From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 64197A0524; Mon, 24 Feb 2020 06:15:24 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 5BCA81F1C; Mon, 24 Feb 2020 06:15:24 +0100 (CET) Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by dpdk.org (Postfix) with ESMTP id 522731DBF for ; Mon, 24 Feb 2020 06:15:22 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga006.fm.intel.com ([10.253.24.20]) by orsmga103.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 23 Feb 2020 21:15:21 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.70,478,1574150400"; d="scan'208";a="437582140" Received: from fmsmsx105.amr.corp.intel.com ([10.18.124.203]) by fmsmga006.fm.intel.com with ESMTP; 23 Feb 2020 21:15:20 -0800 Received: from fmsmsx609.amr.corp.intel.com (10.18.126.89) by FMSMSX105.amr.corp.intel.com (10.18.124.203) with Microsoft SMTP Server (TLS) id 14.3.439.0; Sun, 23 Feb 2020 21:15:20 -0800 Received: from fmsmsx609.amr.corp.intel.com (10.18.126.89) by fmsmsx609.amr.corp.intel.com (10.18.126.89) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Sun, 23 Feb 2020 21:15:19 -0800 Received: from shsmsx101.ccr.corp.intel.com (10.239.4.153) by fmsmsx609.amr.corp.intel.com (10.18.126.89) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_CBC_SHA256) id 15.1.1713.5 via Frontend Transport; Sun, 23 Feb 2020 21:15:19 -0800 Received: from shsmsx103.ccr.corp.intel.com ([169.254.4.196]) by SHSMSX101.ccr.corp.intel.com ([169.254.1.222]) with mapi id 14.03.0439.000; Mon, 24 Feb 2020 13:15:17 +0800 From: "Peng, Yuan" To: "S, Varalakshmi" , "dts@dpdk.org" CC: "S, Varalakshmi" , "Peng, Yuan" Thread-Topic: [dts] [PATCH] L2TPv3 test script Thread-Index: AQHV5/qznPD6ENYcBEaw3YE9i424nKgp0rPg Date: Mon, 24 Feb 2020 05:15:17 +0000 Message-ID: <67D543A150B29E4CAAE53918F64EDAEA37803E3C@SHSMSX103.ccr.corp.intel.com> References: <20200220143247.11878-1-varalakshmi.s@intel.com> In-Reply-To: <20200220143247.11878-1-varalakshmi.s@intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiODU0YzBhYTEtNDllMC00MjA4LWI2MjYtNTRlNWIxYzEwMzY1IiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX05UIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE3LjEwLjE4MDQuNDkiLCJUcnVzdGVkTGFiZWxIYXNoIjoiNE1ESjRnaEhCbTNqSUR5cEZ2TDl0ZW8wbkZTNXhyRGhvamhrczNaZXZkQkxyNWx4YWdRM1NHZ1lkOW02RFFHVyJ9 x-ctpclassification: CTP_NT dlp-product: dlpe-windows dlp-version: 11.2.0.6 dlp-reaction: no-action x-originating-ip: [10.239.127.40] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [dts] [PATCH] L2TPv3 test script X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" Acked by Peng, Yuan -----Original Message----- From: dts On Behalf Of Varalakshmi Sent: Thursday, February 20, 2020 10:33 PM To: dts@dpdk.org Cc: S, Varalakshmi Subject: [dts] [PATCH] L2TPv3 test script diff --git a/tests/TestSuite_DdpL2tpv3.py b/tests/TestSuite_DdpL2tpv3.py ne= w file mode 100644 index 0000000..78d8001 --- /dev/null +++ b/tests/TestSuite_DdpL2tpv3.py @@ -0,0 +1,485 @@ +# +import time +import re +import sys +import utils +from test_case import TestCase +from pmd_output import PmdOutput +from settings import get_nic_name +from scapy.all import * +import random +class TestDdpL2tpv3(TestCase): + + def set_up_all(self): + self.dut_ports =3D self.dut.get_ports(self.nic) + profile_file =3D 'dep/l2tpv3oip-l4.pkg' + profile_dst =3D "/tmp/" + self.dut.session.copy_file_to(profile_file, profile_dst) + out =3D self.dut.send_expect("cat config/common_base", "]# ", 10) + self.PF_Q_strip =3D 'CONFIG_RTE_LIBRTE_I40E_QUEUE_NUM_PER_PF' + pattern =3D "(%s=3D)(\d*)" % self.PF_Q_strip + self.PF_QUEUE =3D self.element_strip(out, pattern) + self.used_dut_port =3D self.dut_ports[0] + tester_port =3D self.tester.get_local_port(self.used_dut_port) + self.tester_intf =3D self.tester.get_interface(tester_port) + self.dut_testpmd =3D PmdOutput(self.dut) + + def set_up(self): + self.load_profile() + + def element_strip(self, out, pattern): + """ + Strip and get queue number. + """ + =20 + s =3D re.compile(pattern) + res =3D s.search(out) + if res is None: + print 'Queue number not in output.' + return None + else: + result =3D res.group(2) + return int(result) + + + def load_profile(self): + """ + Load profile to update FVL configuration tables, profile will be + stored in binary file. + """ + self.dut_testpmd.start_testpmd( + "Default", "--pkt-filter-mode=3Dperfect --port-topology=3Dchai= ned \ + --txq=3D%s --rxq=3D%s --disable-rss" + % (self.PF_QUEUE, self.PF_QUEUE)) + self.dut_testpmd.execute_cmd('port stop 0') + time.sleep(1) + self.dut_testpmd.execute_cmd( + 'ddp add 0 /tmp/l2tpv3oip-l4.pkg,/tmp/l2tpv3oip-l4.bak') + out =3D self.dut_testpmd.execute_cmd('ddp get list 0') + self.verify("Profile number is: 1" in out, + "Failed to load ddp profile!!!") + self.dut_testpmd.execute_cmd('port start 0') + + def l2tpv3pkts(self, keyword): + """ + Generate L2TPv3oIPv4, L2TPv3oIPv6 and UDP packets. + """ + pkt =3D [] + if keyword is not 'def': + if keyword is "l2tpv3oipv4": + pkt.append("Ether()/IP(proto=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IP(proto=3D115)/Raw('\\x00\\x00\\x03\\= fe9')") + if keyword is "l2tpv3oipv4_dst": + pkt.append("Ether()/IP(dst=3D\"8.8.8.8\",proto=3D115)/Raw(= '\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IP(dst=3D\"8.8.8.8\",proto=3D115)/Raw(= '\\x00\\x00\\x03\\xb9')") + pkt.append("Ether()/IP(dst=3D\"88.8.8.8\",proto=3D115)/Raw= ('\\x00\\x00\\x03\\xe9')") + if keyword is "l2tpv3oipv4_src": + pkt.append("Ether()/IP(src=3D\"1.1.1.1\",proto=3D115)/Raw(= '\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IP(src=3D\"1.1.1.1\",proto=3D115)/Raw(= '\\x00\\x00\\x03\\xa9')") + pkt.append("Ether()/IP(src=3D\"11.1.1.1\",proto=3D115)/Raw= ('\\x00\\x00\\x03\\xe9')") + if keyword is "l2tpv3oipv4_src_dst": + pkt.append("Ether()/IP(src=3D\"5.5.5.5\",dst=3D\"2.2.2.2\"= ,proto=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IP(src=3D\"5.5.5.5\",dst=3D\"2.2.2.2\"= ,proto=3D115)/Raw('\\x00\\x00\\x03\\xf9')") + pkt.append("Ether()/IP(src=3D\"55.5.5.5\",dst=3D\"2.2.2.2\= ",proto=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IP(src=3D\"5.5.5.5\",dst=3D\"22.2.2.2\= ",proto=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + if keyword is "l2tpv3oipv6": + pkt.append("Ether()/IPv6(nh=3D115)/Raw('\\x00\\x00\\x03\\x= e9')") + pkt.append("Ether()/IPv6(nh=3D115)/Raw('\\x00\\x00\\x03\\x= c9')") + if keyword is "l2tpv3oipv6_dst": + pkt.append("Ether()/IPv6(dst=3D\"8:7:6:5:4:3:2:1\",nh=3D11= 5)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(dst=3D\"8:7:6:5:4:3:2:1\",nh=3D11= 5)/Raw('\\x00\\x00\\x03\\xd9')") + pkt.append("Ether()/IPv6(dst=3D\"8888:7:6:5:4:3:2:1\",nh= =3D115)/Raw('\\x00\\x00\\x03\\xe9')") + if keyword is "l2tpv3oipv6_src": + pkt.append("Ether()/IPv6(src=3D\"1:2:3:4:5:6:7:8\",nh=3D11= 5)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(src=3D\"1:2:3:4:5:6:7:8\",nh=3D11= 5)/Raw('\\x00\\x00\\x03\\xf9')") + pkt.append("Ether()/IPv6(src=3D\"1111:2:3:4:5:6:7:8\",nh= =3D115)/Raw('\\x00\\x00\\x03\\xe9')") + if keyword is "l2tpv3oipv6_src_dst": + pkt.append("Ether()/IPv6(src=3D\"2:3:4:5:6:7:8:9\",dst=3D\= "6:5:4:3:2:1:8:9\",nh=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(src=3D\"2:3:4:5:6:7:8:9\",dst=3D\= "6:5:4:3:2:1:8:9\",nh=3D115)/Raw('\\x00\\x00\\x03\\xf9')") + pkt.append("Ether()/IPv6(src=3D\"2222:3:4:5:6:7:8:9\",dst= =3D\"6:5:4:3:2:1:8:9\",nh=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(src=3D\"2:3:4:5:6:7:8:9\",dst=3D\= "6666:5:4:3:2:1:8:9\",nh=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + if keyword is "l2tpv3_ipv4_ipv6": + pkt.append("Ether()/IP(proto=3D115)/Raw('\\x00\\x00\\x03\\= xe9')") + pkt.append("Ether()/IP(proto=3D115)/Raw('\\x00\\x00\\x03\\= xf9')") + pkt.append("Ether()/IPv6(nh=3D115)/Raw('\\x00\\x00\\x03\\x= e9')") + pkt.append("Ether()/IPv6(nh=3D115)/Raw('\\x00\\x00\\x03\\x= f9')") + if keyword is "l2tpv3oip_v4src_v6src" : + pkt.append("Ether()/IP(src=3D\"1.3.5.7\",proto=3D115)/Raw(= '\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IP(src=3D\"1.3.5.7\",proto=3D115)/Raw(= '\\x00\\x00\\x03\\xa9')") + pkt.append("Ether()/IP(src=3D\"11.3.5.7\",proto=3D115)/Raw= ('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(src=3D\"1:3:5:7:9:2:4:6\",nh=3D11= 5)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(src=3D\"1:3:5:7:9:2:4:6\",nh=3D11= 5)/Raw('\\x00\\x00\\x03\\xf9')") + pkt.append("Ether()/IPv6(src=3D\"1111:3:5:7:9:2:4:6\",nh= =3D115)/Raw('\\x00\\x00\\x03\\xe9')") + if keyword is "l2tpv3oip_v4dst_v6dst": + pkt.append("Ether()/IP(dst=3D\"9.7.5.3\",proto=3D115)/Raw(= '\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IP(dst=3D\"9.7.5.3\",proto=3D115)/Raw(= '\\x00\\x00\\x03\\xb9')") + pkt.append("Ether()/IP(dst=3D\"99.7.5.3\",proto=3D115)/Raw= ('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(dst=3D\"2:4:6:8:1:3:5:7\",nh=3D11= 5)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(dst=3D\"2:4:6:8:1:3:5:7\",nh=3D11= 5)/Raw('\\x00\\x00\\x03\\xd9')") + pkt.append("Ether()/IPv6(dst=3D\"2222:4:6:8:1:3:5:7\",nh= =3D115)/Raw('\\x00\\x00\\x03\\xe9')") + if keyword is "l2tpv3oip_v4srcdst_v6srcdst": + pkt.append("Ether()/IP(src=3D\"9.8.7.6\",dst=3D\"4.5.6.7\"= ,proto=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IP(src=3D\"9.8.7.6\",dst=3D\"4.5.6.7\"= ,proto=3D115)/Raw('\\x00\\x00\\x03\\xf9')") + pkt.append("Ether()/IP(src=3D\"99.8.7.6\",dst=3D\"4.5.6.7\= ",proto=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IP(src=3D\"9.8.7.6\",dst=3D\"44.5.6.7\= ",proto=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(src=3D\"1:2:3:4:5:6:7:8\",dst=3D\= "9:8:7:6:5:4:3:2\",nh=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(src=3D\"1:2:3:4:5:6:7:8\",dst=3D\= "9:8:7:6:5:4:3:2\",nh=3D115)/Raw('\\x00\\x00\\x03\\xf9')") + pkt.append("Ether()/IPv6(src=3D\"1111:2:3:4:5:6:7:8\",dst= =3D\"9:8:7:6:5:4:3:2\",nh=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(src=3D\"1:2:3:4:5:6:7:8\",dst=3D\= "9999:8:7:6:5:4:3:2\",nh=3D115)/Raw('\\x00\\x00\\x03\\xe9')") + if keyword is "l2tpv3oip_v4_v6_udp": + pkt.append("Ether()/IP(dst=3D\"9.7.5.3\",proto=3D115)/Raw(= '\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IP(dst=3D\"9.7.5.3\",proto=3D115)/Raw(= '\\x00\\x00\\x03\\xb9')") + pkt.append("Ether()/IPv6(dst=3D\"2:4:6:8:1:3:5:7\",nh=3D11= 5)/Raw('\\x00\\x00\\x03\\xe9')") + pkt.append("Ether()/IPv6(dst=3D\"2:4:6:8:1:3:5:7\",nh=3D11= 5)/Raw('\\x00\\x00\\x03\\xd9')") + pkt.append("Ether()/IP()/UDP()") + return pkt + + def send_and_verify(self,keyword=3D'def'): + """ + Send packets and verify result. + """ + pkt =3D self.l2tpv3pkts(keyword) + qnum=3D[] + for i in range(len(pkt)): + self.tester.scapy_append('sendp([%s], iface=3D"%s")'%(pkt[i], self.te= ster_intf)) + self.tester.scapy_execute() + out =3D self.dut.get_session_output(timeout=3D2) + pattern =3D "port (\d)/queue (\d{1,2}): received (\d) packets" + qnum.append(self.element_strip(out, pattern)) + return qnum + + def run_fd_test(self, keyword,crlwords_ipv4,crlwords_ipv6): + """ + Configure Flow director rules. + =20 + keywords: keywords have IPv4/IPv6 SIP DIP and UDP + """ + self.dut_testpmd.execute_cmd('port stop 0') + self.dut_testpmd.execute_cmd('port config 0 pctype 28 fdir_inset c= lear all') + self.dut_testpmd.execute_cmd('port config 0 pctype 38 fdir_inset c= lear all') + if crlwords_ipv4 is not None: + for field in crlwords_ipv4: + self.dut_testpmd.execute_cmd('port config 0 pctype 28 fdir= _inset set field {}'.format(field)) + if crlwords_ipv6 is not None: + for field in crlwords_ipv6: + self.dut_testpmd.execute_cmd('port config 0 pctype 38 fdir= _inset set field {}'.format(field)) + self.dut_testpmd.execute_cmd('port start 0') + self.dut_testpmd.execute_cmd('start') + self.dut_testpmd.execute_cmd('set verbose 1') + qdef=3D[] + qnum =3D self.send_and_verify(keyword) + for i in range(len(qnum)): + self.verify(qnum[i] =3D=3D 0, "Receive packet from wrong=20 +queue!!!") + =20 + queue =3D random.randint(1, self.PF_QUEUE - 1) + =20 + if 'l2tpv3oipv4' is keyword: + =09 + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv4 / l2tpv3oip session_id is 1001 / end actions queue index {} / end= '.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of non=20 +matching sessionID + =20 + if 'l2tpv3oipv4_dst' is keyword: + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv4 dst is 8.8.8.8 / l2tpv3oip session_id is 1001 / end actions que= ue index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of non mat= ching sessionID + qdef.append(0) #Default Queue number to check for in case of non=20 +matching DIP + + + if 'l2tpv3oipv4_src' is keyword: + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv4 src is 1.1.1.1 / l2tpv3oip session_id is 1001 / end actions queue= index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of non mat= ching sessionID + qdef.append(0) #Default Queue number to check for in case of non=20 +matching SIP + + if 'l2tpv3oipv4_src_dst' is keyword: + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv4 src is 5.5.5.5 dst is 2.2.2.2 / l2tpv3oip session_id is 1001 / en= d actions queue index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of non mat= ching sessionID + qdef.append(0) #Default Queue number to check for in case of non mat= ching SIP + qdef.append(0) #Default Queue number to check for in case of non=20 +matching DIP + + if 'l2tpv3oipv6' is keyword: + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv6 / l2tpv3oip session_id is 1001 / end actions queue index {} / end= '.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of non=20 +matching sessionID + + if 'l2tpv3oipv6_dst' is keyword: + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv6 dst is 8:7:6:5:4:3:2:1 / l2tpv3oip session_id is 1001 / end actio= ns queue index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of non mat= ching sessionID + qdef.append(0) #Default Queue number to check for in case of non=20 +matching DIP + + if 'l2tpv3oipv6_src' is keyword: + self.dut_testpmd.execute_cmd('flow create 0 ingress pattern et= h / ipv6 src is 1:2:3:4:5:6:7:8 / l2tpv3oip session_id is 1001 / end action= s queue index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of non mat= ching sessionID + qdef.append(0) #Default Queue number to check for in case of non=20 +matching SIP + + if 'l2tpv3oipv6_src_dst' is keyword: + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv6 src is 2:3:4:5:6:7:8:9 dst is 6:5:4:3:2:1:8:9 / l2tpv3oip session= _id is 1001 / end actions queue index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of non mat= ching sessionID + qdef.append(0) #Default Queue number to check for in case of non mat= ching SIP + qdef.append(0) #Default Queue number to check for in case of non=20 +matching DIP + + if 'l2tpv3_ipv4_ipv6' is keyword: + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv4 / l2tpv3oip session_id is 1001 / end actions queue index {} / end= '.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of non mat= ching sessionID + queue =3D random.randint(1, self.PF_QUEUE - 1) + out=3Dself.dut_testpmd.execute_cmd( 'flow create 0 ingress pat= tern eth / ipv6 / l2tpv3oip session_id is 1001 / end actions queue index {}= / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of non=20 +matching sessionID + + if 'l2tpv3oip_v4src_v6src' is keyword: + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv4 src is 1.3.5.7 / l2tpv3oip session_id is 1001 / end actions queue= index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of n= on matching sessionID + qdef.append(0) #Default Queue number to check for in case of n= on matching IPv4 SIP + queue =3D random.randint(1, self.PF_QUEUE - 1) + out=3Dself.dut_testpmd.execute_cmd( 'flow create 0 ingress pat= tern eth / ipv6 src is 1:3:5:7:9:2:4:6 / l2tpv3oip session_id is 1001 / end= actions queue index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of n= on matching sessionID + qdef.append(0) #Default Queue number to check for in case=20 + of non matching IPv6 SIP + + if 'l2tpv3oip_v4dst_v6dst' is keyword: + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv4 dst is 9.7.5.3 / l2tpv3oip session_id is 1001 / end actions queue= index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of = non matching sessionID + qdef.append(0) #Default Queue number to check for in case of = non matching IPv4 DIP + queue =3D random.randint(1, self.PF_QUEUE - 1) + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv6 dst is 2:4:6:8:1:3:5:7 / l2tpv3oip session_id is 1001 / end actio= ns queue index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of n= on matching sessionID + qdef.append(0) #Default Queue number to check for in case=20 + of non matching IPv6 DIP + + if 'l2tpv3oip_v4srcdst_v6srcdst' is keyword: + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv4 src is 9.8.7.6 dst is 4.5.6.7 / l2tpv3oip session_id is 1001 / en= d actions queue index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of = non matching sessionID + qdef.append(0) #Default Queue number to check for in case of = non matching IPv4 SIP + qdef.append(0) #Default Queue number to check for in case of = non matching IPv4 DIP + queue =3D random.randint(1, self.PF_QUEUE - 1) + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv6 src is 1:2:3:4:5:6:7:8 dst is 9:8:7:6:5:4:3:2 / l2tpv3oip session= _id is 1001 / end actions queue index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of = non matching sessionID + qdef.append(0) #Default Queue number to check for in case of = non matching IPv6 SIP + qdef.append(0) #Default Queue number to check for in case=20 + of non matching IPv6 DIP + + if 'l2tpv3oip_v4_v6_udp' is keyword: + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv4 / l2tpv3oip session_id is 1001 / end actions queue index {} / end= '.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID + qdef.append(0) #Default Queue number to check for in case of n= on matching sessionID + queue =3D random.randint(1, self.PF_QUEUE - 1) + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv6 / l2tpv3oip session_id is 1001 / end actions queue index {} / end= '.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule for= matched sessionID=20 + qdef.append(0) #Default Queue number to check for in case of n= on matching sessionID + queue =3D random.randint(1, self.PF_QUEUE - 1) + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern e= th / ipv4 / udp / end actions queue index {} / end'.format(queue)) + qdef.append(queue) #Queue Number as configured in the rule + + qnum=3Dself.send_and_verify(keyword) + for i in range(len(qdef)): + self.verify(qdef[i] =3D=3D qnum[i], "Receive packet from wrong queue!= !!") + self.dut_testpmd.execute_cmd("flow flush 0") # Delete all the=20 +flow director rules + =20 + def test_l2tpv3oipv4(self): + """ + L2TPv3 PAY is supported by NVM with profile updated. + Default flow director input set is sessionID + flow director works to send matched packets to configured queue,=20 + otherwise to queue 0. + """ + keyword =3D 'l2tpv3oipv4' + crlwords_ipv4=3Drange(44,46) + crlwords_ipv6=3DNone + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + =20 + def test_l2tpv3oipv4_src(self): + """ + Flow director input set is sessionID + SIP for pctype 28 + """ + + crlwords_ipv4=3Dlist(range(15,17))+list(range(44,46)) + crlwords_ipv6=3DNone + keyword =3D 'l2tpv3oipv4_src' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + + def test_l2tpv3oipv4_dst(self): + """ + Flow director input set is sessionID + DIP for pctype 28 + """ + crlwords_ipv4=3Dlist(range(27,29))+list(range(44,46)) + crlwords_ipv6=3DNone + keyword =3D 'l2tpv3oipv4_dst' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + + def test_l2tpv3oipv4_src_dst(self): + """ + Flow director input set is sessionID + SIP + DIP for pctype 28 + """ + crlwords_ipv4=3Dlist(range(15,17))+list(range(27,29))+list(range(4= 4,46)) + crlwords_ipv6=3DNone + keyword =3D 'l2tpv3oipv4_src_dst' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + =20 + def test_l2tpv3oipv6(self): + + """ + Flow director input set is sessionID for pctyp 38 + """ + crlwords_ipv6=3Drange(44,46) + crlwords_ipv4=3DNone + keyword =3D 'l2tpv3oipv6' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + =20 + def test_l2tpv3oipv6_dst(self): + """ + Flow director input set is sessionID + DIP for pctype 38 + """ + crlwords_ipv4=3DNone + crlwords_ipv6=3Dlist(range(21,29))+list(range(44,46)) + keyword =3D 'l2tpv3oipv6_dst' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + + def test_l2tpv3oipv6_src(self): + """ + Flow director input set is sessionID + SIP for pctype 38 + """ + crlwords_ipv4=3DNone + crlwords_ipv6=3Dlist(range(13,21))+list(range(44,46)) + keyword =3D 'l2tpv3oipv6_src' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + + def test_l2tpv3oipv6_src_dst(self): + """ + Flow director input set is sessionID + SIP + DIP for pctype 38 + """ + crlwords_ipv4=3DNone + crlwords_ipv6=3Dlist(range(13,29))+list(range(44,46)) + keyword =3D 'l2tpv3oipv6_src_dst' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + + def test_l2tpv3_ipv4_ipv6(self): + """ + Flow director input set is sessionID for pctype 28 and 38 + """ + crlwords_ipv4=3Drange(44,46) + crlwords_ipv6=3Drange(44,46) + keyword =3D 'l2tpv3_ipv4_ipv6' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + + def test_l2tpv3oip_v4src_v6src(self): + """ + Flow director input set is sessionID + SIP for pctype 28 and 38 + """ + crlwords_ipv4=3Dlist(range(15,17))+list(range(44,46)) + crlwords_ipv6=3Dlist(range(13,21))+list(range(44,46)) + keyword =3D 'l2tpv3oip_v4src_v6src' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + + def test_l2tpv3oip_v4dst_v6dst(self): + """ + Flow director input set is sessionID + DIP for pctype 28 and 38 + """ + crlwords_ipv4=3Dlist(range(27,29))+list(range(44,46)) + crlwords_ipv6=3Dlist(range(21,29))+list(range(44,46)) + keyword =3D 'l2tpv3oip_v4dst_v6dst' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + + def test_l2tpv3oip_v4srcdst_v6srcdst(self): + """ + Flow director input set is sessionID + SIP + DIP for pctype 28 and= 38=20 + """ + crlwords_ipv4=3Dlist(range(15,17))+list(range(27,29))+list(range(4= 4,46)) + crlwords_ipv6=3Dlist(range(13,29))+list(range(44,46)) + keyword =3D 'l2tpv3oip_v4srcdst_v6srcdst' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) + + def test_l2tpv3oip_v4_v6_udp(self): + """ + Flow director input set is sessionID for pctype 28 and 38=20 + """ + crlwords_ipv4=3Drange(44,46) + crlwords_ipv6=3Drange(44,46) + keyword =3D 'l2tpv3oip_v4_v6_udp' + self.run_fd_test(keyword,crlwords_ipv4,crlwords_ipv6) +=09 + def test_l2tpv3oip_load_profile(self): + """ + Test to load the profile. + Step1: Check if it is already loaded, if loaded delete the same + Step2: Load the profile + """ + self.dut_testpmd.execute_cmd('port stop 0') + + out=3Dself.dut_testpmd.execute_cmd('ddp get list 0') + if "L2TPv3oIP with L4 payload" in out: + print "Profile is already loaded!!" + out=3Dself.dut_testpmd.execute_cmd('ddp del 0 /tmp/l2tpv3oip-l= 4.bak') + out=3Dself.dut_testpmd.execute_cmd('ddp add 0 /tmp/l2tpv3oip-l4.pk= g,/tmp/l2tpv3oip-l4.bak') + out=3Dself.dut_testpmd.execute_cmd('ddp get list 0') + self.verify("L2TPv3oIP with L4 payload" in out,"Failed to Load=20 + DDP profile ") + =20 + def test_l2tpv3oip_delete_profile(self): + """ + Test to delete the profile. + Step1: Check if profile is loaded, if loaded, delete the same + Step2: Add the profile again + """ + self.dut_testpmd.execute_cmd('port stop 0') + out=3Dself.dut_testpmd.execute_cmd('ddp get list 0') + + if "L2TPv3oIP with L4 payload" not in out: + out=3Dself.dut_testpmd.execute_cmd('ddp add 0 /tmp/l2tpv3oip-l= 4.pkg,/tmp/l2tpv3oip-l4.bak') + out=3Dself.dut_testpmd.execute_cmd('ddp get list 0') + self.verify("L2TPv3oIP with L4 payload" in out,"Error in loadi= ng the Profile") + out=3Dself.dut_testpmd.execute_cmd('ddp del 0 /tmp/l2tpv3oip-l4.bak') + print out + out=3Dself.dut_testpmd.execute_cmd('ddp get list 0') + print out + self.verify("Profile number is: 0" in out,"Error in @@deleting the= Profile !!") + out=3Dself.dut_testpmd.execute_cmd('ddp add 0 /tmp/l2tpv3oip-l4.pk= g,/tmp/l2tpv3oip-l4.bak') + out=3Dself.dut_testpmd.execute_cmd('ddp get list 0') + self.verify("L2TPv3oIP with L4 payload" in out,"Error in=20 +loading the Profile") + =20 + def test_l2tpv3oip_delete_rules(self): + """=20 + Test to Add, delete and flush flow director rules + Step1: Add 3 rules, flow list , all rules are listed + Step2: Delete 1 rule, flow list, The first rule should not be list= ed + Step3: Flush all rules , flow list, No rules should be listed. + """ + queue =3D random.randint(1, self.PF_QUEUE - 1) + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern eth /= ipv4 / l2tpv3oip session_id is 1001 / end actions queue index {} / end'.fo= rmat(queue)) + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern eth /= ipv4 / l2tpv3oip session_id is 1002 / end actions queue index {} / end'.fo= rmat(queue)) + self.dut_testpmd.execute_cmd( 'flow create 0 ingress pattern eth /= ipv4 / l2tpv3oip session_id is 1003 / end actions queue index {} / end'.fo= rmat(queue)) + out=3Dself.dut_testpmd.execute_cmd('flow list 0') + verify=3Dout.splitlines() + self.verify(len(verify)=3D=3D 6,"Flow rules not added") + self.dut_testpmd.execute_cmd( 'flow destroy 0 rule 0') + out=3Dself.dut_testpmd.execute_cmd('flow list 0') + verify=3Dout.splitlines() + self.verify(len(verify)=3D=3D 5,"Flow rules not destroyed") + self.dut_testpmd.execute_cmd( 'flow flush 0') + out=3Dself.dut_testpmd.execute_cmd('flow list 0') + verify=3Dout.splitlines() + self.verify(len(verify)=3D=3D 1,"Flow rules not destroyed") + =20 + def tear_down(self): + self.dut_testpmd.execute_cmd('stop') + out =3D self.dut_testpmd.execute_cmd('ddp get list 0') + if "Profile number is: 0" not in out: + self.dut_testpmd.execute_cmd('port stop all') + time.sleep(1) + self.dut_testpmd.execute_cmd('ddp del 0 /tmp/l2tpv3oip-l4.bak'= ) + out =3D self.dut_testpmd.execute_cmd('ddp get list 0') + self.verify("Profile number is: 0" in out, + "Failed to delete ddp profile!!!") + self.dut_testpmd.execute_cmd('port start all') + self.dut_testpmd.quit() + + def tear_down_all(self): + pass + -- 2.17.1