From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id C6C7CA04EF; Tue, 2 Jun 2020 07:50:09 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id B867A1BFCA; Tue, 2 Jun 2020 07:50:09 +0200 (CEST) Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by dpdk.org (Postfix) with ESMTP id DE5FB1BFB9 for ; Tue, 2 Jun 2020 07:50:07 +0200 (CEST) IronPort-SDR: 66KPUSXFLm3skIx6cbWLhXQcVzjGLerCPJ3ycfEPGLSW1kDAUNPm27JqivOd4RVbfbBYxgmi8/ +u/GetVWzQiw== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga106.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Jun 2020 22:50:06 -0700 IronPort-SDR: g9N9HCbspgvHCD2bNDEcvRMhQ78411cuzBvjhyvhVOW9koXRymd1348lboC9kMRAOFQHP4aSlP tqUCNS9BQLYQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,463,1583222400"; d="scan'208";a="268578725" Received: from fmsmsx108.amr.corp.intel.com ([10.18.124.206]) by orsmga003.jf.intel.com with ESMTP; 01 Jun 2020 22:50:06 -0700 Received: from fmsmsx101.amr.corp.intel.com (10.18.124.199) by FMSMSX108.amr.corp.intel.com (10.18.124.206) with Microsoft SMTP Server (TLS) id 14.3.439.0; Mon, 1 Jun 2020 22:50:06 -0700 Received: from shsmsx107.ccr.corp.intel.com (10.239.4.96) by fmsmsx101.amr.corp.intel.com (10.18.124.199) with Microsoft SMTP Server (TLS) id 14.3.439.0; Mon, 1 Jun 2020 22:49:01 -0700 Received: from shsmsx101.ccr.corp.intel.com ([169.254.1.85]) by SHSMSX107.ccr.corp.intel.com ([169.254.9.25]) with mapi id 14.03.0439.000; Tue, 2 Jun 2020 13:48:58 +0800 From: "Tu, Lijuan" To: "Fu, Qi" , "dts@dpdk.org" CC: "Fu, Qi" Thread-Topic: [dts] [PATCH V1]test_plans/cvl_dcf_switch_filter_test_plan: add l2tp and esp to dcf switch filter Thread-Index: AQHWOCPjWIzpSm9goUuDtFvsFrsIKKjE0rnA Date: Tue, 2 Jun 2020 05:48:58 +0000 Message-ID: <8CE3E05A3F976642AAB0F4675D0AD20E0BC56F0B@SHSMSX101.ccr.corp.intel.com> References: <20200601234046.81967-1-qi.fu@intel.com> In-Reply-To: <20200601234046.81967-1-qi.fu@intel.com> Accept-Language: zh-CN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.2.0.6 dlp-reaction: no-action x-originating-ip: [10.239.127.40] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [dts] [PATCH V1]test_plans/cvl_dcf_switch_filter_test_plan: add l2tp and esp to dcf switch filter X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" Applied, thanks > -----Original Message----- > From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Fu Qi > Sent: Tuesday, June 2, 2020 7:41 AM > To: dts@dpdk.org > Cc: Fu, Qi > Subject: [dts] [PATCH V1]test_plans/cvl_dcf_switch_filter_test_plan: add = l2tp > and esp to dcf switch filter >=20 > Add l2tpv3 and esp patterns to cvl dcf switch filter. >=20 > Signed-off-by: Fu Qi > --- > .../cvl_dcf_switch_filter_test_plan.rst | 276 +++++++++++++++++- > 1 file changed, 274 insertions(+), 2 deletions(-) >=20 > diff --git a/test_plans/cvl_dcf_switch_filter_test_plan.rst > b/test_plans/cvl_dcf_switch_filter_test_plan.rst > index e22f090..9d415f7 100644 > --- a/test_plans/cvl_dcf_switch_filter_test_plan.rst > +++ b/test_plans/cvl_dcf_switch_filter_test_plan.rst > @@ -153,8 +153,24 @@ Pattern and input set > +---------------------+-------------------------------+---------------= -------------------------- > --+ > | VLAN filter | VLAN filter | [VLAN] = | > +---------------------+-------------------------------+---------------= -------------------------- > --+ > + | | MAC_IPV4_L2TPv3 | [Source IP], [= Dest IP], > [Session_id] | > + | L2TPv3 +-------------------------------+---------------= --------------------------- > -+ > + | | MAC_IPV6_L2TPv3 | [Source IP], [= Dest IP], > [Session_id] | > + +---------------------+-------------------------------+---------------= -------------------------- > --+ > + | | MAC_IPV4_ESP | [Source IP], [= Dest IP], [SPI] > | > + | +-------------------------------+---------------= ----------------------------+ > + | | MAC_IPV6_ESP | [Source IP], [= Dest IP], [SPI] > | > + | +-------------------------------+---------------= ----------------------------+ > + | | MAC_IPV4_AH | [Source IP], [= Dest IP], [SPI] > | > + | ESP +-------------------------------+---------------= ----------------------------+ > + | | MAC_IPV6_AH | [Source IP], [= Dest IP], [SPI] > | > + | +-------------------------------+---------------= ----------------------------+ > + | | MAC_IPV4_NAT-T-ESP | [Source IP], [= Dest IP], [SPI] > | > + | +-------------------------------+---------------= ----------------------------+ > + | | MAC_IPV6_NAT-T-ESP | [Source IP], [= Dest IP], [SPI] > | > + +---------------------+-------------------------------+---------------= -------------------------- > --+ >=20 > - > + > Supported function type > ----------------------- >=20 > @@ -1755,6 +1771,262 @@ Test case: VLAN filter > send matched packets, check the packets are not to port 1. >=20 >=20 > +Test case: MAC_IPV4_L2TPv3 > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D > + > +1. create a rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is > 192.168.0.2 / l2tpv3oip session_id is 1 / end actions vf id 1 / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +2. send matched packets:: > + > + sendp([Ether(dst=3D'00:11:22:33:44:12')/IP(src=3D'192.168.0.2', > proto=3D115)/L2TP('\x00\x00\x00\x01')/('X'*480)], iface=3D"enp27s0f0", co= unt=3D1) > + > + check port 1 receive the packet. > + send mismatched packets:: > + > + sendp([Ether(dst=3D'00:11:22:33:44:12')/IP(src=3D'192.168.0.2', > proto=3D115)/L2TP('\x00\x00\x00\x02')/('X'*480)], iface=3D"enp27s0f0", co= unt=3D1) > + sendp([Ether(dst=3D'00:11:22:33:44:12')/IP(src=3D'192.168.1.2', > proto=3D115)/L2TP('\x00\x00\x00\x01')/('X'*480)], iface=3D"enp27s0f0", co= unt=3D1) > + sendp([Ether(dst=3D'00:11:22:33:44:12')/IP(dst=3D'192.168.0.2', > proto=3D115)/L2TP('\x00\x00\x00\x01')/('X'*480)], iface=3D"enp27s0f0", co= unt=3D1) > + > + check the packets are not to port 1. > + > +3. verify rules can be destroyed:: > + > + testpmd> flow destroy 0 rule 0 > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + send matched packets, check the packets are not to port 1. > + > + > +Test case: MAC_IPV6_L2TPv3 > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D > + > +1. create a rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv6 dst is > 1111:2222:3333:4444:5555:6666:7777:8888 / l2tpv3oip session_id is 1 / end > actions vf id 1 / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +2. send matched packets:: > + > + > sendp([Ether(dst=3D'00:11:22:33:44:13')/IPv6(dst=3D'1111:2222:3333:4444:5= 555:6 > 666:7777:8888', nh=3D115)/L2TP('\x00\x00\x00\x01')/('X'*480)], > iface=3D"enp27s0f0", count=3D1) > + > + check port 1 receive the packet. > + send mismatched packets:: > + > + > sendp([Ether(dst=3D'00:11:22:33:44:13')/IPv6(dst=3D'1111:2222:3333:4444:5= 555:6 > 666:7777:8888', nh=3D115)/L2TP('\x00\x00\x00\x02')/('X'*480)], > iface=3D"enp27s0f0", count=3D1) > + > sendp([Ether(dst=3D'00:11:22:33:44:13')/IPv6(dst=3D'1111:2222:3333:4444:5= 555:6 > 666:7777:9999', nh=3D115)/L2TP('\x00\x00\x00\x01')/('X'*480)], > iface=3D"enp27s0f0", count=3D1) > + > sendp([Ether(dst=3D'00:11:22:33:44:13')/IPv6(src=3D'1111:2222:3333:4444:5= 555:6 > 666:7777:8888', nh=3D115)/L2TP('\x00\x00\x00\x01')/('X'*480)], > iface=3D"enp27s0f0", count=3D1) > + > + check the packets are not to port 1. > + > +3. verify rules can be destroyed:: > + > + testpmd> flow destroy 0 rule 0 > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + send matched packets, check the packets are not to port 1. > + > + > +Test case: MAC_IPV4_ESP > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > + > +1. create a rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is > 192.168.0.2 / esp spi is 1 / end actions vf id 1 / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +2. send matched packets:: > + > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.0.2", > proto=3D50)/ESP(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + > + check port 1 receive the packet. > + send mismatched packets:: > + > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.0.2", > proto=3D50)/ESP(spi=3D2)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.1.2", > proto=3D50)/ESP(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(dst=3D"192.168.0.2", > proto=3D50)/ESP(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + > + check the packets are not to port 1. > + > +3. verify rules can be destroyed:: > + > + testpmd> flow destroy 0 rule 0 > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + send matched packets, check the packets are not to port 1. > + > + > +Test case: MAC_IPV6_ESP > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > + > +1. create a rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv6 dst is > 1111:2222:3333:4444:5555:6666:7777:8888 / esp spi is 1 / end actions vf i= d 1 > / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +2. send matched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(dst=3D"1111:2222:3333:4444:5= 555: > 6666:7777:8888", nh=3D50)/ESP(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", c= ount=3D1) > + > + check port 1 receive the packet. > + send mismatched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(dst=3D"1111:2222:3333:4444:5= 555: > 6666:7777:8888", nh=3D50)/ESP(spi=3D2)/("X"*480)], iface=3D"enp27s0f0", c= ount=3D1) > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(dst=3D"1111:2222:3333:4444:5= 555: > 6666:7777:9999", nh=3D50)/ESP(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", c= ount=3D1) > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(src=3D"1111:2222:3333:4444:5= 555: > 6666:7777:8888", nh=3D50)/ESP(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", c= ount=3D1) > + > + check the packets are not to port 1. > + > +3. verify rules can be destroyed:: > + > + testpmd> flow destroy 0 rule 0 > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + send matched packets, check the packets are not to port 1. > + > + > +Test case: MAC_IPV4_AH > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > + > +1. create a rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is > 192.168.0.2 / ah spi is 1 / end actions vf id 1 / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +2. send matched packets:: > + > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.0.2", > proto=3D51)/AH(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + > + check port 1 receive the packet. > + send mismatched packets:: > + > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.0.2", > proto=3D51)/AH(spi=3D2)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.1.2", > proto=3D51)/AH(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(dst=3D"192.168.0.2", > proto=3D51)/AH(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + > + check the packets are not to port 1. > + > +3. verify rules can be destroyed:: > + > + testpmd> flow destroy 0 rule 0 > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + send matched packets, check the packets are not to port 1. > + > + > +Test case: MAC_IPV6_AH > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > + > +1. create a rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv6 dst is > 1111:2222:3333:4444:5555:6666:7777:8888 / ah spi is 1 / end actions vf id= 1 / > end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +2. send matched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(dst=3D"1111:2222:3333:4444:5= 555: > 6666:7777:8888", nh=3D51)/AH(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", co= unt=3D1) > + > + check port 1 receive the packet. > + send mismatched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(dst=3D"1111:2222:3333:4444:5= 555: > 6666:7777:8888", nh=3D51)/AH(spi=3D2)/("X"*480)], iface=3D"enp27s0f0", co= unt=3D1) > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(dst=3D"1111:2222:3333:4444:5= 555: > 6666:7777:9999", nh=3D51)/AH(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", co= unt=3D1) > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(src=3D"1111:2222:3333:4444:5= 555: > 6666:7777:8888", nh=3D51)/AH(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", co= unt=3D1) > + > + check the packets are not to port 1. > + > +3. verify rules can be destroyed:: > + > + testpmd> flow destroy 0 rule 0 > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + send matched packets, check the packets are not to port 1. > + > + > +Test case: MAC_IPV4_NAT-T-ESP > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D > + > +1. create a rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is > 192.168.0.2 / udp / esp spi is 1 / end actions vf id 1 / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +2. send matched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.0.2")/UDP(dport= =3D450 > 0)/ESP(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + > + check port 1 receive the packet. > + send mismatched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.0.2")/UDP(dport= =3D450 > 0)/ESP(spi=3D2)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.1.2")/UDP(dport= =3D450 > 0)/ESP(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(dst=3D"192.168.0.2")/UDP(dport= =3D450 > 0)/ESP(spi=3D1)/("X"*480)], iface=3D"enp27s0f0", count=3D1) > + > + check the packets are not to port 1. > + > +3. verify rules can be destroyed:: > + > + testpmd> flow destroy 0 rule 0 > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + send matched packets, check the packets are not to port 1. > + > + > +Test case: MAC_IPV6_NAT-T-ESP > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D > + > +1. create a rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv6 dst is > 1111:2222:3333:4444:5555:6666:7777:8888 / udp / esp spi is 1 / end action= s > vf id 1 / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +2. send matched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(dst=3D"1111:2222:3333:4444:5= 555: > 6666:7777:8888")/UDP(dport=3D4500)/ESP(spi=3D1)/("X"*480)], > iface=3D"enp27s0f0", count=3D1) > + > + check port 1 receive the packet. > + send mismatched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(dst=3D"1111:2222:3333:4444:5= 555: > 6666:7777:8888")/UDP(dport=3D4500)/ESP(spi=3D2)/("X"*480)], > iface=3D"enp27s0f0", count=3D1) > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(dst=3D"1111:2222:3333:4444:5= 555: > 6666:7777:9999")/UDP(dport=3D4500)/ESP(spi=3D1)/("X"*480)], > iface=3D"enp27s0f0", count=3D1) > + > sendp([Ether(dst=3D"00:11:22:33:44:13")/IPv6(src=3D"1111:2222:3333:4444:5= 555: > 6666:7777:8888")/UDP(dport=3D4500)/ESP(spi=3D1)/("X"*480)], > iface=3D"enp27s0f0", count=3D1) > + > + check the packets are not to port 1. > + > +3. verify rules can be destroyed:: > + > + testpmd> flow destroy 0 rule 0 > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + send matched packets, check the packets are not to port 1. > + > + > Test case: negative cases > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D >=20 > @@ -1831,7 +2103,7 @@ Subcase 4: unsupported pattern in os default, but > supported in comms >=20 > check the rule not exists in the list. >=20 > -5. repeat step 2-5 with also not supported pattern MAC_IPV4_PFCP_NODE, > get the same result. > +5. repeat step 2-5 with also not supported pattern > MAC_IPV4_PFCP_NODE/MAC_IPV4_L2TPv3/MAC_IPV4_ESP, get the same > result. >=20 > Subcase 5: unsupported input set > -------------------------------- > -- > 2.17.1