From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 5BCFEA0547; Fri, 10 Sep 2021 01:34:05 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 9D64A41143; Fri, 10 Sep 2021 01:33:42 +0200 (CEST) Received: from mail-pf1-f179.google.com (mail-pf1-f179.google.com [209.85.210.179]) by mails.dpdk.org (Postfix) with ESMTP id 754A241121 for ; Fri, 10 Sep 2021 01:33:38 +0200 (CEST) Received: by mail-pf1-f179.google.com with SMTP id x19so201764pfu.4 for ; Thu, 09 Sep 2021 16:33:38 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=networkplumber-org.20150623.gappssmtp.com; s=20150623; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=rESM1MQzNoiY8VEMNKCZYi2f/KHyTbr8M32nD28Rtv4=; b=vrCt+BpL24nP7Ysce6OgFJDW6y6kLyg47SNa2ETCI/tPfm1Vhn1FH3aaRfr+yMC04Z wIVHh2byaUkjmVWXMSIT6wwHdElJmXXWVF0bMxjCoZpnsJp1rY7knCDTI33JaNGzZ4Pa mIS2I6xI35UyliuSuRH4atUO00/PuWYiCdK4XZsBnGhtRMpzTP+y2nF/8pR7AAD7IFYk 1hY06op9bVuze4D2Mkikq4ScgYdT9okSut1OuRYY1gdfCw2SKouiAf9q93XZbisvlQK4 pmCpS8nwnNwk2LK6jB1J4kdGr1HgGrVUL7YxSzkbtRYhuha24TzacJx4tIrUD3Z6FmwS O3xA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=rESM1MQzNoiY8VEMNKCZYi2f/KHyTbr8M32nD28Rtv4=; b=c0U/kH1z+ML29YKmdv5PrPgMqwTOxQMI6XEz6xzuONtQJoIZTiva2q2Jwh7beQOunW dz2jTjkgDVqkxb55rV0DiGQuyAdlTFQ/oMtCG0h6KDD5c+aWlVcGcW7d+k5cwaNeUTRW ArYLZ40Tzpsq3vEqal0EFgaxlhfCQvsIho4s3gGRgVXBMUGB4Q91efo2VxyuNFo11eGI w1HxPh7VVHY/9Sb0zpDfAaeGVfBW+9RARzlHso4NLymqZ12KfrPU8xkBqz6FPJPmgaUV eKe3Rp0ZwPdC6NguWw5oB8pdPDpNQOSkfaoqECYXQcNs172fSARqHreBQZbwXEajb6Wp 6d0A== X-Gm-Message-State: AOAM532HLZkd59oQhmf1zGIv4DVIpLECjUda5XDrXrZ4D4TsvT4QB1RA Vx3fafYIwzl5uKKihEXCzXR2xdNBfE7+vA== X-Google-Smtp-Source: ABdhPJznLM5xYFG39x2L8R1gZ0ImQ57x479HN0Sztbs1zvEs4SLbQVRY9DY3zUz4Gi82W0O6/X88fQ== X-Received: by 2002:a63:385:: with SMTP id 127mr4870061pgd.343.1631230417348; Thu, 09 Sep 2021 16:33:37 -0700 (PDT) Received: from hermes.local (204-195-33-123.wavecable.com. [204.195.33.123]) by smtp.gmail.com with ESMTPSA id z6sm3172255pjn.27.2021.09.09.16.33.36 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 09 Sep 2021 16:33:36 -0700 (PDT) From: Stephen Hemminger To: dev@dpdk.org Cc: Stephen Hemminger Date: Thu, 9 Sep 2021 16:33:24 -0700 Message-Id: <20210909233329.190021-6-stephen@networkplumber.org> X-Mailer: git-send-email 2.30.2 In-Reply-To: <20210909233329.190021-1-stephen@networkplumber.org> References: <20210903004732.109023-1-stephen@networkplumber.org> <20210909233329.190021-1-stephen@networkplumber.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Subject: [dpdk-dev] [PATCH v6 05/10] test: add test for bpf_convert X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Add some functional tests for the Classic BPF to DPDK BPF converter. Signed-off-by: Stephen Hemminger --- app/test/test_bpf.c | 148 ++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 148 insertions(+) diff --git a/app/test/test_bpf.c b/app/test/test_bpf.c index 527c06b80708..68b09067bf56 100644 --- a/app/test/test_bpf.c +++ b/app/test/test_bpf.c @@ -10,6 +10,7 @@ #include #include #include +#include #include #include #include @@ -3233,3 +3234,150 @@ test_bpf(void) } REGISTER_TEST_COMMAND(bpf_autotest, test_bpf); + +#ifdef RTE_PORT_PCAP +#include + +static void +test_bpf_dump(struct bpf_program *cbf, const struct rte_bpf_prm *prm) +{ + printf("cBPF program (%u insns)\n", cbf->bf_len); + bpf_dump(cbf, 1); + + printf("\neBPF program (%u insns)\n", prm->nb_ins); + rte_bpf_dump(stdout, prm->ins, prm->nb_ins); +} + +static int +test_bpf_match(pcap_t *pcap, const char *str, bool expected) +{ + struct bpf_program fcode; + struct rte_bpf_prm *prm = NULL; + struct rte_bpf *bpf = NULL; + uint8_t tbuf[sizeof(struct dummy_mbuf)]; + int ret = -1; + uint64_t rc; + + if (pcap_compile(pcap, &fcode, str, 1, PCAP_NETMASK_UNKNOWN)) { + printf("%s@%d: pcap_compile(\"%s\") failed: %s;\n", + __func__, __LINE__, str, pcap_geterr(pcap)); + return -1; + } + + prm = rte_bpf_convert(&fcode); + if (prm == NULL) { + printf("%s@%d: bpf_convert('%s') failed,, error=%d(%s);\n", + __func__, __LINE__, str, rte_errno, strerror(rte_errno)); + goto error; + } + + bpf = rte_bpf_load(prm); + if (bpf == NULL) { + printf("%s@%d: failed to load bpf code, error=%d(%s);\n", + __func__, __LINE__, rte_errno, strerror(rte_errno)); + goto error; + } + + test_ld_mbuf1_prepare(tbuf); + rc = rte_bpf_exec(bpf, tbuf); + if ((rc == 0) == expected) + ret = 0; + else + printf("%s@%d: failed match: expect %s 0 got %"PRIu64"\n", + __func__, __LINE__, expected ? "==" : "<>", rc); +error: + if (bpf) + rte_bpf_destroy(bpf); + rte_free(prm); + pcap_freecode(&fcode); + return ret; +} + +/* Basic sanity test can we match a IP packet */ +static int +test_bpf_filter_sanity(pcap_t *pcap) +{ + int ret; + + ret = test_bpf_match(pcap, "ip", true); + ret |= test_bpf_match(pcap, "not ip", false); + + return ret; +} + +/* Some sample pcap filter strings from tcpdump man page */ +static const char *sample_filters[] = { + "host 192.168.1.100", + "src net 10", + "not stp", + "len = 128", + "ip host 1.1.1.1 and not 1.1.1.2", + "ip and not net 127.0.0.1", + "tcp[tcpflags] & (tcp-syn|tcp-fin) != 0 and not src and dst net 127.0.0.1", + "ether[0] & 1 = 0 and ip[16] >= 224", + "icmp[icmptype] != icmp-echo and icmp[icmptype] != icmp-echoreply", +}; + +static int +test_bpf_filter(pcap_t *pcap, const char *s) +{ + struct bpf_program fcode; + struct rte_bpf_prm *prm = NULL; + struct rte_bpf *bpf = NULL; + + if (pcap_compile(pcap, &fcode, s, 1, PCAP_NETMASK_UNKNOWN)) { + printf("%s@%d: pcap_compile('%s') failed: %s;\n", + __func__, __LINE__, s, pcap_geterr(pcap)); + return -1; + } + + prm = rte_bpf_convert(&fcode); + if (prm == NULL) { + printf("%s@%d: bpf_convert('%s') failed,, error=%d(%s);\n", + __func__, __LINE__, s, rte_errno, strerror(rte_errno)); + goto error; + } + + bpf = rte_bpf_load(prm); + if (bpf == NULL) { + printf("%s@%d: failed to load bpf code, error=%d(%s);\n", + __func__, __LINE__, rte_errno, strerror(rte_errno)); + goto error; + } + +error: + if (bpf) + rte_bpf_destroy(bpf); + else { + printf("%s \"%s\"\n", __func__, s); + test_bpf_dump(&fcode, prm); + } + + rte_free(prm); + pcap_freecode(&fcode); + return (bpf == NULL) ? -1 : 0; +} + +static int +test_bpf_convert(void) +{ + unsigned int i; + pcap_t *pcap; + int rc; + + pcap = pcap_open_dead(DLT_EN10MB, 262144); + if (!pcap) { + printf("pcap_open_dead failed\n"); + return -1; + } + + rc = test_bpf_filter_sanity(pcap); + for (i = 0; i < RTE_DIM(sample_filters); i++) { + rc |= test_bpf_filter(pcap,sample_filters[i]); + } + pcap_close(pcap); + return rc; +} + +REGISTER_TEST_COMMAND(bpf_convert_autotest, test_bpf_convert); +#endif /* RTE_PORT_PCAP */ -- 2.30.2