* [dts] [PATCH V1 0/2] Ipgre automation testing script
@ 2016-07-26 5:24 Yufen Mo
2016-07-26 5:24 ` [dts] [PATCH V1 1/2] add sctp/gre format support in framework/packet module Yufen Mo
2016-07-26 5:24 ` [dts] [PATCH V1 2/2] Ipgre: upload automation testing script Yufen Mo
0 siblings, 2 replies; 4+ messages in thread
From: Yufen Mo @ 2016-07-26 5:24 UTC (permalink / raw)
To: dts; +Cc: yufengmx
From: yufengmx <yufengx.mo@intel.com>
yufengmx (2):
add sctp/gre format support in framework/packet module
Ipgre: upload automation testing script
framework/packet.py | 19 +++
test_plans/ipgre_test_plan.rst | 181 +++++++++++++++++++++++++
tests/TestSuite_ipgre.py | 295 +++++++++++++++++++++++++++++++++++++++++
3 files changed, 495 insertions(+)
create mode 100644 test_plans/ipgre_test_plan.rst
create mode 100644 tests/TestSuite_ipgre.py
--
1.9.3
^ permalink raw reply [flat|nested] 4+ messages in thread
* [dts] [PATCH V1 1/2] add sctp/gre format support in framework/packet module
2016-07-26 5:24 [dts] [PATCH V1 0/2] Ipgre automation testing script Yufen Mo
@ 2016-07-26 5:24 ` Yufen Mo
2016-07-26 5:24 ` [dts] [PATCH V1 2/2] Ipgre: upload automation testing script Yufen Mo
1 sibling, 0 replies; 4+ messages in thread
From: Yufen Mo @ 2016-07-26 5:24 UTC (permalink / raw)
To: dts; +Cc: yufengmx
From: yufengmx <yufengx.mo@intel.com>
Signed-off-by: yufengmx <yufengx.mo@intel.com>
---
framework/packet.py | 19 +++++++++++++++++++
1 file changed, 19 insertions(+)
diff --git a/framework/packet.py b/framework/packet.py
index a46fd47..30f3b4a 100755
--- a/framework/packet.py
+++ b/framework/packet.py
@@ -255,12 +255,24 @@ class scapy(object):
if chksum is not None:
pkt_layer.chksum = chksum
+ def sctp(self, src=53, dst=53, len=None, chksum=None):
+ self.pkt[SCTP].sport = src
+ self.pkt[SCTP].dport = dst
+ if len is not None:
+ self.pkt[SCTP].len = len
+ if chksum is not None:
+ self.pkt[SCTP].chksum = chksum
+
def raw(self, pkt_layer, payload=None):
if payload is not None:
pkt_layer.load = ''
for hex1, hex2 in payload:
pkt_layer.load += struct.pack("=B", int('%s%s' %(hex1, hex2), 16))
+ def gre(self, proto=None):
+ if proto is not None:
+ self.pkt[GRE].proto = proto
+
def vxlan(self, pkt_layer, vni=0):
pkt_layer.vni = vni
@@ -450,6 +462,7 @@ class Packet(object):
'IPihl': 'ipv4ihl',
'IPFRAG': 'ipv4_ext',
'IPv6': 'ipv6',
+ 'IPv6-TUNNEL':'inner_ipv6',
'IPv6FRAG': 'ipv6_frag',
'IPv6EXT': 'ipv6_ext',
'IPv6EXT2': 'ipv6_ext2',
@@ -565,6 +578,12 @@ class Packet(object):
def _config_layer_tcp(self, pkt_layer, config):
return self.pktgen.tcp(pkt_layer, **config)
+ def _config_layer_sctp(self, pkt_layer, config):
+ return self.pktgen.sctp(**config)
+
+ def _config_layer_gre(self, pkt_layer, config):
+ return self.pktgen.gre(**config)
+
def _config_layer_raw(self, pkt_layer, config):
return self.pktgen.raw(pkt_layer, **config)
--
1.9.3
^ permalink raw reply [flat|nested] 4+ messages in thread
* [dts] [PATCH V1 2/2] Ipgre: upload automation testing script
2016-07-26 5:24 [dts] [PATCH V1 0/2] Ipgre automation testing script Yufen Mo
2016-07-26 5:24 ` [dts] [PATCH V1 1/2] add sctp/gre format support in framework/packet module Yufen Mo
@ 2016-07-26 5:24 ` Yufen Mo
2016-07-26 5:32 ` Liu, Yong
1 sibling, 1 reply; 4+ messages in thread
From: Yufen Mo @ 2016-07-26 5:24 UTC (permalink / raw)
To: dts; +Cc: yufengmx
From: yufengmx <yufengx.mo@intel.com>
Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate
a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network.
Fortville support GRE packet detecting, checksum computing and filtering.
Signed-off-by: yufengmx <yufengx.mo@intel.com>
---
test_plans/ipgre_test_plan.rst | 181 +++++++++++++++++++++++++
tests/TestSuite_ipgre.py | 295 +++++++++++++++++++++++++++++++++++++++++
2 files changed, 476 insertions(+)
create mode 100644 test_plans/ipgre_test_plan.rst
create mode 100644 tests/TestSuite_ipgre.py
diff --git a/test_plans/ipgre_test_plan.rst b/test_plans/ipgre_test_plan.rst
new file mode 100644
index 0000000..444efdf
--- /dev/null
+++ b/test_plans/ipgre_test_plan.rst
@@ -0,0 +1,181 @@
+.. Copyright(c) 2010-2016 Intel Corporation
+ All rights reserved.
+
+ Redistribution and use in source and binary forms, with or without
+ modification, are permitted provided that the following conditions
+ are met:
+
+ - Redistributions of source code must retain the above copyright
+ notice, this list of conditions and the following disclaimer.
+
+ - Redistributions in binary form must reproduce the above copyright
+ notice, this list of conditions and the following disclaimer in
+ the documentation and/or other materials provided with the
+ distribution.
+
+ - Neither the name of Intel Corporation nor the names of its
+ contributors may be used to endorse or promote products derived
+ from this software without specific prior written permission.
+
+ THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
+ FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
+ COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
+ INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
+ (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+ SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+ HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+ STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+ ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
+ OF THE POSSIBILITY OF SUCH DAMAGE.
+
+
+====================
+Generic Routing Encapsulation (GRE)
+====================
+
+Generic Routing Encapsulation (GRE) is a tunneling protocol developed by Cisco Systems that can encapsulate a wide variety of network layer protocols inside virtual point-to-point links over an Internet Protocol network.
+Fortville support GRE packet detecting, checksum computing and filtering.
+
+Prerequisites
+-------------
+
+Fortville nic should be on the DUT.
+
+Test cases
+----------
+
+Test Case 1: GRE ipv4 packet detect
+=================================
+Start testpmd and enable rxonly forwarding mode::
+ testpmd -c ffff -n 4 -- -i --txqflags=0x0
+ testpmd> set fwd rxonly
+ testpmd> set verbose 1
+ testpmd> start
+
+Send packet as table listed and packet type match each layer.
+
++------------+----------+-----------+----------+-----------+
+| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 |
++------------+----------+-----------+----------+-----------+
+| No | Ipv4 | GRE | Ipv4 | Udp |
++------------+----------+-----------+----------+-----------+
+| No | Ipv4 | GRE | Ipv4 | Tcp |
++------------+----------+-----------+----------+-----------+
+| No | Ipv4 | GRE | Ipv4 | Sctp |
++------------+----------+-----------+----------+-----------+
+| Yes | Ipv4 | GRE | Ipv4 | Udp |
++------------+----------+-----------+----------+-----------+
+| Yes | Ipv4 | GRE | Ipv4 | Tcp |
++------------+----------+-----------+----------+-----------+
+| Yes | Ipv4 | GRE | Ipv4 | Sctp |
++------------+----------+-----------+----------+-----------+
+
+
+Test Case 2: GRE ipv6 packet detect
+=================================
+Start testpmd and enable rxonly forwarding mode::
+ testpmd -c ffff -n 4 -- -i --txqflags=0x0
+ testpmd> set fwd rxonly
+ testpmd> set verbose 1
+ testpmd> start
+
+Send packet as table listed and packet type match each layer.
+Ether()/IPv6(nh=47)/GRE()/IP()/UDP()/Raw('x'*40)
+Ether()/IPv6(nh=47)/GRE(proto=0x86dd)/IPv6()/UDP()/Raw('x'*40)
++------------+----------+-----------+----------+-----------+
+| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 |
++------------+----------+-----------+----------+-----------+
+| No | Ipv6 | GRE | Ipv4 | Udp |
++------------+----------+-----------+----------+-----------+
+| No | Ipv6 | GRE | Ipv4 | Tcp |
++------------+----------+-----------+----------+-----------+
+| No | Ipv6 | GRE | Ipv4 | Sctp |
++------------+----------+-----------+----------+-----------+
+| Yes | Ipv6 | GRE | Ipv4 | Udp |
++------------+----------+-----------+----------+-----------+
+| Yes | Ipv6 | GRE | Ipv4 | Tcp |
++------------+----------+-----------+----------+-----------+
+| Yes | Ipv6 | GRE | Ipv4 | Sctp |
++------------+----------+-----------+----------+-----------+
+
++------------+----------+-----------+----------+-----------+
+| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 |
++------------+----------+-----------+----------+-----------+
+| No | Ipv6 | GRE | Ipv6 | Udp |
++------------+----------+-----------+----------+-----------+
+| No | Ipv6 | GRE | Ipv6 | Tcp |
++------------+----------+-----------+----------+-----------+
+| No | Ipv6 | GRE | Ipv6 | Sctp |
++------------+----------+-----------+----------+-----------+
+| Yes | Ipv6 | GRE | Ipv6 | Udp |
++------------+----------+-----------+----------+-----------+
+| Yes | Ipv6 | GRE | Ipv6 | Tcp |
++------------+----------+-----------+----------+-----------+
+| Yes | Ipv6 | GRE | Ipv6 | Sctp |
++------------+----------+-----------+----------+-----------+
+
+Test Case 3: GRE packet filter
+============================
+Start testpmd with multi queues::
+ testpmd -c ff -n 3 -- -i --rxq=4 --txq=4 --txqflags=0x0
+ testpmd> set fwd rxonly
+ testpmd> set nbcore 4
+ testpmd> set verbose 1
+ testpmd> start
+
+Add GRE filter that forward inner ip address 0.0.0.0 to queue 3
+ testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
+ 0.0.0.0 1 ipingre iip 0 3
+
+Send packet inner ip address matched and check packet recevied by queue 3.
+ p = Ether()/IP()/GRE()/IP(dst="0.0.0.0")/UDP()
+
+Remove tunnel filter and check same packet recevied by queue 0
+ testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
+ 0.0.0.0 1 ipingre iip 0 3
+
+Add GRE filter that forward outer ip address 0.0.0.0 to queue 3
+ testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
+ 0.0.0.0 1 ipingre oip 0 3
+
+Send packet outer ip address matched and check packet recevied by queue 3.
+
+Remove tunnel filter and check same packet recevied by queue 0.
+ testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
+ 0.0.0.0 1 ipingre iip 0 3
+
+Test Case 4: GRE packet chksum offload
+====================================
+Start testpmd with hardware checksum offload enabled::
+ testpmd -c ff -n 3 -- -i --txqflags=0x0 --enable-rx-cksum --port-topology=loop
+ testpmd> set verbose 1
+ testpmd> set fwd csum
+ testpmd> csum set ip hw 0
+ testpmd> csum set udp hw 0
+ testpmd> csum set sctp hw 0
+ testpmd> csum set outer-ip hw 0
+ testpmd> csum set tcp hw 0
+ testpmd> csum parse_tunnel on 0
+ testpmd> start
+
+Send packet with wrong outer IP checksum and check forwarded packet IP
+checksum is correct.
+ Ether()/IP(chksum=0x0)/GRE()/IP()/TCP()
+
+Send packet with wrong inner IP checksum and check forwarded packet IP
+checksum is correct.
+ Ether()/IP()/GRE()/IP(chksum=0x0)/TCP()
+
+Send packet with wrong inner TCP checksum and check forwarded packet TCP
+checksum is correct.
+ Ether()/IP()/GRE()/IP()/TCP(chksum=0x0)
+
+Send packet with wrong inner UDP checksum and check forwarded packet UDP
+checksum is correct.
+ Ether()/IP()/GRE()/IP()/UDP(chksum=0xffff)
+
+Send packet with wrong inner SCTP checksum and check forwarded packet SCTP
+checksum is correct.
+ Ether()/IP()/GRE()/IP()/SCTP(chksum=0x0)
diff --git a/tests/TestSuite_ipgre.py b/tests/TestSuite_ipgre.py
new file mode 100644
index 0000000..069fe3f
--- /dev/null
+++ b/tests/TestSuite_ipgre.py
@@ -0,0 +1,295 @@
+# BSD LICENSE
+#
+# Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+#
+# * Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# * Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in
+# the documentation and/or other materials provided with the
+# distribution.
+# * Neither the name of Intel Corporation nor the names of its
+# contributors may be used to endorse or promote products derived
+# from this software without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+"""
+DPDK Test suite.
+
+Generic Routing Encapsulation (GRE) is a tunneling protocol developed by
+Cisco Systems that can encapsulate a wide variety of network layer protocols
+inside virtual point-to-point links over an Internet Protocol network.
+
+Fortville support GRE packet detecting, checksum computing and filtering.
+"""
+
+import time
+import os
+
+import dts
+from test_case import TestCase
+from exception import VerifyFailure
+from packet import Packet
+
+class TestIpgre(TestCase):
+
+ def set_up_all(self):
+ """
+ Run at the start of each test suite.
+ """
+ self.printFlag = dts.debug_mode
+ self.src_mac = "11:22:33:44:55:66"
+ ports = self.dut.get_ports()
+ self.verify(self.nic.startswith("fortville"),
+ "GRE tunnel packet type only support by Fortville")
+ self.verify(len(ports) >= 2, "Insufficient ports for testing")
+ valports = [_ for _ in ports if self.tester.get_local_port(_) != -1]
+ # start testpmd
+ self.dut_port = valports[0]
+ tester_port = self.tester.get_local_port(self.dut_port)
+ self.tester_iface = self.tester.get_interface(tester_port)
+ self.tester_iface_mac = self.tester.get_mac(tester_port)
+
+ def set_up(self):
+ """
+ Run before each test case.
+ Nothing to do.
+ """
+ pass
+
+ def check_packet_transmission(self, pkt_types, layer_configs=None):
+ time.sleep(1)
+ for pkt_type in pkt_types.keys():
+ pkt_names = pkt_types[pkt_type]
+ pkt = Packet(pkt_type=pkt_type)
+ if layer_configs:
+ for layer in layer_configs.keys():
+ pkt.config_layer(layer, layer_configs[layer])
+ pkt.send_pkt(tx_port=self.tester_iface)
+ out = self.dut.get_session_output(timeout=2)
+ if self.printFlag: # debug output
+ print out
+ for pkt_layer_name in pkt_names:
+ if self.printFlag:# debug output
+ print pkt_layer_name
+ if pkt_layer_name not in out:
+ print dts.RED("Fail to detect %s" % pkt_layer_name)
+ if not self.printFlag:
+ raise VerifyFailure("Failed to detect %s" % pkt_layer_name)
+ else:
+ print dts.GREEN("Detected %s successfully" % pkt_type)
+ time.sleep(1)
+
+ def test_GRE_ipv4_packet_detect(self):
+ """
+ Start testpmd and enable rxonly forwarding mode
+ Send packet as table listed and packet type match each layer
+ """
+ pkt_types = {
+ "MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"],
+ "MAC_IP_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP"],
+ "MAC_IP_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP"],
+ "MAC_VLAN_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"],
+ "MAC_VLAN_IP_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP"],
+ "MAC_VLAN_IP_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP"]
+ }
+ config_layers = {'ether': {'src': self.src_mac},
+ 'ipv4': {'proto': 'gre'}}
+ # Start testpmd and enable rxonly forwarding mode
+ testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx-cksum --enable-rx-cksum" % self.target
+ self.dut.send_expect( testpmd_cmd,
+ "testpmd>",
+ 20)
+ self.dut.send_expect("set fwd rxonly", "testpmd>")
+ self.dut.send_expect("set verbose 1", "testpmd>")
+ self.dut.send_expect("start", "testpmd>")
+
+ self.check_packet_transmission(pkt_types, config_layers)
+
+ self.dut.send_expect("quit", "#")
+
+ def test_GRE_ipv6_packet_detect(self):
+ """
+ Start testpmd and enable rxonly forwarding mode
+ Send packet as table listed and packet type match each layer
+ """
+ pkt_types_ipv6_ip = {
+ "MAC_IPv6_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"],
+ "MAC_IPv6_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP"],
+ "MAC_IPv6_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP"],
+ "MAC_VLAN_IPv6_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"],
+ "MAC_VLAN_IPv6_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"],
+ "MAC_VLAN_IPv6_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"]
+ }
+
+ pkt_types_ipv6_ipv6 = {
+ "MAC_IPv6_GRE_IPv6_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"],
+ "MAC_IPv6_GRE_IPv6_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP"],
+ "MAC_VLAN_IPv6_GRE_IPv6_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"],
+ "MAC_VLAN_IPv6_GRE_IPv6_TCP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"]
+ }
+
+ pkt_types_ipv6_ipv6_SCTP = {
+ "MAC_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP"],
+ "MAC_VLAN_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"]
+ }
+
+ # Start testpmd and enable rxonly forwarding mode
+ testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx-cksum" % self.target
+ self.dut.send_expect(testpmd_cmd, "testpmd>", 20)
+ self.dut.send_expect("set fwd rxonly", "testpmd>")
+ self.dut.send_expect("set verbose 1", "testpmd>")
+ self.dut.send_expect("start", "testpmd>")
+
+ # inner ipv4
+ config_layers = {'ether': {'src': self.src_mac},
+ 'ipv6': {'nh': 47},
+ 'raw': {'payload':['78']*40}}
+ self.check_packet_transmission(pkt_types_ipv6_ip, config_layers)
+
+ # inner ipv6
+ config_layers = {'ether': {'src': self.src_mac},
+ 'ipv6': {'nh': 47},
+ 'gre': {'proto': 0x86dd},
+ 'raw': {'payload':['78']*40}}
+ self.check_packet_transmission(pkt_types_ipv6_ipv6, config_layers)
+
+ # inner ipv6 SCTP
+ config_layers = {'ether': {'src': self.src_mac},
+ 'ipv6': {'nh': 47},
+ 'gre': {'proto': 0x86dd},
+ 'inner_ipv6': {'nh': 132},
+ 'raw': {'payload':['78']*40}}
+ self.check_packet_transmission(pkt_types_ipv6_ipv6_SCTP, config_layers)
+ self.dut.send_expect("quit", "#")
+
+ def test_GRE_packet_filter(self):
+ """
+ Start testpmd with multi queues, add GRE filter that forward
+ inner/outer ip address 0.0.0.0 to queue 3, Send packet inner
+ ip address matched and check packet recevied by queue 3
+ """
+ outer_mac = self.tester_iface_mac
+ inner_mac = "10:00:00:00:00:00"
+
+ # Start testpmd with multi queues
+ testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx-cksum --rxq=4 --txq=4" % self.target
+ self.dut.send_expect(testpmd_cmd, "testpmd>", 20)
+ self.dut.send_expect("set fwd rxonly", "testpmd>")
+ self.dut.send_expect("set nbcore 4", "testpmd>")
+ self.dut.send_expect("set verbose 1", "testpmd>")
+ self.dut.send_expect("start", "testpmd>")
+
+ # Add GRE filter that forward inner ip address 0.0.0.0 to queue 3
+ cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre iip 0 3"%(outer_mac, inner_mac)
+ self.dut.send_expect( cmd, "testpmd>")
+
+ # Send packet inner ip address matched and check packet recevied by queue 3
+ pkt_types = {"MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"]}
+ config_layers = {'ether': {'src': self.src_mac},
+ 'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}}
+ self.check_packet_transmission(pkt_types, config_layers)
+
+ # Remove tunnel filter and check same packet recevied by queue 0
+ cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0 3"%(outer_mac, inner_mac)
+ self.dut.send_expect( cmd, "testpmd>")
+
+ # Add GRE filter that forward outer ip address 0.0.0.0 to queue 3
+ cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre oip 0 3"%(outer_mac, inner_mac)
+ self.dut.send_expect( cmd, "testpmd>")
+
+ # Send packet outer ip address matched and check packet recevied by queue 3.
+ pkt_types = {"MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT", "Inner L4 type: UDP"]}
+ config_layers = {'ether': {'src': self.src_mac},
+ 'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}}
+ self.check_packet_transmission(pkt_types, config_layers)
+
+ # Add GRE filter that forward outer ip address 0.0.0.0 to queue 3
+ cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0 3"%(outer_mac, inner_mac)
+ self.dut.send_expect( cmd, "testpmd>")
+ time.sleep(2)
+ self.dut.send_expect("quit", "#")
+
+ def test_GRE_packet_chksum_offload(self):
+ """
+ Start testpmd with hardware checksum offload enabled,
+ Send packet with wrong IP/TCP/UDP/SCTP checksum and check forwarded packet checksum
+ """
+ # Start testpmd and enable rxonly forwarding mode
+ testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx-cksum --txqflags=0x0 --port-topology=loop" % self.target
+ self.dut.send_expect(testpmd_cmd, "testpmd>", 20)
+ self.dut.send_expect("set verbose 1", "testpmd>")
+ self.dut.send_expect("set fwd csum", "testpmd>")
+ self.dut.send_expect("csum set ip hw 0", "testpmd>")
+ self.dut.send_expect("csum set udp hw 0", "testpmd>")
+ self.dut.send_expect("csum set sctp hw 0", "testpmd>")
+ self.dut.send_expect("csum set outer-ip hw 0", "testpmd>")
+ self.dut.send_expect("csum set tcp hw 0", "testpmd>")
+ self.dut.send_expect("csum parse_tunnel on 0", "testpmd>")
+ self.dut.send_expect("start", "testpmd>")
+
+ # Send packet with wrong outer IP checksum and check forwarded packet IP checksum is correct
+ pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_OUTER_IP_CKSUM"]}
+ config_layers = {'ether': {'src': self.src_mac},
+ 'ipv4': {'chksum': 0x0, 'proto': 'gre'}}
+ self.check_packet_transmission(pkt_types, config_layers)
+
+ # Send packet with wrong inner IP checksum and check forwarded packet IP checksum is correct
+ pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_IP_CKSUM"]}
+ config_layers = {'ether': {'src': self.src_mac},
+ 'inner_ipv4': {'chksum': 0x0, 'proto': 'gre'}}
+ self.check_packet_transmission(pkt_types, config_layers)
+
+ # Send packet with wrong inner TCP checksum and check forwarded packet TCP checksum is correct
+ pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_TCP_CKSUM"]}
+ config_layers = {'ether': {'src': self.src_mac},
+ 'tcp': {'chksum': 0x0},
+ 'ipv4': {'proto': 'gre'}}
+ self.check_packet_transmission(pkt_types, config_layers)
+
+ # Send packet with wrong inner UDP checksum and check forwarded packet UDP checksum is correct
+ pkt_types = { "MAC_IP_GRE_IP_UDP_PKT": ["PKT_TX_UDP_CKSUM"]}
+ config_layers = {'ether': {'src': self.src_mac},
+ 'udp': {'chksum': 0xffff},
+ 'ipv4': {'proto': 'gre'}}
+ self.check_packet_transmission(pkt_types, config_layers)
+
+ # Send packet with wrong inner SCTP checksum and check forwarded packet SCTP checksum is correct
+ pkt_types = { "MAC_IP_GRE_IP_SCTP_PKT": ["PKT_TX_SCTP_CKSUM"]}
+ config_layers = {'ether': {'src': self.src_mac},
+ 'ipv4': {'proto': 'gre'},
+ 'sctp': {'chksum': 0x0}}
+ self.check_packet_transmission(pkt_types , config_layers)
+
+ self.dut.send_expect("quit", "#")
+
+ def tear_down(self):
+ """
+ Run after each test case.
+ Nothing to do.
+ """
+ pass
+
+ def tear_down_all(self):
+ """
+ Run after each test suite.
+ Nothing to do.
+ """
+ self.dut.kill_all()
+ pass
--
1.9.3
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [dts] [PATCH V1 2/2] Ipgre: upload automation testing script
2016-07-26 5:24 ` [dts] [PATCH V1 2/2] Ipgre: upload automation testing script Yufen Mo
@ 2016-07-26 5:32 ` Liu, Yong
0 siblings, 0 replies; 4+ messages in thread
From: Liu, Yong @ 2016-07-26 5:32 UTC (permalink / raw)
To: Mo, YufengX, dts; +Cc: Mo, YufengX
Yufen, one comment below.
> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Yufen Mo
> Sent: Tuesday, July 26, 2016 1:25 PM
> To: dts@dpdk.org
> Cc: Mo, YufengX
> Subject: [dts] [PATCH V1 2/2] Ipgre: upload automation testing script
>
> From: yufengmx <yufengx.mo@intel.com>
>
> Generic Routing Encapsulation (GRE) is a tunneling protocol developed by
> Cisco Systems that can encapsulate
> a wide variety of network layer protocols inside virtual point-to-point
> links over an Internet Protocol network.
> Fortville support GRE packet detecting, checksum computing and filtering.
>
> Signed-off-by: yufengmx <yufengx.mo@intel.com>
> ---
> test_plans/ipgre_test_plan.rst | 181 +++++++++++++++++++++++++
> tests/TestSuite_ipgre.py | 295
> +++++++++++++++++++++++++++++++++++++++++
> 2 files changed, 476 insertions(+)
> create mode 100644 test_plans/ipgre_test_plan.rst
> create mode 100644 tests/TestSuite_ipgre.py
>
> diff --git a/test_plans/ipgre_test_plan.rst
> b/test_plans/ipgre_test_plan.rst
> new file mode 100644
> index 0000000..444efdf
> --- /dev/null
> +++ b/test_plans/ipgre_test_plan.rst
> @@ -0,0 +1,181 @@
> +.. Copyright(c) 2010-2016 Intel Corporation
> + All rights reserved.
> +
> + Redistribution and use in source and binary forms, with or without
> + modification, are permitted provided that the following conditions
> + are met:
> +
> + - Redistributions of source code must retain the above copyright
> + notice, this list of conditions and the following disclaimer.
> +
> + - Redistributions in binary form must reproduce the above copyright
> + notice, this list of conditions and the following disclaimer in
> + the documentation and/or other materials provided with the
> + distribution.
> +
> + - Neither the name of Intel Corporation nor the names of its
> + contributors may be used to endorse or promote products derived
> + from this software without specific prior written permission.
> +
> + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
> + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
> + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
> + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
> + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
> + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
> + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
> + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
> + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
> + OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +
> +====================
> +Generic Routing Encapsulation (GRE)
> +====================
> +
> +Generic Routing Encapsulation (GRE) is a tunneling protocol developed by
> Cisco Systems that can encapsulate a wide variety of network layer
> protocols inside virtual point-to-point links over an Internet Protocol
> network.
> +Fortville support GRE packet detecting, checksum computing and filtering.
> +
> +Prerequisites
> +-------------
> +
> +Fortville nic should be on the DUT.
> +
> +Test cases
> +----------
> +
> +Test Case 1: GRE ipv4 packet detect
> +=================================
> +Start testpmd and enable rxonly forwarding mode::
> + testpmd -c ffff -n 4 -- -i --txqflags=0x0
> + testpmd> set fwd rxonly
> + testpmd> set verbose 1
> + testpmd> start
> +
> +Send packet as table listed and packet type match each layer.
> +
> ++------------+----------+-----------+----------+-----------+
> +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 |
> ++------------+----------+-----------+----------+-----------+
> +| No | Ipv4 | GRE | Ipv4 | Udp |
> ++------------+----------+-----------+----------+-----------+
> +| No | Ipv4 | GRE | Ipv4 | Tcp |
> ++------------+----------+-----------+----------+-----------+
> +| No | Ipv4 | GRE | Ipv4 | Sctp |
> ++------------+----------+-----------+----------+-----------+
> +| Yes | Ipv4 | GRE | Ipv4 | Udp |
> ++------------+----------+-----------+----------+-----------+
> +| Yes | Ipv4 | GRE | Ipv4 | Tcp |
> ++------------+----------+-----------+----------+-----------+
> +| Yes | Ipv4 | GRE | Ipv4 | Sctp |
> ++------------+----------+-----------+----------+-----------+
> +
> +
> +Test Case 2: GRE ipv6 packet detect
> +=================================
> +Start testpmd and enable rxonly forwarding mode::
> + testpmd -c ffff -n 4 -- -i --txqflags=0x0
> + testpmd> set fwd rxonly
> + testpmd> set verbose 1
> + testpmd> start
> +
> +Send packet as table listed and packet type match each layer.
> +Ether()/IPv6(nh=47)/GRE()/IP()/UDP()/Raw('x'*40)
> +Ether()/IPv6(nh=47)/GRE(proto=0x86dd)/IPv6()/UDP()/Raw('x'*40)
> ++------------+----------+-----------+----------+-----------+
> +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 |
> ++------------+----------+-----------+----------+-----------+
> +| No | Ipv6 | GRE | Ipv4 | Udp |
> ++------------+----------+-----------+----------+-----------+
> +| No | Ipv6 | GRE | Ipv4 | Tcp |
> ++------------+----------+-----------+----------+-----------+
> +| No | Ipv6 | GRE | Ipv4 | Sctp |
> ++------------+----------+-----------+----------+-----------+
> +| Yes | Ipv6 | GRE | Ipv4 | Udp |
> ++------------+----------+-----------+----------+-----------+
> +| Yes | Ipv6 | GRE | Ipv4 | Tcp |
> ++------------+----------+-----------+----------+-----------+
> +| Yes | Ipv6 | GRE | Ipv4 | Sctp |
> ++------------+----------+-----------+----------+-----------+
> +
> ++------------+----------+-----------+----------+-----------+
> +| Outer Vlan | Outer IP | Tunel | Inner L3 | Inner L4 |
> ++------------+----------+-----------+----------+-----------+
> +| No | Ipv6 | GRE | Ipv6 | Udp |
> ++------------+----------+-----------+----------+-----------+
> +| No | Ipv6 | GRE | Ipv6 | Tcp |
> ++------------+----------+-----------+----------+-----------+
> +| No | Ipv6 | GRE | Ipv6 | Sctp |
> ++------------+----------+-----------+----------+-----------+
> +| Yes | Ipv6 | GRE | Ipv6 | Udp |
> ++------------+----------+-----------+----------+-----------+
> +| Yes | Ipv6 | GRE | Ipv6 | Tcp |
> ++------------+----------+-----------+----------+-----------+
> +| Yes | Ipv6 | GRE | Ipv6 | Sctp |
> ++------------+----------+-----------+----------+-----------+
> +
> +Test Case 3: GRE packet filter
> +============================
> +Start testpmd with multi queues::
> + testpmd -c ff -n 3 -- -i --rxq=4 --txq=4 --txqflags=0x0
> + testpmd> set fwd rxonly
> + testpmd> set nbcore 4
> + testpmd> set verbose 1
> + testpmd> start
> +
> +Add GRE filter that forward inner ip address 0.0.0.0 to queue 3
> + testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
> + 0.0.0.0 1 ipingre iip 0 3
> +
> +Send packet inner ip address matched and check packet recevied by queue 3.
> + p = Ether()/IP()/GRE()/IP(dst="0.0.0.0")/UDP()
> +
> +Remove tunnel filter and check same packet recevied by queue 0
> + testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
> + 0.0.0.0 1 ipingre iip 0 3
> +
> +Add GRE filter that forward outer ip address 0.0.0.0 to queue 3
> + testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
> + 0.0.0.0 1 ipingre oip 0 3
> +
> +Send packet outer ip address matched and check packet recevied by queue 3.
> +
> +Remove tunnel filter and check same packet recevied by queue 0.
> + testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
> + 0.0.0.0 1 ipingre iip 0 3
> +
> +Test Case 4: GRE packet chksum offload
> +====================================
> +Start testpmd with hardware checksum offload enabled::
> + testpmd -c ff -n 3 -- -i --txqflags=0x0 --enable-rx-cksum --port-
> topology=loop
> + testpmd> set verbose 1
> + testpmd> set fwd csum
> + testpmd> csum set ip hw 0
> + testpmd> csum set udp hw 0
> + testpmd> csum set sctp hw 0
> + testpmd> csum set outer-ip hw 0
> + testpmd> csum set tcp hw 0
> + testpmd> csum parse_tunnel on 0
> + testpmd> start
> +
> +Send packet with wrong outer IP checksum and check forwarded packet IP
> +checksum is correct.
> + Ether()/IP(chksum=0x0)/GRE()/IP()/TCP()
> +
> +Send packet with wrong inner IP checksum and check forwarded packet IP
> +checksum is correct.
> + Ether()/IP()/GRE()/IP(chksum=0x0)/TCP()
> +
> +Send packet with wrong inner TCP checksum and check forwarded packet TCP
> +checksum is correct.
> + Ether()/IP()/GRE()/IP()/TCP(chksum=0x0)
> +
> +Send packet with wrong inner UDP checksum and check forwarded packet UDP
> +checksum is correct.
> + Ether()/IP()/GRE()/IP()/UDP(chksum=0xffff)
> +
> +Send packet with wrong inner SCTP checksum and check forwarded packet
> SCTP
> +checksum is correct.
> + Ether()/IP()/GRE()/IP()/SCTP(chksum=0x0)
> diff --git a/tests/TestSuite_ipgre.py b/tests/TestSuite_ipgre.py
> new file mode 100644
> index 0000000..069fe3f
> --- /dev/null
> +++ b/tests/TestSuite_ipgre.py
> @@ -0,0 +1,295 @@
> +# BSD LICENSE
> +#
> +# Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
> +# All rights reserved.
> +#
> +# Redistribution and use in source and binary forms, with or without
> +# modification, are permitted provided that the following conditions
> +# are met:
> +#
> +# * Redistributions of source code must retain the above copyright
> +# notice, this list of conditions and the following disclaimer.
> +# * Redistributions in binary form must reproduce the above copyright
> +# notice, this list of conditions and the following disclaimer in
> +# the documentation and/or other materials provided with the
> +# distribution.
> +# * Neither the name of Intel Corporation nor the names of its
> +# contributors may be used to endorse or promote products derived
> +# from this software without specific prior written permission.
> +#
> +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +"""
> +DPDK Test suite.
> +
> +Generic Routing Encapsulation (GRE) is a tunneling protocol developed by
> +Cisco Systems that can encapsulate a wide variety of network layer
> protocols
> +inside virtual point-to-point links over an Internet Protocol network.
> +
> +Fortville support GRE packet detecting, checksum computing and filtering.
> +"""
> +
> +import time
> +import os
> +
> +import dts
> +from test_case import TestCase
> +from exception import VerifyFailure
> +from packet import Packet
> +
> +class TestIpgre(TestCase):
> +
> + def set_up_all(self):
> + """
> + Run at the start of each test suite.
> + """
> + self.printFlag = dts.debug_mode
> + self.src_mac = "11:22:33:44:55:66"
> + ports = self.dut.get_ports()
> + self.verify(self.nic.startswith("fortville"),
> + "GRE tunnel packet type only support by Fortville")
> + self.verify(len(ports) >= 2, "Insufficient ports for testing")
One port is enough for the testing, please reduce ports requirement from two to one.
> + valports = [_ for _ in ports if self.tester.get_local_port(_) !=
> -1]
> + # start testpmd
> + self.dut_port = valports[0]
> + tester_port = self.tester.get_local_port(self.dut_port)
> + self.tester_iface = self.tester.get_interface(tester_port)
> + self.tester_iface_mac = self.tester.get_mac(tester_port)
> +
> + def set_up(self):
> + """
> + Run before each test case.
> + Nothing to do.
> + """
> + pass
> +
> + def check_packet_transmission(self, pkt_types, layer_configs=None):
> + time.sleep(1)
> + for pkt_type in pkt_types.keys():
> + pkt_names = pkt_types[pkt_type]
> + pkt = Packet(pkt_type=pkt_type)
> + if layer_configs:
> + for layer in layer_configs.keys():
> + pkt.config_layer(layer, layer_configs[layer])
> + pkt.send_pkt(tx_port=self.tester_iface)
> + out = self.dut.get_session_output(timeout=2)
> + if self.printFlag: # debug output
> + print out
> + for pkt_layer_name in pkt_names:
> + if self.printFlag:# debug output
> + print pkt_layer_name
> + if pkt_layer_name not in out:
> + print dts.RED("Fail to detect %s" % pkt_layer_name)
> + if not self.printFlag:
> + raise VerifyFailure("Failed to detect %s" %
> pkt_layer_name)
> + else:
> + print dts.GREEN("Detected %s successfully" % pkt_type)
> + time.sleep(1)
> +
> + def test_GRE_ipv4_packet_detect(self):
> + """
> + Start testpmd and enable rxonly forwarding mode
> + Send packet as table listed and packet type match each layer
> + """
> + pkt_types = {
> + "MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"],
> + "MAC_IP_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: TCP"],
> + "MAC_IP_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: SCTP"],
> + "MAC_VLAN_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"],
> + "MAC_VLAN_IP_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: TCP"],
> + "MAC_VLAN_IP_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: SCTP"]
> + }
> + config_layers = {'ether': {'src': self.src_mac},
> + 'ipv4': {'proto': 'gre'}}
> + # Start testpmd and enable rxonly forwarding mode
> + testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx-
> cksum --enable-rx-cksum" % self.target
> + self.dut.send_expect( testpmd_cmd,
> + "testpmd>",
> + 20)
> + self.dut.send_expect("set fwd rxonly", "testpmd>")
> + self.dut.send_expect("set verbose 1", "testpmd>")
> + self.dut.send_expect("start", "testpmd>")
> +
> + self.check_packet_transmission(pkt_types, config_layers)
> +
> + self.dut.send_expect("quit", "#")
> +
> + def test_GRE_ipv6_packet_detect(self):
> + """
> + Start testpmd and enable rxonly forwarding mode
> + Send packet as table listed and packet type match each layer
> + """
> + pkt_types_ipv6_ip = {
> + "MAC_IPv6_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"],
> + "MAC_IPv6_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: TCP"],
> + "MAC_IPv6_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: SCTP"],
> + "MAC_VLAN_IPv6_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"],
> + "MAC_VLAN_IPv6_GRE_IP_TCP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"],
> + "MAC_VLAN_IPv6_GRE_IP_SCTP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"]
> + }
> +
> + pkt_types_ipv6_ipv6 = {
> + "MAC_IPv6_GRE_IPv6_UDP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"],
> + "MAC_IPv6_GRE_IPv6_TCP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: TCP"],
> + "MAC_VLAN_IPv6_GRE_IPv6_UDP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"],
> + "MAC_VLAN_IPv6_GRE_IPv6_TCP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"]
> + }
> +
> + pkt_types_ipv6_ipv6_SCTP = {
> + "MAC_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT": ["Tunnel type:
> GRENAT", "Inner L4 type: SCTP"],
> + "MAC_VLAN_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT": ["Tunnel type:
> GRENAT", "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"]
> + }
> +
> + # Start testpmd and enable rxonly forwarding mode
> + testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx-
> cksum" % self.target
> + self.dut.send_expect(testpmd_cmd, "testpmd>", 20)
> + self.dut.send_expect("set fwd rxonly", "testpmd>")
> + self.dut.send_expect("set verbose 1", "testpmd>")
> + self.dut.send_expect("start", "testpmd>")
> +
> + # inner ipv4
> + config_layers = {'ether': {'src': self.src_mac},
> + 'ipv6': {'nh': 47},
> + 'raw': {'payload':['78']*40}}
> + self.check_packet_transmission(pkt_types_ipv6_ip, config_layers)
> +
> + # inner ipv6
> + config_layers = {'ether': {'src': self.src_mac},
> + 'ipv6': {'nh': 47},
> + 'gre': {'proto': 0x86dd},
> + 'raw': {'payload':['78']*40}}
> + self.check_packet_transmission(pkt_types_ipv6_ipv6, config_layers)
> +
> + # inner ipv6 SCTP
> + config_layers = {'ether': {'src': self.src_mac},
> + 'ipv6': {'nh': 47},
> + 'gre': {'proto': 0x86dd},
> + 'inner_ipv6': {'nh': 132},
> + 'raw': {'payload':['78']*40}}
> + self.check_packet_transmission(pkt_types_ipv6_ipv6_SCTP,
> config_layers)
> + self.dut.send_expect("quit", "#")
> +
> + def test_GRE_packet_filter(self):
> + """
> + Start testpmd with multi queues, add GRE filter that forward
> + inner/outer ip address 0.0.0.0 to queue 3, Send packet inner
> + ip address matched and check packet recevied by queue 3
> + """
> + outer_mac = self.tester_iface_mac
> + inner_mac = "10:00:00:00:00:00"
> +
> + # Start testpmd with multi queues
> + testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx-
> cksum --rxq=4 --txq=4" % self.target
> + self.dut.send_expect(testpmd_cmd, "testpmd>", 20)
> + self.dut.send_expect("set fwd rxonly", "testpmd>")
> + self.dut.send_expect("set nbcore 4", "testpmd>")
> + self.dut.send_expect("set verbose 1", "testpmd>")
> + self.dut.send_expect("start", "testpmd>")
> +
> + # Add GRE filter that forward inner ip address 0.0.0.0 to queue 3
> + cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre iip 0
> 3"%(outer_mac, inner_mac)
> + self.dut.send_expect( cmd, "testpmd>")
> +
> + # Send packet inner ip address matched and check packet recevied
> by queue 3
> + pkt_types = {"MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"]}
> + config_layers = {'ether': {'src': self.src_mac},
> + 'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}}
> + self.check_packet_transmission(pkt_types, config_layers)
> +
> + # Remove tunnel filter and check same packet recevied by queue 0
> + cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0
> 3"%(outer_mac, inner_mac)
> + self.dut.send_expect( cmd, "testpmd>")
> +
> + # Add GRE filter that forward outer ip address 0.0.0.0 to queue 3
> + cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre oip 0
> 3"%(outer_mac, inner_mac)
> + self.dut.send_expect( cmd, "testpmd>")
> +
> + # Send packet outer ip address matched and check packet recevied
> by queue 3.
> + pkt_types = {"MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"]}
> + config_layers = {'ether': {'src': self.src_mac},
> + 'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}}
> + self.check_packet_transmission(pkt_types, config_layers)
> +
> + # Add GRE filter that forward outer ip address 0.0.0.0 to queue 3
> + cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0
> 3"%(outer_mac, inner_mac)
> + self.dut.send_expect( cmd, "testpmd>")
> + time.sleep(2)
> + self.dut.send_expect("quit", "#")
> +
> + def test_GRE_packet_chksum_offload(self):
> + """
> + Start testpmd with hardware checksum offload enabled,
> + Send packet with wrong IP/TCP/UDP/SCTP checksum and check
> forwarded packet checksum
> + """
> + # Start testpmd and enable rxonly forwarding mode
> + testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx-
> cksum --txqflags=0x0 --port-topology=loop" % self.target
> + self.dut.send_expect(testpmd_cmd, "testpmd>", 20)
> + self.dut.send_expect("set verbose 1", "testpmd>")
> + self.dut.send_expect("set fwd csum", "testpmd>")
> + self.dut.send_expect("csum set ip hw 0", "testpmd>")
> + self.dut.send_expect("csum set udp hw 0", "testpmd>")
> + self.dut.send_expect("csum set sctp hw 0", "testpmd>")
> + self.dut.send_expect("csum set outer-ip hw 0", "testpmd>")
> + self.dut.send_expect("csum set tcp hw 0", "testpmd>")
> + self.dut.send_expect("csum parse_tunnel on 0", "testpmd>")
> + self.dut.send_expect("start", "testpmd>")
> +
> + # Send packet with wrong outer IP checksum and check forwarded
> packet IP checksum is correct
> + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_OUTER_IP_CKSUM"]}
> + config_layers = {'ether': {'src': self.src_mac},
> + 'ipv4': {'chksum': 0x0, 'proto': 'gre'}}
> + self.check_packet_transmission(pkt_types, config_layers)
> +
> + # Send packet with wrong inner IP checksum and check forwarded
> packet IP checksum is correct
> + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_IP_CKSUM"]}
> + config_layers = {'ether': {'src': self.src_mac},
> + 'inner_ipv4': {'chksum': 0x0, 'proto': 'gre'}}
> + self.check_packet_transmission(pkt_types, config_layers)
> +
> + # Send packet with wrong inner TCP checksum and check forwarded
> packet TCP checksum is correct
> + pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_TCP_CKSUM"]}
> + config_layers = {'ether': {'src': self.src_mac},
> + 'tcp': {'chksum': 0x0},
> + 'ipv4': {'proto': 'gre'}}
> + self.check_packet_transmission(pkt_types, config_layers)
> +
> + # Send packet with wrong inner UDP checksum and check forwarded
> packet UDP checksum is correct
> + pkt_types = { "MAC_IP_GRE_IP_UDP_PKT": ["PKT_TX_UDP_CKSUM"]}
> + config_layers = {'ether': {'src': self.src_mac},
> + 'udp': {'chksum': 0xffff},
> + 'ipv4': {'proto': 'gre'}}
> + self.check_packet_transmission(pkt_types, config_layers)
> +
> + # Send packet with wrong inner SCTP checksum and check forwarded
> packet SCTP checksum is correct
> + pkt_types = { "MAC_IP_GRE_IP_SCTP_PKT": ["PKT_TX_SCTP_CKSUM"]}
> + config_layers = {'ether': {'src': self.src_mac},
> + 'ipv4': {'proto': 'gre'},
> + 'sctp': {'chksum': 0x0}}
> + self.check_packet_transmission(pkt_types , config_layers)
> +
> + self.dut.send_expect("quit", "#")
> +
> + def tear_down(self):
> + """
> + Run after each test case.
> + Nothing to do.
> + """
> + pass
> +
> + def tear_down_all(self):
> + """
> + Run after each test suite.
> + Nothing to do.
> + """
> + self.dut.kill_all()
> + pass
> --
> 1.9.3
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2016-07-26 5:32 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-07-26 5:24 [dts] [PATCH V1 0/2] Ipgre automation testing script Yufen Mo
2016-07-26 5:24 ` [dts] [PATCH V1 1/2] add sctp/gre format support in framework/packet module Yufen Mo
2016-07-26 5:24 ` [dts] [PATCH V1 2/2] Ipgre: upload automation testing script Yufen Mo
2016-07-26 5:32 ` Liu, Yong
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).