* [dts] [PATCH v1 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst @ 2020-08-17 5:54 Guinan Sun 2020-08-17 5:54 ` [dts] [PATCH v1 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun ` (3 more replies) 0 siblings, 4 replies; 14+ messages in thread From: Guinan Sun @ 2020-08-17 5:54 UTC (permalink / raw) To: dts; +Cc: Guinan Sun Enables the cloud filter for IPv4_UDP/IPv4_TCP/IPv4_SCTP with SRC port only or DST port only. This supports different filter types for the same packet type. E.g. one IPv4_UDP rules with SRC port only and another IPv4_UDP rule with DST port only. Signed-off-by: Guinan Sun <guinanx.sun@intel.com> --- .../cloud_filter_with_l4_port_test_plan.rst | 631 ++++++++++++++++++ 1 file changed, 631 insertions(+) create mode 100644 test_plans/cloud_filter_with_l4_port_test_plan.rst diff --git a/test_plans/cloud_filter_with_l4_port_test_plan.rst b/test_plans/cloud_filter_with_l4_port_test_plan.rst new file mode 100644 index 0000000..9143dae --- /dev/null +++ b/test_plans/cloud_filter_with_l4_port_test_plan.rst @@ -0,0 +1,631 @@ +.. Copyright (c) <2020>, Intel Corporation + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + - Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + - Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the + distribution. + + - Neither the name of Intel Corporation nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +=================================== +Cloud filter with l4 port test plan +=================================== + +Prerequisites +============= + +1. Hardware: + Fortville + +2. software: + dpdk: http://dpdk.org/git/dpdk + scapy: http://www.secdev.org/projects/scapy/ + +3. bind the pf to dpdk driver:: + + ./usertools/dpdk-devbind.py --force --bind=vfio-pci 0000:81:00.0 + +Test Case 1: ipv4-udp_sport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 2. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 2: ipv4-udp_dport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 2. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 3: ipv4-tcp_sport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 2. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 4: ipv4-tcp_dport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 3. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 5: ipv4-sctp_sport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 2. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 6: ipv4-sctp_dport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 2. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 7: ipv6-udp_sport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 2. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / udp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 8: ipv6-udp_dport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 2. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / udp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 9: ipv6-tcp_sport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 2. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. testpmd> flow create 0 ingress pattern eth / ipv6 / tcp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 10: ipv6-tcp_dport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 3. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / tcp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 11: ipv6-sctp_sport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 2. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 12: ipv6-sctp_dport only +================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 2. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 3. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 13: multi-rule +============================================================ + + 1. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + + 2. create multi-rule with different input set rules:: + creat rules:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end actions pf / queue index 1 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end actions pf / queue index 2 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end actions pf / queue index 3 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end actions pf / queue index 4 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end actions pf / queue index 5 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp dst is 66 / end actions pf / queue index 6 / end + + send packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=33)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=44)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=55)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=66)/Raw('x' * 80) + + Verify each packet can match the right queue. + + 3. destroy the rule:: + testpmd> flow destroy 0 rule 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) + + packets should be in queue 0. + + 4. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 3: NEGATIVE_TEST +==================================== + Prerequisites + + 1. bind the port to dpdk driver in DUT:: + + modprobe vfio-pci + usertools/dpdk-devbind.py --force --bind=vfio-pci 0000:81:00.0 + + 2. Launch the testpmd:: + + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + +1. rules can not create + + 1) unsupported rules:: + create rules:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 dst is 156 / end actions pf / queue index 1 / end + + Verify rules can not create. + + 2) conflicted rules:: + create one rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end + + create conflicted rules:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 2 / end + + Verify rules can not create. \ No newline at end of file -- 2.17.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* [dts] [PATCH v1 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases 2020-08-17 5:54 [dts] [PATCH v1 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Guinan Sun @ 2020-08-17 5:54 ` Guinan Sun 2020-08-17 6:11 ` [dts] [PATCH v1 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Lin, Xueqin ` (2 subsequent siblings) 3 siblings, 0 replies; 14+ messages in thread From: Guinan Sun @ 2020-08-17 5:54 UTC (permalink / raw) To: dts; +Cc: Guinan Sun add test cases for the new cloud filter. Signed-off-by: Guinan Sun <guinanx.sun@intel.com> --- tests/TestSuite_cloud_filter_with_l4_port.py | 400 +++++++++++++++++++ 1 file changed, 400 insertions(+) create mode 100644 tests/TestSuite_cloud_filter_with_l4_port.py diff --git a/tests/TestSuite_cloud_filter_with_l4_port.py b/tests/TestSuite_cloud_filter_with_l4_port.py new file mode 100644 index 0000000..bf62c01 --- /dev/null +++ b/tests/TestSuite_cloud_filter_with_l4_port.py @@ -0,0 +1,400 @@ +# BSD LICENSE +# +# Copyright(c) 2020 Intel Corporation. All rights reserved. +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without +# modification, are permitted provided that the following conditions +# are met: +# +# * Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# * Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in +# the documentation and/or other materials provided with the +# distribution. +# * Neither the name of Intel Corporation nor the names of its +# contributors may be used to endorse or promote products derived +# from this software without specific prior written permission. +# +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +""" +DPDK Test suite. + +Test the support of generic flow API by Poll Mode Drivers. + +""" + +import utils +import time +import re + +from test_case import TestCase +from pmd_output import PmdOutput +from settings import DRIVERS +from crb import Crb +from dut import Dut +import packet +from exception import VerifyFailure +import scapy.layers.inet +from scapy.utils import rdpcap + +MAX_QUEUE = 16 + +class TestCloudFilterWithL4Port(TestCase): + + def set_up_all(self): + """ + Run at the start of each test suite. + Generic filter Prerequistites + """ + # Based on h/w type, choose how many ports to use + self.dut_ports = self.dut.get_ports(self.nic) + # Verify that enough ports are available + self.verify(len(self.dut_ports) >= 1, "Insufficient ports") + self.cores = "1S/8C/1T" + self.pf_cores = "1S/8C/1T" + self.pmdout = PmdOutput(self.dut) + + localPort = self.tester.get_local_port(self.dut_ports[0]) + self.tester_itf = self.tester.get_interface(localPort) + self.pf_interface = self.dut.ports_info[self.dut_ports[0]]['intf'] + self.pf_mac = self.dut.get_mac_address(0) + self.pf_pci = self.dut.ports_info[self.dut_ports[0]]['pci'] + self.pkt_obj = packet.Packet() + + def set_up(self): + """ + Run before each test case. + """ + self.dut.kill_all() + + self.verify(self.nic in ["fortville_eagle", "fortville_spirit", "carlsville", + "fortville_spirit_single", "fortpark_TLV", + "fortpark_BASE-T","fortville_25g"], "%s nic not support fdir vlan filter" % self.nic) + + self.pmdout.start_testpmd("%s" % self.cores, "--rxq=%d --txq=%d --disable-rss" % (MAX_QUEUE, MAX_QUEUE), "-w %s --file-prefix=test1" % self.pf_pci) + self.dut.send_expect("set fwd rxonly", "testpmd> ", 120) + self.dut.send_expect("set promisc all off", "testpmd> ", 120) + self.dut.send_expect("set verbose 1", "testpmd> ", 120) + self.dut.send_expect("start", "testpmd> ", 120) + time.sleep(2) + + def destroy_env(self): + """ + This is to stop testpmd. + """ + self.dut.send_expect("quit", "# ") + time.sleep(2) + + def compare_memory_rules(self, expectedRules): + """ + dump all flow rules that have been created in memory and compare that total rules number with the given expected number + to see if they are equal, as to get your conclusion after you have deleted any flow rule entry. + """ + outstring = self.dut.send_expect("flow list 0", "testpmd> ", 20) + result_scanner = r'\d*.*?\d*.*?\d*.*?=>*' + scanner = re.compile(result_scanner, re.DOTALL) + m = scanner.findall(outstring) + print("All flow entries are: ") + for i in range(len(m)): + print(m[i]) + print('Expected rules are: %d - actual are: %d' % (expectedRules, len(m))) + self.verify(expectedRules == len(m), 'Total rules number mismatched') + + def verify_rulenum(self, rule_num): + """ + Verify all the rules created. + """ + # check if there are expected flow rules have been created + self.compare_memory_rules(rule_num) + # check if one rule destoried with success + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") + self.compare_memory_rules(rule_num - 1) + # check if all flow rules have been removed with success + self.dut.send_expect("flow flush 0", "testpmd> ") + self.compare_memory_rules(0) + + def sendpkt(self, pktstr, count=1): + import sys + py_version = sys.version + if py_version.startswith('3.'): + self.pkt_obj.pktgen.pkts.clear() + else: + del self.pkt_obj.pktgen.pkts[:] + self.pkt_obj.append_pkt(pktstr) + self.pkt_obj.send_pkt(self.tester, tx_port=self.tester_itf, count=count) + + def sendpkt_check_result(self, src_port, dst_port, queue, match, pctype=""): + match_info = "/queue %d: " % queue + # source port + if src_port != "" and dst_port == "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s)' % src_port) + elif pctype == "ipv4-tcp": + self.sendpkt(pktstr='Ether()/IP()/TCP(sport=%s)' % src_port) + elif pctype == "ipv4-sctp": + self.sendpkt(pktstr='Ether()/IP()/SCTP(sport=%s)' % src_port) + elif pctype == "ipv6-udp": + self.sendpkt(pktstr='Ether()/IPv6()/UDP(sport=%s)' % src_port) + elif pctype == "ipv6-tcp": + self.sendpkt(pktstr='Ether()/IPv6()/TCP(sport=%s)' % src_port) + elif pctype == "ipv6-sctp": + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(sport=%s)' % src_port) + elif src_port == "" and dst_port != "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(dport=%s)' % dst_port) + elif pctype == "ipv4-tcp": + self.sendpkt(pktstr='Ether()/IP()/TCP(dport=%s)' % dst_port) + elif pctype == "ipv4-sctp": + self.sendpkt(pktstr='Ether()/IP()/SCTP(dport=%s)' % dst_port) + elif pctype == "ipv6-udp": + self.sendpkt(pktstr='Ether()/IPv6()/UDP(dport=%s)' % dst_port) + elif pctype == "ipv6-tcp": + self.sendpkt(pktstr='Ether()/IPv6()/TCP(dport=%s)' % dst_port) + elif pctype == "ipv6-sctp": + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(dport=%s)' % dst_port) + elif src_port != "" and dst_port != "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s, dport=%s)' % (src_port, dst_port)) + + out_pf = self.dut.get_session_output(timeout=2) + print("out_pf is %s" % out_pf) + + if match == 1: + self.verify(match_info in out_pf, "the packet not match the expect queue %d." % queue) + else: + if match_info in out_pf: + raise Exception("the packet should not match the queue %d." % queue) + + def cloudfilter_test( + self, ip_type='ipv4', l4_port_type='udp', src_dst='src', port_value=156, queue_id=0): + + # validate + self.dut.send_expect( + "flow validate 0 ingress pattern eth / %s / %s %s is %d / end actions pf / queue index %d / end" + % (ip_type, l4_port_type, src_dst, port_value, queue_id), + "validated") + + # create + self.dut.send_expect( + "flow create 0 ingress pattern eth / %s / %s %s is %d / end actions pf / queue index %d / end" + % (ip_type, l4_port_type, src_dst, port_value, queue_id), + "created") + + # list + self.compare_memory_rules(1) + + if src_dst is 'src': + self.sendpkt_check_result("%d"%port_value, "", queue_id, 1, "%s-%s"%(ip_type,l4_port_type)) + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + else: + self.sendpkt_check_result("", "%d"%port_value, queue_id, 1, "%s-%s"%(ip_type,l4_port_type)) + self.sendpkt_check_result("", "%d"%(port_value-1), queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + + # flush + self.dut.send_expect("flow flush 0", "testpmd> ") + + if src_dst is 'src': + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + else: + self.sendpkt_check_result("", "%d"%(port_value-1), queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + + self.compare_memory_rules(0) + + def test_ipv4_udp_sport_only(self): + """ + only supported by i40e + """ + # ipv4-udp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='udp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv4_udp_dport_only(self): + """ + only supported by i40e + """ + # ipv4-udp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='udp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv4_tcp_sport_only(self): + """ + only supported by i40e + """ + # ipv4-tcp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='tcp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv4_tcp_dport_only(self): + """ + only supported by i40e + """ + #ipv4-tcp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='tcp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv4_sctp_sport_only(self): + """ + only supported by i40e + """ + # ipv4-sctp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='sctp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv4_sctp_dport_only(self): + """ + only supported by i40e + """ + #ipv4-sctp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='sctp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv6_udp_sport_only(self): + """ + only supported by i40e + """ + # ipv6-udp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='udp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv6_udp_dport_only(self): + """ + only supported by i40e + """ + # ipv6-udp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='udp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv6_tcp_sport_only(self): + """ + only supported by i40e + """ + # ipv6-tcp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='tcp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv6_tcp_dport_only(self): + """ + only supported by i40e + """ + #ipv6-tcp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='tcp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv6_sctp_sport_only(self): + """ + only supported by i40e + """ + # ipv6-sctp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='sctp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv6_sctp_dport_only(self): + """ + only supported by i40e + """ + #ipv6-sctp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='sctp', src_dst='dst', port_value=156, queue_id=1) + + def test_multi_rule(self): + """ + only supported by i40e + """ + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end actions pf / queue index 1 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end actions pf / queue index 2 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end actions pf / queue index 3 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end actions pf / queue index 4 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end actions pf / queue index 5 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / sctp dst is 66 / end actions pf / queue index 6 / end", + "created") + + self.sendpkt_check_result("11", "", 1, 1, "ipv4-udp") + self.sendpkt_check_result("22", "", 2, 1, "ipv4-tcp") + self.sendpkt_check_result("33", "", 3, 1, "ipv4-sctp") + self.sendpkt_check_result("", "44", 4, 1, "ipv4-udp") + self.sendpkt_check_result("", "55", 5, 1, "ipv4-tcp") + self.sendpkt_check_result("", "66", 6, 1, "ipv4-sctp") + + # destroy + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") + + self.sendpkt_check_result("11", "", 1, 0, "ipv4-udp") + + self.compare_memory_rules(5) + + # flush + self.dut.send_expect("flow flush 0", "testpmd> ") + + self.sendpkt_check_result("22", "", 2, 0, "ipv4-tcp") + + self.compare_memory_rules(0) + + def test_negative(self): + """ + only supported by i40e + """ + # unsupported rules + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 dst is 156 / end actions pf / queue index 1 / end", + "error") + + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end", + "create") + + # conflicted rules + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 2 / end", + "error") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv6 / udp src is 156 / end actions pf / queue index 2 / end", + "error") + + def tear_down(self): + """ + Run after each test case. + """ + self.destroy_env() + self.dut.kill_all() + + def tear_down_all(self): + """ + Run after each test suite. + """ + self.dut.kill_all() -- 2.17.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [dts] [PATCH v1 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst 2020-08-17 5:54 [dts] [PATCH v1 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Guinan Sun 2020-08-17 5:54 ` [dts] [PATCH v1 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun @ 2020-08-17 6:11 ` Lin, Xueqin 2020-08-17 8:34 ` [dts] [PATCH v2 " Guinan Sun 2020-08-18 3:07 ` [dts] [PATCH v3 " Guinan Sun 3 siblings, 0 replies; 14+ messages in thread From: Lin, Xueqin @ 2020-08-17 6:11 UTC (permalink / raw) To: Sun, GuinanX, dts; +Cc: Sun, GuinanX Acked-by: Xueqin Lin <Xueqin.lin@intel.com> > -----Original Message----- > From: dts <dts-bounces@dpdk.org> On Behalf Of Guinan Sun > Sent: Monday, August 17, 2020 1:55 PM > To: dts@dpdk.org > Cc: Sun, GuinanX <guinanx.sun@intel.com> > Subject: [dts] [PATCH v1 1/2] test_plans: add > cloud_filter_with_l4_port_test_plan.rst > > Enables the cloud filter for IPv4_UDP/IPv4_TCP/IPv4_SCTP with SRC port only > or DST port only. > This supports different filter types for the same packet type. > E.g. one IPv4_UDP rules with SRC port only and another IPv4_UDP rule with > DST port only. > > Signed-off-by: Guinan Sun <guinanx.sun@intel.com> > --- > .../cloud_filter_with_l4_port_test_plan.rst | 631 ++++++++++++++++++ > 1 file changed, 631 insertions(+) > create mode 100644 test_plans/cloud_filter_with_l4_port_test_plan.rst > > diff --git a/test_plans/cloud_filter_with_l4_port_test_plan.rst > b/test_plans/cloud_filter_with_l4_port_test_plan.rst > new file mode 100644 > index 0000000..9143dae > --- /dev/null > +++ b/test_plans/cloud_filter_with_l4_port_test_plan.rst > @@ -0,0 +1,631 @@ > +.. Copyright (c) <2020>, Intel Corporation > + All rights reserved. > + > + Redistribution and use in source and binary forms, with or without > + modification, are permitted provided that the following conditions > + are met: > + > + - Redistributions of source code must retain the above copyright > + notice, this list of conditions and the following disclaimer. > + > + - Redistributions in binary form must reproduce the above copyright > + notice, this list of conditions and the following disclaimer in > + the documentation and/or other materials provided with the > + distribution. > + > + - Neither the name of Intel Corporation nor the names of its > + contributors may be used to endorse or promote products derived > + from this software without specific prior written permission. > + > + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND > CONTRIBUTORS > + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT > + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS > + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE > + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, > INDIRECT, > + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES > + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS > OR > + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) > + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN > CONTRACT, > + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) > + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF > ADVISED > + OF THE POSSIBILITY OF SUCH DAMAGE. > + > +=================================== > +Cloud filter with l4 port test plan > +=================================== > + > +Prerequisites > +============= > + > +1. Hardware: > + Fortville > + > +2. software: > + dpdk: http://dpdk.org/git/dpdk > + scapy: http://www.secdev.org/projects/scapy/ > + > +3. bind the pf to dpdk driver:: > + > + ./usertools/dpdk-devbind.py --force --bind=vfio-pci 0000:81:00.0 > + > +Test Case 1: ipv4-udp_sport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 2. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 2: ipv4-udp_dport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 2. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 3: ipv4-tcp_sport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 2. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 4: ipv4-tcp_dport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 3. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 5: ipv4-sctp_sport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 2. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 6: ipv4-sctp_dport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 2. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 7: ipv6-udp_sport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 2. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / udp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 8: ipv6-udp_dport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 2. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / udp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 9: ipv6-tcp_sport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 2. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. testpmd> flow create 0 ingress pattern eth / ipv6 / tcp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 10: ipv6-tcp_dport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 3. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / tcp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 11: ipv6-sctp_sport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 2. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 12: ipv6-sctp_dport only > +================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 2. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 3. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 13: multi-rule > +============================================================ > + > + 1. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > + 2. create multi-rule with different input set rules:: > + creat rules:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end > actions pf / queue index 1 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end > actions pf / queue index 2 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end > actions pf / queue index 3 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end > actions pf / queue index 4 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end > actions pf / queue index 5 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp > + dst is 66 / end actions pf / queue index 6 / end > + > + send packets:: > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=33)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=44)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=55)/Raw('x' * 80) > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=66)/Raw('x' * 80) > + > + Verify each packet can match the right queue. > + > + 3. destroy the rule:: > + testpmd> flow destroy 0 rule 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) > + > + packets should be in queue 0. > + > + 4. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 3: NEGATIVE_TEST > +==================================== > + Prerequisites > + > + 1. bind the port to dpdk driver in DUT:: > + > + modprobe vfio-pci > + usertools/dpdk-devbind.py --force --bind=vfio-pci 0000:81:00.0 > + > + 2. Launch the testpmd:: > + > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > +1. rules can not create > + > + 1) unsupported rules:: > + create rules:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src > + is 156 dst is 156 / end actions pf / queue index 1 / end > + > + Verify rules can not create. > + > + 2) conflicted rules:: > + create one rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src > + is 156 / end actions pf / queue index 1 / end > + > + create conflicted rules:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src > + is 156 / end actions pf / queue index 2 / end > + > + Verify rules can not create. > \ No newline at end of file > -- > 2.17.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* [dts] [PATCH v2 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst 2020-08-17 5:54 [dts] [PATCH v1 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Guinan Sun 2020-08-17 5:54 ` [dts] [PATCH v1 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun 2020-08-17 6:11 ` [dts] [PATCH v1 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Lin, Xueqin @ 2020-08-17 8:34 ` Guinan Sun 2020-08-17 8:34 ` [dts] [PATCH v2 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun 2020-08-18 2:08 ` [dts] [PATCH v2 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Lin, Xueqin 2020-08-18 3:07 ` [dts] [PATCH v3 " Guinan Sun 3 siblings, 2 replies; 14+ messages in thread From: Guinan Sun @ 2020-08-17 8:34 UTC (permalink / raw) To: dts; +Cc: Guinan Sun Enables the cloud filter for IPv4_UDP/IPv4_TCP/IPv4_SCTP with SRC port only or DST port only. This supports different filter types for the same packet type. E.g. one IPv4_UDP rules with SRC port only and another IPv4_UDP rule with DST port only. Signed-off-by: Guinan Sun <guinanx.sun@intel.com> --- .../cloud_filter_with_l4_port_test_plan.rst | 520 ++++++++++++++++++ 1 file changed, 520 insertions(+) create mode 100644 test_plans/cloud_filter_with_l4_port_test_plan.rst diff --git a/test_plans/cloud_filter_with_l4_port_test_plan.rst b/test_plans/cloud_filter_with_l4_port_test_plan.rst new file mode 100644 index 0000000..beef55c --- /dev/null +++ b/test_plans/cloud_filter_with_l4_port_test_plan.rst @@ -0,0 +1,520 @@ +.. Copyright (c) <2020>, Intel Corporation + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + - Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + - Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the + distribution. + + - Neither the name of Intel Corporation nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +=================================== +Cloud filter with l4 port test plan +=================================== + +Prerequisites +============= + +1. Hardware: + Fortville + +2. software: + dpdk: http://dpdk.org/git/dpdk + scapy: http://www.secdev.org/projects/scapy/ + +3. bind the pf to dpdk driver:: + + ./usertools/dpdk-devbind.py --force --bind=vfio-pci 0000:81:00.0 + +4.Launch the testpmd:: + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + +Test Case 1: ipv4-udp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 2: ipv4-udp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 3: ipv4-tcp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 4: ipv4-tcp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 5: ipv4-sctp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 6: ipv4-sctp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 7: ipv6-udp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / udp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 8: ipv6-udp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / udp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 9: ipv6-tcp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. testpmd> flow create 0 ingress pattern eth / ipv6 / tcp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 10: ipv6-tcp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / tcp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 11: ipv6-sctp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 12: ipv6-sctp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there are one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 13: multi-rule +============================================================ + + 1. create multi-rule with different input set rules:: + creat rules:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end actions pf / queue index 1 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end actions pf / queue index 2 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end actions pf / queue index 3 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end actions pf / queue index 4 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end actions pf / queue index 5 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp dst is 66 / end actions pf / queue index 6 / end + + send packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=33)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=44)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=55)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=66)/Raw('x' * 80) + + Verify each packet can match the right queue. + + 2. destroy the rule:: + testpmd> flow destroy 0 rule 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) + + packets should be in queue 0. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 3: NEGATIVE_TEST +==================================== + +1. rules can not create + + 1) unsupported rules:: + create rules:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 dst is 156 / end actions pf / queue index 1 / end + + Verify rules can not create. + + 2) conflicted rules:: + create one rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end + + create conflicted rules:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 2 / end + + Verify rules can not create. \ No newline at end of file -- 2.17.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* [dts] [PATCH v2 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases 2020-08-17 8:34 ` [dts] [PATCH v2 " Guinan Sun @ 2020-08-17 8:34 ` Guinan Sun 2020-08-18 1:59 ` Lin, Xueqin 2020-08-18 2:08 ` [dts] [PATCH v2 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Lin, Xueqin 1 sibling, 1 reply; 14+ messages in thread From: Guinan Sun @ 2020-08-17 8:34 UTC (permalink / raw) To: dts; +Cc: Guinan Sun add test cases for the new cloud filter. Signed-off-by: Guinan Sun <guinanx.sun@intel.com> --- tests/TestSuite_cloud_filter_with_l4_port.py | 400 +++++++++++++++++++ 1 file changed, 400 insertions(+) create mode 100644 tests/TestSuite_cloud_filter_with_l4_port.py diff --git a/tests/TestSuite_cloud_filter_with_l4_port.py b/tests/TestSuite_cloud_filter_with_l4_port.py new file mode 100644 index 0000000..37b646e --- /dev/null +++ b/tests/TestSuite_cloud_filter_with_l4_port.py @@ -0,0 +1,400 @@ +# BSD LICENSE +# +# Copyright(c) 2020 Intel Corporation. All rights reserved. +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without +# modification, are permitted provided that the following conditions +# are met: +# +# * Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# * Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in +# the documentation and/or other materials provided with the +# distribution. +# * Neither the name of Intel Corporation nor the names of its +# contributors may be used to endorse or promote products derived +# from this software without specific prior written permission. +# +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +""" +DPDK Test suite. + +Test the support of generic flow API by Poll Mode Drivers. + +""" + +import utils +import time +import re + +from test_case import TestCase +from pmd_output import PmdOutput +from settings import DRIVERS +from crb import Crb +from dut import Dut +import packet +from exception import VerifyFailure +import scapy.layers.inet +from scapy.utils import rdpcap + +MAX_QUEUE = 16 + +class TestCloudFilterWithL4Port(TestCase): + + def set_up_all(self): + """ + Run at the start of each test suite. + Generic filter Prerequistites + """ + # Based on h/w type, choose how many ports to use + self.dut_ports = self.dut.get_ports(self.nic) + # Verify that enough ports are available + self.verify(len(self.dut_ports) >= 1, "Insufficient ports") + self.cores = "1S/8C/1T" + self.pf_cores = "1S/8C/1T" + self.pmdout = PmdOutput(self.dut) + + localPort = self.tester.get_local_port(self.dut_ports[0]) + self.tester_itf = self.tester.get_interface(localPort) + self.pf_interface = self.dut.ports_info[self.dut_ports[0]]['intf'] + self.pf_mac = self.dut.get_mac_address(0) + self.pf_pci = self.dut.ports_info[self.dut_ports[0]]['pci'] + self.pkt_obj = packet.Packet() + + self.verify(self.nic in ["fortville_eagle", "fortville_spirit", "carlsville", + "fortville_spirit_single", "fortpark_TLV", + "fortpark_BASE-T","fortville_25g"], "%s nic not support fdir vlan filter" % self.nic) + + def set_up(self): + """ + Run before each test case. + """ + self.dut.kill_all() + + self.pmdout.start_testpmd("%s" % self.cores, "--rxq=%d --txq=%d --disable-rss" % (MAX_QUEUE, MAX_QUEUE), "-w %s --file-prefix=test1" % self.pf_pci) + self.dut.send_expect("set fwd rxonly", "testpmd> ", 120) + self.dut.send_expect("set promisc all off", "testpmd> ", 120) + self.dut.send_expect("set verbose 1", "testpmd> ", 120) + self.dut.send_expect("start", "testpmd> ", 120) + time.sleep(2) + + def destroy_env(self): + """ + This is to stop testpmd. + """ + self.dut.send_expect("quit", "# ") + time.sleep(2) + + def compare_memory_rules(self, expectedRules): + """ + dump all flow rules that have been created in memory and compare that total rules number with the given expected number + to see if they are equal, as to get your conclusion after you have deleted any flow rule entry. + """ + outstring = self.dut.send_expect("flow list 0", "testpmd> ", 20) + result_scanner = r'\d*.*?\d*.*?\d*.*?=>*' + scanner = re.compile(result_scanner, re.DOTALL) + m = scanner.findall(outstring) + print("All flow entries are: ") + for i in range(len(m)): + print(m[i]) + print('Expected rules are: %d - actual are: %d' % (expectedRules, len(m))) + self.verify(expectedRules == len(m), 'Total rules number mismatched') + + def verify_rulenum(self, rule_num): + """ + Verify all the rules created. + """ + # check if there are expected flow rules have been created + self.compare_memory_rules(rule_num) + # check if one rule destroied with success + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") + self.compare_memory_rules(rule_num - 1) + # check if all flow rules have been removed with success + self.dut.send_expect("flow flush 0", "testpmd> ") + self.compare_memory_rules(0) + + def sendpkt(self, pktstr, count=1): + import sys + py_version = sys.version + if py_version.startswith('3.'): + self.pkt_obj.pktgen.pkts.clear() + else: + del self.pkt_obj.pktgen.pkts[:] + self.pkt_obj.append_pkt(pktstr) + self.pkt_obj.send_pkt(self.tester, tx_port=self.tester_itf, count=count) + + def sendpkt_check_result(self, src_port, dst_port, queue, match, pctype=""): + match_info = "/queue %d: " % queue + # source port + if src_port != "" and dst_port == "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s)' % src_port) + elif pctype == "ipv4-tcp": + self.sendpkt(pktstr='Ether()/IP()/TCP(sport=%s)' % src_port) + elif pctype == "ipv4-sctp": + self.sendpkt(pktstr='Ether()/IP()/SCTP(sport=%s)' % src_port) + elif pctype == "ipv6-udp": + self.sendpkt(pktstr='Ether()/IPv6()/UDP(sport=%s)' % src_port) + elif pctype == "ipv6-tcp": + self.sendpkt(pktstr='Ether()/IPv6()/TCP(sport=%s)' % src_port) + elif pctype == "ipv6-sctp": + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(sport=%s)' % src_port) + elif src_port == "" and dst_port != "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(dport=%s)' % dst_port) + elif pctype == "ipv4-tcp": + self.sendpkt(pktstr='Ether()/IP()/TCP(dport=%s)' % dst_port) + elif pctype == "ipv4-sctp": + self.sendpkt(pktstr='Ether()/IP()/SCTP(dport=%s)' % dst_port) + elif pctype == "ipv6-udp": + self.sendpkt(pktstr='Ether()/IPv6()/UDP(dport=%s)' % dst_port) + elif pctype == "ipv6-tcp": + self.sendpkt(pktstr='Ether()/IPv6()/TCP(dport=%s)' % dst_port) + elif pctype == "ipv6-sctp": + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(dport=%s)' % dst_port) + elif src_port != "" and dst_port != "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s, dport=%s)' % (src_port, dst_port)) + + out_pf = self.dut.get_session_output(timeout=2) + print("out_pf is %s" % out_pf) + + if match == 1: + self.verify(match_info in out_pf, "the packet not match the expect queue %d." % queue) + else: + if match_info in out_pf: + raise Exception("the packet should not match the queue %d." % queue) + + def cloudfilter_test( + self, ip_type='ipv4', l4_port_type='udp', src_dst='src', port_value=156, queue_id=0): + + # validate + self.dut.send_expect( + "flow validate 0 ingress pattern eth / %s / %s %s is %d / end actions pf / queue index %d / end" + % (ip_type, l4_port_type, src_dst, port_value, queue_id), + "validated") + + # create + self.dut.send_expect( + "flow create 0 ingress pattern eth / %s / %s %s is %d / end actions pf / queue index %d / end" + % (ip_type, l4_port_type, src_dst, port_value, queue_id), + "created") + + # list + self.compare_memory_rules(1) + + if src_dst is 'src': + self.sendpkt_check_result("%d"%port_value, "", queue_id, 1, "%s-%s"%(ip_type,l4_port_type)) + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + else: + self.sendpkt_check_result("", "%d"%port_value, queue_id, 1, "%s-%s"%(ip_type,l4_port_type)) + self.sendpkt_check_result("", "%d"%(port_value-1), queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + + # flush + self.dut.send_expect("flow flush 0", "testpmd> ") + + if src_dst is 'src': + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + else: + self.sendpkt_check_result("", "%d"%(port_value-1), queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + + self.compare_memory_rules(0) + + def test_ipv4_udp_sport_only(self): + """ + only supported by i40e + """ + # ipv4-udp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='udp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv4_udp_dport_only(self): + """ + only supported by i40e + """ + # ipv4-udp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='udp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv4_tcp_sport_only(self): + """ + only supported by i40e + """ + # ipv4-tcp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='tcp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv4_tcp_dport_only(self): + """ + only supported by i40e + """ + #ipv4-tcp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='tcp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv4_sctp_sport_only(self): + """ + only supported by i40e + """ + # ipv4-sctp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='sctp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv4_sctp_dport_only(self): + """ + only supported by i40e + """ + #ipv4-sctp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='sctp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv6_udp_sport_only(self): + """ + only supported by i40e + """ + # ipv6-udp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='udp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv6_udp_dport_only(self): + """ + only supported by i40e + """ + # ipv6-udp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='udp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv6_tcp_sport_only(self): + """ + only supported by i40e + """ + # ipv6-tcp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='tcp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv6_tcp_dport_only(self): + """ + only supported by i40e + """ + #ipv6-tcp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='tcp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv6_sctp_sport_only(self): + """ + only supported by i40e + """ + # ipv6-sctp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='sctp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv6_sctp_dport_only(self): + """ + only supported by i40e + """ + #ipv6-sctp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='sctp', src_dst='dst', port_value=156, queue_id=1) + + def test_multi_rule(self): + """ + only supported by i40e + """ + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end actions pf / queue index 1 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end actions pf / queue index 2 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end actions pf / queue index 3 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end actions pf / queue index 4 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end actions pf / queue index 5 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / sctp dst is 66 / end actions pf / queue index 6 / end", + "created") + + self.sendpkt_check_result("11", "", 1, 1, "ipv4-udp") + self.sendpkt_check_result("22", "", 2, 1, "ipv4-tcp") + self.sendpkt_check_result("33", "", 3, 1, "ipv4-sctp") + self.sendpkt_check_result("", "44", 4, 1, "ipv4-udp") + self.sendpkt_check_result("", "55", 5, 1, "ipv4-tcp") + self.sendpkt_check_result("", "66", 6, 1, "ipv4-sctp") + + # destroy + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") + + self.sendpkt_check_result("11", "", 1, 0, "ipv4-udp") + + self.compare_memory_rules(5) + + # flush + self.dut.send_expect("flow flush 0", "testpmd> ") + + self.sendpkt_check_result("22", "", 2, 0, "ipv4-tcp") + + self.compare_memory_rules(0) + + def test_negative(self): + """ + only supported by i40e + """ + # unsupported rules + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 dst is 156 / end actions pf / queue index 1 / end", + "error") + + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end", + "create") + + # conflicted rules + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 2 / end", + "error") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv6 / udp src is 156 / end actions pf / queue index 2 / end", + "error") + + def tear_down(self): + """ + Run after each test case. + """ + self.destroy_env() + self.dut.kill_all() + + def tear_down_all(self): + """ + Run after each test suite. + """ + self.dut.kill_all() -- 2.17.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [dts] [PATCH v2 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases 2020-08-17 8:34 ` [dts] [PATCH v2 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun @ 2020-08-18 1:59 ` Lin, Xueqin 0 siblings, 0 replies; 14+ messages in thread From: Lin, Xueqin @ 2020-08-18 1:59 UTC (permalink / raw) To: Sun, GuinanX, dts; +Cc: Sun, GuinanX Some comment as below. Best regards, Xueqin > -----Original Message----- > From: dts <dts-bounces@dpdk.org> On Behalf Of Guinan Sun > Sent: Monday, August 17, 2020 4:34 PM > To: dts@dpdk.org > Cc: Sun, GuinanX <guinanx.sun@intel.com> > Subject: [dts] [PATCH v2 2/2] tests/TestSuite_cloud_filter_with_l4_port.py > add test cases > > add test cases for the new cloud filter. > > Signed-off-by: Guinan Sun <guinanx.sun@intel.com> > --- > tests/TestSuite_cloud_filter_with_l4_port.py | 400 +++++++++++++++++++ > 1 file changed, 400 insertions(+) > create mode 100644 tests/TestSuite_cloud_filter_with_l4_port.py > > diff --git a/tests/TestSuite_cloud_filter_with_l4_port.py > b/tests/TestSuite_cloud_filter_with_l4_port.py > new file mode 100644 > index 0000000..37b646e > --- /dev/null > +++ b/tests/TestSuite_cloud_filter_with_l4_port.py > @@ -0,0 +1,400 @@ > +# BSD LICENSE > +# > +# Copyright(c) 2020 Intel Corporation. All rights reserved. > +# All rights reserved. > +# > +# Redistribution and use in source and binary forms, with or without # > +modification, are permitted provided that the following conditions # > +are met: > +# > +# * Redistributions of source code must retain the above copyright > +# notice, this list of conditions and the following disclaimer. > +# * Redistributions in binary form must reproduce the above copyright > +# notice, this list of conditions and the following disclaimer in > +# the documentation and/or other materials provided with the > +# distribution. > +# * Neither the name of Intel Corporation nor the names of its > +# contributors may be used to endorse or promote products derived > +# from this software without specific prior written permission. > +# > +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND > CONTRIBUTORS # > +"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT > # > +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND > FITNESS FOR # > +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE > COPYRIGHT # > +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, > INCIDENTAL, # > +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT > NOT # > +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS > OF USE, # > +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND > ON ANY # > +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR > TORT # > +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF > THE USE # > +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH > DAMAGE. > + > +""" > +DPDK Test suite. > + > +Test the support of generic flow API by Poll Mode Drivers. > + > +""" > + > +import utils > +import time > +import re > + > +from test_case import TestCase > +from pmd_output import PmdOutput > +from settings import DRIVERS > +from crb import Crb > +from dut import Dut > +import packet > +from exception import VerifyFailure > +import scapy.layers.inet > +from scapy.utils import rdpcap > + > +MAX_QUEUE = 16 > + > +class TestCloudFilterWithL4Port(TestCase): > + > + def set_up_all(self): > + """ > + Run at the start of each test suite. > + Generic filter Prerequistites > + """ > + # Based on h/w type, choose how many ports to use > + self.dut_ports = self.dut.get_ports(self.nic) > + # Verify that enough ports are available > + self.verify(len(self.dut_ports) >= 1, "Insufficient ports") > + self.cores = "1S/8C/1T" > + self.pf_cores = "1S/8C/1T" > + self.pmdout = PmdOutput(self.dut) > + > + localPort = self.tester.get_local_port(self.dut_ports[0]) > + self.tester_itf = self.tester.get_interface(localPort) > + self.pf_interface = self.dut.ports_info[self.dut_ports[0]]['intf'] > + self.pf_mac = self.dut.get_mac_address(0) > + self.pf_pci = self.dut.ports_info[self.dut_ports[0]]['pci'] > + self.pkt_obj = packet.Packet() > + > + self.verify(self.nic in ["fortville_eagle", "fortville_spirit", "carlsville", > + "fortville_spirit_single", "fortpark_TLV", > + "fortpark_BASE-T","fortville_25g"], "%s nic not > + support fdir vlan filter" % self.nic) Wrong for "not support fdir vlan filter" > + > + def set_up(self): > + """ > + Run before each test case. > + """ > + self.dut.kill_all() > + > + self.pmdout.start_testpmd("%s" % self.cores, "--rxq=%d --txq=%d -- > disable-rss" % (MAX_QUEUE, MAX_QUEUE), "-w %s --file-prefix=test1" % > self.pf_pci) > + self.dut.send_expect("set fwd rxonly", "testpmd> ", 120) > + self.dut.send_expect("set promisc all off", "testpmd> ", 120) > + self.dut.send_expect("set verbose 1", "testpmd> ", 120) > + self.dut.send_expect("start", "testpmd> ", 120) > + time.sleep(2) > + > + def destroy_env(self): > + """ > + This is to stop testpmd. > + """ > + self.dut.send_expect("quit", "# ") > + time.sleep(2) > + > + def compare_memory_rules(self, expectedRules): > + """ > + dump all flow rules that have been created in memory and compare > that total rules number with the given expected number > + to see if they are equal, as to get your conclusion after you have > deleted any flow rule entry. > + """ > + outstring = self.dut.send_expect("flow list 0", "testpmd> ", 20) > + result_scanner = r'\d*.*?\d*.*?\d*.*?=>*' > + scanner = re.compile(result_scanner, re.DOTALL) > + m = scanner.findall(outstring) > + print("All flow entries are: ") > + for i in range(len(m)): > + print(m[i]) > + print('Expected rules are: %d - actual are: %d' % (expectedRules, len(m))) > + self.verify(expectedRules == len(m), 'Total rules number > + mismatched') > + > + def verify_rulenum(self, rule_num): > + """ > + Verify all the rules created. > + """ > + # check if there are expected flow rules have been created > + self.compare_memory_rules(rule_num) > + # check if one rule destroied with success destroyed > + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") > + self.compare_memory_rules(rule_num - 1) > + # check if all flow rules have been removed with success > + self.dut.send_expect("flow flush 0", "testpmd> ") > + self.compare_memory_rules(0) > + > + def sendpkt(self, pktstr, count=1): > + import sys > + py_version = sys.version > + if py_version.startswith('3.'): > + self.pkt_obj.pktgen.pkts.clear() > + else: > + del self.pkt_obj.pktgen.pkts[:] > + self.pkt_obj.append_pkt(pktstr) > + self.pkt_obj.send_pkt(self.tester, tx_port=self.tester_itf, > + count=count) > + > + def sendpkt_check_result(self, src_port, dst_port, queue, match, > pctype=""): > + match_info = "/queue %d: " % queue > + # source port > + if src_port != "" and dst_port == "": > + if pctype == "ipv4-udp": > + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s)' % src_port) > + elif pctype == "ipv4-tcp": > + self.sendpkt(pktstr='Ether()/IP()/TCP(sport=%s)' % src_port) > + elif pctype == "ipv4-sctp": > + self.sendpkt(pktstr='Ether()/IP()/SCTP(sport=%s)' % src_port) > + elif pctype == "ipv6-udp": > + self.sendpkt(pktstr='Ether()/IPv6()/UDP(sport=%s)' % src_port) > + elif pctype == "ipv6-tcp": > + self.sendpkt(pktstr='Ether()/IPv6()/TCP(sport=%s)' % src_port) > + elif pctype == "ipv6-sctp": > + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(sport=%s)' % src_port) > + elif src_port == "" and dst_port != "": > + if pctype == "ipv4-udp": > + self.sendpkt(pktstr='Ether()/IP()/UDP(dport=%s)' % dst_port) > + elif pctype == "ipv4-tcp": > + self.sendpkt(pktstr='Ether()/IP()/TCP(dport=%s)' % dst_port) > + elif pctype == "ipv4-sctp": > + self.sendpkt(pktstr='Ether()/IP()/SCTP(dport=%s)' % dst_port) > + elif pctype == "ipv6-udp": > + self.sendpkt(pktstr='Ether()/IPv6()/UDP(dport=%s)' % dst_port) > + elif pctype == "ipv6-tcp": > + self.sendpkt(pktstr='Ether()/IPv6()/TCP(dport=%s)' % dst_port) > + elif pctype == "ipv6-sctp": > + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(dport=%s)' % dst_port) > + elif src_port != "" and dst_port != "": > + if pctype == "ipv4-udp": > + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s, > + dport=%s)' % (src_port, dst_port)) > + > + out_pf = self.dut.get_session_output(timeout=2) > + print("out_pf is %s" % out_pf) > + > + if match == 1: > + self.verify(match_info in out_pf, "the packet not match the expect > queue %d." % queue) > + else: > + if match_info in out_pf: > + raise Exception("the packet should not match the queue > + %d." % queue) > + > + def cloudfilter_test( > + self, ip_type='ipv4', l4_port_type='udp', src_dst='src', port_value=156, > queue_id=0): > + > + # validate > + self.dut.send_expect( > + "flow validate 0 ingress pattern eth / %s / %s %s is %d / end actions > pf / queue index %d / end" > + % (ip_type, l4_port_type, src_dst, port_value, queue_id), > + "validated") > + > + # create > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / %s / %s %s is %d / end actions > pf / queue index %d / end" > + % (ip_type, l4_port_type, src_dst, port_value, queue_id), > + "created") > + > + # list > + self.compare_memory_rules(1) > + > + if src_dst is 'src': > + self.sendpkt_check_result("%d"%port_value, "", queue_id, 1, "%s- > %s"%(ip_type,l4_port_type)) > + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, > "%s-%s"%(ip_type,l4_port_type)) > + else: > + self.sendpkt_check_result("", "%d"%port_value, queue_id, 1, "%s- > %s"%(ip_type,l4_port_type)) > + self.sendpkt_check_result("", "%d"%(port_value-1), > + queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) > + > + # flush > + self.dut.send_expect("flow flush 0", "testpmd> ") > + > + if src_dst is 'src': > + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, > "%s-%s"%(ip_type,l4_port_type)) > + else: > + self.sendpkt_check_result("", "%d"%(port_value-1), > + queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) > + > + self.compare_memory_rules(0) > + > + def test_ipv4_udp_sport_only(self): > + """ > + only supported by i40e > + """ Should not have the sentence, above have check the NIC type, same as below. > + # ipv4-udp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='udp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv4_udp_dport_only(self): > + """ > + only supported by i40e > + """ > + # ipv4-udp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='udp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_ipv4_tcp_sport_only(self): > + """ > + only supported by i40e > + """ > + # ipv4-tcp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='tcp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv4_tcp_dport_only(self): > + """ > + only supported by i40e > + """ > + #ipv4-tcp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='tcp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_ipv4_sctp_sport_only(self): > + """ > + only supported by i40e > + """ > + # ipv4-sctp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='sctp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv4_sctp_dport_only(self): > + """ > + only supported by i40e > + """ > + #ipv4-sctp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='sctp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_ipv6_udp_sport_only(self): > + """ > + only supported by i40e > + """ > + # ipv6-udp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='udp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv6_udp_dport_only(self): > + """ > + only supported by i40e > + """ > + # ipv6-udp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='udp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_ipv6_tcp_sport_only(self): > + """ > + only supported by i40e > + """ > + # ipv6-tcp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='tcp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv6_tcp_dport_only(self): > + """ > + only supported by i40e > + """ > + #ipv6-tcp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='tcp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_ipv6_sctp_sport_only(self): > + """ > + only supported by i40e > + """ > + # ipv6-sctp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='sctp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv6_sctp_dport_only(self): > + """ > + only supported by i40e > + """ > + #ipv6-sctp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='sctp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_multi_rule(self): > + """ > + only supported by i40e > + """ > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end actions > pf / queue index 1 / end", > + "created") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end actions > pf / queue index 2 / end", > + "created") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end actions > pf / queue index 3 / end", > + "created") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end actions > pf / queue index 4 / end", > + "created") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end actions > pf / queue index 5 / end", > + "created") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / sctp dst is 66 / end actions > pf / queue index 6 / end", > + "created") > + > + self.sendpkt_check_result("11", "", 1, 1, "ipv4-udp") > + self.sendpkt_check_result("22", "", 2, 1, "ipv4-tcp") > + self.sendpkt_check_result("33", "", 3, 1, "ipv4-sctp") > + self.sendpkt_check_result("", "44", 4, 1, "ipv4-udp") > + self.sendpkt_check_result("", "55", 5, 1, "ipv4-tcp") > + self.sendpkt_check_result("", "66", 6, 1, "ipv4-sctp") > + > + # destroy > + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") > + > + self.sendpkt_check_result("11", "", 1, 0, "ipv4-udp") > + > + self.compare_memory_rules(5) > + > + # flush > + self.dut.send_expect("flow flush 0", "testpmd> ") > + > + self.sendpkt_check_result("22", "", 2, 0, "ipv4-tcp") > + > + self.compare_memory_rules(0) > + > + def test_negative(self): > + """ > + only supported by i40e > + """ > + # unsupported rules > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 dst is 156 / > end actions pf / queue index 1 / end", > + "error") > + > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions > pf / queue index 1 / end", > + "create") > + > + # conflicted rules > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions > pf / queue index 2 / end", > + "error") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv6 / udp src is 156 / end actions > pf / queue index 2 / end", > + "error") > + > + def tear_down(self): > + """ > + Run after each test case. > + """ > + self.destroy_env() > + self.dut.kill_all() > + > + def tear_down_all(self): > + """ > + Run after each test suite. > + """ > + self.dut.kill_all() > -- > 2.17.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [dts] [PATCH v2 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst 2020-08-17 8:34 ` [dts] [PATCH v2 " Guinan Sun 2020-08-17 8:34 ` [dts] [PATCH v2 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun @ 2020-08-18 2:08 ` Lin, Xueqin 1 sibling, 0 replies; 14+ messages in thread From: Lin, Xueqin @ 2020-08-18 2:08 UTC (permalink / raw) To: Sun, GuinanX, dts; +Cc: Sun, GuinanX Verify there are one rule. there are ->there is Best regards, Xueqin > -----Original Message----- > From: dts <dts-bounces@dpdk.org> On Behalf Of Guinan Sun > Sent: Monday, August 17, 2020 4:34 PM > To: dts@dpdk.org > Cc: Sun, GuinanX <guinanx.sun@intel.com> > Subject: [dts] [PATCH v2 1/2] test_plans: add > cloud_filter_with_l4_port_test_plan.rst > > Enables the cloud filter for IPv4_UDP/IPv4_TCP/IPv4_SCTP with SRC port > only or DST port only. > This supports different filter types for the same packet type. > E.g. one IPv4_UDP rules with SRC port only and another IPv4_UDP rule with > DST port only. > > Signed-off-by: Guinan Sun <guinanx.sun@intel.com> > --- > .../cloud_filter_with_l4_port_test_plan.rst | 520 ++++++++++++++++++ > 1 file changed, 520 insertions(+) > create mode 100644 test_plans/cloud_filter_with_l4_port_test_plan.rst > > diff --git a/test_plans/cloud_filter_with_l4_port_test_plan.rst > b/test_plans/cloud_filter_with_l4_port_test_plan.rst > new file mode 100644 > index 0000000..beef55c > --- /dev/null > +++ b/test_plans/cloud_filter_with_l4_port_test_plan.rst > @@ -0,0 +1,520 @@ > +.. Copyright (c) <2020>, Intel Corporation > + All rights reserved. > + > + Redistribution and use in source and binary forms, with or without > + modification, are permitted provided that the following conditions > + are met: > + > + - Redistributions of source code must retain the above copyright > + notice, this list of conditions and the following disclaimer. > + > + - Redistributions in binary form must reproduce the above copyright > + notice, this list of conditions and the following disclaimer in > + the documentation and/or other materials provided with the > + distribution. > + > + - Neither the name of Intel Corporation nor the names of its > + contributors may be used to endorse or promote products derived > + from this software without specific prior written permission. > + > + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND > CONTRIBUTORS > + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT > NOT > + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND > FITNESS > + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE > + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, > INDIRECT, > + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES > + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE > GOODS OR > + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) > + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN > CONTRACT, > + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) > + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF > ADVISED > + OF THE POSSIBILITY OF SUCH DAMAGE. > + > +=================================== > +Cloud filter with l4 port test plan > +=================================== > + > +Prerequisites > +============= > + > +1. Hardware: > + Fortville > + > +2. software: > + dpdk: http://dpdk.org/git/dpdk > + scapy: http://www.secdev.org/projects/scapy/ > + > +3. bind the pf to dpdk driver:: > + > + ./usertools/dpdk-devbind.py --force --bind=vfio-pci 0000:81:00.0 > + > +4.Launch the testpmd:: > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > +Test Case 1: ipv4-udp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. there are ->there is > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 2: ipv4-udp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 3: ipv4-tcp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 4: ipv4-tcp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 5: ipv4-sctp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 6: ipv4-sctp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 7: ipv6-udp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / udp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 8: ipv6-udp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / udp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 9: ipv6-tcp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. testpmd> flow create 0 ingress pattern eth / ipv6 / tcp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 10: ipv6-tcp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / tcp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 11: ipv6-sctp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 12: ipv6-sctp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there are one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 13: multi-rule > +============================================================ > + > + 1. create multi-rule with different input set rules:: > + creat rules:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end > actions pf / queue index 1 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end > actions pf / queue index 2 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end > actions pf / queue index 3 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end > actions pf / queue index 4 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end > actions pf / queue index 5 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp > + dst is 66 / end actions pf / queue index 6 / end > + > + send packets:: > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=33)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=44)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=55)/Raw('x' * 80) > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=66)/Raw('x' * 80) > + > + Verify each packet can match the right queue. > + > + 2. destroy the rule:: > + testpmd> flow destroy 0 rule 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) > + > + packets should be in queue 0. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 3: NEGATIVE_TEST > +==================================== > + > +1. rules can not create > + > + 1) unsupported rules:: > + create rules:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src > + is 156 dst is 156 / end actions pf / queue index 1 / end > + > + Verify rules can not create. > + > + 2) conflicted rules:: > + create one rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src > + is 156 / end actions pf / queue index 1 / end > + > + create conflicted rules:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src > + is 156 / end actions pf / queue index 2 / end > + > + Verify rules can not create. > \ No newline at end of file > -- > 2.17.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* [dts] [PATCH v3 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst 2020-08-17 5:54 [dts] [PATCH v1 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Guinan Sun ` (2 preceding siblings ...) 2020-08-17 8:34 ` [dts] [PATCH v2 " Guinan Sun @ 2020-08-18 3:07 ` Guinan Sun 2020-08-18 3:07 ` [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun ` (2 more replies) 3 siblings, 3 replies; 14+ messages in thread From: Guinan Sun @ 2020-08-18 3:07 UTC (permalink / raw) To: dts; +Cc: Guinan Sun Enables the cloud filter for IPv4_UDP/IPv4_TCP/IPv4_SCTP with SRC port only or DST port only. This supports different filter types for the same packet type. E.g. one IPv4_UDP rules with SRC port only and another IPv4_UDP rule with DST port only. Signed-off-by: Guinan Sun <guinanx.sun@intel.com> --- .../cloud_filter_with_l4_port_test_plan.rst | 520 ++++++++++++++++++ 1 file changed, 520 insertions(+) create mode 100644 test_plans/cloud_filter_with_l4_port_test_plan.rst diff --git a/test_plans/cloud_filter_with_l4_port_test_plan.rst b/test_plans/cloud_filter_with_l4_port_test_plan.rst new file mode 100644 index 0000000..50987f3 --- /dev/null +++ b/test_plans/cloud_filter_with_l4_port_test_plan.rst @@ -0,0 +1,520 @@ +.. Copyright (c) <2020>, Intel Corporation + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + - Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + - Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the + distribution. + + - Neither the name of Intel Corporation nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + +=================================== +Cloud filter with l4 port test plan +=================================== + +Prerequisites +============= + +1. Hardware: + Fortville + +2. software: + dpdk: http://dpdk.org/git/dpdk + scapy: http://www.secdev.org/projects/scapy/ + +3. bind the pf to dpdk driver:: + + ./usertools/dpdk-devbind.py --force --bind=vfio-pci 0000:81:00.0 + +4.Launch the testpmd:: + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 --disable-rss + testpmd> set fwd rxonly + testpmd> set promisc all off + testpmd> set verbose 1 + testpmd> start + +Test Case 1: ipv4-udp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 2: ipv4-udp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 3: ipv4-tcp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 4: ipv4-tcp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 5: ipv4-sctp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 6: ipv4-sctp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 7: ipv6-udp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / udp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 8: ipv6-udp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / udp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 9: ipv6-tcp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. testpmd> flow create 0 ingress pattern eth / ipv6 / tcp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 10: ipv6-tcp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / tcp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 11: ipv6-sctp_sport only +================================ + + 1. validate a source port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp src is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a source port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp src is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 12: ipv6-sctp_dport only +================================ + + 1. validate a destination port rule:: + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp dst is 156 / end actions pf / queue index 1 / end + + Verify the command can validate:: + Flow rule validated + + 2. create a destination port rule:: + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp dst is 156 / end actions pf / queue index 1 / end + + testpmd> flow list 0 + + Verify there is one rule. + + send matched packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) + + Verify packets will be received in queue 1. + + send no matched packet:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=111)/Raw('x' * 80) + + Verify packets will not be received in queue 1. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 13: multi-rule +============================================================ + + 1. create multi-rule with different input set rules:: + creat rules:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end actions pf / queue index 1 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end actions pf / queue index 2 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end actions pf / queue index 3 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end actions pf / queue index 4 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end actions pf / queue index 5 / end + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp dst is 66 / end actions pf / queue index 6 / end + + send packets:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=33)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=44)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=55)/Raw('x' * 80) + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=66)/Raw('x' * 80) + + Verify each packet can match the right queue. + + 2. destroy the rule:: + testpmd> flow destroy 0 rule 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) + + packets should be in queue 0. + + 3. flush the rule:: + testpmd> flow flush 0 + + send packets match rule 0:: + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) + + packets should be in queue 0. + +Test Case 3: NEGATIVE_TEST +==================================== + +1. rules can not create + + 1) unsupported rules:: + create rules:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 dst is 156 / end actions pf / queue index 1 / end + + Verify rules can not create. + + 2) conflicted rules:: + create one rule:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end + + create conflicted rules:: + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 2 / end + + Verify rules can not create. \ No newline at end of file -- 2.17.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases 2020-08-18 3:07 ` [dts] [PATCH v3 " Guinan Sun @ 2020-08-18 3:07 ` Guinan Sun 2020-08-18 5:11 ` Lin, Xueqin ` (2 more replies) 2020-08-18 5:07 ` [dts] [PATCH v3 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Lin, Xueqin 2020-08-21 3:28 ` Tu, Lijuan 2 siblings, 3 replies; 14+ messages in thread From: Guinan Sun @ 2020-08-18 3:07 UTC (permalink / raw) To: dts; +Cc: Guinan Sun add test cases for the new cloud filter. Signed-off-by: Guinan Sun <guinanx.sun@intel.com> --- tests/TestSuite_cloud_filter_with_l4_port.py | 358 +++++++++++++++++++ 1 file changed, 358 insertions(+) create mode 100644 tests/TestSuite_cloud_filter_with_l4_port.py diff --git a/tests/TestSuite_cloud_filter_with_l4_port.py b/tests/TestSuite_cloud_filter_with_l4_port.py new file mode 100644 index 0000000..005983d --- /dev/null +++ b/tests/TestSuite_cloud_filter_with_l4_port.py @@ -0,0 +1,358 @@ +# BSD LICENSE +# +# Copyright(c) 2020 Intel Corporation. All rights reserved. +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without +# modification, are permitted provided that the following conditions +# are met: +# +# * Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# * Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in +# the documentation and/or other materials provided with the +# distribution. +# * Neither the name of Intel Corporation nor the names of its +# contributors may be used to endorse or promote products derived +# from this software without specific prior written permission. +# +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +""" +DPDK Test suite. + +Test the support of generic flow API by Poll Mode Drivers. + +""" + +import utils +import time +import re + +from test_case import TestCase +from pmd_output import PmdOutput +from settings import DRIVERS +from crb import Crb +from dut import Dut +import packet +from exception import VerifyFailure +import scapy.layers.inet +from scapy.utils import rdpcap + +MAX_QUEUE = 16 + +class TestCloudFilterWithL4Port(TestCase): + + def set_up_all(self): + """ + Run at the start of each test suite. + Generic filter Prerequistites + """ + # Based on h/w type, choose how many ports to use + self.dut_ports = self.dut.get_ports(self.nic) + # Verify that enough ports are available + self.verify(len(self.dut_ports) >= 1, "Insufficient ports") + self.cores = "1S/8C/1T" + self.pf_cores = "1S/8C/1T" + self.pmdout = PmdOutput(self.dut) + + localPort = self.tester.get_local_port(self.dut_ports[0]) + self.tester_itf = self.tester.get_interface(localPort) + self.pf_interface = self.dut.ports_info[self.dut_ports[0]]['intf'] + self.pf_mac = self.dut.get_mac_address(0) + self.pf_pci = self.dut.ports_info[self.dut_ports[0]]['pci'] + self.pkt_obj = packet.Packet() + + self.verify(self.nic in ["fortville_eagle", "fortville_spirit", "carlsville", + "fortville_spirit_single", "fortpark_TLV", + "fortpark_BASE-T","fortville_25g"], "%s nic not support cloud filter" % self.nic) + + def set_up(self): + """ + Run before each test case. + """ + self.dut.kill_all() + + self.pmdout.start_testpmd("%s" % self.cores, "--rxq=%d --txq=%d --disable-rss" % (MAX_QUEUE, MAX_QUEUE), "-w %s --file-prefix=test1" % self.pf_pci) + self.dut.send_expect("set fwd rxonly", "testpmd> ", 120) + self.dut.send_expect("set promisc all off", "testpmd> ", 120) + self.dut.send_expect("set verbose 1", "testpmd> ", 120) + self.dut.send_expect("start", "testpmd> ", 120) + time.sleep(2) + + def destroy_env(self): + """ + This is to stop testpmd. + """ + self.dut.send_expect("quit", "# ") + time.sleep(2) + + def compare_memory_rules(self, expectedRules): + """ + dump all flow rules that have been created in memory and compare that total rules number with the given expected number + to see if they are equal, as to get your conclusion after you have deleted any flow rule entry. + """ + outstring = self.dut.send_expect("flow list 0", "testpmd> ", 20) + result_scanner = r'\d*.*?\d*.*?\d*.*?=>*' + scanner = re.compile(result_scanner, re.DOTALL) + m = scanner.findall(outstring) + print("All flow entries are: ") + for i in range(len(m)): + print(m[i]) + print('Expected rules are: %d - actual are: %d' % (expectedRules, len(m))) + self.verify(expectedRules == len(m), 'Total rules number mismatched') + + def verify_rulenum(self, rule_num): + """ + Verify all the rules created. + """ + # check if there are expected flow rules have been created + self.compare_memory_rules(rule_num) + # check if one rule destroyed with success + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") + self.compare_memory_rules(rule_num - 1) + # check if all flow rules have been removed with success + self.dut.send_expect("flow flush 0", "testpmd> ") + self.compare_memory_rules(0) + + def sendpkt(self, pktstr, count=1): + import sys + py_version = sys.version + if py_version.startswith('3.'): + self.pkt_obj.pktgen.pkts.clear() + else: + del self.pkt_obj.pktgen.pkts[:] + self.pkt_obj.append_pkt(pktstr) + self.pkt_obj.send_pkt(self.tester, tx_port=self.tester_itf, count=count) + + def sendpkt_check_result(self, src_port, dst_port, queue, match, pctype=""): + match_info = "/queue %d: " % queue + # source port + if src_port != "" and dst_port == "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s)' % src_port) + elif pctype == "ipv4-tcp": + self.sendpkt(pktstr='Ether()/IP()/TCP(sport=%s)' % src_port) + elif pctype == "ipv4-sctp": + self.sendpkt(pktstr='Ether()/IP()/SCTP(sport=%s)' % src_port) + elif pctype == "ipv6-udp": + self.sendpkt(pktstr='Ether()/IPv6()/UDP(sport=%s)' % src_port) + elif pctype == "ipv6-tcp": + self.sendpkt(pktstr='Ether()/IPv6()/TCP(sport=%s)' % src_port) + elif pctype == "ipv6-sctp": + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(sport=%s)' % src_port) + elif src_port == "" and dst_port != "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(dport=%s)' % dst_port) + elif pctype == "ipv4-tcp": + self.sendpkt(pktstr='Ether()/IP()/TCP(dport=%s)' % dst_port) + elif pctype == "ipv4-sctp": + self.sendpkt(pktstr='Ether()/IP()/SCTP(dport=%s)' % dst_port) + elif pctype == "ipv6-udp": + self.sendpkt(pktstr='Ether()/IPv6()/UDP(dport=%s)' % dst_port) + elif pctype == "ipv6-tcp": + self.sendpkt(pktstr='Ether()/IPv6()/TCP(dport=%s)' % dst_port) + elif pctype == "ipv6-sctp": + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(dport=%s)' % dst_port) + elif src_port != "" and dst_port != "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s, dport=%s)' % (src_port, dst_port)) + + out_pf = self.dut.get_session_output(timeout=2) + print("out_pf is %s" % out_pf) + + if match == 1: + self.verify(match_info in out_pf, "the packet not match the expect queue %d." % queue) + else: + if match_info in out_pf: + raise Exception("the packet should not match the queue %d." % queue) + + def cloudfilter_test( + self, ip_type='ipv4', l4_port_type='udp', src_dst='src', port_value=156, queue_id=0): + + # validate + self.dut.send_expect( + "flow validate 0 ingress pattern eth / %s / %s %s is %d / end actions pf / queue index %d / end" + % (ip_type, l4_port_type, src_dst, port_value, queue_id), + "validated") + + # create + self.dut.send_expect( + "flow create 0 ingress pattern eth / %s / %s %s is %d / end actions pf / queue index %d / end" + % (ip_type, l4_port_type, src_dst, port_value, queue_id), + "created") + + # list + self.compare_memory_rules(1) + + if src_dst is 'src': + self.sendpkt_check_result("%d"%port_value, "", queue_id, 1, "%s-%s"%(ip_type,l4_port_type)) + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + else: + self.sendpkt_check_result("", "%d"%port_value, queue_id, 1, "%s-%s"%(ip_type,l4_port_type)) + self.sendpkt_check_result("", "%d"%(port_value-1), queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + + # flush + self.dut.send_expect("flow flush 0", "testpmd> ") + + if src_dst is 'src': + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + else: + self.sendpkt_check_result("", "%d"%(port_value-1), queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + + self.compare_memory_rules(0) + + def test_ipv4_udp_sport_only(self): + # ipv4-udp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='udp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv4_udp_dport_only(self): + # ipv4-udp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='udp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv4_tcp_sport_only(self): + # ipv4-tcp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='tcp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv4_tcp_dport_only(self): + #ipv4-tcp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='tcp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv4_sctp_sport_only(self): + # ipv4-sctp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='sctp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv4_sctp_dport_only(self): + #ipv4-sctp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='sctp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv6_udp_sport_only(self): + # ipv6-udp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='udp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv6_udp_dport_only(self): + # ipv6-udp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='udp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv6_tcp_sport_only(self): + # ipv6-tcp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='tcp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv6_tcp_dport_only(self): + #ipv6-tcp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='tcp', src_dst='dst', port_value=156, queue_id=1) + + def test_ipv6_sctp_sport_only(self): + # ipv6-sctp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='sctp', src_dst='src', port_value=156, queue_id=1) + + def test_ipv6_sctp_dport_only(self): + #ipv6-sctp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='sctp', src_dst='dst', port_value=156, queue_id=1) + + def test_multi_rule(self): + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end actions pf / queue index 1 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end actions pf / queue index 2 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end actions pf / queue index 3 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end actions pf / queue index 4 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end actions pf / queue index 5 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / sctp dst is 66 / end actions pf / queue index 6 / end", + "created") + + self.sendpkt_check_result("11", "", 1, 1, "ipv4-udp") + self.sendpkt_check_result("22", "", 2, 1, "ipv4-tcp") + self.sendpkt_check_result("33", "", 3, 1, "ipv4-sctp") + self.sendpkt_check_result("", "44", 4, 1, "ipv4-udp") + self.sendpkt_check_result("", "55", 5, 1, "ipv4-tcp") + self.sendpkt_check_result("", "66", 6, 1, "ipv4-sctp") + + # destroy + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") + + self.sendpkt_check_result("11", "", 1, 0, "ipv4-udp") + + self.compare_memory_rules(5) + + # flush + self.dut.send_expect("flow flush 0", "testpmd> ") + + self.sendpkt_check_result("22", "", 2, 0, "ipv4-tcp") + + self.compare_memory_rules(0) + + def test_negative(self): + # unsupported rules + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 dst is 156 / end actions pf / queue index 1 / end", + "error") + + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end", + "create") + + # conflicted rules + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 2 / end", + "error") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv6 / udp src is 156 / end actions pf / queue index 2 / end", + "error") + + def tear_down(self): + """ + Run after each test case. + """ + self.destroy_env() + self.dut.kill_all() + + def tear_down_all(self): + """ + Run after each test suite. + """ + self.dut.kill_all() -- 2.17.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases 2020-08-18 3:07 ` [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun @ 2020-08-18 5:11 ` Lin, Xueqin 2020-08-18 8:38 ` Chen, LingliX 2020-08-21 3:31 ` Tu, Lijuan 2 siblings, 0 replies; 14+ messages in thread From: Lin, Xueqin @ 2020-08-18 5:11 UTC (permalink / raw) To: Sun, GuinanX, dts; +Cc: Sun, GuinanX Acked-by: Xueqin Lin <Xueqin.lin@intel.com> > -----Original Message----- > From: dts <dts-bounces@dpdk.org> On Behalf Of Guinan Sun > Sent: Tuesday, August 18, 2020 11:08 AM > To: dts@dpdk.org > Cc: Sun, GuinanX <guinanx.sun@intel.com> > Subject: [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add > test cases > > add test cases for the new cloud filter. > > Signed-off-by: Guinan Sun <guinanx.sun@intel.com> > --- > tests/TestSuite_cloud_filter_with_l4_port.py | 358 +++++++++++++++++++ > 1 file changed, 358 insertions(+) > create mode 100644 tests/TestSuite_cloud_filter_with_l4_port.py > > diff --git a/tests/TestSuite_cloud_filter_with_l4_port.py > b/tests/TestSuite_cloud_filter_with_l4_port.py > new file mode 100644 > index 0000000..005983d > --- /dev/null > +++ b/tests/TestSuite_cloud_filter_with_l4_port.py > @@ -0,0 +1,358 @@ > +# BSD LICENSE > +# > +# Copyright(c) 2020 Intel Corporation. All rights reserved. > +# All rights reserved. > +# > +# Redistribution and use in source and binary forms, with or without # > +modification, are permitted provided that the following conditions # > +are met: > +# > +# * Redistributions of source code must retain the above copyright > +# notice, this list of conditions and the following disclaimer. > +# * Redistributions in binary form must reproduce the above copyright > +# notice, this list of conditions and the following disclaimer in > +# the documentation and/or other materials provided with the > +# distribution. > +# * Neither the name of Intel Corporation nor the names of its > +# contributors may be used to endorse or promote products derived > +# from this software without specific prior written permission. > +# > +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND > CONTRIBUTORS # > +"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT # > +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS > FOR # > +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE > COPYRIGHT # > +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, > INCIDENTAL, # > +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT > # > +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF > USE, # > +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON > ANY # > +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT # > +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE > USE # > +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. > + > +""" > +DPDK Test suite. > + > +Test the support of generic flow API by Poll Mode Drivers. > + > +""" > + > +import utils > +import time > +import re > + > +from test_case import TestCase > +from pmd_output import PmdOutput > +from settings import DRIVERS > +from crb import Crb > +from dut import Dut > +import packet > +from exception import VerifyFailure > +import scapy.layers.inet > +from scapy.utils import rdpcap > + > +MAX_QUEUE = 16 > + > +class TestCloudFilterWithL4Port(TestCase): > + > + def set_up_all(self): > + """ > + Run at the start of each test suite. > + Generic filter Prerequistites > + """ > + # Based on h/w type, choose how many ports to use > + self.dut_ports = self.dut.get_ports(self.nic) > + # Verify that enough ports are available > + self.verify(len(self.dut_ports) >= 1, "Insufficient ports") > + self.cores = "1S/8C/1T" > + self.pf_cores = "1S/8C/1T" > + self.pmdout = PmdOutput(self.dut) > + > + localPort = self.tester.get_local_port(self.dut_ports[0]) > + self.tester_itf = self.tester.get_interface(localPort) > + self.pf_interface = self.dut.ports_info[self.dut_ports[0]]['intf'] > + self.pf_mac = self.dut.get_mac_address(0) > + self.pf_pci = self.dut.ports_info[self.dut_ports[0]]['pci'] > + self.pkt_obj = packet.Packet() > + > + self.verify(self.nic in ["fortville_eagle", "fortville_spirit", "carlsville", > + "fortville_spirit_single", "fortpark_TLV", > + "fortpark_BASE-T","fortville_25g"], "%s nic not > + support cloud filter" % self.nic) > + > + def set_up(self): > + """ > + Run before each test case. > + """ > + self.dut.kill_all() > + > + self.pmdout.start_testpmd("%s" % self.cores, "--rxq=%d --txq=%d -- > disable-rss" % (MAX_QUEUE, MAX_QUEUE), "-w %s --file-prefix=test1" % > self.pf_pci) > + self.dut.send_expect("set fwd rxonly", "testpmd> ", 120) > + self.dut.send_expect("set promisc all off", "testpmd> ", 120) > + self.dut.send_expect("set verbose 1", "testpmd> ", 120) > + self.dut.send_expect("start", "testpmd> ", 120) > + time.sleep(2) > + > + def destroy_env(self): > + """ > + This is to stop testpmd. > + """ > + self.dut.send_expect("quit", "# ") > + time.sleep(2) > + > + def compare_memory_rules(self, expectedRules): > + """ > + dump all flow rules that have been created in memory and compare that > total rules number with the given expected number > + to see if they are equal, as to get your conclusion after you have deleted > any flow rule entry. > + """ > + outstring = self.dut.send_expect("flow list 0", "testpmd> ", 20) > + result_scanner = r'\d*.*?\d*.*?\d*.*?=>*' > + scanner = re.compile(result_scanner, re.DOTALL) > + m = scanner.findall(outstring) > + print("All flow entries are: ") > + for i in range(len(m)): > + print(m[i]) > + print('Expected rules are: %d - actual are: %d' % (expectedRules, len(m))) > + self.verify(expectedRules == len(m), 'Total rules number > + mismatched') > + > + def verify_rulenum(self, rule_num): > + """ > + Verify all the rules created. > + """ > + # check if there are expected flow rules have been created > + self.compare_memory_rules(rule_num) > + # check if one rule destroyed with success > + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") > + self.compare_memory_rules(rule_num - 1) > + # check if all flow rules have been removed with success > + self.dut.send_expect("flow flush 0", "testpmd> ") > + self.compare_memory_rules(0) > + > + def sendpkt(self, pktstr, count=1): > + import sys > + py_version = sys.version > + if py_version.startswith('3.'): > + self.pkt_obj.pktgen.pkts.clear() > + else: > + del self.pkt_obj.pktgen.pkts[:] > + self.pkt_obj.append_pkt(pktstr) > + self.pkt_obj.send_pkt(self.tester, tx_port=self.tester_itf, > + count=count) > + > + def sendpkt_check_result(self, src_port, dst_port, queue, match, pctype=""): > + match_info = "/queue %d: " % queue > + # source port > + if src_port != "" and dst_port == "": > + if pctype == "ipv4-udp": > + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s)' % src_port) > + elif pctype == "ipv4-tcp": > + self.sendpkt(pktstr='Ether()/IP()/TCP(sport=%s)' % src_port) > + elif pctype == "ipv4-sctp": > + self.sendpkt(pktstr='Ether()/IP()/SCTP(sport=%s)' % src_port) > + elif pctype == "ipv6-udp": > + self.sendpkt(pktstr='Ether()/IPv6()/UDP(sport=%s)' % src_port) > + elif pctype == "ipv6-tcp": > + self.sendpkt(pktstr='Ether()/IPv6()/TCP(sport=%s)' % src_port) > + elif pctype == "ipv6-sctp": > + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(sport=%s)' % src_port) > + elif src_port == "" and dst_port != "": > + if pctype == "ipv4-udp": > + self.sendpkt(pktstr='Ether()/IP()/UDP(dport=%s)' % dst_port) > + elif pctype == "ipv4-tcp": > + self.sendpkt(pktstr='Ether()/IP()/TCP(dport=%s)' % dst_port) > + elif pctype == "ipv4-sctp": > + self.sendpkt(pktstr='Ether()/IP()/SCTP(dport=%s)' % dst_port) > + elif pctype == "ipv6-udp": > + self.sendpkt(pktstr='Ether()/IPv6()/UDP(dport=%s)' % dst_port) > + elif pctype == "ipv6-tcp": > + self.sendpkt(pktstr='Ether()/IPv6()/TCP(dport=%s)' % dst_port) > + elif pctype == "ipv6-sctp": > + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(dport=%s)' % dst_port) > + elif src_port != "" and dst_port != "": > + if pctype == "ipv4-udp": > + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s, > + dport=%s)' % (src_port, dst_port)) > + > + out_pf = self.dut.get_session_output(timeout=2) > + print("out_pf is %s" % out_pf) > + > + if match == 1: > + self.verify(match_info in out_pf, "the packet not match the expect > queue %d." % queue) > + else: > + if match_info in out_pf: > + raise Exception("the packet should not match the queue > + %d." % queue) > + > + def cloudfilter_test( > + self, ip_type='ipv4', l4_port_type='udp', src_dst='src', port_value=156, > queue_id=0): > + > + # validate > + self.dut.send_expect( > + "flow validate 0 ingress pattern eth / %s / %s %s is %d / end actions > pf / queue index %d / end" > + % (ip_type, l4_port_type, src_dst, port_value, queue_id), > + "validated") > + > + # create > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / %s / %s %s is %d / end actions pf > / queue index %d / end" > + % (ip_type, l4_port_type, src_dst, port_value, queue_id), > + "created") > + > + # list > + self.compare_memory_rules(1) > + > + if src_dst is 'src': > + self.sendpkt_check_result("%d"%port_value, "", queue_id, 1, "%s- > %s"%(ip_type,l4_port_type)) > + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, > "%s-%s"%(ip_type,l4_port_type)) > + else: > + self.sendpkt_check_result("", "%d"%port_value, queue_id, 1, "%s- > %s"%(ip_type,l4_port_type)) > + self.sendpkt_check_result("", "%d"%(port_value-1), > + queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) > + > + # flush > + self.dut.send_expect("flow flush 0", "testpmd> ") > + > + if src_dst is 'src': > + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, > "%s-%s"%(ip_type,l4_port_type)) > + else: > + self.sendpkt_check_result("", "%d"%(port_value-1), > + queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) > + > + self.compare_memory_rules(0) > + > + def test_ipv4_udp_sport_only(self): > + # ipv4-udp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='udp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv4_udp_dport_only(self): > + # ipv4-udp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='udp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_ipv4_tcp_sport_only(self): > + # ipv4-tcp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='tcp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv4_tcp_dport_only(self): > + #ipv4-tcp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='tcp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_ipv4_sctp_sport_only(self): > + # ipv4-sctp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='sctp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv4_sctp_dport_only(self): > + #ipv4-sctp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv4', l4_port_type='sctp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_ipv6_udp_sport_only(self): > + # ipv6-udp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='udp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv6_udp_dport_only(self): > + # ipv6-udp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='udp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_ipv6_tcp_sport_only(self): > + # ipv6-tcp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='tcp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv6_tcp_dport_only(self): > + #ipv6-tcp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='tcp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_ipv6_sctp_sport_only(self): > + # ipv6-sctp > + # only src port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='sctp', src_dst='src', > + port_value=156, queue_id=1) > + > + def test_ipv6_sctp_dport_only(self): > + #ipv6-sctp > + # only dst port > + self.cloudfilter_test( > + ip_type='ipv6', l4_port_type='sctp', src_dst='dst', > + port_value=156, queue_id=1) > + > + def test_multi_rule(self): > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end actions pf > / queue index 1 / end", > + "created") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end actions pf > / queue index 2 / end", > + "created") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end actions pf > / queue index 3 / end", > + "created") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end actions pf > / queue index 4 / end", > + "created") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end actions pf > / queue index 5 / end", > + "created") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / sctp dst is 66 / end actions pf > / queue index 6 / end", > + "created") > + > + self.sendpkt_check_result("11", "", 1, 1, "ipv4-udp") > + self.sendpkt_check_result("22", "", 2, 1, "ipv4-tcp") > + self.sendpkt_check_result("33", "", 3, 1, "ipv4-sctp") > + self.sendpkt_check_result("", "44", 4, 1, "ipv4-udp") > + self.sendpkt_check_result("", "55", 5, 1, "ipv4-tcp") > + self.sendpkt_check_result("", "66", 6, 1, "ipv4-sctp") > + > + # destroy > + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") > + > + self.sendpkt_check_result("11", "", 1, 0, "ipv4-udp") > + > + self.compare_memory_rules(5) > + > + # flush > + self.dut.send_expect("flow flush 0", "testpmd> ") > + > + self.sendpkt_check_result("22", "", 2, 0, "ipv4-tcp") > + > + self.compare_memory_rules(0) > + > + def test_negative(self): > + # unsupported rules > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 dst is 156 / > end actions pf / queue index 1 / end", > + "error") > + > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions > pf / queue index 1 / end", > + "create") > + > + # conflicted rules > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions > pf / queue index 2 / end", > + "error") > + self.dut.send_expect( > + "flow create 0 ingress pattern eth / ipv6 / udp src is 156 / end actions > pf / queue index 2 / end", > + "error") > + > + def tear_down(self): > + """ > + Run after each test case. > + """ > + self.destroy_env() > + self.dut.kill_all() > + > + def tear_down_all(self): > + """ > + Run after each test suite. > + """ > + self.dut.kill_all() > -- > 2.17.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases 2020-08-18 3:07 ` [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun 2020-08-18 5:11 ` Lin, Xueqin @ 2020-08-18 8:38 ` Chen, LingliX 2020-08-21 3:31 ` Tu, Lijuan 2 siblings, 0 replies; 14+ messages in thread From: Chen, LingliX @ 2020-08-18 8:38 UTC (permalink / raw) To: dts; +Cc: Sun, GuinanX, Sun, QinX [-- Attachment #1: Type: text/plain, Size: 16241 bytes --] Tested-by: Chen, LingliX <linglix.chen@intel.com> Regards, Chen, Lingli -----Original Message----- From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Guinan Sun Sent: Tuesday, August 18, 2020 11:08 AM To: dts@dpdk.org Cc: Sun, GuinanX <guinanx.sun@intel.com> Subject: [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases add test cases for the new cloud filter. Signed-off-by: Guinan Sun <guinanx.sun@intel.com> --- tests/TestSuite_cloud_filter_with_l4_port.py | 358 +++++++++++++++++++ 1 file changed, 358 insertions(+) create mode 100644 tests/TestSuite_cloud_filter_with_l4_port.py diff --git a/tests/TestSuite_cloud_filter_with_l4_port.py b/tests/TestSuite_cloud_filter_with_l4_port.py new file mode 100644 index 0000000..005983d --- /dev/null +++ b/tests/TestSuite_cloud_filter_with_l4_port.py @@ -0,0 +1,358 @@ +# BSD LICENSE +# +# Copyright(c) 2020 Intel Corporation. All rights reserved. +# All rights reserved. +# +# Redistribution and use in source and binary forms, with or without # +modification, are permitted provided that the following conditions # +are met: +# +# * Redistributions of source code must retain the above copyright +# notice, this list of conditions and the following disclaimer. +# * Redistributions in binary form must reproduce the above copyright +# notice, this list of conditions and the following disclaimer in +# the documentation and/or other materials provided with the +# distribution. +# * Neither the name of Intel Corporation nor the names of its +# contributors may be used to endorse or promote products derived +# from this software without specific prior written permission. +# +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS # +"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT # +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR # +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT # +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, # +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT # +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, # +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY # +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT # +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE # +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. + +""" +DPDK Test suite. + +Test the support of generic flow API by Poll Mode Drivers. + +""" + +import utils +import time +import re + +from test_case import TestCase +from pmd_output import PmdOutput +from settings import DRIVERS +from crb import Crb +from dut import Dut +import packet +from exception import VerifyFailure +import scapy.layers.inet +from scapy.utils import rdpcap + +MAX_QUEUE = 16 + +class TestCloudFilterWithL4Port(TestCase): + + def set_up_all(self): + """ + Run at the start of each test suite. + Generic filter Prerequistites + """ + # Based on h/w type, choose how many ports to use + self.dut_ports = self.dut.get_ports(self.nic) + # Verify that enough ports are available + self.verify(len(self.dut_ports) >= 1, "Insufficient ports") + self.cores = "1S/8C/1T" + self.pf_cores = "1S/8C/1T" + self.pmdout = PmdOutput(self.dut) + + localPort = self.tester.get_local_port(self.dut_ports[0]) + self.tester_itf = self.tester.get_interface(localPort) + self.pf_interface = self.dut.ports_info[self.dut_ports[0]]['intf'] + self.pf_mac = self.dut.get_mac_address(0) + self.pf_pci = self.dut.ports_info[self.dut_ports[0]]['pci'] + self.pkt_obj = packet.Packet() + + self.verify(self.nic in ["fortville_eagle", "fortville_spirit", "carlsville", + "fortville_spirit_single", "fortpark_TLV", + "fortpark_BASE-T","fortville_25g"], "%s nic not + support cloud filter" % self.nic) + + def set_up(self): + """ + Run before each test case. + """ + self.dut.kill_all() + + self.pmdout.start_testpmd("%s" % self.cores, "--rxq=%d --txq=%d --disable-rss" % (MAX_QUEUE, MAX_QUEUE), "-w %s --file-prefix=test1" % self.pf_pci) + self.dut.send_expect("set fwd rxonly", "testpmd> ", 120) + self.dut.send_expect("set promisc all off", "testpmd> ", 120) + self.dut.send_expect("set verbose 1", "testpmd> ", 120) + self.dut.send_expect("start", "testpmd> ", 120) + time.sleep(2) + + def destroy_env(self): + """ + This is to stop testpmd. + """ + self.dut.send_expect("quit", "# ") + time.sleep(2) + + def compare_memory_rules(self, expectedRules): + """ + dump all flow rules that have been created in memory and compare that total rules number with the given expected number + to see if they are equal, as to get your conclusion after you have deleted any flow rule entry. + """ + outstring = self.dut.send_expect("flow list 0", "testpmd> ", 20) + result_scanner = r'\d*.*?\d*.*?\d*.*?=>*' + scanner = re.compile(result_scanner, re.DOTALL) + m = scanner.findall(outstring) + print("All flow entries are: ") + for i in range(len(m)): + print(m[i]) + print('Expected rules are: %d - actual are: %d' % (expectedRules, len(m))) + self.verify(expectedRules == len(m), 'Total rules number + mismatched') + + def verify_rulenum(self, rule_num): + """ + Verify all the rules created. + """ + # check if there are expected flow rules have been created + self.compare_memory_rules(rule_num) + # check if one rule destroyed with success + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") + self.compare_memory_rules(rule_num - 1) + # check if all flow rules have been removed with success + self.dut.send_expect("flow flush 0", "testpmd> ") + self.compare_memory_rules(0) + + def sendpkt(self, pktstr, count=1): + import sys + py_version = sys.version + if py_version.startswith('3.'): + self.pkt_obj.pktgen.pkts.clear() + else: + del self.pkt_obj.pktgen.pkts[:] + self.pkt_obj.append_pkt(pktstr) + self.pkt_obj.send_pkt(self.tester, tx_port=self.tester_itf, + count=count) + + def sendpkt_check_result(self, src_port, dst_port, queue, match, pctype=""): + match_info = "/queue %d: " % queue + # source port + if src_port != "" and dst_port == "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s)' % src_port) + elif pctype == "ipv4-tcp": + self.sendpkt(pktstr='Ether()/IP()/TCP(sport=%s)' % src_port) + elif pctype == "ipv4-sctp": + self.sendpkt(pktstr='Ether()/IP()/SCTP(sport=%s)' % src_port) + elif pctype == "ipv6-udp": + self.sendpkt(pktstr='Ether()/IPv6()/UDP(sport=%s)' % src_port) + elif pctype == "ipv6-tcp": + self.sendpkt(pktstr='Ether()/IPv6()/TCP(sport=%s)' % src_port) + elif pctype == "ipv6-sctp": + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(sport=%s)' % src_port) + elif src_port == "" and dst_port != "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(dport=%s)' % dst_port) + elif pctype == "ipv4-tcp": + self.sendpkt(pktstr='Ether()/IP()/TCP(dport=%s)' % dst_port) + elif pctype == "ipv4-sctp": + self.sendpkt(pktstr='Ether()/IP()/SCTP(dport=%s)' % dst_port) + elif pctype == "ipv6-udp": + self.sendpkt(pktstr='Ether()/IPv6()/UDP(dport=%s)' % dst_port) + elif pctype == "ipv6-tcp": + self.sendpkt(pktstr='Ether()/IPv6()/TCP(dport=%s)' % dst_port) + elif pctype == "ipv6-sctp": + self.sendpkt(pktstr='Ether()/IPv6()/SCTP(dport=%s)' % dst_port) + elif src_port != "" and dst_port != "": + if pctype == "ipv4-udp": + self.sendpkt(pktstr='Ether()/IP()/UDP(sport=%s, + dport=%s)' % (src_port, dst_port)) + + out_pf = self.dut.get_session_output(timeout=2) + print("out_pf is %s" % out_pf) + + if match == 1: + self.verify(match_info in out_pf, "the packet not match the expect queue %d." % queue) + else: + if match_info in out_pf: + raise Exception("the packet should not match the queue + %d." % queue) + + def cloudfilter_test( + self, ip_type='ipv4', l4_port_type='udp', src_dst='src', port_value=156, queue_id=0): + + # validate + self.dut.send_expect( + "flow validate 0 ingress pattern eth / %s / %s %s is %d / end actions pf / queue index %d / end" + % (ip_type, l4_port_type, src_dst, port_value, queue_id), + "validated") + + # create + self.dut.send_expect( + "flow create 0 ingress pattern eth / %s / %s %s is %d / end actions pf / queue index %d / end" + % (ip_type, l4_port_type, src_dst, port_value, queue_id), + "created") + + # list + self.compare_memory_rules(1) + + if src_dst is 'src': + self.sendpkt_check_result("%d"%port_value, "", queue_id, 1, "%s-%s"%(ip_type,l4_port_type)) + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + else: + self.sendpkt_check_result("", "%d"%port_value, queue_id, 1, "%s-%s"%(ip_type,l4_port_type)) + self.sendpkt_check_result("", "%d"%(port_value-1), + queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + + # flush + self.dut.send_expect("flow flush 0", "testpmd> ") + + if src_dst is 'src': + self.sendpkt_check_result("%d"%(port_value-1), "", queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + else: + self.sendpkt_check_result("", "%d"%(port_value-1), + queue_id, 0, "%s-%s"%(ip_type,l4_port_type)) + + self.compare_memory_rules(0) + + def test_ipv4_udp_sport_only(self): + # ipv4-udp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='udp', src_dst='src', + port_value=156, queue_id=1) + + def test_ipv4_udp_dport_only(self): + # ipv4-udp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='udp', src_dst='dst', + port_value=156, queue_id=1) + + def test_ipv4_tcp_sport_only(self): + # ipv4-tcp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='tcp', src_dst='src', + port_value=156, queue_id=1) + + def test_ipv4_tcp_dport_only(self): + #ipv4-tcp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='tcp', src_dst='dst', + port_value=156, queue_id=1) + + def test_ipv4_sctp_sport_only(self): + # ipv4-sctp + # only src port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='sctp', src_dst='src', + port_value=156, queue_id=1) + + def test_ipv4_sctp_dport_only(self): + #ipv4-sctp + # only dst port + self.cloudfilter_test( + ip_type='ipv4', l4_port_type='sctp', src_dst='dst', + port_value=156, queue_id=1) + + def test_ipv6_udp_sport_only(self): + # ipv6-udp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='udp', src_dst='src', + port_value=156, queue_id=1) + + def test_ipv6_udp_dport_only(self): + # ipv6-udp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='udp', src_dst='dst', + port_value=156, queue_id=1) + + def test_ipv6_tcp_sport_only(self): + # ipv6-tcp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='tcp', src_dst='src', + port_value=156, queue_id=1) + + def test_ipv6_tcp_dport_only(self): + #ipv6-tcp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='tcp', src_dst='dst', + port_value=156, queue_id=1) + + def test_ipv6_sctp_sport_only(self): + # ipv6-sctp + # only src port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='sctp', src_dst='src', + port_value=156, queue_id=1) + + def test_ipv6_sctp_dport_only(self): + #ipv6-sctp + # only dst port + self.cloudfilter_test( + ip_type='ipv6', l4_port_type='sctp', src_dst='dst', + port_value=156, queue_id=1) + + def test_multi_rule(self): + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end actions pf / queue index 1 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end actions pf / queue index 2 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end actions pf / queue index 3 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end actions pf / queue index 4 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end actions pf / queue index 5 / end", + "created") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / sctp dst is 66 / end actions pf / queue index 6 / end", + "created") + + self.sendpkt_check_result("11", "", 1, 1, "ipv4-udp") + self.sendpkt_check_result("22", "", 2, 1, "ipv4-tcp") + self.sendpkt_check_result("33", "", 3, 1, "ipv4-sctp") + self.sendpkt_check_result("", "44", 4, 1, "ipv4-udp") + self.sendpkt_check_result("", "55", 5, 1, "ipv4-tcp") + self.sendpkt_check_result("", "66", 6, 1, "ipv4-sctp") + + # destroy + self.dut.send_expect("flow destroy 0 rule 0", "testpmd> ") + + self.sendpkt_check_result("11", "", 1, 0, "ipv4-udp") + + self.compare_memory_rules(5) + + # flush + self.dut.send_expect("flow flush 0", "testpmd> ") + + self.sendpkt_check_result("22", "", 2, 0, "ipv4-tcp") + + self.compare_memory_rules(0) + + def test_negative(self): + # unsupported rules + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 dst is 156 / end actions pf / queue index 1 / end", + "error") + + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 1 / end", + "create") + + # conflicted rules + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv4 / udp src is 156 / end actions pf / queue index 2 / end", + "error") + self.dut.send_expect( + "flow create 0 ingress pattern eth / ipv6 / udp src is 156 / end actions pf / queue index 2 / end", + "error") + + def tear_down(self): + """ + Run after each test case. + """ + self.destroy_env() + self.dut.kill_all() + + def tear_down_all(self): + """ + Run after each test suite. + """ + self.dut.kill_all() -- 2.17.1 [-- Attachment #2: TestCloudFilterWithL4Port.log --] [-- Type: application/octet-stream, Size: 470659 bytes --] ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases 2020-08-18 3:07 ` [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun 2020-08-18 5:11 ` Lin, Xueqin 2020-08-18 8:38 ` Chen, LingliX @ 2020-08-21 3:31 ` Tu, Lijuan 2 siblings, 0 replies; 14+ messages in thread From: Tu, Lijuan @ 2020-08-21 3:31 UTC (permalink / raw) To: Sun, GuinanX, dts; +Cc: Sun, GuinanX > > add test cases for the new cloud filter. > > > > Signed-off-by: Guinan Sun <guinanx.sun@intel.com> > > --- > > tests/TestSuite_cloud_filter_with_l4_port.py | 358 +++++++++++++++++++ > Acked-by: Xueqin Lin <Xueqin.lin@intel.com> Applied ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [dts] [PATCH v3 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst 2020-08-18 3:07 ` [dts] [PATCH v3 " Guinan Sun 2020-08-18 3:07 ` [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun @ 2020-08-18 5:07 ` Lin, Xueqin 2020-08-21 3:28 ` Tu, Lijuan 2 siblings, 0 replies; 14+ messages in thread From: Lin, Xueqin @ 2020-08-18 5:07 UTC (permalink / raw) To: Sun, GuinanX, dts; +Cc: Sun, GuinanX Acked-by: Xueqin Lin <Xueqin.lin@intel.com> > -----Original Message----- > From: dts <dts-bounces@dpdk.org> On Behalf Of Guinan Sun > Sent: Tuesday, August 18, 2020 11:08 AM > To: dts@dpdk.org > Cc: Sun, GuinanX <guinanx.sun@intel.com> > Subject: [dts] [PATCH v3 1/2] test_plans: add > cloud_filter_with_l4_port_test_plan.rst > > Enables the cloud filter for IPv4_UDP/IPv4_TCP/IPv4_SCTP with SRC port only > or DST port only. > This supports different filter types for the same packet type. > E.g. one IPv4_UDP rules with SRC port only and another IPv4_UDP rule with > DST port only. > > Signed-off-by: Guinan Sun <guinanx.sun@intel.com> > --- > .../cloud_filter_with_l4_port_test_plan.rst | 520 ++++++++++++++++++ > 1 file changed, 520 insertions(+) > create mode 100644 test_plans/cloud_filter_with_l4_port_test_plan.rst > > diff --git a/test_plans/cloud_filter_with_l4_port_test_plan.rst > b/test_plans/cloud_filter_with_l4_port_test_plan.rst > new file mode 100644 > index 0000000..50987f3 > --- /dev/null > +++ b/test_plans/cloud_filter_with_l4_port_test_plan.rst > @@ -0,0 +1,520 @@ > +.. Copyright (c) <2020>, Intel Corporation > + All rights reserved. > + > + Redistribution and use in source and binary forms, with or without > + modification, are permitted provided that the following conditions > + are met: > + > + - Redistributions of source code must retain the above copyright > + notice, this list of conditions and the following disclaimer. > + > + - Redistributions in binary form must reproduce the above copyright > + notice, this list of conditions and the following disclaimer in > + the documentation and/or other materials provided with the > + distribution. > + > + - Neither the name of Intel Corporation nor the names of its > + contributors may be used to endorse or promote products derived > + from this software without specific prior written permission. > + > + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND > CONTRIBUTORS > + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT > + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS > + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE > + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, > INDIRECT, > + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES > + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS > OR > + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) > + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN > CONTRACT, > + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) > + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF > ADVISED > + OF THE POSSIBILITY OF SUCH DAMAGE. > + > +=================================== > +Cloud filter with l4 port test plan > +=================================== > + > +Prerequisites > +============= > + > +1. Hardware: > + Fortville > + > +2. software: > + dpdk: http://dpdk.org/git/dpdk > + scapy: http://www.secdev.org/projects/scapy/ > + > +3. bind the pf to dpdk driver:: > + > + ./usertools/dpdk-devbind.py --force --bind=vfio-pci 0000:81:00.0 > + > +4.Launch the testpmd:: > + ./testpmd -l 0-3 -n 4 -w 81:00.0 --file-prefix=test -- -i --rxq=16 --txq=16 -- > disable-rss > + testpmd> set fwd rxonly > + testpmd> set promisc all off > + testpmd> set verbose 1 > + testpmd> start > + > +Test Case 1: ipv4-udp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 2: ipv4-udp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 3: ipv4-tcp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 4: ipv4-tcp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / tcp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 5: ipv4-sctp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 6: ipv4-sctp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv4 / sctp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 7: ipv6-udp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / udp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 8: ipv6-udp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / udp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / udp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/UDP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 9: ipv6-tcp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. testpmd> flow create 0 ingress pattern eth / ipv6 / tcp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 10: ipv6-tcp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / tcp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / tcp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/TCP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 11: ipv6-sctp_sport only > +================================ > + > + 1. validate a source port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp src > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a source port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp src is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(sport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 12: ipv6-sctp_dport only > +================================ > + > + 1. validate a destination port rule:: > + testpmd> flow validate 0 ingress pattern eth / ipv6 / sctp dst > + is 156 / end actions pf / queue index 1 / end > + > + Verify the command can validate:: > + Flow rule validated > + > + 2. create a destination port rule:: > + testpmd> flow create 0 ingress pattern eth / ipv6 / sctp dst is > + 156 / end actions pf / queue index 1 / end > + > + testpmd> flow list 0 > + > + Verify there is one rule. > + > + send matched packets:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) > + > + Verify packets will be received in queue 1. > + > + send no matched packet:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=111)/Raw('x' * 80) > + > + Verify packets will not be received in queue 1. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IPv6()/SCTP(dport=156)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 13: multi-rule > +============================================================ > + > + 1. create multi-rule with different input set rules:: > + creat rules:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src is 11 / end > actions pf / queue index 1 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp src is 22 / end > actions pf / queue index 2 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp src is 33 / end > actions pf / queue index 3 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp dst is 44 / end > actions pf / queue index 4 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp dst is 55 / end > actions pf / queue index 5 / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / sctp > + dst is 66 / end actions pf / queue index 6 / end > + > + send packets:: > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(sport=33)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(dport=44)/Raw('x' * 80) > + p = Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(dport=55)/Raw('x' * 80) > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/SCTP(dport=66)/Raw('x' * 80) > + > + Verify each packet can match the right queue. > + > + 2. destroy the rule:: > + testpmd> flow destroy 0 rule 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/UDP(sport=11)/Raw('x' * 80) > + > + packets should be in queue 0. > + > + 3. flush the rule:: > + testpmd> flow flush 0 > + > + send packets match rule 0:: > + p = > + Ether(dst="3C:FD:FE:CF:31:D8")/IP()/TCP(sport=22)/Raw('x' * 80) > + > + packets should be in queue 0. > + > +Test Case 3: NEGATIVE_TEST > +==================================== > + > +1. rules can not create > + > + 1) unsupported rules:: > + create rules:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src > + is 156 dst is 156 / end actions pf / queue index 1 / end > + > + Verify rules can not create. > + > + 2) conflicted rules:: > + create one rule:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src > + is 156 / end actions pf / queue index 1 / end > + > + create conflicted rules:: > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp src > + is 156 / end actions pf / queue index 2 / end > + > + Verify rules can not create. > \ No newline at end of file > -- > 2.17.1 ^ permalink raw reply [flat|nested] 14+ messages in thread
* Re: [dts] [PATCH v3 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst 2020-08-18 3:07 ` [dts] [PATCH v3 " Guinan Sun 2020-08-18 3:07 ` [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun 2020-08-18 5:07 ` [dts] [PATCH v3 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Lin, Xueqin @ 2020-08-21 3:28 ` Tu, Lijuan 2 siblings, 0 replies; 14+ messages in thread From: Tu, Lijuan @ 2020-08-21 3:28 UTC (permalink / raw) To: Sun, GuinanX, dts; +Cc: Sun, GuinanX > > Enables the cloud filter for IPv4_UDP/IPv4_TCP/IPv4_SCTP with SRC port only or > > DST port only. > > This supports different filter types for the same packet type. > > E.g. one IPv4_UDP rules with SRC port only and another IPv4_UDP rule with DST > > port only. > > > > Signed-off-by: Guinan Sun <guinanx.sun@intel.com> > Acked-by: Xueqin Lin <Xueqin.lin@intel.com> Applied ^ permalink raw reply [flat|nested] 14+ messages in thread
end of thread, other threads:[~2020-08-21 3:31 UTC | newest] Thread overview: 14+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2020-08-17 5:54 [dts] [PATCH v1 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Guinan Sun 2020-08-17 5:54 ` [dts] [PATCH v1 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun 2020-08-17 6:11 ` [dts] [PATCH v1 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Lin, Xueqin 2020-08-17 8:34 ` [dts] [PATCH v2 " Guinan Sun 2020-08-17 8:34 ` [dts] [PATCH v2 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun 2020-08-18 1:59 ` Lin, Xueqin 2020-08-18 2:08 ` [dts] [PATCH v2 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Lin, Xueqin 2020-08-18 3:07 ` [dts] [PATCH v3 " Guinan Sun 2020-08-18 3:07 ` [dts] [PATCH v3 2/2] tests/TestSuite_cloud_filter_with_l4_port.py add test cases Guinan Sun 2020-08-18 5:11 ` Lin, Xueqin 2020-08-18 8:38 ` Chen, LingliX 2020-08-21 3:31 ` Tu, Lijuan 2020-08-18 5:07 ` [dts] [PATCH v3 1/2] test_plans: add cloud_filter_with_l4_port_test_plan.rst Lin, Xueqin 2020-08-21 3:28 ` Tu, Lijuan
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).