From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id AA381A04B5; Mon, 14 Dec 2020 06:28:51 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 81AC12B9C; Mon, 14 Dec 2020 06:28:50 +0100 (CET) Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by dpdk.org (Postfix) with ESMTP id C48361F1C for ; Mon, 14 Dec 2020 06:28:47 +0100 (CET) IronPort-SDR: v48vH6jd0THzgDZ7jNCzaSR/2jAD0QwPm3AJeKRwAIxNNrP66Y+utCWDpAWxl2RlAfzctnZxDe nycqa2Rg5Ekw== X-IronPort-AV: E=McAfee;i="6000,8403,9834"; a="174801532" X-IronPort-AV: E=Sophos;i="5.78,417,1599548400"; d="scan'208";a="174801532" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 13 Dec 2020 21:28:45 -0800 IronPort-SDR: DC45ZemN/R7WosMQE5oL2bZlvueioMwktOznf+KXRZfNofKPChYoB3qsVyGzJTVYqVICHpv4Tb W+DxqzXYoiSA== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.78,417,1599548400"; d="scan'208";a="377861081" Received: from orsmsx602.amr.corp.intel.com ([10.22.229.15]) by orsmga007.jf.intel.com with ESMTP; 13 Dec 2020 21:28:45 -0800 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX602.amr.corp.intel.com (10.22.229.15) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Sun, 13 Dec 2020 21:28:45 -0800 Received: from orsmsx610.amr.corp.intel.com (10.22.229.23) by ORSMSX610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Sun, 13 Dec 2020 21:28:44 -0800 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx610.amr.corp.intel.com (10.22.229.23) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5 via Frontend Transport; Sun, 13 Dec 2020 21:28:44 -0800 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.169) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.1713.5; Sun, 13 Dec 2020 21:28:44 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=L2NrgP8lPoXJWhbhjfDwPiPnuXg/9YbHD1pN1Y3Crcimxoep2ZwQVcacrahY1FhTrcYVHmr1sNkdEfjNwNGWg6+fSswZTl1JPIxj3kwvWWm5oKJ3mU1fkXwnmian1Avq9p8HmyT7oSLhnwe2KuTAkqsOwkYWVp3J6jwFIQnllnEbF/WmnD3zOKb04bkjDBBcWhoW4ibQ6jkZKj8R2ZnVy1OlJUCSxCcQ2fkFwcDKTSEyr1jOUHU55sL7fzclYRVj/L6UyUf0rRaJ4AwXbdDxBtfDVBdGFpo7L//WWADI/oWmBlZ4veVjOp9zyhwBpDK+9Vveqfbw8mGw2j4Pm/tDkQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tRq8qVEPY9YHnVsxVRNj9kI/OExaYrZZS3oioVjaSmg=; b=a9zylL5o6w//FiYUNf0XyzDvVKeOJoU5p8dLmfB7NjCtJy+fuseGmU0NLWD8nffcqXKfDBFhRgrwyCr8DRVcf7AbddIVlyHkWq0om20owOqJdkS7rHSd2GgFGoRheyevp+SXIb93MguBJLqbDhw/DcTxzqRaK07ZJAULJUIxFg6nWQz/lsWPQI5bUqA/u88EjLRwF7lCqMaYfoNuutJwipO5+d0/U6Ooo01NiTXOZGHNFWE1pAhe/5l+qBCgXkaAPXMugp+K5/JRNG5J6k6urxYADoDmYb1k13YR/O+6n3t1BU9cT1QDvEYLp3tAjHFRnUsdlKvokMIva0lsd9xOgA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=tRq8qVEPY9YHnVsxVRNj9kI/OExaYrZZS3oioVjaSmg=; b=cc7IqEg/y3394rewt14Vc6rnwy0AVaR+Vy8miHN6CfmM4T1QyjoL7nIkufrxzYekNjW2Cx6htoLKkumm77gtCshOhxf0bqbxYOrouSohGK+sGGQ050q+jXRV/kpeAM+sQcgYviXQtUxxGCH9QlSQUtkJSa+kevqBFNdj2a/Mrao= Received: from BL0PR11MB3364.namprd11.prod.outlook.com (2603:10b6:208:69::21) by MN2PR11MB4399.namprd11.prod.outlook.com (2603:10b6:208:17b::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3654.21; Mon, 14 Dec 2020 05:28:41 +0000 Received: from BL0PR11MB3364.namprd11.prod.outlook.com ([fe80::b8cc:2b0f:dcd5:953]) by BL0PR11MB3364.namprd11.prod.outlook.com ([fe80::b8cc:2b0f:dcd5:953%3]) with mapi id 15.20.3654.025; Mon, 14 Dec 2020 05:28:41 +0000 From: "Lin, Xueqin" To: "Chen, BoX C" , "dts@dpdk.org" CC: "Chen, BoX C" Thread-Topic: [dts] [PATCH V2] test_plans/cvl_dcf_switch_filter: add drop action test Thread-Index: AQHWz2Wn+mBQxJ40BUqysupHk5dD+6n2FPDw Date: Mon, 14 Dec 2020 05:28:41 +0000 Message-ID: References: <20201211022813.13570-1-box.c.chen@intel.com> In-Reply-To: <20201211022813.13570-1-box.c.chen@intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.5.1.3 dlp-reaction: no-action dlp-product: dlpe-windows authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=intel.com; x-originating-ip: [192.198.147.194] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: a87eb033-1b3b-4a44-b3cb-08d89ff11e38 x-ms-traffictypediagnostic: MN2PR11MB4399: x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:69; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: zNgvsOG3DlFj54mAc84eWpzX8QAvTJAjEMjDIX4tpIIdIr9H0zka+CfAU3oEiq9KWrKhC7la8AKzo7vgja2MCbRkdDFUwj09M+Vu5XHrUOiETy9keGzJP2ykm2VykB0bmNmrQrm/7AgeZL40ZJEpFk5bqtvSkPaG9PO1vYfg8ENV1JzHAISfzU4JiXExoyC3/YRSPCuXNlBiBl2rW2xjEzcKQB81yWb5MjSlpoa39p10rB0a0MOTsxBvil25PenPiIkXIVfDMAdphqxQvYauHfNnacRj0y3/YXujXgzCbJmGMwW6A6i6jtY4MmhO38vd6KkDWeVLqpQzx7VDVcqDWw== x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:BL0PR11MB3364.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(136003)(346002)(366004)(376002)(83380400001)(66556008)(55016002)(9686003)(2906002)(4326008)(5660300002)(66946007)(33656002)(71200400001)(76116006)(52536014)(508600001)(66446008)(30864003)(66476007)(107886003)(26005)(64756008)(53546011)(7696005)(110136005)(86362001)(6506007)(186003)(8936002); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata: =?us-ascii?Q?GEl/Z8pAwgWbqK+gUqU+av3knKMb95W0nCTnpnGcF5W9I37oZKM3KSf3+M5V?= =?us-ascii?Q?EhlHTRG+zZyvWkhrOSCL5VklYm5yyRZzn73YfUyDoDpbpgsFm79uaCUmnZ/n?= =?us-ascii?Q?fGUkf3Hw4sCSRo3EPJW2nNULm2IuJp0DuVnJH8ABssftJKPMzvmyqTguuzTQ?= =?us-ascii?Q?xZ3V1iX7+dig+eAHghd8xukjbuelAdLf3Fct0WNeBOkJNAcNp2d1aQyMs/1g?= =?us-ascii?Q?gsyZNJGhFH8q3Ex0XNlWtMpigm1rNoq1fdNUsrbeBmhOytzlJUKf0K5n+IiR?= =?us-ascii?Q?f561vDP9Kyt3nKqnrHMckgooZGSG0muH7EOLdtFvv4nx12gqVRf/pHQQN+X6?= =?us-ascii?Q?Fu3+767WC3Tul/YyXlWCj3+/W5ddxcJQ/dw+I/O0DPmhYrLP0HXbVeTksl8m?= =?us-ascii?Q?7MaTZPkFKH4+hV77DVg3BRx0qUzfm9KEmsse94f4JAud+eQ+ZrnXV6s4aQXC?= =?us-ascii?Q?nM5tRf9nfhFQU+z4QgaYodKj5O8BJIKD+AViBXOJJkFGXxTCmWtJde8YrN2D?= =?us-ascii?Q?IppA93eeS8Y3Z8ijpFDzmkW/+gcMj2YYmj+r/veaxnLqIQQ5PFPR/C3FE/d4?= =?us-ascii?Q?54O6HISeJgS4ScvodGug0Vwr4a/pseJn0gWczNVG9u9QfYrD2R7MpfIgisX1?= =?us-ascii?Q?bAXod6U92oSevvO534mehNBE/k8N3VSbN5fN4IGvxxXzLUTXwloY4uqijfD4?= =?us-ascii?Q?jDl+Dv/GyzAOL/HrzNiS/2a1aCjRrxAhcRYuHRy7b36fesXMzKZr4iKhiuTj?= =?us-ascii?Q?sTpfdQKb4QH5L5DFPINFnFH5zlXjhUgc/uJCMscfrNCFxUCR57aoqRgOalsh?= =?us-ascii?Q?q52lIqEw7PbZBZOiy/GFYMqSYHTy7A/WRnUSo08wC7na/HG82nlKK9vbbjMT?= =?us-ascii?Q?PN8CBrriC54m0+54/UOHAlkWiApuzjlm6pT1b26VmgkHEdhVIwgPZBWCDPjb?= =?us-ascii?Q?3DZRQUdS4VdNiPJ4nnzpPW2vsLaEjXxmcWgGd5UNvfs=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: BL0PR11MB3364.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: a87eb033-1b3b-4a44-b3cb-08d89ff11e38 X-MS-Exchange-CrossTenant-originalarrivaltime: 14 Dec 2020 05:28:41.4653 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: mjefW3aVpIGCvFhwn3ylwge6J5vbiVqBU+F7Fgt/38bYh4wySEMcioy3PNhVMhzMUwDXI6BYs0uAA/ETIDSUVQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: MN2PR11MB4399 X-OriginatorOrg: intel.com Subject: Re: [dts] [PATCH V2] test_plans/cvl_dcf_switch_filter: add drop action test X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" Acked-by: Xueqin Lin > -----Original Message----- > From: dts On Behalf Of ChenBo > Sent: Friday, December 11, 2020 10:28 AM > To: dts@dpdk.org > Cc: Chen, BoX C > Subject: [dts] [PATCH V2] test_plans/cvl_dcf_switch_filter: add drop acti= on > test >=20 > Add drop action test according to customer requirements. >=20 > Signed-off-by: ChenBo > --- > .../cvl_dcf_switch_filter_test_plan.rst | 436 +++++++++++++++++- > 1 file changed, 431 insertions(+), 5 deletions(-) >=20 > diff --git a/test_plans/cvl_dcf_switch_filter_test_plan.rst > b/test_plans/cvl_dcf_switch_filter_test_plan.rst > index 55ea726..c90f439 100644 > --- a/test_plans/cvl_dcf_switch_filter_test_plan.rst > +++ b/test_plans/cvl_dcf_switch_filter_test_plan.rst > @@ -3965,12 +3965,12 @@ received and forwarded when there is one vf > for forwarding, and no packets are d > ---------------------- Forward statistics for port 1 -------------= --------- > RX-packets: 1 RX-dropped: 0 RX-total: 1 > TX-packets: 1 TX-dropped: 0 TX-total: 1 > - --------------------------------------------------------------------= -------- > + -------------------------------------------------------------------= --------- >=20 > - +++++++++++++++ Accumulated forward statistics for all > ports+++++++++++++++ > - RX-packets: 1 RX-dropped: 0 RX-total: 1 > - TX-packets: 1 TX-dropped: 0 TX-total: 1 > - > ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ > ++++++++++++++ > + +++++++++++++++ Accumulated forward statistics for all > ports+++++++++++++++ > + RX-packets: 1 RX-dropped: 0 RX-total: 1 > + TX-packets: 1 TX-dropped: 0 TX-total: 1 > + > ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++ > ++++++++++++++ >=20 > check the RX-packets and TX-packets of port 1 are both 1, and the TX- > dropped in > "Accumulated forward statistics for all ports" is 0. > @@ -4556,3 +4556,429 @@ Subcase 1: DCF stop/DCF start > check the rule is still there. >=20 > 5. send matched packets, port 1 can still receive the packets. > + > +Test case: Drop action test > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D > + > +Subcase 1: DCF DROP IPV4 SRC PACKAGES > +----------------------------- > + > +1. validate a rule:: > + > + testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src = is > 192.168.0.1 / end actions drop / end > + > + get the message:: > + > + Flow rule validated > + > + check the flow list:: > + > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + > +2. create MAC_IPV4_SRC_ADDR rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is > 192.168.0.1 / end actions drop / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +3. send matched packets:: > + > + sendp([Ether()/IP(src=3D"192.168.0.1")/Raw("x"*80)],iface=3D"enp27s= 0f0") > + > + check port can't receive the packet. > + > +4. send mismatched packets:: > + > + sendp([Ether()/IP(src=3D"192.168.0.2")/Raw("x"*80)],iface=3D"enp27s= 0f0") > + > + check port can receive the packet. > + > +5. verify rules can be destroyed:: > + > + testpmd> flow flush 0 > + testpmd> flow list 0 > + > + check the rules not exist in the list. > + send matched packets, check port can receive the packet. > + > +Subcase 2: DCF DROP IPV4 SRC SPEC MASK PACKAGES > +----------------------------- > + > +1. validate a rule:: > + > + testpmd> flow validate 0 ingress pattern eth / ipv4 dst spec 224.0.= 0.0 dst > mask 240.0.0.0 / end actions drop / end > + > + get the message:: > + > + Flow rule validated > + > + check the flow list:: > + > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + > +2. create MAC_IPV4_SRC_SPEC_PAY rule:: > + > + testpmd> flow create 0 ingress pattern eth / ipv4 dst spec 224.0.0.= 0 dst > mask 240.0.0.0 / end actions drop / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +3. send matched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:55")/IP(dst=3D"239.0.0.0")/TCP()/Raw("= x"*8 > 0)],iface=3D"enp27s0f0") > + > + check port can't receive the packet. > + > +4. send mismatched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:55")/IP(dst=3D"128.0.0.0")/TCP()/Raw("= x"*8 > 0)],iface=3D"enp27s0f0") > + > + check port can receive the packet. > + > +5. verify rules can be destroyed:: > + > + testpmd> flow flush 0 > + testpmd> flow list 0 > + > + check the rules not exist in the list. > + send matched packets, check port can receive the packet. > + > +Subcase 3: DCF DROP NVGRE PACKAGES > +----------------------------- > + > +1. validate a rule:: > + > + testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.= 0.1 / > nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end a= ctions > drop / end > + > + get the message:: > + > + Flow rule validated > + > + check the flow list:: > + > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + > +2. create MAC_IPV4_NVGRE_PAY rule:: > + > + testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.= 1 / > nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end a= ctions > drop / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +3. send matched packets:: > + > + > sendp([Ether()/IP(dst=3D"192.168.0.1")/NVGRE(TNI=3D2)/Ether()/IP(src=3D"1= 92.168. > 1.2", dst=3D"192.168.1.3")/Raw("x"*80)],iface=3D"enp27s0f0") > + > + check port can't receive the packet. > + > +4. send mismatched packets:: > + > + > sendp([Ether()/IP(dst=3D"192.168.0.1")/NVGRE(TNI=3D1)/Ether()/IP(src=3D"1= 92.168. > 1.2", dst=3D"192.168.1.3")/Raw("x"*80)],iface=3D"enp27s0f0") > + > + check port can receive the packet. > + > +5. verify rules can be destroyed:: > + > + testpmd> flow flush 0 > + testpmd> flow list 0 > + > + check the rules not exist in the list. > + send matched packets, check port can receive the packet. > + > +Subcase 4: DCF DROP PPOES PACKAGES > +----------------------------- > + > +1. validate a rule:: > + > + testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:= 55 / > vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions= drop / > end > + > + get the message:: > + > + Flow rule validated > + > + check the flow list:: > + > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + > +2. create MAC_IPV4_PPOES_PAY rule:: > + > + testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55= / vlan > tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions drop= / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +3. send matched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:55",type=3D0x8100)/Dot1Q(vlan=3D1,type= =3D0x8 > 864)/PPPoE(sessionid=3D3)/PPP(b'\\x00\\x21')/IP()/Raw("x" * > 80)],iface=3D"enp27s0f0") > + > + check port can't receive the packet. > + > +4. send mismatched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:55",type=3D0x8100)/Dot1Q(vlan=3D1,type= =3D0x8 > 864)/PPPoE(sessionid=3D2)/PPP(b'\\x00\\x21')/IP()/Raw("x" * > 80)],iface=3D"enp27s0f0") > + > + check port can receive the packet. > + > +5. verify rules can be destroyed:: > + > + testpmd> flow flush 0 > + testpmd> flow list 0 > + > + check the rules not exist in the list. > + send matched packets, check port can receive the packet. > + > +Subcase 5: DCF DROP PFCP PACKAGES > +----------------------------- > + > +1. validate a rule:: > + > + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp / pfcp s_= field is > 0 / end actions drop / end > + > + get the message:: > + > + Flow rule validated > + > + check the flow list:: > + > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + > +2. create MAC_IPV4_PFCP rule:: > + > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp / pfcp s_fi= eld is 0 > / end actions drop / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +3. send matched packets:: > + > + > sendp(Ether(dst=3D"00:11:22:33:44:11")/IP()/UDP(dport=3D8805)/PFCP(S=3D0)= ,iface > =3D"enp27s0f0") > + > + check port can't receive the packet. > + > +4. send mismatched packets:: > + > + > sendp(Ether(dst=3D"00:11:22:33:44:11")/IP()/UDP(dport=3D8805)/PFCP(S=3D1)= ,iface > =3D"enp27s0f0") > + > + check port can receive the packet. > + > +5. verify rules can be destroyed:: > + > + testpmd> flow flush 0 > + testpmd> flow list 0 > + > + check the rules not exist in the list. > + send matched packets, check port can receive the packet. > + > +Subcase 6: DCF DROP VLAN PACKAGES > +----------------------------- > + > +1. validate a rule:: > + > + testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:= 55 / > vlan tci is 1 / end actions drop / end > + > + get the message:: > + > + Flow rule validated > + > + check the flow list:: > + > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + > +2. create MAC_VLAN rule:: > + > + testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55= / vlan > tci is 1 / end actions drop / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +3. send matched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:55",type=3D0x8100)/Dot1Q(vlan=3D1)/IP(= src=3D" > 192.168.0.1",dst=3D"192.168.0.2",tos=3D4,ttl=3D2)/TCP()/Raw("X"*80)],ifac= e=3D"enp > 27s0f0") > + > + check port can't receive the packet. > + > +4. send mismatched packets:: > + > + > sendp([Ether(dst=3D"00:11:22:33:44:55",type=3D0x8100)/Dot1Q(vlan=3D2)/IP(= src=3D" > 192.168.0.1",dst=3D"192.168.0.2",tos=3D4,ttl=3D2)/TCP()/Raw("X"*80)],ifac= e=3D"enp > 27s0f0") > + > + check port can receive the packet. > + > +5. verify rules can be destroyed:: > + > + testpmd> flow flush 0 > + testpmd> flow list 0 > + > + check the rules not exist in the list. > + send matched packets, check port can receive the packet. > + > +Subcase 7: DCF DROP L2TP PACKAGES > +----------------------------- > + > +1. validate a rule:: > + > + testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src = is > 192.168.0.2 / l2tpv3oip session_id is 1 / end actions drop / end > + > + get the message:: > + > + Flow rule validated > + > + check the flow list:: > + > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + > +2. create MAC_IPV4_L2TP_PAY rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is > 192.168.0.2 / l2tpv3oip session_id is 1 / end actions drop / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +3. send matched packets:: > + > + sendp([Ether(dst=3D'00:11:22:33:44:12')/IP(src=3D'192.168.0.2', > proto=3D115)/L2TP(b'\\x00\\x00\\x00\\x01')/('X'*480)], iface=3D"enp27s0f0= ", > count=3D1) > + > + check port can't receive the packet. > + > +4. send mismatched packets:: > + > + sendp([Ether(dst=3D'00:11:22:33:44:12')/IP(src=3D'192.168.0.2', > proto=3D115)/L2TP(b'\\x00\\x00\\x00\\x02')/('X'*480)], iface=3D"enp27s0f0= ", > count=3D1) > + > + check port can receive the packet. > + > +5. verify rules can be destroyed:: > + > + testpmd> flow flush 0 > + testpmd> flow list 0 > + > + check the rules not exist in the list. > + send matched packets, check port can receive the packet. > + > +Subcase 8: DCF DROP ESP PACKAGES > +----------------------------- > + > +1. validate a rule:: > + > + testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src = is > 192.168.0.2 / esp spi is 1 / end actions drop / end > + > + get the message:: > + > + Flow rule validated > + > + check the flow list:: > + > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + > +2. create MAC_IPV4_ESP_PAY rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is > 192.168.0.2 / esp spi is 1 / end actions drop / end > + testpmd> flow list 0 > + > + check the rule exists in the list. > + > +3. send matched packets:: > + > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.0.2", > proto=3D50)/ESP(spi=3D1)/("X"*80)], iface=3D"enp27s0f0") > + > + check port can't receive the packet. > + > +4. send mismatched packets:: > + > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.0.2", > proto=3D50)/ESP(spi=3D2)/("X"*80)], iface=3D"enp27s0f0") > + > + check port can receive the packet. > + > +5. verify rules can be destroyed:: > + > + testpmd> flow flush 0 > + testpmd> flow list 0 > + > + check the rules not exist in the list. > + send matched packets, check port can receive the packet. > + > +Subcase 8: DCF DROP blend PACKAGES > +----------------------------- > + > +1. validate a rule:: > + > + testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src = is > 192.168.0.1 / end actions drop / end > + testpmd> flow validate 0 ingress pattern eth / ipv4 dst spec 224.0.= 0.0 dst > mask 240.0.0.0 / end actions drop / end > + testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.= 0.1 / > nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end a= ctions > drop / end > + testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:= 55 / > vlan tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions= drop / > end > + testpmd> flow validate 0 ingress pattern eth / ipv4 / udp / pfcp s_= field is > 0 / end actions drop / end > + testpmd> flow validate 0 ingress pattern eth dst is 00:11:22:33:44:= 55 / > vlan tci is 1 / end actions drop / end > + testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src = is > 192.168.0.4 / l2tpv3oip session_id is 1 / end actions drop / end > + testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 src = is > 192.168.0.5 / esp spi is 1 / end actions drop / end > + > + get the message:: > + > + Flow rule validated > + > + check the flow list:: > + > + testpmd> flow list 0 > + > + check the rule not exists in the list. > + > +2. create rule:: > + > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is > 192.168.0.1 / end actions drop / end > + testpmd> flow create 0 ingress pattern eth / ipv4 dst spec 224.0.0.= 0 dst > mask 240.0.0.0 / end actions drop / end > + testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.= 1 / > nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end a= ctions > drop / end > + testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55= / vlan > tci is 1 / pppoes seid is 3 / pppoe_proto_id is 0x0021 / end actions drop= / end > + testpmd> flow create 0 ingress pattern eth / ipv4 / udp / pfcp s_fi= eld is 0 > / end actions drop / end > + testpmd> flow create 0 ingress pattern eth dst is 00:11:22:33:44:55= / vlan > tci is 1 / end actions drop / end > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is > 192.168.0.4 / l2tpv3oip session_id is 1 / end actions drop / end > + testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 src is > 192.168.0.5 / esp spi is 1 / end actions drop / end > + > + check the rule exists in the list. > + > +3. send matched packets:: > + > + sendp([Ether()/IP(src=3D"192.168.0.1")/Raw("x"*80)],iface=3D"enp27s= 0f0") > + > sendp([Ether(dst=3D"00:11:22:33:44:55")/IP(dst=3D"239.0.0.0")/TCP()/Raw("= x"*8 > 0)],iface=3D"enp27s0f0") > + > sendp([Ether()/IP(dst=3D"192.168.0.3")/NVGRE(TNI=3D2)/Ether()/IP(src=3D"1= 92.168. > 1.2", dst=3D"192.168.1.3")/Raw("x"*80)],iface=3D"enp27s0f0") > + > sendp([Ether(dst=3D"00:11:22:33:44:55",type=3D0x8100)/Dot1Q(vlan=3D1,type= =3D0x8 > 864)/PPPoE(sessionid=3D3)/PPP(b'\\x00\\x21')/IP()/Raw("x" * > 80)],iface=3D"enp27s0f0") > + > sendp(Ether(dst=3D"00:11:22:33:44:11")/IP()/UDP(dport=3D8805)/PFCP(S=3D0)= ,iface > =3D"enp27s0f0") > + > sendp([Ether(dst=3D"00:11:22:33:44:55",type=3D0x8100)/Dot1Q(vlan=3D1)/IP(= src=3D" > 192.168.0.1",dst=3D"192.168.0.2",tos=3D4,ttl=3D2)/TCP()/Raw("X"*80)],ifac= e=3D"enp > 27s0f0") > + sendp([Ether(dst=3D'00:11:22:33:44:12')/IP(src=3D'192.168.0.4', > proto=3D115)/L2TP(b'\\x00\\x00\\x00\\x01')/('X'*480)], iface=3D"enp27s0f0= ", > count=3D1) > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.0.5", > proto=3D50)/ESP(spi=3D1)/("X"*80)], iface=3D"enp27s0f0") > + > + check port can't receive the packet. > + > +4. send mismatched packets:: > + > + sendp([Ether()/IP(src=3D"192.168.0.6")/Raw("x"*80)],iface=3D"enp27s= 0f0") > + > sendp([Ether(dst=3D"00:11:22:33:44:55")/IP(dst=3D"128.0.0.0")/TCP()/Raw("= x"*8 > 0)],iface=3D"enp27s0f0") > + > sendp([Ether()/IP(dst=3D"192.168.0.8")/NVGRE(TNI=3D1)/Ether()/IP(src=3D"1= 92.168. > 1.2", dst=3D"192.168.1.3")/Raw("x"*80)],iface=3D"enp27s0f0") > + > sendp([Ether(dst=3D"00:11:22:33:44:55",type=3D0x8100)/Dot1Q(vlan=3D1,type= =3D0x8 > 864)/PPPoE(sessionid=3D2)/PPP(b'\\x00\\x21')/IP()/Raw("x" * > 80)],iface=3D"enp27s0f0") > + > sendp(Ether(dst=3D"00:11:22:33:44:11")/IP()/UDP(dport=3D8805)/PFCP(S=3D1)= ,iface > =3D"enp27s0f0") > + > sendp([Ether(dst=3D"00:11:22:33:44:55",type=3D0x8100)/Dot1Q(vlan=3D2)/IP(= src=3D" > 192.168.0.9",dst=3D"192.168.0.2",tos=3D4,ttl=3D2)/TCP()/Raw("X"*80)],ifac= e=3D"enp > 27s0f0") > + sendp([Ether(dst=3D'00:11:22:33:44:12')/IP(src=3D'192.168.0.10', > proto=3D115)/L2TP(b'\\x00\\x00\\x00\\x02')/('X'*480)], iface=3D"enp27s0f0= ", > count=3D1) > + sendp([Ether(dst=3D"00:11:22:33:44:13")/IP(src=3D"192.168.0.11", > proto=3D50)/ESP(spi=3D2)/("X"*80)], iface=3D"enp27s0f0") > + > + check port can receive the packet. > + > +5. verify rules can be destroyed:: > + > + testpmd> flow flush 0 > + testpmd> flow list 0 > + > + check the rules not exist in the list. > + send matched packets, check port can receive the packet. > -- > 2.17.1