From patchwork Fri Aug 27 21:12:53 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Huang, ZhiminX" X-Patchwork-Id: 97465 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 65C1FA0C41; Fri, 27 Aug 2021 14:40:04 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 5D3EE411E7; Fri, 27 Aug 2021 14:40:04 +0200 (CEST) Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mails.dpdk.org (Postfix) with ESMTP id 057D540150 for ; Fri, 27 Aug 2021 14:40:01 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10088"; a="198190508" X-IronPort-AV: E=Sophos;i="5.84,356,1620716400"; d="scan'208";a="198190508" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Aug 2021 05:40:01 -0700 X-IronPort-AV: E=Sophos;i="5.84,356,1620716400"; d="scan'208";a="528301445" Received: from unknown (HELO cvl_100g_103.icx.intel.com) ([10.240.183.103]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 27 Aug 2021 05:40:00 -0700 From: Zhimin Huang To: dts@dpdk.org Cc: Zhimin Huang Date: Sat, 28 Aug 2021 05:12:53 +0800 Message-Id: <20210827211254.5114-4-zhiminx.huang@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210827211254.5114-1-zhiminx.huang@intel.com> References: <20210827211254.5114-1-zhiminx.huang@intel.com> Subject: [dts] [PATCH V1 3/4] tests/cvl_fdir:add esp flow test case X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" 21.08 new feature to support take esp,outer ip src/dst take inputset, so add test case in pf fdir. Signed-off-by: Zhimin Huang --- tests/TestSuite_cvl_fdir.py | 336 ++++++++++++++++++++++++++++++++++++ 1 file changed, 336 insertions(+) diff --git a/tests/TestSuite_cvl_fdir.py b/tests/TestSuite_cvl_fdir.py index 0c3a1917..9cf3c352 100644 --- a/tests/TestSuite_cvl_fdir.py +++ b/tests/TestSuite_cvl_fdir.py @@ -334,6 +334,50 @@ L2_Ethertype = [ 'Ether(dst="00:11:22:33:44:55",type=0x88f7)/"\\x00\\x02"', 'Ether(dst="00:11:22:33:44:55",type=0x8847)'] +MAC_IPV4_ESP = { + "matched": [ + "Ether(dst='00:11:22:33:44:55')/IP(src='192.168.0.20',dst='192.168.0.21',proto=50)/ESP(spi=7)/Raw('x'*480)", + ], + "unmatched": [ + "Ether(dst='00:11:22:33:44:55')/IP(src='192.168.0.22',dst='192.168.0.21',proto=50)/ESP(spi=7)/Raw('x'*480)", + "Ether(dst='00:11:22:33:44:55')/IP(src='192.168.0.20',dst='192.168.0.11',proto=50)/ESP(spi=7)/Raw('x'*480)", + "Ether(dst='00:11:22:33:44:55')/IP(src='192.168.0.20',dst='192.168.0.21',proto=50)/ESP(spi=17)/Raw('x'*480)", + ] +} + +MAC_IPV6_ESP = { + "matched": [ + "Ether(dst='00:11:22:33:44:55')/IPv6(src='2001::1',dst='2001::2',nh=50)/ESP(spi=7)/Raw('x'*480)", + ], + "unmatched": [ + "Ether(dst='00:11:22:33:44:55')/IPv6(src='1111:2222:3333:4444:5555:6666:7777:8888',dst='2001::2',nh=50)/ESP(spi=7)/Raw('x'*480)", + "Ether(dst='00:11:22:33:44:55')/IPv6(src='2001::1',dst='1111:2222:3333:4444:5555:6666:7777:9999',nh=50)/ESP(spi=7)/Raw('x'*480)", + "Ether(dst='00:11:22:33:44:55')/IPv6(src='2001::1',dst='2001::2',nh=50)/ESP(spi=17)/Raw('x'*480)", + ] +} + +MAC_IPV4_NAT_T_ESP = { + "matched": [ + "Ether(dst='00:11:22:33:44:55')/IP(src='192.168.0.20',dst='192.168.0.21')/UDP(dport=4500)/ESP(spi=7)/Raw('x'*480)", + ], + "unmatched": [ + "Ether(dst='00:11:22:33:44:55')/IP(src='192.168.0.22',dst='192.168.0.21')/UDP(dport=4500)/ESP(spi=7)/Raw('x'*480)", + "Ether(dst='00:11:22:33:44:55')/IP(src='192.168.0.20',dst='192.168.0.11')/UDP(dport=4500)/ESP(spi=7)/Raw('x'*480)", + "Ether(dst='00:11:22:33:44:55')/IP(src='192.168.0.20',dst='192.168.0.21')/UDP(dport=4500)/ESP(spi=77)/Raw('x'*480)", + ] +} + +MAC_IPV6_NAT_T_ESP = { + "matched": [ + "Ether(dst='00:11:22:33:44:55')/IPv6(src='2001::1',dst='2001::2')/UDP(dport=4500)/ESP(spi=7)/Raw('x'*480)", + ], + "unmatched": [ + "Ether(dst='00:11:22:33:44:55')/IPv6(src='2001::8',dst='2001::2')/UDP(dport=4500)/ESP(spi=7)/Raw('x'*480)", + "Ether(dst='00:11:22:33:44:55')/IPv6(src='2001::1',dst='2001::9')/UDP(dport=4500)/ESP(spi=7)/Raw('x'*480)", + "Ether(dst='00:11:22:33:44:55')/IPv6(src='2001::1',dst='2001::2')/UDP(dport=4500)/ESP(spi=77)/Raw('x'*480)", + ] +} + tv_mac_ipv4_pay_queue_index = { "name": "test_mac_ipv4_pay_queue_index", "rule": "flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 src is 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions queue index 1 / end", @@ -2148,6 +2192,282 @@ vectors_l2_ethertype = [tv_l2_ethertype_queue_index, tv_l2_ethertype_mark_rss, tv_l2_ethertype_mark] +tv_mac_ipv4_esp_queue_index = { + "name": "tv_mac_ipv4_esp_queue_index", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / esp spi is 7 / end actions queue index 13 / mark id 7 / end", + "scapy_str": {"match": MAC_IPV4_ESP['matched'], + "unmatched": MAC_IPV4_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 7, "queue": 13} +} + +tv_mac_ipv4_esp_queue_group = { + "name": "tv_mac_ipv4_esp_queue_group", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / esp spi is 7 / end actions rss queues 1 2 3 4 end / mark id 6 / end", + "scapy_str": {"match": MAC_IPV4_ESP['matched'], + "unmatched": MAC_IPV4_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 6, "queue": [1, 2, 3, 4]} +} + +tv_mac_ipv4_esp_passthru = { + "name": "tv_mac_ipv4_esp_passthru", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / esp spi is 7 / end actions passthru / mark id 1 / end", + "scapy_str": {"match": MAC_IPV4_ESP['matched'], + "unmatched": MAC_IPV4_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "rss": True, "mark_id": 1} +} + +tv_mac_ipv4_esp_drop = { + "name": "tv_mac_ipv4_esp_drop", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / esp spi is 7 / end actions drop / end", + "scapy_str": {"match": MAC_IPV4_ESP['matched'], + "unmatched": MAC_IPV4_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "drop": 1} +} + +tv_mac_ipv4_esp_mark_rss = { + "name": "tv_mac_ipv4_esp_mark_rss", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / esp spi is 7 / end actions mark id 2 / rss / end", + "scapy_str": {"match": MAC_IPV4_ESP['matched'], + "unmatched": MAC_IPV4_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 2, "rss": True} +} + +tv_mac_ipv4_esp_mark = { + "name": "tv_mac_ipv4_esp_mark", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / esp spi is 7 / end actions mark id 15 / end", + "scapy_str": {"match": MAC_IPV4_ESP['matched'], + "unmatched": MAC_IPV4_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 15} +} + +vectors_mac_ipv4_esp = [ + tv_mac_ipv4_esp_queue_index, + tv_mac_ipv4_esp_queue_group, + tv_mac_ipv4_esp_passthru, + tv_mac_ipv4_esp_drop, + tv_mac_ipv4_esp_mark_rss, + tv_mac_ipv4_esp_mark, +] + +tv_mac_ipv6_esp_queue_index = { + "name": "tv_mac_ipv6_esp_queue_index", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / esp spi is 7 / end actions queue index 13 / mark id 7 / end", + "scapy_str": {"match": MAC_IPV6_ESP['matched'], + "unmatched": MAC_IPV6_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 7, "queue": 13} +} + +tv_mac_ipv6_esp_queue_group = { + "name": "tv_mac_ipv6_esp_queue_group", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / esp spi is 7 / end actions rss queues 1 2 3 4 end / mark id 6 / end", + "scapy_str": {"match": MAC_IPV6_ESP['matched'], + "unmatched": MAC_IPV6_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 6, "queue": [1, 2, 3, 4]} +} + +tv_mac_ipv6_esp_passthru = { + "name": "tv_mac_ipv6_esp_passthru", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / esp spi is 7 / end actions passthru / mark id 1 / end", + "scapy_str": {"match": MAC_IPV6_ESP['matched'], + "unmatched": MAC_IPV6_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "rss": True, "mark_id": 1} +} + +tv_mac_ipv6_esp_drop = { + "name": "tv_mac_ipv6_esp_drop", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / esp spi is 7 / end actions drop / end", + "scapy_str": {"match": MAC_IPV6_ESP['matched'], + "unmatched": MAC_IPV6_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "drop": 1} +} + +tv_mac_ipv6_esp_mark_rss = { + "name": "tv_mac_ipv6_esp_mark_rss", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / esp spi is 7 / end actions mark / rss / end", + "scapy_str": {"match": MAC_IPV6_ESP['matched'], + "unmatched": MAC_IPV6_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 0, "rss": True} +} + +tv_mac_ipv6_esp_mark = { + "name": "tv_mac_ipv6_esp_mark", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / esp spi is 7 / end actions mark id 15 / end", + "scapy_str": {"match": MAC_IPV6_ESP['matched'], + "unmatched": MAC_IPV6_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 15} +} + +vectors_mac_ipv6_esp = [ + tv_mac_ipv6_esp_queue_index, + tv_mac_ipv6_esp_queue_group, + tv_mac_ipv6_esp_passthru, + tv_mac_ipv6_esp_drop, + tv_mac_ipv6_esp_mark_rss, + tv_mac_ipv6_esp_mark, +] + +tv_mac_ipv4_nat_t_esp_queue_index = { + "name": "tv_mac_ipv4_nat_t_esp_queue_index", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / udp / esp spi is 7 / end actions queue index 13 / mark id 7 / end", + "scapy_str": {"match": MAC_IPV4_NAT_T_ESP['matched'], + "unmatched": MAC_IPV4_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 7, "queue": 13} +} + +tv_mac_ipv4_nat_t_esp_queue_group = { + "name": "tv_mac_ipv4_nat_t_esp_queue_group", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / udp / esp spi is 7 / end actions rss queues 1 2 3 4 end / mark id 6 / end", + "scapy_str": {"match": MAC_IPV4_NAT_T_ESP['matched'], + "unmatched": MAC_IPV4_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 6, "queue": [1, 2, 3, 4]} +} + +tv_mac_ipv4_nat_t_esp_passthru = { + "name": "tv_mac_ipv4_nat_t_esp_passthru", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / udp / esp spi is 7 / end actions passthru / mark id 1 / end", + "scapy_str": {"match": MAC_IPV4_NAT_T_ESP['matched'], + "unmatched": MAC_IPV4_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "rss": True, "mark_id": 1} +} + +tv_mac_ipv4_nat_t_esp_drop = { + "name": "tv_mac_ipv4_nat_t_esp_drop", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / udp / esp spi is 7 / end actions drop / end", + "scapy_str": {"match": MAC_IPV4_NAT_T_ESP['matched'], + "unmatched": MAC_IPV4_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "drop": 1} +} + +tv_mac_ipv4_nat_t_esp_mark_rss = { + "name": "tv_mac_ipv4_nat_t_esp_mark_rss", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / udp / esp spi is 7 / end actions mark id 2 / rss / end", + "scapy_str": {"match": MAC_IPV4_NAT_T_ESP['matched'], + "unmatched": MAC_IPV4_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 2, "rss": True} +} + +tv_mac_ipv4_nat_t_esp_mark = { + "name": "tv_mac_ipv4_nat_t_esp_mark", + "rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / udp / esp spi is 7 / end actions mark id 15 / end", + "scapy_str": {"match": MAC_IPV4_NAT_T_ESP['matched'], + "unmatched": MAC_IPV4_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 15} +} + +vectors_mac_ipv4_nat_t_esp = [ + tv_mac_ipv4_nat_t_esp_queue_index, + tv_mac_ipv4_nat_t_esp_queue_group, + tv_mac_ipv4_nat_t_esp_passthru, + tv_mac_ipv4_nat_t_esp_drop, + tv_mac_ipv4_nat_t_esp_mark_rss, + tv_mac_ipv4_nat_t_esp_mark, +] + +tv_mac_ipv6_nat_t_esp_queue_index = { + "name": "tv_mac_ipv6_nat_t_esp_queue_index", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / udp / esp spi is 7 / end actions queue index 13 / mark id 7 / end", + "scapy_str": {"match": MAC_IPV6_NAT_T_ESP['matched'], + "unmatched": MAC_IPV6_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 7, "queue": 13} +} + +tv_mac_ipv6_nat_t_esp_queue_group = { + "name": "tv_mac_ipv6_nat_t_esp_queue_group", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / udp / esp spi is 7 / end actions rss queues 1 2 3 4 end / mark id 6 / end", + "scapy_str": {"match": MAC_IPV6_NAT_T_ESP['matched'], + "unmatched": MAC_IPV6_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 6, "queue": [1, 2, 3, 4]} +} + +tv_mac_ipv6_nat_t_esp_passthru = { + "name": "tv_mac_ipv6_nat_t_esp_passthru", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / udp / esp spi is 7 / end actions passthru / mark id 1 / end", + "scapy_str": {"match": MAC_IPV6_NAT_T_ESP['matched'], + "unmatched": MAC_IPV6_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "rss": True, "mark_id": 1} +} + +tv_mac_ipv6_nat_t_esp_drop = { + "name": "tv_mac_ipv6_nat_t_esp_drop", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / udp / esp spi is 7 / end actions drop / end", + "scapy_str": {"match": MAC_IPV6_NAT_T_ESP['matched'], + "unmatched": MAC_IPV6_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "drop": 1} +} + +tv_mac_ipv6_nat_t_esp_mark_rss = { + "name": "tv_mac_ipv6_nat_t_esp_mark_rss", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / udp / esp spi is 7 / end actions mark id 2 / rss / end", + "scapy_str": {"match": MAC_IPV6_NAT_T_ESP['matched'], + "unmatched": MAC_IPV6_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 2, "rss": True} +} + +tv_mac_ipv6_nat_t_esp_mark = { + "name": "tv_mac_ipv6_nat_t_esp_mark", + "rule": "flow create 0 ingress pattern eth / ipv6 src is 2001::1 dst is 2001::2 / udp / esp spi is 7 / end actions mark id 15 / end", + "scapy_str": {"match": MAC_IPV6_NAT_T_ESP['matched'], + "unmatched": MAC_IPV6_NAT_T_ESP['unmatched'], + }, + "check_func": rfc.check_mark, + "check_param": {"port_id": 0, "mark_id": 15} +} + +vectors_mac_ipv6_nat_t_esp = [ + tv_mac_ipv6_nat_t_esp_queue_index, + tv_mac_ipv6_nat_t_esp_queue_group, + tv_mac_ipv6_nat_t_esp_passthru, + tv_mac_ipv6_nat_t_esp_drop, + tv_mac_ipv6_nat_t_esp_mark_rss, + tv_mac_ipv6_nat_t_esp_mark, +] + class TestCVLFdir(TestCase): def query_count(self, hits_set, hits, port_id=0, rule_id=0): @@ -3183,6 +3503,22 @@ class TestCVLFdir(TestCase): def test_l2_ethertype(self): self._multirules_process(vectors_l2_ethertype) + @skip_unsupported_pkg('os default') + def test_mac_ipv4_esp(self): + self._rte_flow_validate(vectors_mac_ipv4_esp) + + @skip_unsupported_pkg('os default') + def test_mac_ipv6_esp(self): + self._rte_flow_validate(vectors_mac_ipv6_esp) + + @skip_unsupported_pkg('os default') + def test_mac_ipv4_nat_t_esp(self): + self._rte_flow_validate(vectors_mac_ipv4_nat_t_esp) + + @skip_unsupported_pkg('os default') + def test_mac_ipv6_nat_t_esp(self): + self._rte_flow_validate(vectors_mac_ipv6_nat_t_esp) + def test_unsupported_ethertype(self): rule = ['flow create 0 ingress pattern eth type is 0x0800 / end actions queue index 1 / end', 'flow create 0 ingress pattern eth type is 0x86dd / end actions queue index 1 / end']