[dts] [PATCH V1 2/2] Ipgre: upload automation testing script

Liu, Yong yong.liu at intel.com
Tue Jul 26 07:32:11 CEST 2016


Yufen, one comment below.

> -----Original Message-----
> From: dts [mailto:dts-bounces at dpdk.org] On Behalf Of Yufen Mo
> Sent: Tuesday, July 26, 2016 1:25 PM
> To: dts at dpdk.org
> Cc: Mo, YufengX
> Subject: [dts] [PATCH V1 2/2] Ipgre: upload automation testing script
> 
> From: yufengmx <yufengx.mo at intel.com>
> 
> Generic Routing Encapsulation (GRE) is a tunneling protocol developed by
> Cisco Systems that can encapsulate
> a wide variety of network layer protocols inside virtual point-to-point
> links over an Internet Protocol network.
> Fortville support GRE packet detecting, checksum computing and filtering.
> 
> Signed-off-by: yufengmx <yufengx.mo at intel.com>
> ---
>  test_plans/ipgre_test_plan.rst | 181 +++++++++++++++++++++++++
>  tests/TestSuite_ipgre.py       | 295
> +++++++++++++++++++++++++++++++++++++++++
>  2 files changed, 476 insertions(+)
>  create mode 100644 test_plans/ipgre_test_plan.rst
>  create mode 100644 tests/TestSuite_ipgre.py
> 
> diff --git a/test_plans/ipgre_test_plan.rst
> b/test_plans/ipgre_test_plan.rst
> new file mode 100644
> index 0000000..444efdf
> --- /dev/null
> +++ b/test_plans/ipgre_test_plan.rst
> @@ -0,0 +1,181 @@
> +.. Copyright(c) 2010-2016 Intel Corporation
> +   All rights reserved.
> +
> +   Redistribution and use in source and binary forms, with or without
> +   modification, are permitted provided that the following conditions
> +   are met:
> +
> +   - Redistributions of source code must retain the above copyright
> +     notice, this list of conditions and the following disclaimer.
> +
> +   - Redistributions in binary form must reproduce the above copyright
> +     notice, this list of conditions and the following disclaimer in
> +     the documentation and/or other materials provided with the
> +     distribution.
> +
> +   - Neither the name of Intel Corporation nor the names of its
> +     contributors may be used to endorse or promote products derived
> +     from this software without specific prior written permission.
> +
> +   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> +   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> +   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
> +   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
> +   COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
> +   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
> +   (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
> +   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
> +   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
> +   STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
> +   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
> +   OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +
> +====================
> +Generic Routing Encapsulation (GRE)
> +====================
> +
> +Generic Routing Encapsulation (GRE) is a tunneling protocol developed by
> Cisco Systems that can encapsulate a wide variety of network layer
> protocols inside virtual point-to-point links over an Internet Protocol
> network.
> +Fortville support GRE packet detecting, checksum computing and filtering.
> +
> +Prerequisites
> +-------------
> +
> +Fortville nic should be on the DUT.
> +
> +Test cases
> +----------
> +
> +Test Case 1: GRE ipv4 packet detect
> +=================================
> +Start testpmd and enable rxonly forwarding mode::
> +    testpmd -c ffff -n 4 -- -i --txqflags=0x0
> +	testpmd> set fwd rxonly
> +	testpmd> set verbose 1
> +	testpmd> start
> +
> +Send packet as table listed and packet type match each layer.
> +
> ++------------+----------+-----------+----------+-----------+
> +| Outer Vlan | Outer IP | Tunel     | Inner L3 | Inner L4  |
> ++------------+----------+-----------+----------+-----------+
> +| No         | Ipv4     | GRE       | Ipv4     | Udp       |
> ++------------+----------+-----------+----------+-----------+
> +| No         | Ipv4     | GRE       | Ipv4     | Tcp       |
> ++------------+----------+-----------+----------+-----------+
> +| No         | Ipv4     | GRE       | Ipv4     | Sctp      |
> ++------------+----------+-----------+----------+-----------+
> +| Yes        | Ipv4     | GRE       | Ipv4     | Udp       |
> ++------------+----------+-----------+----------+-----------+
> +| Yes        | Ipv4     | GRE       | Ipv4     | Tcp       |
> ++------------+----------+-----------+----------+-----------+
> +| Yes        | Ipv4     | GRE       | Ipv4     | Sctp      |
> ++------------+----------+-----------+----------+-----------+
> +
> +
> +Test Case 2: GRE ipv6 packet detect
> +=================================
> +Start testpmd and enable rxonly forwarding mode::
> +    testpmd -c ffff -n 4 -- -i --txqflags=0x0
> +	testpmd> set fwd rxonly
> +	testpmd> set verbose 1
> +	testpmd> start
> +
> +Send packet as table listed and packet type match each layer.
> +Ether()/IPv6(nh=47)/GRE()/IP()/UDP()/Raw('x'*40)
> +Ether()/IPv6(nh=47)/GRE(proto=0x86dd)/IPv6()/UDP()/Raw('x'*40)
> ++------------+----------+-----------+----------+-----------+
> +| Outer Vlan | Outer IP | Tunel     | Inner L3 | Inner L4  |
> ++------------+----------+-----------+----------+-----------+
> +| No         | Ipv6     | GRE       | Ipv4     | Udp       |
> ++------------+----------+-----------+----------+-----------+
> +| No         | Ipv6     | GRE       | Ipv4     | Tcp       |
> ++------------+----------+-----------+----------+-----------+
> +| No         | Ipv6     | GRE       | Ipv4     | Sctp      |
> ++------------+----------+-----------+----------+-----------+
> +| Yes        | Ipv6     | GRE       | Ipv4     | Udp       |
> ++------------+----------+-----------+----------+-----------+
> +| Yes        | Ipv6     | GRE       | Ipv4     | Tcp       |
> ++------------+----------+-----------+----------+-----------+
> +| Yes        | Ipv6     | GRE       | Ipv4     | Sctp      |
> ++------------+----------+-----------+----------+-----------+
> +
> ++------------+----------+-----------+----------+-----------+
> +| Outer Vlan | Outer IP | Tunel     | Inner L3 | Inner L4  |
> ++------------+----------+-----------+----------+-----------+
> +| No         | Ipv6     | GRE       | Ipv6     | Udp       |
> ++------------+----------+-----------+----------+-----------+
> +| No         | Ipv6     | GRE       | Ipv6     | Tcp       |
> ++------------+----------+-----------+----------+-----------+
> +| No         | Ipv6     | GRE       | Ipv6     | Sctp      |
> ++------------+----------+-----------+----------+-----------+
> +| Yes        | Ipv6     | GRE       | Ipv6     | Udp       |
> ++------------+----------+-----------+----------+-----------+
> +| Yes        | Ipv6     | GRE       | Ipv6     | Tcp       |
> ++------------+----------+-----------+----------+-----------+
> +| Yes        | Ipv6     | GRE       | Ipv6     | Sctp      |
> ++------------+----------+-----------+----------+-----------+
> +
> +Test Case 3: GRE packet filter
> +============================
> +Start testpmd with multi queues::
> +	testpmd -c ff -n 3 -- -i  --rxq=4 --txq=4 --txqflags=0x0
> +	testpmd> set fwd rxonly
> +	testpmd> set nbcore 4
> +	testpmd> set verbose 1
> +	testpmd> start
> +
> +Add GRE filter that forward inner ip address 0.0.0.0 to queue 3
> +	testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
> +	         0.0.0.0 1 ipingre iip 0 3
> +
> +Send packet inner ip address matched and check packet recevied by queue 3.
> +	p = Ether()/IP()/GRE()/IP(dst="0.0.0.0")/UDP()
> +
> +Remove tunnel filter and check same packet recevied by queue 0
> +	testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
> +	         0.0.0.0 1 ipingre iip 0 3
> +
> +Add GRE filter that forward outer ip address 0.0.0.0 to queue 3
> +	testpmd> tunnel_filter add 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
> +	         0.0.0.0 1 ipingre oip 0 3
> +
> +Send packet outer ip address matched and check packet recevied by queue 3.
> +
> +Remove tunnel filter and check same packet recevied by queue 0.
> +	testpmd> tunnel_filter rm 0 XX:XX:XX:XX:XX:XX YY:YY:YY:YY:YY:YY \
> +	         0.0.0.0 1 ipingre iip 0 3
> +
> +Test Case 4: GRE packet chksum offload
> +====================================
> +Start testpmd with hardware checksum offload enabled::
> +    testpmd -c ff -n 3 -- -i --txqflags=0x0 --enable-rx-cksum  --port-
> topology=loop
> +	testpmd> set verbose 1
> +	testpmd> set fwd csum
> +	testpmd> csum set ip hw 0
> +	testpmd> csum set udp hw 0
> +	testpmd> csum set sctp hw 0
> +	testpmd> csum set outer-ip hw 0
> +	testpmd> csum set tcp hw 0
> +	testpmd> csum parse_tunnel on 0
> +	testpmd> start
> +
> +Send packet with wrong outer IP checksum and check forwarded packet IP
> +checksum is correct.
> +	Ether()/IP(chksum=0x0)/GRE()/IP()/TCP()
> +
> +Send packet with wrong inner IP checksum and check forwarded packet IP
> +checksum is correct.
> +	Ether()/IP()/GRE()/IP(chksum=0x0)/TCP()
> +
> +Send packet with wrong inner TCP checksum and check forwarded packet TCP
> +checksum is correct.
> +	Ether()/IP()/GRE()/IP()/TCP(chksum=0x0)
> +
> +Send packet with wrong inner UDP checksum and check forwarded packet UDP
> +checksum is correct.
> +	Ether()/IP()/GRE()/IP()/UDP(chksum=0xffff)
> +
> +Send packet with wrong inner SCTP checksum and check forwarded packet
> SCTP
> +checksum is correct.
> +	Ether()/IP()/GRE()/IP()/SCTP(chksum=0x0)
> diff --git a/tests/TestSuite_ipgre.py b/tests/TestSuite_ipgre.py
> new file mode 100644
> index 0000000..069fe3f
> --- /dev/null
> +++ b/tests/TestSuite_ipgre.py
> @@ -0,0 +1,295 @@
> +# BSD LICENSE
> +#
> +# Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
> +# All rights reserved.
> +#
> +# Redistribution and use in source and binary forms, with or without
> +# modification, are permitted provided that the following conditions
> +# are met:
> +#
> +#   * Redistributions of source code must retain the above copyright
> +#     notice, this list of conditions and the following disclaimer.
> +#   * Redistributions in binary form must reproduce the above copyright
> +#     notice, this list of conditions and the following disclaimer in
> +#     the documentation and/or other materials provided with the
> +#     distribution.
> +#   * Neither the name of Intel Corporation nor the names of its
> +#     contributors may be used to endorse or promote products derived
> +#     from this software without specific prior written permission.
> +#
> +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
> +# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> +# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
> +# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> +# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> +# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> +# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> +# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
> +# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
> +# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> +# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +"""
> +DPDK Test suite.
> +
> +Generic Routing Encapsulation (GRE) is a tunneling protocol developed by
> +Cisco Systems that can encapsulate a wide variety of network layer
> protocols
> +inside virtual point-to-point links over an Internet Protocol network.
> +
> +Fortville support GRE packet detecting, checksum computing and filtering.
> +"""
> +
> +import time
> +import os
> +
> +import dts
> +from test_case import TestCase
> +from exception import VerifyFailure
> +from packet import Packet
> +
> +class TestIpgre(TestCase):
> +
> +    def set_up_all(self):
> +        """
> +        Run at the start of each test suite.
> +        """
> +        self.printFlag = dts.debug_mode
> +        self.src_mac = "11:22:33:44:55:66"
> +        ports = self.dut.get_ports()
> +        self.verify(self.nic.startswith("fortville"),
> +                    "GRE tunnel packet type only support by Fortville")
> +        self.verify(len(ports) >= 2, "Insufficient ports for testing")

One port is enough for the testing, please reduce ports requirement from two to one.

> +        valports = [_ for _ in ports if self.tester.get_local_port(_) !=
> -1]
> +        # start testpmd
> +        self.dut_port = valports[0]
> +        tester_port = self.tester.get_local_port(self.dut_port)
> +        self.tester_iface = self.tester.get_interface(tester_port)
> +        self.tester_iface_mac =  self.tester.get_mac(tester_port)
> +
> +    def set_up(self):
> +        """
> +        Run before each test case.
> +        Nothing to do.
> +        """
> +        pass
> +
> +    def check_packet_transmission(self, pkt_types, layer_configs=None):
> +        time.sleep(1)
> +        for pkt_type in pkt_types.keys():
> +            pkt_names = pkt_types[pkt_type]
> +            pkt = Packet(pkt_type=pkt_type)
> +            if layer_configs:
> +                for layer in layer_configs.keys():
> +                    pkt.config_layer(layer, layer_configs[layer])
> +            pkt.send_pkt(tx_port=self.tester_iface)
> +            out = self.dut.get_session_output(timeout=2)
> +            if self.printFlag: # debug output
> +                print out
> +            for pkt_layer_name in pkt_names:
> +                if self.printFlag:# debug output
> +                    print pkt_layer_name
> +                if pkt_layer_name not in out:
> +                    print dts.RED("Fail to detect %s" % pkt_layer_name)
> +                    if not self.printFlag:
> +                        raise VerifyFailure("Failed to detect %s" %
> pkt_layer_name)
> +            else:
> +                print dts.GREEN("Detected %s successfully" % pkt_type)
> +            time.sleep(1)
> +
> +    def test_GRE_ipv4_packet_detect(self):
> +        """
> +        Start testpmd and enable rxonly forwarding mode
> +        Send packet as table listed and packet type match each layer
> +        """
> +        pkt_types = {
> +            "MAC_IP_GRE_IP_UDP_PKT":        ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"],
> +            "MAC_IP_GRE_IP_TCP_PKT":        ["Tunnel type: GRENAT",
> "Inner L4 type: TCP"],
> +            "MAC_IP_GRE_IP_SCTP_PKT":       ["Tunnel type: GRENAT",
> "Inner L4 type: SCTP"],
> +            "MAC_VLAN_IP_GRE_IP_UDP_PKT":   ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"],
> +            "MAC_VLAN_IP_GRE_IP_TCP_PKT":   ["Tunnel type: GRENAT",
> "Inner L4 type: TCP"],
> +            "MAC_VLAN_IP_GRE_IP_SCTP_PKT":  ["Tunnel type: GRENAT",
> "Inner L4 type: SCTP"]
> +        }
> +        config_layers =  {'ether': {'src': self.src_mac},
> +                          'ipv4': {'proto': 'gre'}}
> +        # Start testpmd and enable rxonly forwarding mode
> +        testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx-
> cksum --enable-rx-cksum" % self.target
> +        self.dut.send_expect( testpmd_cmd,
> +                              "testpmd>",
> +                              20)
> +        self.dut.send_expect("set fwd rxonly", "testpmd>")
> +        self.dut.send_expect("set verbose 1", "testpmd>")
> +        self.dut.send_expect("start", "testpmd>")
> +
> +        self.check_packet_transmission(pkt_types, config_layers)
> +
> +        self.dut.send_expect("quit", "#")
> +
> +    def test_GRE_ipv6_packet_detect(self):
> +        """
> +        Start testpmd and enable rxonly forwarding mode
> +        Send packet as table listed and packet type match each layer
> +        """
> +        pkt_types_ipv6_ip = {
> +            "MAC_IPv6_GRE_IP_UDP_PKT":           ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"],
> +            "MAC_IPv6_GRE_IP_TCP_PKT":           ["Tunnel type: GRENAT",
> "Inner L4 type: TCP"],
> +            "MAC_IPv6_GRE_IP_SCTP_PKT":          ["Tunnel type: GRENAT",
> "Inner L4 type: SCTP"],
> +            "MAC_VLAN_IPv6_GRE_IP_UDP_PKT":      ["Tunnel type: GRENAT",
> "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"],
> +            "MAC_VLAN_IPv6_GRE_IP_TCP_PKT":      ["Tunnel type: GRENAT",
> "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"],
> +            "MAC_VLAN_IPv6_GRE_IP_SCTP_PKT":     ["Tunnel type: GRENAT",
> "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"]
> +        }
> +
> +        pkt_types_ipv6_ipv6 = {
> +            "MAC_IPv6_GRE_IPv6_UDP_PKT":         ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"],
> +            "MAC_IPv6_GRE_IPv6_TCP_PKT":         ["Tunnel type: GRENAT",
> "Inner L4 type: TCP"],
> +            "MAC_VLAN_IPv6_GRE_IPv6_UDP_PKT":    ["Tunnel type: GRENAT",
> "Inner L4 type: UDP", "PKT_RX_VLAN_PKT"],
> +            "MAC_VLAN_IPv6_GRE_IPv6_TCP_PKT":    ["Tunnel type: GRENAT",
> "Inner L4 type: TCP", "PKT_RX_VLAN_PKT"]
> +        }
> +
> +        pkt_types_ipv6_ipv6_SCTP = {
> +            "MAC_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT":        ["Tunnel type:
> GRENAT", "Inner L4 type: SCTP"],
> +            "MAC_VLAN_IPv6_GRE_IPv6-TUNNEL_SCTP_PKT":   ["Tunnel type:
> GRENAT", "Inner L4 type: SCTP", "PKT_RX_VLAN_PKT"]
> +        }
> +
> +        # Start testpmd and enable rxonly forwarding mode
> +        testpmd_cmd = "./%s/app/testpmd -c ffff -n 4 -- -i --enable-rx-
> cksum" % self.target
> +        self.dut.send_expect(testpmd_cmd, "testpmd>", 20)
> +        self.dut.send_expect("set fwd rxonly", "testpmd>")
> +        self.dut.send_expect("set verbose 1", "testpmd>")
> +        self.dut.send_expect("start", "testpmd>")
> +
> +        # inner ipv4
> +        config_layers =  {'ether': {'src': self.src_mac},
> +                          'ipv6': {'nh': 47},
> +                          'raw':  {'payload':['78']*40}}
> +        self.check_packet_transmission(pkt_types_ipv6_ip, config_layers)
> +
> +        # inner ipv6
> +        config_layers =  {'ether': {'src': self.src_mac},
> +                          'ipv6': {'nh': 47},
> +                          'gre':  {'proto': 0x86dd},
> +                          'raw':  {'payload':['78']*40}}
> +        self.check_packet_transmission(pkt_types_ipv6_ipv6, config_layers)
> +
> +        # inner ipv6 SCTP
> +        config_layers =  {'ether': {'src': self.src_mac},
> +                          'ipv6': {'nh': 47},
> +                          'gre':  {'proto': 0x86dd},
> +                          'inner_ipv6': {'nh': 132},
> +                          'raw':  {'payload':['78']*40}}
> +        self.check_packet_transmission(pkt_types_ipv6_ipv6_SCTP,
> config_layers)
> +        self.dut.send_expect("quit", "#")
> +
> +    def test_GRE_packet_filter(self):
> +        """
> +        Start testpmd with multi queues, add GRE filter that forward
> +        inner/outer ip address 0.0.0.0 to queue 3, Send packet inner
> +        ip address matched and check packet recevied by queue 3
> +        """
> +        outer_mac = self.tester_iface_mac
> +        inner_mac = "10:00:00:00:00:00"
> +
> +        # Start testpmd with multi queues
> +        testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx-
> cksum  --rxq=4 --txq=4" % self.target
> +        self.dut.send_expect(testpmd_cmd, "testpmd>", 20)
> +        self.dut.send_expect("set fwd rxonly", "testpmd>")
> +        self.dut.send_expect("set nbcore 4", "testpmd>")
> +        self.dut.send_expect("set verbose 1", "testpmd>")
> +        self.dut.send_expect("start", "testpmd>")
> +
> +        # Add GRE filter that forward inner ip address 0.0.0.0 to queue 3
> +        cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre iip 0
> 3"%(outer_mac, inner_mac)
> +        self.dut.send_expect( cmd, "testpmd>")
> +
> +        # Send packet inner ip address matched and check packet recevied
> by queue 3
> +        pkt_types = {"MAC_IP_GRE_IP_UDP_PKT":  ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"]}
> +        config_layers = {'ether': {'src': self.src_mac},
> +                         'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}}
> +        self.check_packet_transmission(pkt_types, config_layers)
> +
> +        # Remove tunnel filter and check same packet recevied by queue 0
> +        cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0
> 3"%(outer_mac, inner_mac)
> +        self.dut.send_expect( cmd, "testpmd>")
> +
> +        # Add GRE filter that forward outer ip address 0.0.0.0 to queue 3
> +        cmd = "tunnel_filter add 0 %s %s 0.0.0.0 1 ipingre oip 0
> 3"%(outer_mac, inner_mac)
> +        self.dut.send_expect( cmd, "testpmd>")
> +
> +        # Send packet outer ip address matched and check packet recevied
> by queue 3.
> +        pkt_types = {"MAC_IP_GRE_IP_UDP_PKT": ["Tunnel type: GRENAT",
> "Inner L4 type: UDP"]}
> +        config_layers = {'ether': {'src': self.src_mac},
> +                         'ipv4': {'dst': "0.0.0.0", 'proto': 'gre'}}
> +        self.check_packet_transmission(pkt_types, config_layers)
> +
> +        # Add GRE filter that forward outer ip address 0.0.0.0 to queue 3
> +        cmd = "tunnel_filter rm 0 %s %s 0.0.0.0 1 ipingre iip 0
> 3"%(outer_mac, inner_mac)
> +        self.dut.send_expect( cmd, "testpmd>")
> +        time.sleep(2)
> +        self.dut.send_expect("quit", "#")
> +
> +    def test_GRE_packet_chksum_offload(self):
> +        """
> +        Start testpmd with hardware checksum offload enabled,
> +        Send packet with wrong IP/TCP/UDP/SCTP checksum and check
> forwarded packet checksum
> +        """
> +        # Start testpmd and enable rxonly forwarding mode
> +        testpmd_cmd = "./%s/app/testpmd -c ff -n 3 -- -i --enable-rx-
> cksum --txqflags=0x0 --port-topology=loop" % self.target
> +        self.dut.send_expect(testpmd_cmd, "testpmd>", 20)
> +        self.dut.send_expect("set verbose 1", "testpmd>")
> +        self.dut.send_expect("set fwd csum", "testpmd>")
> +        self.dut.send_expect("csum set ip hw 0", "testpmd>")
> +        self.dut.send_expect("csum set udp hw 0", "testpmd>")
> +        self.dut.send_expect("csum set sctp hw 0", "testpmd>")
> +        self.dut.send_expect("csum set outer-ip hw 0", "testpmd>")
> +        self.dut.send_expect("csum set tcp hw 0", "testpmd>")
> +        self.dut.send_expect("csum parse_tunnel on 0", "testpmd>")
> +        self.dut.send_expect("start", "testpmd>")
> +
> +        # Send packet with wrong outer IP checksum and check forwarded
> packet IP checksum is correct
> +        pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_OUTER_IP_CKSUM"]}
> +        config_layers = {'ether': {'src': self.src_mac},
> +                         'ipv4': {'chksum': 0x0, 'proto': 'gre'}}
> +        self.check_packet_transmission(pkt_types, config_layers)
> +
> +        # Send packet with wrong inner IP checksum and check forwarded
> packet IP checksum is correct
> +        pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_IP_CKSUM"]}
> +        config_layers = {'ether': {'src': self.src_mac},
> +                         'inner_ipv4': {'chksum': 0x0, 'proto': 'gre'}}
> +        self.check_packet_transmission(pkt_types, config_layers)
> +
> +        # Send packet with wrong inner TCP checksum and check forwarded
> packet TCP checksum is correct
> +        pkt_types = { "MAC_IP_GRE_IP_TCP_PKT": ["PKT_TX_TCP_CKSUM"]}
> +        config_layers = {'ether': {'src': self.src_mac},
> +                         'tcp': {'chksum': 0x0},
> +                         'ipv4': {'proto': 'gre'}}
> +        self.check_packet_transmission(pkt_types, config_layers)
> +
> +        # Send packet with wrong inner UDP checksum and check forwarded
> packet UDP checksum is correct
> +        pkt_types = { "MAC_IP_GRE_IP_UDP_PKT": ["PKT_TX_UDP_CKSUM"]}
> +        config_layers = {'ether': {'src': self.src_mac},
> +                         'udp':  {'chksum': 0xffff},
> +                         'ipv4': {'proto': 'gre'}}
> +        self.check_packet_transmission(pkt_types, config_layers)
> +
> +        # Send packet with wrong inner SCTP checksum and check forwarded
> packet SCTP checksum is correct
> +        pkt_types = { "MAC_IP_GRE_IP_SCTP_PKT": ["PKT_TX_SCTP_CKSUM"]}
> +        config_layers = {'ether': {'src': self.src_mac},
> +                         'ipv4': {'proto': 'gre'},
> +                         'sctp': {'chksum': 0x0}}
> +        self.check_packet_transmission(pkt_types , config_layers)
> +
> +        self.dut.send_expect("quit", "#")
> +
> +    def tear_down(self):
> +        """
> +        Run after each test case.
> +        Nothing to do.
> +        """
> +        pass
> +
> +    def tear_down_all(self):
> +        """
> +        Run after each test suite.
> +        Nothing to do.
> +        """
> +        self.dut.kill_all()
> +        pass
> --
> 1.9.3



More information about the dts mailing list