Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/84652/?format=api
http://patches.dpdk.org/api/patches/84652/?format=api", "web_url": "http://patches.dpdk.org/project/dts/patch/1606836558-176780-1-git-send-email-yuan.peng@intel.com/", "project": { "id": 3, "url": "http://patches.dpdk.org/api/projects/3/?format=api", "name": "DTS", "link_name": "dts", "list_id": "dts.dpdk.org", "list_email": "dts@dpdk.org", "web_url": "", "scm_url": "git://dpdk.org/tools/dts", "webscm_url": "http://git.dpdk.org/tools/dts/", "list_archive_url": "https://inbox.dpdk.org/dts", "list_archive_url_format": "https://inbox.dpdk.org/dts/{}", "commit_url_format": "" }, "msgid": "<1606836558-176780-1-git-send-email-yuan.peng@intel.com>", "list_archive_url": "https://inbox.dpdk.org/dts/1606836558-176780-1-git-send-email-yuan.peng@intel.com", "date": "2020-12-01T15:29:18", "name": "[v1] tests: add TestSuite_cvl_dcf_acl_filter.py", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "e12bf8c5f8eb641e8ebfed99640ca803afc7bc6b", "submitter": { "id": 429, "url": "http://patches.dpdk.org/api/people/429/?format=api", "name": "Peng, Yuan", "email": "yuan.peng@intel.com" }, "delegate": null, "mbox": "http://patches.dpdk.org/project/dts/patch/1606836558-176780-1-git-send-email-yuan.peng@intel.com/mbox/", "series": [ { "id": 14156, "url": "http://patches.dpdk.org/api/series/14156/?format=api", "web_url": "http://patches.dpdk.org/project/dts/list/?series=14156", "date": "2020-12-01T15:29:18", "name": "[v1] tests: add TestSuite_cvl_dcf_acl_filter.py", "version": 1, "mbox": "http://patches.dpdk.org/series/14156/mbox/" } ], "comments": "http://patches.dpdk.org/api/patches/84652/comments/", "check": "pending", "checks": "http://patches.dpdk.org/api/patches/84652/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<dts-bounces@dpdk.org>", "X-Original-To": "patchwork@inbox.dpdk.org", "Delivered-To": "patchwork@inbox.dpdk.org", "Received": [ "from dpdk.org (dpdk.org [92.243.14.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 22C67A04DB;\n\tTue, 1 Dec 2020 09:26:32 +0100 (CET)", "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 08C03C982;\n\tTue, 1 Dec 2020 09:26:31 +0100 (CET)", "from mga03.intel.com (mga03.intel.com [134.134.136.65])\n by dpdk.org (Postfix) with ESMTP id C9C73C956\n for <dts@dpdk.org>; Tue, 1 Dec 2020 09:26:26 +0100 (CET)", "from fmsmga005.fm.intel.com ([10.253.24.32])\n by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 01 Dec 2020 00:26:11 -0800", "from npg_dpdk_nic_yuanpeng_tester62.sh.intel.com ([10.67.119.113])\n by fmsmga005.fm.intel.com with ESMTP; 01 Dec 2020 00:26:09 -0800" ], "IronPort-SDR": [ "\n zbrn7eiOSeLhzXq8dubmynDSV5DFJTljzwjjBe2hJY/Oexe/XIO/uhXHcbwSFO0fCukp+ukNt6\n Q19kkwtqODTQ==", "\n uUzaDBXNJTF7ZHeiE1HaTzcYeutEDr320l1V7TmpFrGB8IGu2UdvTij9+18GnXs1BCSrcrPW0a\n 9VlLt8YlCcSw==" ], "X-IronPort-AV": [ "E=McAfee;i=\"6000,8403,9821\"; a=\"172888367\"", "E=Sophos;i=\"5.78,384,1599548400\"; d=\"scan'208\";a=\"172888367\"", "E=Sophos;i=\"5.78,384,1599548400\"; d=\"scan'208\";a=\"538925114\"" ], "X-Amp-Result": "SKIPPED(no attachment in message)", "X-Amp-File-Uploaded": "False", "X-ExtLoop1": "1", "From": "Peng Yuan <yuan.peng@intel.com>", "To": "dts@dpdk.org", "Cc": "pengyuan <yuan.peng@intel.com>", "Date": "Tue, 1 Dec 2020 15:29:18 +0000", "Message-Id": "<1606836558-176780-1-git-send-email-yuan.peng@intel.com>", "X-Mailer": "git-send-email 2.7.4", "Subject": "[dts] [PATCH v1]tests: add TestSuite_cvl_dcf_acl_filter.py", "X-BeenThere": "dts@dpdk.org", "X-Mailman-Version": "2.1.15", "Precedence": "list", "List-Id": "test suite reviews and discussions <dts.dpdk.org>", "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>", "List-Archive": "<http://mails.dpdk.org/archives/dts/>", "List-Post": "<mailto:dts@dpdk.org>", "List-Help": "<mailto:dts-request@dpdk.org?subject=help>", "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>", "Errors-To": "dts-bounces@dpdk.org", "Sender": "\"dts\" <dts-bounces@dpdk.org>" }, "content": "From: pengyuan <yuan.peng@intel.com>\n\nAdd TestSuite_cvl_dcf_acl_filter.py to tests.\n\nSigned-off-by: pengyuan <yuan.peng@intel.com>", "diff": "diff --git a/tests/TestSuite_cvl_dcf_acl_filter.py b/tests/TestSuite_cvl_dcf_acl_filter.py\nnew file mode 100644\nindex 00000000..826da9c5\n--- /dev/null\n+++ b/tests/TestSuite_cvl_dcf_acl_filter.py\n@@ -0,0 +1,1518 @@\n+# BSD LICENSE\n+#\n+# Copyright(c) 2020 Intel Corporation. All rights reserved.\n+# All rights reserved.\n+#\n+# Redistribution and use in source and binary forms, with or without\n+# modification, are permitted provided that the following conditions\n+# are met:\n+#\n+# * Redistributions of source code must retain the above copyright\n+# notice, this list of conditions and the following disclaimer.\n+# * Redistributions in binary form must reproduce the above copyright\n+# notice, this list of conditions and the following disclaimer in\n+# the documentation and/or other materials provided with the\n+# distribution.\n+# * Neither the name of Intel Corporation nor the names of its\n+# contributors may be used to endorse or promote products derived\n+# from this software without specific prior written permission.\n+#\n+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS\n+# \"AS IS\" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT\n+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR\n+# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT\n+# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,\n+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT\n+# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,\n+# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY\n+# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT\n+# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE\n+# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n+\n+import json\n+import time\n+import re\n+import copy\n+\n+from test_case import TestCase\n+from pmd_output import PmdOutput\n+from packet import Packet\n+from utils import BLUE, RED, GREEN\n+import rte_flow_common as rfc\n+\n+import os\n+\n+vf1_mac = \"00:01:23:45:67:89\"\n+\n+# send packets\n+\n+MAC_IPV4_PAY_SRC_MAC = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\", frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"01:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"02:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"ff:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"01:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:66:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:66\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\", frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:66:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:66\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:32:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"01:11:22:33:44:66\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_PAY_DST_MAC = {\n+ \"match\": [\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)'\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:66:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)'\n+ ]\n+}\n+\n+MAC_IPV4_PAY_SRC_IP = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.158\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_PAY_DST_IP = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.0\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.0\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.158\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.255\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.255\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.255\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_PAY_SRC_DST_IP = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.158\", dst=\"192.168.255.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/TCP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/SCTP()/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/ICMP()/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_PAY_SRC_DST_MAC_SRC_DST_IP = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:1b\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:1b\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.255\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:00\", dst=\"33:00:00:00:00:03\")/IP(src=\"192.168.0.158\", dst=\"192.168.255.2\")/UDP()/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:ff\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/TCP()/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:ff\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/SCTP()/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:ff\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/ICMP()/Raw(load=\"x\"*30)'\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:66:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\",frag=1)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:01\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP()/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/TCP()/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/SCTP()/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/ICMP()/Raw(load=\"x\"*30)'\n+ ]\n+}\n+\n+MAC_IPV4_TCP_SRC_MAC = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:54\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:57\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_TCP_DST_MAC = {\n+ \"match\": [\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:66:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+ ]\n+}\n+\n+MAC_IPV4_TCP_SRC_IP = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_TCP_DST_IP = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.14\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_TCP_SRC_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/TCP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/TCP(sport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/TCP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_TCP_DST_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/TCP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/TCP(dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/TCP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_TCP_SRC_DST_IP_SRC_DST_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=7985,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_TCP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:66\", dst=\"33:00:00:00:00:03\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:66:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:01\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/TCP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/TCP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=7985,dport=8017)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8010,dport=7985)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)'\n+ ]\n+}\n+\n+MAC_IPV4_UDP_SRC_MAC = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:54\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:57\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_UDP_DST_MAC = {\n+ \"match\": [\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:44:66\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"00:11:22:33:66:55\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+ ]\n+}\n+\n+MAC_IPV4_UDP_SRC_IP = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_UDP_DST_IP = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.14\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_UDP_SRC_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(sport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/UDP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_UDP_DST_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/TCP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/UDP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_UDP_SRC_DST_IP_SRC_DST_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=7985,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/TCP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_UDP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:66\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)'\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:66:55\", dst=\"33:00:00:00:00:03\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:01\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=7985,dport=8017)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"33:00:00:00:00:02\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=7985)/Raw(load=\"x\"*30)'\n+ ]\n+}\n+\n+MAC_IPV4_SCTP_SRC_MAC = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:54\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:57\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_SCTP_DST_MAC = {\n+ \"match\": [\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:02:00:00:00:01\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_SCTP_SRC_IP = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_SCTP_DST_IP = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.14\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_SCTP_SRC_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(sport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/SCTP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(sport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_SCTP_DST_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/SCTP(dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP()/UDP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IPv6()/SCTP(dport=8012)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_SCTP_SRC_DST_IP_SRC_DST_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=7985,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8012,dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+MAC_IPV4_SCTP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT = {\n+ \"match\": [\n+ 'Ether(src=\"00:11:22:33:44:66\", dst=\"%s\")/IP(src=\"192.168.0.2\", dst=\"192.168.255.2\")/SCTP(sport=8012,dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ ],\n+ \"unmatch\": [\n+ 'Ether(src=\"00:11:22:33:66:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8010,dport=8017)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/SCTP(sport=8010,dport=8017)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.3\")/SCTP(sport=8010,dport=8017)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=7985,dport=8017)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/SCTP(sport=8010,dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+}\n+\n+# test vectors\n+\n+tv_mac_ipv4_pay_src_mac = {\n+ \"name\": \"test_mac_ipv4_pay_src_mac\",\n+ \"rules\": \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask 00:ff:ff:ff:ff:ff / ipv4 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_PAY_SRC_MAC,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_pay_dst_mac = {\n+ \"name\": \"test_mac_ipv4_pay_dst_mac\",\n+ \"rules\": [\n+ \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / end actions drop / end\"],\n+ \"scapy_str\": MAC_IPV4_PAY_DST_MAC,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_pay_src_ip = {\n+ \"name\": \"test_mac_ipv4_pay_src_ip\",\n+ \"rules\": \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_PAY_SRC_IP,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_pay_dst_ip = {\n+ \"name\": \"test_mac_ipv4_pay_dst_ip\",\n+ \"rules\": \"flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.0 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_PAY_DST_IP,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_pay_src_dst_ip = {\n+ \"name\": \"test_mac_ipv4_pay_src_dst_ip\",\n+ \"rules\": \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_PAY_SRC_DST_IP,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_pay_src_dst_mac_src_dst_ip = {\n+ \"name\": \"test_mac_ipv4_pay_src_dst_mac_src_dst_ip\",\n+ \"rules\": [\n+ \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 33:00:00:00:00:02 dst mask ff:ff:ff:ff:ff:fe / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / end actions drop / end\"],\n+ \"scapy_str\": MAC_IPV4_PAY_SRC_DST_MAC_SRC_DST_IP,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_src_mac = {\n+ \"name\": \"test_mac_ipv4_tcp_src_mac\",\n+ \"rules\": \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:fe / ipv4 / tcp / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_TCP_SRC_MAC,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_dst_mac = {\n+ \"name\": \"test_mac_ipv4_tcp_dst_mac\",\n+ \"rules\": [\n+ \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / tcp / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / tcp / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / tcp / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / tcp / end actions drop / end\"],\n+ \"scapy_str\": MAC_IPV4_TCP_DST_MAC,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_src_ip = {\n+ \"name\": \"test_mac_ipv4_tcp_src_ip\",\n+ \"rules\": \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / tcp / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_TCP_SRC_IP,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_dst_ip = {\n+ \"name\": \"test_mac_ipv4_tcp_dst_ip\",\n+ \"rules\": \"flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.243 / tcp / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_TCP_DST_IP,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_src_port = {\n+ \"name\": \"test_mac_ipv4_tcp_src_port\",\n+ \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / tcp src spec 8010 src mask 65520 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_TCP_SRC_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_dst_port = {\n+ \"name\": \"test_mac_ipv4_tcp_dst_port\",\n+ \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / tcp dst spec 8010 dst mask 65520 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_TCP_DST_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_src_dst_ip_src_dst_port = {\n+ \"name\": \"test_mac_ipv4_tcp_src_dst_ip_src_dst_port\",\n+ \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / tcp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_TCP_SRC_DST_IP_SRC_DST_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_tcp_src_dst_mac_src_dst_ip_src_dst_port = {\n+ \"name\": \"test_mac_ipv4_tcp_src_dst_mac_src_dst_ip_src_dst_port\",\n+ \"rules\": [\n+ \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions vf id 1 / end\",\n+ \"flow create 0 priority 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 33:00:00:00:00:02 dst mask ff:ff:ff:ff:ff:fe / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / tcp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\"],\n+ \"scapy_str\": MAC_IPV4_TCP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_src_mac = {\n+ \"name\": \"test_mac_ipv4_udp_src_mac\",\n+ \"rules\": \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:fe / ipv4 / udp / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_UDP_SRC_MAC,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_dst_mac = {\n+ \"name\": \"test_mac_ipv4_udp_dst_mac\",\n+ \"rules\": [\n+ \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / udp / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / udp / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / udp / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / udp / end actions drop / end\"],\n+ \"scapy_str\": MAC_IPV4_UDP_DST_MAC,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_src_ip = {\n+ \"name\": \"test_mac_ipv4_udp_src_ip\",\n+ \"rules\": \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / udp / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_UDP_SRC_IP,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_dst_ip = {\n+ \"name\": \"test_mac_ipv4_udp_dst_ip\",\n+ \"rules\": \"flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.243 / udp / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_UDP_DST_IP,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_src_port = {\n+ \"name\": \"test_mac_ipv4_udp_src_port\",\n+ \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / udp src spec 8010 src mask 65520 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_UDP_SRC_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_dst_port = {\n+ \"name\": \"test_mac_ipv4_udp_dst_port\",\n+ \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / udp dst spec 8010 dst mask 65520 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_UDP_DST_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_src_dst_ip_src_dst_port = {\n+ \"name\": \"test_mac_ipv4_udp_src_dst_ip_src_dst_port\",\n+ \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / udp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_UDP_SRC_DST_IP_SRC_DST_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_udp_src_dst_mac_src_dst_ip_src_dst_port = {\n+ \"name\": \"test_mac_ipv4_udp_src_dst_mac_src_dst_ip_src_dst_port\",\n+ \"rules\": [\n+ \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / udp / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / udp / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / udp / end actions vf id 1 / end\",\n+ \"flow create 0 priority 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 33:00:00:00:00:03 dst mask ff:ff:ff:ff:ff:fe / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / udp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\"],\n+ \"scapy_str\": MAC_IPV4_UDP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_src_mac = {\n+ \"name\": \"test_mac_ipv4_sctp_src_mac\",\n+ \"rules\": \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:fe / ipv4 / sctp / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_SCTP_SRC_MAC,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_dst_mac = {\n+ \"name\": \"test_mac_ipv4_sctp_dst_mac\",\n+ \"rules\": [\n+ \"flow create 0 ingress pattern eth dst spec %s dst mask ff:ff:ff:ff:ff:00 / ipv4 / sctp / end actions drop / end\" % vf1_mac],\n+ \"scapy_str\": MAC_IPV4_SCTP_DST_MAC,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_src_ip = {\n+ \"name\": \"test_mac_ipv4_sctp_src_ip\",\n+ \"rules\": \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / sctp / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_SCTP_SRC_IP,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_dst_ip = {\n+ \"name\": \"test_mac_ipv4_sctp_dst_ip\",\n+ \"rules\": \"flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.243 / sctp / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_SCTP_DST_IP,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_src_port = {\n+ \"name\": \"test_mac_ipv4_sctp_src_port\",\n+ \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / sctp src spec 8010 src mask 65520 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_SCTP_SRC_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_dst_port = {\n+ \"name\": \"test_mac_ipv4_sctp_dst_port\",\n+ \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 / sctp dst spec 8010 dst mask 65520 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_SCTP_DST_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_src_dst_ip_src_dst_port = {\n+ \"name\": \"test_mac_ipv4_sctp_src_dst_ip_src_dst_port\",\n+ \"rules\": \"flow create 0 priority 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / sctp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\",\n+ \"scapy_str\": MAC_IPV4_SCTP_SRC_DST_IP_SRC_DST_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+tv_mac_ipv4_sctp_src_dst_mac_src_dst_ip_src_dst_port = {\n+ \"name\": \"test_mac_ipv4_sctp_src_dst_mac_src_dst_ip_src_dst_port\",\n+ \"rules\": [\n+ \"flow create 0 priority 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec %s dst mask ff:ff:ff:ff:ff:fe / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / sctp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end\" % vf1_mac],\n+ \"scapy_str\": MAC_IPV4_SCTP_SRC_DST_MAC_SRC_DST_IP_SRC_DST_PORT,\n+ \"check_param\": {\"port_id\": 1, \"drop\": 1}\n+}\n+\n+\n+vectors_ipv4_pay_4ports = [tv_mac_ipv4_pay_src_ip, tv_mac_ipv4_pay_dst_ip, tv_mac_ipv4_pay_src_dst_ip]\n+\n+vectors_ipv4_pay_2ports = [tv_mac_ipv4_pay_src_mac, tv_mac_ipv4_pay_dst_mac, tv_mac_ipv4_pay_src_ip, tv_mac_ipv4_pay_dst_ip, tv_mac_ipv4_pay_src_dst_mac_src_dst_ip]\n+\n+vectors_ipv4_tcp_4ports = [tv_mac_ipv4_tcp_src_ip, tv_mac_ipv4_tcp_dst_ip,\n+ tv_mac_ipv4_tcp_src_port,tv_mac_ipv4_tcp_dst_port,\n+ tv_mac_ipv4_tcp_src_dst_ip_src_dst_port]\n+\n+vectors_ipv4_tcp_2ports = [tv_mac_ipv4_tcp_src_mac, tv_mac_ipv4_tcp_dst_mac,\n+ tv_mac_ipv4_tcp_src_ip, tv_mac_ipv4_tcp_dst_ip,\n+ tv_mac_ipv4_tcp_src_port,tv_mac_ipv4_tcp_dst_port,\n+ tv_mac_ipv4_tcp_src_dst_mac_src_dst_ip_src_dst_port]\n+\n+vectors_ipv4_udp_4ports = [tv_mac_ipv4_udp_src_ip, tv_mac_ipv4_udp_dst_ip,\n+ tv_mac_ipv4_udp_src_port,tv_mac_ipv4_udp_dst_port,\n+ tv_mac_ipv4_udp_src_dst_ip_src_dst_port]\n+\n+vectors_ipv4_udp_2ports = [tv_mac_ipv4_udp_src_mac, tv_mac_ipv4_udp_dst_mac,\n+ tv_mac_ipv4_udp_src_ip, tv_mac_ipv4_udp_dst_ip,\n+ tv_mac_ipv4_udp_src_port,tv_mac_ipv4_udp_dst_port,\n+ tv_mac_ipv4_udp_src_dst_mac_src_dst_ip_src_dst_port]\n+\n+vectors_ipv4_sctp_4ports = [tv_mac_ipv4_sctp_src_ip, tv_mac_ipv4_sctp_dst_ip,\n+ tv_mac_ipv4_sctp_src_port,tv_mac_ipv4_sctp_dst_port,\n+ tv_mac_ipv4_sctp_src_dst_ip_src_dst_port]\n+\n+vectors_ipv4_sctp_2ports = [tv_mac_ipv4_sctp_src_mac, tv_mac_ipv4_sctp_dst_mac,\n+ tv_mac_ipv4_sctp_src_ip, tv_mac_ipv4_sctp_dst_ip,\n+ tv_mac_ipv4_sctp_src_port,tv_mac_ipv4_sctp_dst_port,\n+ tv_mac_ipv4_sctp_src_dst_mac_src_dst_ip_src_dst_port]\n+\n+\n+class CVLDCFACLFilterTest(TestCase):\n+\n+ def bind_nics_driver(self, ports, driver=\"\"):\n+ # modprobe vfio driver\n+ if driver == \"vfio-pci\":\n+ for port in ports:\n+ netdev = self.dut.ports_info[port]['port']\n+ driver = netdev.get_nic_driver()\n+ if driver != 'vfio-pci':\n+ netdev.bind_driver(driver='vfio-pci')\n+\n+ elif driver == \"igb_uio\":\n+ # igb_uio should insmod as default, no need to check\n+ for port in ports:\n+ netdev = self.dut.ports_info[port]['port']\n+ driver = netdev.get_nic_driver()\n+ if driver != 'igb_uio':\n+ netdev.bind_driver(driver='igb_uio')\n+ else:\n+ for port in ports:\n+ netdev = self.dut.ports_info[port]['port']\n+ driver_now = netdev.get_nic_driver()\n+ if driver == \"\":\n+ driver = netdev.default_driver\n+ if driver != driver_now:\n+ netdev.bind_driver(driver=driver)\n+\n+ def set_up_all(self):\n+ \"\"\"\n+ Run at the start of each test suite.\n+ \"\"\"\n+ self.verify(self.nic in [\"columbiaville_25g\",\"columbiaville_100g\"], \"nic is not CVL\")\n+ self.dut_ports = self.dut.get_ports(self.nic)\n+ # Verify that enough ports are available\n+ self.verify(len(self.dut_ports) >= 2, \"Insufficient ports\")\n+ localPort0 = self.tester.get_local_port(self.dut_ports[0])\n+ self.tester_iface0 = self.tester.get_interface(localPort0)\n+ self.pf0_intf = self.dut.ports_info[self.dut_ports[0]]['intf']\n+ self.pf1_intf = self.dut.ports_info[self.dut_ports[1]]['intf']\n+ self.dut.send_expect(\"ifconfig %s up\" % self.tester_iface0, \"# \")\n+ self.pkt = Packet()\n+ self.pmd_output = PmdOutput(self.dut)\n+ self.testpmd_status = \"close\"\n+ #bind pf to kernel\n+ self.bind_nics_driver(self.dut_ports, driver=\"ice\")\n+ #move comms package to package folder\n+ self.suite_config = rfc.get_suite_config(self)\n+ comms_package_location = self.suite_config[\"comms_package_file_location\"]\n+ package_location = self.suite_config[\"package_file_location\"]\n+ self.dut.send_expect(\"cp %s %s\" % (comms_package_location, package_location), \"# \")\n+ self.re_load_ice_driver()\n+ #set vf driver\n+ self.vf_driver = 'vfio-pci'\n+ self.dut.send_expect(\"modprobe uio\", \"# \")\n+ self.path = self.dut.apps_name['test-pmd']\n+ self.setup_1pf_vfs_env()\n+ self.dut.send_expect(\"ifconfig %s up\" % self.tester_iface0, \"# \", 15)\n+\n+ self.src_file_dir = 'dep/'\n+ self.dut_file_dir = '/tmp/'\n+\n+ def setup_1pf_vfs_env(self, pf_port=0, driver='default'):\n+\n+ self.used_dut_port_0 = self.dut_ports[pf_port]\n+ #get PF interface name\n+ out = self.dut.send_expect('ethtool -i %s' % self.pf0_intf, '#')\n+ #generate 4 VFs on PF\n+ self.dut.generate_sriov_vfs_by_port(self.used_dut_port_0, 4, driver=driver)\n+ self.sriov_vfs_port_0 = self.dut.ports_info[self.used_dut_port_0]['vfs_port']\n+ self.vf0_pci = self.sriov_vfs_port_0[0].pci\n+ self.vf1_pci = self.sriov_vfs_port_0[1].pci\n+ #set VF0 as trust\n+ self.dut.send_expect('ip link set %s vf 0 trust on' % self.pf0_intf, '#')\n+ #set VF1 mac address\n+ self.dut.send_expect(\"ip link set %s vf 1 mac %s\" % (self.pf0_intf, vf1_mac), \"# \")\n+ #bind VFs to dpdk driver\n+ for port in self.sriov_vfs_port_0:\n+ port.bind_driver(self.vf_driver)\n+ time.sleep(15)\n+\n+ def re_load_ice_driver(self):\n+ \"\"\"\n+ remove and reload the ice driver\n+ \"\"\"\n+ ice_driver_file_location = self.suite_config[\"ice_driver_file_location\"]\n+ self.dut.send_expect(\"rmmod ice\", \"# \", 60)\n+ self.dut.send_expect(\"insmod %s\" % ice_driver_file_location, \"# \", 60)\n+ self.dut.send_expect(\"ifconfig %s up\" % self.pf0_intf, \"# \", 15)\n+ self.dut.send_expect(\"ifconfig %s up\" % self.tester_iface0, \"# \", 15)\n+\n+ def set_up(self):\n+ \"\"\"\n+ Run before each test case.\n+ \"\"\"\n+\n+ def create_testpmd_command(self, param):\n+ \"\"\"\n+ Create testpmd command\n+ \"\"\"\n+ #Prepare testpmd EAL and parameters\n+ all_eal_param = self.dut.create_eal_parameters(cores='1S/4C/1T',ports=[self.vf0_pci, self.vf1_pci], port_options={self.vf0_pci:\"cap=dcf\"})\n+ command = self.path + all_eal_param + \"--log-level='ice,7'\" + \" -- -i\" + param\n+ return command\n+\n+ def launch_testpmd(self, param=\"\"):\n+ \"\"\"\n+ launch testpmd with the command\n+ \"\"\"\n+ time.sleep(5)\n+ command = self.create_testpmd_command(param)\n+ out = self.dut.send_expect(command, \"testpmd> \", 20)\n+ self.testpmd_status = \"running\"\n+ self.dut.send_expect(\"set portlist 1\", \"testpmd> \", 15)\n+ self.dut.send_expect(\"set fwd rxonly\", \"testpmd> \", 15)\n+ self.dut.send_expect(\"set verbose 1\", \"testpmd> \", 15)\n+ self.pmd_output.execute_cmd(\"start\")\n+ return out\n+\n+ def send_packets(self, packets):\n+ self.pkt.update_pkt(packets)\n+ tx_port = self.tester_iface0\n+ self.pkt.send_pkt(crb=self.tester, tx_port=tx_port)\n+\n+ def send_pkts_getouput(self, pkts):\n+ \"\"\"\n+ if pkt_info is True, we need to get packet infomation to check the RSS hash and FDIR.\n+ if pkt_info is False, we just need to get the packet number and queue number.\n+ \"\"\"\n+ self.send_packets(pkts)\n+ time.sleep(1)\n+ out_info = self.dut.get_session_output(timeout=1)\n+ out_pkt = self.pmd_output.execute_cmd(\"stop\", timeout=15)\n+ out = out_info + out_pkt\n+ self.pmd_output.execute_cmd(\"start\")\n+ return out\n+\n+ def create_acl_filter_rule(self, rules, session_name=\"\", check_stats=True):\n+ \"\"\"\n+ create acl filter rules\n+ \"\"\"\n+ if session_name == \"\":\n+ session_name = self.dut\n+ p = re.compile(r\"Flow rule #(\\d+) created\")\n+ rule_list = []\n+ acl_rule = \"Succeeded to create (4) flow\"\n+ if isinstance(rules, list):\n+ for rule in rules:\n+ out = session_name.send_expect(rule, \"testpmd> \")\n+ if acl_rule in out:\n+ m = p.search(out)\n+ if m:\n+ rule_list.append(m.group(1))\n+ else:\n+ rule_list.append(False)\n+ else:\n+ out = session_name.send_expect(rules, \"testpmd> \")\n+ if acl_rule in out:\n+ m = p.search(out)\n+ if m:\n+ rule_list.append(m.group(1))\n+ else:\n+ rule_list.append(False)\n+\n+ if check_stats:\n+ self.verify(all(rule_list), \"some rules not created successfully, result %s, rule %s\" % (rule_list, rules))\n+ else:\n+ self.verify(not any(rule_list), \"all rules should create failed, result %s\" % rule_list)\n+ return rule_list\n+\n+ def create_other_filter_rule(self, rules, session_name=\"\", check_stats=True):\n+ \"\"\"\n+ create switch or fdir filter rules\n+ \"\"\"\n+ if session_name == \"\":\n+ session_name = self.dut\n+ p = re.compile(r\"Flow rule #(\\d+) created\")\n+ rule_list = []\n+ if isinstance(rules, list):\n+ for rule in rules:\n+ out = session_name.send_expect(rule, \"testpmd> \")\n+ m = p.search(out)\n+ if m:\n+ rule_list.append(m.group(1))\n+ else:\n+ rule_list.append(False)\n+\n+ else:\n+ out = session_name.send_expect(rules, \"testpmd> \")\n+ m = p.search(out)\n+ if m:\n+ rule_list.append(m.group(1))\n+ else:\n+ rule_list.append(False)\n+ if check_stats:\n+ self.verify(all(rule_list), \"some rules not created successfully, result %s, rule %s\" % (rule_list, rules))\n+ else:\n+ self.verify(not any(rule_list), \"all rules should create failed, result %s\" % rule_list)\n+ return rule_list\n+\n+ def check_filter_rule_list(self, port_id, rule_list, session_name=\"\", need_verify=True):\n+ \"\"\"\n+ check the rules in list identical to ones in rule_list\n+ \"\"\"\n+ if session_name == \"\":\n+ session_name = self.dut\n+ out = session_name.send_expect(\"flow list %d\" % port_id, \"testpmd> \", 15)\n+ p = re.compile(r\"ID\\s+Group\\s+Prio\\s+Attr\\s+Rule\")\n+ m = p.search(out)\n+ if not m:\n+ result = []\n+ else:\n+ p_spec = re.compile(\"^(\\d+)\\s\")\n+ out_lines = out.splitlines()\n+ res = filter(bool, map(p_spec.match, out_lines))\n+ result = [i.group(1) for i in res]\n+ if need_verify:\n+ self.verify(result == rule_list,\n+ \"the rule list is not the same. expect %s, result %s\" % (rule_list, result))\n+ else:\n+ return result\n+\n+ def destroy_acl_filter_rule(self, port_id, rule_list, session_name=\"\", need_verify=True):\n+ if session_name == \"\":\n+ session_name = self.dut\n+ p = re.compile(r\"Flow rule #(\\d+) destroyed\")\n+ destroy_list = []\n+ if isinstance(rule_list, list):\n+ for i in rule_list:\n+ out = session_name.send_expect(\"flow destroy %s rule %s\" % (port_id, i), \"testpmd> \", 15)\n+ m = p.search(out)\n+ if m:\n+ destroy_list.append(m.group(1))\n+ else:\n+ destroy_list.append(False)\n+ else:\n+ out = session_name.send_expect(\"flow destroy %s rule %s\" % (port_id, rule_list), \"testpmd> \", 15)\n+ m = p.search(out)\n+ if m:\n+ destroy_list.append(m.group(1))\n+ else:\n+ destroy_list.append(False)\n+ rule_list = [rule_list]\n+ if need_verify:\n+ self.verify(destroy_list == rule_list, \"flow rule destroy failed, expect %s result %s\" % (rule_list, destroy_list))\n+ else:\n+ return destroy_list\n+\n+ def common_process(self, vectors, launch_testpmd=True):\n+\n+ if launch_testpmd:\n+ #launch testpmd\n+ self.launch_testpmd()\n+\n+ test_results = {}\n+ for test_vector in vectors:\n+ try:\n+ self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 120)\n+\n+ #create a rule\n+ rule_list = self.create_acl_filter_rule(test_vector[\"rules\"])\n+ # send and check match packets\n+ out1 = self.send_pkts_getouput(pkts=test_vector[\"scapy_str\"][\"match\"])\n+ rfc.check_drop(out1, pkt_num=len(test_vector[\"scapy_str\"][\"match\"]), check_param=test_vector[\"check_param\"])\n+ # send and check mismatch packets\n+ out2 = self.send_pkts_getouput(pkts=test_vector[\"scapy_str\"][\"unmatch\"])\n+ rfc.check_drop(out2, pkt_num=len(test_vector[\"scapy_str\"][\"unmatch\"]), check_param=test_vector[\"check_param\"],\n+ stats=False)\n+ #destroy rule\n+ self.destroy_acl_filter_rule(0, rule_list)\n+ #send matched packets and check\n+ out3 = self.send_pkts_getouput(pkts=test_vector[\"scapy_str\"][\"match\"])\n+ rfc.check_drop(out3, pkt_num=len(test_vector[\"scapy_str\"][\"match\"]), check_param=test_vector[\"check_param\"],\n+ stats=False)\n+ test_results[test_vector[\"name\"]] = True\n+ print((GREEN(\"case passed: %s\" % test_vector[\"name\"])))\n+ except Exception as e:\n+ print((RED(e)))\n+ test_results[test_vector[\"name\"]] = False\n+ continue\n+ failed_cases = []\n+ for k, v in list(test_results.items()):\n+ if not v:\n+ failed_cases.append(k)\n+ self.verify(all(test_results.values()), \"{} failed.\".format(failed_cases))\n+\n+ def test_mac_ipv4(self):\n+ if self.nic == \"columbiaville_25g\":\n+ self.common_process(vectors_ipv4_pay_4ports)\n+ else:\n+ self.common_process(vectors_ipv4_pay_2ports)\n+\n+ def test_mac_ipv4_tcp(self):\n+ if self.nic == \"columbiaville_25g\":\n+ self.common_process(vectors_ipv4_tcp_4ports)\n+ else:\n+ self.common_process(vectors_ipv4_tcp_2ports)\n+\n+ def test_mac_ipv4_udp(self):\n+ if self.nic == \"columbiaville_25g\":\n+ self.common_process(vectors_ipv4_udp_4ports)\n+ else:\n+ self.common_process(vectors_ipv4_udp_2ports)\n+\n+ def test_mac_ipv4_sctp(self):\n+ if self.nic == \"columbiaville_25g\":\n+ self.common_process(vectors_ipv4_sctp_4ports)\n+ else:\n+ self.common_process(vectors_ipv4_sctp_2ports)\n+\n+ def test_negative(self):\n+ \"\"\"\n+ negative cases\n+ \"\"\"\n+ out_testpmd = self.launch_testpmd()\n+ self.check_dcf_status(out_testpmd, stats=True)\n+ rules = {\n+ \"inconsistent spec and mask\" : [\n+ \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 dst mask 255.255.255.0 / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 / tcp src spec 8010 dst mask 65520 / end actions drop / end\"],\n+ \"only spec/mask\" : [\n+ \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 src mask 255.255.255.0 / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 / ipv4 / tcp / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth src mask ff:ff:ff:ff:ff:00 / ipv4 / tcp / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 / tcp src spec 8010 / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 / tcp src mask 65520 / end actions drop / end\"],\n+ \"all 0 mask\" : [\n+ \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 0.0.0.0 / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 / tcp dst spec 8010 dst mask 0 / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask 00:00:00:00:00:00 / ipv4 / tcp / end actions drop / end\"],\n+ \"acl rules\" : [\n+ \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 0.0.0.0 / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 / tcp src spec 8010 src mask 65520 dst spec 8017 dst mask 0 / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 00:11:22:33:44:55 dst mask 00:00:00:00:00:00 / ipv4 / tcp / end actions drop / end\"],\n+ \"full mask\" : [\n+ \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.255 dst spec 192.168.0.2 dst mask 255.255.255.255 / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.255 dst spec 192.168.1.2 dst mask 255.255.255.255 / tcp src spec 8010 src mask 65535 dst spec 8017 dst mask 65535 / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.1 src mask 255.255.255.255 dst spec 192.168.2.2 dst mask 255.255.255.0 / udp src spec 8010 src mask 65520 dst spec 8017 dst mask 65535 / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.1 src mask 255.255.255.255 dst spec 192.168.2.2 dst mask 255.255.255.255 / sctp src spec 8012 src mask 65535 dst spec 8018 dst mask 65535 / end actions drop / end\"],\n+ }\n+ # all the rules failed to be created\n+ self.create_acl_filter_rule(rules[\"only spec/mask\"], check_stats=False)\n+ self.check_filter_rule_list(0, [])\n+ self.create_acl_filter_rule(rules[\"all 0 mask\"], check_stats=False)\n+ self.check_filter_rule_list(0, [])\n+ # full mask rules are created as switch rules\n+ self.create_acl_filter_rule(rules[\"full mask\"], check_stats=False)\n+ self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 15)\n+ # inconsistent spec and mask rules\n+ rule_list1 = self.create_acl_filter_rule(rules[\"inconsistent spec and mask\"], check_stats=True)\n+ self.check_filter_rule_list(0, rule_list1)\n+ packet1 = [\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\",dst=\"0.0.0.0\")/(\"X\"*480)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.1\",dst=\"192.168.0.2\")/TCP(sport=22,dport=0)/(\"X\"*480)' % vf1_mac]\n+ out1 = self.send_pkts_getouput(pkts=packet1)\n+ rfc.check_drop(out1, pkt_num=2, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+ self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 15)\n+ # acl rules combined \"0\" mask and not \"0\" mask\n+ rule_list2 = self.create_acl_filter_rule(rules[\"acl rules\"], check_stats=True)\n+ self.check_filter_rule_list(0, rule_list2)\n+ packet2 = [\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.1\",dst=\"192.168.1.2\")/(\"X\"*480)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\",dst=\"192.168.0.2\")/TCP(sport=8012,dport=23)/(\"X\"*480)' % vf1_mac,\n+ 'Ether(src=\"00:11:22:33:44:55\",dst=\"%s\")/IP(src=\"192.168.1.1\",dst=\"192.168.0.2\")/TCP(sport=22,dport=23)/(\"X\"*480)' % vf1_mac]\n+ out2 = self.send_pkts_getouput(pkts=packet2)\n+ rfc.check_drop(out2, pkt_num=3, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+ def test_max_entry_num_combined_pattern(self):\n+ \"\"\"\n+ the max ACL entry number combined two patterns.\n+ \"\"\"\n+ src_file = 'max_entry_num'\n+ flows=open(self.src_file_dir + src_file,mode='w')\n+ count=0\n+ for i in range(64):\n+ flows.write('flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.%d src mask 255.255.255.0 / end actions drop / end \\n' % i)\n+ count=count+1\n+ for i in range(256):\n+ flows.write('flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.%d src mask 255.255.255.254 / tcp / end actions drop / end \\n' % i)\n+ count=count+1\n+ flows.close()\n+ self.verify(count == 320, \"failed to config 320 acl rules.\")\n+ self.dut.session.copy_file_to(self.src_file_dir + src_file, self.dut_file_dir)\n+\n+ # start testpmd with creating 512 ACL rules\n+ param = \" --cmdline-file=%s\" % (self.dut_file_dir + src_file)\n+ out_testpmd = self.launch_testpmd(param)\n+ self.check_dcf_status(out_testpmd, stats=True)\n+ rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+ self.verify(\"319\" in rule_list, \"320 rules failed to be created\")\n+\n+ # create one more ACl rule failed, it is created as a switch rule.\n+ rule = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.255 src mask 255.255.255.254 / tcp / end actions drop / end\"\n+ self.create_acl_filter_rule(rule, check_stats=False)\n+\n+ # delete one ACL rule, create the rule again, it is created as an ACL rule successfully.\n+ self.dut.send_expect(\"flow destroy 0 rule 319\", \"testpmd> \", 15)\n+ rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+ self.verify(\"319\" not in rule_list, \"rule 319 is not deleted\")\n+ self.create_acl_filter_rule(rule, check_stats=True)\n+ # delete the switch rule\n+ self.dut.send_expect(\"flow destroy 0 rule 320\", \"testpmd> \", 15)\n+ # send and check match packets\n+ packet = 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.2.255\", dst=\"192.168.0.2\")/TCP(sport=22, dport=23)/Raw(load=\"x\"*30)' % vf1_mac\n+ out1 = self.send_pkts_getouput(pkts=packet)\n+ rfc.check_drop(out1, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+ # delete all rules, send and check match packets\n+ self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 15)\n+ out1 = self.send_pkts_getouput(pkts=packet)\n+ rfc.check_drop(out1, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+ def test_max_entry_num(self):\n+ \"\"\"\n+ the default entry number is 512\n+ \"\"\"\n+ src_file = 'max_entry_num'\n+ flows=open(self.src_file_dir + src_file,mode='w')\n+ count=0\n+ for i in range(256):\n+ flows.write('flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.%d src mask 255.255.255.254 / tcp / end actions drop / end \\n' % i)\n+ count=count+1\n+ for j in range(255):\n+ flows.write('flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.%d src mask 255.255.255.254 / tcp / end actions drop / end \\n' % j)\n+ count=count+1\n+ flows.close()\n+ self.verify(count == 511, \"failed to config 511 acl rules.\")\n+ self.dut.session.copy_file_to(self.src_file_dir + src_file, self.dut_file_dir)\n+\n+ # start testpmd with creating 512 ACL rules\n+ param = \" --cmdline-file=%s\" % (self.dut_file_dir + src_file)\n+ out_testpmd = self.launch_testpmd(param)\n+ self.check_dcf_status(out_testpmd, stats=True)\n+ rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+ self.verify(\"510\" in rule_list, \"511 rules failed to be created\")\n+\n+ # create a switch rule\n+ rule = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.255 src mask 255.255.255.255 / tcp / end actions drop / end\"\n+ self.create_other_filter_rule(rule, check_stats=True)\n+\n+ # create the 512 ACl rule\n+ rule1 = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.255 src mask 255.255.255.254 / tcp / end actions drop / end\"\n+ self.create_acl_filter_rule(rule1, check_stats=True)\n+ rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+ self.verify(\"512\" in rule_list, \"the last ACL rule failed to be created\")\n+\n+ # send and check match packets\n+ packet1 = 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.2.255\", dst=\"192.168.0.2\")/TCP(sport=22, dport=23)/Raw(load=\"x\"*30)' % vf1_mac\n+ out1 = self.send_pkts_getouput(pkts=packet1)\n+ rfc.check_drop(out1, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+ # create one more ACl rule\n+ rule2 = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.3.255 src mask 255.255.255.254 / tcp / end actions drop / end\"\n+ self.create_acl_filter_rule(rule2, check_stats=False)\n+ # send and check match packets\n+ packet2 = 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.3.255\", dst=\"192.168.0.2\")/TCP(sport=22, dport=23)/Raw(load=\"x\"*30)' % vf1_mac\n+ out2 = self.send_pkts_getouput(pkts=packet2)\n+ rfc.check_drop(out2, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+ # delete one rule, create the rule again, successfully.\n+ self.dut.send_expect(\"flow destroy 0 rule 512\", \"testpmd> \", 15)\n+ rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+ self.verify(\"512\" not in rule_list, \"rule 512 is not deleted\")\n+ self.create_acl_filter_rule(rule2, check_stats=True)\n+ # send and check match packets\n+ out3 = self.send_pkts_getouput(pkts=packet2)\n+ rfc.check_drop(out3, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+ # delete all rules, send and check match packets\n+ self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 15)\n+ out4 = self.send_pkts_getouput(pkts=packet2)\n+ rfc.check_drop(out4, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+ def test_max_entry_num_ipv4_other(self):\n+ \"\"\"\n+ create ipv4-other rules, 128 rules can be created at most.\n+ \"\"\"\n+ src_file = 'max_entry_num_ipv4_other'\n+ flows=open(self.src_file_dir + src_file,mode='w')\n+ count=0\n+ for i in range(127):\n+ flows.write('flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 dst spec 192.168.0.%d dst mask 255.255.255.254 / end actions drop / end \\n' % i)\n+ count=count+1\n+ flows.close()\n+ self.verify(count == 127, \"failed to config 127 acl rules.\")\n+ self.dut.session.copy_file_to(self.src_file_dir + src_file, self.dut_file_dir)\n+\n+ # start testpmd with creating 128 ACL rules\n+ param = \" --cmdline-file=%s\" % (self.dut_file_dir + src_file)\n+ out_testpmd = self.launch_testpmd(param)\n+ self.check_dcf_status(out_testpmd, stats=True)\n+ rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+ self.verify(\"126\" in rule_list, \"127 rules failed to be created\")\n+\n+ # create one switch rule\n+ rule = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 dst spec 192.168.2.100 dst mask 255.255.255.255 / end actions drop / end\"\n+ self.create_other_filter_rule(rule, check_stats=True)\n+\n+ # create the 128th ACl rule\n+ rule1 = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 dst spec 192.168.0.127 dst mask 255.255.255.254 / end actions drop / end\"\n+ self.create_acl_filter_rule(rule1, check_stats=True)\n+\n+ # create one more ACl rule\n+ rule2 = \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 dst spec 192.168.1.128 dst mask 255.255.255.254 / end actions drop / end\"\n+ self.create_acl_filter_rule(rule2, check_stats=False)\n+\n+ # delete one rule, create the rule again, successfully.\n+ self.dut.send_expect(\"flow destroy 0 rule 128\", \"testpmd> \", 15)\n+ rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+ self.verify(\"128\" not in rule_list, \"rule 128 is not deleted\")\n+ self.create_acl_filter_rule(rule2, check_stats=True)\n+ # delete switch rule\n+ self.dut.send_expect(\"flow destroy 0 rule 129\", \"testpmd> \", 15)\n+ rule_list = self.dut.send_expect(\"flow list 0\", \"testpmd> \", 15)\n+ self.verify(\"129\" not in rule_list, \"rule 129 is not deleted\")\n+\n+ # send and check match packets\n+ packet = 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.128\")/Raw(load=\"x\"*30)' % vf1_mac\n+ out1 = self.send_pkts_getouput(pkts=packet)\n+ rfc.check_drop(out1, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+ # delete all rules, send and check match packets\n+ self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 60)\n+ out1 = self.send_pkts_getouput(pkts=packet)\n+ rfc.check_drop(out1, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+ def test_multirules_diff_pattern_inputset(self):\n+ \"\"\"\n+ create rules with different patterns or inputset step by step.\n+ \"\"\"\n+ out_testpmd = self.launch_testpmd()\n+ self.check_dcf_status(out_testpmd, stats=True)\n+ rules = [\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.0.255 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.0 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.1 dst mask 255.255.255.0 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.3 src mask 255.255.0.255 / udp / end actions drop / end'\n+ ]\n+ packets = [\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.3.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.3\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.3.3\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.3.3\", dst=\"192.168.1.2\")/UDP(sport=8012, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac\n+ ]\n+\n+ self.create_acl_filter_rule(rules[0], check_stats=True)\n+ out_drop = self.send_pkts_getouput(pkts=packets[0])\n+ rfc.check_drop(out_drop, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+ out_receive = self.send_pkts_getouput(pkts=packets[1:5])\n+ rfc.check_drop(out_receive, pkt_num=4, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+ # same input set field, same spec, different mask.\n+ self.create_acl_filter_rule(rules[1], check_stats=True)\n+ out_drop = self.send_pkts_getouput(pkts=packets[0:2])\n+ rfc.check_drop(out_drop, pkt_num=2, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+ out_receive = self.send_pkts_getouput(pkts=packets[2:5])\n+ rfc.check_drop(out_receive, pkt_num=3, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+ # same input set field, different spec, same mask.\n+ self.create_acl_filter_rule(rules[2], check_stats=True)\n+ out_drop = self.send_pkts_getouput(pkts=packets[0:3])\n+ rfc.check_drop(out_drop, pkt_num=3, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+ out_receive = self.send_pkts_getouput(pkts=packets[3:5])\n+ rfc.check_drop(out_receive, pkt_num=2, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+ # same pattern, different input set field.\n+ self.create_acl_filter_rule(rules[3], check_stats=True)\n+ out_drop = self.send_pkts_getouput(pkts=packets[0:4])\n+ rfc.check_drop(out_drop, pkt_num=4, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+ out_receive = self.send_pkts_getouput(pkts=packets[4])\n+ rfc.check_drop(out_receive, pkt_num=1, check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+ # different pattern, same input set field.\n+ self.create_acl_filter_rule(rules[4], check_stats=True)\n+ out_drop = self.send_pkts_getouput(pkts=packets[0:5])\n+ rfc.check_drop(out_drop, pkt_num=5, check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+ def test_multirules_all_pattern(self):\n+ \"\"\"\n+ create multirules for all patterns\n+ \"\"\"\n+ out_testpmd = self.launch_testpmd()\n+ self.check_dcf_status(out_testpmd, stats=True)\n+ rules = [\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.0 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 / tcp src spec 8010 src mask 65520 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 / tcp dst spec 8017 dst mask 65520 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / tcp / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.254 / tcp / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / tcp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 / udp src spec 8017 src mask 65520 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 / udp dst spec 8010 dst mask 65520 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.254.255 / udp / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.254.255 / udp / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / udp src spec 8017 src mask 65520 dst spec 8010 dst mask 65520 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / sctp / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.2 dst mask 255.255.255.254 / sctp / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 / sctp src spec 8010 src mask 65520 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 / sctp dst spec 8010 dst mask 65520 / end actions drop / end',\n+ 'flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / sctp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end'\n+ ]\n+ rule_list = self.create_acl_filter_rule(rules, check_stats=True)\n+ self.check_filter_rule_list(0, rule_list)\n+ packets = {\n+ \"drop\": [\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=8012, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=7985, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.1.2\")/TCP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.3\")/TCP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.1.2\")/TCP(sport=8012, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=8017, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/UDP(sport=7985, dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.3\")/UDP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.1.2\")/UDP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.1.2\")/UDP(sport=8018, dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.0\", dst=\"192.168.0.3\")/UDP(sport=8012, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=8012, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/SCTP(sport=7985, dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.3\")/SCTP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.1\", dst=\"192.168.1.2\")/SCTP(sport=7984, dport=7985)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.0.3\", dst=\"192.168.1.2\")/SCTP(sport=8012, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac],\n+ \"receive\": [\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.1.2\")/TCP(sport=8018, dport=8012)/Raw(load=\"x\"*30)' % vf1_mac,\n+ 'Ether(dst=\"%s\")/IP(src=\"192.168.1.0\", dst=\"192.168.1.3\")/SCTP(sport=8017, dport=8018)/Raw(load=\"x\"*30)' % vf1_mac]\n+ }\n+ out_drop = self.send_pkts_getouput(pkts=packets[\"drop\"])\n+ rfc.check_drop(out_drop, pkt_num=len(packets[\"drop\"]), check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+ out_receive = self.send_pkts_getouput(pkts=packets[\"receive\"])\n+ rfc.check_drop(out_receive, pkt_num=len(packets[\"receive\"]), check_param={\"port_id\": 1, \"drop\": 1}, stats=False)\n+\n+ def test_multi_rteflow_rules(self):\n+ \"\"\"\n+ create switch, acl and fdir rules simultaneously.\n+ \"\"\"\n+ param = \" --rxq=16 --txq=16\"\n+ out_testpmd = self.launch_testpmd(param)\n+ self.check_dcf_status(out_testpmd, stats=True)\n+ rules = {\n+ \"switch\": [\n+ \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.3 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 src is 192.168.0.4 dst is 192.168.0.20 / tcp / end actions vf id 1 / end\"],\n+ \"acl\": [\n+ \"flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.255.255.254 / tcp / end actions drop / end\",\n+ \"flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.21 dst mask 255.255.0.255 / tcp / end actions drop / end\"],\n+ \"fdir\": [\n+ \"flow create 1 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\",\n+ \"flow create 1 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\",\n+ \"flow create 1 ingress pattern eth / ipv4 src is 192.168.1.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end\"]\n+ }\n+ switch_rule_list = self.create_other_filter_rule(rules[\"switch\"], check_stats=True)\n+ self.check_filter_rule_list(0, switch_rule_list)\n+ acl_rule_list = self.create_acl_filter_rule(rules[\"acl\"], check_stats=True)\n+ self.check_filter_rule_list(0, switch_rule_list+acl_rule_list)\n+ fdir_rule_list = self.create_other_filter_rule(rules[\"fdir\"], check_stats=True)\n+ self.check_filter_rule_list(1, fdir_rule_list)\n+\n+ packets = {\n+ \"drop\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.2\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.21\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)' % vf1_mac],\n+ \"mark\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"%s\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)' % vf1_mac],\n+ \"rss\": [\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.1\", dst=\"192.168.0.20\")/TCP(sport=32,dport=33)/Raw(load=\"x\"*30)',\n+ 'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.4\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)'],\n+ \"noreceived\": 'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)'\n+ }\n+\n+ out_drop = self.send_pkts_getouput(pkts=packets[\"drop\"])\n+ rfc.check_drop(out_drop, pkt_num=len(packets[\"drop\"]), check_param={\"port_id\": 1, \"drop\": 1}, stats=True)\n+\n+ out_mark = self.send_pkts_getouput(pkts=packets[\"mark\"])\n+ rfc.check_iavf_fdir_mark(out_mark, pkt_num=len(packets[\"mark\"]), check_param={\"port_id\": 1, \"queue\": 3, \"mark_id\": 0})\n+\n+ out_rss = self.send_pkts_getouput(pkts=packets[\"rss\"])\n+ rfc.check_iavf_fdir_mark(out_rss, pkt_num=len(packets[\"rss\"]), check_param={\"port_id\": 1, \"passthru\": 1})\n+\n+ out_noreceived = self.send_pkts_getouput(pkts=packets[\"noreceived\"])\n+ rfc.check_iavf_fdir_mark(out_noreceived, pkt_num=0, check_param={\"port_id\": 1, \"passthru\": 1})\n+\n+ self.dut.send_expect(\"flow destroy 0 rule 4\", \"testpmd> \", 15)\n+\n+ packets = {\n+ \"mark\": 'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.2\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)',\n+ \"rss\": 'Ether(src=\"00:11:22:33:44:55\", dst=\"00:01:23:45:67:88\")/IP(src=\"192.168.0.3\", dst=\"192.168.0.20\")/TCP(sport=22,dport=23)/Raw(load=\"x\"*30)'\n+ }\n+\n+ out_mark = self.send_pkts_getouput(pkts=packets[\"mark\"])\n+ rfc.check_iavf_fdir_mark(out_mark, pkt_num=1, check_param={\"port_id\": 1, \"queue\": 3, \"mark_id\": 0})\n+\n+ out_rss = self.send_pkts_getouput(pkts=packets[\"rss\"])\n+ rfc.check_iavf_fdir_mark(out_rss, pkt_num=1, check_param={\"port_id\": 1, \"passthru\": 1})\n+\n+ def check_dcf_status(self, out_testpmd, stats=True):\n+ \"\"\"\n+ check if request for DCF is accepted.\n+ \"\"\"\n+ if stats:\n+ self.verify(\"Failed to init DCF parent adapter\" not in out_testpmd, \"request for DCF is rejected.\")\n+ out_portinfo = self.dut.send_expect(\"show port info 0\", \"testpmd> \", 15)\n+ self.verify(\"net_ice_dcf\" in out_portinfo, \"request for DCF is rejected.\")\n+ else:\n+ self.verify(\"Failed to init DCF parent adapter\" in out_testpmd, \"request for DCF is accepted.\")\n+ out_portinfo = self.dut.send_expect(\"show port info 0\", \"testpmd> \", 15)\n+ self.verify(\"net_ice_dcf\" not in out_portinfo, \"request for DCF is accepted.\")\n+ def quit_testpmd(self):\n+ \"\"\"\n+ quit testpmd\n+ \"\"\"\n+ if self.testpmd_status != \"close\":\n+ # destroy all flow rules on DCF\n+ self.dut.send_expect(\"flow flush 0\", \"testpmd> \", 15)\n+ self.dut.send_expect(\"clear port stats all\", \"testpmd> \", 15)\n+ self.dut.send_expect(\"quit\", \"#\", 30)\n+ #kill all DPDK application\n+ self.dut.kill_all()\n+ self.testpmd_status = \"close\"\n+\n+ def test_mutually_exclusive(self):\n+ \"\"\"\n+ DCF mode and any ACL filters (not added by DCF) shall be mutually exclusive\n+ \"\"\"\n+ self.dut.kill_all()\n+ self.session_secondary = self.dut.new_session()\n+\n+ # add ACL rule by kernel, reject request for DCF functionality\n+ self.add_acl_rule_not_by_dcf(self.pf0_intf, stats=True)\n+ out_testpmd = self.launch_testpmd()\n+ self.check_dcf_status(out_testpmd, stats=False)\n+ self.quit_testpmd()\n+ self.delete_acl_rule_not_added_by_dcf()\n+ out_testpmd = self.launch_testpmd()\n+ self.check_dcf_status(out_testpmd, stats=True)\n+ self.quit_testpmd()\n+\n+ # add ACL rule by kernel, accept request for DCF functionality of another PF\n+ self.add_acl_rule_not_by_dcf(self.pf1_intf, stats=True)\n+ out_testpmd = self.launch_testpmd()\n+ self.check_dcf_status(out_testpmd, stats=True)\n+ self.quit_testpmd()\n+ self.delete_acl_rule_not_added_by_dcf()\n+\n+ # ACL DCF mode is active, add ACL filters by way of host based configuration is rejected\n+ out_testpmd = self.launch_testpmd()\n+ self.check_dcf_status(out_testpmd, stats=True)\n+ self.add_acl_rule_not_by_dcf(self.pf0_intf, stats=False)\n+ self.quit_testpmd()\n+ self.add_acl_rule_not_by_dcf(self.pf0_intf, stats=True)\n+ self.delete_acl_rule_not_added_by_dcf()\n+\n+ # ACL DCF mode is active, add ACL filters by way of host based configuration on another PF successfully\n+ out_testpmd = self.launch_testpmd()\n+ self.check_dcf_status(out_testpmd, stats=True)\n+ self.add_acl_rule_not_by_dcf(self.pf1_intf, stats=True)\n+ self.quit_testpmd()\n+ self.delete_acl_rule_not_added_by_dcf()\n+\n+ def add_acl_rule_not_by_dcf(self, pf, stats=True):\n+ \"\"\"\n+ use secondary session\n+ add acl rule by kernel command\n+ \"\"\"\n+ if stats:\n+ self.session_secondary.send_expect(\"ethtool -N %s flow-type tcp4 src-ip 192.168.10.0 m 0.255.255.255 dst-port 8000 m 0x00ff action -1\" % pf, \"# \")\n+ else:\n+ error_info = \"rmgr: Cannot insert RX class rule: No such file or directory\"\n+ self.session_secondary.send_expect(\"ethtool -N %s flow-type tcp4 src-ip 192.168.10.0 m 0.255.255.255 dst-port 8000 m 0x00ff action -1\" % pf, error_info)\n+\n+\n+ def delete_acl_rule_not_added_by_dcf(self):\n+ \"\"\"\n+ delete all the acl rule added not by DCF\n+ \"\"\"\n+ out_pf0 = self.dut.send_expect(\"ethtool -n %s\" % (self.pf0_intf), \"# \")\n+ out_pf1 = self.dut.send_expect(\"ethtool -n %s\" % (self.pf1_intf), \"# \")\n+\n+ p = re.compile(r\"Filter: (\\d+)\")\n+ m0 = p.search(out_pf0)\n+ m1 = p.search(out_pf1)\n+ if m0:\n+ self.dut.send_expect(\"ethtool -N %s delete %d\" % (self.pf0_intf, int(m0.group(1))), \"# \")\n+ self.dut.send_expect(\"ethtool -n %s\" % (self.pf0_intf), \"Total 0 rules\")\n+ if m1:\n+ self.dut.send_expect(\"ethtool -N %s delete %d\" % (self.pf1_intf, int(m1.group(1))), \"# \")\n+ self.dut.send_expect(\"ethtool -n %s\" % (self.pf1_intf), \"Total 0 rules\")\n+\n+ def tear_down(self):\n+ \"\"\"\n+ Run after each test case.\n+ \"\"\"\n+ self.quit_testpmd()\n+ if getattr(self, 'session_secondary', None):\n+ self.dut.close_session(self.session_secondary)\n+ self.delete_acl_rule_not_added_by_dcf()\n+\n+ def tear_down_all(self):\n+ \"\"\"\n+ Run after each test suite.\n+ \"\"\"\n+ self.dut.kill_all()\n", "prefixes": [ "v1" ] }{ "id": 84652, "url": "