@@ -106,6 +106,7 @@ SRCS-y += test_table_tables.c
SRCS-y += test_table_ports.c
SRCS-y += test_table_combined.c
SRCS-$(CONFIG_RTE_LIBRTE_ACL) += test_table_acl.c
+SRCS-$(CONFIG_RTE_LIBRTE_ACL) += test_flow_classify.c
endif
SRCS-y += test_rwlock.c
new file mode 100644
@@ -0,0 +1,493 @@
+/*-
+ * BSD LICENSE
+ *
+ * Copyright(c) 2017 Intel Corporation. All rights reserved.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * * Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * * Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in
+ * the documentation and/or other materials provided with the
+ * distribution.
+ * * Neither the name of Intel Corporation nor the names of its
+ * contributors may be used to endorse or promote products derived
+ * from this software without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <string.h>
+#include <errno.h>
+
+#include "test.h"
+
+#include <rte_string_fns.h>
+#include <rte_mbuf.h>
+#include <rte_byteorder.h>
+#include <rte_ip.h>
+#include <rte_acl.h>
+#include <rte_common.h>
+#include <rte_table_acl.h>
+#include <rte_flow.h>
+#include <rte_flow_classify.h>
+
+#include "packet_burst_generator.h"
+#include "test_flow_classify.h"
+
+
+#define FLOW_CLASSIFY_MAX_RULE_NUM 100
+static void *table_acl;
+static uint32_t entry_size;
+
+/*
+ * test functions by passing invalid or
+ * non-workable parameters.
+ */
+static int
+test_invalid_parameters(void)
+{
+ struct rte_flow_classify *classify;
+ int ret;
+
+ ret = rte_flow_classify_validate(NULL, NULL, NULL, NULL, NULL);
+ if (!ret) {
+ printf("Line %i: flow_classify_validate", __LINE__);
+ printf(" with NULL param should have failed!\n");
+ return -1;
+ }
+
+ classify = rte_flow_classify_create(NULL, 0, NULL, NULL, NULL, NULL);
+ if (classify) {
+ printf("Line %i: flow_classify_create", __LINE__);
+ printf(" with NULL param should have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_destroy(NULL, NULL, NULL);
+ if (!ret) {
+ printf("Line %i: flow_classify_destroy", __LINE__);
+ printf(" with NULL param should have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_query(NULL, NULL, NULL, 0, NULL, NULL);
+ if (!ret) {
+ printf("Line %i: flow_classify_query", __LINE__);
+ printf(" with NULL param should have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_validate(NULL, NULL, NULL, NULL, &error);
+ if (!ret) {
+ printf("Line %i: flow_classify_validate", __LINE__);
+ printf(" with NULL param should have failed!\n");
+ return -1;
+ }
+
+ classify = rte_flow_classify_create(NULL, 0, NULL, NULL, NULL, &error);
+ if (classify) {
+ printf("Line %i: flow_classify_create ", __LINE__);
+ printf("with NULL param should have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_destroy(NULL, NULL, &error);
+ if (!ret) {
+ printf("Line %i: flow_classify_destroy", __LINE__);
+ printf("with NULL param should have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_query(NULL, NULL, NULL, 0, NULL, &error);
+ if (!ret) {
+ printf("Line %i: flow_classify_query", __LINE__);
+ printf(" with NULL param should have failed!\n");
+ return -1;
+ }
+ return 0;
+}
+
+static int
+test_valid_parameters(void)
+{
+ struct rte_flow_classify *flow_classify;
+ int ret;
+
+ /* set up parameters for rte_flow_classify_validate and
+ * rte_flow_classify_create and rte_flow_classify_destroy
+ */
+
+ attr.ingress = 1;
+ attr.priority = 1;
+ pattern_udp_1[0] = eth_item;
+ pattern_udp_1[1] = ipv4_udp_item_1;
+ pattern_udp_1[2] = udp_item_1;
+ pattern_udp_1[3] = end_item;
+ actions[0] = count_action;
+ actions[1] = end_action;
+
+ ret = rte_flow_classify_validate(table_acl, &attr,
+ pattern_udp_1, actions, &error);
+ if (ret) {
+ printf("Line %i: flow_classify_validate", __LINE__);
+ printf(" should not have failed!\n");
+ return -1;
+ }
+
+ flow_classify = rte_flow_classify_create(table_acl, entry_size, &attr,
+ pattern_udp_1, actions, &error);
+ if (!flow_classify) {
+ printf("Line %i: flow_classify_create", __LINE__);
+ printf(" should not have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_destroy(table_acl, flow_classify, &error);
+ if (ret) {
+ printf("Line %i: flow_classify_destroy", __LINE__);
+ printf(" should not have failed!\n");
+ return -1;
+ }
+ return 0;
+}
+
+static int
+test_invalid_patterns(void)
+{
+ struct rte_flow_classify *flow_classify;
+ int ret;
+
+ /* set up parameters for rte_flow_classify_validate and
+ * rte_flow_classify_create and rte_flow_classify_destroy
+ */
+
+ attr.ingress = 1;
+ attr.priority = 1;
+ pattern_udp_1[0] = eth_item_bad;
+ pattern_udp_1[1] = ipv4_udp_item_1;
+ pattern_udp_1[2] = udp_item_1;
+ pattern_udp_1[3] = end_item;
+ actions[0] = count_action;
+ actions[1] = end_action;
+
+ ret = rte_flow_classify_validate(table_acl, &attr,
+ pattern_udp_1, actions, &error);
+ if (!ret) {
+ printf("Line %i: flow_classify_validate", __LINE__);
+ printf(" should have failed!\n");
+ return -1;
+ }
+
+ pattern_udp_1[0] = eth_item;
+ pattern_udp_1[1] = ipv4_udp_item_bad;
+ flow_classify = rte_flow_classify_create(table_acl, entry_size, &attr,
+ pattern_udp_1, actions, &error);
+ if (flow_classify) {
+ printf("Line %i: flow_classify_create", __LINE__);
+ printf(" should have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_destroy(table_acl, flow_classify, &error);
+ if (!ret) {
+ printf("Line %i: flow_classify_destroy", __LINE__);
+ printf(" should have failed!\n");
+ return -1;
+ }
+
+ pattern_udp_1[1] = ipv4_udp_item_1;
+ pattern_udp_1[2] = udp_item_bad;
+ ret = rte_flow_classify_validate(table_acl, &attr,
+ pattern_udp_1, actions, &error);
+ if (!ret) {
+ printf("Line %i: flow_classify_validate", __LINE__);
+ printf(" should have failed!\n");
+ return -1;
+ }
+
+ pattern_udp_1[2] = udp_item_1;
+ pattern_udp_1[3] = end_item_bad;
+ flow_classify = rte_flow_classify_create(table_acl, entry_size, &attr,
+ pattern_udp_1, actions, &error);
+ if (flow_classify) {
+ printf("Line %i: flow_classify_create", __LINE__);
+ printf(" should have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_destroy(table_acl, flow_classify, &error);
+ if (!ret) {
+ printf("Line %i: flow_classify_destroy", __LINE__);
+ printf(" should have failed!\n");
+ return -1;
+ }
+ return 0;
+}
+
+static int
+test_invalid_actions(void)
+{
+ struct rte_flow_classify *flow_classify;
+ int ret;
+
+ /* set up parameters for rte_flow_classify_validate and
+ * rte_flow_classify_create and rte_flow_classify_destroy
+ */
+
+ attr.ingress = 1;
+ attr.priority = 1;
+ pattern_udp_1[0] = eth_item;
+ pattern_udp_1[1] = ipv4_udp_item_1;
+ pattern_udp_1[2] = udp_item_1;
+ pattern_udp_1[3] = end_item;
+ actions[0] = count_action_bad;
+ actions[1] = end_action;
+
+ ret = rte_flow_classify_validate(table_acl, &attr,
+ pattern_udp_1, actions, &error);
+ if (!ret) {
+ printf("Line %i: flow_classify_validate", __LINE__);
+ printf(" should have failed!\n");
+ return -1;
+ }
+
+ flow_classify = rte_flow_classify_create(table_acl, entry_size, &attr,
+ pattern_udp_1, actions, &error);
+ if (flow_classify) {
+ printf("Line %i: flow_classify_create", __LINE__);
+ printf(" should have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_destroy(table_acl, flow_classify, &error);
+ if (!ret) {
+ printf("Line %i: flow_classify_destroy", __LINE__);
+ printf(" should have failed!\n");
+ return -1;
+ }
+
+ actions[0] = count_action;
+ actions[1] = end_action_bad;
+ ret = rte_flow_classify_validate(table_acl, &attr,
+ pattern_udp_1, actions, &error);
+ if (!ret) {
+ printf("Line %i: flow_classify_validate", __LINE__);
+ printf(" should have failed!\n");
+ return -1;
+ }
+
+ flow_classify = rte_flow_classify_create(table_acl, entry_size, &attr,
+ pattern_udp_1, actions, &error);
+ if (flow_classify) {
+ printf("Line %i: flow_classify_create", __LINE__);
+ printf(" should have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_destroy(table_acl, flow_classify, &error);
+ if (!ret) {
+ printf("Line %i: flow_classify_destroy", __LINE__);
+ printf("should have failed!\n");
+ return -1;
+ }
+ return 0;
+}
+
+static int
+init_udp_ipv4_traffic(struct rte_mempool *mp,
+ struct rte_mbuf **pkts_burst, uint32_t burst_size)
+{
+ struct ether_hdr pkt_eth_hdr;
+ struct ipv4_hdr pkt_ipv4_hdr;
+ struct udp_hdr pkt_udp_hdr;
+ uint32_t src_addr = IPV4_ADDR(2, 2, 2, 3);
+ uint32_t dst_addr = IPV4_ADDR(2, 2, 2, 7);
+ uint16_t src_port = 32;
+ uint16_t dst_port = 33;
+ uint16_t pktlen;
+
+ static uint8_t src_mac[] = { 0x00, 0xFF, 0xAA, 0xFF, 0xAA, 0xFF };
+ static uint8_t dst_mac[] = { 0x00, 0xAA, 0xFF, 0xAA, 0xFF, 0xAA };
+
+ initialize_eth_header(&pkt_eth_hdr,
+ (struct ether_addr *)src_mac,
+ (struct ether_addr *)dst_mac, ETHER_TYPE_IPv4, 0, 0);
+ pktlen = (uint16_t)(sizeof(struct ether_hdr));
+ printf("ETH pktlen %u\n", pktlen);
+
+ pktlen = initialize_ipv4_header(&pkt_ipv4_hdr, src_addr, dst_addr,
+ pktlen);
+ printf("ETH + IPv4 pktlen %u\n", pktlen);
+
+ pktlen = initialize_udp_header(&pkt_udp_hdr, src_port, dst_port,
+ pktlen);
+ printf("ETH + IPv4 + UDP pktlen %u\n", pktlen);
+
+ return generate_packet_burst(mp, pkts_burst, &pkt_eth_hdr,
+ 0, &pkt_ipv4_hdr, 1,
+ &pkt_udp_hdr, burst_size,
+ PACKET_BURST_GEN_PKT_LEN, 1);
+}
+
+static int
+init_mbufpool(void)
+{
+ int socketid;
+ int ret = 0;
+ unsigned int lcore_id;
+ char s[64];
+
+ for (lcore_id = 0; lcore_id < RTE_MAX_LCORE; lcore_id++) {
+ if (rte_lcore_is_enabled(lcore_id) == 0)
+ continue;
+
+ socketid = rte_lcore_to_socket_id(lcore_id);
+ if (socketid >= NB_SOCKETS) {
+ printf(
+ "Socket %d of lcore %u is out of range %d\n",
+ socketid, lcore_id, NB_SOCKETS);
+ ret = -1;
+ break;
+ }
+ if (mbufpool[socketid] == NULL) {
+ snprintf(s, sizeof(s), "mbuf_pool_%d", socketid);
+ mbufpool[socketid] =
+ rte_pktmbuf_pool_create(s, NB_MBUF,
+ MEMPOOL_CACHE_SIZE, 0, MBUF_SIZE,
+ socketid);
+ if (mbufpool[socketid]) {
+ printf("Allocated mbuf pool on socket %d\n",
+ socketid);
+ } else {
+ printf("Cannot init mbuf pool on socket %d\n",
+ socketid);
+ ret = -ENOMEM;
+ break;
+ }
+ }
+ }
+ return ret;
+}
+
+static int
+test_query_udp(void)
+{
+ struct rte_flow_error error;
+ struct rte_flow_classify *flow_classify;
+ int ret;
+ int i;
+
+ ret = init_udp_ipv4_traffic(mbufpool[0], bufs, MAX_PKT_BURST);
+ if (ret != MAX_PKT_BURST) {
+ printf("Line %i: init_udp_ipv4_traffic has failed!\n",
+ __LINE__);
+ return -1;
+ }
+
+ for (i = 0; i < MAX_PKT_BURST; i++)
+ bufs[i]->packet_type = RTE_PTYPE_L3_IPV4;
+
+ /* set up parameters for rte_flow_classify_validate and
+ * rte_flow_classify_create and rte_flow_classify_destroy
+ */
+
+ attr.ingress = 1;
+ attr.priority = 1;
+ pattern_udp_1[0] = eth_item;
+ pattern_udp_1[1] = ipv4_udp_item_1;
+ pattern_udp_1[2] = udp_item_1;
+ pattern_udp_1[3] = end_item;
+ actions[0] = count_action;
+ actions[1] = end_action;
+
+ ret = rte_flow_classify_validate(table_acl, &attr,
+ pattern_udp_1, actions, &error);
+ if (ret) {
+ printf("Line %i: flow_classify_validate", __LINE__);
+ printf(" should not have failed!\n");
+ return -1;
+ }
+
+ flow_classify = rte_flow_classify_create(table_acl, entry_size, &attr,
+ pattern_udp_1, actions, &error);
+ if (!flow_classify) {
+ printf("Line %i: flow_classify_create", __LINE__);
+ printf(" should not have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_query(table_acl, flow_classify, bufs,
+ MAX_PKT_BURST, &udp_classify_stats, &error);
+ if (ret) {
+ printf("Line %i: flow_classify_query", __LINE__);
+ printf(" should not have failed!\n");
+ return -1;
+ }
+
+ ret = rte_flow_classify_destroy(table_acl, flow_classify, &error);
+ if (ret) {
+ printf("Line %i: flow_classify_destroy", __LINE__);
+ printf(" should not have failed!\n");
+ return -1;
+ }
+ return 0;
+}
+
+static int
+test_flow_classify(void)
+{
+ struct rte_table_acl_params table_acl_params;
+ int socket_id = 0;
+ int ret;
+
+ /* initialise ACL table params */
+ table_acl_params.n_rule_fields = RTE_DIM(ipv4_defs);
+ table_acl_params.name = "table_acl_ipv4_5tuple";
+ table_acl_params.n_rules = FLOW_CLASSIFY_MAX_RULE_NUM;
+ memcpy(table_acl_params.field_format, ipv4_defs, sizeof(ipv4_defs));
+ entry_size = RTE_ACL_RULE_SZ(RTE_DIM(ipv4_defs));
+
+ table_acl = rte_table_acl_ops.f_create(&table_acl_params, socket_id,
+ entry_size);
+ if (table_acl == NULL) {
+ printf("Line %i: f_create has failed!\n", __LINE__);
+ return -1;
+ }
+ printf("Created table_acl for for IPv4 five tuple packets\n");
+
+ ret = init_mbufpool();
+ if (ret) {
+ printf("Line %i: init_mbufpool has failed!\n", __LINE__);
+ return -1;
+ }
+
+ if (test_invalid_parameters() < 0)
+ return -1;
+ if (test_valid_parameters() < 0)
+ return -1;
+ if (test_invalid_patterns() < 0)
+ return -1;
+ if (test_invalid_actions() < 0)
+ return -1;
+ if (test_query_udp() < 0)
+ return -1;
+
+ return 0;
+}
+
+REGISTER_TEST_COMMAND(flow_classify_autotest, test_flow_classify);
new file mode 100644
@@ -0,0 +1,186 @@
+/*-
+ * BSD LICENSE
+ *
+ * Copyright(c) 2017 Intel Corporation. All rights reserved.
+ * All rights reserved.
+ *
+ * Redistribution and use in source and binary forms, with or without
+ * modification, are permitted provided that the following conditions
+ * are met:
+ *
+ * * Redistributions of source code must retain the above copyright
+ * notice, this list of conditions and the following disclaimer.
+ * * Redistributions in binary form must reproduce the above copyright
+ * notice, this list of conditions and the following disclaimer in
+ * the documentation and/or other materials provided with the
+ * distribution.
+ * * Neither the name of Intel Corporation nor the names of its
+ * contributors may be used to endorse or promote products derived
+ * from this software without specific prior written permission.
+ *
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#ifndef TEST_FLOW_CLASSIFY_H_
+#define TEST_FLOW_CLASSIFY_H_
+
+#define MAX_PKT_BURST (32)
+#define NB_SOCKETS (1)
+#define MEMPOOL_CACHE_SIZE (256)
+#define MBUF_SIZE (512)
+#define NB_MBUF (512)
+
+/* test UDP packets */
+static struct rte_mempool *mbufpool[NB_SOCKETS];
+static struct rte_mbuf *bufs[MAX_PKT_BURST];
+
+/* ACL field definitions for IPv4 5 tuple rule */
+
+enum {
+ PROTO_FIELD_IPV4,
+ SRC_FIELD_IPV4,
+ DST_FIELD_IPV4,
+ SRCP_FIELD_IPV4,
+ DSTP_FIELD_IPV4,
+ NUM_FIELDS_IPV4
+};
+
+enum {
+ PROTO_INPUT_IPV4,
+ SRC_INPUT_IPV4,
+ DST_INPUT_IPV4,
+ SRCP_DESTP_INPUT_IPV4
+};
+
+static struct rte_acl_field_def ipv4_defs[NUM_FIELDS_IPV4] = {
+ /* first input field - always one byte long. */
+ {
+ .type = RTE_ACL_FIELD_TYPE_BITMASK,
+ .size = sizeof(uint8_t),
+ .field_index = PROTO_FIELD_IPV4,
+ .input_index = PROTO_INPUT_IPV4,
+ .offset = sizeof(struct ether_hdr) +
+ offsetof(struct ipv4_hdr, next_proto_id),
+ },
+ /* next input field (IPv4 source address) - 4 consecutive bytes. */
+ {
+ /* rte_flow uses a bit mask for IPv4 addresses */
+ .type = RTE_ACL_FIELD_TYPE_BITMASK,
+ .size = sizeof(uint32_t),
+ .field_index = SRC_FIELD_IPV4,
+ .input_index = SRC_INPUT_IPV4,
+ .offset = sizeof(struct ether_hdr) +
+ offsetof(struct ipv4_hdr, src_addr),
+ },
+ /* next input field (IPv4 destination address) - 4 consecutive bytes. */
+ {
+ /* rte_flow uses a bit mask for IPv4 addresses */
+ .type = RTE_ACL_FIELD_TYPE_BITMASK,
+ .size = sizeof(uint32_t),
+ .field_index = DST_FIELD_IPV4,
+ .input_index = DST_INPUT_IPV4,
+ .offset = sizeof(struct ether_hdr) +
+ offsetof(struct ipv4_hdr, dst_addr),
+ },
+ /*
+ * Next 2 fields (src & dst ports) form 4 consecutive bytes.
+ * They share the same input index.
+ */
+ {
+ /* rte_flow uses a bit mask for protocol ports */
+ .type = RTE_ACL_FIELD_TYPE_BITMASK,
+ .size = sizeof(uint16_t),
+ .field_index = SRCP_FIELD_IPV4,
+ .input_index = SRCP_DESTP_INPUT_IPV4,
+ .offset = sizeof(struct ether_hdr) +
+ sizeof(struct ipv4_hdr) +
+ offsetof(struct tcp_hdr, src_port),
+ },
+ {
+ /* rte_flow uses a bit mask for protocol ports */
+ .type = RTE_ACL_FIELD_TYPE_BITMASK,
+ .size = sizeof(uint16_t),
+ .field_index = DSTP_FIELD_IPV4,
+ .input_index = SRCP_DESTP_INPUT_IPV4,
+ .offset = sizeof(struct ether_hdr) +
+ sizeof(struct ipv4_hdr) +
+ offsetof(struct tcp_hdr, dst_port),
+ },
+};
+
+/* parameters for rte_flow_classify_validate and rte_flow_classify_create */
+
+/* first sample UDP pattern:
+ * "eth / ipv4 src spec 2.2.2.3 src mask 255.255.255.00 dst spec 2.2.2.7
+ * dst mask 255.255.255.00 / udp src is 32 dst is 33 / end"
+ */
+static struct rte_flow_item_ipv4 ipv4_udp_spec_1 = {
+ { 0, 0, 0, 0, 0, 0, 17, 0, IPv4(2, 2, 2, 3), IPv4(2, 2, 2, 7)}
+};
+static const struct rte_flow_item_ipv4 ipv4_mask_24 = {
+ .hdr = {
+ .next_proto_id = 0xff,
+ .src_addr = 0xffffff00,
+ .dst_addr = 0xffffff00,
+ },
+};
+static struct rte_flow_item_udp udp_spec_1 = {
+ { 32, 33, 0, 0 }
+};
+
+static struct rte_flow_item eth_item = { RTE_FLOW_ITEM_TYPE_ETH,
+ 0, 0, 0 };
+static struct rte_flow_item eth_item_bad = { -1, 0, 0, 0 };
+
+static struct rte_flow_item ipv4_udp_item_1 = { RTE_FLOW_ITEM_TYPE_IPV4,
+ &ipv4_udp_spec_1, 0, &ipv4_mask_24};
+static struct rte_flow_item ipv4_udp_item_bad = { RTE_FLOW_ITEM_TYPE_IPV4,
+ NULL, 0, NULL};
+
+static struct rte_flow_item udp_item_1 = { RTE_FLOW_ITEM_TYPE_UDP,
+ &udp_spec_1, 0, &rte_flow_item_udp_mask};
+static struct rte_flow_item udp_item_bad = { RTE_FLOW_ITEM_TYPE_UDP,
+ NULL, 0, NULL};
+
+static struct rte_flow_item end_item = { RTE_FLOW_ITEM_TYPE_END,
+ 0, 0, 0 };
+static struct rte_flow_item end_item_bad = { -1, 0, 0, 0 };
+
+static struct rte_flow_item pattern_udp_1[4];
+
+/* sample actions:
+ * "actions count / end"
+ */
+static struct rte_flow_action count_action = { RTE_FLOW_ACTION_TYPE_COUNT, 0};
+static struct rte_flow_action count_action_bad = { -1, 0};
+
+static struct rte_flow_action end_action = { RTE_FLOW_ACTION_TYPE_END, 0};
+static struct rte_flow_action end_action_bad = { -1, 0};
+
+static struct rte_flow_action actions[2];
+
+/* sample attributes */
+static struct rte_flow_attr attr;
+
+/* sample error */
+static struct rte_flow_error error;
+
+/* flow classify data for UDP burst */
+static struct rte_flow_classify_5tuple_stats udp_ntuple_stats;
+static struct rte_flow_classify_stats udp_classify_stats = {
+ .available_space = MAX_PKT_BURST,
+ .used_space = 0,
+ .stats = (void **)&udp_ntuple_stats
+};
+
+#endif /* TEST_FLOW_CLASSIFY_H_ */