2309 lines
67 KiB
C
2309 lines
67 KiB
C
|
// SPDX-License-Identifier: BSD-3-Clause
|
||
|
/* Copyright (C) 2022 Microchip Technology Inc. and its subsidiaries.
|
||
|
* Microchip VCAP API kunit test suite
|
||
|
*/
|
||
|
|
||
|
#include <kunit/test.h>
|
||
|
#include "vcap_api.h"
|
||
|
#include "vcap_api_client.h"
|
||
|
#include "vcap_model_kunit.h"
|
||
|
|
||
|
/* First we have the test infrastructure that emulates the platform
|
||
|
* implementation
|
||
|
*/
|
||
|
#define TEST_BUF_CNT 100
|
||
|
#define TEST_BUF_SZ 350
|
||
|
#define STREAMWSIZE 64
|
||
|
|
||
|
static u32 test_updateaddr[STREAMWSIZE] = {};
|
||
|
static int test_updateaddridx;
|
||
|
static int test_cache_erase_count;
|
||
|
static u32 test_init_start;
|
||
|
static u32 test_init_count;
|
||
|
static u32 test_hw_counter_id;
|
||
|
static struct vcap_cache_data test_hw_cache;
|
||
|
static struct net_device test_netdev = {};
|
||
|
static int test_move_addr;
|
||
|
static int test_move_offset;
|
||
|
static int test_move_count;
|
||
|
|
||
|
/* Callback used by the VCAP API */
|
||
|
static enum vcap_keyfield_set test_val_keyset(struct net_device *ndev,
|
||
|
struct vcap_admin *admin,
|
||
|
struct vcap_rule *rule,
|
||
|
struct vcap_keyset_list *kslist,
|
||
|
u16 l3_proto)
|
||
|
{
|
||
|
int idx;
|
||
|
|
||
|
if (kslist->cnt > 0) {
|
||
|
switch (admin->vtype) {
|
||
|
case VCAP_TYPE_IS0:
|
||
|
for (idx = 0; idx < kslist->cnt; idx++) {
|
||
|
if (kslist->keysets[idx] == VCAP_KFS_ETAG)
|
||
|
return kslist->keysets[idx];
|
||
|
if (kslist->keysets[idx] == VCAP_KFS_PURE_5TUPLE_IP4)
|
||
|
return kslist->keysets[idx];
|
||
|
if (kslist->keysets[idx] == VCAP_KFS_NORMAL_5TUPLE_IP4)
|
||
|
return kslist->keysets[idx];
|
||
|
if (kslist->keysets[idx] == VCAP_KFS_NORMAL_7TUPLE)
|
||
|
return kslist->keysets[idx];
|
||
|
}
|
||
|
break;
|
||
|
case VCAP_TYPE_IS2:
|
||
|
for (idx = 0; idx < kslist->cnt; idx++) {
|
||
|
if (kslist->keysets[idx] == VCAP_KFS_MAC_ETYPE)
|
||
|
return kslist->keysets[idx];
|
||
|
if (kslist->keysets[idx] == VCAP_KFS_ARP)
|
||
|
return kslist->keysets[idx];
|
||
|
if (kslist->keysets[idx] == VCAP_KFS_IP_7TUPLE)
|
||
|
return kslist->keysets[idx];
|
||
|
}
|
||
|
break;
|
||
|
default:
|
||
|
pr_info("%s:%d: no validation for VCAP %d\n",
|
||
|
__func__, __LINE__, admin->vtype);
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
return -EINVAL;
|
||
|
}
|
||
|
|
||
|
/* Callback used by the VCAP API */
|
||
|
static void test_add_def_fields(struct net_device *ndev,
|
||
|
struct vcap_admin *admin,
|
||
|
struct vcap_rule *rule)
|
||
|
{
|
||
|
if (admin->vinst == 0 || admin->vinst == 2)
|
||
|
vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS, VCAP_BIT_1);
|
||
|
else
|
||
|
vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS, VCAP_BIT_0);
|
||
|
}
|
||
|
|
||
|
/* Callback used by the VCAP API */
|
||
|
static void test_cache_erase(struct vcap_admin *admin)
|
||
|
{
|
||
|
if (test_cache_erase_count) {
|
||
|
memset(admin->cache.keystream, 0, test_cache_erase_count);
|
||
|
memset(admin->cache.maskstream, 0, test_cache_erase_count);
|
||
|
memset(admin->cache.actionstream, 0, test_cache_erase_count);
|
||
|
test_cache_erase_count = 0;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/* Callback used by the VCAP API */
|
||
|
static void test_cache_init(struct net_device *ndev, struct vcap_admin *admin,
|
||
|
u32 start, u32 count)
|
||
|
{
|
||
|
test_init_start = start;
|
||
|
test_init_count = count;
|
||
|
}
|
||
|
|
||
|
/* Callback used by the VCAP API */
|
||
|
static void test_cache_read(struct net_device *ndev, struct vcap_admin *admin,
|
||
|
enum vcap_selection sel, u32 start, u32 count)
|
||
|
{
|
||
|
u32 *keystr, *mskstr, *actstr;
|
||
|
int idx;
|
||
|
|
||
|
pr_debug("%s:%d: %d %d\n", __func__, __LINE__, start, count);
|
||
|
switch (sel) {
|
||
|
case VCAP_SEL_ENTRY:
|
||
|
keystr = &admin->cache.keystream[start];
|
||
|
mskstr = &admin->cache.maskstream[start];
|
||
|
for (idx = 0; idx < count; ++idx) {
|
||
|
pr_debug("%s:%d: keydata[%02d]: 0x%08x\n", __func__,
|
||
|
__LINE__, start + idx, keystr[idx]);
|
||
|
}
|
||
|
for (idx = 0; idx < count; ++idx) {
|
||
|
/* Invert the mask before decoding starts */
|
||
|
mskstr[idx] = ~mskstr[idx];
|
||
|
pr_debug("%s:%d: mskdata[%02d]: 0x%08x\n", __func__,
|
||
|
__LINE__, start + idx, mskstr[idx]);
|
||
|
}
|
||
|
break;
|
||
|
case VCAP_SEL_ACTION:
|
||
|
actstr = &admin->cache.actionstream[start];
|
||
|
for (idx = 0; idx < count; ++idx) {
|
||
|
pr_debug("%s:%d: actdata[%02d]: 0x%08x\n", __func__,
|
||
|
__LINE__, start + idx, actstr[idx]);
|
||
|
}
|
||
|
break;
|
||
|
case VCAP_SEL_COUNTER:
|
||
|
pr_debug("%s:%d\n", __func__, __LINE__);
|
||
|
test_hw_counter_id = start;
|
||
|
admin->cache.counter = test_hw_cache.counter;
|
||
|
admin->cache.sticky = test_hw_cache.sticky;
|
||
|
break;
|
||
|
case VCAP_SEL_ALL:
|
||
|
pr_debug("%s:%d\n", __func__, __LINE__);
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/* Callback used by the VCAP API */
|
||
|
static void test_cache_write(struct net_device *ndev, struct vcap_admin *admin,
|
||
|
enum vcap_selection sel, u32 start, u32 count)
|
||
|
{
|
||
|
u32 *keystr, *mskstr, *actstr;
|
||
|
int idx;
|
||
|
|
||
|
switch (sel) {
|
||
|
case VCAP_SEL_ENTRY:
|
||
|
keystr = &admin->cache.keystream[start];
|
||
|
mskstr = &admin->cache.maskstream[start];
|
||
|
for (idx = 0; idx < count; ++idx) {
|
||
|
pr_debug("%s:%d: keydata[%02d]: 0x%08x\n", __func__,
|
||
|
__LINE__, start + idx, keystr[idx]);
|
||
|
}
|
||
|
for (idx = 0; idx < count; ++idx) {
|
||
|
/* Invert the mask before encoding starts */
|
||
|
mskstr[idx] = ~mskstr[idx];
|
||
|
pr_debug("%s:%d: mskdata[%02d]: 0x%08x\n", __func__,
|
||
|
__LINE__, start + idx, mskstr[idx]);
|
||
|
}
|
||
|
break;
|
||
|
case VCAP_SEL_ACTION:
|
||
|
actstr = &admin->cache.actionstream[start];
|
||
|
for (idx = 0; idx < count; ++idx) {
|
||
|
pr_debug("%s:%d: actdata[%02d]: 0x%08x\n", __func__,
|
||
|
__LINE__, start + idx, actstr[idx]);
|
||
|
}
|
||
|
break;
|
||
|
case VCAP_SEL_COUNTER:
|
||
|
pr_debug("%s:%d\n", __func__, __LINE__);
|
||
|
test_hw_counter_id = start;
|
||
|
test_hw_cache.counter = admin->cache.counter;
|
||
|
test_hw_cache.sticky = admin->cache.sticky;
|
||
|
break;
|
||
|
case VCAP_SEL_ALL:
|
||
|
pr_err("%s:%d: cannot write all streams at once\n",
|
||
|
__func__, __LINE__);
|
||
|
break;
|
||
|
}
|
||
|
}
|
||
|
|
||
|
/* Callback used by the VCAP API */
|
||
|
static void test_cache_update(struct net_device *ndev, struct vcap_admin *admin,
|
||
|
enum vcap_command cmd,
|
||
|
enum vcap_selection sel, u32 addr)
|
||
|
{
|
||
|
if (test_updateaddridx < ARRAY_SIZE(test_updateaddr))
|
||
|
test_updateaddr[test_updateaddridx] = addr;
|
||
|
else
|
||
|
pr_err("%s:%d: overflow: %d\n", __func__, __LINE__, test_updateaddridx);
|
||
|
test_updateaddridx++;
|
||
|
}
|
||
|
|
||
|
static void test_cache_move(struct net_device *ndev, struct vcap_admin *admin,
|
||
|
u32 addr, int offset, int count)
|
||
|
{
|
||
|
test_move_addr = addr;
|
||
|
test_move_offset = offset;
|
||
|
test_move_count = count;
|
||
|
}
|
||
|
|
||
|
/* Provide port information via a callback interface */
|
||
|
static int vcap_test_port_info(struct net_device *ndev,
|
||
|
struct vcap_admin *admin,
|
||
|
struct vcap_output_print *out)
|
||
|
{
|
||
|
return 0;
|
||
|
}
|
||
|
|
||
|
static struct vcap_operations test_callbacks = {
|
||
|
.validate_keyset = test_val_keyset,
|
||
|
.add_default_fields = test_add_def_fields,
|
||
|
.cache_erase = test_cache_erase,
|
||
|
.cache_write = test_cache_write,
|
||
|
.cache_read = test_cache_read,
|
||
|
.init = test_cache_init,
|
||
|
.update = test_cache_update,
|
||
|
.move = test_cache_move,
|
||
|
.port_info = vcap_test_port_info,
|
||
|
};
|
||
|
|
||
|
static struct vcap_control test_vctrl = {
|
||
|
.vcaps = kunit_test_vcaps,
|
||
|
.stats = &kunit_test_vcap_stats,
|
||
|
.ops = &test_callbacks,
|
||
|
};
|
||
|
|
||
|
static void vcap_test_api_init(struct vcap_admin *admin)
|
||
|
{
|
||
|
/* Initialize the shared objects */
|
||
|
INIT_LIST_HEAD(&test_vctrl.list);
|
||
|
INIT_LIST_HEAD(&admin->list);
|
||
|
INIT_LIST_HEAD(&admin->rules);
|
||
|
INIT_LIST_HEAD(&admin->enabled);
|
||
|
mutex_init(&admin->lock);
|
||
|
list_add_tail(&admin->list, &test_vctrl.list);
|
||
|
memset(test_updateaddr, 0, sizeof(test_updateaddr));
|
||
|
test_updateaddridx = 0;
|
||
|
}
|
||
|
|
||
|
/* Helper function to create a rule of a specific size */
|
||
|
static struct vcap_rule *
|
||
|
test_vcap_xn_rule_creator(struct kunit *test, int cid, enum vcap_user user,
|
||
|
u16 priority,
|
||
|
int id, int size, int expected_addr)
|
||
|
{
|
||
|
struct vcap_rule *rule;
|
||
|
struct vcap_rule_internal *ri;
|
||
|
enum vcap_keyfield_set keyset = VCAP_KFS_NO_VALUE;
|
||
|
enum vcap_actionfield_set actionset = VCAP_AFS_NO_VALUE;
|
||
|
int ret;
|
||
|
|
||
|
/* init before testing */
|
||
|
memset(test_updateaddr, 0, sizeof(test_updateaddr));
|
||
|
test_updateaddridx = 0;
|
||
|
test_move_addr = 0;
|
||
|
test_move_offset = 0;
|
||
|
test_move_count = 0;
|
||
|
|
||
|
switch (size) {
|
||
|
case 2:
|
||
|
keyset = VCAP_KFS_ETAG;
|
||
|
actionset = VCAP_AFS_CLASS_REDUCED;
|
||
|
break;
|
||
|
case 3:
|
||
|
keyset = VCAP_KFS_PURE_5TUPLE_IP4;
|
||
|
actionset = VCAP_AFS_CLASSIFICATION;
|
||
|
break;
|
||
|
case 6:
|
||
|
keyset = VCAP_KFS_NORMAL_5TUPLE_IP4;
|
||
|
actionset = VCAP_AFS_CLASSIFICATION;
|
||
|
break;
|
||
|
case 12:
|
||
|
keyset = VCAP_KFS_NORMAL_7TUPLE;
|
||
|
actionset = VCAP_AFS_FULL;
|
||
|
break;
|
||
|
default:
|
||
|
break;
|
||
|
}
|
||
|
|
||
|
/* Check that a valid size was used */
|
||
|
KUNIT_ASSERT_NE(test, VCAP_KFS_NO_VALUE, keyset);
|
||
|
|
||
|
/* Allocate the rule */
|
||
|
rule = vcap_alloc_rule(&test_vctrl, &test_netdev, cid, user, priority,
|
||
|
id);
|
||
|
KUNIT_EXPECT_PTR_NE(test, NULL, rule);
|
||
|
|
||
|
ri = (struct vcap_rule_internal *)rule;
|
||
|
|
||
|
/* Override rule keyset */
|
||
|
ret = vcap_set_rule_set_keyset(rule, keyset);
|
||
|
|
||
|
/* Add rule actions : there must be at least one action */
|
||
|
ret = vcap_rule_add_action_u32(rule, VCAP_AF_ISDX_VAL, 0);
|
||
|
|
||
|
/* Override rule actionset */
|
||
|
ret = vcap_set_rule_set_actionset(rule, actionset);
|
||
|
|
||
|
ret = vcap_val_rule(rule, ETH_P_ALL);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
KUNIT_EXPECT_EQ(test, keyset, rule->keyset);
|
||
|
KUNIT_EXPECT_EQ(test, actionset, rule->actionset);
|
||
|
KUNIT_EXPECT_EQ(test, size, ri->size);
|
||
|
|
||
|
/* Add rule with write callback */
|
||
|
ret = vcap_add_rule(rule);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
KUNIT_EXPECT_EQ(test, expected_addr, ri->addr);
|
||
|
return rule;
|
||
|
}
|
||
|
|
||
|
/* Prepare testing rule deletion */
|
||
|
static void test_init_rule_deletion(void)
|
||
|
{
|
||
|
test_move_addr = 0;
|
||
|
test_move_offset = 0;
|
||
|
test_move_count = 0;
|
||
|
test_init_start = 0;
|
||
|
test_init_count = 0;
|
||
|
}
|
||
|
|
||
|
/* Define the test cases. */
|
||
|
|
||
|
static void vcap_api_set_bit_1_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_stream_iter iter = {
|
||
|
.offset = 35,
|
||
|
.sw_width = 52,
|
||
|
.reg_idx = 1,
|
||
|
.reg_bitpos = 20,
|
||
|
.tg = NULL,
|
||
|
};
|
||
|
u32 stream[2] = {0};
|
||
|
|
||
|
vcap_set_bit(stream, &iter, 1);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)BIT(20), stream[1]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_set_bit_0_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_stream_iter iter = {
|
||
|
.offset = 35,
|
||
|
.sw_width = 52,
|
||
|
.reg_idx = 2,
|
||
|
.reg_bitpos = 11,
|
||
|
.tg = NULL,
|
||
|
};
|
||
|
u32 stream[3] = {~0, ~0, ~0};
|
||
|
|
||
|
vcap_set_bit(stream, &iter, 0);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0, stream[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0, stream[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~BIT(11), stream[2]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_iterator_init_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_stream_iter iter;
|
||
|
struct vcap_typegroup typegroups[] = {
|
||
|
{ .offset = 0, .width = 2, .value = 2, },
|
||
|
{ .offset = 156, .width = 1, .value = 0, },
|
||
|
{ .offset = 0, .width = 0, .value = 0, },
|
||
|
};
|
||
|
struct vcap_typegroup typegroups2[] = {
|
||
|
{ .offset = 0, .width = 3, .value = 4, },
|
||
|
{ .offset = 49, .width = 2, .value = 0, },
|
||
|
{ .offset = 98, .width = 2, .value = 0, },
|
||
|
};
|
||
|
|
||
|
vcap_iter_init(&iter, 52, typegroups, 86);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 52, iter.sw_width);
|
||
|
KUNIT_EXPECT_EQ(test, 86 + 2, iter.offset);
|
||
|
KUNIT_EXPECT_EQ(test, 3, iter.reg_idx);
|
||
|
KUNIT_EXPECT_EQ(test, 4, iter.reg_bitpos);
|
||
|
|
||
|
vcap_iter_init(&iter, 49, typegroups2, 134);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 49, iter.sw_width);
|
||
|
KUNIT_EXPECT_EQ(test, 134 + 7, iter.offset);
|
||
|
KUNIT_EXPECT_EQ(test, 5, iter.reg_idx);
|
||
|
KUNIT_EXPECT_EQ(test, 11, iter.reg_bitpos);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_iterator_next_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_stream_iter iter;
|
||
|
struct vcap_typegroup typegroups[] = {
|
||
|
{ .offset = 0, .width = 4, .value = 8, },
|
||
|
{ .offset = 49, .width = 1, .value = 0, },
|
||
|
{ .offset = 98, .width = 2, .value = 0, },
|
||
|
{ .offset = 147, .width = 3, .value = 0, },
|
||
|
{ .offset = 196, .width = 2, .value = 0, },
|
||
|
{ .offset = 245, .width = 1, .value = 0, },
|
||
|
};
|
||
|
int idx;
|
||
|
|
||
|
vcap_iter_init(&iter, 49, typegroups, 86);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 49, iter.sw_width);
|
||
|
KUNIT_EXPECT_EQ(test, 86 + 5, iter.offset);
|
||
|
KUNIT_EXPECT_EQ(test, 3, iter.reg_idx);
|
||
|
KUNIT_EXPECT_EQ(test, 10, iter.reg_bitpos);
|
||
|
|
||
|
vcap_iter_next(&iter);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 91 + 1, iter.offset);
|
||
|
KUNIT_EXPECT_EQ(test, 3, iter.reg_idx);
|
||
|
KUNIT_EXPECT_EQ(test, 11, iter.reg_bitpos);
|
||
|
|
||
|
for (idx = 0; idx < 6; idx++)
|
||
|
vcap_iter_next(&iter);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 92 + 6 + 2, iter.offset);
|
||
|
KUNIT_EXPECT_EQ(test, 4, iter.reg_idx);
|
||
|
KUNIT_EXPECT_EQ(test, 2, iter.reg_bitpos);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_encode_typegroups_test(struct kunit *test)
|
||
|
{
|
||
|
u32 stream[12] = {0};
|
||
|
struct vcap_typegroup typegroups[] = {
|
||
|
{ .offset = 0, .width = 4, .value = 8, },
|
||
|
{ .offset = 49, .width = 1, .value = 1, },
|
||
|
{ .offset = 98, .width = 2, .value = 3, },
|
||
|
{ .offset = 147, .width = 3, .value = 5, },
|
||
|
{ .offset = 196, .width = 2, .value = 2, },
|
||
|
{ .offset = 245, .width = 5, .value = 27, },
|
||
|
{ .offset = 0, .width = 0, .value = 0, },
|
||
|
};
|
||
|
|
||
|
vcap_encode_typegroups(stream, 49, typegroups, false);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x8, stream[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x1, stream[2]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[3]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x3, stream[4]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[5]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x5, stream[6]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[7]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x2, stream[8]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[9]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)27, stream[10]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[11]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_encode_bit_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_stream_iter iter;
|
||
|
u32 stream[4] = {0};
|
||
|
struct vcap_typegroup typegroups[] = {
|
||
|
{ .offset = 0, .width = 4, .value = 8, },
|
||
|
{ .offset = 49, .width = 1, .value = 1, },
|
||
|
{ .offset = 98, .width = 2, .value = 3, },
|
||
|
{ .offset = 147, .width = 3, .value = 5, },
|
||
|
{ .offset = 196, .width = 2, .value = 2, },
|
||
|
{ .offset = 245, .width = 1, .value = 0, },
|
||
|
};
|
||
|
|
||
|
vcap_iter_init(&iter, 49, typegroups, 44);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 48, iter.offset);
|
||
|
KUNIT_EXPECT_EQ(test, 1, iter.reg_idx);
|
||
|
KUNIT_EXPECT_EQ(test, 16, iter.reg_bitpos);
|
||
|
|
||
|
vcap_encode_bit(stream, &iter, 1);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)BIT(16), stream[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[2]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_encode_field_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_stream_iter iter;
|
||
|
u32 stream[16] = {0};
|
||
|
struct vcap_typegroup typegroups[] = {
|
||
|
{ .offset = 0, .width = 4, .value = 8, },
|
||
|
{ .offset = 49, .width = 1, .value = 1, },
|
||
|
{ .offset = 98, .width = 2, .value = 3, },
|
||
|
{ .offset = 147, .width = 3, .value = 5, },
|
||
|
{ .offset = 196, .width = 2, .value = 2, },
|
||
|
{ .offset = 245, .width = 5, .value = 27, },
|
||
|
{ .offset = 0, .width = 0, .value = 0, },
|
||
|
};
|
||
|
struct vcap_field rf = {
|
||
|
.type = VCAP_FIELD_U32,
|
||
|
.offset = 86,
|
||
|
.width = 4,
|
||
|
};
|
||
|
u8 value[] = {0x5};
|
||
|
|
||
|
vcap_iter_init(&iter, 49, typegroups, rf.offset);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 91, iter.offset);
|
||
|
KUNIT_EXPECT_EQ(test, 3, iter.reg_idx);
|
||
|
KUNIT_EXPECT_EQ(test, 10, iter.reg_bitpos);
|
||
|
|
||
|
vcap_encode_field(stream, &iter, rf.width, value);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[2]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)(0x5 << 10), stream[3]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[4]);
|
||
|
|
||
|
vcap_encode_typegroups(stream, 49, typegroups, false);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x8, stream[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x1, stream[2]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)(0x5 << 10), stream[3]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x3, stream[4]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[5]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x5, stream[6]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[7]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x2, stream[8]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[9]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)27, stream[10]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[11]);
|
||
|
}
|
||
|
|
||
|
/* In this testcase the subword is smaller than a register */
|
||
|
static void vcap_api_encode_short_field_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_stream_iter iter;
|
||
|
int sw_width = 21;
|
||
|
u32 stream[6] = {0};
|
||
|
struct vcap_typegroup tgt[] = {
|
||
|
{ .offset = 0, .width = 3, .value = 7, },
|
||
|
{ .offset = 21, .width = 2, .value = 3, },
|
||
|
{ .offset = 42, .width = 1, .value = 1, },
|
||
|
{ .offset = 0, .width = 0, .value = 0, },
|
||
|
};
|
||
|
struct vcap_field rf = {
|
||
|
.type = VCAP_FIELD_U32,
|
||
|
.offset = 25,
|
||
|
.width = 4,
|
||
|
};
|
||
|
u8 value[] = {0x5};
|
||
|
|
||
|
vcap_iter_init(&iter, sw_width, tgt, rf.offset);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 1, iter.regs_per_sw);
|
||
|
KUNIT_EXPECT_EQ(test, 21, iter.sw_width);
|
||
|
KUNIT_EXPECT_EQ(test, 25 + 3 + 2, iter.offset);
|
||
|
KUNIT_EXPECT_EQ(test, 1, iter.reg_idx);
|
||
|
KUNIT_EXPECT_EQ(test, 25 + 3 + 2 - sw_width, iter.reg_bitpos);
|
||
|
|
||
|
vcap_encode_field(stream, &iter, rf.width, value);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)(0x5 << (25 + 3 + 2 - sw_width)), stream[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[2]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[3]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[4]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, stream[5]);
|
||
|
|
||
|
vcap_encode_typegroups(stream, sw_width, tgt, false);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, (u32)7, stream[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)((0x5 << (25 + 3 + 2 - sw_width)) + 3), stream[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)1, stream[2]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0, stream[3]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0, stream[4]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0, stream[5]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_encode_keyfield_test(struct kunit *test)
|
||
|
{
|
||
|
u32 keywords[16] = {0};
|
||
|
u32 maskwords[16] = {0};
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
.cache = {
|
||
|
.keystream = keywords,
|
||
|
.maskstream = maskwords,
|
||
|
.actionstream = keywords,
|
||
|
},
|
||
|
};
|
||
|
struct vcap_rule_internal rule = {
|
||
|
.admin = &admin,
|
||
|
.data = {
|
||
|
.keyset = VCAP_KFS_MAC_ETYPE,
|
||
|
},
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_client_keyfield ckf = {
|
||
|
.ctrl.list = {},
|
||
|
.ctrl.key = VCAP_KF_ISDX_CLS,
|
||
|
.ctrl.type = VCAP_FIELD_U32,
|
||
|
.data.u32.value = 0xeef014a1,
|
||
|
.data.u32.mask = 0xfff,
|
||
|
};
|
||
|
struct vcap_field rf = {
|
||
|
.type = VCAP_FIELD_U32,
|
||
|
.offset = 56,
|
||
|
.width = 12,
|
||
|
};
|
||
|
struct vcap_typegroup tgt[] = {
|
||
|
{ .offset = 0, .width = 2, .value = 2, },
|
||
|
{ .offset = 156, .width = 1, .value = 1, },
|
||
|
{ .offset = 0, .width = 0, .value = 0, },
|
||
|
};
|
||
|
|
||
|
vcap_test_api_init(&admin);
|
||
|
vcap_encode_keyfield(&rule, &ckf, &rf, tgt);
|
||
|
|
||
|
/* Key */
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, keywords[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, keywords[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)(0x04a1 << 6), keywords[2]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, keywords[3]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, keywords[4]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, keywords[5]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, keywords[6]);
|
||
|
|
||
|
/* Mask */
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, maskwords[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, maskwords[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)(0x0fff << 6), maskwords[2]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, maskwords[3]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, maskwords[4]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, maskwords[5]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, maskwords[6]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_encode_max_keyfield_test(struct kunit *test)
|
||
|
{
|
||
|
int idx;
|
||
|
u32 keywords[6] = {0};
|
||
|
u32 maskwords[6] = {0};
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
/* IS2 sw_width = 52 bit */
|
||
|
.cache = {
|
||
|
.keystream = keywords,
|
||
|
.maskstream = maskwords,
|
||
|
.actionstream = keywords,
|
||
|
},
|
||
|
};
|
||
|
struct vcap_rule_internal rule = {
|
||
|
.admin = &admin,
|
||
|
.data = {
|
||
|
.keyset = VCAP_KFS_IP_7TUPLE,
|
||
|
},
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_client_keyfield ckf = {
|
||
|
.ctrl.list = {},
|
||
|
.ctrl.key = VCAP_KF_L3_IP6_DIP,
|
||
|
.ctrl.type = VCAP_FIELD_U128,
|
||
|
.data.u128.value = { 0xa1, 0xa2, 0xa3, 0xa4, 0, 0, 0x43, 0,
|
||
|
0, 0, 0, 0, 0, 0, 0x78, 0x8e, },
|
||
|
.data.u128.mask = { 0xff, 0xff, 0xff, 0xff, 0, 0, 0xff, 0,
|
||
|
0, 0, 0, 0, 0, 0, 0xff, 0xff },
|
||
|
};
|
||
|
struct vcap_field rf = {
|
||
|
.type = VCAP_FIELD_U128,
|
||
|
.offset = 0,
|
||
|
.width = 128,
|
||
|
};
|
||
|
struct vcap_typegroup tgt[] = {
|
||
|
{ .offset = 0, .width = 2, .value = 2, },
|
||
|
{ .offset = 156, .width = 1, .value = 1, },
|
||
|
{ .offset = 0, .width = 0, .value = 0, },
|
||
|
};
|
||
|
u32 keyres[] = {
|
||
|
0x928e8a84,
|
||
|
0x000c0002,
|
||
|
0x00000010,
|
||
|
0x00000000,
|
||
|
0x0239e000,
|
||
|
0x00000000,
|
||
|
};
|
||
|
u32 mskres[] = {
|
||
|
0xfffffffc,
|
||
|
0x000c0003,
|
||
|
0x0000003f,
|
||
|
0x00000000,
|
||
|
0x03fffc00,
|
||
|
0x00000000,
|
||
|
};
|
||
|
|
||
|
vcap_encode_keyfield(&rule, &ckf, &rf, tgt);
|
||
|
|
||
|
/* Key */
|
||
|
for (idx = 0; idx < ARRAY_SIZE(keyres); ++idx)
|
||
|
KUNIT_EXPECT_EQ(test, keyres[idx], keywords[idx]);
|
||
|
/* Mask */
|
||
|
for (idx = 0; idx < ARRAY_SIZE(mskres); ++idx)
|
||
|
KUNIT_EXPECT_EQ(test, mskres[idx], maskwords[idx]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_encode_actionfield_test(struct kunit *test)
|
||
|
{
|
||
|
u32 actwords[16] = {0};
|
||
|
int sw_width = 21;
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_ES2, /* act_width = 21 */
|
||
|
.cache = {
|
||
|
.actionstream = actwords,
|
||
|
},
|
||
|
};
|
||
|
struct vcap_rule_internal rule = {
|
||
|
.admin = &admin,
|
||
|
.data = {
|
||
|
.actionset = VCAP_AFS_BASE_TYPE,
|
||
|
},
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_client_actionfield caf = {
|
||
|
.ctrl.list = {},
|
||
|
.ctrl.action = VCAP_AF_POLICE_IDX,
|
||
|
.ctrl.type = VCAP_FIELD_U32,
|
||
|
.data.u32.value = 0x67908032,
|
||
|
};
|
||
|
struct vcap_field rf = {
|
||
|
.type = VCAP_FIELD_U32,
|
||
|
.offset = 35,
|
||
|
.width = 6,
|
||
|
};
|
||
|
struct vcap_typegroup tgt[] = {
|
||
|
{ .offset = 0, .width = 2, .value = 2, },
|
||
|
{ .offset = 21, .width = 1, .value = 1, },
|
||
|
{ .offset = 42, .width = 1, .value = 0, },
|
||
|
{ .offset = 0, .width = 0, .value = 0, },
|
||
|
};
|
||
|
|
||
|
vcap_encode_actionfield(&rule, &caf, &rf, tgt);
|
||
|
|
||
|
/* Action */
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, actwords[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)((0x32 << (35 + 2 + 1 - sw_width)) & 0x1fffff), actwords[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)((0x32 >> ((2 * sw_width) - 38 - 1))), actwords[2]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, actwords[3]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, actwords[4]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, actwords[5]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0, actwords[6]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_keyfield_typegroup_test(struct kunit *test)
|
||
|
{
|
||
|
const struct vcap_typegroup *tg;
|
||
|
|
||
|
tg = vcap_keyfield_typegroup(&test_vctrl, VCAP_TYPE_IS2, VCAP_KFS_MAC_ETYPE);
|
||
|
KUNIT_EXPECT_PTR_NE(test, NULL, tg);
|
||
|
KUNIT_EXPECT_EQ(test, 0, tg[0].offset);
|
||
|
KUNIT_EXPECT_EQ(test, 2, tg[0].width);
|
||
|
KUNIT_EXPECT_EQ(test, 2, tg[0].value);
|
||
|
KUNIT_EXPECT_EQ(test, 156, tg[1].offset);
|
||
|
KUNIT_EXPECT_EQ(test, 1, tg[1].width);
|
||
|
KUNIT_EXPECT_EQ(test, 0, tg[1].value);
|
||
|
KUNIT_EXPECT_EQ(test, 0, tg[2].offset);
|
||
|
KUNIT_EXPECT_EQ(test, 0, tg[2].width);
|
||
|
KUNIT_EXPECT_EQ(test, 0, tg[2].value);
|
||
|
|
||
|
tg = vcap_keyfield_typegroup(&test_vctrl, VCAP_TYPE_ES2, VCAP_KFS_LL_FULL);
|
||
|
KUNIT_EXPECT_PTR_EQ(test, NULL, tg);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_actionfield_typegroup_test(struct kunit *test)
|
||
|
{
|
||
|
const struct vcap_typegroup *tg;
|
||
|
|
||
|
tg = vcap_actionfield_typegroup(&test_vctrl, VCAP_TYPE_IS0, VCAP_AFS_FULL);
|
||
|
KUNIT_EXPECT_PTR_NE(test, NULL, tg);
|
||
|
KUNIT_EXPECT_EQ(test, 0, tg[0].offset);
|
||
|
KUNIT_EXPECT_EQ(test, 3, tg[0].width);
|
||
|
KUNIT_EXPECT_EQ(test, 4, tg[0].value);
|
||
|
KUNIT_EXPECT_EQ(test, 110, tg[1].offset);
|
||
|
KUNIT_EXPECT_EQ(test, 2, tg[1].width);
|
||
|
KUNIT_EXPECT_EQ(test, 0, tg[1].value);
|
||
|
KUNIT_EXPECT_EQ(test, 220, tg[2].offset);
|
||
|
KUNIT_EXPECT_EQ(test, 2, tg[2].width);
|
||
|
KUNIT_EXPECT_EQ(test, 0, tg[2].value);
|
||
|
KUNIT_EXPECT_EQ(test, 0, tg[3].offset);
|
||
|
KUNIT_EXPECT_EQ(test, 0, tg[3].width);
|
||
|
KUNIT_EXPECT_EQ(test, 0, tg[3].value);
|
||
|
|
||
|
tg = vcap_actionfield_typegroup(&test_vctrl, VCAP_TYPE_IS2, VCAP_AFS_CLASSIFICATION);
|
||
|
KUNIT_EXPECT_PTR_EQ(test, NULL, tg);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_vcap_keyfields_test(struct kunit *test)
|
||
|
{
|
||
|
const struct vcap_field *ft;
|
||
|
|
||
|
ft = vcap_keyfields(&test_vctrl, VCAP_TYPE_IS2, VCAP_KFS_MAC_ETYPE);
|
||
|
KUNIT_EXPECT_PTR_NE(test, NULL, ft);
|
||
|
|
||
|
/* Keyset that is not available and within the maximum keyset enum value */
|
||
|
ft = vcap_keyfields(&test_vctrl, VCAP_TYPE_ES2, VCAP_KFS_PURE_5TUPLE_IP4);
|
||
|
KUNIT_EXPECT_PTR_EQ(test, NULL, ft);
|
||
|
|
||
|
/* Keyset that is not available and beyond the maximum keyset enum value */
|
||
|
ft = vcap_keyfields(&test_vctrl, VCAP_TYPE_ES2, VCAP_KFS_LL_FULL);
|
||
|
KUNIT_EXPECT_PTR_EQ(test, NULL, ft);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_vcap_actionfields_test(struct kunit *test)
|
||
|
{
|
||
|
const struct vcap_field *ft;
|
||
|
|
||
|
ft = vcap_actionfields(&test_vctrl, VCAP_TYPE_IS0, VCAP_AFS_FULL);
|
||
|
KUNIT_EXPECT_PTR_NE(test, NULL, ft);
|
||
|
|
||
|
ft = vcap_actionfields(&test_vctrl, VCAP_TYPE_IS2, VCAP_AFS_FULL);
|
||
|
KUNIT_EXPECT_PTR_EQ(test, NULL, ft);
|
||
|
|
||
|
ft = vcap_actionfields(&test_vctrl, VCAP_TYPE_IS2, VCAP_AFS_CLASSIFICATION);
|
||
|
KUNIT_EXPECT_PTR_EQ(test, NULL, ft);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_encode_rule_keyset_test(struct kunit *test)
|
||
|
{
|
||
|
u32 keywords[16] = {0};
|
||
|
u32 maskwords[16] = {0};
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
.cache = {
|
||
|
.keystream = keywords,
|
||
|
.maskstream = maskwords,
|
||
|
},
|
||
|
};
|
||
|
struct vcap_rule_internal rule = {
|
||
|
.admin = &admin,
|
||
|
.data = {
|
||
|
.keyset = VCAP_KFS_MAC_ETYPE,
|
||
|
},
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_client_keyfield ckf[] = {
|
||
|
{
|
||
|
.ctrl.key = VCAP_KF_TYPE,
|
||
|
.ctrl.type = VCAP_FIELD_U32,
|
||
|
.data.u32.value = 0x00,
|
||
|
.data.u32.mask = 0x0f,
|
||
|
},
|
||
|
{
|
||
|
.ctrl.key = VCAP_KF_LOOKUP_FIRST_IS,
|
||
|
.ctrl.type = VCAP_FIELD_BIT,
|
||
|
.data.u1.value = 0x01,
|
||
|
.data.u1.mask = 0x01,
|
||
|
},
|
||
|
{
|
||
|
.ctrl.key = VCAP_KF_IF_IGR_PORT_MASK_L3,
|
||
|
.ctrl.type = VCAP_FIELD_BIT,
|
||
|
.data.u1.value = 0x00,
|
||
|
.data.u1.mask = 0x01,
|
||
|
},
|
||
|
{
|
||
|
.ctrl.key = VCAP_KF_IF_IGR_PORT_MASK_RNG,
|
||
|
.ctrl.type = VCAP_FIELD_U32,
|
||
|
.data.u32.value = 0x00,
|
||
|
.data.u32.mask = 0x0f,
|
||
|
},
|
||
|
{
|
||
|
.ctrl.key = VCAP_KF_IF_IGR_PORT_MASK,
|
||
|
.ctrl.type = VCAP_FIELD_U72,
|
||
|
.data.u72.value = {0x0, 0x00, 0x00, 0x00},
|
||
|
.data.u72.mask = {0xfd, 0xff, 0xff, 0xff},
|
||
|
},
|
||
|
{
|
||
|
.ctrl.key = VCAP_KF_L2_DMAC,
|
||
|
.ctrl.type = VCAP_FIELD_U48,
|
||
|
/* Opposite endianness */
|
||
|
.data.u48.value = {0x01, 0x02, 0x03, 0x04, 0x05, 0x06},
|
||
|
.data.u48.mask = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff},
|
||
|
},
|
||
|
{
|
||
|
.ctrl.key = VCAP_KF_ETYPE_LEN_IS,
|
||
|
.ctrl.type = VCAP_FIELD_BIT,
|
||
|
.data.u1.value = 0x01,
|
||
|
.data.u1.mask = 0x01,
|
||
|
},
|
||
|
{
|
||
|
.ctrl.key = VCAP_KF_ETYPE,
|
||
|
.ctrl.type = VCAP_FIELD_U32,
|
||
|
.data.u32.value = 0xaabb,
|
||
|
.data.u32.mask = 0xffff,
|
||
|
},
|
||
|
};
|
||
|
int idx;
|
||
|
int ret;
|
||
|
|
||
|
/* Empty entry list */
|
||
|
INIT_LIST_HEAD(&rule.data.keyfields);
|
||
|
ret = vcap_encode_rule_keyset(&rule);
|
||
|
KUNIT_EXPECT_EQ(test, -EINVAL, ret);
|
||
|
|
||
|
for (idx = 0; idx < ARRAY_SIZE(ckf); idx++)
|
||
|
list_add_tail(&ckf[idx].ctrl.list, &rule.data.keyfields);
|
||
|
ret = vcap_encode_rule_keyset(&rule);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
/* The key and mask values below are from an actual Sparx5 rule config */
|
||
|
/* Key */
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000042, keywords[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, keywords[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, keywords[2]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00020100, keywords[3]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x60504030, keywords[4]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, keywords[5]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, keywords[6]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x0002aaee, keywords[7]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, keywords[8]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, keywords[9]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, keywords[10]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, keywords[11]);
|
||
|
|
||
|
/* Mask: they will be inverted when applied to the register */
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0x00b07f80, maskwords[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0xfff00000, maskwords[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0xfffffffc, maskwords[2]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0xfff000ff, maskwords[3]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0x00000000, maskwords[4]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0xfffffff0, maskwords[5]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0xfffffffe, maskwords[6]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0xfffc0001, maskwords[7]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0xffffffff, maskwords[8]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0xffffffff, maskwords[9]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0xffffffff, maskwords[10]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)~0xffffffff, maskwords[11]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_encode_rule_actionset_test(struct kunit *test)
|
||
|
{
|
||
|
u32 actwords[16] = {0};
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
.cache = {
|
||
|
.actionstream = actwords,
|
||
|
},
|
||
|
};
|
||
|
struct vcap_rule_internal rule = {
|
||
|
.admin = &admin,
|
||
|
.data = {
|
||
|
.actionset = VCAP_AFS_BASE_TYPE,
|
||
|
},
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_client_actionfield caf[] = {
|
||
|
{
|
||
|
.ctrl.action = VCAP_AF_MATCH_ID,
|
||
|
.ctrl.type = VCAP_FIELD_U32,
|
||
|
.data.u32.value = 0x01,
|
||
|
},
|
||
|
{
|
||
|
.ctrl.action = VCAP_AF_MATCH_ID_MASK,
|
||
|
.ctrl.type = VCAP_FIELD_U32,
|
||
|
.data.u32.value = 0x01,
|
||
|
},
|
||
|
{
|
||
|
.ctrl.action = VCAP_AF_CNT_ID,
|
||
|
.ctrl.type = VCAP_FIELD_U32,
|
||
|
.data.u32.value = 0x64,
|
||
|
},
|
||
|
};
|
||
|
int idx;
|
||
|
int ret;
|
||
|
|
||
|
/* Empty entry list */
|
||
|
INIT_LIST_HEAD(&rule.data.actionfields);
|
||
|
ret = vcap_encode_rule_actionset(&rule);
|
||
|
/* We allow rules with no actions */
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
for (idx = 0; idx < ARRAY_SIZE(caf); idx++)
|
||
|
list_add_tail(&caf[idx].ctrl.list, &rule.data.actionfields);
|
||
|
ret = vcap_encode_rule_actionset(&rule);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
/* The action values below are from an actual Sparx5 rule config */
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000002, actwords[0]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, actwords[1]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, actwords[2]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, actwords[3]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, actwords[4]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00100000, actwords[5]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x06400010, actwords[6]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, actwords[7]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, actwords[8]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, actwords[9]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, actwords[10]);
|
||
|
KUNIT_EXPECT_EQ(test, (u32)0x00000000, actwords[11]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_rule_add_keyvalue_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
};
|
||
|
struct vcap_rule_internal ri = {
|
||
|
.admin = &admin,
|
||
|
.data = {
|
||
|
.keyset = VCAP_KFS_NO_VALUE,
|
||
|
},
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_rule *rule = (struct vcap_rule *)&ri;
|
||
|
struct vcap_client_keyfield *kf;
|
||
|
int ret;
|
||
|
struct vcap_u128_key dip = {
|
||
|
.value = {0x17, 0x26, 0x35, 0x44, 0x63, 0x62, 0x71},
|
||
|
.mask = {0xf1, 0xf2, 0xf3, 0xf4, 0x4f, 0x3f, 0x2f, 0x1f},
|
||
|
};
|
||
|
int idx;
|
||
|
|
||
|
INIT_LIST_HEAD(&rule->keyfields);
|
||
|
ret = vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS, VCAP_BIT_0);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = list_empty(&rule->keyfields);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
kf = list_first_entry(&rule->keyfields, struct vcap_client_keyfield,
|
||
|
ctrl.list);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KF_LOOKUP_FIRST_IS, kf->ctrl.key);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_FIELD_BIT, kf->ctrl.type);
|
||
|
KUNIT_EXPECT_EQ(test, 0x0, kf->data.u1.value);
|
||
|
KUNIT_EXPECT_EQ(test, 0x1, kf->data.u1.mask);
|
||
|
|
||
|
INIT_LIST_HEAD(&rule->keyfields);
|
||
|
ret = vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS, VCAP_BIT_1);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = list_empty(&rule->keyfields);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
kf = list_first_entry(&rule->keyfields, struct vcap_client_keyfield,
|
||
|
ctrl.list);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KF_LOOKUP_FIRST_IS, kf->ctrl.key);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_FIELD_BIT, kf->ctrl.type);
|
||
|
KUNIT_EXPECT_EQ(test, 0x1, kf->data.u1.value);
|
||
|
KUNIT_EXPECT_EQ(test, 0x1, kf->data.u1.mask);
|
||
|
|
||
|
INIT_LIST_HEAD(&rule->keyfields);
|
||
|
ret = vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS,
|
||
|
VCAP_BIT_ANY);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = list_empty(&rule->keyfields);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
kf = list_first_entry(&rule->keyfields, struct vcap_client_keyfield,
|
||
|
ctrl.list);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KF_LOOKUP_FIRST_IS, kf->ctrl.key);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_FIELD_BIT, kf->ctrl.type);
|
||
|
KUNIT_EXPECT_EQ(test, 0x0, kf->data.u1.value);
|
||
|
KUNIT_EXPECT_EQ(test, 0x0, kf->data.u1.mask);
|
||
|
|
||
|
INIT_LIST_HEAD(&rule->keyfields);
|
||
|
ret = vcap_rule_add_key_u32(rule, VCAP_KF_TYPE, 0x98765432, 0xff00ffab);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = list_empty(&rule->keyfields);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
kf = list_first_entry(&rule->keyfields, struct vcap_client_keyfield,
|
||
|
ctrl.list);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KF_TYPE, kf->ctrl.key);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_FIELD_U32, kf->ctrl.type);
|
||
|
KUNIT_EXPECT_EQ(test, 0x98765432, kf->data.u32.value);
|
||
|
KUNIT_EXPECT_EQ(test, 0xff00ffab, kf->data.u32.mask);
|
||
|
|
||
|
INIT_LIST_HEAD(&rule->keyfields);
|
||
|
ret = vcap_rule_add_key_u128(rule, VCAP_KF_L3_IP6_SIP, &dip);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = list_empty(&rule->keyfields);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
kf = list_first_entry(&rule->keyfields, struct vcap_client_keyfield,
|
||
|
ctrl.list);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KF_L3_IP6_SIP, kf->ctrl.key);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_FIELD_U128, kf->ctrl.type);
|
||
|
for (idx = 0; idx < ARRAY_SIZE(dip.value); ++idx)
|
||
|
KUNIT_EXPECT_EQ(test, dip.value[idx], kf->data.u128.value[idx]);
|
||
|
for (idx = 0; idx < ARRAY_SIZE(dip.mask); ++idx)
|
||
|
KUNIT_EXPECT_EQ(test, dip.mask[idx], kf->data.u128.mask[idx]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_rule_add_actionvalue_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
};
|
||
|
struct vcap_rule_internal ri = {
|
||
|
.admin = &admin,
|
||
|
.data = {
|
||
|
.actionset = VCAP_AFS_NO_VALUE,
|
||
|
},
|
||
|
};
|
||
|
struct vcap_rule *rule = (struct vcap_rule *)&ri;
|
||
|
struct vcap_client_actionfield *af;
|
||
|
int ret;
|
||
|
|
||
|
INIT_LIST_HEAD(&rule->actionfields);
|
||
|
ret = vcap_rule_add_action_bit(rule, VCAP_AF_POLICE_ENA, VCAP_BIT_0);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = list_empty(&rule->actionfields);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
af = list_first_entry(&rule->actionfields,
|
||
|
struct vcap_client_actionfield, ctrl.list);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_AF_POLICE_ENA, af->ctrl.action);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_FIELD_BIT, af->ctrl.type);
|
||
|
KUNIT_EXPECT_EQ(test, 0x0, af->data.u1.value);
|
||
|
|
||
|
INIT_LIST_HEAD(&rule->actionfields);
|
||
|
ret = vcap_rule_add_action_bit(rule, VCAP_AF_POLICE_ENA, VCAP_BIT_1);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = list_empty(&rule->actionfields);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
af = list_first_entry(&rule->actionfields,
|
||
|
struct vcap_client_actionfield, ctrl.list);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_AF_POLICE_ENA, af->ctrl.action);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_FIELD_BIT, af->ctrl.type);
|
||
|
KUNIT_EXPECT_EQ(test, 0x1, af->data.u1.value);
|
||
|
|
||
|
INIT_LIST_HEAD(&rule->actionfields);
|
||
|
ret = vcap_rule_add_action_bit(rule, VCAP_AF_POLICE_ENA, VCAP_BIT_ANY);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = list_empty(&rule->actionfields);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
af = list_first_entry(&rule->actionfields,
|
||
|
struct vcap_client_actionfield, ctrl.list);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_AF_POLICE_ENA, af->ctrl.action);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_FIELD_BIT, af->ctrl.type);
|
||
|
KUNIT_EXPECT_EQ(test, 0x0, af->data.u1.value);
|
||
|
|
||
|
INIT_LIST_HEAD(&rule->actionfields);
|
||
|
ret = vcap_rule_add_action_u32(rule, VCAP_AF_TYPE, 0x98765432);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = list_empty(&rule->actionfields);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
af = list_first_entry(&rule->actionfields,
|
||
|
struct vcap_client_actionfield, ctrl.list);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_AF_TYPE, af->ctrl.action);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_FIELD_U32, af->ctrl.type);
|
||
|
KUNIT_EXPECT_EQ(test, 0x98765432, af->data.u32.value);
|
||
|
|
||
|
INIT_LIST_HEAD(&rule->actionfields);
|
||
|
ret = vcap_rule_add_action_u32(rule, VCAP_AF_MASK_MODE, 0xaabbccdd);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = list_empty(&rule->actionfields);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
af = list_first_entry(&rule->actionfields,
|
||
|
struct vcap_client_actionfield, ctrl.list);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_AF_MASK_MODE, af->ctrl.action);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_FIELD_U32, af->ctrl.type);
|
||
|
KUNIT_EXPECT_EQ(test, 0xaabbccdd, af->data.u32.value);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_rule_find_keyset_basic_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_keyset_list matches = {};
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
};
|
||
|
struct vcap_rule_internal ri = {
|
||
|
.admin = &admin,
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_client_keyfield ckf[] = {
|
||
|
{
|
||
|
.ctrl.key = VCAP_KF_TYPE,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_LOOKUP_FIRST_IS,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_IF_IGR_PORT_MASK_L3,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_IF_IGR_PORT_MASK_RNG,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_IF_IGR_PORT_MASK,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_L2_DMAC,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_ETYPE_LEN_IS,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_ETYPE,
|
||
|
},
|
||
|
};
|
||
|
int idx;
|
||
|
bool ret;
|
||
|
enum vcap_keyfield_set keysets[10] = {};
|
||
|
|
||
|
matches.keysets = keysets;
|
||
|
matches.max = ARRAY_SIZE(keysets);
|
||
|
|
||
|
INIT_LIST_HEAD(&ri.data.keyfields);
|
||
|
for (idx = 0; idx < ARRAY_SIZE(ckf); idx++)
|
||
|
list_add_tail(&ckf[idx].ctrl.list, &ri.data.keyfields);
|
||
|
|
||
|
ret = vcap_rule_find_keysets(&ri.data, &matches);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 1, matches.cnt);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KFS_MAC_ETYPE, matches.keysets[0]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_rule_find_keyset_failed_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_keyset_list matches = {};
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
};
|
||
|
struct vcap_rule_internal ri = {
|
||
|
.admin = &admin,
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_client_keyfield ckf[] = {
|
||
|
{
|
||
|
.ctrl.key = VCAP_KF_TYPE,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_LOOKUP_FIRST_IS,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_ARP_OPCODE,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_L3_IP4_SIP,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_L3_IP4_DIP,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_8021Q_PCP_CLS,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_ETYPE_LEN_IS, /* Not with ARP */
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_ETYPE, /* Not with ARP */
|
||
|
},
|
||
|
};
|
||
|
int idx;
|
||
|
bool ret;
|
||
|
enum vcap_keyfield_set keysets[10] = {};
|
||
|
|
||
|
matches.keysets = keysets;
|
||
|
matches.max = ARRAY_SIZE(keysets);
|
||
|
|
||
|
INIT_LIST_HEAD(&ri.data.keyfields);
|
||
|
for (idx = 0; idx < ARRAY_SIZE(ckf); idx++)
|
||
|
list_add_tail(&ckf[idx].ctrl.list, &ri.data.keyfields);
|
||
|
|
||
|
ret = vcap_rule_find_keysets(&ri.data, &matches);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 0, matches.cnt);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KFS_NO_VALUE, matches.keysets[0]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_rule_find_keyset_many_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_keyset_list matches = {};
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
};
|
||
|
struct vcap_rule_internal ri = {
|
||
|
.admin = &admin,
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_client_keyfield ckf[] = {
|
||
|
{
|
||
|
.ctrl.key = VCAP_KF_TYPE,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_LOOKUP_FIRST_IS,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_8021Q_DEI_CLS,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_8021Q_PCP_CLS,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_8021Q_VID_CLS,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_ISDX_CLS,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_L2_MC_IS,
|
||
|
}, {
|
||
|
.ctrl.key = VCAP_KF_L2_BC_IS,
|
||
|
},
|
||
|
};
|
||
|
int idx;
|
||
|
bool ret;
|
||
|
enum vcap_keyfield_set keysets[10] = {};
|
||
|
|
||
|
matches.keysets = keysets;
|
||
|
matches.max = ARRAY_SIZE(keysets);
|
||
|
|
||
|
INIT_LIST_HEAD(&ri.data.keyfields);
|
||
|
for (idx = 0; idx < ARRAY_SIZE(ckf); idx++)
|
||
|
list_add_tail(&ckf[idx].ctrl.list, &ri.data.keyfields);
|
||
|
|
||
|
ret = vcap_rule_find_keysets(&ri.data, &matches);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 6, matches.cnt);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KFS_ARP, matches.keysets[0]);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KFS_IP4_OTHER, matches.keysets[1]);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KFS_IP4_TCP_UDP, matches.keysets[2]);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KFS_IP6_STD, matches.keysets[3]);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KFS_IP_7TUPLE, matches.keysets[4]);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KFS_MAC_ETYPE, matches.keysets[5]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_encode_rule_test(struct kunit *test)
|
||
|
{
|
||
|
/* Data used by VCAP Library callback */
|
||
|
static u32 keydata[32] = {};
|
||
|
static u32 mskdata[32] = {};
|
||
|
static u32 actdata[32] = {};
|
||
|
|
||
|
struct vcap_admin is2_admin = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
.first_cid = 8000000,
|
||
|
.last_cid = 8099999,
|
||
|
.lookups = 4,
|
||
|
.last_valid_addr = 3071,
|
||
|
.first_valid_addr = 0,
|
||
|
.last_used_addr = 800,
|
||
|
.cache = {
|
||
|
.keystream = keydata,
|
||
|
.maskstream = mskdata,
|
||
|
.actionstream = actdata,
|
||
|
},
|
||
|
};
|
||
|
struct vcap_rule *rule;
|
||
|
struct vcap_rule_internal *ri;
|
||
|
int vcap_chain_id = 8000000;
|
||
|
enum vcap_user user = VCAP_USER_VCAP_UTIL;
|
||
|
u16 priority = 10;
|
||
|
int id = 100;
|
||
|
int ret;
|
||
|
struct vcap_u48_key smac = {
|
||
|
.value = { 0x88, 0x75, 0x32, 0x34, 0x9e, 0xb1 },
|
||
|
.mask = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }
|
||
|
};
|
||
|
struct vcap_u48_key dmac = {
|
||
|
.value = { 0x06, 0x05, 0x04, 0x03, 0x02, 0x01 },
|
||
|
.mask = { 0xff, 0xff, 0xff, 0xff, 0xff, 0xff }
|
||
|
};
|
||
|
u32 port_mask_rng_value = 0x05;
|
||
|
u32 port_mask_rng_mask = 0x0f;
|
||
|
u32 igr_port_mask_value = 0xffabcd01;
|
||
|
u32 igr_port_mask_mask = ~0;
|
||
|
/* counter is written as the first operation */
|
||
|
u32 expwriteaddr[] = {792, 792, 793, 794, 795, 796, 797};
|
||
|
int idx;
|
||
|
|
||
|
vcap_test_api_init(&is2_admin);
|
||
|
|
||
|
/* Allocate the rule */
|
||
|
rule = vcap_alloc_rule(&test_vctrl, &test_netdev, vcap_chain_id, user,
|
||
|
priority, id);
|
||
|
KUNIT_EXPECT_PTR_NE(test, NULL, rule);
|
||
|
ri = (struct vcap_rule_internal *)rule;
|
||
|
|
||
|
/* Add rule keys */
|
||
|
ret = vcap_rule_add_key_u48(rule, VCAP_KF_L2_DMAC, &dmac);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = vcap_rule_add_key_u48(rule, VCAP_KF_L2_SMAC, &smac);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = vcap_rule_add_key_bit(rule, VCAP_KF_ETYPE_LEN_IS, VCAP_BIT_1);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
/* Cannot add the same field twice */
|
||
|
ret = vcap_rule_add_key_bit(rule, VCAP_KF_ETYPE_LEN_IS, VCAP_BIT_1);
|
||
|
KUNIT_EXPECT_EQ(test, -EINVAL, ret);
|
||
|
ret = vcap_rule_add_key_bit(rule, VCAP_KF_IF_IGR_PORT_MASK_L3,
|
||
|
VCAP_BIT_ANY);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = vcap_rule_add_key_u32(rule, VCAP_KF_IF_IGR_PORT_MASK_RNG,
|
||
|
port_mask_rng_value, port_mask_rng_mask);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = vcap_rule_add_key_u32(rule, VCAP_KF_IF_IGR_PORT_MASK,
|
||
|
igr_port_mask_value, igr_port_mask_mask);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
/* Add rule actions */
|
||
|
ret = vcap_rule_add_action_bit(rule, VCAP_AF_POLICE_ENA, VCAP_BIT_1);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = vcap_rule_add_action_u32(rule, VCAP_AF_CNT_ID, id);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = vcap_rule_add_action_u32(rule, VCAP_AF_MATCH_ID, 1);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
ret = vcap_rule_add_action_u32(rule, VCAP_AF_MATCH_ID_MASK, 1);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
/* For now the actionset is hardcoded */
|
||
|
ret = vcap_set_rule_set_actionset(rule, VCAP_AFS_BASE_TYPE);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
/* Validation with validate keyset callback */
|
||
|
ret = vcap_val_rule(rule, ETH_P_ALL);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_KFS_MAC_ETYPE, rule->keyset);
|
||
|
KUNIT_EXPECT_EQ(test, VCAP_AFS_BASE_TYPE, rule->actionset);
|
||
|
KUNIT_EXPECT_EQ(test, 6, ri->size);
|
||
|
KUNIT_EXPECT_EQ(test, 2, ri->keyset_sw_regs);
|
||
|
KUNIT_EXPECT_EQ(test, 4, ri->actionset_sw_regs);
|
||
|
|
||
|
/* Enable lookup, so the rule will be written */
|
||
|
ret = vcap_enable_lookups(&test_vctrl, &test_netdev, 0,
|
||
|
rule->vcap_chain_id, rule->cookie, true);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
/* Add rule with write callback */
|
||
|
ret = vcap_add_rule(rule);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 792, is2_admin.last_used_addr);
|
||
|
for (idx = 0; idx < ARRAY_SIZE(expwriteaddr); ++idx)
|
||
|
KUNIT_EXPECT_EQ(test, expwriteaddr[idx], test_updateaddr[idx]);
|
||
|
|
||
|
/* Check that the rule has been added */
|
||
|
ret = list_empty(&is2_admin.rules);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
vcap_free_rule(rule);
|
||
|
|
||
|
/* Check that the rule has been freed: tricky to access since this
|
||
|
* memory should not be accessible anymore
|
||
|
*/
|
||
|
KUNIT_EXPECT_PTR_NE(test, NULL, rule);
|
||
|
ret = list_empty(&rule->keyfields);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
ret = list_empty(&rule->actionfields);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_set_rule_counter_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_admin is2_admin = {
|
||
|
.cache = {
|
||
|
.counter = 100,
|
||
|
.sticky = true,
|
||
|
},
|
||
|
};
|
||
|
struct vcap_rule_internal ri = {
|
||
|
.data = {
|
||
|
.id = 1001,
|
||
|
},
|
||
|
.addr = 600,
|
||
|
.admin = &is2_admin,
|
||
|
.counter_id = 1002,
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_rule_internal ri2 = {
|
||
|
.data = {
|
||
|
.id = 2001,
|
||
|
},
|
||
|
.addr = 700,
|
||
|
.admin = &is2_admin,
|
||
|
.counter_id = 2002,
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_counter ctr = { .value = 0, .sticky = false};
|
||
|
struct vcap_counter ctr2 = { .value = 101, .sticky = true};
|
||
|
int ret;
|
||
|
|
||
|
vcap_test_api_init(&is2_admin);
|
||
|
list_add_tail(&ri.list, &is2_admin.rules);
|
||
|
list_add_tail(&ri2.list, &is2_admin.rules);
|
||
|
|
||
|
pr_info("%s:%d\n", __func__, __LINE__);
|
||
|
ret = vcap_rule_set_counter(&ri.data, &ctr);
|
||
|
pr_info("%s:%d\n", __func__, __LINE__);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 1002, test_hw_counter_id);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_hw_cache.counter);
|
||
|
KUNIT_EXPECT_EQ(test, false, test_hw_cache.sticky);
|
||
|
KUNIT_EXPECT_EQ(test, 600, test_updateaddr[0]);
|
||
|
|
||
|
ret = vcap_rule_set_counter(&ri2.data, &ctr2);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 2002, test_hw_counter_id);
|
||
|
KUNIT_EXPECT_EQ(test, 101, test_hw_cache.counter);
|
||
|
KUNIT_EXPECT_EQ(test, true, test_hw_cache.sticky);
|
||
|
KUNIT_EXPECT_EQ(test, 700, test_updateaddr[1]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_get_rule_counter_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_admin is2_admin = {
|
||
|
.cache = {
|
||
|
.counter = 100,
|
||
|
.sticky = true,
|
||
|
},
|
||
|
};
|
||
|
struct vcap_rule_internal ri = {
|
||
|
.data = {
|
||
|
.id = 1010,
|
||
|
},
|
||
|
.addr = 400,
|
||
|
.admin = &is2_admin,
|
||
|
.counter_id = 1011,
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_rule_internal ri2 = {
|
||
|
.data = {
|
||
|
.id = 2011,
|
||
|
},
|
||
|
.addr = 300,
|
||
|
.admin = &is2_admin,
|
||
|
.counter_id = 2012,
|
||
|
.vctrl = &test_vctrl,
|
||
|
};
|
||
|
struct vcap_counter ctr = {};
|
||
|
struct vcap_counter ctr2 = {};
|
||
|
int ret;
|
||
|
|
||
|
vcap_test_api_init(&is2_admin);
|
||
|
test_hw_cache.counter = 55;
|
||
|
test_hw_cache.sticky = true;
|
||
|
|
||
|
list_add_tail(&ri.list, &is2_admin.rules);
|
||
|
list_add_tail(&ri2.list, &is2_admin.rules);
|
||
|
|
||
|
ret = vcap_rule_get_counter(&ri.data, &ctr);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 1011, test_hw_counter_id);
|
||
|
KUNIT_EXPECT_EQ(test, 55, ctr.value);
|
||
|
KUNIT_EXPECT_EQ(test, true, ctr.sticky);
|
||
|
KUNIT_EXPECT_EQ(test, 400, test_updateaddr[0]);
|
||
|
|
||
|
test_hw_cache.counter = 22;
|
||
|
test_hw_cache.sticky = false;
|
||
|
|
||
|
ret = vcap_rule_get_counter(&ri2.data, &ctr2);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 2012, test_hw_counter_id);
|
||
|
KUNIT_EXPECT_EQ(test, 22, ctr2.value);
|
||
|
KUNIT_EXPECT_EQ(test, false, ctr2.sticky);
|
||
|
KUNIT_EXPECT_EQ(test, 300, test_updateaddr[1]);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_rule_insert_in_order_test(struct kunit *test)
|
||
|
{
|
||
|
/* Data used by VCAP Library callback */
|
||
|
static u32 keydata[32] = {};
|
||
|
static u32 mskdata[32] = {};
|
||
|
static u32 actdata[32] = {};
|
||
|
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS0,
|
||
|
.first_cid = 10000,
|
||
|
.last_cid = 19999,
|
||
|
.lookups = 4,
|
||
|
.last_valid_addr = 3071,
|
||
|
.first_valid_addr = 0,
|
||
|
.last_used_addr = 800,
|
||
|
.cache = {
|
||
|
.keystream = keydata,
|
||
|
.maskstream = mskdata,
|
||
|
.actionstream = actdata,
|
||
|
},
|
||
|
};
|
||
|
|
||
|
vcap_test_api_init(&admin);
|
||
|
|
||
|
/* Create rules with different sizes and check that they are placed
|
||
|
* at the correct address in the VCAP according to size
|
||
|
*/
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 10, 500, 12, 780);
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 20, 400, 6, 774);
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 30, 300, 3, 771);
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 40, 200, 2, 768);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_rule_insert_reverse_order_test(struct kunit *test)
|
||
|
{
|
||
|
/* Data used by VCAP Library callback */
|
||
|
static u32 keydata[32] = {};
|
||
|
static u32 mskdata[32] = {};
|
||
|
static u32 actdata[32] = {};
|
||
|
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS0,
|
||
|
.first_cid = 10000,
|
||
|
.last_cid = 19999,
|
||
|
.lookups = 4,
|
||
|
.last_valid_addr = 3071,
|
||
|
.first_valid_addr = 0,
|
||
|
.last_used_addr = 800,
|
||
|
.cache = {
|
||
|
.keystream = keydata,
|
||
|
.maskstream = mskdata,
|
||
|
.actionstream = actdata,
|
||
|
},
|
||
|
};
|
||
|
struct vcap_rule_internal *elem;
|
||
|
u32 exp_addr[] = {780, 774, 771, 768, 767};
|
||
|
int idx;
|
||
|
|
||
|
vcap_test_api_init(&admin);
|
||
|
|
||
|
/* Create rules with different sizes and check that they are placed
|
||
|
* at the correct address in the VCAP according to size
|
||
|
*/
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 20, 200, 2, 798);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_addr);
|
||
|
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 30, 300, 3, 795);
|
||
|
KUNIT_EXPECT_EQ(test, 6, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 3, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 798, test_move_addr);
|
||
|
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 40, 400, 6, 792);
|
||
|
KUNIT_EXPECT_EQ(test, 6, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 6, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 792, test_move_addr);
|
||
|
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 50, 500, 12, 780);
|
||
|
KUNIT_EXPECT_EQ(test, 18, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 12, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 786, test_move_addr);
|
||
|
|
||
|
idx = 0;
|
||
|
list_for_each_entry(elem, &admin.rules, list) {
|
||
|
KUNIT_EXPECT_EQ(test, exp_addr[idx], elem->addr);
|
||
|
++idx;
|
||
|
}
|
||
|
KUNIT_EXPECT_EQ(test, 768, admin.last_used_addr);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_rule_remove_at_end_test(struct kunit *test)
|
||
|
{
|
||
|
/* Data used by VCAP Library callback */
|
||
|
static u32 keydata[32] = {};
|
||
|
static u32 mskdata[32] = {};
|
||
|
static u32 actdata[32] = {};
|
||
|
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS0,
|
||
|
.first_cid = 10000,
|
||
|
.last_cid = 19999,
|
||
|
.lookups = 4,
|
||
|
.last_valid_addr = 3071,
|
||
|
.first_valid_addr = 0,
|
||
|
.last_used_addr = 800,
|
||
|
.cache = {
|
||
|
.keystream = keydata,
|
||
|
.maskstream = mskdata,
|
||
|
.actionstream = actdata,
|
||
|
},
|
||
|
};
|
||
|
int ret;
|
||
|
|
||
|
vcap_test_api_init(&admin);
|
||
|
test_init_rule_deletion();
|
||
|
|
||
|
/* Create rules with different sizes and check that they are placed
|
||
|
* at the correct address in the VCAP according to size
|
||
|
*/
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 10, 500, 12, 780);
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 20, 400, 6, 774);
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 30, 300, 3, 771);
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 40, 200, 2, 768);
|
||
|
|
||
|
/* Remove rules again from the end */
|
||
|
ret = vcap_del_rule(&test_vctrl, &test_netdev, 200);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_addr);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 768, test_init_start);
|
||
|
KUNIT_EXPECT_EQ(test, 2, test_init_count);
|
||
|
KUNIT_EXPECT_EQ(test, 771, admin.last_used_addr);
|
||
|
|
||
|
ret = vcap_del_rule(&test_vctrl, &test_netdev, 300);
|
||
|
KUNIT_EXPECT_EQ(test, ret, 0);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_addr);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 771, test_init_start);
|
||
|
KUNIT_EXPECT_EQ(test, 3, test_init_count);
|
||
|
KUNIT_EXPECT_EQ(test, 774, admin.last_used_addr);
|
||
|
|
||
|
ret = vcap_del_rule(&test_vctrl, &test_netdev, 400);
|
||
|
KUNIT_EXPECT_EQ(test, ret, 0);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_addr);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 774, test_init_start);
|
||
|
KUNIT_EXPECT_EQ(test, 6, test_init_count);
|
||
|
KUNIT_EXPECT_EQ(test, 780, admin.last_used_addr);
|
||
|
|
||
|
ret = vcap_del_rule(&test_vctrl, &test_netdev, 500);
|
||
|
KUNIT_EXPECT_EQ(test, ret, 0);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_addr);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 780, test_init_start);
|
||
|
KUNIT_EXPECT_EQ(test, 12, test_init_count);
|
||
|
KUNIT_EXPECT_EQ(test, 3072, admin.last_used_addr);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_rule_remove_in_middle_test(struct kunit *test)
|
||
|
{
|
||
|
/* Data used by VCAP Library callback */
|
||
|
static u32 keydata[32] = {};
|
||
|
static u32 mskdata[32] = {};
|
||
|
static u32 actdata[32] = {};
|
||
|
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS0,
|
||
|
.first_cid = 10000,
|
||
|
.last_cid = 19999,
|
||
|
.lookups = 4,
|
||
|
.first_valid_addr = 0,
|
||
|
.last_used_addr = 800,
|
||
|
.last_valid_addr = 800 - 1,
|
||
|
.cache = {
|
||
|
.keystream = keydata,
|
||
|
.maskstream = mskdata,
|
||
|
.actionstream = actdata,
|
||
|
},
|
||
|
};
|
||
|
int ret;
|
||
|
|
||
|
vcap_test_api_init(&admin);
|
||
|
|
||
|
/* Create rules with different sizes and check that they are placed
|
||
|
* at the correct address in the VCAP according to size
|
||
|
*/
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 10, 500, 12, 780);
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 20, 400, 6, 774);
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 30, 300, 3, 771);
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 40, 200, 2, 768);
|
||
|
|
||
|
/* Remove rules in the middle */
|
||
|
test_init_rule_deletion();
|
||
|
ret = vcap_del_rule(&test_vctrl, &test_netdev, 400);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 768, test_move_addr);
|
||
|
KUNIT_EXPECT_EQ(test, -6, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 6, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 768, test_init_start);
|
||
|
KUNIT_EXPECT_EQ(test, 6, test_init_count);
|
||
|
KUNIT_EXPECT_EQ(test, 774, admin.last_used_addr);
|
||
|
|
||
|
test_init_rule_deletion();
|
||
|
ret = vcap_del_rule(&test_vctrl, &test_netdev, 300);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 774, test_move_addr);
|
||
|
KUNIT_EXPECT_EQ(test, -4, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 2, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 774, test_init_start);
|
||
|
KUNIT_EXPECT_EQ(test, 4, test_init_count);
|
||
|
KUNIT_EXPECT_EQ(test, 778, admin.last_used_addr);
|
||
|
|
||
|
test_init_rule_deletion();
|
||
|
ret = vcap_del_rule(&test_vctrl, &test_netdev, 500);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 778, test_move_addr);
|
||
|
KUNIT_EXPECT_EQ(test, -20, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 2, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 778, test_init_start);
|
||
|
KUNIT_EXPECT_EQ(test, 20, test_init_count);
|
||
|
KUNIT_EXPECT_EQ(test, 798, admin.last_used_addr);
|
||
|
|
||
|
test_init_rule_deletion();
|
||
|
ret = vcap_del_rule(&test_vctrl, &test_netdev, 200);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_addr);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 798, test_init_start);
|
||
|
KUNIT_EXPECT_EQ(test, 2, test_init_count);
|
||
|
KUNIT_EXPECT_EQ(test, 800, admin.last_used_addr);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_rule_remove_in_front_test(struct kunit *test)
|
||
|
{
|
||
|
/* Data used by VCAP Library callback */
|
||
|
static u32 keydata[32] = {};
|
||
|
static u32 mskdata[32] = {};
|
||
|
static u32 actdata[32] = {};
|
||
|
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS0,
|
||
|
.first_cid = 10000,
|
||
|
.last_cid = 19999,
|
||
|
.lookups = 4,
|
||
|
.first_valid_addr = 0,
|
||
|
.last_used_addr = 800,
|
||
|
.last_valid_addr = 800 - 1,
|
||
|
.cache = {
|
||
|
.keystream = keydata,
|
||
|
.maskstream = mskdata,
|
||
|
.actionstream = actdata,
|
||
|
},
|
||
|
};
|
||
|
int ret;
|
||
|
|
||
|
vcap_test_api_init(&admin);
|
||
|
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 10, 500, 12, 780);
|
||
|
KUNIT_EXPECT_EQ(test, 780, admin.last_used_addr);
|
||
|
|
||
|
test_init_rule_deletion();
|
||
|
ret = vcap_del_rule(&test_vctrl, &test_netdev, 500);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_addr);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 0, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 780, test_init_start);
|
||
|
KUNIT_EXPECT_EQ(test, 12, test_init_count);
|
||
|
KUNIT_EXPECT_EQ(test, 800, admin.last_used_addr);
|
||
|
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 20, 400, 6, 792);
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 30, 300, 3, 789);
|
||
|
test_vcap_xn_rule_creator(test, 10000, VCAP_USER_QOS, 40, 200, 2, 786);
|
||
|
|
||
|
test_init_rule_deletion();
|
||
|
ret = vcap_del_rule(&test_vctrl, &test_netdev, 400);
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
KUNIT_EXPECT_EQ(test, 786, test_move_addr);
|
||
|
KUNIT_EXPECT_EQ(test, -8, test_move_offset);
|
||
|
KUNIT_EXPECT_EQ(test, 6, test_move_count);
|
||
|
KUNIT_EXPECT_EQ(test, 786, test_init_start);
|
||
|
KUNIT_EXPECT_EQ(test, 8, test_init_count);
|
||
|
KUNIT_EXPECT_EQ(test, 794, admin.last_used_addr);
|
||
|
}
|
||
|
|
||
|
static struct kunit_case vcap_api_rule_remove_test_cases[] = {
|
||
|
KUNIT_CASE(vcap_api_rule_remove_at_end_test),
|
||
|
KUNIT_CASE(vcap_api_rule_remove_in_middle_test),
|
||
|
KUNIT_CASE(vcap_api_rule_remove_in_front_test),
|
||
|
{}
|
||
|
};
|
||
|
|
||
|
static void vcap_api_next_lookup_basic_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_admin admin1 = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
.vinst = 0,
|
||
|
.first_cid = 8000000,
|
||
|
.last_cid = 8199999,
|
||
|
.lookups = 4,
|
||
|
.lookups_per_instance = 2,
|
||
|
};
|
||
|
struct vcap_admin admin2 = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
.vinst = 1,
|
||
|
.first_cid = 8200000,
|
||
|
.last_cid = 8399999,
|
||
|
.lookups = 4,
|
||
|
.lookups_per_instance = 2,
|
||
|
};
|
||
|
bool ret;
|
||
|
|
||
|
vcap_test_api_init(&admin1);
|
||
|
list_add_tail(&admin2.list, &test_vctrl.list);
|
||
|
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8000000, 1001000);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8000000, 8001000);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8000000, 8101000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8100000, 8101000);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8100000, 8201000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8200000, 8201000);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8200000, 8301000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8300000, 8301000);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8300000, 8401000);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_next_lookup_advanced_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_admin admin[] = {
|
||
|
{
|
||
|
.vtype = VCAP_TYPE_IS0,
|
||
|
.vinst = 0,
|
||
|
.first_cid = 1000000,
|
||
|
.last_cid = 1199999,
|
||
|
.lookups = 6,
|
||
|
.lookups_per_instance = 2,
|
||
|
}, {
|
||
|
.vtype = VCAP_TYPE_IS0,
|
||
|
.vinst = 1,
|
||
|
.first_cid = 1200000,
|
||
|
.last_cid = 1399999,
|
||
|
.lookups = 6,
|
||
|
.lookups_per_instance = 2,
|
||
|
}, {
|
||
|
.vtype = VCAP_TYPE_IS0,
|
||
|
.vinst = 2,
|
||
|
.first_cid = 1400000,
|
||
|
.last_cid = 1599999,
|
||
|
.lookups = 6,
|
||
|
.lookups_per_instance = 2,
|
||
|
}, {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
.vinst = 0,
|
||
|
.first_cid = 8000000,
|
||
|
.last_cid = 8199999,
|
||
|
.lookups = 4,
|
||
|
.lookups_per_instance = 2,
|
||
|
}, {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
.vinst = 1,
|
||
|
.first_cid = 8200000,
|
||
|
.last_cid = 8399999,
|
||
|
.lookups = 4,
|
||
|
.lookups_per_instance = 2,
|
||
|
}
|
||
|
};
|
||
|
bool ret;
|
||
|
|
||
|
vcap_test_api_init(&admin[0]);
|
||
|
list_add_tail(&admin[1].list, &test_vctrl.list);
|
||
|
list_add_tail(&admin[2].list, &test_vctrl.list);
|
||
|
list_add_tail(&admin[3].list, &test_vctrl.list);
|
||
|
list_add_tail(&admin[4].list, &test_vctrl.list);
|
||
|
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 1000000, 1001000);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 1000000, 1101000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 1100000, 1201000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 1100000, 1301000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 1100000, 8101000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 1300000, 1401000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 1400000, 1501000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 1500000, 8001000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8000000, 8001000);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8000000, 8101000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8300000, 8301000);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
ret = vcap_is_next_lookup(&test_vctrl, 8300000, 8401000);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_filter_unsupported_keys_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS2,
|
||
|
};
|
||
|
struct vcap_rule_internal ri = {
|
||
|
.admin = &admin,
|
||
|
.vctrl = &test_vctrl,
|
||
|
.data.keyset = VCAP_KFS_MAC_ETYPE,
|
||
|
};
|
||
|
enum vcap_key_field keylist[] = {
|
||
|
VCAP_KF_TYPE,
|
||
|
VCAP_KF_LOOKUP_FIRST_IS,
|
||
|
VCAP_KF_ARP_ADDR_SPACE_OK_IS, /* arp keys are not in keyset */
|
||
|
VCAP_KF_ARP_PROTO_SPACE_OK_IS,
|
||
|
VCAP_KF_ARP_LEN_OK_IS,
|
||
|
VCAP_KF_ARP_TGT_MATCH_IS,
|
||
|
VCAP_KF_ARP_SENDER_MATCH_IS,
|
||
|
VCAP_KF_ARP_OPCODE_UNKNOWN_IS,
|
||
|
VCAP_KF_ARP_OPCODE,
|
||
|
VCAP_KF_8021Q_DEI_CLS,
|
||
|
VCAP_KF_8021Q_PCP_CLS,
|
||
|
VCAP_KF_8021Q_VID_CLS,
|
||
|
VCAP_KF_L2_MC_IS,
|
||
|
VCAP_KF_L2_BC_IS,
|
||
|
};
|
||
|
enum vcap_key_field expected[] = {
|
||
|
VCAP_KF_TYPE,
|
||
|
VCAP_KF_LOOKUP_FIRST_IS,
|
||
|
VCAP_KF_8021Q_DEI_CLS,
|
||
|
VCAP_KF_8021Q_PCP_CLS,
|
||
|
VCAP_KF_8021Q_VID_CLS,
|
||
|
VCAP_KF_L2_MC_IS,
|
||
|
VCAP_KF_L2_BC_IS,
|
||
|
};
|
||
|
struct vcap_client_keyfield *ckf, *next;
|
||
|
bool ret;
|
||
|
int idx;
|
||
|
|
||
|
/* Add all keys to the rule */
|
||
|
INIT_LIST_HEAD(&ri.data.keyfields);
|
||
|
for (idx = 0; idx < ARRAY_SIZE(keylist); idx++) {
|
||
|
ckf = kzalloc(sizeof(*ckf), GFP_KERNEL);
|
||
|
if (ckf) {
|
||
|
ckf->ctrl.key = keylist[idx];
|
||
|
list_add_tail(&ckf->ctrl.list, &ri.data.keyfields);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 14, ARRAY_SIZE(keylist));
|
||
|
|
||
|
/* Drop unsupported keys from the rule */
|
||
|
ret = vcap_filter_rule_keys(&ri.data, NULL, 0, true);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
/* Check remaining keys in the rule */
|
||
|
idx = 0;
|
||
|
list_for_each_entry_safe(ckf, next, &ri.data.keyfields, ctrl.list) {
|
||
|
KUNIT_EXPECT_EQ(test, expected[idx], ckf->ctrl.key);
|
||
|
list_del(&ckf->ctrl.list);
|
||
|
kfree(ckf);
|
||
|
++idx;
|
||
|
}
|
||
|
KUNIT_EXPECT_EQ(test, 7, idx);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_filter_keylist_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_admin admin = {
|
||
|
.vtype = VCAP_TYPE_IS0,
|
||
|
};
|
||
|
struct vcap_rule_internal ri = {
|
||
|
.admin = &admin,
|
||
|
.vctrl = &test_vctrl,
|
||
|
.data.keyset = VCAP_KFS_NORMAL_7TUPLE,
|
||
|
};
|
||
|
enum vcap_key_field keylist[] = {
|
||
|
VCAP_KF_TYPE,
|
||
|
VCAP_KF_LOOKUP_FIRST_IS,
|
||
|
VCAP_KF_LOOKUP_GEN_IDX_SEL,
|
||
|
VCAP_KF_LOOKUP_GEN_IDX,
|
||
|
VCAP_KF_IF_IGR_PORT_MASK_SEL,
|
||
|
VCAP_KF_IF_IGR_PORT_MASK,
|
||
|
VCAP_KF_L2_MC_IS,
|
||
|
VCAP_KF_L2_BC_IS,
|
||
|
VCAP_KF_8021Q_VLAN_TAGS,
|
||
|
VCAP_KF_8021Q_TPID0,
|
||
|
VCAP_KF_8021Q_PCP0,
|
||
|
VCAP_KF_8021Q_DEI0,
|
||
|
VCAP_KF_8021Q_VID0,
|
||
|
VCAP_KF_8021Q_TPID1,
|
||
|
VCAP_KF_8021Q_PCP1,
|
||
|
VCAP_KF_8021Q_DEI1,
|
||
|
VCAP_KF_8021Q_VID1,
|
||
|
VCAP_KF_8021Q_TPID2,
|
||
|
VCAP_KF_8021Q_PCP2,
|
||
|
VCAP_KF_8021Q_DEI2,
|
||
|
VCAP_KF_8021Q_VID2,
|
||
|
VCAP_KF_L2_DMAC,
|
||
|
VCAP_KF_L2_SMAC,
|
||
|
VCAP_KF_IP_MC_IS,
|
||
|
VCAP_KF_ETYPE_LEN_IS,
|
||
|
VCAP_KF_ETYPE,
|
||
|
VCAP_KF_IP_SNAP_IS,
|
||
|
VCAP_KF_IP4_IS,
|
||
|
VCAP_KF_L3_FRAGMENT_TYPE,
|
||
|
VCAP_KF_L3_FRAG_INVLD_L4_LEN,
|
||
|
VCAP_KF_L3_OPTIONS_IS,
|
||
|
VCAP_KF_L3_DSCP,
|
||
|
VCAP_KF_L3_IP6_DIP,
|
||
|
VCAP_KF_L3_IP6_SIP,
|
||
|
VCAP_KF_TCP_UDP_IS,
|
||
|
VCAP_KF_TCP_IS,
|
||
|
VCAP_KF_L4_SPORT,
|
||
|
VCAP_KF_L4_RNG,
|
||
|
};
|
||
|
enum vcap_key_field droplist[] = {
|
||
|
VCAP_KF_8021Q_TPID1,
|
||
|
VCAP_KF_8021Q_PCP1,
|
||
|
VCAP_KF_8021Q_DEI1,
|
||
|
VCAP_KF_8021Q_VID1,
|
||
|
VCAP_KF_8021Q_TPID2,
|
||
|
VCAP_KF_8021Q_PCP2,
|
||
|
VCAP_KF_8021Q_DEI2,
|
||
|
VCAP_KF_8021Q_VID2,
|
||
|
VCAP_KF_L3_IP6_DIP,
|
||
|
VCAP_KF_L3_IP6_SIP,
|
||
|
VCAP_KF_L4_SPORT,
|
||
|
VCAP_KF_L4_RNG,
|
||
|
};
|
||
|
enum vcap_key_field expected[] = {
|
||
|
VCAP_KF_TYPE,
|
||
|
VCAP_KF_LOOKUP_FIRST_IS,
|
||
|
VCAP_KF_LOOKUP_GEN_IDX_SEL,
|
||
|
VCAP_KF_LOOKUP_GEN_IDX,
|
||
|
VCAP_KF_IF_IGR_PORT_MASK_SEL,
|
||
|
VCAP_KF_IF_IGR_PORT_MASK,
|
||
|
VCAP_KF_L2_MC_IS,
|
||
|
VCAP_KF_L2_BC_IS,
|
||
|
VCAP_KF_8021Q_VLAN_TAGS,
|
||
|
VCAP_KF_8021Q_TPID0,
|
||
|
VCAP_KF_8021Q_PCP0,
|
||
|
VCAP_KF_8021Q_DEI0,
|
||
|
VCAP_KF_8021Q_VID0,
|
||
|
VCAP_KF_L2_DMAC,
|
||
|
VCAP_KF_L2_SMAC,
|
||
|
VCAP_KF_IP_MC_IS,
|
||
|
VCAP_KF_ETYPE_LEN_IS,
|
||
|
VCAP_KF_ETYPE,
|
||
|
VCAP_KF_IP_SNAP_IS,
|
||
|
VCAP_KF_IP4_IS,
|
||
|
VCAP_KF_L3_FRAGMENT_TYPE,
|
||
|
VCAP_KF_L3_FRAG_INVLD_L4_LEN,
|
||
|
VCAP_KF_L3_OPTIONS_IS,
|
||
|
VCAP_KF_L3_DSCP,
|
||
|
VCAP_KF_TCP_UDP_IS,
|
||
|
VCAP_KF_TCP_IS,
|
||
|
};
|
||
|
struct vcap_client_keyfield *ckf, *next;
|
||
|
bool ret;
|
||
|
int idx;
|
||
|
|
||
|
/* Add all keys to the rule */
|
||
|
INIT_LIST_HEAD(&ri.data.keyfields);
|
||
|
for (idx = 0; idx < ARRAY_SIZE(keylist); idx++) {
|
||
|
ckf = kzalloc(sizeof(*ckf), GFP_KERNEL);
|
||
|
if (ckf) {
|
||
|
ckf->ctrl.key = keylist[idx];
|
||
|
list_add_tail(&ckf->ctrl.list, &ri.data.keyfields);
|
||
|
}
|
||
|
}
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 38, ARRAY_SIZE(keylist));
|
||
|
|
||
|
/* Drop listed keys from the rule */
|
||
|
ret = vcap_filter_rule_keys(&ri.data, droplist, ARRAY_SIZE(droplist),
|
||
|
false);
|
||
|
|
||
|
KUNIT_EXPECT_EQ(test, 0, ret);
|
||
|
|
||
|
/* Check remaining keys in the rule */
|
||
|
idx = 0;
|
||
|
list_for_each_entry_safe(ckf, next, &ri.data.keyfields, ctrl.list) {
|
||
|
KUNIT_EXPECT_EQ(test, expected[idx], ckf->ctrl.key);
|
||
|
list_del(&ckf->ctrl.list);
|
||
|
kfree(ckf);
|
||
|
++idx;
|
||
|
}
|
||
|
KUNIT_EXPECT_EQ(test, 26, idx);
|
||
|
}
|
||
|
|
||
|
static void vcap_api_rule_chain_path_test(struct kunit *test)
|
||
|
{
|
||
|
struct vcap_admin admin1 = {
|
||
|
.vtype = VCAP_TYPE_IS0,
|
||
|
.vinst = 0,
|
||
|
.first_cid = 1000000,
|
||
|
.last_cid = 1199999,
|
||
|
.lookups = 6,
|
||
|
.lookups_per_instance = 2,
|
||
|
};
|
||
|
struct vcap_enabled_port eport3 = {
|
||
|
.ndev = &test_netdev,
|
||
|
.cookie = 0x100,
|
||
|
.src_cid = 0,
|
||
|
.dst_cid = 1000000,
|
||
|
};
|
||
|
struct vcap_enabled_port eport2 = {
|
||
|
.ndev = &test_netdev,
|
||
|
.cookie = 0x200,
|
||
|
.src_cid = 1000000,
|
||
|
.dst_cid = 1100000,
|
||
|
};
|
||
|
struct vcap_enabled_port eport1 = {
|
||
|
.ndev = &test_netdev,
|
||
|
.cookie = 0x300,
|
||
|
.src_cid = 1100000,
|
||
|
.dst_cid = 8000000,
|
||
|
};
|
||
|
bool ret;
|
||
|
int chain;
|
||
|
|
||
|
vcap_test_api_init(&admin1);
|
||
|
list_add_tail(&eport1.list, &admin1.enabled);
|
||
|
list_add_tail(&eport2.list, &admin1.enabled);
|
||
|
list_add_tail(&eport3.list, &admin1.enabled);
|
||
|
|
||
|
ret = vcap_path_exist(&test_vctrl, &test_netdev, 1000000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
|
||
|
ret = vcap_path_exist(&test_vctrl, &test_netdev, 1100000);
|
||
|
KUNIT_EXPECT_EQ(test, true, ret);
|
||
|
|
||
|
ret = vcap_path_exist(&test_vctrl, &test_netdev, 1200000);
|
||
|
KUNIT_EXPECT_EQ(test, false, ret);
|
||
|
|
||
|
chain = vcap_get_next_chain(&test_vctrl, &test_netdev, 0);
|
||
|
KUNIT_EXPECT_EQ(test, 1000000, chain);
|
||
|
|
||
|
chain = vcap_get_next_chain(&test_vctrl, &test_netdev, 1000000);
|
||
|
KUNIT_EXPECT_EQ(test, 1100000, chain);
|
||
|
|
||
|
chain = vcap_get_next_chain(&test_vctrl, &test_netdev, 1100000);
|
||
|
KUNIT_EXPECT_EQ(test, 8000000, chain);
|
||
|
}
|
||
|
|
||
|
static struct kunit_case vcap_api_rule_enable_test_cases[] = {
|
||
|
KUNIT_CASE(vcap_api_rule_chain_path_test),
|
||
|
{}
|
||
|
};
|
||
|
|
||
|
static struct kunit_suite vcap_api_rule_enable_test_suite = {
|
||
|
.name = "VCAP_API_Rule_Enable_Testsuite",
|
||
|
.test_cases = vcap_api_rule_enable_test_cases,
|
||
|
};
|
||
|
|
||
|
static struct kunit_suite vcap_api_rule_remove_test_suite = {
|
||
|
.name = "VCAP_API_Rule_Remove_Testsuite",
|
||
|
.test_cases = vcap_api_rule_remove_test_cases,
|
||
|
};
|
||
|
|
||
|
static struct kunit_case vcap_api_rule_insert_test_cases[] = {
|
||
|
KUNIT_CASE(vcap_api_rule_insert_in_order_test),
|
||
|
KUNIT_CASE(vcap_api_rule_insert_reverse_order_test),
|
||
|
{}
|
||
|
};
|
||
|
|
||
|
static struct kunit_suite vcap_api_rule_insert_test_suite = {
|
||
|
.name = "VCAP_API_Rule_Insert_Testsuite",
|
||
|
.test_cases = vcap_api_rule_insert_test_cases,
|
||
|
};
|
||
|
|
||
|
static struct kunit_case vcap_api_rule_counter_test_cases[] = {
|
||
|
KUNIT_CASE(vcap_api_set_rule_counter_test),
|
||
|
KUNIT_CASE(vcap_api_get_rule_counter_test),
|
||
|
{}
|
||
|
};
|
||
|
|
||
|
static struct kunit_suite vcap_api_rule_counter_test_suite = {
|
||
|
.name = "VCAP_API_Rule_Counter_Testsuite",
|
||
|
.test_cases = vcap_api_rule_counter_test_cases,
|
||
|
};
|
||
|
|
||
|
static struct kunit_case vcap_api_support_test_cases[] = {
|
||
|
KUNIT_CASE(vcap_api_next_lookup_basic_test),
|
||
|
KUNIT_CASE(vcap_api_next_lookup_advanced_test),
|
||
|
KUNIT_CASE(vcap_api_filter_unsupported_keys_test),
|
||
|
KUNIT_CASE(vcap_api_filter_keylist_test),
|
||
|
{}
|
||
|
};
|
||
|
|
||
|
static struct kunit_suite vcap_api_support_test_suite = {
|
||
|
.name = "VCAP_API_Support_Testsuite",
|
||
|
.test_cases = vcap_api_support_test_cases,
|
||
|
};
|
||
|
|
||
|
static struct kunit_case vcap_api_full_rule_test_cases[] = {
|
||
|
KUNIT_CASE(vcap_api_rule_find_keyset_basic_test),
|
||
|
KUNIT_CASE(vcap_api_rule_find_keyset_failed_test),
|
||
|
KUNIT_CASE(vcap_api_rule_find_keyset_many_test),
|
||
|
KUNIT_CASE(vcap_api_encode_rule_test),
|
||
|
{}
|
||
|
};
|
||
|
|
||
|
static struct kunit_suite vcap_api_full_rule_test_suite = {
|
||
|
.name = "VCAP_API_Full_Rule_Testsuite",
|
||
|
.test_cases = vcap_api_full_rule_test_cases,
|
||
|
};
|
||
|
|
||
|
static struct kunit_case vcap_api_rule_value_test_cases[] = {
|
||
|
KUNIT_CASE(vcap_api_rule_add_keyvalue_test),
|
||
|
KUNIT_CASE(vcap_api_rule_add_actionvalue_test),
|
||
|
{}
|
||
|
};
|
||
|
|
||
|
static struct kunit_suite vcap_api_rule_value_test_suite = {
|
||
|
.name = "VCAP_API_Rule_Value_Testsuite",
|
||
|
.test_cases = vcap_api_rule_value_test_cases,
|
||
|
};
|
||
|
|
||
|
static struct kunit_case vcap_api_encoding_test_cases[] = {
|
||
|
KUNIT_CASE(vcap_api_set_bit_1_test),
|
||
|
KUNIT_CASE(vcap_api_set_bit_0_test),
|
||
|
KUNIT_CASE(vcap_api_iterator_init_test),
|
||
|
KUNIT_CASE(vcap_api_iterator_next_test),
|
||
|
KUNIT_CASE(vcap_api_encode_typegroups_test),
|
||
|
KUNIT_CASE(vcap_api_encode_bit_test),
|
||
|
KUNIT_CASE(vcap_api_encode_field_test),
|
||
|
KUNIT_CASE(vcap_api_encode_short_field_test),
|
||
|
KUNIT_CASE(vcap_api_encode_keyfield_test),
|
||
|
KUNIT_CASE(vcap_api_encode_max_keyfield_test),
|
||
|
KUNIT_CASE(vcap_api_encode_actionfield_test),
|
||
|
KUNIT_CASE(vcap_api_keyfield_typegroup_test),
|
||
|
KUNIT_CASE(vcap_api_actionfield_typegroup_test),
|
||
|
KUNIT_CASE(vcap_api_vcap_keyfields_test),
|
||
|
KUNIT_CASE(vcap_api_vcap_actionfields_test),
|
||
|
KUNIT_CASE(vcap_api_encode_rule_keyset_test),
|
||
|
KUNIT_CASE(vcap_api_encode_rule_actionset_test),
|
||
|
{}
|
||
|
};
|
||
|
|
||
|
static struct kunit_suite vcap_api_encoding_test_suite = {
|
||
|
.name = "VCAP_API_Encoding_Testsuite",
|
||
|
.test_cases = vcap_api_encoding_test_cases,
|
||
|
};
|
||
|
|
||
|
kunit_test_suite(vcap_api_rule_enable_test_suite);
|
||
|
kunit_test_suite(vcap_api_rule_remove_test_suite);
|
||
|
kunit_test_suite(vcap_api_rule_insert_test_suite);
|
||
|
kunit_test_suite(vcap_api_rule_counter_test_suite);
|
||
|
kunit_test_suite(vcap_api_support_test_suite);
|
||
|
kunit_test_suite(vcap_api_full_rule_test_suite);
|
||
|
kunit_test_suite(vcap_api_rule_value_test_suite);
|
||
|
kunit_test_suite(vcap_api_encoding_test_suite);
|