X-Git-Url: http://git.droids-corp.org/?a=blobdiff_plain;f=app%2Ftest%2Ftest_acl.c;h=5b32347954dc59fa482598ecb4f3bd7a8c8d3f50;hb=cf1e803508009917f41dd5bb347e4140043afe03;hp=8663ff0318c2afcb46e8309b04ff6c44764e666f;hpb=24ac604ef7469eb5773c2504b313dd00257f8df3;p=dpdk.git diff --git a/app/test/test_acl.c b/app/test/test_acl.c index 8663ff0318..5b32347954 100644 --- a/app/test/test_acl.c +++ b/app/test/test_acl.c @@ -266,103 +266,104 @@ rte_acl_ipv4vlan_build(struct rte_acl_ctx *ctx, } /* - * Test scalar and SSE ACL lookup. + * Test ACL lookup (selected alg). */ static int -test_classify_run(struct rte_acl_ctx *acx) +test_classify_alg(struct rte_acl_ctx *acx, struct ipv4_7tuple test_data[], + const uint8_t *data[], size_t dim, enum rte_acl_classify_alg alg) { - int ret, i; - uint32_t result, count; - uint32_t results[RTE_DIM(acl_test_data) * RTE_ACL_MAX_CATEGORIES]; - const uint8_t *data[RTE_DIM(acl_test_data)]; + int32_t ret; + uint32_t i, result, count; + uint32_t results[dim * RTE_ACL_MAX_CATEGORIES]; - /* swap all bytes in the data to network order */ - bswap_test_data(acl_test_data, RTE_DIM(acl_test_data), 1); - - /* store pointers to test data */ - for (i = 0; i < (int) RTE_DIM(acl_test_data); i++) - data[i] = (uint8_t *)&acl_test_data[i]; + /* set given classify alg, skip test if alg is not supported */ + ret = rte_acl_set_ctx_classify(acx, alg); + if (ret != 0) + return (ret == -ENOTSUP) ? 0 : ret; /** * these will run quite a few times, it's necessary to test code paths * from num=0 to num>8 */ - for (count = 0; count <= RTE_DIM(acl_test_data); count++) { + for (count = 0; count <= dim; count++) { ret = rte_acl_classify(acx, data, results, count, RTE_ACL_MAX_CATEGORIES); if (ret != 0) { - printf("Line %i: SSE classify failed!\n", __LINE__); - goto err; + printf("Line %i: classify(alg=%d) failed!\n", + __LINE__, alg); + return ret; } /* check if we allow everything we should allow */ - for (i = 0; i < (int) count; i++) { + for (i = 0; i < count; i++) { result = results[i * RTE_ACL_MAX_CATEGORIES + ACL_ALLOW]; - if (result != acl_test_data[i].allow) { + if (result != test_data[i].allow) { printf("Line %i: Error in allow results at %i " "(expected %"PRIu32" got %"PRIu32")!\n", - __LINE__, i, acl_test_data[i].allow, + __LINE__, i, test_data[i].allow, result); - ret = -EINVAL; - goto err; + return -EINVAL; } } /* check if we deny everything we should deny */ - for (i = 0; i < (int) count; i++) { + for (i = 0; i < count; i++) { result = results[i * RTE_ACL_MAX_CATEGORIES + ACL_DENY]; - if (result != acl_test_data[i].deny) { + if (result != test_data[i].deny) { printf("Line %i: Error in deny results at %i " "(expected %"PRIu32" got %"PRIu32")!\n", - __LINE__, i, acl_test_data[i].deny, + __LINE__, i, test_data[i].deny, result); - ret = -EINVAL; - goto err; + return -EINVAL; } } } - /* make a quick check for scalar */ - ret = rte_acl_classify_alg(acx, data, results, - RTE_DIM(acl_test_data), RTE_ACL_MAX_CATEGORIES, - RTE_ACL_CLASSIFY_SCALAR); - if (ret != 0) { - printf("Line %i: scalar classify failed!\n", __LINE__); - goto err; - } + /* restore default classify alg */ + return rte_acl_set_ctx_classify(acx, RTE_ACL_CLASSIFY_DEFAULT); +} - /* check if we allow everything we should allow */ - for (i = 0; i < (int) RTE_DIM(acl_test_data); i++) { - result = results[i * RTE_ACL_MAX_CATEGORIES + ACL_ALLOW]; - if (result != acl_test_data[i].allow) { - printf("Line %i: Error in allow results at %i " - "(expected %"PRIu32" got %"PRIu32")!\n", - __LINE__, i, acl_test_data[i].allow, - result); - ret = -EINVAL; - goto err; - } - } +/* + * Test ACL lookup (all possible methods). + */ +static int +test_classify_run(struct rte_acl_ctx *acx, struct ipv4_7tuple test_data[], + size_t dim) +{ + int32_t ret; + uint32_t i; + const uint8_t *data[dim]; + + static const enum rte_acl_classify_alg alg[] = { + RTE_ACL_CLASSIFY_SCALAR, + RTE_ACL_CLASSIFY_SSE, + RTE_ACL_CLASSIFY_AVX2, + RTE_ACL_CLASSIFY_NEON, + RTE_ACL_CLASSIFY_ALTIVEC, + RTE_ACL_CLASSIFY_AVX512X16, + RTE_ACL_CLASSIFY_AVX512X32, + }; - /* check if we deny everything we should deny */ - for (i = 0; i < (int) RTE_DIM(acl_test_data); i++) { - result = results[i * RTE_ACL_MAX_CATEGORIES + ACL_DENY]; - if (result != acl_test_data[i].deny) { - printf("Line %i: Error in deny results at %i " - "(expected %"PRIu32" got %"PRIu32")!\n", - __LINE__, i, acl_test_data[i].deny, - result); - ret = -EINVAL; - goto err; - } - } + /* swap all bytes in the data to network order */ + bswap_test_data(test_data, dim, 1); + + /* store pointers to test data */ + for (i = 0; i < dim; i++) + data[i] = (uint8_t *)&test_data[i]; ret = 0; + for (i = 0; i != RTE_DIM(alg); i++) { + ret = test_classify_alg(acx, test_data, data, dim, alg[i]); + if (ret < 0) { + printf("Line %i: %s() for alg=%d failed, errno=%d\n", + __LINE__, __func__, alg[i], -ret); + break; + } + } -err: /* swap data back to cpu order so that next time tests don't fail */ - bswap_test_data(acl_test_data, RTE_DIM(acl_test_data), 0); + bswap_test_data(test_data, dim, 0); return ret; } @@ -425,7 +426,8 @@ test_classify(void) break; } - ret = test_classify_run(acx); + ret = test_classify_run(acx, acl_test_data, + RTE_DIM(acl_test_data)); if (ret != 0) { printf("Line %i, iter: %d: %s failed!\n", __LINE__, i, __func__); @@ -434,7 +436,8 @@ test_classify(void) /* reset rules and make sure that classify still works ok. */ rte_acl_reset_rules(acx); - ret = test_classify_run(acx); + ret = test_classify_run(acx, acl_test_data, + RTE_DIM(acl_test_data)); if (ret != 0) { printf("Line %i, iter: %d: %s failed!\n", __LINE__, i, __func__); @@ -515,15 +518,15 @@ test_build_ports_range(void) static struct ipv4_7tuple test_data[] = { { .proto = 6, - .ip_src = RTE_IPv4(10, 1, 1, 1), - .ip_dst = RTE_IPv4(192, 168, 0, 33), + .ip_src = RTE_IPV4(10, 1, 1, 1), + .ip_dst = RTE_IPV4(192, 168, 0, 33), .port_dst = 53, .allow = 1, }, { .proto = 6, - .ip_src = RTE_IPv4(127, 84, 33, 1), - .ip_dst = RTE_IPv4(1, 2, 3, 4), + .ip_src = RTE_IPV4(127, 84, 33, 1), + .ip_dst = RTE_IPV4(1, 2, 3, 4), .port_dst = 65281, .allow = 1, }, @@ -925,7 +928,8 @@ test_convert_rules(const char *desc, break; } - rc = test_classify_run(acx); + rc = test_classify_run(acx, acl_test_data, + RTE_DIM(acl_test_data)); if (rc != 0) printf("%s failed at line %i, max_size=%zu\n", __func__, __LINE__, mem_sizes[i]); @@ -1394,16 +1398,18 @@ test_invalid_parameters(void) } else rte_acl_free(acx); - /* invalid NUMA node */ - memcpy(¶m, &acl_param, sizeof(param)); - param.socket_id = RTE_MAX_NUMA_NODES + 1; + if (rte_eal_has_hugepages()) { + /* invalid NUMA node */ + memcpy(¶m, &acl_param, sizeof(param)); + param.socket_id = RTE_MAX_NUMA_NODES + 1; - acx = rte_acl_create(¶m); - if (acx != NULL) { - printf("Line %i: ACL context creation with invalid NUMA " - "should have failed!\n", __LINE__); - rte_acl_free(acx); - return -1; + acx = rte_acl_create(¶m); + if (acx != NULL) { + printf("Line %i: ACL context creation with invalid " + "NUMA should have failed!\n", __LINE__); + rte_acl_free(acx); + return -1; + } } /* NULL name */ @@ -1597,6 +1603,119 @@ test_misc(void) return 0; } +static uint32_t +get_u32_range_max(void) +{ + uint32_t i, max; + + max = 0; + for (i = 0; i != RTE_DIM(acl_u32_range_test_rules); i++) + max = RTE_MAX(max, acl_u32_range_test_rules[i].src_mask_len); + return max; +} + +static uint32_t +get_u32_range_min(void) +{ + uint32_t i, min; + + min = UINT32_MAX; + for (i = 0; i != RTE_DIM(acl_u32_range_test_rules); i++) + min = RTE_MIN(min, acl_u32_range_test_rules[i].src_addr); + return min; +} + +static const struct rte_acl_ipv4vlan_rule * +find_u32_range_rule(uint32_t val) +{ + uint32_t i; + + for (i = 0; i != RTE_DIM(acl_u32_range_test_rules); i++) { + if (val >= acl_u32_range_test_rules[i].src_addr && + val <= acl_u32_range_test_rules[i].src_mask_len) + return acl_u32_range_test_rules + i; + } + return NULL; +} + +static void +fill_u32_range_data(struct ipv4_7tuple tdata[], uint32_t start, uint32_t num) +{ + uint32_t i; + const struct rte_acl_ipv4vlan_rule *r; + + for (i = 0; i != num; i++) { + tdata[i].ip_src = start + i; + r = find_u32_range_rule(start + i); + if (r != NULL) + tdata[i].allow = r->data.userdata; + } +} + +static int +test_u32_range(void) +{ + int32_t rc; + uint32_t i, k, max, min; + struct rte_acl_ctx *acx; + struct acl_ipv4vlan_rule r; + struct ipv4_7tuple test_data[64]; + + acx = rte_acl_create(&acl_param); + if (acx == NULL) { + printf("%s#%i: Error creating ACL context!\n", + __func__, __LINE__); + return -1; + } + + for (i = 0; i != RTE_DIM(acl_u32_range_test_rules); i++) { + convert_rule(&acl_u32_range_test_rules[i], &r); + rc = rte_acl_add_rules(acx, (struct rte_acl_rule *)&r, 1); + if (rc != 0) { + printf("%s#%i: Adding rule to ACL context " + "failed with error code: %d\n", + __func__, __LINE__, rc); + rte_acl_free(acx); + return rc; + } + } + + rc = build_convert_rules(acx, convert_config_2, 0); + if (rc != 0) { + printf("%s#%i Error @ build_convert_rules!\n", + __func__, __LINE__); + rte_acl_free(acx); + return rc; + } + + max = get_u32_range_max(); + min = get_u32_range_min(); + + max = RTE_MAX(max, max + 1); + min = RTE_MIN(min, min - 1); + + printf("%s#%d starting range test from %u to %u\n", + __func__, __LINE__, min, max); + + for (i = min; i <= max; i += k) { + + k = RTE_MIN(max - i + 1, RTE_DIM(test_data)); + + memset(test_data, 0, sizeof(test_data)); + fill_u32_range_data(test_data, i, k); + + rc = test_classify_run(acx, test_data, k); + if (rc != 0) { + printf("%s#%d failed at [%u, %u) interval\n", + __func__, __LINE__, i, i + k); + break; + } + } + + rte_acl_free(acx); + return rc; +} + static int test_acl(void) { @@ -1616,6 +1735,8 @@ test_acl(void) return -1; if (test_convert() < 0) return -1; + if (test_u32_range() < 0) + return -1; return 0; }