1 // SPDX-License-Identifier: BSD-3-Clause 2 /* Copyright (C) 2022 Microchip Technology Inc. and its subsidiaries. 3 * Microchip VCAP API kunit test suite 4 */ 5 6 #include <kunit/test.h> 7 #include "vcap_api.h" 8 #include "vcap_api_client.h" 9 #include "vcap_api_debugfs.h" 10 #include "vcap_model_kunit.h" 11 12 /* First we have the test infrastructure that emulates the platform 13 * implementation 14 */ 15 #define TEST_BUF_CNT 100 16 #define TEST_BUF_SZ 350 17 #define STREAMWSIZE 64 18 19 static u32 test_updateaddr[STREAMWSIZE] = {}; 20 static int test_updateaddridx; 21 static int test_cache_erase_count; 22 static u32 test_init_start; 23 static u32 test_init_count; 24 static u32 test_hw_counter_id; 25 static struct vcap_cache_data test_hw_cache; 26 static struct net_device test_netdev = {}; 27 static int test_move_addr; 28 static int test_move_offset; 29 static int test_move_count; 30 static char test_pr_buffer[TEST_BUF_CNT][TEST_BUF_SZ]; 31 static int test_pr_bufferidx; 32 static int test_pr_idx; 33 34 /* Callback used by the VCAP API */ 35 static enum vcap_keyfield_set test_val_keyset(struct net_device *ndev, 36 struct vcap_admin *admin, 37 struct vcap_rule *rule, 38 struct vcap_keyset_list *kslist, 39 u16 l3_proto) 40 { 41 int idx; 42 43 if (kslist->cnt > 0) { 44 switch (admin->vtype) { 45 case VCAP_TYPE_IS0: 46 for (idx = 0; idx < kslist->cnt; idx++) { 47 if (kslist->keysets[idx] == VCAP_KFS_ETAG) 48 return kslist->keysets[idx]; 49 if (kslist->keysets[idx] == 50 VCAP_KFS_PURE_5TUPLE_IP4) 51 return kslist->keysets[idx]; 52 if (kslist->keysets[idx] == 53 VCAP_KFS_NORMAL_5TUPLE_IP4) 54 return kslist->keysets[idx]; 55 if (kslist->keysets[idx] == 56 VCAP_KFS_NORMAL_7TUPLE) 57 return kslist->keysets[idx]; 58 } 59 break; 60 case VCAP_TYPE_IS2: 61 for (idx = 0; idx < kslist->cnt; idx++) { 62 if (kslist->keysets[idx] == VCAP_KFS_MAC_ETYPE) 63 return kslist->keysets[idx]; 64 if (kslist->keysets[idx] == VCAP_KFS_ARP) 65 return kslist->keysets[idx]; 66 if (kslist->keysets[idx] == VCAP_KFS_IP_7TUPLE) 67 return kslist->keysets[idx]; 68 } 69 break; 70 default: 71 pr_info("%s:%d: no validation for VCAP %d\n", 72 __func__, __LINE__, admin->vtype); 73 break; 74 } 75 } 76 return -EINVAL; 77 } 78 79 /* Callback used by the VCAP API */ 80 static void test_add_def_fields(struct net_device *ndev, 81 struct vcap_admin *admin, 82 struct vcap_rule *rule) 83 { 84 if (admin->vinst == 0 || admin->vinst == 2) 85 vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS, 86 VCAP_BIT_1); 87 else 88 vcap_rule_add_key_bit(rule, VCAP_KF_LOOKUP_FIRST_IS, 89 VCAP_BIT_0); 90 } 91 92 /* Callback used by the VCAP API */ 93 static void test_cache_erase(struct vcap_admin *admin) 94 { 95 if (test_cache_erase_count) { 96 memset(admin->cache.keystream, 0, test_cache_erase_count); 97 memset(admin->cache.maskstream, 0, test_cache_erase_count); 98 memset(admin->cache.actionstream, 0, test_cache_erase_count); 99 test_cache_erase_count = 0; 100 } 101 } 102 103 /* Callback used by the VCAP API */ 104 static void test_cache_init(struct net_device *ndev, struct vcap_admin *admin, 105 u32 start, u32 count) 106 { 107 test_init_start = start; 108 test_init_count = count; 109 } 110 111 /* Callback used by the VCAP API */ 112 static void test_cache_read(struct net_device *ndev, struct vcap_admin *admin, 113 enum vcap_selection sel, u32 start, u32 count) 114 { 115 u32 *keystr, *mskstr, *actstr; 116 int idx; 117 118 pr_debug("%s:%d: %d %d\n", __func__, __LINE__, start, count); 119 switch (sel) { 120 case VCAP_SEL_ENTRY: 121 keystr = &admin->cache.keystream[start]; 122 mskstr = &admin->cache.maskstream[start]; 123 for (idx = 0; idx < count; ++idx) { 124 pr_debug("%s:%d: keydata[%02d]: 0x%08x\n", __func__, 125 __LINE__, start + idx, keystr[idx]); 126 } 127 for (idx = 0; idx < count; ++idx) { 128 /* Invert the mask before decoding starts */ 129 mskstr[idx] = ~mskstr[idx]; 130 pr_debug("%s:%d: mskdata[%02d]: 0x%08x\n", __func__, 131 __LINE__, start + idx, mskstr[idx]); 132 } 133 break; 134 case VCAP_SEL_ACTION: 135 actstr = &admin->cache.actionstream[start]; 136 for (idx = 0; idx < count; ++idx) { 137 pr_debug("%s:%d: actdata[%02d]: 0x%08x\n", __func__, 138 __LINE__, start + idx, actstr[idx]); 139 } 140 break; 141 case VCAP_SEL_COUNTER: 142 pr_debug("%s:%d\n", __func__, __LINE__); 143 test_hw_counter_id = start; 144 admin->cache.counter = test_hw_cache.counter; 145 admin->cache.sticky = test_hw_cache.sticky; 146 break; 147 case VCAP_SEL_ALL: 148 pr_debug("%s:%d\n", __func__, __LINE__); 149 break; 150 } 151 } 152 153 /* Callback used by the VCAP API */ 154 static void test_cache_write(struct net_device *ndev, struct vcap_admin *admin, 155 enum vcap_selection sel, u32 start, u32 count) 156 { 157 u32 *keystr, *mskstr, *actstr; 158 int idx; 159 160 switch (sel) { 161 case VCAP_SEL_ENTRY: 162 keystr = &admin->cache.keystream[start]; 163 mskstr = &admin->cache.maskstream[start]; 164 for (idx = 0; idx < count; ++idx) { 165 pr_debug("%s:%d: keydata[%02d]: 0x%08x\n", __func__, 166 __LINE__, start + idx, keystr[idx]); 167 } 168 for (idx = 0; idx < count; ++idx) { 169 /* Invert the mask before encoding starts */ 170 mskstr[idx] = ~mskstr[idx]; 171 pr_debug("%s:%d: mskdata[%02d]: 0x%08x\n", __func__, 172 __LINE__, start + idx, mskstr[idx]); 173 } 174 break; 175 case VCAP_SEL_ACTION: 176 actstr = &admin->cache.actionstream[start]; 177 for (idx = 0; idx < count; ++idx) { 178 pr_debug("%s:%d: actdata[%02d]: 0x%08x\n", __func__, 179 __LINE__, start + idx, actstr[idx]); 180 } 181 break; 182 case VCAP_SEL_COUNTER: 183 pr_debug("%s:%d\n", __func__, __LINE__); 184 test_hw_counter_id = start; 185 test_hw_cache.counter = admin->cache.counter; 186 test_hw_cache.sticky = admin->cache.sticky; 187 break; 188 case VCAP_SEL_ALL: 189 pr_err("%s:%d: cannot write all streams at once\n", 190 __func__, __LINE__); 191 break; 192 } 193 } 194 195 /* Callback used by the VCAP API */ 196 static void test_cache_update(struct net_device *ndev, struct vcap_admin *admin, 197 enum vcap_command cmd, 198 enum vcap_selection sel, u32 addr) 199 { 200 if (test_updateaddridx < ARRAY_SIZE(test_updateaddr)) 201 test_updateaddr[test_updateaddridx] = addr; 202 else 203 pr_err("%s:%d: overflow: %d\n", __func__, __LINE__, 204 test_updateaddridx); 205 test_updateaddridx++; 206 } 207 208 static void test_cache_move(struct net_device *ndev, struct vcap_admin *admin, 209 u32 addr, int offset, int count) 210 { 211 test_move_addr = addr; 212 test_move_offset = offset; 213 test_move_count = count; 214 } 215 216 /* Provide port information via a callback interface */ 217 static int vcap_test_port_info(struct net_device *ndev, 218 struct vcap_admin *admin, 219 struct vcap_output_print *out) 220 { 221 return 0; 222 } 223 224 static struct vcap_operations test_callbacks = { 225 .validate_keyset = test_val_keyset, 226 .add_default_fields = test_add_def_fields, 227 .cache_erase = test_cache_erase, 228 .cache_write = test_cache_write, 229 .cache_read = test_cache_read, 230 .init = test_cache_init, 231 .update = test_cache_update, 232 .move = test_cache_move, 233 .port_info = vcap_test_port_info, 234 }; 235 236 static struct vcap_control test_vctrl = { 237 .vcaps = kunit_test_vcaps, 238 .stats = &kunit_test_vcap_stats, 239 .ops = &test_callbacks, 240 }; 241 242 static void vcap_test_api_init(struct vcap_admin *admin) 243 { 244 /* Initialize the shared objects */ 245 INIT_LIST_HEAD(&test_vctrl.list); 246 INIT_LIST_HEAD(&admin->list); 247 INIT_LIST_HEAD(&admin->rules); 248 INIT_LIST_HEAD(&admin->enabled); 249 mutex_init(&admin->lock); 250 list_add_tail(&admin->list, &test_vctrl.list); 251 memset(test_updateaddr, 0, sizeof(test_updateaddr)); 252 test_updateaddridx = 0; 253 test_pr_bufferidx = 0; 254 test_pr_idx = 0; 255 } 256 257 /* callback used by the show_admin function */ 258 static __printf(2, 3) 259 int test_prf(void *out, const char *fmt, ...) 260 { 261 static char test_buffer[TEST_BUF_SZ]; 262 va_list args; 263 int idx, cnt; 264 265 if (test_pr_bufferidx >= TEST_BUF_CNT) { 266 pr_err("%s:%d: overflow: %d\n", __func__, __LINE__, 267 test_pr_bufferidx); 268 return 0; 269 } 270 271 va_start(args, fmt); 272 cnt = vscnprintf(test_buffer, TEST_BUF_SZ, fmt, args); 273 va_end(args); 274 275 for (idx = 0; idx < cnt; ++idx) { 276 test_pr_buffer[test_pr_bufferidx][test_pr_idx] = 277 test_buffer[idx]; 278 if (test_buffer[idx] == '\n') { 279 test_pr_buffer[test_pr_bufferidx][++test_pr_idx] = 0; 280 test_pr_idx = 0; 281 test_pr_bufferidx++; 282 } else { 283 ++test_pr_idx; 284 } 285 } 286 287 return cnt; 288 } 289 290 /* Define the test cases. */ 291 292 static void vcap_api_addr_keyset_test(struct kunit *test) 293 { 294 u32 keydata[12] = { 295 0x40450042, 0x000feaf3, 0x00000003, 0x00050600, 296 0x10203040, 0x00075880, 0x633c6864, 0x00040003, 297 0x00000020, 0x00000008, 0x00000240, 0x00000000, 298 }; 299 u32 mskdata[12] = { 300 0x0030ff80, 0xfff00000, 0xfffffffc, 0xfff000ff, 301 0x00000000, 0xfff00000, 0x00000000, 0xfff3fffc, 302 0xffffffc0, 0xffffffff, 0xfffffc03, 0xffffffff, 303 }; 304 u32 actdata[12] = {}; 305 struct vcap_admin admin = { 306 .vtype = VCAP_TYPE_IS2, 307 .cache = { 308 .keystream = keydata, 309 .maskstream = mskdata, 310 .actionstream = actdata, 311 }, 312 }; 313 enum vcap_keyfield_set keysets[10]; 314 struct vcap_keyset_list matches; 315 int ret, idx, addr; 316 317 vcap_test_api_init(&admin); 318 319 /* Go from higher to lower addresses searching for a keyset */ 320 matches.keysets = keysets; 321 matches.cnt = 0; 322 matches.max = ARRAY_SIZE(keysets); 323 for (idx = ARRAY_SIZE(keydata) - 1, addr = 799; idx > 0; 324 --idx, --addr) { 325 admin.cache.keystream = &keydata[idx]; 326 admin.cache.maskstream = &mskdata[idx]; 327 ret = vcap_addr_keysets(&test_vctrl, &test_netdev, &admin, 328 addr, &matches); 329 KUNIT_EXPECT_EQ(test, -EINVAL, ret); 330 } 331 332 /* Finally we hit the start of the rule */ 333 admin.cache.keystream = &keydata[idx]; 334 admin.cache.maskstream = &mskdata[idx]; 335 matches.cnt = 0; 336 ret = vcap_addr_keysets(&test_vctrl, &test_netdev, &admin, 337 addr, &matches); 338 KUNIT_EXPECT_EQ(test, 0, ret); 339 KUNIT_EXPECT_EQ(test, matches.cnt, 1); 340 KUNIT_EXPECT_EQ(test, matches.keysets[0], VCAP_KFS_MAC_ETYPE); 341 } 342 343 static void vcap_api_show_admin_raw_test(struct kunit *test) 344 { 345 u32 keydata[4] = { 346 0x40450042, 0x000feaf3, 0x00000003, 0x00050600, 347 }; 348 u32 mskdata[4] = { 349 0x0030ff80, 0xfff00000, 0xfffffffc, 0xfff000ff, 350 }; 351 u32 actdata[12] = {}; 352 struct vcap_admin admin = { 353 .vtype = VCAP_TYPE_IS2, 354 .cache = { 355 .keystream = keydata, 356 .maskstream = mskdata, 357 .actionstream = actdata, 358 }, 359 .first_valid_addr = 786, 360 .last_valid_addr = 788, 361 }; 362 struct vcap_rule_internal ri = { 363 .ndev = &test_netdev, 364 }; 365 struct vcap_output_print out = { 366 .prf = (void *)test_prf, 367 }; 368 const char *test_expected = 369 " addr: 786, X6 rule, keysets: VCAP_KFS_MAC_ETYPE\n"; 370 int ret; 371 372 vcap_test_api_init(&admin); 373 list_add_tail(&ri.list, &admin.rules); 374 375 ret = vcap_show_admin_raw(&test_vctrl, &admin, &out); 376 KUNIT_EXPECT_EQ(test, 0, ret); 377 KUNIT_EXPECT_STREQ(test, test_expected, test_pr_buffer[0]); 378 } 379 380 static const char * const test_admin_info_expect[] = { 381 "name: is2\n", 382 "rows: 256\n", 383 "sw_count: 12\n", 384 "sw_width: 52\n", 385 "sticky_width: 1\n", 386 "act_width: 110\n", 387 "default_cnt: 73\n", 388 "require_cnt_dis: 0\n", 389 "version: 1\n", 390 "vtype: 2\n", 391 "vinst: 0\n", 392 "first_cid: 10000\n", 393 "last_cid: 19999\n", 394 "lookups: 4\n", 395 "first_valid_addr: 0\n", 396 "last_valid_addr: 3071\n", 397 "last_used_addr: 794\n", 398 }; 399 400 static void vcap_api_show_admin_test(struct kunit *test) 401 { 402 struct vcap_admin admin = { 403 .vtype = VCAP_TYPE_IS2, 404 .first_cid = 10000, 405 .last_cid = 19999, 406 .lookups = 4, 407 .last_valid_addr = 3071, 408 .first_valid_addr = 0, 409 .last_used_addr = 794, 410 }; 411 struct vcap_output_print out = { 412 .prf = (void *)test_prf, 413 }; 414 int idx; 415 416 vcap_test_api_init(&admin); 417 418 vcap_show_admin_info(&test_vctrl, &admin, &out); 419 for (idx = 0; idx < test_pr_bufferidx; ++idx) { 420 /* pr_info("log[%02d]: %s", idx, test_pr_buffer[idx]); */ 421 KUNIT_EXPECT_STREQ(test, test_admin_info_expect[idx], 422 test_pr_buffer[idx]); 423 } 424 } 425 426 static const char * const test_admin_expect[] = { 427 "name: is2\n", 428 "rows: 256\n", 429 "sw_count: 12\n", 430 "sw_width: 52\n", 431 "sticky_width: 1\n", 432 "act_width: 110\n", 433 "default_cnt: 73\n", 434 "require_cnt_dis: 0\n", 435 "version: 1\n", 436 "vtype: 2\n", 437 "vinst: 0\n", 438 "first_cid: 8000000\n", 439 "last_cid: 8199999\n", 440 "lookups: 4\n", 441 "first_valid_addr: 0\n", 442 "last_valid_addr: 3071\n", 443 "last_used_addr: 794\n", 444 "\n", 445 "rule: 100, addr: [794,799], X6, ctr[0]: 0, hit: 0\n", 446 " chain_id: 0\n", 447 " user: 0\n", 448 " priority: 0\n", 449 " state: permanent\n", 450 " keysets: VCAP_KFS_MAC_ETYPE\n", 451 " keyset_sw: 6\n", 452 " keyset_sw_regs: 2\n", 453 " ETYPE_LEN_IS: W1: 1/1\n", 454 " IF_IGR_PORT_MASK: W32: 0xffabcd01/0xffffffff\n", 455 " IF_IGR_PORT_MASK_RNG: W4: 5/15\n", 456 " L2_DMAC: W48: 01:02:03:04:05:06/ff:ff:ff:ff:ff:ff\n", 457 " L2_PAYLOAD_ETYPE: W64: 0x9000002000000081/0xff000000000000ff\n", 458 " L2_SMAC: W48: b1:9e:34:32:75:88/ff:ff:ff:ff:ff:ff\n", 459 " LOOKUP_FIRST_IS: W1: 1/1\n", 460 " TYPE: W4: 0/15\n", 461 " actionset: VCAP_AFS_BASE_TYPE\n", 462 " actionset_sw: 3\n", 463 " actionset_sw_regs: 4\n", 464 " CNT_ID: W12: 100\n", 465 " MATCH_ID: W16: 1\n", 466 " MATCH_ID_MASK: W16: 1\n", 467 " POLICE_ENA: W1: 1\n", 468 " PORT_MASK: W68: 0x0514670115f3324589\n", 469 }; 470 471 static void vcap_api_show_admin_rule_test(struct kunit *test) 472 { 473 u32 keydata[] = { 474 0x40450042, 0x000feaf3, 0x00000003, 0x00050600, 475 0x10203040, 0x00075880, 0x633c6864, 0x00040003, 476 0x00000020, 0x00000008, 0x00000240, 0x00000000, 477 }; 478 u32 mskdata[] = { 479 0x0030ff80, 0xfff00000, 0xfffffffc, 0xfff000ff, 480 0x00000000, 0xfff00000, 0x00000000, 0xfff3fffc, 481 0xffffffc0, 0xffffffff, 0xfffffc03, 0xffffffff, 482 }; 483 u32 actdata[] = { 484 0x00040002, 0xf3324589, 0x14670115, 0x00000005, 485 0x00000000, 0x00100000, 0x06400010, 0x00000000, 486 0x00000000, 0x00000000, 0x00000000, 0x00000000, 487 0x00000000, 0x00000000, 0x00000000, 0x00000000, 488 0x00000000, 0x00000000, 0x00000000, 0x00000000, 489 0x00000000, 0x00000000, 0x00000000, 0x00000000, 490 }; 491 struct vcap_admin admin = { 492 .vtype = VCAP_TYPE_IS2, 493 .first_cid = 8000000, 494 .last_cid = 8199999, 495 .lookups = 4, 496 .last_valid_addr = 3071, 497 .first_valid_addr = 0, 498 .last_used_addr = 794, 499 .cache = { 500 .keystream = keydata, 501 .maskstream = mskdata, 502 .actionstream = actdata, 503 }, 504 }; 505 struct vcap_rule_internal ri = { 506 .admin = &admin, 507 .data = { 508 .id = 100, 509 .keyset = VCAP_KFS_MAC_ETYPE, 510 .actionset = VCAP_AFS_BASE_TYPE, 511 }, 512 .size = 6, 513 .keyset_sw = 6, 514 .keyset_sw_regs = 2, 515 .actionset_sw = 3, 516 .actionset_sw_regs = 4, 517 .addr = 794, 518 .vctrl = &test_vctrl, 519 }; 520 struct vcap_output_print out = { 521 .prf = (void *)test_prf, 522 }; 523 int ret, idx; 524 525 vcap_test_api_init(&admin); 526 list_add_tail(&ri.list, &admin.rules); 527 528 ret = vcap_show_admin(&test_vctrl, &admin, &out); 529 KUNIT_EXPECT_EQ(test, 0, ret); 530 for (idx = 0; idx < test_pr_bufferidx; ++idx) { 531 /* pr_info("log[%02d]: %s", idx, test_pr_buffer[idx]); */ 532 KUNIT_EXPECT_STREQ(test, test_admin_expect[idx], 533 test_pr_buffer[idx]); 534 } 535 } 536 537 static struct kunit_case vcap_api_debugfs_test_cases[] = { 538 KUNIT_CASE(vcap_api_addr_keyset_test), 539 KUNIT_CASE(vcap_api_show_admin_raw_test), 540 KUNIT_CASE(vcap_api_show_admin_test), 541 KUNIT_CASE(vcap_api_show_admin_rule_test), 542 {} 543 }; 544 545 static struct kunit_suite vcap_api_debugfs_test_suite = { 546 .name = "VCAP_API_DebugFS_Testsuite", 547 .test_cases = vcap_api_debugfs_test_cases, 548 }; 549 550 kunit_test_suite(vcap_api_debugfs_test_suite); 551