From: Hailin Xu <hailinx.xu@intel.com>
To: dts@dpdk.org
Cc: xueqin.lin@intel.com, Hailin Xu <hailinx.xu@intel.com>
Subject: [dts] [PATCH v2 1/2] test_plans/iavf_fdir: add without input set cases
Date: Mon, 8 Mar 2021 16:44:18 +0800 [thread overview]
Message-ID: <1615193059-72298-2-git-send-email-hailinx.xu@intel.com> (raw)
In-Reply-To: <1615193059-72298-1-git-send-email-hailinx.xu@intel.com>
add without input set IPv4/IPv6 tcp/udp fdir rule test cases.
Signed-off-by: Hailin Xu <hailinx.xu@intel.com>
---
test_plans/iavf_fdir_test_plan.rst | 261 +++++++++++++++++++++++++++++
1 file changed, 261 insertions(+)
diff --git a/test_plans/iavf_fdir_test_plan.rst b/test_plans/iavf_fdir_test_plan.rst
index 6de28d2c..e96c5df0 100644
--- a/test_plans/iavf_fdir_test_plan.rst
+++ b/test_plans/iavf_fdir_test_plan.rst
@@ -4551,3 +4551,264 @@ subcase 3: PFCP FDIR vlan insert on
8. DUT check the packets are not distributed to expected queue without mark id without "PKT_RX_VLAN_STRIPPED",
verify that the same number of packet are correctly received on the traffic generator side port A with VLAN tag "1".
And UDP checksum need be validated as pass by the tester.
+
+Test case: without input set test
+=================================
+Support ipv4 and ipv6 tcp/udp flow director rule without input set.
+The packets are for testing without input set cases.
+
+* MAC_IPV4_TCP
+
+ matched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+ mismatched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/SCTP()],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+* MAC_IPV4_UDP
+
+ matched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+ mismatched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/SCTP()],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+* MAC_IPV6_TCP
+
+ matched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+ mismatched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/SCTP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+* MAC_IPV6_UDP
+
+ matched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+ mismatched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/SCTP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+Test Case: MAC_IPV4_TCP_WITHOUT_INPUT_SET
+-----------------------------------------
+
+Subcase 1: MAC_IPV4_TCP queue index
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions queue index 1 / end
+
+2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to queue 1.
+ send the mismatched packets, check all packets are distributed to all queues.
+
+3. verify rules can be listed and destroyed::
+
+ testpmd> flow list 0
+
+ check the rule listed.
+ destroy the rule::
+
+ testpmd> flow destroy 0 rule 0
+
+4. verify matched packets are distributed to all queues.
+ check there is no rule listed.
+
+Subcase 2: MAC_IPV4_TCP rss queue
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss queues 0 1 2 3 end / end
+
+2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to queue 0-3.
+ send the mismatched packets, check all packets are distributed to all queues.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues.
+ check there is no rule listed.
+
+Subcase 3: MAC_IPV4_TCP passthru
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions passthru / mark id 1 / end
+
+2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x1.
+ send the mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+ check there is no rule listed.
+
+Subcase 4: MAC_IPV4_TCP drop
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions drop / end
+
+2. send ``MAC_IPV4_TCP`` matched packets, check all packets are dropped.
+ send the mismatched packets, check all packets are not dropped.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are not dropped.
+ check there is no rule listed.
+
+Subcase 5: MAC_IPV4_TCP mark+rss
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions mark id 2 / rss / end
+
+2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x2.
+ send the mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+ check there is no rule listed.
+
+Subcase 6: MAC_IPV4_TCP mark
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions mark id 1 / end
+
+2. repeat the step 2-3 of in subcase 3,
+ get the same result.
+
+Test Case: MAC_IPV4_UDP_WITHOUT_INPUT_SET
+-----------------------------------------
+
+1. replace "tcp" with "udp" in all the subcases of MAC_IPV4_TCP_WITHOUT_INPUT_SET pattern.
+2. Then repeat all the steps in all the subcases of MAC_IPV4_TCP_WITHOUT_INPUT_SET pattern.
+3. get the same result.
+
+Test Case: MAC_IPV6_TCP_WITHOUT_INPUT_SET
+-----------------------------------------
+
+Subcase 1: MAC_IPV6_TCP queue index
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / tcp / end actions queue index 1 / end
+
+2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to queue 1.
+ send the mismatched packets, check all packets are distributed to all queues.
+
+3. verify rules can be listed and destroyed::
+
+ testpmd> flow list 0
+
+ check the rule listed.
+ destroy the rule::
+
+ testpmd> flow destroy 0 rule 0
+
+4. verify matched packets are distributed to all queues.
+ check there is no rule listed.
+
+Subcase 2: MAC_IPV6_TCP rss queue
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / tcp / end actions rss queues 0 1 2 3 end / end
+
+2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to queue 0-3.
+ send the mismatched packets, check all packets are distributed to all queues.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues.
+ check there is no rule listed.
+
+Subcase 3: MAC_IPV6_TCP passthru
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / tcp / end actions passthru / mark id 1 / end
+
+2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x1.
+ send mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+ check there is no rule listed.
+
+Subcase 4: MAC_IPV6_TCP drop
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / tcp / end actions drop / end
+
+2. send ``MAC_IPV6_TCP`` matched packets, check all packets are dropped.
+ send the mismatched packets, check all packets are not dropped.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are not dropped.
+ check there is no rule listed.
+
+Subcase 5: MAC_IPV6_TCP mark+rss
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / tcp / end actions mark id 2 / rss / end
+
+2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x2.
+ send the mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+ check there is no rule listed.
+
+Subcase 6: MAC_IPV6_TCP mark
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / udp / end actions mark id 1 / end
+
+2. repeat the step 2-3 of in subcase 3,
+ get the same result.
+
+Test Case: MAC_IPV6_UDP_WITHOUT_INPUT_SET
+-----------------------------------------
+
+1. replace "tcp" with "udp" in all the subcases of MAC_IPV6_TCP_WITHOUT_INPUT_SET pattern.
+2. Then repeat all the steps in all the subcases of MAC_IPV6_TCP_WITHOUT_INPUT_SET pattern.
+3. get the same result.
\ No newline at end of file
--
2.17.1
next prev parent reply other threads:[~2021-03-08 8:56 UTC|newest]
Thread overview: 7+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-03-08 8:44 [dts] [PATCH v2 0/2] add 4 test cases and testplan Hailin Xu
2021-03-08 8:44 ` Hailin Xu [this message]
2021-03-09 8:19 ` [dts] [PATCH v2 1/2] test_plans/iavf_fdir: add without input set cases Lin, Xueqin
2021-03-08 8:44 ` [dts] [PATCH v2 2/2] tests/iavf_fdir: " Hailin Xu
2021-03-08 9:12 ` Xu, HailinX
2021-03-09 8:20 ` Lin, Xueqin
2021-03-10 5:47 ` [dts] [PATCH v2 0/2] add 4 test cases and testplan Tu, Lijuan
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=1615193059-72298-2-git-send-email-hailinx.xu@intel.com \
--to=hailinx.xu@intel.com \
--cc=dts@dpdk.org \
--cc=xueqin.lin@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).