From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id C7901A0C47; Fri, 29 Oct 2021 08:32:57 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id B3CE64113A; Fri, 29 Oct 2021 08:32:57 +0200 (CEST) Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mails.dpdk.org (Postfix) with ESMTP id E90B640688 for ; Fri, 29 Oct 2021 08:32:55 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10151"; a="211370581" X-IronPort-AV: E=Sophos;i="5.87,191,1631602800"; d="scan'208";a="211370581" Received: from orsmga007.jf.intel.com ([10.7.209.58]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Oct 2021 23:18:42 -0700 X-IronPort-AV: E=Sophos;i="5.87,191,1631602800"; d="scan'208";a="487459748" Received: from unknown (HELO dpdk-zhaohy-t.sh.intel.com) ([10.240.183.68]) by orsmga007-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Oct 2021 23:18:41 -0700 From: Jiale Song To: dts@dpdk.org Cc: Jiale Song Date: Fri, 29 Oct 2021 14:18:27 +0800 Message-Id: <1635488309-118246-4-git-send-email-songx.jiale@intel.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1635488309-118246-1-git-send-email-songx.jiale@intel.com> References: <1635488309-118246-1-git-send-email-songx.jiale@intel.com> Subject: [dts] [PATCH V1 4/6] tests/flow_classify_softnic: update case code for dpdk code change X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" dpdk invalid port create rule echo change dpdk commit: 1179f05cc9a044541106981b0366f474043d7872 Signed-off-by: Jiale Song --- test_plans/flow_classify_softnic_test_plan.rst | 8 ++++---- tests/TestSuite_flow_classify_softnic.py | 8 ++++---- 2 files changed, 8 insertions(+), 8 deletions(-) mode change 100644 => 100755 test_plans/flow_classify_softnic_test_plan.rst mode change 100644 => 100755 tests/TestSuite_flow_classify_softnic.py diff --git a/test_plans/flow_classify_softnic_test_plan.rst b/test_plans/flow_classify_softnic_test_plan.rst old mode 100644 new mode 100755 index b18d32b6..2b46d0af --- a/test_plans/flow_classify_softnic_test_plan.rst +++ b/test_plans/flow_classify_softnic_test_plan.rst @@ -562,7 +562,7 @@ a) Map the table a:: dst mask 255.255.255.255 src spec 100.0.0.1 dst spec 200.0.0.1 proto spec 17 \ / udp src mask 0 dst mask 0 src spec 100 dst spec 200 / end actions queue index 3 / end - Error reported, rule item is inconsistent with the table match. + Invalid port 4, rule item is inconsistent with the table match. Table with hask key mask for src addr, but the rule added is for dst addr. b) Map the table b:: @@ -571,7 +571,7 @@ b) Map the table b:: dst mask 255.255.255.255 src spec 100.0.0.1 dst spec 200.0.0.1 proto spec 17 \ / udp src mask 0 dst mask 0 src spec 100 dst spec 200 / end actions queue index 3 / end - Error reported, rule item is inconsistent with the table match. + Invalid port 4, rule item is inconsistent with the table match. Table with hask key mask for dst addr 255.255.255.0, but the rule added is 255.255.255.255. Test Case: ipv6 rule item inconsistent with table match format @@ -605,7 +605,7 @@ a) Map the table a:: src spec 2001::1 dst spec 0::1 proto spec 17 / udp src mask 0 dst mask 65535 \ src spec 31 dst spec 41 / end actions queue index 3 / end - Error reported, rule item is inconsistent with the table match. + Invalid port 4, rule item is inconsistent with the table match. Table with hask key mask for 5 tuple, but the rule added mask udp src with 0. b) Map the table b:: @@ -615,7 +615,7 @@ b) Map the table b:: ABCD:EF01:2345:6789:ABCD:EF01:2345:5789 dst spec 0:0:0:0:0:0:0:0 proto spec 17 \ / udp src mask 0 dst mask 0 src spec 0 dst spec 0 / end actions queue index 3 / end - Error reported, rule item is inconsistent with the table match. + Invalid port 4, rule item is inconsistent with the table match. Table with hask key mask for dst addr, but the rule added is for src addr. Test Case: ipv4 hash table rss action diff --git a/tests/TestSuite_flow_classify_softnic.py b/tests/TestSuite_flow_classify_softnic.py old mode 100644 new mode 100755 index a2c15dcc..329e3d4c --- a/tests/TestSuite_flow_classify_softnic.py +++ b/tests/TestSuite_flow_classify_softnic.py @@ -844,13 +844,13 @@ class TestFlowClassifySoftnic(TestCase): self.start_testpmd(filename, self.port_num) # create rule - self.dut.send_expect("flow create 4 group 0 ingress pattern eth / ipv4 proto mask 0 src mask 0.0.0.0 dst mask 255.255.255.255 src spec 100.0.0.1 dst spec 200.0.0.1 proto spec 17 / udp src mask 0 dst mask 0 src spec 100 dst spec 200 / end actions queue index 3 / end", "error", 60) + self.dut.send_expect("flow create 4 group 0 ingress pattern eth / ipv4 proto mask 0 src mask 0.0.0.0 dst mask 255.255.255.255 src spec 100.0.0.1 dst spec 200.0.0.1 proto spec 17 / udp src mask 0 dst mask 0 src spec 100 dst spec 200 / end actions queue index 3 / end", "Invalid port 4", 60) self.dut.send_expect("quit", "# ", 60) cmd = "pipeline RX table match hash ext key 8 mask FFFFFF0000000000 offset 286 buckets 16K size 64K action AP0" self.set_table(cmd, filename) self.start_testpmd(filename, self.port_num) - self.dut.send_expect("flow create 4 group 0 ingress pattern eth / ipv4 proto mask 0 src mask 0.0.0.0 dst mask 255.255.255.255 src spec 100.0.0.1 dst spec 200.0.0.1 proto spec 17 / udp src mask 0 dst mask 0 src spec 100 dst spec 200 / end actions queue index 3 / end", "error", 60) + self.dut.send_expect("flow create 4 group 0 ingress pattern eth / ipv4 proto mask 0 src mask 0.0.0.0 dst mask 255.255.255.255 src spec 100.0.0.1 dst spec 200.0.0.1 proto spec 17 / udp src mask 0 dst mask 0 src spec 100 dst spec 200 / end actions queue index 3 / end", "Invalid port 4", 60) self.dut.send_expect("quit", "# ", 60) # ipv6 @@ -858,13 +858,13 @@ class TestFlowClassifySoftnic(TestCase): cmd = "pipeline RX table match hash ext key 64 mask 0000FF00FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF000000000000000000000000000000000000000000000000 offset 274 buckets 16K size 64K action AP0" self.set_table(cmd, filename) self.start_testpmd(filename, self.port_num) - self.dut.send_expect("flow create 4 group 0 ingress pattern eth / ipv6 proto mask 255 src mask ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff dst mask ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff src spec 2001::1 dst spec 0::1 proto spec 17 / udp src mask 0 dst mask 65535 src spec 31 dst spec 41 / end actions queue index 3 / end", "error", 60) + self.dut.send_expect("flow create 4 group 0 ingress pattern eth / ipv6 proto mask 255 src mask ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff dst mask ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff src spec 2001::1 dst spec 0::1 proto spec 17 / udp src mask 0 dst mask 65535 src spec 31 dst spec 41 / end actions queue index 3 / end", "Invalid port 4", 60) self.dut.send_expect("quit", "# ", 60) cmd = "pipeline RX table match hash ext key 16 mask FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF offset 294 buckets 16K size 64K action AP0" self.set_table(cmd, filename) self.start_testpmd(filename, self.port_num) - self.dut.send_expect("flow create 4 group 0 ingress pattern eth / ipv6 proto mask 0 src mask ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff dst mask 0:0:0:0:0:0:0:0 src spec ABCD:EF01:2345:6789:ABCD:EF01:2345:5789 dst spec 0:0:0:0:0:0:0:0 proto spec 17 / udp src mask 0 dst mask 0 src spec 0 dst spec 0 / end actions queue index 3 / end", "error", 60) + self.dut.send_expect("flow create 4 group 0 ingress pattern eth / ipv6 proto mask 0 src mask ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff dst mask 0:0:0:0:0:0:0:0 src spec ABCD:EF01:2345:6789:ABCD:EF01:2345:5789 dst spec 0:0:0:0:0:0:0:0 proto spec 17 / udp src mask 0 dst mask 0 src spec 0 dst spec 0 / end actions queue index 3 / end", "Invalid port 4", 60) self.dut.send_expect("quit", "# ", 60) def test_ipv4_hash_rss_action(self): -- 2.17.1