From: "Li, WeiyuanX" <weiyuanx.li@intel.com>
To: dts@dpdk.org, yuan.peng@intel.com
Cc: Weiyuan Li <weiyuanx.li@intel.com>
Subject: [dts][PATCH V1 2/2] test_plans/kernelpf_iavf: remove 4 duplicated cases from kernelpf_iavf
Date: Thu, 9 Jun 2022 15:07:30 +0800 [thread overview]
Message-ID: <20220609070730.1769-2-weiyuanx.li@intel.com> (raw)
In-Reply-To: <20220609070730.1769-1-weiyuanx.li@intel.com>
From: Weiyuan Li <weiyuanx.li@intel.com>
Case vf_add_pvid/vf_vlan_rx are duplicated to vf_vlan suite,
vf_hw_checksum_offload/vf_sw_checksum_offload are duplicated to vf_offload suite.
So remove the four cases.
Signed-off-by: Weiyuan Li <weiyuanx.li@intel.com>
---
test_plans/kernelpf_iavf_test_plan.rst | 116 -------------------------
1 file changed, 116 deletions(-)
diff --git a/test_plans/kernelpf_iavf_test_plan.rst b/test_plans/kernelpf_iavf_test_plan.rst
index 6f65a529..64261b67 100644
--- a/test_plans/kernelpf_iavf_test_plan.rst
+++ b/test_plans/kernelpf_iavf_test_plan.rst
@@ -188,73 +188,6 @@ Disable VF promisc mode::
Send packet with broadcast address ff:ff:ff:ff:ff:ff, and check VF can
receive the packet
-
-Test case: add port based vlan on VF
-====================================
-Add pvid on VF0 from PF device::
-
- ip link set $PF_INTF vf 0 vlan 2
-
-Send packet with same vlan id and check VF can receive
-
-Send packet with wrong vlan id and check VF can't receive
-
-Check PF device shows correct pvid setting::
-
- ip link show $PF_INTF
- ...
- vf 0 MAC 00:01:23:45:67:89, vlan 2, spoof checking on, link-state auto
-
-
-Test case: remove port based vlan on VF
-=======================================
-Remove added vlan from PF device::
-
- ip link set $PF_INTF vf 0 vlan 0
-
-Start testpmd and send packet without vlan and check VF can receive
-
-Set packet with vlan id 0 and check VF can receive
-
-Set packet with random id 1-4095 and check VF can receive
-
-Check PF device doesn't show pvid setting::
-
- ip link show $PF_INTF
-
-Test case: VF tagged vlan RX
-============================
-
-Make sure port based vlan disabled on VF0
-
-Start testpmd with rxonly mode::
-
- testpmd> set fwd rxonly
- testpmd> set verbose 1
- testpmd> start
-
-Send packet without vlan and check VF can receive
-
-Send packet with vlan 0 and check VF can receive
-
-Add vlan from VF driver::
-
- testpmd> rx_vlan add 1 0
-
-Send packet with vlan 1 and check VF can receive
-
-Rerun above with random vlan and max vlan 4095, check VF can't receive
-
-Remove vlan on VF0::
-
- testpmd> rx_vlan rm 1 0
-
-Send packet with vlan 0 and check VF can receive
-
-Send packet without vlan and check VF can receive
-
-Send packet with vlan 1 and check VF can receive
-
Test case: VF vlan insertion
============================
@@ -426,55 +359,6 @@ Send ipv4 packets, check RSS hash value is different::
p=Ether(dst="56:0A:EC:50:A4:28")/IP(src="1.2.3.4")/Raw(load='X'*30)
-
-Test case: VF HW checksum offload
-=================================
-
-Enable HW checksum, set csum forward::
-
- testpmd> port stop all
- testpmd> csum set ip hw 0
- testpmd> csum set udp hw 0
- testpmd> csum set tcp hw 0
- testpmd> csum set sctp hw 0
- testpmd> set fwd csum
- testpmd> set verbose 1
- testpmd> port start all
- testpmd> start
-
-Send packets with incorrect checksum to vf port, verify that the packets
-can be received by VF port and checksum error reported,
-the packets forwarded by VF port have the correct checksum value::
-
- p=Ether()/IP(chksum=0x1234)/UDP()/Raw(load='X'*20)
- p=Ether()/IP()/TCP(chksum=0x1234)/Raw(load='X'*20)
- p=Ether()/IP()/UDP(chksum=0x1234)/Raw(load='X'*20)
-
-
-Test case: VF SW checksum offload
-=================================
-
-Enable SW checksum, set csum forward::
-
- testpmd> port stop all
- testpmd> csum set ip sw 0
- testpmd> csum set udp sw 0
- testpmd> csum set tcp sw 0
- testpmd> csum set sctp sw 0
- testpmd> set fwd csum
- testpmd> set verbose 1
- testpmd> port start all
- testpmd> start
-
-Send packets with incorrect checksum to vf port, verify that the packets
-can be received by VF port and checksum error reported, the packets
-forwarded by VF port have the correct checksum value::
-
- p=Ether()/IP(chksum=0x1234)/UDP()/Raw(load='X'*20)
- p=Ether()/IP()/TCP(chksum=0x1234)/Raw(load='X'*20)
- p=Ether()/IP()/UDP(chksum=0x1234)/Raw(load='X'*20)
-
-
Test case: VF TSO
=================
Turn off all hardware offloads on tester machine::
--
2.17.1
next prev parent reply other threads:[~2022-06-09 7:07 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-06-09 7:07 [dts][PATCH V1 1/2] tests/kernelpf_iavf: " Li, WeiyuanX
2022-06-09 7:07 ` Li, WeiyuanX [this message]
2022-06-15 9:18 ` [dts][PATCH V1 2/2] test_plans/kernelpf_iavf: " lijuan.tu
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20220609070730.1769-2-weiyuanx.li@intel.com \
--to=weiyuanx.li@intel.com \
--cc=dts@dpdk.org \
--cc=yuan.peng@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).