* [dts][PATCH V1 2/2] test_plans/kernelpf_iavf: remove duplicate case vf_tso
2022-08-12 3:11 [dts][PATCH V1 1/2] tests/kernelpf_iavf: remove duplicate case vf_tso Weiyuan Li
@ 2022-08-12 3:11 ` Weiyuan Li
2022-08-24 8:01 ` lijuan.tu
0 siblings, 1 reply; 3+ messages in thread
From: Weiyuan Li @ 2022-08-12 3:11 UTC (permalink / raw)
To: dts; +Cc: Weiyuan Li
Duplicated to vf_offload tso, remove vf_tso from kernelpf_iavf.
Signed-off-by: Weiyuan Li <weiyuanx.li@intel.com>
---
test_plans/kernelpf_iavf_test_plan.rst | 76 --------------------------
1 file changed, 76 deletions(-)
diff --git a/test_plans/kernelpf_iavf_test_plan.rst b/test_plans/kernelpf_iavf_test_plan.rst
index 8c7d1ad5..7613fa68 100644
--- a/test_plans/kernelpf_iavf_test_plan.rst
+++ b/test_plans/kernelpf_iavf_test_plan.rst
@@ -320,82 +320,6 @@ Send ipv4 packets, check RSS hash value is different::
p=Ether(dst="56:0A:EC:50:A4:28")/IP(src="1.2.3.4")/Raw(load='X'*30)
-Test case: VF TSO
-=================
-Turn off all hardware offloads on tester machine::
-
- ethtool -K eth1 rx off tx off tso off gso off gro off lro off
-
-Change mtu for large packet::
-
- ifconfig 'tester interface' mtu 9000
-
-Launch the ``testpmd`` with the following arguments, add "--max-pkt-len"
-for large packet::
-
- ./<build_target>/app/dpdk-testpmd -c f -n 4 -- -i --port-topology=chained --max-pkt-len=9000
-
-Set csum forward::
-
- testpmd> set fwd csum
- testpmd> set verbose 1
-
-Enable HW checksum::
-
- testpmd> port stop all
- testpmd> csum set ip hw 0
- testpmd> csum set udp hw 0
- testpmd> csum set tcp hw 0
- testpmd> csum set sctp hw 0
-
-Set TSO turned on, set TSO size as 1460::
-
- testpmd> tso set 1460 0
- testpmd> port start all
- testpmd> start
-
-Send few IP/TCP packets from tester machine to DUT. Check IP/TCP checksum
-correctness in captured packet and verify correctness of HW TSO offload
-for large packets. One large TCP packet (5214 bytes + headers) segmented
-to four fragments (1460 bytes+header, 1460 bytes+header, 1460 bytes+header
-and 834 bytes + headers), checksums are also ok::
-
- p=Ether()/IP(chksum=0x1234)/TCP(flags=0x10,chksum=0x1234)/Raw(RandString(5214))
-
-Transmitted packet::
-
- 21:48:24.214136 00:00:00:00:00:00 > 3c:fd:fe:9d:69:68, ethertype IPv6
- (0x86dd), length 5288: (hlim 64, next-header TCP (6) payload length: 5234)
- ::1.ftp-data > ::1.http: Flags [.], cksum 0xac95 (correct), seq 0:5214,
- ack 1, win 8192, length 5214: HTTP
-
-Captured packet::
-
- 21:48:24.214207 3c:fd:fe:9d:69:68 > 02:00:00:00:00:00, ethertype IPv6
- (0x86dd), length 1534: (hlim 64, next-header TCP (6) payload length: 1480)
- ::1.ftp-data > ::1.http: Flags [.], cksum 0xa641 (correct), seq 0:1460,
- ack 1, win 8192, length 1460: HTTP
- 21:48:24.214212 3c:fd:fe:9d:69:68 > 02:00:00:00:00:00, ethertype IPv6
- (0x86dd), length 1534: (hlim 64, next-header TCP (6) payload length: 1480)
- ::1.ftp-data > ::1.http: Flags [.], cksum 0xae89 (correct), seq 1460:2920,
- ack 1, win 8192, length 1460: HTTP
- 21:48:24.214213 3c:fd:fe:9d:69:68 > 02:00:00:00:00:00, ethertype IPv6
- (0x86dd), length 1534: (hlim 64, next-header TCP (6) payload length: 1480)
- ::1.ftp-data > ::1.http: Flags [.], cksum 0xfdb6 (correct), seq 2920:4380,
- ack 1, win 8192, length 1460: HTTP
- 21:48:24.214215 3c:fd:fe:9d:69:68 > 02:00:00:00:00:00, ethertype IPv6
- (0x86dd), length 908: (hlim 64, next-header TCP (6) payload length: 854)
- ::1.ftp-data > ::1.http: Flags [.], cksum 0xe629 (correct), seq 4380:5214,
- ack 1, win 8192, length 834: HTTP
-
-Set TSO turned off::
-
- testpmd> tso set 0 0
-
-Send few IP/TCP packets from tester machine to DUT. Check IP/TCP checksum
-correctness in captured packet and verify correctness of HW TSO offload
-for large packets, but don't do packet segmentation.
-
Test case: VF port stop/start
=============================
--
2.27.0
^ permalink raw reply [flat|nested] 3+ messages in thread