test suite reviews and discussions
 help / color / mirror / Atom feed
* [dts] [PATCH v1] Add dcf_lifecycle test plan
@ 2020-05-29  2:18 Chen, Zhaoyan
  2020-06-01  3:24 ` Tu, Lijuan
  0 siblings, 1 reply; 2+ messages in thread
From: Chen, Zhaoyan @ 2020-05-29  2:18 UTC (permalink / raw)
  To: dts; +Cc: Chen, Zhaoyan, Chen

Add dcf test plan for checking lifecycle control.

Signed-off-by: Chen, Zhaoyan <zhaoyan.chen@intel.com>
---
 test_plans/dcf_lifecycle_test.rst | 713 ++++++++++++++++++++++++++++++
 1 file changed, 713 insertions(+)
 create mode 100644 test_plans/dcf_lifecycle_test.rst

diff --git a/test_plans/dcf_lifecycle_test.rst b/test_plans/dcf_lifecycle_test.rst
new file mode 100644
index 0000000..c7d66c6
--- /dev/null
+++ b/test_plans/dcf_lifecycle_test.rst
@@ -0,0 +1,713 @@
+.. Copyright (c) <2019-2020>, Intel Corporation
+         All rights reserved.
+
+   Redistribution and use in source and binary forms, with or without
+   modification, are permitted provided that the following conditions
+   are met:
+
+   - Redistributions of source code must retain the above copyright
+     notice, this list of conditions and the following disclaimer.
+
+   - Redistributions in binary form must reproduce the above copyright
+     notice, this list of conditions and the following disclaimer in
+     the documentation and/or other materials provided with the
+     distribution.
+
+   - Neither the name of Intel Corporation nor the names of its
+     contributors may be used to endorse or promote products derived
+     from this software without specific prior written permission.
+
+   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
+   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
+   COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
+   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
+   (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+   STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
+   OF THE POSSIBILITY OF SUCH DAMAGE.
+
+
+============================
+CVL DCF Lifecycle Test Suite
+============================
+
+Description
+===========
+
+The DCF is a device configuration function (DCF - driver) bound to
+one of the device's VFs which can act as a sole controlling entity
+to exercise advance functionality (such as switch, ACL) for rest of
+the VNFs (virtual network functions) under a DPDK based NFV deployment.
+
+The DCF can act as a special VF talking to the kernel PF over the same
+virtchannel mailbox to configure the underlying device (port) for the VFs.
+
+The test suite covers the lifecycle of DCF context in Kernel PF, such as
+launch, and exit, switch rules handling, reseting, and exception exit.
+
+
+Configuration
+=============
+
+NIC: 2x25G or 2x100G, serveral TC need breakout mode.
+NIC should have 2 PF ports at least, and connect to tester's ports.
+
+Topology
+
+  +-------+       +--------+
+  |       |       |        |
+  |     p1|<----->|        |
+  |  DUT  |       | Tester |
+  |     p2|<----->|        |
+  |       |       |        |
+  +-------+       +--------+
+
+
+Device naming convention and mapping in this test suite
+(You should change these names by your setup)
+
+  +-------------+--------------+------------------+
+  | Device Name |   PCI addr   | Kernel Interface |
+  +=============+==============+==================+
+  |     P1      | 0000:18:00.0 |    enp24s0f0     |
+  +-------------+--------------+------------------+
+  |     VF0     | 0000:18:01.0 |     enp24s1      |
+  +-------------+--------------+------------------+
+  |     P2      | 0000:18:00.1 |    enp24s0f1     |
+  +-------------+--------------+------------------+
+
+
+Support DCF mode
+================
+
+
+TC01: DCF on 1 trust VF on 1 PF
+-------------------------------
+
+Generate 1 trust VF on 1 PF, and request 1 DCF on the trust VF.
+PF should grant DCF mode to it.
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust on
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=vf -- -i
+
+Expected: VF get DCF mode. There are outputs in testpmd launching ::
+
+    EAL: PCI device 0000:18:01.0 on NUMA socket 0
+    EAL: probe driver: 8086:1889 net_ice_dcf
+
+
+TC02: DCF on 2 PFs, 1 trust VF on each PF
+-----------------------------------------
+
+Generate 2 trust VFs on 2 PFs, each trust VF request DCF.
+Each PF should grant DCF mode to them.
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+    echo 4 > /sys/bus/pci/devices/0000:18:00.1/sriov_numvfs
+
+Set a VF as trust on each PF ::
+
+    ip link set enp24s0f0 vf 0 trust on
+    ip link set enp24s0f1 vf 0 trust on
+
+Launch dpdk on the VF on each PF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:11.0
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf1 -- -i
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-15 -n 4 -w 18:11.0,cap=dcf --file-prefix=dcf2 -- -i
+
+Expected: VF get DCF mode. There are outputs in each testpmd launching ::
+
+    EAL: PCI device 0000:18:01.0 on NUMA socket 0
+    EAL: probe driver: 8086:1889 net_ice_dcf
+
+    EAL: PCI device 0000:18:11.0 on NUMA socket 0
+    EAL: probe driver: 8086:1889 net_ice_dcf
+
+
+TC03: Check only VF zero can get DCF mode
+-----------------------------------------
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 1 trust on
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.1
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.1,cap=dcf --file-prefix=vf -- -i
+
+Expected: VF can NOT get DCF mode. testpmd should provide a friendly output ::
+
+    ice_dcf_get_vf_resource(): Fail to get response of OP_GET_VF_RESOURCE
+    ice_dcf_init_hw(): Failed to get VF resource
+    ice_dcf_dev_init(): Failed to init DCF hardware
+
+Error message in dmesg ::
+
+    ice 0000:18:00.0: Only VF0 can request for DCF.
+    ice 0000:18:00.0: VF 1 failed opcode 3, retval: -5
+
+
+TC04: Check only trusted VF can get DCF mode
+--------------------------------------------
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust off
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=vf -- -i
+
+Expected: VF can NOT get DCF mode. testpmd should provide a friendly output ::
+
+    ice_dcf_get_vf_resource(): Fail to get response of OP_GET_VF_RESOURCE
+    ice_dcf_init_hw(): Failed to get VF resource
+    ice_dcf_dev_init(): Failed to init DCF hardware
+
+Error message in dmesg ::
+
+    ice 0000:18:00.0: DCF needs to be trusted.
+    ice 0000:18:00.0: VF 0 failed opcode 3, retval: -5
+
+
+TC05: DCF graceful exit
+-----------------------
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust on
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf -- -i
+
+Launch another testpmd on the VF1, and start mac forward ::
+
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w 18:01.1 --file-prefix=vf -- -i
+    set verbose 1
+    set fwd mac
+    start
+
+Set switch rule to VF1 `0000:18:01.1` from DCF ::
+
+    flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions vf id 1 / end
+
+Send a scapy packet to VF1 ::
+
+    p = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.2', dst='192.168.0.3')/Raw(64*'x')
+    sendp(p, iface='testeri0', count=1)
+
+Check VF1 received the packet. Stats shows 1 packet received and forwarded. ::
+
+    show port stats all
+
+Exit the DCF in DCF testpmd ::
+
+    quit
+
+Send scapy packet again. Check VF1 can't receive the packet ::
+
+    show port stats all
+
+Expect: VF1 can't receive the packet
+
+
+Handling of switch filters added by DCF
+=======================================
+
+TC11: Turn trust mode off, when DCF launched
+--------------------------------------------
+
+If turn trust mode off, when DCF launched. The DCF rules should be removed.
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust on
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf -- -i
+
+Launch another testpmd on the VF1, and start mac forward ::
+
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w 18:01.1 --file-prefix=vf -- -i
+    set verbose 1
+    set fwd macstart
+
+Set switch rule to VF1 0000:18:01.1 from DCF ::
+
+    flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions vf id 1 / end
+
+Send a scapy packet to VF1 ::
+
+    p = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.2', dst='192.168.0.3')/Raw(64*'x')
+    sendp(p, iface='testeri0', count=1)
+
+Check VF1 received the packet. Stats shows 1 packet received and forwarded. ::
+
+    show port stats all
+
+Turn off DCF trust mode ::
+
+    ip link set enp24s0f0 vf 0 trust off
+
+Send scapy packet again. Check VF1 can't receive the packet ::
+
+    show port stats all
+
+Expect: VF1 can't receive the packet
+
+
+TC12: Kill DCF process
+----------------------
+
+If kill DCF process, when DCF launched. The DCF rules should be removed.
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust on
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf -- -i
+
+Launch another testpmd on the VF1, and start mac forward ::
+
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w 18:01.1 --file-prefix=vf -- -i
+    set verbose 1
+    set fwd macstart
+
+Set switch rule to VF1 0000:18:01.1 from DCF ::
+
+    flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions vf id 1 / end
+
+Send a scapy packet to VF1 ::
+
+    p = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.2', dst='192.168.0.3')/Raw(64*'x')
+    sendp(p, iface='testeri0', count=1)
+
+Check VF1 received the packet. Stats shows 1 packet received and forwarded ::
+
+    show port stats all
+
+Kill DCF process ::
+
+    ps -ef |grep testpmd #Check the process id
+    kill -9 <pid>
+
+Send scapy packet again. Check VF1 can't receive the packet ::
+
+    show port stats all
+
+Expect: VF1 can't receive the packet
+
+
+TC13: Launch 2nd DCF process on the same VF
+-------------------------------------------
+
+Launch 2nd DCF process on the same VF, PF shall reject the request.
+DPDK does not support to open 2nd DCF PMD driver on same VF.
+
+Generate 4 VFs on PF
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust on
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf -- -i
+
+Launch another testpmd on the DCF ::
+
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf2 -- -i
+
+Expect: the second testpmd can't be launched
+
+
+TC14: DCF enabled, one of VF reset
+----------------------------------
+
+If DCF enabled, one of VF reset. DCF shall clean up all the rules of this VF.
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust on
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf -- -i
+
+Launch another testpmd on the VF1 and VF2, and start mac forward ::
+
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w 18:01.1 --file-prefix=vf1 -- -i
+    set verbose 1
+    set fwd mac
+    start
+
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 15-16 -n 4 -w 18:01.2 --file-prefix=vf2 -- -i
+    set verbose 1
+    set fwd mac
+    start
+
+Set switch rule to VF1 0000:18:01.1 from DCF ::
+
+    flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions vf id 1 / end
+    flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.4 dst is 192.168.0.5 / end actions vf id 1 / end
+
+Send a scapy packet to VF1 ::
+
+    p = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.2', dst='192.168.0.3')/Raw(64*'x')
+    sendp(p, iface='testeri0', count=1)
+
+Send a scapy packet to VF2 ::
+
+    p = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.4', dst='192.168.0.5')/Raw(64*'x')
+    sendp(p, iface='testeri0', count=1)
+
+Check VF1 received the packet. Stats shows 1 packet received and forwarded ::
+
+    show port stats all
+
+Reset VF1 by set mac addr, to trigger VF reset ::
+
+    ip link set enp24s0f0 vf 1 mac 00:01:02:03:04:05
+
+Reset port in testpmd::
+
+    stop
+    port stop all
+    port reset all
+    port start all
+    start
+
+Send scapy packet again. Check VF1 can receive the packet ::
+
+    show port stats all
+
+Expect: Send packet to VF1 and VF2. VF1 can receive the packet, VF2 can receive the packet.
+
+
+TC15: DCF enabled, PF reset - PFR
+---------------------------------
+
+If DCF enabled, PF reset - PFR. All DCF the rules should be clean up.
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust on
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1 18:01.2
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf -- -i
+
+Launch another testpmd on the VF1, and start mac forward ::
+
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w 18:01.1 -w 18:01.2 --file-prefix=vf -- -i
+    set verbose 1
+    set fwd macstart
+
+Set switch rule to VF1 0000:18:01.1 and VF2 0000:18:01.2 from DCF ::
+
+    flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions vf id 1 / end
+
+Send a scapy packet to VF1 and VF2 ::
+
+    p1 = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.2', dst='192.168.0.3')/Raw(64*'x')
+    sendp(p1, iface='testeri0', count=1)
+
+Check if VF1 and VF2 received the packet.
+Stats shows 1 packet received and forwarded on each VF ::
+
+    show port stats all
+
+Reset PF by lanconf command::
+
+    lanconf /zeroinit
+    <Choose 18:00.0 device> and Enter. See the "Initialize Options Menu"
+    Press Esc, See "LANConf Menu"
+    Select "SV Menu" and then select "Reset Menu"
+    Select "PF Reset" to trigger PF reset event
+
+Send scapy packet again. Check VF1 can't receive the packet
+
+    show port stats all
+
+Expect: VF1 can't receive the packet
+
+
+TC16: DCF enabled, PF reset - CORER. All the rules should be clean up
+---------------------------------------------------------------------
+
+Same to TC15, just reset command is different at last step::
+
+    Select "Core Reset" to trigger Core reset event
+
+
+TC17: DCF enabled, PF reset - GLOBR. All the rules should be clean up
+---------------------------------------------------------------------
+
+Same to TC15, just reset command is different at last step::
+
+    Select "Global Reset" to trigger Global reset event
+
+
+TC18: DCF enabled, PF reset - ENPR. All the rules should be clean up
+--------------------------------------------------------------------
+
+Same to TC15, just reset command is different at last step::
+
+    Select "EMP Reset" to trigger EMP reset event
+
+
+ADQ and DCF mode shall be mutually exclusive
+============================================
+
+TC19: When ADQ set on PF, PF should reject the DCF mode
+-------------------------------------------------------
+
+When ADQ set on PF, PF should reject the DCF mode. Remove the ADQ setting, PF shall accept DCF mode.
+
+Host kernel version is required 4.19+, and MACVLAN offload should be set off
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust on
+
+Set ADQ on PF ::
+
+    modprobe sch_mqprio
+    modprobe act_mirred
+    modprobe cls_flower
+
+    ethtool -K enp24s0f0 hw-tc-offload on
+    tc qdisc add dev enp24s0f0 ingress
+    tc qdisc show dev enp24s0f0
+    tc qdisc add dev enp24s0f0 root mqprio num_tc 4 map 0 0 0 0 1 1 1 1 2 2 2 2 3 3 3 3 queues 4@0 4@4 8@8 8@16 hw 1 mode channel
+    tc filter add dev enp24s0f0 protocol ip parent ffff: prio 1 flower dst_ip 192.168.1.10 ip_proto tcp action gact pass
+    tc filter show dev enp24s0f0 parent ffff:
+
+Try to launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf -- -i
+
+Expect: testpmd can't be launched. PF should reject DCF mode.
+
+Remove ADQ on PF ::
+
+    tc filter del dev enp24s0f0 parent ffff: pref 1 protocol ip
+    tc filter show dev enp24s0f0 parent ffff:
+    tc qdisc del dev enp24s0f0 root mqprio
+    tc qdisc del dev enp24s0f0 ingress
+    tc qdisc show dev enp24s0f0
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf -- -i
+
+Expect: testpmd can launch successfully. DCF mode can be grant ::
+
+    EAL: PCI device 0000:18:01.0 on NUMA socket 0
+    EAL: probe driver: 8086:1889 net_ice_dcf
+
+
+TC20: When DCF mode enabled, ADQ setting on PF shall fail
+---------------------------------------------------------
+
+When DCF mode enabled, ADQ setting on PF shall fail.
+Exit DCF mode, ADQ setting on PF shall be successful.
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust on
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf -- -i
+
+Set ADQ on PF ::
+
+    ethtool -K enp24s0f0 hw-tc-offload on
+    tc qdisc add dev enp24s0f0 ingress
+    tc qdisc show dev enp24s0f0
+    tc qdisc add dev enp24s0f0 root mqprio num_tc 4 map 0 0 0 0 1 1 1 1 2 2 2 2 3 3 3 3 queues 4@0 4@4 8@8 8@16 hw 1 mode channel
+    tc filter add dev enp24s0f0 protocol ip parent ffff: prio 1 flower dst_ip 192.168.1.10 ip_proto tcp action gact pass
+    tc filter show dev enp24s0f0 parent ffff:
+
+Expect: ADQ command can't be executed successfully
+
+Exit testpmd ::
+
+    quit
+
+Set ADQ on PF again
+
+Expect: ADQ can be set.
+
+
+TC21: DCF and ADQ can be enabled on different PF
+------------------------------------------------
+
+Configure the DCF on 1 PF port and configure ADQ on the other PF port.
+Then turn off DCF, other PF's should not be impact.
+
+Generate 4 VFs on PF1 and 4VFs on PF2 ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+    echo 4 > /sys/bus/pci/devices/0000:18:00.1/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust on
+
+Launch dpdk on the VF0 on PF1, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=dcf -- -i
+
+Set ADQ on PF2 ::
+
+    modprobe sch_mqprio
+    modprobe act_mirred
+    modprobe cls_flower
+
+    ethtool -K enp24s0f1 hw-tc-offload on
+    tc qdisc add dev enp24s0f1 ingress
+    tc qdisc show dev enp24s0f1
+    tc qdisc add dev enp24s0f1 root mqprio num_tc 4 map 0 0 0 0 1 1 1 1 2 2 2 2 3 3 3 3 queues 4@0 4@4 8@8 8@16 hw 1 mode channel
+    tc filter add dev enp24s0f1 protocol ip parent ffff: prio 1 flower dst_ip 192.168.1.10 ip_proto tcp action gact pass
+    tc filter show dev enp24s0f1 parent ffff:
+
+Expect: ADQ can be set on PF2.
+
+
+L2 Forwarding (MAC-VLAN feature) and DCF mode shall be mutually exclusive
+=========================================================================
+
+TC22: When L2 forwarding set, PF should reject the DCF mode
+-----------------------------------------------------------
+
+When L2 forwarding set, PF should reject the DCF mode.
+Remove L2 forwarding set, PF shall accept the DCF mode.
+
+Similar to ADQ test TC19
+
+Just change the ADQ commands to MAC-VLAN ::
+
+    ethtool -K enp24s0f0 l2-fwd-offload on
+    ip link add link macvlan0 link enp24s0f0 type macvlan
+    ifconfig macvlan0 192.168.1.111
+    ipconfig macvlan0 up
+
+Remove MAC-VLAN commands ::
+
+  ip link del macvlan0
+  ethtool -K enp24s0f0 l2-fwd-offload off
+
+
+TC23: When DCF mode enabled, PF can't set L2 forwarding
+-------------------------------------------------------
+
+When DCF mode enabled, PF can't set L2 forwarding.
+Exit DCF mode, PF can set L2 forwarding.
+
+Similar to ADQ test TC20
+
+Just change the ADQ commands to MAC-VLAN ::
+
+    ethtool -K enp24s0f0 l2-fwd-offload on
+    ip link add link macvlan0 link enp24s0f0 type macvlan
+    ifconfig macvlan0 192.168.1.111
+    ipconfig macvlan0 up
+
+Remove MAC-VLAN commands ::
+
+  ip link del macvlan0
+  ethtool -K enp24s0f0 l2-fwd-offload off
+
+
+TC24: DCF and L2 forwarding can be enabled on different PF
+----------------------------------------------------------
+
+Configure the DCF on 1 PF port and configure MAC-VLAN on the other PF port.
+Then turn off DCF, other PF's MAC-VLAN filter should not be impact.
+
+Similar to ADQ test TC21
+
+Just change the ADQ commands to MAC-VLAN ::
+
+    ethtool -K enp24s0f0 l2-fwd-offload on
+    ip link add link macvlan0 link enp24s0f0 type macvlan
+    ifconfig macvlan0 192.168.1.111
+    ipconfig macvlan0 up
+
+Remove MAC-VLAN commands ::
+
+  ip link del macvlan0
+  ethtool -K enp24s0f0 l2-fwd-offload off
-- 
2.22.0


^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [dts] [PATCH v1] Add dcf_lifecycle test plan
  2020-05-29  2:18 [dts] [PATCH v1] Add dcf_lifecycle test plan Chen, Zhaoyan
@ 2020-06-01  3:24 ` Tu, Lijuan
  0 siblings, 0 replies; 2+ messages in thread
From: Tu, Lijuan @ 2020-06-01  3:24 UTC (permalink / raw)
  To: Chen, Zhaoyan, dts; +Cc: Chen, Zhaoyan, Chen

Applied, thanks

> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Chen, Zhaoyan
> Sent: Friday, May 29, 2020 10:18 AM
> To: dts@dpdk.org
> Cc: Chen, Zhaoyan <zhaoyan.chen@intel.com>; Chen@dpdk.org
> Subject: [dts] [PATCH v1] Add dcf_lifecycle test plan
> 
> Add dcf test plan for checking lifecycle control.
> 
> Signed-off-by: Chen, Zhaoyan <zhaoyan.chen@intel.com>
> ---
>  test_plans/dcf_lifecycle_test.rst | 713 ++++++++++++++++++++++++++++++
>  1 file changed, 713 insertions(+)
>  create mode 100644 test_plans/dcf_lifecycle_test.rst
> 
> diff --git a/test_plans/dcf_lifecycle_test.rst b/test_plans/dcf_lifecycle_test.rst
> new file mode 100644
> index 0000000..c7d66c6
> --- /dev/null
> +++ b/test_plans/dcf_lifecycle_test.rst
> @@ -0,0 +1,713 @@
> +.. Copyright (c) <2019-2020>, Intel Corporation
> +         All rights reserved.
> +
> +   Redistribution and use in source and binary forms, with or without
> +   modification, are permitted provided that the following conditions
> +   are met:
> +
> +   - Redistributions of source code must retain the above copyright
> +     notice, this list of conditions and the following disclaimer.
> +
> +   - Redistributions in binary form must reproduce the above copyright
> +     notice, this list of conditions and the following disclaimer in
> +     the documentation and/or other materials provided with the
> +     distribution.
> +
> +   - Neither the name of Intel Corporation nor the names of its
> +     contributors may be used to endorse or promote products derived
> +     from this software without specific prior written permission.
> +
> +   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS
> +   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> +   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
> FITNESS
> +   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
> +   COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
> INDIRECT,
> +   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
> +   (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
> GOODS OR
> +   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
> +   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
> CONTRACT,
> +   STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
> +   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
> ADVISED
> +   OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +
> +============================
> +CVL DCF Lifecycle Test Suite
> +============================
> +
> +Description
> +===========
> +
> +The DCF is a device configuration function (DCF - driver) bound to one
> +of the device's VFs which can act as a sole controlling entity to
> +exercise advance functionality (such as switch, ACL) for rest of the
> +VNFs (virtual network functions) under a DPDK based NFV deployment.
> +
> +The DCF can act as a special VF talking to the kernel PF over the same
> +virtchannel mailbox to configure the underlying device (port) for the VFs.
> +
> +The test suite covers the lifecycle of DCF context in Kernel PF, such
> +as launch, and exit, switch rules handling, reseting, and exception exit.
> +
> +
> +Configuration
> +=============
> +
> +NIC: 2x25G or 2x100G, serveral TC need breakout mode.
> +NIC should have 2 PF ports at least, and connect to tester's ports.
> +
> +Topology
> +
> +  +-------+       +--------+
> +  |       |       |        |
> +  |     p1|<----->|        |
> +  |  DUT  |       | Tester |
> +  |     p2|<----->|        |
> +  |       |       |        |
> +  +-------+       +--------+
> +
> +
> +Device naming convention and mapping in this test suite (You should
> +change these names by your setup)
> +
> +  +-------------+--------------+------------------+
> +  | Device Name |   PCI addr   | Kernel Interface |
> +  +=============+==============+==================+
> +  |     P1      | 0000:18:00.0 |    enp24s0f0     |
> +  +-------------+--------------+------------------+
> +  |     VF0     | 0000:18:01.0 |     enp24s1      |
> +  +-------------+--------------+------------------+
> +  |     P2      | 0000:18:00.1 |    enp24s0f1     |
> +  +-------------+--------------+------------------+
> +
> +
> +Support DCF mode
> +================
> +
> +
> +TC01: DCF on 1 trust VF on 1 PF
> +-------------------------------
> +
> +Generate 1 trust VF on 1 PF, and request 1 DCF on the trust VF.
> +PF should grant DCF mode to it.
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=vf -- -i
> +
> +Expected: VF get DCF mode. There are outputs in testpmd launching ::
> +
> +    EAL: PCI device 0000:18:01.0 on NUMA socket 0
> +    EAL: probe driver: 8086:1889 net_ice_dcf
> +
> +
> +TC02: DCF on 2 PFs, 1 trust VF on each PF
> +-----------------------------------------
> +
> +Generate 2 trust VFs on 2 PFs, each trust VF request DCF.
> +Each PF should grant DCF mode to them.
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.1/sriov_numvfs
> +
> +Set a VF as trust on each PF ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +    ip link set enp24s0f1 vf 0 trust on
> +
> +Launch dpdk on the VF on each PF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:11.0
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf
> --file-prefix=dcf1 -- -i
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-15 -n 4 -w
> + 18:11.0,cap=dcf --file-prefix=dcf2 -- -i
> +
> +Expected: VF get DCF mode. There are outputs in each testpmd launching ::
> +
> +    EAL: PCI device 0000:18:01.0 on NUMA socket 0
> +    EAL: probe driver: 8086:1889 net_ice_dcf
> +
> +    EAL: PCI device 0000:18:11.0 on NUMA socket 0
> +    EAL: probe driver: 8086:1889 net_ice_dcf
> +
> +
> +TC03: Check only VF zero can get DCF mode
> +-----------------------------------------
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 1 trust on
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.1
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.1,cap=dcf --file-prefix=vf -- -i
> +
> +Expected: VF can NOT get DCF mode. testpmd should provide a friendly
> output ::
> +
> +    ice_dcf_get_vf_resource(): Fail to get response of OP_GET_VF_RESOURCE
> +    ice_dcf_init_hw(): Failed to get VF resource
> +    ice_dcf_dev_init(): Failed to init DCF hardware
> +
> +Error message in dmesg ::
> +
> +    ice 0000:18:00.0: Only VF0 can request for DCF.
> +    ice 0000:18:00.0: VF 1 failed opcode 3, retval: -5
> +
> +
> +TC04: Check only trusted VF can get DCF mode
> +--------------------------------------------
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust off
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=vf -- -i
> +
> +Expected: VF can NOT get DCF mode. testpmd should provide a friendly
> output ::
> +
> +    ice_dcf_get_vf_resource(): Fail to get response of OP_GET_VF_RESOURCE
> +    ice_dcf_init_hw(): Failed to get VF resource
> +    ice_dcf_dev_init(): Failed to init DCF hardware
> +
> +Error message in dmesg ::
> +
> +    ice 0000:18:00.0: DCF needs to be trusted.
> +    ice 0000:18:00.0: VF 0 failed opcode 3, retval: -5
> +
> +
> +TC05: DCF graceful exit
> +-----------------------
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=dcf -- -i
> +
> +Launch another testpmd on the VF1, and start mac forward ::
> +
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w 18:01.1 --file-
> prefix=vf -- -i
> +    set verbose 1
> +    set fwd mac
> +    start
> +
> +Set switch rule to VF1 `0000:18:01.1` from DCF ::
> +
> +    flow create 0 priority 0 ingress pattern eth / ipv4 src is
> + 192.168.0.2 dst is 192.168.0.3 / end actions vf id 1 / end
> +
> +Send a scapy packet to VF1 ::
> +
> +    p = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.2',
> dst='192.168.0.3')/Raw(64*'x')
> +    sendp(p, iface='testeri0', count=1)
> +
> +Check VF1 received the packet. Stats shows 1 packet received and
> forwarded. ::
> +
> +    show port stats all
> +
> +Exit the DCF in DCF testpmd ::
> +
> +    quit
> +
> +Send scapy packet again. Check VF1 can't receive the packet ::
> +
> +    show port stats all
> +
> +Expect: VF1 can't receive the packet
> +
> +
> +Handling of switch filters added by DCF
> +=======================================
> +
> +TC11: Turn trust mode off, when DCF launched
> +--------------------------------------------
> +
> +If turn trust mode off, when DCF launched. The DCF rules should be
> removed.
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=dcf -- -i
> +
> +Launch another testpmd on the VF1, and start mac forward ::
> +
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w 18:01.1 --file-
> prefix=vf -- -i
> +    set verbose 1
> +    set fwd macstart
> +
> +Set switch rule to VF1 0000:18:01.1 from DCF ::
> +
> +    flow create 0 priority 0 ingress pattern eth / ipv4 src is
> + 192.168.0.2 dst is 192.168.0.3 / end actions vf id 1 / end
> +
> +Send a scapy packet to VF1 ::
> +
> +    p = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.2',
> dst='192.168.0.3')/Raw(64*'x')
> +    sendp(p, iface='testeri0', count=1)
> +
> +Check VF1 received the packet. Stats shows 1 packet received and
> forwarded. ::
> +
> +    show port stats all
> +
> +Turn off DCF trust mode ::
> +
> +    ip link set enp24s0f0 vf 0 trust off
> +
> +Send scapy packet again. Check VF1 can't receive the packet ::
> +
> +    show port stats all
> +
> +Expect: VF1 can't receive the packet
> +
> +
> +TC12: Kill DCF process
> +----------------------
> +
> +If kill DCF process, when DCF launched. The DCF rules should be removed.
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=dcf -- -i
> +
> +Launch another testpmd on the VF1, and start mac forward ::
> +
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w 18:01.1 --file-
> prefix=vf -- -i
> +    set verbose 1
> +    set fwd macstart
> +
> +Set switch rule to VF1 0000:18:01.1 from DCF ::
> +
> +    flow create 0 priority 0 ingress pattern eth / ipv4 src is
> + 192.168.0.2 dst is 192.168.0.3 / end actions vf id 1 / end
> +
> +Send a scapy packet to VF1 ::
> +
> +    p = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.2',
> dst='192.168.0.3')/Raw(64*'x')
> +    sendp(p, iface='testeri0', count=1)
> +
> +Check VF1 received the packet. Stats shows 1 packet received and
> forwarded ::
> +
> +    show port stats all
> +
> +Kill DCF process ::
> +
> +    ps -ef |grep testpmd #Check the process id
> +    kill -9 <pid>
> +
> +Send scapy packet again. Check VF1 can't receive the packet ::
> +
> +    show port stats all
> +
> +Expect: VF1 can't receive the packet
> +
> +
> +TC13: Launch 2nd DCF process on the same VF
> +-------------------------------------------
> +
> +Launch 2nd DCF process on the same VF, PF shall reject the request.
> +DPDK does not support to open 2nd DCF PMD driver on same VF.
> +
> +Generate 4 VFs on PF
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=dcf -- -i
> +
> +Launch another testpmd on the DCF ::
> +
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=dcf2 -- -i
> +
> +Expect: the second testpmd can't be launched
> +
> +
> +TC14: DCF enabled, one of VF reset
> +----------------------------------
> +
> +If DCF enabled, one of VF reset. DCF shall clean up all the rules of this VF.
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=dcf -- -i
> +
> +Launch another testpmd on the VF1 and VF2, and start mac forward ::
> +
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w 18:01.1 --file-
> prefix=vf1 -- -i
> +    set verbose 1
> +    set fwd mac
> +    start
> +
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 15-16 -n 4 -w 18:01.2 --file-
> prefix=vf2 -- -i
> +    set verbose 1
> +    set fwd mac
> +    start
> +
> +Set switch rule to VF1 0000:18:01.1 from DCF ::
> +
> +    flow create 0 priority 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is
> 192.168.0.3 / end actions vf id 1 / end
> +    flow create 0 priority 0 ingress pattern eth / ipv4 src is
> + 192.168.0.4 dst is 192.168.0.5 / end actions vf id 1 / end
> +
> +Send a scapy packet to VF1 ::
> +
> +    p = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.2',
> dst='192.168.0.3')/Raw(64*'x')
> +    sendp(p, iface='testeri0', count=1)
> +
> +Send a scapy packet to VF2 ::
> +
> +    p = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.4',
> dst='192.168.0.5')/Raw(64*'x')
> +    sendp(p, iface='testeri0', count=1)
> +
> +Check VF1 received the packet. Stats shows 1 packet received and
> forwarded ::
> +
> +    show port stats all
> +
> +Reset VF1 by set mac addr, to trigger VF reset ::
> +
> +    ip link set enp24s0f0 vf 1 mac 00:01:02:03:04:05
> +
> +Reset port in testpmd::
> +
> +    stop
> +    port stop all
> +    port reset all
> +    port start all
> +    start
> +
> +Send scapy packet again. Check VF1 can receive the packet ::
> +
> +    show port stats all
> +
> +Expect: Send packet to VF1 and VF2. VF1 can receive the packet, VF2 can
> receive the packet.
> +
> +
> +TC15: DCF enabled, PF reset - PFR
> +---------------------------------
> +
> +If DCF enabled, PF reset - PFR. All DCF the rules should be clean up.
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0 18:01.1 18:01.2
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=dcf -- -i
> +
> +Launch another testpmd on the VF1, and start mac forward ::
> +
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 11-14 -n 4 -w 18:01.1 -w
> 18:01.2 --file-prefix=vf -- -i
> +    set verbose 1
> +    set fwd macstart
> +
> +Set switch rule to VF1 0000:18:01.1 and VF2 0000:18:01.2 from DCF ::
> +
> +    flow create 0 priority 0 ingress pattern eth / ipv4 src is
> + 192.168.0.2 dst is 192.168.0.3 / end actions vf id 1 / end
> +
> +Send a scapy packet to VF1 and VF2 ::
> +
> +    p1 = Ether(dst='xx:xx:xx:xx:xx:xx')/IP(src='192.168.0.2',
> dst='192.168.0.3')/Raw(64*'x')
> +    sendp(p1, iface='testeri0', count=1)
> +
> +Check if VF1 and VF2 received the packet.
> +Stats shows 1 packet received and forwarded on each VF ::
> +
> +    show port stats all
> +
> +Reset PF by lanconf command::
> +
> +    lanconf /zeroinit
> +    <Choose 18:00.0 device> and Enter. See the "Initialize Options Menu"
> +    Press Esc, See "LANConf Menu"
> +    Select "SV Menu" and then select "Reset Menu"
> +    Select "PF Reset" to trigger PF reset event
> +
> +Send scapy packet again. Check VF1 can't receive the packet
> +
> +    show port stats all
> +
> +Expect: VF1 can't receive the packet
> +
> +
> +TC16: DCF enabled, PF reset - CORER. All the rules should be clean up
> +---------------------------------------------------------------------
> +
> +Same to TC15, just reset command is different at last step::
> +
> +    Select "Core Reset" to trigger Core reset event
> +
> +
> +TC17: DCF enabled, PF reset - GLOBR. All the rules should be clean up
> +---------------------------------------------------------------------
> +
> +Same to TC15, just reset command is different at last step::
> +
> +    Select "Global Reset" to trigger Global reset event
> +
> +
> +TC18: DCF enabled, PF reset - ENPR. All the rules should be clean up
> +--------------------------------------------------------------------
> +
> +Same to TC15, just reset command is different at last step::
> +
> +    Select "EMP Reset" to trigger EMP reset event
> +
> +
> +ADQ and DCF mode shall be mutually exclusive
> +============================================
> +
> +TC19: When ADQ set on PF, PF should reject the DCF mode
> +-------------------------------------------------------
> +
> +When ADQ set on PF, PF should reject the DCF mode. Remove the ADQ
> setting, PF shall accept DCF mode.
> +
> +Host kernel version is required 4.19+, and MACVLAN offload should be
> +set off
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +
> +Set ADQ on PF ::
> +
> +    modprobe sch_mqprio
> +    modprobe act_mirred
> +    modprobe cls_flower
> +
> +    ethtool -K enp24s0f0 hw-tc-offload on
> +    tc qdisc add dev enp24s0f0 ingress
> +    tc qdisc show dev enp24s0f0
> +    tc qdisc add dev enp24s0f0 root mqprio num_tc 4 map 0 0 0 0 1 1 1 1 2 2 2
> 2 3 3 3 3 queues 4@0 4@4 8@8 8@16 hw 1 mode channel
> +    tc filter add dev enp24s0f0 protocol ip parent ffff: prio 1 flower dst_ip
> 192.168.1.10 ip_proto tcp action gact pass
> +    tc filter show dev enp24s0f0 parent ffff:
> +
> +Try to launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=dcf -- -i
> +
> +Expect: testpmd can't be launched. PF should reject DCF mode.
> +
> +Remove ADQ on PF ::
> +
> +    tc filter del dev enp24s0f0 parent ffff: pref 1 protocol ip
> +    tc filter show dev enp24s0f0 parent ffff:
> +    tc qdisc del dev enp24s0f0 root mqprio
> +    tc qdisc del dev enp24s0f0 ingress
> +    tc qdisc show dev enp24s0f0
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=dcf -- -i
> +
> +Expect: testpmd can launch successfully. DCF mode can be grant ::
> +
> +    EAL: PCI device 0000:18:01.0 on NUMA socket 0
> +    EAL: probe driver: 8086:1889 net_ice_dcf
> +
> +
> +TC20: When DCF mode enabled, ADQ setting on PF shall fail
> +---------------------------------------------------------
> +
> +When DCF mode enabled, ADQ setting on PF shall fail.
> +Exit DCF mode, ADQ setting on PF shall be successful.
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=dcf -- -i
> +
> +Set ADQ on PF ::
> +
> +    ethtool -K enp24s0f0 hw-tc-offload on
> +    tc qdisc add dev enp24s0f0 ingress
> +    tc qdisc show dev enp24s0f0
> +    tc qdisc add dev enp24s0f0 root mqprio num_tc 4 map 0 0 0 0 1 1 1 1 2 2 2
> 2 3 3 3 3 queues 4@0 4@4 8@8 8@16 hw 1 mode channel
> +    tc filter add dev enp24s0f0 protocol ip parent ffff: prio 1 flower dst_ip
> 192.168.1.10 ip_proto tcp action gact pass
> +    tc filter show dev enp24s0f0 parent ffff:
> +
> +Expect: ADQ command can't be executed successfully
> +
> +Exit testpmd ::
> +
> +    quit
> +
> +Set ADQ on PF again
> +
> +Expect: ADQ can be set.
> +
> +
> +TC21: DCF and ADQ can be enabled on different PF
> +------------------------------------------------
> +
> +Configure the DCF on 1 PF port and configure ADQ on the other PF port.
> +Then turn off DCF, other PF's should not be impact.
> +
> +Generate 4 VFs on PF1 and 4VFs on PF2 ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.1/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +
> +Launch dpdk on the VF0 on PF1, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=dcf -- -i
> +
> +Set ADQ on PF2 ::
> +
> +    modprobe sch_mqprio
> +    modprobe act_mirred
> +    modprobe cls_flower
> +
> +    ethtool -K enp24s0f1 hw-tc-offload on
> +    tc qdisc add dev enp24s0f1 ingress
> +    tc qdisc show dev enp24s0f1
> +    tc qdisc add dev enp24s0f1 root mqprio num_tc 4 map 0 0 0 0 1 1 1 1 2 2 2
> 2 3 3 3 3 queues 4@0 4@4 8@8 8@16 hw 1 mode channel
> +    tc filter add dev enp24s0f1 protocol ip parent ffff: prio 1 flower dst_ip
> 192.168.1.10 ip_proto tcp action gact pass
> +    tc filter show dev enp24s0f1 parent ffff:
> +
> +Expect: ADQ can be set on PF2.
> +
> +
> +L2 Forwarding (MAC-VLAN feature) and DCF mode shall be mutually
> +exclusive
> +===============================================================
> ========
> +==
> +
> +TC22: When L2 forwarding set, PF should reject the DCF mode
> +-----------------------------------------------------------
> +
> +When L2 forwarding set, PF should reject the DCF mode.
> +Remove L2 forwarding set, PF shall accept the DCF mode.
> +
> +Similar to ADQ test TC19
> +
> +Just change the ADQ commands to MAC-VLAN ::
> +
> +    ethtool -K enp24s0f0 l2-fwd-offload on
> +    ip link add link macvlan0 link enp24s0f0 type macvlan
> +    ifconfig macvlan0 192.168.1.111
> +    ipconfig macvlan0 up
> +
> +Remove MAC-VLAN commands ::
> +
> +  ip link del macvlan0
> +  ethtool -K enp24s0f0 l2-fwd-offload off
> +
> +
> +TC23: When DCF mode enabled, PF can't set L2 forwarding
> +-------------------------------------------------------
> +
> +When DCF mode enabled, PF can't set L2 forwarding.
> +Exit DCF mode, PF can set L2 forwarding.
> +
> +Similar to ADQ test TC20
> +
> +Just change the ADQ commands to MAC-VLAN ::
> +
> +    ethtool -K enp24s0f0 l2-fwd-offload on
> +    ip link add link macvlan0 link enp24s0f0 type macvlan
> +    ifconfig macvlan0 192.168.1.111
> +    ipconfig macvlan0 up
> +
> +Remove MAC-VLAN commands ::
> +
> +  ip link del macvlan0
> +  ethtool -K enp24s0f0 l2-fwd-offload off
> +
> +
> +TC24: DCF and L2 forwarding can be enabled on different PF
> +----------------------------------------------------------
> +
> +Configure the DCF on 1 PF port and configure MAC-VLAN on the other PF
> port.
> +Then turn off DCF, other PF's MAC-VLAN filter should not be impact.
> +
> +Similar to ADQ test TC21
> +
> +Just change the ADQ commands to MAC-VLAN ::
> +
> +    ethtool -K enp24s0f0 l2-fwd-offload on
> +    ip link add link macvlan0 link enp24s0f0 type macvlan
> +    ifconfig macvlan0 192.168.1.111
> +    ipconfig macvlan0 up
> +
> +Remove MAC-VLAN commands ::
> +
> +  ip link del macvlan0
> +  ethtool -K enp24s0f0 l2-fwd-offload off
> --
> 2.22.0


^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2020-06-01  3:24 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-05-29  2:18 [dts] [PATCH v1] Add dcf_lifecycle test plan Chen, Zhaoyan
2020-06-01  3:24 ` Tu, Lijuan

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).