test suite reviews and discussions
 help / color / mirror / Atom feed
From: Hailin Xu <hailinx.xu@intel.com>
To: dts@dpdk.org
Cc: xueqin.lin@intel.com, Hailin Xu <hailinx.xu@intel.com>
Subject: [dts] [PATCH v2 1/2] test_plans/iavf_fdir: add without input set cases
Date: Mon,  8 Mar 2021 16:44:18 +0800	[thread overview]
Message-ID: <1615193059-72298-2-git-send-email-hailinx.xu@intel.com> (raw)
In-Reply-To: <1615193059-72298-1-git-send-email-hailinx.xu@intel.com>

add without input set IPv4/IPv6 tcp/udp fdir rule test cases.

Signed-off-by: Hailin Xu <hailinx.xu@intel.com>
---
 test_plans/iavf_fdir_test_plan.rst | 261 +++++++++++++++++++++++++++++
 1 file changed, 261 insertions(+)

diff --git a/test_plans/iavf_fdir_test_plan.rst b/test_plans/iavf_fdir_test_plan.rst
index 6de28d2c..e96c5df0 100644
--- a/test_plans/iavf_fdir_test_plan.rst
+++ b/test_plans/iavf_fdir_test_plan.rst
@@ -4551,3 +4551,264 @@ subcase 3: PFCP FDIR vlan insert on
 8. DUT check the packets are not distributed to expected queue without mark id without "PKT_RX_VLAN_STRIPPED",
    verify that the same number of packet are correctly received on the traffic generator side port A with VLAN tag "1".
    And UDP checksum need be validated as pass by the tester.
+
+Test case: without input set test
+=================================
+Support ipv4 and ipv6 tcp/udp flow director rule without input set.
+The packets are for testing without input set cases.
+
+* MAC_IPV4_TCP
+
+    matched packets::
+
+        sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+    mismatched packets::
+
+        sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/SCTP()],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+* MAC_IPV4_UDP
+
+    matched packets::
+
+        sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+    mismatched packets::
+
+        sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/SCTP()],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+* MAC_IPV6_TCP
+
+    matched packets::
+
+        sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+    mismatched packets::
+
+        sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IPv6()],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/SCTP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+* MAC_IPV6_UDP
+
+    matched packets::
+
+        sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+    mismatched packets::
+
+        sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IPv6()],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+        sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/SCTP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+Test Case: MAC_IPV4_TCP_WITHOUT_INPUT_SET
+-----------------------------------------
+
+Subcase 1: MAC_IPV4_TCP queue index
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv4 / tcp / end actions queue index 1 / end
+
+2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to queue 1.
+   send the mismatched packets, check all packets are distributed to all queues.
+
+3. verify rules can be listed and destroyed::
+
+    testpmd> flow list 0
+
+   check the rule listed.
+   destroy the rule::
+
+   testpmd> flow destroy 0 rule 0
+
+4. verify matched packets are distributed to all queues.
+   check there is no rule listed.
+
+Subcase 2: MAC_IPV4_TCP rss queue
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss queues 0 1 2 3 end / end
+
+2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to queue 0-3.
+   send the mismatched packets, check all packets are distributed to all queues.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues.
+   check there is no rule listed.
+
+Subcase 3: MAC_IPV4_TCP passthru
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv4 / tcp / end actions passthru / mark id 1 / end
+
+2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x1.
+   send the mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+   check there is no rule listed.
+
+Subcase 4: MAC_IPV4_TCP drop
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv4 / tcp / end actions drop / end
+
+2. send ``MAC_IPV4_TCP`` matched packets, check all packets are dropped.
+   send the mismatched packets, check all packets are not dropped.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are not dropped.
+   check there is no rule listed.
+
+Subcase 5: MAC_IPV4_TCP mark+rss
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv4 / tcp / end actions mark id 2 / rss / end
+
+2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x2.
+   send the mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+   check there is no rule listed.
+
+Subcase 6: MAC_IPV4_TCP mark
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv4 / tcp / end actions mark id 1 / end
+
+2. repeat the step 2-3 of in subcase 3,
+   get the same result.
+
+Test Case: MAC_IPV4_UDP_WITHOUT_INPUT_SET
+-----------------------------------------
+
+1. replace "tcp" with "udp" in all the subcases of MAC_IPV4_TCP_WITHOUT_INPUT_SET pattern.
+2. Then repeat all the steps in all the subcases of MAC_IPV4_TCP_WITHOUT_INPUT_SET pattern.
+3. get the same result.
+
+Test Case: MAC_IPV6_TCP_WITHOUT_INPUT_SET
+-----------------------------------------
+
+Subcase 1: MAC_IPV6_TCP queue index
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv6 / tcp / end actions queue index 1 / end
+
+2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to queue 1.
+   send the mismatched packets, check all packets are distributed to all queues.
+
+3. verify rules can be listed and destroyed::
+
+    testpmd> flow list 0
+
+   check the rule listed.
+   destroy the rule::
+
+   testpmd> flow destroy 0 rule 0
+
+4. verify matched packets are distributed to all queues.
+   check there is no rule listed.
+
+Subcase 2: MAC_IPV6_TCP rss queue
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv6 / tcp / end actions rss queues 0 1 2 3 end / end
+
+2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to queue 0-3.
+   send the mismatched packets, check all packets are distributed to all queues.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues.
+   check there is no rule listed.
+
+Subcase 3: MAC_IPV6_TCP passthru
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv6 / tcp / end actions passthru / mark id 1 / end
+
+2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x1.
+   send mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+   check there is no rule listed.
+
+Subcase 4: MAC_IPV6_TCP drop
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv6 / tcp / end actions drop / end
+
+2. send ``MAC_IPV6_TCP`` matched packets, check all packets are dropped.
+   send the mismatched packets, check all packets are not dropped.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are not dropped.
+   check there is no rule listed.
+
+Subcase 5: MAC_IPV6_TCP mark+rss
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv6 / tcp / end actions mark id 2 / rss / end
+
+2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x2.
+   send the mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+   check there is no rule listed.
+
+Subcase 6: MAC_IPV6_TCP mark
+>>>>>>>>>>>>>>>>>>>>>>>>>>>>
+
+1. create filter rules::
+
+    flow create 0 ingress pattern eth / ipv6 / udp / end actions mark id 1 / end
+
+2. repeat the step 2-3 of in subcase 3,
+   get the same result.
+
+Test Case: MAC_IPV6_UDP_WITHOUT_INPUT_SET
+-----------------------------------------
+
+1. replace "tcp" with "udp" in all the subcases of MAC_IPV6_TCP_WITHOUT_INPUT_SET pattern.
+2. Then repeat all the steps in all the subcases of MAC_IPV6_TCP_WITHOUT_INPUT_SET pattern.
+3. get the same result.
\ No newline at end of file
-- 
2.17.1


  reply	other threads:[~2021-03-08  8:56 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-03-08  8:44 [dts] [PATCH v2 0/2] add 4 test cases and testplan Hailin Xu
2021-03-08  8:44 ` Hailin Xu [this message]
2021-03-09  8:19   ` [dts] [PATCH v2 1/2] test_plans/iavf_fdir: add without input set cases Lin, Xueqin
2021-03-08  8:44 ` [dts] [PATCH v2 2/2] tests/iavf_fdir: " Hailin Xu
2021-03-08  9:12   ` Xu, HailinX
2021-03-09  8:20   ` Lin, Xueqin
2021-03-10  5:47 ` [dts] [PATCH v2 0/2] add 4 test cases and testplan Tu, Lijuan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1615193059-72298-2-git-send-email-hailinx.xu@intel.com \
    --to=hailinx.xu@intel.com \
    --cc=dts@dpdk.org \
    --cc=xueqin.lin@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).