From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id F3097A0546; Mon, 8 Mar 2021 09:56:09 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id E9E9122A370; Mon, 8 Mar 2021 09:56:09 +0100 (CET) Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mails.dpdk.org (Postfix) with ESMTP id 9BF1D40141 for ; Mon, 8 Mar 2021 09:56:08 +0100 (CET) IronPort-SDR: wH9YZC3WQCx6yux6Dvx9xysOzsbo0KBUble8ViSgUeP6vTHQrF7E5gSULfwrak/wmYQVhNWUkM Lyl0E9w6VZ0w== X-IronPort-AV: E=McAfee;i="6000,8403,9916"; a="167901720" X-IronPort-AV: E=Sophos;i="5.81,232,1610438400"; d="scan'208";a="167901720" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Mar 2021 00:56:07 -0800 IronPort-SDR: tROC3OMyDgmR5hmtteC1KM83sOruVAMeyy1x/i3keZzrz16Bmpdc50BTjiZw0uf+fCk0RSChUm nUd3uOqZp4pQ== X-IronPort-AV: E=Sophos;i="5.81,232,1610438400"; d="scan'208";a="409221724" Received: from unknown (HELO dpdk-huangzm-d.sh.intel.com) ([10.240.183.72]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Mar 2021 00:56:05 -0800 From: Hailin Xu To: dts@dpdk.org Cc: xueqin.lin@intel.com, Hailin Xu Date: Mon, 8 Mar 2021 16:44:18 +0800 Message-Id: <1615193059-72298-2-git-send-email-hailinx.xu@intel.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1615193059-72298-1-git-send-email-hailinx.xu@intel.com> References: <1615193059-72298-1-git-send-email-hailinx.xu@intel.com> Subject: [dts] [PATCH v2 1/2] test_plans/iavf_fdir: add without input set cases X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" add without input set IPv4/IPv6 tcp/udp fdir rule test cases. Signed-off-by: Hailin Xu --- test_plans/iavf_fdir_test_plan.rst | 261 +++++++++++++++++++++++++++++ 1 file changed, 261 insertions(+) diff --git a/test_plans/iavf_fdir_test_plan.rst b/test_plans/iavf_fdir_test_plan.rst index 6de28d2c..e96c5df0 100644 --- a/test_plans/iavf_fdir_test_plan.rst +++ b/test_plans/iavf_fdir_test_plan.rst @@ -4551,3 +4551,264 @@ subcase 3: PFCP FDIR vlan insert on 8. DUT check the packets are not distributed to expected queue without mark id without "PKT_RX_VLAN_STRIPPED", verify that the same number of packet are correctly received on the traffic generator side port A with VLAN tag "1". And UDP checksum need be validated as pass by the tester. + +Test case: without input set test +================================= +Support ipv4 and ipv6 tcp/udp flow director rule without input set. +The packets are for testing without input set cases. + +* MAC_IPV4_TCP + + matched packets:: + + sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + + mismatched packets:: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/SCTP()],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + +* MAC_IPV4_UDP + + matched packets:: + + sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + + mismatched packets:: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/SCTP()],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + +* MAC_IPV6_TCP + + matched packets:: + + sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + + mismatched packets:: + + sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IPv6()],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/SCTP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + +* MAC_IPV6_UDP + + matched packets:: + + sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + + mismatched packets:: + + sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IPv6()],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/SCTP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100) + +Test Case: MAC_IPV4_TCP_WITHOUT_INPUT_SET +----------------------------------------- + +Subcase 1: MAC_IPV4_TCP queue index +>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv4 / tcp / end actions queue index 1 / end + +2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to queue 1. + send the mismatched packets, check all packets are distributed to all queues. + +3. verify rules can be listed and destroyed:: + + testpmd> flow list 0 + + check the rule listed. + destroy the rule:: + + testpmd> flow destroy 0 rule 0 + +4. verify matched packets are distributed to all queues. + check there is no rule listed. + +Subcase 2: MAC_IPV4_TCP rss queue +>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss queues 0 1 2 3 end / end + +2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to queue 0-3. + send the mismatched packets, check all packets are distributed to all queues. + +3. repeat step 3 of subcase 1. + +4. verify matched packets are distributed to all queues. + check there is no rule listed. + +Subcase 3: MAC_IPV4_TCP passthru +>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv4 / tcp / end actions passthru / mark id 1 / end + +2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x1. + send the mismatched packets, check all packets are distributed to all queues without FDIR matched ID. + +3. repeat step 3 of subcase 1. + +4. verify matched packets are distributed to all queues without FDIR matched ID. + check there is no rule listed. + +Subcase 4: MAC_IPV4_TCP drop +>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv4 / tcp / end actions drop / end + +2. send ``MAC_IPV4_TCP`` matched packets, check all packets are dropped. + send the mismatched packets, check all packets are not dropped. + +3. repeat step 3 of subcase 1. + +4. verify matched packets are not dropped. + check there is no rule listed. + +Subcase 5: MAC_IPV4_TCP mark+rss +>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv4 / tcp / end actions mark id 2 / rss / end + +2. send ``MAC_IPV4_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x2. + send the mismatched packets, check all packets are distributed to all queues without FDIR matched ID. + +3. repeat step 3 of subcase 1. + +4. verify matched packets are distributed to all queues without FDIR matched ID. + check there is no rule listed. + +Subcase 6: MAC_IPV4_TCP mark +>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv4 / tcp / end actions mark id 1 / end + +2. repeat the step 2-3 of in subcase 3, + get the same result. + +Test Case: MAC_IPV4_UDP_WITHOUT_INPUT_SET +----------------------------------------- + +1. replace "tcp" with "udp" in all the subcases of MAC_IPV4_TCP_WITHOUT_INPUT_SET pattern. +2. Then repeat all the steps in all the subcases of MAC_IPV4_TCP_WITHOUT_INPUT_SET pattern. +3. get the same result. + +Test Case: MAC_IPV6_TCP_WITHOUT_INPUT_SET +----------------------------------------- + +Subcase 1: MAC_IPV6_TCP queue index +>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv6 / tcp / end actions queue index 1 / end + +2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to queue 1. + send the mismatched packets, check all packets are distributed to all queues. + +3. verify rules can be listed and destroyed:: + + testpmd> flow list 0 + + check the rule listed. + destroy the rule:: + + testpmd> flow destroy 0 rule 0 + +4. verify matched packets are distributed to all queues. + check there is no rule listed. + +Subcase 2: MAC_IPV6_TCP rss queue +>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv6 / tcp / end actions rss queues 0 1 2 3 end / end + +2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to queue 0-3. + send the mismatched packets, check all packets are distributed to all queues. + +3. repeat step 3 of subcase 1. + +4. verify matched packets are distributed to all queues. + check there is no rule listed. + +Subcase 3: MAC_IPV6_TCP passthru +>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv6 / tcp / end actions passthru / mark id 1 / end + +2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x1. + send mismatched packets, check all packets are distributed to all queues without FDIR matched ID. + +3. repeat step 3 of subcase 1. + +4. verify matched packets are distributed to all queues without FDIR matched ID. + check there is no rule listed. + +Subcase 4: MAC_IPV6_TCP drop +>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv6 / tcp / end actions drop / end + +2. send ``MAC_IPV6_TCP`` matched packets, check all packets are dropped. + send the mismatched packets, check all packets are not dropped. + +3. repeat step 3 of subcase 1. + +4. verify matched packets are not dropped. + check there is no rule listed. + +Subcase 5: MAC_IPV6_TCP mark+rss +>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv6 / tcp / end actions mark id 2 / rss / end + +2. send ``MAC_IPV6_TCP`` matched packets, check all packets are distributed to all queue with FDIR matched ID=0x2. + send the mismatched packets, check all packets are distributed to all queues without FDIR matched ID. + +3. repeat step 3 of subcase 1. + +4. verify matched packets are distributed to all queues without FDIR matched ID. + check there is no rule listed. + +Subcase 6: MAC_IPV6_TCP mark +>>>>>>>>>>>>>>>>>>>>>>>>>>>> + +1. create filter rules:: + + flow create 0 ingress pattern eth / ipv6 / udp / end actions mark id 1 / end + +2. repeat the step 2-3 of in subcase 3, + get the same result. + +Test Case: MAC_IPV6_UDP_WITHOUT_INPUT_SET +----------------------------------------- + +1. replace "tcp" with "udp" in all the subcases of MAC_IPV6_TCP_WITHOUT_INPUT_SET pattern. +2. Then repeat all the steps in all the subcases of MAC_IPV6_TCP_WITHOUT_INPUT_SET pattern. +3. get the same result. \ No newline at end of file -- 2.17.1