From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id ECC75A0A02; Mon, 17 May 2021 10:19:06 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id E3A0140F35; Mon, 17 May 2021 10:19:06 +0200 (CEST) Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by mails.dpdk.org (Postfix) with ESMTP id 885DD4003C for ; Mon, 17 May 2021 10:19:03 +0200 (CEST) IronPort-SDR: BOXgPgeyBp1BgQFBDX2Wkm35/GUOtv2YhXegm5lkot4p1X7wO/p8xkuwTxwu+nDL20mJr28uCV y03xPDGA/WEA== X-IronPort-AV: E=McAfee;i="6200,9189,9986"; a="187817237" X-IronPort-AV: E=Sophos;i="5.82,306,1613462400"; d="scan'208";a="187817237" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 May 2021 01:19:02 -0700 IronPort-SDR: OcQmTc/2Y9LYvhSHwrTv5K3Kr3DzbdhB4+uNlzcPyeuhB1S1tbdvlSzBodf4Byc0Lu6VsxaIEj P8Do3BJR73/w== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.82,306,1613462400"; d="scan'208";a="543628432" Received: from bdcdev11.iind.intel.com ([10.190.193.151]) by orsmga004.jf.intel.com with ESMTP; 17 May 2021 01:19:01 -0700 From: Churchill Khangar To: dts@dpdk.org Cc: venkata.suresh.kumar.p@intel.com, churchill.khangar@intel.com, yogesh.jangra@intel.com Date: Mon, 17 May 2021 04:14:38 -0400 Message-Id: <1621239278-48078-3-git-send-email-churchill.khangar@intel.com> X-Mailer: git-send-email 1.8.3.1 In-Reply-To: <1621239278-48078-1-git-send-email-churchill.khangar@intel.com> References: <1621239278-48078-1-git-send-email-churchill.khangar@intel.com> Subject: [dts] [PATCH 2/2] tests/pipeline: add new P4 scenario tests X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" This patch has the changes to add new tests for covering more P4 scenarios which involves processing of packets with IP, VLAN and multiple tables in the P4 pipeline. Signed-off-by: Churchill Khangar Tested-by: Venkata Suresh Kumar P --- tests/TestSuite_pipeline.py | 55 ++++++++++++++++++++++++++++++++++++++++++--- 1 file changed, 52 insertions(+), 3 deletions(-) diff --git a/tests/TestSuite_pipeline.py b/tests/TestSuite_pipeline.py index d1f4d50..72079fc 100644 --- a/tests/TestSuite_pipeline.py +++ b/tests/TestSuite_pipeline.py @@ -4464,11 +4464,11 @@ class TestPipeline(TestCase): self.send_and_sniff_pkts(0, 1, in_pcap, out_pcap, "udp") self.dut.send_expect("^C", "# ", 20) - def test_tencent_001(self): + def test_u100_001(self): - cli_file = '/tmp/pipeline/tencent_001/tencent_001.cli' + cli_file = '/tmp/pipeline/u100_001/u100_001.cli' self.run_dpdk_app(cli_file) - base_dir = 'pipeline/tencent_001/pcap_files/' + base_dir = 'pipeline/u100_001/pcap_files/' # TCP Packets in_pcap = ['in_1.txt'] @@ -4505,6 +4505,55 @@ class TestPipeline(TestCase): self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters) self.dut.send_expect("^C", "# ", 20) + def test_u100_002(self): + + cli_file = '/tmp/pipeline/u100_002/u100_002.cli' + self.run_dpdk_app(cli_file) + base_dir = 'pipeline/u100_002/pcap_files/' + + # TCP Packets + in_pcap = ['in_1.txt'] + in_pcap = [base_dir + s for s in in_pcap] + out_pcap = ['out_11.txt', 'out_12.txt', 'out_13.txt', 'out_14.txt'] + out_pcap = [base_dir + s for s in out_pcap] + filters = ["tcp", "vlan 16", "vlan 16", "tcp"] + tx_port = [0] + rx_port = [0, 1, 2, 3] + self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters) + + # UDP Packets + in_pcap = ['in_2.txt'] + in_pcap = [base_dir + s for s in in_pcap] + out_pcap = ['out_21.txt', 'out_22.txt', 'out_23.txt', 'out_24.txt'] + out_pcap = [base_dir + s for s in out_pcap] + filters = ["udp port 200", "vlan 16", "vlan 16", "udp port 200"] + self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters) + + # ICMP Packets + in_pcap = ['in_3.txt'] + in_pcap = [base_dir + s for s in in_pcap] + out_pcap = ['out_31.txt', 'out_32.txt', 'out_33.txt', 'out_34.txt'] + out_pcap = [base_dir + s for s in out_pcap] + filters = ["icmp", "vlan 16", "vlan 16", "icmp"] + self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters) + + # IGMP Packets + in_pcap = ['in_4.txt'] + in_pcap = [base_dir + s for s in in_pcap] + out_pcap = ['out_41.txt', 'out_42.txt', 'out_43.txt', 'out_44.txt'] + out_pcap = [base_dir + s for s in out_pcap] + filters = ["igmp", "vlan 16", "vlan 16", "igmp"] * 4 + self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters) + + # IPv6 Packets + in_pcap = ['in_5.txt'] + in_pcap = [base_dir + s for s in in_pcap] + out_pcap = ['out_51.txt', 'out_52.txt', 'out_53.txt', 'out_54.txt'] + out_pcap = [base_dir + s for s in out_pcap] + filters = ["tcp"] * 4 + self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters) + self.dut.send_expect("^C", "# ", 20) + def tear_down(self): """ Run after each test case. -- 1.8.3.1