From: "Tu, Lijuan" <lijuan.tu@intel.com>
To: "Zhao, MeijuanX" <meijuanx.zhao@intel.com>,
"dts@dpdk.org" <dts@dpdk.org>
Cc: "Lin, Xueqin" <xueqin.lin@intel.com>,
"Zhao, MeijuanX" <meijuanx.zhao@intel.com>
Subject: Re: [dts] [PATCH V1] tests/kernelpf_iavf: add new test suite kernelpf iavf
Date: Wed, 26 Jun 2019 08:50:56 +0000 [thread overview]
Message-ID: <8CE3E05A3F976642AAB0F4675D0AD20E0BAC5415@SHSMSX101.ccr.corp.intel.com> (raw)
In-Reply-To: <20190625170645.88676-1-meijuanx.zhao@intel.com>
Applied, thanks
> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of zhaomeijuan
> Sent: Wednesday, June 26, 2019 1:07 AM
> To: dts@dpdk.org
> Cc: Lin, Xueqin <xueqin.lin@intel.com>; Zhao, MeijuanX
> <meijuanx.zhao@intel.com>
> Subject: [dts] [PATCH V1] tests/kernelpf_iavf: add new test suite kernelpf iavf
>
> Signed-off-by: zhaomeijuan <meijuanx.zhao@intel.com>
> ---
> tests/TestSuite_kernelpf_iavf.py | 873 +++++++++++++++++++++++++++++++
> 1 file changed, 873 insertions(+)
> create mode 100644 tests/TestSuite_kernelpf_iavf.py
>
> diff --git a/tests/TestSuite_kernelpf_iavf.py
> b/tests/TestSuite_kernelpf_iavf.py
> new file mode 100644
> index 0000000..2dcd717
> --- /dev/null
> +++ b/tests/TestSuite_kernelpf_iavf.py
> @@ -0,0 +1,873 @@
> +# BSD LICENSE
> +#
> +# Copyright(c) <2019> Intel Corporation. All rights reserved.
> +# All rights reserved.
> +#
> +# Redistribution and use in source and binary forms, with or without #
> +modification, are permitted provided that the following conditions #
> +are met:
> +#
> +# * Redistributions of source code must retain the above copyright
> +# notice, this list of conditions and the following disclaimer.
> +# * Redistributions in binary form must reproduce the above copyright
> +# notice, this list of conditions and the following disclaimer in
> +# the documentation and/or other materials provided with the
> +# distribution.
> +# * Neither the name of Intel Corporation nor the names of its
> +# contributors may be used to endorse or promote products derived
> +# from this software without specific prior written permission.
> +#
> +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS #
> +"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT #
> +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
> FOR #
> +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
> COPYRIGHT #
> +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
> INCIDENTAL, #
> +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> #
> +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
> USE, #
> +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
> ON ANY #
> +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT #
> +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
> USE #
> +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +
> +"""
> +DPDK Test suite.
> +
> +Test some vf function in ice driver
> +
> +"""
> +
> +import re
> +import time
> +import random
> +import utils
> +from virt_common import VM
> +from test_case import TestCase
> +from pmd_output import PmdOutput
> +from settings import HEADER_SIZE
> +from packet import Packet
> +from utils import RED
> +
> +VM_CORES_MASK = 'all'
> +MAX_VLAN = 4095
> +ETHER_STANDARD_MTU = 1518
> +ETHER_JUMBO_FRAME_MTU = 9000
> +
> +
> +class TestKernelpfIavf(TestCase):
> +
> + supported_vf_driver = ['pci-stub', 'vfio-pci']
> +
> + def set_up_all(self):
> + self.dut_ports = self.dut.get_ports(self.nic)
> + self.verify(len(self.dut_ports) >= 2, "Insufficient ports")
> + self.vm0 = None
> + self.env_done = False
> + self.interrupt_flag = False
> + self.vf_mac = '00:01:23:45:67:89'
> + self.add_addr = '00:11:22:33:44:55'
> + self.wrong_mac = '00:11:22:33:44:99'
> +
> + self.port = self.dut_ports[0]
> + self.vm_port = 0
> + cores = self.dut.get_core_list("1S/1C/1T")
> + self.port_mask = utils.create_mask([self.port])
> +
> + # set vf assign method and vf driver
> + self.dut.send_expect('modprobe vfio-pci', '#')
> + self.vf_driver = self.get_suite_cfg()['vf_driver']
> + if self.vf_driver is None:
> + self.vf_driver = 'pci-stub'
> + self.verify(self.vf_driver in self.supported_vf_driver, "Unspported vf
> driver")
> + if self.vf_driver == 'pci-stub':
> + self.vf_assign_method = 'pci-assign'
> + else:
> + self.vf_assign_method = 'vfio-pci'
> + self.dut.send_expect('modprobe vfio-pci', '#')
> + self.used_dut_port = self.dut_ports[0]
> + self.host_intf = self.dut.ports_info[self.used_dut_port]['intf']
> + tester_port = self.tester.get_local_port(self.used_dut_port)
> + self.tester_intf = self.tester.get_interface(tester_port)
> + self.tester_mac = self.tester.get_mac(tester_port)
> +
> + tester_port1 = self.tester.get_local_port(self.dut_ports[1])
> + self.tester_intf1 = self.tester.get_interface(tester_port1)
> +
> + def set_up(self):
> +
> + if self.running_case == "test_vf_mac_filter":
> + self.destroy_vm_env()
> + if self.env_done is False:
> + self.setup_vm_env(driver='', set_vf_mac=False)
> + elif self.running_case == "test_vf_rx_interrupt":
> + self.destroy_vm_env()
> + elif self.env_done is False:
> + self.setup_vm_env()
> +
> + def bind_nic_driver(self, ports, driver=""):
> + # modprobe vfio driver
> + if driver == "vfio-pci":
> + for port in ports:
> + netdev = self.dut.ports_info[port]['port']
> + driver = netdev.get_nic_driver()
> + if driver != 'vfio-pci':
> + netdev.bind_driver(driver='vfio-pci')
> +
> + elif driver == "igb_uio":
> + # igb_uio should insmod as default, no need to check
> + for port in ports:
> + netdev = self.dut.ports_info[port]['port']
> + driver = netdev.get_nic_driver()
> + if driver != 'igb_uio':
> + netdev.bind_driver(driver='igb_uio')
> + else:
> + for port in ports:
> + netdev = self.dut.ports_info[port]['port']
> + driver_now = netdev.get_nic_driver()
> + if driver is None:
> + driver = netdev.default_driver
> + if driver != driver_now:
> + netdev.bind_driver(driver=driver)
> +
> + def setup_vm_env(self, driver='default', set_vf_mac=True):
> + """
> + Create testing environment with 1VF generated from 1PF
> + """
> + if self.env_done:
> + return
> +
> + # bind to default driver
> + self.bind_nic_driver(self.dut_ports, driver="")
> + self.used_dut_port = self.dut_ports[0]
> + self.dut.generate_sriov_vfs_by_port(
> + self.used_dut_port, 1, driver=driver)
> + self.sriov_vfs_port = self.dut.ports_info[
> + self.used_dut_port]['vfs_port']
> + out = self.dut.send_expect('ethtool %s' % self.host_intf, '#')
> + self.speed = re.findall('Supported link modes: (\d*)', out)[0]
> + if set_vf_mac is True:
> + self.vf_mac = "00:01:23:45:67:89"
> + self.dut.send_expect("ip link set %s vf 0 mac %s" %
> + (self.host_intf, self.vf_mac), "# ")
> +
> + try:
> +
> + for port in self.sriov_vfs_port:
> + port.bind_driver(self.vf_driver)
> +
> + time.sleep(1)
> + vf_popt = {'opt_host': self.sriov_vfs_port[0].pci}
> +
> + # set up VM ENV
> + self.vm = VM(self.dut, 'vm0', 'kernelpf_iavf')
> + self.vm.set_vm_device(driver=self.vf_assign_method, **vf_popt)
> + self.vm_dut = self.vm.start()
> + if self.vm_dut is None:
> + raise Exception("Set up VM ENV failed!")
> +
> + self.vm_testpmd = PmdOutput(self.vm_dut)
> + except Exception as e:
> + self.destroy_vm_env()
> + raise Exception(e)
> +
> + self.env_done = True
> +
> + def destroy_vm_env(self):
> + if getattr(self, 'vm', None):
> + if getattr(self, 'vm_dut', None):
> + self.vm_dut.kill_all()
> + self.vm_testpmd = None
> + self.vm_dut_ports = None
> + # destroy vm0
> + self.vm.stop()
> + self.dut.virt_exit()
> + time.sleep(3)
> + self.vm = None
> +
> + if getattr(self, 'used_dut_port', None) is not None:
> + self.dut.destroy_sriov_vfs_by_port(self.used_dut_port)
> + self.used_dut_port = None
> +
> + self.bind_nic_driver(self.dut_ports, driver='default')
> +
> + self.env_done = False
> +
> + def jumboframes_get_stat(self, portid, rx_tx):
> + """
> + Get packets number from port statistic
> + """
> + stats = self.vm_testpmd.get_pmd_stats(portid)
> + if rx_tx == "rx":
> + return [stats['RX-packets'], stats['RX-errors'], stats['RX-bytes']]
> + elif rx_tx == "tx":
> + return [stats['TX-packets'], stats['TX-errors'], stats['TX-bytes']]
> + else:
> + return None
> +
> + def send_random_pkt(self, dts, count=1):
> + tgen_ports = []
> + tx_port = self.tester.get_local_port(self.dut_ports[0])
> + rx_port = self.tester.get_local_port(self.dut_ports[1])
> + tgen_ports.append((tx_port, rx_port))
> + src_mac = self.tester.get_mac(tx_port)
> + dst_mac = dts
> + pkt_param = [("ether", {'dst': dst_mac, 'src': src_mac})]
> + result = self.tester.check_random_pkts(tgen_ports, pktnum=count,
> allow_miss=False, params=pkt_param)
> + return result
> +
> + def test_vf_basic_rxtx(self):
> + '''
> + Set rxonly forward,Send 100 random packets from tester, check
> packets can be received
> + '''
> + self.vm_testpmd.start_testpmd("all")
> + self.vm_testpmd.execute_cmd("set fwd rxonly")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.vm_testpmd.execute_cmd("start")
> + self.send_random_pkt(self.vf_mac, count=100)
> + time.sleep(1)
> + out = self.vm_dut.get_session_output()
> + self.verify(self.vf_mac in out, "vf receive packet fail")
> + stats = self.vm_testpmd.get_pmd_stats(0)
> + self.verify(stats['RX-packets'] == 100, 'vf receive packet num is not
> match')
> + '''
> + Set txonly forward,check packets can be received by tester
> + '''
> + self.vm_testpmd.execute_cmd("stop")
> + self.vm_testpmd.execute_cmd("set fwd txonly")
> + self.tester.send_expect('rm -f tcpdump.pcap', '#')
> + self.tester.send_expect("tcpdump -i %s 2>tcpdump.out &" %
> self.tester_intf, "#")
> + self.vm_testpmd.execute_cmd("start")
> + time.sleep(1)
> + self.vm_testpmd.execute_cmd("stop")
> + self.tester.send_expect('killall tcpdump', '#')
> + time.sleep(1)
> + cap_packet = self.tester.send_expect('cat tcpdump.out', '#', 30)
> + stats = self.vm_testpmd.get_pmd_stats(0)
> + cap_tcp_num = re.findall('(\d+) packets', cap_packet)
> + self.verify(stats['TX-packets'] <= int(cap_tcp_num[1]), 'vf
> + send packet num is not match')
> +
> + def test_vf_mac_filter(self):
> + """
> + Not set VF MAC from kernel PF for this case, if set, will print
> + "not permitted error" when add new MAC for VF.
> + """
> + out = self.vm_testpmd.start_testpmd("all")
> + self.testpmd_mac = self.get_testpmd_vf_mac(out)
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("set promisc all off")
> + self.vm_testpmd.execute_cmd("mac_addr add 0 %s" % self.add_addr)
> + self.vm_testpmd.execute_cmd("start")
> + # send packet with current mac
> + self.send_random_pkt(self.testpmd_mac, count=100)
> + self.verify_packet_count(100)
> + self.vm_testpmd.execute_cmd('clear port stats all')
> + # send packet with add mac
> + self.send_random_pkt(self.add_addr, count=100)
> + self.verify_packet_count(100)
> + self.vm_testpmd.execute_cmd('clear port stats all')
> + # send packet with wrong mac
> + self.send_random_pkt(self.wrong_mac, count=100)
> + self.verify_packet_count(0)
> +
> + def get_testpmd_vf_mac(self, out):
> + result = re.search("([a-f0-9]{2}:){5}[a-f0-9]{2}", out, re.IGNORECASE)
> + mac = result.group()
> + return mac
> +
> + def verify_packet_count(self, count):
> +
> + pmd0_vf0_stats = self.vm_testpmd.get_pmd_stats(0)
> + vf0_rx_cnt = pmd0_vf0_stats['RX-packets']
> + vf0_tx_cnt = pmd0_vf0_stats['TX-packets']
> + self.verify(vf0_rx_cnt == vf0_tx_cnt == count, "vf receive
> + packet count not match!")
> +
> + def test_vf_promisc_mode(self):
> + """
> + Enable kernel trust mode
> + """
> + self.dut.send_expect("ip link set dev %s vf 0 trust on" % self.host_intf,
> "# ")
> + self.vm_testpmd.start_testpmd("all")
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.vm_testpmd.execute_cmd("start")
> + # send packet with current mac, vf can receive and forward packet
> + self.send_random_pkt(self.vf_mac, count=1)
> + out = self.vm_dut.get_session_output()
> + self.verify(self.vf_mac in out, 'vf receive pkt fail with current mac')
> + # send packet with wrong mac, vf can receive and forward packet
> + self.send_random_pkt(self.wrong_mac, count=1)
> + out = self.vm_dut.get_session_output()
> + self.verify(self.wrong_mac in out, 'vf receive pkt fail with
> + wrong mac')
> +
> + self.vm_testpmd.execute_cmd("set promisc all off")
> + # send packet with current mac, vf can receive and forward packet
> + self.send_random_pkt(self.vf_mac, count=1)
> + out = self.vm_dut.get_session_output()
> + self.verify(self.vf_mac in out, 'vf receive pkt fail with current mac')
> + # send packet with wrong mac, vf can not receive and forward packet
> + self.send_random_pkt(self.wrong_mac, count=1)
> + out = self.vm_dut.get_session_output()
> + self.verify(self.wrong_mac not in out, 'vf receive pkt with
> + wrong mac')
> +
> + self.vm_testpmd.execute_cmd("set promisc all on")
> + # send packet with current mac, vf can receive and forward packet
> + self.send_random_pkt(self.vf_mac, count=1)
> + out = self.vm_dut.get_session_output()
> + self.verify(self.vf_mac in out, 'vf receive pkt fail with current mac')
> + # send packet with wrong mac, vf can receive and forward packet
> + self.send_random_pkt(self.wrong_mac, count=1)
> + out = self.vm_dut.get_session_output()
> + self.verify(self.wrong_mac in out, 'vf receive pkt fail with
> + wrong mac')
> +
> + self.dut.send_expect("ip link set dev %s vf 0 trust off" %
> + self.host_intf, "# ")
> +
> + def test_vf_multicast(self):
> + """
> + enable kernel trust mode
> + """
> + multicast_mac = '01:80:C2:00:00:08'
> + self.dut.send_expect("ip link set dev %s vf 0 trust on" % self.host_intf,
> "# ")
> + self.vm_testpmd.start_testpmd("all")
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("set promisc all off")
> + self.vm_testpmd.execute_cmd("set allmulti all off")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.vm_testpmd.execute_cmd("start")
> + self.send_random_pkt(self.vf_mac, count=1)
> + out = self.vm_dut.get_session_output()
> + self.verify(self.vf_mac in out, 'vf receive pkt fail with current mac')
> + self.send_random_pkt(multicast_mac, count=1)
> + out = self.vm_dut.get_session_output()
> + self.verify(multicast_mac not in out, 'vf receive pkt with
> + multicast mac')
> +
> + self.vm_testpmd.execute_cmd("set allmulti all on")
> + self.send_random_pkt(self.vf_mac, count=1)
> + out = self.vm_dut.get_session_output()
> + self.verify(self.vf_mac in out, 'vf receive pkt fail with current mac')
> + self.send_random_pkt(multicast_mac, count=1)
> + out = self.vm_dut.get_session_output()
> + self.verify(multicast_mac in out, 'vf receive pkt fail with multicast mac')
> + self.dut.send_expect("ip link set dev %s vf 0 trust off" %
> + self.host_intf, "# ")
> +
> + def test_vf_broadcast(self):
> + """
> + """
> + broadcast_mac = 'ff:ff:ff:ff:ff:ff'
> + self.vm_testpmd.start_testpmd("all")
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("set promisc all off")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.vm_testpmd.execute_cmd("start")
> + self.send_random_pkt(broadcast_mac, count=1)
> + time.sleep(1)
> + out = self.vm_dut.get_session_output()
> + print out
> + self.verify(broadcast_mac.upper() in out and
> + self.tester_mac.upper() in out, 'vf receive pkt fail with broadcast
> + mac')
> +
> + def test_vf_add_pvid(self):
> + '''
> + vf can receive packet with right vlan id, can't receive wrong vlan id
> packet
> + '''
> + random_vlan = random.randint(1, MAX_VLAN)
> + self.dut.send_expect("ip link set %s vf 0 vlan %s" % (self.host_intf,
> random_vlan), "# ")
> + out = self.dut.send_expect("ip link show %s" % self.host_intf, "# ")
> + self.verify("vlan %d" % random_vlan in out, "Failed to add pvid
> + on VF0")
> +
> + self.vm_testpmd.start_testpmd("all")
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.vm_testpmd.execute_cmd("start")
> + out = self.send_and_getout(vlan=random_vlan, pkt_type="VLAN_UDP")
> + self.verify("VLAN tci=%s" % hex(random_vlan) in out and self.vf_mac in
> out, "Failed to received vlan packet!!!")
> + wrong_vlan = (random_vlan + 1) % 4096
> + out = self.send_and_getout(vlan=wrong_vlan, pkt_type="VLAN_UDP")
> + self.verify("VLAN tci=%s" % hex(wrong_vlan) not in out and
> + self.vf_mac not in out, "received wrong vlan packet!!!")
> +
> + # remove vlan
> + self.dut.send_expect("ip link set %s vf 0 vlan 0" % self.host_intf, "# ")
> + out = self.dut.send_expect("ip link show %s" % self.host_intf, "# ")
> + self.verify("vlan %d" % random_vlan not in out, "Failed to remove pvid
> on VF0")
> + # send packet without vlan
> + out = self.send_and_getout(vlan=0, pkt_type="UDP")
> + self.verify(self.vf_mac in out and "VLAN tci=0x0" in out, "Not
> + received packet without vlan!!!")
> +
> + # send packet with vlan 0
> + out = self.send_and_getout(vlan=0, pkt_type="VLAN_UDP")
> + self.verify(
> + self.vf_mac in out and "VLAN tci=0x0" in out, "Not recevied
> + packet with vlan 0!!!")
> +
> + # send random vlan packet
> + out = self.send_and_getout(vlan=random_vlan, pkt_type="VLAN_UDP")
> + self.verify(self.vf_mac not in out and "VLAN tci=%s" %
> + hex(random_vlan) not in out, "Failed to received vlan packet!!!")
> +
> + def send_and_getout(self, vlan=0, pkt_type="UDP"):
> +
> + if pkt_type == "UDP":
> + pkt = Packet(pkt_type='UDP')
> + pkt.config_layer('ether', {'dst': self.vf_mac})
> + elif pkt_type == "VLAN_UDP":
> + pkt = Packet(pkt_type='VLAN_UDP')
> + pkt.config_layer('vlan', {'vlan': vlan})
> + pkt.config_layer('ether', {'dst': self.vf_mac})
> +
> + pkt.send_pkt(tx_port=self.tester_intf)
> + out = self.vm_dut.get_session_output(timeout=2)
> +
> + return out
> +
> + def test_vf_vlan_rx(self):
> + self.vm_testpmd.start_testpmd("all")
> + self.vm_testpmd.execute_cmd("set fwd rxonly")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.vm_testpmd.execute_cmd("vlan set filter on 0")
> + self.vm_testpmd.execute_cmd("vlan set strip on 0")
> + self.vm_testpmd.execute_cmd("start")
> + # send packet without vlan, vf can receive packet
> + out = self.send_and_getout(pkt_type="UDP")
> + self.verify(self.vf_mac in out, "Failed to received without
> + vlan packet!!!")
> +
> + # send packet vlan 0, vf can receive packet
> + out = self.send_and_getout(vlan=0, pkt_type="VLAN_UDP")
> + self.verify(self.vf_mac in out, "Failed to received vlan 0
> + packet!!!")
> +
> + self.vm_testpmd.execute_cmd("rx_vlan add 1 0")
> +
> + # send packet vlan 1, vf can receive packet
> + out = self.send_and_getout(vlan=1, pkt_type="VLAN_UDP")
> + self.verify("VLAN tci=%s" % hex(1) in out and self.vf_mac in
> + out, "Failed to received vlan 1 packet!!!")
> +
> + # send random vlan packet, vf can not receive packet
> + random_vlan = random.randint(1, MAX_VLAN)
> + out = self.send_and_getout(vlan=random_vlan, pkt_type="VLAN_UDP")
> + self.verify("VLAN tci=%s" % hex(random_vlan) not in out and
> + self.vf_mac not in out, "received random vlan packet!!!")
> +
> + # send max vlan 4095, vf can not receive packet
> + out = self.send_and_getout(vlan=MAX_VLAN, pkt_type="VLAN_UDP")
> + self.verify("VLAN tci=%s" % hex(MAX_VLAN) not in out and
> + self.vf_mac not in out, "received max vlan packet!!!")
> +
> + # remove vlan
> + self.vm_testpmd.execute_cmd("rx_vlan rm 1 0")
> +
> + # send packet without vlan, vf can receive packet
> + out = self.send_and_getout(pkt_type="UDP")
> + self.verify(self.vf_mac in out, "Failed to received without
> + vlan packet!!!")
> +
> + # send packet vlan 0, vf can receive packet
> + out = self.send_and_getout(vlan=0, pkt_type="VLAN_UDP")
> + self.verify(self.vf_mac in out, "Failed to received vlan 0
> + packet!!!")
> +
> + # send vlan 1 packet, vf can not receive packet
> + out = self.send_and_getout(vlan=1, pkt_type="VLAN_UDP")
> + self.verify(self.vf_mac not in out, "received vlan 1
> + packet!!!")
> +
> + def test_vf_vlan_insertion(self):
> + self.vm_testpmd.start_testpmd("all")
> + random_vlan = random.randint(1, MAX_VLAN)
> + self.vm_testpmd.execute_cmd("vlan set strip off 0")
> + self.vm_testpmd.execute_cmd("port stop all")
> + self.vm_testpmd.execute_cmd("tx_vlan set 0 %s" % random_vlan)
> + self.vm_testpmd.execute_cmd("port start all")
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.vm_testpmd.execute_cmd("start")
> +
> + out = self.send_and_getout(pkt_type="UDP")
> + print out
> + time.sleep(1)
> + vlan_hex = hex(random_vlan)
> + self.verify("VLAN tci=%s" % vlan_hex in out, 'add vlan tag fail
> + !!')
> +
> + def test_vf_vlan_strip(self):
> + random_vlan = random.randint(1, MAX_VLAN)
> + self.vm_testpmd.start_testpmd("all")
> + self.vm_testpmd.execute_cmd("vlan set strip on 0")
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.vm_testpmd.execute_cmd("start")
> + out = self.send_and_getout(vlan=random_vlan, pkt_type="VLAN_UDP")
> + self.verify('VLAN tci=' not in out and self.vf_mac not in out,
> + 'vlan tag in out')
> +
> + # disable strip
> + self.vm_testpmd.execute_cmd("vlan set strip off 0")
> + out = self.send_and_getout(vlan=random_vlan, pkt_type="VLAN_UDP")
> + vlan_hex = hex(random_vlan)
> + self.verify("VLAN tci=%s" % vlan_hex in out, 'vlan tag not in
> + out')
> +
> + def test_vf_without_jumboframe(self):
> + self.tester.send_expect('ifconfig %s mtu %s' %
> + (self.tester_intf, ETHER_JUMBO_FRAME_MTU), '#')
> +
> + self.vm_testpmd.start_testpmd("all")
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("set promisc all off")
> + self.vm_testpmd.execute_cmd("start")
> + self.jumboframes_send_packet(ETHER_STANDARD_MTU - 1, True)
> + self.jumboframes_send_packet(ETHER_STANDARD_MTU + 1, False)
> + self.tester.send_expect("ifconfig %s mtu %s" %
> + (self.tester_intf, ETHER_STANDARD_MTU))
> +
> + def test_vf_with_jumboframe(self):
> + self.tester.send_expect('ifconfig %s mtu %d' % (self.tester_intf,
> ETHER_JUMBO_FRAME_MTU), '#')
> + conf_pkt_len = 3000
> + self.vm_testpmd.start_testpmd("all", "--max-pkt-len=%d" %
> conf_pkt_len)
> + self.jumboframes_send_packet(conf_pkt_len - 1, True)
> + self.jumboframes_send_packet(conf_pkt_len + 1, False)
> + self.tester.send_expect("ifconfig %s mtu %d" %
> + (self.tester_intf, ETHER_STANDARD_MTU))
> +
> + def jumboframes_send_packet(self, pktsize, received=True):
> + """
> + Send 1 packet to portid
> + """
> + tx_pkts_ori, _, tx_bytes_ori = [int(_) for _ in
> self.jumboframes_get_stat(self.vm_port, "tx")]
> + rx_pkts_ori, rx_err_ori, rx_bytes_ori = [int(_) for _ in
> + self.jumboframes_get_stat(self.vm_port, "rx")]
> +
> + pkt = Packet(pkt_type='UDP', pkt_len=pktsize)
> + pkt.config_layer('ether', {'dst': self.vf_mac, 'src': self.tester_mac})
> + self.vm_testpmd.execute_cmd("clear port stats all")
> + pkt.send_pkt(tx_port=self.tester_intf)
> +
> + time.sleep(1)
> +
> + tx_pkts, _, tx_bytes = [int(_) for _ in
> self.jumboframes_get_stat(self.port, "tx")]
> + rx_pkts, rx_err, rx_bytes = [int(_) for _ in
> + self.jumboframes_get_stat(self.vm_port, "rx")]
> +
> + tx_pkts -= tx_pkts_ori
> + tx_bytes -= tx_bytes_ori
> + rx_pkts -= rx_pkts_ori
> + rx_bytes -= rx_bytes_ori
> + rx_err -= rx_err_ori
> + if received:
> + self.verify((rx_pkts == 1) and (tx_pkts == 1), "Packet
> + forward assert error")
> +
> + self.verify(rx_bytes == pktsize, "Rx packet size should be
> + packet size")
> +
> + self.verify(tx_bytes == pktsize, "Tx packet size should be packet size")
> + else:
> + self.verify(rx_err == 1 or tx_pkts == 0, "Packet drop
> + assert error")
> +
> + def test_vf_rss(self):
> + self.vm_testpmd.start_testpmd("all", "--txq=4 --rxq=4")
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + for i, j in zip(range(64), [0, 1, 2, 3]*16):
> + self.vm_testpmd.execute_cmd("port config 0 rss reta (%d,%d)" % (i,
> j))
> + self.vm_testpmd.execute_cmd("port config all rss ip")
> + self.vm_testpmd.execute_cmd("port config all rss tcp")
> + self.vm_testpmd.execute_cmd("port config all rss udp")
> + self.vm_testpmd.execute_cmd("start")
> + self.send_packet(self.tester_intf, 'IPV4')
> + time.sleep(2)
> + out = self.vm_dut.get_session_output()
> + self.verify_packet_number(out)
> +
> + self.vm_testpmd.execute_cmd("clear port stats all")
> + self.send_packet(self.tester_intf, 'IPV4&TCP')
> + time.sleep(2)
> + out = self.vm_dut.get_session_output()
> + self.verify_packet_number(out)
> +
> + self.vm_testpmd.execute_cmd("clear port stats all")
> + self.send_packet(self.tester_intf, 'IPV4&UDP')
> + time.sleep(2)
> + out = self.vm_dut.get_session_output()
> + self.verify_packet_number(out)
> +
> + def verify_packet_number(self, out):
> + queue0_number = len(re.findall('port 0/queue 0', out))
> + queue1_number = len(re.findall('port 0/queue 1', out))
> + queue2_number = len(re.findall('port 0/queue 2', out))
> + queue3_number = len(re.findall('port 0/queue 3', out))
> + queue_numbers = [queue0_number, queue1_number,
> queue2_number, queue3_number]
> + self.verify('queue 0' in out and 'queue 1' in out and 'queue 2' in out
> and 'queue 3' in out, "some queue can't receive packet when send ip packet")
> + self.verify(max(queue_numbers)-min(queue_numbers) <= 3, 'packet
> + number on each queue should be similar')
> +
> + def send_packet(self, itf, tran_type):
> + """
> + Sends packets.
> + """
> + mac = self.vf_mac
> + # send packet with different source and dest ip
> + if tran_type == "IPV4":
> + for i in range(30):
> + packet = r'sendp([Ether(dst="%s",
> src="02:00:00:00:00:00")/IP(src="192.168.0.%d", '\
> + 'dst="192.168.0.%d")], iface="%s")' % (mac, i + 1, i + 2,
> itf)
> + self.tester.scapy_append(packet)
> + self.tester.scapy_execute()
> + time.sleep(.5)
> + elif tran_type == "IPV4&TCP":
> + for i in range(30):
> + packet = r'sendp([Ether(dst="%s",
> src="02:00:00:00:00:00")/IP(src="192.168.0.%d", dst="192.168.0.%d")/'\
> + 'TCP(sport=1024,dport=1024)], iface="%s")' % (mac, i + 1,
> i + 2, itf)
> + self.tester.scapy_append(packet)
> + self.tester.scapy_execute()
> + time.sleep(.5)
> + elif tran_type == "IPV4&UDP":
> + for i in range(30):
> + packet = r'sendp([Ether(dst="%s",
> src="02:00:00:00:00:00")/IP(src="192.168.0.%d", dst="192.168.0.%d")/'\
> + 'UDP(sport=1024,dport=1024)], iface="%s")' % (mac, i +
> 1, i + 2, itf)
> + self.tester.scapy_append(packet)
> + self.tester.scapy_execute()
> + time.sleep(.5)
> + self.tester.scapy_execute()
> + time.sleep(1)
> +
> + def enable_hw_checksum(self):
> + self.vm_testpmd.execute_cmd("port stop all")
> + self.vm_testpmd.execute_cmd("csum set ip hw 0")
> + self.vm_testpmd.execute_cmd("csum set udp hw 0")
> + self.vm_testpmd.execute_cmd("csum set tcp hw 0")
> + self.vm_testpmd.execute_cmd("csum set sctp hw 0")
> + self.vm_testpmd.execute_cmd("set fwd csum")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> +
> + def enable_sw_checksum(self):
> + self.vm_testpmd.execute_cmd("port stop all")
> + self.vm_testpmd.execute_cmd("csum set ip sw 0")
> + self.vm_testpmd.execute_cmd("csum set udp sw 0")
> + self.vm_testpmd.execute_cmd("csum set tcp sw 0")
> + self.vm_testpmd.execute_cmd("csum set sctp sw 0")
> + self.vm_testpmd.execute_cmd("set fwd csum")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> +
> + def checksum_verify(self):
> + packets_sent = {'IP/': 'Ether(dst="%s",
> src="52:00:00:00:00:00")/IP(chksum=0x1234)/UDP()/("X"*46)' % self.vf_mac,
> + 'IP/UDP': 'Ether(dst="%s",
> src="52:00:00:00:00:00")/IP()/UDP(chksum=0x1234)/("X"*46)' % self.vf_mac,
> + 'IP/TCP': 'Ether(dst="%s",
> + src="52:00:00:00:00:00")/IP()/TCP(chksum=0x1234)/("X"*46)' %
> + self.vf_mac}
> +
> + # Send packet.
> + self.tester.scapy_foreground()
> +
> + for packet_type in packets_sent.keys():
> + self.tester.scapy_append('sendp([%s], iface="%s")' %
> (packets_sent[packet_type], self.tester_intf))
> + self.start_tcpdump(self.tester_intf)
> + self.tester.scapy_execute()
> + time.sleep(1)
> + tcpdump_out = self.get_tcpdump_package()
> + if packet_type == 'IP/UDP':
> + # verify udp checksum
> + self.verify('bad udp cksum' in tcpdump_out and 'udp sum ok' in
> tcpdump_out, 'udp checksum verify fail')
> + elif packet_type == 'IP/TCP':
> + # verify tcp checksum
> + self.verify("cksum 0x1234 (incorrect" in tcpdump_out and 'correct'
> in tcpdump_out, 'tcp checksum verify fail')
> + else:
> + # verify ip checksum
> + self.verify('bad cksum 1234' in tcpdump_out and 'udp sum ok' in
> tcpdump_out, 'ip checksum verify fail')
> + out = self.vm_testpmd.execute_cmd("stop")
> + bad_ipcsum = self.vm_testpmd.get_pmd_value("Bad-ipcsum:", out)
> + bad_l4csum = self.vm_testpmd.get_pmd_value("Bad-l4csum:", out)
> + self.verify(bad_ipcsum == 1, "Bad-ipcsum check error")
> + self.verify(bad_l4csum == 2, "Bad-ipcsum check error")
> +
> + def test_vf_hw_checksum_offload(self):
> + self.vm_testpmd.start_testpmd("all")
> + self.enable_hw_checksum()
> + self.vm_testpmd.execute_cmd("port start all")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.vm_testpmd.execute_cmd("start")
> + self.checksum_verify()
> +
> + def test_vf_sw_checksum_offload(self):
> + self.vm_testpmd.start_testpmd("all")
> + self.enable_sw_checksum()
> + self.vm_testpmd.execute_cmd("port start all")
> + self.vm_testpmd.execute_cmd("start")
> + self.checksum_verify()
> +
> + def test_vf_tso(self):
> + self.tester.send_expect("ethtool -K %s rx off tx off tso off gso off gro off
> lro off" % self.tester_intf, "#")
> + self.tester.send_expect("ifconfig %s mtu %d" % (self.tester_intf,
> ETHER_JUMBO_FRAME_MTU), "#")
> + self.vm_testpmd.start_testpmd("all", "--port-topology=chained --max-
> pkt-len=%d" % ETHER_JUMBO_FRAME_MTU)
> + self.vm_testpmd.execute_cmd("set fwd csum")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.enable_hw_checksum()
> + self.vm_testpmd.execute_cmd("tso set 1460 0")
> + self.vm_testpmd.execute_cmd("port start all")
> + self.vm_testpmd.execute_cmd("start")
> + self.tester.scapy_foreground()
> + time.sleep(5)
> + self.start_tcpdump(self.tester_intf)
> + pkt =
> 'sendp([Ether(dst="%s")/IP(chksum=0x1234)/TCP(flags=0x10,chksum=0x1234)
> /'\
> + 'Raw(RandString(5214))], iface="%s")' % (self.vf_mac,
> self.tester_intf)
> + self.tester.scapy_append(pkt)
> + self.tester.scapy_execute()
> + time.sleep(2)
> + out = self.get_tcpdump_package()
> + self.verify_packet_segmentation(out)
> + self.vm_testpmd.execute_cmd("stop")
> + self.vm_testpmd.execute_cmd("port stop all")
> + self.vm_testpmd.execute_cmd("tso set 0 0")
> + self.vm_testpmd.execute_cmd("port start all")
> + self.vm_testpmd.execute_cmd("start")
> +
> + self.start_tcpdump(self.tester_intf)
> + self.tester.scapy_append(pkt)
> + self.tester.scapy_execute()
> + time.sleep(2)
> + out = self.get_tcpdump_package()
> + self.verify_packet_segmentation(out, seg=False)
> +
> + def start_tcpdump(self, rxItf):
> + self.tester.send_expect("rm -rf getPackageByTcpdump.cap", "#")
> + self.tester.send_expect("tcpdump -A -nn -e -vv -w
> + getPackageByTcpdump.cap -i %s 2> /dev/null& " % rxItf, "#")
> +
> + def get_tcpdump_package(self):
> + self.tester.send_expect("killall tcpdump", "#")
> + return self.tester.send_expect("tcpdump -A -nn -e -vv -r
> + getPackageByTcpdump.cap", "#")
> +
> + def verify_packet_segmentation(self, out, seg=True):
> + if seg:
> + number1 = re.findall('length 1460: HTTP', out)
> + number2 = re.findall('length 834: HTTP', out)
> + self.verify(len(number1) == 3 and len(number2) == 1, 'packet has no
> segment')
> + else:
> + self.verify('length 1460: HTTP' not in out, 'packet has segment')
> + # tester send packet with incorrect checksum
> + # vf fwd packet with corrent checksum
> + self.verify('incorrect' in out and 'correct' in out, 'checksum has
> incorrect')
> + self.tester.send_expect("^C", "#")
> +
> + def test_vf_port_start_stop(self):
> + self.vm_testpmd.start_testpmd("all")
> + for i in range(10):
> + self.vm_testpmd.execute_cmd("port stop all")
> + self.vm_testpmd.execute_cmd("port start all")
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("start")
> + self.send_random_pkt(self.vf_mac, count=100)
> + port_id_0 = 0
> + vf0_stats = self.vm_testpmd.get_pmd_stats(port_id_0)
> + vf0_rx_cnt = vf0_stats['RX-packets']
> + self.verify(vf0_rx_cnt == 100, "no packet was received by
> + vm0_VF0")
> +
> + vf0_rx_err = vf0_stats['RX-errors']
> + self.verify(vf0_rx_err == 0, "vm0_VF0 rx-errors")
> +
> + vf0_tx_cnt = vf0_stats['TX-packets']
> + self.verify(vf0_tx_cnt == 100, "no packet was fwd by vm0_VF0")
> +
> + def test_vf_statistic_reset(self):
> + self.vm_testpmd.start_testpmd("all")
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.vm_testpmd.execute_cmd("start")
> + out = self.vm_testpmd.execute_cmd("show port stats all")
> + self.verify("RX-packets: 0" in out and "TX-packets: 0" in out, "receive
> some misc packet")
> + self.vm_testpmd.execute_cmd("clear port stats all")
> + self.send_random_pkt(self.vf_mac, count=100)
> + out = self.vm_testpmd.execute_cmd("show port stats all")
> + self.verify("RX-packets: 100" in out and "TX-packets: 100" in out,
> "receive packet fail")
> + self.vm_testpmd.execute_cmd("clear port stats all")
> + out = self.vm_testpmd.execute_cmd("show port stats all")
> + self.verify("RX-packets: 0" in out and "TX-packets: 0" in out,
> + "clear port stats fail")
> +
> + def test_vf_information(self):
> + self.vm_testpmd.start_testpmd("all")
> + out = self.vm_testpmd.execute_cmd("show port info 0")
> + self.verify('Link status: up' in out, 'link stats has error')
> + self.verify('Link speed: %s' % self.speed in out, 'link speed has error')
> + print out
> + self.vm_testpmd.execute_cmd("set fwd mac")
> + self.vm_testpmd.execute_cmd("set verbose 1")
> + self.vm_testpmd.execute_cmd("start")
> + self.send_random_pkt(self.vf_mac, count=100)
> + out = self.vm_testpmd.execute_cmd("show port stats all")
> + print out
> + self.verify("RX-packets: 100" in out and "TX-packets: 100" in
> + out, "receive packet fail")
> +
> + def test_vf_rx_interrupt(self):
> + # build l3-power
> + out = self.dut.build_dpdk_apps("./examples/l3fwd-power")
> + self.verify("Error" not in out, "Compilation error")
> + self.verify("No such" not in out, "Compilation error")
> + self.bind_nic_driver(self.dut_ports, driver="")
> + self.create_2vf_in_host()
> + # start l3fwd-power
> + l3fwd_app = "./examples/l3fwd-power/build/l3fwd-power"
> +
> + cmd = l3fwd_app + " -l 6,7 -n 4 -- -p 0x3 --config " + \
> + "'(0,0,6),(1,0,7)'"
> + self.dut.send_expect(cmd, "POWER", timeout=40)
> + out = self.dut.get_session_output()
> + print out
> + pattern = re.compile(r"(([a-f0-9]{2}:){5}[a-f0-9]{2})")
> + mac_list = pattern.findall(out.lower())
> + vf0_mac = mac_list[0][0]
> + vf1_mac = mac_list[1][0]
> + # send packet to vf0 and vf1
> + self.scapy_send_packet(vf0_mac, self.tester_intf)
> + self.scapy_send_packet(vf1_mac, self.tester_intf1)
> + out = self.dut.get_session_output()
> + self.verify('L3FWD_POWER: lcore 6 is waked up from rx interrupt' in out,
> 'lcore 6 is not waked up')
> + self.verify('L3FWD_POWER: lcore 7 is waked up from rx interrupt' in out,
> 'lcore 7 is not waked up')
> + self.verify('L3FWD_POWER: lcore 6 sleeps until interrupt triggers' in out,
> 'lcore 6 not sleep')
> + self.verify('L3FWD_POWER: lcore 7 sleeps until interrupt triggers' in out,
> 'lcore 7 not sleep')
> + self.scapy_send_packet(vf0_mac, self.tester_intf, count=16)
> + self.scapy_send_packet(vf1_mac, self.tester_intf1, count=16)
> + out = self.dut.get_session_output()
> + self.verify('L3FWD_POWER: lcore 6 is waked up from rx interrupt' in out,
> 'lcore 6 is not waked up')
> + self.verify('L3FWD_POWER: lcore 7 is waked up from rx interrupt' in out,
> 'lcore 7 is not waked up')
> + self.dut.send_expect("^C", "# ", 60)
> + self.interrupt_flag = True
> + time.sleep(1)
> + self.destroy_2vf_in_2pf()
> +
> + def scapy_send_packet(self, mac, testinterface, count=1):
> + """
> + Send a packet to port
> + """
> + if count == 1:
> + self.tester.scapy_append(
> + 'sendp([Ether(dst="%s")/IP()/UDP()/'\
> + 'Raw(\'X\'*18)], iface="%s")' % (mac, testinterface))
> + else:
> + for i in range(16):
> + self.tester.scapy_append(
> + 'sendp([Ether(dst="%s")/IP(dst="127.0.0.%d")/UDP()/'\
> + 'Raw(\'X\'*18)], iface="%s")' % (mac, i, testinterface))
> + self.tester.scapy_execute()
> +
> + def create_2vf_in_host(self, driver=''):
> + self.used_dut_port_0 = self.dut_ports[0]
> + self.dut.generate_sriov_vfs_by_port(self.used_dut_port_0, 1,
> driver=driver)
> + self.sriov_vfs_port_0 =
> + self.dut.ports_info[self.used_dut_port_0]['vfs_port']
> +
> + self.used_dut_port_1 = self.dut_ports[1]
> + self.dut.generate_sriov_vfs_by_port(self.used_dut_port_1, 1,
> driver=driver)
> + self.sriov_vfs_port_1 =
> self.dut.ports_info[self.used_dut_port_1]['vfs_port']
> + self.dut.send_expect('modprobe vfio', "#")
> + self.dut.send_expect('modprobe vfio-pci', "#")
> + for port in self.sriov_vfs_port_0:
> + port.bind_driver('vfio-pci')
> +
> + for port in self.sriov_vfs_port_1:
> + port.bind_driver('vfio-pci')
> +
> + def destroy_2vf_in_2pf(self):
> + if getattr(self, 'used_dut_port_0', None) is not None:
> + self.dut.destroy_sriov_vfs_by_port(self.used_dut_port_0)
> + self.used_dut_port_0 = None
> + if getattr(self, 'used_dut_port_1', None) is not None:
> + self.dut.destroy_sriov_vfs_by_port(self.used_dut_port_1)
> + self.used_dut_port_1 = None
> +
> + def tear_down(self):
> + """
> + Run after each test case.
> + """
> + if self.interrupt_flag is True:
> + self.interrupt_flag = False
> + else:
> + self.vm_testpmd.execute_cmd("quit", "#")
> + time.sleep(1)
> + if self.running_case == 'test_vf_mac_filter':
> + self.destroy_vm_env()
> + if self.running_case == 'test_vf_add_pvid':
> + self.dut.send_expect("ip link set %s vf 0 vlan 0" % self.host_intf, "# ")
> + self.dut.send_expect("ip link set dev %s vf 0 trust off" %
> + self.host_intf, "# ")
> +
> + def tear_down_all(self):
> + """
> + When the case of this test suite finished, the environment should
> + clear up.
> + """
> + if self.env_done:
> + self.destroy_vm_env()
> +
> --
> 2.17.1
prev parent reply other threads:[~2019-06-26 8:51 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2019-06-25 17:06 zhaomeijuan
2019-06-25 9:14 ` Lin, Xueqin
2019-06-26 8:50 ` Tu, Lijuan [this message]
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=8CE3E05A3F976642AAB0F4675D0AD20E0BAC5415@SHSMSX101.ccr.corp.intel.com \
--to=lijuan.tu@intel.com \
--cc=dts@dpdk.org \
--cc=meijuanx.zhao@intel.com \
--cc=xueqin.lin@intel.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).