From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 7B776A0547; Fri, 12 Mar 2021 09:46:13 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 6BE83160849; Fri, 12 Mar 2021 09:46:13 +0100 (CET) Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by mails.dpdk.org (Postfix) with ESMTP id B575B4067E for ; Fri, 12 Mar 2021 09:46:10 +0100 (CET) IronPort-SDR: uSFL7f5Ucr2UxBsC8GA/joxSPh1iDa8SHeNwkGNJ7YEs+ef+6A4gW53k/6ePwWTB1kXt0V/zSh aQc393gRFKsA== X-IronPort-AV: E=McAfee;i="6000,8403,9920"; a="188900392" X-IronPort-AV: E=Sophos;i="5.81,243,1610438400"; d="scan'208";a="188900392" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Mar 2021 00:46:09 -0800 IronPort-SDR: lzctn8sB1mlNlVR/WkuleYiRTuTFXprDMPe2sQlRGxMVILCZVN7KMW+7Ao5S6PP4uZPvi92IMV Q2HcI/HSPQog== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.81,243,1610438400"; d="scan'208";a="603860768" Received: from fmsmsx605.amr.corp.intel.com ([10.18.126.85]) by fmsmga005.fm.intel.com with ESMTP; 12 Mar 2021 00:46:08 -0800 Received: from fmsmsx601.amr.corp.intel.com (10.18.126.81) by fmsmsx605.amr.corp.intel.com (10.18.126.85) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2106.2; Fri, 12 Mar 2021 00:46:08 -0800 Received: from fmsedg601.ED.cps.intel.com (10.1.192.135) by fmsmsx601.amr.corp.intel.com (10.18.126.81) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2106.2 via Frontend Transport; Fri, 12 Mar 2021 00:46:07 -0800 Received: from NAM10-MW2-obe.outbound.protection.outlook.com (104.47.55.107) by edgegateway.intel.com (192.55.55.70) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2106.2; Fri, 12 Mar 2021 00:46:07 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=YHxafVMV+RsBrtbr3vn2oI5crvv4/hNwgBmo3qR633QNZBbcYwvvy9fKavNy643JJGic5Ja7DQmkcnySP5cv7KAVylOD19deIAZvKBv8Ew5B0DpUg3K+UbWoaylKsByVBXvU6Fcq5ukpA3eGJYb0fuVrfAazT/htR+sdce+lGze62f6mpj6b/QN4mSKuhOj0oAjgJnFMj17TkQeSkvIvxdujk4ytXb/JrfH8Tzu0NtdCRZlG/v+OiF/vNqYKxGZ64+d4bYa80HtlyB0ezaHhEFtfIbh4orXhqCFKyXL/FR9nlSZj5USUslQ0yFXAhNEtqhby7W9xUceupCmzWYAUxw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=avQ6AAXjugtJuomaurwVPfJxaPuMBUHJM5aaUB9em9g=; b=MNDBFv5AuHe62xv0xzNp4YsY9rC7r0q2MPhmtTejh1YlPJGMYWM/tvrsnhSLQvskpMtIhK9rRO511ZHrJ5g4tBsfqsiCG2urCqMngvWOUUSRW00Zn6/i28P0rzxJhr291C6kcQWPbB2VsjFZOZRM7nIV9vgyC9oXfrZ3ydfuimzjzUj++78gL0I1C00BTJrQvD0i+pUiOJZ4Tv4wYszLx5JJIzAVQkzFljgKfcEWwpRxlkaQfkPGPwFYSt6mJtpE61+2srjuYJ+LykaaBbhYysUuxX4ot6LDzWR1/j90DklRextVEsOdeddAneGwae7Tto3szq4wCWLNUDwDHP9bBA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=avQ6AAXjugtJuomaurwVPfJxaPuMBUHJM5aaUB9em9g=; b=Bg/VHGklMtrz+GEU8WY2aVN7480F27XZFITGQm6+VQHESzwMNY5MVUPjSN3RRkDv/lkcc1GMwH4ICnvrQLTvJPBwRYtcTN9DC6WasQRk/ovoS54MHIU4jotabROZ3GsOdkJh2WAK8AfGlkDVI8G8Tg0fXir40vMhLXOVWbSFZzw= Received: from CO1PR11MB5058.namprd11.prod.outlook.com (2603:10b6:303:99::17) by CO1PR11MB4772.namprd11.prod.outlook.com (2603:10b6:303:97::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.3912.17; Fri, 12 Mar 2021 08:46:05 +0000 Received: from CO1PR11MB5058.namprd11.prod.outlook.com ([fe80::c520:93b:be34:10a9]) by CO1PR11MB5058.namprd11.prod.outlook.com ([fe80::c520:93b:be34:10a9%3]) with mapi id 15.20.3912.030; Fri, 12 Mar 2021 08:46:05 +0000 From: "Peng, Yuan" To: "Xie, WeiX" , "dts@dpdk.org" CC: "Xie, WeiX" Thread-Topic: [dts] [PATCH V1] tests/cvl_vf_support_multicast_address: add vlan packet check Thread-Index: AQHXFkXq/jMV6vIGf0qLzfiOt72rraqAC5fQ Date: Fri, 12 Mar 2021 08:46:05 +0000 Message-ID: References: <20210311153805.1297-1-weix.xie@intel.com> In-Reply-To: <20210311153805.1297-1-weix.xie@intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-version: 11.5.1.3 dlp-product: dlpe-windows dlp-reaction: no-action authentication-results: intel.com; dkim=none (message not signed) header.d=none;intel.com; dmarc=none action=none header.from=intel.com; x-originating-ip: [192.102.204.38] x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: ec10e480-52f8-4b8a-83df-08d8e5334630 x-ms-traffictypediagnostic: CO1PR11MB4772: x-ld-processed: 46c98d88-e344-4ed4-8496-4ed7712e255d,ExtAddr x-ms-exchange-transport-forked: True x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:632; x-ms-exchange-senderadcheck: 1 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO1PR11MB5058.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(39860400002)(346002)(396003)(366004)(136003)(376002)(71200400001)(52536014)(4326008)(110136005)(478600001)(107886003)(86362001)(186003)(7696005)(316002)(55016002)(9686003)(66556008)(26005)(5660300002)(33656002)(83380400001)(66446008)(53546011)(8676002)(2906002)(76116006)(6506007)(8936002)(66946007)(66476007)(64756008); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata: =?us-ascii?Q?IrAkViCXOZDuHqCIknELrL51pwB5zvM+KbixnsMqH3Je9X9SxkEdOLW4SN6T?= =?us-ascii?Q?IFeJSHl7Kc6WOnt8tC6JE43+cARz/Layr3fYg7QKhSV9KBWG6khr1ZbAM+U0?= =?us-ascii?Q?G5vpSL4yAe8/eraPStl4tCDCED6ZEw5wZHGDXCqG7+LbEEZKG8xy2wqi4vq4?= =?us-ascii?Q?rU15fIUAEEpEUk5Rl2nrQU6l/ieeGCYyx76dpwhuzMLPwdMTlpqsmEoaChJ1?= =?us-ascii?Q?9tXY6cpjj5SKLCHC1cREZZuzE7SV4PkN+Vz4aDeV0HMOFCUZUGPz1KiPJIR4?= =?us-ascii?Q?IUe7iRrpGf7ad+H8bOiSqfBoC5ZLX57uNSgUDY0ng+rcJGy5f4yFGSLvdAKC?= =?us-ascii?Q?4CX+4AegCUIN8DJpg5hR/jMb3dOOsIIbN7T+H5g+5WjOtGYA8a0xceN0hU7S?= =?us-ascii?Q?AaegLRSuGqgEw1KUk3Usd1etdBL1IMPYsyoeLauS0ECk+h7ZdQuhRfjF0N6h?= =?us-ascii?Q?Nhyu+Tamhn0TXTL1ZxlZ5xvScyG5OXkDXDKT0jyVYVi7iE1JdZfNU/Yq7wjM?= =?us-ascii?Q?0gJCdLirVfed6/U69+PJdsf7VlDueZggn0zBB4IXqqnvdaPMwKMoEqHPrNu4?= =?us-ascii?Q?ltDiBXy+mq7Gf1bfbzHUyzjfsLRzahxCtTmlMHbj6eeQak1Kvq5LteWEZsc4?= =?us-ascii?Q?P3n8qWPDHssJtfHjUVxtfECVx/MUXG3O86bARW5Vu6iNby1+K3o9K2v+ovSV?= =?us-ascii?Q?xIKGi7osWjU3ECtYepM5lnckKVzB6aQuPXAuoDHWGsxBIzDjGV5Vo7gAVqH3?= =?us-ascii?Q?iMq6/Nu+Q5JHDS/3AQSRNjb5ZV2Q1P8U9SK2wERYEvTIYkpgJlpa4uAlMubn?= =?us-ascii?Q?5ZSJLk0V5wWOJKBSXdW/oQ/QoR1gBlv3hDyxi5kiVGzROrCaPlpJm0WAdIYz?= =?us-ascii?Q?PqhdeOL0Yfx3XIFNAFYhwwcskXgIeQrFrM7/VpsaKg05YEyXLX67rFDCHR/M?= =?us-ascii?Q?yQOX8nJmtlhdtMWcbrnOyDgTPwQUUGMxpSedqXPQ8peQO+6ox3gXZafUauYV?= =?us-ascii?Q?yvuCKq5Mz+WQLNBbyO0eFEISqv7OpPEKpyqBUMjUGGGgo01sRrF4QZmYSWjD?= =?us-ascii?Q?PDkDsti0oJw+GJsHaODyn9i2lEcn8fXLhAaEXmTySpgWqnzGgEjuTPksDX2b?= =?us-ascii?Q?hcU5MF/FIjmP8IGzFnKDO4Sq1Jw21uCQqisX67Cnuq2eQwLWO/OYnPnCi2Kp?= =?us-ascii?Q?g/+rAiZKSDcB/a92488WvB/0xymSuLW/JFUuARWxj5E9DjuFh0+dvoTjjJqo?= =?us-ascii?Q?u+XcEAMTV2gigxNEkSTvNn2jSvEc4gRLbLAE6uS9WlWr6LHioTDcGl6HTxFo?= =?us-ascii?Q?5oyw8ClVFgNQY7BZmcCCuSDs?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO1PR11MB5058.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: ec10e480-52f8-4b8a-83df-08d8e5334630 X-MS-Exchange-CrossTenant-originalarrivaltime: 12 Mar 2021 08:46:05.5208 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: mvo5xClU/7ttEHWhsHe/JpC9gL2OBwXh0xlNeKh+F71J7XZx6SxpbzNVO7SGgAltt2W0e/NTl4IP/rQN8XGqfQ== X-MS-Exchange-Transport-CrossTenantHeadersStamped: CO1PR11MB4772 X-OriginatorOrg: intel.com Subject: Re: [dts] [PATCH V1] tests/cvl_vf_support_multicast_address: add vlan packet check X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" Acked by Peng, Yuan -----Original Message----- From: dts On Behalf Of xiewei Sent: Thursday, March 11, 2021 11:38 PM To: dts@dpdk.org Cc: Xie, WeiX Subject: [dts] [PATCH V1] tests/cvl_vf_support_multicast_address: add vlan = packet check a) add vlan packet check when set allmulti on b) add a new test case: add vlan filter check when set allmulti off and con= figured multicast address Signed-off-by: xiewei --- ...tSuite_cvl_vf_support_multicast_address.py | 75 ++++++++++++++++--- 1 file changed, 63 insertions(+), 12 deletions(-) diff --git a/tests/TestSuite_cvl_vf_support_multicast_address.py b/tests/Te= stSuite_cvl_vf_support_multicast_address.py index 1b148c6c..dd241a82 100644 --- a/tests/TestSuite_cvl_vf_support_multicast_address.py +++ b/tests/TestSuite_cvl_vf_support_multicast_address.py @@ -393,21 +393,23 @@ class TestCvlVfSupportMulticastAdress(TestCase): =20 # send 5 packets pkt1 =3D 'Ether(dst=3D"%s")/IP(src=3D"224.0.0.1")/UDP(sport=3D22,d= port=3D23)/("X"*480)' % mul_mac_0 - pkt2 =3D 'Ether(dst=3D"%s")/IP(src=3D"224.192.16.1")/UDP(sport=3D2= 2,dport=3D23)/("X"*480)' % mul_mac_1 - pkt3 =3D 'Ether(dst=3D"%s")/IP(src=3D"192.168.0.1")/UDP(sport=3D22= ,dport=3D23)/("X"*480)' % vf0_mac - pkt4 =3D 'Ether(dst=3D"%s")/IP(src=3D"192.168.0.1")/UDP(sport=3D22= ,dport=3D23)/("X"*480)' % vf1_mac - pkt5 =3D 'Ether(dst=3D"%s")/IP(src=3D"192.168.0.1")/UDP(sport=3D22= ,dport=3D23)/("X"*480)' % vf0_wrong_mac - pkts =3D [pkt1, pkt2, pkt3, pkt4, pkt5] + pkt2 =3D 'Ether(dst=3D"%s")/Dot1Q(vlan=3D1)/IP(src=3D"224.0.0.1")/= UDP(sport=3D22,dport=3D23)/("X"*480)' % mul_mac_0 + pkt3 =3D 'Ether(dst=3D"%s")/IP(src=3D"224.192.16.1")/UDP(sport=3D2= 2,dport=3D23)/("X"*480)' % mul_mac_1 + pkt4 =3D 'Ether(dst=3D"%s")/Dot1Q(vlan=3D2)/IP(src=3D"224.192.16.1= ")/UDP(sport=3D22,dport=3D23)/("X"*480)' % mul_mac_1 + pkt5 =3D 'Ether(dst=3D"%s")/IP(src=3D"192.168.0.1")/UDP(sport=3D22= ,dport=3D23)/("X"*480)' % vf0_mac + pkt6 =3D 'Ether(dst=3D"%s")/IP(src=3D"192.168.0.1")/UDP(sport=3D22= ,dport=3D23)/("X"*480)' % vf1_mac + pkt7 =3D 'Ether(dst=3D"%s")/IP(src=3D"192.168.0.1")/UDP(sport=3D22= ,dport=3D23)/("X"*480)' % vf0_wrong_mac + pkts =3D [pkt1, pkt2, pkt3, pkt4, pkt5, pkt6, pkt7] p =3D Packet() for i in pkts: p.append_pkt(i) p.send_pkt(self.tester, tx_port=3Dself.tester_itf) output_1 =3D self.check_pkts_received() - self.verify(len(output_1) =3D=3D 6, "Wrong number of pkts received= ") - self.verify(('0', vf0_mac) in output_1, "pkt3 can't be received by= port 0") - self.verify(('1', vf1_mac) in output_1, "pkt4 can't be received by= port 1") - self.verify(('0', mul_mac_0) in output_1 and ('0', mul_mac_1) in o= utput_1, "pkt1-2 can't be received by port 0") - self.verify(('1', mul_mac_0) in output_1 and ('1', mul_mac_1) in o= utput_1, "pkt1-2 can't be received by port 1") + self.verify(len(output_1) =3D=3D 10, "Wrong number of pkts receive= d") + self.verify(('0', vf0_mac) in output_1, "pkt5 can't be received by= port 0") + self.verify(('1', vf1_mac) in output_1, "pkt6 can't be received by= port 1") + self.verify(('0', mul_mac_0) in output_1 and ('0', mul_mac_1) in o= utput_1, "pkt1-4 can't be received by port 0") + self.verify(('1', mul_mac_0) in output_1 and ('1', mul_mac_1)=20 + in output_1, "pkt1-4 can't be received by port 1") =20 # set allmulti off and promisc on self.pmd_output.execute_cmd("set promisc all on") @@ -416,8 +418,8= @@ class TestCvlVfSupportMulticastAdress(TestCase): p.send_pkt(self.tester, tx_port=3Dself.tester_itf) output_2 =3D self.check_pkts_received() self.verify(len(output_2) =3D=3D 6, "Wrong number of pkts received= ") - self.verify(('0', vf0_mac) in output_2 and ('0', vf1_mac) in outpu= t_2 and ('0', vf0_wrong_mac) in output_2, "pkt3-5 can't be received by port= 0") - self.verify(('1', vf0_mac) in output_2 and ('1', vf1_mac) in outpu= t_2 and ('1', vf0_wrong_mac) in output_2, "pkt3-5 can't be received by port= 1") + self.verify(('0', vf0_mac) in output_2 and ('0', vf1_mac) in outpu= t_2 and ('0', vf0_wrong_mac) in output_2, "pkt5-7 can't be received by port= 0") + self.verify(('1', vf0_mac) in output_2 and ('1', vf1_mac) in=20 + output_2 and ('1', vf0_wrong_mac) in output_2, "pkt5-7 can't be=20 + received by port 1") =20 def test_negative_case(self): # send one packet @@ -469,6 +471,55 @@ class TestCvlVfSupportMulticastAdress(TestCase): output_6 =3D self.check_pkts_received() self.verify(len(output_6) =3D=3D 0, "Wrong number of pkts received= ") =20 + def test_set_vlan_filter_on(self): + # send 4 packets + pkt1 =3D 'Ether(dst=3D"%s")/IP(src=3D"224.0.0.1")/UDP(sport=3D22,d= port=3D23)/("X"*480)' % mul_mac_0 + pkt2 =3D 'Ether(dst=3D"%s")/Dot1Q(vlan=3D1)/IP(src=3D"224.0.0.1")/= UDP(sport=3D22,dport=3D23)/("X"*480)' % mul_mac_0 + pkt3 =3D 'Ether(dst=3D"%s")/IP(src=3D"224.192.16.1")/UDP(sport=3D2= 2,dport=3D23)/("X"*480)' % mul_mac_1 + pkt4 =3D 'Ether(dst=3D"%s")/Dot1Q(vlan=3D1)/IP(src=3D"224.192.16.1= ")/UDP(sport=3D22,dport=3D23)/("X"*480)' % mul_mac_1 + pkts =3D [pkt1, pkt2, pkt3, pkt4] + p =3D Packet() + for i in pkts: + p.append_pkt(i) + p.send_pkt(self.tester, tx_port=3Dself.tester_itf) + out_1 =3D self.check_pkts_received() + self.verify(len(out_1) =3D=3D 0, "pkt1-4 can be received by any=20 + port") + + # configure multicast address + self.pmd_output.execute_cmd("mcast_addr add 0 %s" % mul_mac_0) + self.check_ports_multicast_address_number(1, 0) + # send 4 packets + p.send_pkt(self.tester, tx_port=3Dself.tester_itf) + out_2 =3D self.check_pkts_received() + self.verify(len(out_2) =3D=3D 1, "Wrong number of pkts received") + self.verify(('0', mul_mac_0) in out_2, "pkt1 can't be received=20 + by port 0") + + # set vlan filter on + self.pmd_output.execute_cmd("vlan set filter on 0") + self.pmd_output.execute_cmd("rx_vlan add 1 0") + # send 4 packets + p.send_pkt(self.tester, tx_port=3Dself.tester_itf) + out_3 =3D self.check_pkts_received() + self.verify(len(out_3) =3D=3D 2, "Wrong number of pkts received") + self.verify(('0', mul_mac_0) in out_3, "pkt1-2 can't be received b= y port 0") + self.verify(('0', mul_mac_1) not in out_3, "other pkt can be=20 + received by port 0") + + # remove the vlan filter + self.pmd_output.execute_cmd("rx_vlan rm 1 0") + # send 4 packets + p.send_pkt(self.tester, tx_port=3Dself.tester_itf) + out_4 =3D self.check_pkts_received() + self.verify(len(out_4) =3D=3D 1, "Wrong number of pkts received") + self.verify(('0', mul_mac_0) in out_4, "pkt1 can't be received=20 + by port 0") + + # remove the multicast address configuration + self.pmd_output.execute_cmd("mcast_addr remove 0 %s" % mul_mac_0) + self.check_ports_multicast_address_number(0, 0) + # send 4 packets + p.send_pkt(self.tester, tx_port=3Dself.tester_itf) + out_5 =3D self.check_pkts_received() + self.verify(len(out_5) =3D=3D 0, "pkt1-4 can be received by any=20 + port") + def tear_down(self): """ Run after each test case. -- 2.17.1