Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/96695/?format=api
http://patches.dpdk.org/api/patches/96695/?format=api", "web_url": "http://patches.dpdk.org/project/dts/patch/20210805234931.70531-1-yuan.peng@intel.com/", "project": { "id": 3, "url": "http://patches.dpdk.org/api/projects/3/?format=api", "name": "DTS", "link_name": "dts", "list_id": "dts.dpdk.org", "list_email": "dts@dpdk.org", "web_url": "", "scm_url": "git://dpdk.org/tools/dts", "webscm_url": "http://git.dpdk.org/tools/dts/", "list_archive_url": "https://inbox.dpdk.org/dts", "list_archive_url_format": "https://inbox.dpdk.org/dts/{}", "commit_url_format": "" }, "msgid": "<20210805234931.70531-1-yuan.peng@intel.com>", "list_archive_url": "https://inbox.dpdk.org/dts/20210805234931.70531-1-yuan.peng@intel.com", "date": "2021-08-05T23:49:31", "name": "[V2] test_plans/cvl_dcf_acl_filter_test_plan.rst: modified max entries cases in testplan", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "6f592d727e0d01325a5195afe61c61fdffa38c06", "submitter": { "id": 429, "url": "http://patches.dpdk.org/api/people/429/?format=api", "name": "Peng, Yuan", "email": "yuan.peng@intel.com" }, "delegate": null, "mbox": "http://patches.dpdk.org/project/dts/patch/20210805234931.70531-1-yuan.peng@intel.com/mbox/", "series": [ { "id": 18210, "url": "http://patches.dpdk.org/api/series/18210/?format=api", "web_url": "http://patches.dpdk.org/project/dts/list/?series=18210", "date": "2021-08-05T23:49:31", "name": "[V2] test_plans/cvl_dcf_acl_filter_test_plan.rst: modified max entries cases in testplan", "version": 2, "mbox": "http://patches.dpdk.org/series/18210/mbox/" } ], "comments": "http://patches.dpdk.org/api/patches/96695/comments/", "check": "success", "checks": "http://patches.dpdk.org/api/patches/96695/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<dts-bounces@dpdk.org>", "X-Original-To": "patchwork@inbox.dpdk.org", "Delivered-To": "patchwork@inbox.dpdk.org", "Received": [ "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 5F501A0C4C;\n\tFri, 6 Aug 2021 08:50:53 +0200 (CEST)", "from [217.70.189.124] (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 282CC41293;\n\tFri, 6 Aug 2021 08:50:53 +0200 (CEST)", "from mga17.intel.com (mga17.intel.com [192.55.52.151])\n by mails.dpdk.org (Postfix) with ESMTP id E263F41290\n for <dts@dpdk.org>; Fri, 6 Aug 2021 08:50:50 +0200 (CEST)", "from fmsmga006.fm.intel.com ([10.253.24.20])\n by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 05 Aug 2021 23:50:49 -0700", "from pengyuan-dpdk.sh.intel.com ([10.67.115.83])\n by fmsmga006.fm.intel.com with ESMTP; 05 Aug 2021 23:50:48 -0700" ], "X-IronPort-AV": [ "E=McAfee;i=\"6200,9189,10067\"; a=\"194590542\"", "E=Sophos;i=\"5.84,299,1620716400\"; d=\"scan'208\";a=\"194590542\"", "E=Sophos;i=\"5.84,299,1620716400\"; d=\"scan'208\";a=\"669312322\"" ], "X-ExtLoop1": "1", "From": "Peng Yuan <yuan.peng@intel.com>", "To": "dts@dpdk.org", "Cc": "Peng Yuan <yuan.peng@intel.com>", "Date": "Thu, 5 Aug 2021 23:49:31 +0000", "Message-Id": "<20210805234931.70531-1-yuan.peng@intel.com>", "X-Mailer": "git-send-email 2.17.1", "Subject": "[dts] [PATCH V2] test_plans/cvl_dcf_acl_filter_test_plan.rst:\n modified max entries cases in testplan", "X-BeenThere": "dts@dpdk.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "test suite reviews and discussions <dts.dpdk.org>", "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>", "List-Archive": "<http://mails.dpdk.org/archives/dts/>", "List-Post": "<mailto:dts@dpdk.org>", "List-Help": "<mailto:dts-request@dpdk.org?subject=help>", "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>", "Errors-To": "dts-bounces@dpdk.org", "Sender": "\"dts\" <dts-bounces@dpdk.org>" }, "content": "Max entry is changed from 512 to 256, so modified the related cases.\n\nSigned-off-by: Peng Yuan <yuan.peng@intel.com>", "diff": "diff --git a/test_plans/cvl_dcf_acl_filter_test_plan.rst b/test_plans/cvl_dcf_acl_filter_test_plan.rst\nindex cdccb690..378514dd 100644\n--- a/test_plans/cvl_dcf_acl_filter_test_plan.rst\n+++ b/test_plans/cvl_dcf_acl_filter_test_plan.rst\n@@ -508,11 +508,11 @@ so there is some difference to UDP/TCP case.\n \n Test Case 5: max entry number\n =============================\n-Note: now the default entry number is 512.\n+Note: now the default entry number is 256.\n if create a IPv4 rule, will generate 4 entries:\n ipv4, ipv4-udp, ipv4-tcp, ipv4-sctp\n-So we can create 128 IPv4 rules at most.\n-while we can create 512 ipv4-udp/ipv4-tcp/ipv4-sctp rules at most.\n+So we can create 64 IPv4 rules at most.\n+while we can create 256 ipv4-udp/ipv4-tcp/ipv4-sctp rules at most.\n \n 1. launch DPDK on VF0, request DCF mode::\n \n@@ -526,55 +526,67 @@ while we can create 512 ipv4-udp/ipv4-tcp/ipv4-sctp rules at most.\n \n flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.255 / udp / end actions drop / end\n \n-3. create 512 ipv4-udp ACL rules::\n+3. create 256 ipv4-udp ACL rules::\n \n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.0 src mask 255.255.255.254 / udp / end actions drop / end\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / udp / end actions drop / end\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.255.255.254 / udp / end actions drop / end\n- ......\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.255 src mask 255.255.255.254 / udp / end actions drop / end\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.0 src mask 255.255.255.254 / udp / end actions drop / end\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 / udp / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.0 src mask 255.254.255.255 / udp / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.254.255.255 / udp / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.254.255.255 / udp / end actions drop / end\n ......\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.255 src mask 255.255.255.254 / udp / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.255 src mask 255.254.255.255 / udp / end actions drop / end\n \n all the rules can be created successfully as ACL rules.\n \n-4. list the rules, there are rule 0-512 listed.\n+4. list the rules, there are rule 0-256 listed.\n \n 5. send packet1::\n \n- sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.0.0\", dst=\"192.168.100.2\")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface=\"enp134s0f1\")\n+ sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.0.255\", dst=\"192.168.100.2\")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface=\"enp134s0f1\")\n \n- check the packet dropped.\n+ check the packet dropped. stop the forward::\n+\n+ ---------------------- Forward statistics for port 1 ----------------------\n+ RX-packets: 0 RX-dropped: 1 RX-total: 1\n+ TX-packets: 0 TX-dropped: 0 TX-total: 0\n+ ----------------------------------------------------------------------------\n \n 6. create one more rule::\n \n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.2.1 src mask 255.255.255.254 / udp / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.0 src mask 255.254.255.255 / udp / end actions drop / end\n \n- check the rule can't be created as an ACL rule successfully.\n+ the rule is created as a switch rule.\n \n 7. send packet2::\n \n- sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.2.1\", dst=\"192.168.100.2\")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface=\"enp134s0f1\")\n+ sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.1.0\", dst=\"192.168.100.2\")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface=\"enp134s0f1\")\n \n- check the packet can be received by VF1.\n+ check the packet can't be received by VF1. stop the forward::\n+ \n+ ---------------------- Forward statistics for port 1 ----------------------\n+ RX-packets: 0 RX-dropped: 0 RX-total: 0\n+ TX-packets: 0 TX-dropped: 0 TX-total: 0\n+ ----------------------------------------------------------------------------\n \n-8. delete the rule 512::\n-\n- flow destroy 0 rule 512\n+8. delete the rule 256 and 257::\n+ \n+ flow destroy 0 rule 256\n+ flow destroy 0 rule 257\n \n list the rules::\n \n flow list 0\n \n- there are rule 0-511 listed.\n+ there are rule 0-255 listed.\n \n 9. create the rule in the step6 again,\n- check the rule can be created successfully.\n- list the rules, there are rule 0-512 listed.\n+ check the rule can be created as acl rule successfully.\n+ list the rules, there are rule 0-256 listed.\n+ \n+10.send packet2 again, check the packet dropped. stop the forward::\n \n-10. send packet2 again, check the packet dropped.\n+ ---------------------- Forward statistics for port 1 ----------------------\n+ RX-packets: 0 RX-dropped: 1 RX-total: 1\n+ TX-packets: 0 TX-dropped: 0 TX-total: 0\n+ ----------------------------------------------------------------------------\n \n Test Case 6: max entry number ipv4-other\n ========================================\n@@ -590,51 +602,68 @@ Test Case 6: max entry number ipv4-other\n \n flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.255 / end actions drop / end\n \n-3. create 128 ipv4-other ACL rules::\n-\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.255.254 / end actions drop / end\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.2 src mask 255.255.255.254 / end actions drop / end\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.3 src mask 255.255.255.254 / end actions drop / end\n- ......\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.128 src mask 255.255.255.254 / end actions drop / end\n+3. create 64 ipv4-other ACL rules::\n+ \n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.0.255 / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.2 src mask 255.255.0.255 / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.3 src mask 255.255.0.255 / end actions drop / end\n+ ......\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.64 src mask 255.255.0.255 / end actions drop / end\n \n all the rules can be created successfully as ACL rules.\n \n-4. list the rules, there are rule 0-128 listed.\n+4. list the rules, there are rule 0-64 listed.\n \n 5. send packet1::\n \n- sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.1.1\", dst=\"192.168.0.2\")/Raw(load='X'*30)], iface=\"enp134s0f1\")\n+ sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.1.64\", dst=\"192.168.0.2\")/Raw(load='X'*30)], iface=\"enp134s0f1\")\n \n- check the packet dropped.\n+ check the packet dropped. stop the forward::\n+\n+ ---------------------- Forward statistics for port 1 ----------------------\n+ RX-packets: 0 RX-dropped: 1 RX-total: 1\n+ TX-packets: 0 TX-dropped: 0 TX-total: 0\n+ ----------------------------------------------------------------------------\n \n 6. create one more rule::\n \n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.255.255.254 / udp / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.255.0.255 / udp / end actions drop / end\n \n check the rule can't be created as an ACL rule successfully.\n+ it's created as a switch rule.\n \n 7. send packet2::\n \n sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.0.2\", dst=\"192.168.1.2\")/Raw(load='X'*30)], iface=\"enp134s0f1\")\n \n- check the packet can be received by VF1.\n-\n-8. delete the rule 128::\n+ check the packet can't be received by vf1. stop forward::\n+ \n+ ---------------------- Forward statistics for port 1 ----------------------\n+ RX-packets: 0 RX-dropped: 0 RX-total: 0\n+ TX-packets: 0 TX-dropped: 0 TX-total: 0\n+ ----------------------------------------------------------------------------\n+ \n+8. delete the rule 64 and 65::\n \n- flow destroy 0 rule 128\n+ flow destroy 0 rule 64\n+ flow destroy 0 rule 65\n \n list the rules::\n \n flow list 0\n \n- there are rule 0-127 listed.\n+ there are rule 0-63 listed.\n \n 9. create the rule in the step6 again,\n- check the rule can be created successfully.\n- list the rules, there are rule 0-128 listed.\n+ check the rule can be created as an ACL rule successfully.\n+ list the rules, there are rule 0-64 listed.\n \n-10. send packet2 again, check the packet dropped.\n+10.send packet2 again, check the packet dropped. stop the forward::\n+\n+ ---------------------- Forward statistics for port 1 ----------------------\n+ RX-packets: 0 RX-dropped: 1 RX-total: 1\n+ TX-packets: 0 TX-dropped: 0 TX-total: 0\n+ ----------------------------------------------------------------------------\n \n Test Case 7: max entry number combined patterns\n ===============================================\n@@ -646,27 +675,27 @@ Test Case 7: max entry number combined patterns\n \n ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf0 -n 4 -w 86:01.1 --file-prefix=vf1 -- -i\n \n-2. create 64 ipv4-other ACL rules::\n+2. create 32 ipv4-other ACL rules::\n \n- flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.0 dst mask 255.255.255.0 / end actions drop / end\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.0 dst mask 255.255.0.255 / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.0.255 / end actions drop / end\n ......\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.62 src mask 255.255.255.0 / end actions drop / end\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.63 src mask 255.255.255.0 / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.30 src mask 255.255.0.255 / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.31 src mask 255.255.0.255 / end actions drop / end\n \n all the rules can be created successfully as ACL rules.\n \n-3. create 256 ipv4-udp ACL rules::\n+3. create 128 ipv4-udp ACL rules::\n \n- flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.0 dst mask 255.255.255.254 / udp / end actions drop / end\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.254 / udp / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.0 dst mask 255.255.0.255 / udp / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.0.255 / udp / end actions drop / end\n ......\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.254 src mask 255.255.255.254 / udp / end actions drop / end\n- flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.255 src mask 255.255.255.254 / udp / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.126 src mask 255.255.0.255 / udp / end actions drop / end\n+ flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.127 src mask 255.255.0.255 / udp / end actions drop / end\n \n all the rules can be created successfully as ACL rules.\n \n-4. list the rules, there are rule 0-319 listed.\n+4. list the rules, there are rule 0-159 listed.\n \n 5. create one more ACl rule failed, it is created as a switch rule::\n \n@@ -678,7 +707,12 @@ Test Case 7: max entry number combined patterns\n \n sendp([Ether(dst=\"00:01:23:45:67:89\")/IP(src=\"192.168.2.255\", dst=\"192.168.0.2\")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface=\"enp134s0f1\")\n \n- check the packet dropped.\n+ check the packet dropped. stop the forward::\n+\n+ ---------------------- Forward statistics for port 1 ----------------------\n+ RX-packets: 0 RX-dropped: 1 RX-total: 1\n+ TX-packets: 0 TX-dropped: 0 TX-total: 0\n+ ----------------------------------------------------------------------------\n \n 8. delete all the rules, check the packet is received by vf1.\n \n", "prefixes": [ "V2" ] }{ "id": 96695, "url": "