From patchwork Fri Dec 2 03:27:29 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ke Xu X-Patchwork-Id: 120419 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 1AF5BA0540; Fri, 2 Dec 2022 04:29:30 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 146DA42BD9; Fri, 2 Dec 2022 04:29:30 +0100 (CET) Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mails.dpdk.org (Postfix) with ESMTP id EA3B740687 for ; Fri, 2 Dec 2022 04:29:27 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1669951768; x=1701487768; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=8C5OQBRMVkscmMRdZGWwts++X6AhNl4WdE+gOcFoDNM=; b=l4AgyQTiSKVQxSI4sBtVfw64i3eXAKF37sqLv8A1vHTIx1+0DCeeQ5a7 nxIxjWjIsXpV2QA0iNHuSSIFAHy+3j+wNPF9JDg11RfTElCdJnNI2YBLI P6UqmLNxcBKipTCqvZgz64TDZPiZhjoGao9kiRrnaXxMeTXmLsMi8B/pQ vUDTkb3oIIisk8PULFZ+aY7bWxtl53oswP0apcLKsGoNiIfXOHcyvrj6W 8Xys5qOMHoyXdC7jzisdwyPYtZPlb96qcWSsFtRNV57MuX6F6gxrSSZRe oHLWurnjWyIm71UsIDdLJz0Yks00VA6IpAPyUObWAQm3hT+g7TYrZS96j g==; X-IronPort-AV: E=McAfee;i="6500,9779,10548"; a="317725829" X-IronPort-AV: E=Sophos;i="5.96,210,1665471600"; d="scan'208";a="317725829" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Dec 2022 19:29:27 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10548"; a="751092210" X-IronPort-AV: E=Sophos;i="5.96,210,1665471600"; d="scan'208";a="751092210" Received: from unknown (HELO DPDK-XUKE-LAB.sh.intel.com) ([10.67.119.8]) by fmsmga002.fm.intel.com with ESMTP; 01 Dec 2022 19:29:25 -0800 From: Ke Xu To: dts@dpdk.org Cc: lijuan.tu@intel.com, ke1.xu@intel.com, Jin Ling Subject: [DTS][PATCH V2 1/3] test_plans/ice_dcf_acl_filter: update test plan to support represented port action from deprecated vf action Date: Fri, 2 Dec 2022 11:27:29 +0800 Message-Id: <20221202032731.36164-2-ke1.xu@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221202032731.36164-1-ke1.xu@intel.com> References: <20221202032731.36164-1-ke1.xu@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Testpmd args are modified to support appyling representors for the new API. Rules are modified for the old API being deprecated, changing to the new API. Ports id are modified corresponding to the port representors and modified API. Signed-off-by: Jin Ling Signed-off-by: Ke Xu --- test_plans/ice_dcf_acl_filter_test_plan.rst | 64 ++++++++++----------- 1 file changed, 32 insertions(+), 32 deletions(-) diff --git a/test_plans/ice_dcf_acl_filter_test_plan.rst b/test_plans/ice_dcf_acl_filter_test_plan.rst index a6d038a0..0e7427b6 100644 --- a/test_plans/ice_dcf_acl_filter_test_plan.rst +++ b/test_plans/ice_dcf_acl_filter_test_plan.rst @@ -1,5 +1,5 @@ .. SPDX-License-Identifier: BSD-3-Clause - Copyright(c) 2020 Intel Corporation + Copyright(c) 2020-2022 Intel Corporation ================== ICE DCF ACL filter @@ -90,7 +90,7 @@ Prerequisites or launch one testpmd on VF0 and VF1:: - ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf -n 4 -a 0000:86:01.0,cap=dcf -a 86:01.1 --file-prefix=vf0 --log-level="ice,7" -- -i + ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf -n 4 -a 0000:86:01.0,cap=dcf,representor=vf[1] -a 86:01.1 --file-prefix=vf0 --log-level="ice,7" -- -i Common steps of basic cases =========================== @@ -134,9 +134,9 @@ Then the ACL filter can filter the packet with dst mac address. 1. rule:: - flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / end actions vf id 1 / end - flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / end actions vf id 1 / end - flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / end actions vf id 1 / end + flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / end actions represented_port ethdev_port_id 1 / end + flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / end actions represented_port ethdev_port_id 1 / end + flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / end actions represented_port ethdev_port_id 1 / end flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / end actions drop / end 2. matched packets:: @@ -223,9 +223,9 @@ Subcase 6: src mac + dst mac + src ipv4 + dst ipv4(only 2port NIC support) -------------------------------------------------------------------------- 1. rule:: - flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions vf id 1 / end - flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions vf id 1 / end - flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions vf id 1 / end + flow create 0 ingress pattern eth dst is 33:00:00:00:00:01 / ipv4 / end actions represented_port ethdev_port_id 1 / end + flow create 0 ingress pattern eth dst is 33:00:00:00:00:02 / ipv4 / end actions represented_port ethdev_port_id 1 / end + flow create 0 ingress pattern eth dst is 33:00:00:00:00:03 / ipv4 / end actions represented_port ethdev_port_id 1 / end flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 33:00:00:00:00:02 dst mask ff:ff:ff:ff:ff:fe \ / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 / end actions drop / end @@ -277,9 +277,9 @@ Then the ACL filter can filter the packet with dst mac address. 1. rule:: - flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / tcp / end actions vf id 1 / end - flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / tcp / end actions vf id 1 / end - flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / tcp / end actions vf id 1 / end + flow create 0 ingress pattern eth dst is 00:11:22:33:44:55 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end + flow create 0 ingress pattern eth dst is 00:11:22:33:44:66 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end + flow create 0 ingress pattern eth dst is 00:11:22:33:66:55 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end flow create 0 ingress pattern eth dst spec 00:11:22:33:44:55 dst mask ff:ff:ff:ff:ff:00 / ipv4 / tcp / end actions drop / end 2. matched packets:: @@ -383,9 +383,9 @@ Subcase 8: src mac + dst mac + src ip + dst ip + src port + dst port(only 2ports --------------------------------------------------------------------------------------------- 1. rule:: - flow create 0 ingress pattern eth dst is 00:01:23:45:67:89 / ipv4 / tcp / end actions vf id 1 / end - flow create 0 ingress pattern eth dst is 5E:8E:8B:4D:89:06 / ipv4 / tcp / end actions vf id 1 / end - flow create 0 ingress pattern eth dst is 5E:8E:8B:4D:90:05 / ipv4 / tcp / end actions vf id 1 / end + flow create 0 ingress pattern eth dst is 00:01:23:45:67:89 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end + flow create 0 ingress pattern eth dst is 5E:8E:8B:4D:89:06 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end + flow create 0 ingress pattern eth dst is 5E:8E:8B:4D:90:05 / ipv4 / tcp / end actions represented_port ethdev_port_id 1 / end flow create 0 ingress pattern eth src spec 00:11:22:33:44:55 src mask ff:ff:ff:ff:ff:00 dst spec 00:01:23:45:67:89 dst mask ff:ff:ff:ff:00:ff \ / ipv4 src spec 192.168.0.1 src mask 255.255.255.0 dst spec 192.168.0.2 dst mask 255.255.0.255 \ / tcp src spec 8010 src mask 65520 dst spec 8017 dst mask 65520 / end actions drop / end @@ -878,15 +878,15 @@ Test Case 11: switch/acl/fdir/rss rules combination 2. create rules:: - flow create 0 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp / end actions vf id 1 / end - flow create 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp / end actions vf id 1 / end - flow create 0 ingress pattern eth / ipv4 src is 192.168.0.3 dst is 192.168.0.20 / tcp / end actions vf id 1 / end - flow create 0 ingress pattern eth / ipv4 src is 192.168.0.4 dst is 192.168.0.20 / tcp / end actions vf id 1 / end + flow create 0 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end + flow create 0 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end + flow create 0 ingress pattern eth / ipv4 src is 192.168.0.3 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end + flow create 0 ingress pattern eth / ipv4 src is 192.168.0.4 dst is 192.168.0.20 / tcp / end actions represented_port ethdev_port_id 1 / end flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.2 src mask 255.255.255.254 / tcp / end actions drop / end flow create 0 ingress pattern eth / ipv4 dst spec 192.168.0.21 dst mask 255.255.0.255 / tcp / end actions drop / end - flow create 1 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end - flow create 1 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end - flow create 1 ingress pattern eth / ipv4 src is 192.168.1.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end + flow create 2 ingress pattern eth / ipv4 src is 192.168.0.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end + flow create 2 ingress pattern eth / ipv4 src is 192.168.0.2 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end + flow create 2 ingress pattern eth / ipv4 src is 192.168.1.1 dst is 192.168.0.20 / tcp src is 22 dst is 23 / end actions queue index 3 / mark / end 3. check the rule list:: @@ -898,7 +898,7 @@ Test Case 11: switch/acl/fdir/rss rules combination 3 0 0 i-- ETH IPV4 TCP => VF 4 0 0 i-- ETH IPV4 TCP => DROP 5 0 0 i-- ETH IPV4 TCP => DROP - testpmd> flow list 1 + testpmd> flow list 2 ID Group Prio Attr Rule 0 0 0 i-- ETH IPV4 TCP => QUEUE MARK 1 0 0 i-- ETH IPV4 TCP => QUEUE MARK @@ -915,14 +915,14 @@ Test Case 11: switch/acl/fdir/rss rules combination sendp(Ether(src="00:11:22:33:44:55", dst="00:01:23:45:67:89")/IP(src="192.168.1.1", dst="192.168.0.20")/TCP(sport=22,dport=23)/Raw(load="x"*30), iface="enp216s0f0") sendp(Ether(src="00:11:22:33:44:55", dst="00:01:23:45:67:89")/IP(src="192.168.1.1", dst="192.168.0.21")/TCP(sport=22,dport=23)/Raw(load="x"*30), iface="enp216s0f0") -5. check packet 1 is received by port 1 and redirected to queue 3 with FDIR matched ID=0x0. - packet 2 is received by port 1 and distributed by RSS without mark ID. - packet 3 is dropped by port 1. - packet 4 is dropped by port 1. - packet 5 is received by port 1 and distributed by RSS without mark ID. - packet 6 is can't received by port 0 and port 1. - packet 7 is received by port 1 and redirected to queue 3 with FDIR matched ID=0x0. - packet 8 is dropped by port 1. +5. check packet 1 is received by port 2 and redirected to queue 3 with FDIR matched ID=0x0. + packet 2 is received by port 2 and distributed by RSS without mark ID. + packet 3 is dropped by port 2. + packet 4 is dropped by port 2. + packet 5 is received by port 2 and distributed by RSS without mark ID. + packet 6 is can't received by port 0 and port 2. + packet 7 is received by port 2 and redirected to queue 3 with FDIR matched ID=0x0. + packet 8 is dropped by port 2. 6. delete rule ID 4 from port 0 and list the rules:: @@ -941,5 +941,5 @@ Test Case 11: switch/acl/fdir/rss rules combination sendp(Ether(src="00:11:22:33:44:55", dst="00:01:23:45:67:88")/IP(src="192.168.0.2", dst="192.168.0.20")/TCP(sport=22,dport=23)/Raw(load="x"*30), iface="enp216s0f0") sendp(Ether(src="00:11:22:33:44:55", dst="00:01:23:45:67:88")/IP(src="192.168.0.3", dst="192.168.0.20")/TCP(sport=22,dport=23)/Raw(load="x"*30), iface="enp216s0f0") -8. check packet 1 is received by port 1 and redirected to queue 3 with FDIR matched ID=0x0. - packet 2 is received by port 1 and distributed by RSS without mark ID. +8. check packet 1 is received by port 2 and redirected to queue 3 with FDIR matched ID=0x0. + packet 2 is received by port 2 and distributed by RSS without mark ID.