From patchwork Fri Dec 2 03:27:30 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ke Xu X-Patchwork-Id: 120420 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 4BBA2A0540; Fri, 2 Dec 2022 04:29:38 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 4349A42D14; Fri, 2 Dec 2022 04:29:38 +0100 (CET) Received: from mga03.intel.com (mga03.intel.com [134.134.136.65]) by mails.dpdk.org (Postfix) with ESMTP id A328A40687 for ; Fri, 2 Dec 2022 04:29:36 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1669951776; x=1701487776; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=0y+P+a0Ot6ZxHeVS0soNBUiOFMb7twdjpPceFQItXfc=; b=E9sVoB1R9z6en2aEdfexYeHhNAN4IGWPlBqnfMORsEpErXCVuIfEBx+m TxN0vsQBCQhw4Ds+WE2ZHainiTw5leIOx42zWFfHGYbZqOdNcK8pZLGuu Ubecnx7GppxkniL4kUuCZIwT7dK/erS5z8jHiRz4//dY49vEQFE7HfXLL ZZLSl8NdOokNsMYDw5aOHEjiEs8XGVjijPYZRzEaoVzCxyQGLP5lUxwk6 +7WdJCmeup71ac5bNdXA88G2T5iOdKLhkKhAmM/6iijggwNjfulQ7dMPE rYNyo2vB0OOkJug4kIeEvcCrVu1c6/nYiy8KsKfEdzhItFMAMkLWV7iqr w==; X-IronPort-AV: E=McAfee;i="6500,9779,10548"; a="317725845" X-IronPort-AV: E=Sophos;i="5.96,210,1665471600"; d="scan'208";a="317725845" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga103.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 01 Dec 2022 19:29:35 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10548"; a="751092238" X-IronPort-AV: E=Sophos;i="5.96,210,1665471600"; d="scan'208";a="751092238" Received: from unknown (HELO DPDK-XUKE-LAB.sh.intel.com) ([10.67.119.8]) by fmsmga002.fm.intel.com with ESMTP; 01 Dec 2022 19:29:34 -0800 From: Ke Xu To: dts@dpdk.org Cc: lijuan.tu@intel.com, ke1.xu@intel.com, Jin Ling Subject: [DTS][PATCH V2 2/3] test_plans/ice_dcf_acl_filter: remove redundant white space Date: Fri, 2 Dec 2022 11:27:30 +0800 Message-Id: <20221202032731.36164-3-ke1.xu@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221202032731.36164-1-ke1.xu@intel.com> References: <20221202032731.36164-1-ke1.xu@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Signed-off-by: Jin Ling Signed-off-by: Ke Xu --- test_plans/ice_dcf_acl_filter_test_plan.rst | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/test_plans/ice_dcf_acl_filter_test_plan.rst b/test_plans/ice_dcf_acl_filter_test_plan.rst index 0e7427b6..47f39660 100644 --- a/test_plans/ice_dcf_acl_filter_test_plan.rst +++ b/test_plans/ice_dcf_acl_filter_test_plan.rst @@ -522,14 +522,14 @@ while we can create 256 ipv4-udp/ipv4-tcp/ipv4-sctp rules at most. sendp([Ether(dst="00:01:23:45:67:89")/IP(src="192.168.1.0", dst="192.168.100.2")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface="enp134s0f1") check the packet can't be received by VF1. stop the forward:: - + ---------------------- Forward statistics for port 1 ---------------------- RX-packets: 0 RX-dropped: 0 RX-total: 0 TX-packets: 0 TX-dropped: 0 TX-total: 0 ---------------------------------------------------------------------------- 8. delete the rule 256 and 257:: - + flow destroy 0 rule 256 flow destroy 0 rule 257 @@ -542,7 +542,7 @@ while we can create 256 ipv4-udp/ipv4-tcp/ipv4-sctp rules at most. 9. create the rule in the step6 again, check the rule can be created as acl rule successfully. list the rules, there are rule 0-256 listed. - + 10.send packet2 again, check the packet dropped. stop the forward:: ---------------------- Forward statistics for port 1 ---------------------- @@ -565,7 +565,7 @@ Test Case 6: max entry number ipv4-other flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.255 / end actions drop / end 3. create 64 ipv4-other ACL rules:: - + flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.0.255 / end actions drop / end flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.2 src mask 255.255.0.255 / end actions drop / end flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.3 src mask 255.255.0.255 / end actions drop / end @@ -599,12 +599,12 @@ Test Case 6: max entry number ipv4-other sendp([Ether(dst="00:01:23:45:67:89")/IP(src="192.168.0.2", dst="192.168.1.2")/Raw(load='X'*30)], iface="enp134s0f1") check the packet can't be received by vf1. stop forward:: - + ---------------------- Forward statistics for port 1 ---------------------- RX-packets: 0 RX-dropped: 0 RX-total: 0 TX-packets: 0 TX-dropped: 0 TX-total: 0 ---------------------------------------------------------------------------- - + 8. delete the rule 64 and 65:: flow destroy 0 rule 64