From patchwork Fri Jan 13 13:05:33 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Huang, ZhiminX" X-Patchwork-Id: 121994 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 9993D423BC; Fri, 13 Jan 2023 05:46:20 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 9640E410EF; Fri, 13 Jan 2023 05:46:20 +0100 (CET) Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by mails.dpdk.org (Postfix) with ESMTP id 5ADC5410D4 for ; Fri, 13 Jan 2023 05:46:18 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673585178; x=1705121178; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=7aT1SlcFuV/+ekPSAVS+vRP95Y2hhn5tPzm//fcGg6c=; b=Iek2xZhhIiYXFHuujJiIaToL0kGDXhKBTc9fKjIjAjxAm2+vZTRHw8s0 mvSr5sJ40zK27mz1oPeChsZtIlQG/q1MF02CO2qPv/lyQvAEBXep56cNb W6QBFSbV/vav630Q/K8isk+Ec3J/3ogO6oeQwV+78L850c5hHIa8nEzZ2 a7wsGHJ/VkYLEPG3qGYZqsZW4Q3EFkbrgv5XYZLnOoZlG8hS2HKu0oKNZ n6rJZmGwYavsKWMlGyP479yL2Xz/2vxQ8oU/oUh2800tPOnya7YnSZ8sr HCd5JXdrb8AJdW3KkgnpJFVVM1UZaqsjA3jVMPm0XxAJfF3kCDnbiicZu A==; X-IronPort-AV: E=McAfee;i="6500,9779,10588"; a="323973110" X-IronPort-AV: E=Sophos;i="5.97,212,1669104000"; d="scan'208";a="323973110" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Jan 2023 20:46:17 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10588"; a="782040296" X-IronPort-AV: E=Sophos;i="5.97,212,1669104000"; d="scan'208";a="782040296" Received: from unknown (HELO localhost.localdomain) ([10.239.252.96]) by orsmga004-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Jan 2023 20:46:15 -0800 From: Zhimin Huang To: dts@dpdk.org Cc: Zhimin Huang Subject: [dts][PATCH V1] vf_vlan/vf_vlan_rx:modify code to adapt avx2 and avx512 on vlan offload Date: Fri, 13 Jan 2023 13:05:33 +0000 Message-Id: <20230113130533.982024-1-zhiminx.huang@intel.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org base on dts commit 92e12676d29341695d86ef8ee8e36d4014d56e98,missing vf_vlan_rx test case modification. add parameter "--enable-hw-vlan" in testpmd. the dpdk commit 5cbfb386aa3f4c49b3cd9579e4e928cc5ab08d35 fixed avx2 not support this parameter. the avx2 behavior is not appropriate,it has gap between avx2 and avx512, this feature will be implemetned in the future. so we add parameter "enable-hw-vlan" in testpmd,there is no gap in avx2 and avx512 to test vlan strip. Signed-off-by: Zhimin Huang --- test_plans/vf_vlan_test_plan.rst | 17 +++++++++-------- tests/TestSuite_vf_vlan.py | 3 ++- 2 files changed, 11 insertions(+), 9 deletions(-) diff --git a/test_plans/vf_vlan_test_plan.rst b/test_plans/vf_vlan_test_plan.rst index 8612bd84..0cf946d0 100644 --- a/test_plans/vf_vlan_test_plan.rst +++ b/test_plans/vf_vlan_test_plan.rst @@ -68,7 +68,13 @@ Prerequisites testpmd> set verbose 1 testpmd> start - if test DCF, set VF port to dcf and start up:: +.. note:: + according to dpdk commit 5cbfb386aa3f4c49b3cd9579e4e928cc5ab08d35,if not add parameter "enable-hw-vlan", the vlan + offload should be disable.the avx2 behavior is not appropriate, the avx2 and avx512 shouldn't have gap on vlan + offload.this feature will be implemetned in the future.so add parameter "--enable-hw-vlan" in testpmd to test vlan + strip. + +if test DCF, set VF port to dcf and start up:: Enable kernel trust mode: @@ -155,7 +161,7 @@ Test case4: VF tagged vlan rx 1. Make sure port based vlan disabled on VF0 and VF1 -2. Start testpmd with rxonly mode:: +2. Start testpmd with rxonly mode and parameter "--enable-hw-vlan":: testpmd> set fwd rxonly testpmd> set verbose 1 @@ -186,12 +192,7 @@ Test case4: VF tagged vlan rx Test case5: VF Vlan strip test ============================== -.. note:: - according to dpdk commit 5cbfb386aa3f4c49b3cd9579e4e928cc5ab08d35,if not add parameter "enable-hw-vlan", the vlan - offload should be disable.the avx2 behavior is not appropriate, the avx2 and avx512 shouldn't have gap on vlan - offload. so add parameter "--enable-hw-vlan" in testpmd to test vlan strip. - -1. Start testpmd with mac forward mode:: +1. Start testpmd with mac forward mode and parameter "--enable-hw-vlan":: testpmd> set fwd mac testpmd> set verbose 1 diff --git a/tests/TestSuite_vf_vlan.py b/tests/TestSuite_vf_vlan.py index 14c675c7..563d06b6 100644 --- a/tests/TestSuite_vf_vlan.py +++ b/tests/TestSuite_vf_vlan.py @@ -344,7 +344,8 @@ class TestVfVlan(TestCase): self.vm0_dut_ports = self.vm_dut_0.get_ports("any") self.vm0_testpmd = PmdOutput(self.vm_dut_0) - self.launch_testpmd(dcf_flag=self.dcf_mode) + param = "--enable-hw-vlan" if not self.dcf_mode else "" + self.launch_testpmd(dcf_flag=self.dcf_mode, param=param) self.vm0_testpmd.execute_cmd("set fwd rxonly") self.vm0_testpmd.execute_cmd("set verbose 1") self.vm0_testpmd.execute_cmd("vlan set strip on 0")