From patchwork Wed Jan 11 10:38:54 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Jiale, SongX" X-Patchwork-Id: 121800 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 70CDB42380; Wed, 11 Jan 2023 03:41:17 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 67F2B40E25; Wed, 11 Jan 2023 03:41:17 +0100 (CET) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id 42F004021E for ; Wed, 11 Jan 2023 03:41:15 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673404875; x=1704940875; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=WRBNM1ZXbb5u4utF9o+nuTVxJLlW8cxUJouss3I9HcA=; b=U6EWGbR+dM5uoUW61XTf3KkjyzROf3reF8NKTk/JSlAWJjOhQpRbirbu sTS6pG6aqJggcS6ADAJ/jK3jr+HWAEvspPU7Pf7P7mllK07Qkwb9uvqI8 GgQMh5nKjrKWlpITjCf8bufs3nZlLEcr2Dp3q3sO3j45OdcthuwOxb+eB drOvkZhp5hDCQDOabMXb5p52sEg5OsoiFeM1LV7z3ytWw7GN9cd8HZSn6 0sT2HEBxpwFLjx2yNwlXQpeBqkQAL+CZTAY82He+k2m2ccdk1hgI7ltUJ TAWeVgrb7/OE3xo91eCDPIvXsTqOmp06XRcoC0hG1k9/dcwHQSKg/UIBI g==; X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="350541474" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="350541474" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2023 18:41:14 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="764985905" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="764985905" Received: from unknown (HELO localhost.localdomain) ([10.239.252.20]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2023 18:41:13 -0800 From: Song Jiale To: dts@dpdk.org Cc: Song Jiale Subject: [dts] [PATCH V2 1/5] tests/ice_dcf_dual_vlan: split the ice_qinq suite Date: Wed, 11 Jan 2023 10:38:54 +0000 Message-Id: <20230111103858.970228-2-songx.jiale@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230111103858.970228-1-songx.jiale@intel.com> References: <20230111103858.970228-1-songx.jiale@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org split dcf cases in ice_qinq to ice_dcf_dual_vlan and delete ice_qinq suite. Signed-off-by: Song Jiale --- ...qinq.py => TestSuite_ice_dcf_dual_vlan.py} | 653 ++++-------------- 1 file changed, 144 insertions(+), 509 deletions(-) rename tests/{TestSuite_ice_qinq.py => TestSuite_ice_dcf_dual_vlan.py} (67%) diff --git a/tests/TestSuite_ice_qinq.py b/tests/TestSuite_ice_dcf_dual_vlan.py similarity index 67% rename from tests/TestSuite_ice_qinq.py rename to tests/TestSuite_ice_dcf_dual_vlan.py index 5f01dfef..fc633364 100644 --- a/tests/TestSuite_ice_qinq.py +++ b/tests/TestSuite_ice_dcf_dual_vlan.py @@ -2,7 +2,6 @@ # Copyright(c) 2021-2022 Intel Corporation # -import random import re import time @@ -11,7 +10,7 @@ from framework.pmd_output import PmdOutput from framework.test_case import TestCase, check_supported_nic, skip_unsupported_pkg from framework.utils import GREEN, RED -from .rte_flow_common import RssProcessing +from .rte_flow_common import FdirProcessing mac_qinq_ipv4_pay_src_ip = { "name": "mac_qinq_ipv4_pay_src_ip", @@ -403,7 +402,7 @@ tv_mac_qinq_ipv6_tcp = { tvs_mac_l4_qinq_dcf_pipeline_mode = [tv_mac_qinq_ipv6_udp, tv_mac_qinq_ipv6_tcp] -class TestICEQinq(TestCase): +class TestICEDcfDualVlan(TestCase): @check_supported_nic( [ "ICE_25G-E810C_SFP", @@ -445,6 +444,9 @@ class TestICEQinq(TestCase): self.path = self.dut.apps_name["test-pmd"] self.pkt = Packet() self.pmd_output = PmdOutput(self.dut) + self.fdirprocess = FdirProcessing( + self, self.pmd_output, [self.tester_iface0], rxq=8 + ) def reload_ice(self): self.dut.send_expect("rmmod ice && modprobe ice", "# ") @@ -462,35 +464,28 @@ class TestICEQinq(TestCase): "# ", ) - def setup_pf_vfs_env(self, vfs_num=4): - + def setup_1pf_4vfs_env(self): if self.vf_flag is False: self.dut.generate_sriov_vfs_by_port( - self.used_dut_port, vfs_num, driver=self.kdriver + self.used_dut_port, 4, driver=self.kdriver ) self.sriov_vfs_port = self.dut.ports_info[self.used_dut_port]["vfs_port"] self.vf_flag = True - if vfs_num > 1: - self.dut.send_expect( - "ip link set %s vf 0 trust on" % (self.pf_interface), "# " - ) - self.dut.send_expect( - "ip link set %s vf 1 mac %s" % (self.pf_interface, self.vf1_mac), - "# ", - ) - self.dut.send_expect( - "ip link set %s vf 2 mac %s" % (self.pf_interface, self.vf2_mac), - "# ", - ) - self.dut.send_expect( - "ip link set %s vf 3 mac %s" % (self.pf_interface, self.vf3_mac), - "# ", - ) - else: - self.dut.send_expect( - "ip link set %s vf 0 mac %s" % (self.pf_interface, self.vf1_mac), - "# ", - ) + self.dut.send_expect( + "ip link set %s vf 0 trust on" % (self.pf_interface), "# " + ) + self.dut.send_expect( + "ip link set %s vf 1 mac %s" % (self.pf_interface, self.vf1_mac), + "# ", + ) + self.dut.send_expect( + "ip link set %s vf 2 mac %s" % (self.pf_interface, self.vf2_mac), + "# ", + ) + self.dut.send_expect( + "ip link set %s vf 3 mac %s" % (self.pf_interface, self.vf3_mac), + "# ", + ) try: for port in self.sriov_vfs_port: @@ -502,16 +497,15 @@ class TestICEQinq(TestCase): self.dut.send_expect( "ip link set dev %s vf 0 spoofchk off" % self.pf_interface, "# " ) - if vfs_num == 4: - self.dut.send_expect( - "ip link set dev %s vf 1 spoofchk off" % self.pf_interface, "# " - ) - self.dut.send_expect( - "ip link set dev %s vf 2 spoofchk off" % self.pf_interface, "# " - ) - self.dut.send_expect( - "ip link set dev %s vf 3 spoofchk off" % self.pf_interface, "# " - ) + self.dut.send_expect( + "ip link set dev %s vf 1 spoofchk off" % self.pf_interface, "# " + ) + self.dut.send_expect( + "ip link set dev %s vf 2 spoofchk off" % self.pf_interface, "# " + ) + self.dut.send_expect( + "ip link set dev %s vf 3 spoofchk off" % self.pf_interface, "# " + ) except Exception as e: self.destroy_iavf() raise Exception(e) @@ -521,141 +515,61 @@ class TestICEQinq(TestCase): self.dut.destroy_sriov_vfs_by_port(self.used_dut_port) self.vf_flag = False - def launch_testpmd(self, vfs_num=4, dcf_param=False): - if dcf_param: - port_options = {self.pci_list[0]: "cap=dcf,representor=[1]"} + def launch_testpmd(self, pipline_mode=False): + if pipline_mode: + port_options = { + self.pci_list[0]: "cap=dcf,representor=[1],pipeline-mode-support=1" + } else: - port_options = {self.pci_list[0]: "cap=dcf"} - if vfs_num > 1: - param = " " - self.pmd_output.start_testpmd( - cores="1S/4C/1T", - param=param, - ports=self.pci_list, - socket=self.ports_socket, - port_options=port_options, - ) - else: - param = "--rxq=16 --txq=16" - self.pmd_output.start_testpmd( - cores="1S/4C/1T", - param=param, - ports=self.pci_list, - socket=self.ports_socket, - ) - self.confing_testpmd(vfs_num, dcf_param) + port_options = {self.pci_list[0]: "cap=dcf,representor=[1]"} + param = " " + self.pmd_output.start_testpmd( + cores="1S/4C/1T", + param=param, + ports=self.pci_list, + socket=self.ports_socket, + port_options=port_options, + ) + self.confing_testpmd() - def confing_testpmd(self, vfs_num, dcf_param): + def confing_testpmd(self): driver_type = "Device name.*?%s.*?\n(.*)" % self.sriov_vfs_port[0].pci - if dcf_param or vfs_num == 1: - flow_type = "mac" - if vfs_num > 1: - output = self.pmd_output.execute_cmd("show port info all") - out = re.findall(driver_type, output) - self.verify(len(out) == 2, "port0 and port1 driver not is net_ice_dcf") - else: - flow_type = "rxonly" - output = self.pmd_output.execute_cmd("show port info 0") - out = re.findall(driver_type, output) - self.verify(len(out) == 1, "vf0 driver not is net_ice_dcf") - self.pmd_output.execute_cmd("set fwd %s" % flow_type) + output = self.pmd_output.execute_cmd("show port info all") + out = re.findall(driver_type, output) + self.verify(len(out) == 2, "port0 and port1 driver not is net_ice_dcf") + self.pmd_output.execute_cmd("set fwd mac") self.pmd_output.execute_cmd("set verbose 1") self.pmd_output.execute_cmd("start") - def create_switch_rule(self, rule, session_name="", check_stats=True): - if session_name == "": - session_name = self.pmd_output - p = re.compile(r"Flow rule #(\d+) created") - rule_list = [] - if isinstance(rule, list): - for rule in rule: - out = session_name.execute_cmd(rule) # create a rule - m = p.search(out) - if m: - rule_list.append(m.group(1)) - else: - rule_list.append(False) - else: - out = session_name.execute_cmd(rule) # create a rule - m = p.search(out) - if m: - rule_list.append(m.group(1)) - else: - rule_list.append(False) - if check_stats: - self.verify( - all(rule_list), - "some rules not created successfully, result %s, rule %s" - % (rule_list, rule), - ) - else: - self.verify( - not any(rule_list), - "all rules should create failed, result %s" % rule_list, - ) - return rule_list - - def check_switch_rule(self, port_id=0, stats=True, rule_list=None): - out = self.pmd_output.execute_cmd("flow list %s" % port_id) - p = re.compile(r"ID\s+Group\s+Prio\s+Attr\s+Rule") - matched = p.search(out) - if stats: - self.verify(matched, "flow rule on port %s is not existed" % port_id) - if rule_list: - p = re.compile("^(\d+)\s") - li = out.splitlines() - res = list(filter(bool, list(map(p.match, li)))) - result = [i.group(1) for i in res] - self.verify( - sorted(result) == sorted(rule_list), - "check rule list failed. expect %s, result %s" - % (rule_list, result), - ) - else: - self.verify(not matched, "flow rule on port %s is existed" % port_id) - - def destroy_switch_rule(self, port_id=0, rule_id=None): - if rule_id is None: - rule_id = 0 - if isinstance(rule_id, list): - for i in rule_id: - out = self.dut.send_command( - "flow destroy %s rule %s" % (port_id, i), timeout=1 - ) - p = re.compile(r"Flow rule #(\d+) destroyed") - m = p.search(out) - self.verify(m, "flow rule %s delete failed" % rule_id) - else: - out = self.dut.send_command( - "flow destroy %s rule %s" % (port_id, rule_id), timeout=1 - ) - p = re.compile(r"Flow rule #(\d+) destroyed") - m = p.search(out) - self.verify(m, "flow rule %s delete failed" % rule_id) - self.check_switch_rule(stats=False) + def reset_vf(self): + self.pmd_output.execute_cmd("port stop 2") + self.pmd_output.execute_cmd("port reset 2") + self.pmd_output.execute_cmd("port start 2") + self.pmd_output.execute_cmd("start") - def send_packets(self, pkts, tx_port=None, count=1): - self.pkt.update_pkt(pkts) - tx_port = self.tester_iface0 if not tx_port else tx_port - self.pkt.send_pkt(crb=self.tester, tx_port=tx_port, count=count) + def tcpdump_send_packet_get_output(self, pkt): + self.tester.send_expect("rm -rf getPackageByTcpdump.pcap", "# ") + self.tester.send_expect( + "tcpdump -A -nn -e -vv -w getPackageByTcpdump.pcap -i %s 2> /dev/null& " + % (self.tester_iface0), + "#", + ) + time.sleep(2) + out1 = self.fdirprocess.send_pkt_get_out(pkt) + out2 = self.pmd_output.execute_cmd("show port stats 0") + out = out1 + out2 + self.tester.send_expect("killall tcpdump", "# ") + tcpdump_out = self.tester.send_expect( + "tcpdump -A -nn -vv -er getPackageByTcpdump.pcap", "# " + ) - def send_pkts_getouput(self, pkts, port_id=0, count=1): - tx_port = self.tester_iface0 if port_id == 0 else self.tester_iface1 - self.send_packets(pkts, tx_port=tx_port, count=count) - time.sleep(0.5) - out = self.pmd_output.get_output() - port_stats = self.pmd_output.execute_cmd("show port stats all") - self.pmd_output.execute_cmd("clear port stats all") - self.pmd_output.execute_cmd("stop") - self.pmd_output.execute_cmd("start") - return out + port_stats + return (out, tcpdump_out) def check_packets(self, out, port_id, pkt_num=1, check_stats=True): p = "port (\d+)/queue.*" result_list = re.findall(p, out) self.verify( - len(result_list) == pkt_num, - "received %s packets, expected to %s packets" % (result_list, pkt_num), + len(result_list) == pkt_num, "received packets mismatch".format(port_id) ) for res in result_list: if check_stats: @@ -675,20 +589,22 @@ class TestICEQinq(TestCase): self.logger.info((GREEN("========test subcase: %s========" % test["name"]))) try: port_id = test["check_param"]["port_id"] - rule_list = self.create_switch_rule(test["rule"]) - self.check_switch_rule() + self.fdirprocess.validate_rule(test["rule"], check_stats=True) + rule_list = self.fdirprocess.create_rule(test["rule"], check_stats=True) + self.fdirprocess.check_rule(0, stats=True, rule_list=rule_list) # send matched packets and check matched_packets = test["scapy_str"]["matched"] - out = self.send_pkts_getouput(matched_packets) + out = self.fdirprocess.send_pkt_get_out(matched_packets) self.check_packets(out, port_id, len(matched_packets)) # send mismatched packets and check mismatched_packets = test["scapy_str"]["mismatched"] - out = self.send_pkts_getouput(mismatched_packets) + out = self.fdirprocess.send_pkt_get_out(mismatched_packets) self.check_packets( out, port_id, len(mismatched_packets), check_stats=False ) - self.destroy_switch_rule() - out = self.send_pkts_getouput(matched_packets) + self.fdirprocess.destroy_rule(0, rule_list) + self.fdirprocess.check_rule(0, stats=False, rule_list=rule_list) + out = self.fdirprocess.send_pkt_get_out(matched_packets) self.check_packets( out, port_id, len(matched_packets), check_stats=False ) @@ -696,8 +612,8 @@ class TestICEQinq(TestCase): self.logger.info((GREEN("subcase passed: %s" % test["name"]))) except Exception as e: self.logger.warning((RED(e))) - self.dut.send_command("flow flush 0", timeout=1) - self.dut.send_command("flow flush 1", timeout=1) + self.dut.send_command("flow flush 0") + self.dut.send_command("flow flush 1") test_results[test["name"]] = False self.logger.info((RED("subcase failed: %s" % test["name"]))) continue @@ -707,104 +623,80 @@ class TestICEQinq(TestCase): failed_cases.append(k) self.verify(all(test_results.values()), "{} failed.".format(failed_cases)) - def start_tcpdump(self, rxItf): - self.tester.send_expect("rm -rf getPackageByTcpdump.pcap", "#") - self.tester.send_expect( - "tcpdump -A -nn -e -vv -w getPackageByTcpdump.pcap -i %s 2> /dev/null& " - % rxItf, - "#", - ) - time.sleep(2) - - def get_tcpdump_package(self): - time.sleep(1) - self.tester.send_expect("killall tcpdump", "#") - return self.tester.send_expect( - "tcpdump -A -nn -e -vv -r getPackageByTcpdump.pcap", "#" - ) - - def test_mac_qinq_ipv4_pay(self): + def test_dcf_mac_qinq_ipv4_pay(self): """ - DCF switch for MAC_QINQ_IPV4_PAY + Test case 01: DCF switch for MAC_QINQ_IPV4_PAY """ - self.setup_pf_vfs_env() - self.launch_testpmd(dcf_param=True) + self.setup_1pf_4vfs_env() + self.launch_testpmd() self._rte_flow_validate_pattern(mac_qinq_ipv4_pay) - def test_mac_qinq_ipv6_pay(self): + def test_dcf_mac_qinq_ipv6_pay(self): """ - DCF switch for MAC_QINQ_IPV6_PAY + Test case 02: DCF switch for MAC_QINQ_IPV6_PAY """ - self.setup_pf_vfs_env() - self.launch_testpmd(dcf_param=True) + self.setup_1pf_4vfs_env() + self.launch_testpmd() self._rte_flow_validate_pattern(mac_qinq_ipv6_pay) @skip_unsupported_pkg("os default") - def test_mac_qinq_pppoe_pay(self): + def test_dcf_mac_qinq_pppoe_pay(self): """ - DCF switch for MAC_QINQ_PPPOE_PAY + Test case 03: DCF switch for MAC_QINQ_PPPOE_PAY """ - self.setup_pf_vfs_env() - self.launch_testpmd(dcf_param=True) + self.setup_1pf_4vfs_env() + self.launch_testpmd() self._rte_flow_validate_pattern(mac_qinq_pppoe_pay) @skip_unsupported_pkg("os default") - def test_mac_qinq_pppoe_pay_proto(self): + def test_dcf_mac_qinq_pppoe_pay_proto(self): """ - DCF switch for MAC_QINQ_PPPOE_PAY_Proto + Test case 04: DCF switch for MAC_QINQ_PPPOE_PAY_Proto """ - self.setup_pf_vfs_env() - self.launch_testpmd(dcf_param=True) + self.setup_1pf_4vfs_env() + self.launch_testpmd() self._rte_flow_validate_pattern(mac_qinq_pppoe_proto) @skip_unsupported_pkg("os default") - def test_mac_qinq_pppoe_ipv4(self): + def test_dcf_mac_qinq_pppoe_ipv4(self): """ - DCF switch for MAC_QINQ_PPPOE_IPV4 + Test case 05: DCF switch for MAC_QINQ_PPPOE_IPV4 """ - self.setup_pf_vfs_env() - self.launch_testpmd(dcf_param=True) + self.setup_1pf_4vfs_env() + self.launch_testpmd() self._rte_flow_validate_pattern(mac_qinq_pppoe_ipv4) @skip_unsupported_pkg("os default") - def test_mac_qinq_pppoe_ipv6(self): + def test_dcf_mac_qinq_pppoe_ipv6(self): """ - DCF switch for MAC_QINQ_PPPOE_IPV6 + Test case 06: DCF switch for MAC_QINQ_PPPOE_IPV6 """ - self.setup_pf_vfs_env() - self.launch_testpmd(dcf_param=True) + self.setup_1pf_4vfs_env() + self.launch_testpmd() self._rte_flow_validate_pattern(mac_qinq_pppoe_ipv6) - def test_mac_l4_qinq_dcf_non_pipeline_mode(self): + def test_dcf_mac_l4_qinq_non_pipeline_mode(self): """ - DCF switch for MAC_L4_QINQ + Test case 07: DCF switch for MAC_L4_QINQ """ - self.setup_pf_vfs_env() - self.launch_testpmd(dcf_param=True) + self.setup_1pf_4vfs_env() + self.launch_testpmd() self._rte_flow_validate_pattern(tvs_mac_l4_qinq_dcf_non_pipeline_mode) - def test_mac_l4_qinq_dcf_pipeline_mode(self): + def test_dcf_mac_l4_qinq_pipeline_mode(self): """ - DCF switch for MAC_L4_QINQ_IPV6 + Test case 08: DCF switch for MAC_L4_QINQ_IPV6 """ - self.setup_pf_vfs_env() - self.launch_testpmd(dcf_param=True) + self.setup_1pf_4vfs_env() + self.launch_testpmd(pipline_mode=True) self._rte_flow_validate_pattern(tvs_mac_l4_qinq_dcf_pipeline_mode) - def reset_vf(self): - self.pmd_output.execute_cmd("port stop 2") - self.pmd_output.execute_cmd("port reset 2") - self.pmd_output.execute_cmd("port start 2") - self.pmd_output.execute_cmd("start") - def send_packet_check_vlan_strip(self, pkts, outer=False, inner=False): for pkt in pkts: pkt_index = pkts.index(pkt) - self.start_tcpdump(self.tester_iface0) - out = self.send_pkts_getouput(pkt) - self.check_packets(out, 2, pkt_num=1) - tcpdump_out = self.get_tcpdump_package() - vlan_list = re.findall("vlan \d+", tcpdump_out) + out, tcpdump_out = self.tcpdump_send_packet_get_output(pkt) + self.check_packets(out, port_id=2, pkt_num=1) + vlan_list = re.findall("vlan\s+\d+", tcpdump_out) if pkt_index == 1: vlan_num = 2 if outer or inner: @@ -820,9 +712,9 @@ class TestICEQinq(TestCase): len(vlan_list) == vlan_num, "received outer vlan packet error!!!" ) - def test_vlan_strip_in_pvid_enable(self): + def test_dcf_vlan_strip_in_pvid_enable(self): """ - vlan strip when pvid enable + Test case 09: DCF vlan strip when pvid enable """ pkts = [ 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' @@ -830,8 +722,8 @@ class TestICEQinq(TestCase): 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=21,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' % self.vf1_mac, ] - self.setup_pf_vfs_env() - self.launch_testpmd(dcf_param=True) + self.setup_1pf_4vfs_env() + self.launch_testpmd() self.pmd_output.execute_cmd("stop") self.pmd_output.execute_cmd("vlan set strip on 1") self.reset_vf() @@ -846,23 +738,21 @@ class TestICEQinq(TestCase): self.pmd_output.execute_cmd("vlan set strip on 2") self.send_packet_check_vlan_strip(pkts, outer=True, inner=True) self.pmd_output.execute_cmd("quit", "#") - self.launch_testpmd(dcf_param=True) + self.launch_testpmd() self.pmd_output.execute_cmd("stop") self.pmd_output.execute_cmd("vlan set strip on 2") self.pmd_output.execute_cmd("vlan set strip on 1") self.reset_vf() self.send_packet_check_vlan_strip(pkts, outer=True, inner=True) - def _send_packet_check_vlan_inter( + def send_packet_check_vlan_inter( self, pkts, out_vlan, port_id=3, vlan_header=None, iner_vlan=None ): for pkt in pkts: pkt_index = pkts.index(pkt) - self.start_tcpdump(self.tester_iface0) - out = self.send_pkts_getouput(pkt) + out, tcpdump_out = self.tcpdump_send_packet_get_output(pkt) self.check_packets(out, port_id) - p = "vlan (\d+)" - tcpdump_out = self.get_tcpdump_package() + p = "vlan\s+(\d+)" vlan_list = re.findall(p, tcpdump_out) if vlan_header: header = re.findall(vlan_header, tcpdump_out) @@ -921,9 +811,9 @@ class TestICEQinq(TestCase): "vlan header not matched, expect: %s." % vlan_header, ) - def test_vlan_insert_in_pvid_enable(self): + def test_dcf_vlan_insert_in_pvid_enable(self): """ - vlan insertion when pvid enable + Test case 10: DCF vlan insertion when pvid enable """ out_vlan = 24 iner_vlan = 11 @@ -934,45 +824,45 @@ class TestICEQinq(TestCase): 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' % self.vf2_mac, ] - self.setup_pf_vfs_env() - self.launch_testpmd(dcf_param=True) + self.setup_1pf_4vfs_env() + self.launch_testpmd() self.pmd_output.execute_cmd("stop") self.pmd_output.execute_cmd("tx_vlan set pvid 1 %d on" % out_vlan) self.reset_vf() - self._send_packet_check_vlan_inter(pkt_list, out_vlan, vlan_header=header) + self.send_packet_check_vlan_inter(pkt_list, out_vlan, vlan_header=header) header = "0x88a8" self.pmd_output.execute_cmd("stop") self.pmd_output.execute_cmd("vlan set outer tpid %s 1" % header) self.reset_vf() - self._send_packet_check_vlan_inter(pkt_list, out_vlan, vlan_header=header) + self.send_packet_check_vlan_inter(pkt_list, out_vlan, vlan_header=header) header = "0x9100" self.pmd_output.execute_cmd("stop") self.pmd_output.execute_cmd("vlan set outer tpid %s 1" % header) self.reset_vf() - self._send_packet_check_vlan_inter(pkt_list, out_vlan, vlan_header=header) + self.send_packet_check_vlan_inter(pkt_list, out_vlan, vlan_header=header) self.pmd_output.execute_cmd("stop") self.pmd_output.execute_cmd("port stop 2") self.pmd_output.execute_cmd("tx_vlan set 2 %d" % iner_vlan) self.pmd_output.execute_cmd("port start 2") self.pmd_output.execute_cmd("start") - self._send_packet_check_vlan_inter( + self.send_packet_check_vlan_inter( pkt_list, out_vlan, vlan_header=header, iner_vlan=iner_vlan ) self.pmd_output.execute_cmd("quit", "# ") - self.launch_testpmd(dcf_param=True) + self.launch_testpmd() self.pmd_output.execute_cmd("stop") self.pmd_output.execute_cmd("port stop 2") self.pmd_output.execute_cmd("tx_vlan set 2 %d" % iner_vlan) self.pmd_output.execute_cmd("port start 2") self.pmd_output.execute_cmd("tx_vlan set pvid 1 %d on" % out_vlan) self.reset_vf() - self._send_packet_check_vlan_inter( + self.send_packet_check_vlan_inter( pkt_list, out_vlan, port_id=3, vlan_header=header, iner_vlan=iner_vlan ) - def test_vlan_filter_in_pvid_enable(self): + def test_dcf_vlan_filter_in_pvid_enable(self): """ - vlan filter when pvid enable + Test case 11: DCF vlan filter when pvid enable """ pkt_list1 = [ 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=11,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' @@ -991,281 +881,26 @@ class TestICEQinq(TestCase): "ethtool --set-priv-flags %s %s on" % (self.pf_interface, self.flag), "# ", ) - self.setup_pf_vfs_env() - self.launch_testpmd(dcf_param=True) + self.setup_1pf_4vfs_env() + self.launch_testpmd() self.pmd_output.execute_cmd("vlan set filter on 1") out = self.pmd_output.execute_cmd("rx_vlan add 11 1") self.verify("failed" in out, "add rx_vlan successfully for VF1 by representor") self.pmd_output.execute_cmd("vlan set filter on 2") self.pmd_output.execute_cmd("rx_vlan add 11 2") for pkt in pkt_list1: - out = self.send_pkts_getouput(pkt) + out = self.fdirprocess.send_pkt_get_out(pkt) self.check_packets(out, 2) for pkt in pkt_list2: - out = self.send_pkts_getouput(pkt) + out = self.fdirprocess.send_pkt_get_out(pkt) self.check_packets(out, 2, pkt_num=0, check_stats=False) self.pmd_output.execute_cmd("rx_vlan rm 11 2") for pkt in pkt_list1: - out = self.send_pkts_getouput(pkt) + out = self.fdirprocess.send_pkt_get_out(pkt) self.check_packets(out, 2, pkt_num=0, check_stats=False) - def check_vlan_offload(self, vlan_type, stats): - p = "VLAN offload.*\n.*?%s (\w+)" % vlan_type - out = self.pmd_output.execute_cmd("show port info 0") - vlan_stats = re.search(p, out).group(1) - self.verify(vlan_stats == stats, "VLAN stats mismatch") - - def test_enable_disable_iavf_vlan_filter(self): - """ - Enable/Disable IAVF VLAN filtering - """ - pkt_list1 = [ - 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' - % self.vf1_mac, - 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' - % self.vf1_mac, - ] - pkt_list2 = [ - 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=11,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' - % self.vf1_mac, - 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=11,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' - % self.vf1_mac, - ] - if self.default_stats: - self.dut.send_expect( - "ethtool --set-priv-flags %s %s on" % (self.pf_interface, self.flag), - "# ", - ) - self.setup_pf_vfs_env(vfs_num=1) - self.launch_testpmd(vfs_num=1) - self.pmd_output.execute_cmd("vlan set filter on 0") - self.check_vlan_offload(vlan_type="filter", stats="on") - out = self.send_pkts_getouput(pkt_list1) - receive_pkt = re.findall("dst=%s" % self.vf1_mac, out) - self.verify(len(receive_pkt) == 0, "Failed error received vlan packet!") - - self.pmd_output.execute_cmd("rx_vlan add 1 0") - self.start_tcpdump(self.tester_iface0) - out = self.send_pkts_getouput(pkt_list1) - tcpdump_out = self.get_tcpdump_package() - receive_pkt = re.findall("dst=%s" % self.vf1_mac, out) - self.verify(len(receive_pkt) == 2, "Failed error received vlan packet!") - tester_pkt = re.findall("vlan \d+", tcpdump_out) - self.verify(len(tester_pkt) == 6, "Failed pass received vlan packet!") - - out = self.send_pkts_getouput(pkt_list2) - receive_pkt = re.findall("dst=%s" % self.vf1_mac, out) - self.verify(len(receive_pkt) == 0, "Failed error received vlan packet!") - - self.pmd_output.execute_cmd("rx_vlan rm 1 0") - out = self.send_pkts_getouput(pkt_list1) - receive_pkt = re.findall("dst=%s" % self.vf1_mac, out) - self.verify(len(receive_pkt) == 0, "Failed error received vlan packet!") - - def test_enable_disable_iavf_vlan_strip(self): - """ - Enable/Disable IAVF VLAN header stripping - """ - pkt_list = [ - 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' - % self.vf1_mac, - 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' - % self.vf1_mac, - ] - if self.default_stats: - self.dut.send_expect( - "ethtool --set-priv-flags %s %s on" % (self.pf_interface, self.flag), - "# ", - ) - self.setup_pf_vfs_env(vfs_num=1) - self.launch_testpmd(vfs_num=1) - self.pmd_output.execute_cmd("vlan set filter on 0") - self.pmd_output.execute_cmd("rx_vlan add 1 0") - self.check_vlan_offload(vlan_type="filter", stats="on") - self.pmd_output.execute_cmd("vlan set strip on 0") - self.check_vlan_offload(vlan_type="strip", stats="on") - - self.start_tcpdump(self.tester_iface0) - out = self.send_pkts_getouput(pkt_list) - tcpdump_out = self.get_tcpdump_package() - receive_pkt = re.findall("dst=%s" % self.vf1_mac, out) - self.verify(len(receive_pkt) == 2, "Failed error received vlan packet!") - tester_pkt = re.findall("vlan \d+", tcpdump_out) - self.verify(len(tester_pkt) == 4, "Failed pass received vlan packet!") - - self.pmd_output.execute_cmd("vlan set strip off 0") - self.check_vlan_offload(vlan_type="strip", stats="off") - self.start_tcpdump(self.tester_iface0) - out = self.send_pkts_getouput(pkt_list) - tcpdump_out = self.get_tcpdump_package() - receive_pkt = re.findall("dst=%s" % self.vf1_mac, out) - self.verify(len(receive_pkt) == 2, "Failed error received vlan packet!") - tester_pkt = re.findall("vlan \d+", tcpdump_out) - self.verify(len(tester_pkt) == 6, "Failed pass received vlan packet!") - - def test_enable_disable_iavf_vlan_insert(self): - """ - Enable/Disable IAVF VLAN header insertion - """ - out_vlan = 1 - pkt_list = [ - 'Ether(dst="%s",type=0x0800)/IP(src="196.222.232.221")/("X"*480)' - % self.vf1_mac, - 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=11,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' - % self.vf1_mac, - ] - if self.default_stats: - self.dut.send_expect( - "ethtool --set-priv-flags %s %s off" % (self.pf_interface, self.flag), - "# ", - ) - self.setup_pf_vfs_env(vfs_num=1) - self.launch_testpmd(vfs_num=1) - self.pmd_output.execute_cmd("stop") - self.pmd_output.execute_cmd("port stop 0") - self.pmd_output.execute_cmd("tx_vlan set 0 1") - self.pmd_output.execute_cmd("port start 0") - self.pmd_output.execute_cmd("start") - self._send_packet_check_vlan_inter(pkt_list, out_vlan, port_id=0) - - self.pmd_output.execute_cmd("stop") - self.pmd_output.execute_cmd("port stop 0") - self.pmd_output.execute_cmd("tx_vlan reset 0") - self.pmd_output.execute_cmd("port start 0") - self.pmd_output.execute_cmd("start") - self._send_packet_check_vlan_inter(pkt_list, out_vlan=0, port_id=0) - - def _send_pkt_check_vlan_and_crc( - self, pkt, pkt_len=None, vlan_strip=False, crc_strip=False - ): - if pkt_len: - self.start_tcpdump(self.tester_iface0) - out = self.send_pkts_getouput(pkt) - pkt_length = re.search("length=(\d+)", out).group(1) - rx_bytes = re.search("RX-bytes:\s+(\d+)", out).group(1) - if crc_strip: - self.verify(rx_bytes == pkt_length, "CRC strip on failed") - else: - self.verify(int(rx_bytes) == int(pkt_length) + 4, "CRC strip off failed") - if pkt_len: - tcpdump_out = self.get_tcpdump_package() - vlan_list = re.findall("vlan\s+\d+", tcpdump_out) - if not vlan_strip: - self.verify(pkt_length == pkt_len, "vlan strip off failed") - self.verify(len(vlan_list) == 4, "Failed pass received vlan packet") - elif vlan_strip: - self.verify( - int(pkt_length) + 4 == int(pkt_len), "vlan strip off failed" - ) - self.verify( - len(vlan_list) == 3 and vlan_list[0] != vlan_list[-1], - "Failed error received vlan packet", - ) - - def test_enable_disable_iavf_CRC_strip(self): - """ - Enable/disable AVF CRC stripping - """ - param = "--rxq=16 --txq=16 --disable-crc-strip" - pkt = ( - 'Ether(dst="%s",type=0x0800)/IP(src="196.222.232.221")/("X"*480)' - % self.vf1_mac - ) - if self.default_stats: - self.dut.send_expect( - "ethtool --set-priv-flags %s %s on" % (self.pf_interface, self.flag), - "# ", - ) - self.setup_pf_vfs_env(vfs_num=1) - self.pmd_output.start_testpmd( - cores="1S/4C/1T", param=param, ports=self.pci_list, socket=self.ports_socket - ) - self.pmd_output.execute_cmd("set fwd mac") - self.pmd_output.execute_cmd("set verbose 1") - self.pmd_output.execute_cmd("start") - self._send_pkt_check_vlan_and_crc(pkt) - - self.pmd_output.execute_cmd("stop") - self.pmd_output.execute_cmd("port stop 0") - self.pmd_output.execute_cmd("port config 0 rx_offload keep_crc off") - self.pmd_output.execute_cmd("port start 0") - self.pmd_output.execute_cmd("start") - self._send_pkt_check_vlan_and_crc(pkt, crc_strip=True) - - self.pmd_output.execute_cmd("stop") - self.pmd_output.execute_cmd("port stop 0") - self.pmd_output.execute_cmd("port config 0 rx_offload keep_crc on") - self.pmd_output.execute_cmd("port start 0") - self.pmd_output.execute_cmd("start") - self._send_pkt_check_vlan_and_crc(pkt) - - self.pmd_output.execute_cmd("quit", "#") - self.launch_testpmd(vfs_num=1) - self.start_tcpdump(self.tester_iface0) - self._send_pkt_check_vlan_and_crc(pkt, crc_strip=True) - - def test_CRC_strip_iavf_vlan_strip_coexists(self): - """ - AVF CRC strip and Vlan strip co-exists - """ - pkt = ( - 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' - % self.vf1_mac - ) - if self.default_stats: - self.dut.send_expect( - "ethtool --set-priv-flags %s %s on" % (self.pf_interface, self.flag), - "# ", - ) - self.setup_pf_vfs_env(vfs_num=1) - self.launch_testpmd(vfs_num=1) - self.check_vlan_offload(vlan_type="strip", stats="off") - self.pmd_output.execute_cmd("stop") - self.pmd_output.execute_cmd("vlan set strip off 0") - self.check_vlan_offload(vlan_type="strip", stats="off") - self.pmd_output.execute_cmd("vlan set filter on 0") - self.pmd_output.execute_cmd("rx_vlan add 1 0") - self.pmd_output.execute_cmd("start") - - self.start_tcpdump(self.tester_iface0) - out = self.send_pkts_getouput(pkt) - tcpdump_out = self.get_tcpdump_package() - pkt_len = re.search("length=(\d+)", out).group(1) - vlan_list = re.findall("vlan\s+\d+", tcpdump_out) - self.verify(len(vlan_list) == 4, "vlan strip off failed") - rx_bytes = re.search("RX-bytes:\s+(\d+)", out).group(1) - tx_bytes = re.search("TX-bytes:\s+(\d+)", out).group(1) - self.verify(rx_bytes == tx_bytes == pkt_len, "CRC strip on failed") - - self.pmd_output.execute_cmd("vlan set strip on 0") - self.check_vlan_offload(vlan_type="strip", stats="on") - self._send_pkt_check_vlan_and_crc(pkt=pkt, pkt_len=pkt_len, vlan_strip=True) - - self.pmd_output.execute_cmd("vlan set strip off 0") - self.check_vlan_offload(vlan_type="strip", stats="off") - self.pmd_output.execute_cmd("stop") - self.pmd_output.execute_cmd("port stop 0") - self.pmd_output.execute_cmd("port config 0 rx_offload keep_crc on") - self.pmd_output.execute_cmd("port start 0") - self.pmd_output.execute_cmd("start") - self._send_pkt_check_vlan_and_crc(pkt=pkt, pkt_len=pkt_len) - - out = self.pmd_output.execute_cmd("vlan set strip on 0") - p = "iavf_config_vlan_strip_v2(): fail to execute command VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2" - self.verify(p in out, "set vlan strip on successfully") - self._send_pkt_check_vlan_and_crc(pkt=pkt, pkt_len=pkt_len) - - self.pmd_output.execute_cmd("vlan set strip off 0") - self.check_vlan_offload(vlan_type="strip", stats="off") - self.pmd_output.execute_cmd("stop") - self.pmd_output.execute_cmd("port stop 0") - self.pmd_output.execute_cmd("port config 0 rx_offload keep_crc off") - self.pmd_output.execute_cmd("port start 0") - self.pmd_output.execute_cmd("start") - self._send_pkt_check_vlan_and_crc(pkt=pkt, pkt_len=pkt_len, crc_strip=True) - def tear_down(self): - self.pmd_output.execute_cmd("quit", "#") + self.pmd_output.quit() self.dut.kill_all() self.destroy_iavf() From patchwork Wed Jan 11 10:38:55 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Jiale, SongX" X-Patchwork-Id: 121801 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 9762242380; Wed, 11 Jan 2023 03:41:18 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 9183642C24; Wed, 11 Jan 2023 03:41:18 +0100 (CET) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id A6A864021E for ; Wed, 11 Jan 2023 03:41:16 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673404876; x=1704940876; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=XxYBeGVhvjdkiVFIXj1y6401rPNbFMXw5H7fNSPY1TI=; b=fIKkxTcJ5T4VXiimQ0cg6LSRElHWDkSAIR72C8tc4RXbyfzK8snC/WiG ushrIrbx0Tb8i16cEXIuq2iYtkNdKvqknaGj/PN/tNL7sFeXJ2t03ki1c sQ0O07zN040kdLlFErui8ywaS8h4QBJphfSDg3+ssTmSZDP4pqU0hE7uC UG7khh4YmyoVyU9eSleUSeNBn8XmGt146ycNNqDa2l45eAniBzuVc8Nuq nKuk/fcoYm9pByq5S6BX5WGNAJDmDO8+SxHTIL/nB6bEmLgwe8DKtUF8C 9iJeye958XCdnoY4pWCudLi1sGgaEi0jH1f4McdmBijvQG3gIrARgJYQH A==; X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="350541475" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="350541475" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2023 18:41:16 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="764985936" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="764985936" Received: from unknown (HELO localhost.localdomain) ([10.239.252.20]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2023 18:41:15 -0800 From: Song Jiale To: dts@dpdk.org Cc: Song Jiale Subject: [dts] [PATCH V2 2/5] tests/kernelpf_iavf: split the test suite of ice_qinq Date: Wed, 11 Jan 2023 10:38:55 +0000 Message-Id: <20230111103858.970228-3-songx.jiale@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230111103858.970228-1-songx.jiale@intel.com> References: <20230111103858.970228-1-songx.jiale@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org split iavf cases in ice_qinq to kernelpf_iavf. Signed-off-by: Song Jiale --- tests/TestSuite_kernelpf_iavf.py | 361 ++++++++++++++++++++++++++++++- 1 file changed, 360 insertions(+), 1 deletion(-) diff --git a/tests/TestSuite_kernelpf_iavf.py b/tests/TestSuite_kernelpf_iavf.py index d8a3f55c..9089b511 100644 --- a/tests/TestSuite_kernelpf_iavf.py +++ b/tests/TestSuite_kernelpf_iavf.py @@ -17,7 +17,7 @@ import framework.utils as utils from framework.packet import Packet from framework.pmd_output import PmdOutput from framework.settings import DPDK_DCFMODE_SETTING, load_global_setting -from framework.test_case import TestCase +from framework.test_case import TestCase, check_supported_nic from framework.utils import RED from framework.virt_common import VM @@ -30,6 +30,12 @@ ETHER_JUMBO_FRAME_MTU = 9000 class TestKernelpfIavf(TestCase): supported_vf_driver = ["pci-stub", "vfio-pci"] + ice_nic = [ + "ICE_25G-E810C_SFP", + "ICE_100G-E810C_QSFP", + "ICE_25G-E810_XXV_SFP", + "ICE_25G-E823C_QSFP", + ] def set_up_all(self): self.dut_ports = self.dut.get_ports(self.nic) @@ -835,6 +841,359 @@ class TestKernelpfIavf(TestCase): packets = len(re.findall("received 1 packets", out)) self.verify(packets == 10, "Not receive expected packet") + @check_supported_nic(ice_nic) + def test_iavf_dual_vlan_filter(self): + """ + Test case: IAVF DUAL VLAN filtering + """ + self.skip_case(not self.dcf_mode, "the case not support dcf mode") + pkt_list1 = [ + 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' + % self.vf_mac, + 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' + % self.vf_mac, + ] + pkt_list2 = [ + 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=11,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' + % self.vf_mac, + 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=11,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' + % self.vf_mac, + ] + self.launch_testpmd(dcf_flag=self.dcf_mode) + if self.dcf_mode: + self.vm_testpmd.execute_cmd("set promisc all off") + self.vm_testpmd.execute_cmd("set fwd mac") + self.vm_testpmd.execute_cmd("set verbose 1") + self.vm_testpmd.execute_cmd("start") + self.vm_testpmd.execute_cmd("vlan set filter on 0") + self.check_vlan_offload(vlan_type="filter", stats="on") + out = self.send_pkts_getouput(self.tester_intf, pkt_list1) + receive_pkt = re.findall("dst=%s" % self.vf_mac, out) + self.verify(len(receive_pkt) == 0, "Failed error received vlan packet!") + + self.vm_testpmd.execute_cmd("rx_vlan add 1 0") + self.start_tcpdump(self.tester_intf) + out = self.send_pkts_getouput(self.tester_intf, pkt_list1) + tcpdump_out = self.get_tcpdump_package() + receive_pkt = re.findall("dst=%s" % self.vf_mac, out) + self.verify(len(receive_pkt) == 2, "Failed error received vlan packet!") + tester_pkt = re.findall("vlan \d+", tcpdump_out) + self.verify(len(tester_pkt) == 6, "Failed pass received vlan packet!") + + out = self.send_pkts_getouput(self.tester_intf, pkt_list2) + receive_pkt = re.findall("dst=%s" % self.vf_mac, out) + self.verify(len(receive_pkt) == 0, "Failed error received vlan packet!") + + self.vm_testpmd.execute_cmd("rx_vlan rm 1 0") + out = self.send_pkts_getouput(self.tester_intf, pkt_list1) + receive_pkt = re.findall("dst=%s" % self.vf_mac, out) + self.verify(len(receive_pkt) == 0, "Failed error received vlan packet!") + + @check_supported_nic(ice_nic) + def test_iavf_dual_vlan_strip(self): + """ + Test case: IAVF DUAL VLAN header stripping + """ + self.skip_case(not self.dcf_mode, "the case not support dcf mode") + pkt_list = [ + 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' + % self.vf_mac, + 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' + % self.vf_mac, + ] + self.launch_testpmd(dcf_flag=self.dcf_mode) + self.vm_testpmd.execute_cmd("set fwd mac") + self.vm_testpmd.execute_cmd("set verbose 1") + self.vm_testpmd.execute_cmd("start") + self.vm_testpmd.execute_cmd("vlan set filter on 0") + self.vm_testpmd.execute_cmd("rx_vlan add 1 0") + self.check_vlan_offload(vlan_type="filter", stats="on") + self.vm_testpmd.execute_cmd("vlan set strip on 0") + self.check_vlan_offload(vlan_type="strip", stats="on") + + self.start_tcpdump(self.tester_intf) + out = self.send_pkts_getouput(self.tester_intf, pkt_list) + tcpdump_out = self.get_tcpdump_package() + receive_pkt = re.findall("dst=%s" % self.vf_mac, out) + self.verify(len(receive_pkt) == 2, "Failed error received vlan packet!") + tester_pkt = re.findall("vlan \d+", tcpdump_out) + self.verify(len(tester_pkt) == 4, "Failed pass received vlan packet!") + + self.vm_testpmd.execute_cmd("vlan set strip off 0") + self.check_vlan_offload(vlan_type="strip", stats="off") + self.start_tcpdump(self.tester_intf) + out = self.send_pkts_getouput(self.tester_intf, pkt_list) + tcpdump_out = self.get_tcpdump_package() + receive_pkt = re.findall("dst=%s" % self.vf_mac, out) + self.verify(len(receive_pkt) == 2, "Failed error received vlan packet!") + tester_pkt = re.findall("vlan \d+", tcpdump_out) + self.verify(len(tester_pkt) == 6, "Failed pass received vlan packet!") + + def send_packet_check_vlan_inter( + self, pkts, out_vlan, port_id=3, vlan_header=None, iner_vlan=None + ): + for pkt in pkts: + pkt_index = pkts.index(pkt) + self.start_tcpdump(self.tester_intf) + out = self.send_pkts_getouput(self.tester_intf, pkt) + self.check_packets(out, port_id) + p = "vlan (\d+)" + tcpdump_out = self.get_tcpdump_package() + vlan_list = re.findall(p, tcpdump_out) + if vlan_header: + header = re.findall(vlan_header, tcpdump_out) + if pkt_index == 0: + if out_vlan == 1: + self.verify( + len(vlan_list) == 1, + "received packet outer vlan not is %s" % out_vlan, + ) + elif out_vlan == 0: + self.verify( + len(vlan_list) == 0, + "received packet outer vlan not is %s" % out_vlan, + ) + else: + self.verify( + int(vlan_list[0]) == out_vlan, + "received packet outer vlan not is %s" % out_vlan, + ) + if iner_vlan: + self.verify( + int(vlan_list[1]) == iner_vlan, + "received packet outer vlan not is %s" % iner_vlan, + ) + else: + if out_vlan == 1: + self.verify( + len(vlan_list) == 3 and int(vlan_list[1]) == out_vlan, + "received packet outer vlan not is %s" % out_vlan, + ) + elif out_vlan == 0: + self.verify( + len(vlan_list) == 2, + "received packet outer vlan not is %s" % out_vlan, + ) + else: + self.verify( + int(vlan_list[1]) == out_vlan, + "received packet outer vlan not is %s" % out_vlan, + ) + if iner_vlan: + self.verify( + int(vlan_list[2]) == iner_vlan, + "received packet outer vlan not is %s" % iner_vlan, + ) + if vlan_header == "0x8100": + self.verify( + vlan_header in tcpdump_out, + "vlan header not matched, expect: %s." % vlan_header, + ) + elif vlan_header is None: + pass + else: + self.verify( + len(header) == 1, + "vlan header not matched, expect: %s." % vlan_header, + ) + + def check_packets(self, out, port_id, pkt_num=1, check_stats=True): + p = "port (\d+)/queue.*" + result_list = re.findall(p, out) + self.verify( + len(result_list) == pkt_num, + "received %s packets, expected to %s packets" % (result_list, pkt_num), + ) + for res in result_list: + if check_stats: + self.verify( + int(res) == port_id, + "port {} did not received the packets".format(port_id), + ) + else: + self.verify( + int(res) != port_id, + "port {} should not received a packets".format(port_id), + ) + + @check_supported_nic(ice_nic) + def test_iavf_dual_vlan_insert(self): + """ + Test case: IAVF DUAL VLAN header insertion + """ + out_vlan = 1 + pkt_list = [ + 'Ether(dst="%s",type=0x0800)/IP(src="196.222.232.221")/("X"*480)' + % self.vf_mac, + 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=11,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' + % self.vf_mac, + ] + self.launch_testpmd(dcf_flag=self.dcf_mode) + self.vm_testpmd.execute_cmd("set fwd mac") + self.vm_testpmd.execute_cmd("set verbose 1") + self.vm_testpmd.execute_cmd("vlan set filter on 0") + self.vm_testpmd.execute_cmd("rx_vlan add 11 0") + self.vm_testpmd.execute_cmd("port stop 0") + self.vm_testpmd.execute_cmd("tx_vlan set 0 1") + self.vm_testpmd.execute_cmd("port start 0") + self.vm_testpmd.execute_cmd("start") + self.send_packet_check_vlan_inter(pkt_list, out_vlan, port_id=0) + + self.vm_testpmd.execute_cmd("stop") + self.vm_testpmd.execute_cmd("port stop 0") + self.vm_testpmd.execute_cmd("tx_vlan reset 0") + self.vm_testpmd.execute_cmd("port start 0") + self.vm_testpmd.execute_cmd("start") + self.send_packet_check_vlan_inter(pkt_list, out_vlan=0, port_id=0) + + def check_vlan_offload(self, vlan_type, stats): + p = "VLAN offload.*\n.*?%s (\w+)" % vlan_type + out = self.vm_testpmd.execute_cmd("show port info 0") + vlan_stats = re.search(p, out).group(1) + self.verify(vlan_stats == stats, "VLAN stats mismatch") + + def send_pkts_getouput(self, tport_inface, pkts, count=1): + self.pkt = Packet() + self.pkt.update_pkt(pkts) + self.pkt.send_pkt(crb=self.tester, tx_port=tport_inface, count=count) + time.sleep(1) + out = self.vm_testpmd.get_output() + port_stats = self.vm_testpmd.execute_cmd("show port stats all") + self.vm_testpmd.execute_cmd("clear port stats all") + self.vm_testpmd.execute_cmd("stop") + self.vm_testpmd.execute_cmd("start") + return out + port_stats + + def send_pkt_check_vlan_and_crc( + self, tport_inface, pkt, pkt_len=None, vlan_strip=False, crc_strip=False + ): + if pkt_len: + self.start_tcpdump(tport_inface) + out = self.send_pkts_getouput(tport_inface, pkt) + pkt_length = re.search("length=(\d+)", out).group(1) + rx_bytes = re.search("RX-bytes:\s+(\d+)", out).group(1) + if crc_strip: + self.verify(rx_bytes == pkt_length, "CRC strip on failed") + else: + self.verify(int(rx_bytes) == int(pkt_length) + 4, "CRC strip off failed") + if pkt_len: + tcpdump_out = self.get_tcpdump_package() + vlan_list = re.findall("vlan\s+\d+", tcpdump_out) + if not vlan_strip: + self.verify(pkt_length == pkt_len, "vlan strip off failed") + self.verify(len(vlan_list) == 4, "Failed pass received vlan packet") + elif vlan_strip: + self.verify( + int(pkt_length) + 4 == int(pkt_len), "vlan strip off failed" + ) + self.verify( + len(vlan_list) == 3 and vlan_list[0] != vlan_list[-1], + "Failed error received vlan packet", + ) + + @check_supported_nic(ice_nic) + def test_enable_disable_iavf_CRC_strip(self): + """ + Test case: Enable/disable AVF CRC stripping + """ + self.skip_case(not self.dcf_mode, "the case not support this dcf mode") + param = "--disable-crc-strip" + pkt = ( + 'Ether(dst="%s",type=0x0800)/IP(src="196.222.232.221")/("X"*480)' + % self.vf_mac + ) + + self.launch_testpmd(param=param, dcf_flag=self.dcf_mode) + self.vm_testpmd.execute_cmd("set fwd mac") + self.vm_testpmd.execute_cmd("set verbose 1") + self.vm_testpmd.execute_cmd("start") + self.send_pkt_check_vlan_and_crc(self.tester_intf, pkt) + + self.vm_testpmd.execute_cmd("stop") + self.vm_testpmd.execute_cmd("port stop 0") + self.vm_testpmd.execute_cmd("port config 0 rx_offload keep_crc off") + self.vm_testpmd.execute_cmd("port start 0") + self.vm_testpmd.execute_cmd("start") + self.send_pkt_check_vlan_and_crc(self.tester_intf, pkt, crc_strip=True) + + self.vm_testpmd.execute_cmd("stop") + self.vm_testpmd.execute_cmd("port stop 0") + self.vm_testpmd.execute_cmd("port config 0 rx_offload keep_crc on") + self.vm_testpmd.execute_cmd("port start 0") + self.vm_testpmd.execute_cmd("start") + self.send_pkt_check_vlan_and_crc(self.tester_intf, pkt) + + self.vm_testpmd.execute_cmd("quit", "#") + self.launch_testpmd(dcf_flag=self.dcf_mode) + self.vm_testpmd.execute_cmd("set fwd mac") + self.vm_testpmd.execute_cmd("set verbose 1") + self.vm_testpmd.execute_cmd("start") + self.start_tcpdump(self.tester_intf) + self.send_pkt_check_vlan_and_crc(self.tester_intf, pkt, crc_strip=True) + + @check_supported_nic(ice_nic) + def test_CRC_strip_iavf_vlan_strip_coexists(self): + """ + Test case: IAVF CRC strip and Vlan strip co-exists + """ + self.skip_case(not self.dcf_mode, "the case not support dcf mode") + pkt = ( + 'Ether(dst="%s",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)' + % self.vf_mac + ) + self.launch_testpmd(dcf_flag=self.dcf_mode) + self.vm_testpmd.execute_cmd("set fwd mac") + self.vm_testpmd.execute_cmd("set verbose 1") + self.vm_testpmd.execute_cmd("start") + self.check_vlan_offload(vlan_type="strip", stats="off") + self.vm_testpmd.execute_cmd("stop") + self.vm_testpmd.execute_cmd("vlan set strip off 0") + self.check_vlan_offload(vlan_type="strip", stats="off") + self.vm_testpmd.execute_cmd("vlan set filter on 0") + self.vm_testpmd.execute_cmd("rx_vlan add 1 0") + self.vm_testpmd.execute_cmd("start") + + self.start_tcpdump(self.tester_intf) + out = self.send_pkts_getouput(self.tester_intf, pkt) + tcpdump_out = self.get_tcpdump_package() + pkt_len = re.search("length=(\d+)", out).group(1) + vlan_list = re.findall("vlan\s+\d+", tcpdump_out) + self.verify(len(vlan_list) == 4, "vlan strip off failed") + rx_bytes = re.search("RX-bytes:\s+(\d+)", out).group(1) + tx_bytes = re.search("TX-bytes:\s+(\d+)", out).group(1) + self.verify(rx_bytes == tx_bytes == pkt_len, "CRC strip on failed") + + self.vm_testpmd.execute_cmd("vlan set strip on 0") + self.check_vlan_offload(vlan_type="strip", stats="on") + self.send_pkt_check_vlan_and_crc( + self.tester_intf, pkt=pkt, pkt_len=pkt_len, vlan_strip=True + ) + + self.vm_testpmd.execute_cmd("vlan set strip off 0") + self.check_vlan_offload(vlan_type="strip", stats="off") + self.vm_testpmd.execute_cmd("stop") + self.vm_testpmd.execute_cmd("port stop 0") + self.vm_testpmd.execute_cmd("port config 0 rx_offload keep_crc on") + self.vm_testpmd.execute_cmd("port start 0") + self.vm_testpmd.execute_cmd("start") + self.send_pkt_check_vlan_and_crc(self.tester_intf, pkt=pkt, pkt_len=pkt_len) + + out = self.vm_testpmd.execute_cmd("vlan set strip on 0") + p = "iavf_config_vlan_strip_v2(): fail to execute command VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2" + self.verify(p in out, "set vlan strip on successfully") + self.send_pkt_check_vlan_and_crc(self.tester_intf, pkt=pkt, pkt_len=pkt_len) + + self.vm_testpmd.execute_cmd("vlan set strip off 0") + self.check_vlan_offload(vlan_type="strip", stats="off") + self.vm_testpmd.execute_cmd("stop") + self.vm_testpmd.execute_cmd("port stop 0") + self.vm_testpmd.execute_cmd("port config 0 rx_offload keep_crc off") + self.vm_testpmd.execute_cmd("port start 0") + self.vm_testpmd.execute_cmd("start") + self.send_pkt_check_vlan_and_crc( + self.tester_intf, pkt=pkt, pkt_len=pkt_len, crc_strip=True + ) + def scapy_send_packet(self, mac, testinterface, vlan_flags=False, count=1): """ Send a packet to port From patchwork Wed Jan 11 10:38:56 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: "Jiale, SongX" X-Patchwork-Id: 121802 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id C678E42380; Wed, 11 Jan 2023 03:41:20 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id C224C42D21; Wed, 11 Jan 2023 03:41:20 +0100 (CET) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id DF85A42D20 for ; Wed, 11 Jan 2023 03:41:18 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673404879; x=1704940879; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=d6BD6XVyk9lItN3JHU+IDJhBhaSek3RBHlkQPVylc80=; b=i4nM4Ledrr5YiQV8Ix/pq3Qqn+3BoRXFyUb/hKKq++vrarS0Bg+tYo7d nOAr8xw0dIYSGWi++oKh/xBEI2hRxhqJMWPy2xH5vxwKyUfMSb9rCKrvb xNoqdVhxTwMnKXAYQYuxKVjhdbGcVVXZoK6lpmpL9rCwte+DmDgZjyeC5 7KQ3Kvwz5NHq8prX0fxrkFKxDydjRP3c4OwVZvWURvLJTabnAKVXTt8F/ t4Y7P+9RJ+c48q5XqGXE39BOKv1yFOM7tS5covlwXDLwJRo1sUfQBcazQ xq1LeOy+xt5utqdAjk4G3L+HW2O0QLb1MK7tq5rGiffrr6EGTKOLj9V/Y Q==; X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="350541479" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="350541479" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2023 18:41:18 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="764985944" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="764985944" Received: from unknown (HELO localhost.localdomain) ([10.239.252.20]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2023 18:41:16 -0800 From: Song Jiale To: dts@dpdk.org Cc: Song Jiale Subject: [dts] [PATCH V2 3/5] test_plans/ice_dcf_dual_vlan: split ice_qinq suite Date: Wed, 11 Jan 2023 10:38:56 +0000 Message-Id: <20230111103858.970228-4-songx.jiale@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230111103858.970228-1-songx.jiale@intel.com> References: <20230111103858.970228-1-songx.jiale@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org split dcf cases in ice_qinq to ice_dcf_dual_vlan and delete ice_qinq suite. Signed-off-by: Song Jiale --- ...an.rst => ice_dcf_dual_vlan_test_plan.rst} | 1695 +++++------------ 1 file changed, 501 insertions(+), 1194 deletions(-) rename test_plans/{ice_qinq_test_plan.rst => ice_dcf_dual_vlan_test_plan.rst} (64%) diff --git a/test_plans/ice_qinq_test_plan.rst b/test_plans/ice_dcf_dual_vlan_test_plan.rst similarity index 64% rename from test_plans/ice_qinq_test_plan.rst rename to test_plans/ice_dcf_dual_vlan_test_plan.rst index b3981829..4d2645a9 100644 --- a/test_plans/ice_qinq_test_plan.rst +++ b/test_plans/ice_dcf_dual_vlan_test_plan.rst @@ -7,13 +7,16 @@ ICE support QinQ protocol DPDK support QinQ protocol in Intel® Ethernet 800 Series as below requirements: * DCF support QinQ by add steering rule and vlan strip disable. * DCF is able to set port vlan by port representor. -* AVF is able to configure inner VLAN filter when port vlan is enabled base on negotiation. -* AVF is able to configure outer VLAN (8100) if no port VLANis enabled to compatible with legacy mode. -this test plan contain 3 parts to cover above requirements: + +this test plan contain 2 parts to cover above requirements: * DCF switch filter for QinQ. * DCF pvid support for QinQ. -* AVF VLAN offload for QinQ. +Intel® Ethernet 800 Series support l4 for QinQ switch filter in DCF driver is by +dst MAC + outer VLAN id + inner VLAN id + dst IP + dst port, and port can support +as eth / vlan / vlan / IP / tcp|udp. +* Enable QINQ switch filter for IPv4/IPv6, IPv4 + TCP/UDP in non-pipeline mode. +* Enable QINQ switch filter for IPv6 + TCP/UDP in pipeline mode. Prerequisites ============= @@ -78,39 +81,24 @@ Prerequisites ip link set dev ens785f0 vf 2 spoofchk off ip link set dev ens785f0 vf 3 spoofchk off -12. For test cases for DCF switch filter(01-06), use below cmd to launch testpmd:: +12. For test cases for Non-pipeline mode(case 01-07,09-11), use below cmd to launch testpmd:: ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf -n 4 -a 0000:18:01.0,cap=dcf,representor=[1] -a 0000:18:01.1 -a 0000:18:01.2 -a 0000:18:01.3 -- -i - testpmd> set fwd rxonly - testpmd> set verbose 1 - testpmd> start - testpmd> show port info all - check the VF0 driver is net_ice_dcf. + check the port 0 and port 1 driver is net_ice_dcf. - For test cases for DCF pvid(07-09), use below cmd to launch testpmd:: + For test cases for Pipeline mode(case 08), use below cmd to launch testpmd:: - ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf -n 4 -a 0000:18:01.0,cap=dcf,representor=[1] -a 0000:18:01.1 -a 0000:18:01.2 -a 0000:18:01.3 -- -i - testpmd> set fwd mac - testpmd> set verbose 1 - testpmd> start - testpmd> show port info all + ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf -n 4 -a 0000:18:01.0,cap=dcf,representor=[1],pipeline-mode-support=1 -a 0000:18:01.1 -a 0000:18:01.2 -a 0000:18:01.3 -- -i check the VF0 driver is net_ice_dcf. -13. For AVF QinQ test cases(10-14), recreate Generate 1 VFs on PF0, reconfig the VF then launch testpmd:: - - echo 0 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs - ethtool --set-priv-flags ens785f0 vf-vlan-pruning on - echo 1 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs - ip link set ens785f0 vf 0 mac 00:11:22:33:44:11 - ip link set dev ens785f0 vf 0 spoofchk off +13. config testpmd:: - ./usertools/dpdk-devbind.py -b vfio-pci 0000:18:01.0 - ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf -n 4 -a 0000:18:01.0 -- -i --rxq=16 --txq=16 testpmd> set fwd mac testpmd> set verbose 1 testpmd> start + testpmd> show port info all DCF switch filter support pattern and input set ----------------------------------------------- @@ -156,7 +144,7 @@ subcase: dest mac sendp([Ether(dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x0800)/IP()/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6()/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -164,7 +152,7 @@ subcase: dest mac testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. subcase: src ip --------------- @@ -187,7 +175,7 @@ subcase: src ip sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -195,7 +183,7 @@ subcase: src ip testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. subcase: dst ip --------------- @@ -218,7 +206,7 @@ subcase: dst ip sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP(dst="196.222.232.221")/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x0800)/IP(dst="196.222.232.221")/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -226,7 +214,7 @@ subcase: dst ip testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. Test case 02: DCF switch for MAC_QINQ_IPV6_PAY @@ -252,7 +240,7 @@ subcase: dest mac sendp([Ether(dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x86DD)/IPv6()/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x0800)/IP()/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -260,7 +248,7 @@ subcase: dest mac testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. subcase: src ip --------------- @@ -283,7 +271,7 @@ subcase: src ip sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(src="1111:2222:3333:4444:5555:6666:7777:8888")/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x86DD)/IPv6(src="1111:2222:3333:4444:5555:6666:7777:8888")/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -291,7 +279,7 @@ subcase: src ip testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. subcase: dst ip --------------- @@ -314,7 +302,7 @@ subcase: dst ip sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x86DD)/IPv6(dst="1111:2222:3333:4444:5555:6666:7777:8888")/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x86DD)/IPv6(dst="1111:2222:3333:4444:5555:6666:7777:8888")/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -322,7 +310,7 @@ subcase: dst ip testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. Test case 03: DCF switch for MAC_QINQ_PPPOE_PAY @@ -352,7 +340,7 @@ Test case 03: DCF switch for MAC_QINQ_PPPOE_PAY sendp([Ether(dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x21)/IP()/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x21)/IP()/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -360,7 +348,7 @@ Test case 03: DCF switch for MAC_QINQ_PPPOE_PAY testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. Test case 04: DCF switch for MAC_QINQ_PPPOE_PAY_Proto @@ -386,7 +374,7 @@ Test case 04: DCF switch for MAC_QINQ_PPPOE_PAY_Proto sendp([Ether(dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=2,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x57)/IPv6()/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=1,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x57)/IPv6()/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -394,7 +382,7 @@ Test case 04: DCF switch for MAC_QINQ_PPPOE_PAY_Proto testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. Test case 05: DCF switch for MAC_QINQ_PPPOE_IPV4 @@ -421,7 +409,7 @@ subcase: dest mac sendp([Ether(dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x57)/IPv6()/UDP(dport=23)/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x21)/IP()/UDP(dport=23)/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -429,7 +417,7 @@ subcase: dest mac testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. subcase: src ip --------------- @@ -453,7 +441,7 @@ subcase: src ip sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x21)/IP(src="196.222.232.221")/UDP(dport=23)/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x21)/IP(src="196.222.232.221")/UDP(dport=23)/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -461,7 +449,7 @@ subcase: src ip testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. subcase: dst ip --------------- @@ -485,7 +473,7 @@ subcase: dst ip sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x21)/IP(dst="196.222.232.221")/UDP(dport=23)/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x21)/IP(dst="196.222.232.221")/UDP(dport=23)/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -493,7 +481,7 @@ subcase: dst ip testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. Test case 06: DCF switch for MAC_QINQ_PPPOE_IPV6 @@ -520,7 +508,7 @@ subcase: dest mac sendp([Ether(dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x21)/IP()/UDP(dport=23)/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x1,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x57)/IPv6()/UDP(dport=23)/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -528,7 +516,7 @@ subcase: dest mac testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. subcase: src ip --------------- @@ -552,7 +540,7 @@ subcase: src ip sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x57)/IPv6(src="1111:2222:3333:4444:5555:6666:7777:8888")/UDP(dport=23)/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x57)/IPv6(src="1111:2222:3333:4444:5555:6666:7777:8888")/UDP(dport=23)/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -560,7 +548,7 @@ subcase: src ip testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. subcase: dst ip --------------- @@ -584,7 +572,7 @@ subcase: dst ip sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=0x1,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x57)/IPv6(dst="1111:2222:3333:4444:5555:6666:7777:8888")/UDP(dport=23)/("X"*480)], iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:33",type=0x8100)/Dot1Q(vlan=2,type=0x8100)/Dot1Q(vlan=0x2,type=0x8864)/PPPoE(sessionid=0x1)/PPP(proto=0x57)/IPv6(dst="1111:2222:3333:4444:5555:6666:7777:8888")/UDP(dport=23)/("X"*480)], iface="ens786f0") - check the packets are not to port 1. + check the packets are not to VF1. 3. verify rules can be destroyed:: @@ -592,1436 +580,755 @@ subcase: dst ip testpmd> flow list 0 check the rule not exists in the list. - send matched packets in step 2, check the packets are not to port 1. + send matched packets in step 2, check the packets are not to VF1. -Test case 07: vlan strip when pvid enable -========================================= +#Non-pipeline mode +Test case 07: DCF switch for MAC_L4_QINQ +======================================== +subcase: MAC_QINQ_IPV4 +---------------------- +The test case enable QINQ switch filter for IPv4 in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv4. -1. enable vlan header stripping for VF1 by representor:: +Test Steps +~~~~~~~~~~ +1. Validate a rule:: - testpmd> vlan set strip on 1 + testpmd> flow validate 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 src is dst is / end actions represented_port ethdev_port_id1 / end - Port 2: reset event + Get the message:: -2. reset VF1(port 2):: + Flow rule validated - testpmd> port stop 2 - testpmd> port reset 2 - testpmd> port start 2 - testpmd> start +2. Create a rule and list rules:: -3. tester send qinq pkt and single vlan pkt to VF1:: + testpmd> flow create 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 src is dst is / end actions represented_port ethdev_port_id1 / end - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=21,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + Get the message:: -4. check the pkts can be received in VF1 and fwd to tester without outer vlan header:: + Flow rule #0 created - testpmd> port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + Check the flow list:: - port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + testpmd> flow list 0 - 10:15:10.958039 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:15:10.958121 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype 802.1Q (0x8100), length 518: vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + ID Group Prio Attr Rule + 0 0 0 i-- ETH VLAN VLAN IPV4 => VF - 10:15:15.693894 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 21, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:15:15.693942 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 +3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. -5. disable vlan header stripping for VF1:: +Tester:: - testpmd> vlan set strip off 1 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP(src="",dst="")/("X"*80)],iface="") - Port 2: reset event +DUT:: -6. reset VF1:: + testpmd> port 2/queue 0: received 1 packets + src=A4:BF:01:4D:6F:32 - dst=00:11:22:33:44:55 - type=0x8100 - length=122 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Receive queue=0x0 + ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN - testpmd> port stop 2 - testpmd> port reset 2 - testpmd> port start 2 - testpmd> start +4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. -7. repeat step 3, check the pkts can be received in VF1 and fwd to tester with outer vlan header:: +Tester:: - testpmd> port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP(src="",dst="")/("X"*80)],iface="") - port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP(src="",dst="")/("X"*80)],iface="") - 10:17:55.321952 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:17:55.322008 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP(src="",dst="")/("X"*80)],iface="") - 10:17:58.009862 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 21, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:17:58.009908 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype 802.1Q (0x8100), length 518: vlan 21, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP(src="",dst="")/("X"*80)],iface="") -8. repeat step 1,2, then enable vlan strip by AVF:: +5. Destroy a rule and list rules:: - testpmd> vlan set strip on 2 + testpmd> flow destroy 0 rule 0 -9. repeat step 3, check the pkts can be received in VF1 and fwd to tester without both outer and inner vlan header:: + Get the message:: - testpmd> port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + Flow rule #0 destroyed - port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + Check the flow list:: - 10:28:01.642361 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:28:01.642438 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + testpmd> flow list 0 - 10:28:10.185876 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 21, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:28:10.185916 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + Check the rule not exists in the list. + Send matched packets in step 3, check the packets are not to VF1. -10. relaunch testpmd and enable vlan strip by AVF:: +subcase: MAC_QINQ_IPV6 +---------------------- +The test case enable QINQ switch filter for IPv6 in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv6. - testpmd> vlan set strip on 2 +Test Steps +~~~~~~~~~~ +1. Validate a rule:: -11. repeat step 1,2 and 3, check the pkts can be received in VF1 and fwd to tester without both outer and inner vlan header:: + testpmd> flow validate 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / end actions represented_port ethdev_port_id1 / end - testpmd> port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + Get the message:: - port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + Flow rule validated - 10:28:01.642361 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:28:01.642438 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 +2. Create a rule and list rules:: - 10:28:10.185876 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 21, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:28:10.185916 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + testpmd> flow create 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / end actions represented_port ethdev_port_id1 / end + Get the message:: -Test case 08: vlan insertion when pvid enable -============================================= + Flow rule #0 created -1. add tx port vlan for VF1 by representor 1:: + Check the flow list:: - testpmd> tx_vlan set pvid 1 24 on + testpmd> flow list 0 - Port 2: reset event + ID Group Prio Attr Rule + 0 0 0 i-- ETH VLAN VLAN IPV6 => VF -2. reset VF1:: +3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. - testpmd> port stop 2 - testpmd> port reset 2 - testpmd> port start 2 - testpmd> start +Tester:: -3. send a pkt without vlan header to VF2(VF2 rx, VF1 tx):: + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IPv6(dst="")/("X"*80)],iface="") - sendp([Ether(dst="00:11:22:33:44:22",type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - sendp([Ether(dst="00:11:22:33:44:22",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") +DUT:: -4. check the dpdk can receive this pkt with VF2 and fwd this pkt with outer vlan header id 24 by VF1, and the vlan header ptype is 8100:: + testpmd> port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - Receive queue=0x0 + ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN - testpmd> port 4/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN +4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. - port 4/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN +Tester:: - tcpdump -i ens786f0 -nn -e -v - 11:08:01.061908 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 11:08:01.061987 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 518: vlan 24, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IPv6(dst="")/("X"*80)],iface="") - 11:08:06.773884 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 11:08:06.773928 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 522: vlan 24, p 0, ethertype 802.1Q, vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IPv6(dst="")/("X"*80)],iface="") -5. change the tpid of vlan header to 88A8 for VF1:: + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IPv6(dst="")/("X"*80)],iface="") - testpmd> vlan set outer tpid 0x88a8 1 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IPv6(dst="")/("X"*80)],iface="") -6. reset VF1:: +5. Destroy a rule and list rules:: - testpmd> port stop 2 - testpmd> port reset 2 - testpmd> port start 2 - testpmd> start + testpmd> flow destroy 0 rule 0 -7. repeat step 3, check the dpdk can receive this pkt with VF2 and fwd this pkt with outer vlan header id 24 by VF1, and the vlan header ptype is 88a8:: + Get the message:: - testpmd> port 4/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + Flow rule #0 destroyed - port 4/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + Check the flow list:: - tcpdump -i ens786f0 -nn -e -v - 11:10:32.441834 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 11:10:32.441883 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q-QinQ (0x88a8), length 518: vlan 24, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + testpmd> flow list 0 - 11:10:34.081863 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 11:10:34.081913 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q-QinQ (0x88a8), length 522: vlan 24, p 0, ethertype 802.1Q, vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + Check the rule not exists in the list. + Send matched packets in step 3, check the packets are not to VF1. -8. change the tpid of vlan header to 9100 for VF1:: +subcase: MAC_QINQ_IPV4_UDP +-------------------------- +The test case enable QINQ switch filter for IPv4 + UDP in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv4 + UDP. - testpmd> vlan set outer tpid 0x9100 1 +Test steps +~~~~~~~~~~ +1. Validate a rule:: -9. reset VF1:: + testpmd> flow validate 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 / udp src is dst is / end actions represented_port ethdev_port_id1 / end - testpmd> port stop 2 - testpmd> port reset 2 - testpmd> port start 2 - testpmd> start + Get the message:: -10. repeat step 3, check the dpdk can receive this pkt with VF2 and fwd this pkt with outer vlan header id 24 by VF1, and the vlan header ptype is 9100:: + Flow rule validated - testpmd> port 4/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN +2. Create a rule and list rules:: - port 4/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + testpmd> flow create 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 / udp src is dst is / end actions represented_port ethdev_port_id1 / end - tcpdump -i ens786f0 -nn -e -v - 11:12:13.237834 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 11:12:13.237890 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q-9100 (0x9100), length 518: vlan 24, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + Get the message:: - 11:12:26.049869 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 11:12:26.049920 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q-9100, vlan 24, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + Flow rule #0 created -11. enable tx_vlan for VF1 by AVF:: + Check the flow list:: - testpmd> port stop 2 - Stopping ports... - Checking link statuses... - Done - testpmd> tx_vlan set 2 11 - testpmd> port start 2 + testpmd> flow list 0 -12. repeat step 3, check the dpdk can receive this pkt with VF2 and fwd this pkt with outer vlan header id 24, inner vlan id 11 by VF1:: - - testpmd> port 3/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - - port 3/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - - 11:22:29.561918 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 11:22:29.561992 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 522: vlan 24, p 0, ethertype 802.1Q, vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + ID Group Prio Attr Rule + 0 0 0 i-- ETH VLAN VLAN IPV4 UDP => VF - 11:22:44.481889 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 11:22:44.481922 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 526: vlan 24, p 0, ethertype 802.1Q, vlan 11, p 0, ethertype 802.1Q, vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 +3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. -13. relaunch testpmd and execute step 11 then step 1, 2 and 3, check the dpdk can receive this pkt with VF2 and fwd this pkt with outer vlan header id 24, inner vlan id 11 by VF1:: +Tester:: - testpmd> port 3/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/UDP(sport=,dport=)/("X"*80)],iface="") - port 3/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN +DUT:: - 11:22:29.561918 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 11:22:29.561992 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 522: vlan 24, p 0, ethertype 802.1Q, vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + testpmd> port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=130 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_UDP - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_UDP - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0 + ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN - 11:22:44.481889 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 11:22:44.481922 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 526: vlan 24, p 0, ethertype 802.1Q, vlan 11, p 0, ethertype 802.1Q, vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 +4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. +Tester:: -Test case 09: vlan filter when pvid enable -========================================== + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/UDP(sport=,dport=)/("X"*80)],iface="") -1. reset test environment, create vfs and enable vlan prune flag:: + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/UDP(sport=,dport=)/("X"*80)],iface="") - ethtool --set-priv-flags ens785f0 vf-vlan-pruning on + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/UDP(sport=,dport=)/("X"*80)],iface="") -2. repeat Prerequisites steps from 7 to 12 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/UDP(sport=,dport=)/("X"*80)],iface="") -3. enable vlan filter and add rx_vlan for VF1 by representor:: +5. Destroy a rule and list rules:: - testpmd> vlan set filter on 1 - testpmd> rx_vlan add 11 1 - rte_eth_dev_vlan_filter(port_pi=1, vlan_id=11, on=1) failed diag=-95 + testpmd> flow destroy 0 rule 0 -4. enable vlan filter and add rx_vlan for VF1 by AVF:: + Get the message:: - testpmd> vlan set filter on 2 - testpmd> rx_vlan add 11 2 + Flow rule #0 destroyed -5. tester send qinq pkt and single vlan pkt which outer vlan id is 11 to VF1:: + Check the flow list:: - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=11,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=11,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + testpmd> flow list 0 -6. check the pkts can be received by VF1 and fwd to tester:: + Check the rule not exists in the list. + Send matched packets in step 3, check the packets are not to VF1. - testpmd> port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN +subcase: MAC_QINQ_IPV4_TCP +-------------------------- +The test case enable QINQ switch filter for IPv4 + TCP in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv4 + TCP. - 10:21:53.418039 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 11, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:21:53.418114 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype 802.1Q (0x8100), length 522: vlan 11, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 +Test Steps +~~~~~~~~~~ +1. Validate a rule:: - 10:22:00.005885 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:22:00.005919 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype 802.1Q (0x8100), length 518: vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + testpmd> flow validate 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 / tcp src is dst is / end actions represented_port ethdev_port_id1 / end -7. tester send qinq pkt and single vlan pkt which outer vlan id is 21 to VF1:: + Get the message:: - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=21,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=21,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + Flow rule validated -8. check the pkts can not be received by VF1. +2. Create a rule and list rules:: -9. remove rx_vlan:: + testpmd> flow create 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 / tcp src is dst is / end actions represented_port ethdev_port_id1 / end - testpmd> rx_vlan rm 11 2 + Get the message:: -10. repeat step 5, check the pkts can not be received by VF1. + Flow rule #0 created + Check the flow list:: -Test case 10: Enable/Disable IAVF VLAN filtering -================================================ + testpmd> flow list 0 -1. enable vlan filtering on port VF:: + ID Group Prio Attr Rule + 0 0 0 i-- ETH VLAN VLAN IPV4 TCP => VF - testpmd> set fwd mac - Set mac packet forwarding mode - testpmd> vlan set filter on 0 +3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. -2. check the vlan mode is set successfully:: +Tester:: - testpmd> show port info 0 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/TCP(sport=,dport=)/("X"*80)],iface="") - ********************* Infos for port 0 ********************* - ...... - VLAN offload: - strip off, filter on, extend off, qinq strip off +DUT:: -3. tester send qinq pkt and single vlan pkt which outer vlan id is 1 to VF:: + testpmd> port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_TCP - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_TCP - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0 + ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") +4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. -4. check the pkts can't be received in VF. +Tester:: -5. add rx_vlan in VF:: + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/TCP(sport=,dport=)/("X"*80)],iface="") - testpmd> rx_vlan add 1 0 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/TCP(sport=,dport=)/("X"*80)],iface="") -6. repeat step 3, check the pkts can be received by VF and fwd to tester:: + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/TCP(sport=,dport=)/("X"*80)],iface="") - testpmd> port 0/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - hw ptype: L2_ETHER - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN - l2_len=18 - inner_l2_len=4 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - port 0/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER - sw ptype: L2_ETHER_VLAN - l2_len=18 - Receive queue=0x0 - ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/TCP(sport=,dport=)/("X"*80)],iface="") - tcpdump -i ens786f0 -nn -e -v +5. Destroy a rule and list rules:: - 16:50:38.807158 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype 0x0800, - 16:50:38.807217 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype 0x0800, + testpmd> flow destroy 0 rule 0 - 16:51:06.083084 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype 0x0800, - 16:51:06.083127 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype 0x0800, + Get the message:: -7. tester send qinq pkt and single vlan pkt which outer vlan id is 11 to VF:: + Flow rule #0 destroyed - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=11,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=11,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + Check the flow list:: -8. check the pkts can not be received by VF. + testpmd> flow list 0 -9. remove rx_vlan in VF1:: + Check the rule not exists in the list. + Send matched packets in step 3, check the packets are not to VF1. - testpmd> rx_vlan rm 1 0 +#Pipeline mode +Test case 08: DCF switch for MAC_L4_QINQ_IPV6 +============================================= +subcase: MAC_QINQ_IPV6_UDP +-------------------------- +The test case enable QINQ switch filter for IPv6 + UDP in pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv6 + UDP. -10. repeat step 3, check the pkts can not be received by VF. +Test Steps +~~~~~~~~~~ +1. Validate a rule:: + testpmd> flow validate 0 priority 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / udp src is dst is / end actions represented_port ethdev_port_id1 / end -Test case 11: Enable/Disable IAVF VLAN header stripping -======================================================= + Get the message:: -1. enable vlan filtering on port VF:: + Flow rule validated - testpmd> vlan set filter on 0 - testpmd> rx_vlan add 1 0 +2. Create a rule and list rules:: -2. check the vlan mode is set successfully:: + testpmd> flow create 0 priority 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / udp src is dst is / end actions represented_port ethdev_port_id1 / end - testpmd> show port info 0 + Get the message:: - ********************* Infos for port 0 ********************* - ...... - VLAN offload: - strip off, filter on, extend off, qinq strip off + Flow rule #0 created -3. enable vlan header stripping on VF:: + Check the flow list:: - testpmd> vlan set strip on 0 + testpmd> flow list 0 -4. check the vlan mode is set successfully:: + ID Group Prio Attr Rule + 0 0 0 i-- ETH VLAN VLAN IPV6 UDP => VF - testpmd> show port info 0 +3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. - ********************* Infos for port 0 ********************* - ...... - VLAN offload: - strip on, filter on, extend off, qinq strip off +Tester:: -5. tester send qinq pkt and single vlan pkt which outer vlan id is 1 to VF:: + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/UDP(sport=,dport=)/("X"*80)],iface="") - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") +DUT:: -6. check the pkts can be received in VF and fwd to tester without outer vlan header:: + testpmd> port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=150 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_UDP - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_UDP - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0 + ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN - testpmd> port 0/queue 10: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0xc7b627aa - RSS queue=0xa - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0xa - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN +4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. - port 0/queue 10: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0xc7b627aa - RSS queue=0xa - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0xa - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN +Tester:: - 10:12:38.034948 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:12:38.035025 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/UDP(sport=,dport=)/("X"*80)],iface="") - 10:12:44.806825 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:12:44.806865 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/UDP(sport=,dport=)/("X"*80)],iface="") -7. disable vlan header stripping on VF1:: + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/UDP(sport=,dport=)/("X"*80)],iface="") - testpmd> vlan set strip off 0 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/UDP(sport=,dport=)/("X"*80)],iface="") -8. check the vlan mode is set successfully:: +5. Destroy a rule and list rules:: - testpmd> show port info 0 + testpmd> flow destroy 0 rule 0 - ********************* Infos for port 0 ********************* - ...... - VLAN offload: - strip off, filter on, extend off, qinq strip off + Get the message:: -9. repeat step 5, check the pkts can be received in VF and fwd to tester with outer vlan header:: + Flow rule #0 destroyed - testpmd> port 0/queue 10: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - RSS hash=0xc7b627aa - RSS queue=0xa - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0xa - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + Check the flow list:: - port 0/queue 10: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0xc7b627aa - RSS queue=0xa - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0xa - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + testpmd> flow list 0 - 09:49:08.295172 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 09:49:08.295239 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + Check the rule not exists in the list. + Send matched packets in step 3, check the packets are not to VF1. - 09:49:41.043101 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 09:49:41.043166 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 +subcase: MAC_QINQ_IPV6_TCP +-------------------------- +The test case enable QINQ switch filter for IPv6 + TCP in pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv6 + TCP. +Test steps +~~~~~~~~~~ +1. Validate a rule:: -Test case 12: Enable/Disable IAVF VLAN header insertion -======================================================= + testpmd> flow validate 0 priority 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / tcp src is dst is / end actions represented_port ethdev_port_id1 / end -1. disable vf-vlan-pruning flag:: + Get the message:: - echo 0 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs - ethtool --set-priv-flags ens785f0 vf-vlan-pruning off + Flow rule validated -2. set up test environment again:: +2. Create a rule and list rules:: - echo 1 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs - ip link set ens785f0 vf 0 mac 00:11:22:33:44:11 - ip link set dev ens785f0 vf 0 spoofchk off - ./usertools/dpdk-devbind.py -b vfio-pci 0000:18:01.0 - ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf -n 4 -a 0000:18:01.0 -- -i --rxq=16 --txq=16 - testpmd> set fwd mac - testpmd> set verbose 1 + testpmd> flow create 0 priority 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / tcp src is dst is / end actions represented_port ethdev_port_id1 / end -3. enable vlan header insertion on VF:: + Get the message:: - testpmd> port stop 0 - Stopping ports... - Checking link statuses... - Done - testpmd> tx_vlan set 0 1 - testpmd> port start 0 + Flow rule #0 created -4. tester send pkt to VF:: + Check the flow list:: - sendp([Ether(dst="00:11:22:33:44:11",type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=11,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + testpmd> flow list 0 -5. check the pkts with vlan header can be received in tester:: + ID Group Prio Attr Rule + 0 0 0 i-- ETH VLAN VLAN IPV6 TCP => VF - testpmd> port 0/queue 13: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0xcaf4abfd - RSS queue=0xd - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0xd - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN +3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. - port 0/queue 8: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0x28099b78 - RSS queue=0x8 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x8 - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN +Tester:: - 10:32:55.566801 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:32:55.566856 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/TCP(sport=,dport=)/("X"*80)],iface="") - 06:29:32.281896 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 06:29:32.281940 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 11, p 0, ethertype 802.1Q, vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 +DUT:: -6. disable vlan header insertion on VF1:: + testpmd> port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=162 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_TCP - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_TCP - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=20 - Receive queue=0x0 + ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN - testpmd> port stop 0 - Stopping ports... - Checking link statuses... - Done - testpmd> tx_vlan reset 0 - testpmd> port start 0 +4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. -7. repeat step 4, check the pkts without vlan tag can be received in tester:: +Tester:: - testpmd> port 0/queue 9: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0xa63e8869 - RSS queue=0x9 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x9 - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/TCP(sport=,dport=)/("X"*80)],iface="") - port 0/queue 12: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0x6f5533bc - RSS queue=0xc - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0xc - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/TCP(sport=,dport=)/("X"*80)],iface="") - 10:34:40.070754 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:34:40.070824 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/TCP(sport=,dport=)/("X"*80)],iface="") - 06:36:57.641871 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 06:36:57.641909 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/TCP(sport=,dport=)/("X"*80)],iface="") +5. Destroy a rule and list rules:: -Test case 13: Enable/disable AVF CRC stripping -============================================== + testpmd> flow destroy 0 rule 0 -1. start testpmd with "--disable-crc-strip":: + Get the message:: - ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -l 20-23 -n 4 -a 0000:18:01.0 -- -i --rxq=16 --txq=16 --disable-crc-strip - testpmd> set fwd mac - testpmd> set verbose 1 + Flow rule #0 destroyed -2. send pkts to VF:: + Check the flow list:: - sendp([Ether(dst="00:11:22:33:44:11",type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + testpmd> flow list 0 -3. check VF1 receive this pkts with CRC:: + Check the rule not exists in the list. + Send matched packets in step 3, check the packets are not to VF1. - testpmd> port 0/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0x890d9a70 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN +Test case 09: DCF vlan strip when pvid enable +============================================= - show port stats all +1. enable vlan header stripping for VF1 by representor:: - ######################## NIC statistics for port 0 ######################## - RX-packets: 1 RX-missed: 0 RX-bytes: 518 - RX-errors: 0 - RX-nombuf: 0 - TX-packets: 1 TX-errors: 0 TX-bytes: 514 + testpmd> vlan set strip on 1 - Throughput (since last show) - Rx-pps: 0 Rx-bps: 0 - Tx-pps: 0 Tx-bps: 0 - ############################################################################ - clear port stats all + Port 2: reset event -4. enable crc strip in testpmd:: +2. reset VF1(port 2):: - testpmd> stop - testpmd> port stop 0 - testpmd> port config 0 rx_offload keep_crc off - testpmd> port start 0 + testpmd> port stop 2 + testpmd> port reset 2 + testpmd> port start 2 testpmd> start -5. repeat step 2, check VF receive this pkts without CRC:: +3. tester send qinq pkt and single vlan pkt to VF1:: - testpmd> port 0/queue 2: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0xa94c21d2 - RSS queue=0x2 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x2 - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=21,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - show port stats all +4. check the pkts can be received in VF1 and fwd to tester without outer vlan header:: - ######################## NIC statistics for port 0 ######################## - RX-packets: 1 RX-missed: 0 RX-bytes: 514 - RX-errors: 0 - RX-nombuf: 0 - TX-packets: 1 TX-errors: 0 TX-bytes: 514 + testpmd> port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - Throughput (since last show) - Rx-pps: 0 Rx-bps: 0 - Tx-pps: 0 Tx-bps: 0 - ############################################################################ - clear port stats all + port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN -6. disable crc strip in testpmd:: + 10:15:10.958039 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:15:10.958121 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype 802.1Q (0x8100), length 518: vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - testpmd> stop - testpmd> port stop 0 - testpmd> port config 0 rx_offload keep_crc on - testpmd> port start 0 - testpmd> start + 10:15:15.693894 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 21, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:15:15.693942 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 -7. repeat step 2, check VF1 receive this pkts with CRC:: +5. disable vlan header stripping for VF1:: - testpmd> port 0/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0x79c10190 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + testpmd> vlan set strip off 1 - show port stats all + Port 2: reset event - ######################## NIC statistics for port 0 ######################## - RX-packets: 1 RX-missed: 0 RX-bytes: 518 - RX-errors: 0 - RX-nombuf: 0 - TX-packets: 1 TX-errors: 0 TX-bytes: 514 +6. reset VF1:: - Throughput (since last show) - Rx-pps: 0 Rx-bps: 0 - Tx-pps: 0 Tx-bps: 0 - ############################################################################ - clear port stats all + testpmd> port stop 2 + testpmd> port reset 2 + testpmd> port start 2 + testpmd> start -8. re-launch testpmd without "--disable-crc-strip":: +7. repeat step 3, check the pkts can be received in VF1 and fwd to tester with outer vlan header:: - ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -l 20-23 -n 4 -a 0000:18:01.0 -- -i --rxq=16 --txq=16 - testpmd> set fwd mac - testpmd> set verbose 1 + testpmd> port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN -9. repeat step 2, check VF receive this pkts without CRC:: + port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - testpmd> port 0/queue 2: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0x898ada82 - RSS queue=0x2 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x2 - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - - show port stats all - - ######################## NIC statistics for port 0 ######################## - RX-packets: 1 RX-missed: 0 RX-bytes: 514 - RX-errors: 0 - RX-nombuf: 0 - TX-packets: 1 TX-errors: 0 TX-bytes: 514 - - Throughput (since last show) - Rx-pps: 0 Rx-bps: 0 - Tx-pps: 0 Tx-bps: 0 - ############################################################################ - - -Test case 14: AVF CRC strip and Vlan strip co-exists -==================================================== - -1. start testpmd with crc strip enable, vlan strip disable:: - - ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -l 20-23 -n 4 -a 0000:18:01.0 -- -i --rxq=16 --txq=16 - testpmd> set fwd mac - testpmd> set verbose 1 - testpmd> show port info 0 - ********************* Infos for port 0 ********************* - MAC address: 00:11:22:33:44:11 - Device name: 0000:18:01.1 - Driver name: net_iavf - ...... - VLAN offload: - strip off, filter off, extend off, qinq strip off - -2. request disable vlan strip:: - - testpmd> vlan set strip off 0 - -3. check the vlan strip still disable:: - - testpmd> show port info 0 - ********************* Infos for port 0 ********************* - MAC address: 00:11:22:33:44:11 - Device name: 0000:18:01.1 - Driver name: net_iavf - ...... - VLAN offload: - strip off, filter off, extend off, qinq strip off - -4. set vlan filter on and add rx_vlan 1:: - - testpmd> vlan set filter on 0 - testpmd> rx_vlan add 1 0 - testpmd> start - -5. send qinq pkts to check vlan strip is off, crc strip is on:: - - sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - - testpmd> port 0/queue 6: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - RSS hash=0xf6521426 - RSS queue=0x6 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0x6 - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - - show port stats all - - ######################## NIC statistics for port 0 ######################## - RX-packets: 1 RX-missed: 0 RX-bytes: 522 - RX-errors: 0 - RX-nombuf: 0 - TX-packets: 1 TX-errors: 0 TX-bytes: 522 - - Throughput (since last show) - Rx-pps: 0 Rx-bps: 0 - Tx-pps: 0 Tx-bps: 0 - ############################################################################ - - 09:07:45.863251 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 10:17:55.321952 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 09:07:45.863340 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 10:17:55.322008 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) 196.222.232.221 > 127.0.0.1: ip-proto-0 480 -6. request enable vlan strip:: - - testpmd> vlan set strip on 0 - -7. check the vlan strip enable successfully:: - - testpmd> show port info 0 - ********************* Infos for port 0 ********************* - MAC address: 00:11:22:33:44:11 - Device name: 0000:18:01.1 - Driver name: net_iavf - ...... - VLAN offload: - strip on, filter off, extend off, qinq strip off + 10:17:58.009862 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 21, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:17:58.009908 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype 802.1Q (0x8100), length 518: vlan 21, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 -8. repeat step 5, send qinq pkts to check vlan strip is on(tx-4), crc strip is on:: +8. repeat step 1,2, then enable vlan strip by AVF:: - testpmd> port 0/queue 6: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0xf6521426 - RSS queue=0x6 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0x6 - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + testpmd> vlan set strip on 2 - show port stats all +9. repeat step 3, check the pkts can be received in VF1 and fwd to tester without both outer and inner vlan header:: - ######################## NIC statistics for port 0 ######################## - RX-packets: 1 RX-missed: 0 RX-bytes: 522 - RX-errors: 0 - RX-nombuf: 0 - TX-packets: 1 TX-errors: 0 TX-bytes: 518 + testpmd> port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - Throughput (since last show) - Rx-pps: 0 Rx-bps: 0 - Tx-pps: 0 Tx-bps: 0 - ############################################################################ + port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - 11:09:03.918907 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 10:28:01.642361 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 11:09:03.918952 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 10:28:01.642438 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) 196.222.232.221 > 127.0.0.1: ip-proto-0 480 -9. request disable vlan strip:: - - testpmd> vlan set strip off 0 - -10. check the vlan strip disable successfully:: - - testpmd> show port info 0 - ********************* Infos for port 0 ********************* - MAC address: 00:11:22:33:44:11 - Device name: 0000:18:01.1 - Driver name: net_iavf - ...... - VLAN offload: - strip off, filter on, extend off, qinq strip off - -11. request disable crc strip:: + 10:28:10.185876 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 21, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:28:10.185916 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - testpmd> stop - testpmd> port stop 0 - testpmd> port config 0 rx_offload keep_crc on - testpmd> port start 0 - testpmd> start +10. relaunch testpmd and enable vlan strip by AVF:: -12. repeat step 5, send qinq pkts to check vlan strip is off, crc strip is off(rx+4):: + testpmd> vlan set strip on 2 - testpmd> port 0/queue 7: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - RSS hash=0xbc8b1857 - RSS queue=0x7 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Tail/CRC: 0x58585858/0x6d870bf6 - Receive queue=0x7 - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN +11. repeat step 1,2 and 3, check the pkts can be received in VF1 and fwd to tester without both outer and inner vlan header:: - show port stats all - ######################## NIC statistics for port 0 ######################## - RX-packets: 1 RX-missed: 0 RX-bytes: 526 - RX-errors: 0 - RX-nombuf: 0 - TX-packets: 1 TX-errors: 0 TX-bytes: 522 + testpmd> port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - Throughput (since last show) - Rx-pps: 0 Rx-bps: 0 - Tx-pps: 0 Tx-bps: 0 - ############################################################################ + port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - 10:23:57.350934 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 10:28:01.642361 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:23:57.351008 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 10:28:01.642438 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) 196.222.232.221 > 127.0.0.1: ip-proto-0 480 -13. request enable vlan strip:: - - testpmd> vlan set strip on 0 - iavf_execute_vf_cmd(): No response or return failure (-64) for cmd 54 - iavf_config_vlan_strip_v2(): fail to execute command VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2 - rx_vlan_strip_set(port_pi=0, on=1) failed diag=-5 - -14. repeat step 5, send qinq pkts to check the vlan strip can not enable:: - - testpmd> port 0/queue 7: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0xbc8b1857 - RSS queue=0x7 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Tail/CRC: 0x58585858/0x6d870bf6 - Receive queue=0x7 - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + 10:28:10.185876 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 21, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:28:10.185916 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - show port stats all - ######################## NIC statistics for port 0 ######################## - RX-packets: 1 RX-missed: 0 RX-bytes: 526 - RX-errors: 0 - RX-nombuf: 0 - TX-packets: 1 TX-errors: 0 TX-bytes: 522 - Throughput (since last show) - Rx-pps: 0 Rx-bps: 0 - Tx-pps: 0 Tx-bps: 0 - ############################################################################ +Test case 10: DCF vlan insertion when pvid enable +================================================= - 10:26:08.346936 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:26:08.347006 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 +1. add tx port vlan for VF1 by representor 1:: -15. request disable vlan strip:: + testpmd> tx_vlan set pvid 1 24 on - vlan set strip off 0 + Port 2: reset event -16. check the vlan strip still disable:: +2. reset VF1:: - testpmd> show port info 0 - ********************* Infos for port 0 ********************* - MAC address: 00:11:22:33:44:11 - Device name: 0000:18:01.1 - Driver name: net_iavf - ...... - VLAN offload: - strip off, filter on, extend off, qinq strip off + testpmd> port stop 2 + testpmd> port reset 2 + testpmd> port start 2 + testpmd> start -17. request enable crc strip:: +3. send a pkt without vlan header to VF2(VF2 rx, VF1 tx):: - testpmd> stop - testpmd> port stop 0 - testpmd> port config 0 rx_offload keep_crc off - testpmd> port start 0 - testpmd> start + sendp([Ether(dst="00:11:22:33:44:22",type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + sendp([Ether(dst="00:11:22:33:44:22",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") -18. repeat step 5, send qinq pkts to check the crc strip enable successfully:: +4. check the dpdk can receive this pkt with VF2 and fwd this pkt with outer vlan header id 24 by VF1, and the vlan header ptype is 8100:: - testpmd> port 0/queue 3: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - RSS hash=0x2b4ad203 - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Receive queue=0x3 - ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - port 0/queue 3: sent 1 packets - src=00:11:22:33:44:11 - dst=02:00:00:00:00:00 - type=0x8100 - length=522 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Send queue=0x3 - ol_flags: PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_UNKNOWN PKT_RX_OUTER_L4_CKSUM_UNKNOWN + testpmd> port 4/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - show port stats all - ######################## NIC statistics for port 0 ######################## - RX-packets: 1 RX-missed: 0 RX-bytes: 522 - RX-errors: 0 - RX-nombuf: 0 - TX-packets: 1 TX-errors: 0 TX-bytes: 522 + port 4/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - Throughput (since last show) - Rx-pps: 0 Rx-bps: 0 - Tx-pps: 0 Tx-bps: 0 - ############################################################################ + tcpdump -i ens786f0 -nn -e -v + 11:08:01.061908 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:08:01.061987 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 518: vlan 24, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:29:19.995352 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 10:29:19.995424 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) - 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:08:06.773884 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:08:06.773928 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 522: vlan 24, p 0, ethertype 802.1Q, vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 -==================================== -ICE DCF QINQ Switch Filter Test Plan -==================================== +5. change the tpid of vlan header to 88A8 for VF1:: -Description -=========== -Intel® Ethernet 800 Series support l4 for QinQ switch filter in DCF driver is by -dst MAC + outer VLAN id + inner VLAN id + dst IP + dst port, and port can support -as eth / vlan / vlan / IP / tcp|udp. -* Enable QINQ switch filter for IPv4/IPv6, IPv4 + TCP/UDP in non-pipeline mode. -* Enable QINQ switch filter for IPv6 + TCP/UDP in pipeline mode. + testpmd> vlan set outer tpid 0x88a8 1 -Prerequisites -============= +6. reset VF1:: -Hardware --------- -Supportted NICs: Intel® Ethernet Network Adapter E810-XXVDA4/Intel® Ethernet Network Adapter E810-CQDA2 + testpmd> port stop 2 + testpmd> port reset 2 + testpmd> port start 2 + testpmd> start -Software --------- -dpdk: http://dpdk.org/git/dpdk -scapy: http://www.secdev.org/projects/scapy/ +7. repeat step 3, check the dpdk can receive this pkt with VF2 and fwd this pkt with outer vlan header id 24 by VF1, and the vlan header ptype is 88a8:: -General Set Up --------------- -1. Compile DPDK:: + testpmd> port 4/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - # CC=gcc meson --werror -Denable_kmods=True -Dlibdir=lib --default-library=static x86_64-native-linuxapp-gcc - # ninja -C x86_64-native-linuxapp-gcc -j 110 + port 4/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN -2. Get the pci device id and interface of DUT and tester. - For example, 0000:3b:00.0 and 0000:af:00.0 is pci device id, - ens785f0 and ens260f0 is interface:: + tcpdump -i ens786f0 -nn -e -v + 11:10:32.441834 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:10:32.441883 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q-QinQ (0x88a8), length 518: vlan 24, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - # ./usertools/dpdk-devbind.py -s + 11:10:34.081863 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:10:34.081913 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q-QinQ (0x88a8), length 522: vlan 24, p 0, ethertype 802.1Q, vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - 0000:3b:00.0 'Ethernet Controller E810-C for SFP 1593' if=ens785f0 drv=ice unused=vfio-pci - 0000:af:00.0 'Ethernet Controller XXV710 for 25GbE SFP28 158b' if=ens260f0 drv=i40e unused=vfio-pci +8. change the tpid of vlan header to 9100 for VF1:: -4. Generate 2 VFs on PF0:: + testpmd> vlan set outer tpid 0x9100 1 - # echo 2 > /sys/bus/pci/devices/0000:3b:00.0/sriov_numvfs +9. reset VF1:: -5. Get VF pci device id and interface of DUT. + testpmd> port stop 2 + testpmd> port reset 2 + testpmd> port start 2 + testpmd> start - # ./usertools/dpdk-devbind.py -s +10. repeat step 3, check the dpdk can receive this pkt with VF2 and fwd this pkt with outer vlan header id 24 by VF1, and the vlan header ptype is 9100:: - 0000:3b:01.0 'Ethernet Adaptive Virtual Function 1889' if=ens785f0v0 drv=iavf unused=vfio-pci - 0000:3b:01.1 'Ethernet Adaptive Virtual Function 1889' if=ens785f0v1 drv=iavf unused=vfio-pci + testpmd> port 4/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN -6. Set VF0 as trust:: + port 4/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - # ip link set ens785f0 vf 0 trust on + tcpdump -i ens786f0 -nn -e -v + 11:12:13.237834 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:12:13.237890 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q-9100 (0x9100), length 518: vlan 24, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 -7. Bind the DUT port to dpdk:: + 11:12:26.049869 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:12:26.049920 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q-9100, vlan 24, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - # ./usertools/dpdk-devbind.py -b vfio-pci +11. enable tx_vlan for VF1 by AVF:: -Test case -========= + testpmd> port stop 2 + Stopping ports... + Checking link statuses... + Done + testpmd> tx_vlan set 2 11 + testpmd> port start 2 -Common Steps ------------- -1. Launch the userland ``testpmd`` application on DUT as follows:: +12. repeat step 3, check the dpdk can receive this pkt with VF2 and fwd this pkt with outer vlan header id 24, inner vlan id 11 by VF1:: - /app/dpdk-testpmd -a -- -i + testpmd> port 3/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN -..note:: + port 3/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - For , you can use "-c 0x6 -n 4", you can also refer to testpmd doc for other setings. - For , you can use "0000:3b:01.0,cap=dcf,representor=[1] -a 0000:3b:01.1" for this test plan. + 11:22:29.561918 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:22:29.561992 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 522: vlan 24, p 0, ethertype 802.1Q, vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 -2. Set verbose:: - - testpmd> set verbose 1 - -3. Set fwd engine and start:: + 11:22:44.481889 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:22:44.481922 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 526: vlan 24, p 0, ethertype 802.1Q, vlan 11, p 0, ethertype 802.1Q, vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - testpmd> set fwd rxonly - testpmd> start +13. relaunch testpmd and execute step 11 then step 1, 2 and 3, check the dpdk can receive this pkt with VF2 and fwd this pkt with outer vlan header id 24, inner vlan id 11 by VF1:: -4. Show port info:: + testpmd> port 3/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x0800 - length=514 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - testpmd> show port info all + port 3/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:22 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - Check the VF0 driver is net_ice_dcf. - -All the packets in this test plan use below settings: -dst mac: 00:11:22:33:44:55 -dst mac change inputset: 00:11:22:33:44:33 -ipv4 src: 192.168.1.1 -ipv4 dst: 192.168.1.2 -ipv4 src change inputset: 192.168.1.3 -ipv4 dst change inputset: 192.168.1.4 -ipv6 dst: CDCD:910A:2222:5498:8475:1111:3900:2020 -ipv6 dst change inputset: CDCD:910A:2222:5498:8475:1111:3900:2023 -outer vlan tci: 2 -outer vlan tci change inputset: 1 -inner vlan tci: 1 -inner vlan tci change inputset: 2 -sport: 50 -sport change inputset: 52 -dport: 23 -dport change inputset: 22 + 11:22:29.561918 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:22:29.561992 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 522: vlan 24, p 0, ethertype 802.1Q, vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 -#Non-pipeline mode + 11:22:44.481889 00:00:00:00:00:00 > 00:11:22:33:44:22, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:22:44.481922 00:11:22:33:44:11 > 02:00:00:00:00:02, ethertype 802.1Q (0x8100), length 526: vlan 24, p 0, ethertype 802.1Q, vlan 11, p 0, ethertype 802.1Q, vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 -Test Case 1: MAC_QINQ_IPV4 --------------------------- -The test case enable QINQ switch filter for IPv4 in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv4. -Test Steps -~~~~~~~~~~ -1. Validate a rule:: - - testpmd> flow validate 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 src is dst is / end actions represented_port ethdev_port_id1 / end +Test case 11: DCF vlan filter when pvid enable +============================================== - Get the message:: +1. reset test environment, create vfs and enable vlan prune flag:: - Flow rule validated + ethtool --set-priv-flags ens785f0 vf-vlan-pruning on -2. Create a rule and list rules:: +2. repeat Prerequisites steps from 7 to 12 - testpmd> flow create 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 src is dst is / end actions represented_port ethdev_port_id1 / end - - Get the message:: +3. enable vlan filter and add rx_vlan for VF1 by representor:: - Flow rule #0 created - - Check the flow list:: + testpmd> vlan set filter on 1 + testpmd> rx_vlan add 11 1 + rte_eth_dev_vlan_filter(port_pi=1, vlan_id=11, on=1) failed diag=-95 - testpmd> flow list 0 - - ID Group Prio Attr Rule - 0 0 0 i-- ETH VLAN VLAN IPV4 => VF +4. enable vlan filter and add rx_vlan for VF1 by AVF:: -3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. + testpmd> vlan set filter on 2 + testpmd> rx_vlan add 11 2 -Tester:: +5. tester send qinq pkt and single vlan pkt which outer vlan id is 11 to VF1:: - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP(src="",dst="")/("X"*80)],iface="") + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=11,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=11,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") -DUT:: +6. check the pkts can be received by VF1 and fwd to tester:: testpmd> port 2/queue 0: received 1 packets - src=A4:BF:01:4D:6F:32 - dst=00:11:22:33:44:55 - type=0x8100 - length=122 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Receive queue=0x0 - ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + port 2/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN -4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. + 10:21:53.418039 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 11, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:21:53.418114 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype 802.1Q (0x8100), length 522: vlan 11, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 -Tester:: + 10:22:00.005885 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:22:00.005919 00:11:22:33:44:22 > 02:00:00:00:00:03, ethertype 802.1Q (0x8100), length 518: vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP(src="",dst="")/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP(src="",dst="")/("X"*80)],iface="") +7. tester send qinq pkt and single vlan pkt which outer vlan id is 21 to VF1:: - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP(src="",dst="")/("X"*80)],iface="") + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=21,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=21,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP(src="",dst="")/("X"*80)],iface="") +8. check the pkts can not be received by VF1. -5. Destroy a rule and list rules:: - - testpmd> flow destroy 0 rule 0 - - Get the message:: - - Flow rule #0 destroyed - - Check the flow list:: - - testpmd> flow list 0 - - Check the rule not exists in the list. - Send matched packets in step 3, check the packets are not to port 2. - -Test Case 2: MAC_QINQ_IPV6 --------------------------- -The test case enable QINQ switch filter for IPv6 in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv6. - -Test Steps -~~~~~~~~~~ -1. Validate a rule:: - - testpmd> flow validate 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / end actions represented_port ethdev_port_id1 / end - - Get the message:: - - Flow rule validated - -2. Create a rule and list rules:: - - testpmd> flow create 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / end actions represented_port ethdev_port_id1 / end - - Get the message:: - - Flow rule #0 created - - Check the flow list:: - - testpmd> flow list 0 - - ID Group Prio Attr Rule - 0 0 0 i-- ETH VLAN VLAN IPV6 => VF - -3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. - -Tester:: - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IPv6(dst="")/("X"*80)],iface="") - -DUT:: - - testpmd> port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - Receive queue=0x0 - ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN - -4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. - -Tester:: - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IPv6(dst="")/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IPv6(dst="")/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IPv6(dst="")/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IPv6(dst="")/("X"*80)],iface="") - -5. Destroy a rule and list rules:: - - testpmd> flow destroy 0 rule 0 - - Get the message:: - - Flow rule #0 destroyed - - Check the flow list:: - - testpmd> flow list 0 - - Check the rule not exists in the list. - Send matched packets in step 3, check the packets are not to port 2. - -Test Case 3: MAC_QINQ_IPV4_UDP ------------------------------- -The test case enable QINQ switch filter for IPv4 + UDP in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv4 + UDP. - -Test steps -~~~~~~~~~~ -1. Validate a rule:: - - testpmd> flow validate 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 / udp src is dst is / end actions represented_port ethdev_port_id1 / end - - Get the message:: - - Flow rule validated - -2. Create a rule and list rules:: - - testpmd> flow create 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 / udp src is dst is / end actions represented_port ethdev_port_id1 / end - - Get the message:: - - Flow rule #0 created - - Check the flow list:: - - testpmd> flow list 0 - - ID Group Prio Attr Rule - 0 0 0 i-- ETH VLAN VLAN IPV4 UDP => VF - -3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. - -Tester:: - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/UDP(sport=,dport=)/("X"*80)],iface="") - -DUT:: - - testpmd> port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=130 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_UDP - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_UDP - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0 - ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN - -4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. - -Tester:: - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/UDP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/UDP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/UDP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/UDP(sport=,dport=)/("X"*80)],iface="") - -5. Destroy a rule and list rules:: - - testpmd> flow destroy 0 rule 0 - - Get the message:: - - Flow rule #0 destroyed - - Check the flow list:: - - testpmd> flow list 0 - - Check the rule not exists in the list. - Send matched packets in step 3, check the packets are not to port 2. - -Test Case 4: MAC_QINQ_IPV4_TCP ------------------------------- -The test case enable QINQ switch filter for IPv4 + TCP in non-pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv4 + TCP. - -Test Steps -~~~~~~~~~~ -1. Validate a rule:: - - testpmd> flow validate 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 / tcp src is dst is / end actions represented_port ethdev_port_id1 / end - - Get the message:: - - Flow rule validated - -2. Create a rule and list rules:: - - testpmd> flow create 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv4 / tcp src is dst is / end actions represented_port ethdev_port_id1 / end - - Get the message:: - - Flow rule #0 created - - Check the flow list:: - - testpmd> flow list 0 - - ID Group Prio Attr Rule - 0 0 0 i-- ETH VLAN VLAN IPV4 TCP => VF - -3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. - -Tester:: - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/TCP(sport=,dport=)/("X"*80)],iface="") - -DUT:: - - testpmd> port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=142 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_TCP - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 INNER_L4_TCP - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0 - ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN - -4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. - -Tester:: - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/TCP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/TCP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/TCP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x0800)/IP()/TCP(sport=,dport=)/("X"*80)],iface="") - -5. Destroy a rule and list rules:: - - testpmd> flow destroy 0 rule 0 - - Get the message:: - - Flow rule #0 destroyed - - Check the flow list:: - - testpmd> flow list 0 - - Check the rule not exists in the list. - Send matched packets in step 3, check the packets are not to port 2. - -#Pipeline mode - -Test Case 5: MAC_QINQ_IPV6_UDP ------------------------------- -The test case enable QINQ switch filter for IPv6 + UDP in pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv6 + UDP. - -Test Steps -~~~~~~~~~~ -1. Validate a rule:: - - testpmd> flow validate 0 priority 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / udp src is dst is / end actions represented_port ethdev_port_id1 / end - - Get the message:: - - Flow rule validated - -2. Create a rule and list rules:: - - testpmd> flow create 0 priority 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / udp src is dst is / end actions represented_port ethdev_port_id1 / end - - Get the message:: - - Flow rule #0 created - - Check the flow list:: - - testpmd> flow list 0 - - ID Group Prio Attr Rule - 0 0 0 i-- ETH VLAN VLAN IPV6 UDP => VF - -3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. - -Tester:: - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/UDP(sport=,dport=)/("X"*80)],iface="") - -DUT:: - - testpmd> port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=150 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_UDP - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_UDP - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0 - ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN - -4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. - -Tester:: - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/UDP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/UDP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/UDP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/UDP(sport=,dport=)/("X"*80)],iface="") - -5. Destroy a rule and list rules:: - - testpmd> flow destroy 0 rule 0 - - Get the message:: - - Flow rule #0 destroyed - - Check the flow list:: - - testpmd> flow list 0 - - Check the rule not exists in the list. - Send matched packets in step 3, check the packets are not to port 2. - -Test case 6: MAC_QINQ_IPV6_TCP ------------------------------- -The test case enable QINQ switch filter for IPv6 + TCP in pipeline mode, and port can support as dst MAC + outer VLAN id + inner VLAN id + IPv6 + TCP. - -Test steps -~~~~~~~~~~ -1. Validate a rule:: - - testpmd> flow validate 0 priority 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / tcp src is dst is / end actions represented_port ethdev_port_id1 / end - - Get the message:: - - Flow rule validated - -2. Create a rule and list rules:: - - testpmd> flow create 0 priority 0 ingress pattern eth dst is / vlan tci is / vlan tci is / ipv6 dst is / tcp src is dst is / end actions represented_port ethdev_port_id1 / end - - Get the message:: - - Flow rule #0 created - - Check the flow list:: - - testpmd> flow list 0 - - ID Group Prio Attr Rule - 0 0 0 i-- ETH VLAN VLAN IPV6 TCP => VF - -3. Send matched packet in scapy on tester, check the port 2 of DUT received this packet. - -Tester:: - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/TCP(sport=,dport=)/("X"*80)],iface="") - -DUT:: - - testpmd> port 2/queue 0: received 1 packets - src=00:00:00:00:00:00 - dst=00:11:22:33:44:55 - type=0x8100 - length=162 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN L4_TCP - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV6 INNER_L4_TCP - l2_len=18 - inner_l2_len=4 - inner_l3_len=40 - inner_l4_len=20 - Receive queue=0x0 - ol_flags: RTE_MBUF_F_RX_L4_CKSUM_GOOD RTE_MBUF_F_RX_IP_CKSUM_GOOD RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN - -4. Send mismatched packet in scapy on tester, check the port 2 of DUT could not receive this packet. - -Tester:: - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/TCP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/TCP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/TCP(sport=,dport=)/("X"*80)],iface="") - - >>> sendp([Ether(dst="",type=0x8100)/Dot1Q(vlan=,type=0x8100)/Dot1Q(vlan=,type=0x86DD)/IPv6(dst="")/TCP(sport=,dport=)/("X"*80)],iface="") - -5. Destroy a rule and list rules:: - - testpmd> flow destroy 0 rule 0 - - Get the message:: - - Flow rule #0 destroyed - - Check the flow list:: - - testpmd> flow list 0 - - Check the rule not exists in the list. - Send matched packets in step 3, check the packets are not to port 2. +9. remove rx_vlan:: + testpmd> rx_vlan rm 11 2 +10. repeat step 5, check the pkts can not be received by VF1. From patchwork Wed Jan 11 10:38:57 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Jiale, SongX" X-Patchwork-Id: 121803 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id E86F142380; Wed, 11 Jan 2023 03:41:21 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id E2C2042BD9; Wed, 11 Jan 2023 03:41:21 +0100 (CET) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id 21B294021E for ; Wed, 11 Jan 2023 03:41:19 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673404880; x=1704940880; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=86XB8T544sbkI0QYXtNo2WxM8PJE0vdv5xKKcLHSYhs=; b=AvgK2Eh1Ilc835OUU2MuZbkz633ZIOtqmXmIBGgHmG6TjTUdJjLkOrMj 5q4p7vRCcz0dB1QcAvJLffs/ky+9KgvyZE9ovp+E8/9d7PWf1ahAYk/Kb uaXqaav822aYO8zf6i5bHs50bmkldfypDW+dL4RoQg8Ys1iFyCu4tmCln l+PYyYuXBjLZ6fbeYzlawco4iTkkGCNVrUDjVySszBAIvke6qs7ureQhv gK8MkZvL3YDP4jj3sANzUaADS2Ks3EoEy1W90tWSjTc+EnsO00Uo2EM3N 65OK9quroFXCH0J6Q2O23ADG8PUww3o/rOHUS3b0cfmYVyIKTUeT9L4Bt g==; X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="350541484" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="350541484" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2023 18:41:19 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="764985953" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="764985953" Received: from unknown (HELO localhost.localdomain) ([10.239.252.20]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2023 18:41:18 -0800 From: Song Jiale To: dts@dpdk.org Cc: Song Jiale Subject: [dts] [PATCH V2 4/5] test_plans/kernelpf_iavf: split the test suite of ice_qinq Date: Wed, 11 Jan 2023 10:38:57 +0000 Message-Id: <20230111103858.970228-5-songx.jiale@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230111103858.970228-1-songx.jiale@intel.com> References: <20230111103858.970228-1-songx.jiale@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org split iavf cases in ice_qinq to kernelpf_iavf. Signed-off-by: Song Jiale --- test_plans/kernelpf_iavf_test_plan.rst | 574 +++++++++++++++++++++++++ 1 file changed, 574 insertions(+) diff --git a/test_plans/kernelpf_iavf_test_plan.rst b/test_plans/kernelpf_iavf_test_plan.rst index 7af79f1b..5b91d38b 100644 --- a/test_plans/kernelpf_iavf_test_plan.rst +++ b/test_plans/kernelpf_iavf_test_plan.rst @@ -370,3 +370,577 @@ After the packet forwarded, thread on core6 and core 7 will return to sleep:: Send packet flows to VF0 and VF1, check that thread on core6 and core7 will keep up awake. + +Test case: IAVF DUAL VLAN filtering +=================================== + +1. enable vlan filtering on port VF:: + + testpmd> set fwd mac + Set mac packet forwarding mode + testpmd> vlan set filter on 0 + +2. check the vlan mode is set successfully:: + + testpmd> show port info 0 + + ********************* Infos for port 0 ********************* + ...... + VLAN offload: + strip off, filter on, extend off, qinq strip off + +3. tester send qinq pkt and single vlan pkt which outer vlan id is 1 to VF:: + + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + +4. check the pkts can't be received in VF. + +5. add rx_vlan in VF:: + + testpmd> rx_vlan add 1 0 + +6. repeat step 3, check the pkts can be received by VF and fwd to tester:: + + testpmd> port 0/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - hw ptype: L2_ETHER - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN - l2_len=18 - inner_l2_len=4 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + port 0/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - hw ptype: L2_ETHER - sw ptype: L2_ETHER_VLAN - l2_len=18 - Receive queue=0x0 + ol_flags: PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + tcpdump -i ens786f0 -nn -e -v + + 16:50:38.807158 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype 0x0800, + 16:50:38.807217 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype 0x0800, + + 16:51:06.083084 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype 0x0800, + 16:51:06.083127 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype 0x0800, + +7. tester send qinq pkt and single vlan pkt which outer vlan id is 11 to VF:: + + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=11,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=11,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + +8. check the pkts can not be received by VF. + +9. remove rx_vlan in VF1:: + + testpmd> rx_vlan rm 1 0 + +10. repeat step 3, check the pkts can not be received by VF. + + +Test case: IAVF DUAL VLAN header stripping +========================================== + +1. enable vlan filtering on port VF:: + + testpmd> vlan set filter on 0 + testpmd> rx_vlan add 1 0 + +2. check the vlan mode is set successfully:: + + testpmd> show port info 0 + + ********************* Infos for port 0 ********************* + ...... + VLAN offload: + strip off, filter on, extend off, qinq strip off + +3. enable vlan header stripping on VF:: + + testpmd> vlan set strip on 0 + +4. check the vlan mode is set successfully:: + + testpmd> show port info 0 + + ********************* Infos for port 0 ********************* + ...... + VLAN offload: + strip on, filter on, extend off, qinq strip off + +5. tester send qinq pkt and single vlan pkt which outer vlan id is 1 to VF:: + + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + +6. check the pkts can be received in VF and fwd to tester without outer vlan header:: + + testpmd> port 0/queue 10: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0xc7b627aa - RSS queue=0xa - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0xa + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + port 0/queue 10: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0xc7b627aa - RSS queue=0xa - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0xa + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + 10:12:38.034948 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:12:38.035025 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + + 10:12:44.806825 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:12:44.806865 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + +7. disable vlan header stripping on VF1:: + + testpmd> vlan set strip off 0 + +8. check the vlan mode is set successfully:: + + testpmd> show port info 0 + + ********************* Infos for port 0 ********************* + ...... + VLAN offload: + strip off, filter on, extend off, qinq strip off + +9. repeat step 5, check the pkts can be received in VF and fwd to tester with outer vlan header:: + + testpmd> port 0/queue 10: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - RSS hash=0xc7b627aa - RSS queue=0xa - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0xa + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + port 0/queue 10: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0xc7b627aa - RSS queue=0xa - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0xa + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + 09:49:08.295172 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 09:49:08.295239 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + + 09:49:41.043101 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 09:49:41.043166 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + +Test case: IAVF DUAL VLAN header insertion +========================================== + +1. enable vlan filtering on port VF:: + + testpmd> vlan set filter on 0 + testpmd> rx_vlan add 11 0 + +2. set up test environment again:: + + echo 1 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs + ip link set ens785f0 vf 0 mac 00:11:22:33:44:11 + ip link set dev ens785f0 vf 0 spoofchk off + ./usertools/dpdk-devbind.py -b vfio-pci 0000:18:01.0 + ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -c 0xf -n 4 -a 0000:18:01.0 -- -i --rxq=16 --txq=16 + testpmd> set fwd mac + testpmd> set verbose 1 + +3. enable vlan header insertion on VF:: + + testpmd> port stop 0 + Stopping ports... + Checking link statuses... + Done + testpmd> tx_vlan set 0 1 + testpmd> port start 0 + +4. tester send pkt to VF:: + + sendp([Ether(dst="00:11:22:33:44:11",type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=11,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + +5. check the pkts with vlan header can be received in tester:: + + testpmd> port 0/queue 13: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0xcaf4abfd - RSS queue=0xd - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0xd + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + port 0/queue 8: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0x28099b78 - RSS queue=0x8 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0x8 + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + 10:32:55.566801 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:32:55.566856 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + + 06:29:32.281896 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 06:29:32.281940 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 11, p 0, ethertype 802.1Q, vlan 1, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + +6. disable vlan header insertion on VF1:: + + testpmd> port stop 0 + Stopping ports... + Checking link statuses... + Done + testpmd> tx_vlan reset 0 + testpmd> port start 0 + +7. repeat step 4, check the pkts without vlan tag can be received in tester:: + + testpmd> port 0/queue 9: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0xa63e8869 - RSS queue=0x9 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x9 + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + port 0/queue 12: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0x6f5533bc - RSS queue=0xc - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Receive queue=0xc + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + 10:34:40.070754 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:34:40.070824 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + + 06:36:57.641871 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 518: vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 06:36:57.641909 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 11, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + + +Test case: Enable/disable AVF CRC stripping +=========================================== + +1. start testpmd with "--disable-crc-strip":: + + ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -l 20-23 -n 4 -a 0000:18:01.0 -- -i --rxq=16 --txq=16 --disable-crc-strip + testpmd> set fwd mac + testpmd> set verbose 1 + +2. send pkts to VF:: + + sendp([Ether(dst="00:11:22:33:44:11",type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + +3. check VF1 receive this pkts with CRC:: + + testpmd> port 0/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0x890d9a70 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + show port stats all + + ######################## NIC statistics for port 0 ######################## + RX-packets: 1 RX-missed: 0 RX-bytes: 518 + RX-errors: 0 + RX-nombuf: 0 + TX-packets: 1 TX-errors: 0 TX-bytes: 514 + + Throughput (since last show) + Rx-pps: 0 Rx-bps: 0 + Tx-pps: 0 Tx-bps: 0 + ############################################################################ + clear port stats all + +4. enable crc strip in testpmd:: + + testpmd> stop + testpmd> port stop 0 + testpmd> port config 0 rx_offload keep_crc off + testpmd> port start 0 + testpmd> start + +5. repeat step 2, check VF receive this pkts without CRC:: + + testpmd> port 0/queue 2: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0xa94c21d2 - RSS queue=0x2 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x2 + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + show port stats all + + ######################## NIC statistics for port 0 ######################## + RX-packets: 1 RX-missed: 0 RX-bytes: 514 + RX-errors: 0 + RX-nombuf: 0 + TX-packets: 1 TX-errors: 0 TX-bytes: 514 + + Throughput (since last show) + Rx-pps: 0 Rx-bps: 0 + Tx-pps: 0 Tx-bps: 0 + ############################################################################ + clear port stats all + +6. disable crc strip in testpmd:: + + testpmd> stop + testpmd> port stop 0 + testpmd> port config 0 rx_offload keep_crc on + testpmd> port start 0 + testpmd> start + +7. repeat step 2, check VF1 receive this pkts with CRC:: + + testpmd> port 0/queue 0: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0x79c10190 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0 + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + show port stats all + + ######################## NIC statistics for port 0 ######################## + RX-packets: 1 RX-missed: 0 RX-bytes: 518 + RX-errors: 0 + RX-nombuf: 0 + TX-packets: 1 TX-errors: 0 TX-bytes: 514 + + Throughput (since last show) + Rx-pps: 0 Rx-bps: 0 + Tx-pps: 0 Tx-bps: 0 + ############################################################################ + clear port stats all + +8. re-launch testpmd without "--disable-crc-strip":: + + ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -l 20-23 -n 4 -a 0000:18:01.0 -- -i --rxq=16 --txq=16 + testpmd> set fwd mac + testpmd> set verbose 1 + +9. repeat step 2, check VF receive this pkts without CRC:: + + testpmd> port 0/queue 2: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0x898ada82 - RSS queue=0x2 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x2 + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + show port stats all + + ######################## NIC statistics for port 0 ######################## + RX-packets: 1 RX-missed: 0 RX-bytes: 514 + RX-errors: 0 + RX-nombuf: 0 + TX-packets: 1 TX-errors: 0 TX-bytes: 514 + + Throughput (since last show) + Rx-pps: 0 Rx-bps: 0 + Tx-pps: 0 Tx-bps: 0 + ############################################################################ + + +Test case: IAVF CRC strip and Vlan strip co-exists +================================================== + +1. start testpmd with crc strip enable, vlan strip disable:: + + ./x86_64-native-linuxapp-gcc/app/dpdk-testpmd -l 20-23 -n 4 -a 0000:18:01.0 -- -i --rxq=16 --txq=16 + testpmd> set fwd mac + testpmd> set verbose 1 + testpmd> show port info 0 + ********************* Infos for port 0 ********************* + MAC address: 00:11:22:33:44:11 + Device name: 0000:18:01.1 + Driver name: net_iavf + ...... + VLAN offload: + strip off, filter off, extend off, qinq strip off + +2. request disable vlan strip:: + + testpmd> vlan set strip off 0 + +3. check the vlan strip still disable:: + + testpmd> show port info 0 + ********************* Infos for port 0 ********************* + MAC address: 00:11:22:33:44:11 + Device name: 0000:18:01.1 + Driver name: net_iavf + ...... + VLAN offload: + strip off, filter off, extend off, qinq strip off + +4. set vlan filter on and add rx_vlan 1:: + + testpmd> vlan set filter on 0 + testpmd> rx_vlan add 1 0 + testpmd> start + +5. send qinq pkts to check vlan strip is off, crc strip is on:: + + sendp([Ether(dst="00:11:22:33:44:11",type=0x8100)/Dot1Q(vlan=1,type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="196.222.232.221")/("X"*480)], iface="ens786f0") + + testpmd> port 0/queue 6: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - RSS hash=0xf6521426 - RSS queue=0x6 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0x6 + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + show port stats all + + ######################## NIC statistics for port 0 ######################## + RX-packets: 1 RX-missed: 0 RX-bytes: 522 + RX-errors: 0 + RX-nombuf: 0 + TX-packets: 1 TX-errors: 0 TX-bytes: 522 + + Throughput (since last show) + Rx-pps: 0 Rx-bps: 0 + Tx-pps: 0 Tx-bps: 0 + ############################################################################ + + 09:07:45.863251 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 09:07:45.863340 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + +6. request enable vlan strip:: + + testpmd> vlan set strip on 0 + +7. check the vlan strip enable successfully:: + + testpmd> show port info 0 + ********************* Infos for port 0 ********************* + MAC address: 00:11:22:33:44:11 + Device name: 0000:18:01.1 + Driver name: net_iavf + ...... + VLAN offload: + strip on, filter off, extend off, qinq strip off + +8. repeat step 5, send qinq pkts to check vlan strip is on(tx-4), crc strip is on:: + + testpmd> port 0/queue 6: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0xf6521426 - RSS queue=0x6 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Tail/CRC: 0x58585858/0x00000000 - Receive queue=0x6 + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + show port stats all + + ######################## NIC statistics for port 0 ######################## + RX-packets: 1 RX-missed: 0 RX-bytes: 522 + RX-errors: 0 + RX-nombuf: 0 + TX-packets: 1 TX-errors: 0 TX-bytes: 518 + + Throughput (since last show) + Rx-pps: 0 Rx-bps: 0 + Tx-pps: 0 Tx-bps: 0 + ############################################################################ + + 11:09:03.918907 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 11:09:03.918952 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 518: vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + +9. request disable vlan strip:: + + testpmd> vlan set strip off 0 + +10. check the vlan strip disable successfully:: + + testpmd> show port info 0 + ********************* Infos for port 0 ********************* + MAC address: 00:11:22:33:44:11 + Device name: 0000:18:01.1 + Driver name: net_iavf + ...... + VLAN offload: + strip off, filter on, extend off, qinq strip off + +11. request disable crc strip:: + + testpmd> stop + testpmd> port stop 0 + testpmd> port config 0 rx_offload keep_crc on + testpmd> port start 0 + testpmd> start + +12. repeat step 5, send qinq pkts to check vlan strip is off, crc strip is off(rx+4):: + + testpmd> port 0/queue 7: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - RSS hash=0xbc8b1857 - RSS queue=0x7 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Tail/CRC: 0x58585858/0x6d870bf6 - Receive queue=0x7 + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + show port stats all + ######################## NIC statistics for port 0 ######################## + RX-packets: 1 RX-missed: 0 RX-bytes: 526 + RX-errors: 0 + RX-nombuf: 0 + TX-packets: 1 TX-errors: 0 TX-bytes: 522 + + Throughput (since last show) + Rx-pps: 0 Rx-bps: 0 + Tx-pps: 0 Tx-bps: 0 + ############################################################################ + + 10:23:57.350934 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:23:57.351008 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + +13. request enable vlan strip:: + + testpmd> vlan set strip on 0 + iavf_execute_vf_cmd(): No response or return failure (-64) for cmd 54 + iavf_config_vlan_strip_v2(): fail to execute command VIRTCHNL_OP_ENABLE_VLAN_STRIPPING_V2 + rx_vlan_strip_set(port_pi=0, on=1) failed diag=-5 + +14. repeat step 5, send qinq pkts to check the vlan strip can not enable:: + + testpmd> port 0/queue 7: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=518 - nb_segs=1 - RSS hash=0xbc8b1857 - RSS queue=0x7 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN L3_IPV4 - l2_len=18 - l3_len=20 - Tail/CRC: 0x58585858/0x6d870bf6 - Receive queue=0x7 + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + show port stats all + ######################## NIC statistics for port 0 ######################## + RX-packets: 1 RX-missed: 0 RX-bytes: 526 + RX-errors: 0 + RX-nombuf: 0 + TX-packets: 1 TX-errors: 0 TX-bytes: 522 + + Throughput (since last show) + Rx-pps: 0 Rx-bps: 0 + Tx-pps: 0 Tx-bps: 0 + ############################################################################ + + 10:26:08.346936 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:26:08.347006 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + +15. request disable vlan strip:: + + vlan set strip off 0 + +16. check the vlan strip still disable:: + + testpmd> show port info 0 + ********************* Infos for port 0 ********************* + MAC address: 00:11:22:33:44:11 + Device name: 0000:18:01.1 + Driver name: net_iavf + ...... + VLAN offload: + strip off, filter on, extend off, qinq strip off + +17. request enable crc strip:: + + testpmd> stop + testpmd> port stop 0 + testpmd> port config 0 rx_offload keep_crc off + testpmd> port start 0 + testpmd> start + +18. repeat step 5, send qinq pkts to check the crc strip enable successfully:: + + testpmd> port 0/queue 3: received 1 packets + src=00:00:00:00:00:00 - dst=00:11:22:33:44:11 - type=0x8100 - length=522 - nb_segs=1 - RSS hash=0x2b4ad203 - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Receive queue=0x3 + ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + port 0/queue 3: sent 1 packets + src=00:11:22:33:44:11 - dst=02:00:00:00:00:00 - type=0x8100 - length=522 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER_VLAN INNER_L2_ETHER_VLAN INNER_L3_IPV4 - l2_len=18 - inner_l2_len=4 - inner_l3_len=20 - Send queue=0x3 + ol_flags: PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_UNKNOWN PKT_RX_OUTER_L4_CKSUM_UNKNOWN + + show port stats all + ######################## NIC statistics for port 0 ######################## + RX-packets: 1 RX-missed: 0 RX-bytes: 522 + RX-errors: 0 + RX-nombuf: 0 + TX-packets: 1 TX-errors: 0 TX-bytes: 522 + + Throughput (since last show) + Rx-pps: 0 Rx-bps: 0 + Tx-pps: 0 Tx-bps: 0 + ############################################################################ + + 10:29:19.995352 00:00:00:00:00:00 > 00:11:22:33:44:11, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + 10:29:19.995424 00:11:22:33:44:11 > 02:00:00:00:00:00, ethertype 802.1Q (0x8100), length 522: vlan 1, p 0, ethertype 802.1Q, vlan 2, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto Options (0), length 500) + 196.222.232.221 > 127.0.0.1: ip-proto-0 480 + From patchwork Wed Jan 11 10:38:58 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Jiale, SongX" X-Patchwork-Id: 121804 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 40F4142383; Wed, 11 Jan 2023 03:41:22 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 3C7BE42D25; Wed, 11 Jan 2023 03:41:22 +0100 (CET) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id DC1FF42D24 for ; Wed, 11 Jan 2023 03:41:20 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1673404881; x=1704940881; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=462HNF0uaAnBED5PPYaVv/fdL+i7bFR/zOVMdUWah2Y=; b=ib1neiam59dZoLq0duVZO30NZzdIBPImU+viOlzwqPgOXMbCo4ESkpvD uRrZjOfrMnfn+1vUOLFyablkiIXBmpQye+qP9Y9Z3r1CVKUoRj8unutE8 cmv5eo783sflfsGj0B21AtS01hJMKkKLD/rhTFLcbi7Wgnswrth1A3HwH HP9nZAgO26UqLlv9F+a7JiXg3Q80UtlidpoqTAC4SpcmZhSFAx2/qnIN3 JnJq0fHltAlqMMolqlBo+YDgEJo1Qbeo6zqsUIw1dxVMmDJIwVMCUOq7T CaaP5mE+wbdBmW0NWhpiadnPgASG0nUy2q7keAmXZu7LTdTRKx9wEWxsA A==; X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="350541486" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="350541486" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2023 18:41:20 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10586"; a="764985969" X-IronPort-AV: E=Sophos;i="5.96,315,1665471600"; d="scan'208";a="764985969" Received: from unknown (HELO localhost.localdomain) ([10.239.252.20]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 10 Jan 2023 18:41:19 -0800 From: Song Jiale To: dts@dpdk.org Cc: Song Jiale Subject: [dts] [PATCH V2 5/5] test_plans/index: split the test suite of ice_qinq Date: Wed, 11 Jan 2023 10:38:58 +0000 Message-Id: <20230111103858.970228-6-songx.jiale@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20230111103858.970228-1-songx.jiale@intel.com> References: <20230111103858.970228-1-songx.jiale@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org delete ice_qinq and add ice_dcf_dual_vlan. Signed-off-by: Song Jiale Acked-by: Lijuan Tu --- test_plans/index.rst | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/test_plans/index.rst b/test_plans/index.rst index 41db87fb..70aab286 100644 --- a/test_plans/index.rst +++ b/test_plans/index.rst @@ -50,7 +50,7 @@ The following are the test plans for the DPDK DTS automated test system. ice_iavf_rx_timestamp_test_plan ice_iavf_fdir_pppol2tpoudp_test_plan ice_limit_value_test_test_plan - ice_qinq_test_plan + ice_dcf_dual_vlan_test_plan ice_rss_configure_test_plan ice_switch_filter_test_plan ice_switch_filter_pppoe_test_plan