From patchwork Wed Jan 4 07:20:50 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ke Xu X-Patchwork-Id: 121558 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 95529A00C2; Wed, 4 Jan 2023 08:22:33 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 66BEF40A82; Wed, 4 Jan 2023 08:22:33 +0100 (CET) Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by mails.dpdk.org (Postfix) with ESMTP id D23E240697 for ; Wed, 4 Jan 2023 08:22:31 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1672816952; x=1704352952; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=3ZiLKZeQmEYalAQlSY2Ly5K7WcCVZJY7nnKLvC5dsiA=; b=etL4g8Td1OlK8rZ44VMD7AQWbSV84AR+kIe/nU91FSCr0I/ZneT/yL7P oqzkSLIfF/kW+VMk/bANjJa3315TZpELxrWwTXX56KhGXVCliNtRuW9Ai 92DSBGazXlkk72gd3+ZnD/HycaTECMNF8KxkBuAhOELpK9vJg/IGH9Lpw 2yWeGsdBlMnjY1zneuF3QFq9foxW+5pc9/31Tw8bOKn69WFQM3AvWDti0 qLPPYRa5jmRCFeqxQzFkAymo5Tr+0lP5Q/E4x4yTJ128lyXWYs32V9xeG C6tpNxiJ0wtMu1+6jNQglJHlvAakU5Xzg4XdfS7RUAP3WTVxIl/zKV68H g==; X-IronPort-AV: E=McAfee;i="6500,9779,10579"; a="321928097" X-IronPort-AV: E=Sophos;i="5.96,299,1665471600"; d="scan'208";a="321928097" Received: from fmsmga007.fm.intel.com ([10.253.24.52]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 03 Jan 2023 23:22:30 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10579"; a="657022753" X-IronPort-AV: E=Sophos;i="5.96,299,1665471600"; d="scan'208";a="657022753" Received: from dpdk-xuke-lab.sh.intel.com ([10.67.119.8]) by fmsmga007.fm.intel.com with ESMTP; 03 Jan 2023 23:22:29 -0800 From: Ke Xu To: dts@dpdk.org Cc: lijuan.tu@intel.com, yuan.peng@intel.com, ke1.xu@intel.com Subject: [DTS][PATCH V3 0/3] add packets count, super-long packets and random payload to the case Date: Wed, 4 Jan 2023 15:20:50 +0800 Message-Id: <20230104072053.86366-1-ke1.xu@intel.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Long packet and repeating packet sending helps triggering potential failures. For example, in DPDK 20.11 there was an MDD problem when handling long packets with TSO enabled. This patch implemented packets count that sends multiple packets of one packet combination to trigger problems only happen under massive packets received. This patch also implemented random payload. This patch added super-long packet of payload length of 8500. This helps triggering potential issues of ex-limit input. Ke Xu (3): test_plans/vf_offload: fix wrong example packets. test_plans/vf_offload: add packets count, super-long packets and random payload to the case. tests/vf_offload: implement packets count, super-long packet and random payload. test_plans/vf_offload_test_plan.rst | 155 +++++++++++++++------------- tests/TestSuite_vf_offload.py | 150 ++++++++++++++++++++++----- 2 files changed, 206 insertions(+), 99 deletions(-)