From patchwork Wed Nov 30 03:53:57 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Ke Xu X-Patchwork-Id: 120310 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 2651FA00C2; Wed, 30 Nov 2022 04:55:13 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 2200242BD9; Wed, 30 Nov 2022 04:55:13 +0100 (CET) Received: from mga17.intel.com (mga17.intel.com [192.55.52.151]) by mails.dpdk.org (Postfix) with ESMTP id 0091542D0C for ; Wed, 30 Nov 2022 04:55:11 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1669780512; x=1701316512; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=oQHDm+fZVJsr87E5fHRegdUksvbRQGH+K+n6m9RW2Ec=; b=n2vRJ3JE27vvBU0u3OOJNaZgdW/jiw77rNW9i4IZGj+/8OkTtOV3pLdO AyqUfnIiCH9RJGEN6sHGCiNfBHznWETdr04g5ZGLLZyThR9wYngLvMImR slJ5PJmbdLVfMseZiXmUxm4SeLFbHXYWa05yRTgyYAMoirTcX86ee3+br PqrSaS8W5bmHE1bhErSF8qMy81fV9gJyW3hmFpu8Z4jkRQZGyDHI/973c 4NTL9jidAS3XAIsAJJR4eAcC/7Ffi800Pwvj/Z+Fi8+nNz1t1VLJCCKTe DM2Pvkx85qteJTf76rFzirponTftVpb9tn9KNMNR5/bn3W8a0Nm4Lv0pj g==; X-IronPort-AV: E=McAfee;i="6500,9779,10546"; a="295660525" X-IronPort-AV: E=Sophos;i="5.96,205,1665471600"; d="scan'208";a="295660525" Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga107.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 29 Nov 2022 19:55:11 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6500,9779,10546"; a="594517783" X-IronPort-AV: E=Sophos;i="5.96,205,1665471600"; d="scan'208";a="594517783" Received: from dpdk-xuke-lab.sh.intel.com ([10.67.114.198]) by orsmga003.jf.intel.com with ESMTP; 29 Nov 2022 19:55:10 -0800 From: Ke Xu To: dts@dpdk.org Cc: lijuan.tu@intel.com, Ke Xu , Jin Ling Subject: [DTS][PATCH V1 2/3] test_plans/ice_dcf_acl_filter: remove redundant white space Date: Wed, 30 Nov 2022 11:53:57 +0800 Message-Id: <20221130035358.98410-3-ke1.xu@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221130035358.98410-1-ke1.xu@intel.com> References: <20221130035358.98410-1-ke1.xu@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Signed-off-by: Jin Ling Signed-off-by: Ke Xu --- test_plans/ice_dcf_acl_filter_test_plan.rst | 12 ++++++------ 1 file changed, 6 insertions(+), 6 deletions(-) diff --git a/test_plans/ice_dcf_acl_filter_test_plan.rst b/test_plans/ice_dcf_acl_filter_test_plan.rst index f047598d..893c1078 100644 --- a/test_plans/ice_dcf_acl_filter_test_plan.rst +++ b/test_plans/ice_dcf_acl_filter_test_plan.rst @@ -522,14 +522,14 @@ while we can create 256 ipv4-udp/ipv4-tcp/ipv4-sctp rules at most. sendp([Ether(dst="00:01:23:45:67:89")/IP(src="192.168.1.0", dst="192.168.100.2")/UDP(sport=8010,dport=8017)/Raw(load='X'*30)], iface="enp134s0f1") check the packet can't be received by VF1. stop the forward:: - + ---------------------- Forward statistics for port 1 ---------------------- RX-packets: 0 RX-dropped: 0 RX-total: 0 TX-packets: 0 TX-dropped: 0 TX-total: 0 ---------------------------------------------------------------------------- 8. delete the rule 256 and 257:: - + flow destroy 0 rule 256 flow destroy 0 rule 257 @@ -542,7 +542,7 @@ while we can create 256 ipv4-udp/ipv4-tcp/ipv4-sctp rules at most. 9. create the rule in the step6 again, check the rule can be created as acl rule successfully. list the rules, there are rule 0-256 listed. - + 10.send packet2 again, check the packet dropped. stop the forward:: ---------------------- Forward statistics for port 1 ---------------------- @@ -565,7 +565,7 @@ Test Case 6: max entry number ipv4-other flow create 0 ingress pattern eth / ipv4 src spec 192.168.0.1 src mask 255.255.255.255 / end actions drop / end 3. create 64 ipv4-other ACL rules:: - + flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.1 src mask 255.255.0.255 / end actions drop / end flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.2 src mask 255.255.0.255 / end actions drop / end flow create 0 ingress pattern eth / ipv4 src spec 192.168.1.3 src mask 255.255.0.255 / end actions drop / end @@ -599,12 +599,12 @@ Test Case 6: max entry number ipv4-other sendp([Ether(dst="00:01:23:45:67:89")/IP(src="192.168.0.2", dst="192.168.1.2")/Raw(load='X'*30)], iface="enp134s0f1") check the packet can't be received by vf1. stop forward:: - + ---------------------- Forward statistics for port 1 ---------------------- RX-packets: 0 RX-dropped: 0 RX-total: 0 TX-packets: 0 TX-dropped: 0 TX-total: 0 ---------------------------------------------------------------------------- - + 8. delete the rule 64 and 65:: flow destroy 0 rule 64