From patchwork Thu Dec 29 04:52:03 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yu Jiang X-Patchwork-Id: 121461 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 3C610A0542; Thu, 29 Dec 2022 05:52:16 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 36A4B42D20; Thu, 29 Dec 2022 05:52:16 +0100 (CET) Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by mails.dpdk.org (Postfix) with ESMTP id A1DE7410F9 for ; Thu, 29 Dec 2022 05:52:14 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1672289534; x=1703825534; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=rXE7GsTn98j3EMMN1dIv/ytfqE9KAMwGh2DqpOgZhRw=; b=JU+8MX4jEzkML2nqhw2D7kmh4ZurSSKYHwDRMH2g0fONt+2LpcdoOsiB +o+elQi5/N4eb/5wNO7OGcCTfFeJmD2+r1wZVRbzDOhIQLHQfHUPldR7n sl3BTCNDgTeCg9Zv6sBpl+VjIawgbeoC+PxocZIbRGayYbAJoY8E82JR1 9+lxxOqLek5Qz5gthYmvW8bMlV9vjkg0RTooSCisaLCBPVC4k+tBMb08g 6OqSbxPzvDJHAjFDTlvP1X7migBeiCkHQkgKEPU7up1wE/N4wo/YNaXyW qlEFsJ4cY1c7sTNYVOxMFeQM8WjUrpaOL5ekrFtju20SRk+ZutIxHpo1I g==; X-IronPort-AV: E=McAfee;i="6500,9779,10574"; a="407245240" X-IronPort-AV: E=Sophos;i="5.96,282,1665471600"; d="scan'208";a="407245240" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Dec 2022 20:52:13 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10574"; a="742198616" X-IronPort-AV: E=Sophos;i="5.96,282,1665471600"; d="scan'208";a="742198616" Received: from unknown (HELO localhost.localdomain) ([10.239.252.196]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 28 Dec 2022 20:52:10 -0800 From: Yu Jiang To: qi.fu@intel.com, dts@dpdk.org Cc: Yu Jiang Subject: [dts][PATCH V1 2/2] tests/vf_l2fwd: add vf_l2fwd test script Date: Thu, 29 Dec 2022 12:52:03 +0800 Message-Id: <20221229045203.2210928-3-yux.jiang@intel.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221229045203.2210928-1-yux.jiang@intel.com> References: <20221229045203.2210928-1-yux.jiang@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org tests/vf_l2fwd: add vf_l2fwd test script Signed-off-by: Yu Jiang Acked-by: Yuan Peng Tested-by: Song Jiale Acked-by: Lijuan Tu --- tests/TestSuite_vf_l2fwd.py | 136 ++++++++++++++++++++++++++++++++++++ 1 file changed, 136 insertions(+) create mode 100644 tests/TestSuite_vf_l2fwd.py diff --git a/tests/TestSuite_vf_l2fwd.py b/tests/TestSuite_vf_l2fwd.py new file mode 100644 index 00000000..542838c6 --- /dev/null +++ b/tests/TestSuite_vf_l2fwd.py @@ -0,0 +1,136 @@ +# SPDX-License-Identifier: BSD-3-Clause +# Copyright(c) 2022 Intel Corporation +# + +""" +DPDK Test suite. +Test Layer-2 Forwarding support +""" +import os +import time + +import framework.utils as utils +from framework.pktgen import PacketGeneratorHelper +from framework.settings import HEADER_SIZE +from framework.test_case import TestCase + + +class TestVfL2fwd(TestCase): + def set_up_all(self): + """ + Run at the start of each test suite. + + L2fwd prerequisites. + """ + self.core_config = "1S/4C/1T" + self.dut_ports = self.dut.get_ports() + self.test_queues = [ + {"queues": 1, "Mpps": {}, "pct": {}}, + {"queues": 2, "Mpps": {}, "pct": {}}, + {"queues": 4, "Mpps": {}, "pct": {}}, + {"queues": 8, "Mpps": {}, "pct": {}}, + ] + self.number_of_ports = 2 + self.headers_size = HEADER_SIZE["eth"] + HEADER_SIZE["ip"] + HEADER_SIZE["udp"] + self.verify( + len(self.dut_ports) >= self.number_of_ports, + "Not enough ports for " + self.nic, + ) + self.ports_socket = self.dut.get_numa_id(self.dut_ports[0]) + # compile + out = self.dut.build_dpdk_apps("./examples/l2fwd") + self.app_l2fwd_path = self.dut.apps_name["l2fwd"] + + def set_up(self): + """ + Run before each test case. + """ + pass + + def quit_l2fwd(self): + self.dut.send_expect("fg", "l2fwd ", 5) + self.dut.send_expect("^C", "# ", 5) + + def test_vf_l2fwd_port_forward(self): + """ + Check port forwarding testing. + """ + VF_MAC_ADDR_port0 = "00:11:22:33:44:55" + VF_MAC_ADDR_port1 = "00:11:22:33:44:66" + # generate vf + self.dut.bind_interfaces_linux(self.kdriver) + self.dut.generate_sriov_vfs_by_port(self.dut_ports[0], 1, self.kdriver) + self.sriov_vfs_port_0 = self.dut.ports_info[self.dut_ports[0]]["vfs_port"] + self.verify(len(self.sriov_vfs_port_0) != 0, "VF create failed") + self.dut.generate_sriov_vfs_by_port(self.dut_ports[1], 1, self.kdriver) + self.sriov_vfs_port_1 = self.dut.ports_info[self.dut_ports[1]]["vfs_port"] + self.vf_ports = [self.sriov_vfs_port_0[0].pci, self.sriov_vfs_port_1[0].pci] + for port in self.sriov_vfs_port_0 + self.sriov_vfs_port_1: + port.bind_driver(self.drivername) + + # set vf mac address + self.dut.send_expect( + "ip link set %s vf 0 mac %s" + % (self.dut.ports_info[self.dut_ports[0]]["intf"], VF_MAC_ADDR_port0), + "# ", + ) + self.dut.send_expect( + "ip link set %s vf 0 mac %s" + % (self.dut.ports_info[self.dut_ports[1]]["intf"], VF_MAC_ADDR_port1), + "# ", + ) + # the cases use the first two ports + port_mask = utils.create_mask([self.dut_ports[0], self.dut_ports[1]]) + cores = self.dut.get_core_list(self.core_config, socket=self.ports_socket) + eal_params = self.dut.create_eal_parameters(cores=cores, ports=self.vf_ports) + for queues in self.test_queues: + command_line = "./%s %s -- -q %s -p %s &" % ( + self.app_l2fwd_path, + eal_params, + str(queues["queues"]), + port_mask, + ) + self.dut.send_expect(command_line, "L2FWD: entering main loop", 60) + # Trigger the packet generator of bursting packets from ``port A``, then check if + # ``port 0`` could receive them and ``port 1`` could forward them back. + tgen_input = [] + tx_port = self.tester.get_local_port(self.dut_ports[0]) + rx_port = self.tester.get_local_port(self.dut_ports[1]) + self.tester.is_interface_up(self.tester.get_interface(rx_port)) + tgen_input.append((tx_port, rx_port)) + self.logger.info("check port A -> port 0 -> port 1 -> port B") + result_B = self.tester.check_random_pkts( + tgen_input, + allow_miss=False, + params=[("ether", {"dst": "%s" % (VF_MAC_ADDR_port0)})], + ) + # trigger the packet generator of bursting packets from ``port B``, then + # check if ``port 1`` could receive them and ``port 0`` could forward them back. + tgen_input = [] + rx_port = self.tester.get_local_port(self.dut_ports[0]) + tx_port = self.tester.get_local_port(self.dut_ports[1]) + tgen_input.append((tx_port, rx_port)) + self.logger.info("check port B -> port 1 -> port 0 -> port A") + result_A = self.tester.check_random_pkts( + tgen_input, + allow_miss=False, + params=[("ether", {"dst": "%s" % (VF_MAC_ADDR_port1)})], + ) + + self.verify(result_B != False, "result_B Packet integrity check failed") + self.verify(result_A != False, "result_A Packet integrity check failed") + + self.quit_l2fwd() + + def tear_down(self): + """ + Run after each test case. + """ + self.dut.send_expect("fg", "l2fwd|# ", 5) + self.dut.send_expect("^C", "# ", 5) + + def tear_down_all(self): + """ + Run after each test suite. + """ + pass