Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/121304/?format=api
http://patches.dpdk.org/api/patches/121304/?format=api", "web_url": "http://patches.dpdk.org/project/dts/patch/20221223010242.282584-4-ke1.xu@intel.com/", "project": { "id": 3, "url": "http://patches.dpdk.org/api/projects/3/?format=api", "name": "DTS", "link_name": "dts", "list_id": "dts.dpdk.org", "list_email": "dts@dpdk.org", "web_url": "", "scm_url": "git://dpdk.org/tools/dts", "webscm_url": "http://git.dpdk.org/tools/dts/", "list_archive_url": "https://inbox.dpdk.org/dts", "list_archive_url_format": "https://inbox.dpdk.org/dts/{}", "commit_url_format": "" }, "msgid": "<20221223010242.282584-4-ke1.xu@intel.com>", "list_archive_url": "https://inbox.dpdk.org/dts/20221223010242.282584-4-ke1.xu@intel.com", "date": "2022-12-23T01:02:44", "name": "[V2,3/3] tests/vf_offload: implement packets count, super-long packet and random payload.", "commit_ref": null, "pull_url": null, "state": "superseded", "archived": false, "hash": "8cf5e6e61a5b021ce7d105f4e1209650179f3522", "submitter": { "id": 2810, "url": "http://patches.dpdk.org/api/people/2810/?format=api", "name": "Ke Xu", "email": "ke1.xu@intel.com" }, "delegate": null, "mbox": "http://patches.dpdk.org/project/dts/patch/20221223010242.282584-4-ke1.xu@intel.com/mbox/", "series": [ { "id": 26250, "url": "http://patches.dpdk.org/api/series/26250/?format=api", "web_url": "http://patches.dpdk.org/project/dts/list/?series=26250", "date": "2022-12-23T01:02:41", "name": "add packets count, super-long packets and random payload to the case", "version": 2, "mbox": "http://patches.dpdk.org/series/26250/mbox/" } ], "comments": "http://patches.dpdk.org/api/patches/121304/comments/", "check": "fail", "checks": "http://patches.dpdk.org/api/patches/121304/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<dts-bounces@dpdk.org>", "X-Original-To": "patchwork@inbox.dpdk.org", "Delivered-To": "patchwork@inbox.dpdk.org", "Received": [ "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id E28C0A0093;\n\tFri, 23 Dec 2022 02:04:52 +0100 (CET)", "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id DE5774282D;\n\tFri, 23 Dec 2022 02:04:52 +0100 (CET)", "from mga09.intel.com (mga09.intel.com [134.134.136.24])\n by mails.dpdk.org (Postfix) with ESMTP id A5DC040685\n for <dts@dpdk.org>; Fri, 23 Dec 2022 02:04:51 +0100 (CET)", "from fmsmga002.fm.intel.com ([10.253.24.26])\n by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 22 Dec 2022 17:04:48 -0800", "from dpdk-xuke-lab.sh.intel.com ([10.67.119.8])\n by fmsmga002.fm.intel.com with ESMTP; 22 Dec 2022 17:04:46 -0800" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1671757491; x=1703293491;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=hOYfP6lbLkb3a+rncocps8wyD7GbSwA/+xjHTKii3YM=;\n b=T4DAnFLbjO+VlFtqbqBxYudVSegWpI0QqjwmafvUvAkaPzz88UuTgm31\n /299BnnxVOebt4loEEh98TP50FZIRNPWv0sZcmdiMOyiBhGQc0DR4JZn3\n b7xg79eGP7t/62tA8aP+wGs2fKkarflPMdew7mv9pTuizbuSiGoxbb1t8\n LXNr6gMk9IOSe1ozfBSEy9i2WAhPNWnCPcJ4TQg86HzXaFbQpmba7w+zm\n 0Li41YJI/MMOMyC/w5UxHi0E3JR6GhRmrOk3guTsAQYIpalhNUaCDJlNC\n 5z45MrO8qo9KY2GWnSvy4eEAXW0pqFhi+HaNJJ2PinALAG8ZoesNFPGeO w==;", "X-IronPort-AV": [ "E=McAfee;i=\"6500,9779,10569\"; a=\"321453490\"", "E=Sophos;i=\"5.96,267,1665471600\"; d=\"scan'208\";a=\"321453490\"", "E=McAfee;i=\"6500,9779,10569\"; a=\"759186888\"", "E=Sophos;i=\"5.96,267,1665471600\"; d=\"scan'208\";a=\"759186888\"" ], "X-ExtLoop1": "1", "From": "Ke Xu <ke1.xu@intel.com>", "To": "dts@dpdk.org", "Cc": "lijuan.tu@intel.com, qi.fu@intel.com, yuan.peng@intel.com,\n ke1.xu@intel.com", "Subject": "[DTS][PATCH V2 3/3] tests/vf_offload: implement packets count,\n super-long packet and random payload.", "Date": "Fri, 23 Dec 2022 09:02:44 +0800", "Message-Id": "<20221223010242.282584-4-ke1.xu@intel.com>", "X-Mailer": "git-send-email 2.25.1", "In-Reply-To": "<20221223010242.282584-1-ke1.xu@intel.com>", "References": "<20221223010242.282584-1-ke1.xu@intel.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "X-BeenThere": "dts@dpdk.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "test suite reviews and discussions <dts.dpdk.org>", "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>", "List-Archive": "<http://mails.dpdk.org/archives/dts/>", "List-Post": "<mailto:dts@dpdk.org>", "List-Help": "<mailto:dts-request@dpdk.org?subject=help>", "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>", "Errors-To": "dts-bounces@dpdk.org" }, "content": "Implemented packets count that sends multiple packets of one packet combination.\n\nImplemented random payload.\n\nAdded super-long packet of payload length of 8500.\n\nSigned-off-by: Ke Xu <ke1.xu@intel.com>\n---\n tests/TestSuite_vf_offload.py | 66 ++++++++++++++++++++++-------------\n 1 file changed, 41 insertions(+), 25 deletions(-)", "diff": "diff --git a/tests/TestSuite_vf_offload.py b/tests/TestSuite_vf_offload.py\nindex 6765fcc5..f76a9f54 100644\n--- a/tests/TestSuite_vf_offload.py\n+++ b/tests/TestSuite_vf_offload.py\n@@ -765,7 +765,14 @@ class TestVfOffload(TestCase):\n self.tester.get_local_port(self.dut_ports[1])\n )\n \n- self.loading_sizes = [128, 800, 801, 1700, 2500]\n+ self.size_and_count = [\n+ (128, 10),\n+ (800, 10),\n+ (801, 10),\n+ (1700, 10),\n+ (2500, 10),\n+ (8500, 1000)\n+ ]\n \n self.tester.send_expect(\n \"ethtool -K %s rx off tx off tso off gso off gro off lro off\"\n@@ -839,13 +846,13 @@ class TestVfOffload(TestCase):\n self.tester.scapy_foreground()\n time.sleep(5)\n \n- for loading_size in self.loading_sizes:\n+ for loading_size, packet_count in self.size_and_count:\n # IPv4 tcp test\n out = self.vm0_testpmd.execute_cmd(\"clear port info all\", \"testpmd> \", 120)\n self.tcpdump_start_sniffing([tx_interface, rx_interface])\n self.tester.scapy_append(\n- 'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/(\"X\"*%s)], iface=\"%s\")'\n- % (mac, loading_size, tx_interface)\n+ 'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n+ % (mac, loading_size, tx_interface, packet_count)\n )\n out = self.tester.scapy_execute()\n out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n@@ -858,29 +865,29 @@ class TestVfOffload(TestCase):\n self.logger.info(tx_outlist)\n if loading_size <= 800:\n self.verify(\n- rx_stats == tx_stats and int(tx_outlist[0]) == loading_size,\n+ rx_stats == tx_stats and all([int(tx_outlist[j]) == loading_size for j in range(packet_count)]),\n \"IPV4 RX or TX packet number not correct\",\n )\n else:\n num = loading_size // 800\n for i in range(num):\n self.verify(\n- int(tx_outlist[i]) == 800,\n+ all([int(tx_outlist[i * packet_count + j]) == 800 for j in range(packet_count)]),\n \"the packet segmentation incorrect, %s\" % tx_outlist,\n )\n if loading_size % 800 != 0:\n self.verify(\n- int(tx_outlist[num]) == loading_size % 800,\n+ all([int(tx_outlist[num * packet_count + j]) == loading_size % 800 for j in range(packet_count)]),\n \"the packet segmentation incorrect, %s\" % tx_outlist,\n )\n \n- for loading_size in self.loading_sizes:\n+ for loading_size, packet_count in self.size_and_count:\n # IPv6 tcp test\n out = self.vm0_testpmd.execute_cmd(\"clear port info all\", \"testpmd> \", 120)\n self.tcpdump_start_sniffing([tx_interface, rx_interface])\n self.tester.scapy_append(\n- 'sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/TCP(sport=1021,dport=1021)/(\"X\"*%s)], iface=\"%s\")'\n- % (mac, loading_size, tx_interface)\n+ 'sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n+ % (mac, loading_size, tx_interface, packet_count)\n )\n out = self.tester.scapy_execute()\n out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n@@ -893,19 +900,19 @@ class TestVfOffload(TestCase):\n self.logger.info(tx_outlist)\n if loading_size <= 800:\n self.verify(\n- rx_stats == tx_stats and int(tx_outlist[0]) == loading_size,\n+ rx_stats == tx_stats and all([int(tx_outlist[j]) == loading_size for j in range(packet_count)]),\n \"IPV6 RX or TX packet number not correct\",\n )\n else:\n num = loading_size // 800\n for i in range(num):\n self.verify(\n- int(tx_outlist[i]) == 800,\n+ all([int(tx_outlist[i * packet_count + j]) == 800 for j in range(packet_count)]),\n \"the packet segmentation incorrect, %s\" % tx_outlist,\n )\n if loading_size % 800 != 0:\n self.verify(\n- int(tx_outlist[num]) == loading_size % 800,\n+ all([int(tx_outlist[num * packet_count + j]) == loading_size % 800 for j in range(packet_count)]),\n \"the packet segmentation incorrect, %s\" % tx_outlist,\n )\n \n@@ -924,7 +931,14 @@ class TestVfOffload(TestCase):\n self.tester.get_local_port(self.vm0_dut_ports[1])\n )\n \n- self.loading_sizes = [128, 800, 801, 1700, 2500]\n+ self.size_and_count = [\n+ (128, 10),\n+ (800, 10),\n+ (801, 10),\n+ (1700, 10),\n+ (2500, 10),\n+ (8500, 1000)\n+ ]\n \n self.tester.send_expect(\n \"ethtool -K %s rx off tx off tso off gso off gro off lro off\"\n@@ -981,7 +995,7 @@ class TestVfOffload(TestCase):\n time.sleep(5)\n \n for key_outer in pkts_outer:\n- for loading_size in self.loading_sizes:\n+ for loading_size, packet_count in self.size_and_count:\n # IPv4 tcp test\n out = self.vm0_testpmd.execute_cmd(\n \"clear port info all\", \"testpmd> \", 120\n@@ -995,9 +1009,9 @@ class TestVfOffload(TestCase):\n (\n 'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/'\n + pkts_outer[key_outer]\n- + '/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/(\"X\"*%s)], iface=\"%s\")'\n+ + '/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count = %s)'\n )\n- % (mac, loading_size, tx_interface)\n+ % (mac, loading_size, tx_interface, packet_count)\n )\n out = self.tester.scapy_execute()\n out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n@@ -1005,26 +1019,27 @@ class TestVfOffload(TestCase):\n self.tcpdump_stop_sniff()\n rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+ payload_size_list.sort(reverse=True)\n self.logger.info(payload_size_list)\n if loading_size <= 800:\n self.verify(\n- rx_stats == tx_stats and payload_size_list[0] == loading_size,\n+ rx_stats == tx_stats and all([payload_size_list == loading_size for j in range(packet_count)]),\n f\"{key_outer} tunnel IPV4 RX or TX packet number not correct\",\n )\n else:\n num = loading_size // 800\n for i in range(num):\n self.verify(\n- payload_size_list[i] == 800,\n+ all([payload_size_list[i * packet_count + j] == 800 for j in range(packet_count)]),\n \"the packet segmentation incorrect, %s\" % payload_size_list,\n )\n if loading_size % 800 != 0:\n self.verify(\n- payload_size_list[num] == loading_size % 800,\n+ all([payload_size_list[num * packet_count + j] == loading_size % 800 for j in range(packet_count)]),\n \"the packet segmentation incorrect, %s\" % payload_size_list,\n )\n \n- for loading_size in self.loading_sizes:\n+ for loading_size, packet_count in self.size_and_count:\n # IPv6 tcp test\n out = self.vm0_testpmd.execute_cmd(\n \"clear port info all\", \"testpmd> \", 120\n@@ -1040,7 +1055,7 @@ class TestVfOffload(TestCase):\n + pkts_outer[key_outer]\n + '/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/TCP(sport=1021,dport=1021)/(\"X\"*%s)], iface=\"%s\")'\n )\n- % (mac, loading_size, tx_interface)\n+ % (mac, loading_size, tx_interface, packet_count)\n )\n out = self.tester.scapy_execute()\n out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n@@ -1048,22 +1063,23 @@ class TestVfOffload(TestCase):\n self.tcpdump_stop_sniff()\n rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+ payload_size_list.sort(reverse=True)\n self.logger.info(payload_size_list)\n if loading_size <= 800:\n self.verify(\n- rx_stats == tx_stats and payload_size_list[0] == loading_size,\n+ rx_stats == tx_stats and all([payload_size_list[j] == loading_size for j in range(packet_count)]),\n f\"{key_outer} tunnel IPV6 RX or TX packet number not correct\",\n )\n else:\n num = loading_size // 800\n for i in range(num):\n self.verify(\n- payload_size_list[i] == 800,\n+ all([payload_size_list[i * packet_count + j] == 800 for j in range(packet_count)]),\n \"the packet segmentation incorrect, %s\" % payload_size_list,\n )\n if loading_size % 800 != 0:\n self.verify(\n- payload_size_list[num] == loading_size % 800,\n+ all([payload_size_list[num * packet_count + j] == loading_size % 800 for j in range(packet_count)]),\n \"the packet segmentation incorrect, %s\" % payload_size_list,\n )\n \n", "prefixes": [ "V2", "3/3" ] }{ "id": 121304, "url": "