Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/126638/?format=api
http://patches.dpdk.org/api/patches/126638/?format=api", "web_url": "http://patches.dpdk.org/project/dts/patch/20230501225842.1163820-4-yogesh.jangra@intel.com/", "project": { "id": 3, "url": "http://patches.dpdk.org/api/projects/3/?format=api", "name": "DTS", "link_name": "dts", "list_id": "dts.dpdk.org", "list_email": "dts@dpdk.org", "web_url": "", "scm_url": "git://dpdk.org/tools/dts", "webscm_url": "http://git.dpdk.org/tools/dts/", "list_archive_url": "https://inbox.dpdk.org/dts", "list_archive_url_format": "https://inbox.dpdk.org/dts/{}", "commit_url_format": "" }, "msgid": "<20230501225842.1163820-4-yogesh.jangra@intel.com>", "list_archive_url": "https://inbox.dpdk.org/dts/20230501225842.1163820-4-yogesh.jangra@intel.com", "date": "2023-05-01T22:58:41", "name": "[3/4] tests/pipeline: added testcases for dpdk 23.03 release", "commit_ref": null, "pull_url": null, "state": "accepted", "archived": false, "hash": "53f03db96e5a758f57dd4b1a3cb29373679d7d00", "submitter": { "id": 2025, "url": "http://patches.dpdk.org/api/people/2025/?format=api", "name": "Yogesh Jangra", "email": "yogesh.jangra@intel.com" }, "delegate": null, "mbox": "http://patches.dpdk.org/project/dts/patch/20230501225842.1163820-4-yogesh.jangra@intel.com/mbox/", "series": [ { "id": 27902, "url": "http://patches.dpdk.org/api/series/27902/?format=api", "web_url": "http://patches.dpdk.org/project/dts/list/?series=27902", "date": "2023-05-01T22:58:38", "name": "Added testcases for dpdk 23.03 release features", "version": 1, "mbox": "http://patches.dpdk.org/series/27902/mbox/" } ], "comments": "http://patches.dpdk.org/api/patches/126638/comments/", "check": "pending", "checks": "http://patches.dpdk.org/api/patches/126638/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<dts-bounces@dpdk.org>", "X-Original-To": "patchwork@inbox.dpdk.org", "Delivered-To": "patchwork@inbox.dpdk.org", "Received": [ "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id BCC7042A34;\n\tMon, 1 May 2023 21:07:43 +0200 (CEST)", "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id B8C9542D0E;\n\tMon, 1 May 2023 21:07:43 +0200 (CEST)", "from mga04.intel.com (mga04.intel.com [192.55.52.120])\n by mails.dpdk.org (Postfix) with ESMTP id 0D5F64021E\n for <dts@dpdk.org>; Mon, 1 May 2023 21:07:41 +0200 (CEST)", "from orsmga001.jf.intel.com ([10.7.209.18])\n by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 01 May 2023 12:07:41 -0700", "from ena4.iind.intel.com (HELO localhost.localdomain)\n ([10.190.200.224])\n by orsmga001.jf.intel.com with ESMTP; 01 May 2023 12:07:39 -0700" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1682968062; x=1714504062;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=zk1nXzkC7UmEhA4Ygm2Qfo/vHwDhpED1PcP+YvIk47U=;\n b=duNRYTLS9BgqSv85GgEmMASGGhcpFw7kztwpvVf8kXl1nPUW2xyBIg8N\n EpOvJvq+SGQbf5Cpo0WN5TQBgbmrpHl4IUQr12nqn10NsRwdCUIPVHCyA\n MxFs/r+Hrj/wX3gWoVySXqwcifAjAFfGcmNKCNPr8FTKgwQAG2GPByqAM\n 9QYvDgs4sFZdpXA2NovxjHO+6S7CpPG2ahWcJwyj++18rls3Cbria2I+F\n SrNQEczmo5Grzq/TfrOv59lWswnh65I6JV7yHaAw6y0/EMkp6BbljGGv3\n 8HvX4aFy2PVQQTafYw5pED8+x0jWGhzqeQkP/bYk4u6huvfJzMkH/2sxy A==;", "X-IronPort-AV": [ "E=McAfee;i=\"6600,9927,10697\"; a=\"347026208\"", "E=Sophos;i=\"5.99,242,1677571200\"; d=\"scan'208\";a=\"347026208\"", "E=McAfee;i=\"6600,9927,10697\"; a=\"728641148\"", "E=Sophos;i=\"5.99,242,1677571200\"; d=\"scan'208\";a=\"728641148\"" ], "X-ExtLoop1": "1", "From": "Yogesh Jangra <yogesh.jangra@intel.com>", "To": "dts@dpdk.org", "Cc": "kamalakannan.r@intel.com,\n\tharshad.suresh.narayane@intel.com", "Subject": "[PATCH 3/4] tests/pipeline: added testcases for dpdk 23.03 release", "Date": "Mon, 1 May 2023 18:58:41 -0400", "Message-Id": "<20230501225842.1163820-4-yogesh.jangra@intel.com>", "X-Mailer": "git-send-email 2.25.1", "In-Reply-To": "<20230501225842.1163820-1-yogesh.jangra@intel.com>", "References": "<20230501225842.1163820-1-yogesh.jangra@intel.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "X-BeenThere": "dts@dpdk.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "test suite reviews and discussions <dts.dpdk.org>", "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>", "List-Archive": "<http://mails.dpdk.org/archives/dts/>", "List-Post": "<mailto:dts@dpdk.org>", "List-Help": "<mailto:dts-request@dpdk.org?subject=help>", "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>", "Errors-To": "dts-bounces@dpdk.org" }, "content": "Added testcases for the dpdk 23.03 release features viz, ipsec, large operand support,\ntoeplitz hash, validate instruction and action selector features.\n\nSigned-off-by: Yogesh Jangra <yogesh.jangra@intel.com>\nSigned-off-by: Harshad Narayane <harshad.suresh.narayane@intel.com>\nSigned-off-by: Kamalakannan R <kamalakannan.r@intel.com>\n---\n tests/TestSuite_pipeline.py | 352 +++++++++++++++++++++++++++++++++++-\n 1 file changed, 349 insertions(+), 3 deletions(-)", "diff": "diff --git a/tests/TestSuite_pipeline.py b/tests/TestSuite_pipeline.py\nindex d2f38faf..79050a05 100644\n--- a/tests/TestSuite_pipeline.py\n+++ b/tests/TestSuite_pipeline.py\n@@ -459,7 +459,7 @@ class TestPipeline(TestCase):\n self.dut.send_expect(\"^C\", \"# \", 20)\n self.verify(0, \"CLI Response Error\")\n \n- def run_dpdk_app(self, cli_file, exp_out=\"PIPELINE0 enable\"):\n+ def run_dpdk_app(self, cli_file, exp_out=\"PIPELINE0 enable\", vdev=\"\"):\n \n try:\n cmd = 'test -f {} && echo \"File exists!\"'.format(cli_file)\n@@ -473,8 +473,8 @@ class TestPipeline(TestCase):\n self.dut.send_expect(cmd, \"# \", 20)\n cmd = \"sed -i -e 's/0000:00:07.0/%s/' {}\".format(cli_file) % self.dut_p3_pci\n self.dut.send_expect(cmd, \"# \", 20)\n- cmd = \"{0} {1} -- -s {2}\".format(\n- self.app_pipeline_path, self.eal_para, cli_file\n+ cmd = \"{0} {1} {2} -- -s {3}\".format(\n+ self.app_pipeline_path, self.eal_para, vdev, cli_file\n )\n self.dut.send_expect(cmd, exp_out, 60)\n except Exception:\n@@ -1518,6 +1518,88 @@ class TestPipeline(TestCase):\n self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n self.dut.send_expect(\"^C\", \"# \", 20)\n \n+ def test_mov_009(self):\n+\n+ cli_file = \"/tmp/pipeline/mov_009/mov_009.cli\"\n+ self.run_dpdk_app(cli_file)\n+\n+ in_pcap = [\"pipeline/mov_009/pcap_files/in_1.txt\"] * 4\n+ out_pcap = [\"pipeline/mov_009/pcap_files/out_1.txt\"] * 4\n+ filters = [\"udp port 4789\"] * 4\n+ tx_port = [0, 1, 2, 3]\n+ rx_port = [0, 1, 2, 3]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n+ def test_mov_010(self):\n+\n+ cli_file = \"/tmp/pipeline/mov_010/mov_010.cli\"\n+ self.run_dpdk_app(cli_file)\n+\n+ sleep(self.cli_connect_delay)\n+ s = self.connect_cli_server()\n+\n+ CMD_FILE = \"/tmp/pipeline/mov_010/cmd_files/cmd_1.txt\"\n+ CLI_CMD = \"pipeline PIPELINE0 table table_001 add {}\\n\".format(CMD_FILE)\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+ CLI_CMD = \"pipeline PIPELINE0 commit\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/mov_010/pcap_files/in_1.txt\"] * 4\n+ out_pcap = [\"pipeline/mov_010/pcap_files/out_1.txt\"] * 4\n+ filters = [\"ip\"] * 4\n+ tx_port = [0, 1, 2, 3]\n+ rx_port = [0, 1, 2, 3]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+ s.close()\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n+ def test_mov_011(self):\n+\n+ cli_file = \"/tmp/pipeline/mov_011/mov_011.cli\"\n+ self.run_dpdk_app(cli_file)\n+\n+ sleep(self.cli_connect_delay)\n+ s = self.connect_cli_server()\n+\n+ CMD_FILE = \"/tmp/pipeline/mov_011/cmd_files/cmd_1.txt\"\n+ CLI_CMD = \"pipeline PIPELINE0 table table_001 add {}\\n\".format(CMD_FILE)\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+ CLI_CMD = \"pipeline PIPELINE0 commit\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/mov_011/pcap_files/in_1.txt\"] * 4\n+ out_pcap = [\"pipeline/mov_011/pcap_files/out_1.txt\"] * 4\n+ filters = [\"ip\"] * 4\n+ tx_port = [0, 1, 2, 3]\n+ rx_port = [0, 1, 2, 3]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+ s.close()\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n+ def test_mov_012(self):\n+\n+ cli_file = \"/tmp/pipeline/mov_012/mov_012.cli\"\n+ self.run_dpdk_app(cli_file)\n+\n+ sleep(self.cli_connect_delay)\n+ s = self.connect_cli_server()\n+\n+ CMD_FILE = \"/tmp/pipeline/mov_012/cmd_files/cmd_1.txt\"\n+ CLI_CMD = \"pipeline PIPELINE0 table table_001 add {}\\n\".format(CMD_FILE)\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+ CLI_CMD = \"pipeline PIPELINE0 commit\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/mov_012/pcap_files/in_1.txt\"] * 4\n+ out_pcap = [\"pipeline/mov_012/pcap_files/out_1.txt\"] * 4\n+ filters = [\"ip\"] * 4\n+ tx_port = [0, 1, 2, 3]\n+ rx_port = [0, 1, 2, 3]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+ s.close()\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n def test_table_001(self):\n \n cli_file = \"/tmp/pipeline/table_001/table_001.cli\"\n@@ -5694,6 +5776,23 @@ class TestPipeline(TestCase):\n self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n self.dut.send_expect(\"^C\", \"# \", 20)\n \n+ def test_selector_003(self):\n+\n+ cli_file = \"/tmp/pipeline/selector_003/selector_003.cli\"\n+ self.run_dpdk_app(cli_file)\n+\n+ in_pcap = [\"pipeline/selector_003/pcap_files/in_1.txt\"]\n+ out_pcap_1 = \"pipeline/selector_003/pcap_files/out_1.txt\"\n+ out_pcap_2 = \"pipeline/selector_003/pcap_files/out_2.txt\"\n+ out_pcap_3 = \"pipeline/selector_003/pcap_files/out_3.txt\"\n+ out_pcap_4 = \"pipeline/selector_003/pcap_files/out_4.txt\"\n+ out_pcap = [out_pcap_1, out_pcap_2, out_pcap_3, out_pcap_4]\n+ filters = [\"tcp\"] * 4\n+ tx_port = [0]\n+ rx_port = [0, 1, 2, 3]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n def test_scapy_pkt_gen(self):\n \n # self.send_scapy_pkts(0)\n@@ -6779,6 +6878,253 @@ class TestPipeline(TestCase):\n s.close()\n self.dut.send_expect(\"^C\", \"# \", 20)\n \n+ def test_ipsec_001(self):\n+\n+ cli_file = \"/tmp/pipeline/ipsec_001/ipsec_001.cli\"\n+ vdev = \"--vdev crypto_aesni_mb0\"\n+ self.run_dpdk_app(cli_file, vdev=vdev)\n+\n+ in_pcap = [\"pipeline/ipsec_001/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/ipsec_001/pcap_files/out_1.txt\"]\n+ filters = [\"udp\"]\n+ tx_port = [0]\n+ rx_port = [0]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+\n+ sleep(self.cli_connect_delay)\n+ s = self.connect_cli_server()\n+\n+ # Adding SA rules for tunnel mode\n+ CMD_FILE = \"/tmp/pipeline/ipsec_001/cmd_files/ipsec_sa.txt\"\n+ CLI_CMD = \"ipsec IPSEC0 sa add {}\\n\".format(CMD_FILE)\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ # Adding table rules\n+ CMD_FILE = \"/tmp/pipeline/ipsec_001/cmd_files/cmd_1.txt\"\n+ CLI_CMD = \"pipeline PIPELINE0 table policy_table add {}\\n\".format(CMD_FILE)\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+ CLI_CMD = \"pipeline PIPELINE0 commit\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/ipsec_001/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/ipsec_001/pcap_files/out_2.txt\"]\n+ filters = [\"udp\"]\n+ tx_port = [0]\n+ rx_port = [0]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+\n+ s.close()\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n+ def test_ipsec_002(self):\n+\n+ cli_file = \"/tmp/pipeline/ipsec_002/ipsec_002.cli\"\n+ vdev = \"--vdev crypto_aesni_mb0\"\n+ self.run_dpdk_app(cli_file, vdev=vdev)\n+\n+ in_pcap = [\"pipeline/ipsec_002/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/ipsec_002/pcap_files/out_1.txt\"]\n+ filters = [\"tcp\"]\n+ tx_port = [0]\n+ rx_port = [0]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+\n+ sleep(self.cli_connect_delay)\n+ s = self.connect_cli_server()\n+\n+ # Adding SA rules for transport mode\n+ CMD_FILE = \"/tmp/pipeline/ipsec_002/cmd_files/ipsec_sa.txt\"\n+ CLI_CMD = \"ipsec IPSEC0 sa add {}\\n\".format(CMD_FILE)\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ # Adding table rules\n+ CMD_FILE = \"/tmp/pipeline/ipsec_002/cmd_files/cmd_1.txt\"\n+ CLI_CMD = \"pipeline PIPELINE0 table policy_table add {}\\n\".format(CMD_FILE)\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+ CLI_CMD = \"pipeline PIPELINE0 commit\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/ipsec_002/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/ipsec_002/pcap_files/out_2.txt\"]\n+ filters = [\"tcp\"]\n+ tx_port = [0]\n+ rx_port = [0]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+\n+ s.close()\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n+ def test_ipsec_003(self):\n+\n+ cli_file = \"/tmp/pipeline/ipsec_003/ipsec_003.cli\"\n+ vdev = \"--vdev crypto_aesni_mb0\"\n+ self.run_dpdk_app(cli_file, vdev=vdev)\n+\n+ in_pcap = [\"pipeline/ipsec_003/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/ipsec_003/pcap_files/out_1.txt\"]\n+ filters = [\"udp\"]\n+ tx_port = [0]\n+ rx_port = [0]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+\n+ sleep(self.cli_connect_delay)\n+ s = self.connect_cli_server()\n+\n+ # Deleting table rules\n+ CMD_FILE = \"/tmp/pipeline/ipsec_003/cmd_files/cmd_1.txt\"\n+ CLI_CMD = \"pipeline PIPELINE0 table policy_table delete {}\\n\".format(CMD_FILE)\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+ CLI_CMD = \"pipeline PIPELINE0 commit\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ # Deleting SA rules for tunnel mode\n+ CLI_CMD = \"ipsec IPSEC0 sa delete 0\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+ CLI_CMD = \"ipsec IPSEC0 sa delete 1\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/ipsec_003/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/ipsec_003/pcap_files/out_2.txt\"]\n+ filters = [\"udp\"]\n+ tx_port = [0]\n+ rx_port = [0]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+\n+ s.close()\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n+ def test_ipsec_004(self):\n+\n+ cli_file = \"/tmp/pipeline/ipsec_004/ipsec_004.cli\"\n+ vdev = \"--vdev crypto_aesni_mb0\"\n+ self.run_dpdk_app(cli_file, vdev=vdev)\n+\n+ in_pcap = [\"pipeline/ipsec_004/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/ipsec_004/pcap_files/out_1.txt\"]\n+ filters = [\"tcp\"]\n+ tx_port = [0]\n+ rx_port = [0]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+\n+ sleep(self.cli_connect_delay)\n+ s = self.connect_cli_server()\n+\n+ # Deleting table rules\n+ CMD_FILE = \"/tmp/pipeline/ipsec_004/cmd_files/cmd_1.txt\"\n+ CLI_CMD = \"pipeline PIPELINE0 table policy_table delete {}\\n\".format(CMD_FILE)\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+ CLI_CMD = \"pipeline PIPELINE0 commit\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ # Deleting SA rules for transport mode\n+ CLI_CMD = \"ipsec IPSEC0 sa delete 0\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+ CLI_CMD = \"ipsec IPSEC0 sa delete 1\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/ipsec_004/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/ipsec_004/pcap_files/out_2.txt\"]\n+ filters = [\"tcp\"]\n+ tx_port = [0]\n+ rx_port = [0]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+\n+ s.close()\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n+ def test_rss_001(self):\n+\n+ cli_file = \"/tmp/pipeline/rss_001/rss_001.cli\"\n+ self.run_dpdk_app(cli_file)\n+\n+ sleep(self.cli_connect_delay)\n+ s = self.connect_cli_server()\n+\n+ CLI_CMD = \"pipeline PIPELINE0 rss rss0 key 0 0 1 1\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/rss_001/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/rss_001/pcap_files/out_1.txt\"]\n+ filters = [\"udp port 200\"]\n+ tx_port = [3]\n+ rx_port = [0]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+\n+ CLI_CMD = \"pipeline PIPELINE0 rss rss0 key 0 0 1 2\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/rss_001/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/rss_001/pcap_files/out_1.txt\"]\n+ filters = [\"udp port 200\"]\n+ tx_port = [3]\n+ rx_port = [1]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+ s.close()\n+\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n+ def test_rss_002(self):\n+\n+ cli_file = \"/tmp/pipeline/rss_002/rss_002.cli\"\n+ self.run_dpdk_app(cli_file)\n+\n+ sleep(self.cli_connect_delay)\n+ s = self.connect_cli_server()\n+\n+ CLI_CMD = \"pipeline PIPELINE0 rss rss0 key 0 0 1 1\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/rss_002/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/rss_002/pcap_files/out_1.txt\"]\n+ filters = [\"udp port 200\"]\n+ tx_port = [3]\n+ rx_port = [0]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+\n+ CLI_CMD = \"pipeline PIPELINE0 rss rss0 key 0 0 5 6\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/rss_002/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/rss_002/pcap_files/out_1.txt\"]\n+ filters = [\"udp port 200\"]\n+ tx_port = [3]\n+ rx_port = [2]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+ s.close()\n+\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n+ def test_rss_003(self):\n+\n+ cli_file = \"/tmp/pipeline/rss_003/rss_003.cli\"\n+ self.run_dpdk_app(cli_file)\n+\n+ sleep(self.cli_connect_delay)\n+ s = self.connect_cli_server()\n+\n+ CLI_CMD = \"pipeline PIPELINE0 rss rss0 key 0 0 1 1\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/rss_003/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/rss_003/pcap_files/out_1.txt\"]\n+ filters = [\"udp port 200\"]\n+ tx_port = [3]\n+ rx_port = [0]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+\n+ CLI_CMD = \"pipeline PIPELINE0 rss rss0 key 0 0 1 2\\n\"\n+ self.socket_send_cmd(s, CLI_CMD, \"pipeline> \")\n+\n+ in_pcap = [\"pipeline/rss_003/pcap_files/in_1.txt\"]\n+ out_pcap = [\"pipeline/rss_003/pcap_files/out_1.txt\"]\n+ filters = [\"udp port 200\"]\n+ tx_port = [3]\n+ rx_port = [1]\n+ self.send_and_sniff_multiple(tx_port, rx_port, in_pcap, out_pcap, filters)\n+ s.close()\n+\n+ self.dut.send_expect(\"^C\", \"# \", 20)\n+\n def tear_down(self):\n \"\"\"\n Run after each test case.\n", "prefixes": [ "3/4" ] }{ "id": 126638, "url": "