Patch Detail
get:
Show a patch.
patch:
Update a patch.
put:
Update a patch.
GET /api/patches/123192/?format=api
https://patches.dpdk.org/api/patches/123192/?format=api", "web_url": "https://patches.dpdk.org/project/dts/patch/20230207032313.404935-3-ke1.xu@intel.com/", "project": { "id": 3, "url": "https://patches.dpdk.org/api/projects/3/?format=api", "name": "DTS", "link_name": "dts", "list_id": "dts.dpdk.org", "list_email": "dts@dpdk.org", "web_url": "", "scm_url": "git://dpdk.org/tools/dts", "webscm_url": "http://git.dpdk.org/tools/dts/", "list_archive_url": "https://inbox.dpdk.org/dts", "list_archive_url_format": "https://inbox.dpdk.org/dts/{}", "commit_url_format": "" }, "msgid": "<20230207032313.404935-3-ke1.xu@intel.com>", "list_archive_url": "https://inbox.dpdk.org/dts/20230207032313.404935-3-ke1.xu@intel.com", "date": "2023-02-07T03:23:10", "name": "[V1,2/5] tests/vf_offload: improve TSO validating.", "commit_ref": null, "pull_url": null, "state": "superseded", "archived": false, "hash": "ea504d6abea2e19d7ffabf059c6d533fffdfdc40", "submitter": { "id": 2810, "url": "https://patches.dpdk.org/api/people/2810/?format=api", "name": "Ke Xu", "email": "ke1.xu@intel.com" }, "delegate": null, "mbox": "https://patches.dpdk.org/project/dts/patch/20230207032313.404935-3-ke1.xu@intel.com/mbox/", "series": [ { "id": 26832, "url": "https://patches.dpdk.org/api/series/26832/?format=api", "web_url": "https://patches.dpdk.org/project/dts/list/?series=26832", "date": "2023-02-07T03:23:08", "name": "Update vf_offload cases for DPDK-v23.03 validation.", "version": 1, "mbox": "https://patches.dpdk.org/series/26832/mbox/" } ], "comments": "https://patches.dpdk.org/api/patches/123192/comments/", "check": "pending", "checks": "https://patches.dpdk.org/api/patches/123192/checks/", "tags": {}, "related": [], "headers": { "Return-Path": "<dts-bounces@dpdk.org>", "X-Original-To": "patchwork@inbox.dpdk.org", "Delivered-To": "patchwork@inbox.dpdk.org", "Received": [ "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id AF34341C28;\n\tTue, 7 Feb 2023 04:25:24 +0100 (CET)", "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id A5330427F5;\n\tTue, 7 Feb 2023 04:25:24 +0100 (CET)", "from mga01.intel.com (mga01.intel.com [192.55.52.88])\n by mails.dpdk.org (Postfix) with ESMTP id 8166F427E9\n for <dts@dpdk.org>; Tue, 7 Feb 2023 04:25:22 +0100 (CET)", "from fmsmga007.fm.intel.com ([10.253.24.52])\n by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 06 Feb 2023 19:25:22 -0800", "from dpdk-xuke-lab.sh.intel.com ([10.67.119.8])\n by fmsmga007.fm.intel.com with ESMTP; 06 Feb 2023 19:25:20 -0800" ], "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1675740322; x=1707276322;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=aztkFZbUVHqU1yp0Opuh2eoyFsGPaS4jDzzh9xA3d8Q=;\n b=ODECdsSxD68H9UmV1cde2dTDsP7pcO+1g0bI0yuNZzD82FsUHpTZpGI/\n pMoDWuiqOmrllpEqC60NNgZMPj3DuR7ny0zOL/ucnVGPlBDOpURx+GyZi\n jDDF+Fy3lKrXrAa4W4oD0M1A2T4wRPmSn22tQdu5sdIOapg/JheLwE9VB\n PX5FNUfbE7xojfW2p/FXy71evq53m/dhpHuUPonCE1pKnDfht/MOTce81\n +r+gC0Vnc+ucRaKaxUDFGWi0XpsscrGtIXgBYkLRzPJPDrlVhezu8GAZl\n flt+o+cQs+uhUsc9zDYpT9uDARNg0tjjT6JgaHGxJ6mrzjpTktzKGvHmR g==;", "X-IronPort-AV": [ "E=McAfee;i=\"6500,9779,10613\"; a=\"356757996\"", "E=Sophos;i=\"5.97,278,1669104000\"; d=\"scan'208\";a=\"356757996\"", "E=McAfee;i=\"6500,9779,10613\"; a=\"668636717\"", "E=Sophos;i=\"5.97,278,1669104000\"; d=\"scan'208\";a=\"668636717\"" ], "X-ExtLoop1": "1", "From": "Ke Xu <ke1.xu@intel.com>", "To": "dts@dpdk.org", "Cc": "ke1.xu@intel.com, yux.jiang@intel.com, lijuan.tu@intel.com,\n qi.fu@intel.com", "Subject": "[DTS][PATCH V1 2/5] tests/vf_offload: improve TSO validating.", "Date": "Tue, 7 Feb 2023 11:23:10 +0800", "Message-Id": "<20230207032313.404935-3-ke1.xu@intel.com>", "X-Mailer": "git-send-email 2.25.1", "In-Reply-To": "<20230207032313.404935-1-ke1.xu@intel.com>", "References": "<20230207032313.404935-1-ke1.xu@intel.com>", "MIME-Version": "1.0", "Content-Transfer-Encoding": "8bit", "X-BeenThere": "dts@dpdk.org", "X-Mailman-Version": "2.1.29", "Precedence": "list", "List-Id": "test suite reviews and discussions <dts.dpdk.org>", "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>", "List-Archive": "<http://mails.dpdk.org/archives/dts/>", "List-Post": "<mailto:dts@dpdk.org>", "List-Help": "<mailto:dts-request@dpdk.org?subject=help>", "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>", "Errors-To": "dts-bounces@dpdk.org" }, "content": "Use segment_validate and tso_validate\n methods to do the validate, providing\n scalarble interface for futrher cases.\n\nSigned-off-by: Ke Xu <ke1.xu@intel.com>\n---\n tests/TestSuite_vf_offload.py | 465 +++++++++++++---------------------\n 1 file changed, 180 insertions(+), 285 deletions(-)", "diff": "diff --git a/tests/TestSuite_vf_offload.py b/tests/TestSuite_vf_offload.py\nindex ce1a6f13..bd412100 100644\n--- a/tests/TestSuite_vf_offload.py\n+++ b/tests/TestSuite_vf_offload.py\n@@ -849,6 +849,148 @@ class TestVfOffload(TestCase):\n rx_packet_size = [len(p[Raw].load) for p in pkts]\n return rx_packet_count, rx_packet_size\n \n+ def segment_validate(\n+ self,\n+ segment_size,\n+ loading_size,\n+ packet_count,\n+ tx_stats,\n+ rx_stats,\n+ payload_size_list,\n+ ):\n+ \"\"\"\n+ Validate the segmentation, checking if the result is segmented\n+ as expected.\n+ segment_size: segment size,\n+ loading_size: tx payload size,\n+ packet_count: tx packet count,\n+ tx_stats: tx packets count sniffed,\n+ rx_stats: rx packets count,\n+ payload_size_list: rx packets payload size list,\n+ Return a message of validate result.\n+ \"\"\"\n+ num_segs = (loading_size + segment_size - 1) // segment_size\n+ num_segs_full = loading_size // segment_size\n+ if not packet_count == tx_stats:\n+ return \"Failed: TX packet count is of inconsitent with sniffed TX packet count.\"\n+ elif loading_size <= segment_size and not rx_stats == packet_count:\n+ return \"Failed: RX packet count is of inconsitent with TX packet count.\"\n+ elif loading_size <= segment_size and not all(\n+ [int(payload_size_list[j]) == loading_size for j in range(packet_count)]\n+ ):\n+ return \"Failed: RX packet size is of inconsitent with TX packet size.\"\n+ elif rx_stats != num_segs:\n+ return \"Failed: RX packet count is of inconsitent with segmented TX packet count.\"\n+ elif not (\n+ all(\n+ [\n+ # i * packet_count + j is the i-th segmentation for j-th packet.\n+ payload_size_list[i * packet_count + j] == 800\n+ for j in range(packet_count)\n+ for i in range(num_segs_full)\n+ ]\n+ )\n+ and all(\n+ [\n+ # num_segs_full * packet_count + j is the last segmentation for j-th packet.\n+ payload_size_list[num_segs_full * packet_count + j]\n+ == (loading_size % 800)\n+ for j in range(packet_count)\n+ ]\n+ )\n+ ):\n+ return (\n+ \"Failed: RX packet segmentation size incorrect, %s.\" % payload_size_list\n+ )\n+ return None\n+\n+ def tso_validate(\n+ self,\n+ tx_interface,\n+ rx_interface,\n+ mac,\n+ inet_type,\n+ size_and_count,\n+ outer_pkts=None,\n+ ):\n+\n+ validate_result = []\n+\n+ self.tester.scapy_foreground()\n+ self.tester.scapy_append(\"from scapy.contrib.gtp import GTP_U_Header\")\n+ time.sleep(5)\n+\n+ if not outer_pkts is None:\n+ for key_outer in outer_pkts:\n+ for loading_size, packet_count in size_and_count:\n+ out = self.vm0_testpmd.execute_cmd(\n+ \"clear port info all\", \"testpmd> \", 120\n+ )\n+ self.tcpdump_start_sniffing([tx_interface, rx_interface])\n+ self.tester.scapy_append(\n+ (\n+ 'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/'\n+ + outer_pkts[key_outer]\n+ + '/%s(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n+ )\n+ % (mac, inet_type, loading_size, tx_interface, packet_count)\n+ )\n+ out = self.tester.scapy_execute()\n+ out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n+ print(out)\n+ self.tcpdump_stop_sniff()\n+ rx_stats, payload_size_list = self.tcpdump_analyse_sniff(\n+ rx_interface\n+ )\n+ tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+ payload_size_list.sort(reverse=True)\n+ self.logger.info(payload_size_list)\n+ segment_result = self.segment_validate(\n+ 800,\n+ loading_size,\n+ packet_count,\n+ tx_stats,\n+ rx_stats,\n+ payload_size_list,\n+ )\n+ if segment_result:\n+ validate_result.append(\n+ f\"Packet: {key_outer}, inet type: {inet_type}, loading size: {loading_size} packet count: {packet_count}: \"\n+ + segment_result\n+ )\n+ else:\n+ for loading_size, packet_count in size_and_count:\n+ out = self.vm0_testpmd.execute_cmd(\n+ \"clear port info all\", \"testpmd> \", 120\n+ )\n+ self.tcpdump_start_sniffing([tx_interface, rx_interface])\n+ self.tester.scapy_append(\n+ 'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/%s(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n+ % (mac, inet_type, loading_size, tx_interface, packet_count)\n+ )\n+ out = self.tester.scapy_execute()\n+ out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n+ print(out)\n+ self.tcpdump_stop_sniff()\n+ rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n+ tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+ payload_size_list.sort(reverse=True)\n+ self.logger.info(payload_size_list)\n+ segment_result = self.segment_validate(\n+ 800,\n+ loading_size,\n+ packet_count,\n+ tx_stats,\n+ rx_stats,\n+ payload_size_list,\n+ )\n+ if segment_result:\n+ validate_result.append(\n+ f\"Inet type: {inet_type}, loading size: {loading_size} packet count: {packet_count}: \"\n+ + segment_result\n+ )\n+ return validate_result\n+\n def test_tso(self):\n \"\"\"\n TSO IPv4 TCP, IPv6 TCP testing.\n@@ -863,7 +1005,7 @@ class TestVfOffload(TestCase):\n # Here size_and_count is a list of tuples for the test scopes that\n # in a tuple (size, count) means, sending packets for count times\n # for TSO with a payload size of size.\n- self.size_and_count = [\n+ size_and_count = [\n (128, 10),\n (800, 10),\n (801, 10),\n@@ -895,162 +1037,30 @@ class TestVfOffload(TestCase):\n \n mac = self.vm0_testpmd.get_port_mac(0)\n self.vm0_testpmd.execute_cmd(\"set verbose 1\", \"testpmd> \", 120)\n- self.vm0_testpmd.execute_cmd(\"port stop all\", \"testpmd> \", 120)\n- self.vm0_testpmd.execute_cmd(\n- \"csum set ip hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n- )\n- self.vm0_testpmd.execute_cmd(\n- \"csum set udp hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n- )\n- self.vm0_testpmd.execute_cmd(\n- \"csum set tcp hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n- )\n- self.vm0_testpmd.execute_cmd(\n- \"csum set sctp hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n- )\n- self.vm0_testpmd.execute_cmd(\n- \"csum set outer-ip hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n- )\n- self.vm0_testpmd.execute_cmd(\n- \"csum parse-tunnel on %d\" % self.dut_ports[0], \"testpmd> \", 120\n- )\n-\n- self.vm0_testpmd.execute_cmd(\n- \"csum set ip hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n- )\n- self.vm0_testpmd.execute_cmd(\n- \"csum set udp hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n- )\n- self.vm0_testpmd.execute_cmd(\n- \"csum set tcp hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n- )\n- self.vm0_testpmd.execute_cmd(\n- \"csum set sctp hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n- )\n- self.vm0_testpmd.execute_cmd(\n- \"csum set outer-ip hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n- )\n- self.vm0_testpmd.execute_cmd(\n- \"csum parse-tunnel on %d\" % self.dut_ports[1], \"testpmd> \", 120\n- )\n-\n- self.vm0_testpmd.execute_cmd(\"tso set 800 %d\" % self.vm0_dut_ports[1])\n self.vm0_testpmd.execute_cmd(\"set fwd csum\")\n- self.vm0_testpmd.execute_cmd(\"port start all\", \"testpmd> \", 120)\n+ self.tso_enable(self.vm0_dut_ports[0], self.vm_dut_0)\n+ self.tso_enable(self.vm0_dut_ports[1], self.vm_dut_0)\n self.vm0_testpmd.execute_cmd(\"set promisc 0 on\", \"testpmd> \", 120)\n self.vm0_testpmd.execute_cmd(\"set promisc 1 on\", \"testpmd> \", 120)\n self.vm0_testpmd.execute_cmd(\"start\")\n+ self.vm0_testpmd.wait_link_status_up(self.vm0_dut_ports[0])\n+ self.vm0_testpmd.wait_link_status_up(self.vm0_dut_ports[1])\n \n- self.tester.scapy_foreground()\n- time.sleep(5)\n-\n- for loading_size, packet_count in self.size_and_count:\n- # IPv4 tcp test\n- out = self.vm0_testpmd.execute_cmd(\"clear port info all\", \"testpmd> \", 120)\n- self.tcpdump_start_sniffing([tx_interface, rx_interface])\n- self.tester.scapy_append(\n- 'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n- % (mac, loading_size, tx_interface, packet_count)\n- )\n- out = self.tester.scapy_execute()\n- out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n- print(out)\n- self.tcpdump_stop_sniff()\n- rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n- tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n- payload_size_list.sort(reverse=True)\n- self.logger.info(payload_size_list)\n- if loading_size <= 800:\n- self.verify(\n- # for all packet_count packets, verifying the packet size equals the size we sent.\n- rx_stats == tx_stats\n- and all(\n- [\n- int(payload_size_list[j]) == loading_size\n- for j in range(packet_count)\n- ]\n- ),\n- \"IPV4 RX or TX packet number not correct\",\n- )\n- else:\n- num = loading_size // 800\n- for i in range(num):\n- self.verify(\n- # i * packet_count + j is the i-th segmentation for j-th packet.\n- all(\n- [\n- int(payload_size_list[i * packet_count + j]) == 800\n- for j in range(packet_count)\n- ]\n- ),\n- \"the packet segmentation incorrect, %s\" % payload_size_list,\n- )\n- if loading_size % 800 != 0:\n- self.verify(\n- # num * packet_count + j is the last segmentation for j-th packet.\n- all(\n- [\n- int(payload_size_list[num * packet_count + j])\n- == loading_size % 800\n- for j in range(packet_count)\n- ]\n- ),\n- \"the packet segmentation incorrect, %s\" % payload_size_list,\n- )\n-\n- for loading_size, packet_count in self.size_and_count:\n- # IPv6 tcp test\n- out = self.vm0_testpmd.execute_cmd(\"clear port info all\", \"testpmd> \", 120)\n- self.tcpdump_start_sniffing([tx_interface, rx_interface])\n- self.tester.scapy_append(\n- 'sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n- % (mac, loading_size, tx_interface, packet_count)\n- )\n- out = self.tester.scapy_execute()\n- out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n- print(out)\n- self.tcpdump_stop_sniff()\n- rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n- tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n- payload_size_list.sort(reverse=True)\n- self.logger.info(payload_size_list)\n- if loading_size <= 800:\n- self.verify(\n- # for all packet_count packets, verifying the packet size equals the size we sent.\n- rx_stats == tx_stats\n- and all(\n- [\n- int(payload_size_list[j]) == loading_size\n- for j in range(packet_count)\n- ]\n- ),\n- \"IPV6 RX or TX packet number not correct\",\n- )\n- else:\n- num = loading_size // 800\n- for i in range(num):\n- self.verify(\n- # i * packet_count + j is the i-th segmentation for j-th packet.\n- all(\n- [\n- int(payload_size_list[i * packet_count + j]) == 800\n- for j in range(packet_count)\n- ]\n- ),\n- \"the packet segmentation incorrect, %s\" % payload_size_list,\n- )\n- if loading_size % 800 != 0:\n- self.verify(\n- # num * packet_count + j is the last segmentation for j-th packet.\n- all(\n- [\n- int(payload_size_list[num * packet_count + j])\n- == loading_size % 800\n- for j in range(packet_count)\n- ]\n- ),\n- \"the packet segmentation incorrect, %s\" % payload_size_list,\n- )\n+ validate_result = []\n+ validate_result += self.tso_validate(\n+ tx_interface=tx_interface,\n+ rx_interface=rx_interface,\n+ mac=mac,\n+ inet_type=\"IP\",\n+ size_and_count=size_and_count,\n+ )\n+ validate_result += self.tso_validate(\n+ tx_interface=tx_interface,\n+ rx_interface=rx_interface,\n+ mac=mac,\n+ inet_type=\"IPv6\",\n+ size_and_count=size_and_count,\n+ )\n \n @check_supported_nic(\n [\"ICE_100G-E810C_QSFP\", \"ICE_25G-E810C_SFP\", \"ICE_25G-E810_XXV_SFP\"]\n@@ -1070,7 +1080,7 @@ class TestVfOffload(TestCase):\n # Here size_and_count is a list of tuples for the test scopes that\n # in a tuple (size, count) means, sending packets for count times\n # for TSO with a payload size of size.\n- self.size_and_count = [\n+ size_and_count = [\n (128, 10),\n (800, 10),\n (801, 10),\n@@ -1130,138 +1140,23 @@ class TestVfOffload(TestCase):\n \"IPv6/UDP/GTPU\": 'IPv6(src = \"FE80:0:0:0:200:1FF:FE00:200\", dst = \"3555:5555:6666:6666:7777:7777:8888:8888\") / UDP(dport = 2152) / GTP_U_Header(gtp_type=255, teid=0x123456)',\n }\n \n- self.tester.scapy_foreground()\n- time.sleep(5)\n-\n- for key_outer in pkts_outer:\n- for loading_size, packet_count in self.size_and_count:\n- # IPv4 tcp test\n- out = self.vm0_testpmd.execute_cmd(\n- \"clear port info all\", \"testpmd> \", 120\n- )\n- self.tcpdump_start_sniffing([tx_interface, rx_interface])\n- if \"GTPU\" in key_outer:\n- self.tester.scapy_append(\n- \"from scapy.contrib.gtp import GTP_U_Header\"\n- )\n- self.tester.scapy_append(\n- (\n- 'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/'\n- + pkts_outer[key_outer]\n- + '/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n- )\n- % (mac, loading_size, tx_interface, packet_count)\n- )\n- out = self.tester.scapy_execute()\n- out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n- print(out)\n- self.tcpdump_stop_sniff()\n- rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n- tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n- payload_size_list.sort(reverse=True)\n- self.logger.info(payload_size_list)\n- if loading_size <= 800:\n- self.verify(\n- # for all packet_count packets, verifying the packet size equals the size we sent.\n- rx_stats == tx_stats\n- and all(\n- [\n- int(payload_size_list[j]) == loading_size\n- for j in range(packet_count)\n- ]\n- ),\n- f\"{key_outer} tunnel IPV4 RX or TX packet number not correct\",\n- )\n- else:\n- num = loading_size // 800\n- for i in range(num):\n- self.verify(\n- # i * packet_count + j is the i-th segmentation for j-th packet.\n- all(\n- [\n- payload_size_list[i * packet_count + j] == 800\n- for j in range(packet_count)\n- ]\n- ),\n- \"the packet segmentation incorrect, %s\" % payload_size_list,\n- )\n- if loading_size % 800 != 0:\n- self.verify(\n- # num * packet_count + j is the last segmentation for j-th packet.\n- all(\n- [\n- payload_size_list[num * packet_count + j]\n- == loading_size % 800\n- for j in range(packet_count)\n- ]\n- ),\n- \"the packet segmentation incorrect, %s\" % payload_size_list,\n- )\n-\n- for loading_size, packet_count in self.size_and_count:\n- # IPv6 tcp test\n- out = self.vm0_testpmd.execute_cmd(\n- \"clear port info all\", \"testpmd> \", 120\n- )\n- self.tcpdump_start_sniffing([tx_interface, rx_interface])\n- if \"GTPU\" in key_outer:\n- self.tester.scapy_append(\n- \"from scapy.contrib.gtp import GTP_U_Header\"\n- )\n- self.logger.info([mac, loading_size, tx_interface, packet_count])\n- self.tester.scapy_append(\n- (\n- 'sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/'\n- + pkts_outer[key_outer]\n- + '/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/TCP(sport=1021,dport=1021)/(\"X\"*%s)], iface=\"%s\", count=%s)'\n- )\n- % (mac, loading_size, tx_interface, packet_count)\n- )\n- out = self.tester.scapy_execute()\n- out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n- print(out)\n- self.tcpdump_stop_sniff()\n- rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n- tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n- payload_size_list.sort(reverse=True)\n- self.logger.info(payload_size_list)\n- if loading_size <= 800:\n- self.verify(\n- # for all packet_count packets, verifying the packet size equals the size we sent.\n- rx_stats == tx_stats\n- and all(\n- [\n- payload_size_list[j] == loading_size\n- for j in range(packet_count)\n- ]\n- ),\n- f\"{key_outer} tunnel IPV6 RX or TX packet number not correct\",\n- )\n- else:\n- num = loading_size // 800\n- for i in range(num):\n- self.verify(\n- # i * packet_count + j is the i-th segmentation for j-th packet.\n- all(\n- [\n- payload_size_list[i * packet_count + j] == 800\n- for j in range(packet_count)\n- ]\n- ),\n- \"the packet segmentation incorrect, %s\" % payload_size_list,\n- )\n- if loading_size % 800 != 0:\n- self.verify(\n- # num * packet_count + j is the last segmentation for j-th packet.\n- all(\n- [\n- payload_size_list[num * packet_count + j]\n- == loading_size % 800\n- for j in range(packet_count)\n- ]\n- ),\n- \"the packet segmentation incorrect, %s\" % payload_size_list,\n- )\n+ validate_result = []\n+ validate_result += self.tso_validate(\n+ tx_interface=tx_interface,\n+ rx_interface=rx_interface,\n+ mac=mac,\n+ inet_type=\"IP\",\n+ size_and_count=size_and_count,\n+ outer_pkts=pkts_outer,\n+ )\n+ validate_result += self.tso_validate(\n+ tx_interface=tx_interface,\n+ rx_interface=rx_interface,\n+ mac=mac,\n+ inet_type=\"IPv6\",\n+ size_and_count=size_and_count,\n+ outer_pkts=pkts_outer,\n+ )\n \n def tear_down(self):\n self.vm0_testpmd.execute_cmd(\"quit\", \"# \")\n", "prefixes": [ "V1", "2/5" ] }{ "id": 123192, "url": "