get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/123192/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 123192,
    "url": "https://patches.dpdk.org/api/patches/123192/?format=api",
    "web_url": "https://patches.dpdk.org/project/dts/patch/20230207032313.404935-3-ke1.xu@intel.com/",
    "project": {
        "id": 3,
        "url": "https://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20230207032313.404935-3-ke1.xu@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20230207032313.404935-3-ke1.xu@intel.com",
    "date": "2023-02-07T03:23:10",
    "name": "[V1,2/5] tests/vf_offload: improve TSO validating.",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "ea504d6abea2e19d7ffabf059c6d533fffdfdc40",
    "submitter": {
        "id": 2810,
        "url": "https://patches.dpdk.org/api/people/2810/?format=api",
        "name": "Ke Xu",
        "email": "ke1.xu@intel.com"
    },
    "delegate": null,
    "mbox": "https://patches.dpdk.org/project/dts/patch/20230207032313.404935-3-ke1.xu@intel.com/mbox/",
    "series": [
        {
            "id": 26832,
            "url": "https://patches.dpdk.org/api/series/26832/?format=api",
            "web_url": "https://patches.dpdk.org/project/dts/list/?series=26832",
            "date": "2023-02-07T03:23:08",
            "name": "Update vf_offload cases for DPDK-v23.03 validation.",
            "version": 1,
            "mbox": "https://patches.dpdk.org/series/26832/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/123192/comments/",
    "check": "pending",
    "checks": "https://patches.dpdk.org/api/patches/123192/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id AF34341C28;\n\tTue,  7 Feb 2023 04:25:24 +0100 (CET)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id A5330427F5;\n\tTue,  7 Feb 2023 04:25:24 +0100 (CET)",
            "from mga01.intel.com (mga01.intel.com [192.55.52.88])\n by mails.dpdk.org (Postfix) with ESMTP id 8166F427E9\n for <dts@dpdk.org>; Tue,  7 Feb 2023 04:25:22 +0100 (CET)",
            "from fmsmga007.fm.intel.com ([10.253.24.52])\n by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 06 Feb 2023 19:25:22 -0800",
            "from dpdk-xuke-lab.sh.intel.com ([10.67.119.8])\n by fmsmga007.fm.intel.com with ESMTP; 06 Feb 2023 19:25:20 -0800"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1675740322; x=1707276322;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=aztkFZbUVHqU1yp0Opuh2eoyFsGPaS4jDzzh9xA3d8Q=;\n b=ODECdsSxD68H9UmV1cde2dTDsP7pcO+1g0bI0yuNZzD82FsUHpTZpGI/\n pMoDWuiqOmrllpEqC60NNgZMPj3DuR7ny0zOL/ucnVGPlBDOpURx+GyZi\n jDDF+Fy3lKrXrAa4W4oD0M1A2T4wRPmSn22tQdu5sdIOapg/JheLwE9VB\n PX5FNUfbE7xojfW2p/FXy71evq53m/dhpHuUPonCE1pKnDfht/MOTce81\n +r+gC0Vnc+ucRaKaxUDFGWi0XpsscrGtIXgBYkLRzPJPDrlVhezu8GAZl\n flt+o+cQs+uhUsc9zDYpT9uDARNg0tjjT6JgaHGxJ6mrzjpTktzKGvHmR g==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10613\"; a=\"356757996\"",
            "E=Sophos;i=\"5.97,278,1669104000\"; d=\"scan'208\";a=\"356757996\"",
            "E=McAfee;i=\"6500,9779,10613\"; a=\"668636717\"",
            "E=Sophos;i=\"5.97,278,1669104000\"; d=\"scan'208\";a=\"668636717\""
        ],
        "X-ExtLoop1": "1",
        "From": "Ke Xu <ke1.xu@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "ke1.xu@intel.com, yux.jiang@intel.com, lijuan.tu@intel.com,\n qi.fu@intel.com",
        "Subject": "[DTS][PATCH V1 2/5] tests/vf_offload: improve TSO validating.",
        "Date": "Tue,  7 Feb 2023 11:23:10 +0800",
        "Message-Id": "<20230207032313.404935-3-ke1.xu@intel.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20230207032313.404935-1-ke1.xu@intel.com>",
        "References": "<20230207032313.404935-1-ke1.xu@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "Use segment_validate and tso_validate\n methods to do the validate, providing\n scalarble interface for futrher cases.\n\nSigned-off-by: Ke Xu <ke1.xu@intel.com>\n---\n tests/TestSuite_vf_offload.py | 465 +++++++++++++---------------------\n 1 file changed, 180 insertions(+), 285 deletions(-)",
    "diff": "diff --git a/tests/TestSuite_vf_offload.py b/tests/TestSuite_vf_offload.py\nindex ce1a6f13..bd412100 100644\n--- a/tests/TestSuite_vf_offload.py\n+++ b/tests/TestSuite_vf_offload.py\n@@ -849,6 +849,148 @@ class TestVfOffload(TestCase):\n         rx_packet_size = [len(p[Raw].load) for p in pkts]\n         return rx_packet_count, rx_packet_size\n \n+    def segment_validate(\n+        self,\n+        segment_size,\n+        loading_size,\n+        packet_count,\n+        tx_stats,\n+        rx_stats,\n+        payload_size_list,\n+    ):\n+        \"\"\"\n+        Validate the segmentation, checking if the result is segmented\n+        as expected.\n+        segment_size: segment size,\n+        loading_size: tx payload size,\n+        packet_count: tx packet count,\n+        tx_stats: tx packets count sniffed,\n+        rx_stats: rx packets count,\n+        payload_size_list: rx packets payload size list,\n+        Return a message of validate result.\n+        \"\"\"\n+        num_segs = (loading_size + segment_size - 1) // segment_size\n+        num_segs_full = loading_size // segment_size\n+        if not packet_count == tx_stats:\n+            return \"Failed: TX packet count is of inconsitent with sniffed TX packet count.\"\n+        elif loading_size <= segment_size and not rx_stats == packet_count:\n+            return \"Failed: RX packet count is of inconsitent with TX packet count.\"\n+        elif loading_size <= segment_size and not all(\n+            [int(payload_size_list[j]) == loading_size for j in range(packet_count)]\n+        ):\n+            return \"Failed: RX packet size is of inconsitent with TX packet size.\"\n+        elif rx_stats != num_segs:\n+            return \"Failed: RX packet count is of inconsitent with segmented TX packet count.\"\n+        elif not (\n+            all(\n+                [\n+                    # i * packet_count + j is the i-th segmentation for j-th packet.\n+                    payload_size_list[i * packet_count + j] == 800\n+                    for j in range(packet_count)\n+                    for i in range(num_segs_full)\n+                ]\n+            )\n+            and all(\n+                [\n+                    # num_segs_full * packet_count + j is the last segmentation for j-th packet.\n+                    payload_size_list[num_segs_full * packet_count + j]\n+                    == (loading_size % 800)\n+                    for j in range(packet_count)\n+                ]\n+            )\n+        ):\n+            return (\n+                \"Failed: RX packet segmentation size incorrect, %s.\" % payload_size_list\n+            )\n+        return None\n+\n+    def tso_validate(\n+        self,\n+        tx_interface,\n+        rx_interface,\n+        mac,\n+        inet_type,\n+        size_and_count,\n+        outer_pkts=None,\n+    ):\n+\n+        validate_result = []\n+\n+        self.tester.scapy_foreground()\n+        self.tester.scapy_append(\"from scapy.contrib.gtp import GTP_U_Header\")\n+        time.sleep(5)\n+\n+        if not outer_pkts is None:\n+            for key_outer in outer_pkts:\n+                for loading_size, packet_count in size_and_count:\n+                    out = self.vm0_testpmd.execute_cmd(\n+                        \"clear port info all\", \"testpmd> \", 120\n+                    )\n+                    self.tcpdump_start_sniffing([tx_interface, rx_interface])\n+                    self.tester.scapy_append(\n+                        (\n+                            'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/'\n+                            + outer_pkts[key_outer]\n+                            + '/%s(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n+                        )\n+                        % (mac, inet_type, loading_size, tx_interface, packet_count)\n+                    )\n+                    out = self.tester.scapy_execute()\n+                    out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n+                    print(out)\n+                    self.tcpdump_stop_sniff()\n+                    rx_stats, payload_size_list = self.tcpdump_analyse_sniff(\n+                        rx_interface\n+                    )\n+                    tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+                    payload_size_list.sort(reverse=True)\n+                    self.logger.info(payload_size_list)\n+                    segment_result = self.segment_validate(\n+                        800,\n+                        loading_size,\n+                        packet_count,\n+                        tx_stats,\n+                        rx_stats,\n+                        payload_size_list,\n+                    )\n+                    if segment_result:\n+                        validate_result.append(\n+                            f\"Packet: {key_outer}, inet type: {inet_type}, loading size: {loading_size} packet count: {packet_count}: \"\n+                            + segment_result\n+                        )\n+        else:\n+            for loading_size, packet_count in size_and_count:\n+                out = self.vm0_testpmd.execute_cmd(\n+                    \"clear port info all\", \"testpmd> \", 120\n+                )\n+                self.tcpdump_start_sniffing([tx_interface, rx_interface])\n+                self.tester.scapy_append(\n+                    'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/%s(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n+                    % (mac, inet_type, loading_size, tx_interface, packet_count)\n+                )\n+                out = self.tester.scapy_execute()\n+                out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n+                print(out)\n+                self.tcpdump_stop_sniff()\n+                rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n+                tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+                payload_size_list.sort(reverse=True)\n+                self.logger.info(payload_size_list)\n+                segment_result = self.segment_validate(\n+                    800,\n+                    loading_size,\n+                    packet_count,\n+                    tx_stats,\n+                    rx_stats,\n+                    payload_size_list,\n+                )\n+                if segment_result:\n+                    validate_result.append(\n+                        f\"Inet type: {inet_type}, loading size: {loading_size} packet count: {packet_count}: \"\n+                        + segment_result\n+                    )\n+        return validate_result\n+\n     def test_tso(self):\n         \"\"\"\n         TSO IPv4 TCP, IPv6 TCP testing.\n@@ -863,7 +1005,7 @@ class TestVfOffload(TestCase):\n         # Here size_and_count is a list of tuples for the test scopes that\n         # in a tuple (size, count) means, sending packets for count times\n         # for TSO with a payload size of size.\n-        self.size_and_count = [\n+        size_and_count = [\n             (128, 10),\n             (800, 10),\n             (801, 10),\n@@ -895,162 +1037,30 @@ class TestVfOffload(TestCase):\n \n         mac = self.vm0_testpmd.get_port_mac(0)\n         self.vm0_testpmd.execute_cmd(\"set verbose 1\", \"testpmd> \", 120)\n-        self.vm0_testpmd.execute_cmd(\"port stop all\", \"testpmd> \", 120)\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set ip hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set udp hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set tcp hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set sctp hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set outer-ip hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum parse-tunnel on %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set ip hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set udp hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set tcp hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set sctp hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set outer-ip hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum parse-tunnel on %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-\n-        self.vm0_testpmd.execute_cmd(\"tso set 800 %d\" % self.vm0_dut_ports[1])\n         self.vm0_testpmd.execute_cmd(\"set fwd csum\")\n-        self.vm0_testpmd.execute_cmd(\"port start all\", \"testpmd> \", 120)\n+        self.tso_enable(self.vm0_dut_ports[0], self.vm_dut_0)\n+        self.tso_enable(self.vm0_dut_ports[1], self.vm_dut_0)\n         self.vm0_testpmd.execute_cmd(\"set promisc 0 on\", \"testpmd> \", 120)\n         self.vm0_testpmd.execute_cmd(\"set promisc 1 on\", \"testpmd> \", 120)\n         self.vm0_testpmd.execute_cmd(\"start\")\n+        self.vm0_testpmd.wait_link_status_up(self.vm0_dut_ports[0])\n+        self.vm0_testpmd.wait_link_status_up(self.vm0_dut_ports[1])\n \n-        self.tester.scapy_foreground()\n-        time.sleep(5)\n-\n-        for loading_size, packet_count in self.size_and_count:\n-            # IPv4 tcp test\n-            out = self.vm0_testpmd.execute_cmd(\"clear port info all\", \"testpmd> \", 120)\n-            self.tcpdump_start_sniffing([tx_interface, rx_interface])\n-            self.tester.scapy_append(\n-                'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n-                % (mac, loading_size, tx_interface, packet_count)\n-            )\n-            out = self.tester.scapy_execute()\n-            out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n-            print(out)\n-            self.tcpdump_stop_sniff()\n-            rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n-            tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n-            payload_size_list.sort(reverse=True)\n-            self.logger.info(payload_size_list)\n-            if loading_size <= 800:\n-                self.verify(\n-                    # for all packet_count packets, verifying the packet size equals the size we sent.\n-                    rx_stats == tx_stats\n-                    and all(\n-                        [\n-                            int(payload_size_list[j]) == loading_size\n-                            for j in range(packet_count)\n-                        ]\n-                    ),\n-                    \"IPV4 RX or TX packet number not correct\",\n-                )\n-            else:\n-                num = loading_size // 800\n-                for i in range(num):\n-                    self.verify(\n-                        # i * packet_count + j is the i-th segmentation for j-th packet.\n-                        all(\n-                            [\n-                                int(payload_size_list[i * packet_count + j]) == 800\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                    )\n-                if loading_size % 800 != 0:\n-                    self.verify(\n-                        # num * packet_count + j is the last segmentation for j-th packet.\n-                        all(\n-                            [\n-                                int(payload_size_list[num * packet_count + j])\n-                                == loading_size % 800\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                    )\n-\n-        for loading_size, packet_count in self.size_and_count:\n-            # IPv6 tcp test\n-            out = self.vm0_testpmd.execute_cmd(\"clear port info all\", \"testpmd> \", 120)\n-            self.tcpdump_start_sniffing([tx_interface, rx_interface])\n-            self.tester.scapy_append(\n-                'sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n-                % (mac, loading_size, tx_interface, packet_count)\n-            )\n-            out = self.tester.scapy_execute()\n-            out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n-            print(out)\n-            self.tcpdump_stop_sniff()\n-            rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n-            tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n-            payload_size_list.sort(reverse=True)\n-            self.logger.info(payload_size_list)\n-            if loading_size <= 800:\n-                self.verify(\n-                    # for all packet_count packets, verifying the packet size equals the size we sent.\n-                    rx_stats == tx_stats\n-                    and all(\n-                        [\n-                            int(payload_size_list[j]) == loading_size\n-                            for j in range(packet_count)\n-                        ]\n-                    ),\n-                    \"IPV6 RX or TX packet number not correct\",\n-                )\n-            else:\n-                num = loading_size // 800\n-                for i in range(num):\n-                    self.verify(\n-                        # i * packet_count + j is the i-th segmentation for j-th packet.\n-                        all(\n-                            [\n-                                int(payload_size_list[i * packet_count + j]) == 800\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                    )\n-                if loading_size % 800 != 0:\n-                    self.verify(\n-                        # num * packet_count + j is the last segmentation for j-th packet.\n-                        all(\n-                            [\n-                                int(payload_size_list[num * packet_count + j])\n-                                == loading_size % 800\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                    )\n+        validate_result = []\n+        validate_result += self.tso_validate(\n+            tx_interface=tx_interface,\n+            rx_interface=rx_interface,\n+            mac=mac,\n+            inet_type=\"IP\",\n+            size_and_count=size_and_count,\n+        )\n+        validate_result += self.tso_validate(\n+            tx_interface=tx_interface,\n+            rx_interface=rx_interface,\n+            mac=mac,\n+            inet_type=\"IPv6\",\n+            size_and_count=size_and_count,\n+        )\n \n     @check_supported_nic(\n         [\"ICE_100G-E810C_QSFP\", \"ICE_25G-E810C_SFP\", \"ICE_25G-E810_XXV_SFP\"]\n@@ -1070,7 +1080,7 @@ class TestVfOffload(TestCase):\n         # Here size_and_count is a list of tuples for the test scopes that\n         # in a tuple (size, count) means, sending packets for count times\n         # for TSO with a payload size of size.\n-        self.size_and_count = [\n+        size_and_count = [\n             (128, 10),\n             (800, 10),\n             (801, 10),\n@@ -1130,138 +1140,23 @@ class TestVfOffload(TestCase):\n             \"IPv6/UDP/GTPU\": 'IPv6(src = \"FE80:0:0:0:200:1FF:FE00:200\", dst = \"3555:5555:6666:6666:7777:7777:8888:8888\") / UDP(dport = 2152) / GTP_U_Header(gtp_type=255, teid=0x123456)',\n         }\n \n-        self.tester.scapy_foreground()\n-        time.sleep(5)\n-\n-        for key_outer in pkts_outer:\n-            for loading_size, packet_count in self.size_and_count:\n-                # IPv4 tcp test\n-                out = self.vm0_testpmd.execute_cmd(\n-                    \"clear port info all\", \"testpmd> \", 120\n-                )\n-                self.tcpdump_start_sniffing([tx_interface, rx_interface])\n-                if \"GTPU\" in key_outer:\n-                    self.tester.scapy_append(\n-                        \"from scapy.contrib.gtp import GTP_U_Header\"\n-                    )\n-                self.tester.scapy_append(\n-                    (\n-                        'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/'\n-                        + pkts_outer[key_outer]\n-                        + '/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n-                    )\n-                    % (mac, loading_size, tx_interface, packet_count)\n-                )\n-                out = self.tester.scapy_execute()\n-                out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n-                print(out)\n-                self.tcpdump_stop_sniff()\n-                rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n-                tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n-                payload_size_list.sort(reverse=True)\n-                self.logger.info(payload_size_list)\n-                if loading_size <= 800:\n-                    self.verify(\n-                        # for all packet_count packets, verifying the packet size equals the size we sent.\n-                        rx_stats == tx_stats\n-                        and all(\n-                            [\n-                                int(payload_size_list[j]) == loading_size\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        f\"{key_outer} tunnel IPV4 RX or TX packet number not correct\",\n-                    )\n-                else:\n-                    num = loading_size // 800\n-                    for i in range(num):\n-                        self.verify(\n-                            # i * packet_count + j is the i-th segmentation for j-th packet.\n-                            all(\n-                                [\n-                                    payload_size_list[i * packet_count + j] == 800\n-                                    for j in range(packet_count)\n-                                ]\n-                            ),\n-                            \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                        )\n-                    if loading_size % 800 != 0:\n-                        self.verify(\n-                            # num * packet_count + j is the last segmentation for j-th packet.\n-                            all(\n-                                [\n-                                    payload_size_list[num * packet_count + j]\n-                                    == loading_size % 800\n-                                    for j in range(packet_count)\n-                                ]\n-                            ),\n-                            \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                        )\n-\n-            for loading_size, packet_count in self.size_and_count:\n-                # IPv6 tcp test\n-                out = self.vm0_testpmd.execute_cmd(\n-                    \"clear port info all\", \"testpmd> \", 120\n-                )\n-                self.tcpdump_start_sniffing([tx_interface, rx_interface])\n-                if \"GTPU\" in key_outer:\n-                    self.tester.scapy_append(\n-                        \"from scapy.contrib.gtp import GTP_U_Header\"\n-                    )\n-                self.logger.info([mac, loading_size, tx_interface, packet_count])\n-                self.tester.scapy_append(\n-                    (\n-                        'sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/'\n-                        + pkts_outer[key_outer]\n-                        + '/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/TCP(sport=1021,dport=1021)/(\"X\"*%s)], iface=\"%s\", count=%s)'\n-                    )\n-                    % (mac, loading_size, tx_interface, packet_count)\n-                )\n-                out = self.tester.scapy_execute()\n-                out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n-                print(out)\n-                self.tcpdump_stop_sniff()\n-                rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n-                tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n-                payload_size_list.sort(reverse=True)\n-                self.logger.info(payload_size_list)\n-                if loading_size <= 800:\n-                    self.verify(\n-                        # for all packet_count packets, verifying the packet size equals the size we sent.\n-                        rx_stats == tx_stats\n-                        and all(\n-                            [\n-                                payload_size_list[j] == loading_size\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        f\"{key_outer} tunnel IPV6 RX or TX packet number not correct\",\n-                    )\n-                else:\n-                    num = loading_size // 800\n-                    for i in range(num):\n-                        self.verify(\n-                            # i * packet_count + j is the i-th segmentation for j-th packet.\n-                            all(\n-                                [\n-                                    payload_size_list[i * packet_count + j] == 800\n-                                    for j in range(packet_count)\n-                                ]\n-                            ),\n-                            \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                        )\n-                    if loading_size % 800 != 0:\n-                        self.verify(\n-                            # num * packet_count + j is the last segmentation for j-th packet.\n-                            all(\n-                                [\n-                                    payload_size_list[num * packet_count + j]\n-                                    == loading_size % 800\n-                                    for j in range(packet_count)\n-                                ]\n-                            ),\n-                            \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                        )\n+        validate_result = []\n+        validate_result += self.tso_validate(\n+            tx_interface=tx_interface,\n+            rx_interface=rx_interface,\n+            mac=mac,\n+            inet_type=\"IP\",\n+            size_and_count=size_and_count,\n+            outer_pkts=pkts_outer,\n+        )\n+        validate_result += self.tso_validate(\n+            tx_interface=tx_interface,\n+            rx_interface=rx_interface,\n+            mac=mac,\n+            inet_type=\"IPv6\",\n+            size_and_count=size_and_count,\n+            outer_pkts=pkts_outer,\n+        )\n \n     def tear_down(self):\n         self.vm0_testpmd.execute_cmd(\"quit\", \"# \")\n",
    "prefixes": [
        "V1",
        "2/5"
    ]
}