get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/123770/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 123770,
    "url": "https://patches.dpdk.org/api/patches/123770/?format=api",
    "web_url": "https://patches.dpdk.org/project/dts/patch/20230213075810.1337897-3-ke1.xu@intel.com/",
    "project": {
        "id": 3,
        "url": "https://patches.dpdk.org/api/projects/3/?format=api",
        "name": "DTS",
        "link_name": "dts",
        "list_id": "dts.dpdk.org",
        "list_email": "dts@dpdk.org",
        "web_url": "",
        "scm_url": "git://dpdk.org/tools/dts",
        "webscm_url": "http://git.dpdk.org/tools/dts/",
        "list_archive_url": "https://inbox.dpdk.org/dts",
        "list_archive_url_format": "https://inbox.dpdk.org/dts/{}",
        "commit_url_format": ""
    },
    "msgid": "<20230213075810.1337897-3-ke1.xu@intel.com>",
    "list_archive_url": "https://inbox.dpdk.org/dts/20230213075810.1337897-3-ke1.xu@intel.com",
    "date": "2023-02-13T07:58:09",
    "name": "[V2,2/5] tests/vf_offload: improve TSO validating.",
    "commit_ref": null,
    "pull_url": null,
    "state": "superseded",
    "archived": false,
    "hash": "84278e99a5ec273ae515356252b1def31af6f4c8",
    "submitter": {
        "id": 2810,
        "url": "https://patches.dpdk.org/api/people/2810/?format=api",
        "name": "Ke Xu",
        "email": "ke1.xu@intel.com"
    },
    "delegate": null,
    "mbox": "https://patches.dpdk.org/project/dts/patch/20230213075810.1337897-3-ke1.xu@intel.com/mbox/",
    "series": [
        {
            "id": 26976,
            "url": "https://patches.dpdk.org/api/series/26976/?format=api",
            "web_url": "https://patches.dpdk.org/project/dts/list/?series=26976",
            "date": "2023-02-13T07:58:06",
            "name": "Update vf_offload cases for DPDK-v23.03 validation.",
            "version": 2,
            "mbox": "https://patches.dpdk.org/series/26976/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/123770/comments/",
    "check": "pending",
    "checks": "https://patches.dpdk.org/api/patches/123770/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dts-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from mails.dpdk.org (mails.dpdk.org [217.70.189.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 502DC41C84;\n\tMon, 13 Feb 2023 09:00:56 +0100 (CET)",
            "from mails.dpdk.org (localhost [127.0.0.1])\n\tby mails.dpdk.org (Postfix) with ESMTP id 4989342C76;\n\tMon, 13 Feb 2023 09:00:56 +0100 (CET)",
            "from mga18.intel.com (mga18.intel.com [134.134.136.126])\n by mails.dpdk.org (Postfix) with ESMTP id ACD6A40A81\n for <dts@dpdk.org>; Mon, 13 Feb 2023 09:00:54 +0100 (CET)",
            "from fmsmga008.fm.intel.com ([10.253.24.58])\n by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384;\n 13 Feb 2023 00:00:51 -0800",
            "from dpdk-xuke-lab.sh.intel.com ([10.67.119.8])\n by fmsmga008.fm.intel.com with ESMTP; 13 Feb 2023 00:00:49 -0800"
        ],
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/simple;\n d=intel.com; i=@intel.com; q=dns/txt; s=Intel;\n t=1676275255; x=1707811255;\n h=from:to:cc:subject:date:message-id:in-reply-to:\n references:mime-version:content-transfer-encoding;\n bh=WH7gabalPzu04hrMT1nVu/1oSlq+YR0YhsFaCZDruRs=;\n b=nIsreSAr6FNRXem8vBe0ZWC0a8AA1fOUhqc8Z6zAiFrUIlKuUCjIDobc\n DJ+13bDlEDrRf8ChjxtPLEUDlgbYruA6RCW2agUenn993mkY3ZiHtK/rB\n Ekxi5EFGfqqf7bqzkMvTlakxCExien5UWoIClgCA5z09TIJa6xa2LYDuy\n I6Izz1uxdfjXdbjeTtNnUHQ2KQFkpj15N+R2uCB6WNetq3FGnf7PUsg9T\n PwSS2muO5sR/a8kgz0R+EuEL/oI6t+gk2gllPEQE5ixTU2+tL6Evem7tY\n eEDZejKjavRZsuSEQ84zg3OGSb+X0AAOGZVfQdqb0IzgkeF9GIKPvhXPZ g==;",
        "X-IronPort-AV": [
            "E=McAfee;i=\"6500,9779,10619\"; a=\"314476311\"",
            "E=Sophos;i=\"5.97,293,1669104000\"; d=\"scan'208\";a=\"314476311\"",
            "E=McAfee;i=\"6500,9779,10619\"; a=\"732409267\"",
            "E=Sophos;i=\"5.97,293,1669104000\"; d=\"scan'208\";a=\"732409267\""
        ],
        "X-ExtLoop1": "1",
        "From": "Ke Xu <ke1.xu@intel.com>",
        "To": "dts@dpdk.org",
        "Cc": "ke1.xu@intel.com, qi.fu@intel.com, lijuan.tu@intel.com,\n yux.jiang@intel.com, zhiminx.huang@intel.com",
        "Subject": "[DTS][PATCH V2 2/5] tests/vf_offload: improve TSO validating.",
        "Date": "Mon, 13 Feb 2023 15:58:09 +0800",
        "Message-Id": "<20230213075810.1337897-3-ke1.xu@intel.com>",
        "X-Mailer": "git-send-email 2.25.1",
        "In-Reply-To": "<20230213075810.1337897-1-ke1.xu@intel.com>",
        "References": "<20230213075810.1337897-1-ke1.xu@intel.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "8bit",
        "X-BeenThere": "dts@dpdk.org",
        "X-Mailman-Version": "2.1.29",
        "Precedence": "list",
        "List-Id": "test suite reviews and discussions <dts.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dts>,\n <mailto:dts-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dts/>",
        "List-Post": "<mailto:dts@dpdk.org>",
        "List-Help": "<mailto:dts-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dts>,\n <mailto:dts-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dts-bounces@dpdk.org"
    },
    "content": "Use segment_validate and tso_validate\n methods to do the validate, providing\n scalarble interface for futrher cases.\n\nSigned-off-by: Ke Xu <ke1.xu@intel.com>\n---\n tests/TestSuite_vf_offload.py | 486 ++++++++++++++--------------------\n 1 file changed, 201 insertions(+), 285 deletions(-)",
    "diff": "diff --git a/tests/TestSuite_vf_offload.py b/tests/TestSuite_vf_offload.py\nindex ce1a6f13..f8cdf193 100644\n--- a/tests/TestSuite_vf_offload.py\n+++ b/tests/TestSuite_vf_offload.py\n@@ -849,6 +849,167 @@ class TestVfOffload(TestCase):\n         rx_packet_size = [len(p[Raw].load) for p in pkts]\n         return rx_packet_count, rx_packet_size\n \n+    def segment_validate(\n+        self,\n+        segment_size,\n+        loading_size,\n+        packet_count,\n+        tx_stats,\n+        rx_stats,\n+        payload_size_list,\n+    ):\n+        \"\"\"\n+        Validate the segmentation, checking if the result is segmented\n+        as expected.\n+        segment_size: segment size,\n+        loading_size: tx payload size,\n+        packet_count: tx packet count,\n+        tx_stats: tx packets count sniffed,\n+        rx_stats: rx packets count,\n+        payload_size_list: rx packets payload size list,\n+        Return a message of validate result.\n+        \"\"\"\n+        num_segs = (loading_size + segment_size - 1) // segment_size\n+        num_segs_full = loading_size // segment_size\n+        if not packet_count == tx_stats:\n+            return \"Failed: TX packet count is of inconsitent with sniffed TX packet count.\"\n+        elif not packet_count * num_segs == rx_stats:\n+            return \"Failed: RX packet count is of inconsitent with expected RX packet count.\"\n+        elif not (\n+            all(\n+                [\n+                    # i * packet_count + j is the i-th segmentation for j-th packet.\n+                    payload_size_list[i * packet_count + j] == segment_size\n+                    for j in range(packet_count)\n+                    for i in range(num_segs_full)\n+                ]\n+                + [\n+                    # i * packet_count + j is i-th segmentation for j-th packet.\n+                    # i range from num_segs_full to num_segs, means the last\n+                    # segmentation if exists.\n+                    payload_size_list[i * packet_count + j]\n+                    == (loading_size % segment_size)\n+                    for j in range(packet_count)\n+                    for i in range(num_segs_full, num_segs)\n+                ]\n+            )\n+        ):\n+            return (\n+                \"Failed: RX packet segmentation size incorrect, %s.\" % payload_size_list\n+            )\n+        return None\n+\n+    def tso_validate(\n+        self,\n+        tx_interface,\n+        rx_interface,\n+        mac,\n+        inet_type,\n+        size_and_count,\n+        outer_pkts=None,\n+    ):\n+\n+        validate_result = []\n+\n+        self.tester.scapy_foreground()\n+        time.sleep(5)\n+\n+        packet_l3 = {\n+            \"IP\": 'IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")',\n+            \"IPv6\": 'IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")',\n+        }\n+\n+        if not outer_pkts is None:\n+            for key_outer in outer_pkts:\n+                for loading_size, packet_count in size_and_count:\n+                    out = self.vm0_testpmd.execute_cmd(\n+                        \"clear port info all\", \"testpmd> \", 120\n+                    )\n+                    self.tcpdump_start_sniffing([tx_interface, rx_interface])\n+                    if \"GTPU\" in key_outer:\n+                        self.tester.scapy_append(\n+                            \"from scapy.contrib.gtp import GTP_U_Header\"\n+                        )\n+                    self.tester.scapy_append(\n+                        (\n+                            'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/'\n+                            + outer_pkts[key_outer]\n+                            + '/%s/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n+                        )\n+                        % (\n+                            mac,\n+                            packet_l3[inet_type],\n+                            loading_size,\n+                            tx_interface,\n+                            packet_count,\n+                        )\n+                    )\n+                    out = self.tester.scapy_execute()\n+                    out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n+                    print(out)\n+                    self.tcpdump_stop_sniff()\n+                    rx_stats, payload_size_list = self.tcpdump_analyse_sniff(\n+                        rx_interface\n+                    )\n+                    tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+                    payload_size_list.sort(reverse=True)\n+                    self.logger.info(payload_size_list)\n+                    segment_result = self.segment_validate(\n+                        800,\n+                        loading_size,\n+                        packet_count,\n+                        tx_stats,\n+                        rx_stats,\n+                        payload_size_list,\n+                    )\n+                    if segment_result:\n+                        result_message = (\n+                            f\"Packet: {key_outer}, inet type: {inet_type}, loading size: {loading_size} packet count: {packet_count}: \"\n+                            + segment_result\n+                        )\n+                        self.logger.info(result_message)\n+                        validate_result.append(result_message)\n+        else:\n+            for loading_size, packet_count in size_and_count:\n+                out = self.vm0_testpmd.execute_cmd(\n+                    \"clear port info all\", \"testpmd> \", 120\n+                )\n+                self.tcpdump_start_sniffing([tx_interface, rx_interface])\n+                self.tester.scapy_append(\n+                    'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/%s/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n+                    % (\n+                        mac,\n+                        packet_l3[inet_type],\n+                        loading_size,\n+                        tx_interface,\n+                        packet_count,\n+                    )\n+                )\n+                out = self.tester.scapy_execute()\n+                out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n+                print(out)\n+                self.tcpdump_stop_sniff()\n+                rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n+                tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n+                payload_size_list.sort(reverse=True)\n+                self.logger.info(payload_size_list)\n+                segment_result = self.segment_validate(\n+                    800,\n+                    loading_size,\n+                    packet_count,\n+                    tx_stats,\n+                    rx_stats,\n+                    payload_size_list,\n+                )\n+                if segment_result:\n+                    result_message = (\n+                        f\"Inet type: {inet_type}, loading size: {loading_size} packet count: {packet_count}: \"\n+                        + segment_result\n+                    )\n+                    self.logger.info(result_message)\n+                    validate_result.append(result_message)\n+        return validate_result\n+\n     def test_tso(self):\n         \"\"\"\n         TSO IPv4 TCP, IPv6 TCP testing.\n@@ -863,7 +1024,7 @@ class TestVfOffload(TestCase):\n         # Here size_and_count is a list of tuples for the test scopes that\n         # in a tuple (size, count) means, sending packets for count times\n         # for TSO with a payload size of size.\n-        self.size_and_count = [\n+        size_and_count = [\n             (128, 10),\n             (800, 10),\n             (801, 10),\n@@ -895,162 +1056,31 @@ class TestVfOffload(TestCase):\n \n         mac = self.vm0_testpmd.get_port_mac(0)\n         self.vm0_testpmd.execute_cmd(\"set verbose 1\", \"testpmd> \", 120)\n-        self.vm0_testpmd.execute_cmd(\"port stop all\", \"testpmd> \", 120)\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set ip hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set udp hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set tcp hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set sctp hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set outer-ip hw %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum parse-tunnel on %d\" % self.dut_ports[0], \"testpmd> \", 120\n-        )\n-\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set ip hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set udp hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set tcp hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set sctp hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum set outer-ip hw %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-        self.vm0_testpmd.execute_cmd(\n-            \"csum parse-tunnel on %d\" % self.dut_ports[1], \"testpmd> \", 120\n-        )\n-\n-        self.vm0_testpmd.execute_cmd(\"tso set 800 %d\" % self.vm0_dut_ports[1])\n         self.vm0_testpmd.execute_cmd(\"set fwd csum\")\n-        self.vm0_testpmd.execute_cmd(\"port start all\", \"testpmd> \", 120)\n+        self.tso_enable(self.vm0_dut_ports[0], self.vm_dut_0)\n+        self.tso_enable(self.vm0_dut_ports[1], self.vm_dut_0)\n         self.vm0_testpmd.execute_cmd(\"set promisc 0 on\", \"testpmd> \", 120)\n         self.vm0_testpmd.execute_cmd(\"set promisc 1 on\", \"testpmd> \", 120)\n         self.vm0_testpmd.execute_cmd(\"start\")\n+        self.vm0_testpmd.wait_link_status_up(self.vm0_dut_ports[0])\n+        self.vm0_testpmd.wait_link_status_up(self.vm0_dut_ports[1])\n \n-        self.tester.scapy_foreground()\n-        time.sleep(5)\n-\n-        for loading_size, packet_count in self.size_and_count:\n-            # IPv4 tcp test\n-            out = self.vm0_testpmd.execute_cmd(\"clear port info all\", \"testpmd> \", 120)\n-            self.tcpdump_start_sniffing([tx_interface, rx_interface])\n-            self.tester.scapy_append(\n-                'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n-                % (mac, loading_size, tx_interface, packet_count)\n-            )\n-            out = self.tester.scapy_execute()\n-            out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n-            print(out)\n-            self.tcpdump_stop_sniff()\n-            rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n-            tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n-            payload_size_list.sort(reverse=True)\n-            self.logger.info(payload_size_list)\n-            if loading_size <= 800:\n-                self.verify(\n-                    # for all packet_count packets, verifying the packet size equals the size we sent.\n-                    rx_stats == tx_stats\n-                    and all(\n-                        [\n-                            int(payload_size_list[j]) == loading_size\n-                            for j in range(packet_count)\n-                        ]\n-                    ),\n-                    \"IPV4 RX or TX packet number not correct\",\n-                )\n-            else:\n-                num = loading_size // 800\n-                for i in range(num):\n-                    self.verify(\n-                        # i * packet_count + j is the i-th segmentation for j-th packet.\n-                        all(\n-                            [\n-                                int(payload_size_list[i * packet_count + j]) == 800\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                    )\n-                if loading_size % 800 != 0:\n-                    self.verify(\n-                        # num * packet_count + j is the last segmentation for j-th packet.\n-                        all(\n-                            [\n-                                int(payload_size_list[num * packet_count + j])\n-                                == loading_size % 800\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                    )\n-\n-        for loading_size, packet_count in self.size_and_count:\n-            # IPv6 tcp test\n-            out = self.vm0_testpmd.execute_cmd(\"clear port info all\", \"testpmd> \", 120)\n-            self.tcpdump_start_sniffing([tx_interface, rx_interface])\n-            self.tester.scapy_append(\n-                'sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n-                % (mac, loading_size, tx_interface, packet_count)\n-            )\n-            out = self.tester.scapy_execute()\n-            out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n-            print(out)\n-            self.tcpdump_stop_sniff()\n-            rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n-            tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n-            payload_size_list.sort(reverse=True)\n-            self.logger.info(payload_size_list)\n-            if loading_size <= 800:\n-                self.verify(\n-                    # for all packet_count packets, verifying the packet size equals the size we sent.\n-                    rx_stats == tx_stats\n-                    and all(\n-                        [\n-                            int(payload_size_list[j]) == loading_size\n-                            for j in range(packet_count)\n-                        ]\n-                    ),\n-                    \"IPV6 RX or TX packet number not correct\",\n-                )\n-            else:\n-                num = loading_size // 800\n-                for i in range(num):\n-                    self.verify(\n-                        # i * packet_count + j is the i-th segmentation for j-th packet.\n-                        all(\n-                            [\n-                                int(payload_size_list[i * packet_count + j]) == 800\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                    )\n-                if loading_size % 800 != 0:\n-                    self.verify(\n-                        # num * packet_count + j is the last segmentation for j-th packet.\n-                        all(\n-                            [\n-                                int(payload_size_list[num * packet_count + j])\n-                                == loading_size % 800\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                    )\n+        validate_result = []\n+        validate_result += self.tso_validate(\n+            tx_interface=tx_interface,\n+            rx_interface=rx_interface,\n+            mac=mac,\n+            inet_type=\"IP\",\n+            size_and_count=size_and_count,\n+        )\n+        validate_result += self.tso_validate(\n+            tx_interface=tx_interface,\n+            rx_interface=rx_interface,\n+            mac=mac,\n+            inet_type=\"IPv6\",\n+            size_and_count=size_and_count,\n+        )\n+        self.verify(len(validate_result) == 0, \",\".join(list(validate_result)))\n \n     @check_supported_nic(\n         [\"ICE_100G-E810C_QSFP\", \"ICE_25G-E810C_SFP\", \"ICE_25G-E810_XXV_SFP\"]\n@@ -1070,7 +1100,7 @@ class TestVfOffload(TestCase):\n         # Here size_and_count is a list of tuples for the test scopes that\n         # in a tuple (size, count) means, sending packets for count times\n         # for TSO with a payload size of size.\n-        self.size_and_count = [\n+        size_and_count = [\n             (128, 10),\n             (800, 10),\n             (801, 10),\n@@ -1130,138 +1160,24 @@ class TestVfOffload(TestCase):\n             \"IPv6/UDP/GTPU\": 'IPv6(src = \"FE80:0:0:0:200:1FF:FE00:200\", dst = \"3555:5555:6666:6666:7777:7777:8888:8888\") / UDP(dport = 2152) / GTP_U_Header(gtp_type=255, teid=0x123456)',\n         }\n \n-        self.tester.scapy_foreground()\n-        time.sleep(5)\n-\n-        for key_outer in pkts_outer:\n-            for loading_size, packet_count in self.size_and_count:\n-                # IPv4 tcp test\n-                out = self.vm0_testpmd.execute_cmd(\n-                    \"clear port info all\", \"testpmd> \", 120\n-                )\n-                self.tcpdump_start_sniffing([tx_interface, rx_interface])\n-                if \"GTPU\" in key_outer:\n-                    self.tester.scapy_append(\n-                        \"from scapy.contrib.gtp import GTP_U_Header\"\n-                    )\n-                self.tester.scapy_append(\n-                    (\n-                        'sendp([Ether(dst=\"%s\",src=\"52:00:00:00:00:00\")/'\n-                        + pkts_outer[key_outer]\n-                        + '/IP(src=\"192.168.1.1\",dst=\"192.168.1.2\")/TCP(sport=1021,dport=1021)/Raw(RandString(size=%s))], iface=\"%s\", count=%s)'\n-                    )\n-                    % (mac, loading_size, tx_interface, packet_count)\n-                )\n-                out = self.tester.scapy_execute()\n-                out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n-                print(out)\n-                self.tcpdump_stop_sniff()\n-                rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n-                tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n-                payload_size_list.sort(reverse=True)\n-                self.logger.info(payload_size_list)\n-                if loading_size <= 800:\n-                    self.verify(\n-                        # for all packet_count packets, verifying the packet size equals the size we sent.\n-                        rx_stats == tx_stats\n-                        and all(\n-                            [\n-                                int(payload_size_list[j]) == loading_size\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        f\"{key_outer} tunnel IPV4 RX or TX packet number not correct\",\n-                    )\n-                else:\n-                    num = loading_size // 800\n-                    for i in range(num):\n-                        self.verify(\n-                            # i * packet_count + j is the i-th segmentation for j-th packet.\n-                            all(\n-                                [\n-                                    payload_size_list[i * packet_count + j] == 800\n-                                    for j in range(packet_count)\n-                                ]\n-                            ),\n-                            \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                        )\n-                    if loading_size % 800 != 0:\n-                        self.verify(\n-                            # num * packet_count + j is the last segmentation for j-th packet.\n-                            all(\n-                                [\n-                                    payload_size_list[num * packet_count + j]\n-                                    == loading_size % 800\n-                                    for j in range(packet_count)\n-                                ]\n-                            ),\n-                            \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                        )\n-\n-            for loading_size, packet_count in self.size_and_count:\n-                # IPv6 tcp test\n-                out = self.vm0_testpmd.execute_cmd(\n-                    \"clear port info all\", \"testpmd> \", 120\n-                )\n-                self.tcpdump_start_sniffing([tx_interface, rx_interface])\n-                if \"GTPU\" in key_outer:\n-                    self.tester.scapy_append(\n-                        \"from scapy.contrib.gtp import GTP_U_Header\"\n-                    )\n-                self.logger.info([mac, loading_size, tx_interface, packet_count])\n-                self.tester.scapy_append(\n-                    (\n-                        'sendp([Ether(dst=\"%s\", src=\"52:00:00:00:00:00\")/'\n-                        + pkts_outer[key_outer]\n-                        + '/IPv6(src=\"FE80:0:0:0:200:1FF:FE00:200\", dst=\"3555:5555:6666:6666:7777:7777:8888:8888\")/TCP(sport=1021,dport=1021)/(\"X\"*%s)], iface=\"%s\", count=%s)'\n-                    )\n-                    % (mac, loading_size, tx_interface, packet_count)\n-                )\n-                out = self.tester.scapy_execute()\n-                out = self.vm0_testpmd.execute_cmd(\"show port stats all\")\n-                print(out)\n-                self.tcpdump_stop_sniff()\n-                rx_stats, payload_size_list = self.tcpdump_analyse_sniff(rx_interface)\n-                tx_stats, _ = self.tcpdump_analyse_sniff(tx_interface)\n-                payload_size_list.sort(reverse=True)\n-                self.logger.info(payload_size_list)\n-                if loading_size <= 800:\n-                    self.verify(\n-                        # for all packet_count packets, verifying the packet size equals the size we sent.\n-                        rx_stats == tx_stats\n-                        and all(\n-                            [\n-                                payload_size_list[j] == loading_size\n-                                for j in range(packet_count)\n-                            ]\n-                        ),\n-                        f\"{key_outer} tunnel IPV6 RX or TX packet number not correct\",\n-                    )\n-                else:\n-                    num = loading_size // 800\n-                    for i in range(num):\n-                        self.verify(\n-                            # i * packet_count + j is the i-th segmentation for j-th packet.\n-                            all(\n-                                [\n-                                    payload_size_list[i * packet_count + j] == 800\n-                                    for j in range(packet_count)\n-                                ]\n-                            ),\n-                            \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                        )\n-                    if loading_size % 800 != 0:\n-                        self.verify(\n-                            # num * packet_count + j is the last segmentation for j-th packet.\n-                            all(\n-                                [\n-                                    payload_size_list[num * packet_count + j]\n-                                    == loading_size % 800\n-                                    for j in range(packet_count)\n-                                ]\n-                            ),\n-                            \"the packet segmentation incorrect, %s\" % payload_size_list,\n-                        )\n+        validate_result = []\n+        validate_result += self.tso_validate(\n+            tx_interface=tx_interface,\n+            rx_interface=rx_interface,\n+            mac=mac,\n+            inet_type=\"IP\",\n+            size_and_count=size_and_count,\n+            outer_pkts=pkts_outer,\n+        )\n+        validate_result += self.tso_validate(\n+            tx_interface=tx_interface,\n+            rx_interface=rx_interface,\n+            mac=mac,\n+            inet_type=\"IPv6\",\n+            size_and_count=size_and_count,\n+            outer_pkts=pkts_outer,\n+        )\n+        self.verify(len(validate_result) == 0, \",\".join(list(validate_result)))\n \n     def tear_down(self):\n         self.vm0_testpmd.execute_cmd(\"quit\", \"# \")\n",
    "prefixes": [
        "V2",
        "2/5"
    ]
}