From patchwork Fri Aug 20 19:47:37 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Huang, ZhiminX" X-Patchwork-Id: 97151 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id D9786A0C4C; Fri, 20 Aug 2021 13:15:44 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id C98FC41208; Fri, 20 Aug 2021 13:15:44 +0200 (CEST) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id 247294003E for ; Fri, 20 Aug 2021 13:15:42 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10081"; a="238883113" X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="238883113" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:42 -0700 X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="523571770" Received: from unknown (HELO localhost.localdomain) ([10.240.183.103]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:40 -0700 From: Zhimin Huang To: dts@dpdk.org Cc: Zhimin Huang Date: Sat, 21 Aug 2021 03:47:37 +0800 Message-Id: <20210820194742.28666-2-zhiminx.huang@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210820194742.28666-1-zhiminx.huang@intel.com> References: <20210820194742.28666-1-zhiminx.huang@intel.com> Subject: [dts] [PATCH V1 1/6] test_plans/cvl_advanced_rss_test_plan:remove test steps X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" according to b83d270dff3852f1df0ea9bea5a8740378db0c7c, the defaut rss not support tunnel inner rss, these function will cover by new case. so remove test steps in test plan Signed-off-by: Zhimin Huang --- test_plans/cvl_advanced_rss_test_plan.rst | 259 ---------------------- 1 file changed, 259 deletions(-) diff --git a/test_plans/cvl_advanced_rss_test_plan.rst b/test_plans/cvl_advanced_rss_test_plan.rst index c33f4fb4..8dbb8fc6 100644 --- a/test_plans/cvl_advanced_rss_test_plan.rst +++ b/test_plans/cvl_advanced_rss_test_plan.rst @@ -555,10 +555,6 @@ ipv4-tcp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -ipv4-udp-vxlan packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src='192.168.1.2')/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - 3. hit pattern/not defined input set: ipv4-nonfrag packets:: @@ -576,10 +572,6 @@ ipv4-tcp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=32,dport=33)/("X"*480)],iface="ens786f0") -ipv4-udp-vxlan packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.1.1", src='192.168.0.2')/UDP(sport=32,dport=33)/("X"*480)], iface="ens786f0") - Subcase: MAC_IPV4_L3DST ----------------------- 1. create rss rule:: @@ -624,10 +616,6 @@ ipv4-tcp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=32,dport=33)/("X"*480)],iface="ens786f0") -ipv4-udp-vxlan packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src='192.168.1.2')/UDP(sport=32,dport=33)/("X"*480)], iface="ens786f0") - Subcase: MAC_IPV4_ALL --------------------- 1. create rss rule:: @@ -655,11 +643,6 @@ ipv4-tcp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -ipv4-udp-vxlan packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.1.1", src='192.168.0.2')/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src='192.168.1.2')/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - 3. hit pattern/not defined input set: ipv4-nonfrag packets:: @@ -765,10 +748,6 @@ ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=32,dport=33)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=32,dport=33)/("X"*480)], iface="ens786f0") - Subcase: MAC_IPV4_UDP_L3DST --------------------------- 1. create rss rule:: @@ -789,10 +768,6 @@ ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=32,dport=33)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=32,dport=33)/("X"*480)], iface="ens786f0") - Subcase: MAC_IPV4_UDP_L3SRC_L4SRC --------------------------------- 1. create rss rule:: @@ -805,20 +780,11 @@ ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)], iface="ens786f0") - 3. hit pattern/not defined input set: ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)], iface="ens786f0") - Subcase: MAC_IPV4_UDP_L3SRC_L4DST --------------------------------- 1. create rss rule:: @@ -831,20 +797,11 @@ ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)], iface="ens786f0") - 3. hit pattern/not defined input set: ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)], iface="ens786f0") - Subcase: MAC_IPV4_UDP_L3DST_L4SRC --------------------------------- 1. create rss rule:: @@ -857,20 +814,11 @@ ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)], iface="ens786f0") - 3. hit pattern/not defined input set: ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=33)/("X"*480)], iface="ens786f0") - Subcase: MAC_IPV4_UDP_L3DST_L4DST --------------------------------- 1. create rss rule:: @@ -883,20 +831,11 @@ ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)], iface="ens786f0") - 3. hit pattern/not defined input set: ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=32,dport=23)/("X"*480)], iface="ens786f0") - Subcase: MAC_IPV4_UDP_L4SRC --------------------------- 1. create rss rule:: @@ -908,19 +847,11 @@ ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)], iface="ens786f0") - 3. hit pattern/not defined input set: ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.1.2")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.1.2")/UDP(sport=22,dport=33)/("X"*480)], iface="ens786f0") - Subcase: MAC_IPV4_UDP_L4DST --------------------------- 1. create rss rule:: @@ -932,19 +863,11 @@ ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)], iface="ens786f0") - 3. hit pattern/not defined input set: ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.1.2")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.1.2")/UDP(sport=32,dport=23)/("X"*480)], iface="ens786f0") - Subcase: MAC_IPV4_UDP_IPV4 -------------------------- 1. create rss rule:: @@ -957,21 +880,11 @@ ipv4-udp packets:: sendp([Ether(dst="00:11:22:33:44:55", src="68:05:CA:BB:26:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(dst="00:11:22:33:44:55", src="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - - 3. hit pattern/not defined input set: ipv4-udp packets:: sendp([Ether(dst="00:11:22:33:44:53", src="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=33)/("X"*480)],iface="enp134s0f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=233/("X"*480)], iface="ens786f0") - Subcase: MAC_IPV4_UDP_ALL ------------------------- 1. create rss rule:: @@ -986,13 +899,6 @@ ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - 3. hit pattern/not defined input set: ipv4-udp packets:: @@ -1276,10 +1182,6 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-nonfrag packets:: @@ -1297,10 +1199,6 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=33)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/("X"*480)],iface="ens786f0") - Subcase: MAC_IPV6_L3DST ----------------------- 1. create rss rule:: @@ -1324,10 +1222,6 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-nonfrag packets:: @@ -1345,10 +1239,6 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)],iface="ens786f0") - Subcase: MAC_IPV6_ALL --------------------- 1. create rss rule:: @@ -1376,11 +1266,6 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/("X"*480)],iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-nonfrag packets:: @@ -1398,9 +1283,6 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)],iface="ens786f0") Test case: MAC_IPV6_UDP ======================= @@ -1480,19 +1362,11 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=33)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=33)/("X"*480)],iface="ens786f0") - Subcase: MAC_IPV6_UDP_L3DST --------------------------- @@ -1505,19 +1379,11 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)],iface="ens786f0") - Subcase: MAC_IPV6_UDP_L3SRC_L4SRC --------------------------------- @@ -1530,19 +1396,11 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") - Subcase: MAC_IPV6_UDP_L3SRC_L4DST --------------------------------- @@ -1555,19 +1413,11 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") - Subcase: MAC_IPV6_UDP_L3DST_L4SRC --------------------------------- @@ -1580,19 +1430,11 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") - Subcase: MAC_IPV6_UDP_L3DST_L4DST --------------------------------- @@ -1605,19 +1447,11 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") - Subcase: MAC_IPV6_UDP_L4SRC --------------------------- @@ -1630,19 +1464,11 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") - Subcase: MAC_IPV6_UDP_L4DST --------------------------- @@ -1655,18 +1481,11 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") Subcase: MAC_IPV6_UDP_IPV6 -------------------------- @@ -1680,19 +1499,11 @@ ipv6-udp packets:: sendp([Ether(dst="00:11:22:33:44:55", src="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="enp134s0f0") sendp([Ether(dst="00:11:22:33:44:55", src="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=23)/("X"*480)],iface="enp134s0f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-udp packets:: sendp([Ether(dst="00:11:22:33:44:53", src="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)],iface="enp134s0f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") Subcase: MAC_IPV6_UDP_ALL ------------------------- @@ -1708,13 +1519,6 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") -ipv4_udp_vxlan_ipv6_udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)],iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)],iface="ens786f0") - 3. hit pattern/not defined input set: ipv6-udp packets:: @@ -1870,11 +1674,6 @@ ipv4-tcp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -ipv4-udp-vxlan packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src='192.168.0.2')/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.2", src='192.168.0.1')/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - 3. not hit pattern with switched value of input set in the rule: ipv6-nonfrag packets:: @@ -1895,23 +1694,12 @@ ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=23,dport=22)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=23,dport=22)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=23,dport=22)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=23,dport=22)/("X"*480)], iface="ens786f0") - 3. not hit pattern/not defined input set packets:: ipv4-tcp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -nvgre packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=22,dport=23)/("X"*480)], iface="ens786f0") Test case: symmetric MAC_IPV4_TCP ================================= @@ -1927,23 +1715,12 @@ ipv4-tcp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=23,dport=22)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=23,dport=22)/("X"*480)],iface="ens786f0") -ipv4-udp-vxlan-eth-ipv4-tcp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src='192.168.0.2')/TCP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.2", src='192.168.0.1')/TCP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src='192.168.0.2')/TCP(sport=23,dport=22)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.2", src='192.168.0.1')/TCP(sport=23,dport=22)/("X"*480)], iface="ens786f0") - 3. not hit pattern/not defined input set packets:: ipv4-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -ipv4-udp-vxlan-eth-ipv4-udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src='192.168.0.2')/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.2", src='192.168.0.1')/UDP(sport=22,dport=23)/("X"*480)], iface="ens786f0") Test case: symmetric MAC_IPV4_SCTP ================================== @@ -1959,13 +1736,6 @@ ipv4-sctp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=23,dport=22)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/SCTP(sport=23,dport=22)/("X"*480)],iface="ens786f0") -ipv4-udp-vxlan-eth-ipv4-sctp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src='192.168.0.2')/SCTP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.2", src='192.168.0.1')/SCTP(sport=22,dport=23)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src='192.168.0.2')/SCTP(sport=23,dport=22)/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.2", src='192.168.0.1')/SCTP(sport=23,dport=22)/("X"*480)], iface="ens786f0") - 3. not hit pattern/not defined input set packets:: ipv4-udp packets:: @@ -1999,11 +1769,6 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -ipv4-udp-vxlan-eth-ipv6 packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)], iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)], iface="ens786f0") - 3. not hit pattern with switched value of input set in the rule: ipv4-nonfrag packets:: @@ -2022,22 +1787,12 @@ ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -nvgre-eth-ipv6-udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - 3. not hit pattern/not defined input set packets:: ipv6-tcp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -nvgre-eth-ipv6-tcp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - Test case: symmetric MAC_IPV6_TCP ================================= 1. create rss rule:: @@ -2050,21 +1805,12 @@ ipv6-tcp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -nvgre-eth-ipv6-tcp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - 3. not hit pattern/not defined input set packets:: ipv6-udp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -nvgre-eth-ipv6-udp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)],iface="ens786f0") Test case: symmetric MAC_IPV6_SCTP ================================== @@ -2078,11 +1824,6 @@ ipv6-sctp packets:: sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)],iface="ens786f0") sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)],iface="ens786f0") -nvgre-eth-ipv6-sctp packet:: - - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - sendp([Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)],iface="ens786f0") - 3. not hit pattern/not defined input set packets:: ipv6-udp packets:: From patchwork Fri Aug 20 19:47:38 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Huang, ZhiminX" X-Patchwork-Id: 97152 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 06339A0C4B; Fri, 20 Aug 2021 13:15:46 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id F1DB34013F; Fri, 20 Aug 2021 13:15:45 +0200 (CEST) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id 722C04003E for ; Fri, 20 Aug 2021 13:15:44 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10081"; a="238883117" X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="238883117" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:43 -0700 X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="523571838" Received: from unknown (HELO localhost.localdomain) ([10.240.183.103]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:42 -0700 From: Zhimin Huang To: dts@dpdk.org Cc: Zhimin Huang Date: Sat, 21 Aug 2021 03:47:38 +0800 Message-Id: <20210820194742.28666-3-zhiminx.huang@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210820194742.28666-1-zhiminx.huang@intel.com> References: <20210820194742.28666-1-zhiminx.huang@intel.com> Subject: [dts] [PATCH V1 2/6] test_plans/cvl_fdir_test_plan:remove test steps X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" according to b83d270dff3852f1df0ea9bea5a8740378db0c7c, default rss not support tunnel inner rss, these function will cover by new case, so remove test steps in test plan Signed-off-by: Zhimin Huang --- test_plans/cvl_fdir_test_plan.rst | 46 ++++++------------------------- 1 file changed, 8 insertions(+), 38 deletions(-) diff --git a/test_plans/cvl_fdir_test_plan.rst b/test_plans/cvl_fdir_test_plan.rst index 9f4cae4a..62cae9f5 100644 --- a/test_plans/cvl_fdir_test_plan.rst +++ b/test_plans/cvl_fdir_test_plan.rst @@ -1166,22 +1166,7 @@ Subcase 1: MAC_IPV4_TUN_IPV4_PAY queue index verify the packets hit rule are distributed by RSS without FDIR matched ID. check there is no rule listed. -Subcase 2: MAC_IPV4_TUN_IPV4_PAY rss queues -------------------------------------------- - -1. create filter rules:: - - flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / end actions rss queues 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 end / mark / end - -2. send matched packets, check the packets are distributed to queue group with FDIR matched ID=0x0. - send unmatched packets, check the packets are distributed by RSS without FDIR matched ID. - -3. repeat step 3 of subcase 1. - -4. verify the packets hit rule are distributed by RSS without FDIR matched ID. - check there is no rule listed. - -Subcase 3: MAC_IPV4_TUN_IPV4_PAY passthru +Subcase 2: MAC_IPV4_TUN_IPV4_PAY passthru ----------------------------------------- 1. create filter rules:: @@ -1196,7 +1181,7 @@ Subcase 3: MAC_IPV4_TUN_IPV4_PAY passthru 4. verify the packets hit rule are distributed by RSS without FDIR matched ID. check there is no rule listed. -Subcase 4: MAC_IPV4_TUN_IPV4_PAY drop +Subcase 3: MAC_IPV4_TUN_IPV4_PAY drop ------------------------------------- 1. create filter rules:: @@ -1211,7 +1196,7 @@ Subcase 4: MAC_IPV4_TUN_IPV4_PAY drop 4. check there is no rule listed. verify the packets hit the rule are not dropped. -Subcase 5: MAC_IPV4_TUN_IPV4_PAY mark/rss +Subcase 4: MAC_IPV4_TUN_IPV4_PAY mark/rss ----------------------------------------- 1. create filter rules:: @@ -1226,7 +1211,7 @@ Subcase 5: MAC_IPV4_TUN_IPV4_PAY mark/rss 4. verify matched packet is distributed by RSS without FDIR matched ID. check there is no rule listed. -Subcase 6: MAC_IPV4_TUN_IPV4_PAY mark +Subcase 5: MAC_IPV4_TUN_IPV4_PAY mark ------------------------------------- 1. create filter rules:: @@ -1262,22 +1247,7 @@ Subcase 1: MAC_IPV4_TUN_IPV4_UDP queue index 4. verify the packets hit rule are distributed by RSS without FDIR matched ID. check there is no rule listed. -Subcase 2: MAC_IPV4_TUN_IPV4_UDP rss queues -------------------------------------------- - -1. create filter rules:: - - flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / udp src is 22 dst is 23 / end actions rss queues 38 39 40 41 end / mark id 1 / end - -2. send matched packets, check the packets are distributed to queue group with FDIR matched ID=0x1. - send unmatched packets, check the packets are distributed by RSS without FDIR matched ID. - -3. repeat step 3 of subcase 1. - -4. verify the packets hit rule are distributed by RSS without FDIR matched ID. - check there is no rule listed. - -Subcase 3: MAC_IPV4_TUN_IPV4_UDP passthru +Subcase 2: MAC_IPV4_TUN_IPV4_UDP passthru ----------------------------------------- 1. create filter rules:: @@ -1292,7 +1262,7 @@ Subcase 3: MAC_IPV4_TUN_IPV4_UDP passthru 4. verify the packets hit rule are distributed by RSS without FDIR matched ID. check there is no rule listed. -Subcase 4: MAC_IPV4_TUN_IPV4_UDP drop +Subcase 3: MAC_IPV4_TUN_IPV4_UDP drop ------------------------------------- 1. create filter rules:: @@ -1306,7 +1276,7 @@ Subcase 4: MAC_IPV4_TUN_IPV4_UDP drop 4. verify the packets hit rule are received without FDIR matched ID. -Subcase 5: MAC_IPV4_TUN_IPV4_UDP mark/rss +Subcase 4: MAC_IPV4_TUN_IPV4_UDP mark/rss ----------------------------------------- 1. create filter rules:: @@ -1321,7 +1291,7 @@ Subcase 5: MAC_IPV4_TUN_IPV4_UDP mark/rss 4. verify the packets hit rule are distributed by RSS without FDIR matched ID. check there is no rule listed. -Subcase 6: MAC_IPV4_TUN_IPV4_UDP mark +Subcase 5: MAC_IPV4_TUN_IPV4_UDP mark ------------------------------------- 1. create filter rules:: From patchwork Fri Aug 20 19:47:39 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Huang, ZhiminX" X-Patchwork-Id: 97153 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 34CEDA0C4B; Fri, 20 Aug 2021 13:15:48 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 2C26D4125A; Fri, 20 Aug 2021 13:15:48 +0200 (CEST) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id 7F7804003E for ; Fri, 20 Aug 2021 13:15:46 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10081"; a="238883121" X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="238883121" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:45 -0700 X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="523571846" Received: from unknown (HELO localhost.localdomain) ([10.240.183.103]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:44 -0700 From: Zhimin Huang To: dts@dpdk.org Cc: Zhimin Huang Date: Sat, 21 Aug 2021 03:47:39 +0800 Message-Id: <20210820194742.28666-4-zhiminx.huang@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210820194742.28666-1-zhiminx.huang@intel.com> References: <20210820194742.28666-1-zhiminx.huang@intel.com> Subject: [dts] [PATCH V1 3/6] test_plans/cvl_switch_filter_test_plan:remove test steps X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" according to b83d270dff3852f1df0ea9bea5a8740378db0c7c, default rss not support tunnel inner rss, these function will cover by new case,so remove test step in test plan Signed-off-by: Zhimin Huang --- test_plans/cvl_switch_filter_test_plan.rst | 651 +-------------------- 1 file changed, 14 insertions(+), 637 deletions(-) diff --git a/test_plans/cvl_switch_filter_test_plan.rst b/test_plans/cvl_switch_filter_test_plan.rst index b8f7e147..992aa6c8 100644 --- a/test_plans/cvl_switch_filter_test_plan.rst +++ b/test_plans/cvl_switch_filter_test_plan.rst @@ -261,41 +261,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 3. -to queue group action -..................... - -1. validate a rule:: - - testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions rss queues 2 3 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions rss queues 2 3 end / end - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 2 or 3. - send mismatched packets, check the packets are not to queue 2 and 3. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 15360 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 2 and 3. - drop action ........... @@ -538,48 +503,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 5. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp src is 50 dst is 23 / end actions rss queues 4 5 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp src is 50 dst is 23 / end actions rss queues 4 5 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 4 or 5. - send mismatched packets, check the packets are not to queue 4 and 5. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 15360 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 4 and 5. - drop action ........... @@ -685,48 +608,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 2. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions rss queues 2 3 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions rss queues 2 3 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 2 or 3. - send mismatched packets, check the packets are not to queue 2 and 3. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 15360 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 2 and 3. - drop action ........... @@ -971,48 +852,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 1. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp src is 25 dst is 23 / end actions rss queues 1 2 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp src is 25 dst is 23 / end actions rss queues 1 2 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 1 or 2. - send mismatched packets, check the packets are not to queue 1 and 2. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 15360 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 1 and 2. - drop action ........... @@ -1113,48 +952,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 2. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / end actions rss queues 2 3 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / end actions rss queues 2 3 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 2 or 3. - send mismatched packets, check the packets are not to queue 2 and 3. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 0 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 2 and 3. - drop action ........... @@ -1261,48 +1058,6 @@ to queue action check the rules not exist in the list. send matched packets, check the packets are not to queue 2. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 proto is 0x06 / end actions rss queues 2 3 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 proto is 0x06 / end actions rss queues 2 3 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rules exist in the list. - -3. send matched packets, check the packets are to queue 2 or 3. - send mismatched packets, check the packets are not to queue 2 and 3. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 0 - testpmd> flow list 0 - - check the rules not exist in the list. - send matched packets, check the packets are not to queue 2 and 3. - drop action ............ @@ -1688,12 +1443,12 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 3. -to queue group action -...................... +drop action +........... 1. validate a rule:: - testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions rss queues 4 5 end / end + testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions drop / end get the message:: @@ -1707,7 +1462,7 @@ to queue group action 2. create a rule:: - testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions rss queues 4 5 end / end + testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions drop / end get the message:: @@ -1719,8 +1474,8 @@ to queue group action check the rule exists in the list. -3. send matched packets, check the packets are to queue 4 or 5. - send mismatched packets, check the packets are not to queue 4 and 5. +3. send matched packets, check the packets are dropped. + send mismatched packets, check the packets are not dropped. 4. verify rules can be destroyed:: @@ -1728,60 +1483,18 @@ to queue group action testpmd> flow list 0 check the rule not exists in the list. - send matched packets, check the packets are not to queue queue 4 and 5. + send matched packets, check the packets are not dropped. -drop action -........... +Test case: NVGRE non-pipeline mode +================================== -1. validate a rule:: +MAC_IPV4_NVGRE_IPV4 +------------------- - testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions drop / end +matched packets:: - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions drop / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are dropped. - send mismatched packets, check the packets are not dropped. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 0 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not dropped. - -Test case: NVGRE non-pipeline mode -================================== - -MAC_IPV4_NVGRE_IPV4 -------------------- - -matched packets:: - - sendp([Ether()/IP(dst="192.168.0.1")/NVGRE(TNI=2)/Ether()/IP(src="192.168.1.2", dst="192.168.1.3")/Raw("x"*80)],iface="enp27s0f2",count=1) - sendp([Ether()/IP(dst="192.168.0.1")/NVGRE(TNI=2)/Ether()/IP(src="192.168.1.2", dst="192.168.1.3" ,frag=5)/Raw("x"*80)],iface="enp27s0f2",count=1) + sendp([Ether()/IP(dst="192.168.0.1")/NVGRE(TNI=2)/Ether()/IP(src="192.168.1.2", dst="192.168.1.3")/Raw("x"*80)],iface="enp27s0f2",count=1) + sendp([Ether()/IP(dst="192.168.0.1")/NVGRE(TNI=2)/Ether()/IP(src="192.168.1.2", dst="192.168.1.3" ,frag=5)/Raw("x"*80)],iface="enp27s0f2",count=1) mismatched packets:: @@ -1836,48 +1549,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 3. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions rss queues 2 3 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions rss queues 2 3 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 2 or 3. - send mismatched packets, check the packets are not to queue 2 and 3. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 15360 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 2 and 3. - drop action ........... @@ -2120,48 +1791,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 1. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / tcp src is 25 dst is 23 / end actions rss queues 1 2 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / tcp src is 25 dst is 23 / end actions rss queues 1 2 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 1 or 2 - send mismatched packets, check the packets are not to queue 1 and 2. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 15360 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 1 and 2. - drop action ............ @@ -2267,48 +1896,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 3. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions rss queues 2 3 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions rss queues 2 3 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 2 or 3. - send mismatched packets, check the packets are not to queue 2 and 3. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 15360 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 2 and 3. - drop action ............ @@ -2553,48 +2140,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 3. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / tcp src is 25 dst is 23 / end actions rss queues 2 3 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / tcp src is 25 dst is 23 / end actions rss queues 2 3 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 2 or 3. - send mismatched packets, check the packets are not to queue 2 and 3. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 15360 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 2 and 3. - drop action ............ @@ -2695,48 +2240,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 3. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / end actions rss queues 2 3 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / end actions rss queues 2 3 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 2 or 3. - send mismatched packets, check the packets are not to queue 2 and 3. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 0 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 2 and 3. - drop action ............ @@ -2843,48 +2346,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 2. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 proto is 0x06 tos is 4 / end actions rss queues 2 3 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 proto is 0x06 tos is 4 / end actions rss queues 2 3 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 2 or 3. - send mismatched packets, check the packets are not to queue 2 and 3. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 0 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 2 and 3. - drop action ............ @@ -3129,48 +2590,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 2. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / udp src is 50 dst is 23 / end actions rss queues 4 5 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / udp src is 50 dst is 23 / end actions rss queues 4 5 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 4 or 5. - send mismatched packets, check the packets are not to queue 4 and 5. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 0 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 4 and 5. - drop action ............ @@ -3270,48 +2689,6 @@ to queue action check the rule not exists in the list. send matched packets, check the packets are not to queue 2. -to queue group action -...................... - -1. validate a rule:: - - testpmd> flow validate 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions rss queues 4 5 end / end - - get the message:: - - Flow rule validated - - check the flow list:: - - testpmd> flow list 0 - - check the rule not exists in the list. - -2. create a rule:: - - testpmd> flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions rss queues 4 5 end / end - - get the message:: - - Succeeded to create (2) flow - - check the flow list:: - - testpmd> flow list 0 - - check the rule exists in the list. - -3. send matched packets, check the packets are to queue 4 or 5. - send mismatched packets, check the packets are not to queue 4 and 5. - -4. verify rules can be destroyed:: - - testpmd> flow destroy 0 rule 0 - testpmd> flow list 0 - - check the rule not exists in the list. - send matched packets, check the packets are not to queue 4 and 5. - drop action ............ From patchwork Fri Aug 20 19:47:40 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Huang, ZhiminX" X-Patchwork-Id: 97154 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 823FAA0C4B; Fri, 20 Aug 2021 13:15:50 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 7224941259; Fri, 20 Aug 2021 13:15:50 +0200 (CEST) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id F30804003E for ; Fri, 20 Aug 2021 13:15:47 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10081"; a="238883126" X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="238883126" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:47 -0700 X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="523571857" Received: from unknown (HELO localhost.localdomain) ([10.240.183.103]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:45 -0700 From: Zhimin Huang To: dts@dpdk.org Cc: Zhimin Huang Date: Sat, 21 Aug 2021 03:47:40 +0800 Message-Id: <20210820194742.28666-5-zhiminx.huang@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210820194742.28666-1-zhiminx.huang@intel.com> References: <20210820194742.28666-1-zhiminx.huang@intel.com> Subject: [dts] [PATCH V1 4/6] tests/cvl_advanced_rss:remove test steps X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" according to b83d270dff3852f1df0ea9bea5a8740378db0c7c, defaut rss not support tunnel inner rss, these function will cover by new case,so remove test step in test case Signed-off-by: Zhimin Huang Tested-by: Zhimin Huang --- tests/TestSuite_cvl_advanced_rss.py | 1220 +-------------------------- 1 file changed, 4 insertions(+), 1216 deletions(-) diff --git a/tests/TestSuite_cvl_advanced_rss.py b/tests/TestSuite_cvl_advanced_rss.py index da756ac1..8ed6d1af 100644 --- a/tests/TestSuite_cvl_advanced_rss.py +++ b/tests/TestSuite_cvl_advanced_rss.py @@ -545,18 +545,6 @@ mac_ipv4_l3_src = { 'send_packet': mac_ipv4_l3dst_changed['ipv4-icmp'], 'action': {'check_hash_same': 'ipv4-icmp'}, }, - { - 'send_packet': mac_ipv4_toeplitz_basic_pkt['ipv4-udp-vxlan'], - 'action': {'save_hash': 'ipv4-udp-vxlan'}, - }, - { - 'send_packet': mac_ipv4_l3src_changed['ipv4-udp-vxlan'], - 'action': {'check_hash_different': 'ipv4-udp-vxlan'}, - }, - { - 'send_packet': mac_ipv4_l3dst_changed['ipv4-udp-vxlan'], - 'action': {'check_hash_same': 'ipv4-udp-vxlan'}, - } ], 'post-test': [ { @@ -612,18 +600,6 @@ mac_ipv4_l3_dst = { 'send_packet': mac_ipv4_l3src_changed['ipv4-icmp'], 'action': {'check_hash_same': 'ipv4-icmp'}, }, - { - 'send_packet': mac_ipv4_toeplitz_basic_pkt['ipv4-udp-vxlan'], - 'action': {'save_hash': 'ipv4-udp-vxlan'}, - }, - { - 'send_packet': mac_ipv4_l3dst_changed['ipv4-udp-vxlan'], - 'action': {'check_hash_different': 'ipv4-udp-vxlan'}, - }, - { - 'send_packet': mac_ipv4_l3src_changed['ipv4-udp-vxlan'], - 'action': {'check_hash_same': 'ipv4-udp-vxlan'}, - } ], 'post-test': [ { @@ -691,22 +667,6 @@ mac_ipv4_all = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/ICMP()/("X"*480)', 'action': {'check_hash_same': 'ipv4-icmp'}, }, - { - 'send_packet': mac_ipv4_toeplitz_basic_pkt['ipv4-udp-vxlan'], - 'action': {'save_hash': 'ipv4-udp-vxlan'}, - }, - { - 'send_packet': mac_ipv4_l3dst_changed['ipv4-udp-vxlan'], - 'action': {'check_hash_different': 'ipv4-udp-vxlan'}, - }, - { - 'send_packet': mac_ipv4_l3src_changed['ipv4-udp-vxlan'], - 'action': {'check_hash_different': 'ipv4-udp-vxlan'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_same': 'ipv4-udp-vxlan'}, - } ], 'post-test': [ { @@ -843,18 +803,6 @@ mac_ipv4_udp_l3_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_udp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -888,18 +836,6 @@ mac_ipv4_udp_l3_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_udp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -937,22 +873,6 @@ mac_ipv4_udp_l3src_l4src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_udp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -990,22 +910,6 @@ mac_ipv4_udp_l3src_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_udp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1043,22 +947,6 @@ mac_ipv4_udp_l3dst_l4src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_udp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1096,22 +984,6 @@ mac_ipv4_udp_l3dst_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_udp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1145,18 +1017,6 @@ mac_ipv4_udp_l4_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.1.2")/UDP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_udp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.1.2")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1190,18 +1050,6 @@ mac_ipv4_udp_l4_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.1.2")/UDP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_udp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.1.2")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1247,26 +1095,6 @@ mac_ipv4_udp_all = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_udp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, { 'send_packet': mac_ipv4_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1304,22 +1132,6 @@ mac_ipv4_udp_ipv4 = { 'send_packet': 'Ether(dst="00:11:22:33:44:53", src="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_udp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, ], 'post-test': [ { @@ -1454,18 +1266,6 @@ mac_ipv4_tcp_l3_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_tcp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1499,18 +1299,6 @@ mac_ipv4_tcp_l3_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_tcp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1548,22 +1336,6 @@ mac_ipv4_tcp_l3src_l4src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_tcp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1601,22 +1373,6 @@ mac_ipv4_tcp_l3src_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_tcp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1654,22 +1410,6 @@ mac_ipv4_tcp_l3dst_l4src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_tcp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1707,22 +1447,6 @@ mac_ipv4_tcp_l3dst_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_tcp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1756,18 +1480,6 @@ mac_ipv4_tcp_l4_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.1.2")/TCP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_tcp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.1.2")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1801,18 +1513,6 @@ mac_ipv4_tcp_l4_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.1.2")/TCP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_tcp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.1.2")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1858,26 +1558,6 @@ mac_ipv4_tcp_all = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_tcp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, { 'send_packet': mac_ipv4_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -1915,22 +1595,6 @@ mac_ipv4_tcp_ipv4 = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_tcp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, ], 'post-test': [ { @@ -2065,18 +1729,6 @@ mac_ipv4_sctp_l3_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/SCTP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_sctp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/SCTP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -2110,18 +1762,6 @@ mac_ipv4_sctp_l3_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/SCTP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_sctp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/SCTP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -2159,22 +1799,6 @@ mac_ipv4_sctp_l3src_l4src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/SCTP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_sctp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -2212,22 +1836,6 @@ mac_ipv4_sctp_l3src_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.0.2")/SCTP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_sctp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -2265,22 +1873,6 @@ mac_ipv4_sctp_l3dst_l4src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/SCTP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_sctp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -2318,22 +1910,6 @@ mac_ipv4_sctp_l3dst_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.1.2")/SCTP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_sctp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -2367,18 +1943,6 @@ mac_ipv4_sctp_l4_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.1.2")/SCTP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_sctp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.1.2")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -2412,18 +1976,6 @@ mac_ipv4_sctp_l4_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.1.1", src="192.168.1.2")/SCTP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_sctp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.1.2")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv4_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -2469,26 +2021,6 @@ mac_ipv4_sctp_all = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=22,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_sctp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, { 'send_packet': mac_ipv4_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -2526,22 +2058,6 @@ mac_ipv4_sctp_ipv4 = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=22,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv4_sctp_toeplitz_basic_pkt['nvgre'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.1.1", src="192.168.0.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.1.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, ], 'post-test': [ { @@ -2853,18 +2369,6 @@ mac_ipv6_l3_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=33)/("X"*480)', 'action': {'check_hash_same': 'ipv6-udp'}, }, - { - 'send_packet': mac_ipv6_toeplitz_basic_pkt['nvgre'], - 'action': {'save_hash': 'nvgre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)', - 'action': {'check_hash_different': 'nvgre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/("X"*480)', - 'action': {'check_hash_same': 'nvgre'}, - }, { 'send_packet': mac_ipv6_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -2937,18 +2441,6 @@ mac_ipv6_l3_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)', 'action': {'check_hash_same': 'ipv6-udp'}, }, - { - 'send_packet': mac_ipv6_toeplitz_basic_pkt['nvgre'], - 'action': {'save_hash': 'nvgre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/("X"*480)', - 'action': {'check_hash_different': 'nvgre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)', - 'action': {'check_hash_same': 'nvgre'}, - }, { 'send_packet': mac_ipv6_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3037,22 +2529,6 @@ mac_ipv6_all = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)', 'action': {'check_hash_same': 'ipv6-udp'}, }, - { - 'send_packet': mac_ipv6_toeplitz_basic_pkt['nvgre'], - 'action': {'save_hash': 'nvgre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/("X"*480)', - 'action': {'check_hash_different': 'nvgre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)', - 'action': {'check_hash_different': 'nvgre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)', - 'action': {'check_hash_same': 'nvgre'}, - }, { 'send_packet': mac_ipv6_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3194,18 +2670,6 @@ mac_ipv6_udp_l3_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_udp_toeplitz_basic_pkt['ipv4_udp_vxlan_ipv6_udp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3239,18 +2703,6 @@ mac_ipv6_udp_l3_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_udp_toeplitz_basic_pkt['ipv4_udp_vxlan_ipv6_udp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3284,18 +2736,6 @@ mac_ipv6_udp_l3src_l4src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_udp_toeplitz_basic_pkt['ipv4_udp_vxlan_ipv6_udp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3329,18 +2769,6 @@ mac_ipv6_udp_l3src_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_udp_toeplitz_basic_pkt['ipv4_udp_vxlan_ipv6_udp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3374,18 +2802,6 @@ mac_ipv6_udp_l3dst_l4src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_udp_toeplitz_basic_pkt['ipv4_udp_vxlan_ipv6_udp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3419,18 +2835,6 @@ mac_ipv6_udp_l3dst_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_udp_toeplitz_basic_pkt['ipv4_udp_vxlan_ipv6_udp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3464,18 +2868,6 @@ mac_ipv6_udp_l4_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_udp_toeplitz_basic_pkt['ipv4_udp_vxlan_ipv6_udp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3509,18 +2901,6 @@ mac_ipv6_udp_l4_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_udp_toeplitz_basic_pkt['ipv4_udp_vxlan_ipv6_udp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3566,26 +2946,6 @@ mac_ipv6_udp_all = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_udp_toeplitz_basic_pkt['ipv4_udp_vxlan_ipv6_udp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, { 'send_packet': mac_ipv6_udp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3623,22 +2983,6 @@ mac_ipv6_udp_ipv6 = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_udp_toeplitz_basic_pkt['ipv4_udp_vxlan_ipv6_udp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/UDP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, ], 'post-test': [ { @@ -3773,18 +3117,6 @@ mac_ipv6_tcp_l3_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_tcp_toeplitz_basic_pkt['ipv4_tcp_vxlan_ipv6_tcp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3818,18 +3150,6 @@ mac_ipv6_tcp_l3_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_tcp_toeplitz_basic_pkt['ipv4_tcp_vxlan_ipv6_tcp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3864,23 +3184,11 @@ mac_ipv6_tcp_l3src_l4src = { 'action': 'check_hash_same', }, { - 'send_packet': mac_ipv6_tcp_toeplitz_basic_pkt['ipv4_tcp_vxlan_ipv6_tcp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', + 'send_packet': mac_ipv6_tcp_toeplitz_non_basic_pkt, + 'action': 'check_no_hash', }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, - { - 'send_packet': mac_ipv6_tcp_toeplitz_non_basic_pkt, - 'action': 'check_no_hash', - }, - ], - 'post-test': [ + ], + 'post-test': [ { 'send_packet': [ mac_ipv6_tcp_toeplitz_basic_pkt['ipv6-tcp'][0], @@ -3908,18 +3216,6 @@ mac_ipv6_tcp_l3src_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_tcp_toeplitz_basic_pkt['ipv4_tcp_vxlan_ipv6_tcp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3953,18 +3249,6 @@ mac_ipv6_tcp_l3dst_l4src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_tcp_toeplitz_basic_pkt['ipv4_tcp_vxlan_ipv6_tcp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -3998,18 +3282,6 @@ mac_ipv6_tcp_l3dst_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_tcp_toeplitz_basic_pkt['ipv4_tcp_vxlan_ipv6_tcp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4043,18 +3315,6 @@ mac_ipv6_tcp_l4_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_tcp_toeplitz_basic_pkt['ipv4_tcp_vxlan_ipv6_tcp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4088,18 +3348,6 @@ mac_ipv6_tcp_l4_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_tcp_toeplitz_basic_pkt['ipv4_tcp_vxlan_ipv6_tcp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4145,26 +3393,6 @@ mac_ipv6_tcp_all = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_tcp_toeplitz_basic_pkt['ipv4_tcp_vxlan_ipv6_tcp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, { 'send_packet': mac_ipv6_tcp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4202,22 +3430,6 @@ mac_ipv6_tcp_ipv6 = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_tcp_toeplitz_basic_pkt['ipv4_tcp_vxlan_ipv6_tcp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/TCP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, ], 'post-test': [ { @@ -4352,18 +3564,6 @@ mac_ipv6_sctp_l3_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_sctp_toeplitz_basic_pkt['ipv4_sctp_vxlan_ipv6_sctp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4397,18 +3597,6 @@ mac_ipv6_sctp_l3_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_sctp_toeplitz_basic_pkt['ipv4_sctp_vxlan_ipv6_sctp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4442,18 +3630,6 @@ mac_ipv6_sctp_l3src_l4src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_sctp_toeplitz_basic_pkt['ipv4_sctp_vxlan_ipv6_sctp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4487,18 +3663,6 @@ mac_ipv6_sctp_l3src_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_sctp_toeplitz_basic_pkt['ipv4_sctp_vxlan_ipv6_sctp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4532,18 +3696,6 @@ mac_ipv6_sctp_l3dst_l4src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_sctp_toeplitz_basic_pkt['ipv4_sctp_vxlan_ipv6_sctp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4577,18 +3729,6 @@ mac_ipv6_sctp_l3dst_l4dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_sctp_toeplitz_basic_pkt['ipv4_sctp_vxlan_ipv6_sctp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4622,18 +3762,6 @@ mac_ipv6_sctp_l4_src = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=22,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_sctp_toeplitz_basic_pkt['ipv4_sctp_vxlan_ipv6_sctp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4667,18 +3795,6 @@ mac_ipv6_sctp_l4_dst = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=32,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_sctp_toeplitz_basic_pkt['ipv4_sctp_vxlan_ipv6_sctp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_same', - }, { 'send_packet': mac_ipv6_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4724,26 +3840,6 @@ mac_ipv6_sctp_all = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_sctp_toeplitz_basic_pkt['ipv4_sctp_vxlan_ipv6_sctp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=32,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=33)/("X"*480)', - 'action': 'check_hash_different', - }, { 'send_packet': mac_ipv6_sctp_toeplitz_non_basic_pkt, 'action': 'check_no_hash', @@ -4781,22 +3877,6 @@ mac_ipv6_sctp_ipv6 = { 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=32,dport=33)/("X"*480)', 'action': 'check_hash_same', }, - { - 'send_packet': mac_ipv6_sctp_toeplitz_basic_pkt['ipv4_sctp_vxlan_ipv6_sctp'], - 'action': 'save_hash', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2021")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': 'check_hash_different', - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:53", dst="68:05:CA:BB:27:E0")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=32,dport=33)/("X"*480)', - 'action': 'check_hash_same', - }, ], 'post-test': [ { @@ -4884,14 +3964,6 @@ mac_ipv4_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_different': 'ipv4-tcp-pre'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'ipv4-udp-vlan-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_different': 'ipv4-udp-vlan-pre'}, - }, ], 'test': [ { @@ -4926,14 +3998,6 @@ mac_ipv4_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_same': 'ipv4-tcp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'ipv4-udp-vlan'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_same': 'ipv4-udp-vlan'}, - }, { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2928",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)', 'action': {'save_hash': 'ipv6'}, @@ -4976,14 +4040,6 @@ mac_ipv4_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=22,dport=23)/("X"*480)', 'action': {'check_no_hash_or_different': 'ipv4-tcp-post'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_or_no_hash': 'ipv4-udp-vlan-post'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_no_hash_or_different': 'ipv4-udp-vlan-post'}, - }, ], } @@ -5008,22 +4064,6 @@ mac_ipv4_udp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=23,dport=22)/("X"*480)', 'action': {'check_hash_different': 'ipv4-udp-pre'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_different': 'nvgre-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_different': 'nvgre-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_different': 'nvgre-pre'}, - }, ], 'test': [ { @@ -5042,22 +4082,6 @@ mac_ipv4_udp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=23,dport=22)/("X"*480)', 'action': {'check_hash_same': 'ipv4-udp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_same': 'nvgre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_same': 'nvgre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_same': 'nvgre'}, - }, { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', 'action': {'save_hash': 'ipv4-tcp'}, @@ -5066,14 +4090,6 @@ mac_ipv4_udp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_different': 'ipv4-tcp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_different': 'nvgre'}, - }, ], 'post-test': [ { @@ -5088,18 +4104,6 @@ mac_ipv4_udp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=23,dport=22)/("X"*480)', 'action': {'check_no_hash_or_different': 'ipv4-udp-post'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-post'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_no_hash_or_different': 'nvgre-post'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=23,dport=22)/("X"*480)', - 'action': {'check_no_hash_or_different': 'nvgre-post'}, - }, ], } @@ -5124,22 +4128,6 @@ mac_ipv4_tcp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=23,dport=22)/("X"*480)', 'action': {'check_hash_different': 'ipv4-tcp-pre'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'ipv4-udp-vxlan-eth-ipv4-tcp-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_different': 'ipv4-udp-vxlan-eth-ipv4-tcp-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_different': 'ipv4-udp-vxlan-eth-ipv4-tcp-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_different': 'ipv4-udp-vxlan-eth-ipv4-tcp-pre'}, - }, ], 'test': [ { @@ -5158,22 +4146,6 @@ mac_ipv4_tcp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=23,dport=22)/("X"*480)', 'action': {'check_hash_same': 'ipv4-tcp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'ipv4-udp-vxlan-eth-ipv4-tcp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_same': 'ipv4-udp-vxlan-eth-ipv4-tcp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_same': 'ipv4-udp-vxlan-eth-ipv4-tcp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_same': 'ipv4-udp-vxlan-eth-ipv4-tcp'}, - }, { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', 'action': {'save_hash': 'ipv4-udp'}, @@ -5182,14 +4154,6 @@ mac_ipv4_tcp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_different': 'ipv4-udp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'ipv4-udp-vxlan-eth-ipv4-udp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_different': 'ipv4-udp-vxlan-eth-ipv4-udp'}, - }, ], 'post-test': [ { @@ -5204,18 +4168,6 @@ mac_ipv4_tcp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=23,dport=22)/("X"*480)', 'action': {'check_no_hash_or_different': 'ipv4-tcp-post'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'ipv4-udp-vxlan-eth-ipv4-tcp-post'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'check_no_hash_or_different': 'ipv4-udp-vxlan-eth-ipv4-tcp-post'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/TCP(sport=23,dport=22)/("X"*480)', - 'action': {'check_no_hash_or_different': 'ipv4-udp-vxlan-eth-ipv4-tcp-post'}, - }, ], } @@ -5240,22 +4192,6 @@ mac_ipv4_sctp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/SCTP(sport=23,dport=22)/("X"*480)', 'action': {'check_hash_different': 'ipv4-sctp-pre'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'ipv4-udp-vxlan-eth-ipv4-sctp-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_different': 'ipv4-udp-vxlan-eth-ipv4-sctp-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_different': 'ipv4-udp-vxlan-eth-ipv4-sctp-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/SCTP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_different': 'ipv4-udp-vxlan-eth-ipv4-sctp-pre'}, - }, ], 'test': [ { @@ -5274,22 +4210,6 @@ mac_ipv4_sctp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/SCTP(sport=23,dport=22)/("X"*480)', 'action': {'check_hash_same': 'ipv4-sctp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'ipv4-udp-vxlan-eth-ipv4-sctp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_same': 'ipv4-udp-vxlan-eth-ipv4-sctp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_same': 'ipv4-udp-vxlan-eth-ipv4-sctp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/SCTP(sport=23,dport=22)/("X"*480)', - 'action': {'check_hash_same': 'ipv4-udp-vxlan-eth-ipv4-sctp'}, - }, { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/UDP(sport=22,dport=23)/("X"*480)', 'action': {'save_hash': 'ipv4-udp'}, @@ -5312,18 +4232,6 @@ mac_ipv4_sctp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.2", src="192.168.0.1")/SCTP(sport=23,dport=22)/("X"*480)', 'action': {'check_no_hash_or_different': 'ipv4-sctp-post'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.1", src="192.168.0.2")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'ipv4-udp-vxlan-eth-ipv4-sctp-post'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'check_no_hash_or_different': 'ipv4-udp-vxlan-eth-ipv4-sctp-post'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IP(dst="192.168.0.2", src="192.168.0.1")/SCTP(sport=23,dport=22)/("X"*480)', - 'action': {'check_no_hash_or_different': 'ipv4-udp-vxlan-eth-ipv4-sctp-post'}, - }, ], } @@ -5364,14 +4272,6 @@ mac_ipv6_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_different': 'ipv6-udp-pre'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)', - 'action': {'save_hash': 'ipv4-udp-vxlan-eth-ipv6-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)', - 'action': {'check_hash_different': 'ipv4-udp-vxlan-eth-ipv6-pre'}, - }, ], 'test': [ { @@ -5406,14 +4306,6 @@ mac_ipv6_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_same': 'ipv6-udp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)', - 'action': {'save_hash': 'ipv4-udp-vxlan-eth-ipv6'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)', - 'action': {'check_hash_same': 'ipv4-udp-vxlan-eth-ipv6'}, - }, { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP(dst="192.168.0.1", src="192.168.0.2")/("X"*480)', 'action': {'save_hash': 'ipv4-nonfrag'}, @@ -5456,14 +4348,6 @@ mac_ipv6_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', 'action': {'check_no_hash_or_different': 'ipv6-udp-post'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)', - 'action': {'save_or_no_hash': 'ipv4-udp-vxlan-eth-ipv6-post'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/UDP()/VXLAN()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)', - 'action': {'check_no_hash_or_different': 'ipv4-udp-vxlan-eth-ipv6-post'}, - }, ], } @@ -5480,14 +4364,6 @@ mac_ipv6_udp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_different': 'ipv6-udp-pre'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-eth-ipv6-udp-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_different': 'nvgre-eth-ipv6-udp-pre'}, - }, ], 'test': [ { @@ -5498,14 +4374,6 @@ mac_ipv6_udp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_same': 'ipv6-udp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-eth-ipv6-udp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_same': 'nvgre-eth-ipv6-udp'}, - }, { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', 'action': {'save_hash': 'ipv6-tcp'}, @@ -5514,14 +4382,6 @@ mac_ipv6_udp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_different': 'ipv6-tcp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-eth-ipv6-tcp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_different': 'nvgre-eth-ipv6-tcp'}, - }, ], 'post-test': [ { @@ -5532,14 +4392,6 @@ mac_ipv6_udp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', 'action': {'check_no_hash_or_different': 'ipv6-udp-post'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-eth-ipv6-udp-post'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_no_hash_or_different': 'nvgre-eth-ipv6-udp-post'}, - }, ], } @@ -5556,14 +4408,6 @@ mac_ipv6_tcp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_different': 'ipv6-tcp-pre'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-eth-ipv6-tcp-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_different': 'nvgre-eth-ipv6-tcp-pre'}, - }, ], 'test': [ { @@ -5574,14 +4418,6 @@ mac_ipv6_tcp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_same': 'ipv6-tcp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-eth-ipv6-tcp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_same': 'nvgre-eth-ipv6-tcp'}, - }, { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', 'action': {'save_hash': 'ipv6-udp'}, @@ -5590,14 +4426,6 @@ mac_ipv6_tcp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_different': 'ipv6-udp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-eth-ipv6-udp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_different': 'nvgre-eth-ipv6-udp'}, - }, ], 'post-test': [ { @@ -5608,14 +4436,6 @@ mac_ipv6_tcp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', 'action': {'check_no_hash_or_different': 'ipv6-tcp-post'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-eth-ipv6-tcp-post'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=22,dport=23)/("X"*480)', - 'action': {'check_no_hash_or_different': 'nvgre-eth-ipv6-tcp-post'}, - }, ], } @@ -5632,14 +4452,6 @@ mac_ipv6_sctp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_different': 'ipv6-sctp-pre'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-eth-ipv6-sctp-pre'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_different': 'nvgre-eth-ipv6-sctp-pre'}, - }, ], 'test': [ { @@ -5650,22 +4462,6 @@ mac_ipv6_sctp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', 'action': {'check_hash_same': 'ipv6-sctp'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-eth-ipv6-sctp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_same': 'nvgre-eth-ipv6-sctp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'ipv6-udp'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=22,dport=23)/("X"*480)', - 'action': {'check_hash_different': 'ipv6-udp'}, - }, ], 'post-test': [ { @@ -5676,14 +4472,6 @@ mac_ipv6_sctp_symmetric = { 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', 'action': {'check_no_hash_or_different': 'ipv6-sctp-post'}, }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'save_hash': 'nvgre-eth-ipv6-sctp-post'}, - }, - { - 'send_packet': 'Ether(src="00:11:22:33:44:55", dst="68:05:CA:BB:26:E0")/IP()/NVGRE()/Ether()/IPv6(dst="ABAB:910B:6666:3457:8295:3333:1800:2929",src="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=22,dport=23)/("X"*480)', - 'action': {'check_no_hash_or_different': 'nvgre-eth-ipv6-sctp-post'}, - }, ], } # symmetric related data end From patchwork Fri Aug 20 19:47:41 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Huang, ZhiminX" X-Patchwork-Id: 97155 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id A94C2A0C4B; Fri, 20 Aug 2021 13:15:51 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id A436C41260; Fri, 20 Aug 2021 13:15:51 +0200 (CEST) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id B27FF4003E for ; Fri, 20 Aug 2021 13:15:49 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10081"; a="238883130" X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="238883130" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:49 -0700 X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="523571861" Received: from unknown (HELO localhost.localdomain) ([10.240.183.103]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:47 -0700 From: Zhimin Huang To: dts@dpdk.org Cc: Zhimin Huang Date: Sat, 21 Aug 2021 03:47:41 +0800 Message-Id: <20210820194742.28666-6-zhiminx.huang@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210820194742.28666-1-zhiminx.huang@intel.com> References: <20210820194742.28666-1-zhiminx.huang@intel.com> Subject: [dts] [PATCH V1 5/6] tests/cvl_fdir:remove test steps X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" according to b83d270dff3852f1df0ea9bea5a8740378db0c7c, default rss not support tunnel inner rss, these function will cover by new case,so remove test step in test case Signed-off-by: Zhimin Huang Tested-by: Zhimin Huang --- tests/TestSuite_cvl_fdir.py | 30 +++--------------------------- 1 file changed, 3 insertions(+), 27 deletions(-) diff --git a/tests/TestSuite_cvl_fdir.py b/tests/TestSuite_cvl_fdir.py index 0c3a1917..ee4b43a8 100644 --- a/tests/TestSuite_cvl_fdir.py +++ b/tests/TestSuite_cvl_fdir.py @@ -751,14 +751,6 @@ tv_mac_ipv4_tun_ipv4_pay_queue_index = { "check_param": {"port_id": 0, "queue": 1} } -tv_mac_ipv4_tun_ipv4_pay_rss_queues = { - "name": "test_mac_ipv4_tun_ipv4_pay_rss_queues", - "rule": "flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / end actions rss queues 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 end / mark / end", - "scapy_str": MAC_IPV4_TUN_IPV4_PAY_MAC_IPV4_TUN_MAC_IPV4_PAY, - "check_func": rfc.check_mark, - "check_param": {"port_id": 0, "queue": list(range(9, 25)), "mark_id": 0} -} - tv_mac_ipv4_tun_ipv4_pay_passthru = { "name": "test_mac_ipv4_tun_ipv4_pay_passthru", "rule": "flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / end actions passthru / mark / end", @@ -791,7 +783,7 @@ tv_mac_ipv4_tun_ipv4_pay_mark = { "check_param": {"port_id": 0, "mark_id": 0, "rss": True} } -vectors_ipv4_tun_ipv4_pay = [tv_mac_ipv4_tun_ipv4_pay_queue_index, tv_mac_ipv4_tun_ipv4_pay_rss_queues, +vectors_ipv4_tun_ipv4_pay = [tv_mac_ipv4_tun_ipv4_pay_queue_index, tv_mac_ipv4_tun_ipv4_pay_passthru, tv_mac_ipv4_tun_ipv4_pay_drop, tv_mac_ipv4_tun_ipv4_pay_mark_rss, tv_mac_ipv4_tun_ipv4_pay_mark] @@ -855,14 +847,6 @@ tv_mac_ipv4_tun_ipv4_tcp_queue_index = { "check_param": {"port_id": 0, "queue": 1, "mark_id": 1} } -tv_mac_ipv4_tun_ipv4_tcp_rss_queues = { - "name": "test_mac_ipv4_tun_ipv4_tcp_rss_queues", - "rule": "flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / tcp src is 22 dst is 23 / end actions rss queues 38 39 40 41 end / mark id 1 / end", - "scapy_str": MAC_IPV4_TUN_IPV4_TCP_MAC_IPV4_TUN_MAC_IPV4_TCP, - "check_func": rfc.check_mark, - "check_param": {"port_id": 0, "queue": list(range(38, 42)), "mark_id": 1} -} - tv_mac_ipv4_tun_ipv4_tcp_passthru = { "name": "test_mac_ipv4_tun_ipv4_tcp_passthru", "rule": "flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / tcp src is 22 dst is 23 / end actions passthru / mark id 1 / end", @@ -895,7 +879,7 @@ tv_mac_ipv4_tun_ipv4_tcp_mark = { "check_param": {"port_id": 0, "mark_id": 1, "rss": True} } -vectors_ipv4_tun_ipv4_tcp = [tv_mac_ipv4_tun_ipv4_tcp_queue_index, tv_mac_ipv4_tun_ipv4_tcp_rss_queues, +vectors_ipv4_tun_ipv4_tcp = [tv_mac_ipv4_tun_ipv4_tcp_queue_index, tv_mac_ipv4_tun_ipv4_tcp_passthru, tv_mac_ipv4_tun_ipv4_tcp_drop, tv_mac_ipv4_tun_ipv4_tcp_mark_rss, tv_mac_ipv4_tun_ipv4_tcp_mark] @@ -907,14 +891,6 @@ tv_mac_ipv4_tun_ipv4_sctp_queue_index = { "check_param": {"port_id": 0, "queue": 1, "mark_id": 1} } -tv_mac_ipv4_tun_ipv4_sctp_rss_queues = { - "name": "test_mac_ipv4_tun_ipv4_sctp_rss_queues", - "rule": "flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / sctp src is 22 dst is 23 / end actions rss queues 38 39 40 41 end / mark id 1 / end", - "scapy_str": MAC_IPV4_TUN_IPV4_SCTP_MAC_IPV4_TUN_MAC_IPV4_SCTP, - "check_func": rfc.check_mark, - "check_param": {"port_id": 0, "queue": list(range(38, 42)), "mark_id": 1} -} - tv_mac_ipv4_tun_ipv4_sctp_passthru = { "name": "test_mac_ipv4_tun_ipv4_sctp_passthru", "rule": "flow create 0 ingress pattern eth / ipv4 / udp / vxlan / ipv4 src is 192.168.0.20 dst is 192.168.0.21 / sctp src is 22 dst is 23 / end actions passthru / mark id 1 / end", @@ -947,7 +923,7 @@ tv_mac_ipv4_tun_ipv4_sctp_mark = { "check_param": {"port_id": 0, "mark_id": 1, "rss": True} } -vectors_ipv4_tun_ipv4_sctp = [tv_mac_ipv4_tun_ipv4_sctp_queue_index, tv_mac_ipv4_tun_ipv4_sctp_rss_queues, +vectors_ipv4_tun_ipv4_sctp = [tv_mac_ipv4_tun_ipv4_sctp_queue_index, tv_mac_ipv4_tun_ipv4_sctp_passthru, tv_mac_ipv4_tun_ipv4_sctp_drop, tv_mac_ipv4_tun_ipv4_sctp_mark_rss, tv_mac_ipv4_tun_ipv4_sctp_mark] From patchwork Fri Aug 20 19:47:42 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: "Huang, ZhiminX" X-Patchwork-Id: 97156 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id DE50BA0C4B; Fri, 20 Aug 2021 13:15:53 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id D3A7141255; Fri, 20 Aug 2021 13:15:53 +0200 (CEST) Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by mails.dpdk.org (Postfix) with ESMTP id 7EC4C4003E for ; Fri, 20 Aug 2021 13:15:51 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10081"; a="238883137" X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="238883137" Received: from fmsmga003.fm.intel.com ([10.253.24.29]) by fmsmga101.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:50 -0700 X-IronPort-AV: E=Sophos;i="5.84,337,1620716400"; d="scan'208";a="523571866" Received: from unknown (HELO localhost.localdomain) ([10.240.183.103]) by fmsmga003-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 20 Aug 2021 04:15:49 -0700 From: Zhimin Huang To: dts@dpdk.org Cc: Zhimin Huang Date: Sat, 21 Aug 2021 03:47:42 +0800 Message-Id: <20210820194742.28666-7-zhiminx.huang@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20210820194742.28666-1-zhiminx.huang@intel.com> References: <20210820194742.28666-1-zhiminx.huang@intel.com> Subject: [dts] [PATCH V1 6/6] tests/cvl_switch_filter:remove test steps X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" according to b83d270dff3852f1df0ea9bea5a8740378db0c7c, default rss not support tunnel rss, these function will cover by new case,so remove test steps in test case Signed-off-by: Zhimin Huang Tested-by: Zhimin Huang --- tests/TestSuite_cvl_switch_filter.py | 255 --------------------------- 1 file changed, 255 deletions(-) diff --git a/tests/TestSuite_cvl_switch_filter.py b/tests/TestSuite_cvl_switch_filter.py index 5ec8b184..95bc6cb7 100644 --- a/tests/TestSuite_cvl_switch_filter.py +++ b/tests/TestSuite_cvl_switch_filter.py @@ -80,22 +80,6 @@ tv_mac_ipv4_vxlan_ipv4_in_queue_01 = { "expect_results":{"expect_pkts":8}} } -tv_mac_ipv4_vxlan_ipv4_queue_region_02 = { - "name":"tv_mac_ipv4_vxlan_ipv4_frag_queue_region_02", - "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions rss queues 2 3 end / end", - "configuration":{ - "is_non_pipeline":True, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_vxlan_ipv4_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":2}}, - "mismatched":{"scapy_str":mac_ipv4_vxlan_ipv4_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":8}} -} - tv_mac_ipv4_vxlan_ipv4_drop_03 = { "name":"tv_mac_ipv4_vxlan_ipv4_frag_drop_03", "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions drop / end", @@ -114,7 +98,6 @@ tv_mac_ipv4_vxlan_ipv4_drop_03 = { tvs_mac_ipv4_vxlan_ipv4 = [ tv_mac_ipv4_vxlan_ipv4_in_queue_01, - tv_mac_ipv4_vxlan_ipv4_queue_region_02, tv_mac_ipv4_vxlan_ipv4_drop_03 ] @@ -217,22 +200,6 @@ tv_mac_ipv4_vxlan_ipv4_tcp_in_queue_01 = { "expect_results":{"expect_pkts":6}} } -tv_mac_ipv4_vxlan_ipv4_tcp_queue_region_02 = { - "name":"tv_mac_ipv4_vxlan_ipv4_tcp_queue_region_02", - "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp src is 50 dst is 23 / end actions rss queues 4 5 end / end", - "configuration":{ - "is_non_pipeline":True, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_vxlan_ipv4_tcp_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[4, 5]}}, - "expect_results":{"expect_pkts":1}}, - "mismatched":{"scapy_str":mac_ipv4_vxlan_ipv4_tcp_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[4, 5]}}, - "expect_results":{"expect_pkts":6}} -} - tv_mac_ipv4_vxlan_ipv4_tcp_drop_03 = { "name":"tv_mac_ipv4_vxlan_ipv4_tcp_drop_03", "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp src is 50 dst is 23 / end actions drop / end", @@ -251,7 +218,6 @@ tv_mac_ipv4_vxlan_ipv4_tcp_drop_03 = { tvs_mac_ipv4_vxlan_ipv4_tcp = [ tv_mac_ipv4_vxlan_ipv4_tcp_in_queue_01, - tv_mac_ipv4_vxlan_ipv4_tcp_queue_region_02, tv_mac_ipv4_vxlan_ipv4_tcp_drop_03 ] @@ -291,22 +257,6 @@ tv_mac_ipv4_vxlan_mac_ipv4_in_queue_01 = { "expect_results":{"expect_pkts":10}} } -tv_mac_ipv4_vxlan_mac_ipv4_queue_region_02 = { - "name":"tv_mac_ipv4_vxlan_mac_ipv4_queue_region_02", - "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions rss queues 2 3 end / end", - "configuration":{ - "is_non_pipeline":True, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_vxlan_mac_ipv4_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":2}}, - "mismatched":{"scapy_str":mac_ipv4_vxlan_mac_ipv4_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":10}} -} - tv_mac_ipv4_vxlan_mac_ipv4_drop_03 = { "name":"tv_mac_ipv4_vxlan_mac_ipv4_drop_03", "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / end actions drop / end", @@ -325,7 +275,6 @@ tv_mac_ipv4_vxlan_mac_ipv4_drop_03 = { tvs_mac_ipv4_vxlan_mac_ipv4 = [ tv_mac_ipv4_vxlan_mac_ipv4_in_queue_01, - tv_mac_ipv4_vxlan_mac_ipv4_queue_region_02, tv_mac_ipv4_vxlan_mac_ipv4_drop_03 ] @@ -429,22 +378,6 @@ tv_mac_ipv4_vxlan_mac_ipv4_tcp_in_queue_01 = { "expect_results":{"expect_pkts":7}} } -tv_mac_ipv4_vxlan_mac_ipv4_tcp_queue_region_02 = { - "name":"tv_mac_ipv4_vxlan_mac_ipv4_tcp_queue_region_02", - "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp src is 25 dst is 23 / end actions rss queues 1 2 end / end", - "configuration":{ - "is_non_pipeline":True, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_vxlan_mac_ipv4_tcp_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[1, 2]}}, - "expect_results":{"expect_pkts":1}}, - "mismatched":{"scapy_str":mac_ipv4_vxlan_mac_ipv4_tcp_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[1, 2]}}, - "expect_results":{"expect_pkts":7}} -} - tv_mac_ipv4_vxlan_mac_ipv4_tcp_drop_03 = { "name":"tv_mac_ipv4_vxlan_mac_ipv4_tcp_drop_03", "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / udp / vxlan vni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.0.2 dst is 192.168.0.3 / tcp src is 25 dst is 23 / end actions drop / end", @@ -463,7 +396,6 @@ tv_mac_ipv4_vxlan_mac_ipv4_tcp_drop_03 = { tvs_mac_ipv4_vxlan_mac_ipv4_tcp = [ tv_mac_ipv4_vxlan_mac_ipv4_tcp_in_queue_01, - tv_mac_ipv4_vxlan_mac_ipv4_tcp_queue_region_02, tv_mac_ipv4_vxlan_mac_ipv4_tcp_drop_03 ] @@ -501,22 +433,6 @@ tv_mac_ipv4_nvgre_ipv4_in_queue_01 = { "expect_results":{"expect_pkts":8}} } -tv_mac_ipv4_nvgre_ipv4_queue_region_02 = { - "name":"tv_mac_ipv4_nvgre_ipv4_queue_region_02", - "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions rss queues 2 3 end / end", - "configuration":{ - "is_non_pipeline":True, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_nvgre_ipv4_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":2}}, - "mismatched":{"scapy_str":mac_ipv4_nvgre_ipv4_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":8}} -} - tv_mac_ipv4_nvgre_ipv4_drop_03 = { "name":"tv_mac_ipv4_nvgre_ipv4_drop_03", "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions drop / end", @@ -535,7 +451,6 @@ tv_mac_ipv4_nvgre_ipv4_drop_03 = { tvs_mac_ipv4_nvgre_ipv4 = [ tv_mac_ipv4_nvgre_ipv4_in_queue_01, - tv_mac_ipv4_nvgre_ipv4_queue_region_02, tv_mac_ipv4_nvgre_ipv4_drop_03 ] @@ -637,22 +552,6 @@ tv_mac_ipv4_nvgre_ipv4_tcp_in_queue_01 = { "expect_results":{"expect_pkts":6}} } -tv_mac_ipv4_nvgre_ipv4_tcp_queue_region_02 = { - "name":"tv_mac_ipv4_nvgre_ipv4_tcp_queue_region_02", - "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / tcp src is 25 dst is 23 / end actions rss queues 1 2 end / end", - "configuration":{ - "is_non_pipeline":True, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_nvgre_ipv4_tcp_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[1, 2]}}, - "expect_results":{"expect_pkts":1}}, - "mismatched":{"scapy_str":mac_ipv4_nvgre_ipv4_tcp_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[1, 2]}}, - "expect_results":{"expect_pkts":6}} -} - tv_mac_ipv4_nvgre_ipv4_tcp_drop_03 = { "name":"tv_mac_ipv4_nvgre_ipv4_tcp_drop_03", "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / tcp src is 25 dst is 23 / end actions drop / end", @@ -671,7 +570,6 @@ tv_mac_ipv4_nvgre_ipv4_tcp_drop_03 = { tvs_mac_ipv4_nvgre_ipv4_tcp = [ tv_mac_ipv4_nvgre_ipv4_tcp_in_queue_01, - tv_mac_ipv4_nvgre_ipv4_tcp_queue_region_02, tv_mac_ipv4_nvgre_ipv4_tcp_drop_03 ] @@ -710,22 +608,6 @@ tv_mac_ipv4_nvgre_mac_ipv4_in_queue_01 = { "expect_results":{"expect_pkts":10}} } -tv_mac_ipv4_nvgre_mac_ipv4_queue_region_02 = { - "name":"tv_mac_ipv4_nvgre_mac_ipv4_queue_region_02", - "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions rss queues 2 3 end / end", - "configuration":{ - "is_non_pipeline":True, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_nvgre_mac_ipv4_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":2}}, - "mismatched":{"scapy_str":mac_ipv4_nvgre_mac_ipv4_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":10}} -} - tv_mac_ipv4_nvgre_mac_ipv4_drop_03 = { "name":"tv_mac_ipv4_nvgre_mac_ipv4_drop_03", "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / end actions drop / end", @@ -744,7 +626,6 @@ tv_mac_ipv4_nvgre_mac_ipv4_drop_03 = { tvs_mac_ipv4_nvgre_mac_ipv4 = [ tv_mac_ipv4_nvgre_mac_ipv4_in_queue_01, - tv_mac_ipv4_nvgre_mac_ipv4_queue_region_02, tv_mac_ipv4_nvgre_mac_ipv4_drop_03 ] @@ -848,22 +729,6 @@ tv_mac_ipv4_nvgre_mac_ipv4_tcp_in_queue_01 = { "expect_results":{"expect_pkts":7}} } -tv_mac_ipv4_nvgre_mac_ipv4_tcp_queue_region_02 = { - "name":"tv_mac_ipv4_nvgre_mac_ipv4_tcp_queue_region_02", - "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / tcp src is 25 dst is 23 / end actions rss queues 2 3 end / end", - "configuration":{ - "is_non_pipeline":True, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_nvgre_mac_ipv4_tcp_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":1}}, - "mismatched":{"scapy_str":mac_ipv4_nvgre_mac_ipv4_tcp_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":7}} -} - tv_mac_ipv4_nvgre_mac_ipv4_tcp_drop_03 = { "name":"tv_mac_ipv4_nvgre_mac_ipv4_tcp_drop_03", "rte_flow_pattern":"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.1 / nvgre tni is 2 / eth dst is 68:05:ca:8d:ed:a8 / ipv4 src is 192.168.1.2 dst is 192.168.1.3 / tcp src is 25 dst is 23 / end actions drop / end", @@ -882,7 +747,6 @@ tv_mac_ipv4_nvgre_mac_ipv4_tcp_drop_03 = { tvs_mac_ipv4_nvgre_mac_ipv4_tcp = [ tv_mac_ipv4_nvgre_mac_ipv4_tcp_in_queue_01, - tv_mac_ipv4_nvgre_mac_ipv4_tcp_queue_region_02, tv_mac_ipv4_nvgre_mac_ipv4_tcp_drop_03 ] @@ -914,22 +778,6 @@ tv_mac_ipv4_vxlan_ipv4_frag_pipeline_mode_in_queue_01 = { "expect_results":{"expect_pkts":3}} } -tv_mac_ipv4_vxlan_ipv4_frag_pipeline_mode_queue_region_02 = { - "name":"tv_mac_ipv4_vxlan_ipv4_frag_pipeline_mode_queue_region_02", - "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / end actions rss queues 2 3 end / end", - "configuration":{ - "is_non_pipeline":False, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_vxlan_ipv4_frag_pipeline_mode_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":1}}, - "mismatched":{"scapy_str":mac_ipv4_vxlan_ipv4_frag_pipeline_mode_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":3}} -} - tv_mac_ipv4_vxlan_ipv4_frag_pipeline_mode_drop_03 = { "name":"tv_mac_ipv4_vxlan_ipv4_frag_pipeline_mode_drop_03", "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / end actions drop / end", @@ -948,7 +796,6 @@ tv_mac_ipv4_vxlan_ipv4_frag_pipeline_mode_drop_03 = { tvs_mac_ipv4_vxlan_ipv4_frag_pipeline_mode = [ tv_mac_ipv4_vxlan_ipv4_frag_pipeline_mode_in_queue_01, - tv_mac_ipv4_vxlan_ipv4_frag_pipeline_mode_queue_region_02, tv_mac_ipv4_vxlan_ipv4_frag_pipeline_mode_drop_03 ] @@ -985,22 +832,6 @@ tv_mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode_in_queue_01 = { "expect_results":{"expect_pkts":8}} } -tv_mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode_queue_region_02 = { - "name":"tv_mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode_queue_region_02", - "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 proto is 0x06 / end actions rss queues 2 3 end / end", - "configuration":{ - "is_non_pipeline":False, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":2}}, - "mismatched":{"scapy_str":mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":8}} -} - tv_mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode_drop_03 = { "name":"tv_mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode_drop_03", "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 proto is 0x06 / end actions drop / end", @@ -1019,7 +850,6 @@ tv_mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode_drop_03 = { tvs_mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode = [ tv_mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode_in_queue_01, - tv_mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode_queue_region_02, tv_mac_ipv4_vxlan_ipv4_pay_proto_tcp_pipeline_mode_drop_03 ] @@ -1190,22 +1020,6 @@ tv_mac_ipv4_vxlan_ipv4_tcp_pipeline_mode_in_queue_01 = { "expect_results":{"expect_pkts":5}} } -tv_mac_ipv4_vxlan_ipv4_tcp_pipeline_mode_queue_region_02 = { - "name":"tv_mac_ipv4_vxlan_ipv4_tcp_pipeline_mode_queue_region_02", - "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions rss queues 4 5 end / end", - "configuration":{ - "is_non_pipeline":False, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_vxlan_ipv4_tcp_pipeline_mode_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[4, 5]}}, - "expect_results":{"expect_pkts":1}}, - "mismatched":{"scapy_str":mac_ipv4_vxlan_ipv4_tcp_pipeline_mode_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[4, 5]}}, - "expect_results":{"expect_pkts":5}} -} - tv_mac_ipv4_vxlan_ipv4_tcp_pipeline_mode_drop_03 = { "name":"tv_mac_ipv4_vxlan_ipv4_tcp_pipeline_mode_drop_03", "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / udp / vxlan / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions drop / end", @@ -1224,7 +1038,6 @@ tv_mac_ipv4_vxlan_ipv4_tcp_pipeline_mode_drop_03 = { tvs_mac_ipv4_vxlan_ipv4_tcp_pipeline_mode = [ tv_mac_ipv4_vxlan_ipv4_tcp_pipeline_mode_in_queue_01, - tv_mac_ipv4_vxlan_ipv4_tcp_pipeline_mode_queue_region_02, tv_mac_ipv4_vxlan_ipv4_tcp_pipeline_mode_drop_03 ] @@ -1256,22 +1069,6 @@ tv_mac_ipv4_nvgre_ipv4_frag_pipeline_mode_in_queue_01 = { "expect_results":{"expect_pkts":3}} } -tv_mac_ipv4_nvgre_ipv4_frag_pipeline_mode_queue_region_02 = { - "name":"tv_mac_ipv4_nvgre_ipv4_frag_pipeline_mode_queue_region_02", - "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / end actions rss queues 2 3 end / end", - "configuration":{ - "is_non_pipeline":False, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_nvgre_ipv4_frag_pipeline_mode_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":1}}, - "mismatched":{"scapy_str":mac_ipv4_nvgre_ipv4_frag_pipeline_mode_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":3}} -} - tv_mac_ipv4_nvgre_ipv4_frag_pipeline_mode_drop_03 = { "name":"tv_mac_ipv4_nvgre_ipv4_frag_pipeline_mode_drop_03", "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / end actions drop / end", @@ -1290,7 +1087,6 @@ tv_mac_ipv4_nvgre_ipv4_frag_pipeline_mode_drop_03 = { tvs_mac_ipv4_nvgre_ipv4_frag_pipeline_mode = [ tv_mac_ipv4_nvgre_ipv4_frag_pipeline_mode_in_queue_01, - tv_mac_ipv4_nvgre_ipv4_frag_pipeline_mode_queue_region_02, tv_mac_ipv4_nvgre_ipv4_frag_pipeline_mode_drop_03 ] @@ -1327,22 +1123,6 @@ tv_mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode_in_queue_01 = { "expect_results":{"expect_pkts":8}} } -tv_mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode_queue_region_02 = { - "name":"tv_mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode_queue_region_02", - "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 proto is 0x06 tos is 4 / end actions rss queues 2 3 end / end", - "configuration":{ - "is_non_pipeline":False, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":2}}, - "mismatched":{"scapy_str":mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[2, 3]}}, - "expect_results":{"expect_pkts":8}} -} - tv_mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode_drop_03 = { "name":"tv_mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode_drop_03", "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 proto is 0x06 tos is 4 / end actions drop / end", @@ -1361,7 +1141,6 @@ tv_mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode_drop_03 = { tvs_mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode = [ tv_mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode_in_queue_01, - tv_mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode_queue_region_02, tv_mac_ipv4_nvgre_ipv4_pay_proto_tcp_pipeline_mode_drop_03 ] @@ -1465,22 +1244,6 @@ tv_mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode_in_queue_01 = { "expect_results":{"expect_pkts":5}} } -tv_mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode_queue_region_02 = { - "name":"tv_mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode_queue_region_02", - "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / udp src is 50 dst is 23 / end actions rss queues 4 5 end / end", - "configuration":{ - "is_non_pipeline":False, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[4, 5]}}, - "expect_results":{"expect_pkts":1}}, - "mismatched":{"scapy_str":mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[4, 5]}}, - "expect_results":{"expect_pkts":5}} -} - tv_mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode_drop_03 = { "name":"tv_mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode_drop_03", "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / udp src is 50 dst is 23 / end actions drop / end", @@ -1499,7 +1262,6 @@ tv_mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode_drop_03 = { tvs_mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode = [ tv_mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode_in_queue_01, - tv_mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode_queue_region_02, tv_mac_ipv4_nvgre_ipv4_udp_pay_pipeline_mode_drop_03 ] @@ -1532,22 +1294,6 @@ tv_mac_ipv4_nvgre_ipv4_tcp_pipeline_mode_in_queue_01 = { "expect_results":{"expect_pkts":5}} } -tv_mac_ipv4_nvgre_ipv4_tcp_pipeline_mode_queue_region_02 = { - "name":"tv_mac_ipv4_nvgre_ipv4_tcp_pipeline_mode_queue_region_02", - "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions rss queues 4 5 end / end", - "configuration":{ - "is_non_pipeline":False, - "is_need_rss_rule":False}, - "matched":{"scapy_str":mac_ipv4_nvgre_ipv4_tcp_pipeline_mode_scapy_str["matched"], - "check_func":{"func":rfc.check_output_log_queue_region, - "param":{"expect_port":0, "expect_queues":[4, 5]}}, - "expect_results":{"expect_pkts":1}}, - "mismatched":{"scapy_str":mac_ipv4_nvgre_ipv4_tcp_pipeline_mode_scapy_str["mismatched"], - "check_func":{"func":rfc.check_output_log_queue_region_mismatched, - "param":{"expect_port":0, "expect_queues":[4, 5]}}, - "expect_results":{"expect_pkts":5}} -} - tv_mac_ipv4_nvgre_ipv4_tcp_pipeline_mode_drop_03 = { "name":"tv_mac_ipv4_nvgre_ipv4_tcp_pipeline_mode_drop_03", "rte_flow_pattern":"flow create 0 priority 0 ingress pattern eth / ipv4 / nvgre / eth / ipv4 src is 192.168.0.2 dst is 192.168.0.3 tos is 4 / tcp src is 50 dst is 23 / end actions drop / end", @@ -1566,7 +1312,6 @@ tv_mac_ipv4_nvgre_ipv4_tcp_pipeline_mode_drop_03 = { tvs_mac_ipv4_nvgre_ipv4_tcp_pipeline_mode = [ tv_mac_ipv4_nvgre_ipv4_tcp_pipeline_mode_in_queue_01, - tv_mac_ipv4_nvgre_ipv4_tcp_pipeline_mode_queue_region_02, tv_mac_ipv4_nvgre_ipv4_tcp_pipeline_mode_drop_03 ]