From patchwork Tue Dec 27 05:56:31 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Weiyuan Li X-Patchwork-Id: 121397 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id D9AA4A04FD; Tue, 27 Dec 2022 06:56:38 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id CF7DC410FC; Tue, 27 Dec 2022 06:56:38 +0100 (CET) Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by mails.dpdk.org (Postfix) with ESMTP id 2FA2A40E2D for ; Tue, 27 Dec 2022 06:56:37 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1672120597; x=1703656597; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=C+pkxTP3O/pn+dYb88F/OgC94MFAped3FTv5M7LkvRI=; b=DxAhxwxcCIiC5YlStu10hrqObDH+TQS5qr6lpB5NQgRmjQx5+Pm8mhtV WLqBKg0fH7Vgbqgp0sPW42taNgP84RWcinR5KXPfy0Za9hYKzVblF0axI ODBKXMVJ1xaX2ATXJyNHoA5/XSqvStPy7eO4LEI5n2r0RtnSm0f7YdHcl VVR95QED4PyUArWRARW40lkj0TeWoS126BU4NhPEDBpOong5LFfx9lDoL 0C+RmP05FEg6sK2mFCJiW11i+h3ODwUSQPU9zN40Uz/cksIcb7IWttDij fg0PiN1EX5UJKm6dW3QzmBTdPxRlXZIvR7jHKwV3gvMRvjvvAtvAX4qTm w==; X-IronPort-AV: E=McAfee;i="6500,9779,10572"; a="304150956" X-IronPort-AV: E=Sophos;i="5.96,277,1665471600"; d="scan'208";a="304150956" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Dec 2022 21:56:32 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10572"; a="760231696" X-IronPort-AV: E=Sophos;i="5.96,277,1665471600"; d="scan'208";a="760231696" Received: from unknown (HELO localhost.localdomain) ([10.239.252.248]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Dec 2022 21:56:30 -0800 From: Weiyuan Li To: dts@dpdk.org Cc: Weiyuan Li Subject: [dts][PATCH V1 1/2] test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp: add PF new cases according to testplan Date: Tue, 27 Dec 2022 13:56:31 +0800 Message-Id: <20221227055632.13510-1-weiyuanx.li@intel.com> X-Mailer: git-send-email 2.27.0 MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Add PF new cases according to testplan. Signed-off-by: Weiyuan Li --- ...ed_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst | 523 ++++++++++++++++++ 1 file changed, 523 insertions(+) diff --git a/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst b/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst index f365784e..12322737 100644 --- a/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst +++ b/test_plans/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp_test_plan.rst @@ -671,6 +671,8 @@ Test case: MAC_IPV6_AH Test case: MAC_VLAN_IPV4_PAY ============================ +Subcase: MAC_VLAN_IPV4_PAY_VLAN +------------------------------- 1. validate a rule for RSS type of MAC_VLAN_IPV4_PAY:: @@ -724,8 +726,65 @@ Test case: MAC_VLAN_IPV4_PAY check the rule not exists. send the matched packets, check the hash values of the packets are not exist. +Subcase: MAC_VLAN_IPV4_PAY_L3DST +-------------------------------- + +1. validate a rule for RSS type of MAC_VLAN_IPV4_PAY:: + + testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / end actions rss types ipv4 l3-dst-only end key_len 0 queues end / end + + get the message:: + + Flow rule validated + + check the flow list:: + + testpmd> flow list 0 + + check the rule not exists in the list. + +2. create a rule for RSS type of MAC_VLAN_IPV4_PAY:: + + testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / end actions rss types ipv4 l3-dst-only end key_len 0 queues end / end + testpmd> flow list 0 + + check the rule exists in the list. + +3. send matched packets + + * MAC_VLAN_IPV4_PAY packet:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/Raw("x" * 80)],iface="ens786f0",count=1) + + change the field [l3 dst address], send packets:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.3")/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash value is different from the first packet. + change other fields, send packets:: + + sendp([Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="192.168.1.3", dst="192.168.1.2")/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are the same as the first packet. + +4. send packets mismatched the pattern:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values not exist. + +5. destroy the rule:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow list 0 + + check the rule not exists. + send the matched packets, check the hash values of the packets are not exist. + Test case: MAC_VLAN_IPV4_UDP_PAY ================================ +Subcase: MAC_VLAN_IPV4_UDP_VLAN +------------------------------- 1. validate a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY:: @@ -780,8 +839,122 @@ Test case: MAC_VLAN_IPV4_UDP_PAY check the rule not exists. send the matched packets, check the hash values of the packets are not exist. +Subcase: MAC_VLAN_IPV4_UDP_L3SRC +-------------------------------- + +1. validate a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY:: + + testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end + + get the message:: + + Flow rule validated + + check the flow list:: + + testpmd> flow list 0 + + check the rule not exists in the list. + +2. create a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY:: + + testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end + testpmd> flow list 0 + + check the rule exists in the list. + +3. send matched packets + + * MAC_VLAN_IPV4_UDP_PAY packet:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + change the field [l3 src address], send packets:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.3", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are different from the first packet. + change other fields, send packets:: + + sendp([Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.4")/UDP(sport=19,dport=99)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are the same as as the first packet. + +4. send packets mismatched the pattern:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/TCP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values of the packets not exist. + +5. destroy the rule:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow list 0 + + check the rule not exists. + send the matched packets, check the hash values of the packets are not exist. + +Subcase: MAC_VLAN_IPV4_UDP_L4DST +-------------------------------- + +1. validate a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY:: + + testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4-udp l4-dst-only end key_len 0 queues end / end + + get the message:: + + Flow rule validated + + check the flow list:: + + testpmd> flow list 0 + + check the rule not exists in the list. + +2. create a rule for RSS type of MAC_VLAN_IPV4_UDP_PAY:: + + testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4-udp l4-dst-only end key_len 0 queues end / end + testpmd> flow list 0 + + check the rule exists in the list. + +3. send matched packets + + * MAC_VLAN_IPV4_UDP_PAY packet:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + change the field [l4 dst address], send packets:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=24)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are different from the first packet. + change other fields, send packets:: + + sendp([Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="192.168.1.3", dst="192.168.1.4")/UDP(sport=19,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are the same as as the first packet. + +4. send packets mismatched the pattern:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/TCP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values of the packets not exist. + +5. destroy the rule:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow list 0 + + check the rule not exists. + send the matched packets, check the hash values of the packets are not exist. + Test case: MAC_VLAN_IPV4_TCP_PAY ================================ +Subcase: MAC_VLAN_IPV4_TCP_VLAN +------------------------------- 1. validate a rule for RSS type of MAC_VLAN_IPV4_TCP_PAY:: @@ -836,8 +1009,67 @@ Test case: MAC_VLAN_IPV4_TCP_PAY check the rule not exists. send the matched packets, check the hash values of the packets are not exist. +Subcase: MAC_VLAN_IPV4_TCP_l3SRC_L4SRC +-------------------------------------- + +1. validate a rule for RSS type of MAC_VLAN_IPV4_TCP_PAY:: + + testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / tcp / end actions rss types ipv4-tcp l3-src-only l4-src-only end key_len 0 queues end / end + + get the message:: + + Flow rule validated + + check the flow list:: + + testpmd> flow list 0 + + check the rule not exists in the list. + +2. create a rule for RSS type of MAC_VLAN_IPV4_TCP_PAY:: + + testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / tcp / end actions rss types ipv4-tcp l3-src-only l4-src-only end key_len 0 queues end / end + testpmd> flow list 0 + + check the rule exists in the list. + +3. send matched packets + + * MAC_VLAN_IPV4_TCP_PAY packet:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/TCP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + change the field [l3 src address and l4 sport], send packets:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.3", dst="192.168.1.2")/TCP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/TCP(sport=22,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are different from the first packet. + change other fields, send packets:: + + sendp([Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.4")/TCP(sport=25,dport=99)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are the same as as the first packet. + +4. send packets mismatched the pattern:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/TCP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values of the packets not exist. + +5. destroy the rule:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow list 0 + + check the rule not exists. + send the matched packets, check the hash values of the packets are not exist. + Test case: MAC_VLAN_IPV4_SCTP_PAY ================================= +Subcase: MAC_VLAN_IPV4_SCTP_VLAN +-------------------------------- 1. validate a rule for RSS type of MAC_VLAN_IPV4_SCTP_PAY:: @@ -892,8 +1124,69 @@ Test case: MAC_VLAN_IPV4_SCTP_PAY check the rule not exists. send the matched packets, check the hash values of the packets are not exist. +Subcase: MAC_VLAN_IPV4_SCTP_ALL +------------------------------- + +1. validate a rule for RSS type of MAC_VLAN_IPV4_SCTP_PAY:: + + testpmd> flow validate 0 ingress pattern eth / vlan / ipv4 / sctp / end actions rss types ipv4-sctp end key_len 0 queues end / end + + get the message:: + + Flow rule validated + + check the flow list:: + + testpmd> flow list 0 + + check the rule not exists in the list. + +2. create a rule for RSS type of MAC_VLAN_IPV4_SCTP_PAY:: + + testpmd> flow create 0 ingress pattern eth / vlan / ipv4 / sctp / end actions rss types ipv4-sctp end key_len 0 queues end / end + testpmd> flow list 0 + + check the rule exists in the list. + +3. send matched packets + + * MAC_VLAN_IPV4_SCTP_PAY packet:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/SCTP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + change the field [ipv4-sctp], send packets:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.3", dst="192.168.1.2")/SCTP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.4")/SCTP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/SCTP(sport=19,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/SCTP(sport=25,dport=99)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are different from the first packet. + change other fields, send packets:: + + sendp([Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/SCTP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are the same as as the first packet. + +4. send packets mismatched the pattern:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/SCTP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values of the packets not exist. + +5. destroy the rule:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow list 0 + + check the rule not exists. + send the matched packets, check the hash values of the packets are not exist. + Test case: MAC_VLAN_IPV6_PAY ============================ +Subcase: MAC_VLAN_IPV6_PAY_vlan +------------------------------- 1. validate a rule for RSS type of MAC_VLAN_IPV6_PAY:: @@ -947,8 +1240,65 @@ Test case: MAC_VLAN_IPV6_PAY check the rule not exists. send the matched packets, check the hash values of the packets are not exist. +Subcase: MAC_VLAN_IPV6_PAY_L3SRC +-------------------------------- + +1. validate a rule for RSS type of MAC_VLAN_IPV6_PAY:: + + testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / end actions rss types ipv6 l3-src-only end key_len 0 queues end / end + + get the message:: + + Flow rule validated + + check the flow list:: + + testpmd> flow list 0 + + check the rule not exists in the list. + +2. create a rule for RSS type of MAC_VLAN_IPV6_PAY:: + + testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / end actions rss types ipv6 l3-src-only end key_len 0 queues end / end + testpmd> flow list 0 + + check the rule exists in the list. + +3. send matched packets + + * MAC_VLAN_IPV6_PAY packet:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/Raw("x" * 80)],iface="ens786f0",count=1) + + change the field [l3 src address], send packets:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1537", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are different from the first packet. + change other fields, send packets:: + + sendp([Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2023")/Raw("y" * 80)],iface="ens786f0",count=1) + + check the hash values are the same as the first packet. + +4. send packets mismatched the pattern:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values not exist. + +5. destroy the rule:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow list 0 + + check the rule not exists. + send the matched packets, check the hash values of the packets are not exist. + Test case: MAC_VLAN_IPV6_UDP_PAY ================================ +Subcase: MAC_VLAN_IPV6_UDP_VLAN +------------------------------- 1. validate a rule for RSS type of MAC_VLAN_IPV6_UDP_PAY:: @@ -1003,8 +1353,66 @@ Test case: MAC_VLAN_IPV6_UDP_PAY check the rule not exists. send the matched packets, check the hash values of the packets are not exist. +Subcase: MAC_VLAN_IPV6_UDP_L4SRC +-------------------------------- + +1. validate a rule for RSS type of MAC_VLAN_IPV6_UDP_PAY:: + + testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / udp / end actions rss types ipv6-udp l4-src-only end key_len 0 queues end / end + + get the message:: + + Flow rule validated + + check the flow list:: + + testpmd> flow list 0 + + check the rule not exists in the list. + +2. create a rule for RSS type of MAC_VLAN_IPV6_UDP_PAY:: + + testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / udp / end actions rss types ipv6-udp l4-src-only end key_len 0 queues end / end + testpmd> flow list 0 + + check the rule exists in the list. + +3. send matched packets + + * MAC_VLAN_IPV6_UDP_PAY packet:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + change the field [l4 src address], send packets:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=19,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are different from the first packet. + change other fields, send packets:: + + sendp([Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1537", dst="CDCD:910A:2222:5498:8475:1111:3900:2023")/UDP(sport=25,dport=99)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are the same as the first packet. + +4. send packets mismatched the pattern:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/TCP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values not exist. + +5. destroy the rule:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow list 0 + + check the rule not exists. + send the matched packets, check the hash values of the packets are not exist. + Test case: MAC_VLAN_IPV6_TCP_PAY ================================ +Subcase: MAC_VLAN_IPV6_TCP_VLAN +------------------------------- 1. validate a rule for RSS type of MAC_VLAN_IPV6_TCP_PAY:: @@ -1059,8 +1467,66 @@ Test case: MAC_VLAN_IPV6_TCP_PAY check the rule not exists. send the matched packets, check the hash values of the packets are not exist. +Subcase: MAC_VLAN_IPV6_TCP_L3DST +-------------------------------- + +1. validate a rule for RSS type of MAC_VLAN_IPV6_TCP_PAY:: + + testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / tcp / end actions rss types ipv6-tcp l3-dst-only end key_len 0 queues end / end + + get the message:: + + Flow rule validated + + check the flow list:: + + testpmd> flow list 0 + + check the rule not exists in the list. + +2. create a rule for RSS type of MAC_VLAN_IPV6_TCP_PAY:: + + testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / tcp / end actions rss types ipv6-tcp l3-dst-only end key_len 0 queues end / end + testpmd> flow list 0 + + check the rule exists in the list. + +3. send matched packets + + * MAC_VLAN_IPV6_TCP_PAY packet:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/TCP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + change the field [l3 dst address], send packets:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2023")/TCP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are different from the first packet. + change other fields, send packets:: + + sendp([Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1537", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/TCP(sport=19,dport=99)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are the same as the first packet. + +4. send packets mismatched the pattern:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/TCP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values not exist. + +5. destroy the rule:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow list 0 + + check the rule not exists. + send the matched packets, check the hash values of the packets are not exist. + Test case: MAC_VLAN_IPV6_SCTP_PAY ================================= +Subcase: MAC_VLAN_IPV6_SCTP_VLAN +-------------------------------- 1. validate a rule for RSS type of MAC_VLAN_IPV6_SCTP_PAY:: @@ -1115,6 +1581,63 @@ Test case: MAC_VLAN_IPV6_SCTP_PAY check the rule not exists. send the matched packets, check the hash values the packets are not exist. +Subcase: MAC_VLAN_IPV6_SCTP_L3DST_L4DST +--------------------------------------- + +1. validate a rule for RSS type of MAC_VLAN_IPV6_SCTP_PAY:: + + testpmd> flow validate 0 ingress pattern eth / vlan / ipv6 / sctp / end actions rss types ipv6-sctp l3-dst-only l4-dst-only end key_len 0 queues end / end + + get the message:: + + Flow rule validated + + check the flow list:: + + testpmd> flow list 0 + + check the rule not exists in the list. + +2. create a rule for RSS type of MAC_VLAN_IPV6_SCTP_PAY:: + + testpmd> flow create 0 ingress pattern eth / vlan / ipv6 / sctp / end actions rss types ipv6-sctp l3-dst-only l4-dst-only end key_len 0 queues end / end + testpmd> flow list 0 + + check the rule exists in the list. + +3. send matched packets + + * MAC_VLAN_IPV6_SCTP_PAY packet:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/SCTP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + change the field [l3 dst address and l4 dport], send packets:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2023")/SCTP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/SCTP(sport=25,dport=99)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are different from the first packet. + change other fields, send packets:: + + sendp([Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1537", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/SCTP(sport=19,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values are the same as the first packet. + +4. send packets mismatched the pattern:: + + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/SCTP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + sendp([Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=25,dport=23)/Raw("x" * 80)],iface="ens786f0",count=1) + + check the hash values not exist. + +5. destroy the rule:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow list 0 + + check the rule not exists. + send the matched packets, check the hash values the packets are not exist. + Test case: negative cases ========================= From patchwork Tue Dec 27 05:56:32 2022 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Weiyuan Li X-Patchwork-Id: 121398 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 0A162A0540; Tue, 27 Dec 2022 06:56:40 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 00BDD4114B; Tue, 27 Dec 2022 06:56:40 +0100 (CET) Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by mails.dpdk.org (Postfix) with ESMTP id 1E9AD40E2D for ; Tue, 27 Dec 2022 06:56:37 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1672120598; x=1703656598; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=zXHgolwzoaeKbCTdn5xJe/Jap2WRgJZz5HlgsW5rmIo=; b=XbdO7DPp41T58T0LoBrnCOaXNrnX2blcn0kmPeQraGJCw8MeEyhzhjsl TyBc1ARgQ7PpMwMRSpLptt9X/MnMLOFMewxDeAoLIzc3sJgHYhAJdgzwZ 2RlQgXr52+ErV5wHDWCFVTcQllU+JlIbMIlVZ5AtickTytl5B9JW77gAS BCyKMR4zPHAIyDb1VsB4+ehAisZQ7d2E/H1rvejdMJiwj108UOn0vI9YE T3QIlj/J1wjZdEPeaBEMOVNVWI5Os9mvUk4E676i3+bjJ+cy8m4STDoPh r1uttmlQs2YUKkUY75716zl0F2xjLV5izfqbiRlouVRGSZngRc3CfX+pZ w==; X-IronPort-AV: E=McAfee;i="6500,9779,10572"; a="304150958" X-IronPort-AV: E=Sophos;i="5.96,277,1665471600"; d="scan'208";a="304150958" Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by orsmga106.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Dec 2022 21:56:33 -0800 X-IronPort-AV: E=McAfee;i="6500,9779,10572"; a="760231704" X-IronPort-AV: E=Sophos;i="5.96,277,1665471600"; d="scan'208";a="760231704" Received: from unknown (HELO localhost.localdomain) ([10.239.252.248]) by fmsmga002-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Dec 2022 21:56:32 -0800 From: Weiyuan Li To: dts@dpdk.org Cc: Weiyuan Li Subject: [dts][PATCH V1 2/2] tests/ice_advanced_rss_vlan_esp_ah_l2tp_pfcp: add PF new cases according to testplan Date: Tue, 27 Dec 2022 13:56:32 +0800 Message-Id: <20221227055632.13510-2-weiyuanx.li@intel.com> X-Mailer: git-send-email 2.27.0 In-Reply-To: <20221227055632.13510-1-weiyuanx.li@intel.com> References: <20221227055632.13510-1-weiyuanx.li@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Add PF new cases according to testplan. Signed-off-by: Weiyuan Li --- ..._ice_advanced_rss_vlan_esp_ah_l2tp_pfcp.py | 526 +++++++++++++++++- 1 file changed, 518 insertions(+), 8 deletions(-) diff --git a/tests/TestSuite_ice_advanced_rss_vlan_esp_ah_l2tp_pfcp.py b/tests/TestSuite_ice_advanced_rss_vlan_esp_ah_l2tp_pfcp.py index dd610bc4..0a18c4b9 100644 --- a/tests/TestSuite_ice_advanced_rss_vlan_esp_ah_l2tp_pfcp.py +++ b/tests/TestSuite_ice_advanced_rss_vlan_esp_ah_l2tp_pfcp.py @@ -448,6 +448,19 @@ mac_vlan_ipv4_pay_packets = { ], } +mac_vlan_ipv4_pay_l3dst_packets = { + "match": { + "mac_vlan_ipv4_pay": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.3")/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.3", dst="192.168.1.2")/Raw("x" * 80)', + ], + }, + "mismatch": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/Raw("x" * 80)' + ], +} + mac_vlan_ipv4_pay = { "sub_casename": "mac_vlan_ipv4_pay", "port_id": 0, @@ -478,6 +491,49 @@ mac_vlan_ipv4_pay = { ], } +mac_vlan_ipv4_pay_l3dst = { + "sub_casename": "mac_vlan_ipv4_pay_l3dst", + "port_id": 0, + "rule": "flow create 0 ingress pattern eth / vlan / ipv4 / end actions rss types ipv4 l3-dst-only end key_len 0 queues end / end", + "test": [ + { + "send_packet": mac_vlan_ipv4_pay_l3dst_packets["match"][ + "mac_vlan_ipv4_pay" + ][0], + "action": {"save_hash": "mac_vlan_ipv4_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_pay_l3dst_packets["match"][ + "mac_vlan_ipv4_pay" + ][1], + "action": {"check_hash_different": "mac_vlan_ipv4_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_pay_l3dst_packets["match"][ + "mac_vlan_ipv4_pay" + ][2], + "action": {"check_hash_same": "mac_vlan_ipv4_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_pay_l3dst_packets["mismatch"][0], + "action": "check_no_hash", + }, + ], + "post-test": [ + { + "send_packet": mac_vlan_ipv4_pay_l3dst_packets["match"][ + "mac_vlan_ipv4_pay" + ], + "action": "check_no_hash", + }, + ], +} + +mac_vlan_ipv4_pay_list = [ + mac_vlan_ipv4_pay, + mac_vlan_ipv4_pay_l3dst, +] + mac_vlan_ipv4_udp_pay_packets = { "match": { "mac_vlan_ipv4_udp_pay": [ @@ -492,6 +548,34 @@ mac_vlan_ipv4_udp_pay_packets = { ], } +mac_vlan_ipv4_udp_l3src_packets = { + "match": { + "mac_vlan_ipv4_udp_pay": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="192.168.1.3", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.4")/UDP(sport=19,dport=99)/Raw("x" * 80)', + ] + }, + "mismatch": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/TCP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=25,dport=23)/Raw("x" * 80)', + ], +} + +mac_vlan_ipv4_udp_l4dst_packets = { + "match": { + "mac_vlan_ipv4_udp_pay": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=24)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.3", dst="192.168.1.4")/UDP(sport=19,dport=23)/Raw("x" * 80)', + ] + }, + "mismatch": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/TCP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=25,dport=23)/Raw("x" * 80)', + ], +} + mac_vlan_ipv4_udp_pay = { "sub_casename": "mac_vlan_ipv4_udp_pay", "port_id": 0, @@ -530,6 +614,88 @@ mac_vlan_ipv4_udp_pay = { ], } +mac_vlan_ipv4_udp_l3src = { + "sub_casename": "mac_vlan_ipv4_udp_l3src", + "port_id": 0, + "rule": "flow create 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end", + "test": [ + { + "send_packet": mac_vlan_ipv4_udp_l3src_packets["match"][ + "mac_vlan_ipv4_udp_pay" + ][0], + "action": {"save_hash": "mac_vlan_ipv4_udp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_udp_l3src_packets["match"][ + "mac_vlan_ipv4_udp_pay" + ][1], + "action": {"check_hash_different": "mac_vlan_ipv4_udp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_udp_l3src_packets["match"][ + "mac_vlan_ipv4_udp_pay" + ][2], + "action": {"check_hash_same": "mac_vlan_ipv4_udp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_udp_l3src_packets["mismatch"], + "action": "check_no_hash", + }, + ], + "post-test": [ + { + "send_packet": mac_vlan_ipv4_udp_l3src_packets["match"][ + "mac_vlan_ipv4_udp_pay" + ], + "action": "check_no_hash", + }, + ], +} + +mac_vlan_ipv4_udp_l4dst = { + "sub_casename": "mac_vlan_ipv4_udp_l4dst", + "port_id": 0, + "rule": "flow create 0 ingress pattern eth / vlan / ipv4 / udp / end actions rss types ipv4-udp l4-dst-only end key_len 0 queues end / end", + "test": [ + { + "send_packet": mac_vlan_ipv4_udp_l4dst_packets["match"][ + "mac_vlan_ipv4_udp_pay" + ][0], + "action": {"save_hash": "mac_vlan_ipv4_udp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_udp_l4dst_packets["match"][ + "mac_vlan_ipv4_udp_pay" + ][1], + "action": {"check_hash_different": "mac_vlan_ipv4_udp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_udp_l4dst_packets["match"][ + "mac_vlan_ipv4_udp_pay" + ][2], + "action": {"check_hash_same": "mac_vlan_ipv4_udp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_udp_l4dst_packets["mismatch"], + "action": "check_no_hash", + }, + ], + "post-test": [ + { + "send_packet": mac_vlan_ipv4_udp_l4dst_packets["match"][ + "mac_vlan_ipv4_udp_pay" + ], + "action": "check_no_hash", + }, + ], +} + +mac_vlan_ipv4_udp_pay_list = [ + mac_vlan_ipv4_udp_pay, + mac_vlan_ipv4_udp_l3src, + mac_vlan_ipv4_udp_l4dst, +] + mac_vlan_ipv4_tcp_pay_packets = { "match": { "mac_vlan_ipv4_tcp_pay": [ @@ -544,6 +710,20 @@ mac_vlan_ipv4_tcp_pay_packets = { ], } +mac_vlan_ipv4_tcp_l3src_l4src_packets = { + "match": { + "mac_vlan_ipv4_tcp_pay": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/TCP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.3", dst="192.168.1.2")/TCP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.4")/TCP(sport=25,dport=99)/Raw("x" * 80)', + ] + }, + "mismatch": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/TCP(sport=25,dport=23)/Raw("x" * 80)', + ], +} + mac_vlan_ipv4_tcp_pay = { "sub_casename": "mac_vlan_ipv4_tcp_pay", "port_id": 0, @@ -582,6 +762,49 @@ mac_vlan_ipv4_tcp_pay = { ], } +mac_vlan_ipv4_tcp_l3src_l4src = { + "sub_casename": "mac_vlan_ipv4_tcp_l3src_l4src", + "port_id": 0, + "rule": "flow create 0 ingress pattern eth / vlan / ipv4 / tcp / end actions rss types ipv4-tcp l3-src-only l4-src-only end key_len 0 queues end / end", + "test": [ + { + "send_packet": mac_vlan_ipv4_tcp_l3src_l4src_packets["match"][ + "mac_vlan_ipv4_tcp_pay" + ][0], + "action": {"save_hash": "mac_vlan_ipv4_tcp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_tcp_l3src_l4src_packets["match"][ + "mac_vlan_ipv4_tcp_pay" + ][1], + "action": {"check_hash_different": "mac_vlan_ipv4_tcp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_tcp_l3src_l4src_packets["match"][ + "mac_vlan_ipv4_tcp_pay" + ][2], + "action": {"check_hash_same": "mac_vlan_ipv4_tcp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_tcp_l3src_l4src_packets["mismatch"], + "action": "check_no_hash", + }, + ], + "post-test": [ + { + "send_packet": mac_vlan_ipv4_tcp_l3src_l4src_packets["match"][ + "mac_vlan_ipv4_tcp_pay" + ], + "action": "check_no_hash", + }, + ], +} + +mac_vlan_ipv4_tcp_pay_list = [ + mac_vlan_ipv4_tcp_pay, + mac_vlan_ipv4_tcp_l3src_l4src, +] + mac_vlan_ipv4_sctp_pay_packets = { "match": { "mac_vlan_ipv4_sctp_pay": [ @@ -596,6 +819,23 @@ mac_vlan_ipv4_sctp_pay_packets = { ], } +mac_vlan_ipv4_sctp_all_packets = { + "match": { + "mac_vlan_ipv4_sctp_pay": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/SCTP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.3", dst="192.168.1.2")/SCTP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.4")/SCTP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/SCTP(sport=19,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/SCTP(sport=25,dport=99)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/SCTP(sport=25,dport=23)/Raw("x" * 80)', + ] + }, + "mismatch": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/SCTP(sport=25,dport=23)/Raw("x" * 80)', + ], +} + mac_vlan_ipv4_sctp_pay = { "sub_casename": "mac_vlan_ipv4_sctp_pay", "port_id": 0, @@ -634,6 +874,49 @@ mac_vlan_ipv4_sctp_pay = { ], } +mac_vlan_ipv4_sctp_all = { + "sub_casename": "mac_vlan_ipv4_sctp_all", + "port_id": 0, + "rule": "flow create 0 ingress pattern eth / vlan / ipv4 / sctp / end actions rss types ipv4-sctp end key_len 0 queues end / end", + "test": [ + { + "send_packet": mac_vlan_ipv4_sctp_all_packets["match"][ + "mac_vlan_ipv4_sctp_pay" + ][0], + "action": {"save_hash": "mac_vlan_ipv4_sctp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_sctp_all_packets["match"][ + "mac_vlan_ipv4_sctp_pay" + ][1:5], + "action": {"check_hash_different": "mac_vlan_ipv4_sctp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_sctp_all_packets["match"][ + "mac_vlan_ipv4_sctp_pay" + ][5], + "action": {"check_hash_same": "mac_vlan_ipv4_sctp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv4_sctp_all_packets["mismatch"], + "action": "check_no_hash", + }, + ], + "post-test": [ + { + "send_packet": mac_vlan_ipv4_sctp_all_packets["match"][ + "mac_vlan_ipv4_sctp_pay" + ], + "action": "check_no_hash", + }, + ], +} + +mac_vlan_ipv4_sctp_list = [ + mac_vlan_ipv4_sctp_pay, + mac_vlan_ipv4_sctp_all, +] + mac_vlan_ipv6_pay_packets = { "match": { "mac_vlan_ipv6_pay": [ @@ -647,6 +930,18 @@ mac_vlan_ipv6_pay_packets = { ], } +mac_vlan_ipv6_pay_l3src_packets = { + "match": { + "mac_vlan_ipv6_pay": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1537", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2023")/Raw("y" * 80)', + ] + }, + "mismatch": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/Raw("x" * 80)' + ], +} mac_vlan_ipv6_pay = { "sub_casename": "mac_vlan_ipv6_pay", "port_id": 0, @@ -677,6 +972,49 @@ mac_vlan_ipv6_pay = { ], } +mac_vlan_ipv6_pay_l3src = { + "sub_casename": "mac_vlan_ipv6_pay_l3src", + "port_id": 0, + "rule": "flow create 0 ingress pattern eth / vlan / ipv6 / end actions rss types ipv6 l3-src-only end key_len 0 queues end / end", + "test": [ + { + "send_packet": mac_vlan_ipv6_pay_l3src_packets["match"][ + "mac_vlan_ipv6_pay" + ][0], + "action": {"save_hash": "mac_vlan_ipv6_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_pay_l3src_packets["match"][ + "mac_vlan_ipv6_pay" + ][1], + "action": {"check_hash_different": "mac_vlan_ipv6_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_pay_l3src_packets["match"][ + "mac_vlan_ipv6_pay" + ][2], + "action": {"check_hash_same": "mac_vlan_ipv6_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_pay_l3src_packets["mismatch"], + "action": "check_no_hash", + }, + ], + "post-test": [ + { + "send_packet": mac_vlan_ipv6_pay_l3src_packets["match"][ + "mac_vlan_ipv6_pay" + ], + "action": "check_no_hash", + }, + ], +} + +mac_vlan_ipv6_pay_list = [ + mac_vlan_ipv6_pay, + mac_vlan_ipv6_pay_l3src, +] + mac_vlan_ipv6_udp_pay_packets = { "match": { "mac_vlan_ipv6_udp_pay": [ @@ -691,6 +1029,20 @@ mac_vlan_ipv6_udp_pay_packets = { ], } +mac_vlan_ipv6_udp_l4src_packets = { + "match": { + "mac_vlan_ipv6_udp_pay": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=19,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1537", dst="CDCD:910A:2222:5498:8475:1111:3900:2023")/UDP(sport=25,dport=99)/Raw("x" * 80)', + ] + }, + "mismatch": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/TCP(sport=25,dport=23)/Raw("x" * 80)', + ], +} + mac_vlan_ipv6_udp_pay = { "sub_casename": "mac_vlan_ipv6_udp_pay", "port_id": 0, @@ -729,6 +1081,49 @@ mac_vlan_ipv6_udp_pay = { ], } +mac_vlan_ipv6_udp_l4src = { + "sub_casename": "mac_vlan_ipv6_udp_l4src", + "port_id": 0, + "rule": "flow create 0 ingress pattern eth / vlan / ipv6 / udp / end actions rss types ipv6-udp l4-src-only end key_len 0 queues end / end", + "test": [ + { + "send_packet": mac_vlan_ipv6_udp_l4src_packets["match"][ + "mac_vlan_ipv6_udp_pay" + ][0], + "action": {"save_hash": "mac_vlan_ipv6_udp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_udp_l4src_packets["match"][ + "mac_vlan_ipv6_udp_pay" + ][1], + "action": {"check_hash_different": "mac_vlan_ipv6_udp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_udp_l4src_packets["match"][ + "mac_vlan_ipv6_udp_pay" + ][2], + "action": {"check_hash_same": "mac_vlan_ipv6_udp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_udp_l4src_packets["mismatch"], + "action": "check_no_hash", + }, + ], + "post-test": [ + { + "send_packet": mac_vlan_ipv6_udp_l4src_packets["match"][ + "mac_vlan_ipv6_udp_pay" + ], + "action": "check_no_hash", + }, + ], +} + +mac_vlan_ipv6_udp_pay_list = [ + mac_vlan_ipv6_udp_pay, + mac_vlan_ipv6_udp_l4src, +] + mac_vlan_ipv6_tcp_pay_packets = { "match": { "mac_vlan_ipv6_tcp_pay": [ @@ -743,6 +1138,20 @@ mac_vlan_ipv6_tcp_pay_packets = { ], } +mac_vlan_ipv6_tcp_l3dst_packets = { + "match": { + "mac_vlan_ipv6_tcp_pay": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/TCP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2023")/TCP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1537", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/TCP(sport=19,dport=99)/Raw("x" * 80)', + ] + }, + "mismatch": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/TCP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=25,dport=23)/Raw("x" * 80)', + ], +} + mac_vlan_ipv6_tcp_pay = { "sub_casename": "mac_vlan_ipv6_tcp_pay", "port_id": 0, @@ -781,6 +1190,49 @@ mac_vlan_ipv6_tcp_pay = { ], } +mac_vlan_ipv6_tcp_l3dst = { + "sub_casename": "mac_vlan_ipv6_tcp_l3dst", + "port_id": 0, + "rule": "flow create 0 ingress pattern eth / vlan / ipv6 / tcp / end actions rss types ipv6-tcp l3-dst-only end key_len 0 queues end / end", + "test": [ + { + "send_packet": mac_vlan_ipv6_tcp_l3dst_packets["match"][ + "mac_vlan_ipv6_tcp_pay" + ][0], + "action": {"save_hash": "mac_vlan_ipv6_tcp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_tcp_l3dst_packets["match"][ + "mac_vlan_ipv6_tcp_pay" + ][1], + "action": {"check_hash_different": "mac_vlan_ipv6_tcp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_tcp_l3dst_packets["match"][ + "mac_vlan_ipv6_tcp_pay" + ][2], + "action": {"check_hash_same": "mac_vlan_ipv6_tcp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_tcp_l3dst_packets["mismatch"], + "action": "check_no_hash", + }, + ], + "post-test": [ + { + "send_packet": mac_vlan_ipv6_tcp_l3dst_packets["match"][ + "mac_vlan_ipv6_tcp_pay" + ], + "action": "check_no_hash", + }, + ], +} + +mac_vlan_ipv6_tcp_pay_list = [ + mac_vlan_ipv6_tcp_pay, + mac_vlan_ipv6_tcp_l3dst, +] + mac_vlan_ipv6_sctp_pay_packets = { "match": { "mac_vlan_ipv6_sctp_pay": [ @@ -795,6 +1247,21 @@ mac_vlan_ipv6_sctp_pay_packets = { ], } +mac_vlan_ipv6_sctp_l3dst_l4dst_packets = { + "match": { + "mac_vlan_ipv6_sctp_pay": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/SCTP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2023")/SCTP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/SCTP(sport=25,dport=99)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:99", dst="00:11:22:33:44:53",type=0x8100)/Dot1Q(vlan=2,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1537", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/SCTP(sport=19,dport=23)/Raw("x" * 80)', + ] + }, + "mismatch": [ + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x0800)/IP(src="192.168.1.1", dst="192.168.1.2")/SCTP(sport=25,dport=23)/Raw("x" * 80)', + 'Ether(src="10:22:33:44:55:66", dst="00:11:22:33:44:55",type=0x8100)/Dot1Q(vlan=1,type=0x86dd)/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1536", dst="CDCD:910A:2222:5498:8475:1111:3900:2022")/UDP(sport=25,dport=23)/Raw("x" * 80)', + ], +} + mac_vlan_ipv6_sctp_pay = { "sub_casename": "mac_vlan_ipv6_sctp_pay", "port_id": 0, @@ -833,6 +1300,49 @@ mac_vlan_ipv6_sctp_pay = { ], } +mac_vlan_ipv6_sctp_l3dst_l4dst = { + "sub_casename": "mac_vlan_ipv6_sctp_l3dst_l4dst", + "port_id": 0, + "rule": "flow create 0 ingress pattern eth / vlan / ipv6 / sctp / end actions rss types ipv6-sctp l3-dst-only l4-dst-only end key_len 0 queues end / end", + "test": [ + { + "send_packet": mac_vlan_ipv6_sctp_l3dst_l4dst_packets["match"][ + "mac_vlan_ipv6_sctp_pay" + ][0], + "action": {"save_hash": "mac_vlan_ipv6_sctp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_sctp_l3dst_l4dst_packets["match"][ + "mac_vlan_ipv6_sctp_pay" + ][1:3], + "action": {"check_hash_different": "mac_vlan_ipv6_sctp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_sctp_l3dst_l4dst_packets["match"][ + "mac_vlan_ipv6_sctp_pay" + ][3], + "action": {"check_hash_same": "mac_vlan_ipv6_sctp_pay_match"}, + }, + { + "send_packet": mac_vlan_ipv6_sctp_l3dst_l4dst_packets["mismatch"], + "action": "check_no_hash", + }, + ], + "post-test": [ + { + "send_packet": mac_vlan_ipv6_sctp_l3dst_l4dst_packets["match"][ + "mac_vlan_ipv6_sctp_pay" + ], + "action": "check_no_hash", + }, + ], +} + +mac_vlan_ipv6_sctp_pay_list = [ + mac_vlan_ipv6_sctp_pay, + mac_vlan_ipv6_sctp_l3dst_l4dst, +] + class Advanced_rss_vlan_ah_l2tp_pfcp(TestCase): def set_up_all(self): @@ -1027,32 +1537,32 @@ class Advanced_rss_vlan_ah_l2tp_pfcp(TestCase): def test_mac_vlan_ipv4_pay(self): self.switch_testpmd(symmetric=False) - self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv4_pay) + self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv4_pay_list) def test_mac_vlan_ipv4_udp_pay(self): self.switch_testpmd(symmetric=False) - self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv4_udp_pay) + self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv4_udp_pay_list) def test_mac_vlan_ipv4_tcp_pay(self): self.switch_testpmd(symmetric=False) - self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv4_tcp_pay) + self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv4_tcp_pay_list) def test_mac_vlan_ipv4_sctp_pay(self): self.switch_testpmd(symmetric=False) - self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv4_sctp_pay) + self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv4_sctp_list) def test_mac_vlan_ipv6_pay(self): self.switch_testpmd(symmetric=False) - self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv6_pay) + self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv6_pay_list) def test_mac_vlan_ipv6_udp_pay(self): self.switch_testpmd(symmetric=False) - self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv6_udp_pay) + self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv6_udp_pay_list) def test_mac_vlan_ipv6_tcp_pay(self): self.switch_testpmd(symmetric=False) - self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv6_tcp_pay) + self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv6_tcp_pay_list) def test_mac_vlan_ipv6_sctp_pay(self): self.switch_testpmd(symmetric=False) - self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv6_sctp_pay) + self.rsspro.handle_rss_distribute_cases(cases_info=mac_vlan_ipv6_sctp_pay_list)