* [RFC v1 0/2] dts: initial checksum offload suite
@ 2024-08-12 13:39 Dean Marx
2024-08-12 13:39 ` [PATCH v1 1/2] dts: add csum HW offload to testpmd shell Dean Marx
2024-08-12 13:39 ` [PATCH v1 2/2] dts: checksum offload test suite Dean Marx
0 siblings, 2 replies; 7+ messages in thread
From: Dean Marx @ 2024-08-12 13:39 UTC (permalink / raw)
To: probb, npratte, jspewock, luca.vizzarro, yoan.picchi,
Honnappa.Nagarahalli, paul.szczepanek, juraj.linkes
Cc: dev, Dean Marx
Test suite for verifying checksum hardware offload through the
PMD works as expected. This is done by checking the verbose output in
testpmd while in csum forwarding mode, specifically the ol_flags
section, to ensure they match the flags in the test plan. However,
there are a few issues I noticed while writing the suite that made
me hesitant to submit a patch:
1. SCTP hardware offload is not supported on any of the NICs I tested
on. I've tried this on mlx5, i40e, and bnxt drivers and none of them
support it. SCTP offload is used as part of almost every test case, so I
removed SCTP packets from the suite entirely. I intend to keep it that
way unless anyone is able to use the command "csum set sctp hw 0"
without an "SCTP not supported" error.
2. There are two Tx checksum test cases, which involve checking the Tx
flags section of verbose output to ensure they match the ones in the
test plan. However, the Tx flags don't appear to change at all
depending on what packet you send to testpmd, which leaves me with no
way to verify correct behavior. I'm considering removing the Tx cases
entirely, but they are a large chunk of the suite so if anyone disagrees
I can look for more of a workaround.
If anyone has any comments or advice about the issues above it is
greatly appreciated.
Dean Marx (2):
dts: add csum HW offload to testpmd shell
dts: checksum offload test suite
dts/framework/config/conf_yaml_schema.json | 3 +-
dts/framework/remote_session/testpmd_shell.py | 94 ++++++
dts/tests/TestSuite_checksum_offload.py | 288 ++++++++++++++++++
3 files changed, 384 insertions(+), 1 deletion(-)
create mode 100644 dts/tests/TestSuite_checksum_offload.py
--
2.44.0
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH v1 1/2] dts: add csum HW offload to testpmd shell
2024-08-12 13:39 [RFC v1 0/2] dts: initial checksum offload suite Dean Marx
@ 2024-08-12 13:39 ` Dean Marx
2024-08-12 20:32 ` Nicholas Pratte
2024-08-12 13:39 ` [PATCH v1 2/2] dts: checksum offload test suite Dean Marx
1 sibling, 1 reply; 7+ messages in thread
From: Dean Marx @ 2024-08-12 13:39 UTC (permalink / raw)
To: probb, npratte, jspewock, luca.vizzarro, yoan.picchi,
Honnappa.Nagarahalli, paul.szczepanek, juraj.linkes
Cc: dev, Dean Marx
add csum_set_hw method to testpmd shell class. Port over
set_verbose and port start/stop from queue start/stop suite.
Signed-off-by: Dean Marx <dmarx@iol.unh.edu>
---
dts/framework/remote_session/testpmd_shell.py | 94 +++++++++++++++++++
1 file changed, 94 insertions(+)
diff --git a/dts/framework/remote_session/testpmd_shell.py b/dts/framework/remote_session/testpmd_shell.py
index 43e9f56517..be8fbdc295 100644
--- a/dts/framework/remote_session/testpmd_shell.py
+++ b/dts/framework/remote_session/testpmd_shell.py
@@ -806,6 +806,100 @@ def show_port_stats(self, port_id: int) -> TestPmdPortStats:
return TestPmdPortStats.parse(output)
+ def port_stop(self, port: int, verify: bool = True):
+ """Stop specified port.
+
+ Args:
+ port: Specifies the port number to use, must be between 0-32.
+ verify: If :data:`True`, the output of the command is scanned
+ to ensure specified port is stopped. If not, it is considered
+ an error.
+
+ Raises:
+ InteractiveCommandExecutionError: If `verify` is :data:`True` and the port
+ is not stopped."""
+ port_output = self.send_command(f"port stop {port}")
+ if verify:
+ if "Done" not in port_output:
+ self._logger.debug(f"Failed to stop port {port}: \n{port_output}")
+ raise InteractiveCommandExecutionError(f"Testpmd failed to stop port {port}.")
+
+ def port_start(self, port: int, verify: bool = True):
+ """Start specified port.
+
+ Args:
+ port: Specifies the port number to use, must be between 0-32.
+ verify: If :data:`True`, the output of the command is scanned
+ to ensure specified port is started. If not, it is considered
+ an error.
+
+ Raises:
+ InteractiveCommandExecutionError: If `verify` is :data:`True` and the port
+ is not started."""
+ port_output = self.send_command(f"port start {port}")
+ if verify:
+ if "Done" not in port_output:
+ self._logger.debug(f"Failed to start port {port}: \n{port_output}")
+ raise InteractiveCommandExecutionError(f"Testpmd failed to start port {port}.")
+
+ def csum_set_hw(self, layer: str, port_id: int, verify: bool = True) -> None:
+ """Enables hardware checksum offloading on the specified layer.
+
+ Args:
+ layer: The layer that checksum offloading should be enabled on.
+ options: tcp, ip, udp, sctp, outer-ip, outer-udp.
+ port_id: The port number to enable checksum offloading on, should be within 0-32.
+ verify: If :data:`True` the output of the command will be scanned in an attempt to
+ verify that checksum offloading was enabled on the port.
+
+ Raises:
+ InteractiveCommandExecutionError: If checksum offload is not enabled successfully.
+ """
+ csum_output = self.send_command(f"csum set {layer} hw {port_id}")
+ if (verify and ("Bad arguments" in csum_output or f"Please stop port {port_id} first")):
+ self._logger.debug(f"Failed to set csum hw mode on port {port_id}:\n{csum_output}")
+ raise InteractiveCommandExecutionError(
+ f"Failed to set csum hw mode on port {port_id}"
+ )
+ if verify and f"checksum offload is not supported by port {port_id}" in csum_output:
+ self._logger.debug(f"Checksum {layer} offload is not supported by port {port_id}:\n{csum_output}")
+
+ success = False
+ if "outer-ip" in layer:
+ if "Outer-Ip checksum offload is hw" in csum_output:
+ success = True
+ if "outer-udp" in layer:
+ if "Outer-Udp checksum offload is hw" in csum_output:
+ success = True
+ else:
+ if f"{layer.upper} checksum offload is hw" in csum_output:
+ success = True
+ if not success and verify:
+ self._logger.debug(f"Failed to set csum hw mode on port {port_id}:\n{csum_output}")
+
+ def set_verbose(self, level: int, verify: bool = True) -> None:
+ """Set debug verbosity level.
+
+ Args:
+ level: 0 - silent except for error
+ 1 - fully verbose except for Tx packets
+ 2 - fully verbose except for Rx packets
+ >2 - fully verbose
+ verify: if :data:`True` an additional command will be sent to verify that verbose level
+ is properly set. Defaults to :data:`True`.
+
+ Raises:
+ InteractiveCommandExecutionError: If `verify` is :data:`True` and verbose level
+ is not correctly set.
+ """
+ verbose_output = self.send_command(f"set verbose {level}")
+ if verify:
+ if "Change verbose level" not in verbose_output:
+ self._logger.debug(f"Failed to set verbose level to {level}: \n{verbose_output}")
+ raise InteractiveCommandExecutionError(
+ f"Testpmd failed to set verbose level to {level}."
+ )
+
def _close(self) -> None:
"""Overrides :meth:`~.interactive_shell.close`."""
self.stop()
--
2.44.0
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH v1 2/2] dts: checksum offload test suite
2024-08-12 13:39 [RFC v1 0/2] dts: initial checksum offload suite Dean Marx
2024-08-12 13:39 ` [PATCH v1 1/2] dts: add csum HW offload to testpmd shell Dean Marx
@ 2024-08-12 13:39 ` Dean Marx
1 sibling, 0 replies; 7+ messages in thread
From: Dean Marx @ 2024-08-12 13:39 UTC (permalink / raw)
To: probb, npratte, jspewock, luca.vizzarro, yoan.picchi,
Honnappa.Nagarahalli, paul.szczepanek, juraj.linkes
Cc: dev, Dean Marx
test suite for verifying layer 3/4 checksum offload
features on poll mode driver.
Depends-on: patch-142762
("dts: add text parser for testpmd verbose output")
Depends-on: patch-142691
("dts: add send_packets to test suites and rework packet addressing")
Signed-off-by: Dean Marx <dmarx@iol.unh.edu>
---
dts/framework/config/conf_yaml_schema.json | 3 +-
dts/framework/remote_session/testpmd_shell.py | 2 +-
dts/tests/TestSuite_checksum_offload.py | 288 ++++++++++++++++++
3 files changed, 291 insertions(+), 2 deletions(-)
create mode 100644 dts/tests/TestSuite_checksum_offload.py
diff --git a/dts/framework/config/conf_yaml_schema.json b/dts/framework/config/conf_yaml_schema.json
index f02a310bb5..a83a6786df 100644
--- a/dts/framework/config/conf_yaml_schema.json
+++ b/dts/framework/config/conf_yaml_schema.json
@@ -187,7 +187,8 @@
"enum": [
"hello_world",
"os_udp",
- "pmd_buffer_scatter"
+ "pmd_buffer_scatter",
+ "checksum_offload"
]
},
"test_target": {
diff --git a/dts/framework/remote_session/testpmd_shell.py b/dts/framework/remote_session/testpmd_shell.py
index be8fbdc295..01f378acc3 100644
--- a/dts/framework/remote_session/testpmd_shell.py
+++ b/dts/framework/remote_session/testpmd_shell.py
@@ -856,7 +856,7 @@ def csum_set_hw(self, layer: str, port_id: int, verify: bool = True) -> None:
InteractiveCommandExecutionError: If checksum offload is not enabled successfully.
"""
csum_output = self.send_command(f"csum set {layer} hw {port_id}")
- if (verify and ("Bad arguments" in csum_output or f"Please stop port {port_id} first")):
+ if (verify and ("Bad arguments" in csum_output or f"Please stop port {port_id} first" in csum_output)):
self._logger.debug(f"Failed to set csum hw mode on port {port_id}:\n{csum_output}")
raise InteractiveCommandExecutionError(
f"Failed to set csum hw mode on port {port_id}"
diff --git a/dts/tests/TestSuite_checksum_offload.py b/dts/tests/TestSuite_checksum_offload.py
new file mode 100644
index 0000000000..7ce5897c34
--- /dev/null
+++ b/dts/tests/TestSuite_checksum_offload.py
@@ -0,0 +1,288 @@
+# SPDX-License-Identifier: BSD-3-Clause
+# Copyright(c) 2024 University of New Hampshire
+
+"""DPDK checksum offload testing suite.
+
+This suite verifies L3/L4 checksum offload features of the Poll Mode Driver.
+On the Rx side, IPv4 and UDP/TCP checksum by hardware is checked to ensure
+checksum flags match expected flags. On the Tx side, IPv4/UDP, IPv4/TCP,
+IPv6/UDP, and IPv6/TCP insertion by hardware is checked to checksum flags
+match expected flags.
+
+"""
+
+from typing import List
+
+from scapy.all import Packet # type: ignore[import-untyped]
+from scapy.layers.inet import GRE, IP, TCP, UDP # type: ignore[import-untyped]
+from scapy.layers.inet6 import IPv6 # type: ignore[import-untyped]
+from scapy.layers.l2 import Dot1Q # type: ignore[import-untyped]
+from scapy.layers.l2 import Ether # type: ignore[import-untyped]
+from scapy.layers.vxlan import VXLAN # type: ignore[import-untyped]
+from scapy.packet import Raw # type: ignore[import-untyped]
+
+from framework.remote_session.testpmd_shell import (
+ SimpleForwardingModes,
+ TestPmdShell,
+ VerboseOLFlag,
+)
+from framework.test_suite import TestSuite
+
+
+class TestChecksumOffload(TestSuite):
+ """Checksum offload test suite.
+
+ This suite consists of 8 test cases:
+ 1. Insert checksum on transmit packet
+ 2. Do not insert checksum on transmit packet
+ 3. Validate Rx checksum valid flags
+ 4. Hardware checksum check L4 Rx
+ 5. Hardware checksum check L3 Rx
+ 6. Hardware checksum check L4 Tx
+ 7. Hardware checksum check L3 Tx
+ 8. Checksum offload with vlan
+
+ """
+
+ def set_up_suite(self) -> None:
+ """Set up the test suite.
+
+ Setup:
+ Verify that at least two port links are created when the
+ test run is initialized.
+ """
+ self.verify(len(self._port_links) > 1, "Not enough port links.")
+
+ def send_packet_and_verify(
+ self, packet_list: List[Packet], load: str, should_receive: bool
+ ) -> None:
+ """Send and verify packet is received on the traffic generator.
+
+ Args:
+ packet: Scapy packet to send and verify.
+ load: Raw layer load attribute in the sent packet.
+ should_receive: Indicates whether the packet should be received by the traffic generator.
+ """
+ for i in range(0, len(packet_list)):
+ received_packets = self.send_packet_and_capture(packet=packet_list[i])
+ received = any(
+ packet.haslayer(Raw) and load in str(packet.load) for packet in received_packets
+ )
+ self.verify(
+ received == should_receive,
+ f"Packet was {'dropped' if should_receive else 'received'}",
+ )
+
+ def send_packet_and_verify_checksum(
+ self, packet: Packet, goodL4: bool, goodIP: bool, testpmd: TestPmdShell
+ ) -> None:
+ """Send packet and verify verbose output matches expected output.
+
+ Args:
+ packet: Scapy packet to send to DUT.
+ goodL4: Verifies RTE_MBUF_F_RX_L4_CKSUM_GOOD in verbose output
+ if :data:`True`, or RTE_MBUF_F_RX_L4_CKSUM_UNKOWN if :data:`False`.
+ goodIP: Verifies RTE_MBUF_F_RX_IP_CKSUM_GOOD in verbose output
+ if :data:`True`, or RTE_MBUF_F_RX_IP_CKSUM_UNKOWN if :data:`False`.
+ testpmd: Testpmd shell session to analyze verbose output of.
+ """
+ testpmd.start()
+ self.send_packet_and_capture(packet=packet)
+ verbose_output = testpmd.extract_verbose_output(testpmd.stop())
+ isL4 = any(
+ VerboseOLFlag.RTE_MBUF_F_RX_L4_CKSUM_GOOD in packet.ol_flags
+ for index in verbose_output
+ for packet in index.packets
+ )
+ isIP = any(
+ VerboseOLFlag.RTE_MBUF_F_RX_IP_CKSUM_GOOD in packet.ol_flags
+ for index in verbose_output
+ for packet in index.packets
+ )
+ self.verify(isL4 == goodL4, "Layer 4 checksum flag did not match expected checksum flag.")
+ self.verify(isIP == goodIP, "IP checksum flag did not match expected checksum flag.")
+
+ def setup_hw_offload(self, testpmd: TestPmdShell) -> None:
+ """Sets IP, UDP, TCP, and SCTP layers to hardware offload."""
+ testpmd.port_stop(port=0)
+ testpmd.csum_set_hw(layer="ip", port_id=0)
+ testpmd.csum_set_hw(layer="udp", port_id=0)
+ testpmd.csum_set_hw(layer="tcp", port_id=0)
+ testpmd.port_start(port=0)
+
+ def test_insert_checksums(self) -> None:
+ """Enable checksum offload insertion and verify packet reception."""
+ packet_list = [
+ Ether() / IP() / UDP() / Raw("xxxxx"),
+ Ether() / IP() / TCP() / Raw("xxxxx"),
+ Ether() / IPv6(src="::1") / UDP() / Raw("xxxxx"),
+ Ether() / IPv6(src="::1") / TCP() / Raw("xxxxx"),
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ self.setup_hw_offload(testpmd=testpmd)
+ testpmd.start()
+ self.send_packet_and_verify(packet_list=packet_list, load="xxxxx", should_receive=True)
+ for i in range(0, len(packet_list)):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=True, testpmd=testpmd
+ )
+
+ def test_no_insert_checksums(self) -> None:
+ """Enable checksum offload insertion and verify packet reception."""
+ packet_list = [
+ Ether() / IP() / UDP() / Raw("xxxxx"),
+ Ether() / IP() / TCP() / Raw("xxxxx"),
+ Ether() / IPv6(src="::1") / UDP() / Raw("xxxxx"),
+ Ether() / IPv6(src="::1") / TCP() / Raw("xxxxx"),
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ testpmd.start()
+ self.send_packet_and_verify(packet_list=packet_list, load="xxxxx", should_receive=True)
+ for i in range(0, len(packet_list)):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=True, testpmd=testpmd
+ )
+
+ def test_validate_rx_checksum(self) -> None:
+ """Verify verbose output of Rx packets matches expected behavior."""
+ packet_list = [
+ Ether() / IP() / UDP(),
+ Ether() / IP() / TCP(),
+ Ether() / IPv6(src="::1") / UDP(),
+ Ether() / IPv6(src="::1") / TCP(),
+ Ether() / IP(chksum=0x0) / UDP(chksum=0xF),
+ Ether() / IP(chksum=0x0) / TCP(chksum=0xF),
+ Ether() / IPv6(src="::1") / UDP(chksum=0xF),
+ Ether() / IPv6(src="::1") / TCP(chksum=0xF),
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ self.setup_hw_offload(testpmd=testpmd)
+ for i in range(0, 4):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=True, testpmd=testpmd
+ )
+ for i in range(4, 6):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=False, goodIP=False, testpmd=testpmd
+ )
+ for i in range(6, 8):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=False, goodIP=True, testpmd=testpmd
+ )
+
+ def test_l4_rx_checksum(self) -> None:
+ """Tests L4 Rx checksum in a variety of scenarios."""
+ packet_list = [
+ Ether() / IP() / UDP(),
+ Ether() / IP() / TCP(),
+ Ether() / IP() / UDP(chksum=0xF),
+ Ether() / IP() / TCP(chksum=0xF),
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ self.setup_hw_offload(testpmd=testpmd)
+ for i in range(0, 2):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=True, testpmd=testpmd
+ )
+ for i in range(2, 4):
+ # Originally had False for goodIP in the test plan, but that doesn't logically make sense
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=False, goodIP=True, testpmd=testpmd
+ )
+
+ def test_l3_rx_checksum(self) -> None:
+ """Tests L3 Rx checksum hardware offload."""
+ packet_list = [
+ Ether() / IP() / UDP(),
+ Ether() / IP() / TCP(),
+ Ether() / IP(chksum=0xF) / UDP(),
+ Ether() / IP(chksum=0xF) / TCP(),
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ self.setup_hw_offload(testpmd=testpmd)
+ for i in range(0, 2):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=True, testpmd=testpmd
+ )
+ for i in range(2, 4):
+ # Originally had False for goodL4 in the test plan, but that doesn't logically make sense
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=False, testpmd=testpmd
+ )
+
+ def test_l4_tx_checksum(self) -> None:
+ """Tests L4 Tx checksum in a variety of scenarios."""
+ packet_list = [
+ Ether() / IP() / UDP(chksum=0xB161),
+ Ether() / IP() / UDP(chksum=0xF),
+ Ether() / IP() / TCP(chksum=0x4904),
+ Ether() / IP() / TCP(chksum=0xF),
+ Ether() / IPv6() / UDP(chksum=0xAF62),
+ Ether() / IPv6() / UDP(chksum=0xF),
+ Ether() / IPv6() / TCP(chksum=0x4705),
+ Ether() / IPv6() / TCP(chksum=0xF),
+ Ether() / IP() / UDP() / VXLAN() / Ether() / IP() / UDP(chksum=0x9949),
+ Ether() / IP() / UDP() / VXLAN() / Ether() / IP() / UDP(chksum=0xF),
+ Ether() / IP() / UDP(chksum=0xF) / VXLAN() / Ether() / IP() / UDP(),
+ Ether() / IP() / UDP(chksum=0xF) / VXLAN() / Ether() / IP() / UDP(chksum=0xF),
+ Ether() / IP() / UDP() / VXLAN() / Ether() / IP() / TCP(chksum=0x30EC),
+ Ether() / IP() / UDP() / VXLAN() / Ether() / IP() / TCP(chksum=0xF),
+ Ether() / IP() / UDP(chksum=0xF) / VXLAN() / Ether() / IP() / TCP(),
+ Ether() / IP() / UDP(chksum=0xF) / VXLAN() / Ether() / IP() / TCP(chksum=0xF),
+ Ether() / IPv6() / UDP() / VXLAN() / Ether() / IPv6() / UDP(chksum=0x9949),
+ Ether() / IPv6() / UDP() / VXLAN() / Ether() / IPv6() / UDP(chksum=0xF),
+ Ether() / IPv6() / UDP(chksum=0xF) / VXLAN() / Ether() / IPv6() / UDP(),
+ Ether() / IPv6() / UDP(chksum=0xF) / VXLAN() / Ether() / IPv6() / UDP(chksum=0xF),
+ Ether() / IPv6() / UDP() / VXLAN() / Ether() / IPv6() / TCP(chksum=0x30EC),
+ Ether() / IPv6() / UDP() / VXLAN() / Ether() / IPv6() / TCP(chksum=0xF),
+ Ether() / IPv6() / UDP(chksum=0xF) / VXLAN() / Ether() / IPv6() / TCP(),
+ Ether() / IPv6() / UDP(chksum=0xF) / VXLAN() / Ether() / IPv6() / TCP(chksum=0xF),
+ Ether() / IP() / GRE() / IP() / UDP(chksum=0x8131),
+ Ether() / IP() / GRE() / IP() / UDP(chksum=0xF),
+ Ether() / IP() / GRE() / IP() / TCP(chksum=0x18D4),
+ Ether() / IP() / GRE() / IP() / TCP(chksum=0xF),
+ Ether() / IPv6() / GRE() / IPv6() / UDP(chksum=0x8131),
+ Ether() / IPv6() / GRE() / IPv6() / UDP(chksum=0xF),
+ Ether() / IPv6() / GRE() / IPv6() / TCP(chksum=0x18D4),
+ Ether() / IPv6() / GRE() / IPv6() / TCP(chksum=0xF),
+ ]
+ """This test case is based on verifying Tx checksum flags in the testpmd verbose
+ output, but these flags seem to vary depending on the type of NIC being used."""
+
+ def test_l3_tx_checksum(self) -> None:
+ """Tests L3 Tx checksum hardware offload."""
+ packet_list = [Ether() / IP(chksum=0x7CCC) / TCP(), Ether() / IP(chksum=0xF) / TCP()]
+ """Another test based on verifying Tx checksum flags in verbose output."""
+
+ def test_vlan_checksum(self) -> None:
+ """Tests VLAN Rx checksum hardware offload and verify packet reception."""
+ packet_list = [
+ Ether() / Dot1Q(vlan=1) / IP(chksum=0x0) / UDP(chksum=0xF) / Raw("xxxxx"),
+ Ether() / Dot1Q(vlan=1) / IP(chksum=0x0) / TCP(chksum=0xF) / Raw("xxxxx"),
+ Ether() / Dot1Q(vlan=1) / IPv6(src="::1") / UDP(chksum=0xF) / Raw("xxxxx"),
+ Ether() / Dot1Q(vlan=1) / IPv6(src="::1") / TCP(chksum=0xF) / Raw("xxxxx"),
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ self.setup_hw_offload(testpmd=testpmd)
+ testpmd.start()
+ self.send_packet_and_verify(packet_list=packet_list, load="xxxxx", should_receive=True)
+ for i in range(0, 2):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=False, goodIP=False, testpmd=testpmd
+ )
+ for i in range(2, 4):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=False, goodIP=True, testpmd=testpmd
+ )
--
2.44.0
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH v1 1/2] dts: add csum HW offload to testpmd shell
2024-08-12 13:39 ` [PATCH v1 1/2] dts: add csum HW offload to testpmd shell Dean Marx
@ 2024-08-12 20:32 ` Nicholas Pratte
0 siblings, 0 replies; 7+ messages in thread
From: Nicholas Pratte @ 2024-08-12 20:32 UTC (permalink / raw)
To: Dean Marx
Cc: probb, jspewock, luca.vizzarro, yoan.picchi,
Honnappa.Nagarahalli, paul.szczepanek, juraj.linkes, dev
On Mon, Aug 12, 2024 at 9:39 AM Dean Marx <dmarx@iol.unh.edu> wrote:
>
> add csum_set_hw method to testpmd shell class. Port over
> set_verbose and port start/stop from queue start/stop suite.
>
> Signed-off-by: Dean Marx <dmarx@iol.unh.edu>
> ---
> dts/framework/remote_session/testpmd_shell.py | 94 +++++++++++++++++++
> 1 file changed, 94 insertions(+)
>
> diff --git a/dts/framework/remote_session/testpmd_shell.py b/dts/framework/remote_session/testpmd_shell.py
> index 43e9f56517..be8fbdc295 100644
> --- a/dts/framework/remote_session/testpmd_shell.py
> +++ b/dts/framework/remote_session/testpmd_shell.py
> @@ -806,6 +806,100 @@ def show_port_stats(self, port_id: int) -> TestPmdPortStats:
>
> return TestPmdPortStats.parse(output)
>
> + def port_stop(self, port: int, verify: bool = True):
> + """Stop specified port.
> +
> + Args:
> + port: Specifies the port number to use, must be between 0-32.
> + verify: If :data:`True`, the output of the command is scanned
> + to ensure specified port is stopped. If not, it is considered
> + an error.
> +
> + Raises:
> + InteractiveCommandExecutionError: If `verify` is :data:`True` and the port
> + is not stopped."""
> + port_output = self.send_command(f"port stop {port}")
> + if verify:
> + if "Done" not in port_output:
> + self._logger.debug(f"Failed to stop port {port}: \n{port_output}")
> + raise InteractiveCommandExecutionError(f"Testpmd failed to stop port {port}.")
> +
> + def port_start(self, port: int, verify: bool = True):
> + """Start specified port.
> +
> + Args:
> + port: Specifies the port number to use, must be between 0-32.
> + verify: If :data:`True`, the output of the command is scanned
> + to ensure specified port is started. If not, it is considered
> + an error.
> +
> + Raises:
> + InteractiveCommandExecutionError: If `verify` is :data:`True` and the port
> + is not started."""
> + port_output = self.send_command(f"port start {port}")
> + if verify:
> + if "Done" not in port_output:
> + self._logger.debug(f"Failed to start port {port}: \n{port_output}")
> + raise InteractiveCommandExecutionError(f"Testpmd failed to start port {port}.")
> +
> + def csum_set_hw(self, layer: str, port_id: int, verify: bool = True) -> None:
> + """Enables hardware checksum offloading on the specified layer.
> +
> + Args:
> + layer: The layer that checksum offloading should be enabled on.
> + options: tcp, ip, udp, sctp, outer-ip, outer-udp.
> + port_id: The port number to enable checksum offloading on, should be within 0-32.
> + verify: If :data:`True` the output of the command will be scanned in an attempt to
> + verify that checksum offloading was enabled on the port.
I ran into a similar situation with the VLAN offload set command which
requires a string input much like that of the 'layer' parameter here.
While this would technically work, it might be best to create some
kind of type class (or even Flags if at all possible) so that users
can select from a more rigorous list of options when writing test
suites.
For example, instead of passing a string into the method, you have the
user pass in something like csum_set_hw(LayerTypes.ip, port_id = 0)
where 'LayerTypes' is some kind of Flag or user-defined type class.
It's really just a preference, but I do think it makes for more
concise code.
> +
> + Raises:
> + InteractiveCommandExecutionError: If checksum offload is not enabled successfully.
> + """
> + csum_output = self.send_command(f"csum set {layer} hw {port_id}")
> + if (verify and ("Bad arguments" in csum_output or f"Please stop port {port_id} first")):
> + self._logger.debug(f"Failed to set csum hw mode on port {port_id}:\n{csum_output}")
> + raise InteractiveCommandExecutionError(
> + f"Failed to set csum hw mode on port {port_id}"
> + )
> + if verify and f"checksum offload is not supported by port {port_id}" in csum_output:
> + self._logger.debug(f"Checksum {layer} offload is not supported by port {port_id}:\n{csum_output}")
> +
> + success = False
> + if "outer-ip" in layer:
> + if "Outer-Ip checksum offload is hw" in csum_output:
> + success = True
> + if "outer-udp" in layer:
> + if "Outer-Udp checksum offload is hw" in csum_output:
> + success = True
> + else:
> + if f"{layer.upper} checksum offload is hw" in csum_output:
> + success = True
> + if not success and verify:
> + self._logger.debug(f"Failed to set csum hw mode on port {port_id}:\n{csum_output}")
> +
> + def set_verbose(self, level: int, verify: bool = True) -> None:
> + """Set debug verbosity level.
> +
> + Args:
> + level: 0 - silent except for error
> + 1 - fully verbose except for Tx packets
> + 2 - fully verbose except for Rx packets
> + >2 - fully verbose
> + verify: if :data:`True` an additional command will be sent to verify that verbose level
> + is properly set. Defaults to :data:`True`.
> +
> + Raises:
> + InteractiveCommandExecutionError: If `verify` is :data:`True` and verbose level
> + is not correctly set.
> + """
> + verbose_output = self.send_command(f"set verbose {level}")
> + if verify:
> + if "Change verbose level" not in verbose_output:
> + self._logger.debug(f"Failed to set verbose level to {level}: \n{verbose_output}")
> + raise InteractiveCommandExecutionError(
> + f"Testpmd failed to set verbose level to {level}."
> + )
> +
> def _close(self) -> None:
> """Overrides :meth:`~.interactive_shell.close`."""
> self.stop()
> --
> 2.44.0
>
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH v1 2/2] dts: checksum offload test suite
2024-08-19 14:28 ` Alex Chapman
@ 2024-08-19 17:01 ` Dean Marx
0 siblings, 0 replies; 7+ messages in thread
From: Dean Marx @ 2024-08-19 17:01 UTC (permalink / raw)
To: Alex Chapman
Cc: probb, npratte, jspewock, luca.vizzarro, yoan.picchi,
Honnappa.Nagarahalli, paul.szczepanek, juraj.linkes, dev
[-- Attachment #1: Type: text/plain, Size: 1633 bytes --]
>
> <snip>
> > + def send_packet_and_verify(
>
> Should this not be `send_packets_and_verify(` as the argument is
> `packet_list`.
>
Yeah that would definitely make more sense, I'll change that in the next
version.
> <snip>
> > + isL4 = any(
> > + VerboseOLFlag.RTE_MBUF_F_RX_L4_CKSUM_GOOD in packet.ol_flags
> > + for index in verbose_output
> > + for packet in index.packets
> > + )
>
> How does this filter out noise packets with valid checksums?
>
It really doesn't right now, I was considering using another verbose output
parameter to verify the packet matches the one that is sent, but I hadn't
included it yet since I wasn't sure which would be best. I feel as though
either length or src_mac would be the easiest to use, but if you or anyone
else has a better idea let me know and I'll incorporate it.
>
> > + isIP = any(
> > + VerboseOLFlag.RTE_MBUF_F_RX_IP_CKSUM_GOOD in packet.ol_flags
> > + for index in verbose_output
> > + for packet in index.packets
> > + )
>
>
> I also noticed there was no implementation of IPv6/SCTP. Although the
> old test suite did not include IPv6/SCTP, would it be worth adding it to
> the new test suite?
> It was included in the test plan, but never implemented for some reason.
>
>
I'm assuming you mean SCTP/IPv6 checksums, which I didn't see in any
verbose output on any NIC I had access to so I just left it out. I was
assuming that was the same reason they left it out of the old suite, as
this included the i40e driver, and testpmd only ever displayed IP, L4, and
outer checksums.
[-- Attachment #2: Type: text/html, Size: 2381 bytes --]
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH v1 2/2] dts: checksum offload test suite
2024-08-16 14:20 ` [PATCH v1 2/2] dts: checksum offload test suite Dean Marx
@ 2024-08-19 14:28 ` Alex Chapman
2024-08-19 17:01 ` Dean Marx
0 siblings, 1 reply; 7+ messages in thread
From: Alex Chapman @ 2024-08-19 14:28 UTC (permalink / raw)
To: Dean Marx, probb, npratte, jspewock, luca.vizzarro, yoan.picchi,
Honnappa.Nagarahalli, paul.szczepanek, juraj.linkes
Cc: dev
Hi Dean,
Just though I would point out a few things.
On 8/16/24 15:20, Dean Marx wrote:
<snip>
> + def send_packet_and_verify(
Should this not be `send_packets_and_verify(` as the argument is
`packet_list`.
<snip>
> + isL4 = any(
> + VerboseOLFlag.RTE_MBUF_F_RX_L4_CKSUM_GOOD in packet.ol_flags
> + for index in verbose_output
> + for packet in index.packets
> + )
How does this filter out noise packets with valid checksums?
> + isIP = any(
> + VerboseOLFlag.RTE_MBUF_F_RX_IP_CKSUM_GOOD in packet.ol_flags
> + for index in verbose_output
> + for packet in index.packets
> + )
As above
I also noticed there was no implementation of IPv6/SCTP. Although the
old test suite did not include IPv6/SCTP, would it be worth adding it to
the new test suite?
It was included in the test plan, but never implemented for some reason.
Best regards,
Alex
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH v1 2/2] dts: checksum offload test suite
2024-08-16 14:20 [PATCH v1 0/2] dts: port over checksum offload suite Dean Marx
@ 2024-08-16 14:20 ` Dean Marx
2024-08-19 14:28 ` Alex Chapman
0 siblings, 1 reply; 7+ messages in thread
From: Dean Marx @ 2024-08-16 14:20 UTC (permalink / raw)
To: probb, npratte, jspewock, luca.vizzarro, yoan.picchi,
Honnappa.Nagarahalli, paul.szczepanek, juraj.linkes
Cc: dev, Dean Marx
test suite for verifying layer 3/4 checksum offload
features on poll mode driver.
Depends-on: patch-143033
("dts: add text parser for testpmd verbose output")
Depends-on: patch-142691
("dts: add send_packets to test suites and rework packet addressing")
Signed-off-by: Dean Marx <dmarx@iol.unh.edu>
---
dts/tests/TestSuite_checksum_offload.py | 255 ++++++++++++++++++++++++
1 file changed, 255 insertions(+)
create mode 100644 dts/tests/TestSuite_checksum_offload.py
diff --git a/dts/tests/TestSuite_checksum_offload.py b/dts/tests/TestSuite_checksum_offload.py
new file mode 100644
index 0000000000..b327261ff3
--- /dev/null
+++ b/dts/tests/TestSuite_checksum_offload.py
@@ -0,0 +1,255 @@
+# SPDX-License-Identifier: BSD-3-Clause
+# Copyright(c) 2024 University of New Hampshire
+
+"""DPDK checksum offload testing suite.
+
+This suite verifies L3/L4 checksum offload features of the Poll Mode Driver.
+On the Rx side, IPv4 and UDP/TCP checksum by hardware is checked to ensure
+checksum flags match expected flags. On the Tx side, IPv4/UDP, IPv4/TCP,
+IPv6/UDP, and IPv6/TCP insertion by hardware is checked to checksum flags
+match expected flags.
+
+"""
+
+from typing import List
+
+from scapy.all import Packet # type: ignore[import-untyped]
+from scapy.layers.inet import IP, TCP, UDP # type: ignore[import-untyped]
+from scapy.layers.inet6 import IPv6 # type: ignore[import-untyped]
+from scapy.layers.sctp import SCTP # type: ignore[import-untyped]
+from scapy.layers.l2 import Dot1Q # type: ignore[import-untyped]
+from scapy.layers.l2 import Ether
+from scapy.packet import Raw # type: ignore[import-untyped]
+
+from framework.remote_session.testpmd_shell import (
+ SimpleForwardingModes,
+ TestPmdShell,
+ VerboseOLFlag,
+ ChecksumOffloadOptions
+)
+from framework.test_suite import TestSuite
+
+
+class TestChecksumOffload(TestSuite):
+ """Checksum offload test suite.
+
+ This suite consists of 8 test cases:
+ 1. Insert checksum on transmit packet
+ 2. Do not insert checksum on transmit packet
+ 3. Validate Rx checksum valid flags
+ 4. Hardware checksum check L4 Rx
+ 5. Hardware checksum check L3 Rx
+ 6. Checksum offload with vlan
+
+ """
+
+ def set_up_suite(self) -> None:
+ """Set up the test suite.
+
+ Setup:
+ Verify that at least two port links are created when the
+ test run is initialized.
+ """
+ self.verify(len(self._port_links) > 1, "Not enough port links.")
+
+ def send_packet_and_verify(
+ self, packet_list: List[Packet], load: str, should_receive: bool
+ ) -> None:
+ """Send and verify packet is received on the traffic generator.
+
+ Args:
+ packet_list: list of Scapy packets to send and verify.
+ load: Raw layer load attribute in the sent packet.
+ should_receive: Indicates whether the packet should be received
+ by the traffic generator.
+ """
+ for i in range(0, len(packet_list)):
+ received_packets = self.send_packet_and_capture(packet=packet_list[i])
+ received = any(
+ packet.haslayer(Raw) and load in str(packet.load) for packet in received_packets
+ )
+ self.verify(
+ received == should_receive,
+ f"Packet was {'dropped' if should_receive else 'received'}",
+ )
+
+ def send_packet_and_verify_checksum(
+ self, packet: Packet, goodL4: bool, goodIP: bool, testpmd: TestPmdShell
+ ) -> None:
+ """Send packet and verify verbose output matches expected output.
+
+ Args:
+ packet: Scapy packet to send to DUT.
+ goodL4: Verifies RTE_MBUF_F_RX_L4_CKSUM_GOOD in verbose output
+ if :data:`True`, or RTE_MBUF_F_RX_L4_CKSUM_UNKNOWN if :data:`False`.
+ goodIP: Verifies RTE_MBUF_F_RX_IP_CKSUM_GOOD in verbose output
+ if :data:`True`, or RTE_MBUF_F_RX_IP_CKSUM_UNKNOWN if :data:`False`.
+ testpmd: Testpmd shell session to analyze verbose output of.
+ """
+ testpmd.start()
+ self.send_packet_and_capture(packet=packet)
+ verbose_output = testpmd.extract_verbose_output(testpmd.stop())
+ isL4 = any(
+ VerboseOLFlag.RTE_MBUF_F_RX_L4_CKSUM_GOOD in packet.ol_flags
+ for index in verbose_output
+ for packet in index.packets
+ )
+ isIP = any(
+ VerboseOLFlag.RTE_MBUF_F_RX_IP_CKSUM_GOOD in packet.ol_flags
+ for index in verbose_output
+ for packet in index.packets
+ )
+ self.verify(isL4 == goodL4, "Layer 4 checksum flag did not match expected checksum flag.")
+ self.verify(isIP == goodIP, "IP checksum flag did not match expected checksum flag.")
+
+ def setup_hw_offload(self, testpmd: TestPmdShell) -> None:
+ """Sets IP, UDP, TCP, and SCTP layers to hardware offload."""
+ testpmd.port_stop(port=0)
+ testpmd.csum_set_hw(layer=ChecksumOffloadOptions.ip, port_id=0)
+ testpmd.csum_set_hw(layer=ChecksumOffloadOptions.udp, port_id=0)
+ testpmd.csum_set_hw(layer=ChecksumOffloadOptions.tcp, port_id=0)
+ testpmd.csum_set_hw(layer=ChecksumOffloadOptions.sctp, port_id=0)
+ testpmd.port_start(port=0)
+
+ def test_insert_checksums(self) -> None:
+ """Enable checksum offload insertion and verify packet reception."""
+ payload = "xxxxx"
+ packet_list = [
+ Ether() / IP() / UDP() / Raw(payload),
+ Ether() / IP() / TCP() / Raw(payload),
+ Ether() / IP() / SCTP() / Raw(payload),
+ Ether() / IPv6(src="::1") / UDP() / Raw(payload),
+ Ether() / IPv6(src="::1") / TCP() / Raw(payload),
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ self.setup_hw_offload(testpmd=testpmd)
+ testpmd.start()
+ self.send_packet_and_verify(packet_list=packet_list, load=payload, should_receive=True)
+ for i in range(0, len(packet_list)):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=True, testpmd=testpmd
+ )
+
+ def test_no_insert_checksums(self) -> None:
+ """Enable checksum offload insertion and verify packet reception."""
+ payload = "xxxxx"
+ packet_list = [
+ Ether() / IP() / UDP() / Raw(payload),
+ Ether() / IP() / TCP() / Raw(payload),
+ Ether() / IP() / SCTP() / Raw(payload),
+ Ether() / IPv6(src="::1") / UDP() / Raw(payload),
+ Ether() / IPv6(src="::1") / TCP() / Raw(payload),
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ testpmd.start()
+ self.send_packet_and_verify(packet_list=packet_list, load=payload, should_receive=True)
+ for i in range(0, len(packet_list)):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=True, testpmd=testpmd
+ )
+
+ def test_validate_rx_checksum(self) -> None:
+ """Verify verbose output of Rx packets matches expected behavior."""
+ packet_list = [
+ Ether() / IP() / UDP(),
+ Ether() / IP() / TCP(),
+ Ether() / IP() / SCTP(),
+ Ether() / IPv6(src="::1") / UDP(),
+ Ether() / IPv6(src="::1") / TCP(),
+ Ether() / IP(chksum=0x0) / UDP(chksum=0xF),
+ Ether() / IP(chksum=0x0) / TCP(chksum=0xF),
+ Ether() / IP(chksum=0x0) / SCTP(chksum=0xf),
+ Ether() / IPv6(src="::1") / UDP(chksum=0xF),
+ Ether() / IPv6(src="::1") / TCP(chksum=0xF),
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ self.setup_hw_offload(testpmd=testpmd)
+ for i in range(0, 5):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=True, testpmd=testpmd
+ )
+ for i in range(5, 8):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=False, goodIP=False, testpmd=testpmd
+ )
+ for i in range(8, 10):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=False, goodIP=True, testpmd=testpmd
+ )
+
+ def test_l4_rx_checksum(self) -> None:
+ """Tests L4 Rx checksum in a variety of scenarios."""
+ packet_list = [
+ Ether() / IP() / UDP(),
+ Ether() / IP() / TCP(),
+ Ether() / IP() / SCTP(),
+ Ether() / IP() / UDP(chksum=0xF),
+ Ether() / IP() / TCP(chksum=0xF),
+ Ether() / IP() / SCTP(chksum=0xf)
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ self.setup_hw_offload(testpmd=testpmd)
+ for i in range(0, 3):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=True, testpmd=testpmd
+ )
+ for i in range(3, 6):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=False, goodIP=True, testpmd=testpmd
+ )
+
+ def test_l3_rx_checksum(self) -> None:
+ """Tests L3 Rx checksum hardware offload."""
+ packet_list = [
+ Ether() / IP() / UDP(),
+ Ether() / IP() / TCP(),
+ Ether() / IP() / SCTP(),
+ Ether() / IP(chksum=0xF) / UDP(),
+ Ether() / IP(chksum=0xF) / TCP(),
+ Ether() / IP(chksum=0xf) / SCTP()
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ self.setup_hw_offload(testpmd=testpmd)
+ for i in range(0, 3):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=True, testpmd=testpmd
+ )
+ for i in range(3, 6):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=True, goodIP=False, testpmd=testpmd
+ )
+
+ def test_vlan_checksum(self) -> None:
+ """Tests VLAN Rx checksum hardware offload and verify packet reception."""
+ payload = "xxxxx"
+ packet_list = [
+ Ether() / Dot1Q(vlan=1) / IP(chksum=0x0) / UDP(chksum=0xF) / Raw(payload),
+ Ether() / Dot1Q(vlan=1) / IP(chksum=0x0) / TCP(chksum=0xF) / Raw(payload),
+ Ether() / Dot1Q(vlan=1) / IP(chksum=0x0) / SCTP(chksum=0x0) / Raw(payload),
+ Ether() / Dot1Q(vlan=1) / IPv6(src="::1") / UDP(chksum=0xF) / Raw(payload),
+ Ether() / Dot1Q(vlan=1) / IPv6(src="::1") / TCP(chksum=0xF) / Raw(payload),
+ ]
+ with TestPmdShell(node=self.sut_node, enable_rx_cksum=True) as testpmd:
+ testpmd.set_forward_mode(SimpleForwardingModes.csum)
+ testpmd.set_verbose(level=1)
+ self.setup_hw_offload(testpmd=testpmd)
+ testpmd.start()
+ self.send_packet_and_verify(packet_list=packet_list, load=payload, should_receive=True)
+ for i in range(0, 3):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=False, goodIP=False, testpmd=testpmd
+ )
+ for i in range(3, 5):
+ self.send_packet_and_verify_checksum(
+ packet=packet_list[i], goodL4=False, goodIP=True, testpmd=testpmd
+ )
--
2.44.0
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2024-08-19 17:01 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2024-08-12 13:39 [RFC v1 0/2] dts: initial checksum offload suite Dean Marx
2024-08-12 13:39 ` [PATCH v1 1/2] dts: add csum HW offload to testpmd shell Dean Marx
2024-08-12 20:32 ` Nicholas Pratte
2024-08-12 13:39 ` [PATCH v1 2/2] dts: checksum offload test suite Dean Marx
2024-08-16 14:20 [PATCH v1 0/2] dts: port over checksum offload suite Dean Marx
2024-08-16 14:20 ` [PATCH v1 2/2] dts: checksum offload test suite Dean Marx
2024-08-19 14:28 ` Alex Chapman
2024-08-19 17:01 ` Dean Marx
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).