From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id B3282A04F9; Thu, 9 Jan 2020 07:01:48 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 3CF361DB84; Thu, 9 Jan 2020 07:01:48 +0100 (CET) Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by dpdk.org (Postfix) with ESMTP id E467A1DB7E for ; Thu, 9 Jan 2020 07:01:45 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 08 Jan 2020 22:01:45 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.69,412,1571727600"; d="scan'208";a="254482948" Received: from unknown (HELO dpdk-wenjielx-dtspatch135.sh.intel.com) ([10.240.176.135]) by fmsmga002.fm.intel.com with ESMTP; 08 Jan 2020 22:01:43 -0800 From: Haiyang Zhao To: dts@dpdk.org Cc: Haiyang Zhao Date: Thu, 9 Jan 2020 14:05:10 +0800 Message-Id: <1578549916-14350-2-git-send-email-haiyangx.zhao@intel.com> X-Mailer: git-send-email 1.9.3 In-Reply-To: <1578549916-14350-1-git-send-email-haiyangx.zhao@intel.com> References: <1578549916-14350-1-git-send-email-haiyangx.zhao@intel.com> MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Subject: [dts] [PATCH V1 2/8] test_plans/cvl_advanced_rss_test_plan:fix build warnings and errors X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" Signed-off-by: Haiyang Zhao --- test_plans/cvl_advanced_rss_test_plan.rst | 377 ++++++++++++++++++------------ 1 file changed, 230 insertions(+), 147 deletions(-) diff --git a/test_plans/cvl_advanced_rss_test_plan.rst b/test_plans/cvl_advanced_rss_test_plan.rst index e15daac..8a9af1b 100644 --- a/test_plans/cvl_advanced_rss_test_plan.rst +++ b/test_plans/cvl_advanced_rss_test_plan.rst @@ -48,113 +48,113 @@ Pattern and input set --------------------- Table 1: - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | Default hash function: Non Symmetric_toeplitz | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | Default hash function: Non Symmetric_toeplitz | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | Packet Type | Pattern | Input Set | + +===============================+====================================+=================================================================================+ + | IPv4/IPv6 + TCP/UDP/SCTP/ICMP | MAC_IPV4_SRC_ONLY |[Dest MAC],[Source IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_DST_ONLY_FRAG |[Dest MAC],[Dest IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_PAY |[Dest MAC],[Source IP], [Dest IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_SRC_ICMP |[Dest MAC],[Source IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_DST_ICMP |[Dest MAC],[Source IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_UDP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_UDP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_TCP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_TCP_L3DST_L4SRC |[Dest MAC],[Dest IP],[Source Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_TCP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_SCTP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_SCTP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_NVGRE_ICMP |[Inner Source IP], [Inner Dest IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_NVGRE_L3SRC_ICMP |[Inner MAC][Inner Source IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_NVGRE_L3DST_ICMP |[Inner MAC][Inner Dest IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_NVGRE_TCP |[Inner Source IP], [Inner Dest IP],[Inner Source Port], [Inner Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_NVGRE_SCTP |[Inner Source IP], [Inner Dest IP],[Inner Source Port], [Inner Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_VXLAN_ICMP |[Inner Source IP], [Inner Dest IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_VXLAN_L3SRC_ICMP |[Inner MAC][Inner Source IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_VXLAN_L3DST_ICMP |[Inner MAC][Inner Dest IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_VXLAN_TCP |[Inner Source IP], [Inner Dest IP],[Inner Source Port], [Inner Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_VXLAN_SCTP |[Inner Source IP], [Inner Dest IP],[Inner Source Port], [Inner Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_VXLAN_UDP |[Inner Source IP], [Inner Dest IP],[Inner Source Port], [Inner Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV6_SRC_ONLY |[Dest MAC],[Source IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV6_DST_ONLY_FRAG |[Dest MAC],[Dest IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV6_PAY |[Dest MAC],[Source IP], [Dest IP], | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV6_UDP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV6_TCP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV6_SCTP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_PPPOE_PPPOD |[Dest MAC],[Session ID],[Proto] ,[Source IP] ,[Dest IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_PPPOE_TCP |[Dest MAC],[Session ID],[Proto],[Source IP],[Dest IP],[Source Port],[Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_PPPOE_UDP |[Dest MAC],[Session ID],[Proto],[Source IP],[Dest IP],[Source Port],[Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_PPPOE_TCP |[Dest MAC],[Session ID],[Proto],[Source IP],[Dest IP],[Source Port],[Dest Port] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_PPPOE_ICMP |[Dest MAC],[Session ID],[Proto],[Source IP],[Dest IP] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_GTP | [TEID] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + | | MAC_IPV4_GTPU_IPV4_TCP | [TEID] | + +-------------------------------+------------------------------------+---------------------------------------------------------------------------------+ + +Table 2: + +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ + | Hash function: Symmetric_toeplitz | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ | Packet Type | Pattern | Input Set | +===============================+====================================+===============================================================================+ - | IPv4/IPv6 + TCP/UDP/SCTP/ICMP | MAC_IPV4_SRC_ONLY |[Dest MAC],[Source IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_DST_ONLY_FRAG |[Dest MAC],[Dest IP] | + | IPV4/IPV6 | MAC_IPV4_SRC_ONLY |[Dest MAC],[Source IP] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_PAY |[Dest MAC],[Source IP], [Dest IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_SRC_ICMP |[Dest MAC],[Source IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_DST_ICMP |[Dest MAC],[Source IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_UDP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_UDP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_TCP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_TCP_L3DST_L4SRC |[Dest MAC],[Dest IP],[Source Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_TCP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_SCTP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_SCTP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_NVGRE_ICMP |[Inner Source IP], [Inner Dest IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_NVGRE_L3SRC_ICMP |[Inner MAC][Inner Source IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_NVGRE_L3DST_ICMP |[Inner MAC][Inner Dest IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_NVGRE_TCP |[Inner Source IP], [Inner Dest IP],[Inner Source Port], [Inner Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_NVGRE_SCTP |[Inner Source IP], [Inner Dest IP],[Inner Source Port], [Inner Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_VXLAN_ICMP |[Inner Source IP], [Inner Dest IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_VXLAN_L3SRC_ICMP |[Inner MAC][Inner Source IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_VXLAN_L3DST_ICMP |[Inner MAC][Inner Dest IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_VXLAN_TCP |[Inner Source IP], [Inner Dest IP],[Inner Source Port], [Inner Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_VXLAN_SCTP |[Inner Source IP], [Inner Dest IP],[Inner Source Port], [Inner Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_VXLAN_UDP |[Inner Source IP], [Inner Dest IP],[Inner Source Port], [Inner Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_SRC_ONLY |[Dest MAC],[Source IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_DST_ONLY_FRAG |[Dest MAC],[Dest IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_PAY |[Dest MAC],[Source IP], [Dest IP], | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_UDP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_TCP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_SCTP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_PPPOE_PPPOD |[Dest MAC],[Session ID],[Proto] ,[Source IP] ,[Dest IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_PPPOE_TCP |[Dest MAC],[Session ID],[Proto],[Source IP],[Dest IP],[Source Port],[Dest Port]| - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_PPPOE_UDP |[Dest MAC],[Session ID],[Proto],[Source IP],[Dest IP],[Source Port],[Dest Port]| - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_PPPOE_TCP |[Dest MAC],[Session ID],[Proto],[Source IP],[Dest IP],[Source Port],[Dest Port]| - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_PPPOE_ICMP |[Dest MAC],[Session ID],[Proto],[Source IP],[Dest IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_GTP | [TEID] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_GTPU_IPV4_TCP | [TEID] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - -Table 2: - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | Hash function: Symmetric_toeplitz | + | | MAC_IPV4_DST_ONLY_FRAG |[Dest MAC],[Dest IP] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | Packet Type | Pattern | Input Set | - +===============================+====================================+===============================================================================+ - | IPV4/IPV6 | MAC_IPV4_SRC_ONLY |[Dest MAC],[Source IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_DST_ONLY_FRAG |[Dest MAC],[Dest IP] | - +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_PAY |[Dest MAC],[Source IP], [Dest IP] | + | | MAC_IPV4_PAY |[Dest MAC],[Source IP], [Dest IP] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_SRC_ICMP |[Dest MAC],[Source IP] | + | | MAC_IPV4_SRC_ICMP |[Dest MAC],[Source IP] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_DST_ICMP |[Dest MAC],[Source IP] | + | | MAC_IPV4_DST_ICMP |[Dest MAC],[Source IP] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_UDP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | + | | MAC_IPV4_UDP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_UDP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + | | MAC_IPV4_UDP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_TCP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | + | | MAC_IPV4_TCP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_TCP_L3DST_L4SRC |[Dest MAC],[Dest IP],[Source Port] | + | | MAC_IPV4_TCP_L3DST_L4SRC |[Dest MAC],[Dest IP],[Source Port] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_TCP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + | | MAC_IPV4_TCP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_SCTP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | + | | MAC_IPV4_SCTP_L3SRC_L4DST |[Dest MAC],[Source IP],[Dest Port] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_SCTP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + | | MAC_IPV4_SCTP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ | | MAC_IPV4_NVGRE_ICMP |[Inner Source IP], [Inner Dest IP] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ @@ -178,21 +178,21 @@ Table 2: +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ | | MAC_IPV4_VXLAN_UDP |[Inner Source IP], [Inner Dest IP],[Inner Source Port], [Inner Dest Port] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_SRC_ONLY |[Dest MAC],[Source IP] | + | | MAC_IPV6_SRC_ONLY |[Dest MAC],[Source IP] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_DST_ONLY_FRAG |[Dest MAC],[Dest IP] | + | | MAC_IPV6_DST_ONLY_FRAG |[Dest MAC],[Dest IP] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_PAY |[Dest MAC],[Source IP], [Dest IP], | + | | MAC_IPV6_PAY |[Dest MAC],[Source IP], [Dest IP], | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_UDP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + | | MAC_IPV6_UDP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_TCP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + | | MAC_IPV6_TCP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_SCTP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | + | | MAC_IPV6_SCTP |[Dest MAC],[Source IP], [Dest IP], [TTL], [DSCP], [Source Port], [Dest Port] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV4_SIMPLE_XOR |[Dest MAC],[Source IP], [Dest IP] | + | | MAC_IPV4_SIMPLE_XOR |[Dest MAC],[Source IP], [Dest IP] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ - | | MAC_IPV6_SIMPLE_XOR |[Dest MAC],[Source IP], [Dest IP] | + | | MAC_IPV6_SIMPLE_XOR |[Dest MAC],[Source IP], [Dest IP] | +-------------------------------+------------------------------------+-------------------------------------------------------------------------------+ Default parameters @@ -255,11 +255,11 @@ Note: This rss feature designed for CVL NIC 25G and 100g, so below the case only Note: The kernel must be >= 3.6+ and VT-d must be enabled in bios. 4. Launch the testpmd to configuration queue of rx and tx number 64 in DUT:: - - testpmd>./x86_64-native-linuxapp-gcc/app/testpmd -c 0xff -n 4 -- -i --rxq=64 --txq=64 --port-topology=loop - testpmd>set fwd rxonly - testpmd>set verbose 1 - testpmd>rx_vxlan_port add 4789 0 + + testpmd>./x86_64-native-linuxapp-gcc/app/testpmd -c 0xff -n 4 -- -i --rxq=64 --txq=64 --port-topology=loop + testpmd>set fwd rxonly + testpmd>set verbose 1 + testpmd>rx_vxlan_port add 4789 0 3. start scapy and configuration NVGRE and GTP profile in tester scapy:: @@ -272,13 +272,13 @@ Test case: MAC_IPV4_L3SRC ========================= #. create rule for the rss type for l3 src only:: - testpmd>flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end - testpmd>start + testpmd>flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end + testpmd>start #. send the 100 IP pkts:: - - sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP())/("X"*480)], iface="enp175s0f0", count=100) - testpmd> stop + + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP())/("X"*480)], iface="enp175s0f0", count=100) + testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with differently RSS random value,and check the pkts typ is “L2_ETHER L3_IPV4 NONFRAG” @@ -287,7 +287,7 @@ Test case: MAC_IPV4_L3SRC Once rule has created and receive related packets, Check the rss hash value and rss queue, make sure the different hash value and cause to related packets enter difference queue:: - src=00:00:00:00:00:00 - dst=68:05:CA:A3:28:94 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0x60994f6e - RSS queue=0x2e - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV 4 - l2_len=14 - l3_len=20 - Receive queue=0x2e ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN + src=00:00:00:00:00:00 - dst=68:05:CA:A3:28:94 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0x60994f6e - RSS queue=0x2e - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV 4 - l2_len=14 - l3_len=20 - Receive queue=0x2e ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN statistics log: ------- Forward Stats for RX Port= 0/Queue= 0 -> TX Port= 0/Queue= 0 ------- @@ -295,7 +295,6 @@ Test case: MAC_IPV4_L3SRC ------- Forward Stats for RX Port= 0/Queue= 1 -> TX Port= 0/Queue= 1 ------- RX-packets: 2 TX-packets: 0 TX-dropped: 0 - ...... ------- Forward Stats for RX Port= 0/Queue=63 -> TX Port= 0/Queue=63 ------- @@ -315,13 +314,13 @@ Test case: MAC_IPV4_L3SRC_FRAG ============================== #. create rule for the rss type for l3 src only:: - testpmd>flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4 l3-dst-only end key_len 0 queues end / end - testpmd> start + testpmd>flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4 l3-dst-only end key_len 0 queues end / end + testpmd> start #. send the 100 IP +frag type pkts:: - sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP(), frag=5)/SCTP(sport=RandShort())/("X" * 80)], iface="enp175s0f0", count=100) - testpmd> stop + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP(), frag=5)/SCTP(sport=RandShort())/("X" * 80)], iface="enp175s0f0", count=100) + testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with differently RSS random value,and check the pkts typ is L2_ETHER L3_IPV4 "FRAG" @@ -332,13 +331,13 @@ Test case: MAC_IPV4_L3DST: testpmd> flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4 l3-dst-only end key_len 0 queues end / end testpmd> start #. send the 100 IP +frag type pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(dst=RandIP())/("X"*480)], iface="enp175s0f0", count=100) - testpmd> stop -#. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with +#. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with differently RSS random value,and check the pkts typ is L2_ETHER L3_IPV4 "FRAG" - - + + Test case: MAC_IPV4_L3DST_FRAG: =============================== #. create rule for the rss type for l3 dst only:: @@ -382,9 +381,11 @@ Test case: MAC_IPV4_L3DST_FRAG_ICMP: Test case: MAC_IPV4_PAY: ======================== #. create rule for the rss type for l3 all keywords:: + testpmd> flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4 end key_len 0 queues end / end testpmd> start #. send the 100 IP pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP(),dst=RandIP())/("X"*480)], iface="enp175s0f0", count=100) testpmd>stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -397,6 +398,7 @@ Test case: MAC_IPV4_PAY_FRAG_ICMP: flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4 end key_len 0 queues end / end #. send the 100 IP pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP(),dst=RandIP())/ICMP()/("X"*480)], iface="enp175s0f0", count=100) testpmd>stop @@ -409,6 +411,7 @@ Test case: MAC_IPV4_NVGRE_L3SRC: testpmd> flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end testpmd> start #. send the 100 IP nvgre pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IP(src=RandIP())/ICMP()/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -420,6 +423,7 @@ Test case: MAC_IPV4_NVGRE_L3DST: testpmd> flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4 l3-dst-only end key_len 0 queues end / end testpmd> start #. send the 100 IP nvgre pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IP(dst=RandIP())/ICMP()/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop @@ -517,7 +521,8 @@ Test case: MAC_IPV4_UDP: #. create rule for the rss type is ipv4 UDP +l3 src and dst:: testpmd>flow create 0 ingress pattern eth / ipv4 / udp / end actions rss types ipv4-udp l3-src-only l4-dst-only end key_len 0 queues end / end testpmd>start -#. send the 100 IP+UDP pkts:: +#. send the 100 IP+UDP pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP())/UDP(dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -530,11 +535,14 @@ Test case: MAC_IPV4_UDP_FRAG: testpmd> flow create 0 ingress pattern eth / ipv4 / udp / end actions rss types ipv4-udp end key_len 0 queues end / end testpmd> start #. send the 100 IP src IP +UDP port pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP(),dst=RandIP())/UDP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) #. send the 100 IP +UDP port pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/UDP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) #. send the 100 IP src and dst IP +UDP port pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP(),dst=RandIP())/UDP()/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop @@ -548,6 +556,7 @@ Test case: MAC_NVGRE_IPV4_UDP_FRAG: testpmd>start #. send the 100 NVGRE IP pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IP(src=RandIP(),dst=RandIP())/UDP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -559,6 +568,7 @@ Test case: MAC_VXLAN_IPV4_UDP_FRAG: testpmd> flow create 0 ingress pattern eth / ipv4 / udp / end actions rss types ipv4-udp end key_len 0 queues end / end testpmd> start #. To send VXLAN pkts with IP src and dst,UDP port:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/UDP()/VXLAN()/Ether()/IP(src=RandIP(),dst=RandIP())/UDP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -587,9 +597,11 @@ Test case: MAC_IPV4_TCP_FRAG: #. create rule for the rss type is IPV4 + TCP L3 src and L4 dst type hash:: testpmd>flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l3-src-only l4-dst-only end key_len 0 queues end / end #. To send IPV4 pkts with scr IP and TCP dst port:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP())/TCP(dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd>flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l3-src-only l4-src-only end key_len 0 queues end / end #. To send IPV4 pkts with scr IP and TCP src port:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(dst=RandIP())/TCP(sport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -601,12 +613,16 @@ Test case: MAC_IPV4_TCP_PAY testpmd>flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end key_len 0 queues end / end testpmd>start #. To send IPV4 pkts with IP src and dst ip and TCP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP(),dst=RandIP())/TCP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) #. To send IPV4 pkts without IP src and dst ip and includ TCP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/TCP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) #. To send IPV4 pkts with IP src and dst ip and without TCP port:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP(),dst=RandIP())/TCP()/("X"*480)], iface="enp175s0f0", count=100) #. To send IPV4 pkts with IP src and dst +frag and without TCP port:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP(),dst=RandIP(),frag=4)/TCP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -619,6 +635,7 @@ Test case: MAC_IPV6_UDP_FRAG: testpmd>flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end key_len 0 queues end / end testpmd>start #. To send NVGRE ip pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IP(src=RandIP(),dst=RandIP())/TCP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -630,6 +647,7 @@ Test case: MAC_VXLAN_IPV4_TCP testpmd>flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end key_len 0 queues end / end testpmd>start #. To send VXLAN pkts includ src and dst ip and TCP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/TCP()/VXLAN()/Ether()/IP(src=RandIP(),dst=RandIP())/TCP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -664,8 +682,10 @@ Test case: MAC_IPV4_SCTP: testpmd>flow create 0 ingress pattern eth / ipv4 / sctp / end actions rss types ipv4-sctp l3-src-only l4-dst-only end key_len 0 queues end / end testpmd>start #. To send IP pkts includ SCTP dport:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP())/SCTP(dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) #. To send IP pkts includ SCTP sport:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(dst=RandIP())/SCTP(sport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -678,6 +698,7 @@ Test case: MAC_IPV4_SCTP_FRAG: testpmd>flow create 0 ingress pattern eth / ipv4 / sctp / end actions rss types ipv4-sctp end key_len 0 queues end / end testpmd>start #. To send IPV4 pkt include SCTP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP(),dst=RandIP())/SCTP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/SCTP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src=RandIP(),dst=RandIP())/SCTP()/("X"*480)], iface="enp175s0f0", count=100) @@ -693,6 +714,7 @@ Test case: MAC_NVGRE_IPV4_SCTP: testpmd>flow create 0 ingress pattern eth / ipv4 / sctp / end actions rss types ipv4-sctp end key_len 0 queues end / end testpmd>start #. To send NVGRE ip pkts and sctp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IP(src=RandIP(),dst=RandIP())/SCTP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -705,19 +727,21 @@ Test case: MAC_VXLAN_IPV4_SCTP: testpmd>flow create 0 ingress pattern eth / ipv4 / sctp / end actions rss types ipv4-sctp end key_len 0 queues end / end testpmd>start #. To send VXLAN ip pkts and sctp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/SCTP()/VXLAN()/Ether()/IP(src=RandIP(),dst=RandIP())/SCTP(sport=RandShort(),dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with differently RSS random value Test case: MAC_IPV6_SCTP_PAY: -============================ +============================= #. Create rule for the rss type IPV6 and hash keywords ipv4 sctp src and dst type:: testpmd>flow create 0 ingress pattern eth / ipv6 / sctp / end actions rss types ipv6-sctp end key_len 0 queues end / end testpmd>start #. To send IPV6 pkts and sctp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IPv6(src=RandIP6())/SCTP(sport=RandShort(),dport=RandShort())/("X" * 80)], iface="enp175s0f0", count=100) - MAC IPV6 SCTP all+frag: + MAC IPV6 SCTP all+frag: #. to send IPV6 pkts includ frag:: sendp([Ether(dst="68:05:ca:a3:28:94")/IPv6(src=RandIP6())/IPv6ExtHdrFragment()/SCTP(sport=RandShort(),dport=RandShort())/("X" * 80)], iface="enp175s0f0", count=100) testpmd> stop @@ -731,6 +755,7 @@ Test case: MAC_IPV4_PPPOD_PPPOE: testpmd>flow create 0 ingress pattern eth / pppoes / ipv4 / end actions rss types ipv4 end key_len 0 queues end / end testpmd>start #. To send pppoe 100pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/PPPoE(sessionid=RandShort())/PPP(proto=0x21)/IP(src=RandIP())/UDP(sport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -738,11 +763,12 @@ Test case: MAC_IPV4_PPPOD_PPPOE: Test case: MAC_IPV4_PPPOD_PPPOE: -=============================== +================================ #. Create rule for the rss type pppoes:: testpmd>flow create 0 ingress pattern eth / pppoes / ipv4 / end actions rss types ipv4 end key_len 0 queues end / end testpmd>start #. To send pppoe pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/PPPoE(sessionid=RandShort())/PPP(proto=0x21)/IP(src=RandIP())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. Verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -750,11 +776,12 @@ Test case: MAC_IPV4_PPPOD_PPPOE: Test case: MAC_IPV4_PPPOD_PPPOE_UDP: -=================================== +==================================== #. Create rule for the rss type pppoes and hash l3 src , l4 dst port:: testpmd>flow create 0 ingress pattern eth / pppoes / ipv4 / udp / end actions rss types ipv4-udp l3-src-only l4-dst-only end key_len 0 queues end / end testpmd>start #. To send pppoe pkt and include the UPD ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/PPPoE(sessionid=RandShort())/PPP(proto=0x21)/IP(src=RandIP())/UDP(dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. Verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -767,6 +794,7 @@ Test case: MAC_IPV4_PPPOD_PPPOE_SCTP: testpmd>flow create 0 ingress pattern eth / pppoes / ipv4 / sctp / end actions rss types ipv4-sctp end key_len 0 queues end / end testpmd>start #. To send pppoe pkt and include the SCTP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/PPPoE(sessionid=RandShort())/PPP(proto=0x21)/IP(src=RandIP())/SCTP(dport=RandShort())/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. Verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -779,6 +807,7 @@ Test case: MAC_IPV4_PPPOD_PPPOE_ICMP: testpmd> flow create 0 ingress pattern eth / pppoes / ipv4 / end actions rss types ipv4 end key_len 0 queues end / end testpmd>start #. To send pppoe pkt and include the ICMP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/PPPoE(sessionid=RandShort())/PPP(proto=0x21)/IP(src=RandIP())/ICMP()/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. Verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -786,13 +815,15 @@ Test case: MAC_IPV4_PPPOD_PPPOE_ICMP: Test case: MAC_IPV4_GTPU_FRAG: -============================= +============================== #. Create rule for the rss type GTPU and hash l3 src keywords:: testpmd>flow create 0 ingress pattern eth / ipv4 / udp / gtpu / gtp_psc / ipv4 / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end testpmd>start #. To send GTPU pkts:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/UDP(dport=2152)/GTP_U_Header(teid=0x123456)/IP(src=RandIP())/ICMP()/("X"*480)],iface="enp175s0f0",count=100) #. To send GTPU PKTS and IPV4 frag:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/UDP(dport=2152)/GTP_U_Header(teid=0x123456)/IP(src=RandIP(),frag=6)/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. Verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -805,6 +836,7 @@ Test case: MAC_IPV4_GTPU_FRAG_UDP: testpmd>flow create 0 ingress pattern eth / ipv4 / udp / gtpu / gtp_psc / ipv4 / udp / end actions rss types ipv4 end key_len 0 queues end / end testpmd>start #. to send GTP pkts and include IP pkts and UDP:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/UDP(dport=2152)/GTP_U_Header(teid=0x123456)/IP(src=RandIP(),frag=6)/UDP(dport=RandShort())/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -812,11 +844,12 @@ Test case: MAC_IPV4_GTPU_FRAG_UDP: Test case: MAC_IPV4_GTPU_FRAG_TCP: -=============================== +================================== #. create rule for the rss type GTPU and hash l3 src and dst keywords:: testpmd>flow create 0 ingress pattern eth / ipv4 / udp / gtpu / gtp_psc / ipv4 / tcp / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end testpmd>start #. to send GTP pkts and include IP pkts and tcp:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/UDP(dport=2152)/GTP_U_Header(teid=0x123456)/IP(src=RandIP(),frag=6)/TCP(dport=RandShort())/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with @@ -825,29 +858,32 @@ Test case: MAC_IPV4_GTPU_FRAG_TCP: Test case: MAC_IPV4_GTPU_FRAG_ICMP: =================================== - create rule for the rss type GTPU and hash l3 src and dst keywords:: +#. create rule for the rss type GTPU and hash l3 src and dst keywords:: + testpmd>flow create 0 ingress pattern eth / ipv4 / udp / gtpu / gtp_psc / ipv4 / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end testpmd>start - to send GTP pkts and include IP pkts and ICMP:: +#. to send GTP pkts and include IP pkts and ICMP:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/UDP(dport=2152)/GTP_U_Header(teid=0x123456)/IP(src=RandIP(),frag=6)/ICMP()/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop - verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with - differently RSS random value + verify 100 pkts has sent, and to check the 100 pkts has send to differently totaly 64 queues evenly with + differently RSS random value Test case: SYMMETRIC_TOEPLITZ_IPV4_PAY: -====================================== +======================================= #. create rule for the rss type symmetric_toeplitz and hash ipv4 src and dst keywords:: testpmd>flow create 0 ingress pattern eth / ipv4 / end actions rss func symmetric_toeplitz types ipv4 end key_len 0 queues end / end testpmd>start -#. to send ip pkts with fix IP:: +#. to send ip pkts with fix IP:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.1",dst="192.168.0.2")/("X"*480)], iface="enp175s0f0", count=100) #. to send ip pkts with fix IP and switch src and dst ip address:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.2",dst="192.168.0.1")/("X"*480)], iface="enp175s0f0", count=100) - - + Verbos log: src=A4:BF:01:68:D2:03 - dst=68:05:CA:A3:28:94 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0xf84ccd9b - RSS queue=0x1b - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x1b ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN - + src=A4:BF:01:68:D2:03 - dst=68:05:CA:A3:28:94 - type=0x0800 - length=514 - nb_segs=1 - RSS hash=0xf84ccd9b - RSS queue=0x1b - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN L4_NONFRAG - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x1b ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN #. To verify the hash value keep with a same value when the IP has exchanged. @@ -856,8 +892,10 @@ Test case: SYMMETRIC_TOEPLITZ_IPV4_PAY: hash=0xf84ccd9b - RSS queue=0 #. to send ip pkts with fix IP:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="8.8.8.2",dst="5.6.7.8")/("X"*480)], iface="enp175s0f0", count=100) #. to send ip pkts with fix IP and switch src and dst ip address:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="5.6.7.8",dst="8.8.8.2")/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop @@ -890,11 +928,14 @@ Test case: SYMMETRIC_TOEPLITZ_IPV4_PAY: Test case: SYMMETRIC_TOEPLITZ_IPV4_PAY_FRAG: ============================================ #. create rule for the rss type symmetric_toeplitz and hash ipv4 src and dst keywords:: + testpmd>flow create 0 ingress pattern eth / ipv4 / end actions rss func symmetric_toeplitz types ipv4 end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix IP includ frag:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.1",dst="192.168.0.2",frag=6)/("X"*480)], iface="enp175s0f0", count=100) #. to send ip pkts with fix IP includ frag and switch src and dst ip address:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.2",dst="192.168.0.1",frag=6)/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss has has fixed with a same value. @@ -903,11 +944,14 @@ Test case: SYMMETRIC_TOEPLITZ_IPV4_PAY_FRAG: Test case: SYMMETRIC_TOEPLITZ_IPV4_UDP: ======================================= #. create rule for the rss type symmetric_toeplitz and hash UDP src and dst keywords:: + testpmd>flow create 0 ingress pattern eth / ipv4 / udp / end actions rss func symmetric_toeplitz types ipv4-udp end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix IP includ frag and UDP:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.1",dst="192.168.0.2",frag=6)/UDP(sport=20,dport=22)/("X"*480)], iface="enp175s0f0", count=100) #. to send ip pkts with fix IP includ frag and switch src and dst ip address and UDP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.2",dst="192.168.0.1",frag=6)/UDP(sport=22,dport=20)/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. @@ -915,11 +959,14 @@ Test case: SYMMETRIC_TOEPLITZ_IPV4_UDP: Test case: SYMMETRIC_TOEPLITZ_IPV4_UDP_L3SRC_L3DST_L4SRC_L4DST: =============================================================== #. create rule for the rss type symmetric_toeplitz and hash l3 l4 keywords:: + testpmd>flow create 0 ingress pattern eth / ipv4 / udp / end actions rss func symmetric_toeplitz types ipv4-udp l3-src-only l3-dst-only l4-src-only l4-dst-only end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix IP includ frag and UDP:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="1.1.4.1",dst="2.2.2.3")/UDP(sport=20,dport=22)/("X"*480)], iface="enp175s0f0", count=100) #. to send ip pkts with fix IP includ frag and switch src and dst ip address and UDP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="2.2.2.3",dst="1.1.4.1")/UDP(sport=22,dport=20)/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. @@ -927,11 +974,14 @@ Test case: SYMMETRIC_TOEPLITZ_IPV4_UDP_L3SRC_L3DST_L4SRC_L4DST: Test case: SYMMETRIC_TOEPLITZ_IPV4_TCP: ======================================= #. create rule for the rss type symmetric_toeplitz and hash TCP keywords:: + testpmd>flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss func symmetric_toeplitz types ipv4-tcp end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix IP includ frag and TCP:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.1",dst="192.168.0.2",frag=6)/TCP(sport=20,dport=22)/("X"*480)], iface="enp175s0f0", count=100) #. to send ip pkts with fix IP includ frag and switch src and dst ip address and tcp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.2",dst="192.168.0.1",frag=6)/TCP(sport=22,dport=20)/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. @@ -940,24 +990,30 @@ Test case: SYMMETRIC_TOEPLITZ_IPV4_TCP: Test case: SYMMETRIC_TOEPLITZ_IPV4_SCTP: ======================================== #. create rule for the rss type symmetric_toeplitz and hash SCTP keywords:: + testpmd>flow create 0 ingress pattern eth / ipv4 / sctp / end actions rss func symmetric_toeplitz types ipv4-sctp end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix IP includ frag and SCTP:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.1",dst="192.168.0.2",frag=6)/SCTP(sport=20,dport=22)/("X"*480)], iface="enp175s0f0", count=100) #. to send ip pkts with fix IP includ frag and switch src and dst ip address and sctp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.2",dst="192.168.0.1",frag=6)/SCTP(sport=22,dport=20)/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop - + #. verify 100 pkts has sent, and check the has rssh hash keep a fixed value. Test case: SYMMETRIC_TOEPLITZ_IPV4_ICMP: ======================================== #. create rule for the rss type symmetric_toeplitz and hash ICMP keywords:: + testpmd>flow create 0 ingress pattern eth / ipv4 / end actions rss func symmetric_toeplitz types ipv4 end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix IP includ frag and ICMP:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.1",dst="192.168.0.2",frag=6)/ICMP()/("X"*480)], iface="enp175s0f0", count=100) #. to send ip pkts with fix IP includ frag and switch src and dst ip address and ICMP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="192.168.0.2",dst="192.168.0.1",frag=6)/ICMP()/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash value with a fixed value . @@ -993,7 +1049,7 @@ Test case: SYMMETRIC_TOEPLITZ_IPV6_PAY: Test case: SYMMETRIC_TOEPLITZ_IPV6_UDP: -====================================== +======================================= #. create rule for the rss type symmetric_toeplitz and hash IPV6 keywords:: testpmd>flow create 0 ingress pattern eth / ipv6 / udp / end actions rss func symmetric_toeplitz types ipv6-udp end key_len 0 queues end / end testpmd>start @@ -1017,7 +1073,7 @@ Test case: SYMMETRIC_TOEPLITZ_IPV6_TCP: Test case: SYMMETRIC_TOEPLITZ_IPV6_SCTP: -======================================= +======================================== #. create rule for the rss type symmetric_toeplitz and hash IPV6 keywords:: testpmd>flow create 0 ingress pattern eth / ipv6 / sctp / end actions rss func symmetric_toeplitz types ipv6-sctp end key_len 0 queues end / end testpmd>start @@ -1041,11 +1097,12 @@ Test case: SYMMETRIC_TOEPLITZ_IPV6_ICMP: Test case: SYMMETRIC_TOEPLITZ_NVGRE_IPV4: -======================================= +========================================= #. create rule for the rss type symmetric_toeplitz and hash IPV4 keywords:: testpmd>flow create 0 ingress pattern eth / ipv4 / end actions rss func symmetric_toeplitz types ipv4 end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix nvgre pkts with fixed address and includ frag:: + sendp([Ether()/IP()/NVGRE()/Ether()/IP(src="192.168.0.8",dst="192.168.0.69",frag=6)/("X"*480)], iface="enp175s0f0", count=100) sendp([Ether()/IP()/NVGRE()/Ether()/IP(src="192.168.0.69",dst="192.168.0.8",frag=6)/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop @@ -1057,6 +1114,7 @@ Test case: SYMMETRIC_TOEPLITZ_VXLAN_IPV4: testpmd>flow create 0 ingress pattern eth / ipv4 / end actions rss func symmetric_toeplitz types ipv4 end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix vxlan pkts with fixed address and includ frag:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/UDP()/VXLAN()/Ether()/IP(src="192.168.0.1",dst="192.168.0.2",frag=6)/("X"*480)], iface="enp175s0f0", count=100) sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/UDP()/VXLAN()/Ether()/IP(src="192.168.0.2",dst="192.168.0.1",frag=6)/("X"*480)], iface="enp175s0f0", count=100) testpmd> stop @@ -1069,6 +1127,7 @@ Test case: SYMMETRIC_TOEPLITZ_NVGRE_IPV4_UDP: testpmd>flow create 0 ingress pattern eth / ipv4 / udp / end actions rss func symmetric_toeplitz types ipv4-udp end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix nvgre pkts with fixed address and includ frag and udp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether(dst="68:05:ca:a3:28:94")/IP(src="8.8.8.1",dst="5.6.8.2")/UDP(sport=20,dport=22)/("X"*480)],iface="enp175s0f0",count=100) sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether(dst="68:05:ca:a3:28:94")/IP(src="5.6.8.2",dst="8.8.8.1")/UDP(sport=22,dport=20)/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop @@ -1080,41 +1139,46 @@ Test case: SYMMETRIC_TOEPLITZ_NVGRE_SCTP: testpmd>flow create 0 ingress pattern eth / ipv4 / sctp / end actions rss func symmetric_toeplitz types ipv4-sctp end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix nvgre pkts with fixed address and includ frag and sctp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether(dst="68:05:ca:a3:28:94")/IP(src="8.8.8.1",dst="5.6.8.2")/SCTP(sport=20,dport=22)/("X"*480)],iface="enp175s0f0",count=100) sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether(dst="68:05:ca:a3:28:94")/IP(src="5.6.8.2",dst="8.8.8.1")/SCTP(sport=22,dport=20)/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. Test case: SYMMETRIC_TOEPLITZ_NVGRE_IPV4_TCP: -============================================ +============================================= #. create rule for the rss type symmetric_toeplitz and hash IPV4 keywords:: testpmd>flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss func symmetric_toeplitz types ipv4-tcp end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix nvgre pkts with fixed address and includ frag and tcp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether(dst="68:05:ca:a3:28:94")/IP(src="8.8.8.1",dst="5.6.8.2")/TCP(sport=20,dport=22)/("X"*480)],iface="enp175s0f0",count=100) sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether(dst="68:05:ca:a3:28:94")/IP(src="5.6.8.2",dst="8.8.8.1")/TCP(sport=22,dport=20)/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. Test case: SYMMETRIC_TOEPLITZ_NVGRE_IPV4_ICMP: -============================================= +============================================== #. create rule for the rss type symmetric_toeplitz and hash IPV4 keywords:: testpmd>flow create 0 ingress pattern eth / ipv4 / end actions rss func symmetric_toeplitz types ipv4 end key_len 0 queues end / end testpmd>start #. to send ip pkts with fix nvgre pkts with fixed address and includ frag and icmp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IP(src="8.8.8.1",dst="5.6.8.2")/ICMP()/("X"*480)],iface="enp175s0f0",count=100) sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IP(src="5.6.8.2",dst="8.8.8.1")/ICMP()/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. Test case: SYMMETRIC_TOEPLITZ_NVGRE_IPV6: -======================================== +========================================= #. create rule for the rss type symmetric_toeplitz and hash IPV6 keywords:: testpmd>flow create 0 ingress pattern eth / ipv6 / end actions rss func symmetric_toeplitz types ipv6 end key_len 0 queues end / end testpmd>start -#. to send ipv6 pkts with fix nvgre pkts with fixed address:: +#. to send ipv6 pkts with fix nvgre pkts with fixed address:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:2020",dst="ABAB:910B:6666:3457:8295:3333:1800:2929")/("X"*480)],iface="enp175s0f0",count=100) #. to send ip pkts with fix IPv6 includ frag and switch src and dst ip address:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. @@ -1125,8 +1189,10 @@ Test case: SYMMETRIC_TOEPLITZ_NVGRE_IPV6_UDP: testpmd>flow create 0 ingress pattern eth / ipv6 / udp / end actions rss func symmetric_toeplitz types ipv6-udp end key_len 0 queues end / end testpmd>start #. to send ipv6 pkts with fix nvgre pkts with fixed address and includ ipv6 frag and UDP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:2020",dst="ABAB:910B:6666:3457:8295:3333:1800:2929")/UDP(sport=30,dport=32)/("X"*480)],iface="enp175s0f0",count=100) #. to send ip pkts with fix IPv6 includ frag and switch src and dst ip address and udp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. @@ -1138,11 +1204,13 @@ Test case: SYMMETRIC_TOEPLITZ_NVGRE_IPV6_TCP: testpmd>flow create 0 ingress pattern eth / ipv6 / tcp / end actions rss func symmetric_toeplitz types ipv6-tcp end key_len 0 queues end / end testpmd>start #. to send ipv6 pkts with fix nvgre pkts with fixed address and includ ipv6 frag and tcp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:2020",dst="ABAB:910B:6666:3457:8295:3333:1800:2929")/TCP(sport=30,dport=32)/("X"*480)],iface="enp175s0f0",count=100) - to send ip pkts with fix IPv6 includ frag and switch src and dst ip address and tcp ports:: +#. to send ip pkts with fix IPv6 includ frag and switch src and dst ip address and tcp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=32,dport=33)/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop - verify 100 pkts has sent, and check the rss hash with a fixed value. + verify 100 pkts has sent, and check the rss hash with a fixed value. Test case: SYMMETRIC_TOEPLITZ_NVGRE_IPV6_SCTP ============================================== @@ -1150,8 +1218,10 @@ Test case: SYMMETRIC_TOEPLITZ_NVGRE_IPV6_SCTP testpmd>flow create 0 ingress pattern eth / ipv6 / sctp / end actions rss func symmetric_toeplitz types ipv6-sctp end key_len 0 queues end / end testpmd>start #. to send ipv6 pkts with fix nvgre pkts with fixed address and includ ipv6 frag and SCTP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:2020",dst="ABAB:910B:6666:3457:8295:3333:1800:2929")/SCTP(sport=30,dport=32)/("X"*480)],iface="enp175s0f0",count=100) #. to send ip pkts with fix IPv6 includ frag and switch src and dst ip address and SCTP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=32,dport=33)/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. @@ -1163,8 +1233,10 @@ Test case: SYMMETRIC_TOEPLITZ_NVGRE_IPV6_ICMP: testpmd>flow create 0 ingress pattern eth / ipv6 / end actions rss func symmetric_toeplitz types ipv6 end key_len 0 queues end / end testpmd>start #. to send ipv6 pkts with fix nvgre pkts with fixed address and includ ipv6 frag and ICMP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:2020",dst="ABAB:910B:6666:3457:8295:3333:1800:2929")/ICMP()/("X"*480)],iface="enp175s0f0",count=100) #. to send ip pkts with fix IPv6 includ frag and switch src and dst ip address and ICMP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/NVGRE()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/ICMP()/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. @@ -1175,8 +1247,10 @@ Test case: SYMMETRIC_TOEPLITZ_VXLAN_IPV6_UDP: testpmd>flow create 0 ingress pattern eth / ipv6 / udp / end actions rss func symmetric_toeplitz types ipv6-udp end key_len 0 queues end / end testpmd>start #. to send ipv6 pkts with fix vxlan pkts with fixed address and includ ipv6 frag and UDP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:2020",dst="ABAB:910B:6666:3457:8295:3333:1800:2929")/UDP(sport=30,dport=32)/("X"*480)],iface="enp175s0f0",count=100) #. to send VXLAN pkts with fix IPv6 includ frag and switch src and dst ip address and UDP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/UDP(sport=32,dport=33)/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. @@ -1187,8 +1261,10 @@ Test case: SYMMETRIC_TOEPLITZ_VXLAN_IPV6: testpmd>flow create 0 ingress pattern eth / ipv6 / end actions rss func symmetric_toeplitz types ipv6 end key_len 0 queues end / end testpmd>start #. to send ipv6 pkts with fix vxlan pkts with fixed address and includ ipv6 frag:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/UDP()/VXLAN()/Ether()/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:2020",dst="ABAB:910B:6666:3457:8295:3333:1800:2929")/("X"*480)],iface="enp175s0f0",count=100) #. to send VXLAN pkts with fix IPv6 includ frag and switch src and dst ip address:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. @@ -1199,8 +1275,10 @@ Test case: SYMMETRIC_TOEPLITZ_VXLAN_IPV6_TCP: testpmd>flow create 0 ingress pattern eth / ipv6 / tcp / end actions rss func symmetric_toeplitz types ipv6-tcp end key_len 0 queues end / end testpmd>start #. to send ipv6 pkts with fix vxlan pkts with fixed address and includ ipv6 frag and tcp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:2020",dst="ABAB:910B:6666:3457:8295:3333:1800:2929")/TCP(sport=30,dport=32)/("X"*480)],iface="enp175s0f0",count=100) #. to send VXLAN pkts with fix IPv6 includ frag and switch src and dst ip address and tcp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/TCP(sport=32,dport=33)/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. @@ -1211,8 +1289,10 @@ Test case: SYMMETRIC_TOEPLITZ_VXLAN_IPV6_SCTP: testpmd>flow create 0 ingress pattern eth / ipv6 / sctp / end actions rss func symmetric_toeplitz types ipv6-sctp end key_len 0 queues end / end testpmd>start #. to send ipv6 pkts with fix vxlan pkts with fixed address and includ ipv6 frag and sctp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:2020",dst="ABAB:910B:6666:3457:8295:3333:1800:2929")/SCTP(sport=30,dport=32)/("X"*480)],iface="enp175s0f0",count=100) #. to send VXLAN pkts with fix IPv6 includ frag and switch src and dst ip address and sctp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/SCTP(sport=32,dport=30)/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value. @@ -1223,8 +1303,10 @@ Test case: SYMMETRIC_TOEPLITZ_VXLAN_IPV6_ICMP: testpmd>flow create 0 ingress pattern eth / ipv6 / end actions rss func symmetric_toeplitz types ipv6 end key_len 0 queues end / end testpmd>start #. to send ipv6 pkts with fix vxlan pkts with fixed address and includ ipv6 frag and ICMP ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:2020",dst="ABAB:910B:6666:3457:8295:3333:1800:2929")/ICMP()/("X"*480)],iface="enp175s0f0",count=100) #. to send VXLAN pkts with fix IPv6 includ frag and switch src and dst ip address and icmp ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IPv6()/UDP()/VXLAN()/Ether()/IPv6(src="ABAB:910B:6666:3457:8295:3333:1800:2929",dst="CDCD:910A:2222:5498:8475:1111:3900:2020")/ICMP()/("X"*480)],iface="enp175s0f0",count=100) testpmd> stop #. verify 100 pkts has sent, and check the rss hash with a fixed value @@ -1239,6 +1321,7 @@ Test case: SIMPLE_XOR: Test case: SIMPLE_XOR_IPV4: =========================== #. to send IPV4 pkt with fixed IP and switch IP src and dst address and switch the upd, tcp, sctp, icpm ports:: + sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="1.1.4.1",dst="2.2.2.3")/("X"*480)], iface="enp175s0f0", count=100) sendp([Ether(dst="68:05:ca:a3:28:94")/IP(src="2.2.2.3",dst="1.1.4.1")/("X"*480)], iface="enp175s0f0", count=100) -- 1.8.3.1