From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 5B617A0597; Thu, 9 Apr 2020 10:05:06 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 4DDC51C1C4; Thu, 9 Apr 2020 10:05:06 +0200 (CEST) Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by dpdk.org (Postfix) with ESMTP id 686E21C1B0 for ; Thu, 9 Apr 2020 10:05:04 +0200 (CEST) IronPort-SDR: lllcApjqj8kppc+lnoeu/gLheIBcO/zirYThYILfRH3ZlV5LHhj0MFFRXJTMhZ7LduIqBtDRjg hkvJg4xR2BaA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 09 Apr 2020 01:05:03 -0700 IronPort-SDR: R36H6Q2aHe0xiajXNeGn/I+A4lC1w8ZY+HIBGqCoYtafpJLUcdLbMHK2Ui8O3zlGRkLqHwawhE 3AnTOqxY+PgQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,362,1580803200"; d="scan'208";a="362089361" Received: from unknown (HELO localhost.localdomain) ([10.239.255.70]) by fmsmga001.fm.intel.com with ESMTP; 09 Apr 2020 01:05:02 -0700 From: Chenxu Di To: dts@dpdk.org Cc: Chenxu Di Date: Thu, 9 Apr 2020 07:56:47 +0000 Message-Id: <20200409075648.26432-2-chenxux.di@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20200409075648.26432-1-chenxux.di@intel.com> References: <20200331104413.89038-1-chenxux.di@intel.com> <20200409075648.26432-1-chenxux.di@intel.com> Subject: [dts] [PATCH v2 1/2] test_plans/fortville_rss_input: add fortville rss input test plan X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" Fortville enable setting hash input set in rte flow. Add test plan for it. Signed-off-by: Chenxu Di --- test_plans/fortville_rss_input_test_plan.rst | 582 +++++++++++++++++++ 1 file changed, 582 insertions(+) create mode 100644 test_plans/fortville_rss_input_test_plan.rst diff --git a/test_plans/fortville_rss_input_test_plan.rst b/test_plans/fortville_rss_input_test_plan.rst new file mode 100644 index 0000000..d5b2bf3 --- /dev/null +++ b/test_plans/fortville_rss_input_test_plan.rst @@ -0,0 +1,582 @@ +.. Copyright (c) <2019>, Intel Corporation + All rights reserved. + + Redistribution and use in source and binary forms, with or without + modification, are permitted provided that the following conditions + are met: + + - Redistributions of source code must retain the above copyright + notice, this list of conditions and the following disclaimer. + + - Redistributions in binary form must reproduce the above copyright + notice, this list of conditions and the following disclaimer in + the documentation and/or other materials provided with the + distribution. + + - Neither the name of Intel Corporation nor the names of its + contributors may be used to endorse or promote products derived + from this software without specific prior written permission. + + THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS + "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT + LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS + FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE + COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, + INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES + (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR + SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) + HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, + STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) + ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED + OF THE POSSIBILITY OF SUCH DAMAGE. + + +==================================================== +Fortville Configuration of RSS in RTE Flow Tests +==================================================== + +Description +=========== + +The feature remove legacy filter API and switch to rte_flow in driver fm10k, +i40e, ixgbe, ice. What is need is that remove the function in filter_ctrl +ops in drivers and implement functions in rte_flow. Many functions have been +implemented in rte_flow in the early patches. this feature implement that +set global configurations of hash filters, set symmetric hash configuration +enable and Set GRE key length for input set in driver i40e. + +Prerequisites +============= + +1.Bind PF ports to igb_uio driver:: + + usertools/dpdk-devbind.py --bind=igb_uio 0000:81:00.0 + +2.Start testpmd on host:: + + ./x86_64-native-linuxapp-gcc/app/testpmd -c 0xf -n 4 -w 81:00.0 -- -i --txq=8 --rxq=8 + testpmd>set verbose 1 + testpmd>start + +Test Case: test global configurations of hash filter +==================================================== + +create a rule that set global configurations of hash filters is toeplitz:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end func toeplitz / end + testpmd> flow list 0 + +verify the Rule is RSS. + +get the status of hash configuration:: + + testpmd> get_hash_global_config 0 + +verify Hash function is toeplitz. +verify Symmetric hash is enable globally for flow type ipv4-tcp by port 0 + +create a rule that set global configurations of hash filters is toeplitz:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end func simple_xor / end + testpmd> flow list 0 + +verify the Rule is RSS. + +get the status of hash configuration:: + + testpmd> get_hash_global_config 0 + +verify Hash function is simple_xor. +verify Symmetric hash is enable globally for flow type ipv4-tcp by port 0 + +delete the rule:: + testpmd> flow flush 0 + testpmd> flow list 0 + +verify the rules have been destroyed. + +get the status of hash configuration:: + + testpmd> get_hash_global_config 0 + +verify Symmetric hash is disabled globally for flow type ipv4-tcp by port 0 + +Test Case: test symmetric hash configuration +============================================ + +create a rule that set symmetric hash configuration enable:: + + testpmd> flow create 0 ingress pattern end actions rss types end queue end func symmetric_toeplitz / end + testpmd> flow list 0 + +verify the Rule is RSS. + +get the status of symmetric hash:: + + testpmd> get_sym_hash_ena_per_port 0 + +verify Symmetric hash is enable on port 0. +send 2 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1",dst="192.168.0.2")/Raw(load='X'*1000)],iface='ens802f3') + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.2",dst="192.168.0.1")/Raw(load='X'*1000)],iface='ens802f3') + +vefify two packets have the same RSS hash value. +destroy the rull:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow list 0 + +verify the rule has been destroyed. + +get the status of symmetric hash:: + + testpmd> get_sym_hash_ena_per_port 0 + +verify Symmetric hash is disabled on port 0. +send 2 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1",dst="192.168.0.2")/Raw(load='X'*1000)],iface='ens802f3') + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.2",dst="192.168.0.1")/Raw(load='X'*1000)],iface='ens802f3') + +vefify two packets have different RSS hash values. + +Test Case: test set hash input set for ipv4-tcp +================================================ + +test all different hash input set for ipv4-tcp +1. Set hash input set for ipv4-tcp l3-src-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l3-src-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst=RandIP())/TCP(sport=RandShort(),dport=RandShort())],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst=RandIP())/TCP(sport=RandShort(),dport=RandShort())],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +2. Set hash input set for ipv4-tcp l3-dst-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l3-dst-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst="192.168.0.2")/TCP(sport=RandShort(),dport=RandShort())],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst="192.168.0.2")/TCP(sport=RandShort(),dport=RandShort())],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +3. Set hash input set for ipv4-tcp l4-src-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-src-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/TCP(sport=1024,dport=RandShort())],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/TCP(sport=1024,dport=RandShort())],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +4. Set hash input set for ipv4-tcp l4-dst-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-dst-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/TCP(sport=RandShort(),dport=1025)],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/TCP(sport=RandShort(),dport=1025)],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +5. Set hash input set for ipv4-tcp l3-src-only and l3-dst-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l3-src-only l3-dst-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst="192.168.0.2")/TCP(sport=RandShort(),dport=RandShort())],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst="192.168.0.2")/TCP(sport=RandShort(),dport=RandShort())],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +6. Set hash input set for ipv4-tcp l4-src-only and l4-dst-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-src-only l4-dst-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/TCP(sport=1024,dport=1025)],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/TCP(sport=1024,dport=1025)],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +7.Set hash input set for ipv4-tcp l4-src-only and l3-src-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-src-only l3-src-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst=RandIP())/TCP(sport=1024,dport=RandShort())],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst=RandIP())/TCP(sport=1024,dport=RandShort())],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +8. Set hash input set for ipv4-tcp l4-dst-only and l3-dst-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-dst-only l3-dst-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst="192.168.0.2")/TCP(sport=RandShort(),dport=1025)],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst="192.168.0.2")/TCP(sport=RandShort(),dport=1025)],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +9. Set hash input set for ipv4-tcp l4-src-only and l3-dst-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-src-only l3-dst-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst="192.168.0.2")/TCP(sport=1024,dport=RandShort())],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst="192.168.0.2")/TCP(sport=1024,dport=RandShort())],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +10. Set hash input set for ipv4-tcp l4-dst-only and l3-src-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-dst-only l3-src-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst=RandIP())/TCP(sport=RandShort(),dport=1025)],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst=RandIP())/TCP(sport=RandShort(),dport=1025)],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +11. Set hash input set for ipv4-tcp l4-src-only, l4-dst-only and l3-dst-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-src-only l4-dst-only l3-dst-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst="192.168.0.2")/TCP(sport=1024,dport=1025)],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst="192.168.0.2")/TCP(sport=1024,dport=1025)],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +12. Set hash input set for ipv4-tcp l4-src-only, l4-dst-only and l3-src-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-src-only l4-dst-only l3-src-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst=RandIP())/TCP(sport=1024,dport=1025)],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst=RandIP())/TCP(sport=1024,dport=1025)],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +13. Set hash input set for ipv4-tcp l4-dst-only, l3-dst-only and l3-src-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-dst-only l3-dst-only l3-src-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst="192.168.0.2")/TCP(sport=RandShort(),dport=1025)],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst="192.168.0.2")/TCP(sport=RandShort(),dport=1025)],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +14. Set hash input set for ipv4-tcp l4-src-only, l3-src-only and l3-dst-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-src-only l3-dst-only l3-src-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst="192.168.0.2")/TCP(sport=1024,RandShort())],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst="192.168.0.2")/TCP(sport=1024,RandShort())],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +15. Set hash input set for ipv4-tcp l4-src-only, l4-dst-only, l3-src-only and l3-dst-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp l4-src-only l4-dst-only l3-src-only l3-dst-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst="192.168.0.2")/TCP(sport=1024,dport=1025)],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss types ipv4-tcp end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst="192.168.0.2")/TCP(sport=1024,dport=1025)],iface='ens802f3') + + verify the packet have same RSS hash value as above. + +Test Case: test set hash input set for ipv4-udp +================================================ + +test all different hash input set for ipv4-udp +the same steps as step 1-15 for ipv4-tcp, just replace tcp with udp. + +Test Case: test set hash input set for ipv4-sctp +================================================ + +test all different hash input set for ipv4-sctp +the same steps as step 1-15 for ipv4-tcp, just replace tcp with sctp. + +Test Case: test set hash input set for ipv6-tcp +================================================ + +test all different hash input set for ipv6-tcp +the same steps as step 1-15 for ipv4-tcp, just replace ipv4 with ipv6. + +Test Case: test set hash input set for ipv6-udp +================================================ + +test all different hash input set for ipv6-udp +the same steps as step 1-15 for ipv4-tcp, just replace ipv4-tcp with ipv6-udp. + +Test Case: test set hash input set for ipv6-sctp +================================================ + +test all different hash input set for ipv6-sctp +the same steps as step 1-15 for ipv4-tcp, just replace ipv4-tcp with ipv6-sctp. + +Test Case: test set hash input set for ipv4-other +================================================ + +test all different hash input set for ipv4-other +1. Set hash input set for ipv4-other l3-src-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4-other l3-src-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst=RandIP())/GRE(key_present=1,proto=2048,key=67108863)/IP()],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4-other end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst=RandIP())/GRE(key_present=1,proto=2048,key=67108863)/IP()],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +2. Set hash input set for ipv4-other l3-dst-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4-other l3-dst-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst="192.168.0.2")/GRE(key_present=1,proto=2048,key=67108863)/IP()],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4-other end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst="192.168.0.2")/GRE(key_present=1,proto=2048,key=67108863)/IP()],iface='ens802f3') + + verify the packet have different RSS hash value with above. + +3. Set hash input set for ipv4-other l3-src-only and l3-dst-only:: + + testpmd> flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4-other l3-src-only l3-dst-only end queues end / end + + verify the Rule create successfully. + + send 10 packets: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst="192.168.0.2")/GRE(key_present=1,proto=2048,key=67108863)/IP()],iface='ens802f3',count=10) + + verify 10 packets have the same RSS hash value. + destroy the rule and create a new rule with default inputset:: + + testpmd> flow destroy 0 rule 0 + testpmd> flow create 0 ingress pattern eth / ipv4 / end actions rss types ipv4-other end queues end / end + + send 1 packet same as above: + + sendp([Ether(dst="00:11:22:33:44:55")/IP(src="192.168.0.1", dst="192.168.0.2")/GRE(key_present=1,proto=2048,key=67108863)/IP()],iface='ens802f3') + + verify the packet have same RSS hash value as above. + +Test Case: test set hash input set for ipv6-other +================================================ + +test all different hash input set for ipv6-other +the same steps as step 1-3 for ipv4-other, just replace ipv4 with ipv6. \ No newline at end of file -- 2.17.1