test suite reviews and discussions
 help / color / mirror / Atom feed
* [dts] [PATCH v2]Add RSS Key Update Feature
       [not found] <f08663d0b11bfc1487f7461dd7c952bab652d9e8>
@ 2020-07-15 20:08 ` David Liu
  2020-07-24  2:01   ` Tu, Lijuan
  0 siblings, 1 reply; 3+ messages in thread
From: David Liu @ 2020-07-15 20:08 UTC (permalink / raw)
  To: dts; +Cc: lylavoie, David Liu

 Merge duplicated code. Add flag in send packet and verify
 result to identify symmetric used.

Signed-off-by: David Liu <dliu@iol.unh.edu>
---
 tests/TestSuite_rss_key_update.py | 183 ++++++++----------------------
 1 file changed, 46 insertions(+), 137 deletions(-)

diff --git a/tests/TestSuite_rss_key_update.py b/tests/TestSuite_rss_key_update.py
index 0985f30..adb44f1 100644
--- a/tests/TestSuite_rss_key_update.py
+++ b/tests/TestSuite_rss_key_update.py
@@ -39,7 +39,6 @@ Test the support of RSS Key Update by Poll Mode Drivers.
 
 import time
 import re
-import packet
 import random
 import utils
 
@@ -63,85 +62,37 @@ iptypes = {'ipv4-sctp': 'sctp',
 
 class TestRssKeyUpdate(TestCase):
 
-    def send_packet(self, itf, tran_type):
+    def send_packet(self, itf, tran_type, symmetric):
         """
         Sends packets.
         """
+        packet_list = {
+            'ipv4-sctp': 'IP(src="192.168.0.%d", dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)',
+            'ipv4-other': 'IP(src="192.168.0.%d", dst="192.168.0.%d")',
+            'ipv4-frag': 'IP(src="192.168.0.%d", dst="192.168.0.%d",frag=1,flags="MF")',
+            'ipv4-udp': 'IP(src="192.168.0.%d", dst="192.168.0.%d")/UDP(sport=1024,dport=1024)',
+            'ipv4-tcp': 'IP(src="192.168.0.%d", dst="192.168.0.%d")/TCP(sport=1024,dport=1024)',
+            'ipv6-other':'IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")',
+            'ipv6-sctp': 'IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)',
+            'ipv6-udp': 'IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)',
+            'ipv6-tcp': 'IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)',
+            'ipv6-frag': 'IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()'
+        }
+
         received_pkts = []
         self.tester.scapy_foreground()
         self.dut.send_expect("start", "testpmd>")
         mac = self.dut.get_mac_address(0)
 
         # send packet with different source and dest ip
-        if tran_type == "ipv4-other":
-            for i in range(10):
-                packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")], iface="%s")' % (
-                    mac, itf, i + 1, i + 2, itf)
-                self.tester.scapy_append(packet)
-            self.tester.scapy_execute()
-            time.sleep(.5)
-        elif tran_type == "ipv4-tcp":
-            for i in range(10):
-                packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")/TCP(sport=1024,dport=1024)], iface="%s")' % (
-                    mac, itf, i + 1, i + 2, itf)
-                self.tester.scapy_append(packet)
-            self.tester.scapy_execute()
-            time.sleep(.5)
-        elif tran_type == "ipv4-udp":
-            for i in range(10):
-                packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")/UDP(sport=1024,dport=1024)], iface="%s")' % (
-                    mac, itf, i + 1, i + 2, itf)
-                self.tester.scapy_append(packet)
-            self.tester.scapy_execute()
-            time.sleep(.5)
-        elif tran_type == "ipv4-sctp":
-            for i in range(10):
-                packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)], iface="%s")' % (
-                    mac, itf, i + 1, i + 2, itf)
-                self.tester.scapy_append(packet)
-            self.tester.scapy_execute()
-            time.sleep(.5)
-        elif tran_type == "ipv4-frag":
-            for i in range(10):
-                packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d",frag=1,flags="MF")], iface="%s")' % (
-                    mac, itf, i + 1, i + 2, itf)
-                self.tester.scapy_append(packet)
-            self.tester.scapy_execute()
-            time.sleep(.5)
-
-        elif tran_type == "ipv6-other":
-            for i in range(10):
-                packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")], iface="%s")' % (
-                    mac, itf, i + 1, i + 2, itf)
-                self.tester.scapy_append(packet)
-            self.tester.scapy_execute()
-            time.sleep(.5)
-        elif tran_type == "ipv6-tcp":
-            for i in range(10):
-                packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)], iface="%s")' % (
-                    mac, itf, i + 1, i + 2, itf)
-                self.tester.scapy_append(packet)
-            self.tester.scapy_execute()
-            time.sleep(.5)
-        elif tran_type == "ipv6-udp":
-            for i in range(10):
-                packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)], iface="%s")' % (
-                    mac, itf, i + 1, i + 2, itf)
-                self.tester.scapy_append(packet)
-            self.tester.scapy_execute()
-            time.sleep(.5)
-        elif tran_type == "ipv6-sctp":
+        if tran_type in packet_list.keys():
+            packet_temp = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/%s], iface="%s")' % (mac, itf, packet_list[tran_type], itf)
             for i in range(10):
-                packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)], iface="%s")' % (
-                    mac, itf, i + 1, i + 2, itf)
-                self.tester.scapy_append(packet)
-            self.tester.scapy_execute()
-            time.sleep(.5)
-        elif tran_type == "ipv6-frag":
-            for i in range(10):
-                packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()], iface="%s")' % (
-                    mac, itf, i + 1, i + 2, itf)
+                packet = packet_temp % (i + 1, i + 2)
                 self.tester.scapy_append(packet)
+                if symmetric:
+                    packet2 = packet_list[tran_type] % (mac, itf, i + 2, i + 1, itf)
+                    self.tester.scapy_append(packet2)
             self.tester.scapy_execute()
             time.sleep(.5)
         else:
@@ -154,102 +105,64 @@ class TestRssKeyUpdate(TestCase):
         # collect the hash result and the queue id
         for line in lines:
             line = line.strip()
-            if len(line) != 0 and line.strip().startswith("port "):
+            if len(line) != 0 and line.startswith("port "):
                 reta_line = {}
-                rexp = r"port (\d)/queue (\d{1,2}): received (\d) packets"
-                m = re.match(rexp, line.strip())
+                rexp = r"port (\d+)/queue (\d+): received (\d+) packets"
+                m = re.match(rexp, line)
                 if m:
                     reta_line["port"] = m.group(1)
                     reta_line["queue"] = m.group(2)
 
-            elif len(line) != 0 and line.startswith(("src=",)):
+            elif len(line) != 0 and line.startswith("src="):
                 if "RSS hash" not in line:
                     continue
                 for item in line.split("-"):
                     item = item.strip()
-                    if(item.startswith("RSS hash")):
+                    if item.startswith("RSS hash"):
                         name, value = item.split("=", 1)
 
                 reta_line[name.strip()] = value.strip()
                 received_pkts.append(reta_line)
 
-        return(self.verifyResult(received_pkts))
+        return(self.verifyResult(received_pkts, symmetric))
 
-    def verifyResult(self, reta_lines):
+    def verifyResult(self, reta_lines, symmetric):
         """
         Verify whether or not the result passes.
         """
-
-        global reta_num
         result = []
         key_id = {}
         self.verify(len(reta_lines) > 0, 'No packet received!')
         self.result_table_create(
             ['packet index', 'hash value', 'hash index', 'queue id', 'actual queue id', 'pass '])
 
-        i = 0
-
-        for tmp_reta_line in reta_lines:
+        for i, tmp_reta_line in enumerate(reta_lines):
             status = "false"
             # compute the hash result of five tuple into the 7 LSBs value.
             hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num
-            print(reta_entries[hash_index], tmp_reta_line)
             if(reta_entries[hash_index] == int(tmp_reta_line["queue"])):
                 status = "true"
                 result.insert(i, 0)
+                if symmetric:
+                    if(i % 2 == 1):
+                        if(pre_RSS_hash == tmp_reta_line["RSS hash"]):
+                            status = "true"
+                            result.insert(len(reta_lines) + (i - 1) // 2, 0)
+                        else:
+                            status = "fail"
+                            result.insert(len(reta_lines) + (i - 1) // 2, 1)
+                    pre_RSS_hash = tmp_reta_line["RSS hash"]
             else:
                 status = "fail"
                 result.insert(i, 1)
             self.result_table_add(
                 [i, tmp_reta_line["RSS hash"], hash_index, reta_entries[hash_index], tmp_reta_line["queue"], status])
-            i = i + 1
-            key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index]
+            key_id[tmp_reta_line["RSS hash"]] = reta_entries[hash_index]
 
         self.result_table_print()
         self.verify(sum(result) == 0, "the reta update function failed!")
         return key_id
 
-    def verifyResult_symmetric(self, reta_lines):
-        """
-        Verify whether or not the result passes.
-        """
-
-        global reta_num
-        result = []
-        key_id = {}
-        self.verify(len(reta_lines) > 0, 'No packet received!')
-        self.result_table_create(
-            ['packet index', 'RSS hash', 'hash index', 'queue id', 'actual queue id', 'pass '])
-
-        i = 0
-        for tmp_reta_line in reta_lines:
-            status = "false"
-            # compute the hash result of five tuple into the 7 LSBs value.
-            hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num
-            if(reta_entries[hash_index] == int(tmp_reta_line["queue"])):
-                status = "true"
-                result.insert(i, 0)
-                if(i % 2 == 1):
-                    if(pre_RSS_hash == tmp_reta_line["RSS hash"]):
-                        status = "true"
-                        result.insert(len(reta_lines) + (i - 1) // 2, 0)
-                    else:
-                        status = "fail"
-                        result.insert(len(reta_lines) + (i - 1) // 2, 1)
-                pre_RSS_hash = tmp_reta_line["RSS hash"]
-            else:
-                status = "fail"
-                result.insert(i, 1)
-            self.result_table_add(
-                [i, tmp_reta_line["RSS hash"], hash_index, reta_entries[hash_index], tmp_reta_line["queue"], status])
-            i = i + 1
-            key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index]
-
-        self.result_table_print()
-        self.verify(
-            sum(result) == 0, "the symmetric RSS hash function failed!")
-        return key_id
-
     def set_up_all(self):
         """
         Run at the start of each test suite.
@@ -282,7 +195,7 @@ class TestRssKeyUpdate(TestCase):
         elif self.nic in ["redrockcanyou", "atwood", "boulderrapid"]:
             reta_num = 128
         else:
-            self.verify(False, f"NIC Unsupported:{self.nic}")
+            self.verify(False, f"NIC Unsupported: {self.nic}")
 
         cores = self.dut.get_core_list("all")
         self.coremask = utils.create_mask(cores)
@@ -300,8 +213,6 @@ class TestRssKeyUpdate(TestCase):
         dutPorts = self.dut.get_ports(self.nic)
         localPort = self.tester.get_local_port(dutPorts[0])
         self.itf = self.tester.get_interface(localPort)
-        global reta_num
-        global iptypes
 
         self.dut.kill_all()
 
@@ -326,12 +237,12 @@ class TestRssKeyUpdate(TestCase):
                 reta_entries.insert(i, random.randint(0, queue - 1))
                 self.dut.send_expect(f"port config 0 rss reta ({i},{reta_entries[i]})", "testpmd> ")
 
-            ori_output = self.send_packet(self.itf, iptype)
+            ori_output = self.send_packet(self.itf, iptype, False)
 
             self.dut.send_expect("show port 0 rss-hash key", "testpmd> ")
             self.dut.send_expect(f"port config 0 rss-hash-key {iptype} 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ")
 
-            new_output = self.send_packet(self.itf, iptype)
+            new_output = self.send_packet(self.itf, iptype, False)
 
             self.verify(ori_output != new_output, "before and after results are the same, hash key configuration failed!")
 
@@ -356,16 +267,15 @@ class TestRssKeyUpdate(TestCase):
                 reta_entries.insert(i, random.randint(0, queue - 1))
                 self.dut.send_expect(f"port config 0 rss reta ({i},{reta_entries[i]})", "testpmd> ")
 
-            ori_output = self.send_packet(self.itf, iptype)
+            ori_output = self.send_packet(self.itf, iptype, True)
 
             out = self.dut.send_expect("show port 0 rss-hash key", "testpmd> ")
             self.verify("rss disable" not in out, "rss is disable!")
             self.dut.send_expect(f"port config 0 rss-hash-key {iptype} 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ")
 
-            new_output = self.send_packet(self.itf, iptype)
+            new_output = self.send_packet(self.itf, iptype, True)
 
             self.verify(ori_output != new_output, "before and after results are the same, hash key configuration failed!")
-        self.dut.send_expect("quit", "# ", 30)
 
     def test_set_hash_key_short_long(self):
 
@@ -384,26 +294,25 @@ class TestRssKeyUpdate(TestCase):
         out = self.dut.send_expect("show port info all", "testpmd> ", 120)
         self.verify(f"Hash key size in bytes: {nic_rss_key_size[self.nic]}" in out, "not expected hash key size!")
 
-        test_keies = {
+        test_keys = {
             "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFFFF": "longer",
             "4439796BB54C50f3B675EF5B124F9F30B8A2C0DC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF": "shorter",
         }
 
         # config key length longer/shorter than 104 hexa-decimal numbers
-        for key, error in test_keies.items():
+        for key, error in test_keys.items():
             out = self.dut.send_expect(f"port config 0 rss-hash-key ipv4-udp {key}", "testpmd> ")
             self.verify("invalid" in out, f"Try to set hash key {error} than 104 hexa-decimal numbers!")
 
         # config ket length same as 104 hex-decimal numbers and keep the config
         key = "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF"
         out = self.dut.send_expect(f"port config 0 rss-hash-key ipv4-udp {key}", "testpmd> ")
-        self.dut.send_expect("quit", "# ", 30)
 
     def tear_down(self):
         """
         Run after each test case.
         """
-        self.dut.send_expect("quit", "# ", 30)
+        self.pmdout.quit()
 
     def tear_down_all(self):
         """
-- 
2.17.1


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [dts] [PATCH v2]Add RSS Key Update Feature
  2020-07-15 20:08 ` [dts] [PATCH v2]Add RSS Key Update Feature David Liu
@ 2020-07-24  2:01   ` Tu, Lijuan
  2020-07-24 20:45     ` David Liu
  0 siblings, 1 reply; 3+ messages in thread
From: Tu, Lijuan @ 2020-07-24  2:01 UTC (permalink / raw)
  To: David Liu, dts; +Cc: lylavoie

Hi David,

V2 should be also based on DTS remote master, but not your local code.

When V1 are not merged, we submit V2, V2 should cover V1+ fix comments based on DTS remote code, maintainer will ignore V1 and merge V2. It's not make sense to merge patches with obvious defect. 

> -----Original Message-----
> From: dts <dts-bounces@dpdk.org> On Behalf Of David Liu
> Sent: 2020年7月16日 4:09
> To: dts@dpdk.org
> Cc: lylavoie@iol.unh.edu; David Liu <dliu@iol.unh.edu>
> Subject: [dts] [PATCH v2]Add RSS Key Update Feature
> 
>  Merge duplicated code. Add flag in send packet and verify  result to identify
> symmetric used.
> 
> Signed-off-by: David Liu <dliu@iol.unh.edu>
> ---
>  tests/TestSuite_rss_key_update.py | 183 ++++++++----------------------
>  1 file changed, 46 insertions(+), 137 deletions(-)
> 
> diff --git a/tests/TestSuite_rss_key_update.py
> b/tests/TestSuite_rss_key_update.py
> index 0985f30..adb44f1 100644
> --- a/tests/TestSuite_rss_key_update.py
> +++ b/tests/TestSuite_rss_key_update.py
> @@ -39,7 +39,6 @@ Test the support of RSS Key Update by Poll Mode Drivers.
> 
>  import time
>  import re
> -import packet
>  import random
>  import utils
> 
> @@ -63,85 +62,37 @@ iptypes = {'ipv4-sctp': 'sctp',
> 
>  class TestRssKeyUpdate(TestCase):
> 
> -    def send_packet(self, itf, tran_type):
> +    def send_packet(self, itf, tran_type, symmetric):
>          """
>          Sends packets.
>          """
> +        packet_list = {
> +            'ipv4-sctp': 'IP(src="192.168.0.%d",
> dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)',
> +            'ipv4-other': 'IP(src="192.168.0.%d", dst="192.168.0.%d")',
> +            'ipv4-frag': 'IP(src="192.168.0.%d",
> dst="192.168.0.%d",frag=1,flags="MF")',
> +            'ipv4-udp': 'IP(src="192.168.0.%d",
> dst="192.168.0.%d")/UDP(sport=1024,dport=1024)',
> +            'ipv4-tcp': 'IP(src="192.168.0.%d",
> dst="192.168.0.%d")/TCP(sport=1024,dport=1024)',
> +            'ipv6-other':'IPv6(src="3ffe:2501:200:1fff::%d",
> dst="3ffe:2501:200:3::%d")',
> +            'ipv6-sctp': 'IPv6(src="3ffe:2501:200:1fff::%d",
> dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)',
> +            'ipv6-udp': 'IPv6(src="3ffe:2501:200:1fff::%d",
> dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)',
> +            'ipv6-tcp': 'IPv6(src="3ffe:2501:200:1fff::%d",
> dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)',
> +            'ipv6-frag': 'IPv6(src="3ffe:2501:200:1fff::%d",
> dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()'
> +        }
> +
>          received_pkts = []
>          self.tester.scapy_foreground()
>          self.dut.send_expect("start", "testpmd>")
>          mac = self.dut.get_mac_address(0)
> 
>          # send packet with different source and dest ip
> -        if tran_type == "ipv4-other":
> -            for i in range(10):
> -                packet = r'sendp([Ether(dst="%s",
> src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")],
> iface="%s")' % (
> -                    mac, itf, i + 1, i + 2, itf)
> -                self.tester.scapy_append(packet)
> -            self.tester.scapy_execute()
> -            time.sleep(.5)
> -        elif tran_type == "ipv4-tcp":
> -            for i in range(10):
> -                packet = r'sendp([Ether(dst="%s",
> src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d",
> dst="192.168.0.%d")/TCP(sport=1024,dport=1024)], iface="%s")' % (
> -                    mac, itf, i + 1, i + 2, itf)
> -                self.tester.scapy_append(packet)
> -            self.tester.scapy_execute()
> -            time.sleep(.5)
> -        elif tran_type == "ipv4-udp":
> -            for i in range(10):
> -                packet = r'sendp([Ether(dst="%s",
> src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d",
> dst="192.168.0.%d")/UDP(sport=1024,dport=1024)], iface="%s")' % (
> -                    mac, itf, i + 1, i + 2, itf)
> -                self.tester.scapy_append(packet)
> -            self.tester.scapy_execute()
> -            time.sleep(.5)
> -        elif tran_type == "ipv4-sctp":
> -            for i in range(10):
> -                packet = r'sendp([Ether(dst="%s",
> src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d",
> dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)], iface="%s")' % (
> -                    mac, itf, i + 1, i + 2, itf)
> -                self.tester.scapy_append(packet)
> -            self.tester.scapy_execute()
> -            time.sleep(.5)
> -        elif tran_type == "ipv4-frag":
> -            for i in range(10):
> -                packet = r'sendp([Ether(dst="%s",
> src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d",
> dst="192.168.0.%d",frag=1,flags="MF")], iface="%s")' % (
> -                    mac, itf, i + 1, i + 2, itf)
> -                self.tester.scapy_append(packet)
> -            self.tester.scapy_execute()
> -            time.sleep(.5)
> -
> -        elif tran_type == "ipv6-other":
> -            for i in range(10):
> -                packet = r'sendp([Ether(dst="%s",
> src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d",
> dst="3ffe:2501:200:3::%d")], iface="%s")' % (
> -                    mac, itf, i + 1, i + 2, itf)
> -                self.tester.scapy_append(packet)
> -            self.tester.scapy_execute()
> -            time.sleep(.5)
> -        elif tran_type == "ipv6-tcp":
> -            for i in range(10):
> -                packet = r'sendp([Ether(dst="%s",
> src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d",
> dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)], iface="%s")' % (
> -                    mac, itf, i + 1, i + 2, itf)
> -                self.tester.scapy_append(packet)
> -            self.tester.scapy_execute()
> -            time.sleep(.5)
> -        elif tran_type == "ipv6-udp":
> -            for i in range(10):
> -                packet = r'sendp([Ether(dst="%s",
> src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d",
> dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)], iface="%s")' % (
> -                    mac, itf, i + 1, i + 2, itf)
> -                self.tester.scapy_append(packet)
> -            self.tester.scapy_execute()
> -            time.sleep(.5)
> -        elif tran_type == "ipv6-sctp":
> +        if tran_type in packet_list.keys():
> +            packet_temp = r'sendp([Ether(dst="%s",
> + src=get_if_hwaddr("%s"))/%s], iface="%s")' % (mac, itf,
> + packet_list[tran_type], itf)
>              for i in range(10):
> -                packet = r'sendp([Ether(dst="%s",
> src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d",
> dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)],
> iface="%s")' % (
> -                    mac, itf, i + 1, i + 2, itf)
> -                self.tester.scapy_append(packet)
> -            self.tester.scapy_execute()
> -            time.sleep(.5)
> -        elif tran_type == "ipv6-frag":
> -            for i in range(10):
> -                packet = r'sendp([Ether(dst="%s",
> src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d",
> dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()], iface="%s")' % (
> -                    mac, itf, i + 1, i + 2, itf)
> +                packet = packet_temp % (i + 1, i + 2)
>                  self.tester.scapy_append(packet)
> +                if symmetric:
> +                    packet2 = packet_list[tran_type] % (mac, itf, i + 2, i + 1, itf)
> +                    self.tester.scapy_append(packet2)
>              self.tester.scapy_execute()
>              time.sleep(.5)
>          else:
> @@ -154,102 +105,64 @@ class TestRssKeyUpdate(TestCase):
>          # collect the hash result and the queue id
>          for line in lines:
>              line = line.strip()
> -            if len(line) != 0 and line.strip().startswith("port "):
> +            if len(line) != 0 and line.startswith("port "):
>                  reta_line = {}
> -                rexp = r"port (\d)/queue (\d{1,2}): received (\d) packets"
> -                m = re.match(rexp, line.strip())
> +                rexp = r"port (\d+)/queue (\d+): received (\d+) packets"
> +                m = re.match(rexp, line)
>                  if m:
>                      reta_line["port"] = m.group(1)
>                      reta_line["queue"] = m.group(2)
> 
> -            elif len(line) != 0 and line.startswith(("src=",)):
> +            elif len(line) != 0 and line.startswith("src="):
>                  if "RSS hash" not in line:
>                      continue
>                  for item in line.split("-"):
>                      item = item.strip()
> -                    if(item.startswith("RSS hash")):
> +                    if item.startswith("RSS hash"):
>                          name, value = item.split("=", 1)
> 
>                  reta_line[name.strip()] = value.strip()
>                  received_pkts.append(reta_line)
> 
> -        return(self.verifyResult(received_pkts))
> +        return(self.verifyResult(received_pkts, symmetric))
> 
> -    def verifyResult(self, reta_lines):
> +    def verifyResult(self, reta_lines, symmetric):
>          """
>          Verify whether or not the result passes.
>          """
> -
> -        global reta_num
>          result = []
>          key_id = {}
>          self.verify(len(reta_lines) > 0, 'No packet received!')
>          self.result_table_create(
>              ['packet index', 'hash value', 'hash index', 'queue id', 'actual queue id',
> 'pass '])
> 
> -        i = 0
> -
> -        for tmp_reta_line in reta_lines:
> +        for i, tmp_reta_line in enumerate(reta_lines):
>              status = "false"
>              # compute the hash result of five tuple into the 7 LSBs value.
>              hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num
> -            print(reta_entries[hash_index], tmp_reta_line)
>              if(reta_entries[hash_index] == int(tmp_reta_line["queue"])):
>                  status = "true"
>                  result.insert(i, 0)
> +                if symmetric:
> +                    if(i % 2 == 1):
> +                        if(pre_RSS_hash == tmp_reta_line["RSS hash"]):
> +                            status = "true"
> +                            result.insert(len(reta_lines) + (i - 1) // 2, 0)
> +                        else:
> +                            status = "fail"
> +                            result.insert(len(reta_lines) + (i - 1) // 2, 1)
> +                    pre_RSS_hash = tmp_reta_line["RSS hash"]
>              else:
>                  status = "fail"
>                  result.insert(i, 1)
>              self.result_table_add(
>                  [i, tmp_reta_line["RSS hash"], hash_index, reta_entries[hash_index],
> tmp_reta_line["queue"], status])
> -            i = i + 1
> -            key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index]
> +            key_id[tmp_reta_line["RSS hash"]] =
> + reta_entries[hash_index]
> 
>          self.result_table_print()
>          self.verify(sum(result) == 0, "the reta update function failed!")
>          return key_id
> 
> -    def verifyResult_symmetric(self, reta_lines):
> -        """
> -        Verify whether or not the result passes.
> -        """
> -
> -        global reta_num
> -        result = []
> -        key_id = {}
> -        self.verify(len(reta_lines) > 0, 'No packet received!')
> -        self.result_table_create(
> -            ['packet index', 'RSS hash', 'hash index', 'queue id', 'actual queue id', 'pass
> '])
> -
> -        i = 0
> -        for tmp_reta_line in reta_lines:
> -            status = "false"
> -            # compute the hash result of five tuple into the 7 LSBs value.
> -            hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num
> -            if(reta_entries[hash_index] == int(tmp_reta_line["queue"])):
> -                status = "true"
> -                result.insert(i, 0)
> -                if(i % 2 == 1):
> -                    if(pre_RSS_hash == tmp_reta_line["RSS hash"]):
> -                        status = "true"
> -                        result.insert(len(reta_lines) + (i - 1) // 2, 0)
> -                    else:
> -                        status = "fail"
> -                        result.insert(len(reta_lines) + (i - 1) // 2, 1)
> -                pre_RSS_hash = tmp_reta_line["RSS hash"]
> -            else:
> -                status = "fail"
> -                result.insert(i, 1)
> -            self.result_table_add(
> -                [i, tmp_reta_line["RSS hash"], hash_index, reta_entries[hash_index],
> tmp_reta_line["queue"], status])
> -            i = i + 1
> -            key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index]
> -
> -        self.result_table_print()
> -        self.verify(
> -            sum(result) == 0, "the symmetric RSS hash function failed!")
> -        return key_id
> -
>      def set_up_all(self):
>          """
>          Run at the start of each test suite.
> @@ -282,7 +195,7 @@ class TestRssKeyUpdate(TestCase):
>          elif self.nic in ["redrockcanyou", "atwood", "boulderrapid"]:
>              reta_num = 128
>          else:
> -            self.verify(False, f"NIC Unsupported:{self.nic}")
> +            self.verify(False, f"NIC Unsupported: {self.nic}")
> 
>          cores = self.dut.get_core_list("all")
>          self.coremask = utils.create_mask(cores) @@ -300,8 +213,6 @@ class
> TestRssKeyUpdate(TestCase):
>          dutPorts = self.dut.get_ports(self.nic)
>          localPort = self.tester.get_local_port(dutPorts[0])
>          self.itf = self.tester.get_interface(localPort)
> -        global reta_num
> -        global iptypes
> 
>          self.dut.kill_all()
> 
> @@ -326,12 +237,12 @@ class TestRssKeyUpdate(TestCase):
>                  reta_entries.insert(i, random.randint(0, queue - 1))
>                  self.dut.send_expect(f"port config 0 rss reta ({i},{reta_entries[i]})",
> "testpmd> ")
> 
> -            ori_output = self.send_packet(self.itf, iptype)
> +            ori_output = self.send_packet(self.itf, iptype, False)
> 
>              self.dut.send_expect("show port 0 rss-hash key", "testpmd> ")
>              self.dut.send_expect(f"port config 0 rss-hash-key {iptype}
> 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C
> 05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ")
> 
> -            new_output = self.send_packet(self.itf, iptype)
> +            new_output = self.send_packet(self.itf, iptype, False)
> 
>              self.verify(ori_output != new_output, "before and after results are the
> same, hash key configuration failed!")
> 
> @@ -356,16 +267,15 @@ class TestRssKeyUpdate(TestCase):
>                  reta_entries.insert(i, random.randint(0, queue - 1))
>                  self.dut.send_expect(f"port config 0 rss reta ({i},{reta_entries[i]})",
> "testpmd> ")
> 
> -            ori_output = self.send_packet(self.itf, iptype)
> +            ori_output = self.send_packet(self.itf, iptype, True)
> 
>              out = self.dut.send_expect("show port 0 rss-hash key", "testpmd> ")
>              self.verify("rss disable" not in out, "rss is disable!")
>              self.dut.send_expect(f"port config 0 rss-hash-key {iptype}
> 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C
> 05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ")
> 
> -            new_output = self.send_packet(self.itf, iptype)
> +            new_output = self.send_packet(self.itf, iptype, True)
> 
>              self.verify(ori_output != new_output, "before and after results are the
> same, hash key configuration failed!")
> -        self.dut.send_expect("quit", "# ", 30)
> 
>      def test_set_hash_key_short_long(self):
> 
> @@ -384,26 +294,25 @@ class TestRssKeyUpdate(TestCase):
>          out = self.dut.send_expect("show port info all", "testpmd> ", 120)
>          self.verify(f"Hash key size in bytes: {nic_rss_key_size[self.nic]}" in out, "not
> expected hash key size!")
> 
> -        test_keies = {
> +        test_keys = {
> 
> "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4
> C05C6FA343958D855FFF9583AE138C92E81150FFFFF": "longer",
> 
> "4439796BB54C50f3B675EF5B124F9F30B8A2C0DC4D02A08C9B334FF64A4C05C
> 6FA343958D855FFF9583AE138C92E81150FFF": "shorter",
>          }
> 
>          # config key length longer/shorter than 104 hexa-decimal numbers
> -        for key, error in test_keies.items():
> +        for key, error in test_keys.items():
>              out = self.dut.send_expect(f"port config 0 rss-hash-key ipv4-udp {key}",
> "testpmd> ")
>              self.verify("invalid" in out, f"Try to set hash key {error} than 104 hexa-
> decimal numbers!")
> 
>          # config ket length same as 104 hex-decimal numbers and keep the config
>          key =
> "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4
> C05C6FA343958D855FFF9583AE138C92E81150FFF"
>          out = self.dut.send_expect(f"port config 0 rss-hash-key ipv4-udp {key}",
> "testpmd> ")
> -        self.dut.send_expect("quit", "# ", 30)
> 
>      def tear_down(self):
>          """
>          Run after each test case.
>          """
> -        self.dut.send_expect("quit", "# ", 30)
> +        self.pmdout.quit()
> 
>      def tear_down_all(self):
>          """
> --
> 2.17.1


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [dts] [PATCH v2]Add RSS Key Update Feature
  2020-07-24  2:01   ` Tu, Lijuan
@ 2020-07-24 20:45     ` David Liu
  0 siblings, 0 replies; 3+ messages in thread
From: David Liu @ 2020-07-24 20:45 UTC (permalink / raw)
  To: Tu, Lijuan; +Cc: dts, lylavoie

[-- Attachment #1: Type: text/plain, Size: 18815 bytes --]

Hi Lijuan,

Sorry, what you suggested makes sense. The V2 I send was some changes that
will make the code cleaner by combining some duplicated code in the V1. To
solve this issue, I will submit a patch that combines both of these
versions.

Thanks
David

On Thu, Jul 23, 2020 at 10:01 PM Tu, Lijuan <lijuan.tu@intel.com> wrote:

> Hi David,
>
> V2 should be also based on DTS remote master, but not your local code.
>
> When V1 are not merged, we submit V2, V2 should cover V1+ fix comments
> based on DTS remote code, maintainer will ignore V1 and merge V2. It's not
> make sense to merge patches with obvious defect.
>
> > -----Original Message-----
> > From: dts <dts-bounces@dpdk.org> On Behalf Of David Liu
> > Sent: 2020年7月16日 4:09
> > To: dts@dpdk.org
> > Cc: lylavoie@iol.unh.edu; David Liu <dliu@iol.unh.edu>
> > Subject: [dts] [PATCH v2]Add RSS Key Update Feature
> >
> >  Merge duplicated code. Add flag in send packet and verify  result to
> identify
> > symmetric used.
> >
> > Signed-off-by: David Liu <dliu@iol.unh.edu>
> > ---
> >  tests/TestSuite_rss_key_update.py | 183 ++++++++----------------------
> >  1 file changed, 46 insertions(+), 137 deletions(-)
> >
> > diff --git a/tests/TestSuite_rss_key_update.py
> > b/tests/TestSuite_rss_key_update.py
> > index 0985f30..adb44f1 100644
> > --- a/tests/TestSuite_rss_key_update.py
> > +++ b/tests/TestSuite_rss_key_update.py
> > @@ -39,7 +39,6 @@ Test the support of RSS Key Update by Poll Mode
> Drivers.
> >
> >  import time
> >  import re
> > -import packet
> >  import random
> >  import utils
> >
> > @@ -63,85 +62,37 @@ iptypes = {'ipv4-sctp': 'sctp',
> >
> >  class TestRssKeyUpdate(TestCase):
> >
> > -    def send_packet(self, itf, tran_type):
> > +    def send_packet(self, itf, tran_type, symmetric):
> >          """
> >          Sends packets.
> >          """
> > +        packet_list = {
> > +            'ipv4-sctp': 'IP(src="192.168.0.%d",
> > dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)',
> > +            'ipv4-other': 'IP(src="192.168.0.%d", dst="192.168.0.%d")',
> > +            'ipv4-frag': 'IP(src="192.168.0.%d",
> > dst="192.168.0.%d",frag=1,flags="MF")',
> > +            'ipv4-udp': 'IP(src="192.168.0.%d",
> > dst="192.168.0.%d")/UDP(sport=1024,dport=1024)',
> > +            'ipv4-tcp': 'IP(src="192.168.0.%d",
> > dst="192.168.0.%d")/TCP(sport=1024,dport=1024)',
> > +            'ipv6-other':'IPv6(src="3ffe:2501:200:1fff::%d",
> > dst="3ffe:2501:200:3::%d")',
> > +            'ipv6-sctp': 'IPv6(src="3ffe:2501:200:1fff::%d",
> > dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)',
> > +            'ipv6-udp': 'IPv6(src="3ffe:2501:200:1fff::%d",
> > dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)',
> > +            'ipv6-tcp': 'IPv6(src="3ffe:2501:200:1fff::%d",
> > dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)',
> > +            'ipv6-frag': 'IPv6(src="3ffe:2501:200:1fff::%d",
> > dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()'
> > +        }
> > +
> >          received_pkts = []
> >          self.tester.scapy_foreground()
> >          self.dut.send_expect("start", "testpmd>")
> >          mac = self.dut.get_mac_address(0)
> >
> >          # send packet with different source and dest ip
> > -        if tran_type == "ipv4-other":
> > -            for i in range(10):
> > -                packet = r'sendp([Ether(dst="%s",
> > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")],
> > iface="%s")' % (
> > -                    mac, itf, i + 1, i + 2, itf)
> > -                self.tester.scapy_append(packet)
> > -            self.tester.scapy_execute()
> > -            time.sleep(.5)
> > -        elif tran_type == "ipv4-tcp":
> > -            for i in range(10):
> > -                packet = r'sendp([Ether(dst="%s",
> > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d",
> > dst="192.168.0.%d")/TCP(sport=1024,dport=1024)], iface="%s")' % (
> > -                    mac, itf, i + 1, i + 2, itf)
> > -                self.tester.scapy_append(packet)
> > -            self.tester.scapy_execute()
> > -            time.sleep(.5)
> > -        elif tran_type == "ipv4-udp":
> > -            for i in range(10):
> > -                packet = r'sendp([Ether(dst="%s",
> > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d",
> > dst="192.168.0.%d")/UDP(sport=1024,dport=1024)], iface="%s")' % (
> > -                    mac, itf, i + 1, i + 2, itf)
> > -                self.tester.scapy_append(packet)
> > -            self.tester.scapy_execute()
> > -            time.sleep(.5)
> > -        elif tran_type == "ipv4-sctp":
> > -            for i in range(10):
> > -                packet = r'sendp([Ether(dst="%s",
> > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d",
> > dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)], iface="%s")' % (
> > -                    mac, itf, i + 1, i + 2, itf)
> > -                self.tester.scapy_append(packet)
> > -            self.tester.scapy_execute()
> > -            time.sleep(.5)
> > -        elif tran_type == "ipv4-frag":
> > -            for i in range(10):
> > -                packet = r'sendp([Ether(dst="%s",
> > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d",
> > dst="192.168.0.%d",frag=1,flags="MF")], iface="%s")' % (
> > -                    mac, itf, i + 1, i + 2, itf)
> > -                self.tester.scapy_append(packet)
> > -            self.tester.scapy_execute()
> > -            time.sleep(.5)
> > -
> > -        elif tran_type == "ipv6-other":
> > -            for i in range(10):
> > -                packet = r'sendp([Ether(dst="%s",
> > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d",
> > dst="3ffe:2501:200:3::%d")], iface="%s")' % (
> > -                    mac, itf, i + 1, i + 2, itf)
> > -                self.tester.scapy_append(packet)
> > -            self.tester.scapy_execute()
> > -            time.sleep(.5)
> > -        elif tran_type == "ipv6-tcp":
> > -            for i in range(10):
> > -                packet = r'sendp([Ether(dst="%s",
> > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d",
> > dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)], iface="%s")' % (
> > -                    mac, itf, i + 1, i + 2, itf)
> > -                self.tester.scapy_append(packet)
> > -            self.tester.scapy_execute()
> > -            time.sleep(.5)
> > -        elif tran_type == "ipv6-udp":
> > -            for i in range(10):
> > -                packet = r'sendp([Ether(dst="%s",
> > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d",
> > dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)], iface="%s")' % (
> > -                    mac, itf, i + 1, i + 2, itf)
> > -                self.tester.scapy_append(packet)
> > -            self.tester.scapy_execute()
> > -            time.sleep(.5)
> > -        elif tran_type == "ipv6-sctp":
> > +        if tran_type in packet_list.keys():
> > +            packet_temp = r'sendp([Ether(dst="%s",
> > + src=get_if_hwaddr("%s"))/%s], iface="%s")' % (mac, itf,
> > + packet_list[tran_type], itf)
> >              for i in range(10):
> > -                packet = r'sendp([Ether(dst="%s",
> > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d",
> > dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)],
> > iface="%s")' % (
> > -                    mac, itf, i + 1, i + 2, itf)
> > -                self.tester.scapy_append(packet)
> > -            self.tester.scapy_execute()
> > -            time.sleep(.5)
> > -        elif tran_type == "ipv6-frag":
> > -            for i in range(10):
> > -                packet = r'sendp([Ether(dst="%s",
> > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d",
> > dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()], iface="%s")' % (
> > -                    mac, itf, i + 1, i + 2, itf)
> > +                packet = packet_temp % (i + 1, i + 2)
> >                  self.tester.scapy_append(packet)
> > +                if symmetric:
> > +                    packet2 = packet_list[tran_type] % (mac, itf, i +
> 2, i + 1, itf)
> > +                    self.tester.scapy_append(packet2)
> >              self.tester.scapy_execute()
> >              time.sleep(.5)
> >          else:
> > @@ -154,102 +105,64 @@ class TestRssKeyUpdate(TestCase):
> >          # collect the hash result and the queue id
> >          for line in lines:
> >              line = line.strip()
> > -            if len(line) != 0 and line.strip().startswith("port "):
> > +            if len(line) != 0 and line.startswith("port "):
> >                  reta_line = {}
> > -                rexp = r"port (\d)/queue (\d{1,2}): received (\d)
> packets"
> > -                m = re.match(rexp, line.strip())
> > +                rexp = r"port (\d+)/queue (\d+): received (\d+) packets"
> > +                m = re.match(rexp, line)
> >                  if m:
> >                      reta_line["port"] = m.group(1)
> >                      reta_line["queue"] = m.group(2)
> >
> > -            elif len(line) != 0 and line.startswith(("src=",)):
> > +            elif len(line) != 0 and line.startswith("src="):
> >                  if "RSS hash" not in line:
> >                      continue
> >                  for item in line.split("-"):
> >                      item = item.strip()
> > -                    if(item.startswith("RSS hash")):
> > +                    if item.startswith("RSS hash"):
> >                          name, value = item.split("=", 1)
> >
> >                  reta_line[name.strip()] = value.strip()
> >                  received_pkts.append(reta_line)
> >
> > -        return(self.verifyResult(received_pkts))
> > +        return(self.verifyResult(received_pkts, symmetric))
> >
> > -    def verifyResult(self, reta_lines):
> > +    def verifyResult(self, reta_lines, symmetric):
> >          """
> >          Verify whether or not the result passes.
> >          """
> > -
> > -        global reta_num
> >          result = []
> >          key_id = {}
> >          self.verify(len(reta_lines) > 0, 'No packet received!')
> >          self.result_table_create(
> >              ['packet index', 'hash value', 'hash index', 'queue id',
> 'actual queue id',
> > 'pass '])
> >
> > -        i = 0
> > -
> > -        for tmp_reta_line in reta_lines:
> > +        for i, tmp_reta_line in enumerate(reta_lines):
> >              status = "false"
> >              # compute the hash result of five tuple into the 7 LSBs
> value.
> >              hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num
> > -            print(reta_entries[hash_index], tmp_reta_line)
> >              if(reta_entries[hash_index] == int(tmp_reta_line["queue"])):
> >                  status = "true"
> >                  result.insert(i, 0)
> > +                if symmetric:
> > +                    if(i % 2 == 1):
> > +                        if(pre_RSS_hash == tmp_reta_line["RSS hash"]):
> > +                            status = "true"
> > +                            result.insert(len(reta_lines) + (i - 1) //
> 2, 0)
> > +                        else:
> > +                            status = "fail"
> > +                            result.insert(len(reta_lines) + (i - 1) //
> 2, 1)
> > +                    pre_RSS_hash = tmp_reta_line["RSS hash"]
> >              else:
> >                  status = "fail"
> >                  result.insert(i, 1)
> >              self.result_table_add(
> >                  [i, tmp_reta_line["RSS hash"], hash_index,
> reta_entries[hash_index],
> > tmp_reta_line["queue"], status])
> > -            i = i + 1
> > -            key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index]
> > +            key_id[tmp_reta_line["RSS hash"]] =
> > + reta_entries[hash_index]
> >
> >          self.result_table_print()
> >          self.verify(sum(result) == 0, "the reta update function
> failed!")
> >          return key_id
> >
> > -    def verifyResult_symmetric(self, reta_lines):
> > -        """
> > -        Verify whether or not the result passes.
> > -        """
> > -
> > -        global reta_num
> > -        result = []
> > -        key_id = {}
> > -        self.verify(len(reta_lines) > 0, 'No packet received!')
> > -        self.result_table_create(
> > -            ['packet index', 'RSS hash', 'hash index', 'queue id',
> 'actual queue id', 'pass
> > '])
> > -
> > -        i = 0
> > -        for tmp_reta_line in reta_lines:
> > -            status = "false"
> > -            # compute the hash result of five tuple into the 7 LSBs
> value.
> > -            hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num
> > -            if(reta_entries[hash_index] == int(tmp_reta_line["queue"])):
> > -                status = "true"
> > -                result.insert(i, 0)
> > -                if(i % 2 == 1):
> > -                    if(pre_RSS_hash == tmp_reta_line["RSS hash"]):
> > -                        status = "true"
> > -                        result.insert(len(reta_lines) + (i - 1) // 2, 0)
> > -                    else:
> > -                        status = "fail"
> > -                        result.insert(len(reta_lines) + (i - 1) // 2, 1)
> > -                pre_RSS_hash = tmp_reta_line["RSS hash"]
> > -            else:
> > -                status = "fail"
> > -                result.insert(i, 1)
> > -            self.result_table_add(
> > -                [i, tmp_reta_line["RSS hash"], hash_index,
> reta_entries[hash_index],
> > tmp_reta_line["queue"], status])
> > -            i = i + 1
> > -            key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index]
> > -
> > -        self.result_table_print()
> > -        self.verify(
> > -            sum(result) == 0, "the symmetric RSS hash function failed!")
> > -        return key_id
> > -
> >      def set_up_all(self):
> >          """
> >          Run at the start of each test suite.
> > @@ -282,7 +195,7 @@ class TestRssKeyUpdate(TestCase):
> >          elif self.nic in ["redrockcanyou", "atwood", "boulderrapid"]:
> >              reta_num = 128
> >          else:
> > -            self.verify(False, f"NIC Unsupported:{self.nic}")
> > +            self.verify(False, f"NIC Unsupported: {self.nic}")
> >
> >          cores = self.dut.get_core_list("all")
> >          self.coremask = utils.create_mask(cores) @@ -300,8 +213,6 @@
> class
> > TestRssKeyUpdate(TestCase):
> >          dutPorts = self.dut.get_ports(self.nic)
> >          localPort = self.tester.get_local_port(dutPorts[0])
> >          self.itf = self.tester.get_interface(localPort)
> > -        global reta_num
> > -        global iptypes
> >
> >          self.dut.kill_all()
> >
> > @@ -326,12 +237,12 @@ class TestRssKeyUpdate(TestCase):
> >                  reta_entries.insert(i, random.randint(0, queue - 1))
> >                  self.dut.send_expect(f"port config 0 rss reta
> ({i},{reta_entries[i]})",
> > "testpmd> ")
> >
> > -            ori_output = self.send_packet(self.itf, iptype)
> > +            ori_output = self.send_packet(self.itf, iptype, False)
> >
> >              self.dut.send_expect("show port 0 rss-hash key", "testpmd>
> ")
> >              self.dut.send_expect(f"port config 0 rss-hash-key {iptype}
> > 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C
> > 05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ")
> >
> > -            new_output = self.send_packet(self.itf, iptype)
> > +            new_output = self.send_packet(self.itf, iptype, False)
> >
> >              self.verify(ori_output != new_output, "before and after
> results are the
> > same, hash key configuration failed!")
> >
> > @@ -356,16 +267,15 @@ class TestRssKeyUpdate(TestCase):
> >                  reta_entries.insert(i, random.randint(0, queue - 1))
> >                  self.dut.send_expect(f"port config 0 rss reta
> ({i},{reta_entries[i]})",
> > "testpmd> ")
> >
> > -            ori_output = self.send_packet(self.itf, iptype)
> > +            ori_output = self.send_packet(self.itf, iptype, True)
> >
> >              out = self.dut.send_expect("show port 0 rss-hash key",
> "testpmd> ")
> >              self.verify("rss disable" not in out, "rss is disable!")
> >              self.dut.send_expect(f"port config 0 rss-hash-key {iptype}
> > 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C
> > 05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ")
> >
> > -            new_output = self.send_packet(self.itf, iptype)
> > +            new_output = self.send_packet(self.itf, iptype, True)
> >
> >              self.verify(ori_output != new_output, "before and after
> results are the
> > same, hash key configuration failed!")
> > -        self.dut.send_expect("quit", "# ", 30)
> >
> >      def test_set_hash_key_short_long(self):
> >
> > @@ -384,26 +294,25 @@ class TestRssKeyUpdate(TestCase):
> >          out = self.dut.send_expect("show port info all", "testpmd> ",
> 120)
> >          self.verify(f"Hash key size in bytes:
> {nic_rss_key_size[self.nic]}" in out, "not
> > expected hash key size!")
> >
> > -        test_keies = {
> > +        test_keys = {
> >
> > "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4
> > C05C6FA343958D855FFF9583AE138C92E81150FFFFF": "longer",
> >
> > "4439796BB54C50f3B675EF5B124F9F30B8A2C0DC4D02A08C9B334FF64A4C05C
> > 6FA343958D855FFF9583AE138C92E81150FFF": "shorter",
> >          }
> >
> >          # config key length longer/shorter than 104 hexa-decimal numbers
> > -        for key, error in test_keies.items():
> > +        for key, error in test_keys.items():
> >              out = self.dut.send_expect(f"port config 0 rss-hash-key
> ipv4-udp {key}",
> > "testpmd> ")
> >              self.verify("invalid" in out, f"Try to set hash key {error}
> than 104 hexa-
> > decimal numbers!")
> >
> >          # config ket length same as 104 hex-decimal numbers and keep
> the config
> >          key =
> > "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4
> > C05C6FA343958D855FFF9583AE138C92E81150FFF"
> >          out = self.dut.send_expect(f"port config 0 rss-hash-key
> ipv4-udp {key}",
> > "testpmd> ")
> > -        self.dut.send_expect("quit", "# ", 30)
> >
> >      def tear_down(self):
> >          """
> >          Run after each test case.
> >          """
> > -        self.dut.send_expect("quit", "# ", 30)
> > +        self.pmdout.quit()
> >
> >      def tear_down_all(self):
> >          """
> > --
> > 2.17.1
>
>

[-- Attachment #2: Type: text/html, Size: 25384 bytes --]

^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2020-07-24 20:46 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
     [not found] <f08663d0b11bfc1487f7461dd7c952bab652d9e8>
2020-07-15 20:08 ` [dts] [PATCH v2]Add RSS Key Update Feature David Liu
2020-07-24  2:01   ` Tu, Lijuan
2020-07-24 20:45     ` David Liu

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).