From: David Liu <dliu@iol.unh.edu>
To: dts@dpdk.org
Cc: dliu@iol.unh.edu, lylavoie@iol.unh.edu, dev@dpdk.org
Subject: [dts] [PATCH] Add RSS Key Update Feature
Date: Fri, 10 Jul 2020 12:42:41 -0400 [thread overview]
Message-ID: <20200710164242.23828-1-dliu@iol.unh.edu> (raw)
This is test case use Toeplitz hash function to check for RSS
Key Update.
Signed-off-by: David Liu <dliu@iol.unh.edu>
---
| 121 +++++++
| 412 ++++++++++++++++++++++++
2 files changed, 533 insertions(+)
create mode 100644 test_plans/rss_key_update_test_plan.rst
create mode 100644 tests/TestSuite_rss_key_update.py
--git a/test_plans/rss_key_update_test_plan.rst b/test_plans/rss_key_update_test_plan.rst
new file mode 100644
index 0000000..43f726b
--- /dev/null
+++ b/test_plans/rss_key_update_test_plan.rst
@@ -0,0 +1,121 @@
+.. # BSD LICENSE
+ #
+ # Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
+ # Copyright © 2018[, 2019] The University of New Hampshire. All rights reserved.
+ # All rights reserved.
+ #
+ # Redistribution and use in source and binary forms, with or without
+ # modification, are permitted provided that the following conditions
+ # are met:
+ #
+ # * Redistributions of source code must retain the above copyright
+ # notice, this list of conditions and the following disclaimer.
+ # * Redistributions in binary form must reproduce the above copyright
+ # notice, this list of conditions and the following disclaimer in
+ # the documentation and/or other materials provided with the
+ # distribution.
+ # * Neither the name of Intel Corporation nor the names of its
+ # contributors may be used to endorse or promote products derived
+ # from this software without specific prior written permission.
+ #
+ # THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ # "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ # LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ # A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ # OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ # SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ # LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ # DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ # THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ # (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ # OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+=====================
+RSS Key Update Tests
+=====================
+
+This document provides test plan to configure Receive Side Scaling (RSS)
+hash key. This test case use similar testing method in ```pmdrss_hash```.
+Verify setting a new hash key will result a change in packets queue destination.
+
+=============
+Prerequisites
+=============
+
+Assuming that ports ``0`` and ``1`` of the test target are directly connected
+to the traffic generator and hash function Toeplitz is supported.
+
+
+Test Case: test_set_hash_key_toeplitz
+=====================================
+
+#. Launch the ``testpmd`` application with the following arguments::
+
+ ./testpmd -c ffffff -n 4 -- -i --portmask=0x6 --rxq=16 --txq=16
+
+#. PMD fwd only receive the packets::
+
+ testpmd> set fwd rxonly
+
+#. Set port verbosity to 8::
+
+ testpmd> set verbose 8
+
+#. Configure a RETA table with 512 or 128 entries to store queue::
+
+ testpmd> port config 0 rss reta (hash_index,queue_id)
+
+#. Set hash function, symmetric, port and packet type::
+
+ testpmd> set_hash_global_config 0 toeplitz ipv4-udp enable
+
+#. Send packet and print the hash value and queue id of every packet. \
+ Then use the hash value % the table size to find expected queue id. \
+ Make sure the expected queue and the destination queue id are the same.
+
+#. Check RSS enable/disable and types of RSS hash function for each port::
+
+ testpmd> show port <port-id> rss-hash
+
+ RSS is on by default, unless ```--disable-rss``` flag is apply.
+
+#. Configure new RSS hash key::
+
+ testpmd> port config <port_id> rss-hash-key <ipv4|ipv4-frag|\
+ ipv4-tcp|ipv4-udp|ipv4-sctp|ipv4-other|\
+ ipv6|ipv6-frag|ipv6-tcp|ipv6-udp|ipv6-sctp|\
+ ipv6-other|l2-payload|ipv6-ex|ipv6-tcp-ex|\
+ ipv6-udp-ex> <string of hex digits>
+
+#. Send packet and print the hash value again to check if they have the same hash value and destination queue id.
+
+
+Test Case: test_set_hash_key_toeplitz_symmetric
+================================================
+
+Same steps as the "test_set_hash_key_toeplitz" test case.
+When set hash function you will need to add::
+
+ testpmd> set_sym_hash_ena_per_port 0 enable
+
+Then send in packet as normal.
+
+Test Case: test_set_hash_key_long_short
+========================================
+
+#. Check hash key size is supported in "show port info"
+
+#. Check RSS is enable
+
+#. Configure RSS hash key in testpmd with longer/normal/shorter hash key::
+
+ testpmd> port config <port_id> rss-hash-key <ipv4|ipv4-frag|\
+ ipv4-tcp|ipv4-udp|ipv4-sctp|ipv4-other|\
+ ipv6|ipv6-frag|ipv6-tcp|ipv6-udp|ipv6-sctp|\
+ ipv6-other|l2-payload|ipv6-ex|ipv6-tcp-ex|\
+ ipv6-udp-ex> <string of hex digits>
+
+#. Display updated key and compare it with the original key::
+
+ testpmd> show port <port-id> rss-hash key
+
--git a/tests/TestSuite_rss_key_update.py b/tests/TestSuite_rss_key_update.py
new file mode 100644
index 0000000..0985f30
--- /dev/null
+++ b/tests/TestSuite_rss_key_update.py
@@ -0,0 +1,412 @@
+# BSD LICENSE
+#
+# Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
+# Copyright © 2018[, 2019] The University of New Hampshire. All rights reserved.
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+#
+# * Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# * Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in
+# the documentation and/or other materials provided with the
+# distribution.
+# * Neither the name of Intel Corporation nor the names of its
+# contributors may be used to endorse or promote products derived
+# from this software without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+"""
+DPDK Test suite.
+
+Test the support of RSS Key Update by Poll Mode Drivers.
+
+"""
+
+import time
+import re
+import packet
+import random
+import utils
+
+from test_case import TestCase
+from pmd_output import PmdOutput
+
+queue = 16
+reta_entries = []
+reta_num = 128
+iptypes = {'ipv4-sctp': 'sctp',
+ 'ipv4-other': 'ip',
+ 'ipv4-frag': 'ip',
+ 'ipv4-udp': 'udp',
+ 'ipv4-tcp': 'tcp',
+ 'ipv6-other': 'ip',
+ 'ipv6-sctp': 'sctp',
+ 'ipv6-udp': 'udp',
+ 'ipv6-tcp': 'tcp',
+ 'ipv6-frag': 'ip'
+ }
+
+class TestRssKeyUpdate(TestCase):
+
+ def send_packet(self, itf, tran_type):
+ """
+ Sends packets.
+ """
+ received_pkts = []
+ self.tester.scapy_foreground()
+ self.dut.send_expect("start", "testpmd>")
+ mac = self.dut.get_mac_address(0)
+
+ # send packet with different source and dest ip
+ if tran_type == "ipv4-other":
+ for i in range(10):
+ packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")], iface="%s")' % (
+ mac, itf, i + 1, i + 2, itf)
+ self.tester.scapy_append(packet)
+ self.tester.scapy_execute()
+ time.sleep(.5)
+ elif tran_type == "ipv4-tcp":
+ for i in range(10):
+ packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")/TCP(sport=1024,dport=1024)], iface="%s")' % (
+ mac, itf, i + 1, i + 2, itf)
+ self.tester.scapy_append(packet)
+ self.tester.scapy_execute()
+ time.sleep(.5)
+ elif tran_type == "ipv4-udp":
+ for i in range(10):
+ packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")/UDP(sport=1024,dport=1024)], iface="%s")' % (
+ mac, itf, i + 1, i + 2, itf)
+ self.tester.scapy_append(packet)
+ self.tester.scapy_execute()
+ time.sleep(.5)
+ elif tran_type == "ipv4-sctp":
+ for i in range(10):
+ packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)], iface="%s")' % (
+ mac, itf, i + 1, i + 2, itf)
+ self.tester.scapy_append(packet)
+ self.tester.scapy_execute()
+ time.sleep(.5)
+ elif tran_type == "ipv4-frag":
+ for i in range(10):
+ packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d",frag=1,flags="MF")], iface="%s")' % (
+ mac, itf, i + 1, i + 2, itf)
+ self.tester.scapy_append(packet)
+ self.tester.scapy_execute()
+ time.sleep(.5)
+
+ elif tran_type == "ipv6-other":
+ for i in range(10):
+ packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")], iface="%s")' % (
+ mac, itf, i + 1, i + 2, itf)
+ self.tester.scapy_append(packet)
+ self.tester.scapy_execute()
+ time.sleep(.5)
+ elif tran_type == "ipv6-tcp":
+ for i in range(10):
+ packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)], iface="%s")' % (
+ mac, itf, i + 1, i + 2, itf)
+ self.tester.scapy_append(packet)
+ self.tester.scapy_execute()
+ time.sleep(.5)
+ elif tran_type == "ipv6-udp":
+ for i in range(10):
+ packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)], iface="%s")' % (
+ mac, itf, i + 1, i + 2, itf)
+ self.tester.scapy_append(packet)
+ self.tester.scapy_execute()
+ time.sleep(.5)
+ elif tran_type == "ipv6-sctp":
+ for i in range(10):
+ packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)], iface="%s")' % (
+ mac, itf, i + 1, i + 2, itf)
+ self.tester.scapy_append(packet)
+ self.tester.scapy_execute()
+ time.sleep(.5)
+ elif tran_type == "ipv6-frag":
+ for i in range(10):
+ packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()], iface="%s")' % (
+ mac, itf, i + 1, i + 2, itf)
+ self.tester.scapy_append(packet)
+ self.tester.scapy_execute()
+ time.sleep(.5)
+ else:
+ print("\ntran_type error!\n")
+
+ out = self.dut.get_session_output(timeout=1)
+ self.dut.send_expect("stop", "testpmd>")
+ lines = out.split("\r\n")
+ reta_line = {}
+ # collect the hash result and the queue id
+ for line in lines:
+ line = line.strip()
+ if len(line) != 0 and line.strip().startswith("port "):
+ reta_line = {}
+ rexp = r"port (\d)/queue (\d{1,2}): received (\d) packets"
+ m = re.match(rexp, line.strip())
+ if m:
+ reta_line["port"] = m.group(1)
+ reta_line["queue"] = m.group(2)
+
+ elif len(line) != 0 and line.startswith(("src=",)):
+ if "RSS hash" not in line:
+ continue
+ for item in line.split("-"):
+ item = item.strip()
+ if(item.startswith("RSS hash")):
+ name, value = item.split("=", 1)
+
+ reta_line[name.strip()] = value.strip()
+ received_pkts.append(reta_line)
+
+ return(self.verifyResult(received_pkts))
+
+ def verifyResult(self, reta_lines):
+ """
+ Verify whether or not the result passes.
+ """
+
+ global reta_num
+ result = []
+ key_id = {}
+ self.verify(len(reta_lines) > 0, 'No packet received!')
+ self.result_table_create(
+ ['packet index', 'hash value', 'hash index', 'queue id', 'actual queue id', 'pass '])
+
+ i = 0
+
+ for tmp_reta_line in reta_lines:
+ status = "false"
+ # compute the hash result of five tuple into the 7 LSBs value.
+ hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num
+ print(reta_entries[hash_index], tmp_reta_line)
+ if(reta_entries[hash_index] == int(tmp_reta_line["queue"])):
+ status = "true"
+ result.insert(i, 0)
+ else:
+ status = "fail"
+ result.insert(i, 1)
+ self.result_table_add(
+ [i, tmp_reta_line["RSS hash"], hash_index, reta_entries[hash_index], tmp_reta_line["queue"], status])
+ i = i + 1
+ key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index]
+
+ self.result_table_print()
+ self.verify(sum(result) == 0, "the reta update function failed!")
+ return key_id
+
+ def verifyResult_symmetric(self, reta_lines):
+ """
+ Verify whether or not the result passes.
+ """
+
+ global reta_num
+ result = []
+ key_id = {}
+ self.verify(len(reta_lines) > 0, 'No packet received!')
+ self.result_table_create(
+ ['packet index', 'RSS hash', 'hash index', 'queue id', 'actual queue id', 'pass '])
+
+ i = 0
+ for tmp_reta_line in reta_lines:
+ status = "false"
+ # compute the hash result of five tuple into the 7 LSBs value.
+ hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num
+ if(reta_entries[hash_index] == int(tmp_reta_line["queue"])):
+ status = "true"
+ result.insert(i, 0)
+ if(i % 2 == 1):
+ if(pre_RSS_hash == tmp_reta_line["RSS hash"]):
+ status = "true"
+ result.insert(len(reta_lines) + (i - 1) // 2, 0)
+ else:
+ status = "fail"
+ result.insert(len(reta_lines) + (i - 1) // 2, 1)
+ pre_RSS_hash = tmp_reta_line["RSS hash"]
+ else:
+ status = "fail"
+ result.insert(i, 1)
+ self.result_table_add(
+ [i, tmp_reta_line["RSS hash"], hash_index, reta_entries[hash_index], tmp_reta_line["queue"], status])
+ i = i + 1
+ key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index]
+
+ self.result_table_print()
+ self.verify(
+ sum(result) == 0, "the symmetric RSS hash function failed!")
+ return key_id
+
+ def set_up_all(self):
+ """
+ Run at the start of each test suite.
+ """
+
+ self.verify(self.nic in ["columbiaville_25g", "columbiaville_100g","fortville_eagle", "fortville_spirit",
+ "fortville_spirit_single", "redrockcanyou", "atwood",
+ "boulderrapid", "fortpark_TLV", "fortpark_BASE-T","fortville_25g", "niantic", "carlsville", "foxville"],
+ "NIC Unsupported: " + str(self.nic))
+ global reta_num
+ global iptypes
+ global queue
+ if self.nic in ["foxville"]:
+ queue = 4
+
+ if self.nic in ["fortville_eagle", "fortville_spirit", "fortville_spirit_single", "fortpark_TLV",
+ "fortpark_BASE-T","fortville_25g", "carlsville"]:
+ reta_num = 512
+ elif self.nic in ["niantic", "foxville"]:
+ reta_num = 128
+ iptypes = {'ipv4-other': 'ip',
+ 'ipv4-frag': 'ip',
+ 'ipv4-udp': 'udp',
+ 'ipv4-tcp': 'tcp',
+ 'ipv6-other': 'ip',
+ 'ipv6-udp': 'udp',
+ 'ipv6-tcp': 'tcp',
+ 'ipv6-frag': 'ip'
+ }
+ elif self.nic in ["redrockcanyou", "atwood", "boulderrapid"]:
+ reta_num = 128
+ else:
+ self.verify(False, f"NIC Unsupported:{self.nic}")
+
+ cores = self.dut.get_core_list("all")
+ self.coremask = utils.create_mask(cores)
+
+ ports = self.dut.get_ports(self.nic)
+ self.ports_socket = self.dut.get_numa_id(ports[0])
+ self.verify(len(ports) >= 1, "Not enough ports available")
+
+ self.pmdout = PmdOutput(self.dut)
+
+ def set_up(self):
+ """
+ Run before each test case.
+ """
+ dutPorts = self.dut.get_ports(self.nic)
+ localPort = self.tester.get_local_port(dutPorts[0])
+ self.itf = self.tester.get_interface(localPort)
+ global reta_num
+ global iptypes
+
+ self.dut.kill_all()
+
+ self.pmdout.start_testpmd("Default", f"--rxq={queue} --txq={queue}")
+
+ def test_set_hash_key_toeplitz(self):
+
+ self.dut.send_expect("set verbose 8", "testpmd> ")
+ self.dut.send_expect("set fwd rxonly", "testpmd> ")
+ self.dut.send_expect("set promisc all off", "testpmd> ")
+ self.dut.send_expect(f"set nbcore {queue + 1}", "testpmd> ")
+
+ for iptype, rsstype in list(iptypes.items()):
+ self.logger.info(f"***********************{iptype} rss test********************************")
+ self.dut.send_expect("port stop all", "testpmd> ")
+ self.dut.send_expect(f"set_hash_global_config 0 toeplitz {iptype} enable", "testpmd> ")
+ self.dut.send_expect("port start all", "testpmd> ")
+ out = self.dut.send_expect(f"port config all rss {rsstype}", "testpmd> ")
+ self.verify("error" not in out, "Configuration of RSS hash failed: Invalid argument")
+ # configure the reta with specific mappings.
+ for i in range(reta_num):
+ reta_entries.insert(i, random.randint(0, queue - 1))
+ self.dut.send_expect(f"port config 0 rss reta ({i},{reta_entries[i]})", "testpmd> ")
+
+ ori_output = self.send_packet(self.itf, iptype)
+
+ self.dut.send_expect("show port 0 rss-hash key", "testpmd> ")
+ self.dut.send_expect(f"port config 0 rss-hash-key {iptype} 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ")
+
+ new_output = self.send_packet(self.itf, iptype)
+
+ self.verify(ori_output != new_output, "before and after results are the same, hash key configuration failed!")
+
+ def test_set_hash_key_toeplitz_symmetric(self):
+
+ self.dut.send_expect("set verbose 8", "testpmd> ")
+ self.dut.send_expect("set fwd rxonly", "testpmd> ")
+ self.dut.send_expect("set promisc all off", "testpmd> ")
+ self.dut.send_expect(f"set nbcore {queue + 1}", "testpmd> ")
+
+ for iptype, rsstype in list(iptypes.items()):
+ self.logger.info(f"***********************{iptype} rss test********************************")
+ self.dut.send_expect("port stop all", "testpmd> ")
+ self.dut.send_expect(f"set_hash_global_config 0 toeplitz {iptype} enable", "testpmd> ")
+ self.dut.send_expect("set_sym_hash_ena_per_port 0 enable", "testpmd> ")
+ self.dut.send_expect("port start all", "testpmd> ")
+ out = self.dut.send_expect(f"port config all rss {rsstype}", "testpmd> ")
+ self.verify("error" not in out, "configuration of rss hash failed: invalid argument")
+
+ # configure the reta with specific mappings.
+ for i in range(reta_num):
+ reta_entries.insert(i, random.randint(0, queue - 1))
+ self.dut.send_expect(f"port config 0 rss reta ({i},{reta_entries[i]})", "testpmd> ")
+
+ ori_output = self.send_packet(self.itf, iptype)
+
+ out = self.dut.send_expect("show port 0 rss-hash key", "testpmd> ")
+ self.verify("rss disable" not in out, "rss is disable!")
+ self.dut.send_expect(f"port config 0 rss-hash-key {iptype} 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ")
+
+ new_output = self.send_packet(self.itf, iptype)
+
+ self.verify(ori_output != new_output, "before and after results are the same, hash key configuration failed!")
+ self.dut.send_expect("quit", "# ", 30)
+
+ def test_set_hash_key_short_long(self):
+
+ nic_rss_key_size = {"columbiaville_25g": 52, "columbiaville_100g": 52, "fortville_eagle": 52,
+ "fortville_spirit": 52,
+ "fortville_spirit_single": 52, "fortville_25g": 52, "niantic": 40, "e1000": 40,
+ "redrockcanyou": 40,
+ "atwood": 40, "boulderrapid": 40, "fortpark_TLV": 52, "fortpark_BASE-T": 52, "hi1822": 40,
+ "cavium_a063": 48,
+ "cavium_a064": 48, "carlsville": 52, "sagepond": 40, "sageville": 40, "foxville": 40,
+ "twinpond": 40}
+
+ self.verify(self.nic in list(nic_rss_key_size.keys()), f"Not supported rss key on {self.nic}")
+
+ # Check supported hash key size
+ out = self.dut.send_expect("show port info all", "testpmd> ", 120)
+ self.verify(f"Hash key size in bytes: {nic_rss_key_size[self.nic]}" in out, "not expected hash key size!")
+
+ test_keies = {
+ "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFFFF": "longer",
+ "4439796BB54C50f3B675EF5B124F9F30B8A2C0DC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF": "shorter",
+ }
+
+ # config key length longer/shorter than 104 hexa-decimal numbers
+ for key, error in test_keies.items():
+ out = self.dut.send_expect(f"port config 0 rss-hash-key ipv4-udp {key}", "testpmd> ")
+ self.verify("invalid" in out, f"Try to set hash key {error} than 104 hexa-decimal numbers!")
+
+ # config ket length same as 104 hex-decimal numbers and keep the config
+ key = "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF"
+ out = self.dut.send_expect(f"port config 0 rss-hash-key ipv4-udp {key}", "testpmd> ")
+ self.dut.send_expect("quit", "# ", 30)
+
+ def tear_down(self):
+ """
+ Run after each test case.
+ """
+ self.dut.send_expect("quit", "# ", 30)
+
+ def tear_down_all(self):
+ """
+ Run after each test suite.
+ """
+ self.dut.kill_all()
--
2.17.1
reply other threads:[~2020-07-10 16:42 UTC|newest]
Thread overview: [no followups] expand[flat|nested] mbox.gz Atom feed
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20200710164242.23828-1-dliu@iol.unh.edu \
--to=dliu@iol.unh.edu \
--cc=dev@dpdk.org \
--cc=dts@dpdk.org \
--cc=lylavoie@iol.unh.edu \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).