* [dts] [PATCH v2]Add RSS Key Update Feature [not found] <f08663d0b11bfc1487f7461dd7c952bab652d9e8> @ 2020-07-15 20:08 ` David Liu 2020-07-24 2:01 ` Tu, Lijuan 0 siblings, 1 reply; 3+ messages in thread From: David Liu @ 2020-07-15 20:08 UTC (permalink / raw) To: dts; +Cc: lylavoie, David Liu Merge duplicated code. Add flag in send packet and verify result to identify symmetric used. Signed-off-by: David Liu <dliu@iol.unh.edu> --- tests/TestSuite_rss_key_update.py | 183 ++++++++---------------------- 1 file changed, 46 insertions(+), 137 deletions(-) diff --git a/tests/TestSuite_rss_key_update.py b/tests/TestSuite_rss_key_update.py index 0985f30..adb44f1 100644 --- a/tests/TestSuite_rss_key_update.py +++ b/tests/TestSuite_rss_key_update.py @@ -39,7 +39,6 @@ Test the support of RSS Key Update by Poll Mode Drivers. import time import re -import packet import random import utils @@ -63,85 +62,37 @@ iptypes = {'ipv4-sctp': 'sctp', class TestRssKeyUpdate(TestCase): - def send_packet(self, itf, tran_type): + def send_packet(self, itf, tran_type, symmetric): """ Sends packets. """ + packet_list = { + 'ipv4-sctp': 'IP(src="192.168.0.%d", dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)', + 'ipv4-other': 'IP(src="192.168.0.%d", dst="192.168.0.%d")', + 'ipv4-frag': 'IP(src="192.168.0.%d", dst="192.168.0.%d",frag=1,flags="MF")', + 'ipv4-udp': 'IP(src="192.168.0.%d", dst="192.168.0.%d")/UDP(sport=1024,dport=1024)', + 'ipv4-tcp': 'IP(src="192.168.0.%d", dst="192.168.0.%d")/TCP(sport=1024,dport=1024)', + 'ipv6-other':'IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")', + 'ipv6-sctp': 'IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)', + 'ipv6-udp': 'IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)', + 'ipv6-tcp': 'IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)', + 'ipv6-frag': 'IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()' + } + received_pkts = [] self.tester.scapy_foreground() self.dut.send_expect("start", "testpmd>") mac = self.dut.get_mac_address(0) # send packet with different source and dest ip - if tran_type == "ipv4-other": - for i in range(10): - packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")], iface="%s")' % ( - mac, itf, i + 1, i + 2, itf) - self.tester.scapy_append(packet) - self.tester.scapy_execute() - time.sleep(.5) - elif tran_type == "ipv4-tcp": - for i in range(10): - packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")/TCP(sport=1024,dport=1024)], iface="%s")' % ( - mac, itf, i + 1, i + 2, itf) - self.tester.scapy_append(packet) - self.tester.scapy_execute() - time.sleep(.5) - elif tran_type == "ipv4-udp": - for i in range(10): - packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")/UDP(sport=1024,dport=1024)], iface="%s")' % ( - mac, itf, i + 1, i + 2, itf) - self.tester.scapy_append(packet) - self.tester.scapy_execute() - time.sleep(.5) - elif tran_type == "ipv4-sctp": - for i in range(10): - packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)], iface="%s")' % ( - mac, itf, i + 1, i + 2, itf) - self.tester.scapy_append(packet) - self.tester.scapy_execute() - time.sleep(.5) - elif tran_type == "ipv4-frag": - for i in range(10): - packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d",frag=1,flags="MF")], iface="%s")' % ( - mac, itf, i + 1, i + 2, itf) - self.tester.scapy_append(packet) - self.tester.scapy_execute() - time.sleep(.5) - - elif tran_type == "ipv6-other": - for i in range(10): - packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")], iface="%s")' % ( - mac, itf, i + 1, i + 2, itf) - self.tester.scapy_append(packet) - self.tester.scapy_execute() - time.sleep(.5) - elif tran_type == "ipv6-tcp": - for i in range(10): - packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)], iface="%s")' % ( - mac, itf, i + 1, i + 2, itf) - self.tester.scapy_append(packet) - self.tester.scapy_execute() - time.sleep(.5) - elif tran_type == "ipv6-udp": - for i in range(10): - packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)], iface="%s")' % ( - mac, itf, i + 1, i + 2, itf) - self.tester.scapy_append(packet) - self.tester.scapy_execute() - time.sleep(.5) - elif tran_type == "ipv6-sctp": + if tran_type in packet_list.keys(): + packet_temp = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/%s], iface="%s")' % (mac, itf, packet_list[tran_type], itf) for i in range(10): - packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)], iface="%s")' % ( - mac, itf, i + 1, i + 2, itf) - self.tester.scapy_append(packet) - self.tester.scapy_execute() - time.sleep(.5) - elif tran_type == "ipv6-frag": - for i in range(10): - packet = r'sendp([Ether(dst="%s", src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()], iface="%s")' % ( - mac, itf, i + 1, i + 2, itf) + packet = packet_temp % (i + 1, i + 2) self.tester.scapy_append(packet) + if symmetric: + packet2 = packet_list[tran_type] % (mac, itf, i + 2, i + 1, itf) + self.tester.scapy_append(packet2) self.tester.scapy_execute() time.sleep(.5) else: @@ -154,102 +105,64 @@ class TestRssKeyUpdate(TestCase): # collect the hash result and the queue id for line in lines: line = line.strip() - if len(line) != 0 and line.strip().startswith("port "): + if len(line) != 0 and line.startswith("port "): reta_line = {} - rexp = r"port (\d)/queue (\d{1,2}): received (\d) packets" - m = re.match(rexp, line.strip()) + rexp = r"port (\d+)/queue (\d+): received (\d+) packets" + m = re.match(rexp, line) if m: reta_line["port"] = m.group(1) reta_line["queue"] = m.group(2) - elif len(line) != 0 and line.startswith(("src=",)): + elif len(line) != 0 and line.startswith("src="): if "RSS hash" not in line: continue for item in line.split("-"): item = item.strip() - if(item.startswith("RSS hash")): + if item.startswith("RSS hash"): name, value = item.split("=", 1) reta_line[name.strip()] = value.strip() received_pkts.append(reta_line) - return(self.verifyResult(received_pkts)) + return(self.verifyResult(received_pkts, symmetric)) - def verifyResult(self, reta_lines): + def verifyResult(self, reta_lines, symmetric): """ Verify whether or not the result passes. """ - - global reta_num result = [] key_id = {} self.verify(len(reta_lines) > 0, 'No packet received!') self.result_table_create( ['packet index', 'hash value', 'hash index', 'queue id', 'actual queue id', 'pass ']) - i = 0 - - for tmp_reta_line in reta_lines: + for i, tmp_reta_line in enumerate(reta_lines): status = "false" # compute the hash result of five tuple into the 7 LSBs value. hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num - print(reta_entries[hash_index], tmp_reta_line) if(reta_entries[hash_index] == int(tmp_reta_line["queue"])): status = "true" result.insert(i, 0) + if symmetric: + if(i % 2 == 1): + if(pre_RSS_hash == tmp_reta_line["RSS hash"]): + status = "true" + result.insert(len(reta_lines) + (i - 1) // 2, 0) + else: + status = "fail" + result.insert(len(reta_lines) + (i - 1) // 2, 1) + pre_RSS_hash = tmp_reta_line["RSS hash"] else: status = "fail" result.insert(i, 1) self.result_table_add( [i, tmp_reta_line["RSS hash"], hash_index, reta_entries[hash_index], tmp_reta_line["queue"], status]) - i = i + 1 - key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index] + key_id[tmp_reta_line["RSS hash"]] = reta_entries[hash_index] self.result_table_print() self.verify(sum(result) == 0, "the reta update function failed!") return key_id - def verifyResult_symmetric(self, reta_lines): - """ - Verify whether or not the result passes. - """ - - global reta_num - result = [] - key_id = {} - self.verify(len(reta_lines) > 0, 'No packet received!') - self.result_table_create( - ['packet index', 'RSS hash', 'hash index', 'queue id', 'actual queue id', 'pass ']) - - i = 0 - for tmp_reta_line in reta_lines: - status = "false" - # compute the hash result of five tuple into the 7 LSBs value. - hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num - if(reta_entries[hash_index] == int(tmp_reta_line["queue"])): - status = "true" - result.insert(i, 0) - if(i % 2 == 1): - if(pre_RSS_hash == tmp_reta_line["RSS hash"]): - status = "true" - result.insert(len(reta_lines) + (i - 1) // 2, 0) - else: - status = "fail" - result.insert(len(reta_lines) + (i - 1) // 2, 1) - pre_RSS_hash = tmp_reta_line["RSS hash"] - else: - status = "fail" - result.insert(i, 1) - self.result_table_add( - [i, tmp_reta_line["RSS hash"], hash_index, reta_entries[hash_index], tmp_reta_line["queue"], status]) - i = i + 1 - key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index] - - self.result_table_print() - self.verify( - sum(result) == 0, "the symmetric RSS hash function failed!") - return key_id - def set_up_all(self): """ Run at the start of each test suite. @@ -282,7 +195,7 @@ class TestRssKeyUpdate(TestCase): elif self.nic in ["redrockcanyou", "atwood", "boulderrapid"]: reta_num = 128 else: - self.verify(False, f"NIC Unsupported:{self.nic}") + self.verify(False, f"NIC Unsupported: {self.nic}") cores = self.dut.get_core_list("all") self.coremask = utils.create_mask(cores) @@ -300,8 +213,6 @@ class TestRssKeyUpdate(TestCase): dutPorts = self.dut.get_ports(self.nic) localPort = self.tester.get_local_port(dutPorts[0]) self.itf = self.tester.get_interface(localPort) - global reta_num - global iptypes self.dut.kill_all() @@ -326,12 +237,12 @@ class TestRssKeyUpdate(TestCase): reta_entries.insert(i, random.randint(0, queue - 1)) self.dut.send_expect(f"port config 0 rss reta ({i},{reta_entries[i]})", "testpmd> ") - ori_output = self.send_packet(self.itf, iptype) + ori_output = self.send_packet(self.itf, iptype, False) self.dut.send_expect("show port 0 rss-hash key", "testpmd> ") self.dut.send_expect(f"port config 0 rss-hash-key {iptype} 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ") - new_output = self.send_packet(self.itf, iptype) + new_output = self.send_packet(self.itf, iptype, False) self.verify(ori_output != new_output, "before and after results are the same, hash key configuration failed!") @@ -356,16 +267,15 @@ class TestRssKeyUpdate(TestCase): reta_entries.insert(i, random.randint(0, queue - 1)) self.dut.send_expect(f"port config 0 rss reta ({i},{reta_entries[i]})", "testpmd> ") - ori_output = self.send_packet(self.itf, iptype) + ori_output = self.send_packet(self.itf, iptype, True) out = self.dut.send_expect("show port 0 rss-hash key", "testpmd> ") self.verify("rss disable" not in out, "rss is disable!") self.dut.send_expect(f"port config 0 rss-hash-key {iptype} 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ") - new_output = self.send_packet(self.itf, iptype) + new_output = self.send_packet(self.itf, iptype, True) self.verify(ori_output != new_output, "before and after results are the same, hash key configuration failed!") - self.dut.send_expect("quit", "# ", 30) def test_set_hash_key_short_long(self): @@ -384,26 +294,25 @@ class TestRssKeyUpdate(TestCase): out = self.dut.send_expect("show port info all", "testpmd> ", 120) self.verify(f"Hash key size in bytes: {nic_rss_key_size[self.nic]}" in out, "not expected hash key size!") - test_keies = { + test_keys = { "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFFFF": "longer", "4439796BB54C50f3B675EF5B124F9F30B8A2C0DC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF": "shorter", } # config key length longer/shorter than 104 hexa-decimal numbers - for key, error in test_keies.items(): + for key, error in test_keys.items(): out = self.dut.send_expect(f"port config 0 rss-hash-key ipv4-udp {key}", "testpmd> ") self.verify("invalid" in out, f"Try to set hash key {error} than 104 hexa-decimal numbers!") # config ket length same as 104 hex-decimal numbers and keep the config key = "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C05C6FA343958D855FFF9583AE138C92E81150FFF" out = self.dut.send_expect(f"port config 0 rss-hash-key ipv4-udp {key}", "testpmd> ") - self.dut.send_expect("quit", "# ", 30) def tear_down(self): """ Run after each test case. """ - self.dut.send_expect("quit", "# ", 30) + self.pmdout.quit() def tear_down_all(self): """ -- 2.17.1 ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [dts] [PATCH v2]Add RSS Key Update Feature 2020-07-15 20:08 ` [dts] [PATCH v2]Add RSS Key Update Feature David Liu @ 2020-07-24 2:01 ` Tu, Lijuan 2020-07-24 20:45 ` David Liu 0 siblings, 1 reply; 3+ messages in thread From: Tu, Lijuan @ 2020-07-24 2:01 UTC (permalink / raw) To: David Liu, dts; +Cc: lylavoie Hi David, V2 should be also based on DTS remote master, but not your local code. When V1 are not merged, we submit V2, V2 should cover V1+ fix comments based on DTS remote code, maintainer will ignore V1 and merge V2. It's not make sense to merge patches with obvious defect. > -----Original Message----- > From: dts <dts-bounces@dpdk.org> On Behalf Of David Liu > Sent: 2020年7月16日 4:09 > To: dts@dpdk.org > Cc: lylavoie@iol.unh.edu; David Liu <dliu@iol.unh.edu> > Subject: [dts] [PATCH v2]Add RSS Key Update Feature > > Merge duplicated code. Add flag in send packet and verify result to identify > symmetric used. > > Signed-off-by: David Liu <dliu@iol.unh.edu> > --- > tests/TestSuite_rss_key_update.py | 183 ++++++++---------------------- > 1 file changed, 46 insertions(+), 137 deletions(-) > > diff --git a/tests/TestSuite_rss_key_update.py > b/tests/TestSuite_rss_key_update.py > index 0985f30..adb44f1 100644 > --- a/tests/TestSuite_rss_key_update.py > +++ b/tests/TestSuite_rss_key_update.py > @@ -39,7 +39,6 @@ Test the support of RSS Key Update by Poll Mode Drivers. > > import time > import re > -import packet > import random > import utils > > @@ -63,85 +62,37 @@ iptypes = {'ipv4-sctp': 'sctp', > > class TestRssKeyUpdate(TestCase): > > - def send_packet(self, itf, tran_type): > + def send_packet(self, itf, tran_type, symmetric): > """ > Sends packets. > """ > + packet_list = { > + 'ipv4-sctp': 'IP(src="192.168.0.%d", > dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)', > + 'ipv4-other': 'IP(src="192.168.0.%d", dst="192.168.0.%d")', > + 'ipv4-frag': 'IP(src="192.168.0.%d", > dst="192.168.0.%d",frag=1,flags="MF")', > + 'ipv4-udp': 'IP(src="192.168.0.%d", > dst="192.168.0.%d")/UDP(sport=1024,dport=1024)', > + 'ipv4-tcp': 'IP(src="192.168.0.%d", > dst="192.168.0.%d")/TCP(sport=1024,dport=1024)', > + 'ipv6-other':'IPv6(src="3ffe:2501:200:1fff::%d", > dst="3ffe:2501:200:3::%d")', > + 'ipv6-sctp': 'IPv6(src="3ffe:2501:200:1fff::%d", > dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)', > + 'ipv6-udp': 'IPv6(src="3ffe:2501:200:1fff::%d", > dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)', > + 'ipv6-tcp': 'IPv6(src="3ffe:2501:200:1fff::%d", > dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)', > + 'ipv6-frag': 'IPv6(src="3ffe:2501:200:1fff::%d", > dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()' > + } > + > received_pkts = [] > self.tester.scapy_foreground() > self.dut.send_expect("start", "testpmd>") > mac = self.dut.get_mac_address(0) > > # send packet with different source and dest ip > - if tran_type == "ipv4-other": > - for i in range(10): > - packet = r'sendp([Ether(dst="%s", > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")], > iface="%s")' % ( > - mac, itf, i + 1, i + 2, itf) > - self.tester.scapy_append(packet) > - self.tester.scapy_execute() > - time.sleep(.5) > - elif tran_type == "ipv4-tcp": > - for i in range(10): > - packet = r'sendp([Ether(dst="%s", > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", > dst="192.168.0.%d")/TCP(sport=1024,dport=1024)], iface="%s")' % ( > - mac, itf, i + 1, i + 2, itf) > - self.tester.scapy_append(packet) > - self.tester.scapy_execute() > - time.sleep(.5) > - elif tran_type == "ipv4-udp": > - for i in range(10): > - packet = r'sendp([Ether(dst="%s", > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", > dst="192.168.0.%d")/UDP(sport=1024,dport=1024)], iface="%s")' % ( > - mac, itf, i + 1, i + 2, itf) > - self.tester.scapy_append(packet) > - self.tester.scapy_execute() > - time.sleep(.5) > - elif tran_type == "ipv4-sctp": > - for i in range(10): > - packet = r'sendp([Ether(dst="%s", > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", > dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)], iface="%s")' % ( > - mac, itf, i + 1, i + 2, itf) > - self.tester.scapy_append(packet) > - self.tester.scapy_execute() > - time.sleep(.5) > - elif tran_type == "ipv4-frag": > - for i in range(10): > - packet = r'sendp([Ether(dst="%s", > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", > dst="192.168.0.%d",frag=1,flags="MF")], iface="%s")' % ( > - mac, itf, i + 1, i + 2, itf) > - self.tester.scapy_append(packet) > - self.tester.scapy_execute() > - time.sleep(.5) > - > - elif tran_type == "ipv6-other": > - for i in range(10): > - packet = r'sendp([Ether(dst="%s", > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", > dst="3ffe:2501:200:3::%d")], iface="%s")' % ( > - mac, itf, i + 1, i + 2, itf) > - self.tester.scapy_append(packet) > - self.tester.scapy_execute() > - time.sleep(.5) > - elif tran_type == "ipv6-tcp": > - for i in range(10): > - packet = r'sendp([Ether(dst="%s", > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", > dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)], iface="%s")' % ( > - mac, itf, i + 1, i + 2, itf) > - self.tester.scapy_append(packet) > - self.tester.scapy_execute() > - time.sleep(.5) > - elif tran_type == "ipv6-udp": > - for i in range(10): > - packet = r'sendp([Ether(dst="%s", > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", > dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)], iface="%s")' % ( > - mac, itf, i + 1, i + 2, itf) > - self.tester.scapy_append(packet) > - self.tester.scapy_execute() > - time.sleep(.5) > - elif tran_type == "ipv6-sctp": > + if tran_type in packet_list.keys(): > + packet_temp = r'sendp([Ether(dst="%s", > + src=get_if_hwaddr("%s"))/%s], iface="%s")' % (mac, itf, > + packet_list[tran_type], itf) > for i in range(10): > - packet = r'sendp([Ether(dst="%s", > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", > dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)], > iface="%s")' % ( > - mac, itf, i + 1, i + 2, itf) > - self.tester.scapy_append(packet) > - self.tester.scapy_execute() > - time.sleep(.5) > - elif tran_type == "ipv6-frag": > - for i in range(10): > - packet = r'sendp([Ether(dst="%s", > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", > dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()], iface="%s")' % ( > - mac, itf, i + 1, i + 2, itf) > + packet = packet_temp % (i + 1, i + 2) > self.tester.scapy_append(packet) > + if symmetric: > + packet2 = packet_list[tran_type] % (mac, itf, i + 2, i + 1, itf) > + self.tester.scapy_append(packet2) > self.tester.scapy_execute() > time.sleep(.5) > else: > @@ -154,102 +105,64 @@ class TestRssKeyUpdate(TestCase): > # collect the hash result and the queue id > for line in lines: > line = line.strip() > - if len(line) != 0 and line.strip().startswith("port "): > + if len(line) != 0 and line.startswith("port "): > reta_line = {} > - rexp = r"port (\d)/queue (\d{1,2}): received (\d) packets" > - m = re.match(rexp, line.strip()) > + rexp = r"port (\d+)/queue (\d+): received (\d+) packets" > + m = re.match(rexp, line) > if m: > reta_line["port"] = m.group(1) > reta_line["queue"] = m.group(2) > > - elif len(line) != 0 and line.startswith(("src=",)): > + elif len(line) != 0 and line.startswith("src="): > if "RSS hash" not in line: > continue > for item in line.split("-"): > item = item.strip() > - if(item.startswith("RSS hash")): > + if item.startswith("RSS hash"): > name, value = item.split("=", 1) > > reta_line[name.strip()] = value.strip() > received_pkts.append(reta_line) > > - return(self.verifyResult(received_pkts)) > + return(self.verifyResult(received_pkts, symmetric)) > > - def verifyResult(self, reta_lines): > + def verifyResult(self, reta_lines, symmetric): > """ > Verify whether or not the result passes. > """ > - > - global reta_num > result = [] > key_id = {} > self.verify(len(reta_lines) > 0, 'No packet received!') > self.result_table_create( > ['packet index', 'hash value', 'hash index', 'queue id', 'actual queue id', > 'pass ']) > > - i = 0 > - > - for tmp_reta_line in reta_lines: > + for i, tmp_reta_line in enumerate(reta_lines): > status = "false" > # compute the hash result of five tuple into the 7 LSBs value. > hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num > - print(reta_entries[hash_index], tmp_reta_line) > if(reta_entries[hash_index] == int(tmp_reta_line["queue"])): > status = "true" > result.insert(i, 0) > + if symmetric: > + if(i % 2 == 1): > + if(pre_RSS_hash == tmp_reta_line["RSS hash"]): > + status = "true" > + result.insert(len(reta_lines) + (i - 1) // 2, 0) > + else: > + status = "fail" > + result.insert(len(reta_lines) + (i - 1) // 2, 1) > + pre_RSS_hash = tmp_reta_line["RSS hash"] > else: > status = "fail" > result.insert(i, 1) > self.result_table_add( > [i, tmp_reta_line["RSS hash"], hash_index, reta_entries[hash_index], > tmp_reta_line["queue"], status]) > - i = i + 1 > - key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index] > + key_id[tmp_reta_line["RSS hash"]] = > + reta_entries[hash_index] > > self.result_table_print() > self.verify(sum(result) == 0, "the reta update function failed!") > return key_id > > - def verifyResult_symmetric(self, reta_lines): > - """ > - Verify whether or not the result passes. > - """ > - > - global reta_num > - result = [] > - key_id = {} > - self.verify(len(reta_lines) > 0, 'No packet received!') > - self.result_table_create( > - ['packet index', 'RSS hash', 'hash index', 'queue id', 'actual queue id', 'pass > ']) > - > - i = 0 > - for tmp_reta_line in reta_lines: > - status = "false" > - # compute the hash result of five tuple into the 7 LSBs value. > - hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num > - if(reta_entries[hash_index] == int(tmp_reta_line["queue"])): > - status = "true" > - result.insert(i, 0) > - if(i % 2 == 1): > - if(pre_RSS_hash == tmp_reta_line["RSS hash"]): > - status = "true" > - result.insert(len(reta_lines) + (i - 1) // 2, 0) > - else: > - status = "fail" > - result.insert(len(reta_lines) + (i - 1) // 2, 1) > - pre_RSS_hash = tmp_reta_line["RSS hash"] > - else: > - status = "fail" > - result.insert(i, 1) > - self.result_table_add( > - [i, tmp_reta_line["RSS hash"], hash_index, reta_entries[hash_index], > tmp_reta_line["queue"], status]) > - i = i + 1 > - key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index] > - > - self.result_table_print() > - self.verify( > - sum(result) == 0, "the symmetric RSS hash function failed!") > - return key_id > - > def set_up_all(self): > """ > Run at the start of each test suite. > @@ -282,7 +195,7 @@ class TestRssKeyUpdate(TestCase): > elif self.nic in ["redrockcanyou", "atwood", "boulderrapid"]: > reta_num = 128 > else: > - self.verify(False, f"NIC Unsupported:{self.nic}") > + self.verify(False, f"NIC Unsupported: {self.nic}") > > cores = self.dut.get_core_list("all") > self.coremask = utils.create_mask(cores) @@ -300,8 +213,6 @@ class > TestRssKeyUpdate(TestCase): > dutPorts = self.dut.get_ports(self.nic) > localPort = self.tester.get_local_port(dutPorts[0]) > self.itf = self.tester.get_interface(localPort) > - global reta_num > - global iptypes > > self.dut.kill_all() > > @@ -326,12 +237,12 @@ class TestRssKeyUpdate(TestCase): > reta_entries.insert(i, random.randint(0, queue - 1)) > self.dut.send_expect(f"port config 0 rss reta ({i},{reta_entries[i]})", > "testpmd> ") > > - ori_output = self.send_packet(self.itf, iptype) > + ori_output = self.send_packet(self.itf, iptype, False) > > self.dut.send_expect("show port 0 rss-hash key", "testpmd> ") > self.dut.send_expect(f"port config 0 rss-hash-key {iptype} > 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C > 05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ") > > - new_output = self.send_packet(self.itf, iptype) > + new_output = self.send_packet(self.itf, iptype, False) > > self.verify(ori_output != new_output, "before and after results are the > same, hash key configuration failed!") > > @@ -356,16 +267,15 @@ class TestRssKeyUpdate(TestCase): > reta_entries.insert(i, random.randint(0, queue - 1)) > self.dut.send_expect(f"port config 0 rss reta ({i},{reta_entries[i]})", > "testpmd> ") > > - ori_output = self.send_packet(self.itf, iptype) > + ori_output = self.send_packet(self.itf, iptype, True) > > out = self.dut.send_expect("show port 0 rss-hash key", "testpmd> ") > self.verify("rss disable" not in out, "rss is disable!") > self.dut.send_expect(f"port config 0 rss-hash-key {iptype} > 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C > 05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ") > > - new_output = self.send_packet(self.itf, iptype) > + new_output = self.send_packet(self.itf, iptype, True) > > self.verify(ori_output != new_output, "before and after results are the > same, hash key configuration failed!") > - self.dut.send_expect("quit", "# ", 30) > > def test_set_hash_key_short_long(self): > > @@ -384,26 +294,25 @@ class TestRssKeyUpdate(TestCase): > out = self.dut.send_expect("show port info all", "testpmd> ", 120) > self.verify(f"Hash key size in bytes: {nic_rss_key_size[self.nic]}" in out, "not > expected hash key size!") > > - test_keies = { > + test_keys = { > > "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4 > C05C6FA343958D855FFF9583AE138C92E81150FFFFF": "longer", > > "4439796BB54C50f3B675EF5B124F9F30B8A2C0DC4D02A08C9B334FF64A4C05C > 6FA343958D855FFF9583AE138C92E81150FFF": "shorter", > } > > # config key length longer/shorter than 104 hexa-decimal numbers > - for key, error in test_keies.items(): > + for key, error in test_keys.items(): > out = self.dut.send_expect(f"port config 0 rss-hash-key ipv4-udp {key}", > "testpmd> ") > self.verify("invalid" in out, f"Try to set hash key {error} than 104 hexa- > decimal numbers!") > > # config ket length same as 104 hex-decimal numbers and keep the config > key = > "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4 > C05C6FA343958D855FFF9583AE138C92E81150FFF" > out = self.dut.send_expect(f"port config 0 rss-hash-key ipv4-udp {key}", > "testpmd> ") > - self.dut.send_expect("quit", "# ", 30) > > def tear_down(self): > """ > Run after each test case. > """ > - self.dut.send_expect("quit", "# ", 30) > + self.pmdout.quit() > > def tear_down_all(self): > """ > -- > 2.17.1 ^ permalink raw reply [flat|nested] 3+ messages in thread
* Re: [dts] [PATCH v2]Add RSS Key Update Feature 2020-07-24 2:01 ` Tu, Lijuan @ 2020-07-24 20:45 ` David Liu 0 siblings, 0 replies; 3+ messages in thread From: David Liu @ 2020-07-24 20:45 UTC (permalink / raw) To: Tu, Lijuan; +Cc: dts, lylavoie [-- Attachment #1: Type: text/plain, Size: 18815 bytes --] Hi Lijuan, Sorry, what you suggested makes sense. The V2 I send was some changes that will make the code cleaner by combining some duplicated code in the V1. To solve this issue, I will submit a patch that combines both of these versions. Thanks David On Thu, Jul 23, 2020 at 10:01 PM Tu, Lijuan <lijuan.tu@intel.com> wrote: > Hi David, > > V2 should be also based on DTS remote master, but not your local code. > > When V1 are not merged, we submit V2, V2 should cover V1+ fix comments > based on DTS remote code, maintainer will ignore V1 and merge V2. It's not > make sense to merge patches with obvious defect. > > > -----Original Message----- > > From: dts <dts-bounces@dpdk.org> On Behalf Of David Liu > > Sent: 2020年7月16日 4:09 > > To: dts@dpdk.org > > Cc: lylavoie@iol.unh.edu; David Liu <dliu@iol.unh.edu> > > Subject: [dts] [PATCH v2]Add RSS Key Update Feature > > > > Merge duplicated code. Add flag in send packet and verify result to > identify > > symmetric used. > > > > Signed-off-by: David Liu <dliu@iol.unh.edu> > > --- > > tests/TestSuite_rss_key_update.py | 183 ++++++++---------------------- > > 1 file changed, 46 insertions(+), 137 deletions(-) > > > > diff --git a/tests/TestSuite_rss_key_update.py > > b/tests/TestSuite_rss_key_update.py > > index 0985f30..adb44f1 100644 > > --- a/tests/TestSuite_rss_key_update.py > > +++ b/tests/TestSuite_rss_key_update.py > > @@ -39,7 +39,6 @@ Test the support of RSS Key Update by Poll Mode > Drivers. > > > > import time > > import re > > -import packet > > import random > > import utils > > > > @@ -63,85 +62,37 @@ iptypes = {'ipv4-sctp': 'sctp', > > > > class TestRssKeyUpdate(TestCase): > > > > - def send_packet(self, itf, tran_type): > > + def send_packet(self, itf, tran_type, symmetric): > > """ > > Sends packets. > > """ > > + packet_list = { > > + 'ipv4-sctp': 'IP(src="192.168.0.%d", > > dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)', > > + 'ipv4-other': 'IP(src="192.168.0.%d", dst="192.168.0.%d")', > > + 'ipv4-frag': 'IP(src="192.168.0.%d", > > dst="192.168.0.%d",frag=1,flags="MF")', > > + 'ipv4-udp': 'IP(src="192.168.0.%d", > > dst="192.168.0.%d")/UDP(sport=1024,dport=1024)', > > + 'ipv4-tcp': 'IP(src="192.168.0.%d", > > dst="192.168.0.%d")/TCP(sport=1024,dport=1024)', > > + 'ipv6-other':'IPv6(src="3ffe:2501:200:1fff::%d", > > dst="3ffe:2501:200:3::%d")', > > + 'ipv6-sctp': 'IPv6(src="3ffe:2501:200:1fff::%d", > > dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)', > > + 'ipv6-udp': 'IPv6(src="3ffe:2501:200:1fff::%d", > > dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)', > > + 'ipv6-tcp': 'IPv6(src="3ffe:2501:200:1fff::%d", > > dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)', > > + 'ipv6-frag': 'IPv6(src="3ffe:2501:200:1fff::%d", > > dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()' > > + } > > + > > received_pkts = [] > > self.tester.scapy_foreground() > > self.dut.send_expect("start", "testpmd>") > > mac = self.dut.get_mac_address(0) > > > > # send packet with different source and dest ip > > - if tran_type == "ipv4-other": > > - for i in range(10): > > - packet = r'sendp([Ether(dst="%s", > > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", dst="192.168.0.%d")], > > iface="%s")' % ( > > - mac, itf, i + 1, i + 2, itf) > > - self.tester.scapy_append(packet) > > - self.tester.scapy_execute() > > - time.sleep(.5) > > - elif tran_type == "ipv4-tcp": > > - for i in range(10): > > - packet = r'sendp([Ether(dst="%s", > > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", > > dst="192.168.0.%d")/TCP(sport=1024,dport=1024)], iface="%s")' % ( > > - mac, itf, i + 1, i + 2, itf) > > - self.tester.scapy_append(packet) > > - self.tester.scapy_execute() > > - time.sleep(.5) > > - elif tran_type == "ipv4-udp": > > - for i in range(10): > > - packet = r'sendp([Ether(dst="%s", > > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", > > dst="192.168.0.%d")/UDP(sport=1024,dport=1024)], iface="%s")' % ( > > - mac, itf, i + 1, i + 2, itf) > > - self.tester.scapy_append(packet) > > - self.tester.scapy_execute() > > - time.sleep(.5) > > - elif tran_type == "ipv4-sctp": > > - for i in range(10): > > - packet = r'sendp([Ether(dst="%s", > > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", > > dst="192.168.0.%d")/SCTP(sport=1024,dport=1024,tag=1)], iface="%s")' % ( > > - mac, itf, i + 1, i + 2, itf) > > - self.tester.scapy_append(packet) > > - self.tester.scapy_execute() > > - time.sleep(.5) > > - elif tran_type == "ipv4-frag": > > - for i in range(10): > > - packet = r'sendp([Ether(dst="%s", > > src=get_if_hwaddr("%s"))/IP(src="192.168.0.%d", > > dst="192.168.0.%d",frag=1,flags="MF")], iface="%s")' % ( > > - mac, itf, i + 1, i + 2, itf) > > - self.tester.scapy_append(packet) > > - self.tester.scapy_execute() > > - time.sleep(.5) > > - > > - elif tran_type == "ipv6-other": > > - for i in range(10): > > - packet = r'sendp([Ether(dst="%s", > > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", > > dst="3ffe:2501:200:3::%d")], iface="%s")' % ( > > - mac, itf, i + 1, i + 2, itf) > > - self.tester.scapy_append(packet) > > - self.tester.scapy_execute() > > - time.sleep(.5) > > - elif tran_type == "ipv6-tcp": > > - for i in range(10): > > - packet = r'sendp([Ether(dst="%s", > > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", > > dst="3ffe:2501:200:3::%d")/TCP(sport=1024,dport=1024)], iface="%s")' % ( > > - mac, itf, i + 1, i + 2, itf) > > - self.tester.scapy_append(packet) > > - self.tester.scapy_execute() > > - time.sleep(.5) > > - elif tran_type == "ipv6-udp": > > - for i in range(10): > > - packet = r'sendp([Ether(dst="%s", > > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", > > dst="3ffe:2501:200:3::%d")/UDP(sport=1024,dport=1024)], iface="%s")' % ( > > - mac, itf, i + 1, i + 2, itf) > > - self.tester.scapy_append(packet) > > - self.tester.scapy_execute() > > - time.sleep(.5) > > - elif tran_type == "ipv6-sctp": > > + if tran_type in packet_list.keys(): > > + packet_temp = r'sendp([Ether(dst="%s", > > + src=get_if_hwaddr("%s"))/%s], iface="%s")' % (mac, itf, > > + packet_list[tran_type], itf) > > for i in range(10): > > - packet = r'sendp([Ether(dst="%s", > > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", > > dst="3ffe:2501:200:3::%d", nh=132)/SCTP(sport=1024,dport=1024,tag=1)], > > iface="%s")' % ( > > - mac, itf, i + 1, i + 2, itf) > > - self.tester.scapy_append(packet) > > - self.tester.scapy_execute() > > - time.sleep(.5) > > - elif tran_type == "ipv6-frag": > > - for i in range(10): > > - packet = r'sendp([Ether(dst="%s", > > src=get_if_hwaddr("%s"))/IPv6(src="3ffe:2501:200:1fff::%d", > > dst="3ffe:2501:200:3::%d",nh=44)/IPv6ExtHdrFragment()], iface="%s")' % ( > > - mac, itf, i + 1, i + 2, itf) > > + packet = packet_temp % (i + 1, i + 2) > > self.tester.scapy_append(packet) > > + if symmetric: > > + packet2 = packet_list[tran_type] % (mac, itf, i + > 2, i + 1, itf) > > + self.tester.scapy_append(packet2) > > self.tester.scapy_execute() > > time.sleep(.5) > > else: > > @@ -154,102 +105,64 @@ class TestRssKeyUpdate(TestCase): > > # collect the hash result and the queue id > > for line in lines: > > line = line.strip() > > - if len(line) != 0 and line.strip().startswith("port "): > > + if len(line) != 0 and line.startswith("port "): > > reta_line = {} > > - rexp = r"port (\d)/queue (\d{1,2}): received (\d) > packets" > > - m = re.match(rexp, line.strip()) > > + rexp = r"port (\d+)/queue (\d+): received (\d+) packets" > > + m = re.match(rexp, line) > > if m: > > reta_line["port"] = m.group(1) > > reta_line["queue"] = m.group(2) > > > > - elif len(line) != 0 and line.startswith(("src=",)): > > + elif len(line) != 0 and line.startswith("src="): > > if "RSS hash" not in line: > > continue > > for item in line.split("-"): > > item = item.strip() > > - if(item.startswith("RSS hash")): > > + if item.startswith("RSS hash"): > > name, value = item.split("=", 1) > > > > reta_line[name.strip()] = value.strip() > > received_pkts.append(reta_line) > > > > - return(self.verifyResult(received_pkts)) > > + return(self.verifyResult(received_pkts, symmetric)) > > > > - def verifyResult(self, reta_lines): > > + def verifyResult(self, reta_lines, symmetric): > > """ > > Verify whether or not the result passes. > > """ > > - > > - global reta_num > > result = [] > > key_id = {} > > self.verify(len(reta_lines) > 0, 'No packet received!') > > self.result_table_create( > > ['packet index', 'hash value', 'hash index', 'queue id', > 'actual queue id', > > 'pass ']) > > > > - i = 0 > > - > > - for tmp_reta_line in reta_lines: > > + for i, tmp_reta_line in enumerate(reta_lines): > > status = "false" > > # compute the hash result of five tuple into the 7 LSBs > value. > > hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num > > - print(reta_entries[hash_index], tmp_reta_line) > > if(reta_entries[hash_index] == int(tmp_reta_line["queue"])): > > status = "true" > > result.insert(i, 0) > > + if symmetric: > > + if(i % 2 == 1): > > + if(pre_RSS_hash == tmp_reta_line["RSS hash"]): > > + status = "true" > > + result.insert(len(reta_lines) + (i - 1) // > 2, 0) > > + else: > > + status = "fail" > > + result.insert(len(reta_lines) + (i - 1) // > 2, 1) > > + pre_RSS_hash = tmp_reta_line["RSS hash"] > > else: > > status = "fail" > > result.insert(i, 1) > > self.result_table_add( > > [i, tmp_reta_line["RSS hash"], hash_index, > reta_entries[hash_index], > > tmp_reta_line["queue"], status]) > > - i = i + 1 > > - key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index] > > + key_id[tmp_reta_line["RSS hash"]] = > > + reta_entries[hash_index] > > > > self.result_table_print() > > self.verify(sum(result) == 0, "the reta update function > failed!") > > return key_id > > > > - def verifyResult_symmetric(self, reta_lines): > > - """ > > - Verify whether or not the result passes. > > - """ > > - > > - global reta_num > > - result = [] > > - key_id = {} > > - self.verify(len(reta_lines) > 0, 'No packet received!') > > - self.result_table_create( > > - ['packet index', 'RSS hash', 'hash index', 'queue id', > 'actual queue id', 'pass > > ']) > > - > > - i = 0 > > - for tmp_reta_line in reta_lines: > > - status = "false" > > - # compute the hash result of five tuple into the 7 LSBs > value. > > - hash_index = int(tmp_reta_line["RSS hash"], 16) % reta_num > > - if(reta_entries[hash_index] == int(tmp_reta_line["queue"])): > > - status = "true" > > - result.insert(i, 0) > > - if(i % 2 == 1): > > - if(pre_RSS_hash == tmp_reta_line["RSS hash"]): > > - status = "true" > > - result.insert(len(reta_lines) + (i - 1) // 2, 0) > > - else: > > - status = "fail" > > - result.insert(len(reta_lines) + (i - 1) // 2, 1) > > - pre_RSS_hash = tmp_reta_line["RSS hash"] > > - else: > > - status = "fail" > > - result.insert(i, 1) > > - self.result_table_add( > > - [i, tmp_reta_line["RSS hash"], hash_index, > reta_entries[hash_index], > > tmp_reta_line["queue"], status]) > > - i = i + 1 > > - key_id[tmp_reta_line["RSS hash"]]=reta_entries[hash_index] > > - > > - self.result_table_print() > > - self.verify( > > - sum(result) == 0, "the symmetric RSS hash function failed!") > > - return key_id > > - > > def set_up_all(self): > > """ > > Run at the start of each test suite. > > @@ -282,7 +195,7 @@ class TestRssKeyUpdate(TestCase): > > elif self.nic in ["redrockcanyou", "atwood", "boulderrapid"]: > > reta_num = 128 > > else: > > - self.verify(False, f"NIC Unsupported:{self.nic}") > > + self.verify(False, f"NIC Unsupported: {self.nic}") > > > > cores = self.dut.get_core_list("all") > > self.coremask = utils.create_mask(cores) @@ -300,8 +213,6 @@ > class > > TestRssKeyUpdate(TestCase): > > dutPorts = self.dut.get_ports(self.nic) > > localPort = self.tester.get_local_port(dutPorts[0]) > > self.itf = self.tester.get_interface(localPort) > > - global reta_num > > - global iptypes > > > > self.dut.kill_all() > > > > @@ -326,12 +237,12 @@ class TestRssKeyUpdate(TestCase): > > reta_entries.insert(i, random.randint(0, queue - 1)) > > self.dut.send_expect(f"port config 0 rss reta > ({i},{reta_entries[i]})", > > "testpmd> ") > > > > - ori_output = self.send_packet(self.itf, iptype) > > + ori_output = self.send_packet(self.itf, iptype, False) > > > > self.dut.send_expect("show port 0 rss-hash key", "testpmd> > ") > > self.dut.send_expect(f"port config 0 rss-hash-key {iptype} > > 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C > > 05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ") > > > > - new_output = self.send_packet(self.itf, iptype) > > + new_output = self.send_packet(self.itf, iptype, False) > > > > self.verify(ori_output != new_output, "before and after > results are the > > same, hash key configuration failed!") > > > > @@ -356,16 +267,15 @@ class TestRssKeyUpdate(TestCase): > > reta_entries.insert(i, random.randint(0, queue - 1)) > > self.dut.send_expect(f"port config 0 rss reta > ({i},{reta_entries[i]})", > > "testpmd> ") > > > > - ori_output = self.send_packet(self.itf, iptype) > > + ori_output = self.send_packet(self.itf, iptype, True) > > > > out = self.dut.send_expect("show port 0 rss-hash key", > "testpmd> ") > > self.verify("rss disable" not in out, "rss is disable!") > > self.dut.send_expect(f"port config 0 rss-hash-key {iptype} > > 4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4C > > 05C6FA343958D855FFF9583AE138C92E81150FFF", "testpmd> ") > > > > - new_output = self.send_packet(self.itf, iptype) > > + new_output = self.send_packet(self.itf, iptype, True) > > > > self.verify(ori_output != new_output, "before and after > results are the > > same, hash key configuration failed!") > > - self.dut.send_expect("quit", "# ", 30) > > > > def test_set_hash_key_short_long(self): > > > > @@ -384,26 +294,25 @@ class TestRssKeyUpdate(TestCase): > > out = self.dut.send_expect("show port info all", "testpmd> ", > 120) > > self.verify(f"Hash key size in bytes: > {nic_rss_key_size[self.nic]}" in out, "not > > expected hash key size!") > > > > - test_keies = { > > + test_keys = { > > > > "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4 > > C05C6FA343958D855FFF9583AE138C92E81150FFFFF": "longer", > > > > "4439796BB54C50f3B675EF5B124F9F30B8A2C0DC4D02A08C9B334FF64A4C05C > > 6FA343958D855FFF9583AE138C92E81150FFF": "shorter", > > } > > > > # config key length longer/shorter than 104 hexa-decimal numbers > > - for key, error in test_keies.items(): > > + for key, error in test_keys.items(): > > out = self.dut.send_expect(f"port config 0 rss-hash-key > ipv4-udp {key}", > > "testpmd> ") > > self.verify("invalid" in out, f"Try to set hash key {error} > than 104 hexa- > > decimal numbers!") > > > > # config ket length same as 104 hex-decimal numbers and keep > the config > > key = > > "4439796BB54C50f3B675EF5B124F9F30B8A2C0FFFFDC4D02A08C9B334FF64A4 > > C05C6FA343958D855FFF9583AE138C92E81150FFF" > > out = self.dut.send_expect(f"port config 0 rss-hash-key > ipv4-udp {key}", > > "testpmd> ") > > - self.dut.send_expect("quit", "# ", 30) > > > > def tear_down(self): > > """ > > Run after each test case. > > """ > > - self.dut.send_expect("quit", "# ", 30) > > + self.pmdout.quit() > > > > def tear_down_all(self): > > """ > > -- > > 2.17.1 > > [-- Attachment #2: Type: text/html, Size: 25384 bytes --] ^ permalink raw reply [flat|nested] 3+ messages in thread
end of thread, other threads:[~2020-07-24 20:46 UTC | newest] Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- [not found] <f08663d0b11bfc1487f7461dd7c952bab652d9e8> 2020-07-15 20:08 ` [dts] [PATCH v2]Add RSS Key Update Feature David Liu 2020-07-24 2:01 ` Tu, Lijuan 2020-07-24 20:45 ` David Liu
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).