xref: /dpdk/dts/framework/remote_session/testpmd_shell.py (revision e3b16f45cb17fe7dc4251e493fa5e9ef235bfd0d)
1840b1e01SJuraj Linkeš# SPDX-License-Identifier: BSD-3-Clause
2840b1e01SJuraj Linkeš# Copyright(c) 2023 University of New Hampshire
36ef07151SJuraj Linkeš# Copyright(c) 2023 PANTHEON.tech s.r.o.
461d5bc9bSLuca Vizzarro# Copyright(c) 2024 Arm Limited
56ef07151SJuraj Linkeš
66ef07151SJuraj Linkeš"""Testpmd interactive shell.
76ef07151SJuraj Linkeš
86ef07151SJuraj LinkešTypical usage example in a TestSuite::
96ef07151SJuraj Linkeš
10bfad0948SLuca Vizzarro    testpmd_shell = TestPmdShell(self.sut_node)
116ef07151SJuraj Linkeš    devices = testpmd_shell.get_devices()
126ef07151SJuraj Linkeš    for device in devices:
136ef07151SJuraj Linkeš        print(device)
146ef07151SJuraj Linkeš    testpmd_shell.close()
156ef07151SJuraj Linkeš"""
16840b1e01SJuraj Linkeš
172ecfd126SLuca Vizzarroimport functools
1861d5bc9bSLuca Vizzarroimport re
19369d34b8SJeremy Spewockimport time
20c89d0038SJuraj Linkešfrom collections.abc import Callable, MutableSet
2161d5bc9bSLuca Vizzarrofrom dataclasses import dataclass, field
2261d5bc9bSLuca Vizzarrofrom enum import Flag, auto
23949d1488SLuca Vizzarrofrom os import environ
24840b1e01SJuraj Linkešfrom pathlib import PurePath
25c89d0038SJuraj Linkešfrom typing import TYPE_CHECKING, Any, ClassVar, Concatenate, ParamSpec, TypeAlias
26c89d0038SJuraj Linkeš
27949d1488SLuca Vizzarroif TYPE_CHECKING or environ.get("DTS_DOC_BUILD"):
28c89d0038SJuraj Linkeš    from enum import Enum as NoAliasEnum
29c89d0038SJuraj Linkešelse:
30c89d0038SJuraj Linkeš    from aenum import NoAliasEnum
31840b1e01SJuraj Linkeš
3287ba4cdcSLuca Vizzarrofrom typing_extensions import Self, Unpack
3361d5bc9bSLuca Vizzarro
342ecfd126SLuca Vizzarrofrom framework.exception import InteractiveCommandExecutionError, InternalError
35fc0f7dc4SLuca Vizzarrofrom framework.params.testpmd import SimpleForwardingModes, TestPmdParams
3687ba4cdcSLuca Vizzarrofrom framework.params.types import TestPmdParamsDict
3761d5bc9bSLuca Vizzarrofrom framework.parser import ParserFn, TextParser
38bfad0948SLuca Vizzarrofrom framework.remote_session.dpdk_shell import DPDKShell
39369d34b8SJeremy Spewockfrom framework.settings import SETTINGS
40bfad0948SLuca Vizzarrofrom framework.testbed_model.cpu import LogicalCoreCount, LogicalCoreList
41bfad0948SLuca Vizzarrofrom framework.testbed_model.sut_node import SutNode
42a91d5f47SJeremy Spewockfrom framework.utils import REGEX_FOR_MAC_ADDRESS, StrEnum
43369d34b8SJeremy Spewock
442ecfd126SLuca VizzarroP = ParamSpec("P")
452ecfd126SLuca VizzarroTestPmdShellMethod = Callable[Concatenate["TestPmdShell", P], Any]
462ecfd126SLuca Vizzarro
47c89d0038SJuraj LinkešTestPmdShellCapabilityMethod: TypeAlias = Callable[
48c89d0038SJuraj Linkeš    ["TestPmdShell", MutableSet["NicCapability"], MutableSet["NicCapability"]], None
49c89d0038SJuraj Linkeš]
50c89d0038SJuraj Linkeš
51c89d0038SJuraj LinkešTestPmdShellDecorator: TypeAlias = Callable[[TestPmdShellMethod], TestPmdShellMethod]
52c89d0038SJuraj Linkeš
53c0119400SJuraj LinkešTestPmdShellNicCapability = (
54c0119400SJuraj Linkeš    TestPmdShellCapabilityMethod | tuple[TestPmdShellCapabilityMethod, TestPmdShellDecorator]
55c0119400SJuraj Linkeš)
56c0119400SJuraj Linkeš
57840b1e01SJuraj Linkeš
583e967643SJuraj Linkešclass TestPmdDevice:
596ef07151SJuraj Linkeš    """The data of a device that testpmd can recognize.
606ef07151SJuraj Linkeš
616ef07151SJuraj Linkeš    Attributes:
626ef07151SJuraj Linkeš        pci_address: The PCI address of the device.
636ef07151SJuraj Linkeš    """
646ef07151SJuraj Linkeš
65840b1e01SJuraj Linkeš    pci_address: str
66840b1e01SJuraj Linkeš
67840b1e01SJuraj Linkeš    def __init__(self, pci_address_line: str):
686ef07151SJuraj Linkeš        """Initialize the device from the testpmd output line string.
696ef07151SJuraj Linkeš
706ef07151SJuraj Linkeš        Args:
716ef07151SJuraj Linkeš            pci_address_line: A line of testpmd output that contains a device.
726ef07151SJuraj Linkeš        """
73840b1e01SJuraj Linkeš        self.pci_address = pci_address_line.strip().split(": ")[1].strip()
74840b1e01SJuraj Linkeš
75840b1e01SJuraj Linkeš    def __str__(self) -> str:
766ef07151SJuraj Linkeš        """The PCI address captures what the device is."""
77840b1e01SJuraj Linkeš        return self.pci_address
78840b1e01SJuraj Linkeš
79840b1e01SJuraj Linkeš
8061d5bc9bSLuca Vizzarroclass VLANOffloadFlag(Flag):
8161d5bc9bSLuca Vizzarro    """Flag representing the VLAN offload settings of a NIC port."""
8261d5bc9bSLuca Vizzarro
8361d5bc9bSLuca Vizzarro    #:
8461d5bc9bSLuca Vizzarro    STRIP = auto()
8561d5bc9bSLuca Vizzarro    #:
8661d5bc9bSLuca Vizzarro    FILTER = auto()
8761d5bc9bSLuca Vizzarro    #:
8861d5bc9bSLuca Vizzarro    EXTEND = auto()
8961d5bc9bSLuca Vizzarro    #:
9061d5bc9bSLuca Vizzarro    QINQ_STRIP = auto()
9161d5bc9bSLuca Vizzarro
9261d5bc9bSLuca Vizzarro    @classmethod
9361d5bc9bSLuca Vizzarro    def from_str_dict(cls, d):
9461d5bc9bSLuca Vizzarro        """Makes an instance from a dict containing the flag member names with an "on" value.
9561d5bc9bSLuca Vizzarro
9661d5bc9bSLuca Vizzarro        Args:
9761d5bc9bSLuca Vizzarro            d: A dictionary containing the flag members as keys and any string value.
9861d5bc9bSLuca Vizzarro
9961d5bc9bSLuca Vizzarro        Returns:
10061d5bc9bSLuca Vizzarro            A new instance of the flag.
10161d5bc9bSLuca Vizzarro        """
10261d5bc9bSLuca Vizzarro        flag = cls(0)
10361d5bc9bSLuca Vizzarro        for name in cls.__members__:
10461d5bc9bSLuca Vizzarro            if d.get(name) == "on":
10561d5bc9bSLuca Vizzarro                flag |= cls[name]
10661d5bc9bSLuca Vizzarro        return flag
10761d5bc9bSLuca Vizzarro
10861d5bc9bSLuca Vizzarro    @classmethod
10961d5bc9bSLuca Vizzarro    def make_parser(cls) -> ParserFn:
11061d5bc9bSLuca Vizzarro        """Makes a parser function.
11161d5bc9bSLuca Vizzarro
11261d5bc9bSLuca Vizzarro        Returns:
11361d5bc9bSLuca Vizzarro            ParserFn: A dictionary for the `dataclasses.field` metadata argument containing a
11461d5bc9bSLuca Vizzarro                parser function that makes an instance of this flag from text.
11561d5bc9bSLuca Vizzarro        """
11661d5bc9bSLuca Vizzarro        return TextParser.wrap(
11761d5bc9bSLuca Vizzarro            TextParser.find(
11861d5bc9bSLuca Vizzarro                r"VLAN offload:\s+"
11961d5bc9bSLuca Vizzarro                r"strip (?P<STRIP>on|off), "
12061d5bc9bSLuca Vizzarro                r"filter (?P<FILTER>on|off), "
12161d5bc9bSLuca Vizzarro                r"extend (?P<EXTEND>on|off), "
1221a7520a1SDean Marx                r"qinq strip (?P<QINQ_STRIP>on|off)",
12361d5bc9bSLuca Vizzarro                re.MULTILINE,
12461d5bc9bSLuca Vizzarro                named=True,
12561d5bc9bSLuca Vizzarro            ),
12661d5bc9bSLuca Vizzarro            cls.from_str_dict,
12761d5bc9bSLuca Vizzarro        )
12861d5bc9bSLuca Vizzarro
12961d5bc9bSLuca Vizzarro
13061d5bc9bSLuca Vizzarroclass RSSOffloadTypesFlag(Flag):
13161d5bc9bSLuca Vizzarro    """Flag representing the RSS offload flow types supported by the NIC port."""
13261d5bc9bSLuca Vizzarro
13361d5bc9bSLuca Vizzarro    #:
13461d5bc9bSLuca Vizzarro    ipv4 = auto()
13561d5bc9bSLuca Vizzarro    #:
13661d5bc9bSLuca Vizzarro    ipv4_frag = auto()
13761d5bc9bSLuca Vizzarro    #:
13861d5bc9bSLuca Vizzarro    ipv4_tcp = auto()
13961d5bc9bSLuca Vizzarro    #:
14061d5bc9bSLuca Vizzarro    ipv4_udp = auto()
14161d5bc9bSLuca Vizzarro    #:
14261d5bc9bSLuca Vizzarro    ipv4_sctp = auto()
14361d5bc9bSLuca Vizzarro    #:
14461d5bc9bSLuca Vizzarro    ipv4_other = auto()
14561d5bc9bSLuca Vizzarro    #:
14661d5bc9bSLuca Vizzarro    ipv6 = auto()
14761d5bc9bSLuca Vizzarro    #:
14861d5bc9bSLuca Vizzarro    ipv6_frag = auto()
14961d5bc9bSLuca Vizzarro    #:
15061d5bc9bSLuca Vizzarro    ipv6_tcp = auto()
15161d5bc9bSLuca Vizzarro    #:
15261d5bc9bSLuca Vizzarro    ipv6_udp = auto()
15361d5bc9bSLuca Vizzarro    #:
15461d5bc9bSLuca Vizzarro    ipv6_sctp = auto()
15561d5bc9bSLuca Vizzarro    #:
15661d5bc9bSLuca Vizzarro    ipv6_other = auto()
15761d5bc9bSLuca Vizzarro    #:
15861d5bc9bSLuca Vizzarro    l2_payload = auto()
15961d5bc9bSLuca Vizzarro    #:
16061d5bc9bSLuca Vizzarro    ipv6_ex = auto()
16161d5bc9bSLuca Vizzarro    #:
16261d5bc9bSLuca Vizzarro    ipv6_tcp_ex = auto()
16361d5bc9bSLuca Vizzarro    #:
16461d5bc9bSLuca Vizzarro    ipv6_udp_ex = auto()
16561d5bc9bSLuca Vizzarro    #:
16661d5bc9bSLuca Vizzarro    port = auto()
16761d5bc9bSLuca Vizzarro    #:
16861d5bc9bSLuca Vizzarro    vxlan = auto()
16961d5bc9bSLuca Vizzarro    #:
17061d5bc9bSLuca Vizzarro    geneve = auto()
17161d5bc9bSLuca Vizzarro    #:
17261d5bc9bSLuca Vizzarro    nvgre = auto()
17361d5bc9bSLuca Vizzarro    #:
17461d5bc9bSLuca Vizzarro    user_defined_22 = auto()
17561d5bc9bSLuca Vizzarro    #:
17661d5bc9bSLuca Vizzarro    gtpu = auto()
17761d5bc9bSLuca Vizzarro    #:
17861d5bc9bSLuca Vizzarro    eth = auto()
17961d5bc9bSLuca Vizzarro    #:
18061d5bc9bSLuca Vizzarro    s_vlan = auto()
18161d5bc9bSLuca Vizzarro    #:
18261d5bc9bSLuca Vizzarro    c_vlan = auto()
18361d5bc9bSLuca Vizzarro    #:
18461d5bc9bSLuca Vizzarro    esp = auto()
18561d5bc9bSLuca Vizzarro    #:
18661d5bc9bSLuca Vizzarro    ah = auto()
18761d5bc9bSLuca Vizzarro    #:
18861d5bc9bSLuca Vizzarro    l2tpv3 = auto()
18961d5bc9bSLuca Vizzarro    #:
19061d5bc9bSLuca Vizzarro    pfcp = auto()
19161d5bc9bSLuca Vizzarro    #:
19261d5bc9bSLuca Vizzarro    pppoe = auto()
19361d5bc9bSLuca Vizzarro    #:
19461d5bc9bSLuca Vizzarro    ecpri = auto()
19561d5bc9bSLuca Vizzarro    #:
19661d5bc9bSLuca Vizzarro    mpls = auto()
19761d5bc9bSLuca Vizzarro    #:
19861d5bc9bSLuca Vizzarro    ipv4_chksum = auto()
19961d5bc9bSLuca Vizzarro    #:
20061d5bc9bSLuca Vizzarro    l4_chksum = auto()
20161d5bc9bSLuca Vizzarro    #:
20261d5bc9bSLuca Vizzarro    l2tpv2 = auto()
20361d5bc9bSLuca Vizzarro    #:
20461d5bc9bSLuca Vizzarro    ipv6_flow_label = auto()
20561d5bc9bSLuca Vizzarro    #:
20661d5bc9bSLuca Vizzarro    user_defined_38 = auto()
20761d5bc9bSLuca Vizzarro    #:
20861d5bc9bSLuca Vizzarro    user_defined_39 = auto()
20961d5bc9bSLuca Vizzarro    #:
21061d5bc9bSLuca Vizzarro    user_defined_40 = auto()
21161d5bc9bSLuca Vizzarro    #:
21261d5bc9bSLuca Vizzarro    user_defined_41 = auto()
21361d5bc9bSLuca Vizzarro    #:
21461d5bc9bSLuca Vizzarro    user_defined_42 = auto()
21561d5bc9bSLuca Vizzarro    #:
21661d5bc9bSLuca Vizzarro    user_defined_43 = auto()
21761d5bc9bSLuca Vizzarro    #:
21861d5bc9bSLuca Vizzarro    user_defined_44 = auto()
21961d5bc9bSLuca Vizzarro    #:
22061d5bc9bSLuca Vizzarro    user_defined_45 = auto()
22161d5bc9bSLuca Vizzarro    #:
22261d5bc9bSLuca Vizzarro    user_defined_46 = auto()
22361d5bc9bSLuca Vizzarro    #:
22461d5bc9bSLuca Vizzarro    user_defined_47 = auto()
22561d5bc9bSLuca Vizzarro    #:
22661d5bc9bSLuca Vizzarro    user_defined_48 = auto()
22761d5bc9bSLuca Vizzarro    #:
22861d5bc9bSLuca Vizzarro    user_defined_49 = auto()
22961d5bc9bSLuca Vizzarro    #:
23061d5bc9bSLuca Vizzarro    user_defined_50 = auto()
23161d5bc9bSLuca Vizzarro    #:
23261d5bc9bSLuca Vizzarro    user_defined_51 = auto()
23361d5bc9bSLuca Vizzarro    #:
23461d5bc9bSLuca Vizzarro    l3_pre96 = auto()
23561d5bc9bSLuca Vizzarro    #:
23661d5bc9bSLuca Vizzarro    l3_pre64 = auto()
23761d5bc9bSLuca Vizzarro    #:
23861d5bc9bSLuca Vizzarro    l3_pre56 = auto()
23961d5bc9bSLuca Vizzarro    #:
24061d5bc9bSLuca Vizzarro    l3_pre48 = auto()
24161d5bc9bSLuca Vizzarro    #:
24261d5bc9bSLuca Vizzarro    l3_pre40 = auto()
24361d5bc9bSLuca Vizzarro    #:
24461d5bc9bSLuca Vizzarro    l3_pre32 = auto()
24561d5bc9bSLuca Vizzarro    #:
24661d5bc9bSLuca Vizzarro    l2_dst_only = auto()
24761d5bc9bSLuca Vizzarro    #:
24861d5bc9bSLuca Vizzarro    l2_src_only = auto()
24961d5bc9bSLuca Vizzarro    #:
25061d5bc9bSLuca Vizzarro    l4_dst_only = auto()
25161d5bc9bSLuca Vizzarro    #:
25261d5bc9bSLuca Vizzarro    l4_src_only = auto()
25361d5bc9bSLuca Vizzarro    #:
25461d5bc9bSLuca Vizzarro    l3_dst_only = auto()
25561d5bc9bSLuca Vizzarro    #:
25661d5bc9bSLuca Vizzarro    l3_src_only = auto()
25761d5bc9bSLuca Vizzarro
25861d5bc9bSLuca Vizzarro    #:
25961d5bc9bSLuca Vizzarro    ip = ipv4 | ipv4_frag | ipv4_other | ipv6 | ipv6_frag | ipv6_other | ipv6_ex
26061d5bc9bSLuca Vizzarro    #:
26161d5bc9bSLuca Vizzarro    udp = ipv4_udp | ipv6_udp | ipv6_udp_ex
26261d5bc9bSLuca Vizzarro    #:
26361d5bc9bSLuca Vizzarro    tcp = ipv4_tcp | ipv6_tcp | ipv6_tcp_ex
26461d5bc9bSLuca Vizzarro    #:
26561d5bc9bSLuca Vizzarro    sctp = ipv4_sctp | ipv6_sctp
26661d5bc9bSLuca Vizzarro    #:
26761d5bc9bSLuca Vizzarro    tunnel = vxlan | geneve | nvgre
26861d5bc9bSLuca Vizzarro    #:
26961d5bc9bSLuca Vizzarro    vlan = s_vlan | c_vlan
27061d5bc9bSLuca Vizzarro    #:
27161d5bc9bSLuca Vizzarro    all = (
27261d5bc9bSLuca Vizzarro        eth
27361d5bc9bSLuca Vizzarro        | vlan
27461d5bc9bSLuca Vizzarro        | ip
27561d5bc9bSLuca Vizzarro        | tcp
27661d5bc9bSLuca Vizzarro        | udp
27761d5bc9bSLuca Vizzarro        | sctp
27861d5bc9bSLuca Vizzarro        | l2_payload
27961d5bc9bSLuca Vizzarro        | l2tpv3
28061d5bc9bSLuca Vizzarro        | esp
28161d5bc9bSLuca Vizzarro        | ah
28261d5bc9bSLuca Vizzarro        | pfcp
28361d5bc9bSLuca Vizzarro        | gtpu
28461d5bc9bSLuca Vizzarro        | ecpri
28561d5bc9bSLuca Vizzarro        | mpls
28661d5bc9bSLuca Vizzarro        | l2tpv2
28761d5bc9bSLuca Vizzarro    )
28861d5bc9bSLuca Vizzarro
28961d5bc9bSLuca Vizzarro    @classmethod
29061d5bc9bSLuca Vizzarro    def from_list_string(cls, names: str) -> Self:
29161d5bc9bSLuca Vizzarro        """Makes a flag from a whitespace-separated list of names.
29261d5bc9bSLuca Vizzarro
29361d5bc9bSLuca Vizzarro        Args:
29461d5bc9bSLuca Vizzarro            names: a whitespace-separated list containing the members of this flag.
29561d5bc9bSLuca Vizzarro
29661d5bc9bSLuca Vizzarro        Returns:
29761d5bc9bSLuca Vizzarro            An instance of this flag.
29861d5bc9bSLuca Vizzarro        """
29961d5bc9bSLuca Vizzarro        flag = cls(0)
30061d5bc9bSLuca Vizzarro        for name in names.split():
30161d5bc9bSLuca Vizzarro            flag |= cls.from_str(name)
30261d5bc9bSLuca Vizzarro        return flag
30361d5bc9bSLuca Vizzarro
30461d5bc9bSLuca Vizzarro    @classmethod
30561d5bc9bSLuca Vizzarro    def from_str(cls, name: str) -> Self:
30661d5bc9bSLuca Vizzarro        """Makes a flag matching the supplied name.
30761d5bc9bSLuca Vizzarro
30861d5bc9bSLuca Vizzarro        Args:
30961d5bc9bSLuca Vizzarro            name: a valid member of this flag in text
31061d5bc9bSLuca Vizzarro        Returns:
31161d5bc9bSLuca Vizzarro            An instance of this flag.
31261d5bc9bSLuca Vizzarro        """
31361d5bc9bSLuca Vizzarro        member_name = name.strip().replace("-", "_")
31461d5bc9bSLuca Vizzarro        return cls[member_name]
31561d5bc9bSLuca Vizzarro
31661d5bc9bSLuca Vizzarro    @classmethod
31761d5bc9bSLuca Vizzarro    def make_parser(cls) -> ParserFn:
31861d5bc9bSLuca Vizzarro        """Makes a parser function.
31961d5bc9bSLuca Vizzarro
32061d5bc9bSLuca Vizzarro        Returns:
32161d5bc9bSLuca Vizzarro            ParserFn: A dictionary for the `dataclasses.field` metadata argument containing a
32261d5bc9bSLuca Vizzarro                parser function that makes an instance of this flag from text.
32361d5bc9bSLuca Vizzarro        """
32461d5bc9bSLuca Vizzarro        return TextParser.wrap(
32561d5bc9bSLuca Vizzarro            TextParser.find(r"Supported RSS offload flow types:((?:\r?\n?  \S+)+)", re.MULTILINE),
32661d5bc9bSLuca Vizzarro            RSSOffloadTypesFlag.from_list_string,
32761d5bc9bSLuca Vizzarro        )
32861d5bc9bSLuca Vizzarro
32961d5bc9bSLuca Vizzarro
33061d5bc9bSLuca Vizzarroclass DeviceCapabilitiesFlag(Flag):
33161d5bc9bSLuca Vizzarro    """Flag representing the device capabilities."""
33261d5bc9bSLuca Vizzarro
33361d5bc9bSLuca Vizzarro    #: Device supports Rx queue setup after device started.
33461d5bc9bSLuca Vizzarro    RUNTIME_RX_QUEUE_SETUP = auto()
33561d5bc9bSLuca Vizzarro    #: Device supports Tx queue setup after device started.
33661d5bc9bSLuca Vizzarro    RUNTIME_TX_QUEUE_SETUP = auto()
33761d5bc9bSLuca Vizzarro    #: Device supports shared Rx queue among ports within Rx domain and switch domain.
33861d5bc9bSLuca Vizzarro    RXQ_SHARE = auto()
33961d5bc9bSLuca Vizzarro    #: Device supports keeping flow rules across restart.
34061d5bc9bSLuca Vizzarro    FLOW_RULE_KEEP = auto()
34161d5bc9bSLuca Vizzarro    #: Device supports keeping shared flow objects across restart.
34261d5bc9bSLuca Vizzarro    FLOW_SHARED_OBJECT_KEEP = auto()
34361d5bc9bSLuca Vizzarro
34461d5bc9bSLuca Vizzarro    @classmethod
34561d5bc9bSLuca Vizzarro    def make_parser(cls) -> ParserFn:
34661d5bc9bSLuca Vizzarro        """Makes a parser function.
34761d5bc9bSLuca Vizzarro
34861d5bc9bSLuca Vizzarro        Returns:
34961d5bc9bSLuca Vizzarro            ParserFn: A dictionary for the `dataclasses.field` metadata argument containing a
35061d5bc9bSLuca Vizzarro                parser function that makes an instance of this flag from text.
35161d5bc9bSLuca Vizzarro        """
35261d5bc9bSLuca Vizzarro        return TextParser.wrap(
35361d5bc9bSLuca Vizzarro            TextParser.find_int(r"Device capabilities: (0x[A-Fa-f\d]+)"),
35461d5bc9bSLuca Vizzarro            cls,
35561d5bc9bSLuca Vizzarro        )
35661d5bc9bSLuca Vizzarro
35761d5bc9bSLuca Vizzarro
35861d5bc9bSLuca Vizzarroclass DeviceErrorHandlingMode(StrEnum):
35961d5bc9bSLuca Vizzarro    """Enum representing the device error handling mode."""
36061d5bc9bSLuca Vizzarro
36161d5bc9bSLuca Vizzarro    #:
36261d5bc9bSLuca Vizzarro    none = auto()
36361d5bc9bSLuca Vizzarro    #:
36461d5bc9bSLuca Vizzarro    passive = auto()
36561d5bc9bSLuca Vizzarro    #:
36661d5bc9bSLuca Vizzarro    proactive = auto()
36761d5bc9bSLuca Vizzarro    #:
36861d5bc9bSLuca Vizzarro    unknown = auto()
36961d5bc9bSLuca Vizzarro
37061d5bc9bSLuca Vizzarro    @classmethod
37161d5bc9bSLuca Vizzarro    def make_parser(cls) -> ParserFn:
37261d5bc9bSLuca Vizzarro        """Makes a parser function.
37361d5bc9bSLuca Vizzarro
37461d5bc9bSLuca Vizzarro        Returns:
37561d5bc9bSLuca Vizzarro            ParserFn: A dictionary for the `dataclasses.field` metadata argument containing a
37661d5bc9bSLuca Vizzarro                parser function that makes an instance of this enum from text.
37761d5bc9bSLuca Vizzarro        """
37861d5bc9bSLuca Vizzarro        return TextParser.wrap(TextParser.find(r"Device error handling mode: (\w+)"), cls)
37961d5bc9bSLuca Vizzarro
38061d5bc9bSLuca Vizzarro
38161d5bc9bSLuca Vizzarrodef make_device_private_info_parser() -> ParserFn:
38261d5bc9bSLuca Vizzarro    """Device private information parser.
38361d5bc9bSLuca Vizzarro
38461d5bc9bSLuca Vizzarro    Ensures that we are not parsing invalid device private info output.
38561d5bc9bSLuca Vizzarro
38661d5bc9bSLuca Vizzarro    Returns:
38761d5bc9bSLuca Vizzarro        ParserFn: A dictionary for the `dataclasses.field` metadata argument containing a parser
38861d5bc9bSLuca Vizzarro            function that parses the device private info from the TestPmd port info output.
38961d5bc9bSLuca Vizzarro    """
39061d5bc9bSLuca Vizzarro
39161d5bc9bSLuca Vizzarro    def _validate(info: str):
39261d5bc9bSLuca Vizzarro        info = info.strip()
39361d5bc9bSLuca Vizzarro        if info == "none" or info.startswith("Invalid file") or info.startswith("Failed to dump"):
39461d5bc9bSLuca Vizzarro            return None
39561d5bc9bSLuca Vizzarro        return info
39661d5bc9bSLuca Vizzarro
39761d5bc9bSLuca Vizzarro    return TextParser.wrap(TextParser.find(r"Device private info:\s+([\s\S]+)"), _validate)
39861d5bc9bSLuca Vizzarro
39961d5bc9bSLuca Vizzarro
400c0119400SJuraj Linkešclass RxQueueState(StrEnum):
401c0119400SJuraj Linkeš    """RX queue states.
402c0119400SJuraj Linkeš
403c0119400SJuraj Linkeš    References:
404c0119400SJuraj Linkeš        DPDK lib: ``lib/ethdev/rte_ethdev.h``
405c0119400SJuraj Linkeš        testpmd display function: ``app/test-pmd/config.c:get_queue_state_name()``
406c0119400SJuraj Linkeš    """
407c0119400SJuraj Linkeš
408c0119400SJuraj Linkeš    #:
409c0119400SJuraj Linkeš    stopped = auto()
410c0119400SJuraj Linkeš    #:
411c0119400SJuraj Linkeš    started = auto()
412c0119400SJuraj Linkeš    #:
413c0119400SJuraj Linkeš    hairpin = auto()
414c0119400SJuraj Linkeš    #:
415c0119400SJuraj Linkeš    unknown = auto()
416c0119400SJuraj Linkeš
417c0119400SJuraj Linkeš    @classmethod
418c0119400SJuraj Linkeš    def make_parser(cls) -> ParserFn:
419c0119400SJuraj Linkeš        """Makes a parser function.
420c0119400SJuraj Linkeš
421c0119400SJuraj Linkeš        Returns:
422c0119400SJuraj Linkeš            ParserFn: A dictionary for the `dataclasses.field` metadata argument containing a
423c0119400SJuraj Linkeš                parser function that makes an instance of this enum from text.
424c0119400SJuraj Linkeš        """
425c0119400SJuraj Linkeš        return TextParser.wrap(TextParser.find(r"Rx queue state: ([^\r\n]+)"), cls)
426c0119400SJuraj Linkeš
427c0119400SJuraj Linkeš
428c0119400SJuraj Linkeš@dataclass
429c0119400SJuraj Linkešclass TestPmdRxqInfo(TextParser):
430c0119400SJuraj Linkeš    """Representation of testpmd's ``show rxq info <port_id> <queue_id>`` command.
431c0119400SJuraj Linkeš
432c0119400SJuraj Linkeš    References:
433c0119400SJuraj Linkeš        testpmd command function: ``app/test-pmd/cmdline.c:cmd_showqueue()``
434c0119400SJuraj Linkeš        testpmd display function: ``app/test-pmd/config.c:rx_queue_infos_display()``
435c0119400SJuraj Linkeš    """
436c0119400SJuraj Linkeš
437c0119400SJuraj Linkeš    #:
438c0119400SJuraj Linkeš    port_id: int = field(metadata=TextParser.find_int(r"Infos for port (\d+)\b ?, RX queue \d+\b"))
439c0119400SJuraj Linkeš    #:
440c0119400SJuraj Linkeš    queue_id: int = field(metadata=TextParser.find_int(r"Infos for port \d+\b ?, RX queue (\d+)\b"))
441c0119400SJuraj Linkeš    #: Mempool used by that queue
442c0119400SJuraj Linkeš    mempool: str = field(metadata=TextParser.find(r"Mempool: ([^\r\n]+)"))
443c0119400SJuraj Linkeš    #: Ring prefetch threshold
444c0119400SJuraj Linkeš    rx_prefetch_threshold: int = field(
445c0119400SJuraj Linkeš        metadata=TextParser.find_int(r"RX prefetch threshold: (\d+)\b")
446c0119400SJuraj Linkeš    )
447c0119400SJuraj Linkeš    #: Ring host threshold
448c0119400SJuraj Linkeš    rx_host_threshold: int = field(metadata=TextParser.find_int(r"RX host threshold: (\d+)\b"))
449c0119400SJuraj Linkeš    #: Ring writeback threshold
450c0119400SJuraj Linkeš    rx_writeback_threshold: int = field(
451c0119400SJuraj Linkeš        metadata=TextParser.find_int(r"RX writeback threshold: (\d+)\b")
452c0119400SJuraj Linkeš    )
453c0119400SJuraj Linkeš    #: Drives the freeing of Rx descriptors
454c0119400SJuraj Linkeš    rx_free_threshold: int = field(metadata=TextParser.find_int(r"RX free threshold: (\d+)\b"))
455c0119400SJuraj Linkeš    #: Drop packets if no descriptors are available
456c0119400SJuraj Linkeš    rx_drop_packets: bool = field(metadata=TextParser.find(r"RX drop packets: on"))
457c0119400SJuraj Linkeš    #: Do not start queue with rte_eth_dev_start()
458c0119400SJuraj Linkeš    rx_deferred_start: bool = field(metadata=TextParser.find(r"RX deferred start: on"))
459c0119400SJuraj Linkeš    #: Scattered packets Rx enabled
460c0119400SJuraj Linkeš    rx_scattered_packets: bool = field(metadata=TextParser.find(r"RX scattered packets: on"))
461c0119400SJuraj Linkeš    #: The state of the queue
462c0119400SJuraj Linkeš    rx_queue_state: str = field(metadata=RxQueueState.make_parser())
463c0119400SJuraj Linkeš    #: Configured number of RXDs
464c0119400SJuraj Linkeš    number_of_rxds: int = field(metadata=TextParser.find_int(r"Number of RXDs: (\d+)\b"))
465c0119400SJuraj Linkeš    #: Hardware receive buffer size
466c0119400SJuraj Linkeš    rx_buffer_size: int | None = field(
467c0119400SJuraj Linkeš        default=None, metadata=TextParser.find_int(r"RX buffer size: (\d+)\b")
468c0119400SJuraj Linkeš    )
469c0119400SJuraj Linkeš    #: Burst mode information
470c0119400SJuraj Linkeš    burst_mode: str | None = field(
471c0119400SJuraj Linkeš        default=None, metadata=TextParser.find(r"Burst mode: ([^\r\n]+)")
472c0119400SJuraj Linkeš    )
473c0119400SJuraj Linkeš
474c0119400SJuraj Linkeš
47561d5bc9bSLuca Vizzarro@dataclass
47661d5bc9bSLuca Vizzarroclass TestPmdPort(TextParser):
47761d5bc9bSLuca Vizzarro    """Dataclass representing the result of testpmd's ``show port info`` command."""
47861d5bc9bSLuca Vizzarro
47961d5bc9bSLuca Vizzarro    #:
48061d5bc9bSLuca Vizzarro    id: int = field(metadata=TextParser.find_int(r"Infos for port (\d+)\b"))
48161d5bc9bSLuca Vizzarro    #:
48261d5bc9bSLuca Vizzarro    device_name: str = field(metadata=TextParser.find(r"Device name: ([^\r\n]+)"))
48361d5bc9bSLuca Vizzarro    #:
48461d5bc9bSLuca Vizzarro    driver_name: str = field(metadata=TextParser.find(r"Driver name: ([^\r\n]+)"))
48561d5bc9bSLuca Vizzarro    #:
48661d5bc9bSLuca Vizzarro    socket_id: int = field(metadata=TextParser.find_int(r"Connect to socket: (\d+)"))
48761d5bc9bSLuca Vizzarro    #:
48861d5bc9bSLuca Vizzarro    is_link_up: bool = field(metadata=TextParser.find("Link status: up"))
48961d5bc9bSLuca Vizzarro    #:
49061d5bc9bSLuca Vizzarro    link_speed: str = field(metadata=TextParser.find(r"Link speed: ([^\r\n]+)"))
49161d5bc9bSLuca Vizzarro    #:
49261d5bc9bSLuca Vizzarro    is_link_full_duplex: bool = field(metadata=TextParser.find("Link duplex: full-duplex"))
49361d5bc9bSLuca Vizzarro    #:
49461d5bc9bSLuca Vizzarro    is_link_autonegotiated: bool = field(metadata=TextParser.find("Autoneg status: On"))
49561d5bc9bSLuca Vizzarro    #:
49661d5bc9bSLuca Vizzarro    is_promiscuous_mode_enabled: bool = field(metadata=TextParser.find("Promiscuous mode: enabled"))
49761d5bc9bSLuca Vizzarro    #:
49861d5bc9bSLuca Vizzarro    is_allmulticast_mode_enabled: bool = field(
49961d5bc9bSLuca Vizzarro        metadata=TextParser.find("Allmulticast mode: enabled")
50061d5bc9bSLuca Vizzarro    )
50161d5bc9bSLuca Vizzarro    #: Maximum number of MAC addresses
50261d5bc9bSLuca Vizzarro    max_mac_addresses_num: int = field(
50361d5bc9bSLuca Vizzarro        metadata=TextParser.find_int(r"Maximum number of MAC addresses: (\d+)")
50461d5bc9bSLuca Vizzarro    )
50561d5bc9bSLuca Vizzarro    #: Maximum configurable length of RX packet
50661d5bc9bSLuca Vizzarro    max_hash_mac_addresses_num: int = field(
50761d5bc9bSLuca Vizzarro        metadata=TextParser.find_int(r"Maximum number of MAC addresses of hash filtering: (\d+)")
50861d5bc9bSLuca Vizzarro    )
50961d5bc9bSLuca Vizzarro    #: Minimum size of RX buffer
51061d5bc9bSLuca Vizzarro    min_rx_bufsize: int = field(metadata=TextParser.find_int(r"Minimum size of RX buffer: (\d+)"))
51161d5bc9bSLuca Vizzarro    #: Maximum configurable length of RX packet
51261d5bc9bSLuca Vizzarro    max_rx_packet_length: int = field(
51361d5bc9bSLuca Vizzarro        metadata=TextParser.find_int(r"Maximum configurable length of RX packet: (\d+)")
51461d5bc9bSLuca Vizzarro    )
51561d5bc9bSLuca Vizzarro    #: Maximum configurable size of LRO aggregated packet
51661d5bc9bSLuca Vizzarro    max_lro_packet_size: int = field(
51761d5bc9bSLuca Vizzarro        metadata=TextParser.find_int(r"Maximum configurable size of LRO aggregated packet: (\d+)")
51861d5bc9bSLuca Vizzarro    )
51961d5bc9bSLuca Vizzarro
52061d5bc9bSLuca Vizzarro    #: Current number of RX queues
52161d5bc9bSLuca Vizzarro    rx_queues_num: int = field(metadata=TextParser.find_int(r"Current number of RX queues: (\d+)"))
52261d5bc9bSLuca Vizzarro    #: Max possible RX queues
52361d5bc9bSLuca Vizzarro    max_rx_queues_num: int = field(metadata=TextParser.find_int(r"Max possible RX queues: (\d+)"))
52461d5bc9bSLuca Vizzarro    #: Max possible number of RXDs per queue
52561d5bc9bSLuca Vizzarro    max_queue_rxd_num: int = field(
52661d5bc9bSLuca Vizzarro        metadata=TextParser.find_int(r"Max possible number of RXDs per queue: (\d+)")
52761d5bc9bSLuca Vizzarro    )
52861d5bc9bSLuca Vizzarro    #: Min possible number of RXDs per queue
52961d5bc9bSLuca Vizzarro    min_queue_rxd_num: int = field(
53061d5bc9bSLuca Vizzarro        metadata=TextParser.find_int(r"Min possible number of RXDs per queue: (\d+)")
53161d5bc9bSLuca Vizzarro    )
53261d5bc9bSLuca Vizzarro    #: RXDs number alignment
53361d5bc9bSLuca Vizzarro    rxd_alignment_num: int = field(metadata=TextParser.find_int(r"RXDs number alignment: (\d+)"))
53461d5bc9bSLuca Vizzarro
53561d5bc9bSLuca Vizzarro    #: Current number of TX queues
53661d5bc9bSLuca Vizzarro    tx_queues_num: int = field(metadata=TextParser.find_int(r"Current number of TX queues: (\d+)"))
53761d5bc9bSLuca Vizzarro    #: Max possible TX queues
53861d5bc9bSLuca Vizzarro    max_tx_queues_num: int = field(metadata=TextParser.find_int(r"Max possible TX queues: (\d+)"))
53961d5bc9bSLuca Vizzarro    #: Max possible number of TXDs per queue
54061d5bc9bSLuca Vizzarro    max_queue_txd_num: int = field(
54161d5bc9bSLuca Vizzarro        metadata=TextParser.find_int(r"Max possible number of TXDs per queue: (\d+)")
54261d5bc9bSLuca Vizzarro    )
54361d5bc9bSLuca Vizzarro    #: Min possible number of TXDs per queue
54461d5bc9bSLuca Vizzarro    min_queue_txd_num: int = field(
54561d5bc9bSLuca Vizzarro        metadata=TextParser.find_int(r"Min possible number of TXDs per queue: (\d+)")
54661d5bc9bSLuca Vizzarro    )
54761d5bc9bSLuca Vizzarro    #: TXDs number alignment
54861d5bc9bSLuca Vizzarro    txd_alignment_num: int = field(metadata=TextParser.find_int(r"TXDs number alignment: (\d+)"))
54961d5bc9bSLuca Vizzarro    #: Max segment number per packet
55061d5bc9bSLuca Vizzarro    max_packet_segment_num: int = field(
55161d5bc9bSLuca Vizzarro        metadata=TextParser.find_int(r"Max segment number per packet: (\d+)")
55261d5bc9bSLuca Vizzarro    )
55361d5bc9bSLuca Vizzarro    #: Max segment number per MTU/TSO
55461d5bc9bSLuca Vizzarro    max_mtu_segment_num: int = field(
55561d5bc9bSLuca Vizzarro        metadata=TextParser.find_int(r"Max segment number per MTU\/TSO: (\d+)")
55661d5bc9bSLuca Vizzarro    )
55761d5bc9bSLuca Vizzarro
55861d5bc9bSLuca Vizzarro    #:
55961d5bc9bSLuca Vizzarro    device_capabilities: DeviceCapabilitiesFlag = field(
56061d5bc9bSLuca Vizzarro        metadata=DeviceCapabilitiesFlag.make_parser(),
56161d5bc9bSLuca Vizzarro    )
56261d5bc9bSLuca Vizzarro    #:
563618d9140SJuraj Linkeš    device_error_handling_mode: DeviceErrorHandlingMode | None = field(
564618d9140SJuraj Linkeš        default=None, metadata=DeviceErrorHandlingMode.make_parser()
56561d5bc9bSLuca Vizzarro    )
56661d5bc9bSLuca Vizzarro    #:
56761d5bc9bSLuca Vizzarro    device_private_info: str | None = field(
56861d5bc9bSLuca Vizzarro        default=None,
56961d5bc9bSLuca Vizzarro        metadata=make_device_private_info_parser(),
57061d5bc9bSLuca Vizzarro    )
57161d5bc9bSLuca Vizzarro
57261d5bc9bSLuca Vizzarro    #:
57361d5bc9bSLuca Vizzarro    hash_key_size: int | None = field(
57461d5bc9bSLuca Vizzarro        default=None, metadata=TextParser.find_int(r"Hash key size in bytes: (\d+)")
57561d5bc9bSLuca Vizzarro    )
57661d5bc9bSLuca Vizzarro    #:
57761d5bc9bSLuca Vizzarro    redirection_table_size: int | None = field(
57861d5bc9bSLuca Vizzarro        default=None, metadata=TextParser.find_int(r"Redirection table size: (\d+)")
57961d5bc9bSLuca Vizzarro    )
58061d5bc9bSLuca Vizzarro    #:
58161d5bc9bSLuca Vizzarro    supported_rss_offload_flow_types: RSSOffloadTypesFlag = field(
58261d5bc9bSLuca Vizzarro        default=RSSOffloadTypesFlag(0), metadata=RSSOffloadTypesFlag.make_parser()
58361d5bc9bSLuca Vizzarro    )
58461d5bc9bSLuca Vizzarro
58561d5bc9bSLuca Vizzarro    #:
58661d5bc9bSLuca Vizzarro    mac_address: str | None = field(
58761d5bc9bSLuca Vizzarro        default=None, metadata=TextParser.find(r"MAC address: ([A-Fa-f0-9:]+)")
58861d5bc9bSLuca Vizzarro    )
58961d5bc9bSLuca Vizzarro    #:
59061d5bc9bSLuca Vizzarro    fw_version: str | None = field(
59161d5bc9bSLuca Vizzarro        default=None, metadata=TextParser.find(r"Firmware-version: ([^\r\n]+)")
59261d5bc9bSLuca Vizzarro    )
59361d5bc9bSLuca Vizzarro    #:
59461d5bc9bSLuca Vizzarro    dev_args: str | None = field(default=None, metadata=TextParser.find(r"Devargs: ([^\r\n]+)"))
59561d5bc9bSLuca Vizzarro    #: Socket id of the memory allocation
59661d5bc9bSLuca Vizzarro    mem_alloc_socket_id: int | None = field(
59761d5bc9bSLuca Vizzarro        default=None,
59861d5bc9bSLuca Vizzarro        metadata=TextParser.find_int(r"memory allocation on the socket: (\d+)"),
59961d5bc9bSLuca Vizzarro    )
60061d5bc9bSLuca Vizzarro    #:
60161d5bc9bSLuca Vizzarro    mtu: int | None = field(default=None, metadata=TextParser.find_int(r"MTU: (\d+)"))
60261d5bc9bSLuca Vizzarro
60361d5bc9bSLuca Vizzarro    #:
60461d5bc9bSLuca Vizzarro    vlan_offload: VLANOffloadFlag | None = field(
60561d5bc9bSLuca Vizzarro        default=None,
60661d5bc9bSLuca Vizzarro        metadata=VLANOffloadFlag.make_parser(),
60761d5bc9bSLuca Vizzarro    )
60861d5bc9bSLuca Vizzarro
60961d5bc9bSLuca Vizzarro    #: Maximum size of RX buffer
61061d5bc9bSLuca Vizzarro    max_rx_bufsize: int | None = field(
61161d5bc9bSLuca Vizzarro        default=None, metadata=TextParser.find_int(r"Maximum size of RX buffer: (\d+)")
61261d5bc9bSLuca Vizzarro    )
61361d5bc9bSLuca Vizzarro    #: Maximum number of VFs
61461d5bc9bSLuca Vizzarro    max_vfs_num: int | None = field(
61561d5bc9bSLuca Vizzarro        default=None, metadata=TextParser.find_int(r"Maximum number of VFs: (\d+)")
61661d5bc9bSLuca Vizzarro    )
61761d5bc9bSLuca Vizzarro    #: Maximum number of VMDq pools
61861d5bc9bSLuca Vizzarro    max_vmdq_pools_num: int | None = field(
61961d5bc9bSLuca Vizzarro        default=None, metadata=TextParser.find_int(r"Maximum number of VMDq pools: (\d+)")
62061d5bc9bSLuca Vizzarro    )
62161d5bc9bSLuca Vizzarro
62261d5bc9bSLuca Vizzarro    #:
62361d5bc9bSLuca Vizzarro    switch_name: str | None = field(
62461d5bc9bSLuca Vizzarro        default=None, metadata=TextParser.find(r"Switch name: ([\r\n]+)")
62561d5bc9bSLuca Vizzarro    )
62661d5bc9bSLuca Vizzarro    #:
62761d5bc9bSLuca Vizzarro    switch_domain_id: int | None = field(
62861d5bc9bSLuca Vizzarro        default=None, metadata=TextParser.find_int(r"Switch domain Id: (\d+)")
62961d5bc9bSLuca Vizzarro    )
63061d5bc9bSLuca Vizzarro    #:
63161d5bc9bSLuca Vizzarro    switch_port_id: int | None = field(
63261d5bc9bSLuca Vizzarro        default=None, metadata=TextParser.find_int(r"Switch Port Id: (\d+)")
63361d5bc9bSLuca Vizzarro    )
63461d5bc9bSLuca Vizzarro    #:
63561d5bc9bSLuca Vizzarro    switch_rx_domain: int | None = field(
63661d5bc9bSLuca Vizzarro        default=None, metadata=TextParser.find_int(r"Switch Rx domain: (\d+)")
63761d5bc9bSLuca Vizzarro    )
63861d5bc9bSLuca Vizzarro
63961d5bc9bSLuca Vizzarro
64053eacf3dSLuca Vizzarro@dataclass
64153eacf3dSLuca Vizzarroclass TestPmdPortStats(TextParser):
64253eacf3dSLuca Vizzarro    """Port statistics."""
64353eacf3dSLuca Vizzarro
64453eacf3dSLuca Vizzarro    #:
64553eacf3dSLuca Vizzarro    port_id: int = field(metadata=TextParser.find_int(r"NIC statistics for port (\d+)"))
64653eacf3dSLuca Vizzarro
64753eacf3dSLuca Vizzarro    #:
64853eacf3dSLuca Vizzarro    rx_packets: int = field(metadata=TextParser.find_int(r"RX-packets:\s+(\d+)"))
64953eacf3dSLuca Vizzarro    #:
65053eacf3dSLuca Vizzarro    rx_missed: int = field(metadata=TextParser.find_int(r"RX-missed:\s+(\d+)"))
65153eacf3dSLuca Vizzarro    #:
65253eacf3dSLuca Vizzarro    rx_bytes: int = field(metadata=TextParser.find_int(r"RX-bytes:\s+(\d+)"))
65353eacf3dSLuca Vizzarro    #:
65453eacf3dSLuca Vizzarro    rx_errors: int = field(metadata=TextParser.find_int(r"RX-errors:\s+(\d+)"))
65553eacf3dSLuca Vizzarro    #:
65653eacf3dSLuca Vizzarro    rx_nombuf: int = field(metadata=TextParser.find_int(r"RX-nombuf:\s+(\d+)"))
65753eacf3dSLuca Vizzarro
65853eacf3dSLuca Vizzarro    #:
65953eacf3dSLuca Vizzarro    tx_packets: int = field(metadata=TextParser.find_int(r"TX-packets:\s+(\d+)"))
66053eacf3dSLuca Vizzarro    #:
66153eacf3dSLuca Vizzarro    tx_errors: int = field(metadata=TextParser.find_int(r"TX-errors:\s+(\d+)"))
66253eacf3dSLuca Vizzarro    #:
66353eacf3dSLuca Vizzarro    tx_bytes: int = field(metadata=TextParser.find_int(r"TX-bytes:\s+(\d+)"))
66453eacf3dSLuca Vizzarro
66553eacf3dSLuca Vizzarro    #:
66653eacf3dSLuca Vizzarro    rx_pps: int = field(metadata=TextParser.find_int(r"Rx-pps:\s+(\d+)"))
66753eacf3dSLuca Vizzarro    #:
66853eacf3dSLuca Vizzarro    rx_bps: int = field(metadata=TextParser.find_int(r"Rx-bps:\s+(\d+)"))
66953eacf3dSLuca Vizzarro
67053eacf3dSLuca Vizzarro    #:
67153eacf3dSLuca Vizzarro    tx_pps: int = field(metadata=TextParser.find_int(r"Tx-pps:\s+(\d+)"))
67253eacf3dSLuca Vizzarro    #:
67353eacf3dSLuca Vizzarro    tx_bps: int = field(metadata=TextParser.find_int(r"Tx-bps:\s+(\d+)"))
67453eacf3dSLuca Vizzarro
67553eacf3dSLuca Vizzarro
676a91d5f47SJeremy Spewockclass PacketOffloadFlag(Flag):
677a91d5f47SJeremy Spewock    """Flag representing the Packet Offload Features Flags in DPDK.
678a91d5f47SJeremy Spewock
679a91d5f47SJeremy Spewock    Values in this class are taken from the definitions in the RTE MBUF core library in DPDK
680a91d5f47SJeremy Spewock    located in ``lib/mbuf/rte_mbuf_core.h``. It is expected that flag values in this class will
681a91d5f47SJeremy Spewock    match the values they are set to in said DPDK library with one exception; all values must be
682a91d5f47SJeremy Spewock    unique. For example, the definitions for unknown checksum flags in ``rte_mbuf_core.h`` are all
683a91d5f47SJeremy Spewock    set to :data:`0`, but it is valuable to distinguish between them in this framework. For this
684a91d5f47SJeremy Spewock    reason flags that are not unique in the DPDK library are set either to values within the
685a91d5f47SJeremy Spewock    RTE_MBUF_F_FIRST_FREE-RTE_MBUF_F_LAST_FREE range for Rx or shifted 61+ bits for Tx.
686a91d5f47SJeremy Spewock
687a91d5f47SJeremy Spewock    References:
688a91d5f47SJeremy Spewock        DPDK lib: ``lib/mbuf/rte_mbuf_core.h``
689a91d5f47SJeremy Spewock    """
690a91d5f47SJeremy Spewock
691a91d5f47SJeremy Spewock    # RX flags
692a91d5f47SJeremy Spewock
693a91d5f47SJeremy Spewock    #: The RX packet is a 802.1q VLAN packet, and the tci has been saved in mbuf->vlan_tci. If the
694a91d5f47SJeremy Spewock    #: flag RTE_MBUF_F_RX_VLAN_STRIPPED is also present, the VLAN header has been stripped from
695a91d5f47SJeremy Spewock    #: mbuf data, else it is still present.
696a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_VLAN = auto()
697a91d5f47SJeremy Spewock
698a91d5f47SJeremy Spewock    #: RX packet with RSS hash result.
699a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_RSS_HASH = auto()
700a91d5f47SJeremy Spewock
701a91d5f47SJeremy Spewock    #: RX packet with FDIR match indicate.
702a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_FDIR = auto()
703a91d5f47SJeremy Spewock
704a91d5f47SJeremy Spewock    #: This flag is set when the outermost IP header checksum is detected as wrong by the hardware.
705a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_OUTER_IP_CKSUM_BAD = 1 << 5
706a91d5f47SJeremy Spewock
707a91d5f47SJeremy Spewock    #: A vlan has been stripped by the hardware and its tci is saved in mbuf->vlan_tci. This can
708a91d5f47SJeremy Spewock    #: only happen if vlan stripping is enabled in the RX configuration of the PMD. When
709a91d5f47SJeremy Spewock    #: RTE_MBUF_F_RX_VLAN_STRIPPED is set, RTE_MBUF_F_RX_VLAN must also be set.
710a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_VLAN_STRIPPED = auto()
711a91d5f47SJeremy Spewock
712a91d5f47SJeremy Spewock    #: No information about the RX IP checksum. Value is 0 in the DPDK library.
713a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_IP_CKSUM_UNKNOWN = 1 << 23
714a91d5f47SJeremy Spewock    #: The IP checksum in the packet is wrong.
715a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_IP_CKSUM_BAD = 1 << 4
716a91d5f47SJeremy Spewock    #: The IP checksum in the packet is valid.
717a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_IP_CKSUM_GOOD = 1 << 7
718a91d5f47SJeremy Spewock    #: The IP checksum is not correct in the packet data, but the integrity of the IP header is
719a91d5f47SJeremy Spewock    #: verified. Value is RTE_MBUF_F_RX_IP_CKSUM_BAD | RTE_MBUF_F_RX_IP_CKSUM_GOOD in the DPDK
720a91d5f47SJeremy Spewock    #: library.
721a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_IP_CKSUM_NONE = 1 << 24
722a91d5f47SJeremy Spewock
723a91d5f47SJeremy Spewock    #: No information about the RX L4 checksum. Value is 0 in the DPDK library.
724a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_L4_CKSUM_UNKNOWN = 1 << 25
725a91d5f47SJeremy Spewock    #: The L4 checksum in the packet is wrong.
726a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_L4_CKSUM_BAD = 1 << 3
727a91d5f47SJeremy Spewock    #: The L4 checksum in the packet is valid.
728a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_L4_CKSUM_GOOD = 1 << 8
729a91d5f47SJeremy Spewock    #: The L4 checksum is not correct in the packet data, but the integrity of the L4 data is
730a91d5f47SJeremy Spewock    #: verified. Value is RTE_MBUF_F_RX_L4_CKSUM_BAD | RTE_MBUF_F_RX_L4_CKSUM_GOOD in the DPDK
731a91d5f47SJeremy Spewock    #: library.
732a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_L4_CKSUM_NONE = 1 << 26
733a91d5f47SJeremy Spewock
734a91d5f47SJeremy Spewock    #: RX IEEE1588 L2 Ethernet PT Packet.
735a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_IEEE1588_PTP = 1 << 9
736a91d5f47SJeremy Spewock    #: RX IEEE1588 L2/L4 timestamped packet.
737a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_IEEE1588_TMST = 1 << 10
738a91d5f47SJeremy Spewock
739a91d5f47SJeremy Spewock    #: FD id reported if FDIR match.
740a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_FDIR_ID = 1 << 13
741a91d5f47SJeremy Spewock    #: Flexible bytes reported if FDIR match.
742a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_FDIR_FLX = 1 << 14
743a91d5f47SJeremy Spewock
744a91d5f47SJeremy Spewock    #: If both RTE_MBUF_F_RX_QINQ_STRIPPED and RTE_MBUF_F_RX_VLAN_STRIPPED are set, the 2 VLANs
745a91d5f47SJeremy Spewock    #: have been stripped by the hardware. If RTE_MBUF_F_RX_QINQ_STRIPPED is set and
746a91d5f47SJeremy Spewock    #: RTE_MBUF_F_RX_VLAN_STRIPPED is unset, only the outer VLAN is removed from packet data.
747a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_QINQ_STRIPPED = auto()
748a91d5f47SJeremy Spewock
749a91d5f47SJeremy Spewock    #: When packets are coalesced by a hardware or virtual driver, this flag can be set in the RX
750a91d5f47SJeremy Spewock    #: mbuf, meaning that the m->tso_segsz field is valid and is set to the segment size of
751a91d5f47SJeremy Spewock    #: original packets.
752a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_LRO = auto()
753a91d5f47SJeremy Spewock
754a91d5f47SJeremy Spewock    #: Indicate that security offload processing was applied on the RX packet.
755a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_SEC_OFFLOAD = 1 << 18
756a91d5f47SJeremy Spewock    #: Indicate that security offload processing failed on the RX packet.
757a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_SEC_OFFLOAD_FAILED = auto()
758a91d5f47SJeremy Spewock
759a91d5f47SJeremy Spewock    #: The RX packet is a double VLAN. If this flag is set, RTE_MBUF_F_RX_VLAN must also be set. If
760a91d5f47SJeremy Spewock    #: the flag RTE_MBUF_F_RX_QINQ_STRIPPED is also present, both VLANs headers have been stripped
761a91d5f47SJeremy Spewock    #: from mbuf data, else they are still present.
762a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_QINQ = auto()
763a91d5f47SJeremy Spewock
764a91d5f47SJeremy Spewock    #: No info about the outer RX L4 checksum. Value is 0 in the DPDK library.
765a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_OUTER_L4_CKSUM_UNKNOWN = 1 << 27
766a91d5f47SJeremy Spewock    #: The outer L4 checksum in the packet is wrong
767a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_OUTER_L4_CKSUM_BAD = 1 << 21
768a91d5f47SJeremy Spewock    #: The outer L4 checksum in the packet is valid
769a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD = 1 << 22
770a91d5f47SJeremy Spewock    #: Invalid outer L4 checksum state. Value is
771a91d5f47SJeremy Spewock    #: RTE_MBUF_F_RX_OUTER_L4_CKSUM_BAD | RTE_MBUF_F_RX_OUTER_L4_CKSUM_GOOD in the DPDK library.
772a91d5f47SJeremy Spewock    RTE_MBUF_F_RX_OUTER_L4_CKSUM_INVALID = 1 << 28
773a91d5f47SJeremy Spewock
774a91d5f47SJeremy Spewock    # TX flags
775a91d5f47SJeremy Spewock
776a91d5f47SJeremy Spewock    #: Outer UDP checksum offload flag. This flag is used for enabling outer UDP checksum in PMD.
777a91d5f47SJeremy Spewock    #: To use outer UDP checksum, the user either needs to enable the following in mbuf:
778a91d5f47SJeremy Spewock    #:
779a91d5f47SJeremy Spewock    #:  a) Fill outer_l2_len and outer_l3_len in mbuf.
780a91d5f47SJeremy Spewock    #:  b) Set the RTE_MBUF_F_TX_OUTER_UDP_CKSUM flag.
781a91d5f47SJeremy Spewock    #:  c) Set the RTE_MBUF_F_TX_OUTER_IPV4 or RTE_MBUF_F_TX_OUTER_IPV6 flag.
782a91d5f47SJeremy Spewock    #:
783a91d5f47SJeremy Spewock    #: Or configure RTE_ETH_TX_OFFLOAD_OUTER_UDP_CKSUM offload flag.
784a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_OUTER_UDP_CKSUM = 1 << 41
785a91d5f47SJeremy Spewock
786a91d5f47SJeremy Spewock    #: UDP Fragmentation Offload flag. This flag is used for enabling UDP fragmentation in SW or in
787a91d5f47SJeremy Spewock    #: HW.
788a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_UDP_SEG = auto()
789a91d5f47SJeremy Spewock
790a91d5f47SJeremy Spewock    #: Request security offload processing on the TX packet. To use Tx security offload, the user
791a91d5f47SJeremy Spewock    #: needs to fill l2_len in mbuf indicating L2 header size and where L3 header starts.
792a91d5f47SJeremy Spewock    #: Similarly, l3_len should also be filled along with ol_flags reflecting current L3 type.
793a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_SEC_OFFLOAD = auto()
794a91d5f47SJeremy Spewock
795a91d5f47SJeremy Spewock    #: Offload the MACsec. This flag must be set by the application to enable this offload feature
796a91d5f47SJeremy Spewock    #: for a packet to be transmitted.
797a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_MACSEC = auto()
798a91d5f47SJeremy Spewock
799a91d5f47SJeremy Spewock    # Bits 45:48 are used for the tunnel type in ``lib/mbuf/rte_mbuf_core.h``, but some are modified
800a91d5f47SJeremy Spewock    # in this Flag to maintain uniqueness. The tunnel type must be specified for TSO or checksum on
801a91d5f47SJeremy Spewock    # the inner part of tunnel packets. These flags can be used with RTE_MBUF_F_TX_TCP_SEG for TSO,
802a91d5f47SJeremy Spewock    # or RTE_MBUF_F_TX_xxx_CKSUM. The mbuf fields for inner and outer header lengths are required:
803a91d5f47SJeremy Spewock    # outer_l2_len, outer_l3_len, l2_len, l3_len, l4_len and tso_segsz for TSO.
804a91d5f47SJeremy Spewock
805a91d5f47SJeremy Spewock    #:
806a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TUNNEL_VXLAN = 1 << 45
807a91d5f47SJeremy Spewock    #:
808a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TUNNEL_GRE = 1 << 46
809a91d5f47SJeremy Spewock    #: Value is 3 << 45 in the DPDK library.
810a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TUNNEL_IPIP = 1 << 61
811a91d5f47SJeremy Spewock    #:
812a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TUNNEL_GENEVE = 1 << 47
813a91d5f47SJeremy Spewock    #: TX packet with MPLS-in-UDP RFC 7510 header. Value is 5 << 45 in the DPDK library.
814a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TUNNEL_MPLSINUDP = 1 << 62
815a91d5f47SJeremy Spewock    #: Value is 6 << 45 in the DPDK library.
816a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TUNNEL_VXLAN_GPE = 1 << 63
817a91d5f47SJeremy Spewock    #: Value is 7 << 45 in the DPDK library.
818a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TUNNEL_GTP = 1 << 64
819a91d5f47SJeremy Spewock    #:
820a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TUNNEL_ESP = 1 << 48
821a91d5f47SJeremy Spewock    #: Generic IP encapsulated tunnel type, used for TSO and checksum offload. This can be used for
822a91d5f47SJeremy Spewock    #: tunnels which are not standards or listed above. It is preferred to use specific tunnel
823a91d5f47SJeremy Spewock    #: flags like RTE_MBUF_F_TX_TUNNEL_GRE or RTE_MBUF_F_TX_TUNNEL_IPIP if possible. The ethdev
824a91d5f47SJeremy Spewock    #: must be configured with RTE_ETH_TX_OFFLOAD_IP_TNL_TSO.  Outer and inner checksums are done
825a91d5f47SJeremy Spewock    #: according to the existing flags like RTE_MBUF_F_TX_xxx_CKSUM. Specific tunnel headers that
826a91d5f47SJeremy Spewock    #: contain payload length, sequence id or checksum are not expected to be updated. Value is
827a91d5f47SJeremy Spewock    #: 0xD << 45 in the DPDK library.
828a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TUNNEL_IP = 1 << 65
829a91d5f47SJeremy Spewock    #: Generic UDP encapsulated tunnel type, used for TSO and checksum offload. UDP tunnel type
830a91d5f47SJeremy Spewock    #: implies outer IP layer. It can be used for tunnels which are not standards or listed above.
831a91d5f47SJeremy Spewock    #: It is preferred to use specific tunnel flags like RTE_MBUF_F_TX_TUNNEL_VXLAN if possible.
832a91d5f47SJeremy Spewock    #: The ethdev must be configured with RTE_ETH_TX_OFFLOAD_UDP_TNL_TSO. Outer and inner checksums
833a91d5f47SJeremy Spewock    #: are done according to the existing flags like RTE_MBUF_F_TX_xxx_CKSUM. Specific tunnel
834a91d5f47SJeremy Spewock    #: headers that contain payload length, sequence id or checksum are not expected to be updated.
835a91d5f47SJeremy Spewock    #: value is 0xE << 45 in the DPDK library.
836a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TUNNEL_UDP = 1 << 66
837a91d5f47SJeremy Spewock
838a91d5f47SJeremy Spewock    #: Double VLAN insertion (QinQ) request to driver, driver may offload the insertion based on
839a91d5f47SJeremy Spewock    #: device capability. Mbuf 'vlan_tci' & 'vlan_tci_outer' must be valid when this flag is set.
840a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_QINQ = 1 << 49
841a91d5f47SJeremy Spewock
842a91d5f47SJeremy Spewock    #: TCP segmentation offload. To enable this offload feature for a packet to be transmitted on
843a91d5f47SJeremy Spewock    #: hardware supporting TSO:
844a91d5f47SJeremy Spewock    #:
845a91d5f47SJeremy Spewock    #:  - set the RTE_MBUF_F_TX_TCP_SEG flag in mbuf->ol_flags (this flag implies
846a91d5f47SJeremy Spewock    #:      RTE_MBUF_F_TX_TCP_CKSUM)
847a91d5f47SJeremy Spewock    #:  - set the flag RTE_MBUF_F_TX_IPV4 or RTE_MBUF_F_TX_IPV6
848a91d5f47SJeremy Spewock    #:      * if it's IPv4, set the RTE_MBUF_F_TX_IP_CKSUM flag
849a91d5f47SJeremy Spewock    #:  - fill the mbuf offload information: l2_len, l3_len, l4_len, tso_segsz
850a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TCP_SEG = auto()
851a91d5f47SJeremy Spewock
852a91d5f47SJeremy Spewock    #: TX IEEE1588 packet to timestamp.
853a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_IEEE1588_TMST = auto()
854a91d5f47SJeremy Spewock
855a91d5f47SJeremy Spewock    # Bits 52+53 used for L4 packet type with checksum enabled in ``lib/mbuf/rte_mbuf_core.h`` but
856a91d5f47SJeremy Spewock    # some values must be modified in this framework to maintain uniqueness. To use hardware
857a91d5f47SJeremy Spewock    # L4 checksum offload, the user needs to:
858a91d5f47SJeremy Spewock    #
859a91d5f47SJeremy Spewock    # - fill l2_len and l3_len in mbuf
860a91d5f47SJeremy Spewock    # - set the flags RTE_MBUF_F_TX_TCP_CKSUM, RTE_MBUF_F_TX_SCTP_CKSUM or
861a91d5f47SJeremy Spewock    #   RTE_MBUF_F_TX_UDP_CKSUM
862a91d5f47SJeremy Spewock    # - set the flag RTE_MBUF_F_TX_IPV4 or RTE_MBUF_F_TX_IPV6
863a91d5f47SJeremy Spewock
864a91d5f47SJeremy Spewock    #: Disable L4 cksum of TX pkt. Value is 0 in the DPDK library.
865a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_L4_NO_CKSUM = 1 << 67
866a91d5f47SJeremy Spewock    #: TCP cksum of TX pkt. Computed by NIC.
867a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_TCP_CKSUM = 1 << 52
868a91d5f47SJeremy Spewock    #: SCTP cksum of TX pkt. Computed by NIC.
869a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_SCTP_CKSUM = 1 << 53
870a91d5f47SJeremy Spewock    #: UDP cksum of TX pkt. Computed by NIC. Value is 3 << 52 in the DPDK library.
871a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_UDP_CKSUM = 1 << 68
872a91d5f47SJeremy Spewock
873a91d5f47SJeremy Spewock    #: Offload the IP checksum in the hardware. The flag RTE_MBUF_F_TX_IPV4 should also be set by
874a91d5f47SJeremy Spewock    #: the application, although a PMD will only check RTE_MBUF_F_TX_IP_CKSUM.
875a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_IP_CKSUM = 1 << 54
876a91d5f47SJeremy Spewock
877a91d5f47SJeremy Spewock    #: Packet is IPv4. This flag must be set when using any offload feature (TSO, L3 or L4
878a91d5f47SJeremy Spewock    #: checksum) to tell the NIC that the packet is an IPv4 packet. If the packet is a tunneled
879a91d5f47SJeremy Spewock    #: packet, this flag is related to the inner headers.
880a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_IPV4 = auto()
881a91d5f47SJeremy Spewock    #: Packet is IPv6. This flag must be set when using an offload feature (TSO or L4 checksum) to
882a91d5f47SJeremy Spewock    #: tell the NIC that the packet is an IPv6 packet. If the packet is a tunneled packet, this
883a91d5f47SJeremy Spewock    #: flag is related to the inner headers.
884a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_IPV6 = auto()
885a91d5f47SJeremy Spewock    #: VLAN tag insertion request to driver, driver may offload the insertion based on the device
886a91d5f47SJeremy Spewock    #: capability. mbuf 'vlan_tci' field must be valid when this flag is set.
887a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_VLAN = auto()
888a91d5f47SJeremy Spewock
889a91d5f47SJeremy Spewock    #: Offload the IP checksum of an external header in the hardware. The flag
890a91d5f47SJeremy Spewock    #: RTE_MBUF_F_TX_OUTER_IPV4 should also be set by the application, although a PMD will only
891a91d5f47SJeremy Spewock    #: check RTE_MBUF_F_TX_OUTER_IP_CKSUM.
892a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_OUTER_IP_CKSUM = auto()
893a91d5f47SJeremy Spewock    #: Packet outer header is IPv4. This flag must be set when using any outer offload feature (L3
894a91d5f47SJeremy Spewock    #: or L4 checksum) to tell the NIC that the outer header of the tunneled packet is an IPv4
895a91d5f47SJeremy Spewock    #: packet.
896a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_OUTER_IPV4 = auto()
897a91d5f47SJeremy Spewock    #: Packet outer header is IPv6. This flag must be set when using any outer offload feature (L4
898a91d5f47SJeremy Spewock    #: checksum) to tell the NIC that the outer header of the tunneled packet is an IPv6 packet.
899a91d5f47SJeremy Spewock    RTE_MBUF_F_TX_OUTER_IPV6 = auto()
900a91d5f47SJeremy Spewock
901a91d5f47SJeremy Spewock    @classmethod
902a91d5f47SJeremy Spewock    def from_list_string(cls, names: str) -> Self:
903a91d5f47SJeremy Spewock        """Makes a flag from a whitespace-separated list of names.
904a91d5f47SJeremy Spewock
905a91d5f47SJeremy Spewock        Args:
906a91d5f47SJeremy Spewock            names: a whitespace-separated list containing the members of this flag.
907a91d5f47SJeremy Spewock
908a91d5f47SJeremy Spewock        Returns:
909a91d5f47SJeremy Spewock            An instance of this flag.
910a91d5f47SJeremy Spewock        """
911a91d5f47SJeremy Spewock        flag = cls(0)
912a91d5f47SJeremy Spewock        for name in names.split():
913a91d5f47SJeremy Spewock            flag |= cls.from_str(name)
914a91d5f47SJeremy Spewock        return flag
915a91d5f47SJeremy Spewock
916a91d5f47SJeremy Spewock    @classmethod
917a91d5f47SJeremy Spewock    def from_str(cls, name: str) -> Self:
918a91d5f47SJeremy Spewock        """Makes a flag matching the supplied name.
919a91d5f47SJeremy Spewock
920a91d5f47SJeremy Spewock        Args:
921a91d5f47SJeremy Spewock            name: a valid member of this flag in text
922a91d5f47SJeremy Spewock        Returns:
923a91d5f47SJeremy Spewock            An instance of this flag.
924a91d5f47SJeremy Spewock        """
925a91d5f47SJeremy Spewock        member_name = name.strip().replace("-", "_")
926a91d5f47SJeremy Spewock        return cls[member_name]
927a91d5f47SJeremy Spewock
928a91d5f47SJeremy Spewock    @classmethod
929a91d5f47SJeremy Spewock    def make_parser(cls) -> ParserFn:
930a91d5f47SJeremy Spewock        """Makes a parser function.
931a91d5f47SJeremy Spewock
932a91d5f47SJeremy Spewock        Returns:
933a91d5f47SJeremy Spewock            ParserFn: A dictionary for the `dataclasses.field` metadata argument containing a
934a91d5f47SJeremy Spewock                parser function that makes an instance of this flag from text.
935a91d5f47SJeremy Spewock        """
936a91d5f47SJeremy Spewock        return TextParser.wrap(
937a91d5f47SJeremy Spewock            TextParser.find(r"ol_flags: ([^\n]+)"),
938a91d5f47SJeremy Spewock            cls.from_list_string,
939a91d5f47SJeremy Spewock        )
940a91d5f47SJeremy Spewock
941a91d5f47SJeremy Spewock
942a91d5f47SJeremy Spewockclass RtePTypes(Flag):
943a91d5f47SJeremy Spewock    """Flag representing possible packet types in DPDK verbose output.
944a91d5f47SJeremy Spewock
945a91d5f47SJeremy Spewock    Values in this class are derived from definitions in the RTE MBUF ptype library in DPDK located
946a91d5f47SJeremy Spewock    in ``lib/mbuf/rte_mbuf_ptype.h``. Specifically, the names of values in this class should match
947a91d5f47SJeremy Spewock    the possible return options from the functions ``rte_get_ptype_*_name`` in ``rte_mbuf_ptype.c``.
948a91d5f47SJeremy Spewock
949a91d5f47SJeremy Spewock    References:
950a91d5f47SJeremy Spewock        DPDK lib: ``lib/mbuf/rte_mbuf_ptype.h``
951a91d5f47SJeremy Spewock        DPDK ptype name formatting functions: ``lib/mbuf/rte_mbuf_ptype.c:rte_get_ptype_*_name()``
952a91d5f47SJeremy Spewock    """
953a91d5f47SJeremy Spewock
954a91d5f47SJeremy Spewock    # L2
955a91d5f47SJeremy Spewock    #: Ethernet packet type. This is used for outer packet for tunneling cases.
956a91d5f47SJeremy Spewock    L2_ETHER = auto()
957a91d5f47SJeremy Spewock    #: Ethernet packet type for time sync.
958a91d5f47SJeremy Spewock    L2_ETHER_TIMESYNC = auto()
959a91d5f47SJeremy Spewock    #: ARP (Address Resolution Protocol) packet type.
960a91d5f47SJeremy Spewock    L2_ETHER_ARP = auto()
961a91d5f47SJeremy Spewock    #: LLDP (Link Layer Discovery Protocol) packet type.
962a91d5f47SJeremy Spewock    L2_ETHER_LLDP = auto()
963a91d5f47SJeremy Spewock    #: NSH (Network Service Header) packet type.
964a91d5f47SJeremy Spewock    L2_ETHER_NSH = auto()
965a91d5f47SJeremy Spewock    #: VLAN packet type.
966a91d5f47SJeremy Spewock    L2_ETHER_VLAN = auto()
967a91d5f47SJeremy Spewock    #: QinQ packet type.
968a91d5f47SJeremy Spewock    L2_ETHER_QINQ = auto()
969a91d5f47SJeremy Spewock    #: PPPOE packet type.
970a91d5f47SJeremy Spewock    L2_ETHER_PPPOE = auto()
971a91d5f47SJeremy Spewock    #: FCoE packet type..
972a91d5f47SJeremy Spewock    L2_ETHER_FCOE = auto()
973a91d5f47SJeremy Spewock    #: MPLS packet type.
974a91d5f47SJeremy Spewock    L2_ETHER_MPLS = auto()
975a91d5f47SJeremy Spewock    #: No L2 packet information.
976a91d5f47SJeremy Spewock    L2_UNKNOWN = auto()
977a91d5f47SJeremy Spewock
978a91d5f47SJeremy Spewock    # L3
979a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 4 packet type. This is used for outer packet for tunneling
980a91d5f47SJeremy Spewock    #: cases, and does not contain any header option.
981a91d5f47SJeremy Spewock    L3_IPV4 = auto()
982a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 4 packet type. This is used for outer packet for tunneling
983a91d5f47SJeremy Spewock    #: cases, and contains header options.
984a91d5f47SJeremy Spewock    L3_IPV4_EXT = auto()
985a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 6 packet type. This is used for outer packet for tunneling
986a91d5f47SJeremy Spewock    #: cases, and does not contain any extension header.
987a91d5f47SJeremy Spewock    L3_IPV6 = auto()
988a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 4 packet type. This is used for outer packet for tunneling
989a91d5f47SJeremy Spewock    #: cases, and may or maynot contain header options.
990a91d5f47SJeremy Spewock    L3_IPV4_EXT_UNKNOWN = auto()
991a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 6 packet type. This is used for outer packet for tunneling
992a91d5f47SJeremy Spewock    #: cases, and contains extension headers.
993a91d5f47SJeremy Spewock    L3_IPV6_EXT = auto()
994a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 6 packet type. This is used for outer packet for tunneling
995a91d5f47SJeremy Spewock    #: cases, and may or maynot contain extension headers.
996a91d5f47SJeremy Spewock    L3_IPV6_EXT_UNKNOWN = auto()
997a91d5f47SJeremy Spewock    #: No L3 packet information.
998a91d5f47SJeremy Spewock    L3_UNKNOWN = auto()
999a91d5f47SJeremy Spewock
1000a91d5f47SJeremy Spewock    # L4
1001a91d5f47SJeremy Spewock    #: TCP (Transmission Control Protocol) packet type. This is used for outer packet for tunneling
1002a91d5f47SJeremy Spewock    #: cases.
1003a91d5f47SJeremy Spewock    L4_TCP = auto()
1004a91d5f47SJeremy Spewock    #: UDP (User Datagram Protocol) packet type. This is used for outer packet for tunneling cases.
1005a91d5f47SJeremy Spewock    L4_UDP = auto()
1006a91d5f47SJeremy Spewock    #: Fragmented IP (Internet Protocol) packet type. This is used for outer packet for tunneling
1007a91d5f47SJeremy Spewock    #: cases and refers to those packets of any IP types which can be recognized as fragmented. A
1008a91d5f47SJeremy Spewock    #: fragmented packet cannot be recognized as any other L4 types (RTE_PTYPE_L4_TCP,
1009a91d5f47SJeremy Spewock    #: RTE_PTYPE_L4_UDP, RTE_PTYPE_L4_SCTP, RTE_PTYPE_L4_ICMP, RTE_PTYPE_L4_NONFRAG).
1010a91d5f47SJeremy Spewock    L4_FRAG = auto()
1011a91d5f47SJeremy Spewock    #: SCTP (Stream Control Transmission Protocol) packet type. This is used for outer packet for
1012a91d5f47SJeremy Spewock    #: tunneling cases.
1013a91d5f47SJeremy Spewock    L4_SCTP = auto()
1014a91d5f47SJeremy Spewock    #: ICMP (Internet Control Message Protocol) packet type. This is used for outer packet for
1015a91d5f47SJeremy Spewock    #: tunneling cases.
1016a91d5f47SJeremy Spewock    L4_ICMP = auto()
1017a91d5f47SJeremy Spewock    #: Non-fragmented IP (Internet Protocol) packet type. This is used for outer packet for
1018a91d5f47SJeremy Spewock    #: tunneling cases and refers to those packets of any IP types, that cannot be recognized as
1019a91d5f47SJeremy Spewock    #: any of the above L4 types (RTE_PTYPE_L4_TCP, RTE_PTYPE_L4_UDP, RTE_PTYPE_L4_FRAG,
1020a91d5f47SJeremy Spewock    #: RTE_PTYPE_L4_SCTP, RTE_PTYPE_L4_ICMP).
1021a91d5f47SJeremy Spewock    L4_NONFRAG = auto()
1022a91d5f47SJeremy Spewock    #: IGMP (Internet Group Management Protocol) packet type.
1023a91d5f47SJeremy Spewock    L4_IGMP = auto()
1024a91d5f47SJeremy Spewock    #: No L4 packet information.
1025a91d5f47SJeremy Spewock    L4_UNKNOWN = auto()
1026a91d5f47SJeremy Spewock
1027a91d5f47SJeremy Spewock    # Tunnel
1028a91d5f47SJeremy Spewock    #: IP (Internet Protocol) in IP (Internet Protocol) tunneling packet type.
1029a91d5f47SJeremy Spewock    TUNNEL_IP = auto()
1030a91d5f47SJeremy Spewock    #: GRE (Generic Routing Encapsulation) tunneling packet type.
1031a91d5f47SJeremy Spewock    TUNNEL_GRE = auto()
1032a91d5f47SJeremy Spewock    #: VXLAN (Virtual eXtensible Local Area Network) tunneling packet type.
1033a91d5f47SJeremy Spewock    TUNNEL_VXLAN = auto()
1034a91d5f47SJeremy Spewock    #: NVGRE (Network Virtualization using Generic Routing Encapsulation) tunneling packet type.
1035a91d5f47SJeremy Spewock    TUNNEL_NVGRE = auto()
1036a91d5f47SJeremy Spewock    #: GENEVE (Generic Network Virtualization Encapsulation) tunneling packet type.
1037a91d5f47SJeremy Spewock    TUNNEL_GENEVE = auto()
1038a91d5f47SJeremy Spewock    #: Tunneling packet type of Teredo, VXLAN (Virtual eXtensible Local Area Network) or GRE
1039a91d5f47SJeremy Spewock    #: (Generic Routing Encapsulation) could be recognized as this packet type, if they can not be
1040a91d5f47SJeremy Spewock    #: recognized independently as of hardware capability.
1041a91d5f47SJeremy Spewock    TUNNEL_GRENAT = auto()
1042a91d5f47SJeremy Spewock    #: GTP-C (GPRS Tunnelling Protocol) control tunneling packet type.
1043a91d5f47SJeremy Spewock    TUNNEL_GTPC = auto()
1044a91d5f47SJeremy Spewock    #: GTP-U (GPRS Tunnelling Protocol) user data tunneling packet type.
1045a91d5f47SJeremy Spewock    TUNNEL_GTPU = auto()
1046a91d5f47SJeremy Spewock    #: ESP (IP Encapsulating Security Payload) tunneling packet type.
1047a91d5f47SJeremy Spewock    TUNNEL_ESP = auto()
1048a91d5f47SJeremy Spewock    #: L2TP (Layer 2 Tunneling Protocol) tunneling packet type.
1049a91d5f47SJeremy Spewock    TUNNEL_L2TP = auto()
1050a91d5f47SJeremy Spewock    #: VXLAN-GPE (VXLAN Generic Protocol Extension) tunneling packet type.
1051a91d5f47SJeremy Spewock    TUNNEL_VXLAN_GPE = auto()
1052a91d5f47SJeremy Spewock    #: MPLS-in-UDP tunneling packet type (RFC 7510).
1053a91d5f47SJeremy Spewock    TUNNEL_MPLS_IN_UDP = auto()
1054a91d5f47SJeremy Spewock    #: MPLS-in-GRE tunneling packet type (RFC 4023).
1055a91d5f47SJeremy Spewock    TUNNEL_MPLS_IN_GRE = auto()
1056a91d5f47SJeremy Spewock    #: No tunnel information found on the packet.
1057a91d5f47SJeremy Spewock    TUNNEL_UNKNOWN = auto()
1058a91d5f47SJeremy Spewock
1059a91d5f47SJeremy Spewock    # Inner L2
1060a91d5f47SJeremy Spewock    #: Ethernet packet type. This is used for inner packet type only.
1061a91d5f47SJeremy Spewock    INNER_L2_ETHER = auto()
1062a91d5f47SJeremy Spewock    #: Ethernet packet type with VLAN (Virtual Local Area Network) tag.
1063a91d5f47SJeremy Spewock    INNER_L2_ETHER_VLAN = auto()
1064a91d5f47SJeremy Spewock    #: QinQ packet type.
1065a91d5f47SJeremy Spewock    INNER_L2_ETHER_QINQ = auto()
1066a91d5f47SJeremy Spewock    #: No inner L2 information found on the packet.
1067a91d5f47SJeremy Spewock    INNER_L2_UNKNOWN = auto()
1068a91d5f47SJeremy Spewock
1069a91d5f47SJeremy Spewock    # Inner L3
1070a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 4 packet type. This is used for inner packet only, and does
1071a91d5f47SJeremy Spewock    #: not contain any header option.
1072a91d5f47SJeremy Spewock    INNER_L3_IPV4 = auto()
1073a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 4 packet type. This is used for inner packet only, and
1074a91d5f47SJeremy Spewock    #: contains header options.
1075a91d5f47SJeremy Spewock    INNER_L3_IPV4_EXT = auto()
1076a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 6 packet type. This is used for inner packet only, and does
1077a91d5f47SJeremy Spewock    #: not contain any extension header.
1078a91d5f47SJeremy Spewock    INNER_L3_IPV6 = auto()
1079a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 4 packet type. This is used for inner packet only, and may or
1080a91d5f47SJeremy Spewock    #: may not contain header options.
1081a91d5f47SJeremy Spewock    INNER_L3_IPV4_EXT_UNKNOWN = auto()
1082a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 6 packet type. This is used for inner packet only, and
1083a91d5f47SJeremy Spewock    #: contains extension headers.
1084a91d5f47SJeremy Spewock    INNER_L3_IPV6_EXT = auto()
1085a91d5f47SJeremy Spewock    #: IP (Internet Protocol) version 6 packet type. This is used for inner packet only, and may or
1086a91d5f47SJeremy Spewock    #: may not contain extension headers.
1087a91d5f47SJeremy Spewock    INNER_L3_IPV6_EXT_UNKNOWN = auto()
1088a91d5f47SJeremy Spewock    #: No inner L3 information found on the packet.
1089a91d5f47SJeremy Spewock    INNER_L3_UNKNOWN = auto()
1090a91d5f47SJeremy Spewock
1091a91d5f47SJeremy Spewock    # Inner L4
1092a91d5f47SJeremy Spewock    #: TCP (Transmission Control Protocol) packet type. This is used for inner packet only.
1093a91d5f47SJeremy Spewock    INNER_L4_TCP = auto()
1094a91d5f47SJeremy Spewock    #: UDP (User Datagram Protocol) packet type. This is used for inner packet only.
1095a91d5f47SJeremy Spewock    INNER_L4_UDP = auto()
1096a91d5f47SJeremy Spewock    #: Fragmented IP (Internet Protocol) packet type. This is used for inner packet only, and may
1097a91d5f47SJeremy Spewock    #: or maynot have a layer 4 packet.
1098a91d5f47SJeremy Spewock    INNER_L4_FRAG = auto()
1099a91d5f47SJeremy Spewock    #: SCTP (Stream Control Transmission Protocol) packet type. This is used for inner packet only.
1100a91d5f47SJeremy Spewock    INNER_L4_SCTP = auto()
1101a91d5f47SJeremy Spewock    #: ICMP (Internet Control Message Protocol) packet type. This is used for inner packet only.
1102a91d5f47SJeremy Spewock    INNER_L4_ICMP = auto()
1103a91d5f47SJeremy Spewock    #: Non-fragmented IP (Internet Protocol) packet type. It is used for inner packet only, and may
1104a91d5f47SJeremy Spewock    #: or may not have other unknown layer 4 packet types.
1105a91d5f47SJeremy Spewock    INNER_L4_NONFRAG = auto()
1106a91d5f47SJeremy Spewock    #: No inner L4 information found on the packet.
1107a91d5f47SJeremy Spewock    INNER_L4_UNKNOWN = auto()
1108a91d5f47SJeremy Spewock
1109a91d5f47SJeremy Spewock    @classmethod
1110a91d5f47SJeremy Spewock    def from_list_string(cls, names: str) -> Self:
1111a91d5f47SJeremy Spewock        """Makes a flag from a whitespace-separated list of names.
1112a91d5f47SJeremy Spewock
1113a91d5f47SJeremy Spewock        Args:
1114a91d5f47SJeremy Spewock            names: a whitespace-separated list containing the members of this flag.
1115a91d5f47SJeremy Spewock
1116a91d5f47SJeremy Spewock        Returns:
1117a91d5f47SJeremy Spewock            An instance of this flag.
1118a91d5f47SJeremy Spewock        """
1119a91d5f47SJeremy Spewock        flag = cls(0)
1120a91d5f47SJeremy Spewock        for name in names.split():
1121a91d5f47SJeremy Spewock            flag |= cls.from_str(name)
1122a91d5f47SJeremy Spewock        return flag
1123a91d5f47SJeremy Spewock
1124a91d5f47SJeremy Spewock    @classmethod
1125a91d5f47SJeremy Spewock    def from_str(cls, name: str) -> Self:
1126a91d5f47SJeremy Spewock        """Makes a flag matching the supplied name.
1127a91d5f47SJeremy Spewock
1128a91d5f47SJeremy Spewock        Args:
1129a91d5f47SJeremy Spewock            name: a valid member of this flag in text
1130a91d5f47SJeremy Spewock        Returns:
1131a91d5f47SJeremy Spewock            An instance of this flag.
1132a91d5f47SJeremy Spewock        """
1133a91d5f47SJeremy Spewock        member_name = name.strip().replace("-", "_")
1134a91d5f47SJeremy Spewock        return cls[member_name]
1135a91d5f47SJeremy Spewock
1136a91d5f47SJeremy Spewock    @classmethod
1137a91d5f47SJeremy Spewock    def make_parser(cls, hw: bool) -> ParserFn:
1138a91d5f47SJeremy Spewock        """Makes a parser function.
1139a91d5f47SJeremy Spewock
1140a91d5f47SJeremy Spewock        Args:
1141a91d5f47SJeremy Spewock            hw: Whether to make a parser for hardware ptypes or software ptypes. If :data:`True`,
1142a91d5f47SJeremy Spewock                hardware ptypes will be collected, otherwise software pytpes will.
1143a91d5f47SJeremy Spewock
1144a91d5f47SJeremy Spewock        Returns:
1145a91d5f47SJeremy Spewock            ParserFn: A dictionary for the `dataclasses.field` metadata argument containing a
1146a91d5f47SJeremy Spewock                parser function that makes an instance of this flag from text.
1147a91d5f47SJeremy Spewock        """
1148a91d5f47SJeremy Spewock        return TextParser.wrap(
1149a91d5f47SJeremy Spewock            TextParser.find(f"{'hw' if hw else 'sw'} ptype: ([^-]+)"),
1150a91d5f47SJeremy Spewock            cls.from_list_string,
1151a91d5f47SJeremy Spewock        )
1152a91d5f47SJeremy Spewock
1153a91d5f47SJeremy Spewock
1154a91d5f47SJeremy Spewock@dataclass
1155a91d5f47SJeremy Spewockclass TestPmdVerbosePacket(TextParser):
1156a91d5f47SJeremy Spewock    """Packet information provided by verbose output in Testpmd.
1157a91d5f47SJeremy Spewock
1158a91d5f47SJeremy Spewock    This dataclass expects that packet information be prepended with the starting line of packet
1159a91d5f47SJeremy Spewock    bursts. Specifically, the line that reads "port X/queue Y: sent/received Z packets".
1160a91d5f47SJeremy Spewock    """
1161a91d5f47SJeremy Spewock
1162a91d5f47SJeremy Spewock    #: ID of the port that handled the packet.
1163a91d5f47SJeremy Spewock    port_id: int = field(metadata=TextParser.find_int(r"port (\d+)/queue \d+"))
1164a91d5f47SJeremy Spewock    #: ID of the queue that handled the packet.
1165a91d5f47SJeremy Spewock    queue_id: int = field(metadata=TextParser.find_int(r"port \d+/queue (\d+)"))
1166a91d5f47SJeremy Spewock    #: Whether the packet was received or sent by the queue/port.
1167a91d5f47SJeremy Spewock    was_received: bool = field(metadata=TextParser.find(r"received \d+ packets"))
1168a91d5f47SJeremy Spewock    #:
1169a91d5f47SJeremy Spewock    src_mac: str = field(metadata=TextParser.find(f"src=({REGEX_FOR_MAC_ADDRESS})"))
1170a91d5f47SJeremy Spewock    #:
1171a91d5f47SJeremy Spewock    dst_mac: str = field(metadata=TextParser.find(f"dst=({REGEX_FOR_MAC_ADDRESS})"))
1172a91d5f47SJeremy Spewock    #: Memory pool the packet was handled on.
1173a91d5f47SJeremy Spewock    pool: str = field(metadata=TextParser.find(r"pool=(\S+)"))
1174a91d5f47SJeremy Spewock    #: Packet type in hex.
1175a91d5f47SJeremy Spewock    p_type: int = field(metadata=TextParser.find_int(r"type=(0x[a-fA-F\d]+)"))
1176a91d5f47SJeremy Spewock    #:
1177a91d5f47SJeremy Spewock    length: int = field(metadata=TextParser.find_int(r"length=(\d+)"))
1178a91d5f47SJeremy Spewock    #: Number of segments in the packet.
1179a91d5f47SJeremy Spewock    nb_segs: int = field(metadata=TextParser.find_int(r"nb_segs=(\d+)"))
1180a91d5f47SJeremy Spewock    #: Hardware packet type.
1181a91d5f47SJeremy Spewock    hw_ptype: RtePTypes = field(metadata=RtePTypes.make_parser(hw=True))
1182a91d5f47SJeremy Spewock    #: Software packet type.
1183a91d5f47SJeremy Spewock    sw_ptype: RtePTypes = field(metadata=RtePTypes.make_parser(hw=False))
1184a91d5f47SJeremy Spewock    #:
1185a91d5f47SJeremy Spewock    l2_len: int = field(metadata=TextParser.find_int(r"l2_len=(\d+)"))
1186a91d5f47SJeremy Spewock    #:
1187a91d5f47SJeremy Spewock    ol_flags: PacketOffloadFlag = field(metadata=PacketOffloadFlag.make_parser())
1188a91d5f47SJeremy Spewock    #: RSS hash of the packet in hex.
1189a91d5f47SJeremy Spewock    rss_hash: int | None = field(
1190a91d5f47SJeremy Spewock        default=None, metadata=TextParser.find_int(r"RSS hash=(0x[a-fA-F\d]+)")
1191a91d5f47SJeremy Spewock    )
1192a91d5f47SJeremy Spewock    #: RSS queue that handled the packet in hex.
1193a91d5f47SJeremy Spewock    rss_queue: int | None = field(
1194a91d5f47SJeremy Spewock        default=None, metadata=TextParser.find_int(r"RSS queue=(0x[a-fA-F\d]+)")
1195a91d5f47SJeremy Spewock    )
1196a91d5f47SJeremy Spewock    #:
1197a91d5f47SJeremy Spewock    l3_len: int | None = field(default=None, metadata=TextParser.find_int(r"l3_len=(\d+)"))
1198a91d5f47SJeremy Spewock    #:
1199a91d5f47SJeremy Spewock    l4_len: int | None = field(default=None, metadata=TextParser.find_int(r"l4_len=(\d+)"))
1200a91d5f47SJeremy Spewock
1201a91d5f47SJeremy Spewock
1202a79884f9SJuraj Linkešclass RxOffloadCapability(Flag):
1203a79884f9SJuraj Linkeš    """Rx offload capabilities of a device.
1204a79884f9SJuraj Linkeš
1205a79884f9SJuraj Linkeš    The flags are taken from ``lib/ethdev/rte_ethdev.h``.
1206a79884f9SJuraj Linkeš    They're prefixed with ``RTE_ETH_RX_OFFLOAD`` in ``lib/ethdev/rte_ethdev.h``
1207a79884f9SJuraj Linkeš    instead of ``RX_OFFLOAD``, which is what testpmd changes the prefix to.
1208a79884f9SJuraj Linkeš    The values are not contiguous, so the correspondence is preserved
1209a79884f9SJuraj Linkeš    by specifying concrete values interspersed between auto() values.
1210a79884f9SJuraj Linkeš
1211a79884f9SJuraj Linkeš    The ``RX_OFFLOAD`` prefix has been preserved so that the same flag names can be used
1212a79884f9SJuraj Linkeš    in :class:`NicCapability`. The prefix is needed in :class:`NicCapability` since there's
1213a79884f9SJuraj Linkeš    no other qualifier which would sufficiently distinguish it from other capabilities.
1214a79884f9SJuraj Linkeš
1215a79884f9SJuraj Linkeš    References:
1216a79884f9SJuraj Linkeš        DPDK lib: ``lib/ethdev/rte_ethdev.h``
1217a79884f9SJuraj Linkeš        testpmd display function: ``app/test-pmd/cmdline.c:print_rx_offloads()``
1218a79884f9SJuraj Linkeš    """
1219a79884f9SJuraj Linkeš
1220a79884f9SJuraj Linkeš    #:
1221a79884f9SJuraj Linkeš    RX_OFFLOAD_VLAN_STRIP = auto()
1222a79884f9SJuraj Linkeš    #: Device supports L3 checksum offload.
1223a79884f9SJuraj Linkeš    RX_OFFLOAD_IPV4_CKSUM = auto()
1224a79884f9SJuraj Linkeš    #: Device supports L4 checksum offload.
1225a79884f9SJuraj Linkeš    RX_OFFLOAD_UDP_CKSUM = auto()
1226a79884f9SJuraj Linkeš    #: Device supports L4 checksum offload.
1227a79884f9SJuraj Linkeš    RX_OFFLOAD_TCP_CKSUM = auto()
1228a79884f9SJuraj Linkeš    #: Device supports Large Receive Offload.
1229a79884f9SJuraj Linkeš    RX_OFFLOAD_TCP_LRO = auto()
1230a79884f9SJuraj Linkeš    #: Device supports QinQ (queue in queue) offload.
1231a79884f9SJuraj Linkeš    RX_OFFLOAD_QINQ_STRIP = auto()
1232a79884f9SJuraj Linkeš    #: Device supports inner packet L3 checksum.
1233a79884f9SJuraj Linkeš    RX_OFFLOAD_OUTER_IPV4_CKSUM = auto()
1234a79884f9SJuraj Linkeš    #: Device supports MACsec.
1235a79884f9SJuraj Linkeš    RX_OFFLOAD_MACSEC_STRIP = auto()
1236a79884f9SJuraj Linkeš    #: Device supports filtering of a VLAN Tag identifier.
1237a79884f9SJuraj Linkeš    RX_OFFLOAD_VLAN_FILTER = 1 << 9
1238a79884f9SJuraj Linkeš    #: Device supports VLAN offload.
1239a79884f9SJuraj Linkeš    RX_OFFLOAD_VLAN_EXTEND = auto()
1240a79884f9SJuraj Linkeš    #: Device supports receiving segmented mbufs.
1241a79884f9SJuraj Linkeš    RX_OFFLOAD_SCATTER = 1 << 13
1242a79884f9SJuraj Linkeš    #: Device supports Timestamp.
1243a79884f9SJuraj Linkeš    RX_OFFLOAD_TIMESTAMP = auto()
1244a79884f9SJuraj Linkeš    #: Device supports crypto processing while packet is received in NIC.
1245a79884f9SJuraj Linkeš    RX_OFFLOAD_SECURITY = auto()
1246a79884f9SJuraj Linkeš    #: Device supports CRC stripping.
1247a79884f9SJuraj Linkeš    RX_OFFLOAD_KEEP_CRC = auto()
1248a79884f9SJuraj Linkeš    #: Device supports L4 checksum offload.
1249a79884f9SJuraj Linkeš    RX_OFFLOAD_SCTP_CKSUM = auto()
1250a79884f9SJuraj Linkeš    #: Device supports inner packet L4 checksum.
1251a79884f9SJuraj Linkeš    RX_OFFLOAD_OUTER_UDP_CKSUM = auto()
1252a79884f9SJuraj Linkeš    #: Device supports RSS hashing.
1253a79884f9SJuraj Linkeš    RX_OFFLOAD_RSS_HASH = auto()
1254a79884f9SJuraj Linkeš    #: Device supports
1255a79884f9SJuraj Linkeš    RX_OFFLOAD_BUFFER_SPLIT = auto()
1256a79884f9SJuraj Linkeš    #: Device supports all checksum capabilities.
1257a79884f9SJuraj Linkeš    RX_OFFLOAD_CHECKSUM = RX_OFFLOAD_IPV4_CKSUM | RX_OFFLOAD_UDP_CKSUM | RX_OFFLOAD_TCP_CKSUM
1258a79884f9SJuraj Linkeš    #: Device supports all VLAN capabilities.
1259a79884f9SJuraj Linkeš    RX_OFFLOAD_VLAN = (
1260a79884f9SJuraj Linkeš        RX_OFFLOAD_VLAN_STRIP
1261a79884f9SJuraj Linkeš        | RX_OFFLOAD_VLAN_FILTER
1262a79884f9SJuraj Linkeš        | RX_OFFLOAD_VLAN_EXTEND
1263a79884f9SJuraj Linkeš        | RX_OFFLOAD_QINQ_STRIP
1264a79884f9SJuraj Linkeš    )
1265a79884f9SJuraj Linkeš
1266a79884f9SJuraj Linkeš    @classmethod
1267a79884f9SJuraj Linkeš    def from_string(cls, line: str) -> Self:
1268a79884f9SJuraj Linkeš        """Make an instance from a string containing the flag names separated with a space.
1269a79884f9SJuraj Linkeš
1270a79884f9SJuraj Linkeš        Args:
1271a79884f9SJuraj Linkeš            line: The line to parse.
1272a79884f9SJuraj Linkeš
1273a79884f9SJuraj Linkeš        Returns:
1274a79884f9SJuraj Linkeš            A new instance containing all found flags.
1275a79884f9SJuraj Linkeš        """
1276a79884f9SJuraj Linkeš        flag = cls(0)
1277a79884f9SJuraj Linkeš        for flag_name in line.split():
1278a79884f9SJuraj Linkeš            flag |= cls[f"RX_OFFLOAD_{flag_name}"]
1279a79884f9SJuraj Linkeš        return flag
1280a79884f9SJuraj Linkeš
1281a79884f9SJuraj Linkeš    @classmethod
1282a79884f9SJuraj Linkeš    def make_parser(cls, per_port: bool) -> ParserFn:
1283a79884f9SJuraj Linkeš        """Make a parser function.
1284a79884f9SJuraj Linkeš
1285a79884f9SJuraj Linkeš        Args:
1286a79884f9SJuraj Linkeš            per_port: If :data:`True`, will return capabilities per port. If :data:`False`,
1287a79884f9SJuraj Linkeš                will return capabilities per queue.
1288a79884f9SJuraj Linkeš
1289a79884f9SJuraj Linkeš        Returns:
1290a79884f9SJuraj Linkeš            ParserFn: A dictionary for the `dataclasses.field` metadata argument containing a
1291a79884f9SJuraj Linkeš                parser function that makes an instance of this flag from text.
1292a79884f9SJuraj Linkeš        """
1293a79884f9SJuraj Linkeš        granularity = "Port" if per_port else "Queue"
1294a79884f9SJuraj Linkeš        return TextParser.wrap(
1295a79884f9SJuraj Linkeš            TextParser.find(rf"Per {granularity}\s+:(.*)$", re.MULTILINE),
1296a79884f9SJuraj Linkeš            cls.from_string,
1297a79884f9SJuraj Linkeš        )
1298a79884f9SJuraj Linkeš
1299a79884f9SJuraj Linkeš
1300a79884f9SJuraj Linkeš@dataclass
1301a79884f9SJuraj Linkešclass RxOffloadCapabilities(TextParser):
1302a79884f9SJuraj Linkeš    """The result of testpmd's ``show port <port_id> rx_offload capabilities`` command.
1303a79884f9SJuraj Linkeš
1304a79884f9SJuraj Linkeš    References:
1305a79884f9SJuraj Linkeš        testpmd command function: ``app/test-pmd/cmdline.c:cmd_rx_offload_get_capa()``
1306a79884f9SJuraj Linkeš        testpmd display function: ``app/test-pmd/cmdline.c:cmd_rx_offload_get_capa_parsed()``
1307a79884f9SJuraj Linkeš    """
1308a79884f9SJuraj Linkeš
1309a79884f9SJuraj Linkeš    #:
1310a79884f9SJuraj Linkeš    port_id: int = field(
1311a79884f9SJuraj Linkeš        metadata=TextParser.find_int(r"Rx Offloading Capabilities of port (\d+) :")
1312a79884f9SJuraj Linkeš    )
1313a79884f9SJuraj Linkeš    #: Per-queue Rx offload capabilities.
1314a79884f9SJuraj Linkeš    per_queue: RxOffloadCapability = field(metadata=RxOffloadCapability.make_parser(False))
1315a79884f9SJuraj Linkeš    #: Capabilities other than per-queue Rx offload capabilities.
1316a79884f9SJuraj Linkeš    per_port: RxOffloadCapability = field(metadata=RxOffloadCapability.make_parser(True))
1317a79884f9SJuraj Linkeš
1318a79884f9SJuraj Linkeš
13192ecfd126SLuca Vizzarrodef requires_stopped_ports(func: TestPmdShellMethod) -> TestPmdShellMethod:
13202ecfd126SLuca Vizzarro    """Decorator for :class:`TestPmdShell` commands methods that require stopped ports.
13212ecfd126SLuca Vizzarro
13222ecfd126SLuca Vizzarro    If the decorated method is called while the ports are started, then these are stopped before
13232ecfd126SLuca Vizzarro    continuing.
13242ecfd126SLuca Vizzarro
13252ecfd126SLuca Vizzarro    Args:
13262ecfd126SLuca Vizzarro        func: The :class:`TestPmdShell` method to decorate.
13272ecfd126SLuca Vizzarro    """
13282ecfd126SLuca Vizzarro
13292ecfd126SLuca Vizzarro    @functools.wraps(func)
13302ecfd126SLuca Vizzarro    def _wrapper(self: "TestPmdShell", *args: P.args, **kwargs: P.kwargs):
13312ecfd126SLuca Vizzarro        if self.ports_started:
13322ecfd126SLuca Vizzarro            self._logger.debug("Ports need to be stopped to continue.")
13332ecfd126SLuca Vizzarro            self.stop_all_ports()
13342ecfd126SLuca Vizzarro
13352ecfd126SLuca Vizzarro        return func(self, *args, **kwargs)
13362ecfd126SLuca Vizzarro
13372ecfd126SLuca Vizzarro    return _wrapper
13382ecfd126SLuca Vizzarro
13392ecfd126SLuca Vizzarro
13402ecfd126SLuca Vizzarrodef requires_started_ports(func: TestPmdShellMethod) -> TestPmdShellMethod:
13412ecfd126SLuca Vizzarro    """Decorator for :class:`TestPmdShell` commands methods that require started ports.
13422ecfd126SLuca Vizzarro
13432ecfd126SLuca Vizzarro    If the decorated method is called while the ports are stopped, then these are started before
13442ecfd126SLuca Vizzarro    continuing.
13452ecfd126SLuca Vizzarro
13462ecfd126SLuca Vizzarro    Args:
13472ecfd126SLuca Vizzarro        func: The :class:`TestPmdShell` method to decorate.
13482ecfd126SLuca Vizzarro    """
13492ecfd126SLuca Vizzarro
13502ecfd126SLuca Vizzarro    @functools.wraps(func)
13512ecfd126SLuca Vizzarro    def _wrapper(self: "TestPmdShell", *args: P.args, **kwargs: P.kwargs):
13522ecfd126SLuca Vizzarro        if not self.ports_started:
13532ecfd126SLuca Vizzarro            self._logger.debug("Ports need to be started to continue.")
13542ecfd126SLuca Vizzarro            self.start_all_ports()
13552ecfd126SLuca Vizzarro
13562ecfd126SLuca Vizzarro        return func(self, *args, **kwargs)
13572ecfd126SLuca Vizzarro
13582ecfd126SLuca Vizzarro    return _wrapper
13592ecfd126SLuca Vizzarro
13602ecfd126SLuca Vizzarro
1361c0119400SJuraj Linkešdef add_remove_mtu(mtu: int = 1500) -> Callable[[TestPmdShellMethod], TestPmdShellMethod]:
1362c0119400SJuraj Linkeš    """Configure MTU to `mtu` on all ports, run the decorated function, then revert.
1363c0119400SJuraj Linkeš
1364c0119400SJuraj Linkeš    Args:
1365c0119400SJuraj Linkeš        mtu: The MTU to configure all ports on.
1366c0119400SJuraj Linkeš
1367c0119400SJuraj Linkeš    Returns:
1368c0119400SJuraj Linkeš        The method decorated with setting and reverting MTU.
1369c0119400SJuraj Linkeš    """
1370c0119400SJuraj Linkeš
1371c0119400SJuraj Linkeš    def decorator(func: TestPmdShellMethod) -> TestPmdShellMethod:
1372c0119400SJuraj Linkeš        @functools.wraps(func)
1373c0119400SJuraj Linkeš        def wrapper(self: "TestPmdShell", *args: P.args, **kwargs: P.kwargs):
1374c0119400SJuraj Linkeš            original_mtu = self.ports[0].mtu
1375c0119400SJuraj Linkeš            self.set_port_mtu_all(mtu=mtu, verify=False)
1376c0119400SJuraj Linkeš            retval = func(self, *args, **kwargs)
1377c0119400SJuraj Linkeš            self.set_port_mtu_all(original_mtu if original_mtu else 1500, verify=False)
1378c0119400SJuraj Linkeš            return retval
1379c0119400SJuraj Linkeš
1380c0119400SJuraj Linkeš        return wrapper
1381c0119400SJuraj Linkeš
1382c0119400SJuraj Linkeš    return decorator
1383c0119400SJuraj Linkeš
1384c0119400SJuraj Linkeš
1385bfad0948SLuca Vizzarroclass TestPmdShell(DPDKShell):
13866ef07151SJuraj Linkeš    """Testpmd interactive shell.
13876ef07151SJuraj Linkeš
13886ef07151SJuraj Linkeš    The testpmd shell users should never use
13896ef07151SJuraj Linkeš    the :meth:`~.interactive_shell.InteractiveShell.send_command` method directly, but rather
13906ef07151SJuraj Linkeš    call specialized methods. If there isn't one that satisfies a need, it should be added.
13912ecfd126SLuca Vizzarro
13922ecfd126SLuca Vizzarro    Attributes:
13932ecfd126SLuca Vizzarro        ports_started: Indicates whether the ports are started.
13946ef07151SJuraj Linkeš    """
13956ef07151SJuraj Linkeš
1396bfad0948SLuca Vizzarro    _app_params: TestPmdParams
139785d15c7cSJuraj Linkeš    _ports: list[TestPmdPort] | None
1398369d34b8SJeremy Spewock
13996ef07151SJuraj Linkeš    #: The path to the testpmd executable.
14006ef07151SJuraj Linkeš    path: ClassVar[PurePath] = PurePath("app", "dpdk-testpmd")
14016ef07151SJuraj Linkeš
14026ef07151SJuraj Linkeš    #: The testpmd's prompt.
14036ef07151SJuraj Linkeš    _default_prompt: ClassVar[str] = "testpmd>"
14046ef07151SJuraj Linkeš
14056ef07151SJuraj Linkeš    #: This forces the prompt to appear after sending a command.
14066ef07151SJuraj Linkeš    _command_extra_chars: ClassVar[str] = "\n"
1407840b1e01SJuraj Linkeš
14082ecfd126SLuca Vizzarro    ports_started: bool
14092ecfd126SLuca Vizzarro
1410bfad0948SLuca Vizzarro    def __init__(
1411bfad0948SLuca Vizzarro        self,
1412bfad0948SLuca Vizzarro        node: SutNode,
1413bfad0948SLuca Vizzarro        privileged: bool = True,
1414bfad0948SLuca Vizzarro        timeout: float = SETTINGS.timeout,
1415bfad0948SLuca Vizzarro        lcore_filter_specifier: LogicalCoreCount | LogicalCoreList = LogicalCoreCount(),
1416bfad0948SLuca Vizzarro        ascending_cores: bool = True,
1417bfad0948SLuca Vizzarro        append_prefix_timestamp: bool = True,
141865a1b4e8SJeremy Spewock        name: str | None = None,
141987ba4cdcSLuca Vizzarro        **app_params: Unpack[TestPmdParamsDict],
1420bfad0948SLuca Vizzarro    ) -> None:
1421bfad0948SLuca Vizzarro        """Overrides :meth:`~.dpdk_shell.DPDKShell.__init__`. Changes app_params to kwargs."""
1422bfad0948SLuca Vizzarro        super().__init__(
1423bfad0948SLuca Vizzarro            node,
1424bfad0948SLuca Vizzarro            privileged,
1425bfad0948SLuca Vizzarro            timeout,
1426bfad0948SLuca Vizzarro            lcore_filter_specifier,
1427bfad0948SLuca Vizzarro            ascending_cores,
1428bfad0948SLuca Vizzarro            append_prefix_timestamp,
1429bfad0948SLuca Vizzarro            TestPmdParams(**app_params),
143065a1b4e8SJeremy Spewock            name,
1431fd8cd8eeSLuca Vizzarro        )
14322ecfd126SLuca Vizzarro        self.ports_started = not self._app_params.disable_device_start
143385d15c7cSJuraj Linkeš        self._ports = None
143485d15c7cSJuraj Linkeš
143585d15c7cSJuraj Linkeš    @property
143685d15c7cSJuraj Linkeš    def ports(self) -> list[TestPmdPort]:
143785d15c7cSJuraj Linkeš        """The ports of the instance.
143885d15c7cSJuraj Linkeš
143985d15c7cSJuraj Linkeš        This caches the ports returned by :meth:`show_port_info_all`.
144085d15c7cSJuraj Linkeš        To force an update of port information, execute :meth:`show_port_info_all` or
144185d15c7cSJuraj Linkeš        :meth:`show_port_info`.
144285d15c7cSJuraj Linkeš
144385d15c7cSJuraj Linkeš        Returns: The list of known testpmd ports.
144485d15c7cSJuraj Linkeš        """
144585d15c7cSJuraj Linkeš        if self._ports is None:
144685d15c7cSJuraj Linkeš            return self.show_port_info_all()
144785d15c7cSJuraj Linkeš        return self._ports
14482ecfd126SLuca Vizzarro
14492ecfd126SLuca Vizzarro    @requires_started_ports
1450369d34b8SJeremy Spewock    def start(self, verify: bool = True) -> None:
1451369d34b8SJeremy Spewock        """Start packet forwarding with the current configuration.
1452369d34b8SJeremy Spewock
1453369d34b8SJeremy Spewock        Args:
1454369d34b8SJeremy Spewock            verify: If :data:`True` , a second start command will be sent in an attempt to verify
1455369d34b8SJeremy Spewock                packet forwarding started as expected.
1456369d34b8SJeremy Spewock
1457369d34b8SJeremy Spewock        Raises:
1458369d34b8SJeremy Spewock            InteractiveCommandExecutionError: If `verify` is :data:`True` and forwarding fails to
1459369d34b8SJeremy Spewock                start or ports fail to come up.
1460369d34b8SJeremy Spewock        """
1461369d34b8SJeremy Spewock        self.send_command("start")
1462369d34b8SJeremy Spewock        if verify:
1463369d34b8SJeremy Spewock            # If forwarding was already started, sending "start" again should tell us
1464369d34b8SJeremy Spewock            start_cmd_output = self.send_command("start")
1465369d34b8SJeremy Spewock            if "Packet forwarding already started" not in start_cmd_output:
1466369d34b8SJeremy Spewock                self._logger.debug(f"Failed to start packet forwarding: \n{start_cmd_output}")
1467369d34b8SJeremy Spewock                raise InteractiveCommandExecutionError("Testpmd failed to start packet forwarding.")
1468369d34b8SJeremy Spewock
14690264e408SLuca Vizzarro            number_of_ports = len(self._app_params.allowed_ports or [])
1470bfad0948SLuca Vizzarro            for port_id in range(number_of_ports):
1471369d34b8SJeremy Spewock                if not self.wait_link_status_up(port_id):
1472369d34b8SJeremy Spewock                    raise InteractiveCommandExecutionError(
1473369d34b8SJeremy Spewock                        "Not all ports came up after starting packet forwarding in testpmd."
1474369d34b8SJeremy Spewock                    )
1475369d34b8SJeremy Spewock
1476a91d5f47SJeremy Spewock    def stop(self, verify: bool = True) -> str:
1477369d34b8SJeremy Spewock        """Stop packet forwarding.
1478369d34b8SJeremy Spewock
1479369d34b8SJeremy Spewock        Args:
1480369d34b8SJeremy Spewock            verify: If :data:`True` , the output of the stop command is scanned to verify that
1481369d34b8SJeremy Spewock                forwarding was stopped successfully or not started. If neither is found, it is
1482369d34b8SJeremy Spewock                considered an error.
1483369d34b8SJeremy Spewock
1484369d34b8SJeremy Spewock        Raises:
1485369d34b8SJeremy Spewock            InteractiveCommandExecutionError: If `verify` is :data:`True` and the command to stop
1486369d34b8SJeremy Spewock                forwarding results in an error.
1487a91d5f47SJeremy Spewock
1488a91d5f47SJeremy Spewock        Returns:
1489a91d5f47SJeremy Spewock            Output gathered from the stop command and all other preceding logs in the buffer. This
1490a91d5f47SJeremy Spewock            output is most often used to view forwarding statistics that are displayed when this
1491a91d5f47SJeremy Spewock            command is sent as well as any verbose packet information that hasn't been consumed
1492a91d5f47SJeremy Spewock            prior to calling this method.
1493369d34b8SJeremy Spewock        """
1494369d34b8SJeremy Spewock        stop_cmd_output = self.send_command("stop")
1495369d34b8SJeremy Spewock        if verify:
1496369d34b8SJeremy Spewock            if (
1497369d34b8SJeremy Spewock                "Done." not in stop_cmd_output
1498369d34b8SJeremy Spewock                and "Packet forwarding not started" not in stop_cmd_output
1499369d34b8SJeremy Spewock            ):
1500369d34b8SJeremy Spewock                self._logger.debug(f"Failed to stop packet forwarding: \n{stop_cmd_output}")
1501369d34b8SJeremy Spewock                raise InteractiveCommandExecutionError("Testpmd failed to stop packet forwarding.")
1502a91d5f47SJeremy Spewock        return stop_cmd_output
1503369d34b8SJeremy Spewock
1504840b1e01SJuraj Linkeš    def get_devices(self) -> list[TestPmdDevice]:
15056ef07151SJuraj Linkeš        """Get a list of device names that are known to testpmd.
1506840b1e01SJuraj Linkeš
15076ef07151SJuraj Linkeš        Uses the device info listed in testpmd and then parses the output.
1508840b1e01SJuraj Linkeš
1509840b1e01SJuraj Linkeš        Returns:
15106ef07151SJuraj Linkeš            A list of devices.
1511840b1e01SJuraj Linkeš        """
1512840b1e01SJuraj Linkeš        dev_info: str = self.send_command("show device info all")
1513840b1e01SJuraj Linkeš        dev_list: list[TestPmdDevice] = []
1514840b1e01SJuraj Linkeš        for line in dev_info.split("\n"):
1515840b1e01SJuraj Linkeš            if "device name:" in line.lower():
1516840b1e01SJuraj Linkeš                dev_list.append(TestPmdDevice(line))
1517840b1e01SJuraj Linkeš        return dev_list
1518369d34b8SJeremy Spewock
1519369d34b8SJeremy Spewock    def wait_link_status_up(self, port_id: int, timeout=SETTINGS.timeout) -> bool:
1520369d34b8SJeremy Spewock        """Wait until the link status on the given port is "up".
1521369d34b8SJeremy Spewock
1522369d34b8SJeremy Spewock        Arguments:
1523369d34b8SJeremy Spewock            port_id: Port to check the link status on.
1524369d34b8SJeremy Spewock            timeout: Time to wait for the link to come up. The default value for this
1525369d34b8SJeremy Spewock                argument may be modified using the :option:`--timeout` command-line argument
1526369d34b8SJeremy Spewock                or the :envvar:`DTS_TIMEOUT` environment variable.
1527369d34b8SJeremy Spewock
1528369d34b8SJeremy Spewock        Returns:
1529369d34b8SJeremy Spewock            Whether the link came up in time or not.
1530369d34b8SJeremy Spewock        """
1531369d34b8SJeremy Spewock        time_to_stop = time.time() + timeout
1532369d34b8SJeremy Spewock        port_info: str = ""
1533369d34b8SJeremy Spewock        while time.time() < time_to_stop:
1534369d34b8SJeremy Spewock            port_info = self.send_command(f"show port info {port_id}")
1535369d34b8SJeremy Spewock            if "Link status: up" in port_info:
1536369d34b8SJeremy Spewock                break
1537369d34b8SJeremy Spewock            time.sleep(0.5)
1538369d34b8SJeremy Spewock        else:
1539369d34b8SJeremy Spewock            self._logger.error(f"The link for port {port_id} did not come up in the given timeout.")
1540369d34b8SJeremy Spewock        return "Link status: up" in port_info
1541369d34b8SJeremy Spewock
1542fc0f7dc4SLuca Vizzarro    def set_forward_mode(self, mode: SimpleForwardingModes, verify: bool = True):
1543369d34b8SJeremy Spewock        """Set packet forwarding mode.
1544369d34b8SJeremy Spewock
1545369d34b8SJeremy Spewock        Args:
1546369d34b8SJeremy Spewock            mode: The forwarding mode to use.
1547369d34b8SJeremy Spewock            verify: If :data:`True` the output of the command will be scanned in an attempt to
1548369d34b8SJeremy Spewock                verify that the forwarding mode was set to `mode` properly.
1549369d34b8SJeremy Spewock
1550369d34b8SJeremy Spewock        Raises:
1551369d34b8SJeremy Spewock            InteractiveCommandExecutionError: If `verify` is :data:`True` and the forwarding mode
1552369d34b8SJeremy Spewock                fails to update.
1553369d34b8SJeremy Spewock        """
1554369d34b8SJeremy Spewock        set_fwd_output = self.send_command(f"set fwd {mode.value}")
1555d7181426SDean Marx        if verify:
1556369d34b8SJeremy Spewock            if f"Set {mode.value} packet forwarding mode" not in set_fwd_output:
1557369d34b8SJeremy Spewock                self._logger.debug(f"Failed to set fwd mode to {mode.value}:\n{set_fwd_output}")
1558369d34b8SJeremy Spewock                raise InteractiveCommandExecutionError(
1559369d34b8SJeremy Spewock                    f"Test pmd failed to set fwd mode to {mode.value}"
1560369d34b8SJeremy Spewock                )
1561369d34b8SJeremy Spewock
15622ecfd126SLuca Vizzarro    def stop_all_ports(self, verify: bool = True) -> None:
15632ecfd126SLuca Vizzarro        """Stops all the ports.
15642ecfd126SLuca Vizzarro
15652ecfd126SLuca Vizzarro        Args:
15662ecfd126SLuca Vizzarro            verify: If :data:`True`, the output of the command will be checked for a successful
15672ecfd126SLuca Vizzarro                execution.
15682ecfd126SLuca Vizzarro
15692ecfd126SLuca Vizzarro        Raises:
15702ecfd126SLuca Vizzarro            InteractiveCommandExecutionError: If `verify` is :data:`True` and the ports were not
15712ecfd126SLuca Vizzarro                stopped successfully.
15722ecfd126SLuca Vizzarro        """
15732ecfd126SLuca Vizzarro        self._logger.debug("Stopping all the ports...")
15742ecfd126SLuca Vizzarro        output = self.send_command("port stop all")
15752ecfd126SLuca Vizzarro        if verify and not output.strip().endswith("Done"):
15762ecfd126SLuca Vizzarro            raise InteractiveCommandExecutionError("Ports were not stopped successfully.")
15772ecfd126SLuca Vizzarro
15782ecfd126SLuca Vizzarro        self.ports_started = False
15792ecfd126SLuca Vizzarro
15802ecfd126SLuca Vizzarro    def start_all_ports(self, verify: bool = True) -> None:
15812ecfd126SLuca Vizzarro        """Starts all the ports.
15822ecfd126SLuca Vizzarro
15832ecfd126SLuca Vizzarro        Args:
15842ecfd126SLuca Vizzarro            verify: If :data:`True`, the output of the command will be checked for a successful
15852ecfd126SLuca Vizzarro                execution.
15862ecfd126SLuca Vizzarro
15872ecfd126SLuca Vizzarro        Raises:
15882ecfd126SLuca Vizzarro            InteractiveCommandExecutionError: If `verify` is :data:`True` and the ports were not
15892ecfd126SLuca Vizzarro                started successfully.
15902ecfd126SLuca Vizzarro        """
15912ecfd126SLuca Vizzarro        self._logger.debug("Starting all the ports...")
15922ecfd126SLuca Vizzarro        output = self.send_command("port start all")
15932ecfd126SLuca Vizzarro        if verify and not output.strip().endswith("Done"):
15942ecfd126SLuca Vizzarro            raise InteractiveCommandExecutionError("Ports were not started successfully.")
15952ecfd126SLuca Vizzarro
15962ecfd126SLuca Vizzarro        self.ports_started = True
15972ecfd126SLuca Vizzarro
159807816eadSLuca Vizzarro    @requires_stopped_ports
159907816eadSLuca Vizzarro    def set_ports_queues(self, number_of: int) -> None:
160007816eadSLuca Vizzarro        """Sets the number of queues per port.
160107816eadSLuca Vizzarro
160207816eadSLuca Vizzarro        Args:
160307816eadSLuca Vizzarro            number_of: The number of RX/TX queues to create per port.
160407816eadSLuca Vizzarro
160507816eadSLuca Vizzarro        Raises:
160607816eadSLuca Vizzarro            InternalError: If `number_of` is invalid.
160707816eadSLuca Vizzarro        """
160807816eadSLuca Vizzarro        if number_of < 1:
160907816eadSLuca Vizzarro            raise InternalError("The number of queues must be positive and non-zero.")
161007816eadSLuca Vizzarro
161107816eadSLuca Vizzarro        self.send_command(f"port config all rxq {number_of}")
161207816eadSLuca Vizzarro        self.send_command(f"port config all txq {number_of}")
161307816eadSLuca Vizzarro
161461d5bc9bSLuca Vizzarro    def show_port_info_all(self) -> list[TestPmdPort]:
161561d5bc9bSLuca Vizzarro        """Returns the information of all the ports.
161661d5bc9bSLuca Vizzarro
161761d5bc9bSLuca Vizzarro        Returns:
161861d5bc9bSLuca Vizzarro            list[TestPmdPort]: A list containing all the ports information as `TestPmdPort`.
161961d5bc9bSLuca Vizzarro        """
162061d5bc9bSLuca Vizzarro        output = self.send_command("show port info all")
162161d5bc9bSLuca Vizzarro
162261d5bc9bSLuca Vizzarro        # Sample output of the "all" command looks like:
162361d5bc9bSLuca Vizzarro        #
162461d5bc9bSLuca Vizzarro        # <start>
162561d5bc9bSLuca Vizzarro        #
162661d5bc9bSLuca Vizzarro        #   ********************* Infos for port 0 *********************
162761d5bc9bSLuca Vizzarro        #   Key: value
162861d5bc9bSLuca Vizzarro        #
162961d5bc9bSLuca Vizzarro        #   ********************* Infos for port 1 *********************
163061d5bc9bSLuca Vizzarro        #   Key: value
163161d5bc9bSLuca Vizzarro        # <end>
163261d5bc9bSLuca Vizzarro        #
163361d5bc9bSLuca Vizzarro        # Takes advantage of the double new line in between ports as end delimiter. But we need to
163461d5bc9bSLuca Vizzarro        # artificially add a new line at the end to pick up the last port. Because commands are
163561d5bc9bSLuca Vizzarro        # executed on a pseudo-terminal created by paramiko on the remote node, lines end with CRLF.
163661d5bc9bSLuca Vizzarro        # Therefore we also need to take the carriage return into account.
163761d5bc9bSLuca Vizzarro        iter = re.finditer(r"\*{21}.*?[\r\n]{4}", output + "\r\n", re.S)
163885d15c7cSJuraj Linkeš        self._ports = [TestPmdPort.parse(block.group(0)) for block in iter]
163985d15c7cSJuraj Linkeš        return self._ports
164061d5bc9bSLuca Vizzarro
164161d5bc9bSLuca Vizzarro    def show_port_info(self, port_id: int) -> TestPmdPort:
164261d5bc9bSLuca Vizzarro        """Returns the given port information.
164361d5bc9bSLuca Vizzarro
164461d5bc9bSLuca Vizzarro        Args:
164561d5bc9bSLuca Vizzarro            port_id: The port ID to gather information for.
164661d5bc9bSLuca Vizzarro
164761d5bc9bSLuca Vizzarro        Raises:
164861d5bc9bSLuca Vizzarro            InteractiveCommandExecutionError: If `port_id` is invalid.
164961d5bc9bSLuca Vizzarro
165061d5bc9bSLuca Vizzarro        Returns:
165161d5bc9bSLuca Vizzarro            TestPmdPort: An instance of `TestPmdPort` containing the given port's information.
165261d5bc9bSLuca Vizzarro        """
165361d5bc9bSLuca Vizzarro        output = self.send_command(f"show port info {port_id}", skip_first_line=True)
165461d5bc9bSLuca Vizzarro        if output.startswith("Invalid port"):
165561d5bc9bSLuca Vizzarro            raise InteractiveCommandExecutionError("invalid port given")
165661d5bc9bSLuca Vizzarro
165785d15c7cSJuraj Linkeš        port = TestPmdPort.parse(output)
165885d15c7cSJuraj Linkeš        self._update_port(port)
165985d15c7cSJuraj Linkeš        return port
166085d15c7cSJuraj Linkeš
166185d15c7cSJuraj Linkeš    def _update_port(self, port: TestPmdPort) -> None:
166285d15c7cSJuraj Linkeš        if self._ports:
166385d15c7cSJuraj Linkeš            self._ports = [
166485d15c7cSJuraj Linkeš                existing_port if port.id != existing_port.id else port
166585d15c7cSJuraj Linkeš                for existing_port in self._ports
166685d15c7cSJuraj Linkeš            ]
166761d5bc9bSLuca Vizzarro
1668*e3b16f45SNicholas Pratte    def set_mac_addr(self, port_id: int, mac_address: str, add: bool, verify: bool = True) -> None:
1669*e3b16f45SNicholas Pratte        """Add or remove a mac address on a given port's Allowlist.
1670*e3b16f45SNicholas Pratte
1671*e3b16f45SNicholas Pratte        Args:
1672*e3b16f45SNicholas Pratte            port_id: The port ID the mac address is set on.
1673*e3b16f45SNicholas Pratte            mac_address: The mac address to be added to or removed from the specified port.
1674*e3b16f45SNicholas Pratte            add: If :data:`True`, add the specified mac address. If :data:`False`, remove specified
1675*e3b16f45SNicholas Pratte                mac address.
1676*e3b16f45SNicholas Pratte            verify: If :data:'True', assert that the 'mac_addr' operation was successful. If
1677*e3b16f45SNicholas Pratte                :data:'False', run the command and skip this assertion.
1678*e3b16f45SNicholas Pratte
1679*e3b16f45SNicholas Pratte        Raises:
1680*e3b16f45SNicholas Pratte            InteractiveCommandExecutionError: If the set mac address operation fails.
1681*e3b16f45SNicholas Pratte        """
1682*e3b16f45SNicholas Pratte        mac_cmd = "add" if add else "remove"
1683*e3b16f45SNicholas Pratte        output = self.send_command(f"mac_addr {mac_cmd} {port_id} {mac_address}")
1684*e3b16f45SNicholas Pratte        if "Bad arguments" in output:
1685*e3b16f45SNicholas Pratte            self._logger.debug("Invalid argument provided to mac_addr")
1686*e3b16f45SNicholas Pratte            raise InteractiveCommandExecutionError("Invalid argument provided")
1687*e3b16f45SNicholas Pratte
1688*e3b16f45SNicholas Pratte        if verify:
1689*e3b16f45SNicholas Pratte            if "mac_addr_cmd error:" in output:
1690*e3b16f45SNicholas Pratte                self._logger.debug(f"Failed to {mac_cmd} {mac_address} on port {port_id}")
1691*e3b16f45SNicholas Pratte                raise InteractiveCommandExecutionError(
1692*e3b16f45SNicholas Pratte                    f"Failed to {mac_cmd} {mac_address} on port {port_id} \n{output}"
1693*e3b16f45SNicholas Pratte                )
1694*e3b16f45SNicholas Pratte
1695*e3b16f45SNicholas Pratte    def set_multicast_mac_addr(
1696*e3b16f45SNicholas Pratte        self, port_id: int, multi_addr: str, add: bool, verify: bool = True
1697*e3b16f45SNicholas Pratte    ) -> None:
1698*e3b16f45SNicholas Pratte        """Add or remove multicast mac address to a specified port's allow list.
1699*e3b16f45SNicholas Pratte
1700*e3b16f45SNicholas Pratte        Args:
1701*e3b16f45SNicholas Pratte            port_id: The port ID the multicast address is set on.
1702*e3b16f45SNicholas Pratte            multi_addr: The multicast address to be added or removed from the filter.
1703*e3b16f45SNicholas Pratte            add: If :data:'True', add the specified multicast address to the port filter.
1704*e3b16f45SNicholas Pratte                If :data:'False', remove the specified multicast address from the port filter.
1705*e3b16f45SNicholas Pratte            verify: If :data:'True', assert that the 'mcast_addr' operations was successful.
1706*e3b16f45SNicholas Pratte                If :data:'False', execute the 'mcast_addr' operation and skip the assertion.
1707*e3b16f45SNicholas Pratte
1708*e3b16f45SNicholas Pratte        Raises:
1709*e3b16f45SNicholas Pratte            InteractiveCommandExecutionError: If either the 'add' or 'remove' operations fails.
1710*e3b16f45SNicholas Pratte        """
1711*e3b16f45SNicholas Pratte        mcast_cmd = "add" if add else "remove"
1712*e3b16f45SNicholas Pratte        output = self.send_command(f"mcast_addr {mcast_cmd} {port_id} {multi_addr}")
1713*e3b16f45SNicholas Pratte        if "Bad arguments" in output:
1714*e3b16f45SNicholas Pratte            self._logger.debug("Invalid arguments provided to mcast_addr")
1715*e3b16f45SNicholas Pratte            raise InteractiveCommandExecutionError("Invalid argument provided")
1716*e3b16f45SNicholas Pratte
1717*e3b16f45SNicholas Pratte        if verify:
1718*e3b16f45SNicholas Pratte            if (
1719*e3b16f45SNicholas Pratte                "Invalid multicast_addr" in output
1720*e3b16f45SNicholas Pratte                or f'multicast address {"already" if add else "not"} filtered by port' in output
1721*e3b16f45SNicholas Pratte            ):
1722*e3b16f45SNicholas Pratte                self._logger.debug(f"Failed to {mcast_cmd} {multi_addr} on port {port_id}")
1723*e3b16f45SNicholas Pratte                raise InteractiveCommandExecutionError(
1724*e3b16f45SNicholas Pratte                    f"Failed to {mcast_cmd} {multi_addr} on port {port_id} \n{output}"
1725*e3b16f45SNicholas Pratte                )
1726*e3b16f45SNicholas Pratte
172753eacf3dSLuca Vizzarro    def show_port_stats_all(self) -> list[TestPmdPortStats]:
172853eacf3dSLuca Vizzarro        """Returns the statistics of all the ports.
172953eacf3dSLuca Vizzarro
173053eacf3dSLuca Vizzarro        Returns:
173153eacf3dSLuca Vizzarro            list[TestPmdPortStats]: A list containing all the ports stats as `TestPmdPortStats`.
173253eacf3dSLuca Vizzarro        """
173353eacf3dSLuca Vizzarro        output = self.send_command("show port stats all")
173453eacf3dSLuca Vizzarro
173553eacf3dSLuca Vizzarro        # Sample output of the "all" command looks like:
173653eacf3dSLuca Vizzarro        #
173753eacf3dSLuca Vizzarro        #   ########### NIC statistics for port 0 ###########
173853eacf3dSLuca Vizzarro        #   values...
173953eacf3dSLuca Vizzarro        #   #################################################
174053eacf3dSLuca Vizzarro        #
174153eacf3dSLuca Vizzarro        #   ########### NIC statistics for port 1 ###########
174253eacf3dSLuca Vizzarro        #   values...
174353eacf3dSLuca Vizzarro        #   #################################################
174453eacf3dSLuca Vizzarro        #
174553eacf3dSLuca Vizzarro        iter = re.finditer(r"(^  #*.+#*$[^#]+)^  #*\r$", output, re.MULTILINE)
174653eacf3dSLuca Vizzarro        return [TestPmdPortStats.parse(block.group(1)) for block in iter]
174753eacf3dSLuca Vizzarro
174853eacf3dSLuca Vizzarro    def show_port_stats(self, port_id: int) -> TestPmdPortStats:
174953eacf3dSLuca Vizzarro        """Returns the given port statistics.
175053eacf3dSLuca Vizzarro
175153eacf3dSLuca Vizzarro        Args:
175253eacf3dSLuca Vizzarro            port_id: The port ID to gather information for.
175353eacf3dSLuca Vizzarro
175453eacf3dSLuca Vizzarro        Raises:
175553eacf3dSLuca Vizzarro            InteractiveCommandExecutionError: If `port_id` is invalid.
175653eacf3dSLuca Vizzarro
175753eacf3dSLuca Vizzarro        Returns:
175853eacf3dSLuca Vizzarro            TestPmdPortStats: An instance of `TestPmdPortStats` containing the given port's stats.
175953eacf3dSLuca Vizzarro        """
176053eacf3dSLuca Vizzarro        output = self.send_command(f"show port stats {port_id}", skip_first_line=True)
176153eacf3dSLuca Vizzarro        if output.startswith("Invalid port"):
176253eacf3dSLuca Vizzarro            raise InteractiveCommandExecutionError("invalid port given")
176353eacf3dSLuca Vizzarro
176453eacf3dSLuca Vizzarro        return TestPmdPortStats.parse(output)
176553eacf3dSLuca Vizzarro
17669910db35SJeremy Spewock    @requires_stopped_ports
17679910db35SJeremy Spewock    def set_port_mtu(self, port_id: int, mtu: int, verify: bool = True) -> None:
17689910db35SJeremy Spewock        """Change the MTU of a port using testpmd.
17699910db35SJeremy Spewock
17709910db35SJeremy Spewock        Some PMDs require that the port be stopped before changing the MTU, and it does no harm to
17719910db35SJeremy Spewock        stop the port before configuring in cases where it isn't required, so ports are stopped
17729910db35SJeremy Spewock        prior to changing their MTU.
17739910db35SJeremy Spewock
17749910db35SJeremy Spewock        Args:
17759910db35SJeremy Spewock            port_id: ID of the port to adjust the MTU on.
17769910db35SJeremy Spewock            mtu: Desired value for the MTU to be set to.
17779910db35SJeremy Spewock            verify: If `verify` is :data:`True` then the output will be scanned in an attempt to
17789910db35SJeremy Spewock                verify that the mtu was properly set on the port. Defaults to :data:`True`.
17799910db35SJeremy Spewock
17809910db35SJeremy Spewock        Raises:
17819910db35SJeremy Spewock            InteractiveCommandExecutionError: If `verify` is :data:`True` and the MTU was not
17829910db35SJeremy Spewock                properly updated on the port matching `port_id`.
17839910db35SJeremy Spewock        """
17849910db35SJeremy Spewock        set_mtu_output = self.send_command(f"port config mtu {port_id} {mtu}")
17859910db35SJeremy Spewock        if verify and (f"MTU: {mtu}" not in self.send_command(f"show port info {port_id}")):
17869910db35SJeremy Spewock            self._logger.debug(
17879910db35SJeremy Spewock                f"Failed to set mtu to {mtu} on port {port_id}." f" Output was:\n{set_mtu_output}"
17889910db35SJeremy Spewock            )
17899910db35SJeremy Spewock            raise InteractiveCommandExecutionError(
17909910db35SJeremy Spewock                f"Test pmd failed to update mtu of port {port_id} to {mtu}"
17919910db35SJeremy Spewock            )
17929910db35SJeremy Spewock
17939910db35SJeremy Spewock    def set_port_mtu_all(self, mtu: int, verify: bool = True) -> None:
17949910db35SJeremy Spewock        """Change the MTU of all ports using testpmd.
17959910db35SJeremy Spewock
17969910db35SJeremy Spewock        Runs :meth:`set_port_mtu` for every port that testpmd is aware of.
17979910db35SJeremy Spewock
17989910db35SJeremy Spewock        Args:
17999910db35SJeremy Spewock            mtu: Desired value for the MTU to be set to.
18009910db35SJeremy Spewock            verify: Whether to verify that setting the MTU on each port was successful or not.
18019910db35SJeremy Spewock                Defaults to :data:`True`.
18029910db35SJeremy Spewock
18039910db35SJeremy Spewock        Raises:
18049910db35SJeremy Spewock            InteractiveCommandExecutionError: If `verify` is :data:`True` and the MTU was not
18059910db35SJeremy Spewock                properly updated on at least one port.
18069910db35SJeremy Spewock        """
18079910db35SJeremy Spewock        for port in self.ports:
18089910db35SJeremy Spewock            self.set_port_mtu(port.id, mtu, verify)
18099910db35SJeremy Spewock
1810a91d5f47SJeremy Spewock    @staticmethod
1811a91d5f47SJeremy Spewock    def extract_verbose_output(output: str) -> list[TestPmdVerbosePacket]:
1812a91d5f47SJeremy Spewock        """Extract the verbose information present in given testpmd output.
1813a91d5f47SJeremy Spewock
1814a91d5f47SJeremy Spewock        This method extracts sections of verbose output that begin with the line
1815a91d5f47SJeremy Spewock        "port X/queue Y: sent/received Z packets" and end with the ol_flags of a packet.
1816a91d5f47SJeremy Spewock
1817a91d5f47SJeremy Spewock        Args:
1818a91d5f47SJeremy Spewock            output: Testpmd output that contains verbose information
1819a91d5f47SJeremy Spewock
1820a91d5f47SJeremy Spewock        Returns:
1821a91d5f47SJeremy Spewock            List of parsed packet information gathered from verbose information in `output`.
1822a91d5f47SJeremy Spewock        """
1823a91d5f47SJeremy Spewock        out: list[TestPmdVerbosePacket] = []
1824a91d5f47SJeremy Spewock        prev_header: str = ""
1825a91d5f47SJeremy Spewock        iter = re.finditer(
1826a91d5f47SJeremy Spewock            r"(?P<HEADER>(?:port \d+/queue \d+: (?:received|sent) \d+ packets)?)\s*"
1827a91d5f47SJeremy Spewock            r"(?P<PACKET>src=[\w\s=:-]+?ol_flags: [\w ]+)",
1828a91d5f47SJeremy Spewock            output,
1829a91d5f47SJeremy Spewock        )
1830a91d5f47SJeremy Spewock        for match in iter:
1831a91d5f47SJeremy Spewock            if match.group("HEADER"):
1832a91d5f47SJeremy Spewock                prev_header = match.group("HEADER")
1833a91d5f47SJeremy Spewock            out.append(TestPmdVerbosePacket.parse(f"{prev_header}\n{match.group('PACKET')}"))
1834a91d5f47SJeremy Spewock        return out
1835a91d5f47SJeremy Spewock
18361a7520a1SDean Marx    def set_vlan_filter(self, port: int, enable: bool, verify: bool = True) -> None:
18371a7520a1SDean Marx        """Set vlan filter on.
18381a7520a1SDean Marx
18391a7520a1SDean Marx        Args:
18401a7520a1SDean Marx            port: The port number to enable VLAN filter on.
18411a7520a1SDean Marx            enable: Enable the filter on `port` if :data:`True`, otherwise disable it.
18421a7520a1SDean Marx            verify: If :data:`True`, the output of the command and show port info
18431a7520a1SDean Marx                is scanned to verify that vlan filtering was set successfully.
18441a7520a1SDean Marx
18451a7520a1SDean Marx        Raises:
18461a7520a1SDean Marx            InteractiveCommandExecutionError: If `verify` is :data:`True` and the filter
18471a7520a1SDean Marx                fails to update.
18481a7520a1SDean Marx        """
18491a7520a1SDean Marx        filter_cmd_output = self.send_command(f"vlan set filter {'on' if enable else 'off'} {port}")
18501a7520a1SDean Marx        if verify:
18511a7520a1SDean Marx            vlan_settings = self.show_port_info(port_id=port).vlan_offload
18521a7520a1SDean Marx            if enable ^ (vlan_settings is not None and VLANOffloadFlag.FILTER in vlan_settings):
18531a7520a1SDean Marx                self._logger.debug(
18541a7520a1SDean Marx                    f"""Failed to {'enable' if enable else 'disable'}
18551a7520a1SDean Marx                                   filter on port {port}: \n{filter_cmd_output}"""
18561a7520a1SDean Marx                )
18571a7520a1SDean Marx                raise InteractiveCommandExecutionError(
18581a7520a1SDean Marx                    f"""Failed to {'enable' if enable else 'disable'}
18591a7520a1SDean Marx                    filter on port {port}"""
18601a7520a1SDean Marx                )
18611a7520a1SDean Marx
18621a7520a1SDean Marx    def rx_vlan(self, vlan: int, port: int, add: bool, verify: bool = True) -> None:
18631a7520a1SDean Marx        """Add specified vlan tag to the filter list on a port. Requires vlan filter to be on.
18641a7520a1SDean Marx
18651a7520a1SDean Marx        Args:
18661a7520a1SDean Marx            vlan: The vlan tag to add, should be within 1-1005.
18671a7520a1SDean Marx            port: The port number to add the tag on.
18681a7520a1SDean Marx            add: Adds the tag if :data:`True`, otherwise removes the tag.
18691a7520a1SDean Marx            verify: If :data:`True`, the output of the command is scanned to verify that
18701a7520a1SDean Marx                the vlan tag was added to the filter list on the specified port.
18711a7520a1SDean Marx
18721a7520a1SDean Marx        Raises:
18731a7520a1SDean Marx            InteractiveCommandExecutionError: If `verify` is :data:`True` and the tag
18741a7520a1SDean Marx                is not added.
18751a7520a1SDean Marx        """
18761a7520a1SDean Marx        rx_cmd_output = self.send_command(f"rx_vlan {'add' if add else 'rm'} {vlan} {port}")
18771a7520a1SDean Marx        if verify:
18781a7520a1SDean Marx            if (
18791a7520a1SDean Marx                "VLAN-filtering disabled" in rx_cmd_output
18801a7520a1SDean Marx                or "Invalid vlan_id" in rx_cmd_output
18811a7520a1SDean Marx                or "Bad arguments" in rx_cmd_output
18821a7520a1SDean Marx            ):
18831a7520a1SDean Marx                self._logger.debug(
18841a7520a1SDean Marx                    f"""Failed to {'add' if add else 'remove'} tag {vlan}
18851a7520a1SDean Marx                    port {port}: \n{rx_cmd_output}"""
18861a7520a1SDean Marx                )
18871a7520a1SDean Marx                raise InteractiveCommandExecutionError(
18881a7520a1SDean Marx                    f"Testpmd failed to {'add' if add else 'remove'} tag {vlan} on port {port}."
18891a7520a1SDean Marx                )
18901a7520a1SDean Marx
18911a7520a1SDean Marx    def set_vlan_strip(self, port: int, enable: bool, verify: bool = True) -> None:
18921a7520a1SDean Marx        """Enable or disable vlan stripping on the specified port.
18931a7520a1SDean Marx
18941a7520a1SDean Marx        Args:
18951a7520a1SDean Marx            port: The port number to use.
18961a7520a1SDean Marx            enable: If :data:`True`, will turn vlan stripping on, otherwise will turn off.
18971a7520a1SDean Marx            verify: If :data:`True`, the output of the command and show port info
18981a7520a1SDean Marx                is scanned to verify that vlan stripping was enabled on the specified port.
18991a7520a1SDean Marx
19001a7520a1SDean Marx        Raises:
19011a7520a1SDean Marx            InteractiveCommandExecutionError: If `verify` is :data:`True` and stripping
19021a7520a1SDean Marx                fails to update.
19031a7520a1SDean Marx        """
19041a7520a1SDean Marx        strip_cmd_output = self.send_command(f"vlan set strip {'on' if enable else 'off'} {port}")
19051a7520a1SDean Marx        if verify:
19061a7520a1SDean Marx            vlan_settings = self.show_port_info(port_id=port).vlan_offload
19071a7520a1SDean Marx            if enable ^ (vlan_settings is not None and VLANOffloadFlag.STRIP in vlan_settings):
19081a7520a1SDean Marx                self._logger.debug(
19091a7520a1SDean Marx                    f"""Failed to set strip {'on' if enable else 'off'}
19101a7520a1SDean Marx                    port {port}: \n{strip_cmd_output}"""
19111a7520a1SDean Marx                )
19121a7520a1SDean Marx                raise InteractiveCommandExecutionError(
19131a7520a1SDean Marx                    f"Testpmd failed to set strip {'on' if enable else 'off'} port {port}."
19141a7520a1SDean Marx                )
19151a7520a1SDean Marx
19161a7520a1SDean Marx    @requires_stopped_ports
19171a7520a1SDean Marx    def tx_vlan_set(
19181a7520a1SDean Marx        self, port: int, enable: bool, vlan: int | None = None, verify: bool = True
19191a7520a1SDean Marx    ) -> None:
19201a7520a1SDean Marx        """Set hardware insertion of vlan tags in packets sent on a port.
19211a7520a1SDean Marx
19221a7520a1SDean Marx        Args:
19231a7520a1SDean Marx            port: The port number to use.
19241a7520a1SDean Marx            enable: Sets vlan tag insertion if :data:`True`, and resets if :data:`False`.
19251a7520a1SDean Marx            vlan: The vlan tag to insert if enable is :data:`True`.
19261a7520a1SDean Marx            verify: If :data:`True`, the output of the command is scanned to verify that
19271a7520a1SDean Marx                vlan insertion was enabled on the specified port.
19281a7520a1SDean Marx
19291a7520a1SDean Marx        Raises:
19301a7520a1SDean Marx            InteractiveCommandExecutionError: If `verify` is :data:`True` and the insertion
19311a7520a1SDean Marx                tag is not set.
19321a7520a1SDean Marx        """
19331a7520a1SDean Marx        if enable:
19341a7520a1SDean Marx            tx_vlan_cmd_output = self.send_command(f"tx_vlan set {port} {vlan}")
19351a7520a1SDean Marx            if verify:
19361a7520a1SDean Marx                if (
19371a7520a1SDean Marx                    "Please stop port" in tx_vlan_cmd_output
19381a7520a1SDean Marx                    or "Invalid vlan_id" in tx_vlan_cmd_output
19391a7520a1SDean Marx                    or "Invalid port" in tx_vlan_cmd_output
19401a7520a1SDean Marx                ):
19411a7520a1SDean Marx                    self._logger.debug(
19421a7520a1SDean Marx                        f"Failed to set vlan tag {vlan} on port {port}:\n{tx_vlan_cmd_output}"
19431a7520a1SDean Marx                    )
19441a7520a1SDean Marx                    raise InteractiveCommandExecutionError(
19451a7520a1SDean Marx                        f"Testpmd failed to set vlan insertion tag {vlan} on port {port}."
19461a7520a1SDean Marx                    )
19471a7520a1SDean Marx        else:
19481a7520a1SDean Marx            tx_vlan_cmd_output = self.send_command(f"tx_vlan reset {port}")
19491a7520a1SDean Marx            if verify:
19501a7520a1SDean Marx                if "Please stop port" in tx_vlan_cmd_output or "Invalid port" in tx_vlan_cmd_output:
19511a7520a1SDean Marx                    self._logger.debug(
19521a7520a1SDean Marx                        f"Failed to reset vlan insertion on port {port}: \n{tx_vlan_cmd_output}"
19531a7520a1SDean Marx                    )
19541a7520a1SDean Marx                    raise InteractiveCommandExecutionError(
19551a7520a1SDean Marx                        f"Testpmd failed to reset vlan insertion on port {port}."
19561a7520a1SDean Marx                    )
19571a7520a1SDean Marx
19581a7520a1SDean Marx    def set_promisc(self, port: int, enable: bool, verify: bool = True) -> None:
19591a7520a1SDean Marx        """Enable or disable promiscuous mode for the specified port.
19601a7520a1SDean Marx
19611a7520a1SDean Marx        Args:
19621a7520a1SDean Marx            port: Port number to use.
19631a7520a1SDean Marx            enable: If :data:`True`, turn promiscuous mode on, otherwise turn off.
19641a7520a1SDean Marx            verify: If :data:`True` an additional command will be sent to verify that
19651a7520a1SDean Marx                promiscuous mode is properly set. Defaults to :data:`True`.
19661a7520a1SDean Marx
19671a7520a1SDean Marx        Raises:
19681a7520a1SDean Marx            InteractiveCommandExecutionError: If `verify` is :data:`True` and promiscuous mode
19691a7520a1SDean Marx                is not correctly set.
19701a7520a1SDean Marx        """
19711a7520a1SDean Marx        promisc_cmd_output = self.send_command(f"set promisc {port} {'on' if enable else 'off'}")
19721a7520a1SDean Marx        if verify:
19731a7520a1SDean Marx            stats = self.show_port_info(port_id=port)
19741a7520a1SDean Marx            if enable ^ stats.is_promiscuous_mode_enabled:
19751a7520a1SDean Marx                self._logger.debug(
19761a7520a1SDean Marx                    f"Failed to set promiscuous mode on port {port}: \n{promisc_cmd_output}"
19771a7520a1SDean Marx                )
19781a7520a1SDean Marx                raise InteractiveCommandExecutionError(
19791a7520a1SDean Marx                    f"Testpmd failed to set promiscuous mode on port {port}."
19801a7520a1SDean Marx                )
19811a7520a1SDean Marx
19821a7520a1SDean Marx    def set_verbose(self, level: int, verify: bool = True) -> None:
19831a7520a1SDean Marx        """Set debug verbosity level.
19841a7520a1SDean Marx
19851a7520a1SDean Marx        Args:
19861a7520a1SDean Marx            level: 0 - silent except for error
19871a7520a1SDean Marx                1 - fully verbose except for Tx packets
19881a7520a1SDean Marx                2 - fully verbose except for Rx packets
19891a7520a1SDean Marx                >2 - fully verbose
19901a7520a1SDean Marx            verify: If :data:`True` the command output will be scanned to verify that verbose level
19911a7520a1SDean Marx                is properly set. Defaults to :data:`True`.
19921a7520a1SDean Marx
19931a7520a1SDean Marx        Raises:
19941a7520a1SDean Marx            InteractiveCommandExecutionError: If `verify` is :data:`True` and verbose level
19951a7520a1SDean Marx            is not correctly set.
19961a7520a1SDean Marx        """
19971a7520a1SDean Marx        verbose_cmd_output = self.send_command(f"set verbose {level}")
19981a7520a1SDean Marx        if verify:
19991a7520a1SDean Marx            if "Change verbose level" not in verbose_cmd_output:
20001a7520a1SDean Marx                self._logger.debug(
20011a7520a1SDean Marx                    f"Failed to set verbose level to {level}: \n{verbose_cmd_output}"
20021a7520a1SDean Marx                )
20031a7520a1SDean Marx                raise InteractiveCommandExecutionError(
20041a7520a1SDean Marx                    f"Testpmd failed to set verbose level to {level}."
20051a7520a1SDean Marx                )
20061a7520a1SDean Marx
20072b648cd4SJeremy Spewock    def _close(self) -> None:
2008369d34b8SJeremy Spewock        """Overrides :meth:`~.interactive_shell.close`."""
20092b648cd4SJeremy Spewock        self.stop()
201092439dc9SJeremy Spewock        self.send_command("quit", "Bye...")
20112b648cd4SJeremy Spewock        return super()._close()
2012c89d0038SJuraj Linkeš
2013c0119400SJuraj Linkeš    """
2014c0119400SJuraj Linkeš    ====== Capability retrieval methods ======
2015c0119400SJuraj Linkeš    """
2016c0119400SJuraj Linkeš
2017a79884f9SJuraj Linkeš    def get_capabilities_rx_offload(
2018a79884f9SJuraj Linkeš        self,
2019a79884f9SJuraj Linkeš        supported_capabilities: MutableSet["NicCapability"],
2020a79884f9SJuraj Linkeš        unsupported_capabilities: MutableSet["NicCapability"],
2021a79884f9SJuraj Linkeš    ) -> None:
2022a79884f9SJuraj Linkeš        """Get all rx offload capabilities and divide them into supported and unsupported.
2023a79884f9SJuraj Linkeš
2024a79884f9SJuraj Linkeš        Args:
2025a79884f9SJuraj Linkeš            supported_capabilities: Supported capabilities will be added to this set.
2026a79884f9SJuraj Linkeš            unsupported_capabilities: Unsupported capabilities will be added to this set.
2027a79884f9SJuraj Linkeš        """
2028a79884f9SJuraj Linkeš        self._logger.debug("Getting rx offload capabilities.")
2029a79884f9SJuraj Linkeš        command = f"show port {self.ports[0].id} rx_offload capabilities"
2030a79884f9SJuraj Linkeš        rx_offload_capabilities_out = self.send_command(command)
2031a79884f9SJuraj Linkeš        rx_offload_capabilities = RxOffloadCapabilities.parse(rx_offload_capabilities_out)
2032a79884f9SJuraj Linkeš        self._update_capabilities_from_flag(
2033a79884f9SJuraj Linkeš            supported_capabilities,
2034a79884f9SJuraj Linkeš            unsupported_capabilities,
2035a79884f9SJuraj Linkeš            RxOffloadCapability,
2036a79884f9SJuraj Linkeš            rx_offload_capabilities.per_port | rx_offload_capabilities.per_queue,
2037a79884f9SJuraj Linkeš        )
2038a79884f9SJuraj Linkeš
2039a79884f9SJuraj Linkeš    def _update_capabilities_from_flag(
2040a79884f9SJuraj Linkeš        self,
2041a79884f9SJuraj Linkeš        supported_capabilities: MutableSet["NicCapability"],
2042a79884f9SJuraj Linkeš        unsupported_capabilities: MutableSet["NicCapability"],
2043a79884f9SJuraj Linkeš        flag_class: type[Flag],
2044a79884f9SJuraj Linkeš        supported_flags: Flag,
2045a79884f9SJuraj Linkeš    ) -> None:
2046a79884f9SJuraj Linkeš        """Divide all flags from `flag_class` into supported and unsupported."""
2047a79884f9SJuraj Linkeš        for flag in flag_class:
2048a79884f9SJuraj Linkeš            if flag in supported_flags:
2049a79884f9SJuraj Linkeš                supported_capabilities.add(NicCapability[str(flag.name)])
2050a79884f9SJuraj Linkeš            else:
2051a79884f9SJuraj Linkeš                unsupported_capabilities.add(NicCapability[str(flag.name)])
2052a79884f9SJuraj Linkeš
2053c0119400SJuraj Linkeš    @requires_started_ports
2054c0119400SJuraj Linkeš    def get_capabilities_rxq_info(
2055c0119400SJuraj Linkeš        self,
2056c0119400SJuraj Linkeš        supported_capabilities: MutableSet["NicCapability"],
2057c0119400SJuraj Linkeš        unsupported_capabilities: MutableSet["NicCapability"],
2058c0119400SJuraj Linkeš    ) -> None:
2059c0119400SJuraj Linkeš        """Get all rxq capabilities and divide them into supported and unsupported.
2060c0119400SJuraj Linkeš
2061c0119400SJuraj Linkeš        Args:
2062c0119400SJuraj Linkeš            supported_capabilities: Supported capabilities will be added to this set.
2063c0119400SJuraj Linkeš            unsupported_capabilities: Unsupported capabilities will be added to this set.
2064c0119400SJuraj Linkeš        """
2065c0119400SJuraj Linkeš        self._logger.debug("Getting rxq capabilities.")
2066c0119400SJuraj Linkeš        command = f"show rxq info {self.ports[0].id} 0"
2067c0119400SJuraj Linkeš        rxq_info = TestPmdRxqInfo.parse(self.send_command(command))
2068c0119400SJuraj Linkeš        if rxq_info.rx_scattered_packets:
2069c0119400SJuraj Linkeš            supported_capabilities.add(NicCapability.SCATTERED_RX_ENABLED)
2070c0119400SJuraj Linkeš        else:
2071c0119400SJuraj Linkeš            unsupported_capabilities.add(NicCapability.SCATTERED_RX_ENABLED)
2072c0119400SJuraj Linkeš
2073d64f6ba5SJuraj Linkeš    def get_capabilities_show_port_info(
2074d64f6ba5SJuraj Linkeš        self,
2075d64f6ba5SJuraj Linkeš        supported_capabilities: MutableSet["NicCapability"],
2076d64f6ba5SJuraj Linkeš        unsupported_capabilities: MutableSet["NicCapability"],
2077d64f6ba5SJuraj Linkeš    ) -> None:
2078d64f6ba5SJuraj Linkeš        """Get all capabilities from show port info and divide them into supported and unsupported.
2079d64f6ba5SJuraj Linkeš
2080d64f6ba5SJuraj Linkeš        Args:
2081d64f6ba5SJuraj Linkeš            supported_capabilities: Supported capabilities will be added to this set.
2082d64f6ba5SJuraj Linkeš            unsupported_capabilities: Unsupported capabilities will be added to this set.
2083d64f6ba5SJuraj Linkeš        """
2084d64f6ba5SJuraj Linkeš        self._update_capabilities_from_flag(
2085d64f6ba5SJuraj Linkeš            supported_capabilities,
2086d64f6ba5SJuraj Linkeš            unsupported_capabilities,
2087d64f6ba5SJuraj Linkeš            DeviceCapabilitiesFlag,
2088d64f6ba5SJuraj Linkeš            self.ports[0].device_capabilities,
2089d64f6ba5SJuraj Linkeš        )
2090d64f6ba5SJuraj Linkeš
2091c89d0038SJuraj Linkeš
2092c89d0038SJuraj Linkešclass NicCapability(NoAliasEnum):
2093c89d0038SJuraj Linkeš    """A mapping between capability names and the associated :class:`TestPmdShell` methods.
2094c89d0038SJuraj Linkeš
2095c89d0038SJuraj Linkeš    The :class:`TestPmdShell` capability checking method executes the command that checks
2096c89d0038SJuraj Linkeš    whether the capability is supported.
2097c89d0038SJuraj Linkeš    A decorator may optionally be added to the method that will add and remove configuration
2098c89d0038SJuraj Linkeš    that's necessary to retrieve the capability support status.
2099c89d0038SJuraj Linkeš    The Enum members may be assigned the method itself or a tuple of
2100c89d0038SJuraj Linkeš    (capability_checking_method, decorator_function).
2101c89d0038SJuraj Linkeš
2102c89d0038SJuraj Linkeš    The signature of each :class:`TestPmdShell` capability checking method must be::
2103c89d0038SJuraj Linkeš
2104c89d0038SJuraj Linkeš        fn(self, supported_capabilities: MutableSet, unsupported_capabilities: MutableSet) -> None
2105c89d0038SJuraj Linkeš
2106c89d0038SJuraj Linkeš    The capability checking method must get whether a capability is supported or not
2107c89d0038SJuraj Linkeš    from a testpmd command. If multiple capabilities can be obtained from a testpmd command,
2108c89d0038SJuraj Linkeš    each should be obtained in the method. These capabilities should then
2109c89d0038SJuraj Linkeš    be added to `supported_capabilities` or `unsupported_capabilities` based on their support.
2110c89d0038SJuraj Linkeš
2111c89d0038SJuraj Linkeš    The two dictionaries are shared across all capability discovery function calls in a given
2112c0119400SJuraj Linkeš    test run so that we don't call the same function multiple times. For example, when we find
2113c0119400SJuraj Linkeš    :attr:`SCATTERED_RX_ENABLED` in :meth:`TestPmdShell.get_capabilities_rxq_info`,
2114c0119400SJuraj Linkeš    we don't go looking for it again if a different test case also needs it.
2115c89d0038SJuraj Linkeš    """
2116c89d0038SJuraj Linkeš
2117c0119400SJuraj Linkeš    #: Scattered packets Rx enabled
2118c0119400SJuraj Linkeš    SCATTERED_RX_ENABLED: TestPmdShellNicCapability = (
2119c0119400SJuraj Linkeš        TestPmdShell.get_capabilities_rxq_info,
2120c0119400SJuraj Linkeš        add_remove_mtu(9000),
2121c0119400SJuraj Linkeš    )
2122a79884f9SJuraj Linkeš    #:
2123a79884f9SJuraj Linkeš    RX_OFFLOAD_VLAN_STRIP: TestPmdShellCapabilityMethod = functools.partial(
2124a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2125a79884f9SJuraj Linkeš    )
2126a79884f9SJuraj Linkeš    #: Device supports L3 checksum offload.
2127a79884f9SJuraj Linkeš    RX_OFFLOAD_IPV4_CKSUM: TestPmdShellCapabilityMethod = functools.partial(
2128a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2129a79884f9SJuraj Linkeš    )
2130a79884f9SJuraj Linkeš    #: Device supports L4 checksum offload.
2131a79884f9SJuraj Linkeš    RX_OFFLOAD_UDP_CKSUM: TestPmdShellCapabilityMethod = functools.partial(
2132a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2133a79884f9SJuraj Linkeš    )
2134a79884f9SJuraj Linkeš    #: Device supports L4 checksum offload.
2135a79884f9SJuraj Linkeš    RX_OFFLOAD_TCP_CKSUM: TestPmdShellCapabilityMethod = functools.partial(
2136a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2137a79884f9SJuraj Linkeš    )
2138a79884f9SJuraj Linkeš    #: Device supports Large Receive Offload.
2139a79884f9SJuraj Linkeš    RX_OFFLOAD_TCP_LRO: TestPmdShellCapabilityMethod = functools.partial(
2140a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2141a79884f9SJuraj Linkeš    )
2142a79884f9SJuraj Linkeš    #: Device supports QinQ (queue in queue) offload.
2143a79884f9SJuraj Linkeš    RX_OFFLOAD_QINQ_STRIP: TestPmdShellCapabilityMethod = functools.partial(
2144a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2145a79884f9SJuraj Linkeš    )
2146a79884f9SJuraj Linkeš    #: Device supports inner packet L3 checksum.
2147a79884f9SJuraj Linkeš    RX_OFFLOAD_OUTER_IPV4_CKSUM: TestPmdShellCapabilityMethod = functools.partial(
2148a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2149a79884f9SJuraj Linkeš    )
2150a79884f9SJuraj Linkeš    #: Device supports MACsec.
2151a79884f9SJuraj Linkeš    RX_OFFLOAD_MACSEC_STRIP: TestPmdShellCapabilityMethod = functools.partial(
2152a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2153a79884f9SJuraj Linkeš    )
2154a79884f9SJuraj Linkeš    #: Device supports filtering of a VLAN Tag identifier.
2155a79884f9SJuraj Linkeš    RX_OFFLOAD_VLAN_FILTER: TestPmdShellCapabilityMethod = functools.partial(
2156a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2157a79884f9SJuraj Linkeš    )
2158a79884f9SJuraj Linkeš    #: Device supports VLAN offload.
2159a79884f9SJuraj Linkeš    RX_OFFLOAD_VLAN_EXTEND: TestPmdShellCapabilityMethod = functools.partial(
2160a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2161a79884f9SJuraj Linkeš    )
2162a79884f9SJuraj Linkeš    #: Device supports receiving segmented mbufs.
2163a79884f9SJuraj Linkeš    RX_OFFLOAD_SCATTER: TestPmdShellCapabilityMethod = functools.partial(
2164a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2165a79884f9SJuraj Linkeš    )
2166a79884f9SJuraj Linkeš    #: Device supports Timestamp.
2167a79884f9SJuraj Linkeš    RX_OFFLOAD_TIMESTAMP: TestPmdShellCapabilityMethod = functools.partial(
2168a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2169a79884f9SJuraj Linkeš    )
2170a79884f9SJuraj Linkeš    #: Device supports crypto processing while packet is received in NIC.
2171a79884f9SJuraj Linkeš    RX_OFFLOAD_SECURITY: TestPmdShellCapabilityMethod = functools.partial(
2172a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2173a79884f9SJuraj Linkeš    )
2174a79884f9SJuraj Linkeš    #: Device supports CRC stripping.
2175a79884f9SJuraj Linkeš    RX_OFFLOAD_KEEP_CRC: TestPmdShellCapabilityMethod = functools.partial(
2176a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2177a79884f9SJuraj Linkeš    )
2178a79884f9SJuraj Linkeš    #: Device supports L4 checksum offload.
2179a79884f9SJuraj Linkeš    RX_OFFLOAD_SCTP_CKSUM: TestPmdShellCapabilityMethod = functools.partial(
2180a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2181a79884f9SJuraj Linkeš    )
2182a79884f9SJuraj Linkeš    #: Device supports inner packet L4 checksum.
2183a79884f9SJuraj Linkeš    RX_OFFLOAD_OUTER_UDP_CKSUM: TestPmdShellCapabilityMethod = functools.partial(
2184a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2185a79884f9SJuraj Linkeš    )
2186a79884f9SJuraj Linkeš    #: Device supports RSS hashing.
2187a79884f9SJuraj Linkeš    RX_OFFLOAD_RSS_HASH: TestPmdShellCapabilityMethod = functools.partial(
2188a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2189a79884f9SJuraj Linkeš    )
2190a79884f9SJuraj Linkeš    #: Device supports scatter Rx packets to segmented mbufs.
2191a79884f9SJuraj Linkeš    RX_OFFLOAD_BUFFER_SPLIT: TestPmdShellCapabilityMethod = functools.partial(
2192a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2193a79884f9SJuraj Linkeš    )
2194a79884f9SJuraj Linkeš    #: Device supports all checksum capabilities.
2195a79884f9SJuraj Linkeš    RX_OFFLOAD_CHECKSUM: TestPmdShellCapabilityMethod = functools.partial(
2196a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2197a79884f9SJuraj Linkeš    )
2198a79884f9SJuraj Linkeš    #: Device supports all VLAN capabilities.
2199a79884f9SJuraj Linkeš    RX_OFFLOAD_VLAN: TestPmdShellCapabilityMethod = functools.partial(
2200a79884f9SJuraj Linkeš        TestPmdShell.get_capabilities_rx_offload
2201a79884f9SJuraj Linkeš    )
2202d64f6ba5SJuraj Linkeš    #: Device supports Rx queue setup after device started.
2203d64f6ba5SJuraj Linkeš    RUNTIME_RX_QUEUE_SETUP: TestPmdShellCapabilityMethod = functools.partial(
2204d64f6ba5SJuraj Linkeš        TestPmdShell.get_capabilities_show_port_info
2205d64f6ba5SJuraj Linkeš    )
2206d64f6ba5SJuraj Linkeš    #: Device supports Tx queue setup after device started.
2207d64f6ba5SJuraj Linkeš    RUNTIME_TX_QUEUE_SETUP: TestPmdShellCapabilityMethod = functools.partial(
2208d64f6ba5SJuraj Linkeš        TestPmdShell.get_capabilities_show_port_info
2209d64f6ba5SJuraj Linkeš    )
2210d64f6ba5SJuraj Linkeš    #: Device supports shared Rx queue among ports within Rx domain and switch domain.
2211d64f6ba5SJuraj Linkeš    RXQ_SHARE: TestPmdShellCapabilityMethod = functools.partial(
2212d64f6ba5SJuraj Linkeš        TestPmdShell.get_capabilities_show_port_info
2213d64f6ba5SJuraj Linkeš    )
2214d64f6ba5SJuraj Linkeš    #: Device supports keeping flow rules across restart.
2215d64f6ba5SJuraj Linkeš    FLOW_RULE_KEEP: TestPmdShellCapabilityMethod = functools.partial(
2216d64f6ba5SJuraj Linkeš        TestPmdShell.get_capabilities_show_port_info
2217d64f6ba5SJuraj Linkeš    )
2218d64f6ba5SJuraj Linkeš    #: Device supports keeping shared flow objects across restart.
2219d64f6ba5SJuraj Linkeš    FLOW_SHARED_OBJECT_KEEP: TestPmdShellCapabilityMethod = functools.partial(
2220d64f6ba5SJuraj Linkeš        TestPmdShell.get_capabilities_show_port_info
2221d64f6ba5SJuraj Linkeš    )
2222c0119400SJuraj Linkeš
2223c89d0038SJuraj Linkeš    def __call__(
2224c89d0038SJuraj Linkeš        self,
2225c89d0038SJuraj Linkeš        testpmd_shell: TestPmdShell,
2226c89d0038SJuraj Linkeš        supported_capabilities: MutableSet[Self],
2227c89d0038SJuraj Linkeš        unsupported_capabilities: MutableSet[Self],
2228c89d0038SJuraj Linkeš    ) -> None:
2229c89d0038SJuraj Linkeš        """Execute the associated capability retrieval function.
2230c89d0038SJuraj Linkeš
2231c89d0038SJuraj Linkeš        Args:
2232c89d0038SJuraj Linkeš            testpmd_shell: :class:`TestPmdShell` object to which the function will be bound to.
2233c89d0038SJuraj Linkeš            supported_capabilities: The dictionary storing the supported capabilities
2234c89d0038SJuraj Linkeš                of a given test run.
2235c89d0038SJuraj Linkeš            unsupported_capabilities: The dictionary storing the unsupported capabilities
2236c89d0038SJuraj Linkeš                of a given test run.
2237c89d0038SJuraj Linkeš        """
2238c89d0038SJuraj Linkeš        self.value(testpmd_shell, supported_capabilities, unsupported_capabilities)
2239