Imported Upstream version 16.04
[deb_dpdk.git] / app / test / test_table_combined.c
diff --git a/app/test/test_table_combined.c b/app/test/test_table_combined.c
new file mode 100644 (file)
index 0000000..acb4f4d
--- /dev/null
@@ -0,0 +1,788 @@
+/*-
+ *   BSD LICENSE
+ *
+ *   Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
+ *   All rights reserved.
+ *
+ *   Redistribution and use in source and binary forms, with or without
+ *   modification, are permitted provided that the following conditions
+ *   are met:
+ *
+ *     * Redistributions of source code must retain the above copyright
+ *       notice, this list of conditions and the following disclaimer.
+ *     * Redistributions in binary form must reproduce the above copyright
+ *       notice, this list of conditions and the following disclaimer in
+ *       the documentation and/or other materials provided with the
+ *       distribution.
+ *     * Neither the name of Intel Corporation nor the names of its
+ *       contributors may be used to endorse or promote products derived
+ *       from this software without specific prior written permission.
+ *
+ *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+ *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+ *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+ *   A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+ *   OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+ *   SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+ *   LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+ *   DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+ *   THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+ *   (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+ *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ */
+
+#include <string.h>
+#include "test_table_combined.h"
+#include "test_table.h"
+#include <rte_table_lpm_ipv6.h>
+
+#define MAX_TEST_KEYS 128
+#define N_PACKETS 50
+
+enum check_table_result {
+       CHECK_TABLE_OK,
+       CHECK_TABLE_PORT_CONFIG,
+       CHECK_TABLE_PORT_ENABLE,
+       CHECK_TABLE_TABLE_CONFIG,
+       CHECK_TABLE_ENTRY_ADD,
+       CHECK_TABLE_DEFAULT_ENTRY_ADD,
+       CHECK_TABLE_CONNECT,
+       CHECK_TABLE_MANAGE_ERROR,
+       CHECK_TABLE_CONSISTENCY,
+       CHECK_TABLE_NO_TRAFFIC,
+       CHECK_TABLE_INVALID_PARAMETER,
+};
+
+struct table_packets {
+       uint32_t hit_packet[MAX_TEST_KEYS];
+       uint32_t miss_packet[MAX_TEST_KEYS];
+       uint32_t n_hit_packets;
+       uint32_t n_miss_packets;
+};
+
+combined_table_test table_tests_combined[] = {
+       test_table_lpm_combined,
+       test_table_lpm_ipv6_combined,
+       test_table_hash8lru,
+       test_table_hash8ext,
+       test_table_hash16lru,
+       test_table_hash16ext,
+       test_table_hash32lru,
+       test_table_hash32ext,
+};
+
+unsigned n_table_tests_combined = RTE_DIM(table_tests_combined);
+
+/* Generic port tester function */
+static int
+test_table_type(struct rte_table_ops *table_ops, void *table_args,
+       void *key, struct table_packets *table_packets,
+       struct manage_ops *manage_ops, unsigned n_ops)
+{
+       uint32_t ring_in_id, table_id, ring_out_id, ring_out_2_id;
+       unsigned i;
+
+       RTE_SET_USED(manage_ops);
+       RTE_SET_USED(n_ops);
+       /* Create pipeline */
+       struct rte_pipeline_params pipeline_params = {
+               .name = "pipeline",
+               .socket_id = 0,
+       };
+
+       struct rte_pipeline *pipeline = rte_pipeline_create(&pipeline_params);
+
+       /* Create input ring */
+       struct rte_port_ring_reader_params ring_params_rx = {
+               .ring = RING_RX,
+       };
+
+       struct rte_port_ring_writer_params ring_params_tx = {
+               .ring = RING_RX,
+               .tx_burst_sz = RTE_PORT_IN_BURST_SIZE_MAX,
+       };
+
+       struct rte_pipeline_port_in_params ring_in_params = {
+               .ops = &rte_port_ring_reader_ops,
+               .arg_create = (void *)&ring_params_rx,
+               .f_action = NULL,
+               .burst_size = RTE_PORT_IN_BURST_SIZE_MAX,
+       };
+
+       if (rte_pipeline_port_in_create(pipeline, &ring_in_params,
+               &ring_in_id) != 0)
+               return -CHECK_TABLE_PORT_CONFIG;
+
+       /* Create table */
+       struct rte_pipeline_table_params table_params = {
+               .ops = table_ops,
+               .arg_create = table_args,
+               .f_action_hit = NULL,
+               .f_action_miss = NULL,
+               .arg_ah = NULL,
+               .action_data_size = 0,
+       };
+
+       if (rte_pipeline_table_create(pipeline, &table_params, &table_id) != 0)
+               return -CHECK_TABLE_TABLE_CONFIG;
+
+       /* Create output ports */
+       ring_params_tx.ring = RING_TX;
+
+       struct rte_pipeline_port_out_params ring_out_params = {
+               .ops = &rte_port_ring_writer_ops,
+               .arg_create = (void *)&ring_params_tx,
+               .f_action = NULL,
+       };
+
+       if (rte_pipeline_port_out_create(pipeline, &ring_out_params,
+               &ring_out_id) != 0)
+               return -CHECK_TABLE_PORT_CONFIG;
+
+       ring_params_tx.ring = RING_TX_2;
+
+       if (rte_pipeline_port_out_create(pipeline, &ring_out_params,
+               &ring_out_2_id) != 0)
+               return -CHECK_TABLE_PORT_CONFIG;
+
+       /* Add entry to the table */
+       struct rte_pipeline_table_entry default_entry = {
+               .action = RTE_PIPELINE_ACTION_DROP,
+               {.table_id = ring_out_id},
+       };
+
+       struct rte_pipeline_table_entry table_entry = {
+               .action = RTE_PIPELINE_ACTION_PORT,
+               {.table_id = ring_out_id},
+       };
+
+       struct rte_pipeline_table_entry *default_entry_ptr, *entry_ptr;
+
+       int key_found;
+
+       if (rte_pipeline_table_default_entry_add(pipeline, table_id,
+               &default_entry, &default_entry_ptr) != 0)
+               return -CHECK_TABLE_DEFAULT_ENTRY_ADD;
+
+       if (rte_pipeline_table_entry_add(pipeline, table_id,
+               key ? key : &table_entry, &table_entry, &key_found,
+                       &entry_ptr) != 0)
+               return -CHECK_TABLE_ENTRY_ADD;
+
+       /* Create connections and check consistency */
+       if (rte_pipeline_port_in_connect_to_table(pipeline, ring_in_id,
+               table_id) != 0)
+               return -CHECK_TABLE_CONNECT;
+
+       if (rte_pipeline_port_in_enable(pipeline, ring_in_id) != 0)
+               return -CHECK_TABLE_PORT_ENABLE;
+
+       if (rte_pipeline_check(pipeline) != 0)
+               return -CHECK_TABLE_CONSISTENCY;
+
+
+
+       /* Flow test - All hits */
+       if (table_packets->n_hit_packets) {
+               for (i = 0; i < table_packets->n_hit_packets; i++)
+                       RING_ENQUEUE(RING_RX, table_packets->hit_packet[i]);
+
+               RUN_PIPELINE(pipeline);
+
+               VERIFY_TRAFFIC(RING_TX, table_packets->n_hit_packets,
+                               table_packets->n_hit_packets);
+       }
+
+       /* Flow test - All misses */
+       if (table_packets->n_miss_packets) {
+               for (i = 0; i < table_packets->n_miss_packets; i++)
+                       RING_ENQUEUE(RING_RX, table_packets->miss_packet[i]);
+
+               RUN_PIPELINE(pipeline);
+
+               VERIFY_TRAFFIC(RING_TX, table_packets->n_miss_packets, 0);
+       }
+
+       /* Flow test - Half hits, half misses */
+       if (table_packets->n_hit_packets && table_packets->n_miss_packets) {
+               for (i = 0; i < (table_packets->n_hit_packets) / 2; i++)
+                       RING_ENQUEUE(RING_RX, table_packets->hit_packet[i]);
+
+               for (i = 0; i < (table_packets->n_miss_packets) / 2; i++)
+                       RING_ENQUEUE(RING_RX, table_packets->miss_packet[i]);
+
+               RUN_PIPELINE(pipeline);
+               VERIFY_TRAFFIC(RING_TX, table_packets->n_hit_packets,
+                       table_packets->n_hit_packets / 2);
+       }
+
+       /* Flow test - Single packet */
+       if (table_packets->n_hit_packets) {
+               RING_ENQUEUE(RING_RX, table_packets->hit_packet[0]);
+               RUN_PIPELINE(pipeline);
+               VERIFY_TRAFFIC(RING_TX, table_packets->n_hit_packets, 1);
+       }
+       if (table_packets->n_miss_packets) {
+               RING_ENQUEUE(RING_RX, table_packets->miss_packet[0]);
+               RUN_PIPELINE(pipeline);
+               VERIFY_TRAFFIC(RING_TX, table_packets->n_miss_packets, 0);
+       }
+
+
+       /* Change table entry action */
+       printf("Change entry action\n");
+       table_entry.table_id = ring_out_2_id;
+
+       if (rte_pipeline_table_default_entry_add(pipeline, table_id,
+               &default_entry, &default_entry_ptr) != 0)
+               return -CHECK_TABLE_ENTRY_ADD;
+
+       if (rte_pipeline_table_entry_add(pipeline, table_id,
+               key ? key : &table_entry, &table_entry, &key_found,
+                       &entry_ptr) != 0)
+               return -CHECK_TABLE_ENTRY_ADD;
+
+       /* Check that traffic destination has changed */
+       if (table_packets->n_hit_packets) {
+               for (i = 0; i < table_packets->n_hit_packets; i++)
+                       RING_ENQUEUE(RING_RX, table_packets->hit_packet[i]);
+
+               RUN_PIPELINE(pipeline);
+               VERIFY_TRAFFIC(RING_TX, table_packets->n_hit_packets, 0);
+               VERIFY_TRAFFIC(RING_TX_2, table_packets->n_hit_packets,
+                       table_packets->n_hit_packets);
+       }
+
+       printf("delete entry\n");
+       /* Delete table entry */
+       rte_pipeline_table_entry_delete(pipeline, table_id,
+               key ? key : &table_entry, &key_found, NULL);
+
+       rte_pipeline_free(pipeline);
+
+       return 0;
+}
+
+/* Table tests */
+int
+test_table_stub_combined(void)
+{
+       int status, i;
+       struct table_packets table_packets;
+
+       printf("--------------\n");
+       printf("RUNNING TEST - %s\n", __func__);
+       printf("--------------\n");
+       for (i = 0; i < N_PACKETS; i++)
+               table_packets.hit_packet[i] = i;
+
+       table_packets.n_hit_packets = N_PACKETS;
+       table_packets.n_miss_packets = 0;
+
+       status = test_table_type(&rte_table_stub_ops, NULL, NULL,
+               &table_packets, NULL, 1);
+       VERIFY(status, CHECK_TABLE_OK);
+
+       return 0;
+}
+
+int
+test_table_lpm_combined(void)
+{
+       int status, i;
+
+       /* Traffic flow */
+       struct rte_table_lpm_params lpm_params = {
+               .name = "LPM",
+               .n_rules = 1 << 16,
+               .number_tbl8s = 1 << 8,
+               .flags = 0,
+               .entry_unique_size = 8,
+               .offset = APP_METADATA_OFFSET(0),
+       };
+
+       struct rte_table_lpm_key lpm_key = {
+               .ip = 0xadadadad,
+               .depth = 16,
+       };
+
+       struct table_packets table_packets;
+
+       printf("--------------\n");
+       printf("RUNNING TEST - %s\n", __func__);
+       printf("--------------\n");
+
+       for (i = 0; i < N_PACKETS; i++)
+               table_packets.hit_packet[i] = 0xadadadad;
+
+       for (i = 0; i < N_PACKETS; i++)
+               table_packets.miss_packet[i] = 0xfefefefe;
+
+       table_packets.n_hit_packets = N_PACKETS;
+       table_packets.n_miss_packets = N_PACKETS;
+
+       status = test_table_type(&rte_table_lpm_ops, (void *)&lpm_params,
+               (void *)&lpm_key, &table_packets, NULL, 0);
+       VERIFY(status, CHECK_TABLE_OK);
+
+       /* Invalid parameters */
+       lpm_params.n_rules = 0;
+
+       status = test_table_type(&rte_table_lpm_ops, (void *)&lpm_params,
+               (void *)&lpm_key, &table_packets, NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       lpm_params.n_rules = 1 << 24;
+       lpm_key.depth = 0;
+
+       status = test_table_type(&rte_table_lpm_ops, (void *)&lpm_params,
+               (void *)&lpm_key, &table_packets, NULL, 0);
+       VERIFY(status, CHECK_TABLE_ENTRY_ADD);
+
+       lpm_key.depth = 33;
+
+       status = test_table_type(&rte_table_lpm_ops, (void *)&lpm_params,
+               (void *)&lpm_key, &table_packets, NULL, 0);
+       VERIFY(status, CHECK_TABLE_ENTRY_ADD);
+
+       return 0;
+}
+
+int
+test_table_lpm_ipv6_combined(void)
+{
+       int status, i;
+
+       /* Traffic flow */
+       struct rte_table_lpm_ipv6_params lpm_ipv6_params = {
+               .name = "LPM",
+               .n_rules = 1 << 16,
+               .number_tbl8s = 1 << 13,
+               .entry_unique_size = 8,
+               .offset = APP_METADATA_OFFSET(32),
+       };
+
+       struct rte_table_lpm_ipv6_key lpm_ipv6_key = {
+               .depth = 16,
+       };
+       memset(lpm_ipv6_key.ip, 0xad, 16);
+
+       struct table_packets table_packets;
+
+       printf("--------------\n");
+       printf("RUNNING TEST - %s\n", __func__);
+       printf("--------------\n");
+       for (i = 0; i < N_PACKETS; i++)
+               table_packets.hit_packet[i] = 0xadadadad;
+
+       for (i = 0; i < N_PACKETS; i++)
+               table_packets.miss_packet[i] = 0xadadadab;
+
+       table_packets.n_hit_packets = N_PACKETS;
+       table_packets.n_miss_packets = N_PACKETS;
+
+       status = test_table_type(&rte_table_lpm_ipv6_ops,
+               (void *)&lpm_ipv6_params,
+               (void *)&lpm_ipv6_key, &table_packets, NULL, 0);
+       VERIFY(status, CHECK_TABLE_OK);
+
+       /* Invalid parameters */
+       lpm_ipv6_params.n_rules = 0;
+
+       status = test_table_type(&rte_table_lpm_ipv6_ops,
+               (void *)&lpm_ipv6_params,
+               (void *)&lpm_ipv6_key, &table_packets, NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       lpm_ipv6_params.n_rules = 1 << 24;
+       lpm_ipv6_key.depth = 0;
+
+       status = test_table_type(&rte_table_lpm_ipv6_ops,
+               (void *)&lpm_ipv6_params,
+               (void *)&lpm_ipv6_key, &table_packets, NULL, 0);
+       VERIFY(status, CHECK_TABLE_ENTRY_ADD);
+
+       lpm_ipv6_key.depth = 129;
+       status = test_table_type(&rte_table_lpm_ipv6_ops,
+               (void *)&lpm_ipv6_params,
+               (void *)&lpm_ipv6_key, &table_packets, NULL, 0);
+       VERIFY(status, CHECK_TABLE_ENTRY_ADD);
+
+       return 0;
+}
+
+int
+test_table_hash8lru(void)
+{
+       int status, i;
+
+       /* Traffic flow */
+       struct rte_table_hash_key8_lru_params key8lru_params = {
+               .n_entries = 1<<24,
+               .f_hash = pipeline_test_hash,
+               .signature_offset = APP_METADATA_OFFSET(0),
+               .key_offset = APP_METADATA_OFFSET(32),
+               .key_mask = NULL,
+       };
+
+       uint8_t key8lru[8];
+       uint32_t *k8lru = (uint32_t *) key8lru;
+
+       memset(key8lru, 0, sizeof(key8lru));
+       k8lru[0] = 0xadadadad;
+
+       struct table_packets table_packets;
+
+       printf("--------------\n");
+       printf("RUNNING TEST - %s\n", __func__);
+       printf("--------------\n");
+       for (i = 0; i < 50; i++)
+               table_packets.hit_packet[i] = 0xadadadad;
+
+       for (i = 0; i < 50; i++)
+               table_packets.miss_packet[i] = 0xfefefefe;
+
+       table_packets.n_hit_packets = 50;
+       table_packets.n_miss_packets = 50;
+
+       status = test_table_type(&rte_table_hash_key8_lru_ops,
+               (void *)&key8lru_params, (void *)key8lru, &table_packets,
+                       NULL, 0);
+       VERIFY(status, CHECK_TABLE_OK);
+
+       /* Invalid parameters */
+       key8lru_params.n_entries = 0;
+
+       status = test_table_type(&rte_table_hash_key8_lru_ops,
+               (void *)&key8lru_params, (void *)key8lru, &table_packets,
+                       NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       key8lru_params.n_entries = 1<<16;
+       key8lru_params.f_hash = NULL;
+
+       status = test_table_type(&rte_table_hash_key8_lru_ops,
+               (void *)&key8lru_params, (void *)key8lru, &table_packets,
+                       NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       return 0;
+}
+
+int
+test_table_hash16lru(void)
+{
+       int status, i;
+
+       /* Traffic flow */
+       struct rte_table_hash_key16_lru_params key16lru_params = {
+               .n_entries = 1<<16,
+               .f_hash = pipeline_test_hash,
+               .seed = 0,
+               .signature_offset = APP_METADATA_OFFSET(0),
+               .key_offset = APP_METADATA_OFFSET(32),
+               .key_mask = NULL,
+       };
+
+       uint8_t key16lru[16];
+       uint32_t *k16lru = (uint32_t *) key16lru;
+
+       memset(key16lru, 0, sizeof(key16lru));
+       k16lru[0] = 0xadadadad;
+
+       struct table_packets table_packets;
+
+       printf("--------------\n");
+       printf("RUNNING TEST - %s\n", __func__);
+       printf("--------------\n");
+       for (i = 0; i < 50; i++)
+               table_packets.hit_packet[i] = 0xadadadad;
+
+       for (i = 0; i < 50; i++)
+               table_packets.miss_packet[i] = 0xfefefefe;
+
+       table_packets.n_hit_packets = 50;
+       table_packets.n_miss_packets = 50;
+
+       status = test_table_type(&rte_table_hash_key16_lru_ops,
+               (void *)&key16lru_params, (void *)key16lru, &table_packets,
+                       NULL, 0);
+       VERIFY(status, CHECK_TABLE_OK);
+
+       /* Invalid parameters */
+       key16lru_params.n_entries = 0;
+
+       status = test_table_type(&rte_table_hash_key16_lru_ops,
+               (void *)&key16lru_params, (void *)key16lru, &table_packets,
+                       NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       key16lru_params.n_entries = 1<<16;
+       key16lru_params.f_hash = NULL;
+
+       status = test_table_type(&rte_table_hash_key16_lru_ops,
+               (void *)&key16lru_params, (void *)key16lru, &table_packets,
+                       NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       return 0;
+}
+
+int
+test_table_hash32lru(void)
+{
+       int status, i;
+
+       /* Traffic flow */
+       struct rte_table_hash_key32_lru_params key32lru_params = {
+               .n_entries = 1<<16,
+               .f_hash = pipeline_test_hash,
+               .seed = 0,
+               .signature_offset = APP_METADATA_OFFSET(0),
+               .key_offset = APP_METADATA_OFFSET(32),
+       };
+
+       uint8_t key32lru[32];
+       uint32_t *k32lru = (uint32_t *) key32lru;
+
+       memset(key32lru, 0, sizeof(key32lru));
+       k32lru[0] = 0xadadadad;
+
+       struct table_packets table_packets;
+
+       printf("--------------\n");
+       printf("RUNNING TEST - %s\n", __func__);
+       printf("--------------\n");
+       for (i = 0; i < 50; i++)
+               table_packets.hit_packet[i] = 0xadadadad;
+
+       for (i = 0; i < 50; i++)
+               table_packets.miss_packet[i] = 0xbdadadad;
+
+       table_packets.n_hit_packets = 50;
+       table_packets.n_miss_packets = 50;
+
+       status = test_table_type(&rte_table_hash_key32_lru_ops,
+               (void *)&key32lru_params, (void *)key32lru, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_OK);
+
+       /* Invalid parameters */
+       key32lru_params.n_entries = 0;
+
+       status = test_table_type(&rte_table_hash_key32_lru_ops,
+               (void *)&key32lru_params, (void *)key32lru, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       key32lru_params.n_entries = 1<<16;
+       key32lru_params.f_hash = NULL;
+
+       status = test_table_type(&rte_table_hash_key32_lru_ops,
+               (void *)&key32lru_params, (void *)key32lru, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       return 0;
+}
+
+int
+test_table_hash8ext(void)
+{
+       int status, i;
+
+       /* Traffic flow */
+       struct rte_table_hash_key8_ext_params key8ext_params = {
+               .n_entries = 1<<16,
+               .n_entries_ext = 1<<15,
+               .f_hash = pipeline_test_hash,
+               .seed = 0,
+               .signature_offset = APP_METADATA_OFFSET(0),
+               .key_offset = APP_METADATA_OFFSET(32),
+               .key_mask = NULL,
+       };
+
+       uint8_t key8ext[8];
+       uint32_t *k8ext = (uint32_t *) key8ext;
+
+       memset(key8ext, 0, sizeof(key8ext));
+       k8ext[0] = 0xadadadad;
+
+       struct table_packets table_packets;
+
+       printf("--------------\n");
+       printf("RUNNING TEST - %s\n", __func__);
+       printf("--------------\n");
+       for (i = 0; i < 50; i++)
+               table_packets.hit_packet[i] = 0xadadadad;
+
+       for (i = 0; i < 50; i++)
+               table_packets.miss_packet[i] = 0xbdadadad;
+
+       table_packets.n_hit_packets = 50;
+       table_packets.n_miss_packets = 50;
+
+       status = test_table_type(&rte_table_hash_key8_ext_ops,
+               (void *)&key8ext_params, (void *)key8ext, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_OK);
+
+       /* Invalid parameters */
+       key8ext_params.n_entries = 0;
+
+       status = test_table_type(&rte_table_hash_key8_ext_ops,
+               (void *)&key8ext_params, (void *)key8ext, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       key8ext_params.n_entries = 1<<16;
+       key8ext_params.f_hash = NULL;
+
+       status = test_table_type(&rte_table_hash_key8_ext_ops,
+               (void *)&key8ext_params, (void *)key8ext, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       key8ext_params.f_hash = pipeline_test_hash;
+       key8ext_params.n_entries_ext = 0;
+
+       status = test_table_type(&rte_table_hash_key8_ext_ops,
+       (void *)&key8ext_params, (void *)key8ext, &table_packets, NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       return 0;
+}
+
+int
+test_table_hash16ext(void)
+{
+       int status, i;
+
+       /* Traffic flow */
+       struct rte_table_hash_key16_ext_params key16ext_params = {
+               .n_entries = 1<<16,
+               .n_entries_ext = 1<<15,
+               .f_hash = pipeline_test_hash,
+               .seed = 0,
+               .signature_offset = APP_METADATA_OFFSET(0),
+               .key_offset = APP_METADATA_OFFSET(32),
+               .key_mask = NULL,
+       };
+
+       uint8_t key16ext[16];
+       uint32_t *k16ext = (uint32_t *) key16ext;
+
+       memset(key16ext, 0, sizeof(key16ext));
+       k16ext[0] = 0xadadadad;
+
+       struct table_packets table_packets;
+
+       printf("--------------\n");
+       printf("RUNNING TEST - %s\n", __func__);
+       printf("--------------\n");
+       for (i = 0; i < 50; i++)
+               table_packets.hit_packet[i] = 0xadadadad;
+
+       for (i = 0; i < 50; i++)
+               table_packets.miss_packet[i] = 0xbdadadad;
+
+       table_packets.n_hit_packets = 50;
+       table_packets.n_miss_packets = 50;
+
+       status = test_table_type(&rte_table_hash_key16_ext_ops,
+               (void *)&key16ext_params, (void *)key16ext, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_OK);
+
+       /* Invalid parameters */
+       key16ext_params.n_entries = 0;
+
+       status = test_table_type(&rte_table_hash_key16_ext_ops,
+               (void *)&key16ext_params, (void *)key16ext, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       key16ext_params.n_entries = 1<<16;
+       key16ext_params.f_hash = NULL;
+
+       status = test_table_type(&rte_table_hash_key16_ext_ops,
+               (void *)&key16ext_params, (void *)key16ext, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       key16ext_params.f_hash = pipeline_test_hash;
+       key16ext_params.n_entries_ext = 0;
+
+       status = test_table_type(&rte_table_hash_key16_ext_ops,
+       (void *)&key16ext_params, (void *)key16ext, &table_packets, NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       return 0;
+}
+
+int
+test_table_hash32ext(void)
+{
+       int status, i;
+
+       /* Traffic flow */
+       struct rte_table_hash_key32_ext_params key32ext_params = {
+               .n_entries = 1<<16,
+               .n_entries_ext = 1<<15,
+               .f_hash = pipeline_test_hash,
+               .seed = 0,
+               .signature_offset = APP_METADATA_OFFSET(0),
+               .key_offset = APP_METADATA_OFFSET(32),
+       };
+
+       uint8_t key32ext[32];
+       uint32_t *k32ext = (uint32_t *) key32ext;
+
+       memset(key32ext, 0, sizeof(key32ext));
+       k32ext[0] = 0xadadadad;
+
+       struct table_packets table_packets;
+
+       printf("--------------\n");
+       printf("RUNNING TEST - %s\n", __func__);
+       printf("--------------\n");
+       for (i = 0; i < 50; i++)
+               table_packets.hit_packet[i] = 0xadadadad;
+
+       for (i = 0; i < 50; i++)
+               table_packets.miss_packet[i] = 0xbdadadad;
+
+       table_packets.n_hit_packets = 50;
+       table_packets.n_miss_packets = 50;
+
+       status = test_table_type(&rte_table_hash_key32_ext_ops,
+               (void *)&key32ext_params, (void *)key32ext, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_OK);
+
+       /* Invalid parameters */
+       key32ext_params.n_entries = 0;
+
+       status = test_table_type(&rte_table_hash_key32_ext_ops,
+               (void *)&key32ext_params, (void *)key32ext, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       key32ext_params.n_entries = 1<<16;
+       key32ext_params.f_hash = NULL;
+
+       status = test_table_type(&rte_table_hash_key32_ext_ops,
+               (void *)&key32ext_params, (void *)key32ext, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       key32ext_params.f_hash = pipeline_test_hash;
+       key32ext_params.n_entries_ext = 0;
+
+       status = test_table_type(&rte_table_hash_key32_ext_ops,
+               (void *)&key32ext_params, (void *)key32ext, &table_packets,
+               NULL, 0);
+       VERIFY(status, CHECK_TABLE_TABLE_CONFIG);
+
+       return 0;
+}