test suite reviews and discussions
 help / color / mirror / Atom feed
* [dts] [PATCH V1] tests/ipgre: optimize script
@ 2019-09-06 18:42 Wenjie Li
  2019-09-09  2:36 ` Zhang, YanX A
  2019-09-18 10:34 ` Tu, Lijuan
  0 siblings, 2 replies; 3+ messages in thread
From: Wenjie Li @ 2019-09-06 18:42 UTC (permalink / raw)
  To: dts; +Cc: Wenjie Li

1. could support cvl nic, add cvl to nic list
2. move dut.kill_all from tear_down_all to tear_down, since testpmd will
be started in every case, if one case is failed, the testpmd is still
runnning, this will affect the following cases.

Signed-off-by: Wenjie Li <wenjiex.a.li@intel.com>
---
 tests/TestSuite_ipgre.py | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/tests/TestSuite_ipgre.py b/tests/TestSuite_ipgre.py
index 7fbddf1..e10b0e0 100644
--- a/tests/TestSuite_ipgre.py
+++ b/tests/TestSuite_ipgre.py
@@ -63,7 +63,7 @@ class TestIpgre(TestCase):
         """
         self.printFlag = self._enable_debug
         ports = self.dut.get_ports()
-        self.verify(self.nic in ["fortville_eagle", "fortville_spirit", "fortville_spirit_single", "fortville_25g", "carlsville"],
+        self.verify(self.nic in ["fortville_eagle", "fortville_spirit", "fortville_spirit_single", "fortville_25g", "carlsville", "columbiaville_25g", "columbiaville_100g"],
                     "GRE tunnel packet type only support by fortville and carlsville")
         self.verify(len(ports) >= 1, "Insufficient ports for testing")
         valports = [_ for _ in ports if self.tester.get_local_port(_) != -1]
@@ -439,12 +439,11 @@ class TestIpgre(TestCase):
         Run after each test case.
         Nothing to do.
         """
-        pass
+        self.dut.kill_all()
 
     def tear_down_all(self):
         """
         Run after each test suite.
         Nothing to do.
         """
-        self.dut.kill_all()
         pass
-- 
2.17.1


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [dts] [PATCH V1] tests/ipgre: optimize script
  2019-09-06 18:42 [dts] [PATCH V1] tests/ipgre: optimize script Wenjie Li
@ 2019-09-09  2:36 ` Zhang, YanX A
  2019-09-18 10:34 ` Tu, Lijuan
  1 sibling, 0 replies; 3+ messages in thread
From: Zhang, YanX A @ 2019-09-09  2:36 UTC (permalink / raw)
  To: Li, WenjieX A, dts; +Cc: Li, WenjieX A

[-- Attachment #1: Type: text/plain, Size: 1969 bytes --]

Tested-by:  Zhang, YanX A <yanx.a.zhang@intel.com>

Notes: One case failed due to a bug. The bug ID is 15071

-----Original Message-----
From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Wenjie Li
Sent: Saturday, September 7, 2019 2:43 AM
To: dts@dpdk.org
Cc: Li, WenjieX A <wenjiex.a.li@intel.com>
Subject: [dts] [PATCH V1] tests/ipgre: optimize script

1. could support cvl nic, add cvl to nic list 2. move dut.kill_all from tear_down_all to tear_down, since testpmd will be started in every case, if one case is failed, the testpmd is still runnning, this will affect the following cases.

Signed-off-by: Wenjie Li <wenjiex.a.li@intel.com>
---
 tests/TestSuite_ipgre.py | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/tests/TestSuite_ipgre.py b/tests/TestSuite_ipgre.py index 7fbddf1..e10b0e0 100644
--- a/tests/TestSuite_ipgre.py
+++ b/tests/TestSuite_ipgre.py
@@ -63,7 +63,7 @@ class TestIpgre(TestCase):
         """
         self.printFlag = self._enable_debug
         ports = self.dut.get_ports()
-        self.verify(self.nic in ["fortville_eagle", "fortville_spirit", "fortville_spirit_single", "fortville_25g", "carlsville"],
+        self.verify(self.nic in ["fortville_eagle", "fortville_spirit", 
+ "fortville_spirit_single", "fortville_25g", "carlsville", 
+ "columbiaville_25g", "columbiaville_100g"],
                     "GRE tunnel packet type only support by fortville and carlsville")
         self.verify(len(ports) >= 1, "Insufficient ports for testing")
         valports = [_ for _ in ports if self.tester.get_local_port(_) != -1] @@ -439,12 +439,11 @@ class TestIpgre(TestCase):
         Run after each test case.
         Nothing to do.
         """
-        pass
+        self.dut.kill_all()
 
     def tear_down_all(self):
         """
         Run after each test suite.
         Nothing to do.
         """
-        self.dut.kill_all()
         pass
--
2.17.1


[-- Attachment #2: TestIpgre.log --]
[-- Type: application/octet-stream, Size: 85292 bytes --]

09/09/2019 11:12:24                            dts: 
TEST SUITE : TestIpgre
09/09/2019 11:12:24                            dts: NIC :        columbiaville_25g
09/09/2019 11:12:24              dut.10.238.54.215: 
09/09/2019 11:12:24                         tester: 
09/09/2019 11:12:24                      TestIpgre: Test Case test_GRE_ipv4_packet_detect Begin
09/09/2019 11:12:24              dut.10.238.54.215: 
09/09/2019 11:12:24                         tester: 
09/09/2019 11:12:24              dut.10.238.54.215: ./x86_64-native-linuxapp-gcc/app/testpmd -c ffff -n 4 -- -i --enable-rx-cksum --enable-rx-cksum
09/09/2019 11:12:36              dut.10.238.54.215: EAL: Detected 96 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/rte/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL: PCI device 0000:00:04.0 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.1 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.2 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.3 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.4 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.5 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.6 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.7 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:1a:00.0 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:1a:00.1 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:1a:00.2 on NUMA socket 0
EAL:   probe driver: 8086:37d3 net_i40e
EAL: PCI device 0000:1a:00.3 on NUMA socket 0
EAL:   probe driver: 8086:37d3 net_i40e
EAL: PCI device 0000:60:00.0 on NUMA socket 0
EAL:   probe driver: 8086:10fb net_ixgbe
EAL: PCI device 0000:60:00.1 on NUMA socket 0
EAL:   probe driver: 8086:10fb net_ixgbe
EAL: PCI device 0000:80:04.0 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.1 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.2 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.3 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.4 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.5 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.6 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.7 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:86:00.0 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL:   using IOMMU type 1 (Type 1)
EAL: PCI device 0000:86:00.1 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL: PCI device 0000:86:00.2 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL: PCI device 0000:86:00.3 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=267456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=267456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc
Configuring Port 0 (socket 1)
Port 0: 00:00:00:00:01:00
Configuring Port 1 (socket 1)
Port 1: 00:00:00:00:01:01
Configuring Port 2 (socket 1)
Port 2: 00:00:00:00:01:02
Configuring Port 3 (socket 1)
Port 3: 00:00:00:00:01:03
Checking link statuses...
Done
09/09/2019 11:12:36              dut.10.238.54.215: set fwd rxonly
09/09/2019 11:12:36              dut.10.238.54.215: set fwd rxonly
Set rxonly packet forwarding mode
09/09/2019 11:12:36              dut.10.238.54.215: set verbose 1
09/09/2019 11:12:36              dut.10.238.54.215: set verbose 1
Change verbose level from 0 to 1
09/09/2019 11:12:36              dut.10.238.54.215: start
09/09/2019 11:12:36              dut.10.238.54.215: start
rxonly packet forwarding - ports=4 - cores=1 - streams=4 - NUMA support enabled, MP allocation mode: native
Logical Core 1 (socket 0) forwards packets on 4 streams:
  RX P=0/Q=0 (socket 1) -> TX P=1/Q=0 (socket 1) peer=02:00:00:00:00:01
  RX P=1/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00
  RX P=2/Q=0 (socket 1) -> TX P=3/Q=0 (socket 1) peer=02:00:00:00:00:03
  RX P=3/Q=0 (socket 1) -> TX P=2/Q=0 (socket 1) peer=02:00:00:00:00:02

  rxonly packet forwarding packets/burst=32
  nb forwarding cores=1 - nb forwarding ports=4
  port 0: RX queue number: 1 Tx queue number: 1
    Rx offloads=0xe Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
  port 1: RX queue number: 1 Tx queue number: 1
    Rx offloads=0xe Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
  port 2: RX queue number: 1 Tx queue number: 1
    Rx offloads=0xe Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
  port 3: RX queue number: 1 Tx queue number: 1
    Rx offloads=0xe Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
09/09/2019 11:12:42                         tester: Ether(src='00:00:10:00:00:00', dst='ff:ff:ff:ff:ff:ff')/Dot1Q()/IP(frag=0, src='127.0.0.1', proto=47, tos=0, dst='127.0.0.1', id=1, version=4, ttl=64)/GRE()/IP()/SCTP()/Raw(load='')
09/09/2019 11:12:45              dut.10.238.54.215:  port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=74 - nb_segs=1 - RSS hash=0x74ad1df3 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=74 - nb_segs=1 - RSS hash=0x74ad1df3 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=74 - nb_segs=1 - RSS hash=0x74ad1df3 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=74 - nb_segs=1 - RSS hash=0x74ad1df3 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

09/09/2019 11:12:53                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:13:01                         tester: Ether(src='00:00:10:00:00:00', dst='ff:ff:ff:ff:ff:ff')/IP(frag=0, src='127.0.0.1', proto=47, tos=0, dst='127.0.0.1', id=1, version=4, ttl=64)/GRE()/IP()/TCP()/Raw(load='')
09/09/2019 11:13:03              dut.10.238.54.215: port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=78 - nb_segs=1 - RSS hash=0x579b5cb - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=78 - nb_segs=1 - RSS hash=0x579b5cb - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=78 - nb_segs=1 - RSS hash=0x579b5cb - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=78 - nb_segs=1 - RSS hash=0x579b5cb - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

09/09/2019 11:13:11                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:13:19                         tester: Ether(src='00:00:10:00:00:00', dst='ff:ff:ff:ff:ff:ff')/Dot1Q()/IP(frag=0, src='127.0.0.1', proto=47, tos=0, dst='127.0.0.1', id=1, version=4, ttl=64)/GRE()/IP()/TCP()/Raw(load='')
09/09/2019 11:13:21              dut.10.238.54.215: port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=82 - nb_segs=1 - RSS hash=0x579b5cb - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=82 - nb_segs=1 - RSS hash=0x579b5cb - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=82 - nb_segs=1 - RSS hash=0x579b5cb - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=82 - nb_segs=1 - RSS hash=0x579b5cb - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

09/09/2019 11:13:30                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:13:38                         tester: Ether(src='00:00:10:00:00:00', dst='ff:ff:ff:ff:ff:ff')/IP(frag=0, src='127.0.0.1', proto=47, tos=0, dst='127.0.0.1', id=1, version=4, ttl=64)/GRE()/IP()/UDP()/Raw(load='')
09/09/2019 11:13:40              dut.10.238.54.215: port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x4f2afc67 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x4f2afc67 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x4f2afc67 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x4f2afc67 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

09/09/2019 11:13:48                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:13:56                         tester: Ether(src='00:00:10:00:00:00', dst='ff:ff:ff:ff:ff:ff')/Dot1Q()/IP(frag=0, src='127.0.0.1', proto=47, tos=0, dst='127.0.0.1', id=1, version=4, ttl=64)/GRE()/IP()/UDP()/Raw(load='')
09/09/2019 11:13:58              dut.10.238.54.215: port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=70 - nb_segs=1 - RSS hash=0x4f2afc67 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=70 - nb_segs=1 - RSS hash=0x4f2afc67 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=70 - nb_segs=1 - RSS hash=0x4f2afc67 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x8100 - length=70 - nb_segs=1 - RSS hash=0x4f2afc67 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER_VLAN L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=18 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

09/09/2019 11:14:07                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:14:15                         tester: Ether(src='00:00:10:00:00:00', dst='ff:ff:ff:ff:ff:ff')/IP(frag=0, src='127.0.0.1', proto=47, tos=0, dst='127.0.0.1', id=1, version=4, ttl=64)/GRE()/IP()/SCTP()/Raw(load='')
09/09/2019 11:14:17              dut.10.238.54.215: port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=70 - nb_segs=1 - RSS hash=0x74ad1df3 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=70 - nb_segs=1 - RSS hash=0x74ad1df3 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=70 - nb_segs=1 - RSS hash=0x74ad1df3 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=70 - nb_segs=1 - RSS hash=0x74ad1df3 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

09/09/2019 11:14:25                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:14:28              dut.10.238.54.215: quit
09/09/2019 11:14:32              dut.10.238.54.215: quit
Telling cores to stop...
Waiting for lcores to finish...

  ---------------------- Forward statistics for port 0  ----------------------
  RX-packets: 24             RX-dropped: 0             RX-total: 24
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  ---------------------- Forward statistics for port 1  ----------------------
  RX-packets: 0              RX-dropped: 0             RX-total: 0
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  ---------------------- Forward statistics for port 2  ----------------------
  RX-packets: 0              RX-dropped: 0             RX-total: 0
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  ---------------------- Forward statistics for port 3  ----------------------
  RX-packets: 0              RX-dropped: 0             RX-total: 0
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  +++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
  RX-packets: 24             RX-dropped: 0             RX-total: 24
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Done.

Stopping port 0...
Stopping ports...
Done

Stopping port 1...
Stopping ports...
Done

Stopping port 2...
Stopping ports...
Done

Stopping port 3...
Stopping ports...
Done

Shutting down port 0...
Closing ports...
Done

Shutting down port 1...
Closing ports...
Done

Shutting down port 2...
Closing ports...
Done

Shutting down port 3...
Closing ports...
Done

Bye...
09/09/2019 11:14:32                      TestIpgre: Test Case test_GRE_ipv4_packet_detect Result PASSED:
09/09/2019 11:14:32                      TestIpgre: Test Case test_GRE_ipv6_packet_detect Begin
09/09/2019 11:14:32              dut.10.238.54.215:  
09/09/2019 11:14:32                         tester: 
09/09/2019 11:14:32              dut.10.238.54.215: ./x86_64-native-linuxapp-gcc/app/testpmd -c ffff -n 4 -- -i --enable-rx-cksum --enable-hw-vlan
09/09/2019 11:14:44              dut.10.238.54.215: EAL: Detected 96 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/rte/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL: PCI device 0000:00:04.0 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.1 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.2 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.3 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.4 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.5 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.6 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.7 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:1a:00.0 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:1a:00.1 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:1a:00.2 on NUMA socket 0
EAL:   probe driver: 8086:37d3 net_i40e
EAL: PCI device 0000:1a:00.3 on NUMA socket 0
EAL:   probe driver: 8086:37d3 net_i40e
EAL: PCI device 0000:60:00.0 on NUMA socket 0
EAL:   probe driver: 8086:10fb net_ixgbe
EAL: PCI device 0000:60:00.1 on NUMA socket 0
EAL:   probe driver: 8086:10fb net_ixgbe
EAL: PCI device 0000:80:04.0 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.1 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.2 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.3 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.4 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.5 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.6 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.7 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:86:00.0 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL:   using IOMMU type 1 (Type 1)
EAL: PCI device 0000:86:00.1 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL: PCI device 0000:86:00.2 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL: PCI device 0000:86:00.3 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=267456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=267456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc
Configuring Port 0 (socket 1)
Port 0: 00:00:00:00:01:00
Configuring Port 1 (socket 1)
Port 1: 00:00:00:00:01:01
Configuring Port 2 (socket 1)
Port 2: 00:00:00:00:01:02
Configuring Port 3 (socket 1)
Port 3: 00:00:00:00:01:03
Checking link statuses...
Done
09/09/2019 11:14:44              dut.10.238.54.215: set fwd rxonly
09/09/2019 11:14:44              dut.10.238.54.215: set fwd rxonly
Set rxonly packet forwarding mode
09/09/2019 11:14:44              dut.10.238.54.215: set verbose 1
09/09/2019 11:14:44              dut.10.238.54.215: set verbose 1
Change verbose level from 0 to 1
09/09/2019 11:14:44              dut.10.238.54.215: start
09/09/2019 11:14:44              dut.10.238.54.215: start
rxonly packet forwarding - ports=4 - cores=1 - streams=4 - NUMA support enabled, MP allocation mode: native
Logical Core 1 (socket 0) forwards packets on 4 streams:
  RX P=0/Q=0 (socket 1) -> TX P=1/Q=0 (socket 1) peer=02:00:00:00:00:01
  RX P=1/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00
  RX P=2/Q=0 (socket 1) -> TX P=3/Q=0 (socket 1) peer=02:00:00:00:00:03
  RX P=3/Q=0 (socket 1) -> TX P=2/Q=0 (socket 1) peer=02:00:00:00:00:02

  rxonly packet forwarding packets/burst=32
  nb forwarding cores=1 - nb forwarding ports=4
  port 0: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x62f Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0x62f
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
  port 1: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x62f Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0x62f
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
  port 2: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x62f Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0x62f
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
  port 3: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x62f Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0x62f
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
09/09/2019 11:14:50                         tester: Ether(src='00:00:10:00:00:00', dst='ff:ff:ff:ff:ff:ff')/IPv6(nh=47, src='::1', dst='::1', version=6, fl=0, tc=0)/GRE()/IP()/UDP()/Raw(load='xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
09/09/2019 11:14:52              dut.10.238.54.215:  port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0x52152f87 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0x52152f87 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0x52152f87 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0x52152f87 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

09/09/2019 11:15:01                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:15:09                         tester: Ether(src='00:00:10:00:00:00', dst='ff:ff:ff:ff:ff:ff')/IPv6(nh=47, src='::1', dst='::1', version=6, fl=0, tc=0)/GRE()/IP()/TCP()/Raw(load='xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
09/09/2019 11:15:11              dut.10.238.54.215: port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x86dd - length=138 - nb_segs=1 - RSS hash=0xcc649e77 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x86dd - length=138 - nb_segs=1 - RSS hash=0xcc649e77 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x86dd - length=138 - nb_segs=1 - RSS hash=0xcc649e77 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x86dd - length=138 - nb_segs=1 - RSS hash=0xcc649e77 - RSS queue=0x0 - hw ptype: L2_ETHER L3_IPV6_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

09/09/2019 11:15:19                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:15:27                         tester: Ether(src='00:00:10:00:00:00', dst='ff:ff:ff:ff:ff:ff')/Dot1Q()/IPv6(nh=47, src='::1', dst='::1', version=6, fl=0, tc=0)/GRE()/IP()/TCP()/Raw(load='xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
09/09/2019 11:15:29              dut.10.238.54.215: 
09/09/2019 11:15:37                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:15:39                      TestIpgre: Test Case test_GRE_ipv6_packet_detect Result FAILED: 'Failed to detect TUNNEL_GRENAT'
09/09/2019 11:15:41              dut.10.238.54.215: 
09/09/2019 11:15:42                      TestIpgre: Test Case test_GRE_packet_chksum_offload Begin
09/09/2019 11:15:42              dut.10.238.54.215: 
09/09/2019 11:15:42                         tester: 
09/09/2019 11:15:42              dut.10.238.54.215: ./x86_64-native-linuxapp-gcc/app/testpmd -c ff -n 3 -- -i --enable-rx-cksum --port-topology=loop
09/09/2019 11:15:54              dut.10.238.54.215: Killed
[PEXPECT]# EAL: Detected 96 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/rte/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL: PCI device 0000:00:04.0 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.1 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.2 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.3 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.4 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.5 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.6 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.7 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:1a:00.0 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:1a:00.1 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:1a:00.2 on NUMA socket 0
EAL:   probe driver: 8086:37d3 net_i40e
EAL: PCI device 0000:1a:00.3 on NUMA socket 0
EAL:   probe driver: 8086:37d3 net_i40e
EAL: PCI device 0000:60:00.0 on NUMA socket 0
EAL:   probe driver: 8086:10fb net_ixgbe
EAL: PCI device 0000:60:00.1 on NUMA socket 0
EAL:   probe driver: 8086:10fb net_ixgbe
EAL: PCI device 0000:80:04.0 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.1 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.2 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.3 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.4 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.5 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.6 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.7 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:86:00.0 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL:   using IOMMU type 1 (Type 1)
EAL: PCI device 0000:86:00.1 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL: PCI device 0000:86:00.2 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL: PCI device 0000:86:00.3 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=203456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=203456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc
Configuring Port 0 (socket 1)
Port 0: 00:00:00:00:01:00
Configuring Port 1 (socket 1)
Port 1: 00:00:00:00:01:01
Configuring Port 2 (socket 1)
Port 2: 00:00:00:00:01:02
Configuring Port 3 (socket 1)
Port 3: 00:00:00:00:01:03
Checking link statuses...
Done
09/09/2019 11:15:54              dut.10.238.54.215: set verbose 1
09/09/2019 11:15:54              dut.10.238.54.215: set verbose 1
Change verbose level from 0 to 1
09/09/2019 11:15:54              dut.10.238.54.215: set fwd csum
09/09/2019 11:15:54              dut.10.238.54.215: set fwd csum
Set csum packet forwarding mode
09/09/2019 11:15:54              dut.10.238.54.215: stop
09/09/2019 11:15:54              dut.10.238.54.215: stop
Packet forwarding not started
09/09/2019 11:15:54              dut.10.238.54.215: port stop all
09/09/2019 11:15:54              dut.10.238.54.215: port stop all
Stopping ports...
Checking link statuses...
Done
09/09/2019 11:15:54              dut.10.238.54.215: csum set ip hw 0
09/09/2019 11:15:54              dut.10.238.54.215: csum set ip hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is sw
TCP checksum offload is sw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
09/09/2019 11:15:54              dut.10.238.54.215: csum set udp hw 0
09/09/2019 11:15:55              dut.10.238.54.215: csum set udp hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is hw
TCP checksum offload is sw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
09/09/2019 11:15:55              dut.10.238.54.215: csum set sctp hw 0
09/09/2019 11:15:55              dut.10.238.54.215: csum set sctp hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is hw
TCP checksum offload is sw
SCTP checksum offload is hw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
09/09/2019 11:15:55              dut.10.238.54.215: csum set outer-ip hw 0
09/09/2019 11:15:55              dut.10.238.54.215: csum set outer-ip hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is hw
TCP checksum offload is sw
SCTP checksum offload is hw
Outer-Ip checksum offload is hw
Outer-Udp checksum offload is sw
09/09/2019 11:15:55              dut.10.238.54.215: csum set tcp hw 0
09/09/2019 11:15:55              dut.10.238.54.215: csum set tcp hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is hw
TCP checksum offload is hw
SCTP checksum offload is hw
Outer-Ip checksum offload is hw
Outer-Udp checksum offload is sw
09/09/2019 11:15:55              dut.10.238.54.215: csum parse-tunnel on 0
09/09/2019 11:15:55              dut.10.238.54.215: csum parse-tunnel on 0
Parse tunnel is on
IP checksum offload is hw
UDP checksum offload is hw
TCP checksum offload is hw
SCTP checksum offload is hw
Outer-Ip checksum offload is hw
Outer-Udp checksum offload is sw
09/09/2019 11:15:55              dut.10.238.54.215: port start all
09/09/2019 11:15:55              dut.10.238.54.215: port start all
Configuring Port 0 (socket 1)
Port 0: 00:00:00:00:01:00
Port 1: 00:00:00:00:01:01
Port 2: 00:00:00:00:01:02
Port 3: 00:00:00:00:01:03
Checking link statuses...
Done
09/09/2019 11:15:55              dut.10.238.54.215: start
09/09/2019 11:15:55              dut.10.238.54.215: start
csum packet forwarding - ports=4 - cores=1 - streams=4 - NUMA support enabled, MP allocation mode: native
Logical Core 1 (socket 0) forwards packets on 4 streams:
  RX P=0/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00
  RX P=1/Q=0 (socket 1) -> TX P=1/Q=0 (socket 1) peer=02:00:00:00:00:01
  RX P=2/Q=0 (socket 1) -> TX P=2/Q=0 (socket 1) peer=02:00:00:00:00:02
  RX P=3/Q=0 (socket 1) -> TX P=3/Q=0 (socket 1) peer=02:00:00:00:00:03

  csum packet forwarding packets/burst=32
  nb forwarding cores=1 - nb forwarding ports=4
  port 0: RX queue number: 1 Tx queue number: 1
    Rx offloads=0xe Tx offloads=0x1009e
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x1009e - TX RS bit threshold=32
  port 1: RX queue number: 1 Tx queue number: 1
    Rx offloads=0xe Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
  port 2: RX queue number: 1 Tx queue number: 1
    Rx offloads=0xe Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
  port 3: RX queue number: 1 Tx queue number: 1
    Rx offloads=0xe Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
09/09/2019 11:16:02                         tester: Ether(src='00:00:10:00:00:00', dst='11:22:33:44:55:66')/IP(frag=0, src='192.168.1.1', proto=47, tos=0, dst='192.168.1.2', id=1, version=4, ttl=64)/GRE()/IP(frag=0, src='192.168.2.1', tos=0, dst='192.168.2.2', ttl=64, id=1, version=4, chksum=0)/TCP()/Raw(load='')
09/09/2019 11:16:04              dut.10.238.54.215:  port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a6cf80, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a6d8c0, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a6e200, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a6eb40, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 

09/09/2019 11:16:36                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:16:39                      TestIpgre: chksums_ref :: {'inner_tcp': '0xa2b', 'inner_ip': '0xf57b'}
09/09/2019 11:16:39                      TestIpgre: chksums :: {'inner_tcp': '0xa2b', 'inner_ip': '0xf57b'}
09/09/2019 11:16:46                         tester: Ether(src='00:00:10:00:00:00', dst='11:22:33:44:55:66')/IP(frag=0, src='192.168.1.1', proto=47, tos=0, dst='192.168.1.2', ttl=64, id=1, version=4, chksum=0)/GRE()/IP(frag=0, src='192.168.2.1', tos=0, dst='192.168.2.2', id=1, version=4, ttl=64)/TCP()/Raw(load='')
09/09/2019 11:16:48              dut.10.238.54.215: port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_GOOD PKT_RX_EIP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a6f480, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_GOOD PKT_RX_EIP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_GOOD PKT_RX_EIP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a6fdc0, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_GOOD PKT_RX_EIP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_GOOD PKT_RX_EIP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a70700, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_GOOD PKT_RX_EIP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_GOOD PKT_RX_EIP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a71040, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_UNKNOWN PKT_RX_IP_CKSUM_GOOD PKT_RX_EIP_CKSUM_BAD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 

09/09/2019 11:17:21                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:17:24                      TestIpgre: chksums_ref :: {'inner_tcp': '0xa2b', 'inner_ip': '0xf57b'}
09/09/2019 11:17:24                      TestIpgre: chksums :: {'inner_tcp': '0xa2b', 'inner_ip': '0xf57b'}
09/09/2019 11:17:31                         tester: Ether(src='00:00:10:00:00:00', dst='11:22:33:44:55:66')/IP(frag=0, src='192.168.1.1', proto=47, tos=0, dst='192.168.1.2', id=1, version=4, ttl=64)/GRE()/IP(frag=0, src='192.168.2.1', tos=0, dst='192.168.2.2', id=1, version=4, ttl=64)/TCP(dport=53, sport=53, chksum=0)/Raw(load='')
09/09/2019 11:17:33              dut.10.238.54.215: port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a71980, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a722c0, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a72c00, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=78 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_TCP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a73540, pkt_len=78, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=6 l4_len=20 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=20
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_TCP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 

09/09/2019 11:18:05                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:18:08                      TestIpgre: chksums_ref :: {'inner_tcp': '0xa25', 'inner_ip': '0xf57b'}
09/09/2019 11:18:08                      TestIpgre: chksums :: {'inner_tcp': '0xa25', 'inner_ip': '0xf57b'}
09/09/2019 11:18:15                         tester: Ether(src='00:00:10:00:00:00', dst='11:22:33:44:55:66')/IP(frag=0, src='192.168.1.1', proto=47, tos=0, dst='192.168.1.2', id=1, version=4, ttl=64)/GRE()/IP(frag=0, src='192.168.2.1', tos=0, dst='192.168.2.2', id=1, version=4, ttl=64)/UDP(dport=53, sport=53, chksum=65535)/Raw(load='')
09/09/2019 11:18:17              dut.10.238.54.215: port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=66 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a73e80, pkt_len=66, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=17 l4_len=8 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=8
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_UDP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=66 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a747c0, pkt_len=66, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=17 l4_len=8 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=8
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_UDP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=66 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a75100, pkt_len=66, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=17 l4_len=8 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=8
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_UDP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=66 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a75a40, pkt_len=66, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=17 l4_len=8 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=8
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_UDP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 

09/09/2019 11:18:49                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:18:52                      TestIpgre: chksums_ref :: {'inner_ip': '0xf57c', 'inner_udp': '0x7a20'}
09/09/2019 11:18:52                      TestIpgre: chksums :: {'inner_ip': '0xf57c', 'inner_udp': '0x7a20'}
09/09/2019 11:18:59                         tester: Ether(src='00:00:10:00:00:00', dst='11:22:33:44:55:66')/IP(frag=0, src='192.168.1.1', proto=47, tos=0, dst='192.168.1.2', id=1, version=4, ttl=64)/GRE()/IP(frag=0, src='192.168.2.1', tos=0, dst='192.168.2.2', id=1, version=4, ttl=64)/SCTP(dport=53, sport=53, chksum=0)/Raw(load='')
09/09/2019 11:19:01              dut.10.238.54.215: port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=70 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x2263a76380, pkt_len=70, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=132 l4_len=0 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=0
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_SCTP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=70 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x226315bcc0, pkt_len=70, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=132 l4_len=0 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=0
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_SCTP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=70 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x226315c600, pkt_len=70, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=132 l4_len=0 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=0
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_SCTP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 
port 0/queue 0: received 1 packets
  src=00:00:10:00:00:00 - dst=11:22:33:44:55:66 - type=0x0800 - length=70 - nb_segs=1 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_SCTP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_SCTP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=12 - Receive queue=0x0
  ol_flags: PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
-----------------
port=0, mbuf=0x226315cf40, pkt_len=70, nb_segs=1:
rx: l2_len=4 ethertype=800 l3_len=20 l4_proto=132 l4_len=0 flags=PKT_RX_L4_CKSUM_BAD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
rx: outer_l2_len=14 outer_ethertype=800 outer_l3_len=20
tx: m->l2_len=4 m->l3_len=20 m->l4_len=0
tx: m->outer_l2_len=14 m->outer_l3_len=20
tx: flags=PKT_TX_IP_CKSUM PKT_TX_SCTP_CKSUM PKT_TX_IPV4 PKT_TX_OUTER_IP_CKSUM PKT_TX_OUTER_IPV4 PKT_TX_TUNNEL_GRE 

09/09/2019 11:19:33                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:19:36                      TestIpgre: chksums_ref :: {'inner_ip': '0xf505', 'inner_sctp': '0xdb1752b9'}
09/09/2019 11:19:36                      TestIpgre: chksums :: {'inner_ip': '0xf505', 'inner_sctp': '0xdb1752b9'}
09/09/2019 11:19:36              dut.10.238.54.215: quit
09/09/2019 11:19:40              dut.10.238.54.215: quit
Telling cores to stop...
Waiting for lcores to finish...

  ---------------------- Forward statistics for port 0  ----------------------
  RX-packets: 20             RX-dropped: 0             RX-total: 20
  Bad-ipcsum: 4              Bad-l4csum: 12            Bad-outer-l4csum: 0             
  TX-packets: 20             TX-dropped: 0             TX-total: 20
  ----------------------------------------------------------------------------

  ---------------------- Forward statistics for port 1  ----------------------
  RX-packets: 0              RX-dropped: 0             RX-total: 0
  Bad-ipcsum: 0              Bad-l4csum: 0             Bad-outer-l4csum: 0             
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  ---------------------- Forward statistics for port 2  ----------------------
  RX-packets: 0              RX-dropped: 0             RX-total: 0
  Bad-ipcsum: 0              Bad-l4csum: 0             Bad-outer-l4csum: 0             
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  ---------------------- Forward statistics for port 3  ----------------------
  RX-packets: 0              RX-dropped: 0             RX-total: 0
  Bad-ipcsum: 0              Bad-l4csum: 0             Bad-outer-l4csum: 0             
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  +++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
  RX-packets: 20             RX-dropped: 0             RX-total: 20
  TX-packets: 20             TX-dropped: 0             TX-total: 20
  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Done.

Stopping port 0...
Stopping ports...
Done

Stopping port 1...
Stopping ports...
Done

Stopping port 2...
Stopping ports...
Done

Stopping port 3...
Stopping ports...
Done

Shutting down port 0...
Closing ports...
Done

Shutting down port 1...
Closing ports...
Done

Shutting down port 2...
Closing ports...
Done

Shutting down port 3...
Closing ports...
Done

Bye...
09/09/2019 11:19:40                      TestIpgre: Test Case test_GRE_packet_chksum_offload Result PASSED:
09/09/2019 11:19:40                      TestIpgre: Test Case test_GRE_packet_filter Begin
09/09/2019 11:19:40              dut.10.238.54.215:  
09/09/2019 11:19:41                         tester: 
09/09/2019 11:19:41              dut.10.238.54.215: ./x86_64-native-linuxapp-gcc/app/testpmd -c ff -n 3 -- -i --enable-rx-cksum  --rxq=4 --txq=4
09/09/2019 11:19:53              dut.10.238.54.215: EAL: Detected 96 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/rte/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL: PCI device 0000:00:04.0 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.1 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.2 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.3 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.4 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.5 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.6 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.7 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:1a:00.0 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:1a:00.1 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:1a:00.2 on NUMA socket 0
EAL:   probe driver: 8086:37d3 net_i40e
EAL: PCI device 0000:1a:00.3 on NUMA socket 0
EAL:   probe driver: 8086:37d3 net_i40e
EAL: PCI device 0000:60:00.0 on NUMA socket 0
EAL:   probe driver: 8086:10fb net_ixgbe
EAL: PCI device 0000:60:00.1 on NUMA socket 0
EAL:   probe driver: 8086:10fb net_ixgbe
EAL: PCI device 0000:80:04.0 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.1 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.2 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.3 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.4 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.5 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.6 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.7 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:86:00.0 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL:   using IOMMU type 1 (Type 1)
EAL: PCI device 0000:86:00.1 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL: PCI device 0000:86:00.2 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
EAL: PCI device 0000:86:00.3 on NUMA socket 1
EAL:   probe driver: 8086:1593 net_ice
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=203456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=203456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc
Configuring Port 0 (socket 1)
Port 0: 00:00:00:00:01:00
Configuring Port 1 (socket 1)
Port 1: 00:00:00:00:01:01
Configuring Port 2 (socket 1)
Port 2: 00:00:00:00:01:02
Configuring Port 3 (socket 1)
Port 3: 00:00:00:00:01:03
Checking link statuses...
Done
09/09/2019 11:19:53              dut.10.238.54.215: set fwd rxonly
09/09/2019 11:19:53              dut.10.238.54.215: set fwd rxonly
Set rxonly packet forwarding mode
09/09/2019 11:19:53              dut.10.238.54.215: set nbcore 4
09/09/2019 11:19:53              dut.10.238.54.215: set nbcore 4
Number of forwarding cores set to 4
09/09/2019 11:19:53              dut.10.238.54.215: set verbose 1
09/09/2019 11:19:53              dut.10.238.54.215: set verbose 1
Change verbose level from 0 to 1
09/09/2019 11:19:53              dut.10.238.54.215: start
09/09/2019 11:19:53              dut.10.238.54.215: start
rxonly packet forwarding - ports=4 - cores=4 - streams=16 - NUMA support enabled, MP allocation mode: native
Logical Core 1 (socket 0) forwards packets on 4 streams:
  RX P=0/Q=0 (socket 1) -> TX P=1/Q=0 (socket 1) peer=02:00:00:00:00:01
  RX P=1/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00
  RX P=2/Q=0 (socket 1) -> TX P=3/Q=0 (socket 1) peer=02:00:00:00:00:03
  RX P=3/Q=0 (socket 1) -> TX P=2/Q=0 (socket 1) peer=02:00:00:00:00:02
Logical Core 2 (socket 0) forwards packets on 4 streams:
  RX P=0/Q=1 (socket 1) -> TX P=1/Q=1 (socket 1) peer=02:00:00:00:00:01
  RX P=1/Q=1 (socket 1) -> TX P=0/Q=1 (socket 1) peer=02:00:00:00:00:00
  RX P=2/Q=1 (socket 1) -> TX P=3/Q=1 (socket 1) peer=02:00:00:00:00:03
  RX P=3/Q=1 (socket 1) -> TX P=2/Q=1 (socket 1) peer=02:00:00:00:00:02
Logical Core 3 (socket 0) forwards packets on 4 streams:
  RX P=0/Q=2 (socket 1) -> TX P=1/Q=2 (socket 1) peer=02:00:00:00:00:01
  RX P=1/Q=2 (socket 1) -> TX P=0/Q=2 (socket 1) peer=02:00:00:00:00:00
  RX P=2/Q=2 (socket 1) -> TX P=3/Q=2 (socket 1) peer=02:00:00:00:00:03
  RX P=3/Q=2 (socket 1) -> TX P=2/Q=2 (socket 1) peer=02:00:00:00:00:02
Logical Core 4 (socket 0) forwards packets on 4 streams:
  RX P=0/Q=3 (socket 1) -> TX P=1/Q=3 (socket 1) peer=02:00:00:00:00:01
  RX P=1/Q=3 (socket 1) -> TX P=0/Q=3 (socket 1) peer=02:00:00:00:00:00
  RX P=2/Q=3 (socket 1) -> TX P=3/Q=3 (socket 1) peer=02:00:00:00:00:03
  RX P=3/Q=3 (socket 1) -> TX P=2/Q=3 (socket 1) peer=02:00:00:00:00:02

  rxonly packet forwarding packets/burst=32
  nb forwarding cores=4 - nb forwarding ports=4
  port 0: RX queue number: 4 Tx queue number: 4
    Rx offloads=0xe Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
  port 1: RX queue number: 4 Tx queue number: 4
    Rx offloads=0xe Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
  port 2: RX queue number: 4 Tx queue number: 4
    Rx offloads=0xe Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
  port 3: RX queue number: 4 Tx queue number: 4
    Rx offloads=0xe Tx offloads=0x10000
    RX queue: 0
      RX desc=1024 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0xe
    TX queue: 0
      TX desc=1024 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x10000 - TX RS bit threshold=32
09/09/2019 11:19:53              dut.10.238.54.215: tunnel_filter add 0 68:05:ca:0e:bc:03 10:00:00:00:00:00 0.0.0.0 1 ipingre iip 0 3
09/09/2019 11:19:53              dut.10.238.54.215: tunnel_filter add 0 68:05:ca:0e:bc:03 10:00:00:00:00:00 0.0.0.0 1 ipingre iip 0 3
ice_dev_filter_ctrl(): Filter type (6) not supported
cmd_tunnel_filter_parsed error: (Invalid argument)
09/09/2019 11:19:59                         tester: Ether(src='00:00:10:00:00:00', dst='ff:ff:ff:ff:ff:ff')/IP(frag=0, src='127.0.0.1', proto=47, tos=0, dst='0.0.0.0', id=1, version=4, ttl=64)/GRE()/IP()/UDP()/Raw(load='')
09/09/2019 11:20:01              dut.10.238.54.215:  port 0/queue 3: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x639bdb1b - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 3: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x639bdb1b - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 3: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x639bdb1b - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 3: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x639bdb1b - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

09/09/2019 11:20:09                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:20:12              dut.10.238.54.215: tunnel_filter rm 0 68:05:ca:0e:bc:03 10:00:00:00:00:00 0.0.0.0 1 ipingre iip 0 3
09/09/2019 11:20:12              dut.10.238.54.215: tunnel_filter rm 0 68:05:ca:0e:bc:03 10:00:00:00:00:00 0.0.0.0 1 ipingre iip 0 3
ice_dev_filter_ctrl(): Filter type (6) not supported
cmd_tunnel_filter_parsed error: (Invalid argument)
09/09/2019 11:20:12              dut.10.238.54.215: tunnel_filter add 0 68:05:ca:0e:bc:03 10:00:00:00:00:00 0.0.0.0 1 ipingre oip 0 3
09/09/2019 11:20:12              dut.10.238.54.215: tunnel_filter add 0 68:05:ca:0e:bc:03 10:00:00:00:00:00 0.0.0.0 1 ipingre oip 0 3
ice_dev_filter_ctrl(): Filter type (6) not supported
cmd_tunnel_filter_parsed error: (Invalid argument)
09/09/2019 11:20:19                         tester: Ether(src='00:00:10:00:00:00', dst='ff:ff:ff:ff:ff:ff')/IP(frag=0, src='127.0.0.1', proto=47, tos=0, dst='0.0.0.0', id=1, version=4, ttl=64)/GRE()/IP()/UDP()/Raw(load='')
09/09/2019 11:20:21              dut.10.238.54.215:  port 0/queue 3: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x639bdb1b - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 3: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x639bdb1b - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 3: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x639bdb1b - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 3: received 1 packets
  src=00:00:10:00:00:00 - dst=FF:FF:FF:FF:FF:FF - type=0x0800 - length=66 - nb_segs=1 - RSS hash=0x639bdb1b - RSS queue=0x3 - hw ptype: L2_ETHER L3_IPV4_EXT_UNKNOWN TUNNEL_GRENAT INNER_L3_IPV4_EXT_UNKNOWN INNER_L4_UDP  - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x3
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

09/09/2019 11:20:29                         tester: scp -v root@10.238.54.201:/tmp/sniff_ens8.pcap .
09/09/2019 11:20:32              dut.10.238.54.215: tunnel_filter rm 0 68:05:ca:0e:bc:03 10:00:00:00:00:00 0.0.0.0 1 ipingre iip 0 3
09/09/2019 11:20:32              dut.10.238.54.215: tunnel_filter rm 0 68:05:ca:0e:bc:03 10:00:00:00:00:00 0.0.0.0 1 ipingre iip 0 3
ice_dev_filter_ctrl(): Filter type (6) not supported
cmd_tunnel_filter_parsed error: (Invalid argument)
09/09/2019 11:20:34              dut.10.238.54.215: quit
09/09/2019 11:20:38              dut.10.238.54.215: quit
Telling cores to stop...
Waiting for lcores to finish...

  ------- Forward Stats for RX Port= 0/Queue= 3 -> TX Port= 1/Queue= 3 -------
  RX-packets: 8              TX-packets: 0              TX-dropped: 0             

  ---------------------- Forward statistics for port 0  ----------------------
  RX-packets: 8              RX-dropped: 0             RX-total: 8
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  ---------------------- Forward statistics for port 1  ----------------------
  RX-packets: 0              RX-dropped: 0             RX-total: 0
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  ---------------------- Forward statistics for port 2  ----------------------
  RX-packets: 0              RX-dropped: 0             RX-total: 0
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  ---------------------- Forward statistics for port 3  ----------------------
  RX-packets: 0              RX-dropped: 0             RX-total: 0
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  +++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
  RX-packets: 8              RX-dropped: 0             RX-total: 8
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Done.

Stopping port 0...
Stopping ports...
Done

Stopping port 1...
Stopping ports...
Done

Stopping port 2...
Stopping ports...
Done

Stopping port 3...
Stopping ports...
Done

Shutting down port 0...
Closing ports...
Done

Shutting down port 1...
Closing ports...
Done

Shutting down port 2...
Closing ports...
Done

Shutting down port 3...
Closing ports...
Done

Bye...
09/09/2019 11:20:38                      TestIpgre: Test Case test_GRE_packet_filter Result PASSED:
09/09/2019 11:20:39                            dts: 
TEST SUITE ENDED: TestIpgre

^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [dts] [PATCH V1] tests/ipgre: optimize script
  2019-09-06 18:42 [dts] [PATCH V1] tests/ipgre: optimize script Wenjie Li
  2019-09-09  2:36 ` Zhang, YanX A
@ 2019-09-18 10:34 ` Tu, Lijuan
  1 sibling, 0 replies; 3+ messages in thread
From: Tu, Lijuan @ 2019-09-18 10:34 UTC (permalink / raw)
  To: Li, WenjieX A, dts; +Cc: Li, WenjieX A

Applied failed, please rework it. thanks

> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Wenjie Li
> Sent: Saturday, September 7, 2019 2:43 AM
> To: dts@dpdk.org
> Cc: Li, WenjieX A <wenjiex.a.li@intel.com>
> Subject: [dts] [PATCH V1] tests/ipgre: optimize script
> 
> 1. could support cvl nic, add cvl to nic list 2. move dut.kill_all from
> tear_down_all to tear_down, since testpmd will be started in every case, if
> one case is failed, the testpmd is still runnning, this will affect the following
> cases.
> 
> Signed-off-by: Wenjie Li <wenjiex.a.li@intel.com>
> ---
>  tests/TestSuite_ipgre.py | 5 ++---
>  1 file changed, 2 insertions(+), 3 deletions(-)
> 
> diff --git a/tests/TestSuite_ipgre.py b/tests/TestSuite_ipgre.py index
> 7fbddf1..e10b0e0 100644
> --- a/tests/TestSuite_ipgre.py
> +++ b/tests/TestSuite_ipgre.py
> @@ -63,7 +63,7 @@ class TestIpgre(TestCase):
>          """
>          self.printFlag = self._enable_debug
>          ports = self.dut.get_ports()
> -        self.verify(self.nic in ["fortville_eagle", "fortville_spirit",
> "fortville_spirit_single", "fortville_25g", "carlsville"],
> +        self.verify(self.nic in ["fortville_eagle", "fortville_spirit",
> + "fortville_spirit_single", "fortville_25g", "carlsville",
> + "columbiaville_25g", "columbiaville_100g"],
>                      "GRE tunnel packet type only support by fortville and carlsville")
>          self.verify(len(ports) >= 1, "Insufficient ports for testing")
>          valports = [_ for _ in ports if self.tester.get_local_port(_) != -1] @@ -
> 439,12 +439,11 @@ class TestIpgre(TestCase):
>          Run after each test case.
>          Nothing to do.
>          """
> -        pass
> +        self.dut.kill_all()
> 
>      def tear_down_all(self):
>          """
>          Run after each test suite.
>          Nothing to do.
>          """
> -        self.dut.kill_all()
>          pass
> --
> 2.17.1


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2019-09-18 10:34 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-09-06 18:42 [dts] [PATCH V1] tests/ipgre: optimize script Wenjie Li
2019-09-09  2:36 ` Zhang, YanX A
2019-09-18 10:34 ` Tu, Lijuan

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).