test suite reviews and discussions
 help / color / mirror / Atom feed
* [dts] [PATCH V1 1/2] test_plans:add new test plan
@ 2020-07-31  8:19 Xu hailin
  2020-07-31  8:19 ` [dts] [PATCH V1 2/2] tests:add new suite Xu hailin
                   ` (2 more replies)
  0 siblings, 3 replies; 9+ messages in thread
From: Xu hailin @ 2020-07-31  8:19 UTC (permalink / raw)
  To: dts; +Cc: Xu,Hailin

From: "Xu,Hailin" <hailinx.xu@intel.com>

add cvl dcf new test plan:test_plans/cvl_dcf_date_path_test_plan.rst

Signed-off-by: Xu,Hailin <hailinx.xu@intel.com>
---
 test_plans/cvl_dcf_date_path_test_plan.rst | 203 +++++++++++++++++++++
 1 file changed, 203 insertions(+)
 create mode 100755 test_plans/cvl_dcf_date_path_test_plan.rst

diff --git a/test_plans/cvl_dcf_date_path_test_plan.rst b/test_plans/cvl_dcf_date_path_test_plan.rst
new file mode 100755
index 0000000..380090f
--- /dev/null
+++ b/test_plans/cvl_dcf_date_path_test_plan.rst
@@ -0,0 +1,203 @@
+
+Common steps for launching DCF
+==============================
+
+Generate 1 trust VF on 1 PF, and request 1 DCF on the trust VF.
+PF should grant DCF mode to it.
+
+Generate 4 VFs on PF ::
+
+    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
+
+Set a VF as trust ::
+
+    ip link set enp24s0f0 vf 0 trust on
+    ip link set enp27s0f0 vf 0 mac D2:6B:4C:EB:1C:26
+
+Launch dpdk on the VF, request DCF mode ::
+
+    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
+    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w 18:01.0,cap=dcf --file-prefix=vf -- -i
+
+
+Test Case: Launch DCF and do macfwd
+===================================
+
+Execute **common steps** to prepare DCF test environment
+
+Set macfwd ::
+
+    set fwd mac
+    start
+
+Launch tcpdump to sniffer the packets from DCF ::
+
+    tcpdump -i enp24s0f1 -vvv -Q in
+
+Send packets from tester(scapy) to the VF by MAC address(D2:6B:4C:EB:1C:26) ::
+
+    p = Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="192.168.1.1",dst="192.168.1.3")/Raw('x'*64)
+    sendp(p, iface=intf, count=100)
+
+Expect tester can get packets which loopbacked by DCF.
+
+
+Test Case: Check default rss for L3
+===================================
+
+DCF data path support RSS packets by default. For L3 packets, input set is IP src/dst.
+For tunneling packets, input set is inner IP src/dst.
+
+Execute **common steps** to prepare DCF test environment
+
+Set rxonly forward mode ::
+
+    set fwd rxonly
+    set verbose 1
+    start
+    
+Send a series packets to check if DCF RSS is correct for IPv4 ::
+
+    intf="enp175s0f0" 
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="192.168.1.1", dst="192.168.1.2")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="192.168.1.1", dst="192.168.1.3")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="192.168.1.3", dst="192.168.1.2")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="192.168.1.1", dst="192.168.1.2")/Raw('x'*64), iface=intf)
+
+Expected: p1 hash value is not equal to p2 or p3, and should be same to p4.
+
+Send a series packets to check if DCF RSS is correct for IPv6 ::
+
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IPv6(src="::22", dst="::11")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IPv6(src="::22", dst="::12")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IPv6(src="::21", dst="::11")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IPv6(src="::22", dst="::11")/Raw('x'*64), iface=intf)
+
+Expected: p1 hash value is not equal to p2 or p3, and should be same to p4.
+
+Send a series packets to check if DCF RSS is correct for tunnelling packet (inner IPv4) ::
+
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IP(src="192.168.1.1", dst="192.168.1.2")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IP(src="192.168.1.1", dst="192.168.1.3")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IP(src="192.168.1.3", dst="192.168.1.2")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="11:22:33:44:55:77")/IP(src="1.1.1.2", dst="2.2.2.1")/GRE()/IP(src="192.168.1.1", dst="192.168.1.2")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="11:22:33:44:55:77")/IPv6(src="::11", dst="::22")/GRE()/IP(src="192.168.1.1", dst="192.168.1.2")/Raw('x'*64), iface=intf)
+
+
+Expected: p1 hash value is not equal to p2 or p3. p1 hash value is equal to p4 and p5.
+
+
+Send a series packets to check if DCF RSS is correct for tunnelling packet (inner IPv6) ::
+
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::11")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::12")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IPv6(src="::21", dst="::11")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="11:22:33:44:55:77")/IP(src="1.1.1.2", dst="2.2.2.1")/GRE()/IPv6(src="::22", dst="::11")/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="11:22:33:44:55:77")/IPv6(src="::33", dst="::44")/GRE()/IPv6(src="::22", dst="::11")/Raw('x'*64), iface=intf)
+
+Expected: p1 hash value is not equal to p2 or p3. p1 hash value is equal to p4 and p5.
+
+
+Test Case: Check default rss for L4
+===================================
+
+DCF data path support RSS packets by default. For L3 packets, input set is IP src/dst.
+For tunneling packets, input set is inner IP src/dst.
+
+Execute **common steps** to prepare DCF test environment
+
+Set rxonly forward mode ::
+
+    set fwd rxonly
+    set verbose 1
+    start
+
+Send a series packets to check if DCF RSS is correct for IPv4 ::
+
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="192.168.1.1", dst="192.168.1.3")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="192.168.1.3", dst="192.168.1.2")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=1235, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=1234, dport=5679)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:22:33:44:55:77")/IP(src="192.168.1.1", dst="192.168.1.2")/TCP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+
+Expected: p1 hash value is not equal to p2 or p3 or p4 or p5, and should be equal to p6.
+
+Send a series packets to check if DCF RSS is correct for IPv6 ::
+
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IPv6(src="::22", dst="::11")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IPv6(src="::22", dst="::12")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IPv6(src="::21", dst="::11")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IPv6(src="::22", dst="::11")/UDP(sport=1235, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IPv6(src="::22", dst="::11")/UDP(sport=1234, dport=5679)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="11:22:33:44:55:77")/IPv6(src="::22", dst="::11")/TCP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+
+Expected: p1 hash value is not equal to p2 or p3 or p4 or p5, and should be equal to p6.
+
+Send a series packets to check if DCF RSS is correct for tunnelling packet (inner IPv4) ::
+
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IP(src="192.168.1.1", dst="192.168.1.3")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IP(src="192.168.1.3", dst="192.168.1.2")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=1235, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=1234, dport=5679)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:22:33:44:55:77")/IP(src="1.1.1.2", dst="2.2.2.1")/GRE()/IP(src="192.168.1.1", dst="192.168.1.2")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:22:33:44:55:77")/IPv6(src="::11", dst="::22")/GRE()/IP(src="192.168.1.1", dst="192.168.1.2")/TCP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+
+Expected: p1 hash value is not equal to p2 or p3 or p4 or p5, and should be equal to p6 and p7.
+
+
+Send a series packets to check if DCF RSS is correct for tunnelling packet (inner IPv6) ::
+
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::11")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::12")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IPv6(src="::21", dst="::11")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::11")/UDP(sport=1235, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:11:22:33:44:55")/IP(src="1.1.1.1", dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::11")/UDP(sport=1234, dport=5679)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:22:33:44:55:77")/IP(src="1.1.1.2", dst="2.2.2.1")/GRE()/IPv6(src="::22", dst="::11")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+    sendp(Ether(dst="D2:6B:4C:EB:1C:26", src="00:22:33:44:55:77")/IPv6(src="::33", dst="::44")/GRE()/IPv6(src="::22", dst="::11")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
+
+Expected: p1 hash value is not equal to p2 or p3 or p4 or p5, and should be equal to p6 and p7.
+
+
+Test Case: Create rule with to original VF action
+=================================================
+
+DCF data path support RSS packets by default. For L3 packets, input set is IP src/dst.
+For tunneling packets, input set is inner IP src/dst.
+
+Execute **common steps** to prepare DCF test environment
+
+Set rxonly forward mode ::
+
+    set fwd rxonly
+    set verbose 1
+    start
+
+Send a packet, check the DCF can't recieve the packet (Dest mac address is not DCF's mac) ::
+    
+    sendp([Ether(dst="68:05:ca:8d:ed:a8")/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1518", dst="CDCD:910A:2222:5498:8475:1111:3900:2020",tc=3)/TCP(sport=25,dport=23)/("X"*480)], iface=intf, count=1)
+
+Create a rule to DCF ::
+
+    flow create 0 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 tc is 3 / tcp src is 25 dst is 23 / end actions vf original 1 / end
+
+Send the packet again, check DCF can recieve the packet ::
+
+    sendp([Ether(dst="68:05:ca:8d:ed:a8")/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1518", dst="CDCD:910A:2222:5498:8475:1111:3900:2020",tc=3)/TCP(sport=25,dport=23)/("X"*480)], iface=intf, count=1)
+
+Destory the rule on DCF ::
+
+    flow destroy 0 rule 0
+
+Send the packet agiain, check DCF can't recieve the packet ::
+
+    sendp([Ether(dst="68:05:ca:8d:ed:a8")/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1518", dst="CDCD:910A:2222:5498:8475:1111:3900:2020",tc=3)/TCP(sport=25,dport=23)/("X"*480)], iface=intf, count=1)
+
+
+Test Case: Measure performance of DCF interface
+===============================================
+
+The steps are same to iAVF performance test, a slight difference on 
+launching testpmd devarg. DCF need cap=dcf option.
+Expect the performance is same to iAVF
\ No newline at end of file
-- 
2.17.1


^ permalink raw reply	[flat|nested] 9+ messages in thread

* [dts] [PATCH V1 2/2] tests:add new suite
  2020-07-31  8:19 [dts] [PATCH V1 1/2] test_plans:add new test plan Xu hailin
@ 2020-07-31  8:19 ` Xu hailin
  2020-07-31  8:19 ` [dts] [PATCH V1 0/2] test_plans: adds, tests: adds Xu hailin
  2020-08-06  1:27 ` [dts] [PATCH V1 1/2] test_plans:add new test plan Chen, Zhaoyan
  2 siblings, 0 replies; 9+ messages in thread
From: Xu hailin @ 2020-07-31  8:19 UTC (permalink / raw)
  To: dts; +Cc: Xu,Hailin

From: "Xu,Hailin" <hailinx.xu@intel.com>

add cvl dcf new test suite:tests/TestSuite_cvl_dcf_date_path.py

Signed-off-by: Xu,Hailin <hailinx.xu@intel.com>
---
 tests/TestSuite_cvl_dcf_date_path.py | 206 +++++++++++++++++++++++++++
 1 file changed, 206 insertions(+)
 create mode 100755 tests/TestSuite_cvl_dcf_date_path.py

diff --git a/tests/TestSuite_cvl_dcf_date_path.py b/tests/TestSuite_cvl_dcf_date_path.py
new file mode 100755
index 0000000..9efeab4
--- /dev/null
+++ b/tests/TestSuite_cvl_dcf_date_path.py
@@ -0,0 +1,206 @@
+# BSD LICENSE
+#
+# Copyright(c) 2010-2019 Intel Corporation. All rights reserved.
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+#
+#   * Redistributions of source code must retain the above copyright
+#     notice, this list of conditions and the following disclaimer.
+#   * Redistributions in binary form must reproduce the above copyright
+#     notice, this list of conditions and the following disclaimer in
+#     the documentation and/or other materials provided with the
+#     distribution.
+#   * Neither the name of Intel Corporation nor the names of its
+#     contributors may be used to endorse or promote products derived
+#     from this software without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+
+
+import re
+import time
+from pmd_output import PmdOutput
+from test_case import TestCase
+from packet import Packet
+
+
+class DcfDatePathTest(TestCase):
+    vf_mac = "D2:6B:4C:EB:1C:26"
+    wrong_mac = "68:05:CA:8D:ED:A8"
+
+    def set_up_all(self):
+        self.dut_ports = self.dut.get_ports(self.nic)
+        self.used_dut_port = self.dut_ports[0]
+        self.verify(len(self.dut_ports) >= 1, "Insufficient ports")
+        self.vf_driver = self.get_suite_cfg()['vf_driver']
+        self.dut_intf0 = self.dut.ports_info[self.used_dut_port]['intf']
+        self.tester_intf0 = self.tester.get_interface(self.tester.get_local_port(0))
+        # Generate 1 trust VF on 1 PF, and request 1 DCF on the trust VF
+        self.dut.generate_sriov_vfs_by_port(self.used_dut_port, 4, self.kdriver)
+        self.sriov_vfs_port_0 = self.dut.ports_info[self.dut_ports[0]]['vfs_port']
+        self.used_vf_pci = self.sriov_vfs_port_0[0].pci
+        # config vf trust on and vf mac value
+        self.dut.send_expect('ip link set %s vf 0 trust on' % self.dut_intf0, '#')
+        self.dut.send_expect('ip link set {} vf 0 mac {}'.format(self.dut_intf0, self.vf_mac), '#')
+        self.sriov_vfs_port_0[0].bind_driver(self.vf_driver)
+        self.pmd_output = PmdOutput(self.dut)
+        self.pkt = Packet()
+
+    def set_up(self):
+        self.pmd_output.start_testpmd(cores="1S/4C/1T", param='', eal_param="-w %s,cap=dcf --file-prefix=vf" % self.used_vf_pci)
+
+    def send_packets(self, packets, tx_port, count=1):
+        self.pkt.update_pkt(packets)
+        self.pkt.send_pkt(crb=self.tester, tx_port=tx_port, count=count)
+
+    def send_pkts_getouput(self, pkts, tx_port, count=1, status=False):
+        # Get the DCF package information
+        p = re.compile('RSS hash=(\w+)')
+        self.send_packets(pkts, tx_port=tx_port, count=count)
+        time.sleep(0.5)
+        if status:
+            out = self.pmd_output.get_output()
+        else:
+            # Get the DCF package rss hash value
+            output = self.pmd_output.get_output()
+            out = p.findall(output)
+        return out
+
+    def test_dcf_macfwd(self):
+        """
+        Test Case: Launch DCF and do macfwd
+        """
+        self.pmd_output.execute_cmd("set fwd mac")
+        self.pmd_output.execute_cmd("start")
+        inst = self.tester.tcpdump_sniff_packets(self.tester_intf0)
+        pkts_cmd = 'Ether(dst="{}", src="00:11:22:33:44:55")/IP(src="192.168.1.1",dst="192.168.1.3")/Raw("x"*64)'.format(self.vf_mac)
+        self.send_packets(pkts_cmd, self.tester_intf0, count=100)
+        time.sleep(2)
+        p = self.tester.load_tcpdump_sniff_packets(inst)
+        self.verify(len(p) == 100, "send 100 packets received %d packets, not match" % len(p))
+
+    def test_default_rss_l3(self):
+        """
+        Test Case: Check default rss for L3
+        """
+        pkt_list1 = [
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="192.168.1.1",dst="192.168.1.2") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="192.168.1.1",dst="192.168.1.3") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="192.168.1.3",dst="192.168.1.2") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="192.168.1.1",dst="192.168.1.2") / Raw("x" * 64)' % self.vf_mac]
+        pkt_list2 = [
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IPv6(src="::22", dst="::11") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IPv6(src="::22", dst="::12") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IPv6(src="::21", dst="::11") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IPv6(src="::22", dst="::11") / Raw("x" * 64)' % self.vf_mac]
+        pkt_list3 = [
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1", dst="2.2.2.2") / GRE() / IP(src="192.168.1.1", dst="192.168.1.2") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1", dst="2.2.2.2") / GRE() / IP(src="192.168.1.1", dst="192.168.1.3") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1", dst="2.2.2.2") / GRE() / IP(src="192.168.1.3", dst="192.168.1.2") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="11:22:33:44:55:77") / IP(src="1.1.1.2", dst="2.2.2.1") / GRE() / IP(src="192.168.1.1", dst="192.168.1.2") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="11:22:33:44:55:77") / IPv6(src="::11", dst="::22") / GRE() / IP(src="192.168.1.1", dst="192.168.1.2") / Raw("x" * 64)' % self.vf_mac]
+        pkt_list4 = [
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1",dst="2.2.2.2") / GRE() / IPv6(src="::22",dst="::11") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1",dst="2.2.2.2") / GRE() / IPv6(src="::22",dst="::12") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1",dst="2.2.2.2") / GRE() / IPv6(src="::21",dst="::11") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="11:22:33:44:55:77") / IP(src="1.1.1.2",dst="2.2.2.1") / GRE() / IPv6(src="::22",dst="::11") / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="11:22:33:44:55:77") / IPv6(src="::33", dst="::44") / GRE() / IPv6(src="::22", dst="::11") / Raw("x" * 64)' % self.vf_mac]
+
+        self.pmd_output.execute_cmd("set fwd rxonly")
+        self.pmd_output.execute_cmd("set verbose 1")
+        self.pmd_output.execute_cmd("start")
+        out1 = self.send_pkts_getouput(pkt_list1, self.tester_intf0)
+        self.verify(out1[0] == out1[3] and out1[0] != out1[1] != out1[2], "ipv4 rss hash value test failed")
+        out2 = self.send_pkts_getouput(pkt_list2, self.tester_intf0)
+        self.verify(out2[0] == out2[3] and out2[0] != out2[1] != out2[2], "ipv6 rss hash value test failed")
+        out3 = self.send_pkts_getouput(pkt_list3, self.tester_intf0)
+        self.verify(out3[0] == out3[3] == out3[4] and out3[0] != out3[1] != out3[2], "inner ipv4 rss hash value test failed")
+        out4 = self.send_pkts_getouput(pkt_list4, self.tester_intf0)
+        self.verify(out4[0] == out4[3] == out4[4] and out4[0] != out4[1] != out4[2], "inner ipv6 rss hash value test failed")
+
+    def test_default_rss_l4(self):
+        """
+        Test Case: Check default rss for L4
+        """
+        pkt_list1 = [
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="192.168.1.1",dst="192.168.1.2") / UDP(sport=1234,dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="192.168.1.1",dst="192.168.1.3") / UDP(sport=1234,dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="192.168.1.3",dst="192.168.1.2") / UDP(sport=1234,dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="192.168.1.1",dst="192.168.1.2") / UDP(sport=1235,dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="192.168.1.1",dst="192.168.1.2") / UDP(sport=1234,dport=5679) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:22:33:44:55:77") / IP(src="192.168.1.1",dst="192.168.1.2") / TCP(sport=1234,dport=5678) / Raw("x" * 64)' % self.vf_mac]
+        pkt_list2 = [
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IPv6(src="::22", dst="::11") / UDP(sport=1234,dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IPv6(src="::22", dst="::12") / UDP(sport=1234,dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IPv6(src="::21", dst="::11") / UDP(sport=1234,dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IPv6(src="::22", dst="::11") / UDP(sport=1235,dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IPv6(src="::22", dst="::11") / UDP(sport=1234,dport=5679) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="11:22:33:44:55:77") / IPv6(src="::22", dst="::11") / TCP(sport=1234,dport=5678) / Raw("x" * 64)' % self.vf_mac]
+        pkt_list3 = [
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1", dst="2.2.2.2") / GRE() / IP(src="192.168.1.1", dst="192.168.1.2") / UDP(sport=22, dport=23) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1", dst="2.2.2.2") / GRE() / IP(src="192.168.1.1", dst="192.168.1.3") / UDP(sport=22, dport=23) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1", dst="2.2.2.2") / GRE() / IP(src="192.168.1.3", dst="192.168.1.2") / UDP(sport=22, dport=23) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1", dst="2.2.2.2") / GRE() / IP(src="192.168.1.1", dst="192.168.1.2") / UDP(sport=21, dport=23) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1", dst="2.2.2.2") / GRE() / IP(src="192.168.1.1", dst="192.168.1.2") / UDP(sport=22, dport=24) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:22:33:44:55:77") / IP(src="1.1.1.2", dst="2.2.2.1") / GRE() / IP(src="192.168.1.1", dst="192.168.1.2") / UDP(sport=22, dport=23) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:22:33:44:55:77") / IPv6(src="::11", dst="::22") / GRE() / IP(src="192.168.1.1", dst="192.168.1.2") / TCP(sport=22, dport=23) / Raw("x" * 64)' % self.vf_mac]
+        pkt_list4 = [
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1",dst="2.2.2.2") / GRE() / IPv6(src="::22",dst="::11") / UDP(sport=1234, dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1",dst="2.2.2.2") / GRE() / IPv6(src="::22",dst="::12") / UDP(sport=1234, dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1",dst="2.2.2.2") / GRE() / IPv6(src="::21",dst="::11") / UDP(sport=1234, dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1",dst="2.2.2.2") / GRE() / IPv6(src="::22",dst="::11") / UDP(sport=1235, dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:11:22:33:44:55") / IP(src="1.1.1.1",dst="2.2.2.2") / GRE() / IPv6(src="::22",dst="::11") / UDP(sport=1234, dport=5679) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:22:33:44:55:77") / IP(src="1.1.1.2",dst="2.2.2.1") / GRE() / IPv6(src="::22",dst="::11") / UDP(sport=1234, dport=5678) / Raw("x" * 64)' % self.vf_mac,
+            'Ether(dst="%s", src="00:22:33:44:55:77") / IPv6(src="::33", dst="::44") / GRE() / IPv6(src="::22", dst="::11") / UDP(sport=1234, dport=5678) / Raw("x" * 64)' % self.vf_mac]
+
+        self.pmd_output.execute_cmd("set fwd rxonly")
+        self.pmd_output.execute_cmd("set verbose 1")
+        self.pmd_output.execute_cmd("start")
+        out1 = self.send_pkts_getouput(pkt_list1, self.tester_intf0)
+        self.verify(out1[0] == out1[5] and out1[0] != out1[1] != out1[2] != out1[3] != out1[4], "ipv4 rss hash value test failed")
+        out2 = self.send_pkts_getouput(pkt_list2, self.tester_intf0)
+        self.verify(out2[0] == out2[5] and out2[0] != out2[1] != out2[2] != out2[3] != out2[4], "ipv6 rss hash value test failed")
+        out3 = self.send_pkts_getouput(pkt_list3, self.tester_intf0)
+        self.verify(out3[0] == out3[6] and out3[0] != out3[1] != out3[2] != out3[3] != out3[4] != out3[5], "inner ipv4 rss hash value test failed")
+        out4 = self.send_pkts_getouput(pkt_list4, self.tester_intf0)
+        self.verify(out4[0] == out4[6] and out4[0] != out4[1] != out4[2] != out4[3] != out4[4] != out4[5], "inner ipv6 rss hash value test failed")
+
+    def test_create_rule_with_vf_action(self):
+        """
+        Test Case: Create rule with to original VF action
+        """
+        pkt = 'Ether(dst="%s")/IPv6(src="CDCD:910A:2222:5498:8475:1111:3900:1518", dst="CDCD:910A:2222:5498:8475:1111:3900:2020",tc=3)/TCP(sport=25,dport=23)/("X"*480)' % self.wrong_mac
+        rule = 'flow create 0 ingress pattern eth dst is %s / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 tc is 3 / tcp src is 25 dst is 23 / end actions vf original 1 / end' % self.wrong_mac
+
+        self.pmd_output.execute_cmd("set fwd rxonly")
+        self.pmd_output.execute_cmd("set verbose 1")
+        self.pmd_output.execute_cmd("start")
+        out = self.send_pkts_getouput(pkt, self.tester_intf0, status=True)
+        self.verify(self.wrong_mac not in out, "The wrong mac packet was received")
+        self.pmd_output.execute_cmd(rule, "created")
+        out = self.send_pkts_getouput(pkt, self.tester_intf0, status=True)
+        self.verify(self.wrong_mac in out, "The wrong mac packet not received")
+        self.pmd_output.execute_cmd("flow destroy 0 rule 0", "destroyed")
+        out = self.send_pkts_getouput(pkt, self.tester_intf0, status=True)
+        self.verify(self.wrong_mac not in out, "The wrong mac packet was received")
+
+    def tear_down(self):
+        self.pmd_output.execute_cmd('quit', "#")
+
+    def tear_down_all(self):
+        self.dut.kill_all()
+        self.dut.destroy_sriov_vfs_by_port(self.used_dut_port)
+
-- 
2.17.1


^ permalink raw reply	[flat|nested] 9+ messages in thread

* [dts] [PATCH V1 0/2] test_plans: adds, tests: adds
  2020-07-31  8:19 [dts] [PATCH V1 1/2] test_plans:add new test plan Xu hailin
  2020-07-31  8:19 ` [dts] [PATCH V1 2/2] tests:add new suite Xu hailin
@ 2020-07-31  8:19 ` Xu hailin
  2020-08-03  6:09   ` Xu, HailinX
  2020-08-12  8:00   ` Tu, Lijuan
  2020-08-06  1:27 ` [dts] [PATCH V1 1/2] test_plans:add new test plan Chen, Zhaoyan
  2 siblings, 2 replies; 9+ messages in thread
From: Xu hailin @ 2020-07-31  8:19 UTC (permalink / raw)
  To: dts; +Cc: Xu,Hailin

From: "Xu,Hailin" <hailinx.xu@intel.com>

add cvl dcf new suite

Xu,Hailin (2):
  test_plans/cvl_dcf_date_path:add new test plan
  tests/TestSuite_cvl_dcf_date_path:add new suite

 test_plans/cvl_dcf_date_path_test_plan.rst | 203 ++++++++++++++++++++
 tests/TestSuite_cvl_dcf_date_path.py       | 206 +++++++++++++++++++++
 2 files changed, 409 insertions(+)
 create mode 100755 test_plans/cvl_dcf_date_path_test_plan.rst
 create mode 100755 tests/TestSuite_cvl_dcf_date_path.py

-- 
2.17.1


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [dts] [PATCH V1 0/2] test_plans: adds, tests: adds
  2020-07-31  8:19 ` [dts] [PATCH V1 0/2] test_plans: adds, tests: adds Xu hailin
@ 2020-08-03  6:09   ` Xu, HailinX
  2020-08-06  1:27     ` Chen, Zhaoyan
  2020-08-12  8:00   ` Tu, Lijuan
  1 sibling, 1 reply; 9+ messages in thread
From: Xu, HailinX @ 2020-08-03  6:09 UTC (permalink / raw)
  To: dts

[-- Attachment #1: Type: text/plain, Size: 790 bytes --]

Tested-by:  Xu, HailinX <hailinx.xu@intel.com>

Regards,
Xu, Hailin


-----Original Message-----
From: Xu, HailinX 
Sent: Friday, July 31, 2020 4:19 PM
To: dts@dpdk.org
Cc: Xu, HailinX <hailinx.xu@intel.com>
Subject: [dts][PATCH V1 0/2] test_plans: adds, tests: adds

From: "Xu,Hailin" <hailinx.xu@intel.com>

add cvl dcf new suite

Xu,Hailin (2):
  test_plans/cvl_dcf_date_path:add new test plan
  tests/TestSuite_cvl_dcf_date_path:add new suite

 test_plans/cvl_dcf_date_path_test_plan.rst | 203 ++++++++++++++++++++
 tests/TestSuite_cvl_dcf_date_path.py       | 206 +++++++++++++++++++++
 2 files changed, 409 insertions(+)
 create mode 100755 test_plans/cvl_dcf_date_path_test_plan.rst
 create mode 100755 tests/TestSuite_cvl_dcf_date_path.py

-- 
2.17.1


[-- Attachment #2: DcfDatePathTest.log --]
[-- Type: application/octet-stream, Size: 67610 bytes --]

30/07/2020 11:09:54                            dts: 
TEST SUITE : DcfDatePathTest
30/07/2020 11:09:54                            dts: NIC :        columbiaville_100g
30/07/2020 11:09:54              dut.10.240.183.62: 
30/07/2020 11:09:54                         tester: 
30/07/2020 11:09:59              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.0/vendor
30/07/2020 11:09:59              dut.10.240.183.62: 0x8086
30/07/2020 11:09:59              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.0/device
30/07/2020 11:09:59              dut.10.240.183.62: 0x1889
30/07/2020 11:09:59              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.0/vendor
30/07/2020 11:09:59              dut.10.240.183.62: 0x8086
30/07/2020 11:09:59              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.0/device
30/07/2020 11:09:59              dut.10.240.183.62: 0x1889
30/07/2020 11:10:00              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.1/vendor
30/07/2020 11:10:00              dut.10.240.183.62: 0x8086
30/07/2020 11:10:00              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.1/device
30/07/2020 11:10:00              dut.10.240.183.62: 0x1889
30/07/2020 11:10:00              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.1/vendor
30/07/2020 11:10:00              dut.10.240.183.62: 0x8086
30/07/2020 11:10:00              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.1/device
30/07/2020 11:10:00              dut.10.240.183.62: 0x1889
30/07/2020 11:10:00              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.2/vendor
30/07/2020 11:10:00              dut.10.240.183.62: 0x8086
30/07/2020 11:10:00              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.2/device
30/07/2020 11:10:00              dut.10.240.183.62: 0x1889
30/07/2020 11:10:00              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.2/vendor
30/07/2020 11:10:00              dut.10.240.183.62: 0x8086
30/07/2020 11:10:00              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.2/device
30/07/2020 11:10:00              dut.10.240.183.62: 0x1889
30/07/2020 11:10:01              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.3/vendor
30/07/2020 11:10:01              dut.10.240.183.62: 0x8086
30/07/2020 11:10:01              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.3/device
30/07/2020 11:10:01              dut.10.240.183.62: 0x1889
30/07/2020 11:10:01              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.3/vendor
30/07/2020 11:10:01              dut.10.240.183.62: 0x8086
30/07/2020 11:10:01              dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.3/device
30/07/2020 11:10:01              dut.10.240.183.62: 0x1889
30/07/2020 11:10:01              dut.10.240.183.62: ip link set enp175s0f0 vf 0 trust on
30/07/2020 11:10:01              dut.10.240.183.62: 
30/07/2020 11:10:01              dut.10.240.183.62: ip link set enp175s0f0 vf 0 mac D2:6B:4C:EB:1C:26
30/07/2020 11:10:01              dut.10.240.183.62: 
30/07/2020 11:10:03                DcfDatePathTest: Rerun Test Case test_create_rule_with_vf_action Begin
30/07/2020 11:10:10                DcfDatePathTest: Rerun Test Case test_create_rule_with_vf_action Begin
30/07/2020 11:10:10                DcfDatePathTest: Test Case test_create_rule_with_vf_action Begin
30/07/2020 11:10:10              dut.10.240.183.62: 
30/07/2020 11:10:10                         tester: 
30/07/2020 11:10:10              dut.10.240.183.62: x86_64-native-linuxapp-gcc/app/testpmd  -l 1,2,3,4 -n 4 -w 0000:af:01.0,cap=dcf  --file-prefix=vf_17765_20200730110932    -- -i 
30/07/2020 11:10:11              dut.10.240.183.62: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/vf_17765_20200730110932/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL:   using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_iavf (8086:1889) device: 0000:af:01.0 (socket 1)
EAL: Releasing pci mapped resource for 0000:af:01.0
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300000000
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300020000
EAL:   using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_ice_dcf (8086:1889) device: 0000:af:01.0 (socket 1)
ice_load_pkg_type(): Active package is: 1.3.17.0, ICE COMMS Package
EAL: No legacy callbacks, legacy socket not created
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=171456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=171456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc

Warning! port-topology=paired and odd forward ports number, the last port will pair with itself.

Configuring Port 0 (socket 1)
ice_dcf_init_rss(): RSS is enabled by PF by default
ice_dcf_configure_queues(): request RXDID == 16 in Queue[0]
Port 0: D2:6B:4C:EB:1C:26
Checking link statuses...
Done
30/07/2020 11:10:21              dut.10.240.183.62: set fwd rxonly
30/07/2020 11:10:21              dut.10.240.183.62: set fwd rxonly
Set rxonly packet forwarding mode
30/07/2020 11:10:21              dut.10.240.183.62: set verbose 1
30/07/2020 11:10:21              dut.10.240.183.62: set verbose 1
Change verbose level from 0 to 1
30/07/2020 11:10:21              dut.10.240.183.62: start
30/07/2020 11:10:22              dut.10.240.183.62: start
rxonly packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
  RX P=0/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00

  rxonly packet forwarding packets/burst=32
  nb forwarding cores=1 - nb forwarding ports=1
  port 0: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x0 Tx offloads=0x0
    RX queue: 0
      RX desc=0 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0x0
    TX queue: 0
      TX desc=0 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x0 - TX RS bit threshold=32
30/07/2020 11:10:22                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107422.0516474 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:25                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107422.0516474 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:28                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107422.0516474
30/07/2020 11:10:28                         tester: packet ready for sending...
Ether(dst='68:05:ca:8d:ed:a8', src='00:00:00:00:00:00', type=34525)/IPv6(version=6, tc=3, fl=0, plen=500, nh=6, hlim=64, src='cdcd:910a:2222:5498:8475:1111:3900:1518', dst='cdcd:910a:2222:5498:8475:1111:3900:2020')/TCP(sport=25, dport=23, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=15765, urgptr=0)/Raw(load=b'XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
30/07/2020 11:10:30              dut.10.240.183.62: 
30/07/2020 11:10:30              dut.10.240.183.62: flow create 0 ingress pattern eth dst is 68:05:CA:8D:ED:A8 / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 tc is 3 / tcp src is 25 dst is 23 / end actions vf original 1 / end
30/07/2020 11:10:31              dut.10.240.183.62: flow create 0 ingress pattern eth dst is 68:05:CA:8D:ED:A8 / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 tc is 3 / tcp src is 25 dst is 23 / end actions vf original 1 / end
30/07/2020 11:10:31                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107431.1447203 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:34                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107431.1447203 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:37                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107431.1447203
30/07/2020 11:10:38                         tester: packet ready for sending...
Ether(dst='68:05:ca:8d:ed:a8', src='00:00:00:00:00:00', type=34525)/IPv6(version=6, tc=3, fl=0, plen=500, nh=6, hlim=64, src='cdcd:910a:2222:5498:8475:1111:3900:1518', dst='cdcd:910a:2222:5498:8475:1111:3900:2020')/TCP(sport=25, dport=23, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=15765, urgptr=0)/Raw(load=b'XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
30/07/2020 11:10:39              dut.10.240.183.62: 
testpmd> port 0/queue 0: received 1 packets
  src=00:00:00:00:00:00 - dst=68:05:CA:8D:ED:A8 - type=0x86dd - length=554 - nb_segs=1 - RSS hash=0x5b961f1 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_TCP  - l2_len=14 - l3_len=40 - l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

30/07/2020 11:10:39              dut.10.240.183.62: flow destroy 0 rule 0
30/07/2020 11:10:39              dut.10.240.183.62: flow destroy 0 rule 0
30/07/2020 11:10:39                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107439.6990027 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:42                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107439.6990027 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:46                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107439.6990027
30/07/2020 11:10:47                         tester: packet ready for sending...
Ether(dst='68:05:ca:8d:ed:a8', src='00:00:00:00:00:00', type=34525)/IPv6(version=6, tc=3, fl=0, plen=500, nh=6, hlim=64, src='cdcd:910a:2222:5498:8475:1111:3900:1518', dst='cdcd:910a:2222:5498:8475:1111:3900:2020')/TCP(sport=25, dport=23, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=15765, urgptr=0)/Raw(load=b'XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
30/07/2020 11:10:48              dut.10.240.183.62: 
testpmd> 
30/07/2020 11:10:48                DcfDatePathTest: Test Case test_create_rule_with_vf_action Result PASSED:
30/07/2020 11:10:48              dut.10.240.183.62: quit
30/07/2020 11:10:49              dut.10.240.183.62: quit
Telling cores to stop...
Waiting for lcores to finish...

  ---------------------- Forward statistics for port 0  ----------------------
  RX-packets: 1              RX-dropped: 0             RX-total: 1
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  +++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
  RX-packets: 1              RX-dropped: 0             RX-total: 1
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Done.

Stopping port 0...
Stopping ports...
Done

Shutting down port 0...
Closing ports...
Done

Bye...
30/07/2020 11:10:52                DcfDatePathTest: Rerun Test Case test_dcf_macfwd Begin
30/07/2020 11:10:57                DcfDatePathTest: Rerun Test Case test_dcf_macfwd Begin
30/07/2020 11:10:57                DcfDatePathTest: Test Case test_dcf_macfwd Begin
30/07/2020 11:10:57              dut.10.240.183.62: 
30/07/2020 11:10:57                         tester: 
30/07/2020 11:10:57              dut.10.240.183.62: x86_64-native-linuxapp-gcc/app/testpmd  -l 1,2,3,4 -n 4 -w 0000:af:01.0,cap=dcf  --file-prefix=vf_17765_20200730110932    -- -i 
30/07/2020 11:10:59              dut.10.240.183.62: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/vf_17765_20200730110932/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL:   using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_iavf (8086:1889) device: 0000:af:01.0 (socket 1)
EAL: Releasing pci mapped resource for 0000:af:01.0
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300000000
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300020000
EAL:   using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_ice_dcf (8086:1889) device: 0000:af:01.0 (socket 1)
ice_load_pkg_type(): Active package is: 1.3.17.0, ICE COMMS Package
EAL: No legacy callbacks, legacy socket not created
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=171456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=171456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc

Warning! port-topology=paired and odd forward ports number, the last port will pair with itself.

Configuring Port 0 (socket 1)
ice_dcf_init_rss(): RSS is enabled by PF by default
ice_dcf_configure_queues(): request RXDID == 16 in Queue[0]
Port 0: D2:6B:4C:EB:1C:26
Checking link statuses...
Done
30/07/2020 11:11:09              dut.10.240.183.62: set fwd mac
30/07/2020 11:11:09              dut.10.240.183.62: set fwd mac
Set mac packet forwarding mode
30/07/2020 11:11:09              dut.10.240.183.62: start
30/07/2020 11:11:09              dut.10.240.183.62: start
mac packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
  RX P=0/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00

  mac packet forwarding packets/burst=32
  nb forwarding cores=1 - nb forwarding ports=1
  port 0: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x0 Tx offloads=0x0
    RX queue: 0
      RX desc=0 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0x0
    TX queue: 0
      TX desc=0 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x0 - TX RS bit threshold=32
30/07/2020 11:11:09                         tester: ls -d /tmp/tester/
30/07/2020 11:11:09                         tester: /tmp/tester/
30/07/2020 11:11:09                         tester: rm -rf /tmp/tester/sniff_ens192f0.pcap
30/07/2020 11:11:09                         tester: 
30/07/2020 11:11:16                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107476.3663418 root@10.240.183.55:/tmp/tester/
30/07/2020 11:11:20                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107476.3663418 root@10.240.183.55:/tmp/tester/
30/07/2020 11:11:23                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107476.3663418
30/07/2020 11:11:23                         tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63316, src='192.168.1.1', dst='192.168.1.3')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:11:31                DcfDatePathTest: Test Case test_dcf_macfwd Result PASSED:
30/07/2020 11:11:31              dut.10.240.183.62: quit
30/07/2020 11:11:32              dut.10.240.183.62: quit
Telling cores to stop...
Waiting for lcores to finish...

  ---------------------- Forward statistics for port 0  ----------------------
  RX-packets: 100            RX-dropped: 0             RX-total: 100
  TX-packets: 100            TX-dropped: 0             TX-total: 100
  ----------------------------------------------------------------------------

  +++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
  RX-packets: 100            RX-dropped: 0             RX-total: 100
  TX-packets: 100            TX-dropped: 0             TX-total: 100
  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Done.

Stopping port 0...
Stopping ports...
Done

Shutting down port 0...
Closing ports...
Done

Bye...
30/07/2020 11:13:19                DcfDatePathTest: Rerun Test Case test_default_rss_l3 Begin
30/07/2020 11:13:23                DcfDatePathTest: Rerun Test Case test_default_rss_l3 Begin
30/07/2020 11:13:23                DcfDatePathTest: Test Case test_default_rss_l3 Begin
30/07/2020 11:13:23              dut.10.240.183.62: 
30/07/2020 11:13:23                         tester: 
30/07/2020 11:13:23              dut.10.240.183.62: x86_64-native-linuxapp-gcc/app/testpmd  -l 1,2,3,4 -n 4 -w 0000:af:01.0,cap=dcf  --file-prefix=vf_17765_20200730110932    -- -i 
30/07/2020 11:13:25              dut.10.240.183.62: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/vf_17765_20200730110932/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL:   using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_iavf (8086:1889) device: 0000:af:01.0 (socket 1)
EAL: Releasing pci mapped resource for 0000:af:01.0
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300000000
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300020000
EAL:   using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_ice_dcf (8086:1889) device: 0000:af:01.0 (socket 1)
ice_load_pkg_type(): Active package is: 1.3.17.0, ICE COMMS Package
EAL: No legacy callbacks, legacy socket not created
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=171456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=171456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc

Warning! port-topology=paired and odd forward ports number, the last port will pair with itself.

Configuring Port 0 (socket 1)
ice_dcf_init_rss(): RSS is enabled by PF by default
ice_dcf_configure_queues(): request RXDID == 16 in Queue[0]
Port 0: D2:6B:4C:EB:1C:26
Checking link statuses...
Done
30/07/2020 11:13:35              dut.10.240.183.62: set fwd rxonly
30/07/2020 11:13:35              dut.10.240.183.62: set fwd rxonly
Set rxonly packet forwarding mode
30/07/2020 11:13:35              dut.10.240.183.62: set verbose 1
30/07/2020 11:13:35              dut.10.240.183.62: set verbose 1
Change verbose level from 0 to 1
30/07/2020 11:13:35              dut.10.240.183.62: start
30/07/2020 11:13:35              dut.10.240.183.62: start
rxonly packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
  RX P=0/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00

  rxonly packet forwarding packets/burst=32
  nb forwarding cores=1 - nb forwarding ports=1
  port 0: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x0 Tx offloads=0x0
    RX queue: 0
      RX desc=0 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0x0
    TX queue: 0
      TX desc=0 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x0 - TX RS bit threshold=32
30/07/2020 11:13:35                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107615.6880608 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:39                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107615.6880608 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:42                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107615.6880608
30/07/2020 11:13:42                         tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63317, src='192.168.1.1', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63316, src='192.168.1.1', dst='192.168.1.3')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63315, src='192.168.1.3', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63317, src='192.168.1.1', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:13:44              dut.10.240.183.62: port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=98 - nb_segs=1 - RSS hash=0x4eeb3e08 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4  - l2_len=14 - l3_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=98 - nb_segs=1 - RSS hash=0x95866c16 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4  - l2_len=14 - l3_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=98 - nb_segs=1 - RSS hash=0xf1179acb - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4  - l2_len=14 - l3_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=98 - nb_segs=1 - RSS hash=0x4eeb3e08 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4  - l2_len=14 - l3_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

30/07/2020 11:13:44                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107624.1117468 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:47                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107624.1117468 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:50                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107624.1117468
30/07/2020 11:13:51                         tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::12')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::21', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:13:52              dut.10.240.183.62: port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=118 - nb_segs=1 - RSS hash=0x39e03a7c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6  - l2_len=14 - l3_len=40 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=118 - nb_segs=1 - RSS hash=0x4ff3931e - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6  - l2_len=14 - l3_len=40 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=118 - nb_segs=1 - RSS hash=0x29277ca - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6  - l2_len=14 - l3_len=40 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=118 - nb_segs=1 - RSS hash=0x39e03a7c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6  - l2_len=14 - l3_len=40 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

30/07/2020 11:13:52                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107632.5236943 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:55                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107632.5236943 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:58                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107632.5236943
30/07/2020 11:13:59                         tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=108, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29789, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63317, src='192.168.1.1', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=108, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29789, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63316, src='192.168.1.1', dst='192.168.1.3')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=108, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29789, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63315, src='192.168.1.3', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='11:22:33:44:55:77', type=2048)/IP(version=4, ihl=5, tos=0, len=108, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29789, src='1.1.1.2', dst='2.2.2.1')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63317, src='192.168.1.1', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='11:22:33:44:55:77', type=34525)/IPv6(version=6, tc=0, fl=0, plen=88, nh=47, hlim=64, src='::11', dst='::22')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63317, src='192.168.1.1', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:14:00              dut.10.240.183.62: port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=122 - nb_segs=1 - RSS hash=0x4eeb3e08 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=122 - nb_segs=1 - RSS hash=0x95866c16 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=122 - nb_segs=1 - RSS hash=0xf1179acb - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=11:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=122 - nb_segs=1 - RSS hash=0x4eeb3e08 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=11:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=142 - nb_segs=1 - RSS hash=0x4eeb3e08 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

30/07/2020 11:14:00                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107640.959596 root@10.240.183.55:/tmp/tester/
30/07/2020 11:14:04                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107640.959596 root@10.240.183.55:/tmp/tester/
30/07/2020 11:14:08                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107640.959596
30/07/2020 11:14:08                         tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=128, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29769, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=128, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29769, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::12')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=128, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29769, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::21', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='11:22:33:44:55:77', type=2048)/IP(version=4, ihl=5, tos=0, len=128, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29769, src='1.1.1.2', dst='2.2.2.1')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='11:22:33:44:55:77', type=34525)/IPv6(version=6, tc=0, fl=0, plen=108, nh=47, hlim=64, src='::33', dst='::44')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:14:10              dut.10.240.183.62: port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=142 - nb_segs=1 - RSS hash=0x39e03a7c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=142 - nb_segs=1 - RSS hash=0x4ff3931e - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=142 - nb_segs=1 - RSS hash=0x29277ca - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=11:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=142 - nb_segs=1 - RSS hash=0x39e03a7c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=11:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=162 - nb_segs=1 - RSS hash=0x39e03a7c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV6  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=40 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

30/07/2020 11:14:10                DcfDatePathTest: Test Case test_default_rss_l3 Result PASSED:
30/07/2020 11:14:10              dut.10.240.183.62: quit
30/07/2020 11:14:11              dut.10.240.183.62: quit
Telling cores to stop...
Waiting for lcores to finish...

  ---------------------- Forward statistics for port 0  ----------------------
  RX-packets: 18             RX-dropped: 0             RX-total: 18
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  +++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
  RX-packets: 18             RX-dropped: 0             RX-total: 18
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Done.

Stopping port 0...
Stopping ports...
Done

Shutting down port 0...
Closing ports...
Done

Bye...
30/07/2020 11:14:44                DcfDatePathTest: Rerun Test Case test_default_rss_l4 Begin
30/07/2020 11:14:49                DcfDatePathTest: Rerun Test Case test_default_rss_l4 Begin
30/07/2020 11:14:49                DcfDatePathTest: Test Case test_default_rss_l4 Begin
30/07/2020 11:14:49              dut.10.240.183.62: 
30/07/2020 11:14:49                         tester: 
30/07/2020 11:14:49              dut.10.240.183.62: x86_64-native-linuxapp-gcc/app/testpmd  -l 1,2,3,4 -n 4 -w 0000:af:01.0,cap=dcf  --file-prefix=vf_17765_20200730110932    -- -i 
30/07/2020 11:14:51              dut.10.240.183.62: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/vf_17765_20200730110932/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL:   using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_iavf (8086:1889) device: 0000:af:01.0 (socket 1)
EAL: Releasing pci mapped resource for 0000:af:01.0
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300000000
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300020000
EAL:   using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_ice_dcf (8086:1889) device: 0000:af:01.0 (socket 1)
ice_load_pkg_type(): Active package is: 1.3.17.0, ICE COMMS Package
EAL: No legacy callbacks, legacy socket not created
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=171456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=171456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc

Warning! port-topology=paired and odd forward ports number, the last port will pair with itself.

Configuring Port 0 (socket 1)
ice_dcf_init_rss(): RSS is enabled by PF by default
ice_dcf_configure_queues(): request RXDID == 16 in Queue[0]
Port 0: D2:6B:4C:EB:1C:26
Checking link statuses...
Done
30/07/2020 11:15:01              dut.10.240.183.62: set fwd rxonly
30/07/2020 11:15:01              dut.10.240.183.62: set fwd rxonly
Set rxonly packet forwarding mode
30/07/2020 11:15:01              dut.10.240.183.62: set verbose 1
30/07/2020 11:15:01              dut.10.240.183.62: set verbose 1
Change verbose level from 0 to 1
30/07/2020 11:15:01              dut.10.240.183.62: start
30/07/2020 11:15:01              dut.10.240.183.62: start
rxonly packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
  RX P=0/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00

  rxonly packet forwarding packets/burst=32
  nb forwarding cores=1 - nb forwarding ports=1
  port 0: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x0 Tx offloads=0x0
    RX queue: 0
      RX desc=0 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=0
      RX Offloads=0x0
    TX queue: 0
      TX desc=0 - TX free threshold=32
      TX threshold registers: pthresh=32 hthresh=0  wthresh=0
      TX offloads=0x0 - TX RS bit threshold=32
30/07/2020 11:15:01                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107701.2840192 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:05                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107701.2840192 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:08                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107701.2840192
30/07/2020 11:15:09                         tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=1234, dport=5678, len=72, chksum=20987)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63291, src='192.168.1.1', dst='192.168.1.3')/UDP(sport=1234, dport=5678, len=72, chksum=20986)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63290, src='192.168.1.3', dst='192.168.1.2')/UDP(sport=1234, dport=5678, len=72, chksum=20985)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=1235, dport=5678, len=72, chksum=20986)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=1234, dport=5679, len=72, chksum=20986)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:22:33:44:55:77', type=2048)/IP(version=4, ihl=5, tos=0, len=104, id=1, flags=0, frag=0, ttl=64, proto=6, chksum=63291, src='192.168.1.1', dst='192.168.1.2')/TCP(sport=1234, dport=5678, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=57919, urgptr=0)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:15:11              dut.10.240.183.62: port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=106 - nb_segs=1 - RSS hash=0xda0c765e - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_UDP  - l2_len=14 - l3_len=20 - l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=106 - nb_segs=1 - RSS hash=0x1612440 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_UDP  - l2_len=14 - l3_len=20 - l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=106 - nb_segs=1 - RSS hash=0x65f0d29d - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_UDP  - l2_len=14 - l3_len=20 - l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=106 - nb_segs=1 - RSS hash=0x8812a97c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_UDP  - l2_len=14 - l3_len=20 - l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=106 - nb_segs=1 - RSS hash=0x52efaf3 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_UDP  - l2_len=14 - l3_len=20 - l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=118 - nb_segs=1 - RSS hash=0xda0c765e - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_TCP  - l2_len=14 - l3_len=20 - l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

30/07/2020 11:15:11                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107711.0111084 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:14                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107711.0111084 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:17                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107711.0111084
30/07/2020 11:15:18                         tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54556)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::12')/UDP(sport=1234, dport=5678, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::21', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54557)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1235, dport=5678, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5679, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='11:22:33:44:55:77', type=34525)/IPv6(version=6, tc=0, fl=0, plen=84, nh=6, hlim=64, src='::22', dst='::11')/TCP(sport=1234, dport=5678, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=25953, urgptr=0)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:15:20              dut.10.240.183.62: port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0xa87b5936 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_UDP  - l2_len=14 - l3_len=40 - l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0xde68f054 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_UDP  - l2_len=14 - l3_len=40 - l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0x93091480 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_UDP  - l2_len=14 - l3_len=40 - l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0x99c7a5cb - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_UDP  - l2_len=14 - l3_len=40 - l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0x548607d7 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_UDP  - l2_len=14 - l3_len=40 - l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=11:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=138 - nb_segs=1 - RSS hash=0xa87b5936 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_TCP  - l2_len=14 - l3_len=40 - l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

30/07/2020 11:15:20                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107720.0178802 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:23                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107720.0178802 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:26                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107720.0178802
30/07/2020 11:15:27                         tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=22, dport=23, len=72, chksum=27854)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63291, src='192.168.1.1', dst='192.168.1.3')/UDP(sport=22, dport=23, len=72, chksum=27853)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63290, src='192.168.1.3', dst='192.168.1.2')/UDP(sport=22, dport=23, len=72, chksum=27852)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=21, dport=23, len=72, chksum=27855)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=22, dport=24, len=72, chksum=27853)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:22:33:44:55:77', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.2', dst='2.2.2.1')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=22, dport=23, len=72, chksum=27854)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:22:33:44:55:77', type=34525)/IPv6(version=6, tc=0, fl=0, plen=108, nh=47, hlim=64, src='::11', dst='::22')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=104, id=1, flags=0, frag=0, ttl=64, proto=6, chksum=63291, src='192.168.1.1', dst='192.168.1.2')/TCP(sport=22, dport=23, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=64786, urgptr=0)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:15:28              dut.10.240.183.62: port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x8ccb4ab9 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x57a618a7 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x3337ee7a - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x77dafa0a - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x505472fc - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x8ccb4ab9 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=162 - nb_segs=1 - RSS hash=0x8ccb4ab9 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

30/07/2020 11:15:28                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107728.8297284 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:32                         tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107728.8297284 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:35                         tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107728.8297284
30/07/2020 11:15:35                         tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54556)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::12')/UDP(sport=1234, dport=5678, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::21', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54557)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1235, dport=5678, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5679, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:22:33:44:55:77', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.2', dst='2.2.2.1')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54556)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:22:33:44:55:77', type=34525)/IPv6(version=6, tc=0, fl=0, plen=116, nh=47, hlim=64, src='::33', dst='::44')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54556)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:15:37              dut.10.240.183.62: port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0xa87b5936 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0xde68f054 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0x93091480 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0x99c7a5cb - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0x548607d7 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0xa87b5936 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP  - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 
port 0/queue 0: received 1 packets
  src=00:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=170 - nb_segs=1 - RSS hash=0xa87b5936 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP  - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
  ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN 

30/07/2020 11:15:37                DcfDatePathTest: Test Case test_default_rss_l4 Result PASSED:
30/07/2020 11:15:37              dut.10.240.183.62: quit
30/07/2020 11:15:38              dut.10.240.183.62: quit
Telling cores to stop...
Waiting for lcores to finish...

  ---------------------- Forward statistics for port 0  ----------------------
  RX-packets: 26             RX-dropped: 0             RX-total: 26
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ----------------------------------------------------------------------------

  +++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
  RX-packets: 26             RX-dropped: 0             RX-total: 26
  TX-packets: 0              TX-dropped: 0             TX-total: 0
  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Done.

Stopping port 0...
Stopping ports...
Done

Shutting down port 0...
Closing ports...
Done

Bye...
30/07/2020 11:15:40                            dts: 
TEST SUITE ENDED: DcfDatePathTest

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [dts] [PATCH V1 1/2] test_plans:add new test plan
  2020-07-31  8:19 [dts] [PATCH V1 1/2] test_plans:add new test plan Xu hailin
  2020-07-31  8:19 ` [dts] [PATCH V1 2/2] tests:add new suite Xu hailin
  2020-07-31  8:19 ` [dts] [PATCH V1 0/2] test_plans: adds, tests: adds Xu hailin
@ 2020-08-06  1:27 ` Chen, Zhaoyan
  2 siblings, 0 replies; 9+ messages in thread
From: Chen, Zhaoyan @ 2020-08-06  1:27 UTC (permalink / raw)
  To: Xu, HailinX, dts; +Cc: Xu, HailinX, Chen, Zhaoyan

Acked-by: Zhaoyan Chen <zhaoyan.chen@intel.com>



Regards,
Zhaoyan Chen

> -----Original Message-----
> From: dts <dts-bounces@dpdk.org> On Behalf Of Xu hailin
> Sent: Friday, July 31, 2020 4:19 PM
> To: dts@dpdk.org
> Cc: Xu, HailinX <hailinx.xu@intel.com>
> Subject: [dts] [PATCH V1 1/2] test_plans:add new test plan
> 
> From: "Xu,Hailin" <hailinx.xu@intel.com>
> 
> add cvl dcf new test plan:test_plans/cvl_dcf_date_path_test_plan.rst
> 
> Signed-off-by: Xu,Hailin <hailinx.xu@intel.com>
> ---
>  test_plans/cvl_dcf_date_path_test_plan.rst | 203
> +++++++++++++++++++++
>  1 file changed, 203 insertions(+)
>  create mode 100755 test_plans/cvl_dcf_date_path_test_plan.rst
> 
> diff --git a/test_plans/cvl_dcf_date_path_test_plan.rst
> b/test_plans/cvl_dcf_date_path_test_plan.rst
> new file mode 100755
> index 0000000..380090f
> --- /dev/null
> +++ b/test_plans/cvl_dcf_date_path_test_plan.rst
> @@ -0,0 +1,203 @@
> +
> +Common steps for launching DCF
> +==============================
> +
> +Generate 1 trust VF on 1 PF, and request 1 DCF on the trust VF.
> +PF should grant DCF mode to it.
> +
> +Generate 4 VFs on PF ::
> +
> +    echo 4 > /sys/bus/pci/devices/0000:18:00.0/sriov_numvfs
> +
> +Set a VF as trust ::
> +
> +    ip link set enp24s0f0 vf 0 trust on
> +    ip link set enp27s0f0 vf 0 mac D2:6B:4C:EB:1C:26
> +
> +Launch dpdk on the VF, request DCF mode ::
> +
> +    ./usertools/dpdk-devbind.py -b vfio-pci 18:01.0
> +    ./x86_64-native-linuxapp-gcc/app/testpmd -l 6-10 -n 4 -w
> + 18:01.0,cap=dcf --file-prefix=vf -- -i
> +
> +
> +Test Case: Launch DCF and do macfwd
> +===================================
> +
> +Execute **common steps** to prepare DCF test environment
> +
> +Set macfwd ::
> +
> +    set fwd mac
> +    start
> +
> +Launch tcpdump to sniffer the packets from DCF ::
> +
> +    tcpdump -i enp24s0f1 -vvv -Q in
> +
> +Send packets from tester(scapy) to the VF by MAC
> address(D2:6B:4C:EB:1C:26) ::
> +
> +    p = Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="192.168.1.1",dst="192.168.1.3")/Raw('x'*6
> 4)
> +    sendp(p, iface=intf, count=100)
> +
> +Expect tester can get packets which loopbacked by DCF.
> +
> +
> +Test Case: Check default rss for L3
> +===================================
> +
> +DCF data path support RSS packets by default. For L3 packets, input set is
> IP src/dst.
> +For tunneling packets, input set is inner IP src/dst.
> +
> +Execute **common steps** to prepare DCF test environment
> +
> +Set rxonly forward mode ::
> +
> +    set fwd rxonly
> +    set verbose 1
> +    start
> +
> +Send a series packets to check if DCF RSS is correct for IPv4 ::
> +
> +    intf="enp175s0f0"
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="192.168.1.1",
> dst="192.168.1.2")/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="192.168.1.1",
> dst="192.168.1.3")/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="192.168.1.3",
> dst="192.168.1.2")/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> + src="00:11:22:33:44:55")/IP(src="192.168.1.1",
> + dst="192.168.1.2")/Raw('x'*64), iface=intf)
> +
> +Expected: p1 hash value is not equal to p2 or p3, and should be same to
> p4.
> +
> +Send a series packets to check if DCF RSS is correct for IPv6 ::
> +
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IPv6(src="::22", dst="::11")/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IPv6(src="::22", dst="::12")/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IPv6(src="::21", dst="::11")/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> + src="00:11:22:33:44:55")/IPv6(src="::22", dst="::11")/Raw('x'*64),
> + iface=intf)
> +
> +Expected: p1 hash value is not equal to p2 or p3, and should be same to
> p4.
> +
> +Send a series packets to check if DCF RSS is correct for tunnelling packet
> (inner IPv4) ::
> +
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IP(src="192.168.1.1", dst="192.168.1.2")/Raw('x'*64),
> iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IP(src="192.168.1.1", dst="192.168.1.3")/Raw('x'*64),
> iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IP(src="192.168.1.3", dst="192.168.1.2")/Raw('x'*64),
> iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="11:22:33:44:55:77")/IP(src="1.1.1.2",
> dst="2.2.2.1")/GRE()/IP(src="192.168.1.1", dst="192.168.1.2")/Raw('x'*64),
> iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> + src="11:22:33:44:55:77")/IPv6(src="::11",
> + dst="::22")/GRE()/IP(src="192.168.1.1",
> + dst="192.168.1.2")/Raw('x'*64), iface=intf)
> +
> +
> +Expected: p1 hash value is not equal to p2 or p3. p1 hash value is equal
> to p4 and p5.
> +
> +
> +Send a series packets to check if DCF RSS is correct for tunnelling packet
> (inner IPv6) ::
> +
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::11")/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::12")/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IPv6(src="::21", dst="::11")/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="11:22:33:44:55:77")/IP(src="1.1.1.2",
> dst="2.2.2.1")/GRE()/IPv6(src="::22", dst="::11")/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> + src="11:22:33:44:55:77")/IPv6(src="::33",
> + dst="::44")/GRE()/IPv6(src="::22", dst="::11")/Raw('x'*64),
> + iface=intf)
> +
> +Expected: p1 hash value is not equal to p2 or p3. p1 hash value is equal
> to p4 and p5.
> +
> +
> +Test Case: Check default rss for L4
> +===================================
> +
> +DCF data path support RSS packets by default. For L3 packets, input set is
> IP src/dst.
> +For tunneling packets, input set is inner IP src/dst.
> +
> +Execute **common steps** to prepare DCF test environment
> +
> +Set rxonly forward mode ::
> +
> +    set fwd rxonly
> +    set verbose 1
> +    start
> +
> +Send a series packets to check if DCF RSS is correct for IPv4 ::
> +
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="192.168.1.1",
> dst="192.168.1.2")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="192.168.1.1",
> dst="192.168.1.3")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="192.168.1.3",
> dst="192.168.1.2")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="192.168.1.1",
> dst="192.168.1.2")/UDP(sport=1235, dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="192.168.1.1",
> dst="192.168.1.2")/UDP(sport=1234, dport=5679)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> + src="00:22:33:44:55:77")/IP(src="192.168.1.1",
> + dst="192.168.1.2")/TCP(sport=1234, dport=5678)/Raw('x'*64),
> + iface=intf)
> +
> +Expected: p1 hash value is not equal to p2 or p3 or p4 or p5, and should
> be equal to p6.
> +
> +Send a series packets to check if DCF RSS is correct for IPv6 ::
> +
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IPv6(src="::22", dst="::11")/UDP(sport=1234,
> dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IPv6(src="::22", dst="::12")/UDP(sport=1234,
> dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IPv6(src="::21", dst="::11")/UDP(sport=1234,
> dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IPv6(src="::22", dst="::11")/UDP(sport=1235,
> dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IPv6(src="::22", dst="::11")/UDP(sport=1234,
> dport=5679)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> + src="11:22:33:44:55:77")/IPv6(src="::22", dst="::11")/TCP(sport=1234,
> + dport=5678)/Raw('x'*64), iface=intf)
> +
> +Expected: p1 hash value is not equal to p2 or p3 or p4 or p5, and should
> be equal to p6.
> +
> +Send a series packets to check if DCF RSS is correct for tunnelling packet
> (inner IPv4) ::
> +
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IP(src="192.168.1.1",
> dst="192.168.1.2")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IP(src="192.168.1.1",
> dst="192.168.1.3")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IP(src="192.168.1.3",
> dst="192.168.1.2")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IP(src="192.168.1.1",
> dst="192.168.1.2")/UDP(sport=1235, dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IP(src="192.168.1.1",
> dst="192.168.1.2")/UDP(sport=1234, dport=5679)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:22:33:44:55:77")/IP(src="1.1.1.2",
> dst="2.2.2.1")/GRE()/IP(src="192.168.1.1",
> dst="192.168.1.2")/UDP(sport=1234, dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> + src="00:22:33:44:55:77")/IPv6(src="::11",
> + dst="::22")/GRE()/IP(src="192.168.1.1",
> + dst="192.168.1.2")/TCP(sport=1234, dport=5678)/Raw('x'*64),
> + iface=intf)
> +
> +Expected: p1 hash value is not equal to p2 or p3 or p4 or p5, and should
> be equal to p6 and p7.
> +
> +
> +Send a series packets to check if DCF RSS is correct for tunnelling packet
> (inner IPv6) ::
> +
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::11")/UDP(sport=1234,
> dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::12")/UDP(sport=1234,
> dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IPv6(src="::21", dst="::11")/UDP(sport=1234,
> dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::11")/UDP(sport=1235,
> dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:11:22:33:44:55")/IP(src="1.1.1.1",
> dst="2.2.2.2")/GRE()/IPv6(src="::22", dst="::11")/UDP(sport=1234,
> dport=5679)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> src="00:22:33:44:55:77")/IP(src="1.1.1.2",
> dst="2.2.2.1")/GRE()/IPv6(src="::22", dst="::11")/UDP(sport=1234,
> dport=5678)/Raw('x'*64), iface=intf)
> +    sendp(Ether(dst="D2:6B:4C:EB:1C:26",
> + src="00:22:33:44:55:77")/IPv6(src="::33",
> + dst="::44")/GRE()/IPv6(src="::22", dst="::11")/UDP(sport=1234,
> + dport=5678)/Raw('x'*64), iface=intf)
> +
> +Expected: p1 hash value is not equal to p2 or p3 or p4 or p5, and should
> be equal to p6 and p7.
> +
> +
> +Test Case: Create rule with to original VF action
> +=================================================
> +
> +DCF data path support RSS packets by default. For L3 packets, input set is
> IP src/dst.
> +For tunneling packets, input set is inner IP src/dst.
> +
> +Execute **common steps** to prepare DCF test environment
> +
> +Set rxonly forward mode ::
> +
> +    set fwd rxonly
> +    set verbose 1
> +    start
> +
> +Send a packet, check the DCF can't recieve the packet (Dest mac address
> is not DCF's mac) ::
> +
> +
> +
> sendp([Ether(dst="68:05:ca:8d:ed:a8")/IPv6(src="CDCD:910A:2222:5498:84
> + 75:1111:3900:1518",
> +
> dst="CDCD:910A:2222:5498:8475:1111:3900:2020",tc=3)/TCP(sport=25,dp
> ort
> + =23)/("X"*480)], iface=intf, count=1)
> +
> +Create a rule to DCF ::
> +
> +    flow create 0 ingress pattern eth dst is 68:05:ca:8d:ed:a8 / ipv6
> + dst is CDCD:910A:2222:5498:8475:1111:3900:2020 tc is 3 / tcp src is 25
> + dst is 23 / end actions vf original 1 / end
> +
> +Send the packet again, check DCF can recieve the packet ::
> +
> +
> +
> sendp([Ether(dst="68:05:ca:8d:ed:a8")/IPv6(src="CDCD:910A:2222:5498:84
> + 75:1111:3900:1518",
> +
> dst="CDCD:910A:2222:5498:8475:1111:3900:2020",tc=3)/TCP(sport=25,dp
> ort
> + =23)/("X"*480)], iface=intf, count=1)
> +
> +Destory the rule on DCF ::
> +
> +    flow destroy 0 rule 0
> +
> +Send the packet agiain, check DCF can't recieve the packet ::
> +
> +
> +
> sendp([Ether(dst="68:05:ca:8d:ed:a8")/IPv6(src="CDCD:910A:2222:5498:84
> + 75:1111:3900:1518",
> +
> dst="CDCD:910A:2222:5498:8475:1111:3900:2020",tc=3)/TCP(sport=25,dp
> ort
> + =23)/("X"*480)], iface=intf, count=1)
> +
> +
> +Test Case: Measure performance of DCF interface
> +===============================================
> +
> +The steps are same to iAVF performance test, a slight difference on
> +launching testpmd devarg. DCF need cap=dcf option.
> +Expect the performance is same to iAVF
> \ No newline at end of file
> --
> 2.17.1


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [dts] [PATCH V1 0/2] test_plans: adds, tests: adds
  2020-08-03  6:09   ` Xu, HailinX
@ 2020-08-06  1:27     ` Chen, Zhaoyan
  0 siblings, 0 replies; 9+ messages in thread
From: Chen, Zhaoyan @ 2020-08-06  1:27 UTC (permalink / raw)
  To: Xu, HailinX, dts; +Cc: Chen, Zhaoyan

Acked-by: Zhaoyan Chen <zhaoyan.chen@intel.com>



Regards,
Zhaoyan Chen

> -----Original Message-----
> From: dts <dts-bounces@dpdk.org> On Behalf Of Xu, HailinX
> Sent: Monday, August 3, 2020 2:10 PM
> To: dts@dpdk.org
> Subject: Re: [dts] [PATCH V1 0/2] test_plans: adds, tests: adds
> 
> Tested-by:  Xu, HailinX <hailinx.xu@intel.com>
> 
> Regards,
> Xu, Hailin
> 
> 
> -----Original Message-----
> From: Xu, HailinX
> Sent: Friday, July 31, 2020 4:19 PM
> To: dts@dpdk.org
> Cc: Xu, HailinX <hailinx.xu@intel.com>
> Subject: [dts][PATCH V1 0/2] test_plans: adds, tests: adds
> 
> From: "Xu,Hailin" <hailinx.xu@intel.com>
> 
> add cvl dcf new suite
> 
> Xu,Hailin (2):
>   test_plans/cvl_dcf_date_path:add new test plan
>   tests/TestSuite_cvl_dcf_date_path:add new suite
> 
>  test_plans/cvl_dcf_date_path_test_plan.rst | 203
> ++++++++++++++++++++
>  tests/TestSuite_cvl_dcf_date_path.py       | 206 +++++++++++++++++++++
>  2 files changed, 409 insertions(+)
>  create mode 100755 test_plans/cvl_dcf_date_path_test_plan.rst
>  create mode 100755 tests/TestSuite_cvl_dcf_date_path.py
> 
> --
> 2.17.1


^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [dts] [PATCH V1 0/2] test_plans: adds, tests: adds
  2020-07-31  8:19 ` [dts] [PATCH V1 0/2] test_plans: adds, tests: adds Xu hailin
  2020-08-03  6:09   ` Xu, HailinX
@ 2020-08-12  8:00   ` Tu, Lijuan
  1 sibling, 0 replies; 9+ messages in thread
From: Tu, Lijuan @ 2020-08-12  8:00 UTC (permalink / raw)
  To: Xu, HailinX, dts; +Cc: Xu, HailinX

> add cvl dcf new suite
> 
> Xu,Hailin (2):
>   test_plans/cvl_dcf_date_path:add new test plan
>   tests/TestSuite_cvl_dcf_date_path:add new suite
> 
>  test_plans/cvl_dcf_date_path_test_plan.rst | 203 ++++++++++++++++++++
>  tests/TestSuite_cvl_dcf_date_path.py       | 206 +++++++++++++++++++++

Applied

^ permalink raw reply	[flat|nested] 9+ messages in thread

* Re: [dts] [PATCH v1 0/2] test_plans:adds, tests:adds
  2021-02-23  7:10 [dts] [PATCH v1 0/2] test_plans:adds, tests:adds Hailin Xu
@ 2021-02-23  7:37 ` Xu, HailinX
  0 siblings, 0 replies; 9+ messages in thread
From: Xu, HailinX @ 2021-02-23  7:37 UTC (permalink / raw)
  To: dts; +Cc: Lin, Xueqin

[-- Attachment #1: Type: text/plain, Size: 344 bytes --]

Tested-by: Xu, HailinX <hailinx.xu@intel.com>

Regards,
Xu, Hailin

>-----Original Message-----
>From: Xu, HailinX <hailinx.xu@intel.com> 
>Sent: Tuesday, February 23, 2021 3:11 PM
>To: dts@dpdk.org
>Cc: Lin, Xueqin <xueqin.lin@intel.com>; Xu, HailinX <hailinx.xu@intel.com>
>Subject: [dts][PATCH v1 0/2] test_plans:adds, tests:adds

[-- Attachment #2: TestIAVFFdir.log --]
[-- Type: application/octet-stream, Size: 6273050 bytes --]

^ permalink raw reply	[flat|nested] 9+ messages in thread

* [dts] [PATCH v1 0/2] test_plans:adds, tests:adds
@ 2021-02-23  7:10 Hailin Xu
  2021-02-23  7:37 ` Xu, HailinX
  0 siblings, 1 reply; 9+ messages in thread
From: Hailin Xu @ 2021-02-23  7:10 UTC (permalink / raw)
  To: dts; +Cc: xueqin.lin, Hailin Xu

add without input set IPv4/IPv6 tcp/udp fdir rule cases.

Hailin Xu (2):
  test_plans/iavf_fdir:add without input set cases
  tests/iavf_fdir:add without input set cases

 test_plans/iavf_fdir_test_plan.rst | 259 ++++++++++++++++++++++++++++
 tests/TestSuite_iavf_fdir.py       | 265 ++++++++++++++++++++++++++++-
 2 files changed, 516 insertions(+), 8 deletions(-)

-- 
2.17.1


^ permalink raw reply	[flat|nested] 9+ messages in thread

end of thread, other threads:[~2021-02-23  7:37 UTC | newest]

Thread overview: 9+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2020-07-31  8:19 [dts] [PATCH V1 1/2] test_plans:add new test plan Xu hailin
2020-07-31  8:19 ` [dts] [PATCH V1 2/2] tests:add new suite Xu hailin
2020-07-31  8:19 ` [dts] [PATCH V1 0/2] test_plans: adds, tests: adds Xu hailin
2020-08-03  6:09   ` Xu, HailinX
2020-08-06  1:27     ` Chen, Zhaoyan
2020-08-12  8:00   ` Tu, Lijuan
2020-08-06  1:27 ` [dts] [PATCH V1 1/2] test_plans:add new test plan Chen, Zhaoyan
2021-02-23  7:10 [dts] [PATCH v1 0/2] test_plans:adds, tests:adds Hailin Xu
2021-02-23  7:37 ` Xu, HailinX

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).