automatic DPDK test reports
 help / color / mirror / Atom feed
* [dpdk-test-report] |ERROR| pw 8546 bnx2x: use bnx2xvf driver for VF devices
@ 2015-11-02 20:18 sys_stv
  2015-11-03  3:11 ` Liu, Yong
  0 siblings, 1 reply; 2+ messages in thread
From: sys_stv @ 2015-11-02 20:18 UTC (permalink / raw)
  To: test-report, 3chas3

[-- Attachment #1: Type: text/plain, Size: 9763 bytes --]

Test-Label: Intel Niantic on Fedora
Test-Status: ERROR
Patchwork: http://www.dpdk.org/dev/patchwork/patch/8546/

DPDK git baseline: 3764b6724b83b41651fb9b598ef0221641c15ed4
Patchwork ID: 8546
http://www.dpdk.org/dev/patchwork/patch/8546/
Submitter: Chas Williams <3chas3@gmail.com>
Date: Mon,  2 Nov 2015 13:32:40 -0500

Source Compilation:
OS: fedora
Nic: niantic
i686-native-linuxapp-gcc: compile pass
x86_64-native-linuxapp-gcc: compile pass

DTS validation: 
OS: fedora
Nic: Niantic
TestType: auto
GCC: 4
x86_64-native-linuxapp-gcc:  total 75, passed 72, failed 3.
Failed Case List:
Target: x86_64-native-linuxapp-gcc
OS: fedora
Failed DTS case: 
checksum_offload_disable: http://dpdk.org/browse/tools/dts/tree/test_plans/checksum_offload_test_plan.rst
checksum_offload_enable: http://dpdk.org/browse/tools/dts/tree/test_plans/checksum_offload_test_plan.rst
checksum_offload_with_vlan: http://dpdk.org/browse/tools/dts/tree/test_plans/checksum_offload_test_plan.rst

DTS Validation Error:
========================================================================================================================
========================================================================================================================
TEST SUITE : TestChecksumOffload

-------------------------------------------------------------------------------
Begin: Test Casetest_checksum_offload_disable
--------------------------------------------------
FAILED  'Unexpected Packets Drop'
--------------------------------------------------
[   SUITE_DUT_CMD]  ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4  -- -i --portmask=0x3 --disable-hw-vlan --enable-rx-cksum --crc-strip --txqflags=0
[   SUITE_DUT_CMD]  set verbose 1
[   SUITE_DUT_CMD]  set fwd csum
[   SUITE_DUT_CMD]  start
[SUITE_TESTER_CMD]  scapy
[SUITE_TESTER_CMD]  sys.path.append("./")
[SUITE_TESTER_CMD]  from sctp import *
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/UDP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/TCP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="10.0.0.2")/UDP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="10.0.0.2")/TCP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  exit()
[SUITE_TESTER_CMD]  echo -n '' >  scapyResult.txt
[SUITE_TESTER_CMD]  scp sniff.py root@10.239.128.80:~/
[SUITE_TESTER_CMD]  SCAPY Receive setup:
[SUITE_TESTER_CMD]  killall scapy 2>/dev/null; echo tester
[SUITE_TESTER_CMD]  scapy
[SUITE_TESTER_CMD]  subprocess.call("scapy -c sniff.py &", shell=True)
[SUITE_TESTER_CMD]  sys.path.append("./")
[SUITE_TESTER_CMD]  import sctp
[SUITE_TESTER_CMD]  from sctp import *
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/UDP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/TCP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="10.0.0.1",chksum=0x0)/UDP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="10.0.0.1",chksum=0x0)/TCP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  exit()
[SUITE_TESTER_CMD]  cat scapyResult.txt
[SUITE_TESTER_CMD]  SCAPY Result:
End test_checksum_offload_disable
-------------------------------------------------------------------------------

-------------------------------------------------------------------------------
Begin: Test Casetest_checksum_offload_enable
--------------------------------------------------
FAILED  'Unexpected Packets Drop'
--------------------------------------------------
[   SUITE_DUT_CMD]  ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4  -- -i --portmask=0x3 --disable-hw-vlan --enable-rx-cksum --crc-strip --txqflags=0
[   SUITE_DUT_CMD]  set verbose 1
[   SUITE_DUT_CMD]  set fwd csum
[   SUITE_DUT_CMD]  csum set ip hw 0
[   SUITE_DUT_CMD]  csum set udp hw 0
[   SUITE_DUT_CMD]  csum set tcp hw 0
[   SUITE_DUT_CMD]  csum set sctp hw 0
[   SUITE_DUT_CMD]  csum set ip hw 1
[   SUITE_DUT_CMD]  csum set udp hw 1
[   SUITE_DUT_CMD]  csum set tcp hw 1
[   SUITE_DUT_CMD]  csum set sctp hw 1
[   SUITE_DUT_CMD]  start
[SUITE_TESTER_CMD]  scapy
[SUITE_TESTER_CMD]  sys.path.append("./")
[SUITE_TESTER_CMD]  from sctp import *
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/UDP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/SCTP()/("X"*48)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/TCP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/UDP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/TCP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  exit()
[SUITE_TESTER_CMD]  echo -n '' >  scapyResult.txt
[SUITE_TESTER_CMD]  scp sniff.py root@10.239.128.80:~/
[SUITE_TESTER_CMD]  SCAPY Receive setup:
[SUITE_TESTER_CMD]  killall scapy 2>/dev/null; echo tester
[SUITE_TESTER_CMD]  scapy
[SUITE_TESTER_CMD]  subprocess.call("scapy -c sniff.py &", shell=True)
[SUITE_TESTER_CMD]  sys.path.append("./")
[SUITE_TESTER_CMD]  import sctp
[SUITE_TESTER_CMD]  from sctp import *
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/UDP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/SCTP(chksum=0xf)/("X"*48)], iface="p785p2")
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/TCP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/UDP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/TCP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  exit()
[SUITE_TESTER_CMD]  cat scapyResult.txt
[SUITE_TESTER_CMD]  SCAPY Result:
End test_checksum_offload_enable
-------------------------------------------------------------------------------

-------------------------------------------------------------------------------
Begin: Test Casetest_checksum_offload_with_vlan
--------------------------------------------------
FAILED  'Unexpected Packets Drop'
--------------------------------------------------
[   SUITE_DUT_CMD]  ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4  -- -i --portmask=0x3 --disable-hw-vlan --enable-rx-cksum --crc-strip --txqflags=0
[   SUITE_DUT_CMD]  set verbose 1
[   SUITE_DUT_CMD]  set fwd csum
[   SUITE_DUT_CMD]  csum set ip hw 0
[   SUITE_DUT_CMD]  csum set udp hw 0
[   SUITE_DUT_CMD]  csum set tcp hw 0
[   SUITE_DUT_CMD]  csum set sctp hw 0
[   SUITE_DUT_CMD]  csum set ip hw 1
[   SUITE_DUT_CMD]  csum set udp hw 1
[   SUITE_DUT_CMD]  csum set tcp hw 1
[   SUITE_DUT_CMD]  csum set sctp hw 1
[   SUITE_DUT_CMD]  start
[SUITE_TESTER_CMD]  scapy
[SUITE_TESTER_CMD]  sys.path.append("./")
[SUITE_TESTER_CMD]  from sctp import *
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/UDP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/SCTP()/("X"*48)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/TCP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/UDP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/TCP()/("X"*46)
[SUITE_TESTER_CMD]  p.show2()
[SUITE_TESTER_CMD]  exit()
[SUITE_TESTER_CMD]  echo -n '' >  scapyResult.txt
[SUITE_TESTER_CMD]  scp sniff.py root@10.239.128.80:~/
[SUITE_TESTER_CMD]  SCAPY Receive setup:
[SUITE_TESTER_CMD]  killall scapy 2>/dev/null; echo tester
[SUITE_TESTER_CMD]  scapy
[SUITE_TESTER_CMD]  subprocess.call("scapy -c sniff.py &", shell=True)
[SUITE_TESTER_CMD]  sys.path.append("./")
[SUITE_TESTER_CMD]  import sctp
[SUITE_TESTER_CMD]  from sctp import *
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/UDP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/SCTP(chksum=0xf)/("X"*48)], iface="p785p2")
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/TCP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/UDP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/TCP(chksum=0xf)/("X"*46)], iface="p785p2")
[SUITE_TESTER_CMD]  exit()
[SUITE_TESTER_CMD]  cat scapyResult.txt
[SUITE_TESTER_CMD]  SCAPY Result:
End test_checksum_offload_with_vlan
-------------------------------------------------------------------------------
[SUITE_DUT_CMD] quit



DPDK STV team 

^ permalink raw reply	[flat|nested] 2+ messages in thread

* Re: [dpdk-test-report] |ERROR| pw 8546 bnx2x: use bnx2xvf driver for VF devices
  2015-11-02 20:18 [dpdk-test-report] |ERROR| pw 8546 bnx2x: use bnx2xvf driver for VF devices sys_stv
@ 2015-11-03  3:11 ` Liu, Yong
  0 siblings, 0 replies; 2+ messages in thread
From: Liu, Yong @ 2015-11-03  3:11 UTC (permalink / raw)
  To: sys_stv, test-report

Hi all,
The root cause of this issue is that csum forwarding changed packet destination mac in recent commit.
Our validation suite will be updated and keep pace with the latest code.

The basic function of csum offload has been verified pass, so please ignore these three failures.

> -----Original Message-----
> From: sys_stv
> Sent: Tuesday, November 03, 2015 4:18 AM
> To: test-report@dpdk.org; 3chas3@gmail.com
> Subject: |ERROR| pw 8546 bnx2x: use bnx2xvf driver for VF devices
> 
> Test-Label: Intel Niantic on Fedora
> Test-Status: ERROR
> Patchwork: http://www.dpdk.org/dev/patchwork/patch/8546/
> 
> DPDK git baseline: 3764b6724b83b41651fb9b598ef0221641c15ed4
> Patchwork ID: 8546
> http://www.dpdk.org/dev/patchwork/patch/8546/
> Submitter: Chas Williams <3chas3@gmail.com>
> Date: Mon,  2 Nov 2015 13:32:40 -0500
> 
> Source Compilation:
> OS: fedora
> Nic: niantic
> i686-native-linuxapp-gcc: compile pass
> x86_64-native-linuxapp-gcc: compile pass
> 
> DTS validation:
> OS: fedora
> Nic: Niantic
> TestType: auto
> GCC: 4
> x86_64-native-linuxapp-gcc:  total 75, passed 72, failed 3.
> Failed Case List:
> Target: x86_64-native-linuxapp-gcc
> OS: fedora
> Failed DTS case:
> checksum_offload_disable:
> http://dpdk.org/browse/tools/dts/tree/test_plans/checksum_offload_test_pla
> n.rst
> checksum_offload_enable:
> http://dpdk.org/browse/tools/dts/tree/test_plans/checksum_offload_test_pla
> n.rst
> checksum_offload_with_vlan:
> http://dpdk.org/browse/tools/dts/tree/test_plans/checksum_offload_test_pla
> n.rst
> 
> DTS Validation Error:
> ==========================================================================
> ==============================================
> ==========================================================================
> ==============================================
> TEST SUITE : TestChecksumOffload
> 
> --------------------------------------------------------------------------
> -----
> Begin: Test Casetest_checksum_offload_disable
> --------------------------------------------------
> FAILED  'Unexpected Packets Drop'
> --------------------------------------------------
> [   SUITE_DUT_CMD]  ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4
> -- -i --portmask=0x3 --disable-hw-vlan --enable-rx-cksum --crc-strip --
> txqflags=0
> [   SUITE_DUT_CMD]  set verbose 1
> [   SUITE_DUT_CMD]  set fwd csum
> [   SUITE_DUT_CMD]  start
> [SUITE_TESTER_CMD]  scapy
> [SUITE_TESTER_CMD]  sys.path.append("./")
> [SUITE_TESTER_CMD]  from sctp import *
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::2")/UDP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::2")/TCP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(src="10.0.0.2")/UDP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(src="10.0.0.2")/TCP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  exit()
> [SUITE_TESTER_CMD]  echo -n '' >  scapyResult.txt
> [SUITE_TESTER_CMD]  scp sniff.py root@10.239.128.80:~/
> [SUITE_TESTER_CMD]  SCAPY Receive setup:
> [SUITE_TESTER_CMD]  killall scapy 2>/dev/null; echo tester
> [SUITE_TESTER_CMD]  scapy
> [SUITE_TESTER_CMD]  subprocess.call("scapy -c sniff.py &", shell=True)
> [SUITE_TESTER_CMD]  sys.path.append("./")
> [SUITE_TESTER_CMD]  import sctp
> [SUITE_TESTER_CMD]  from sctp import *
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::1")/UDP(chksum=0xf)/("X"*46)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::1")/TCP(chksum=0xf)/("X"*46)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(src="10.0.0.1",chksum=0x0)/UDP(chksum=0xf)/("X
> "*46)], iface="p785p2")
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(src="10.0.0.1",chksum=0x0)/TCP(chksum=0xf)/("X
> "*46)], iface="p785p2")
> [SUITE_TESTER_CMD]  exit()
> [SUITE_TESTER_CMD]  cat scapyResult.txt
> [SUITE_TESTER_CMD]  SCAPY Result:
> End test_checksum_offload_disable
> --------------------------------------------------------------------------
> -----
> 
> --------------------------------------------------------------------------
> -----
> Begin: Test Casetest_checksum_offload_enable
> --------------------------------------------------
> FAILED  'Unexpected Packets Drop'
> --------------------------------------------------
> [   SUITE_DUT_CMD]  ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4
> -- -i --portmask=0x3 --disable-hw-vlan --enable-rx-cksum --crc-strip --
> txqflags=0
> [   SUITE_DUT_CMD]  set verbose 1
> [   SUITE_DUT_CMD]  set fwd csum
> [   SUITE_DUT_CMD]  csum set ip hw 0
> [   SUITE_DUT_CMD]  csum set udp hw 0
> [   SUITE_DUT_CMD]  csum set tcp hw 0
> [   SUITE_DUT_CMD]  csum set sctp hw 0
> [   SUITE_DUT_CMD]  csum set ip hw 1
> [   SUITE_DUT_CMD]  csum set udp hw 1
> [   SUITE_DUT_CMD]  csum set tcp hw 1
> [   SUITE_DUT_CMD]  csum set sctp hw 1
> [   SUITE_DUT_CMD]  start
> [SUITE_TESTER_CMD]  scapy
> [SUITE_TESTER_CMD]  sys.path.append("./")
> [SUITE_TESTER_CMD]  from sctp import *
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::2")/UDP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(src="127.0.0.2")/SCTP()/("X"*48)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::2")/TCP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(src="127.0.0.2")/UDP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(src="127.0.0.2")/TCP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  exit()
> [SUITE_TESTER_CMD]  echo -n '' >  scapyResult.txt
> [SUITE_TESTER_CMD]  scp sniff.py root@10.239.128.80:~/
> [SUITE_TESTER_CMD]  SCAPY Receive setup:
> [SUITE_TESTER_CMD]  killall scapy 2>/dev/null; echo tester
> [SUITE_TESTER_CMD]  scapy
> [SUITE_TESTER_CMD]  subprocess.call("scapy -c sniff.py &", shell=True)
> [SUITE_TESTER_CMD]  sys.path.append("./")
> [SUITE_TESTER_CMD]  import sctp
> [SUITE_TESTER_CMD]  from sctp import *
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::1")/UDP(chksum=0xf)/("X"*46)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(chksum=0x0)/SCTP(chksum=0xf)/("X"*48)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::1")/TCP(chksum=0xf)/("X"*46)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(chksum=0x0)/UDP(chksum=0xf)/("X"*46)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(chksum=0x0)/TCP(chksum=0xf)/("X"*46)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  exit()
> [SUITE_TESTER_CMD]  cat scapyResult.txt
> [SUITE_TESTER_CMD]  SCAPY Result:
> End test_checksum_offload_enable
> --------------------------------------------------------------------------
> -----
> 
> --------------------------------------------------------------------------
> -----
> Begin: Test Casetest_checksum_offload_with_vlan
> --------------------------------------------------
> FAILED  'Unexpected Packets Drop'
> --------------------------------------------------
> [   SUITE_DUT_CMD]  ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4
> -- -i --portmask=0x3 --disable-hw-vlan --enable-rx-cksum --crc-strip --
> txqflags=0
> [   SUITE_DUT_CMD]  set verbose 1
> [   SUITE_DUT_CMD]  set fwd csum
> [   SUITE_DUT_CMD]  csum set ip hw 0
> [   SUITE_DUT_CMD]  csum set udp hw 0
> [   SUITE_DUT_CMD]  csum set tcp hw 0
> [   SUITE_DUT_CMD]  csum set sctp hw 0
> [   SUITE_DUT_CMD]  csum set ip hw 1
> [   SUITE_DUT_CMD]  csum set udp hw 1
> [   SUITE_DUT_CMD]  csum set tcp hw 1
> [   SUITE_DUT_CMD]  csum set sctp hw 1
> [   SUITE_DUT_CMD]  start
> [SUITE_TESTER_CMD]  scapy
> [SUITE_TESTER_CMD]  sys.path.append("./")
> [SUITE_TESTER_CMD]  from sctp import *
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::2")/UDP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(src="127.0.0.2")/SCTP()/("X"*48)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::2")/TCP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(src="127.0.0.2")/UDP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  p = Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(src="127.0.0.2")/TCP()/("X"*46)
> [SUITE_TESTER_CMD]  p.show2()
> [SUITE_TESTER_CMD]  exit()
> [SUITE_TESTER_CMD]  echo -n '' >  scapyResult.txt
> [SUITE_TESTER_CMD]  scp sniff.py root@10.239.128.80:~/
> [SUITE_TESTER_CMD]  SCAPY Receive setup:
> [SUITE_TESTER_CMD]  killall scapy 2>/dev/null; echo tester
> [SUITE_TESTER_CMD]  scapy
> [SUITE_TESTER_CMD]  subprocess.call("scapy -c sniff.py &", shell=True)
> [SUITE_TESTER_CMD]  sys.path.append("./")
> [SUITE_TESTER_CMD]  import sctp
> [SUITE_TESTER_CMD]  from sctp import *
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::1")/UDP(chksum=0xf)/("X"*46)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(chksum=0x0)/SCTP(chksum=0xf)/("X"*48)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IPv6(src="::1")/TCP(chksum=0xf)/("X"*46)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(chksum=0x0)/UDP(chksum=0xf)/("X"*46)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  sendp([Ether(dst="90:e2:ba:4a:54:81",
> src="52:00:00:00:00:00")/IP(chksum=0x0)/TCP(chksum=0xf)/("X"*46)],
> iface="p785p2")
> [SUITE_TESTER_CMD]  exit()
> [SUITE_TESTER_CMD]  cat scapyResult.txt
> [SUITE_TESTER_CMD]  SCAPY Result:
> End test_checksum_offload_with_vlan
> --------------------------------------------------------------------------
> -----
> [SUITE_DUT_CMD] quit
> 
> 
> 
> DPDK STV team

^ permalink raw reply	[flat|nested] 2+ messages in thread

end of thread, other threads:[~2015-11-03  3:11 UTC | newest]

Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2015-11-02 20:18 [dpdk-test-report] |ERROR| pw 8546 bnx2x: use bnx2xvf driver for VF devices sys_stv
2015-11-03  3:11 ` Liu, Yong

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).