Test-Label: Intel Niantic on Fedora Test-Status: ERROR Patchwork: http://www.dpdk.org/dev/patchwork/patch/8525/ DPDK git baseline: 3764b6724b83b41651fb9b598ef0221641c15ed4 Patchwork ID: 8525 http://www.dpdk.org/dev/patchwork/patch/8525/ Submitter: Harry van Haaren Date: Mon, 2 Nov 2015 10:56:09 +0000 Source Compilation: OS: fedora Nic: niantic i686-native-linuxapp-gcc: compile pass x86_64-native-linuxapp-gcc: compile pass DTS validation: OS: fedora Nic: Niantic TestType: auto GCC: 4 x86_64-native-linuxapp-gcc: total 75, passed 72, failed 3. Failed Case List: Target: x86_64-native-linuxapp-gcc OS: fedora Failed DTS case: checksum_offload_disable: http://dpdk.org/browse/tools/dts/tree/test_plans/checksum_offload_test_plan.rst checksum_offload_enable: http://dpdk.org/browse/tools/dts/tree/test_plans/checksum_offload_test_plan.rst checksum_offload_with_vlan: http://dpdk.org/browse/tools/dts/tree/test_plans/checksum_offload_test_plan.rst DTS Validation Error: ======================================================================================================================== ======================================================================================================================== TEST SUITE : TestChecksumOffload ------------------------------------------------------------------------------- Begin: Test Casetest_checksum_offload_disable -------------------------------------------------- FAILED 'Unexpected Packets Drop' -------------------------------------------------- [ SUITE_DUT_CMD] ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4 -- -i --portmask=0x3 --disable-hw-vlan --enable-rx-cksum --crc-strip --txqflags=0 [ SUITE_DUT_CMD] set verbose 1 [ SUITE_DUT_CMD] set fwd csum [ SUITE_DUT_CMD] start [SUITE_TESTER_CMD] scapy [SUITE_TESTER_CMD] sys.path.append("./") [SUITE_TESTER_CMD] from sctp import * [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/UDP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/TCP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="10.0.0.2")/UDP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="10.0.0.2")/TCP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] exit() [SUITE_TESTER_CMD] echo -n '' > scapyResult.txt [SUITE_TESTER_CMD] scp sniff.py root@10.239.128.80:~/ [SUITE_TESTER_CMD] SCAPY Receive setup: [SUITE_TESTER_CMD] killall scapy 2>/dev/null; echo tester [SUITE_TESTER_CMD] scapy [SUITE_TESTER_CMD] subprocess.call("scapy -c sniff.py &", shell=True) [SUITE_TESTER_CMD] sys.path.append("./") [SUITE_TESTER_CMD] import sctp [SUITE_TESTER_CMD] from sctp import * [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/UDP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/TCP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="10.0.0.1",chksum=0x0)/UDP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="10.0.0.1",chksum=0x0)/TCP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] exit() [SUITE_TESTER_CMD] cat scapyResult.txt [SUITE_TESTER_CMD] SCAPY Result: End test_checksum_offload_disable ------------------------------------------------------------------------------- ------------------------------------------------------------------------------- Begin: Test Casetest_checksum_offload_enable -------------------------------------------------- FAILED 'Unexpected Packets Drop' -------------------------------------------------- [ SUITE_DUT_CMD] ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4 -- -i --portmask=0x3 --disable-hw-vlan --enable-rx-cksum --crc-strip --txqflags=0 [ SUITE_DUT_CMD] set verbose 1 [ SUITE_DUT_CMD] set fwd csum [ SUITE_DUT_CMD] csum set ip hw 0 [ SUITE_DUT_CMD] csum set udp hw 0 [ SUITE_DUT_CMD] csum set tcp hw 0 [ SUITE_DUT_CMD] csum set sctp hw 0 [ SUITE_DUT_CMD] csum set ip hw 1 [ SUITE_DUT_CMD] csum set udp hw 1 [ SUITE_DUT_CMD] csum set tcp hw 1 [ SUITE_DUT_CMD] csum set sctp hw 1 [ SUITE_DUT_CMD] start [SUITE_TESTER_CMD] scapy [SUITE_TESTER_CMD] sys.path.append("./") [SUITE_TESTER_CMD] from sctp import * [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/UDP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/SCTP()/("X"*48) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/TCP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/UDP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/TCP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] exit() [SUITE_TESTER_CMD] echo -n '' > scapyResult.txt [SUITE_TESTER_CMD] scp sniff.py root@10.239.128.80:~/ [SUITE_TESTER_CMD] SCAPY Receive setup: [SUITE_TESTER_CMD] killall scapy 2>/dev/null; echo tester [SUITE_TESTER_CMD] scapy [SUITE_TESTER_CMD] subprocess.call("scapy -c sniff.py &", shell=True) [SUITE_TESTER_CMD] sys.path.append("./") [SUITE_TESTER_CMD] import sctp [SUITE_TESTER_CMD] from sctp import * [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/UDP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/SCTP(chksum=0xf)/("X"*48)], iface="p785p2") [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/TCP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/UDP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/TCP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] exit() [SUITE_TESTER_CMD] cat scapyResult.txt [SUITE_TESTER_CMD] SCAPY Result: End test_checksum_offload_enable ------------------------------------------------------------------------------- ------------------------------------------------------------------------------- Begin: Test Casetest_checksum_offload_with_vlan -------------------------------------------------- FAILED 'Unexpected Packets Drop' -------------------------------------------------- [ SUITE_DUT_CMD] ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4 -- -i --portmask=0x3 --disable-hw-vlan --enable-rx-cksum --crc-strip --txqflags=0 [ SUITE_DUT_CMD] set verbose 1 [ SUITE_DUT_CMD] set fwd csum [ SUITE_DUT_CMD] csum set ip hw 0 [ SUITE_DUT_CMD] csum set udp hw 0 [ SUITE_DUT_CMD] csum set tcp hw 0 [ SUITE_DUT_CMD] csum set sctp hw 0 [ SUITE_DUT_CMD] csum set ip hw 1 [ SUITE_DUT_CMD] csum set udp hw 1 [ SUITE_DUT_CMD] csum set tcp hw 1 [ SUITE_DUT_CMD] csum set sctp hw 1 [ SUITE_DUT_CMD] start [SUITE_TESTER_CMD] scapy [SUITE_TESTER_CMD] sys.path.append("./") [SUITE_TESTER_CMD] from sctp import * [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/UDP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/SCTP()/("X"*48) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::2")/TCP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/UDP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] p = Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(src="127.0.0.2")/TCP()/("X"*46) [SUITE_TESTER_CMD] p.show2() [SUITE_TESTER_CMD] exit() [SUITE_TESTER_CMD] echo -n '' > scapyResult.txt [SUITE_TESTER_CMD] scp sniff.py root@10.239.128.80:~/ [SUITE_TESTER_CMD] SCAPY Receive setup: [SUITE_TESTER_CMD] killall scapy 2>/dev/null; echo tester [SUITE_TESTER_CMD] scapy [SUITE_TESTER_CMD] subprocess.call("scapy -c sniff.py &", shell=True) [SUITE_TESTER_CMD] sys.path.append("./") [SUITE_TESTER_CMD] import sctp [SUITE_TESTER_CMD] from sctp import * [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/UDP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/SCTP(chksum=0xf)/("X"*48)], iface="p785p2") [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IPv6(src="::1")/TCP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/UDP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] sendp([Ether(dst="90:e2:ba:4a:54:81", src="52:00:00:00:00:00")/IP(chksum=0x0)/TCP(chksum=0xf)/("X"*46)], iface="p785p2") [SUITE_TESTER_CMD] exit() [SUITE_TESTER_CMD] cat scapyResult.txt [SUITE_TESTER_CMD] SCAPY Result: End test_checksum_offload_with_vlan ------------------------------------------------------------------------------- [SUITE_DUT_CMD] quit DPDK STV team