* Re: [dts] [PATCH V1] tests/tx_preparation: optimize script
2019-08-23 17:03 [dts] [PATCH V1] tests/tx_preparation: optimize script Wenjie Li
@ 2019-08-23 8:24 ` Yao, BingX Y
2019-09-04 5:00 ` Tu, Lijuan
1 sibling, 0 replies; 3+ messages in thread
From: Yao, BingX Y @ 2019-08-23 8:24 UTC (permalink / raw)
To: Li, WenjieX A, dts; +Cc: Li, WenjieX A
[-- Attachment #1: Type: text/plain, Size: 1607 bytes --]
Tested-by:Yao, BingX Y <bingx.y.yao@intel.com>
-----Original Message-----
From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Wenjie Li
Sent: Saturday, August 24, 2019 1:03 AM
To: dts@dpdk.org
Cc: Li, WenjieX A <wenjiex.a.li@intel.com>
Subject: [dts] [PATCH V1] tests/tx_preparation: optimize script
move stop/quit testpmd into tear_down; otherwise, if one case is failed, the testpmd is still running, it will affect the following cases.
Signed-off-by: Wenjie Li <wenjiex.a.li@intel.com>
---
tests/TestSuite_tx_preparation.py | 11 +++--------
1 file changed, 3 insertions(+), 8 deletions(-)
diff --git a/tests/TestSuite_tx_preparation.py b/tests/TestSuite_tx_preparation.py
index eea95c1..ba0aac7 100644
--- a/tests/TestSuite_tx_preparation.py
+++ b/tests/TestSuite_tx_preparation.py
@@ -173,8 +173,6 @@ class TestTX_preparation(TestCase):
self.dut_testpmd.execute_cmd('start')
self.send_packet_verify()
- self.dut_testpmd.execute_cmd('stop')
- self.dut_testpmd.quit()
def test_tx_preparation_TSO(self):
"""
@@ -185,16 +183,13 @@ class TestTX_preparation(TestCase):
self.dut_testpmd.execute_cmd('start')
self.send_packet_verify(1)
- self.dut_testpmd.execute_cmd('stop')
- self.dut_testpmd.quit()
-
def tear_down(self):
"""
Run after each test case.
- """
- pass
-
+ """
+ self.dut_testpmd.execute_cmd('stop')
+ self.dut_testpmd.quit()
def tear_down_all(self):
"""
--
2.17.1
[-- Attachment #2: TestTX_preparation.log --]
[-- Type: application/octet-stream, Size: 55884 bytes --]
23/08/2019 23:22:49 dts:
TEST SUITE : TestTX_preparation
23/08/2019 23:22:49 dts: NIC : powerville
23/08/2019 23:22:49 dut.10.240.176.197:
23/08/2019 23:22:49 tester:
23/08/2019 23:22:49 tester: ethtool -K eno50336512 rx off tx off tso off gso off gro off lro off
23/08/2019 23:22:49 tester: Cannot change large-receive-offload
23/08/2019 23:22:49 tester: ethtool -K eno50336512 rx off tx off tso off gso off gro off
23/08/2019 23:22:49 tester:
23/08/2019 23:22:49 tester: ifconfig eno50336512 mtu 9000
23/08/2019 23:22:49 tester:
23/08/2019 23:22:49 TestTX_preparation: Test Case test_tx_preparation_NonTSO Begin
23/08/2019 23:22:49 dut.10.240.176.197:
23/08/2019 23:22:50 tester:
23/08/2019 23:22:50 dut.10.240.176.197: ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4 -- -i --portmask=1 --port-topology=chained --max-pkt-len=9000 --tx-offloads=0x8000
23/08/2019 23:22:50 dut.10.240.176.197: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/rte/mp_socket
EAL: Selected IOVA mode 'PA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: PCI device 0000:00:04.0 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.1 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.2 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.3 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.4 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.5 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.6 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.7 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:18:00.0 on NUMA socket 0
EAL: probe driver: 8086:1583 net_i40e
EAL: PCI device 0000:18:00.1 on NUMA socket 0
EAL: probe driver: 8086:1583 net_i40e
EAL: PCI device 0000:1a:00.0 on NUMA socket 0
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.1 on NUMA socket 0
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.2 on NUMA socket 0
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.3 on NUMA socket 0
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:3d:00.0 on NUMA socket 0
EAL: probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:3d:00.1 on NUMA socket 0
EAL: probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:80:04.0 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.1 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.2 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.3 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.4 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.5 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.6 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.7 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:af:00.0 on NUMA socket 1
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.1 on NUMA socket 1
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.2 on NUMA socket 1
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.3 on NUMA socket 1
EAL: probe driver: 8086:1521 net_e1000_igb
Interactive-mode selected
previous number of forwarding ports 2 - changed to number of configured ports 1
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=155456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
Configuring Port 0 (socket 0)
Port 0: B4:96:91:49:96:EC
Configuring Port 1 (socket 0)
Port 1: B4:96:91:49:96:ED
Checking link statuses...
Done
23/08/2019 23:23:00 dut.10.240.176.197: show port info 0
23/08/2019 23:23:01 dut.10.240.176.197: show port info 0
********************* Infos for port 0 *********************
MAC address: B4:96:91:49:96:EC
Device name: 0000:1a:00.0
Driver name: net_e1000_igb
Connect to socket: 0
memory allocation on the socket: 0
Link status: up
Link speed: 1000 Mbps
Link duplex: full-duplex
MTU: 1500
Promiscuous mode: enabled
Allmulticast mode: disabled
Maximum number of MAC addresses: 32
Maximum number of MAC addresses of hash filtering: 0
VLAN offload:
strip off
filter off
qinq(extend) off
Hash key size in bytes: 40
Redirection table size: 128
Supported RSS offload flow types:
ipv4
ipv4-tcp
ipv4-udp
ipv6
ipv6-tcp
ipv6-udp
user defined 15
user defined 16
user defined 17
Minimum size of RX buffer: 256
Maximum configurable length of RX packet: 16383
Maximum number of VMDq pools: 8
Current number of RX queues: 1
Max possible RX queues: 8
Max possible number of RXDs per queue: 4096
Min possible number of RXDs per queue: 32
RXDs number alignment: 8
Current number of TX queues: 1
Max possible TX queues: 8
Max possible number of TXDs per queue: 4096
Min possible number of TXDs per queue: 32
TXDs number alignment: 8
Max segment number per packet: 255
Max segment number per MTU/TSO: 255
23/08/2019 23:23:01 dut.10.240.176.197: set fwd csum
23/08/2019 23:23:01 dut.10.240.176.197: set fwd csum
Set csum packet forwarding mode
23/08/2019 23:23:01 dut.10.240.176.197: set verbose 1
23/08/2019 23:23:01 dut.10.240.176.197: set verbose 1
Change verbose level from 0 to 1
23/08/2019 23:23:01 dut.10.240.176.197: port stop all
23/08/2019 23:23:01 dut.10.240.176.197: port stop all
Stopping ports...
Checking link statuses...
Done
23/08/2019 23:23:01 dut.10.240.176.197: csum set ip hw 0
23/08/2019 23:23:01 dut.10.240.176.197: csum set ip hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is sw
TCP checksum offload is sw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:23:01 dut.10.240.176.197: csum set tcp hw 0
23/08/2019 23:23:01 dut.10.240.176.197: csum set tcp hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is sw
TCP checksum offload is hw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:23:01 dut.10.240.176.197: csum set udp hw 0
23/08/2019 23:23:01 dut.10.240.176.197: csum set udp hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is hw
TCP checksum offload is hw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:23:01 dut.10.240.176.197: tso set 0 0
23/08/2019 23:23:01 dut.10.240.176.197: tso set 0 0
TSO for non-tunneled packets is disabled
23/08/2019 23:23:01 dut.10.240.176.197: port start all
23/08/2019 23:23:02 dut.10.240.176.197: port start all
Configuring Port 0 (socket 0)
Port 0: B4:96:91:49:96:EC
Port 1: B4:96:91:49:96:ED
Checking link statuses...
Done
23/08/2019 23:23:02 dut.10.240.176.197: start
23/08/2019 23:23:02 dut.10.240.176.197: start
csum packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
RX P=0/Q=0 (socket 0) -> TX P=0/Q=0 (socket 0) peer=02:00:00:00:00:00
csum packet forwarding packets/burst=32
nb forwarding cores=1 - nb forwarding ports=1
port 0: RX queue number: 1 Tx queue number: 1
Rx offloads=0x800 Tx offloads=0x800e
RX queue: 0
RX desc=512 - RX free threshold=32
RX threshold registers: pthresh=8 hthresh=8 wthresh=4
RX Offloads=0x800
TX queue: 0
TX desc=512 - TX free threshold=0
TX threshold registers: pthresh=8 hthresh=1 wthresh=16
TX offloads=0x800e - TX RS bit threshold=0
port 1: RX queue number: 1 Tx queue number: 1
Rx offloads=0x800 Tx offloads=0x8000
RX queue: 0
RX desc=512 - RX free threshold=32
RX threshold registers: pthresh=8 hthresh=8 wthresh=4
RX Offloads=0x800
TX queue: 0
TX desc=512 - TX free threshold=0
TX threshold registers: pthresh=8 hthresh=1 wthresh=16
TX offloads=0x8000 - TX RS bit threshold=0
23/08/2019 23:23:02 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:02 tester:
23/08/2019 23:23:02 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:23:02 tester: [1] 7751
23/08/2019 23:23:05 tester: scapy
23/08/2019 23:23:06 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:08 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10) /Raw(RandString(1681))], iface="eno50336512")
23/08/2019 23:23:08 tester: .
Sent 1 packets.
23/08/2019 23:23:10 tester: exit()
23/08/2019 23:23:11 tester:
23/08/2019 23:23:11 tester: killall tcpdump
23/08/2019 23:23:11 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:11 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:11 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:08.949613 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 1755: (hlim 64, next-header TCP (6) payload length: 1701) ::1.20 > ::1.80: Flags [.], cksum 0x1217 (correct), seq 0:1681, ack 0, win 8192, length 1681: HTTP
23/08/2019 23:23:11 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:11 tester:
23/08/2019 23:23:11 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:23:11 tester: [1] 7758
23/08/2019 23:23:14 tester: scapy
23/08/2019 23:23:15 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:17 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10, chksum=0x1234)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:23:17 tester: .
Sent 1 packets.
23/08/2019 23:23:19 tester: exit()
23/08/2019 23:23:19 tester:
23/08/2019 23:23:19 tester: killall tcpdump
23/08/2019 23:23:19 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:19 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:20 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:17.579809 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xa93e (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:23:20 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:20 tester:
23/08/2019 23:23:20 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:23:20 tester: [1] 7765
23/08/2019 23:23:23 tester: scapy
23/08/2019 23:23:23 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:25 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10) /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:23:26 tester: .
Sent 1 packets.
23/08/2019 23:23:28 tester: exit()
23/08/2019 23:23:28 tester:
23/08/2019 23:23:28 tester: killall tcpdump
23/08/2019 23:23:28 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:28 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:28 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:26.115015 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 124: (hlim 64, next-header TCP (6) payload length: 70) ::1.20 > ::1.80: Flags [.], cksum 0xbd4b (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:23:28 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:28 tester:
23/08/2019 23:23:28 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:23:28 tester: [1] 7772
23/08/2019 23:23:31 tester: scapy
23/08/2019 23:23:32 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:34 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP(chksum=0x1234) /TCP(flags=0x10,chksum=0x1234)/Raw(RandString(1681))], iface="eno50336512")
23/08/2019 23:23:34 tester: .
Sent 1 packets.
23/08/2019 23:23:36 tester: exit()
23/08/2019 23:23:36 tester:
23/08/2019 23:23:36 tester: killall tcpdump
23/08/2019 23:23:36 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:36 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:37 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:34.578172 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1735: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 1721)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xcb94 (correct), seq 0:1681, ack 0, win 8192, length 1681: HTTP
23/08/2019 23:23:37 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:37 tester:
23/08/2019 23:23:37 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:23:37 tester: [1] 7779
23/08/2019 23:23:40 tester: scapy
23/08/2019 23:23:40 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:42 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP(chksum=0x1234) /TCP(flags=0x10)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:23:43 tester: .
Sent 1 packets.
23/08/2019 23:23:45 tester: exit()
23/08/2019 23:23:45 tester:
23/08/2019 23:23:45 tester: killall tcpdump
23/08/2019 23:23:45 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:45 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:45 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:43.038899 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x00f0 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:23:45 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:45 tester:
23/08/2019 23:23:45 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:23:45 tester: [1] 7786
23/08/2019 23:23:48 tester: scapy
23/08/2019 23:23:49 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:51 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10, chksum=0x1234)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:23:51 tester: .
Sent 1 packets.
23/08/2019 23:23:53 tester: exit()
23/08/2019 23:23:53 tester:
23/08/2019 23:23:53 tester: killall tcpdump
23/08/2019 23:23:53 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:53 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:53 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:51.498622 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 124: (hlim 64, next-header TCP (6) payload length: 70) ::1.20 > ::1.80: Flags [.], cksum 0x908e (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:23:53 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:54 tester:
23/08/2019 23:23:54 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:23:54 tester: [1] 7793
23/08/2019 23:23:57 tester: scapy
23/08/2019 23:23:57 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:59 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10) /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:23:59 tester: .
Sent 1 packets.
23/08/2019 23:24:01 tester: exit()
23/08/2019 23:24:02 tester:
23/08/2019 23:24:02 tester: killall tcpdump
23/08/2019 23:24:02 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:02 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:02 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:59.957350 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xfdd1 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:24:02 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:02 tester:
23/08/2019 23:24:02 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:24:02 tester: [1] 7800
23/08/2019 23:24:05 tester: scapy
23/08/2019 23:24:06 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:24:08 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10) /Raw(RandString(1681))], iface="eno50336512")
23/08/2019 23:24:08 tester: .
Sent 1 packets.
23/08/2019 23:24:10 tester: exit()
23/08/2019 23:24:10 tester:
23/08/2019 23:24:10 tester: killall tcpdump
23/08/2019 23:24:10 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:10 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:10 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:24:08.423747 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1735: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 1721)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x2e44 (correct), seq 0:1681, ack 0, win 8192, length 1681: HTTP
23/08/2019 23:24:10 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:11 tester:
23/08/2019 23:24:11 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:24:11 tester: [1] 7810
23/08/2019 23:24:14 tester: scapy
23/08/2019 23:24:14 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:24:16 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/UDP() /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:24:16 tester: .
Sent 1 packets.
23/08/2019 23:24:18 tester: exit()
23/08/2019 23:24:19 tester:
23/08/2019 23:24:19 tester: killall tcpdump
23/08/2019 23:24:19 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:19 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:19 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:24:16.898374 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 112: (hlim 64, next-header UDP (17) payload length: 58) ::1.53 > ::1.53: [udp sum ok] 30306 updateD+% [b2&3=0x5736] [21813a] [19282q] [21369n] [17002au][|domain]
23/08/2019 23:24:19 TestTX_preparation: Test Case test_tx_preparation_NonTSO Result PASSED:
23/08/2019 23:24:19 dut.10.240.176.197: stop
23/08/2019 23:24:19 dut.10.240.176.197: stop
Telling cores to stop...
Waiting for lcores to finish...
---------------------- Forward statistics for port 0 ----------------------
RX-packets: 9 RX-dropped: 0 RX-total: 9
Bad-ipcsum: 0 Bad-l4csum: 0 Bad-outer-l4csum: 0
TX-packets: 9 TX-dropped: 0 TX-total: 9
----------------------------------------------------------------------------
+++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
RX-packets: 9 RX-dropped: 0 RX-total: 9
TX-packets: 9 TX-dropped: 0 TX-total: 9
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Done.
23/08/2019 23:24:19 dut.10.240.176.197: quit
23/08/2019 23:24:19 dut.10.240.176.197: quit
Stopping port 0...
Stopping ports...
Done
Stopping port 1...
Stopping ports...
Done
Shutting down port 0...
Closing ports...
Done
Shutting down port 1...
Closing ports...
Done
Bye...
23/08/2019 23:24:19 TestTX_preparation: Test Case test_tx_preparation_TSO Begin
23/08/2019 23:24:19 dut.10.240.176.197:
23/08/2019 23:24:19 tester:
23/08/2019 23:24:19 dut.10.240.176.197: ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4 -- -i --portmask=1 --port-topology=chained --max-pkt-len=9000 --tx-offloads=0x8000
23/08/2019 23:24:20 dut.10.240.176.197: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/rte/mp_socket
EAL: Selected IOVA mode 'PA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: PCI device 0000:00:04.0 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.1 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.2 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.3 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.4 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.5 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.6 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.7 on NUMA socket 0
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:18:00.0 on NUMA socket 0
EAL: probe driver: 8086:1583 net_i40e
EAL: PCI device 0000:18:00.1 on NUMA socket 0
EAL: probe driver: 8086:1583 net_i40e
EAL: PCI device 0000:1a:00.0 on NUMA socket 0
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.1 on NUMA socket 0
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.2 on NUMA socket 0
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.3 on NUMA socket 0
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:3d:00.0 on NUMA socket 0
EAL: probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:3d:00.1 on NUMA socket 0
EAL: probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:80:04.0 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.1 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.2 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.3 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.4 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.5 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.6 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.7 on NUMA socket 1
EAL: probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:af:00.0 on NUMA socket 1
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.1 on NUMA socket 1
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.2 on NUMA socket 1
EAL: probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.3 on NUMA socket 1
EAL: probe driver: 8086:1521 net_e1000_igb
Interactive-mode selected
previous number of forwarding ports 2 - changed to number of configured ports 1
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=155456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
Configuring Port 0 (socket 0)
Port 0: B4:96:91:49:96:EC
Configuring Port 1 (socket 0)
Port 1: B4:96:91:49:96:ED
Checking link statuses...
Done
23/08/2019 23:24:30 dut.10.240.176.197: show port info 0
23/08/2019 23:24:31 dut.10.240.176.197: show port info 0
********************* Infos for port 0 *********************
MAC address: B4:96:91:49:96:EC
Device name: 0000:1a:00.0
Driver name: net_e1000_igb
Connect to socket: 0
memory allocation on the socket: 0
Link status: up
Link speed: 1000 Mbps
Link duplex: full-duplex
MTU: 1500
Promiscuous mode: enabled
Allmulticast mode: disabled
Maximum number of MAC addresses: 32
Maximum number of MAC addresses of hash filtering: 0
VLAN offload:
strip off
filter off
qinq(extend) off
Hash key size in bytes: 40
Redirection table size: 128
Supported RSS offload flow types:
ipv4
ipv4-tcp
ipv4-udp
ipv6
ipv6-tcp
ipv6-udp
user defined 15
user defined 16
user defined 17
Minimum size of RX buffer: 256
Maximum configurable length of RX packet: 16383
Maximum number of VMDq pools: 8
Current number of RX queues: 1
Max possible RX queues: 8
Max possible number of RXDs per queue: 4096
Min possible number of RXDs per queue: 32
RXDs number alignment: 8
Current number of TX queues: 1
Max possible TX queues: 8
Max possible number of TXDs per queue: 4096
Min possible number of TXDs per queue: 32
TXDs number alignment: 8
Max segment number per packet: 255
Max segment number per MTU/TSO: 255
23/08/2019 23:24:31 dut.10.240.176.197: set fwd csum
23/08/2019 23:24:31 dut.10.240.176.197: set fwd csum
Set csum packet forwarding mode
23/08/2019 23:24:31 dut.10.240.176.197: set verbose 1
23/08/2019 23:24:31 dut.10.240.176.197: set verbose 1
Change verbose level from 0 to 1
23/08/2019 23:24:31 dut.10.240.176.197: port stop all
23/08/2019 23:24:31 dut.10.240.176.197: port stop all
Stopping ports...
Checking link statuses...
Done
23/08/2019 23:24:31 dut.10.240.176.197: csum set ip hw 0
23/08/2019 23:24:31 dut.10.240.176.197: csum set ip hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is sw
TCP checksum offload is sw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:24:31 dut.10.240.176.197: csum set tcp hw 0
23/08/2019 23:24:31 dut.10.240.176.197: csum set tcp hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is sw
TCP checksum offload is hw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:24:31 dut.10.240.176.197: csum set udp hw 0
23/08/2019 23:24:31 dut.10.240.176.197: csum set udp hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is hw
TCP checksum offload is hw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:24:31 dut.10.240.176.197: tso set 1460 0
23/08/2019 23:24:31 dut.10.240.176.197: tso set 1460 0
TSO segment size for non-tunneled packets is 1460
23/08/2019 23:24:31 dut.10.240.176.197: port start all
23/08/2019 23:24:32 dut.10.240.176.197: port start all
Configuring Port 0 (socket 0)
Port 0: B4:96:91:49:96:EC
Port 1: B4:96:91:49:96:ED
Checking link statuses...
Done
23/08/2019 23:24:32 dut.10.240.176.197: start
23/08/2019 23:24:32 dut.10.240.176.197: start
csum packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
RX P=0/Q=0 (socket 0) -> TX P=0/Q=0 (socket 0) peer=02:00:00:00:00:00
csum packet forwarding packets/burst=32
nb forwarding cores=1 - nb forwarding ports=1
port 0: RX queue number: 1 Tx queue number: 1
Rx offloads=0x800 Tx offloads=0x802e
RX queue: 0
RX desc=512 - RX free threshold=32
RX threshold registers: pthresh=8 hthresh=8 wthresh=4
RX Offloads=0x800
TX queue: 0
TX desc=512 - TX free threshold=0
TX threshold registers: pthresh=8 hthresh=1 wthresh=16
TX offloads=0x802e - TX RS bit threshold=0
port 1: RX queue number: 1 Tx queue number: 1
Rx offloads=0x800 Tx offloads=0x8000
RX queue: 0
RX desc=512 - RX free threshold=32
RX threshold registers: pthresh=8 hthresh=8 wthresh=4
RX Offloads=0x800
TX queue: 0
TX desc=512 - TX free threshold=0
TX threshold registers: pthresh=8 hthresh=1 wthresh=16
TX offloads=0x8000 - TX RS bit threshold=0
23/08/2019 23:24:32 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:32 tester:
23/08/2019 23:24:32 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:24:32 tester: [1] 7817
23/08/2019 23:24:35 tester: scapy
23/08/2019 23:24:36 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:24:38 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10) /Raw(RandString(6009))], iface="eno50336512")
23/08/2019 23:24:38 tester: .
Sent 1 packets.
23/08/2019 23:24:40 tester: exit()
23/08/2019 23:24:40 tester:
23/08/2019 23:24:40 tester: killall tcpdump
23/08/2019 23:24:40 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:40 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:40 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:24:38.478538 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 1534: (hlim 64, next-header TCP (6) payload length: 1480) ::1.20 > ::1.80: Flags [.], cksum 0x6492 (correct), seq 0:1460, ack 0, win 8192, length 1460: HTTP
23:24:38.478544 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 1534: (hlim 64, next-header TCP (6) payload length: 1480) ::1.20 > ::1.80: Flags [.], cksum 0xf76a (correct), seq 1460:2920, ack 1, win 8192, length 1460: HTTP
23:24:38.478785 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 1534: (hlim 64, next-header TCP (6) payload length: 1480) ::1.20 > ::1.80: Flags [.], cksum 0xd987 (correct), seq 2920:4380, ack 1, win 8192, length 1460: HTTP
23:24:38.478788 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 1534: (hlim 64, next-header TCP (6) payload length: 1480) ::1.20 > ::1.80: Flags [.], cksum 0x97b2 (correct), seq 4380:5840, ack 1, win 8192, length 1460: HTTP
23:24:38.478810 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 243: (hlim 64, next-header TCP (6) payload length: 189) ::1.20 > ::1.80: Flags [.], cksum 0x0e23 (correct), seq 5840:6009, ack 1, win 8192, length 169: HTTP
23/08/2019 23:24:40 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:41 tester:
23/08/2019 23:24:41 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:24:41 tester: [1] 7824
23/08/2019 23:24:44 tester: scapy
23/08/2019 23:24:44 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:24:46 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10, chksum=0x1234)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:24:46 tester: .
Sent 1 packets.
23/08/2019 23:24:48 tester: exit()
23/08/2019 23:24:49 tester:
23/08/2019 23:24:49 tester: killall tcpdump
23/08/2019 23:24:49 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:49 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:49 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:24:46.932610 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x476b (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:24:49 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:49 tester:
23/08/2019 23:24:49 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:24:49 tester: [1] 7831
23/08/2019 23:24:52 tester: scapy
23/08/2019 23:24:53 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:24:55 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10) /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:24:55 tester: .
Sent 1 packets.
23/08/2019 23:24:57 tester: exit()
23/08/2019 23:24:57 tester:
23/08/2019 23:24:57 tester: killall tcpdump
23/08/2019 23:24:57 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:57 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:57 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:24:55.497314 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 124: (hlim 64, next-header TCP (6) payload length: 70) ::1.20 > ::1.80: Flags [.], cksum 0x3b93 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:24:57 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:58 tester:
23/08/2019 23:24:58 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:24:58 tester: [1] 7838
23/08/2019 23:25:01 tester: scapy
23/08/2019 23:25:01 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:03 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP(chksum=0x1234) /TCP(flags=0x10,chksum=0x1234)/Raw(RandString(6009))], iface="eno50336512")
23/08/2019 23:25:03 tester: .
Sent 1 packets.
23/08/2019 23:25:05 tester: exit()
23/08/2019 23:25:06 tester:
23/08/2019 23:25:06 tester: killall tcpdump
23/08/2019 23:25:06 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:06 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:06 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:03.976632 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 1500)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x6292 (correct), seq 0:1460, ack 0, win 8192, length 1460: HTTP
23:25:03.976636 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 2, offset 0, flags [none], proto TCP (6), length 1500)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x9db8 (correct), seq 1460:2920, ack 1, win 8192, length 1460: HTTP
23:25:03.976675 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 3, offset 0, flags [none], proto TCP (6), length 1500)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xe7f2 (correct), seq 2920:4380, ack 1, win 8192, length 1460: HTTP
23:25:03.976677 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 4, offset 0, flags [none], proto TCP (6), length 1500)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xb4ca (correct), seq 4380:5840, ack 1, win 8192, length 1460: HTTP
23:25:03.976680 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 223: (tos 0x0, ttl 64, id 5, offset 0, flags [none], proto TCP (6), length 209)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xa1ae (correct), seq 5840:6009, ack 1, win 8192, length 169: HTTP
23/08/2019 23:25:06 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:25:06 tester:
23/08/2019 23:25:06 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:25:06 tester: [1] 7845
23/08/2019 23:25:09 tester: scapy
23/08/2019 23:25:10 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:12 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP(chksum=0x1234) /TCP(flags=0x10)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:25:12 tester: .
Sent 1 packets.
23/08/2019 23:25:14 tester: exit()
23/08/2019 23:25:14 tester:
23/08/2019 23:25:14 tester: killall tcpdump
23/08/2019 23:25:14 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:14 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:14 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:12.446804 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x3123 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:25:14 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:25:15 tester:
23/08/2019 23:25:15 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:25:15 tester: [1] 7852
23/08/2019 23:25:18 tester: scapy
23/08/2019 23:25:18 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:20 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10, chksum=0x1234)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:25:20 tester: .
Sent 1 packets.
23/08/2019 23:25:22 tester: exit()
23/08/2019 23:25:23 tester:
23/08/2019 23:25:23 tester: killall tcpdump
23/08/2019 23:25:23 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:23 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:23 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:20.900925 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 124: (hlim 64, next-header TCP (6) payload length: 70) ::1.20 > ::1.80: Flags [.], cksum 0xd826 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:25:23 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:25:23 tester:
23/08/2019 23:25:23 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:25:23 tester: [1] 7859
23/08/2019 23:25:26 tester: scapy
23/08/2019 23:25:27 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:29 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10) /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:25:29 tester: .
Sent 1 packets.
23/08/2019 23:25:31 tester: exit()
23/08/2019 23:25:31 tester:
23/08/2019 23:25:31 tester: killall tcpdump
23/08/2019 23:25:31 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:31 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:31 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:29.357480 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x69d6 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:25:31 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:25:31 tester:
23/08/2019 23:25:31 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:25:32 tester: [1] 7866
23/08/2019 23:25:35 tester: scapy
23/08/2019 23:25:35 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:37 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10) /Raw(RandString(6009))], iface="eno50336512")
23/08/2019 23:25:37 tester: .
Sent 1 packets.
23/08/2019 23:25:39 tester: exit()
23/08/2019 23:25:40 tester:
23/08/2019 23:25:40 tester: killall tcpdump
23/08/2019 23:25:40 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:40 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:40 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:37.856366 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 1500)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x4452 (correct), seq 0:1460, ack 0, win 8192, length 1460: HTTP
23:25:37.856371 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 2, offset 0, flags [none], proto TCP (6), length 1500)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xd1e9 (correct), seq 1460:2920, ack 1, win 8192, length 1460: HTTP
23:25:37.856411 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 3, offset 0, flags [none], proto TCP (6), length 1500)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x27d5 (correct), seq 2920:4380, ack 1, win 8192, length 1460: HTTP
23:25:37.856425 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 4, offset 0, flags [none], proto TCP (6), length 1500)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x1d41 (correct), seq 4380:5840, ack 1, win 8192, length 1460: HTTP
23:25:37.856428 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 223: (tos 0x0, ttl 64, id 5, offset 0, flags [none], proto TCP (6), length 209)
127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x11ba (correct), seq 5840:6009, ack 1, win 8192, length 169: HTTP
23/08/2019 23:25:40 tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:25:40 tester:
23/08/2019 23:25:40 tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null&
23/08/2019 23:25:40 tester: [1] 7873
23/08/2019 23:25:43 tester: scapy
23/08/2019 23:25:44 tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:46 tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/UDP() /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:25:46 tester: .
Sent 1 packets.
23/08/2019 23:25:48 tester: exit()
23/08/2019 23:25:48 tester:
23/08/2019 23:25:48 tester: killall tcpdump
23/08/2019 23:25:48 tester: [1]+ Done tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:48 tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:48 tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:46.310497 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 112: (hlim 64, next-header UDP (17) payload length: 58) ::1.53 > ::1.53: [udp sum ok] 31303 updateM+% [b2&3=0x6756] [31059a] [28514q] [31041n] [20809au][|domain]
23/08/2019 23:25:48 TestTX_preparation: Test Case test_tx_preparation_TSO Result PASSED:
23/08/2019 23:25:48 dut.10.240.176.197: stop
23/08/2019 23:25:48 dut.10.240.176.197: stop
Telling cores to stop...
Waiting for lcores to finish...
---------------------- Forward statistics for port 0 ----------------------
RX-packets: 9 RX-dropped: 0 RX-total: 9
Bad-ipcsum: 0 Bad-l4csum: 0 Bad-outer-l4csum: 0
TX-packets: 21 TX-dropped: 0 TX-total: 21
----------------------------------------------------------------------------
+++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
RX-packets: 9 RX-dropped: 0 RX-total: 9
TX-packets: 21 TX-dropped: 0 TX-total: 21
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Done.
23/08/2019 23:25:48 dut.10.240.176.197: quit
23/08/2019 23:25:49 dut.10.240.176.197: quit
Stopping port 0...
Stopping ports...
Done
Stopping port 1...
Stopping ports...
Done
Shutting down port 0...
Closing ports...
Done
Shutting down port 1...
Closing ports...
Done
Bye...
23/08/2019 23:25:49 tester: ifconfig eno50336512 mtu 1500
23/08/2019 23:25:49 tester:
23/08/2019 23:25:50 dts:
TEST SUITE ENDED: TestTX_preparation
^ permalink raw reply [flat|nested] 3+ messages in thread