* [dts] [PATCH v1 0/2] test_plans:adds, tests:adds
@ 2021-02-23 7:10 Hailin Xu
2021-02-23 7:10 ` [dts] [PATCH v1 1/2] test_plans/iavf_fdir:add without input set cases Hailin Xu
` (2 more replies)
0 siblings, 3 replies; 10+ messages in thread
From: Hailin Xu @ 2021-02-23 7:10 UTC (permalink / raw)
To: dts; +Cc: xueqin.lin, Hailin Xu
add without input set IPv4/IPv6 tcp/udp fdir rule cases.
Hailin Xu (2):
test_plans/iavf_fdir:add without input set cases
tests/iavf_fdir:add without input set cases
test_plans/iavf_fdir_test_plan.rst | 259 ++++++++++++++++++++++++++++
tests/TestSuite_iavf_fdir.py | 265 ++++++++++++++++++++++++++++-
2 files changed, 516 insertions(+), 8 deletions(-)
--
2.17.1
^ permalink raw reply [flat|nested] 10+ messages in thread
* [dts] [PATCH v1 1/2] test_plans/iavf_fdir:add without input set cases
2021-02-23 7:10 [dts] [PATCH v1 0/2] test_plans:adds, tests:adds Hailin Xu
@ 2021-02-23 7:10 ` Hailin Xu
2021-03-08 8:20 ` Lin, Xueqin
2021-02-23 7:10 ` [dts] [PATCH v1 2/2] tests/iavf_fdir:add " Hailin Xu
2021-02-23 7:37 ` [dts] [PATCH v1 0/2] test_plans:adds, tests:adds Xu, HailinX
2 siblings, 1 reply; 10+ messages in thread
From: Hailin Xu @ 2021-02-23 7:10 UTC (permalink / raw)
To: dts; +Cc: xueqin.lin, Hailin Xu
add without input set IPv4/IPv6 tcp/udp fdir rule test plans.
Signed-off-by: Hailin Xu <hailinx.xu@intel.com>
---
test_plans/iavf_fdir_test_plan.rst | 259 +++++++++++++++++++++++++++++
1 file changed, 259 insertions(+)
diff --git a/test_plans/iavf_fdir_test_plan.rst b/test_plans/iavf_fdir_test_plan.rst
index 6de28d2c..f63548dc 100644
--- a/test_plans/iavf_fdir_test_plan.rst
+++ b/test_plans/iavf_fdir_test_plan.rst
@@ -4551,3 +4551,262 @@ subcase 3: PFCP FDIR vlan insert on
8. DUT check the packets are not distributed to expected queue without mark id without "PKT_RX_VLAN_STRIPPED",
verify that the same number of packet are correctly received on the traffic generator side port A with VLAN tag "1".
And UDP checksum need be validated as pass by the tester.
+
+ipv4/ipv6 rss tcp/udp without input set cases
+=============================================
+
+* MAC_IPV4_TCP
+
+ matched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+ mismatched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/SCTP()],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+* MAC_IPV4_UDP
+
+ matched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+ mismatched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/SCTP()],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+* MAC_IPV6_TCP
+
+ matched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+ mismatched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/SCTP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+* MAC_IPV6_UDP
+
+ matched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+ mismatched packets::
+
+ sendp([Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+ sendp([Ether(dst="00:11:22:33:44:55")/IPv6()/SCTP(sport=RandShort(),dport=RandShort())],iface='ens192f1',count=100)
+
+Test Case: MAC_IPV4_TCP_WITHOUT_INPUT_SET
+=========================================
+
+Subcase 1: MAC_IPV4_TCP queue index
+-----------------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions queue index 1 / end
+
+2. send matched packets, check all packets are distributed to queue 1.
+ send mismatched packets, check all packets are distributed to all queues.
+
+3. verify rules can be listed and destroyed::
+
+ testpmd> flow list 0
+
+ check the rule listed.
+ destroy the rule::
+
+ testpmd> flow destroy 0 rule 0
+
+4. verify matched packets are distributed to all queues.
+ check there is no rule listed.
+
+Subcase 2: MAC_IPV4_TCP rss queue
+---------------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss queues 0 1 2 3 end / end
+
+2. send matched packets, check all packets are distributed to queue 0-3.
+ send mismatched packets, check all packets are distributed to all queues.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues.
+ check there is no rule listed.
+
+Subcase 3: MAC_IPV4_TCP passthru
+--------------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions passthru / mark id 1 / end
+
+2. send matched packets, check all packets are distributed to all queue with FDIR matched ID=0x1.
+ send mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+ check there is no rule listed.
+
+Subcase 4: MAC_IPV4_TCP drop
+----------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions drop / end
+
+2. send matched packets, check all packets are dropped.
+ send mismatched packets, check all packets are not dropped.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are not dropped.
+ check there is no rule listed.
+
+Subcase 5: MAC_IPV4_TCP mark+rss
+--------------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions mark id 2 / rss / end
+
+2. send matched packets, check all packets are distributed to all queue with FDIR matched ID=0x2.
+ send mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+ check there is no rule listed.
+
+Subcase 6: MAC_IPV4_TCP mark
+----------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv4 / tcp / end actions mark id 1 / end
+
+2. repeat the step 2-3 of in subcase 3,
+ get the same result.
+
+Test Case: MAC_IPV4_UDP_WITHOUT_INPUT_SET
+=========================================
+
+1. replace "tcp" with "udp" in all the subcases of MAC_IPV4_TCP_WITHOUT_INPUT_SET pattern.
+2. Then repeat all the steps in all the subcases of MAC_IPV4_TCP_WITHOUT_INPUT_SET pattern.
+3. get the same result.
+
+Test Case: MAC_IPV6_TCP_WITHOUT_INPUT_SET
+=========================================
+
+Subcase 1: MAC_IPV6_TCP queue index
+-----------------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / tcp / end actions queue index 1 / end
+
+2. send matched packets, check all packets are distributed to queue 1.
+ send mismatched packets, check all packets are distributed to all queues.
+
+3. verify rules can be listed and destroyed::
+
+ testpmd> flow list 0
+
+ check the rule listed.
+ destroy the rule::
+
+ testpmd> flow destroy 0 rule 0
+
+4. verify matched packets are distributed to all queues.
+ check there is no rule listed.
+
+Subcase 2: MAC_IPV6_TCP rss queue
+---------------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / tcp / end actions rss queues 0 1 2 3 end / end
+
+2. send matched packets, check all packets are distributed to queue 0-3.
+ send mismatched packets, check all packets are distributed to all queues.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues.
+ check there is no rule listed.
+
+Subcase 3: MAC_IPV6_TCP passthru
+--------------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / tcp / end actions passthru / mark id 1 / end
+
+2. send matched packets, check all packets are distributed to all queue with FDIR matched ID=0x1.
+ send mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+ check there is no rule listed.
+
+Subcase 4: MAC_IPV6_TCP drop
+----------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / tcp / end actions drop / end
+
+2. send matched packets, check all packets are dropped.
+ send mismatched packets, check all packets are not dropped.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are not dropped.
+ check there is no rule listed.
+
+Subcase 5: MAC_IPV6_TCP mark+rss
+--------------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / tcp / end actions mark id 2 / rss / end
+
+2. send matched packets, check all packets are distributed to all queue with FDIR matched ID=0x2.
+ send mismatched packets, check all packets are distributed to all queues without FDIR matched ID.
+
+3. repeat step 3 of subcase 1.
+
+4. verify matched packets are distributed to all queues without FDIR matched ID.
+ check there is no rule listed.
+
+Subcase 6: MAC_IPV6_TCP mark
+----------------------------
+
+1. create filter rules::
+
+ flow create 0 ingress pattern eth / ipv6 / udp / end actions mark id 1 / end
+
+2. repeat the step 2-3 of in subcase 3,
+ get the same result.
+
+Test Case: MAC_IPV6_UDP_WITHOUT_INPUT_SET
+=========================================
+
+1. replace "tcp" with "udp" in all the subcases of MAC_IPV6_TCP_WITHOUT_INPUT_SET pattern.
+2. Then repeat all the steps in all the subcases of MAC_IPV6_TCP_WITHOUT_INPUT_SET pattern.
+3. get the same result.
\ No newline at end of file
--
2.17.1
^ permalink raw reply [flat|nested] 10+ messages in thread
* [dts] [PATCH v1 2/2] tests/iavf_fdir:add without input set cases
2021-02-23 7:10 [dts] [PATCH v1 0/2] test_plans:adds, tests:adds Hailin Xu
2021-02-23 7:10 ` [dts] [PATCH v1 1/2] test_plans/iavf_fdir:add without input set cases Hailin Xu
@ 2021-02-23 7:10 ` Hailin Xu
2021-03-08 8:21 ` Lin, Xueqin
2021-02-23 7:37 ` [dts] [PATCH v1 0/2] test_plans:adds, tests:adds Xu, HailinX
2 siblings, 1 reply; 10+ messages in thread
From: Hailin Xu @ 2021-02-23 7:10 UTC (permalink / raw)
To: dts; +Cc: xueqin.lin, Hailin Xu
add without input set IPv4/IPv6 tcp/udp fdir rule test cases.
Signed-off-by: Hailin Xu <hailinx.xu@intel.com>
---
tests/TestSuite_iavf_fdir.py | 265 +++++++++++++++++++++++++++++++++--
1 file changed, 257 insertions(+), 8 deletions(-)
diff --git a/tests/TestSuite_iavf_fdir.py b/tests/TestSuite_iavf_fdir.py
index 76a320a3..e83855d4 100644
--- a/tests/TestSuite_iavf_fdir.py
+++ b/tests/TestSuite_iavf_fdir.py
@@ -575,6 +575,38 @@ tv_pfcp_drop = {
{"port_id": 0, "passthru": 1}]
}
+MAC_IPV4_TCP_WITHOUT = {
+ "match": ['Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())'],
+ "mismatch": ['Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())',
+ 'Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/SCTP()',
+ 'Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=RandShort(),dport=RandShort())',
+ 'Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())']
+}
+
+MAC_IPV4_UDP_WITHOUT = {
+ "match": ['Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=RandShort(),dport=RandShort())'],
+ "mismatch": ['Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())',
+ 'Ether(dst="00:11:22:33:44:55")/IP(src=RandIP(), dst=RandIP())/SCTP()',
+ 'Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())',
+ 'Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())']
+}
+
+MAC_IPV6_TCP_WITHOUT = {
+ "match": ['Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())'],
+ "mismatch": ['Ether(dst="00:11:22:33:44:55")/IP()/TCP(sport=RandShort(),dport=RandShort())',
+ 'Ether(dst="00:11:22:33:44:55")/IPv6()',
+ 'Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())',
+ 'Ether(dst="00:11:22:33:44:55")/IPv6()/SCTP(sport=RandShort(),dport=RandShort())']
+}
+
+MAC_IPV6_UDP_WITHOUT = {
+ "match": ['Ether(dst="00:11:22:33:44:55")/IPv6()/UDP(sport=RandShort(),dport=RandShort())'],
+ "mismatch": ['Ether(dst="00:11:22:33:44:55")/IP()/UDP(sport=RandShort(),dport=RandShort())',
+ 'Ether(dst="00:11:22:33:44:55")/IPv6()',
+ 'Ether(dst="00:11:22:33:44:55")/IPv6()/TCP(sport=RandShort(),dport=RandShort())',
+ 'Ether(dst="00:11:22:33:44:55")/IPv6()/SCTP(sport=RandShort(),dport=RandShort())']
+}
+
tv_mac_ipv4_pay_queue_index = {
"name": "test_mac_ipv4_pay_queue_index",
"rule": "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 proto is 255 ttl is 2 tos is 4 / end actions queue index 1 / end",
@@ -1783,6 +1815,186 @@ tv_mac_ipv6_nat_t_esp_mark = {
"check_param": {"port_id": 0, "passthru": 1, "mark_id": 15}
}
+# mac_ipv4_tcp_without_input_set
+tv_mac_ipv4_tcp_without_input_set_queue_index = {
+ "name": "test_mac_ipv4_tcp_without_input_set_queue_index",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / tcp / end actions queue index 1 / end",
+ "scapy_str": MAC_IPV4_TCP_WITHOUT,
+ "count": 10,
+ "check_param": {"port_id": 0, "queue": 1}
+}
+
+tv_mac_ipv4_tcp_without_input_set_queue_group = {
+ "name": "test_mac_ipv4_tcp_without_input_set_drop",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / tcp / end actions rss queues 0 1 2 3 end / end",
+ "scapy_str": MAC_IPV4_TCP_WITHOUT,
+ "count": 10,
+ "check_param": {"port_id": 0, "queue": [0, 1, 2, 3]}
+}
+
+tv_mac_ipv4_tcp_without_input_set_passthru = {
+ "name": "test_mac_ipv4_tcp_without_input_set_passthru",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / tcp / end actions passthru / mark id 1 / end",
+ "scapy_str": MAC_IPV4_TCP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 1}
+}
+
+tv_mac_ipv4_tcp_without_input_set_drop = {
+ "name": "test_mac_ipv4_tcp_without_input_set_drop",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / tcp / end actions drop / end",
+ "scapy_str": MAC_IPV4_TCP_WITHOUT,
+ "check_param": {"port_id": 0, "drop": 1}
+}
+
+tv_mac_ipv4_tcp_without_input_set_mark_rss = {
+ "name": "test_mac_ipv4_tcp_without_input_set_mark_rss",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / tcp / end actions mark id 2 / rss / end",
+ "scapy_str": MAC_IPV4_TCP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 2}
+}
+
+tv_mac_ipv4_tcp_without_input_set_mark = {
+ "name": "test_mac_ipv4_tcp_without_input_set_mark",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / tcp / end actions mark id 1 / end",
+ "scapy_str": MAC_IPV4_TCP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 1}
+}
+
+# mac_ipv4_udp_without_input_set
+tv_mac_ipv4_udp_without_input_set_queue_index = {
+ "name": "test_mac_ipv4_udp_without_input_set_queue_index",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / udp / end actions queue index 1 / end",
+ "scapy_str": MAC_IPV4_UDP_WITHOUT,
+ "count": 10,
+ "check_param": {"port_id": 0, "queue": 1}
+}
+
+tv_mac_ipv4_udp_without_input_set_queue_group = {
+ "name": "test_mac_ipv4_udp_without_input_set_drop",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / udp / end actions rss queues 0 1 2 3 end / end",
+ "scapy_str": MAC_IPV4_UDP_WITHOUT,
+ "count": 10,
+ "check_param": {"port_id": 0, "queue": [0, 1, 2, 3]}
+}
+
+tv_mac_ipv4_udp_without_input_set_passthru = {
+ "name": "test_mac_ipv4_udp_without_input_set_passthru",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / udp / end actions passthru / mark id 1 / end",
+ "scapy_str": MAC_IPV4_UDP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 1}
+}
+
+tv_mac_ipv4_udp_without_input_set_drop = {
+ "name": "test_mac_ipv4_udp_without_input_set_drop",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / udp / end actions drop / end",
+ "scapy_str": MAC_IPV4_UDP_WITHOUT,
+ "check_param": {"port_id": 0, "drop": 1}
+}
+
+tv_mac_ipv4_udp_without_input_set_mark_rss = {
+ "name": "test_mac_ipv4_udp_without_input_set_mark_rss",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / udp / end actions mark id 2 / rss / end",
+ "scapy_str": MAC_IPV4_UDP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 2}
+}
+
+tv_mac_ipv4_udp_without_input_set_mark = {
+ "name": "test_mac_ipv4_udp_without_input_set_mark",
+ "rule": "flow create 0 ingress pattern eth / ipv4 / udp / end actions mark id 1 / end",
+ "scapy_str": MAC_IPV4_UDP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 1}
+}
+
+# mac_ipv6_tcp_without_input_set
+tv_mac_ipv6_tcp_without_input_set_queue_index = {
+ "name": "test_mac_ipv6_tcp_without_input_set_queue_index",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / tcp / end actions queue index 1 / end",
+ "scapy_str": MAC_IPV6_TCP_WITHOUT,
+ "count": 10,
+ "check_param": {"port_id": 0, "queue": 1}
+}
+
+tv_mac_ipv6_tcp_without_input_set_queue_group = {
+ "name": "test_mac_ipv6_tcp_without_input_set_drop",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / tcp / end actions rss queues 0 1 2 3 end / end",
+ "scapy_str": MAC_IPV6_TCP_WITHOUT,
+ "count": 10,
+ "check_param": {"port_id": 0, "queue": [0, 1, 2, 3]}
+}
+
+tv_mac_ipv6_tcp_without_input_set_passthru = {
+ "name": "test_mac_ipv6_tcp_without_input_set_passthru",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / tcp / end actions passthru / mark id 1 / end",
+ "scapy_str": MAC_IPV6_TCP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 1}
+}
+
+tv_mac_ipv6_tcp_without_input_set_drop = {
+ "name": "test_mac_ipv6_tcp_without_input_set_drop",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / tcp / end actions drop / end",
+ "scapy_str": MAC_IPV6_TCP_WITHOUT,
+ "check_param": {"port_id": 0, "drop": 1}
+}
+
+tv_mac_ipv6_tcp_without_input_set_mark_rss = {
+ "name": "test_mac_ipv6_tcp_without_input_set_mark_rss",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / tcp / end actions mark id 2 / rss / end",
+ "scapy_str": MAC_IPV6_TCP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 2}
+}
+
+tv_mac_ipv6_tcp_without_input_set_mark = {
+ "name": "test_mac_ipv6_tcp_without_input_set_mark",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / tcp / end actions mark id 1 / end",
+ "scapy_str": MAC_IPV6_TCP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 1}
+}
+
+# mac_ipv6_udp_without_input_set
+tv_mac_ipv6_udp_without_input_set_queue_index = {
+ "name": "test_mac_ipv6_udp_without_input_set_queue_index",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / udp / end actions queue index 1 / end",
+ "scapy_str": MAC_IPV6_UDP_WITHOUT,
+ "count": 10,
+ "check_param": {"port_id": 0, "queue": 1}
+}
+
+tv_mac_ipv6_udp_without_input_set_queue_group = {
+ "name": "test_mac_ipv6_udp_without_input_set_drop",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / udp / end actions rss queues 0 1 2 3 end / end",
+ "scapy_str": MAC_IPV6_UDP_WITHOUT,
+ "count": 10,
+ "check_param": {"port_id": 0, "queue": [0, 1, 2, 3]}
+}
+
+tv_mac_ipv6_udp_without_input_set_passthru = {
+ "name": "test_mac_ipv6_udp_without_input_set_passthru",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / udp / end actions passthru / mark id 1 / end",
+ "scapy_str": MAC_IPV6_UDP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 1}
+}
+
+tv_mac_ipv6_udp_without_input_set_drop = {
+ "name": "test_mac_ipv6_udp_without_input_set_drop",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / udp / end actions drop / end",
+ "scapy_str": MAC_IPV6_UDP_WITHOUT,
+ "check_param": {"port_id": 0, "drop": 1}
+}
+
+tv_mac_ipv6_udp_without_input_set_mark_rss = {
+ "name": "test_mac_ipv6_udp_without_input_set_mark_rss",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / udp / end actions mark id 2 / rss / end",
+ "scapy_str": MAC_IPV6_UDP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 2}
+}
+
+tv_mac_ipv6_udp_without_input_set_mark = {
+ "name": "test_mac_ipv6_udp_without_input_set_mark",
+ "rule": "flow create 0 ingress pattern eth / ipv6 / udp / end actions mark id 1 / end",
+ "scapy_str": MAC_IPV6_UDP_WITHOUT,
+ "check_param": {"port_id": 0, "passthru": 1, "mark_id": 1}
+}
+
vectors_ipv4_pay = [tv_mac_ipv4_pay_queue_index, tv_mac_ipv4_pay_mark_rss,tv_mac_ipv4_pay_passthru,
tv_mac_ipv4_pay_drop, tv_mac_ipv4_pay_queue_group, tv_mac_ipv4_pay_mark]
@@ -1873,6 +2085,22 @@ vectors_ipv4_nat_t_esp = [tv_mac_ipv4_nat_t_esp_queue_index, tv_mac_ipv4_nat_t_e
vectors_ipv6_nat_t_esp = [tv_mac_ipv6_nat_t_esp_queue_index, tv_mac_ipv6_nat_t_esp_queue_group, tv_mac_ipv6_nat_t_esp_mark]
+vectors_ipv4_tcp_without_input_set = [tv_mac_ipv4_tcp_without_input_set_queue_index, tv_mac_ipv4_tcp_without_input_set_queue_group,
+ tv_mac_ipv4_tcp_without_input_set_mark_rss, tv_mac_ipv4_tcp_without_input_set_passthru,
+ tv_mac_ipv4_tcp_without_input_set_drop, tv_mac_ipv4_tcp_without_input_set_mark]
+
+vectors_ipv4_udp_without_input_set = [tv_mac_ipv4_udp_without_input_set_queue_index, tv_mac_ipv4_udp_without_input_set_queue_group,
+ tv_mac_ipv4_udp_without_input_set_mark_rss, tv_mac_ipv4_udp_without_input_set_passthru,
+ tv_mac_ipv4_udp_without_input_set_drop, tv_mac_ipv4_udp_without_input_set_mark]
+
+vectors_ipv6_tcp_without_input_set = [tv_mac_ipv6_tcp_without_input_set_queue_index, tv_mac_ipv6_tcp_without_input_set_queue_group,
+ tv_mac_ipv6_tcp_without_input_set_mark_rss, tv_mac_ipv6_tcp_without_input_set_passthru,
+ tv_mac_ipv6_tcp_without_input_set_drop, tv_mac_ipv6_tcp_without_input_set_mark]
+
+vectors_ipv6_udp_without_input_set = [tv_mac_ipv6_udp_without_input_set_queue_index, tv_mac_ipv6_udp_without_input_set_queue_group,
+ tv_mac_ipv6_udp_without_input_set_mark_rss, tv_mac_ipv6_udp_without_input_set_passthru,
+ tv_mac_ipv6_udp_without_input_set_drop, tv_mac_ipv6_udp_without_input_set_mark]
+
class TestIAVFFdir(TestCase):
def rte_flow_process(self, vectors):
@@ -1893,9 +2121,13 @@ class TestIAVFFdir(TestCase):
"flow create 0 ingress pattern eth / ipv4 / udp / gtpu / gtp_psc pdu_t is 1 / ipv4 / end actions rss types ipv4 l3-src-only end key_len 0 queues end / end"]
gtpu_rss_rule_li = self.create_fdir_rule(gtpu_rss, check_stats=True)
- # send and check match packets
- out1 = self.send_pkts_getouput(pkts=tv["scapy_str"]["match"])
- rfc.check_iavf_fdir_mark(out1, pkt_num=len(tv["scapy_str"]["match"]), check_param=tv["check_param"])
+ if "count" in tv:
+ out1 = self.send_pkts_getouput(pkts=tv["scapy_str"]["match"], count=tv["count"])
+ rfc.check_iavf_fdir_mark(out1, pkt_num=tv["count"], check_param=tv["check_param"])
+ else:
+ # send and check match packets
+ out1 = self.send_pkts_getouput(pkts=tv["scapy_str"]["match"])
+ rfc.check_iavf_fdir_mark(out1, pkt_num=len(tv["scapy_str"]["match"]), check_param=tv["check_param"])
# send and check mismatch packets
out2 = self.send_pkts_getouput(pkts=tv["scapy_str"]["mismatch"])
rfc.check_iavf_fdir_mark(out2, pkt_num=len(tv["scapy_str"]["mismatch"]), check_param=tv["check_param"],
@@ -2106,17 +2338,17 @@ class TestIAVFFdir(TestCase):
socket=self.ports_socket)
self.config_testpmd()
- def send_packets(self, packets, pf_id=0):
+ def send_packets(self, packets, pf_id=0, count=1):
self.pkt.update_pkt(packets)
tx_port = self.tester_iface0 if pf_id == 0 else self.tester_iface1
- self.pkt.send_pkt(crb=self.tester, tx_port=tx_port)
+ self.pkt.send_pkt(crb=self.tester, tx_port=tx_port, count=count)
- def send_pkts_getouput(self, pkts, pf_id=0):
+ def send_pkts_getouput(self, pkts, pf_id=0, count=1):
"""
if pkt_info is True, we need to get packet infomation to check the RSS hash and FDIR.
if pkt_info is False, we just need to get the packet number and queue number.
"""
- self.send_packets(pkts, pf_id)
+ self.send_packets(pkts, pf_id, count)
time.sleep(1)
out_info = self.dut.get_session_output(timeout=1)
out_pkt = self.pmd_output.execute_cmd("stop")
@@ -2278,6 +2510,18 @@ class TestIAVFFdir(TestCase):
def test_mac_ipv6_nat_t_esp(self):
self.rte_flow_process(vectors_ipv6_nat_t_esp)
+ def test_mac_ipv4_tcp_without_input_set(self):
+ self.rte_flow_process(vectors_ipv4_tcp_without_input_set)
+
+ def test_mac_ipv4_udp_without_input_set(self):
+ self.rte_flow_process(vectors_ipv4_udp_without_input_set)
+
+ def test_mac_ipv6_tcp_without_input_set(self):
+ self.rte_flow_process(vectors_ipv6_tcp_without_input_set)
+
+ def test_mac_ipv6_udp_without_input_set(self):
+ self.rte_flow_process(vectors_ipv6_udp_without_input_set)
+
def test_mac_ipv4_protocol(self):
rules = [
"flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.21 proto is 1 / end actions queue index 1 / mark id 1 / end",
@@ -2458,7 +2702,6 @@ class TestIAVFFdir(TestCase):
out7 = self.send_pkts_getouput(pkts["mismatch"][7])
rfc.check_iavf_fdir_mark(out7, pkt_num=1, check_param={"port_id": 0, "drop": True}, stats=False)
-
def test_mac_outer_co_exist_gtpu_eh_dst(self):
rules = ["flow create 0 ingress pattern eth / ipv4 dst is 192.168.0.31 / udp / gtpu / gtp_psc / end actions rss queues 1 2 end / mark id 1 / end", \
"flow create 0 ingress pattern eth / ipv6 dst is ::32 / udp / gtpu / gtp_psc / end actions rss queues 3 4 5 6 end / mark id 2 / end",\
@@ -2691,6 +2934,12 @@ class TestIAVFFdir(TestCase):
self.create_fdir_rule(rule1, check_stats=False)
rule2 = "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / end actions drop / end"
self.create_fdir_rule(rule2, check_stats=False)
+ self.create_fdir_rule(rule2, check_stats=False)
+ self.pmd_output.execute_cmd("flow destroy 0 rule 0", timeout=1)
+ rule3 = "flow create 0 ingress pattern eth / ipv4 / tcp / end actions queue index 1 / end"
+ self.create_fdir_rule(rule3, check_stats=True)
+ rule4 = "flow create 0 ingress pattern eth / ipv4 src is 192.168.0.20 dst is 192.168.0.21 ttl is 2 tos is 4 / tcp / end actions queue index 1 / end"
+ self.create_fdir_rule(rule4, check_stats=False)
self.pmd_output.execute_cmd("flow destroy 0 rule 0", timeout=1)
# delete a non-existent rule
--
2.17.1
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dts] [PATCH v1 0/2] test_plans:adds, tests:adds
2021-02-23 7:10 [dts] [PATCH v1 0/2] test_plans:adds, tests:adds Hailin Xu
2021-02-23 7:10 ` [dts] [PATCH v1 1/2] test_plans/iavf_fdir:add without input set cases Hailin Xu
2021-02-23 7:10 ` [dts] [PATCH v1 2/2] tests/iavf_fdir:add " Hailin Xu
@ 2021-02-23 7:37 ` Xu, HailinX
2 siblings, 0 replies; 10+ messages in thread
From: Xu, HailinX @ 2021-02-23 7:37 UTC (permalink / raw)
To: dts; +Cc: Lin, Xueqin
[-- Attachment #1: Type: text/plain, Size: 344 bytes --]
Tested-by: Xu, HailinX <hailinx.xu@intel.com>
Regards,
Xu, Hailin
>-----Original Message-----
>From: Xu, HailinX <hailinx.xu@intel.com>
>Sent: Tuesday, February 23, 2021 3:11 PM
>To: dts@dpdk.org
>Cc: Lin, Xueqin <xueqin.lin@intel.com>; Xu, HailinX <hailinx.xu@intel.com>
>Subject: [dts][PATCH v1 0/2] test_plans:adds, tests:adds
[-- Attachment #2: TestIAVFFdir.log --]
[-- Type: application/octet-stream, Size: 6273050 bytes --]
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dts] [PATCH v1 1/2] test_plans/iavf_fdir:add without input set cases
2021-02-23 7:10 ` [dts] [PATCH v1 1/2] test_plans/iavf_fdir:add without input set cases Hailin Xu
@ 2021-03-08 8:20 ` Lin, Xueqin
0 siblings, 0 replies; 10+ messages in thread
From: Lin, Xueqin @ 2021-03-08 8:20 UTC (permalink / raw)
To: Xu, HailinX, dts
> -----Original Message-----
> From: Xu, HailinX <hailinx.xu@intel.com>
> Sent: Tuesday, February 23, 2021 3:11 PM
> To: dts@dpdk.org
> Cc: Lin, Xueqin <xueqin.lin@intel.com>; Xu, HailinX <hailinx.xu@intel.com>
> Subject: [dts][PATCH v1 1/2] test_plans/iavf_fdir:add without input set cases
>
> add without input set IPv4/IPv6 tcp/udp fdir rule test plans.
>
> Signed-off-by: Hailin Xu <hailinx.xu@intel.com>
Acked-by: Xueqin Lin <Xueqin.lin@intel.com>
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dts] [PATCH v1 2/2] tests/iavf_fdir:add without input set cases
2021-02-23 7:10 ` [dts] [PATCH v1 2/2] tests/iavf_fdir:add " Hailin Xu
@ 2021-03-08 8:21 ` Lin, Xueqin
0 siblings, 0 replies; 10+ messages in thread
From: Lin, Xueqin @ 2021-03-08 8:21 UTC (permalink / raw)
To: Xu, HailinX, dts
> -----Original Message-----
> From: Xu, HailinX <hailinx.xu@intel.com>
> Sent: Tuesday, February 23, 2021 3:11 PM
> To: dts@dpdk.org
> Cc: Lin, Xueqin <xueqin.lin@intel.com>; Xu, HailinX <hailinx.xu@intel.com>
> Subject: [dts][PATCH v1 2/2] tests/iavf_fdir:add without input set cases
>
> add without input set IPv4/IPv6 tcp/udp fdir rule test cases.
>
> Signed-off-by: Hailin Xu <hailinx.xu@intel.com>
Acked-by: Xueqin Lin <Xueqin.lin@intel.com>
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dts] [PATCH V1 0/2] test_plans: adds, tests: adds
2020-07-31 8:19 ` [dts] [PATCH V1 0/2] test_plans: adds, tests: adds Xu hailin
2020-08-03 6:09 ` Xu, HailinX
@ 2020-08-12 8:00 ` Tu, Lijuan
1 sibling, 0 replies; 10+ messages in thread
From: Tu, Lijuan @ 2020-08-12 8:00 UTC (permalink / raw)
To: Xu, HailinX, dts; +Cc: Xu, HailinX
> add cvl dcf new suite
>
> Xu,Hailin (2):
> test_plans/cvl_dcf_date_path:add new test plan
> tests/TestSuite_cvl_dcf_date_path:add new suite
>
> test_plans/cvl_dcf_date_path_test_plan.rst | 203 ++++++++++++++++++++
> tests/TestSuite_cvl_dcf_date_path.py | 206 +++++++++++++++++++++
Applied
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dts] [PATCH V1 0/2] test_plans: adds, tests: adds
2020-08-03 6:09 ` Xu, HailinX
@ 2020-08-06 1:27 ` Chen, Zhaoyan
0 siblings, 0 replies; 10+ messages in thread
From: Chen, Zhaoyan @ 2020-08-06 1:27 UTC (permalink / raw)
To: Xu, HailinX, dts; +Cc: Chen, Zhaoyan
Acked-by: Zhaoyan Chen <zhaoyan.chen@intel.com>
Regards,
Zhaoyan Chen
> -----Original Message-----
> From: dts <dts-bounces@dpdk.org> On Behalf Of Xu, HailinX
> Sent: Monday, August 3, 2020 2:10 PM
> To: dts@dpdk.org
> Subject: Re: [dts] [PATCH V1 0/2] test_plans: adds, tests: adds
>
> Tested-by: Xu, HailinX <hailinx.xu@intel.com>
>
> Regards,
> Xu, Hailin
>
>
> -----Original Message-----
> From: Xu, HailinX
> Sent: Friday, July 31, 2020 4:19 PM
> To: dts@dpdk.org
> Cc: Xu, HailinX <hailinx.xu@intel.com>
> Subject: [dts][PATCH V1 0/2] test_plans: adds, tests: adds
>
> From: "Xu,Hailin" <hailinx.xu@intel.com>
>
> add cvl dcf new suite
>
> Xu,Hailin (2):
> test_plans/cvl_dcf_date_path:add new test plan
> tests/TestSuite_cvl_dcf_date_path:add new suite
>
> test_plans/cvl_dcf_date_path_test_plan.rst | 203
> ++++++++++++++++++++
> tests/TestSuite_cvl_dcf_date_path.py | 206 +++++++++++++++++++++
> 2 files changed, 409 insertions(+)
> create mode 100755 test_plans/cvl_dcf_date_path_test_plan.rst
> create mode 100755 tests/TestSuite_cvl_dcf_date_path.py
>
> --
> 2.17.1
^ permalink raw reply [flat|nested] 10+ messages in thread
* Re: [dts] [PATCH V1 0/2] test_plans: adds, tests: adds
2020-07-31 8:19 ` [dts] [PATCH V1 0/2] test_plans: adds, tests: adds Xu hailin
@ 2020-08-03 6:09 ` Xu, HailinX
2020-08-06 1:27 ` Chen, Zhaoyan
2020-08-12 8:00 ` Tu, Lijuan
1 sibling, 1 reply; 10+ messages in thread
From: Xu, HailinX @ 2020-08-03 6:09 UTC (permalink / raw)
To: dts
[-- Attachment #1: Type: text/plain, Size: 790 bytes --]
Tested-by: Xu, HailinX <hailinx.xu@intel.com>
Regards,
Xu, Hailin
-----Original Message-----
From: Xu, HailinX
Sent: Friday, July 31, 2020 4:19 PM
To: dts@dpdk.org
Cc: Xu, HailinX <hailinx.xu@intel.com>
Subject: [dts][PATCH V1 0/2] test_plans: adds, tests: adds
From: "Xu,Hailin" <hailinx.xu@intel.com>
add cvl dcf new suite
Xu,Hailin (2):
test_plans/cvl_dcf_date_path:add new test plan
tests/TestSuite_cvl_dcf_date_path:add new suite
test_plans/cvl_dcf_date_path_test_plan.rst | 203 ++++++++++++++++++++
tests/TestSuite_cvl_dcf_date_path.py | 206 +++++++++++++++++++++
2 files changed, 409 insertions(+)
create mode 100755 test_plans/cvl_dcf_date_path_test_plan.rst
create mode 100755 tests/TestSuite_cvl_dcf_date_path.py
--
2.17.1
[-- Attachment #2: DcfDatePathTest.log --]
[-- Type: application/octet-stream, Size: 67610 bytes --]
30/07/2020 11:09:54 dts:
TEST SUITE : DcfDatePathTest
30/07/2020 11:09:54 dts: NIC : columbiaville_100g
30/07/2020 11:09:54 dut.10.240.183.62:
30/07/2020 11:09:54 tester:
30/07/2020 11:09:59 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.0/vendor
30/07/2020 11:09:59 dut.10.240.183.62: 0x8086
30/07/2020 11:09:59 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.0/device
30/07/2020 11:09:59 dut.10.240.183.62: 0x1889
30/07/2020 11:09:59 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.0/vendor
30/07/2020 11:09:59 dut.10.240.183.62: 0x8086
30/07/2020 11:09:59 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.0/device
30/07/2020 11:09:59 dut.10.240.183.62: 0x1889
30/07/2020 11:10:00 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.1/vendor
30/07/2020 11:10:00 dut.10.240.183.62: 0x8086
30/07/2020 11:10:00 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.1/device
30/07/2020 11:10:00 dut.10.240.183.62: 0x1889
30/07/2020 11:10:00 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.1/vendor
30/07/2020 11:10:00 dut.10.240.183.62: 0x8086
30/07/2020 11:10:00 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.1/device
30/07/2020 11:10:00 dut.10.240.183.62: 0x1889
30/07/2020 11:10:00 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.2/vendor
30/07/2020 11:10:00 dut.10.240.183.62: 0x8086
30/07/2020 11:10:00 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.2/device
30/07/2020 11:10:00 dut.10.240.183.62: 0x1889
30/07/2020 11:10:00 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.2/vendor
30/07/2020 11:10:00 dut.10.240.183.62: 0x8086
30/07/2020 11:10:00 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.2/device
30/07/2020 11:10:00 dut.10.240.183.62: 0x1889
30/07/2020 11:10:01 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.3/vendor
30/07/2020 11:10:01 dut.10.240.183.62: 0x8086
30/07/2020 11:10:01 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.3/device
30/07/2020 11:10:01 dut.10.240.183.62: 0x1889
30/07/2020 11:10:01 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.3/vendor
30/07/2020 11:10:01 dut.10.240.183.62: 0x8086
30/07/2020 11:10:01 dut.10.240.183.62: cat /sys/bus/pci/devices/0000\:af\:01.3/device
30/07/2020 11:10:01 dut.10.240.183.62: 0x1889
30/07/2020 11:10:01 dut.10.240.183.62: ip link set enp175s0f0 vf 0 trust on
30/07/2020 11:10:01 dut.10.240.183.62:
30/07/2020 11:10:01 dut.10.240.183.62: ip link set enp175s0f0 vf 0 mac D2:6B:4C:EB:1C:26
30/07/2020 11:10:01 dut.10.240.183.62:
30/07/2020 11:10:03 DcfDatePathTest: Rerun Test Case test_create_rule_with_vf_action Begin
30/07/2020 11:10:10 DcfDatePathTest: Rerun Test Case test_create_rule_with_vf_action Begin
30/07/2020 11:10:10 DcfDatePathTest: Test Case test_create_rule_with_vf_action Begin
30/07/2020 11:10:10 dut.10.240.183.62:
30/07/2020 11:10:10 tester:
30/07/2020 11:10:10 dut.10.240.183.62: x86_64-native-linuxapp-gcc/app/testpmd -l 1,2,3,4 -n 4 -w 0000:af:01.0,cap=dcf --file-prefix=vf_17765_20200730110932 -- -i
30/07/2020 11:10:11 dut.10.240.183.62: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/vf_17765_20200730110932/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL: using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_iavf (8086:1889) device: 0000:af:01.0 (socket 1)
EAL: Releasing pci mapped resource for 0000:af:01.0
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300000000
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300020000
EAL: using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_ice_dcf (8086:1889) device: 0000:af:01.0 (socket 1)
ice_load_pkg_type(): Active package is: 1.3.17.0, ICE COMMS Package
EAL: No legacy callbacks, legacy socket not created
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=171456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=171456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc
Warning! port-topology=paired and odd forward ports number, the last port will pair with itself.
Configuring Port 0 (socket 1)
ice_dcf_init_rss(): RSS is enabled by PF by default
ice_dcf_configure_queues(): request RXDID == 16 in Queue[0]
Port 0: D2:6B:4C:EB:1C:26
Checking link statuses...
Done
30/07/2020 11:10:21 dut.10.240.183.62: set fwd rxonly
30/07/2020 11:10:21 dut.10.240.183.62: set fwd rxonly
Set rxonly packet forwarding mode
30/07/2020 11:10:21 dut.10.240.183.62: set verbose 1
30/07/2020 11:10:21 dut.10.240.183.62: set verbose 1
Change verbose level from 0 to 1
30/07/2020 11:10:21 dut.10.240.183.62: start
30/07/2020 11:10:22 dut.10.240.183.62: start
rxonly packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
RX P=0/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00
rxonly packet forwarding packets/burst=32
nb forwarding cores=1 - nb forwarding ports=1
port 0: RX queue number: 1 Tx queue number: 1
Rx offloads=0x0 Tx offloads=0x0
RX queue: 0
RX desc=0 - RX free threshold=32
RX threshold registers: pthresh=8 hthresh=8 wthresh=0
RX Offloads=0x0
TX queue: 0
TX desc=0 - TX free threshold=32
TX threshold registers: pthresh=32 hthresh=0 wthresh=0
TX offloads=0x0 - TX RS bit threshold=32
30/07/2020 11:10:22 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107422.0516474 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:25 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107422.0516474 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:28 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107422.0516474
30/07/2020 11:10:28 tester: packet ready for sending...
Ether(dst='68:05:ca:8d:ed:a8', src='00:00:00:00:00:00', type=34525)/IPv6(version=6, tc=3, fl=0, plen=500, nh=6, hlim=64, src='cdcd:910a:2222:5498:8475:1111:3900:1518', dst='cdcd:910a:2222:5498:8475:1111:3900:2020')/TCP(sport=25, dport=23, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=15765, urgptr=0)/Raw(load=b'XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
30/07/2020 11:10:30 dut.10.240.183.62:
30/07/2020 11:10:30 dut.10.240.183.62: flow create 0 ingress pattern eth dst is 68:05:CA:8D:ED:A8 / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 tc is 3 / tcp src is 25 dst is 23 / end actions vf original 1 / end
30/07/2020 11:10:31 dut.10.240.183.62: flow create 0 ingress pattern eth dst is 68:05:CA:8D:ED:A8 / ipv6 dst is CDCD:910A:2222:5498:8475:1111:3900:2020 tc is 3 / tcp src is 25 dst is 23 / end actions vf original 1 / end
30/07/2020 11:10:31 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107431.1447203 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:34 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107431.1447203 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:37 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107431.1447203
30/07/2020 11:10:38 tester: packet ready for sending...
Ether(dst='68:05:ca:8d:ed:a8', src='00:00:00:00:00:00', type=34525)/IPv6(version=6, tc=3, fl=0, plen=500, nh=6, hlim=64, src='cdcd:910a:2222:5498:8475:1111:3900:1518', dst='cdcd:910a:2222:5498:8475:1111:3900:2020')/TCP(sport=25, dport=23, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=15765, urgptr=0)/Raw(load=b'XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
30/07/2020 11:10:39 dut.10.240.183.62:
testpmd> port 0/queue 0: received 1 packets
src=00:00:00:00:00:00 - dst=68:05:CA:8D:ED:A8 - type=0x86dd - length=554 - nb_segs=1 - RSS hash=0x5b961f1 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_TCP - l2_len=14 - l3_len=40 - l4_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
30/07/2020 11:10:39 dut.10.240.183.62: flow destroy 0 rule 0
30/07/2020 11:10:39 dut.10.240.183.62: flow destroy 0 rule 0
30/07/2020 11:10:39 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107439.6990027 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:42 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107439.6990027 root@10.240.183.55:/tmp/tester/
30/07/2020 11:10:46 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107439.6990027
30/07/2020 11:10:47 tester: packet ready for sending...
Ether(dst='68:05:ca:8d:ed:a8', src='00:00:00:00:00:00', type=34525)/IPv6(version=6, tc=3, fl=0, plen=500, nh=6, hlim=64, src='cdcd:910a:2222:5498:8475:1111:3900:1518', dst='cdcd:910a:2222:5498:8475:1111:3900:2020')/TCP(sport=25, dport=23, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=15765, urgptr=0)/Raw(load=b'XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX')
30/07/2020 11:10:48 dut.10.240.183.62:
testpmd>
30/07/2020 11:10:48 DcfDatePathTest: Test Case test_create_rule_with_vf_action Result PASSED:
30/07/2020 11:10:48 dut.10.240.183.62: quit
30/07/2020 11:10:49 dut.10.240.183.62: quit
Telling cores to stop...
Waiting for lcores to finish...
---------------------- Forward statistics for port 0 ----------------------
RX-packets: 1 RX-dropped: 0 RX-total: 1
TX-packets: 0 TX-dropped: 0 TX-total: 0
----------------------------------------------------------------------------
+++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
RX-packets: 1 RX-dropped: 0 RX-total: 1
TX-packets: 0 TX-dropped: 0 TX-total: 0
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Done.
Stopping port 0...
Stopping ports...
Done
Shutting down port 0...
Closing ports...
Done
Bye...
30/07/2020 11:10:52 DcfDatePathTest: Rerun Test Case test_dcf_macfwd Begin
30/07/2020 11:10:57 DcfDatePathTest: Rerun Test Case test_dcf_macfwd Begin
30/07/2020 11:10:57 DcfDatePathTest: Test Case test_dcf_macfwd Begin
30/07/2020 11:10:57 dut.10.240.183.62:
30/07/2020 11:10:57 tester:
30/07/2020 11:10:57 dut.10.240.183.62: x86_64-native-linuxapp-gcc/app/testpmd -l 1,2,3,4 -n 4 -w 0000:af:01.0,cap=dcf --file-prefix=vf_17765_20200730110932 -- -i
30/07/2020 11:10:59 dut.10.240.183.62: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/vf_17765_20200730110932/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL: using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_iavf (8086:1889) device: 0000:af:01.0 (socket 1)
EAL: Releasing pci mapped resource for 0000:af:01.0
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300000000
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300020000
EAL: using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_ice_dcf (8086:1889) device: 0000:af:01.0 (socket 1)
ice_load_pkg_type(): Active package is: 1.3.17.0, ICE COMMS Package
EAL: No legacy callbacks, legacy socket not created
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=171456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=171456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc
Warning! port-topology=paired and odd forward ports number, the last port will pair with itself.
Configuring Port 0 (socket 1)
ice_dcf_init_rss(): RSS is enabled by PF by default
ice_dcf_configure_queues(): request RXDID == 16 in Queue[0]
Port 0: D2:6B:4C:EB:1C:26
Checking link statuses...
Done
30/07/2020 11:11:09 dut.10.240.183.62: set fwd mac
30/07/2020 11:11:09 dut.10.240.183.62: set fwd mac
Set mac packet forwarding mode
30/07/2020 11:11:09 dut.10.240.183.62: start
30/07/2020 11:11:09 dut.10.240.183.62: start
mac packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
RX P=0/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00
mac packet forwarding packets/burst=32
nb forwarding cores=1 - nb forwarding ports=1
port 0: RX queue number: 1 Tx queue number: 1
Rx offloads=0x0 Tx offloads=0x0
RX queue: 0
RX desc=0 - RX free threshold=32
RX threshold registers: pthresh=8 hthresh=8 wthresh=0
RX Offloads=0x0
TX queue: 0
TX desc=0 - TX free threshold=32
TX threshold registers: pthresh=32 hthresh=0 wthresh=0
TX offloads=0x0 - TX RS bit threshold=32
30/07/2020 11:11:09 tester: ls -d /tmp/tester/
30/07/2020 11:11:09 tester: /tmp/tester/
30/07/2020 11:11:09 tester: rm -rf /tmp/tester/sniff_ens192f0.pcap
30/07/2020 11:11:09 tester:
30/07/2020 11:11:16 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107476.3663418 root@10.240.183.55:/tmp/tester/
30/07/2020 11:11:20 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107476.3663418 root@10.240.183.55:/tmp/tester/
30/07/2020 11:11:23 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107476.3663418
30/07/2020 11:11:23 tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63316, src='192.168.1.1', dst='192.168.1.3')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:11:31 DcfDatePathTest: Test Case test_dcf_macfwd Result PASSED:
30/07/2020 11:11:31 dut.10.240.183.62: quit
30/07/2020 11:11:32 dut.10.240.183.62: quit
Telling cores to stop...
Waiting for lcores to finish...
---------------------- Forward statistics for port 0 ----------------------
RX-packets: 100 RX-dropped: 0 RX-total: 100
TX-packets: 100 TX-dropped: 0 TX-total: 100
----------------------------------------------------------------------------
+++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
RX-packets: 100 RX-dropped: 0 RX-total: 100
TX-packets: 100 TX-dropped: 0 TX-total: 100
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Done.
Stopping port 0...
Stopping ports...
Done
Shutting down port 0...
Closing ports...
Done
Bye...
30/07/2020 11:13:19 DcfDatePathTest: Rerun Test Case test_default_rss_l3 Begin
30/07/2020 11:13:23 DcfDatePathTest: Rerun Test Case test_default_rss_l3 Begin
30/07/2020 11:13:23 DcfDatePathTest: Test Case test_default_rss_l3 Begin
30/07/2020 11:13:23 dut.10.240.183.62:
30/07/2020 11:13:23 tester:
30/07/2020 11:13:23 dut.10.240.183.62: x86_64-native-linuxapp-gcc/app/testpmd -l 1,2,3,4 -n 4 -w 0000:af:01.0,cap=dcf --file-prefix=vf_17765_20200730110932 -- -i
30/07/2020 11:13:25 dut.10.240.183.62: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/vf_17765_20200730110932/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL: using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_iavf (8086:1889) device: 0000:af:01.0 (socket 1)
EAL: Releasing pci mapped resource for 0000:af:01.0
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300000000
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300020000
EAL: using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_ice_dcf (8086:1889) device: 0000:af:01.0 (socket 1)
ice_load_pkg_type(): Active package is: 1.3.17.0, ICE COMMS Package
EAL: No legacy callbacks, legacy socket not created
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=171456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=171456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc
Warning! port-topology=paired and odd forward ports number, the last port will pair with itself.
Configuring Port 0 (socket 1)
ice_dcf_init_rss(): RSS is enabled by PF by default
ice_dcf_configure_queues(): request RXDID == 16 in Queue[0]
Port 0: D2:6B:4C:EB:1C:26
Checking link statuses...
Done
30/07/2020 11:13:35 dut.10.240.183.62: set fwd rxonly
30/07/2020 11:13:35 dut.10.240.183.62: set fwd rxonly
Set rxonly packet forwarding mode
30/07/2020 11:13:35 dut.10.240.183.62: set verbose 1
30/07/2020 11:13:35 dut.10.240.183.62: set verbose 1
Change verbose level from 0 to 1
30/07/2020 11:13:35 dut.10.240.183.62: start
30/07/2020 11:13:35 dut.10.240.183.62: start
rxonly packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
RX P=0/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00
rxonly packet forwarding packets/burst=32
nb forwarding cores=1 - nb forwarding ports=1
port 0: RX queue number: 1 Tx queue number: 1
Rx offloads=0x0 Tx offloads=0x0
RX queue: 0
RX desc=0 - RX free threshold=32
RX threshold registers: pthresh=8 hthresh=8 wthresh=0
RX Offloads=0x0
TX queue: 0
TX desc=0 - TX free threshold=32
TX threshold registers: pthresh=32 hthresh=0 wthresh=0
TX offloads=0x0 - TX RS bit threshold=32
30/07/2020 11:13:35 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107615.6880608 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:39 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107615.6880608 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:42 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107615.6880608
30/07/2020 11:13:42 tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63317, src='192.168.1.1', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63316, src='192.168.1.1', dst='192.168.1.3')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63315, src='192.168.1.3', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63317, src='192.168.1.1', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:13:44 dut.10.240.183.62: port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=98 - nb_segs=1 - RSS hash=0x4eeb3e08 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=98 - nb_segs=1 - RSS hash=0x95866c16 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=98 - nb_segs=1 - RSS hash=0xf1179acb - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=98 - nb_segs=1 - RSS hash=0x4eeb3e08 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 - l2_len=14 - l3_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
30/07/2020 11:13:44 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107624.1117468 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:47 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107624.1117468 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:50 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107624.1117468
30/07/2020 11:13:51 tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::12')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::21', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:13:52 dut.10.240.183.62: port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=118 - nb_segs=1 - RSS hash=0x39e03a7c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 - l2_len=14 - l3_len=40 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=118 - nb_segs=1 - RSS hash=0x4ff3931e - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 - l2_len=14 - l3_len=40 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=118 - nb_segs=1 - RSS hash=0x29277ca - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 - l2_len=14 - l3_len=40 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=118 - nb_segs=1 - RSS hash=0x39e03a7c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 - l2_len=14 - l3_len=40 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
30/07/2020 11:13:52 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107632.5236943 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:55 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107632.5236943 root@10.240.183.55:/tmp/tester/
30/07/2020 11:13:58 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107632.5236943
30/07/2020 11:13:59 tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=108, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29789, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63317, src='192.168.1.1', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=108, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29789, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63316, src='192.168.1.1', dst='192.168.1.3')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=108, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29789, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63315, src='192.168.1.3', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='11:22:33:44:55:77', type=2048)/IP(version=4, ihl=5, tos=0, len=108, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29789, src='1.1.1.2', dst='2.2.2.1')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63317, src='192.168.1.1', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='11:22:33:44:55:77', type=34525)/IPv6(version=6, tc=0, fl=0, plen=88, nh=47, hlim=64, src='::11', dst='::22')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=84, id=1, flags=0, frag=0, ttl=64, proto=0, chksum=63317, src='192.168.1.1', dst='192.168.1.2')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:14:00 dut.10.240.183.62: port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=122 - nb_segs=1 - RSS hash=0x4eeb3e08 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=122 - nb_segs=1 - RSS hash=0x95866c16 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=122 - nb_segs=1 - RSS hash=0xf1179acb - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=11:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=122 - nb_segs=1 - RSS hash=0x4eeb3e08 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=11:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=142 - nb_segs=1 - RSS hash=0x4eeb3e08 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4 - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
30/07/2020 11:14:00 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107640.959596 root@10.240.183.55:/tmp/tester/
30/07/2020 11:14:04 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107640.959596 root@10.240.183.55:/tmp/tester/
30/07/2020 11:14:08 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107640.959596
30/07/2020 11:14:08 tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=128, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29769, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=128, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29769, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::12')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=128, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29769, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::21', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='11:22:33:44:55:77', type=2048)/IP(version=4, ihl=5, tos=0, len=128, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29769, src='1.1.1.2', dst='2.2.2.1')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='11:22:33:44:55:77', type=34525)/IPv6(version=6, tc=0, fl=0, plen=108, nh=47, hlim=64, src='::33', dst='::44')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=64, nh=59, hlim=64, src='::22', dst='::11')/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:14:10 dut.10.240.183.62: port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=142 - nb_segs=1 - RSS hash=0x39e03a7c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=142 - nb_segs=1 - RSS hash=0x4ff3931e - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=142 - nb_segs=1 - RSS hash=0x29277ca - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=11:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=142 - nb_segs=1 - RSS hash=0x39e03a7c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=11:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=162 - nb_segs=1 - RSS hash=0x39e03a7c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV6 - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=40 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
30/07/2020 11:14:10 DcfDatePathTest: Test Case test_default_rss_l3 Result PASSED:
30/07/2020 11:14:10 dut.10.240.183.62: quit
30/07/2020 11:14:11 dut.10.240.183.62: quit
Telling cores to stop...
Waiting for lcores to finish...
---------------------- Forward statistics for port 0 ----------------------
RX-packets: 18 RX-dropped: 0 RX-total: 18
TX-packets: 0 TX-dropped: 0 TX-total: 0
----------------------------------------------------------------------------
+++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
RX-packets: 18 RX-dropped: 0 RX-total: 18
TX-packets: 0 TX-dropped: 0 TX-total: 0
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Done.
Stopping port 0...
Stopping ports...
Done
Shutting down port 0...
Closing ports...
Done
Bye...
30/07/2020 11:14:44 DcfDatePathTest: Rerun Test Case test_default_rss_l4 Begin
30/07/2020 11:14:49 DcfDatePathTest: Rerun Test Case test_default_rss_l4 Begin
30/07/2020 11:14:49 DcfDatePathTest: Test Case test_default_rss_l4 Begin
30/07/2020 11:14:49 dut.10.240.183.62:
30/07/2020 11:14:49 tester:
30/07/2020 11:14:49 dut.10.240.183.62: x86_64-native-linuxapp-gcc/app/testpmd -l 1,2,3,4 -n 4 -w 0000:af:01.0,cap=dcf --file-prefix=vf_17765_20200730110932 -- -i
30/07/2020 11:14:51 dut.10.240.183.62: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/vf_17765_20200730110932/mp_socket
EAL: Selected IOVA mode 'VA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: VFIO support initialized
EAL: using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_iavf (8086:1889) device: 0000:af:01.0 (socket 1)
EAL: Releasing pci mapped resource for 0000:af:01.0
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300000000
EAL: Calling pci_unmap_resource for 0000:af:01.0 at 0x4300020000
EAL: using IOMMU type 1 (Type 1)
EAL: Probe PCI driver: net_ice_dcf (8086:1889) device: 0000:af:01.0 (socket 1)
ice_load_pkg_type(): Active package is: 1.3.17.0, ICE COMMS Package
EAL: No legacy callbacks, legacy socket not created
Interactive-mode selected
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=171456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
testpmd: create a new mbuf pool <mbuf_pool_socket_1>: n=171456, size=2176, socket=1
testpmd: preferred mempool ops selected: ring_mp_mc
Warning! port-topology=paired and odd forward ports number, the last port will pair with itself.
Configuring Port 0 (socket 1)
ice_dcf_init_rss(): RSS is enabled by PF by default
ice_dcf_configure_queues(): request RXDID == 16 in Queue[0]
Port 0: D2:6B:4C:EB:1C:26
Checking link statuses...
Done
30/07/2020 11:15:01 dut.10.240.183.62: set fwd rxonly
30/07/2020 11:15:01 dut.10.240.183.62: set fwd rxonly
Set rxonly packet forwarding mode
30/07/2020 11:15:01 dut.10.240.183.62: set verbose 1
30/07/2020 11:15:01 dut.10.240.183.62: set verbose 1
Change verbose level from 0 to 1
30/07/2020 11:15:01 dut.10.240.183.62: start
30/07/2020 11:15:01 dut.10.240.183.62: start
rxonly packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
RX P=0/Q=0 (socket 1) -> TX P=0/Q=0 (socket 1) peer=02:00:00:00:00:00
rxonly packet forwarding packets/burst=32
nb forwarding cores=1 - nb forwarding ports=1
port 0: RX queue number: 1 Tx queue number: 1
Rx offloads=0x0 Tx offloads=0x0
RX queue: 0
RX desc=0 - RX free threshold=32
RX threshold registers: pthresh=8 hthresh=8 wthresh=0
RX Offloads=0x0
TX queue: 0
TX desc=0 - TX free threshold=32
TX threshold registers: pthresh=32 hthresh=0 wthresh=0
TX offloads=0x0 - TX RS bit threshold=32
30/07/2020 11:15:01 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107701.2840192 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:05 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107701.2840192 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:08 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107701.2840192
30/07/2020 11:15:09 tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=1234, dport=5678, len=72, chksum=20987)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63291, src='192.168.1.1', dst='192.168.1.3')/UDP(sport=1234, dport=5678, len=72, chksum=20986)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63290, src='192.168.1.3', dst='192.168.1.2')/UDP(sport=1234, dport=5678, len=72, chksum=20985)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=1235, dport=5678, len=72, chksum=20986)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=1234, dport=5679, len=72, chksum=20986)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:22:33:44:55:77', type=2048)/IP(version=4, ihl=5, tos=0, len=104, id=1, flags=0, frag=0, ttl=64, proto=6, chksum=63291, src='192.168.1.1', dst='192.168.1.2')/TCP(sport=1234, dport=5678, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=57919, urgptr=0)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:15:11 dut.10.240.183.62: port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=106 - nb_segs=1 - RSS hash=0xda0c765e - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_UDP - l2_len=14 - l3_len=20 - l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=106 - nb_segs=1 - RSS hash=0x1612440 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_UDP - l2_len=14 - l3_len=20 - l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=106 - nb_segs=1 - RSS hash=0x65f0d29d - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_UDP - l2_len=14 - l3_len=20 - l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=106 - nb_segs=1 - RSS hash=0x8812a97c - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_UDP - l2_len=14 - l3_len=20 - l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=106 - nb_segs=1 - RSS hash=0x52efaf3 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_UDP - l2_len=14 - l3_len=20 - l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=118 - nb_segs=1 - RSS hash=0xda0c765e - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 L4_TCP - l2_len=14 - l3_len=20 - l4_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
30/07/2020 11:15:11 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107711.0111084 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:14 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107711.0111084 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:17 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107711.0111084
30/07/2020 11:15:18 tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54556)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::12')/UDP(sport=1234, dport=5678, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::21', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54557)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1235, dport=5678, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=34525)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5679, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='11:22:33:44:55:77', type=34525)/IPv6(version=6, tc=0, fl=0, plen=84, nh=6, hlim=64, src='::22', dst='::11')/TCP(sport=1234, dport=5678, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=25953, urgptr=0)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:15:20 dut.10.240.183.62: port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0xa87b5936 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_UDP - l2_len=14 - l3_len=40 - l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0xde68f054 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_UDP - l2_len=14 - l3_len=40 - l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0x93091480 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_UDP - l2_len=14 - l3_len=40 - l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0x99c7a5cb - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_UDP - l2_len=14 - l3_len=40 - l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=126 - nb_segs=1 - RSS hash=0x548607d7 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_UDP - l2_len=14 - l3_len=40 - l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=11:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=138 - nb_segs=1 - RSS hash=0xa87b5936 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 L4_TCP - l2_len=14 - l3_len=40 - l4_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
30/07/2020 11:15:20 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107720.0178802 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:23 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107720.0178802 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:26 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107720.0178802
30/07/2020 11:15:27 tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=22, dport=23, len=72, chksum=27854)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63291, src='192.168.1.1', dst='192.168.1.3')/UDP(sport=22, dport=23, len=72, chksum=27853)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63290, src='192.168.1.3', dst='192.168.1.2')/UDP(sport=22, dport=23, len=72, chksum=27852)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=21, dport=23, len=72, chksum=27855)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=22, dport=24, len=72, chksum=27853)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:22:33:44:55:77', type=2048)/IP(version=4, ihl=5, tos=0, len=116, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29781, src='1.1.1.2', dst='2.2.2.1')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=92, id=1, flags=0, frag=0, ttl=64, proto=17, chksum=63292, src='192.168.1.1', dst='192.168.1.2')/UDP(sport=22, dport=23, len=72, chksum=27854)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:22:33:44:55:77', type=34525)/IPv6(version=6, tc=0, fl=0, plen=108, nh=47, hlim=64, src='::11', dst='::22')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=2048, chksum=None, offset=None, key=None, seqence_number=None)/IP(version=4, ihl=5, tos=0, len=104, id=1, flags=0, frag=0, ttl=64, proto=6, chksum=63291, src='192.168.1.1', dst='192.168.1.2')/TCP(sport=22, dport=23, seq=0, ack=0, dataofs=5, reserved=0, flags=2, window=8192, chksum=64786, urgptr=0)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:15:28 dut.10.240.183.62: port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x8ccb4ab9 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x57a618a7 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x3337ee7a - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x77dafa0a - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x505472fc - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=130 - nb_segs=1 - RSS hash=0x8ccb4ab9 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=162 - nb_segs=1 - RSS hash=0x8ccb4ab9 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV4 INNER_L4_TCP - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=20 - inner_l4_len=20 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
30/07/2020 11:15:28 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.pcap1596107728.8297284 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:32 tester: scp -v /home/dts/output/tmp/pcap/scapy_ens192f0.cmd1596107728.8297284 root@10.240.183.55:/tmp/tester/
30/07/2020 11:15:35 tester: python3 /tmp/tester/scapy_ens192f0.cmd1596107728.8297284
30/07/2020 11:15:35 tester: packet ready for sending...
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54556)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::12')/UDP(sport=1234, dport=5678, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::21', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54557)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1235, dport=5678, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:11:22:33:44:55', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.1', dst='2.2.2.2')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5679, len=72, chksum=54555)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:22:33:44:55:77', type=2048)/IP(version=4, ihl=5, tos=0, len=136, id=1, flags=0, frag=0, ttl=64, proto=47, chksum=29761, src='1.1.1.2', dst='2.2.2.1')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54556)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
Ether(dst='d2:6b:4c:eb:1c:26', src='00:22:33:44:55:77', type=34525)/IPv6(version=6, tc=0, fl=0, plen=116, nh=47, hlim=64, src='::33', dst='::44')/GRE(chksum_present=0, routing_present=0, key_present=0, seqnum_present=0, strict_route_source=0, recursion_control=0, flags=0, version=0, proto=34525, chksum=None, offset=None, key=None, seqence_number=None)/IPv6(version=6, tc=0, fl=0, plen=72, nh=17, hlim=64, src='::22', dst='::11')/UDP(sport=1234, dport=5678, len=72, chksum=54556)/Raw(load=b'xxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx')
30/07/2020 11:15:37 dut.10.240.183.62: port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0xa87b5936 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0xde68f054 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0x93091480 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0x99c7a5cb - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:11:22:33:44:55 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0x548607d7 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x0800 - length=150 - nb_segs=1 - RSS hash=0xa87b5936 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV4 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP - l2_len=14 - l3_len=20 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
port 0/queue 0: received 1 packets
src=00:22:33:44:55:77 - dst=D2:6B:4C:EB:1C:26 - type=0x86dd - length=170 - nb_segs=1 - RSS hash=0xa87b5936 - RSS queue=0x0 - sw ptype: L2_ETHER L3_IPV6 TUNNEL_GRE INNER_L3_IPV6 INNER_L4_UDP - l2_len=14 - l3_len=40 - tunnel_len=4 - inner_l3_len=40 - inner_l4_len=8 - Receive queue=0x0
ol_flags: PKT_RX_RSS_HASH PKT_RX_L4_CKSUM_GOOD PKT_RX_IP_CKSUM_GOOD PKT_RX_OUTER_L4_CKSUM_UNKNOWN
30/07/2020 11:15:37 DcfDatePathTest: Test Case test_default_rss_l4 Result PASSED:
30/07/2020 11:15:37 dut.10.240.183.62: quit
30/07/2020 11:15:38 dut.10.240.183.62: quit
Telling cores to stop...
Waiting for lcores to finish...
---------------------- Forward statistics for port 0 ----------------------
RX-packets: 26 RX-dropped: 0 RX-total: 26
TX-packets: 0 TX-dropped: 0 TX-total: 0
----------------------------------------------------------------------------
+++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
RX-packets: 26 RX-dropped: 0 RX-total: 26
TX-packets: 0 TX-dropped: 0 TX-total: 0
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Done.
Stopping port 0...
Stopping ports...
Done
Shutting down port 0...
Closing ports...
Done
Bye...
30/07/2020 11:15:40 dts:
TEST SUITE ENDED: DcfDatePathTest
^ permalink raw reply [flat|nested] 10+ messages in thread
* [dts] [PATCH V1 0/2] test_plans: adds, tests: adds
2020-07-31 8:19 [dts] [PATCH V1 1/2] test_plans:add new test plan Xu hailin
@ 2020-07-31 8:19 ` Xu hailin
2020-08-03 6:09 ` Xu, HailinX
2020-08-12 8:00 ` Tu, Lijuan
0 siblings, 2 replies; 10+ messages in thread
From: Xu hailin @ 2020-07-31 8:19 UTC (permalink / raw)
To: dts; +Cc: Xu,Hailin
From: "Xu,Hailin" <hailinx.xu@intel.com>
add cvl dcf new suite
Xu,Hailin (2):
test_plans/cvl_dcf_date_path:add new test plan
tests/TestSuite_cvl_dcf_date_path:add new suite
test_plans/cvl_dcf_date_path_test_plan.rst | 203 ++++++++++++++++++++
tests/TestSuite_cvl_dcf_date_path.py | 206 +++++++++++++++++++++
2 files changed, 409 insertions(+)
create mode 100755 test_plans/cvl_dcf_date_path_test_plan.rst
create mode 100755 tests/TestSuite_cvl_dcf_date_path.py
--
2.17.1
^ permalink raw reply [flat|nested] 10+ messages in thread
end of thread, other threads:[~2021-03-08 8:21 UTC | newest]
Thread overview: 10+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-02-23 7:10 [dts] [PATCH v1 0/2] test_plans:adds, tests:adds Hailin Xu
2021-02-23 7:10 ` [dts] [PATCH v1 1/2] test_plans/iavf_fdir:add without input set cases Hailin Xu
2021-03-08 8:20 ` Lin, Xueqin
2021-02-23 7:10 ` [dts] [PATCH v1 2/2] tests/iavf_fdir:add " Hailin Xu
2021-03-08 8:21 ` Lin, Xueqin
2021-02-23 7:37 ` [dts] [PATCH v1 0/2] test_plans:adds, tests:adds Xu, HailinX
-- strict thread matches above, loose matches on Subject: below --
2020-07-31 8:19 [dts] [PATCH V1 1/2] test_plans:add new test plan Xu hailin
2020-07-31 8:19 ` [dts] [PATCH V1 0/2] test_plans: adds, tests: adds Xu hailin
2020-08-03 6:09 ` Xu, HailinX
2020-08-06 1:27 ` Chen, Zhaoyan
2020-08-12 8:00 ` Tu, Lijuan
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).