test suite reviews and discussions
 help / color / mirror / Atom feed
From: "Yao, BingX Y" <bingx.y.yao@intel.com>
To: "Li, WenjieX A" <wenjiex.a.li@intel.com>, "dts@dpdk.org" <dts@dpdk.org>
Cc: "Li, WenjieX A" <wenjiex.a.li@intel.com>
Subject: Re: [dts] [PATCH V1] tests/tx_preparation: optimize script
Date: Fri, 23 Aug 2019 08:24:12 +0000	[thread overview]
Message-ID: <95BCD24840F32441BEA74E0F8A31839E058FC5C8@SHSMSX106.ccr.corp.intel.com> (raw)
In-Reply-To: <1566579803-48004-1-git-send-email-wenjiex.a.li@intel.com>

[-- Attachment #1: Type: text/plain, Size: 1607 bytes --]

Tested-by:Yao, BingX Y <bingx.y.yao@intel.com>

-----Original Message-----
From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Wenjie Li
Sent: Saturday, August 24, 2019 1:03 AM
To: dts@dpdk.org
Cc: Li, WenjieX A <wenjiex.a.li@intel.com>
Subject: [dts] [PATCH V1] tests/tx_preparation: optimize script

move stop/quit testpmd into tear_down; otherwise, if one case is failed, the testpmd is still running, it will affect the following cases.

Signed-off-by: Wenjie Li <wenjiex.a.li@intel.com>
---
 tests/TestSuite_tx_preparation.py | 11 +++--------
 1 file changed, 3 insertions(+), 8 deletions(-)

diff --git a/tests/TestSuite_tx_preparation.py b/tests/TestSuite_tx_preparation.py
index eea95c1..ba0aac7 100644
--- a/tests/TestSuite_tx_preparation.py
+++ b/tests/TestSuite_tx_preparation.py
@@ -173,8 +173,6 @@ class TestTX_preparation(TestCase):
         self.dut_testpmd.execute_cmd('start')
 
         self.send_packet_verify()
-        self.dut_testpmd.execute_cmd('stop')
-        self.dut_testpmd.quit() 
  
     def test_tx_preparation_TSO(self):
         """
@@ -185,16 +183,13 @@ class TestTX_preparation(TestCase):
         self.dut_testpmd.execute_cmd('start')
 
         self.send_packet_verify(1)
-        self.dut_testpmd.execute_cmd('stop')
-        self.dut_testpmd.quit()
-
 
     def tear_down(self):
         """
         Run after each test case. 
-        """ 
-        pass
-
+        """
+        self.dut_testpmd.execute_cmd('stop')
+        self.dut_testpmd.quit()
         
     def tear_down_all(self):
         """
--
2.17.1


[-- Attachment #2: TestTX_preparation.log --]
[-- Type: application/octet-stream, Size: 55884 bytes --]

23/08/2019 23:22:49                            dts: 
TEST SUITE : TestTX_preparation
23/08/2019 23:22:49                            dts: NIC :        powerville
23/08/2019 23:22:49             dut.10.240.176.197: 
23/08/2019 23:22:49                         tester: 
23/08/2019 23:22:49                         tester: ethtool -K eno50336512 rx off tx off tso off gso            off gro off lro off
23/08/2019 23:22:49                         tester: Cannot change large-receive-offload
23/08/2019 23:22:49                         tester: ethtool -K eno50336512 rx off tx off tso off gso            off gro off
23/08/2019 23:22:49                         tester: 
23/08/2019 23:22:49                         tester: ifconfig eno50336512 mtu 9000
23/08/2019 23:22:49                         tester: 
23/08/2019 23:22:49             TestTX_preparation: Test Case test_tx_preparation_NonTSO Begin
23/08/2019 23:22:49             dut.10.240.176.197: 
23/08/2019 23:22:50                         tester:  
23/08/2019 23:22:50             dut.10.240.176.197: ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4  -- -i  --portmask=1 --port-topology=chained --max-pkt-len=9000 --tx-offloads=0x8000
23/08/2019 23:22:50             dut.10.240.176.197: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/rte/mp_socket
EAL: Selected IOVA mode 'PA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: PCI device 0000:00:04.0 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.1 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.2 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.3 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.4 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.5 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.6 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.7 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:18:00.0 on NUMA socket 0
EAL:   probe driver: 8086:1583 net_i40e
EAL: PCI device 0000:18:00.1 on NUMA socket 0
EAL:   probe driver: 8086:1583 net_i40e
EAL: PCI device 0000:1a:00.0 on NUMA socket 0
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.1 on NUMA socket 0
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.2 on NUMA socket 0
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.3 on NUMA socket 0
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:3d:00.0 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:3d:00.1 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:80:04.0 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.1 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.2 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.3 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.4 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.5 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.6 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.7 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:af:00.0 on NUMA socket 1
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.1 on NUMA socket 1
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.2 on NUMA socket 1
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.3 on NUMA socket 1
EAL:   probe driver: 8086:1521 net_e1000_igb
Interactive-mode selected
previous number of forwarding ports 2 - changed to number of configured ports 1
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=155456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
Configuring Port 0 (socket 0)
Port 0: B4:96:91:49:96:EC
Configuring Port 1 (socket 0)
Port 1: B4:96:91:49:96:ED
Checking link statuses...
Done
23/08/2019 23:23:00             dut.10.240.176.197: show port info 0
23/08/2019 23:23:01             dut.10.240.176.197: show port info 0

********************* Infos for port 0  *********************
MAC address: B4:96:91:49:96:EC
Device name: 0000:1a:00.0
Driver name: net_e1000_igb
Connect to socket: 0
memory allocation on the socket: 0
Link status: up
Link speed: 1000 Mbps
Link duplex: full-duplex
MTU: 1500
Promiscuous mode: enabled
Allmulticast mode: disabled
Maximum number of MAC addresses: 32
Maximum number of MAC addresses of hash filtering: 0
VLAN offload: 
  strip off 
  filter off 
  qinq(extend) off 
Hash key size in bytes: 40
Redirection table size: 128
Supported RSS offload flow types:
  ipv4
  ipv4-tcp
  ipv4-udp
  ipv6
  ipv6-tcp
  ipv6-udp
  user defined 15
  user defined 16
  user defined 17
Minimum size of RX buffer: 256
Maximum configurable length of RX packet: 16383
Maximum number of VMDq pools: 8
Current number of RX queues: 1
Max possible RX queues: 8
Max possible number of RXDs per queue: 4096
Min possible number of RXDs per queue: 32
RXDs number alignment: 8
Current number of TX queues: 1
Max possible TX queues: 8
Max possible number of TXDs per queue: 4096
Min possible number of TXDs per queue: 32
TXDs number alignment: 8
Max segment number per packet: 255
Max segment number per MTU/TSO: 255
23/08/2019 23:23:01             dut.10.240.176.197: set fwd csum
23/08/2019 23:23:01             dut.10.240.176.197: set fwd csum
Set csum packet forwarding mode
23/08/2019 23:23:01             dut.10.240.176.197: set verbose 1
23/08/2019 23:23:01             dut.10.240.176.197: set verbose 1
Change verbose level from 0 to 1
23/08/2019 23:23:01             dut.10.240.176.197: port stop all
23/08/2019 23:23:01             dut.10.240.176.197: port stop all
Stopping ports...
Checking link statuses...
Done
23/08/2019 23:23:01             dut.10.240.176.197: csum set ip hw 0
23/08/2019 23:23:01             dut.10.240.176.197: csum set ip hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is sw
TCP checksum offload is sw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:23:01             dut.10.240.176.197: csum set tcp hw 0
23/08/2019 23:23:01             dut.10.240.176.197: csum set tcp hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is sw
TCP checksum offload is hw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:23:01             dut.10.240.176.197: csum set udp hw 0
23/08/2019 23:23:01             dut.10.240.176.197: csum set udp hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is hw
TCP checksum offload is hw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:23:01             dut.10.240.176.197: tso set 0 0
23/08/2019 23:23:01             dut.10.240.176.197: tso set 0 0
TSO for non-tunneled packets is disabled
23/08/2019 23:23:01             dut.10.240.176.197: port start all
23/08/2019 23:23:02             dut.10.240.176.197: port start all
Configuring Port 0 (socket 0)
Port 0: B4:96:91:49:96:EC
Port 1: B4:96:91:49:96:ED
Checking link statuses...
Done
23/08/2019 23:23:02             dut.10.240.176.197: start
23/08/2019 23:23:02             dut.10.240.176.197: start
csum packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
  RX P=0/Q=0 (socket 0) -> TX P=0/Q=0 (socket 0) peer=02:00:00:00:00:00

  csum packet forwarding packets/burst=32
  nb forwarding cores=1 - nb forwarding ports=1
  port 0: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x800 Tx offloads=0x800e
    RX queue: 0
      RX desc=512 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=4
      RX Offloads=0x800
    TX queue: 0
      TX desc=512 - TX free threshold=0
      TX threshold registers: pthresh=8 hthresh=1  wthresh=16
      TX offloads=0x800e - TX RS bit threshold=0
  port 1: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x800 Tx offloads=0x8000
    RX queue: 0
      RX desc=512 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=4
      RX Offloads=0x800
    TX queue: 0
      TX desc=512 - TX free threshold=0
      TX threshold registers: pthresh=8 hthresh=1  wthresh=16
      TX offloads=0x8000 - TX RS bit threshold=0
23/08/2019 23:23:02                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:02                         tester: 
23/08/2019 23:23:02                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:23:02                         tester: [1] 7751
23/08/2019 23:23:05                         tester: scapy
23/08/2019 23:23:06                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:08                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10)                    /Raw(RandString(1681))], iface="eno50336512")
23/08/2019 23:23:08                         tester: .
Sent 1 packets.
23/08/2019 23:23:10                         tester: exit()
23/08/2019 23:23:11                         tester: 
23/08/2019 23:23:11                         tester: killall tcpdump
23/08/2019 23:23:11                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:11                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:11                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:08.949613 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 1755: (hlim 64, next-header TCP (6) payload length: 1701) ::1.20 > ::1.80: Flags [.], cksum 0x1217 (correct), seq 0:1681, ack 0, win 8192, length 1681: HTTP
23/08/2019 23:23:11                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:11                         tester: 
23/08/2019 23:23:11                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:23:11                         tester: [1] 7758
23/08/2019 23:23:14                         tester: scapy
23/08/2019 23:23:15                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:17                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10,                    chksum=0x1234)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:23:17                         tester: .
Sent 1 packets.
23/08/2019 23:23:19                         tester: exit()
23/08/2019 23:23:19                         tester: 
23/08/2019 23:23:19                         tester: killall tcpdump
23/08/2019 23:23:19                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:19                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:20                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:17.579809 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xa93e (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:23:20                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:20                         tester: 
23/08/2019 23:23:20                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:23:20                         tester: [1] 7765
23/08/2019 23:23:23                         tester: scapy
23/08/2019 23:23:23                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:25                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10)                    /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:23:26                         tester: .
Sent 1 packets.
23/08/2019 23:23:28                         tester: exit()
23/08/2019 23:23:28                         tester: 
23/08/2019 23:23:28                         tester: killall tcpdump
23/08/2019 23:23:28                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:28                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:28                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:26.115015 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 124: (hlim 64, next-header TCP (6) payload length: 70) ::1.20 > ::1.80: Flags [.], cksum 0xbd4b (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:23:28                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:28                         tester: 
23/08/2019 23:23:28                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:23:28                         tester: [1] 7772
23/08/2019 23:23:31                         tester: scapy
23/08/2019 23:23:32                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:34                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP(chksum=0x1234)                    /TCP(flags=0x10,chksum=0x1234)/Raw(RandString(1681))], iface="eno50336512")
23/08/2019 23:23:34                         tester: .
Sent 1 packets.
23/08/2019 23:23:36                         tester: exit()
23/08/2019 23:23:36                         tester: 
23/08/2019 23:23:36                         tester: killall tcpdump
23/08/2019 23:23:36                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:36                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:37                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:34.578172 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1735: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 1721)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xcb94 (correct), seq 0:1681, ack 0, win 8192, length 1681: HTTP
23/08/2019 23:23:37                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:37                         tester: 
23/08/2019 23:23:37                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:23:37                         tester: [1] 7779
23/08/2019 23:23:40                         tester: scapy
23/08/2019 23:23:40                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:42                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP(chksum=0x1234)                    /TCP(flags=0x10)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:23:43                         tester: .
Sent 1 packets.
23/08/2019 23:23:45                         tester: exit()
23/08/2019 23:23:45                         tester: 
23/08/2019 23:23:45                         tester: killall tcpdump
23/08/2019 23:23:45                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:45                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:45                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:43.038899 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x00f0 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:23:45                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:45                         tester: 
23/08/2019 23:23:45                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:23:45                         tester: [1] 7786
23/08/2019 23:23:48                         tester: scapy
23/08/2019 23:23:49                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:51                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10,                    chksum=0x1234)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:23:51                         tester: .
Sent 1 packets.
23/08/2019 23:23:53                         tester: exit()
23/08/2019 23:23:53                         tester: 
23/08/2019 23:23:53                         tester: killall tcpdump
23/08/2019 23:23:53                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:23:53                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:23:53                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:51.498622 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 124: (hlim 64, next-header TCP (6) payload length: 70) ::1.20 > ::1.80: Flags [.], cksum 0x908e (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:23:53                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:23:54                         tester: 
23/08/2019 23:23:54                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:23:54                         tester: [1] 7793
23/08/2019 23:23:57                         tester: scapy
23/08/2019 23:23:57                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:23:59                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10)                    /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:23:59                         tester: .
Sent 1 packets.
23/08/2019 23:24:01                         tester: exit()
23/08/2019 23:24:02                         tester: 
23/08/2019 23:24:02                         tester: killall tcpdump
23/08/2019 23:24:02                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:02                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:02                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:23:59.957350 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xfdd1 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:24:02                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:02                         tester: 
23/08/2019 23:24:02                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:24:02                         tester: [1] 7800
23/08/2019 23:24:05                         tester: scapy
23/08/2019 23:24:06                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:24:08                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10)                    /Raw(RandString(1681))], iface="eno50336512")
23/08/2019 23:24:08                         tester: .
Sent 1 packets.
23/08/2019 23:24:10                         tester: exit()
23/08/2019 23:24:10                         tester: 
23/08/2019 23:24:10                         tester: killall tcpdump
23/08/2019 23:24:10                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:10                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:10                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:24:08.423747 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1735: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 1721)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x2e44 (correct), seq 0:1681, ack 0, win 8192, length 1681: HTTP
23/08/2019 23:24:10                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:11                         tester: 
23/08/2019 23:24:11                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:24:11                         tester: [1] 7810
23/08/2019 23:24:14                         tester: scapy
23/08/2019 23:24:14                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:24:16                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/UDP()                    /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:24:16                         tester: .
Sent 1 packets.
23/08/2019 23:24:18                         tester: exit()
23/08/2019 23:24:19                         tester: 
23/08/2019 23:24:19                         tester: killall tcpdump
23/08/2019 23:24:19                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:19                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:19                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:24:16.898374 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 112: (hlim 64, next-header UDP (17) payload length: 58) ::1.53 > ::1.53: [udp sum ok] 30306 updateD+% [b2&3=0x5736] [21813a] [19282q] [21369n] [17002au][|domain]
23/08/2019 23:24:19             TestTX_preparation: Test Case test_tx_preparation_NonTSO Result PASSED:
23/08/2019 23:24:19             dut.10.240.176.197: stop
23/08/2019 23:24:19             dut.10.240.176.197: stop
Telling cores to stop...
Waiting for lcores to finish...

  ---------------------- Forward statistics for port 0  ----------------------
  RX-packets: 9              RX-dropped: 0             RX-total: 9
  Bad-ipcsum: 0              Bad-l4csum: 0             Bad-outer-l4csum: 0             
  TX-packets: 9              TX-dropped: 0             TX-total: 9
  ----------------------------------------------------------------------------

  +++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
  RX-packets: 9              RX-dropped: 0             RX-total: 9
  TX-packets: 9              TX-dropped: 0             TX-total: 9
  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Done.
23/08/2019 23:24:19             dut.10.240.176.197: quit
23/08/2019 23:24:19             dut.10.240.176.197: quit

Stopping port 0...
Stopping ports...
Done

Stopping port 1...
Stopping ports...
Done

Shutting down port 0...
Closing ports...
Done

Shutting down port 1...
Closing ports...
Done

Bye...
23/08/2019 23:24:19             TestTX_preparation: Test Case test_tx_preparation_TSO Begin
23/08/2019 23:24:19             dut.10.240.176.197: 
23/08/2019 23:24:19                         tester:  
23/08/2019 23:24:19             dut.10.240.176.197: ./x86_64-native-linuxapp-gcc/app/testpmd -c 0x6 -n 4  -- -i  --portmask=1 --port-topology=chained --max-pkt-len=9000 --tx-offloads=0x8000
23/08/2019 23:24:20             dut.10.240.176.197: EAL: Detected 72 lcore(s)
EAL: Detected 2 NUMA nodes
EAL: Multi-process socket /var/run/dpdk/rte/mp_socket
EAL: Selected IOVA mode 'PA'
EAL: 1024 hugepages of size 2097152 reserved, but no mounted hugetlbfs found for that size
EAL: Probing VFIO support...
EAL: PCI device 0000:00:04.0 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.1 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.2 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.3 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.4 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.5 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.6 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:00:04.7 on NUMA socket 0
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:18:00.0 on NUMA socket 0
EAL:   probe driver: 8086:1583 net_i40e
EAL: PCI device 0000:18:00.1 on NUMA socket 0
EAL:   probe driver: 8086:1583 net_i40e
EAL: PCI device 0000:1a:00.0 on NUMA socket 0
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.1 on NUMA socket 0
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.2 on NUMA socket 0
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:1a:00.3 on NUMA socket 0
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:3d:00.0 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:3d:00.1 on NUMA socket 0
EAL:   probe driver: 8086:37d2 net_i40e
EAL: PCI device 0000:80:04.0 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.1 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.2 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.3 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.4 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.5 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.6 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:80:04.7 on NUMA socket 1
EAL:   probe driver: 8086:2021 rawdev_ioat
EAL: PCI device 0000:af:00.0 on NUMA socket 1
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.1 on NUMA socket 1
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.2 on NUMA socket 1
EAL:   probe driver: 8086:1521 net_e1000_igb
EAL: PCI device 0000:af:00.3 on NUMA socket 1
EAL:   probe driver: 8086:1521 net_e1000_igb
Interactive-mode selected
previous number of forwarding ports 2 - changed to number of configured ports 1
testpmd: create a new mbuf pool <mbuf_pool_socket_0>: n=155456, size=2176, socket=0
testpmd: preferred mempool ops selected: ring_mp_mc
Configuring Port 0 (socket 0)
Port 0: B4:96:91:49:96:EC
Configuring Port 1 (socket 0)
Port 1: B4:96:91:49:96:ED
Checking link statuses...
Done
23/08/2019 23:24:30             dut.10.240.176.197: show port info 0
23/08/2019 23:24:31             dut.10.240.176.197: show port info 0

********************* Infos for port 0  *********************
MAC address: B4:96:91:49:96:EC
Device name: 0000:1a:00.0
Driver name: net_e1000_igb
Connect to socket: 0
memory allocation on the socket: 0
Link status: up
Link speed: 1000 Mbps
Link duplex: full-duplex
MTU: 1500
Promiscuous mode: enabled
Allmulticast mode: disabled
Maximum number of MAC addresses: 32
Maximum number of MAC addresses of hash filtering: 0
VLAN offload: 
  strip off 
  filter off 
  qinq(extend) off 
Hash key size in bytes: 40
Redirection table size: 128
Supported RSS offload flow types:
  ipv4
  ipv4-tcp
  ipv4-udp
  ipv6
  ipv6-tcp
  ipv6-udp
  user defined 15
  user defined 16
  user defined 17
Minimum size of RX buffer: 256
Maximum configurable length of RX packet: 16383
Maximum number of VMDq pools: 8
Current number of RX queues: 1
Max possible RX queues: 8
Max possible number of RXDs per queue: 4096
Min possible number of RXDs per queue: 32
RXDs number alignment: 8
Current number of TX queues: 1
Max possible TX queues: 8
Max possible number of TXDs per queue: 4096
Min possible number of TXDs per queue: 32
TXDs number alignment: 8
Max segment number per packet: 255
Max segment number per MTU/TSO: 255
23/08/2019 23:24:31             dut.10.240.176.197: set fwd csum
23/08/2019 23:24:31             dut.10.240.176.197: set fwd csum
Set csum packet forwarding mode
23/08/2019 23:24:31             dut.10.240.176.197: set verbose 1
23/08/2019 23:24:31             dut.10.240.176.197: set verbose 1
Change verbose level from 0 to 1
23/08/2019 23:24:31             dut.10.240.176.197: port stop all
23/08/2019 23:24:31             dut.10.240.176.197: port stop all
Stopping ports...
Checking link statuses...
Done
23/08/2019 23:24:31             dut.10.240.176.197: csum set ip hw 0
23/08/2019 23:24:31             dut.10.240.176.197: csum set ip hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is sw
TCP checksum offload is sw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:24:31             dut.10.240.176.197: csum set tcp hw 0
23/08/2019 23:24:31             dut.10.240.176.197: csum set tcp hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is sw
TCP checksum offload is hw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:24:31             dut.10.240.176.197: csum set udp hw 0
23/08/2019 23:24:31             dut.10.240.176.197: csum set udp hw 0
Parse tunnel is off
IP checksum offload is hw
UDP checksum offload is hw
TCP checksum offload is hw
SCTP checksum offload is sw
Outer-Ip checksum offload is sw
Outer-Udp checksum offload is sw
23/08/2019 23:24:31             dut.10.240.176.197: tso set 1460 0
23/08/2019 23:24:31             dut.10.240.176.197: tso set 1460 0
TSO segment size for non-tunneled packets is 1460
23/08/2019 23:24:31             dut.10.240.176.197: port start all
23/08/2019 23:24:32             dut.10.240.176.197: port start all
Configuring Port 0 (socket 0)
Port 0: B4:96:91:49:96:EC
Port 1: B4:96:91:49:96:ED
Checking link statuses...
Done
23/08/2019 23:24:32             dut.10.240.176.197: start
23/08/2019 23:24:32             dut.10.240.176.197: start
csum packet forwarding - ports=1 - cores=1 - streams=1 - NUMA support enabled, MP allocation mode: native
Logical Core 2 (socket 0) forwards packets on 1 streams:
  RX P=0/Q=0 (socket 0) -> TX P=0/Q=0 (socket 0) peer=02:00:00:00:00:00

  csum packet forwarding packets/burst=32
  nb forwarding cores=1 - nb forwarding ports=1
  port 0: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x800 Tx offloads=0x802e
    RX queue: 0
      RX desc=512 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=4
      RX Offloads=0x800
    TX queue: 0
      TX desc=512 - TX free threshold=0
      TX threshold registers: pthresh=8 hthresh=1  wthresh=16
      TX offloads=0x802e - TX RS bit threshold=0
  port 1: RX queue number: 1 Tx queue number: 1
    Rx offloads=0x800 Tx offloads=0x8000
    RX queue: 0
      RX desc=512 - RX free threshold=32
      RX threshold registers: pthresh=8 hthresh=8  wthresh=4
      RX Offloads=0x800
    TX queue: 0
      TX desc=512 - TX free threshold=0
      TX threshold registers: pthresh=8 hthresh=1  wthresh=16
      TX offloads=0x8000 - TX RS bit threshold=0
23/08/2019 23:24:32                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:32                         tester: 
23/08/2019 23:24:32                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:24:32                         tester: [1] 7817
23/08/2019 23:24:35                         tester: scapy
23/08/2019 23:24:36                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:24:38                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10)                    /Raw(RandString(6009))], iface="eno50336512")
23/08/2019 23:24:38                         tester: .
Sent 1 packets.
23/08/2019 23:24:40                         tester: exit()
23/08/2019 23:24:40                         tester: 
23/08/2019 23:24:40                         tester: killall tcpdump
23/08/2019 23:24:40                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:40                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:40                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:24:38.478538 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 1534: (hlim 64, next-header TCP (6) payload length: 1480) ::1.20 > ::1.80: Flags [.], cksum 0x6492 (correct), seq 0:1460, ack 0, win 8192, length 1460: HTTP
23:24:38.478544 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 1534: (hlim 64, next-header TCP (6) payload length: 1480) ::1.20 > ::1.80: Flags [.], cksum 0xf76a (correct), seq 1460:2920, ack 1, win 8192, length 1460: HTTP
23:24:38.478785 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 1534: (hlim 64, next-header TCP (6) payload length: 1480) ::1.20 > ::1.80: Flags [.], cksum 0xd987 (correct), seq 2920:4380, ack 1, win 8192, length 1460: HTTP
23:24:38.478788 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 1534: (hlim 64, next-header TCP (6) payload length: 1480) ::1.20 > ::1.80: Flags [.], cksum 0x97b2 (correct), seq 4380:5840, ack 1, win 8192, length 1460: HTTP
23:24:38.478810 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 243: (hlim 64, next-header TCP (6) payload length: 189) ::1.20 > ::1.80: Flags [.], cksum 0x0e23 (correct), seq 5840:6009, ack 1, win 8192, length 169: HTTP
23/08/2019 23:24:40                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:41                         tester: 
23/08/2019 23:24:41                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:24:41                         tester: [1] 7824
23/08/2019 23:24:44                         tester: scapy
23/08/2019 23:24:44                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:24:46                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10,                    chksum=0x1234)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:24:46                         tester: .
Sent 1 packets.
23/08/2019 23:24:48                         tester: exit()
23/08/2019 23:24:49                         tester: 
23/08/2019 23:24:49                         tester: killall tcpdump
23/08/2019 23:24:49                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:49                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:49                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:24:46.932610 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x476b (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:24:49                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:49                         tester: 
23/08/2019 23:24:49                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:24:49                         tester: [1] 7831
23/08/2019 23:24:52                         tester: scapy
23/08/2019 23:24:53                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:24:55                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10)                    /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:24:55                         tester: .
Sent 1 packets.
23/08/2019 23:24:57                         tester: exit()
23/08/2019 23:24:57                         tester: 
23/08/2019 23:24:57                         tester: killall tcpdump
23/08/2019 23:24:57                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:24:57                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:24:57                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:24:55.497314 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 124: (hlim 64, next-header TCP (6) payload length: 70) ::1.20 > ::1.80: Flags [.], cksum 0x3b93 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:24:57                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:24:58                         tester: 
23/08/2019 23:24:58                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:24:58                         tester: [1] 7838
23/08/2019 23:25:01                         tester: scapy
23/08/2019 23:25:01                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:03                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP(chksum=0x1234)                    /TCP(flags=0x10,chksum=0x1234)/Raw(RandString(6009))], iface="eno50336512")
23/08/2019 23:25:03                         tester: .
Sent 1 packets.
23/08/2019 23:25:05                         tester: exit()
23/08/2019 23:25:06                         tester: 
23/08/2019 23:25:06                         tester: killall tcpdump
23/08/2019 23:25:06                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:06                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:06                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:03.976632 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 1500)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x6292 (correct), seq 0:1460, ack 0, win 8192, length 1460: HTTP
23:25:03.976636 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 2, offset 0, flags [none], proto TCP (6), length 1500)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x9db8 (correct), seq 1460:2920, ack 1, win 8192, length 1460: HTTP
23:25:03.976675 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 3, offset 0, flags [none], proto TCP (6), length 1500)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xe7f2 (correct), seq 2920:4380, ack 1, win 8192, length 1460: HTTP
23:25:03.976677 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 4, offset 0, flags [none], proto TCP (6), length 1500)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xb4ca (correct), seq 4380:5840, ack 1, win 8192, length 1460: HTTP
23:25:03.976680 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 223: (tos 0x0, ttl 64, id 5, offset 0, flags [none], proto TCP (6), length 209)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xa1ae (correct), seq 5840:6009, ack 1, win 8192, length 169: HTTP
23/08/2019 23:25:06                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:25:06                         tester: 
23/08/2019 23:25:06                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:25:06                         tester: [1] 7845
23/08/2019 23:25:09                         tester: scapy
23/08/2019 23:25:10                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:12                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP(chksum=0x1234)                    /TCP(flags=0x10)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:25:12                         tester: .
Sent 1 packets.
23/08/2019 23:25:14                         tester: exit()
23/08/2019 23:25:14                         tester: 
23/08/2019 23:25:14                         tester: killall tcpdump
23/08/2019 23:25:14                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:14                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:14                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:12.446804 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x3123 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:25:14                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:25:15                         tester: 
23/08/2019 23:25:15                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:25:15                         tester: [1] 7852
23/08/2019 23:25:18                         tester: scapy
23/08/2019 23:25:18                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:20                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/TCP(flags=0x10,                    chksum=0x1234)/Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:25:20                         tester: .
Sent 1 packets.
23/08/2019 23:25:22                         tester: exit()
23/08/2019 23:25:23                         tester: 
23/08/2019 23:25:23                         tester: killall tcpdump
23/08/2019 23:25:23                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:23                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:23                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:20.900925 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 124: (hlim 64, next-header TCP (6) payload length: 70) ::1.20 > ::1.80: Flags [.], cksum 0xd826 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:25:23                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:25:23                         tester: 
23/08/2019 23:25:23                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:25:23                         tester: [1] 7859
23/08/2019 23:25:26                         tester: scapy
23/08/2019 23:25:27                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:29                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10)                    /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:25:29                         tester: .
Sent 1 packets.
23/08/2019 23:25:31                         tester: exit()
23/08/2019 23:25:31                         tester: 
23/08/2019 23:25:31                         tester: killall tcpdump
23/08/2019 23:25:31                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:31                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:31                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:29.357480 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 104: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 90)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x69d6 (correct), seq 0:50, ack 0, win 8192, length 50: HTTP
23/08/2019 23:25:31                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:25:31                         tester: 
23/08/2019 23:25:31                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:25:32                         tester: [1] 7866
23/08/2019 23:25:35                         tester: scapy
23/08/2019 23:25:35                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:37                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IP()/TCP(flags=0x10)                    /Raw(RandString(6009))], iface="eno50336512")
23/08/2019 23:25:37                         tester: .
Sent 1 packets.
23/08/2019 23:25:39                         tester: exit()
23/08/2019 23:25:40                         tester: 
23/08/2019 23:25:40                         tester: killall tcpdump
23/08/2019 23:25:40                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:40                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:40                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:37.856366 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 1, offset 0, flags [none], proto TCP (6), length 1500)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x4452 (correct), seq 0:1460, ack 0, win 8192, length 1460: HTTP
23:25:37.856371 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 2, offset 0, flags [none], proto TCP (6), length 1500)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0xd1e9 (correct), seq 1460:2920, ack 1, win 8192, length 1460: HTTP
23:25:37.856411 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 3, offset 0, flags [none], proto TCP (6), length 1500)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x27d5 (correct), seq 2920:4380, ack 1, win 8192, length 1460: HTTP
23:25:37.856425 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 1514: (tos 0x0, ttl 64, id 4, offset 0, flags [none], proto TCP (6), length 1500)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x1d41 (correct), seq 4380:5840, ack 1, win 8192, length 1460: HTTP
23:25:37.856428 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv4 (0x0800), length 223: (tos 0x0, ttl 64, id 5, offset 0, flags [none], proto TCP (6), length 209)
    127.0.0.1.20 > 127.0.0.1.80: Flags [.], cksum 0x11ba (correct), seq 5840:6009, ack 1, win 8192, length 169: HTTP
23/08/2019 23:25:40                         tester: rm -rf ./getPackageByTcpdump.cap
23/08/2019 23:25:40                         tester: 
23/08/2019 23:25:40                         tester: tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w            ./getPackageByTcpdump.cap 2> /dev/null& 
23/08/2019 23:25:40                         tester: [1] 7873
23/08/2019 23:25:43                         tester: scapy
23/08/2019 23:25:44                         tester: INFO: Can't import PyX. Won't be able to use psdump() or pdfdump().
WARNING: No route found for IPv6 destination :: (no default route?)
Welcome to Scapy (2.2.0)
23/08/2019 23:25:46                         tester: sendp([Ether(dst="B4:96:91:49:96:EC")/IPv6()/UDP()                    /Raw(RandString(50))], iface="eno50336512")
23/08/2019 23:25:46                         tester: .
Sent 1 packets.
23/08/2019 23:25:48                         tester: exit()
23/08/2019 23:25:48                         tester: 
23/08/2019 23:25:48                         tester: killall tcpdump
23/08/2019 23:25:48                         tester: [1]+  Done                    tcpdump ether[12:2]!=0x88cc and ether src B4:96:91:49:96:EC -i eno50336512 -n -e -vv -w ./getPackageByTcpdump.cap 2> /dev/null
23/08/2019 23:25:48                         tester: tcpdump -c 1024 -nn -e -v -r ./getPackageByTcpdump.cap
23/08/2019 23:25:48                         tester: reading from file ./getPackageByTcpdump.cap, link-type EN10MB (Ethernet)
23:25:46.310497 b4:96:91:49:96:ec > 02:00:00:00:00:00, ethertype IPv6 (0x86dd), length 112: (hlim 64, next-header UDP (17) payload length: 58) ::1.53 > ::1.53: [udp sum ok] 31303 updateM+% [b2&3=0x6756] [31059a] [28514q] [31041n] [20809au][|domain]
23/08/2019 23:25:48             TestTX_preparation: Test Case test_tx_preparation_TSO Result PASSED:
23/08/2019 23:25:48             dut.10.240.176.197: stop
23/08/2019 23:25:48             dut.10.240.176.197: stop
Telling cores to stop...
Waiting for lcores to finish...

  ---------------------- Forward statistics for port 0  ----------------------
  RX-packets: 9              RX-dropped: 0             RX-total: 9
  Bad-ipcsum: 0              Bad-l4csum: 0             Bad-outer-l4csum: 0             
  TX-packets: 21             TX-dropped: 0             TX-total: 21
  ----------------------------------------------------------------------------

  +++++++++++++++ Accumulated forward statistics for all ports+++++++++++++++
  RX-packets: 9              RX-dropped: 0             RX-total: 9
  TX-packets: 21             TX-dropped: 0             TX-total: 21
  ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Done.
23/08/2019 23:25:48             dut.10.240.176.197: quit
23/08/2019 23:25:49             dut.10.240.176.197: quit

Stopping port 0...
Stopping ports...
Done

Stopping port 1...
Stopping ports...
Done

Shutting down port 0...
Closing ports...
Done

Shutting down port 1...
Closing ports...
Done

Bye...
23/08/2019 23:25:49                         tester: ifconfig eno50336512 mtu 1500
23/08/2019 23:25:49                         tester: 
23/08/2019 23:25:50                            dts: 
TEST SUITE ENDED: TestTX_preparation

  reply	other threads:[~2019-08-23  8:24 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-08-23 17:03 Wenjie Li
2019-08-23  8:24 ` Yao, BingX Y [this message]
2019-09-04  5:00 ` Tu, Lijuan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=95BCD24840F32441BEA74E0F8A31839E058FC5C8@SHSMSX106.ccr.corp.intel.com \
    --to=bingx.y.yao@intel.com \
    --cc=dts@dpdk.org \
    --cc=wenjiex.a.li@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).