From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by dpdk.org (Postfix) with ESMTP id 3D4311B03C for ; Fri, 23 Mar 2018 09:04:40 +0100 (CET) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 9A8301435; Fri, 23 Mar 2018 01:04:39 -0700 (PDT) Received: from phil-VirtualBox.shanghai.arm.com (unknown [10.169.108.169]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id AAE4C3F25D; Fri, 23 Mar 2018 01:04:38 -0700 (PDT) From: Phil Yang To: dts@dpdk.org Cc: nd@arm.com, phil.yang@arm.com, yong.liu@intel.com, herbert.guan@arm.com Date: Fri, 23 Mar 2018 16:03:53 +0800 Message-Id: <1521792246-4950-4-git-send-email-phil.yang@arm.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1521792246-4950-1-git-send-email-phil.yang@arm.com> References: <1521792246-4950-1-git-send-email-phil.yang@arm.com> Subject: [dts] [PATCH 04/17] tests/ipfrag: Replaced sniff_packet to tester.tcpdump_sniff_packet X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 23 Mar 2018 08:04:40 -0000 Make sniff_packet running on the tester. Create a ssh connection to the tester then call tcpdump. Signed-off-by: Phil Yang --- tests/TestSuite_ipfrag.py | 9 ++++----- 1 file changed, 4 insertions(+), 5 deletions(-) diff --git a/tests/TestSuite_ipfrag.py b/tests/TestSuite_ipfrag.py index f23dbe1..9ebda1f 100644 --- a/tests/TestSuite_ipfrag.py +++ b/tests/TestSuite_ipfrag.py @@ -39,7 +39,6 @@ import string import re import time from settings import HEADER_SIZE -from packet import Packet, sniff_packets, load_sniff_packets lpm_table_ipv4 = [ "{IPv4(100,10,0,0), 16, P1}", @@ -159,7 +158,7 @@ l3fwd_ipv4_route_array[] = {\\\n" expPkts = 1 val = 2 - inst = sniff_packets(intf=self.rxItf, timeout=5) + inst = self.tester.tcpdump_sniff_packets(intf=self.rxItf, timeout=5) # send packet for times in range(burst): pkt_size = pkt_sizes[pkt_sizes.index(size) + times] @@ -169,7 +168,7 @@ l3fwd_ipv4_route_array[] = {\\\n" pkt.send_pkt(tx_port=self.txItf) # verify normal packet just by number, verify fragment packet by all elements - pkts = load_sniff_packets(inst) + pkts = self.tester.load_tcpdump_sniff_packets(inst) self.verify(len(pkts) == expPkts, "Failed on forward packet size " + str(size)) if flag == 'frag': idx = 1 @@ -209,7 +208,7 @@ l3fwd_ipv4_route_array[] = {\\\n" expPkts = 1 val = 2 - inst = sniff_packets(intf=self.rxItf, timeout=5) + inst = self.tester.tcpdump_sniff_packets(intf=self.rxItf, timeout=5) # send packet for times in range(burst): pkt_size = pkt_sizes[pkt_sizes.index(size) + times] @@ -219,7 +218,7 @@ l3fwd_ipv4_route_array[] = {\\\n" pkt.send_pkt(tx_port=self.txItf) # verify normal packet just by number, verify fragment packet by all elements - pkts = load_sniff_packets(inst) + pkts = self.tester.load_tcpdump_sniff_packets(inst) self.verify(len(pkts) == expPkts, "Failed on forward packet size " + str(size)) if flag == 'frag': idx = 1 -- 2.7.4