From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from foss.arm.com (foss.arm.com [217.140.101.70]) by dpdk.org (Postfix) with ESMTP id 3D5104C92 for ; Fri, 30 Mar 2018 12:41:33 +0200 (CEST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id A324D1596; Fri, 30 Mar 2018 03:41:32 -0700 (PDT) Received: from phil-VirtualBox.shanghai.arm.com (unknown [10.169.107.220]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 027053F487; Fri, 30 Mar 2018 03:41:31 -0700 (PDT) From: Phil Yang To: dts@dpdk.org Cc: nd@arm.com, yong.liu@intel.com Date: Fri, 30 Mar 2018 18:40:56 +0800 Message-Id: <1522406469-9251-4-git-send-email-phil.yang@arm.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1522406469-9251-1-git-send-email-phil.yang@arm.com> References: <1521792246-4950-1-git-send-email-phil.yang@arm.com> <1522406469-9251-1-git-send-email-phil.yang@arm.com> Subject: [dts] [PATCH v2 04/17] tests/ipfrag: Replace sniff_packet to tester.tcpdump_sniff_packet X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 30 Mar 2018 10:41:33 -0000 Make sniff_packet running on the tester. Create a ssh connection to the tester then call tcpdump. Signed-off-by: Phil Yang --- tests/TestSuite_ipfrag.py | 11 ++++++----- 1 file changed, 6 insertions(+), 5 deletions(-) diff --git a/tests/TestSuite_ipfrag.py b/tests/TestSuite_ipfrag.py index f23dbe1..d5e8e5f 100644 --- a/tests/TestSuite_ipfrag.py +++ b/tests/TestSuite_ipfrag.py @@ -39,7 +39,6 @@ import string import re import time from settings import HEADER_SIZE -from packet import Packet, sniff_packets, load_sniff_packets lpm_table_ipv4 = [ "{IPv4(100,10,0,0), 16, P1}", @@ -159,7 +158,7 @@ l3fwd_ipv4_route_array[] = {\\\n" expPkts = 1 val = 2 - inst = sniff_packets(intf=self.rxItf, timeout=5) + inst = self.tester.tcpdump_sniff_packets(intf=self.rxItf, timeout=5) # send packet for times in range(burst): pkt_size = pkt_sizes[pkt_sizes.index(size) + times] @@ -169,7 +168,8 @@ l3fwd_ipv4_route_array[] = {\\\n" pkt.send_pkt(tx_port=self.txItf) # verify normal packet just by number, verify fragment packet by all elements - pkts = load_sniff_packets(inst) + self.tester.session.copy_file_from("/tmp/sniff_%s.pcap" % self.rxItf, "/tmp/") + pkts = self.tester.load_tcpdump_sniff_packets(inst) self.verify(len(pkts) == expPkts, "Failed on forward packet size " + str(size)) if flag == 'frag': idx = 1 @@ -209,7 +209,7 @@ l3fwd_ipv4_route_array[] = {\\\n" expPkts = 1 val = 2 - inst = sniff_packets(intf=self.rxItf, timeout=5) + inst = self.tester.tcpdump_sniff_packets(intf=self.rxItf, timeout=5) # send packet for times in range(burst): pkt_size = pkt_sizes[pkt_sizes.index(size) + times] @@ -219,7 +219,8 @@ l3fwd_ipv4_route_array[] = {\\\n" pkt.send_pkt(tx_port=self.txItf) # verify normal packet just by number, verify fragment packet by all elements - pkts = load_sniff_packets(inst) + self.tester.session.copy_file_from("/tmp/sniff_%s.pcap" % self.rxItf, "/tmp/") + pkts = self.tester.load_tcpdump_sniff_packets(inst) self.verify(len(pkts) == expPkts, "Failed on forward packet size " + str(size)) if flag == 'frag': idx = 1 -- 2.7.4