From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from foss.arm.com (foss.arm.com [217.140.101.70]) by dpdk.org (Postfix) with ESMTP id B80832F4F for ; Tue, 4 Sep 2018 10:29:51 +0200 (CEST) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 35FD91596; Tue, 4 Sep 2018 01:29:51 -0700 (PDT) Received: from phil-VirtualBox.shanghai.arm.com (unknown [10.169.109.153]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id 732533F614; Tue, 4 Sep 2018 01:29:50 -0700 (PDT) From: Phil Yang Date: Tue, 4 Sep 2018 16:26:17 +0800 Message-Id: <1536049595-22271-4-git-send-email-phil.yang@arm.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1536049595-22271-1-git-send-email-phil.yang@arm.com> References: <1523526771-7437-1-git-send-email-phil.yang@arm.com> <1536049595-22271-1-git-send-email-phil.yang@arm.com> Subject: [dts] [PATCH v5 04/22] tests/ipfrag: Replace sniff_packet to tester.tcpdump_sniff_packet X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 04 Sep 2018 08:29:52 -0000 From: Phil Yang Make packet sniff run on the Tester. Signed-off-by: Phil Yang Suggested-by: Marvin Liu --- tests/TestSuite_ipfrag.py | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/tests/TestSuite_ipfrag.py b/tests/TestSuite_ipfrag.py index f23dbe1..38e00d7 100644 --- a/tests/TestSuite_ipfrag.py +++ b/tests/TestSuite_ipfrag.py @@ -39,7 +39,7 @@ import string import re import time from settings import HEADER_SIZE -from packet import Packet, sniff_packets, load_sniff_packets +from packet import Packet lpm_table_ipv4 = [ "{IPv4(100,10,0,0), 16, P1}", @@ -159,7 +159,7 @@ l3fwd_ipv4_route_array[] = {\\\n" expPkts = 1 val = 2 - inst = sniff_packets(intf=self.rxItf, timeout=5) + inst = self.tester.tcpdump_sniff_packets(intf=self.rxItf, timeout=5) # send packet for times in range(burst): pkt_size = pkt_sizes[pkt_sizes.index(size) + times] @@ -169,7 +169,7 @@ l3fwd_ipv4_route_array[] = {\\\n" pkt.send_pkt(tx_port=self.txItf) # verify normal packet just by number, verify fragment packet by all elements - pkts = load_sniff_packets(inst) + pkts = self.tester.load_tcpdump_sniff_packets(inst) self.verify(len(pkts) == expPkts, "Failed on forward packet size " + str(size)) if flag == 'frag': idx = 1 @@ -209,7 +209,7 @@ l3fwd_ipv4_route_array[] = {\\\n" expPkts = 1 val = 2 - inst = sniff_packets(intf=self.rxItf, timeout=5) + inst = self.tester.tcpdump_sniff_packets(intf=self.rxItf, timeout=5) # send packet for times in range(burst): pkt_size = pkt_sizes[pkt_sizes.index(size) + times] @@ -219,7 +219,7 @@ l3fwd_ipv4_route_array[] = {\\\n" pkt.send_pkt(tx_port=self.txItf) # verify normal packet just by number, verify fragment packet by all elements - pkts = load_sniff_packets(inst) + pkts = self.tester.load_tcpdump_sniff_packets(inst) self.verify(len(pkts) == expPkts, "Failed on forward packet size " + str(size)) if flag == 'frag': idx = 1 -- 2.7.4