From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from foss.arm.com (usa-sjc-mx-foss1.foss.arm.com [217.140.101.70]) by dpdk.org (Postfix) with ESMTP id 4916A4CC7 for ; Tue, 16 Oct 2018 11:48:39 +0200 (CEST) Received: by usa-sjc-mx-foss1.foss.arm.com (Postfix, from userid 105) id 0B4D432AC; Tue, 16 Oct 2018 02:53:34 -0700 (PDT) Received: from usa-sjc-imap-foss1.foss.arm.com (unknown [10.72.51.249]) by usa-sjc-mx-foss1.foss.arm.com (Postfix) with ESMTP id 675653700; Mon, 15 Oct 2018 23:20:35 -0700 (PDT) Received: from phil-VirtualBox.shanghai.arm.com (unknown [10.169.107.186]) by usa-sjc-imap-foss1.foss.arm.com (Postfix) with ESMTPA id A87D53F908; Mon, 15 Oct 2018 23:20:17 -0700 (PDT) From: Phil Yang To: dts@dpdk.org Cc: nd@arm.com, lijuan.tu@intel.com Date: Tue, 16 Oct 2018 14:19:44 +0800 Message-Id: <1539670802-15603-4-git-send-email-phil.yang@arm.com> X-Mailer: git-send-email 2.7.4 In-Reply-To: <1539670802-15603-1-git-send-email-phil.yang@arm.com> References: <1536049595-22271-1-git-send-email-phil.yang@arm.com> <1539670802-15603-1-git-send-email-phil.yang@arm.com> Subject: [dts] [PATCH v6 04/22] tests/ipfrag: Replace sniff_packet to tester.tcpdump_sniff_packet X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 16 Oct 2018 09:48:39 -0000 Make packet sniff run on the Tester. Signed-off-by: Phil Yang Suggested-by: Marvin Liu Suggested-by: Tu Lijuan --- tests/TestSuite_ipfrag.py | 10 +++++----- 1 file changed, 5 insertions(+), 5 deletions(-) diff --git a/tests/TestSuite_ipfrag.py b/tests/TestSuite_ipfrag.py index f23dbe1..38e00d7 100644 --- a/tests/TestSuite_ipfrag.py +++ b/tests/TestSuite_ipfrag.py @@ -39,7 +39,7 @@ import string import re import time from settings import HEADER_SIZE -from packet import Packet, sniff_packets, load_sniff_packets +from packet import Packet lpm_table_ipv4 = [ "{IPv4(100,10,0,0), 16, P1}", @@ -159,7 +159,7 @@ l3fwd_ipv4_route_array[] = {\\\n" expPkts = 1 val = 2 - inst = sniff_packets(intf=self.rxItf, timeout=5) + inst = self.tester.tcpdump_sniff_packets(intf=self.rxItf, timeout=5) # send packet for times in range(burst): pkt_size = pkt_sizes[pkt_sizes.index(size) + times] @@ -169,7 +169,7 @@ l3fwd_ipv4_route_array[] = {\\\n" pkt.send_pkt(tx_port=self.txItf) # verify normal packet just by number, verify fragment packet by all elements - pkts = load_sniff_packets(inst) + pkts = self.tester.load_tcpdump_sniff_packets(inst) self.verify(len(pkts) == expPkts, "Failed on forward packet size " + str(size)) if flag == 'frag': idx = 1 @@ -209,7 +209,7 @@ l3fwd_ipv4_route_array[] = {\\\n" expPkts = 1 val = 2 - inst = sniff_packets(intf=self.rxItf, timeout=5) + inst = self.tester.tcpdump_sniff_packets(intf=self.rxItf, timeout=5) # send packet for times in range(burst): pkt_size = pkt_sizes[pkt_sizes.index(size) + times] @@ -219,7 +219,7 @@ l3fwd_ipv4_route_array[] = {\\\n" pkt.send_pkt(tx_port=self.txItf) # verify normal packet just by number, verify fragment packet by all elements - pkts = load_sniff_packets(inst) + pkts = self.tester.load_tcpdump_sniff_packets(inst) self.verify(len(pkts) == expPkts, "Failed on forward packet size " + str(size)) if flag == 'frag': idx = 1 -- 2.7.4