From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 640ADA05A1; Wed, 22 Apr 2020 04:11:59 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 36D511C2B7; Wed, 22 Apr 2020 04:11:59 +0200 (CEST) Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by dpdk.org (Postfix) with ESMTP id D6DD11C2B2 for ; Wed, 22 Apr 2020 04:11:57 +0200 (CEST) IronPort-SDR: Wmzl2D6mxrFwKkxh0nlUmjHotDMEzIjMswtoRLf/pObbYwieDbIsPIjn2pP85JdHpt9rvhmzYq 8H61Pcv2+rJA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 21 Apr 2020 19:11:57 -0700 IronPort-SDR: /Hg4tLz8+oOEmjfvOz+eDEb7NdHF8NBn7UOxd2zG3lkUjNUl0ZNsB0I6G2dSYVK2UTmdRdnp8N xDCqG+dVz0ow== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.72,412,1580803200"; d="scan'208";a="255482848" Received: from fmsmsx107.amr.corp.intel.com ([10.18.124.205]) by orsmga003.jf.intel.com with ESMTP; 21 Apr 2020 19:11:56 -0700 Received: from shsmsx605.ccr.corp.intel.com (10.109.6.215) by fmsmsx107.amr.corp.intel.com (10.18.124.205) with Microsoft SMTP Server (TLS) id 14.3.439.0; Tue, 21 Apr 2020 19:11:38 -0700 Received: from shsmsx602.ccr.corp.intel.com (10.109.6.142) by SHSMSX605.ccr.corp.intel.com (10.109.6.215) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1713.5; Wed, 22 Apr 2020 10:11:36 +0800 Received: from shsmsx602.ccr.corp.intel.com ([10.109.6.142]) by SHSMSX602.ccr.corp.intel.com ([10.109.6.142]) with mapi id 15.01.1713.004; Wed, 22 Apr 2020 10:11:36 +0800 From: "Zhao, XinfengX" To: "Xie, WeiX" , "dts@dpdk.org" Thread-Topic: [dts][PATCH V1] tests/etag:etag set insertion off cmd fixed Thread-Index: AQHWF9CUeps2HyM4zUa6U0CaIYSITqiEZvKw Date: Wed, 22 Apr 2020 02:11:36 +0000 Message-ID: <158ee07c395f4eab8fcb17273c707546@intel.com> References: <1587468279-308763-1-git-send-email-weix.xie@intel.com> <6FD6A7610D20924F885A4ECF34E8AC91045E26CA@CDSMSX102.ccr.corp.intel.com> In-Reply-To: <6FD6A7610D20924F885A4ECF34E8AC91045E26CA@CDSMSX102.ccr.corp.intel.com> Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-originating-ip: [10.239.127.36] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [dts] [PATCH V1] tests/etag:etag set insertion off cmd fixed X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" Tested-by: Zhao, Xinfeng -----Original Message----- From: Xie, WeiX=20 Sent: Tuesday, April 21, 2020 7:33 PM To: dts@dpdk.org Cc: Zhao, XinfengX Subject: RE: [dts][PATCH V1] tests/etag:etag set insertion off cmd fixed Tested-by: Xie,WeiX < weix.xie@intel.com> Regards, Xie Wei -----Original Message----- From: Xie, WeiX Sent: Tuesday, April 21, 2020 7:25 PM To: dts@dpdk.org Cc: Xie, WeiX Subject: [dts][PATCH V1] tests/etag:etag set insertion off cmd fixed From: "Xie,WeiX" Signed-off-by: Xie,WeiX --- tests/TestSuite_etag.py | 16 ++++++++-------- 1 file changed, 8 insertions(+), 8 deletions(-) diff --git a/tests/TestSuite_etag.py b/tests/TestSuite_etag.py index e095f8= 2..f165c91 100644 --- a/tests/TestSuite_etag.py +++ b/tests/TestSuite_etag.py @@ -342,19 +342,19 @@ class TestEtag(TestCase): self.check_packet_transmission(pkt_types) time.sleep(1) pkts =3D self.tester.load_tcpdump_sniff_packets(inst) - self.host_testpmd.execute_cmd('E-tag set insertion off port-tag-id= 1000 port 0 vf 0') + self.host_testpmd.execute_cmd('E-tag set insertion off port 0=20 + vf 0') =20 # load sniff pcap file, check received packet's content packetContentFile =3D "/tmp/packetContent.log" - pcap_file =3D "/tmp/sniff_%s.pcap"%intf - fp=3Dopen(packetContentFile,'w') - backup_out=3Dsys.stdout - sys.stdout=3Dfp - pkts=3Drdpcap(pcap_file) + pcap_file =3D "/tmp/tester/sniff_%s.pcap" % intf + fp =3D open(packetContentFile, 'w') + backup_out =3D sys.stdout + sys.stdout =3D fp + pkts =3D rdpcap(pcap_file) pkts.show() fp.close() - sys.stdout=3Dbackup_out - fp=3Dopen(packetContentFile,'r') + sys.stdout =3D backup_out + fp =3D open(packetContentFile, 'r') out =3D fp.read() fp.close() if self.printFlag:# debug output -- 1.8.3.1