From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id E45A7A034F; Mon, 22 Mar 2021 08:16:37 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id DA30240040; Mon, 22 Mar 2021 08:16:37 +0100 (CET) Received: from mga05.intel.com (mga05.intel.com [192.55.52.43]) by mails.dpdk.org (Postfix) with ESMTP id 52FF54003D for ; Mon, 22 Mar 2021 08:16:36 +0100 (CET) IronPort-SDR: SQNenL7j/XAsfNnlUrzftI5TarihaQCUrDSoQYAnYR33Jx6MukpD+oNRFwSJTnmMoeQs6PPB1i yGHhwfIFn/gw== X-IronPort-AV: E=McAfee;i="6000,8403,9930"; a="275309999" X-IronPort-AV: E=Sophos;i="5.81,268,1610438400"; d="scan'208";a="275309999" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga105.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Mar 2021 00:16:35 -0700 IronPort-SDR: lZAjYlB2psbAkkao4YTC+OAnqMSom7W4TwuC8pB9nCT31Ho3+ZAr+73RCBa7ExIjLVqlPrlvqB m4/FhipizShw== X-IronPort-AV: E=Sophos;i="5.81,268,1610438400"; d="scan'208";a="414368513" Received: from unknown (HELO localhost.localdomain.localdomain) ([10.240.183.111]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 22 Mar 2021 00:16:34 -0700 From: Zhou Jun To: dts@dpdk.org Cc: Zhou Jun Date: Mon, 22 Mar 2021 15:13:21 +0800 Message-Id: <1616397201-28715-1-git-send-email-junx.w.zhou@intel.com> X-Mailer: git-send-email 1.8.3.1 Subject: [dts] [PATCH V1] tests/malicious_driver_event_indication:code for optimizing the start mode of VF X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" the original way:copy testpmd to another file and start VF now:start VF with another profix file on the testpmd start PF Signed-off-by: Zhou Jun --- .../TestSuite_malicious_driver_event_indication.py | 41 ++++++++-------------- 1 file changed, 14 insertions(+), 27 deletions(-) diff --git a/tests/TestSuite_malicious_driver_event_indication.py b/tests/TestSuite_malicious_driver_event_indication.py index 44859ab..e98bc97 100644 --- a/tests/TestSuite_malicious_driver_event_indication.py +++ b/tests/TestSuite_malicious_driver_event_indication.py @@ -38,6 +38,7 @@ import re import time import traceback from contextlib import contextmanager +from pmd_output import PmdOutput from exception import VerifyFailure @@ -159,28 +160,12 @@ class TestSuiteMaliciousDrvEventIndication(TestCase): def init_vf_testpmd(self): self.vf_pmd_session_name = 'vf_testpmd' self.vf_pmd_session = self.dut.create_session(self.vf_pmd_session_name) - self.vf_testpmd = "{}/{}/app/testpmd_vf".format( - self.target_dir, self.dut.target) - cmd = 'rm -f {vf_pmd};cp -f {pf_pmd} {vf_pmd}'.format( - **{'pf_pmd': self.pf_testpmd, 'vf_pmd': self.vf_testpmd}) - self.d_a_con(cmd) + self.vf_pmdout = PmdOutput(self.dut, self.vf_pmd_session) def start_vf_testpmd(self): - core_mask = utils.create_mask(self.vf_pmd_cores) - cmd = ( - "{bin} " - "-v " - "-c {core_mask} " - "-n {mem_channel} " - "--file-prefix={prefix} " - "{whitelist} " - "-- -i ").format(**{ - 'bin': self.vf_testpmd, - 'core_mask': core_mask, - 'mem_channel': self.dut.get_memory_channels(), - 'whitelist': self.vf_pmd_whitelist, - 'prefix': 'vf_pmd', }) - self.vf_pmd_con([cmd, "testpmd> ", 120]) + self.vf_pmdout.start_testpmd(self.vf_pmd_cores, + eal_param="-v {}".format(self.vf_pmd_whitelist), + prefix='vf_pmd') self.is_vf_pmd_on = True cmds = [ 'set fwd txonly', @@ -278,11 +263,6 @@ class TestSuiteMaliciousDrvEventIndication(TestCase): def preset_test_environment(self): self.preset_dpdk_compilation() - self.init_pf_testpmd() - self.init_vf_testpmd() - self.vf_create() - # get socket and cores - self.preset_pmd_res() def destroy_resource(self): with self.restore_dpdk_compilation(): @@ -297,7 +277,6 @@ class TestSuiteMaliciousDrvEventIndication(TestCase): """ Run at the start of each test suite. """ - self.init_params() self.dut_ports = self.dut.get_ports(self.nic) self.verify(len(self.dut_ports) >= 1, "Not enough ports") self.verify_supported_nic() @@ -314,13 +293,21 @@ class TestSuiteMaliciousDrvEventIndication(TestCase): """ Run before each test case. """ - pass + self.init_params() + self.init_pf_testpmd() + self.init_vf_testpmd() + self.vf_create() + self.preset_pmd_res() def tear_down(self): """ Run after each test case. """ self.dut.kill_all() + self.vf_destroy() + if self.vf_pmd_session: + self.dut.close_session(self.vf_pmd_session) + self.vf_pmd_session = None def test_malicious_driver_event_detected(self): """ -- 1.8.3.1