From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 25681A0548; Fri, 12 Nov 2021 09:48:44 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id EF81440692; Fri, 12 Nov 2021 09:48:43 +0100 (CET) Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) by mails.dpdk.org (Postfix) with ESMTP id A2E3940687 for ; Fri, 12 Nov 2021 09:48:42 +0100 (CET) X-IronPort-AV: E=McAfee;i="6200,9189,10165"; a="232942581" X-IronPort-AV: E=Sophos;i="5.87,228,1631602800"; d="scan'208";a="232942581" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by orsmga102.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Nov 2021 00:48:41 -0800 X-IronPort-AV: E=Sophos;i="5.87,228,1631602800"; d="scan'208";a="504806806" Received: from unknown (HELO dpdk.lan) ([10.240.183.77]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 12 Nov 2021 00:48:27 -0800 From: Lewei Yang To: dts@dpdk.org Cc: Lewei Yang Subject: [dts][PATCH V1] test/rxtx_offload:add RSS_HASH display Date: Fri, 12 Nov 2021 16:49:59 +0000 Message-Id: <20211112164959.107746-1-leweix.yang@intel.com> X-Mailer: git-send-email 2.33.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org According to dpdk commit 655eae01f993("app/testpmd: fix RSS hash offload display"), RSS_HASH is displayed by default Signed-off-by: Lewei Yang --- tests/TestSuite_rxtx_offload.py | 5 ++++- 1 file changed, 4 insertions(+), 1 deletion(-) diff --git a/tests/TestSuite_rxtx_offload.py b/tests/TestSuite_rxtx_offload.py index 14fd40ac..59d3b821 100644 --- a/tests/TestSuite_rxtx_offload.py +++ b/tests/TestSuite_rxtx_offload.py @@ -165,7 +165,10 @@ class TestRxTx_Offload(TestCase): scanner = re.compile(result_scanner, re.DOTALL) m = scanner.search(outstring) if offload == "NULL": - self.verify(m == None, "The offload failed to be disabled.") + if rxtx == "rx": + self.verify(m.group(1).strip() == 'RSS_HASH', "The offload failed to be disabled.") + elif rxtx == "tx": + self.verify(m == None, "The offload failed to be disabled.") else: exp_offload = m.group(1).split() self.verify(exp_offload != None, "There is no offload configured.") -- 2.33.1