From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id E977E42847; Mon, 27 Mar 2023 05:10:07 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id BC87C40ED8; Mon, 27 Mar 2023 05:10:07 +0200 (CEST) Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by mails.dpdk.org (Postfix) with ESMTP id CA15340ED5 for ; Mon, 27 Mar 2023 05:10:06 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1679886606; x=1711422606; h=from:to:cc:subject:date:message-id:mime-version: content-transfer-encoding; bh=5pQiZG7B5n6PTLH+3I6rsK4fbNAiml+4lq+7Jnqa1xU=; b=d52lGlKbvvclr0kbbWDrFtWdjnItK1pU6rUaxM6eEyKOwQtICHtfZG8y LhmvXkFPnGnMIqafmq9WVX7D/NwgmDoUiaMImgVltWj3izECg3pt7X71k GX057lS7Okoa/7AlH0CcW3zpIoOVHiSA1gvTUzEnMgxl6djVUpsz9MQ0x I9B8P3svY5JXc6zuivxj3LKt/PF3DouwiQM6CF4IRrfQP8z9rBCbNKyj/ CDWfLX5K4UUgg+ZnaDb2+X5jUWX3k0egtuaEgOYak55zfFRkSmFvv8n96 wN+qTjCDDqp321P2Y0kcB/BQS/Ds/MHaWLBb/wH+tPA7TOuMNJhg9/FIs w==; X-IronPort-AV: E=McAfee;i="6600,9927,10661"; a="340194843" X-IronPort-AV: E=Sophos;i="5.98,293,1673942400"; d="scan'208";a="340194843" Received: from fmsmga004.fm.intel.com ([10.253.24.48]) by fmsmga103.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Mar 2023 20:10:02 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10661"; a="752533714" X-IronPort-AV: E=Sophos;i="5.98,293,1673942400"; d="scan'208";a="752533714" Received: from unknown (HELO localhost.localdomain) ([10.239.252.20]) by fmsmga004-auth.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 26 Mar 2023 20:10:01 -0700 From: Song Jiale To: dts@dpdk.org Cc: Song Jiale Subject: [dts] [PATCH V1] tests/vxlan: optimize script Date: Mon, 27 Mar 2023 11:06:32 +0000 Message-Id: <20230327110632.735583-1-songx.jiale@intel.com> X-Mailer: git-send-email 2.25.1 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org only port 0 link state has been checked. it may occur that other port link state is down, causing sending and receiving packets to fail. Signed-off-by: Song Jiale --- tests/TestSuite_vxlan.py | 20 ++++++++++---------- 1 file changed, 10 insertions(+), 10 deletions(-) diff --git a/tests/TestSuite_vxlan.py b/tests/TestSuite_vxlan.py index 1bf12743..98d6e666 100644 --- a/tests/TestSuite_vxlan.py +++ b/tests/TestSuite_vxlan.py @@ -553,7 +553,7 @@ class TestVxlan(TestCase): config.outer_mac_dst = self.dut_port_mac config.create_pcap() self.dut.send_expect("start", "testpmd>", 10) - self.pmdout.wait_link_status_up(self.dut_port) + self.pmdout.wait_link_status_up("all") config.send_pcap(self.tester_iface) # check whether detect vxlan type out = self.dut.get_session_output(timeout=2) @@ -615,7 +615,7 @@ class TestVxlan(TestCase): config.outer_mac_dst = self.dut_port_mac config.create_pcap() - self.pmdout.wait_link_status_up(self.dut_port) + self.pmdout.wait_link_status_up("all") # save the capture packet into pcap format inst = self.tester.tcpdump_sniff_packets(self.recv_iface) config.send_pcap(self.tester_iface) @@ -660,7 +660,7 @@ class TestVxlan(TestCase): # send vxlan packet config.create_pcap() self.dut.send_expect("start", "testpmd>", 10) - self.pmdout.wait_link_status_up(self.dut_port) + self.pmdout.wait_link_status_up("all") config.send_pcap(self.tester_iface) out = self.dut.get_session_output(timeout=2) print(out) @@ -705,7 +705,7 @@ class TestVxlan(TestCase): self.dut.send_expect("set verbose 1", "testpmd>", 10) self.enable_vxlan(self.dut_port) self.enable_vxlan(self.recv_port) - self.pmdout.wait_link_status_up(self.dut_port) + self.pmdout.wait_link_status_up("all") # check normal packet self.send_and_detect(outer_udp_dst=1234) # check vxlan + UDP inner packet @@ -749,7 +749,7 @@ class TestVxlan(TestCase): self.dut.send_expect("set verbose 1", "testpmd>", 10) self.enable_vxlan(self.dut_port) self.enable_vxlan(self.recv_port) - self.pmdout.wait_link_status_up(self.dut_port) + self.pmdout.wait_link_status_up("all") # check normal ipv6 packet self.send_and_detect( outer_ip6_src="FE80:0:0:0:0:0:0:0", @@ -811,7 +811,7 @@ class TestVxlan(TestCase): self.enable_vxlan(self.dut_port) self.enable_vxlan(self.recv_port) - self.pmdout.wait_link_status_up(self.dut_port) + self.pmdout.wait_link_status_up("all") # check normal packet + ip checksum invalid self.send_and_check(outer_ip_invalid=1, outer_udp_dst=1234) # check vxlan packet + inner ip checksum invalid @@ -975,7 +975,7 @@ class TestVxlan(TestCase): self.dut.send_expect("set verbose 1", "testpmd>", 10) self.enable_vxlan(self.dut_port) self.enable_vxlan(self.recv_port) - self.pmdout.wait_link_status_up(self.dut_port) + self.pmdout.wait_link_status_up("all") config = VxlanTestConfig(self) config_vlan = VxlanTestConfig(self, inner_vlan=1) config.outer_mac_dst = self.dut_port_mac @@ -1055,7 +1055,7 @@ class TestVxlan(TestCase): self.enable_vxlan(self.dut_port) self.enable_vxlan(self.recv_port) - self.pmdout.wait_link_status_up(self.dut_port) + self.pmdout.wait_link_status_up("all") rule = ( "flow create {} ingress pattern eth / ipv4 / udp / vxlan vni is {} / eth dst is {} / end actions pf " "/ queue index {} / end".format( @@ -1234,7 +1234,7 @@ class TestVxlan(TestCase): self.dut.send_expect("set fwd io", "testpmd>", 10) self.dut.send_expect("start", "testpmd>", 10) - self.pmdout.wait_link_status_up(self.dut_port) + self.pmdout.wait_link_status_up("all") if BIDIRECT: wirespeed = self.wirespeed(self.nic, PACKET_LEN, 2) else: @@ -1328,7 +1328,7 @@ class TestVxlan(TestCase): self.dut.send_expect("set fwd csum", "testpmd>", 10) self.enable_vxlan(self.dut_port) self.enable_vxlan(self.recv_port) - self.pmdout.wait_link_status_up(self.dut_port) + self.pmdout.wait_link_status_up("all") # redirect flow to another queue by tunnel filter rule_config = { -- 2.25.1