test suite reviews and discussions
 help / color / mirror / Atom feed
From: "Tu, Lijuan" <lijuan.tu@intel.com>
To: "Zhao, MeijuanX" <meijuanx.zhao@intel.com>,
	"dts@dpdk.org" <dts@dpdk.org>
Cc: "Lin, Xueqin" <xueqin.lin@intel.com>,
	"Zhao, MeijuanX" <meijuanx.zhao@intel.com>
Subject: Re: [dts] [PATCH V1] tests/kernelpf_iavf: add new test suite kernelpf	iavf
Date: Wed, 26 Jun 2019 08:50:56 +0000	[thread overview]
Message-ID: <8CE3E05A3F976642AAB0F4675D0AD20E0BAC5415@SHSMSX101.ccr.corp.intel.com> (raw)
In-Reply-To: <20190625170645.88676-1-meijuanx.zhao@intel.com>

Applied, thanks

> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of zhaomeijuan
> Sent: Wednesday, June 26, 2019 1:07 AM
> To: dts@dpdk.org
> Cc: Lin, Xueqin <xueqin.lin@intel.com>; Zhao, MeijuanX
> <meijuanx.zhao@intel.com>
> Subject: [dts] [PATCH V1] tests/kernelpf_iavf: add new test suite kernelpf iavf
> 
> Signed-off-by: zhaomeijuan <meijuanx.zhao@intel.com>
> ---
>  tests/TestSuite_kernelpf_iavf.py | 873 +++++++++++++++++++++++++++++++
>  1 file changed, 873 insertions(+)
>  create mode 100644 tests/TestSuite_kernelpf_iavf.py
> 
> diff --git a/tests/TestSuite_kernelpf_iavf.py
> b/tests/TestSuite_kernelpf_iavf.py
> new file mode 100644
> index 0000000..2dcd717
> --- /dev/null
> +++ b/tests/TestSuite_kernelpf_iavf.py
> @@ -0,0 +1,873 @@
> +# BSD LICENSE
> +#
> +# Copyright(c) <2019> Intel Corporation. All rights reserved.
> +# All rights reserved.
> +#
> +# Redistribution and use in source and binary forms, with or without #
> +modification, are permitted provided that the following conditions #
> +are met:
> +#
> +#   * Redistributions of source code must retain the above copyright
> +#     notice, this list of conditions and the following disclaimer.
> +#   * Redistributions in binary form must reproduce the above copyright
> +#     notice, this list of conditions and the following disclaimer in
> +#     the documentation and/or other materials provided with the
> +#     distribution.
> +#   * Neither the name of Intel Corporation nor the names of its
> +#     contributors may be used to endorse or promote products derived
> +#     from this software without specific prior written permission.
> +#
> +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS #
> +"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT #
> +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
> FOR #
> +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
> COPYRIGHT #
> +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
> INCIDENTAL, #
> +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> #
> +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
> USE, #
> +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
> ON ANY #
> +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT #
> +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
> USE #
> +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +
> +"""
> +DPDK Test suite.
> +
> +Test some vf function in ice driver
> +
> +"""
> +
> +import re
> +import time
> +import random
> +import utils
> +from virt_common import VM
> +from test_case import TestCase
> +from pmd_output import PmdOutput
> +from settings import HEADER_SIZE
> +from packet import Packet
> +from utils import RED
> +
> +VM_CORES_MASK = 'all'
> +MAX_VLAN = 4095
> +ETHER_STANDARD_MTU = 1518
> +ETHER_JUMBO_FRAME_MTU = 9000
> +
> +
> +class TestKernelpfIavf(TestCase):
> +
> +    supported_vf_driver = ['pci-stub', 'vfio-pci']
> +
> +    def set_up_all(self):
> +        self.dut_ports = self.dut.get_ports(self.nic)
> +        self.verify(len(self.dut_ports) >= 2, "Insufficient ports")
> +        self.vm0 = None
> +        self.env_done = False
> +        self.interrupt_flag = False
> +        self.vf_mac = '00:01:23:45:67:89'
> +        self.add_addr = '00:11:22:33:44:55'
> +        self.wrong_mac = '00:11:22:33:44:99'
> +
> +        self.port = self.dut_ports[0]
> +        self.vm_port = 0
> +        cores = self.dut.get_core_list("1S/1C/1T")
> +        self.port_mask = utils.create_mask([self.port])
> +
> +        # set vf assign method and vf driver
> +        self.dut.send_expect('modprobe vfio-pci', '#')
> +        self.vf_driver = self.get_suite_cfg()['vf_driver']
> +        if self.vf_driver is None:
> +            self.vf_driver = 'pci-stub'
> +        self.verify(self.vf_driver in self.supported_vf_driver, "Unspported vf
> driver")
> +        if self.vf_driver == 'pci-stub':
> +            self.vf_assign_method = 'pci-assign'
> +        else:
> +            self.vf_assign_method = 'vfio-pci'
> +            self.dut.send_expect('modprobe vfio-pci', '#')
> +        self.used_dut_port = self.dut_ports[0]
> +        self.host_intf = self.dut.ports_info[self.used_dut_port]['intf']
> +        tester_port = self.tester.get_local_port(self.used_dut_port)
> +        self.tester_intf = self.tester.get_interface(tester_port)
> +        self.tester_mac = self.tester.get_mac(tester_port)
> +
> +        tester_port1 = self.tester.get_local_port(self.dut_ports[1])
> +        self.tester_intf1 = self.tester.get_interface(tester_port1)
> +
> +    def set_up(self):
> +
> +        if self.running_case == "test_vf_mac_filter":
> +            self.destroy_vm_env()
> +            if self.env_done is False:
> +                self.setup_vm_env(driver='', set_vf_mac=False)
> +        elif self.running_case == "test_vf_rx_interrupt":
> +            self.destroy_vm_env()
> +        elif self.env_done is False:
> +            self.setup_vm_env()
> +
> +    def bind_nic_driver(self, ports, driver=""):
> +        # modprobe vfio driver
> +        if driver == "vfio-pci":
> +            for port in ports:
> +                netdev = self.dut.ports_info[port]['port']
> +                driver = netdev.get_nic_driver()
> +                if driver != 'vfio-pci':
> +                    netdev.bind_driver(driver='vfio-pci')
> +
> +        elif driver == "igb_uio":
> +            # igb_uio should insmod as default, no need to check
> +            for port in ports:
> +                netdev = self.dut.ports_info[port]['port']
> +                driver = netdev.get_nic_driver()
> +                if driver != 'igb_uio':
> +                    netdev.bind_driver(driver='igb_uio')
> +        else:
> +            for port in ports:
> +                netdev = self.dut.ports_info[port]['port']
> +                driver_now = netdev.get_nic_driver()
> +                if driver is None:
> +                    driver = netdev.default_driver
> +                if driver != driver_now:
> +                    netdev.bind_driver(driver=driver)
> +
> +    def setup_vm_env(self, driver='default', set_vf_mac=True):
> +        """
> +        Create testing environment with 1VF generated from 1PF
> +        """
> +        if self.env_done:
> +            return
> +
> +        # bind to default driver
> +        self.bind_nic_driver(self.dut_ports, driver="")
> +        self.used_dut_port = self.dut_ports[0]
> +        self.dut.generate_sriov_vfs_by_port(
> +            self.used_dut_port, 1, driver=driver)
> +        self.sriov_vfs_port = self.dut.ports_info[
> +            self.used_dut_port]['vfs_port']
> +        out = self.dut.send_expect('ethtool %s' % self.host_intf, '#')
> +        self.speed = re.findall('Supported link modes:   (\d*)', out)[0]
> +        if set_vf_mac is True:
> +            self.vf_mac = "00:01:23:45:67:89"
> +            self.dut.send_expect("ip link set %s vf 0 mac %s" %
> +                                 (self.host_intf, self.vf_mac), "# ")
> +
> +        try:
> +
> +            for port in self.sriov_vfs_port:
> +                port.bind_driver(self.vf_driver)
> +
> +            time.sleep(1)
> +            vf_popt = {'opt_host': self.sriov_vfs_port[0].pci}
> +
> +            # set up VM ENV
> +            self.vm = VM(self.dut, 'vm0', 'kernelpf_iavf')
> +            self.vm.set_vm_device(driver=self.vf_assign_method, **vf_popt)
> +            self.vm_dut = self.vm.start()
> +            if self.vm_dut is None:
> +                raise Exception("Set up VM ENV failed!")
> +
> +            self.vm_testpmd = PmdOutput(self.vm_dut)
> +        except Exception as e:
> +            self.destroy_vm_env()
> +            raise Exception(e)
> +
> +        self.env_done = True
> +
> +    def destroy_vm_env(self):
> +        if getattr(self, 'vm', None):
> +            if getattr(self, 'vm_dut', None):
> +                self.vm_dut.kill_all()
> +            self.vm_testpmd = None
> +            self.vm_dut_ports = None
> +            # destroy vm0
> +            self.vm.stop()
> +            self.dut.virt_exit()
> +            time.sleep(3)
> +            self.vm = None
> +
> +        if getattr(self, 'used_dut_port', None) is not None:
> +            self.dut.destroy_sriov_vfs_by_port(self.used_dut_port)
> +            self.used_dut_port = None
> +
> +        self.bind_nic_driver(self.dut_ports, driver='default')
> +
> +        self.env_done = False
> +
> +    def jumboframes_get_stat(self, portid, rx_tx):
> +        """
> +        Get packets number from port statistic
> +        """
> +        stats = self.vm_testpmd.get_pmd_stats(portid)
> +        if rx_tx == "rx":
> +            return [stats['RX-packets'], stats['RX-errors'], stats['RX-bytes']]
> +        elif rx_tx == "tx":
> +            return [stats['TX-packets'], stats['TX-errors'], stats['TX-bytes']]
> +        else:
> +            return None
> +
> +    def send_random_pkt(self, dts, count=1):
> +        tgen_ports = []
> +        tx_port = self.tester.get_local_port(self.dut_ports[0])
> +        rx_port = self.tester.get_local_port(self.dut_ports[1])
> +        tgen_ports.append((tx_port, rx_port))
> +        src_mac = self.tester.get_mac(tx_port)
> +        dst_mac = dts
> +        pkt_param = [("ether", {'dst': dst_mac, 'src': src_mac})]
> +        result = self.tester.check_random_pkts(tgen_ports, pktnum=count,
> allow_miss=False, params=pkt_param)
> +        return result
> +
> +    def test_vf_basic_rxtx(self):
> +        '''
> +        Set rxonly forward,Send 100 random packets from tester, check
> packets can be received
> +        '''
> +        self.vm_testpmd.start_testpmd("all")
> +        self.vm_testpmd.execute_cmd("set fwd rxonly")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.vm_testpmd.execute_cmd("start")
> +        self.send_random_pkt(self.vf_mac, count=100)
> +        time.sleep(1)
> +        out = self.vm_dut.get_session_output()
> +        self.verify(self.vf_mac in out, "vf receive packet fail")
> +        stats = self.vm_testpmd.get_pmd_stats(0)
> +        self.verify(stats['RX-packets'] == 100, 'vf receive packet num is not
> match')
> +        '''
> +        Set txonly forward,check packets can be received by tester
> +        '''
> +        self.vm_testpmd.execute_cmd("stop")
> +        self.vm_testpmd.execute_cmd("set fwd txonly")
> +        self.tester.send_expect('rm -f tcpdump.pcap', '#')
> +        self.tester.send_expect("tcpdump -i %s 2>tcpdump.out &" %
> self.tester_intf, "#")
> +        self.vm_testpmd.execute_cmd("start")
> +        time.sleep(1)
> +        self.vm_testpmd.execute_cmd("stop")
> +        self.tester.send_expect('killall tcpdump', '#')
> +        time.sleep(1)
> +        cap_packet = self.tester.send_expect('cat tcpdump.out', '#', 30)
> +        stats = self.vm_testpmd.get_pmd_stats(0)
> +        cap_tcp_num = re.findall('(\d+) packets', cap_packet)
> +        self.verify(stats['TX-packets'] <= int(cap_tcp_num[1]), 'vf
> + send packet num is not match')
> +
> +    def test_vf_mac_filter(self):
> +        """
> +        Not set VF MAC from kernel PF for this case, if set, will print
> +        "not permitted error" when add new MAC for VF.
> +        """
> +        out = self.vm_testpmd.start_testpmd("all")
> +        self.testpmd_mac = self.get_testpmd_vf_mac(out)
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("set promisc all off")
> +        self.vm_testpmd.execute_cmd("mac_addr add 0 %s" % self.add_addr)
> +        self.vm_testpmd.execute_cmd("start")
> +        # send packet with current mac
> +        self.send_random_pkt(self.testpmd_mac, count=100)
> +        self.verify_packet_count(100)
> +        self.vm_testpmd.execute_cmd('clear port stats all')
> +        # send packet with add mac
> +        self.send_random_pkt(self.add_addr, count=100)
> +        self.verify_packet_count(100)
> +        self.vm_testpmd.execute_cmd('clear port stats all')
> +        # send packet with wrong mac
> +        self.send_random_pkt(self.wrong_mac, count=100)
> +        self.verify_packet_count(0)
> +
> +    def get_testpmd_vf_mac(self, out):
> +        result = re.search("([a-f0-9]{2}:){5}[a-f0-9]{2}", out, re.IGNORECASE)
> +        mac = result.group()
> +        return mac
> +
> +    def verify_packet_count(self, count):
> +
> +        pmd0_vf0_stats = self.vm_testpmd.get_pmd_stats(0)
> +        vf0_rx_cnt = pmd0_vf0_stats['RX-packets']
> +        vf0_tx_cnt = pmd0_vf0_stats['TX-packets']
> +        self.verify(vf0_rx_cnt == vf0_tx_cnt == count, "vf receive
> + packet count not match!")
> +
> +    def test_vf_promisc_mode(self):
> +        """
> +        Enable kernel trust mode
> +        """
> +        self.dut.send_expect("ip link set dev %s vf 0 trust on" % self.host_intf,
> "# ")
> +        self.vm_testpmd.start_testpmd("all")
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.vm_testpmd.execute_cmd("start")
> +        # send packet with current mac, vf can receive and forward packet
> +        self.send_random_pkt(self.vf_mac, count=1)
> +        out = self.vm_dut.get_session_output()
> +        self.verify(self.vf_mac in out, 'vf receive pkt fail with current mac')
> +        # send packet with wrong mac, vf can receive and forward packet
> +        self.send_random_pkt(self.wrong_mac, count=1)
> +        out = self.vm_dut.get_session_output()
> +        self.verify(self.wrong_mac in out, 'vf receive pkt fail with
> + wrong mac')
> +
> +        self.vm_testpmd.execute_cmd("set promisc all off")
> +        # send packet with current mac, vf can receive and forward packet
> +        self.send_random_pkt(self.vf_mac, count=1)
> +        out = self.vm_dut.get_session_output()
> +        self.verify(self.vf_mac in out, 'vf receive pkt fail with current mac')
> +        # send packet with wrong mac, vf can not receive and forward packet
> +        self.send_random_pkt(self.wrong_mac, count=1)
> +        out = self.vm_dut.get_session_output()
> +        self.verify(self.wrong_mac not in out, 'vf receive pkt with
> + wrong mac')
> +
> +        self.vm_testpmd.execute_cmd("set promisc all on")
> +        # send packet with current mac, vf can receive and forward packet
> +        self.send_random_pkt(self.vf_mac, count=1)
> +        out = self.vm_dut.get_session_output()
> +        self.verify(self.vf_mac in out, 'vf receive pkt fail with current mac')
> +        # send packet with wrong mac, vf can receive and forward packet
> +        self.send_random_pkt(self.wrong_mac, count=1)
> +        out = self.vm_dut.get_session_output()
> +        self.verify(self.wrong_mac in out, 'vf receive pkt fail with
> + wrong mac')
> +
> +        self.dut.send_expect("ip link set dev %s vf 0 trust off" %
> + self.host_intf, "# ")
> +
> +    def test_vf_multicast(self):
> +        """
> +        enable kernel trust mode
> +        """
> +        multicast_mac = '01:80:C2:00:00:08'
> +        self.dut.send_expect("ip link set dev %s vf 0 trust on" % self.host_intf,
> "# ")
> +        self.vm_testpmd.start_testpmd("all")
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("set promisc all off")
> +        self.vm_testpmd.execute_cmd("set allmulti all off")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.vm_testpmd.execute_cmd("start")
> +        self.send_random_pkt(self.vf_mac, count=1)
> +        out = self.vm_dut.get_session_output()
> +        self.verify(self.vf_mac in out, 'vf receive pkt fail with current mac')
> +        self.send_random_pkt(multicast_mac, count=1)
> +        out = self.vm_dut.get_session_output()
> +        self.verify(multicast_mac not in out, 'vf receive pkt with
> + multicast mac')
> +
> +        self.vm_testpmd.execute_cmd("set allmulti all on")
> +        self.send_random_pkt(self.vf_mac, count=1)
> +        out = self.vm_dut.get_session_output()
> +        self.verify(self.vf_mac in out, 'vf receive pkt fail with current mac')
> +        self.send_random_pkt(multicast_mac, count=1)
> +        out = self.vm_dut.get_session_output()
> +        self.verify(multicast_mac in out, 'vf receive pkt fail with multicast mac')
> +        self.dut.send_expect("ip link set dev %s vf 0 trust off" %
> + self.host_intf, "# ")
> +
> +    def test_vf_broadcast(self):
> +        """
> +        """
> +        broadcast_mac = 'ff:ff:ff:ff:ff:ff'
> +        self.vm_testpmd.start_testpmd("all")
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("set promisc all off")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.vm_testpmd.execute_cmd("start")
> +        self.send_random_pkt(broadcast_mac, count=1)
> +        time.sleep(1)
> +        out = self.vm_dut.get_session_output()
> +        print out
> +        self.verify(broadcast_mac.upper() in out and
> + self.tester_mac.upper() in out, 'vf receive pkt fail with broadcast
> + mac')
> +
> +    def test_vf_add_pvid(self):
> +        '''
> +        vf can receive packet with right vlan id, can't receive wrong vlan id
> packet
> +        '''
> +        random_vlan = random.randint(1, MAX_VLAN)
> +        self.dut.send_expect("ip link set %s vf 0 vlan %s" % (self.host_intf,
> random_vlan), "# ")
> +        out = self.dut.send_expect("ip link show %s" % self.host_intf, "# ")
> +        self.verify("vlan %d" % random_vlan in out, "Failed to add pvid
> + on VF0")
> +
> +        self.vm_testpmd.start_testpmd("all")
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.vm_testpmd.execute_cmd("start")
> +        out = self.send_and_getout(vlan=random_vlan, pkt_type="VLAN_UDP")
> +        self.verify("VLAN tci=%s" % hex(random_vlan) in out and self.vf_mac in
> out, "Failed to received vlan packet!!!")
> +        wrong_vlan = (random_vlan + 1) % 4096
> +        out = self.send_and_getout(vlan=wrong_vlan, pkt_type="VLAN_UDP")
> +        self.verify("VLAN tci=%s" % hex(wrong_vlan) not in out and
> + self.vf_mac not in out, "received wrong vlan packet!!!")
> +
> +        # remove vlan
> +        self.dut.send_expect("ip link set %s vf 0 vlan 0" % self.host_intf, "# ")
> +        out = self.dut.send_expect("ip link show %s" % self.host_intf, "# ")
> +        self.verify("vlan %d" % random_vlan not in out, "Failed to remove pvid
> on VF0")
> +        # send packet without vlan
> +        out = self.send_and_getout(vlan=0, pkt_type="UDP")
> +        self.verify(self.vf_mac in out and "VLAN tci=0x0" in out, "Not
> + received packet without vlan!!!")
> +
> +        # send packet with vlan 0
> +        out = self.send_and_getout(vlan=0, pkt_type="VLAN_UDP")
> +        self.verify(
> +            self.vf_mac in out and "VLAN tci=0x0" in out, "Not recevied
> + packet with vlan 0!!!")
> +
> +        # send random vlan packet
> +        out = self.send_and_getout(vlan=random_vlan, pkt_type="VLAN_UDP")
> +        self.verify(self.vf_mac not in out and "VLAN tci=%s" %
> + hex(random_vlan) not in out, "Failed to received vlan packet!!!")
> +
> +    def send_and_getout(self, vlan=0, pkt_type="UDP"):
> +
> +        if pkt_type == "UDP":
> +            pkt = Packet(pkt_type='UDP')
> +            pkt.config_layer('ether', {'dst': self.vf_mac})
> +        elif pkt_type == "VLAN_UDP":
> +            pkt = Packet(pkt_type='VLAN_UDP')
> +            pkt.config_layer('vlan', {'vlan': vlan})
> +            pkt.config_layer('ether', {'dst': self.vf_mac})
> +
> +        pkt.send_pkt(tx_port=self.tester_intf)
> +        out = self.vm_dut.get_session_output(timeout=2)
> +
> +        return out
> +
> +    def test_vf_vlan_rx(self):
> +        self.vm_testpmd.start_testpmd("all")
> +        self.vm_testpmd.execute_cmd("set fwd rxonly")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.vm_testpmd.execute_cmd("vlan set filter on 0")
> +        self.vm_testpmd.execute_cmd("vlan set strip on 0")
> +        self.vm_testpmd.execute_cmd("start")
> +        # send packet without vlan, vf can receive packet
> +        out = self.send_and_getout(pkt_type="UDP")
> +        self.verify(self.vf_mac in out, "Failed to received without
> + vlan packet!!!")
> +
> +        # send packet vlan 0, vf can receive packet
> +        out = self.send_and_getout(vlan=0, pkt_type="VLAN_UDP")
> +        self.verify(self.vf_mac in out, "Failed to received vlan 0
> + packet!!!")
> +
> +        self.vm_testpmd.execute_cmd("rx_vlan add 1 0")
> +
> +        # send packet vlan 1, vf can receive packet
> +        out = self.send_and_getout(vlan=1, pkt_type="VLAN_UDP")
> +        self.verify("VLAN tci=%s" % hex(1) in out and self.vf_mac in
> + out, "Failed to received vlan 1 packet!!!")
> +
> +        # send random vlan packet, vf can not receive packet
> +        random_vlan = random.randint(1, MAX_VLAN)
> +        out = self.send_and_getout(vlan=random_vlan, pkt_type="VLAN_UDP")
> +        self.verify("VLAN tci=%s" % hex(random_vlan) not in out and
> + self.vf_mac not in out, "received random vlan packet!!!")
> +
> +        # send max vlan 4095, vf can not receive packet
> +        out = self.send_and_getout(vlan=MAX_VLAN, pkt_type="VLAN_UDP")
> +        self.verify("VLAN tci=%s" % hex(MAX_VLAN) not in out and
> + self.vf_mac not in out, "received max vlan packet!!!")
> +
> +        # remove vlan
> +        self.vm_testpmd.execute_cmd("rx_vlan rm 1 0")
> +
> +        # send packet without vlan, vf can receive packet
> +        out = self.send_and_getout(pkt_type="UDP")
> +        self.verify(self.vf_mac in out, "Failed to received without
> + vlan packet!!!")
> +
> +        # send packet vlan 0, vf can receive packet
> +        out = self.send_and_getout(vlan=0, pkt_type="VLAN_UDP")
> +        self.verify(self.vf_mac in out, "Failed to received vlan 0
> + packet!!!")
> +
> +        # send vlan 1 packet, vf can not receive packet
> +        out = self.send_and_getout(vlan=1, pkt_type="VLAN_UDP")
> +        self.verify(self.vf_mac not in out, "received vlan 1
> + packet!!!")
> +
> +    def test_vf_vlan_insertion(self):
> +        self.vm_testpmd.start_testpmd("all")
> +        random_vlan = random.randint(1, MAX_VLAN)
> +        self.vm_testpmd.execute_cmd("vlan set strip off 0")
> +        self.vm_testpmd.execute_cmd("port stop all")
> +        self.vm_testpmd.execute_cmd("tx_vlan set 0 %s" % random_vlan)
> +        self.vm_testpmd.execute_cmd("port start all")
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.vm_testpmd.execute_cmd("start")
> +
> +        out = self.send_and_getout(pkt_type="UDP")
> +        print out
> +        time.sleep(1)
> +        vlan_hex = hex(random_vlan)
> +        self.verify("VLAN tci=%s" % vlan_hex in out, 'add vlan tag fail
> + !!')
> +
> +    def test_vf_vlan_strip(self):
> +        random_vlan = random.randint(1, MAX_VLAN)
> +        self.vm_testpmd.start_testpmd("all")
> +        self.vm_testpmd.execute_cmd("vlan set strip on 0")
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.vm_testpmd.execute_cmd("start")
> +        out = self.send_and_getout(vlan=random_vlan, pkt_type="VLAN_UDP")
> +        self.verify('VLAN tci=' not in out and self.vf_mac not in out,
> + 'vlan tag in out')
> +
> +        # disable strip
> +        self.vm_testpmd.execute_cmd("vlan set strip off 0")
> +        out = self.send_and_getout(vlan=random_vlan, pkt_type="VLAN_UDP")
> +        vlan_hex = hex(random_vlan)
> +        self.verify("VLAN tci=%s" % vlan_hex in out, 'vlan tag not in
> + out')
> +
> +    def test_vf_without_jumboframe(self):
> +        self.tester.send_expect('ifconfig %s mtu %s' %
> + (self.tester_intf, ETHER_JUMBO_FRAME_MTU), '#')
> +
> +        self.vm_testpmd.start_testpmd("all")
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("set promisc all off")
> +        self.vm_testpmd.execute_cmd("start")
> +        self.jumboframes_send_packet(ETHER_STANDARD_MTU - 1, True)
> +        self.jumboframes_send_packet(ETHER_STANDARD_MTU + 1, False)
> +        self.tester.send_expect("ifconfig %s mtu %s" %
> + (self.tester_intf, ETHER_STANDARD_MTU))
> +
> +    def test_vf_with_jumboframe(self):
> +        self.tester.send_expect('ifconfig %s mtu %d' % (self.tester_intf,
> ETHER_JUMBO_FRAME_MTU), '#')
> +        conf_pkt_len = 3000
> +        self.vm_testpmd.start_testpmd("all", "--max-pkt-len=%d" %
> conf_pkt_len)
> +        self.jumboframes_send_packet(conf_pkt_len - 1, True)
> +        self.jumboframes_send_packet(conf_pkt_len + 1, False)
> +        self.tester.send_expect("ifconfig %s mtu %d" %
> + (self.tester_intf, ETHER_STANDARD_MTU))
> +
> +    def jumboframes_send_packet(self, pktsize, received=True):
> +        """
> +        Send 1 packet to portid
> +        """
> +        tx_pkts_ori, _, tx_bytes_ori = [int(_) for _ in
> self.jumboframes_get_stat(self.vm_port, "tx")]
> +        rx_pkts_ori, rx_err_ori, rx_bytes_ori = [int(_) for _ in
> + self.jumboframes_get_stat(self.vm_port, "rx")]
> +
> +        pkt = Packet(pkt_type='UDP', pkt_len=pktsize)
> +        pkt.config_layer('ether', {'dst': self.vf_mac, 'src': self.tester_mac})
> +        self.vm_testpmd.execute_cmd("clear port stats all")
> +        pkt.send_pkt(tx_port=self.tester_intf)
> +
> +        time.sleep(1)
> +
> +        tx_pkts, _, tx_bytes = [int(_) for _ in
> self.jumboframes_get_stat(self.port, "tx")]
> +        rx_pkts, rx_err, rx_bytes = [int(_) for _ in
> + self.jumboframes_get_stat(self.vm_port, "rx")]
> +
> +        tx_pkts -= tx_pkts_ori
> +        tx_bytes -= tx_bytes_ori
> +        rx_pkts -= rx_pkts_ori
> +        rx_bytes -= rx_bytes_ori
> +        rx_err -= rx_err_ori
> +        if received:
> +            self.verify((rx_pkts == 1) and (tx_pkts == 1), "Packet
> + forward assert error")
> +
> +            self.verify(rx_bytes == pktsize, "Rx packet size should be
> + packet size")
> +
> +            self.verify(tx_bytes == pktsize, "Tx packet size should be packet size")
> +        else:
> +            self.verify(rx_err == 1 or tx_pkts == 0, "Packet drop
> + assert error")
> +
> +    def test_vf_rss(self):
> +        self.vm_testpmd.start_testpmd("all", "--txq=4 --rxq=4")
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        for i, j in zip(range(64), [0, 1, 2, 3]*16):
> +            self.vm_testpmd.execute_cmd("port config 0 rss reta (%d,%d)" % (i,
> j))
> +        self.vm_testpmd.execute_cmd("port config all rss ip")
> +        self.vm_testpmd.execute_cmd("port config all rss tcp")
> +        self.vm_testpmd.execute_cmd("port config all rss udp")
> +        self.vm_testpmd.execute_cmd("start")
> +        self.send_packet(self.tester_intf, 'IPV4')
> +        time.sleep(2)
> +        out = self.vm_dut.get_session_output()
> +        self.verify_packet_number(out)
> +
> +        self.vm_testpmd.execute_cmd("clear port stats all")
> +        self.send_packet(self.tester_intf, 'IPV4&TCP')
> +        time.sleep(2)
> +        out = self.vm_dut.get_session_output()
> +        self.verify_packet_number(out)
> +
> +        self.vm_testpmd.execute_cmd("clear port stats all")
> +        self.send_packet(self.tester_intf, 'IPV4&UDP')
> +        time.sleep(2)
> +        out = self.vm_dut.get_session_output()
> +        self.verify_packet_number(out)
> +
> +    def verify_packet_number(self, out):
> +        queue0_number = len(re.findall('port 0/queue 0', out))
> +        queue1_number = len(re.findall('port 0/queue 1', out))
> +        queue2_number = len(re.findall('port 0/queue 2', out))
> +        queue3_number = len(re.findall('port 0/queue 3', out))
> +        queue_numbers = [queue0_number, queue1_number,
> queue2_number, queue3_number]
> +        self.verify('queue 0' in out and 'queue 1' in out and 'queue 2' in out
> and 'queue 3' in out, "some queue can't receive packet when send ip packet")
> +        self.verify(max(queue_numbers)-min(queue_numbers) <= 3, 'packet
> + number on each queue should be similar')
> +
> +    def send_packet(self, itf, tran_type):
> +        """
> +        Sends packets.
> +        """
> +        mac = self.vf_mac
> +        # send packet with different source and dest ip
> +        if tran_type == "IPV4":
> +            for i in range(30):
> +                packet = r'sendp([Ether(dst="%s",
> src="02:00:00:00:00:00")/IP(src="192.168.0.%d", '\
> +                                  'dst="192.168.0.%d")], iface="%s")' % (mac, i + 1, i + 2,
> itf)
> +                self.tester.scapy_append(packet)
> +            self.tester.scapy_execute()
> +            time.sleep(.5)
> +        elif tran_type == "IPV4&TCP":
> +            for i in range(30):
> +                packet = r'sendp([Ether(dst="%s",
> src="02:00:00:00:00:00")/IP(src="192.168.0.%d", dst="192.168.0.%d")/'\
> +                                  'TCP(sport=1024,dport=1024)], iface="%s")' % (mac, i + 1,
> i + 2, itf)
> +                self.tester.scapy_append(packet)
> +            self.tester.scapy_execute()
> +            time.sleep(.5)
> +        elif tran_type == "IPV4&UDP":
> +            for i in range(30):
> +                packet = r'sendp([Ether(dst="%s",
> src="02:00:00:00:00:00")/IP(src="192.168.0.%d", dst="192.168.0.%d")/'\
> +                                  'UDP(sport=1024,dport=1024)], iface="%s")' % (mac, i +
> 1, i + 2, itf)
> +                self.tester.scapy_append(packet)
> +            self.tester.scapy_execute()
> +            time.sleep(.5)
> +        self.tester.scapy_execute()
> +        time.sleep(1)
> +
> +    def enable_hw_checksum(self):
> +        self.vm_testpmd.execute_cmd("port stop all")
> +        self.vm_testpmd.execute_cmd("csum set ip hw 0")
> +        self.vm_testpmd.execute_cmd("csum set udp hw 0")
> +        self.vm_testpmd.execute_cmd("csum set tcp hw 0")
> +        self.vm_testpmd.execute_cmd("csum set sctp hw 0")
> +        self.vm_testpmd.execute_cmd("set fwd csum")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +
> +    def enable_sw_checksum(self):
> +        self.vm_testpmd.execute_cmd("port stop all")
> +        self.vm_testpmd.execute_cmd("csum set ip sw 0")
> +        self.vm_testpmd.execute_cmd("csum set udp sw 0")
> +        self.vm_testpmd.execute_cmd("csum set tcp sw 0")
> +        self.vm_testpmd.execute_cmd("csum set sctp sw 0")
> +        self.vm_testpmd.execute_cmd("set fwd csum")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +
> +    def checksum_verify(self):
> +        packets_sent = {'IP/': 'Ether(dst="%s",
> src="52:00:00:00:00:00")/IP(chksum=0x1234)/UDP()/("X"*46)' % self.vf_mac,
> +                        'IP/UDP': 'Ether(dst="%s",
> src="52:00:00:00:00:00")/IP()/UDP(chksum=0x1234)/("X"*46)' % self.vf_mac,
> +                        'IP/TCP': 'Ether(dst="%s",
> + src="52:00:00:00:00:00")/IP()/TCP(chksum=0x1234)/("X"*46)' %
> + self.vf_mac}
> +
> +        # Send packet.
> +        self.tester.scapy_foreground()
> +
> +        for packet_type in packets_sent.keys():
> +            self.tester.scapy_append('sendp([%s], iface="%s")' %
> (packets_sent[packet_type], self.tester_intf))
> +            self.start_tcpdump(self.tester_intf)
> +            self.tester.scapy_execute()
> +            time.sleep(1)
> +            tcpdump_out = self.get_tcpdump_package()
> +            if packet_type == 'IP/UDP':
> +                # verify udp checksum
> +                self.verify('bad udp cksum' in tcpdump_out and 'udp sum ok' in
> tcpdump_out, 'udp checksum verify fail')
> +            elif packet_type == 'IP/TCP':
> +                # verify tcp checksum
> +                self.verify("cksum 0x1234 (incorrect" in tcpdump_out and 'correct'
> in tcpdump_out, 'tcp checksum verify fail')
> +            else:
> +                # verify ip checksum
> +                self.verify('bad cksum 1234' in tcpdump_out and 'udp sum ok' in
> tcpdump_out, 'ip checksum verify fail')
> +        out = self.vm_testpmd.execute_cmd("stop")
> +        bad_ipcsum = self.vm_testpmd.get_pmd_value("Bad-ipcsum:", out)
> +        bad_l4csum = self.vm_testpmd.get_pmd_value("Bad-l4csum:", out)
> +        self.verify(bad_ipcsum == 1, "Bad-ipcsum check error")
> +        self.verify(bad_l4csum == 2, "Bad-ipcsum check error")
> +
> +    def test_vf_hw_checksum_offload(self):
> +        self.vm_testpmd.start_testpmd("all")
> +        self.enable_hw_checksum()
> +        self.vm_testpmd.execute_cmd("port start all")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.vm_testpmd.execute_cmd("start")
> +        self.checksum_verify()
> +
> +    def test_vf_sw_checksum_offload(self):
> +        self.vm_testpmd.start_testpmd("all")
> +        self.enable_sw_checksum()
> +        self.vm_testpmd.execute_cmd("port start all")
> +        self.vm_testpmd.execute_cmd("start")
> +        self.checksum_verify()
> +
> +    def test_vf_tso(self):
> +        self.tester.send_expect("ethtool -K %s rx off tx off tso off gso off gro off
> lro off" % self.tester_intf, "#")
> +        self.tester.send_expect("ifconfig %s mtu %d" % (self.tester_intf,
> ETHER_JUMBO_FRAME_MTU), "#")
> +        self.vm_testpmd.start_testpmd("all", "--port-topology=chained --max-
> pkt-len=%d" % ETHER_JUMBO_FRAME_MTU)
> +        self.vm_testpmd.execute_cmd("set fwd csum")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.enable_hw_checksum()
> +        self.vm_testpmd.execute_cmd("tso set 1460 0")
> +        self.vm_testpmd.execute_cmd("port start all")
> +        self.vm_testpmd.execute_cmd("start")
> +        self.tester.scapy_foreground()
> +        time.sleep(5)
> +        self.start_tcpdump(self.tester_intf)
> +        pkt =
> 'sendp([Ether(dst="%s")/IP(chksum=0x1234)/TCP(flags=0x10,chksum=0x1234)
> /'\
> +                      'Raw(RandString(5214))], iface="%s")' % (self.vf_mac,
> self.tester_intf)
> +        self.tester.scapy_append(pkt)
> +        self.tester.scapy_execute()
> +        time.sleep(2)
> +        out = self.get_tcpdump_package()
> +        self.verify_packet_segmentation(out)
> +        self.vm_testpmd.execute_cmd("stop")
> +        self.vm_testpmd.execute_cmd("port stop all")
> +        self.vm_testpmd.execute_cmd("tso set 0 0")
> +        self.vm_testpmd.execute_cmd("port start all")
> +        self.vm_testpmd.execute_cmd("start")
> +
> +        self.start_tcpdump(self.tester_intf)
> +        self.tester.scapy_append(pkt)
> +        self.tester.scapy_execute()
> +        time.sleep(2)
> +        out = self.get_tcpdump_package()
> +        self.verify_packet_segmentation(out, seg=False)
> +
> +    def start_tcpdump(self, rxItf):
> +        self.tester.send_expect("rm -rf getPackageByTcpdump.cap", "#")
> +        self.tester.send_expect("tcpdump -A -nn -e -vv -w
> + getPackageByTcpdump.cap -i %s 2> /dev/null& " % rxItf, "#")
> +
> +    def get_tcpdump_package(self):
> +        self.tester.send_expect("killall tcpdump", "#")
> +        return self.tester.send_expect("tcpdump -A -nn -e -vv -r
> + getPackageByTcpdump.cap", "#")
> +
> +    def verify_packet_segmentation(self, out, seg=True):
> +        if seg:
> +            number1 = re.findall('length 1460: HTTP', out)
> +            number2 = re.findall('length 834: HTTP', out)
> +            self.verify(len(number1) == 3 and len(number2) == 1, 'packet has no
> segment')
> +        else:
> +            self.verify('length 1460: HTTP' not in out, 'packet has segment')
> +            # tester send packet with incorrect checksum
> +            # vf fwd packet with corrent checksum
> +            self.verify('incorrect' in out and 'correct' in out, 'checksum has
> incorrect')
> +        self.tester.send_expect("^C", "#")
> +
> +    def test_vf_port_start_stop(self):
> +        self.vm_testpmd.start_testpmd("all")
> +        for i in range(10):
> +            self.vm_testpmd.execute_cmd("port stop all")
> +            self.vm_testpmd.execute_cmd("port start all")
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("start")
> +        self.send_random_pkt(self.vf_mac, count=100)
> +        port_id_0 = 0
> +        vf0_stats = self.vm_testpmd.get_pmd_stats(port_id_0)
> +        vf0_rx_cnt = vf0_stats['RX-packets']
> +        self.verify(vf0_rx_cnt == 100, "no packet was received by
> + vm0_VF0")
> +
> +        vf0_rx_err = vf0_stats['RX-errors']
> +        self.verify(vf0_rx_err == 0, "vm0_VF0 rx-errors")
> +
> +        vf0_tx_cnt = vf0_stats['TX-packets']
> +        self.verify(vf0_tx_cnt == 100, "no packet was fwd by vm0_VF0")
> +
> +    def test_vf_statistic_reset(self):
> +        self.vm_testpmd.start_testpmd("all")
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.vm_testpmd.execute_cmd("start")
> +        out = self.vm_testpmd.execute_cmd("show port stats all")
> +        self.verify("RX-packets: 0" in out and "TX-packets: 0" in out, "receive
> some misc packet")
> +        self.vm_testpmd.execute_cmd("clear port stats all")
> +        self.send_random_pkt(self.vf_mac, count=100)
> +        out = self.vm_testpmd.execute_cmd("show port stats all")
> +        self.verify("RX-packets: 100" in out and "TX-packets: 100" in out,
> "receive packet fail")
> +        self.vm_testpmd.execute_cmd("clear port stats all")
> +        out = self.vm_testpmd.execute_cmd("show port stats all")
> +        self.verify("RX-packets: 0" in out and "TX-packets: 0" in out,
> + "clear port stats fail")
> +
> +    def test_vf_information(self):
> +        self.vm_testpmd.start_testpmd("all")
> +        out = self.vm_testpmd.execute_cmd("show port info 0")
> +        self.verify('Link status: up' in out, 'link stats has error')
> +        self.verify('Link speed: %s' % self.speed in out, 'link speed has error')
> +        print out
> +        self.vm_testpmd.execute_cmd("set fwd mac")
> +        self.vm_testpmd.execute_cmd("set verbose 1")
> +        self.vm_testpmd.execute_cmd("start")
> +        self.send_random_pkt(self.vf_mac, count=100)
> +        out = self.vm_testpmd.execute_cmd("show port stats all")
> +        print out
> +        self.verify("RX-packets: 100" in out and "TX-packets: 100" in
> + out, "receive packet fail")
> +
> +    def test_vf_rx_interrupt(self):
> +        # build l3-power
> +        out = self.dut.build_dpdk_apps("./examples/l3fwd-power")
> +        self.verify("Error" not in out, "Compilation error")
> +        self.verify("No such" not in out, "Compilation error")
> +        self.bind_nic_driver(self.dut_ports, driver="")
> +        self.create_2vf_in_host()
> +        # start l3fwd-power
> +        l3fwd_app = "./examples/l3fwd-power/build/l3fwd-power"
> +
> +        cmd = l3fwd_app + " -l 6,7 -n 4 -- -p 0x3 --config " + \
> +                          "'(0,0,6),(1,0,7)'"
> +        self.dut.send_expect(cmd, "POWER", timeout=40)
> +        out = self.dut.get_session_output()
> +        print out
> +        pattern = re.compile(r"(([a-f0-9]{2}:){5}[a-f0-9]{2})")
> +        mac_list = pattern.findall(out.lower())
> +        vf0_mac = mac_list[0][0]
> +        vf1_mac = mac_list[1][0]
> +        # send packet to vf0 and vf1
> +        self.scapy_send_packet(vf0_mac, self.tester_intf)
> +        self.scapy_send_packet(vf1_mac, self.tester_intf1)
> +        out = self.dut.get_session_output()
> +        self.verify('L3FWD_POWER: lcore 6 is waked up from rx interrupt' in out,
> 'lcore 6 is not waked up')
> +        self.verify('L3FWD_POWER: lcore 7 is waked up from rx interrupt' in out,
> 'lcore 7 is not waked up')
> +        self.verify('L3FWD_POWER: lcore 6 sleeps until interrupt triggers' in out,
> 'lcore 6 not sleep')
> +        self.verify('L3FWD_POWER: lcore 7 sleeps until interrupt triggers' in out,
> 'lcore 7 not sleep')
> +        self.scapy_send_packet(vf0_mac, self.tester_intf, count=16)
> +        self.scapy_send_packet(vf1_mac, self.tester_intf1, count=16)
> +        out = self.dut.get_session_output()
> +        self.verify('L3FWD_POWER: lcore 6 is waked up from rx interrupt' in out,
> 'lcore 6 is not waked up')
> +        self.verify('L3FWD_POWER: lcore 7 is waked up from rx interrupt' in out,
> 'lcore 7 is not waked up')
> +        self.dut.send_expect("^C", "# ", 60)
> +        self.interrupt_flag = True
> +        time.sleep(1)
> +        self.destroy_2vf_in_2pf()
> +
> +    def scapy_send_packet(self, mac, testinterface, count=1):
> +        """
> +        Send a packet to port
> +        """
> +        if count == 1:
> +            self.tester.scapy_append(
> +                'sendp([Ether(dst="%s")/IP()/UDP()/'\
> +                        'Raw(\'X\'*18)], iface="%s")' % (mac, testinterface))
> +        else:
> +            for i in range(16):
> +                self.tester.scapy_append(
> +                    'sendp([Ether(dst="%s")/IP(dst="127.0.0.%d")/UDP()/'\
> +                            'Raw(\'X\'*18)], iface="%s")' % (mac, i, testinterface))
> +        self.tester.scapy_execute()
> +
> +    def create_2vf_in_host(self, driver=''):
> +        self.used_dut_port_0 = self.dut_ports[0]
> +        self.dut.generate_sriov_vfs_by_port(self.used_dut_port_0, 1,
> driver=driver)
> +        self.sriov_vfs_port_0 =
> + self.dut.ports_info[self.used_dut_port_0]['vfs_port']
> +
> +        self.used_dut_port_1 = self.dut_ports[1]
> +        self.dut.generate_sriov_vfs_by_port(self.used_dut_port_1, 1,
> driver=driver)
> +        self.sriov_vfs_port_1 =
> self.dut.ports_info[self.used_dut_port_1]['vfs_port']
> +        self.dut.send_expect('modprobe vfio', "#")
> +        self.dut.send_expect('modprobe vfio-pci', "#")
> +        for port in self.sriov_vfs_port_0:
> +            port.bind_driver('vfio-pci')
> +
> +        for port in self.sriov_vfs_port_1:
> +            port.bind_driver('vfio-pci')
> +
> +    def destroy_2vf_in_2pf(self):
> +        if getattr(self, 'used_dut_port_0', None) is not None:
> +            self.dut.destroy_sriov_vfs_by_port(self.used_dut_port_0)
> +            self.used_dut_port_0 = None
> +        if getattr(self, 'used_dut_port_1', None) is not None:
> +            self.dut.destroy_sriov_vfs_by_port(self.used_dut_port_1)
> +            self.used_dut_port_1 = None
> +
> +    def tear_down(self):
> +        """
> +        Run after each test case.
> +        """
> +        if self.interrupt_flag is True:
> +            self.interrupt_flag = False
> +        else:
> +            self.vm_testpmd.execute_cmd("quit", "#")
> +            time.sleep(1)
> +        if self.running_case == 'test_vf_mac_filter':
> +            self.destroy_vm_env()
> +        if self.running_case == 'test_vf_add_pvid':
> +            self.dut.send_expect("ip link set %s vf 0 vlan 0" % self.host_intf, "# ")
> +        self.dut.send_expect("ip link set dev %s vf 0 trust off" %
> + self.host_intf, "# ")
> +
> +    def tear_down_all(self):
> +        """
> +        When the case of this test suite finished, the environment should
> +        clear up.
> +        """
> +        if self.env_done:
> +            self.destroy_vm_env()
> +
> --
> 2.17.1


      parent reply	other threads:[~2019-06-26  8:51 UTC|newest]

Thread overview: 3+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-06-25 17:06 zhaomeijuan
2019-06-25  9:14 ` Lin, Xueqin
2019-06-26  8:50 ` Tu, Lijuan [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=8CE3E05A3F976642AAB0F4675D0AD20E0BAC5415@SHSMSX101.ccr.corp.intel.com \
    --to=lijuan.tu@intel.com \
    --cc=dts@dpdk.org \
    --cc=meijuanx.zhao@intel.com \
    --cc=xueqin.lin@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).