test suite reviews and discussions
 help / color / mirror / Atom feed
From: "Chen, Zhaoyan" <zhaoyan.chen@intel.com>
To: "Xiao, QimaiX" <qimaix.xiao@intel.com>, "dts@dpdk.org" <dts@dpdk.org>
Cc: "Xiao, QimaiX" <qimaix.xiao@intel.com>,
	"Chen, Zhaoyan" <zhaoyan.chen@intel.com>
Subject: Re: [dts] [PATCH V1] framework/tester: update tester module of dts
Date: Tue, 8 Oct 2019 02:22:11 +0000	[thread overview]
Message-ID: <9DEEADBC57E43F4DA73B571777FECECA41DD735F@SHSMSX104.ccr.corp.intel.com> (raw)
In-Reply-To: <20190927180539.2344-3-qimaix.xiao@intel.com>

Acked-by: Chen, Zhaoyan <zhaoyan.chen@intel.com>



Regards,
Zhaoyan Chen


> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Qimai Xiao
> Sent: Saturday, September 28, 2019 2:06 AM
> To: dts@dpdk.org
> Cc: Xiao, QimaiX <qimaix.xiao@intel.com>
> Subject: [dts] [PATCH V1] framework/tester: update tester module of dts
> 
> update APIs related to packet module and rewrite func check_random_pkts
> 
> Signed-off-by: Qimai Xiao <qimaix.xiao@intel.com>
> ---
>  framework/tester.py | 157 ++++++++++++--------------------------------
>  1 file changed, 43 insertions(+), 114 deletions(-)
> 
> diff --git a/framework/tester.py b/framework/tester.py index 174d0b6..d7e74d4
> 100644
> --- a/framework/tester.py
> +++ b/framework/tester.py
> @@ -75,6 +75,11 @@ class Tester(Crb):
>          self.re_run_time = 0
>          self.pktgen = None
>          self.ixia_packet_gen = None
> +        self.tmp_file = '/tmp/tester/'
> +        out = self.send_expect('ls -d %s' % self.tmp_file, '# ', verify=True)
> +        if out == 2:
> +            self.send_expect('mkdir -p %s' % self.tmp_file, '# ')
> +
> 
>      def init_ext_gen(self):
>          """
> @@ -639,12 +644,12 @@ class Tester(Crb):
>          else:
>              return None
> 
> -    def parallel_transmit_ptks(self, send_f=None, intf='', pkts=[], interval=0.01):
> +    def parallel_transmit_ptks(self, pkt=None, intf='', send_times=1, interval=0.01):
>          """
>          Callable function for parallel processes
>          """
>          print GREEN("Transmitting and sniffing packets, please wait few minutes...")
> -        send_f(intf=intf, pkts=pkts, interval=interval)
> +        return pkt.send_pkt_bg(crb=self, tx_port=intf,
> + count=send_times, loop=0, interval=interval)
> 
>      def check_random_pkts(self, portList, pktnum=2000, interval=0.01,
> allow_miss=True, seq_check=False, params=None):
>          """
> @@ -653,79 +658,49 @@ class Tester(Crb):
>          # load functions in packet module
>          module = __import__("packet")
>          pkt_c = getattr(module, "Packet")
> -        send_f = getattr(module, "send_packets")
>          compare_f = getattr(module, "compare_pktload")
>          strip_f = getattr(module, "strip_pktload")
> -        save_f = getattr(module, "save_packets")
>          tx_pkts = {}
>          rx_inst = {}
>          # packet type random between tcp/udp/ipv6
>          random_type = ['TCP', 'UDP', 'IPv6_TCP', 'IPv6_UDP']
> -        pkt_minlen = {'TCP': 64, 'UDP': 64, 'IPv6_TCP': 74, 'IPv6_UDP': 64}
> -        # at least wait 2 seconds
> -        timeout = int(pktnum * (interval + 0.01)) + 2
>          for txport, rxport in portList:
> -            pkts = []
>              txIntf = self.get_interface(txport)
>              rxIntf = self.get_interface(rxport)
>              print GREEN("Preparing transmit packets, please wait few minutes...")
> -            for num in range(pktnum):
> -                # chose random packet
> -                pkt_type = random.choice(random_type)
> -                pkt = pkt_c(pkt_type=pkt_type,
> -                            pkt_len=random.randint(pkt_minlen[pkt_type], 1514),
> -                            ran_payload=True)
> -                # config packet if has parameters
> -                if params and len(portList) == len(params):
> -                    for param in params:
> -                        layer, config = param
> -                        pkt.config_layer(layer, config)
> -                # hardcode src/dst port for some protocol may cause issue
> -                if "TCP" in pkt_type:
> -                    pkt.config_layer('tcp', {'src': 65535, 'dst': 65535})
> -                else:
> -                    pkt.config_layer('udp', {'src': 65535, 'dst': 65535})
> -                # sequence saved in layer3 source ip
> -                if "IPv6" in pkt_type:
> -                    ip_str = convert_int2ip(num, 6)
> -                    pkt.config_layer('ipv6', {'src': ip_str})
> -                else:
> -                    ip_str = convert_int2ip(num, 4)
> -                    pkt.config_layer('ipv4', {'src': ip_str})
> +            pkt = pkt_c()
> +            pkt.generate_random_pkts(pktnum=pktnum, random_type=random_type,
> ip_increase=True, random_payload=True,
> +                                     options={"layers_config": params})
> 
> -                pkts.append(pkt)
> -            tx_pkts[txport] = pkts
> +            tx_pkts[txport] = pkt
> +            # sniff packets
> +            inst = module.start_tcpdump(self, rxIntf, count=pktnum,
> +                                        filters=[{'layer': 'network', 'config': {'srcport': '65535'}},
> +                                                 {'layer': 'network',
> + 'config': {'dstport': '65535'}}])
> 
> -            # send and sniff packets
> -            save_f(pkts=pkts, filename="/tmp/%s_tx.pcap" % txIntf)
> -            inst = self.tcpdump_sniff_packets(intf=rxIntf, count=pktnum,
> timeout=timeout, filters=
> -                [{'layer': 'network', 'config': {'srcport': '65535'}},
> -                 {'layer': 'network', 'config': {'dstport': '65535'}}])
>              rx_inst[rxport] = inst
> -
> -        # Transmit packet simultaneously
> -        processes = []
> +        filenames = []
>          for txport, _ in portList:
>              txIntf = self.get_interface(txport)
> -            processes.append(Process(target = self.parallel_transmit_ptks,
> -                             args=(send_f, txIntf, tx_pkts[txport], interval)))
> -
> -        for transmit_proc in processes:
> -            transmit_proc.start()
> -
> -        for transmit_proc in processes:
> -            transmit_proc.join()
> -
> +
> + filenames.append(self.parallel_transmit_ptks(pkt=tx_pkts[txport],
> + intf=txIntf, send_times=1, interval=interval))
>          # Verify all packets
> +        sleep(interval * pktnum + 1)
> +        flag = True
> +        while flag:
> +            for i in filenames:
> +                flag = self.send_expect('ps -ef |grep %s|grep -v grep' % i, expected='# ')
> +                if flag:
> +                    print('wait for the completion of sending pkts...')
> +                    sleep(1.5)
> +                    continue
>          prev_id = -1
>          for txport, rxport in portList:
> -            recv_pkts = self.load_tcpdump_sniff_packets(rx_inst[rxport])
> -
> +            p = module.stop_and_load_tcpdump_packets(rx_inst[rxport])
> +            recv_pkts = p.pktgen.pkts
>              # only report when received number not matched
> -            if len(tx_pkts[txport]) > len(recv_pkts):
> -                print ("Pkt number not matched,%d sent and %d received\n" \
> -                       % (len(tx_pkts[txport]), len(recv_pkts)))
> -
> +            if len(tx_pkts[txport].pktgen.pkts) > len(recv_pkts):
> +                print ("Pkt number not matched,%d sent and %d received\n" % (
> +                len(tx_pkts[txport].pktgen.pkts), len(recv_pkts)))
>                  if allow_miss is False:
>                      return False
> 
> @@ -733,9 +708,9 @@ class Tester(Crb):
>              print GREEN("Comparing sniffed packets, please wait few minutes...")
>              for idx in range(len(recv_pkts)):
>                  try:
> -                    l3_type = recv_pkts[idx].strip_element_layer2('type')
> -                    sip = recv_pkts[idx].strip_element_layer3('src')
> -                except:
> +                    l3_type = p.strip_element_layer2('type', p_index=idx)
> +                    sip = p.strip_element_layer3('dst', p_index=idx)
> +                except Exception as e:
>                      continue
>                  # ipv4 packet
>                  if l3_type == 2048:
> @@ -753,10 +728,10 @@ class Tester(Crb):
>                      else:
>                          prev_id = t_idx
> 
> -                if compare_f(tx_pkts[txport][t_idx], recv_pkts[idx], "L4") is False:
> +                if compare_f(tx_pkts[txport].pktgen.pkts[t_idx], recv_pkts[idx], "L4") is
> False:
>                      print "Pkt received index %d not match original " \
>                            "index %d" % (idx, t_idx)
> -                    print "Sent: %s" % strip_f(tx_pkts[txport][t_idx], "L4")
> +                    print "Sent: %s" %
> + strip_f(tx_pkts[txport].pktgen.pkts[t_idx], "L4")
>                      print "Recv: %s" % strip_f(recv_pkts[idx], "L4")
>                      return False
> 
> @@ -776,70 +751,24 @@ class Tester(Crb):
>              instance.__dict__ = self.ixia_packet_gen.__dict__
>              instance.__dict__.update(current_attrs)
> 
> -    def sendpkt_bg(self, localPort, dst_mac):
> -        """
> -        loop to Send packet in background, should call stop_sendpkt_bg to stop it.
> -        """
> -        itf = self.get_interface(localPort)
> -        src_mac = self.get_mac(localPort)
> -        script_str = "from scapy.all import *\n" + \
> -                     "sendp([Ether(dst='%s', src='%s')/IP(len=46)], iface='%s', loop=1)\n" %
> (dst_mac, src_mac, itf)
> -
> -        self.send_expect("rm -fr send_pkg_loop.py", "# ")
> -        f = open("send_pkt_loop.py", "w")
> -        f.write(script_str)
> -        f.close()
> -
> -        self.proc = subprocess.Popen(['python', 'send_pkt_loop.py'])
> -
> -    def stop_sendpkt_bg(self):
> -        """
> -        stop send_pkt_loop in background
> -        """
> -        if self.proc:
> -            self.proc.kill()
> -            self.proc = None
> -
> -    def tcpdump_sniff_packets(self, intf, count=0, timeout=5, filters=[]):
> +    def tcpdump_sniff_packets(self, intf, count=0, filters=None, lldp_forbid=True):
>          """
>          Wrapper for packet module sniff_packets
>          """
>          # load functions in packet module
> -        module = __import__("packet")
> -        sniff_f = getattr(module, "sniff_packets")
> -
> -        target=[]
> -        target.append(self.get_ip_address())
> -        target.append(self.get_username())
> -        target.append(self.get_password())
> -        return sniff_f(intf, count, timeout, filters, target)
> -
> -    def load_tcpdump_sniff_pcap(self, index=''):
> -        """
> -        Wrapper for packet module load_sniff_pcap
> -        """
> -        # load functions in packet module
> -        module = __import__("packet")
> -        load_pcap_f = getattr(module, "load_sniff_pcap")
> -
> -        target=[]
> -        target.append(self.get_ip_address())
> -        target.append(self.get_username())
> -        target.append(self.get_password())
> -        pcap = load_pcap_f(index, target)
> -        self.session.copy_file_from(pcap)
> -
> -        return pcap.split(os.sep)[-1]
> +        packet = __import__("packet")
> +        inst = packet.start_tcpdump(self, intf=intf, count=count, filters=filters,
> lldp_forbid=lldp_forbid)
> +        return inst
> 
> -    def load_tcpdump_sniff_packets(self, index=''):
> +    def load_tcpdump_sniff_packets(self, index='', timeout=1):
>          """
>          Wrapper for packet module load_pcapfile
>          """
>          # load functions in packet module
>          packet = __import__("packet")
> -        file = self.load_tcpdump_sniff_pcap(index)
> +        p = packet.stop_and_load_tcpdump_packets(index,
> + timeout=timeout)
> 
> -        return packet.load_pcapfile(file)
> +        return p
> 
>      def kill_all(self, killall=False):
>          """
> --
> 2.17.1


  reply	other threads:[~2019-10-08  2:22 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-09-27 18:05 [dts] [PATCH V1] tests/: update cases related to new framework Qimai Xiao
2019-09-27 18:05 ` [dts] [PATCH V1] framework/packet: update packet module of dts Qimai Xiao
2019-10-08  2:22   ` Chen, Zhaoyan
2019-10-12  5:30   ` Tu, Lijuan
2019-09-27 18:05 ` [dts] [PATCH V1] framework/tester: update tester " Qimai Xiao
2019-10-08  2:22   ` Chen, Zhaoyan [this message]
2019-10-12  5:30   ` Tu, Lijuan
2019-10-08  2:22 ` [dts] [PATCH V1] tests/: update cases related to new framework Chen, Zhaoyan
2019-10-12  5:30 ` Tu, Lijuan

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=9DEEADBC57E43F4DA73B571777FECECA41DD735F@SHSMSX104.ccr.corp.intel.com \
    --to=zhaoyan.chen@intel.com \
    --cc=dts@dpdk.org \
    --cc=qimaix.xiao@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).