From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by dpdk.org (Postfix) with ESMTP id D9FBE11DE for ; Mon, 11 Jul 2016 03:53:38 +0200 (CEST) Received: from orsmga003.jf.intel.com ([10.7.209.27]) by fmsmga101.fm.intel.com with ESMTP; 10 Jul 2016 18:53:38 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.28,344,1464678000"; d="scan'208";a="843860379" Received: from unknown (HELO dpdk-fedora20.icx.intel.com) ([10.238.55.12]) by orsmga003.jf.intel.com with ESMTP; 10 Jul 2016 18:53:37 -0700 From: Lijuan Tu To: dts@dpdk.org Cc: Lijuan Tu Date: Mon, 11 Jul 2016 09:49:08 +0800 Message-Id: <1468201748-42995-1-git-send-email-lijuanx.a.tu@intel.com> X-Mailer: git-send-email 1.9.3 Subject: [dts] [PATCH]tests vf_to_vf_nic_bridge:fix "killall tcpdump" won't get usefull infomation X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 11 Jul 2016 01:53:39 -0000 we use "killall tcpdump" to get "x packets captured" infomation before. but on some os ,it is invalid. Signed-off-by: Lijuan Tu --- tests/TestSuite_vf_to_vf_nic_bridge.py | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/tests/TestSuite_vf_to_vf_nic_bridge.py b/tests/TestSuite_vf_to_vf_nic_bridge.py index 4137404..9c5548b 100644 --- a/tests/TestSuite_vf_to_vf_nic_bridge.py +++ b/tests/TestSuite_vf_to_vf_nic_bridge.py @@ -187,7 +187,7 @@ class TestVF2VFBridge(TestCase): self.vm0_dut.restore_interfaces() self.vm0_ports = self.vm0_dut.get_ports('any') vf0_intf = self.vm0_dut.ports_info[self.vm0_ports[0]]['intf'] - self.vm0_dut.send_expect('tcpdump -i %s -s 1000 > /dev/null &' % vf0_intf, '#', 30) + self.vm0_dut.send_expect('tcpdump -i %s -s 1000 ' % vf0_intf, 'tcpdump', 30) self.vm1_ports = self.vm1_dut.get_ports('any') self.prepare_pktgen(self.vm1_dut) @@ -204,7 +204,7 @@ class TestVF2VFBridge(TestCase): self.send_stream_pktgen(self.vm1_dut) self.stop_stream_pktgen(self.vm1_dut) - recv_tcpdump = self.vm0_dut.send_expect('killall tcpdump', '#', 30) + recv_tcpdump = self.vm0_dut.send_expect('^C', '#', 30) time.sleep(5) recv_pattern = re.compile("(\d+) packets captured") recv_info = recv_pattern.search(recv_tcpdump) -- 2.5.0