From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 33444A09E5; Tue, 8 Dec 2020 11:03:54 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 642F7C9A2; Tue, 8 Dec 2020 11:03:48 +0100 (CET) Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by dpdk.org (Postfix) with ESMTP id 2B6BAC926 for ; Tue, 8 Dec 2020 11:03:45 +0100 (CET) IronPort-SDR: PsLl2bAedTAU2AiAysGw3ag+j8+FB81DiFX88dEdRliqGLSU1XSvVSokiERCiVgxRmreMdD2iw DQRHTrP+EQ/Q== X-IronPort-AV: E=McAfee;i="6000,8403,9828"; a="171293352" X-IronPort-AV: E=Sophos;i="5.78,402,1599548400"; d="scan'208";a="171293352" Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Dec 2020 02:03:43 -0800 IronPort-SDR: VbxilmP93l1gcp51+E28FtMYJRQKajZohySA8X4KVFx11BW6LLBitQj6MNS7rPfAEbASqc3Ltp CUaoYCcyIfHQ== X-IronPort-AV: E=Sophos;i="5.78,402,1599548400"; d="scan'208";a="363575609" Received: from unknown (HELO localhost.localdomain) ([10.240.183.80]) by orsmga008-auth.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 08 Dec 2020 02:03:42 -0800 From: Zhou Jun To: dts@dpdk.org Cc: Zhou Jun Date: Tue, 8 Dec 2020 18:06:05 +0800 Message-Id: <20201208100627.9792-7-junx.w.zhou@intel.com> X-Mailer: git-send-email 2.17.1 In-Reply-To: <20201208100627.9792-1-junx.w.zhou@intel.com> References: <20201208100627.9792-1-junx.w.zhou@intel.com> Subject: [dts] [dts 06/28] tests/TestSuite_ipfrag:Modify the hard coded app parameter to call the platform interface X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" Signed-off-by: Zhou Jun --- tests/TestSuite_ipfrag.py | 7 ++----- 1 file changed, 2 insertions(+), 5 deletions(-) diff --git a/tests/TestSuite_ipfrag.py b/tests/TestSuite_ipfrag.py index ba64e168..84725dad 100644 --- a/tests/TestSuite_ipfrag.py +++ b/tests/TestSuite_ipfrag.py @@ -124,19 +124,16 @@ class TestIpfrag(TestCase): self.verify("No such file" not in out, "compilation error 2") cores = self.dut.get_core_list("1S/1C/2T") + self.eal_para = self.dut.create_eal_parameters(cores='1S/1C/2T') coremask = utils.create_mask(cores) portmask = utils.create_mask([P0, P1]) numPortThread = len([P0, P1]) / len(cores) result = True errString = '' - eal_param = "" - for i in [P0, P1]: - eal_param += " -w %s" % self.dut.ports_info[i]['pci'] # run ipv4_frag self.app_ip_fragmentation_path = self.dut.apps_name['ip_fragmentation'] - self.dut.send_expect("%s -c %s -n %d %s -- -p %s -q %s" % (self.app_ip_fragmentation_path, coremask, - self.dut.get_memory_channels(), eal_param, portmask, + self.dut.send_expect("%s %s -- -p %s -q %s" % (self.app_ip_fragmentation_path, self.eal_para, portmask, int(numPortThread)), "Link [Uu]p", 120) time.sleep(2) -- 2.17.1