From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id CED54A04EF; Mon, 1 Jun 2020 05:13:30 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id C59881D418; Mon, 1 Jun 2020 05:13:30 +0200 (CEST) Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by dpdk.org (Postfix) with ESMTP id 7B4191D410 for ; Mon, 1 Jun 2020 05:13:29 +0200 (CEST) IronPort-SDR: DcggDjbjZXlnt9/aBy1FEXRS8cvA0TCuqefgb49ZOiM9G6DkPn5Ub/hKSUqFr03iWBI2RgYTYZ sPWuv4f80PaA== X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga003.jf.intel.com ([10.7.209.27]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 31 May 2020 20:13:28 -0700 IronPort-SDR: pQ0ztqWjyGrKo9fkwHb1ogAncOFeTAq/l/nur4MaZYX9cQ+FYYJlwdf3Jvzz+uyuCYRbpjP65f p1VmbTwtocDQ== X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.73,459,1583222400"; d="scan'208";a="268179789" Received: from fmsmsx105.amr.corp.intel.com ([10.18.124.203]) by orsmga003.jf.intel.com with ESMTP; 31 May 2020 20:13:28 -0700 Received: from fmsmsx111.amr.corp.intel.com (10.18.116.5) by FMSMSX105.amr.corp.intel.com (10.18.124.203) with Microsoft SMTP Server (TLS) id 14.3.439.0; Sun, 31 May 2020 20:13:27 -0700 Received: from shsmsx154.ccr.corp.intel.com (10.239.6.54) by fmsmsx111.amr.corp.intel.com (10.18.116.5) with Microsoft SMTP Server (TLS) id 14.3.439.0; Sun, 31 May 2020 20:13:27 -0700 Received: from shsmsx101.ccr.corp.intel.com ([169.254.1.85]) by SHSMSX154.ccr.corp.intel.com ([169.254.7.221]) with mapi id 14.03.0439.000; Mon, 1 Jun 2020 11:13:25 +0800 From: "Tu, Lijuan" To: "Mo, YufengX" , "dts@dpdk.org" , "Yao, Lei A" CC: "Mo, YufengX" Thread-Topic: [dts] [PATCH V4 0/3] tests/malicious_driver_event_indication: upload test plan and automation script Thread-Index: AQHWMyZqAg2kjzLchkeygIAVSoFlSqjDHunQ Date: Mon, 1 Jun 2020 03:13:24 +0000 Message-ID: <8CE3E05A3F976642AAB0F4675D0AD20E0BC5660F@SHSMSX101.ccr.corp.intel.com> References: <20200526062601.17135-1-yufengx.mo@intel.com> In-Reply-To: <20200526062601.17135-1-yufengx.mo@intel.com> Accept-Language: zh-CN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.2.0.6 dlp-reaction: no-action x-originating-ip: [10.239.127.40] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [dts] [PATCH V4 0/3] tests/malicious_driver_event_indication: upload test plan and automation script X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" Applied the series, thanks > -----Original Message----- > From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of yufengmx > Sent: Tuesday, May 26, 2020 2:26 PM > To: dts@dpdk.org; Yao, Lei A > Cc: Mo, YufengX > Subject: [dts] [PATCH V4 0/3] tests/malicious_driver_event_indication: > upload test plan and automation script >=20 > Malicious driver event indication process in FVL PF driver. >=20 > v4: > - fix typo in test plan. >=20 > v3: > - rebase source code. >=20 > v2: > - change auto patch dpdk code method >=20 > yufengmx (3): > tests/malicious_driver_event_indication: upload automation script > tests/malicious_driver_event_indication: update test plan > tests/malicious_driver_event_indication: add test plan index >=20 > test_plans/index.rst | 1 + > ...ious_driver_event_indication_test_plan.rst | 96 > +++++ ...Suite_malicious_driver_event_indication.py | 335 > ++++++++++++++++++ > 3 files changed, 432 insertions(+) > create mode 100644 > test_plans/malicious_driver_event_indication_test_plan.rst > create mode 100644 tests/TestSuite_malicious_driver_event_indication.py >=20 > -- > 2.21.0