* [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test
@ 2019-05-15 22:14 Xinfeng Zhao
2019-05-16 6:42 ` Zhao, XinfengX
` (2 more replies)
0 siblings, 3 replies; 4+ messages in thread
From: Xinfeng Zhao @ 2019-05-15 22:14 UTC (permalink / raw)
To: dts; +Cc: Xinfeng Zhao
Signed-off-by: Xinfeng Zhao <xinfengx.zhao@intel.com>
---
conf/virtio_ipsec_cryptodev_func.cfg | 51 ++++
tests/TestSuite_virtio_ipsec_cryptodev_func.py | 369 +++++++++++++++++++++++++
2 files changed, 420 insertions(+)
create mode 100644 conf/virtio_ipsec_cryptodev_func.cfg
create mode 100644 tests/TestSuite_virtio_ipsec_cryptodev_func.py
diff --git a/conf/virtio_ipsec_cryptodev_func.cfg b/conf/virtio_ipsec_cryptodev_func.cfg
new file mode 100644
index 0000000..2e727c6
--- /dev/null
+++ b/conf/virtio_ipsec_cryptodev_func.cfg
@@ -0,0 +1,51 @@
+[suite]
+# Cryptodev common options qat device id
+crypto_dev_id="37c9"
+
+# PCI Pass-through
+vfio_pci="0000:60:00.0 0000:60:00.1 0000:3b:00.0 0000:3b:00.1"
+
+# default crypto device and sw device config
+vdev="crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"
+
+[vm0]
+qemu =
+ path=/root/qemu-2/bin/qemu-system-x86_64;
+cpu =
+ model=host,number=4,cpupin=11 12 13 14;
+mem =
+ size=5120,hugepage=yes;
+crypto =
+ enable=yes,opt_num=2;
+daemon =
+ enable=yes;
+login =
+ user=root,password=tester;
+disk =
+ file=/root/VMs/virtio_crypto_test_710_1.img;
+vnc =
+ displayNum=1;
+device =
+ driver=vfio-pci,opt_host=0000:3b:00.0;
+ driver=vfio-pci,opt_host=0000:3b:00.1;
+
+[vm1]
+qemu =
+ path=/root/qemu-2/bin/qemu-system-x86_64;
+cpu =
+ model=host,number=4,cpupin=15 16 17 18;
+mem =
+ size=5120,hugepage=yes;
+crypto =
+ enable=yes,opt_num=2;
+daemon =
+ enable=yes;
+login =
+ user=root,password=tester;
+disk =
+ file=/root/VMs/virtio_crypto_test_710_2.img;
+vnc =
+ displayNum=2;
+device =
+ driver=vfio-pci,opt_host=0000:60:00.0;
+ driver=vfio-pci,opt_host=0000:60:00.1;
diff --git a/tests/TestSuite_virtio_ipsec_cryptodev_func.py b/tests/TestSuite_virtio_ipsec_cryptodev_func.py
new file mode 100644
index 0000000..d89a93d
--- /dev/null
+++ b/tests/TestSuite_virtio_ipsec_cryptodev_func.py
@@ -0,0 +1,369 @@
+# BSD LICENSE
+#
+# Copyright(c) <2019>, Intel Corporation. All rights reserved.
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without
+# modification, are permitted provided that the following conditions
+# are met:
+#
+# * Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# * Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in
+# the documentation and/or other materials provided with the
+# distribution.
+# * Neither the name of Intel Corporation nor the names of its
+# contributors may be used to endorse or promote products derived
+# from this software without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
+# A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
+# OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
+# SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
+# LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
+# DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
+# THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
+# (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
+# OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+"""
+DPDK Test suite
+Test DPDK vhost + virtio scenarios
+"""
+import os
+import utils
+import time
+import commands
+import binascii
+from test_case import TestCase
+from qemu_kvm import QEMUKvm
+import cryptodev_common as cc
+from packet import Packet
+
+class VirtioCryptodevIpsecTest(TestCase):
+ def set_up_all(self):
+ self.sample_app = "./examples/vhost_crypto/build/vhost-crypto"
+ self.user_app = "./examples/ipsec-secgw/build/ipsec-secgw "
+ self._default_ipsec_gw_opts = {
+ "p": "0x3",
+ "config": None,
+ "f": "ipsec_test.cfg",
+ "u": "0x1"
+ }
+
+ self.vm0, self.vm0_dut = None, None
+ self.vm1, self.vm1_dut = None, None
+ self.dut.skip_setup = True
+
+ self.dut_ports = self.dut.get_ports(self.nic)
+ self.cores = self.dut.get_core_list("1S/5C/1T")
+ self.mem_channel = self.dut.get_memory_channels()
+ self.port_mask = utils.create_mask([self.dut_ports[0]])
+
+ self.tx_port = self.tester.get_local_port(self.dut_ports[0])
+ self.rx_port = self.tester.get_local_port(self.dut_ports[1])
+
+ self.tx_interface = self.tester.get_interface(self.tx_port)
+ self.rx_interface = self.tester.get_interface(self.rx_port)
+
+ self.logger.info("tx interface = " + self.tx_interface)
+ self.logger.info("rx interface = " + self.rx_interface)
+
+ self.bind_script_path = self.dut.get_dpdk_bind_script()
+ self.vfio_pci = self.get_suite_cfg()["vfio_pci"]
+ for each in self.vfio_pci.split():
+ cmd = "echo {} > /sys/bus/pci/devices/{}/driver/unbind".format(each, each.replace(":", "\:"))
+ self.dut_execut_cmd(cmd)
+ self.dut.restore_interfaces()
+
+ if not cc.is_build_skip(self):
+ self.tar_dpdk()
+ self.dut.skip_setup = False
+ cc.build_dpdk_with_cryptodev(self)
+ self.build_vhost_app()
+ cc.bind_qat_device(self, "vfio-pci")
+
+ self.launch_vhost_switch()
+ self.bind_vfio_pci()
+
+ self.vm0, self.vm0_dut = self.launch_virtio_dut("vm0")
+ self.vm1, self.vm1_dut = self.launch_virtio_dut("vm1")
+
+ def set_up(self):
+ pass
+
+ def dut_execut_cmd(self, cmdline, ex='#', timout=30):
+ return self.dut.send_expect(cmdline, ex, timout)
+
+ def tar_dpdk(self):
+ self.dut_execut_cmd("tar -czf %s/dep/dpdk.tar.gz ../dpdk" % os.getcwd(), '#', 100)
+
+ def build_user_dpdk(self, user_dut):
+ user_dut.send_expect(
+ "sed -i 's/CONFIG_RTE_LIBRTE_PMD_AESNI_MB=n$/CONFIG_RTE_LIBRTE_PMD_AESNI_MB=y/' config/common_base", '#', 30)
+ out = user_dut.send_expect("make install T=%s" % self.target, "# ", 900)
+ self.logger.info(out)
+ assert ("Error" not in out), "Compilation error..."
+
+ def build_vhost_app(self):
+ out = self.dut.build_dpdk_apps("./examples/vhost_crypto")
+ self.verify("Error" not in out, "Compilation error")
+ self.verify("No such" not in out, "Compilation error")
+
+ def build_user_app(self, user_dut):
+ user_dut.send_expect("export RTE_SDK=`pwd`", '#', 30)
+ user_dut.send_expect("export RTE_TARGET=%s" % self.target, '#', 30)
+ out = user_dut.send_expect("make -C ./examples/ipsec-secgw", '#', 600)
+ self.logger.info(out)
+ self.verify("Error" not in out, "Compilation error")
+ self.verify("No such" not in out, "Compilation error")
+
+ def get_vhost_eal(self):
+ default_eal_opts = {
+ "c": None,
+ "l": ','.join(self.cores),
+ "w": None,
+ "vdev": None,
+ "config": None,
+ "socket-mem": "2048,0",
+ "n": self.mem_channel
+ }
+ opts = default_eal_opts.copy()
+
+ # Update options with test suite/case config file
+ for key in opts.keys():
+ if key in self.get_suite_cfg():
+ opts[key] = self.get_suite_cfg()[key]
+
+ # Generate option string
+ opt_str = ""
+ for key,value in opts.items():
+ if value is None:
+ continue
+ dash = "-" if len(key) == 1 else "--"
+ opt_str = opt_str + "{0}{1} {2} ".format(dash, key, value)
+
+ return opt_str
+
+ def cfg_prepare(self, dut):
+ """
+ ipsec configuration file
+ """
+ ep0 = (
+ "#SP IPv4 rules\n"
+ "sp ipv4 out esp protect 5 pri 1 dst 192.168.105.0/24 sport 0:65535 dport 0:65535\n"
+ "sp ipv4 in esp protect 105 pri 1 dst 192.168.115.0/24 sport 0:65535 dport 0:65535\n"
+
+ "#SA rules\n"
+ "sa out 5 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.1.5 dst 172.16.2.5\n"
+ "sa in 105 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.2.5 dst 172.16.1.5\n"
+
+ "#Routing rules\n"
+ "rt ipv4 dst 172.16.2.5/32 port 0\n"
+ "rt ipv4 dst 192.168.115.0/24 port 1\n")
+
+ ep1 = (
+ "#SP IPv4 rules\n"
+ "sp ipv4 in esp protect 5 pri 1 dst 192.168.105.0/24 sport 0:65535 dport 0:65535\n"
+ "sp ipv4 out esp protect 105 pri 1 dst 192.168.115.0/24 sport 0:65535 dport 0:65535\n"
+
+ "#SA rules\n"
+ "sa in 5 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.1.5 dst 172.16.2.5\n"
+ "sa out 105 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.2.5 dst 172.16.1.5\n"
+
+ "#Routing rules\n"
+ "rt ipv4 dst 172.16.1.5/32 port 0\n"
+ "rt ipv4 dst 192.168.105.0/24 port 1\n")
+
+ self.set_cfg(dut, 'ep0.cfg', ep0)
+ self.set_cfg(dut, 'ep1.cfg', ep1)
+
+ def set_cfg(self, dut, filename, cfg):
+ with open(filename, 'w') as f:
+ f.write(cfg)
+
+ dut.session.copy_file_to(filename, dut.base_dir)
+ dut.session.copy_file_to(filename, dut.base_dir)
+
+ def launch_vhost_switch(self):
+ eal_opt_str = self.get_vhost_eal()
+
+ config = '"(%s,0,0),(%s,0,0),(%s,0,0),(%s,0,0)"' % tuple(self.cores[-4:])
+ socket_file = "%s,/tmp/vm0_crypto0.sock\
+ --socket-file=%s,/tmp/vm0_crypto1.sock\
+ --socket-file=%s,/tmp/vm1_crypto0.sock\
+ --socket-file=%s,/tmp/vm1_crypto1.sock"% tuple(self.cores[-4:])
+ self.vhost_switch_cmd = cc.get_dpdk_app_cmd_str(self.sample_app, eal_opt_str,
+ '--config %s --socket-file %s' % (config, socket_file))
+
+ self.dut_execut_cmd("rm -r /tmp/*")
+ self.dut_execut_cmd(self.vhost_switch_cmd, "socket created", 30)
+
+ def bind_vfio_pci(self):
+ commands.getoutput("modprobe vfio-pci")
+ commands.getoutput('%s -b vfio-pci %s' % (os.path.join(self.dut.base_dir, self.bind_script_path), self.vfio_pci))
+
+ def set_virtio_pci(self, dut):
+ out = dut.send_expect("lspci -d:1054|awk '{{print $1}}'", "# ", 10)
+ virtio_list = out.replace("\r", "\n").replace("\n\n", "\n").split("\n")
+ dut.send_expect('modprobe uio_pci_generic', '#', 10)
+ for line in virtio_list:
+ cmd = "echo 0000:{} > /sys/bus/pci/devices/0000\:{}/driver/unbind".format(
+ line, line.replace(":", "\:"))
+ dut.send_expect(cmd, "# ", 10)
+ dut.send_expect('echo "1af4 1054" > /sys/bus/pci/drivers/uio_pci_generic/new_id', "# ", 10)
+
+ return virtio_list
+
+ def launch_virtio_dut(self, vm_name):
+ vm = QEMUKvm(self.dut, vm_name, 'virtio_ipsec_cryptodev_func')
+
+ try:
+ vm_dut = vm.start(set_target=False)
+ if vm_dut is None:
+ print('{} start failed'.format(vm_name))
+ except Exception as err:
+ raise err
+ vm_dut.restore_interfaces()
+
+ if not self.dut.skip_setup:
+ self.build_user_dpdk(vm_dut)
+ self.build_user_app(vm_dut)
+
+ vm_dut.setup_modules(self.target, "igb_uio", None)
+ vm_dut.bind_interfaces_linux('igb_uio')
+ vm.virtio_list = self.set_virtio_pci(vm_dut)
+ self.logger.info("{} virtio list: {}".format(vm_name, vm.virtio_list))
+ vm.cores = vm_dut.get_core_list("all")
+ self.logger.info("{} core list: {}".format(vm_name, vm.cores))
+ vm.ports = [port["pci"] for port in vm_dut.ports_info]
+ self.logger.info("{} port list: {}".format(vm_name, vm.ports))
+ self.cfg_prepare(vm_dut)
+
+ return vm, vm_dut
+
+ def send_and_dump_pkg(self):
+ status = True
+
+ inst = self.tester.tcpdump_sniff_packets(self.rx_interface, timeout=25)
+
+ PACKET_COUNT = 65
+ payload = 256 * ['11']
+
+ pkt = Packet()
+
+ pkt.assign_layers(["ether", "ipv4", "udp", "raw"])
+ pkt.config_layer("ether", {"src": "52:00:00:00:00:00", "dst": "52:00:00:00:00:01"})
+ src_ip = "192.168.105.200"
+ dst_ip = "192.168.105.100"
+ pkt.config_layer("ipv4", {"src": src_ip, "dst": dst_ip})
+ pkt.config_layer("udp", {"dst": 0})
+ pkt.config_layer("raw", {"payload": payload})
+ pkt.send_pkt(tx_port=self.tx_interface, count=PACKET_COUNT)
+
+ pkt_rec = self.tester.load_tcpdump_sniff_packets(inst)
+ self.logger.info("dump: {} packets".format(len(pkt_rec)))
+ if len(pkt_rec) != PACKET_COUNT:
+ self.logger.info("dump pkg: {}, the num of pkg dumped is incorrtct!".format(len(pkt_rec)))
+ status = False
+
+ for pkt_r in pkt_rec:
+ #pkt_r.pktgen.pkt.show()
+ if src_ip != pkt_r.pktgen.strip_layer3("src") or dst_ip != pkt_r.pktgen.strip_layer3("dst"):
+ self.logger.info("the ip of pkg dumped is incorrtct!")
+ status = False
+
+ dump_text = binascii.b2a_hex(pkt_r.pktgen.pkt["Raw"].getfieldval("load"))
+ if dump_text != ''.join(payload):
+ self.logger.info("the text of pkg dumped is incorrtct!")
+ status = False
+
+ return status
+
+ def test_aesni_mb_aes_cbc_sha1_hmac(self):
+ if cc.is_test_skip(self):
+ return
+
+ eal_opt_str_0 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm0.cores[-3:]),
+ "socket-mem":"512,0",
+ "w": " -w ".join(self.vm0.ports),
+ "vdev":"crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"})
+
+ crypto_ipsec_opt_str0 = cc.get_opt_str(self, self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep0.cfg", "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm0.cores[-2:])})
+
+ out0 = self._run_crypto_ipsec(self.vm0_dut, eal_opt_str_0, crypto_ipsec_opt_str0)
+ self.logger.info(out0)
+
+ eal_opt_str_1 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm1.cores[-3:]),
+ "socket-mem":"512,0",
+ "w": " -w ".join(self.vm1.ports),
+ "vdev": "crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"})
+
+ crypto_ipsec_opt_str1 = cc.get_opt_str(self, self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep1.cfg", "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm1.cores[-2:])})
+ out1 = self._run_crypto_ipsec(self.vm1_dut, eal_opt_str_1, crypto_ipsec_opt_str1)
+ self.logger.info(out1)
+
+ result = self.send_and_dump_pkg()
+ self.verify(result, "FAILED")
+
+ def test_virtio_aes_cbc_sha1_hmac(self):
+ if cc.is_test_skip(self):
+ return
+
+ eal_opt_str_0 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm0.cores[-3:]),
+ "socket-mem":"512,0",
+ "w": " -w ".join(self.vm0.ports + self.vm0.virtio_list),
+ "vdev":None})
+
+ crypto_ipsec_opt_str0 = cc.get_opt_str(self, self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep0.cfg", "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm0.cores[-2:])})
+ out0 = self._run_crypto_ipsec(self.vm0_dut, eal_opt_str_0, crypto_ipsec_opt_str0)
+ self.logger.info(out0)
+
+ eal_opt_str_1 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm1.cores[-3:]),
+ "socket-mem":"512,0",
+ "w": " -w ".join(self.vm1.ports + self.vm1.virtio_list),
+ "vdev": None})
+
+ crypto_ipsec_opt_str1 = cc.get_opt_str(self, self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep1.cfg", "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm1.cores[-2:])})
+ out1 = self._run_crypto_ipsec(self.vm1_dut, eal_opt_str_1, crypto_ipsec_opt_str1)
+ self.logger.info(out1)
+
+ result = self.send_and_dump_pkg()
+ self.verify(result, "FAILED")
+
+ def _run_crypto_ipsec(self, vm_dut, eal_opt_str, case_opt_str):
+ cmd_str = cc.get_dpdk_app_cmd_str(self.user_app,
+ eal_opt_str,
+ case_opt_str + " -l")
+ self.logger.info(cmd_str)
+ try:
+ out = vm_dut.send_expect(cmd_str, "IPSEC", 600)
+ except Exception, ex:
+ self.logger.error(ex)
+ raise ex
+
+ return out
+
+ def tear_down(self):
+ self.vm0_dut.send_expect("^C", "# ")
+ self.vm1_dut.send_expect("^C", "# ")
+
+ def tear_down_all(self):
+ if self.vm0:
+ self.vm0.stop()
+ self.dut.virt_exit()
+ self.vm0 = None
+
+ if self.vm1:
+ self.vm1.stop()
+ self.dut.virt_exit()
+ self.vm1 = None
+
+ self.dut_execut_cmd("^C", "# ")
+ self.dut_execut_cmd("killall -s INT vhost-crypto")
+ self.dut_execut_cmd("killall -s INT qemu-system-x86_64")
+ self.dut_execut_cmd("rm -r /tmp/*")
+
+ cc.clear_dpdk_config(self)
--
2.7.4
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test
2019-05-15 22:14 [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test Xinfeng Zhao
@ 2019-05-16 6:42 ` Zhao, XinfengX
2019-05-22 8:48 ` Tu, Lijuan
2019-05-27 1:01 ` Chen, Zhaoyan
2 siblings, 0 replies; 4+ messages in thread
From: Zhao, XinfengX @ 2019-05-16 6:42 UTC (permalink / raw)
To: dts
Tested-by: Zhao, XinfengX <xinfengx.zhao@intel.com>
-----Original Message-----
From: Zhao, XinfengX
Sent: Thursday, May 16, 2019 6:15 AM
To: dts@dpdk.org
Cc: Zhao, XinfengX <xinfengx.zhao@intel.com>
Subject: [dts][PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test
Signed-off-by: Xinfeng Zhao <xinfengx.zhao@intel.com>
---
conf/virtio_ipsec_cryptodev_func.cfg | 51 ++++
tests/TestSuite_virtio_ipsec_cryptodev_func.py | 369 +++++++++++++++++++++++++
2 files changed, 420 insertions(+)
create mode 100644 conf/virtio_ipsec_cryptodev_func.cfg
create mode 100644 tests/TestSuite_virtio_ipsec_cryptodev_func.py
diff --git a/conf/virtio_ipsec_cryptodev_func.cfg b/conf/virtio_ipsec_cryptodev_func.cfg
new file mode 100644
index 0000000..2e727c6
--- /dev/null
+++ b/conf/virtio_ipsec_cryptodev_func.cfg
@@ -0,0 +1,51 @@
+[suite]
+# Cryptodev common options qat device id crypto_dev_id="37c9"
+
+# PCI Pass-through
+vfio_pci="0000:60:00.0 0000:60:00.1 0000:3b:00.0 0000:3b:00.1"
+
+# default crypto device and sw device config
+vdev="crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"
+
+[vm0]
+qemu =
+ path=/root/qemu-2/bin/qemu-system-x86_64;
+cpu =
+ model=host,number=4,cpupin=11 12 13 14; mem =
+ size=5120,hugepage=yes;
+crypto =
+ enable=yes,opt_num=2;
+daemon =
+ enable=yes;
+login =
+ user=root,password=tester;
+disk =
+ file=/root/VMs/virtio_crypto_test_710_1.img;
+vnc =
+ displayNum=1;
+device =
+ driver=vfio-pci,opt_host=0000:3b:00.0;
+ driver=vfio-pci,opt_host=0000:3b:00.1;
+
+[vm1]
+qemu =
+ path=/root/qemu-2/bin/qemu-system-x86_64;
+cpu =
+ model=host,number=4,cpupin=15 16 17 18; mem =
+ size=5120,hugepage=yes;
+crypto =
+ enable=yes,opt_num=2;
+daemon =
+ enable=yes;
+login =
+ user=root,password=tester;
+disk =
+ file=/root/VMs/virtio_crypto_test_710_2.img;
+vnc =
+ displayNum=2;
+device =
+ driver=vfio-pci,opt_host=0000:60:00.0;
+ driver=vfio-pci,opt_host=0000:60:00.1;
diff --git a/tests/TestSuite_virtio_ipsec_cryptodev_func.py b/tests/TestSuite_virtio_ipsec_cryptodev_func.py
new file mode 100644
index 0000000..d89a93d
--- /dev/null
+++ b/tests/TestSuite_virtio_ipsec_cryptodev_func.py
@@ -0,0 +1,369 @@
+# BSD LICENSE
+#
+# Copyright(c) <2019>, Intel Corporation. All rights reserved.
+# All rights reserved.
+#
+# Redistribution and use in source and binary forms, with or without #
+modification, are permitted provided that the following conditions #
+are met:
+#
+# * Redistributions of source code must retain the above copyright
+# notice, this list of conditions and the following disclaimer.
+# * Redistributions in binary form must reproduce the above copyright
+# notice, this list of conditions and the following disclaimer in
+# the documentation and/or other materials provided with the
+# distribution.
+# * Neither the name of Intel Corporation nor the names of its
+# contributors may be used to endorse or promote products derived
+# from this software without specific prior written permission.
+#
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS #
+"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT #
+LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR #
+A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT #
+OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, #
+SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT #
+LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, #
+DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY #
+THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT #
+(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE #
+OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+"""
+DPDK Test suite
+Test DPDK vhost + virtio scenarios
+"""
+import os
+import utils
+import time
+import commands
+import binascii
+from test_case import TestCase
+from qemu_kvm import QEMUKvm
+import cryptodev_common as cc
+from packet import Packet
+
+class VirtioCryptodevIpsecTest(TestCase):
+ def set_up_all(self):
+ self.sample_app = "./examples/vhost_crypto/build/vhost-crypto"
+ self.user_app = "./examples/ipsec-secgw/build/ipsec-secgw "
+ self._default_ipsec_gw_opts = {
+ "p": "0x3",
+ "config": None,
+ "f": "ipsec_test.cfg",
+ "u": "0x1"
+ }
+
+ self.vm0, self.vm0_dut = None, None
+ self.vm1, self.vm1_dut = None, None
+ self.dut.skip_setup = True
+
+ self.dut_ports = self.dut.get_ports(self.nic)
+ self.cores = self.dut.get_core_list("1S/5C/1T")
+ self.mem_channel = self.dut.get_memory_channels()
+ self.port_mask = utils.create_mask([self.dut_ports[0]])
+
+ self.tx_port = self.tester.get_local_port(self.dut_ports[0])
+ self.rx_port = self.tester.get_local_port(self.dut_ports[1])
+
+ self.tx_interface = self.tester.get_interface(self.tx_port)
+ self.rx_interface = self.tester.get_interface(self.rx_port)
+
+ self.logger.info("tx interface = " + self.tx_interface)
+ self.logger.info("rx interface = " + self.rx_interface)
+
+ self.bind_script_path = self.dut.get_dpdk_bind_script()
+ self.vfio_pci = self.get_suite_cfg()["vfio_pci"]
+ for each in self.vfio_pci.split():
+ cmd = "echo {} > /sys/bus/pci/devices/{}/driver/unbind".format(each, each.replace(":", "\:"))
+ self.dut_execut_cmd(cmd)
+ self.dut.restore_interfaces()
+
+ if not cc.is_build_skip(self):
+ self.tar_dpdk()
+ self.dut.skip_setup = False
+ cc.build_dpdk_with_cryptodev(self)
+ self.build_vhost_app()
+ cc.bind_qat_device(self, "vfio-pci")
+
+ self.launch_vhost_switch()
+ self.bind_vfio_pci()
+
+ self.vm0, self.vm0_dut = self.launch_virtio_dut("vm0")
+ self.vm1, self.vm1_dut = self.launch_virtio_dut("vm1")
+
+ def set_up(self):
+ pass
+
+ def dut_execut_cmd(self, cmdline, ex='#', timout=30):
+ return self.dut.send_expect(cmdline, ex, timout)
+
+ def tar_dpdk(self):
+ self.dut_execut_cmd("tar -czf %s/dep/dpdk.tar.gz ../dpdk" %
+ os.getcwd(), '#', 100)
+
+ def build_user_dpdk(self, user_dut):
+ user_dut.send_expect(
+ "sed -i 's/CONFIG_RTE_LIBRTE_PMD_AESNI_MB=n$/CONFIG_RTE_LIBRTE_PMD_AESNI_MB=y/' config/common_base", '#', 30)
+ out = user_dut.send_expect("make install T=%s" % self.target, "# ", 900)
+ self.logger.info(out)
+ assert ("Error" not in out), "Compilation error..."
+
+ def build_vhost_app(self):
+ out = self.dut.build_dpdk_apps("./examples/vhost_crypto")
+ self.verify("Error" not in out, "Compilation error")
+ self.verify("No such" not in out, "Compilation error")
+
+ def build_user_app(self, user_dut):
+ user_dut.send_expect("export RTE_SDK=`pwd`", '#', 30)
+ user_dut.send_expect("export RTE_TARGET=%s" % self.target, '#', 30)
+ out = user_dut.send_expect("make -C ./examples/ipsec-secgw", '#', 600)
+ self.logger.info(out)
+ self.verify("Error" not in out, "Compilation error")
+ self.verify("No such" not in out, "Compilation error")
+
+ def get_vhost_eal(self):
+ default_eal_opts = {
+ "c": None,
+ "l": ','.join(self.cores),
+ "w": None,
+ "vdev": None,
+ "config": None,
+ "socket-mem": "2048,0",
+ "n": self.mem_channel
+ }
+ opts = default_eal_opts.copy()
+
+ # Update options with test suite/case config file
+ for key in opts.keys():
+ if key in self.get_suite_cfg():
+ opts[key] = self.get_suite_cfg()[key]
+
+ # Generate option string
+ opt_str = ""
+ for key,value in opts.items():
+ if value is None:
+ continue
+ dash = "-" if len(key) == 1 else "--"
+ opt_str = opt_str + "{0}{1} {2} ".format(dash, key, value)
+
+ return opt_str
+
+ def cfg_prepare(self, dut):
+ """
+ ipsec configuration file
+ """
+ ep0 = (
+ "#SP IPv4 rules\n"
+ "sp ipv4 out esp protect 5 pri 1 dst 192.168.105.0/24 sport 0:65535 dport 0:65535\n"
+ "sp ipv4 in esp protect 105 pri 1 dst 192.168.115.0/24 sport 0:65535 dport 0:65535\n"
+
+ "#SA rules\n"
+ "sa out 5 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.1.5 dst 172.16.2.5\n"
+ "sa in 105 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.2.5 dst 172.16.1.5\n"
+
+ "#Routing rules\n"
+ "rt ipv4 dst 172.16.2.5/32 port 0\n"
+ "rt ipv4 dst 192.168.115.0/24 port 1\n")
+
+ ep1 = (
+ "#SP IPv4 rules\n"
+ "sp ipv4 in esp protect 5 pri 1 dst 192.168.105.0/24 sport 0:65535 dport 0:65535\n"
+ "sp ipv4 out esp protect 105 pri 1 dst 192.168.115.0/24 sport 0:65535 dport 0:65535\n"
+
+ "#SA rules\n"
+ "sa in 5 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.1.5 dst 172.16.2.5\n"
+ "sa out 105 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.2.5 dst 172.16.1.5\n"
+
+ "#Routing rules\n"
+ "rt ipv4 dst 172.16.1.5/32 port 0\n"
+ "rt ipv4 dst 192.168.105.0/24 port 1\n")
+
+ self.set_cfg(dut, 'ep0.cfg', ep0)
+ self.set_cfg(dut, 'ep1.cfg', ep1)
+
+ def set_cfg(self, dut, filename, cfg):
+ with open(filename, 'w') as f:
+ f.write(cfg)
+
+ dut.session.copy_file_to(filename, dut.base_dir)
+ dut.session.copy_file_to(filename, dut.base_dir)
+
+ def launch_vhost_switch(self):
+ eal_opt_str = self.get_vhost_eal()
+
+ config = '"(%s,0,0),(%s,0,0),(%s,0,0),(%s,0,0)"' % tuple(self.cores[-4:])
+ socket_file = "%s,/tmp/vm0_crypto0.sock\
+ --socket-file=%s,/tmp/vm0_crypto1.sock\
+ --socket-file=%s,/tmp/vm1_crypto0.sock\
+ --socket-file=%s,/tmp/vm1_crypto1.sock"% tuple(self.cores[-4:])
+ self.vhost_switch_cmd = cc.get_dpdk_app_cmd_str(self.sample_app, eal_opt_str,
+ '--config %s --socket-file %s' %
+ (config, socket_file))
+
+ self.dut_execut_cmd("rm -r /tmp/*")
+ self.dut_execut_cmd(self.vhost_switch_cmd, "socket created",
+ 30)
+
+ def bind_vfio_pci(self):
+ commands.getoutput("modprobe vfio-pci")
+ commands.getoutput('%s -b vfio-pci %s' %
+ (os.path.join(self.dut.base_dir, self.bind_script_path),
+ self.vfio_pci))
+
+ def set_virtio_pci(self, dut):
+ out = dut.send_expect("lspci -d:1054|awk '{{print $1}}'", "# ", 10)
+ virtio_list = out.replace("\r", "\n").replace("\n\n", "\n").split("\n")
+ dut.send_expect('modprobe uio_pci_generic', '#', 10)
+ for line in virtio_list:
+ cmd = "echo 0000:{} > /sys/bus/pci/devices/0000\:{}/driver/unbind".format(
+ line, line.replace(":", "\:"))
+ dut.send_expect(cmd, "# ", 10)
+ dut.send_expect('echo "1af4 1054" >
+ /sys/bus/pci/drivers/uio_pci_generic/new_id', "# ", 10)
+
+ return virtio_list
+
+ def launch_virtio_dut(self, vm_name):
+ vm = QEMUKvm(self.dut, vm_name, 'virtio_ipsec_cryptodev_func')
+
+ try:
+ vm_dut = vm.start(set_target=False)
+ if vm_dut is None:
+ print('{} start failed'.format(vm_name))
+ except Exception as err:
+ raise err
+ vm_dut.restore_interfaces()
+
+ if not self.dut.skip_setup:
+ self.build_user_dpdk(vm_dut)
+ self.build_user_app(vm_dut)
+
+ vm_dut.setup_modules(self.target, "igb_uio", None)
+ vm_dut.bind_interfaces_linux('igb_uio')
+ vm.virtio_list = self.set_virtio_pci(vm_dut)
+ self.logger.info("{} virtio list: {}".format(vm_name, vm.virtio_list))
+ vm.cores = vm_dut.get_core_list("all")
+ self.logger.info("{} core list: {}".format(vm_name, vm.cores))
+ vm.ports = [port["pci"] for port in vm_dut.ports_info]
+ self.logger.info("{} port list: {}".format(vm_name, vm.ports))
+ self.cfg_prepare(vm_dut)
+
+ return vm, vm_dut
+
+ def send_and_dump_pkg(self):
+ status = True
+
+ inst = self.tester.tcpdump_sniff_packets(self.rx_interface,
+ timeout=25)
+
+ PACKET_COUNT = 65
+ payload = 256 * ['11']
+
+ pkt = Packet()
+
+ pkt.assign_layers(["ether", "ipv4", "udp", "raw"])
+ pkt.config_layer("ether", {"src": "52:00:00:00:00:00", "dst": "52:00:00:00:00:01"})
+ src_ip = "192.168.105.200"
+ dst_ip = "192.168.105.100"
+ pkt.config_layer("ipv4", {"src": src_ip, "dst": dst_ip})
+ pkt.config_layer("udp", {"dst": 0})
+ pkt.config_layer("raw", {"payload": payload})
+ pkt.send_pkt(tx_port=self.tx_interface, count=PACKET_COUNT)
+
+ pkt_rec = self.tester.load_tcpdump_sniff_packets(inst)
+ self.logger.info("dump: {} packets".format(len(pkt_rec)))
+ if len(pkt_rec) != PACKET_COUNT:
+ self.logger.info("dump pkg: {}, the num of pkg dumped is incorrtct!".format(len(pkt_rec)))
+ status = False
+
+ for pkt_r in pkt_rec:
+ #pkt_r.pktgen.pkt.show()
+ if src_ip != pkt_r.pktgen.strip_layer3("src") or dst_ip != pkt_r.pktgen.strip_layer3("dst"):
+ self.logger.info("the ip of pkg dumped is incorrtct!")
+ status = False
+
+ dump_text = binascii.b2a_hex(pkt_r.pktgen.pkt["Raw"].getfieldval("load"))
+ if dump_text != ''.join(payload):
+ self.logger.info("the text of pkg dumped is incorrtct!")
+ status = False
+
+ return status
+
+ def test_aesni_mb_aes_cbc_sha1_hmac(self):
+ if cc.is_test_skip(self):
+ return
+
+ eal_opt_str_0 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm0.cores[-3:]),
+ "socket-mem":"512,0",
+ "w": " -w ".join(self.vm0.ports),
+
+ "vdev":"crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"})
+
+ crypto_ipsec_opt_str0 = cc.get_opt_str(self,
+ self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep0.cfg",
+ "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm0.cores[-2:])})
+
+ out0 = self._run_crypto_ipsec(self.vm0_dut, eal_opt_str_0, crypto_ipsec_opt_str0)
+ self.logger.info(out0)
+
+ eal_opt_str_1 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm1.cores[-3:]),
+ "socket-mem":"512,0",
+ "w": " -w ".join(self.vm1.ports),
+ "vdev":
+ "crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"})
+
+ crypto_ipsec_opt_str1 = cc.get_opt_str(self, self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep1.cfg", "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm1.cores[-2:])})
+ out1 = self._run_crypto_ipsec(self.vm1_dut, eal_opt_str_1, crypto_ipsec_opt_str1)
+ self.logger.info(out1)
+
+ result = self.send_and_dump_pkg()
+ self.verify(result, "FAILED")
+
+ def test_virtio_aes_cbc_sha1_hmac(self):
+ if cc.is_test_skip(self):
+ return
+
+ eal_opt_str_0 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm0.cores[-3:]),
+ "socket-mem":"512,0",
+ "w": " -w ".join(self.vm0.ports + self.vm0.virtio_list),
+ "vdev":None})
+
+ crypto_ipsec_opt_str0 = cc.get_opt_str(self, self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep0.cfg", "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm0.cores[-2:])})
+ out0 = self._run_crypto_ipsec(self.vm0_dut, eal_opt_str_0, crypto_ipsec_opt_str0)
+ self.logger.info(out0)
+
+ eal_opt_str_1 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm1.cores[-3:]),
+ "socket-mem":"512,0",
+ "w": " -w ".join(self.vm1.ports + self.vm1.virtio_list),
+ "vdev": None})
+
+ crypto_ipsec_opt_str1 = cc.get_opt_str(self, self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep1.cfg", "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm1.cores[-2:])})
+ out1 = self._run_crypto_ipsec(self.vm1_dut, eal_opt_str_1, crypto_ipsec_opt_str1)
+ self.logger.info(out1)
+
+ result = self.send_and_dump_pkg()
+ self.verify(result, "FAILED")
+
+ def _run_crypto_ipsec(self, vm_dut, eal_opt_str, case_opt_str):
+ cmd_str = cc.get_dpdk_app_cmd_str(self.user_app,
+ eal_opt_str,
+ case_opt_str + " -l")
+ self.logger.info(cmd_str)
+ try:
+ out = vm_dut.send_expect(cmd_str, "IPSEC", 600)
+ except Exception, ex:
+ self.logger.error(ex)
+ raise ex
+
+ return out
+
+ def tear_down(self):
+ self.vm0_dut.send_expect("^C", "# ")
+ self.vm1_dut.send_expect("^C", "# ")
+
+ def tear_down_all(self):
+ if self.vm0:
+ self.vm0.stop()
+ self.dut.virt_exit()
+ self.vm0 = None
+
+ if self.vm1:
+ self.vm1.stop()
+ self.dut.virt_exit()
+ self.vm1 = None
+
+ self.dut_execut_cmd("^C", "# ")
+ self.dut_execut_cmd("killall -s INT vhost-crypto")
+ self.dut_execut_cmd("killall -s INT qemu-system-x86_64")
+ self.dut_execut_cmd("rm -r /tmp/*")
+
+ cc.clear_dpdk_config(self)
--
2.7.4
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test
2019-05-15 22:14 [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test Xinfeng Zhao
2019-05-16 6:42 ` Zhao, XinfengX
@ 2019-05-22 8:48 ` Tu, Lijuan
2019-05-27 1:01 ` Chen, Zhaoyan
2 siblings, 0 replies; 4+ messages in thread
From: Tu, Lijuan @ 2019-05-22 8:48 UTC (permalink / raw)
To: Zhao, XinfengX, dts; +Cc: Zhao, XinfengX
Applied, thanks
> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Xinfeng Zhao
> Sent: Thursday, May 16, 2019 6:15 AM
> To: dts@dpdk.org
> Cc: Zhao, XinfengX <xinfengx.zhao@intel.com>
> Subject: [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio
> ipsec test
>
> Signed-off-by: Xinfeng Zhao <xinfengx.zhao@intel.com>
> ---
> conf/virtio_ipsec_cryptodev_func.cfg | 51 ++++
> tests/TestSuite_virtio_ipsec_cryptodev_func.py | 369
> +++++++++++++++++++++++++
> 2 files changed, 420 insertions(+)
> create mode 100644 conf/virtio_ipsec_cryptodev_func.cfg
> create mode 100644 tests/TestSuite_virtio_ipsec_cryptodev_func.py
>
> diff --git a/conf/virtio_ipsec_cryptodev_func.cfg
> b/conf/virtio_ipsec_cryptodev_func.cfg
> new file mode 100644
> index 0000000..2e727c6
> --- /dev/null
> +++ b/conf/virtio_ipsec_cryptodev_func.cfg
> @@ -0,0 +1,51 @@
> +[suite]
> +# Cryptodev common options qat device id crypto_dev_id="37c9"
> +
> +# PCI Pass-through
> +vfio_pci="0000:60:00.0 0000:60:00.1 0000:3b:00.0 0000:3b:00.1"
> +
> +# default crypto device and sw device config
> +vdev="crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"
> +
> +[vm0]
> +qemu =
> + path=/root/qemu-2/bin/qemu-system-x86_64;
> +cpu =
> + model=host,number=4,cpupin=11 12 13 14; mem =
> + size=5120,hugepage=yes;
> +crypto =
> + enable=yes,opt_num=2;
> +daemon =
> + enable=yes;
> +login =
> + user=root,password=tester;
> +disk =
> + file=/root/VMs/virtio_crypto_test_710_1.img;
> +vnc =
> + displayNum=1;
> +device =
> + driver=vfio-pci,opt_host=0000:3b:00.0;
> + driver=vfio-pci,opt_host=0000:3b:00.1;
> +
> +[vm1]
> +qemu =
> + path=/root/qemu-2/bin/qemu-system-x86_64;
> +cpu =
> + model=host,number=4,cpupin=15 16 17 18; mem =
> + size=5120,hugepage=yes;
> +crypto =
> + enable=yes,opt_num=2;
> +daemon =
> + enable=yes;
> +login =
> + user=root,password=tester;
> +disk =
> + file=/root/VMs/virtio_crypto_test_710_2.img;
> +vnc =
> + displayNum=2;
> +device =
> + driver=vfio-pci,opt_host=0000:60:00.0;
> + driver=vfio-pci,opt_host=0000:60:00.1;
> diff --git a/tests/TestSuite_virtio_ipsec_cryptodev_func.py
> b/tests/TestSuite_virtio_ipsec_cryptodev_func.py
> new file mode 100644
> index 0000000..d89a93d
> --- /dev/null
> +++ b/tests/TestSuite_virtio_ipsec_cryptodev_func.py
> @@ -0,0 +1,369 @@
> +# BSD LICENSE
> +#
> +# Copyright(c) <2019>, Intel Corporation. All rights reserved.
> +# All rights reserved.
> +#
> +# Redistribution and use in source and binary forms, with or without #
> +modification, are permitted provided that the following conditions #
> +are met:
> +#
> +# * Redistributions of source code must retain the above copyright
> +# notice, this list of conditions and the following disclaimer.
> +# * Redistributions in binary form must reproduce the above copyright
> +# notice, this list of conditions and the following disclaimer in
> +# the documentation and/or other materials provided with the
> +# distribution.
> +# * Neither the name of Intel Corporation nor the names of its
> +# contributors may be used to endorse or promote products derived
> +# from this software without specific prior written permission.
> +#
> +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS #
> +"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT #
> +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
> FOR #
> +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
> COPYRIGHT #
> +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
> INCIDENTAL, #
> +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
> #
> +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF
> USE, #
> +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND
> ON ANY #
> +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT #
> +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE
> USE #
> +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +"""
> +DPDK Test suite
> +Test DPDK vhost + virtio scenarios
> +"""
> +import os
> +import utils
> +import time
> +import commands
> +import binascii
> +from test_case import TestCase
> +from qemu_kvm import QEMUKvm
> +import cryptodev_common as cc
> +from packet import Packet
> +
> +class VirtioCryptodevIpsecTest(TestCase):
> + def set_up_all(self):
> + self.sample_app = "./examples/vhost_crypto/build/vhost-crypto"
> + self.user_app = "./examples/ipsec-secgw/build/ipsec-secgw "
> + self._default_ipsec_gw_opts = {
> + "p": "0x3",
> + "config": None,
> + "f": "ipsec_test.cfg",
> + "u": "0x1"
> + }
> +
> + self.vm0, self.vm0_dut = None, None
> + self.vm1, self.vm1_dut = None, None
> + self.dut.skip_setup = True
> +
> + self.dut_ports = self.dut.get_ports(self.nic)
> + self.cores = self.dut.get_core_list("1S/5C/1T")
> + self.mem_channel = self.dut.get_memory_channels()
> + self.port_mask = utils.create_mask([self.dut_ports[0]])
> +
> + self.tx_port = self.tester.get_local_port(self.dut_ports[0])
> + self.rx_port = self.tester.get_local_port(self.dut_ports[1])
> +
> + self.tx_interface = self.tester.get_interface(self.tx_port)
> + self.rx_interface = self.tester.get_interface(self.rx_port)
> +
> + self.logger.info("tx interface = " + self.tx_interface)
> + self.logger.info("rx interface = " + self.rx_interface)
> +
> + self.bind_script_path = self.dut.get_dpdk_bind_script()
> + self.vfio_pci = self.get_suite_cfg()["vfio_pci"]
> + for each in self.vfio_pci.split():
> + cmd = "echo {} > /sys/bus/pci/devices/{}/driver/unbind".format(each,
> each.replace(":", "\:"))
> + self.dut_execut_cmd(cmd)
> + self.dut.restore_interfaces()
> +
> + if not cc.is_build_skip(self):
> + self.tar_dpdk()
> + self.dut.skip_setup = False
> + cc.build_dpdk_with_cryptodev(self)
> + self.build_vhost_app()
> + cc.bind_qat_device(self, "vfio-pci")
> +
> + self.launch_vhost_switch()
> + self.bind_vfio_pci()
> +
> + self.vm0, self.vm0_dut = self.launch_virtio_dut("vm0")
> + self.vm1, self.vm1_dut = self.launch_virtio_dut("vm1")
> +
> + def set_up(self):
> + pass
> +
> + def dut_execut_cmd(self, cmdline, ex='#', timout=30):
> + return self.dut.send_expect(cmdline, ex, timout)
> +
> + def tar_dpdk(self):
> + self.dut_execut_cmd("tar -czf %s/dep/dpdk.tar.gz ../dpdk" %
> + os.getcwd(), '#', 100)
> +
> + def build_user_dpdk(self, user_dut):
> + user_dut.send_expect(
> + "sed -i
> 's/CONFIG_RTE_LIBRTE_PMD_AESNI_MB=n$/CONFIG_RTE_LIBRTE_PMD_AES
> NI_MB=y/' config/common_base", '#', 30)
> + out = user_dut.send_expect("make install T=%s" % self.target, "# ", 900)
> + self.logger.info(out)
> + assert ("Error" not in out), "Compilation error..."
> +
> + def build_vhost_app(self):
> + out = self.dut.build_dpdk_apps("./examples/vhost_crypto")
> + self.verify("Error" not in out, "Compilation error")
> + self.verify("No such" not in out, "Compilation error")
> +
> + def build_user_app(self, user_dut):
> + user_dut.send_expect("export RTE_SDK=`pwd`", '#', 30)
> + user_dut.send_expect("export RTE_TARGET=%s" % self.target, '#', 30)
> + out = user_dut.send_expect("make -C ./examples/ipsec-secgw", '#', 600)
> + self.logger.info(out)
> + self.verify("Error" not in out, "Compilation error")
> + self.verify("No such" not in out, "Compilation error")
> +
> + def get_vhost_eal(self):
> + default_eal_opts = {
> + "c": None,
> + "l": ','.join(self.cores),
> + "w": None,
> + "vdev": None,
> + "config": None,
> + "socket-mem": "2048,0",
> + "n": self.mem_channel
> + }
> + opts = default_eal_opts.copy()
> +
> + # Update options with test suite/case config file
> + for key in opts.keys():
> + if key in self.get_suite_cfg():
> + opts[key] = self.get_suite_cfg()[key]
> +
> + # Generate option string
> + opt_str = ""
> + for key,value in opts.items():
> + if value is None:
> + continue
> + dash = "-" if len(key) == 1 else "--"
> + opt_str = opt_str + "{0}{1} {2} ".format(dash, key, value)
> +
> + return opt_str
> +
> + def cfg_prepare(self, dut):
> + """
> + ipsec configuration file
> + """
> + ep0 = (
> + "#SP IPv4 rules\n"
> + "sp ipv4 out esp protect 5 pri 1 dst 192.168.105.0/24 sport 0:65535
> dport 0:65535\n"
> + "sp ipv4 in esp protect 105 pri 1 dst 192.168.115.0/24 sport 0:65535
> dport 0:65535\n"
> +
> + "#SA rules\n"
> + "sa out 5 cipher_algo aes-128-cbc cipher_key
> 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key
> 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.1.5 dst
> 172.16.2.5\n"
> + "sa in 105 cipher_algo aes-128-cbc cipher_key
> 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key
> 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.2.5 dst
> 172.16.1.5\n"
> +
> + "#Routing rules\n"
> + "rt ipv4 dst 172.16.2.5/32 port 0\n"
> + "rt ipv4 dst 192.168.115.0/24 port 1\n")
> +
> + ep1 = (
> + "#SP IPv4 rules\n"
> + "sp ipv4 in esp protect 5 pri 1 dst 192.168.105.0/24 sport 0:65535
> dport 0:65535\n"
> + "sp ipv4 out esp protect 105 pri 1 dst 192.168.115.0/24 sport
> 0:65535 dport 0:65535\n"
> +
> + "#SA rules\n"
> + "sa in 5 cipher_algo aes-128-cbc cipher_key
> 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key
> 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.1.5 dst
> 172.16.2.5\n"
> + "sa out 105 cipher_algo aes-128-cbc cipher_key
> 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key
> 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.2.5 dst
> 172.16.1.5\n"
> +
> + "#Routing rules\n"
> + "rt ipv4 dst 172.16.1.5/32 port 0\n"
> + "rt ipv4 dst 192.168.105.0/24 port 1\n")
> +
> + self.set_cfg(dut, 'ep0.cfg', ep0)
> + self.set_cfg(dut, 'ep1.cfg', ep1)
> +
> + def set_cfg(self, dut, filename, cfg):
> + with open(filename, 'w') as f:
> + f.write(cfg)
> +
> + dut.session.copy_file_to(filename, dut.base_dir)
> + dut.session.copy_file_to(filename, dut.base_dir)
> +
> + def launch_vhost_switch(self):
> + eal_opt_str = self.get_vhost_eal()
> +
> + config = '"(%s,0,0),(%s,0,0),(%s,0,0),(%s,0,0)"' % tuple(self.cores[-4:])
> + socket_file = "%s,/tmp/vm0_crypto0.sock\
> + --socket-file=%s,/tmp/vm0_crypto1.sock\
> + --socket-file=%s,/tmp/vm1_crypto0.sock\
> + --socket-file=%s,/tmp/vm1_crypto1.sock"% tuple(self.cores[-4:])
> + self.vhost_switch_cmd = cc.get_dpdk_app_cmd_str(self.sample_app,
> eal_opt_str,
> + '--config %s --socket-file %s' %
> + (config, socket_file))
> +
> + self.dut_execut_cmd("rm -r /tmp/*")
> + self.dut_execut_cmd(self.vhost_switch_cmd, "socket created",
> + 30)
> +
> + def bind_vfio_pci(self):
> + commands.getoutput("modprobe vfio-pci")
> + commands.getoutput('%s -b vfio-pci %s' %
> + (os.path.join(self.dut.base_dir, self.bind_script_path),
> + self.vfio_pci))
> +
> + def set_virtio_pci(self, dut):
> + out = dut.send_expect("lspci -d:1054|awk '{{print $1}}'", "# ", 10)
> + virtio_list = out.replace("\r", "\n").replace("\n\n", "\n").split("\n")
> + dut.send_expect('modprobe uio_pci_generic', '#', 10)
> + for line in virtio_list:
> + cmd = "echo 0000:{} >
> /sys/bus/pci/devices/0000\:{}/driver/unbind".format(
> + line, line.replace(":", "\:"))
> + dut.send_expect(cmd, "# ", 10)
> + dut.send_expect('echo "1af4 1054" >
> + /sys/bus/pci/drivers/uio_pci_generic/new_id', "# ", 10)
> +
> + return virtio_list
> +
> + def launch_virtio_dut(self, vm_name):
> + vm = QEMUKvm(self.dut, vm_name, 'virtio_ipsec_cryptodev_func')
> +
> + try:
> + vm_dut = vm.start(set_target=False)
> + if vm_dut is None:
> + print('{} start failed'.format(vm_name))
> + except Exception as err:
> + raise err
> + vm_dut.restore_interfaces()
> +
> + if not self.dut.skip_setup:
> + self.build_user_dpdk(vm_dut)
> + self.build_user_app(vm_dut)
> +
> + vm_dut.setup_modules(self.target, "igb_uio", None)
> + vm_dut.bind_interfaces_linux('igb_uio')
> + vm.virtio_list = self.set_virtio_pci(vm_dut)
> + self.logger.info("{} virtio list: {}".format(vm_name, vm.virtio_list))
> + vm.cores = vm_dut.get_core_list("all")
> + self.logger.info("{} core list: {}".format(vm_name, vm.cores))
> + vm.ports = [port["pci"] for port in vm_dut.ports_info]
> + self.logger.info("{} port list: {}".format(vm_name, vm.ports))
> + self.cfg_prepare(vm_dut)
> +
> + return vm, vm_dut
> +
> + def send_and_dump_pkg(self):
> + status = True
> +
> + inst = self.tester.tcpdump_sniff_packets(self.rx_interface,
> + timeout=25)
> +
> + PACKET_COUNT = 65
> + payload = 256 * ['11']
> +
> + pkt = Packet()
> +
> + pkt.assign_layers(["ether", "ipv4", "udp", "raw"])
> + pkt.config_layer("ether", {"src": "52:00:00:00:00:00", "dst":
> "52:00:00:00:00:01"})
> + src_ip = "192.168.105.200"
> + dst_ip = "192.168.105.100"
> + pkt.config_layer("ipv4", {"src": src_ip, "dst": dst_ip})
> + pkt.config_layer("udp", {"dst": 0})
> + pkt.config_layer("raw", {"payload": payload})
> + pkt.send_pkt(tx_port=self.tx_interface, count=PACKET_COUNT)
> +
> + pkt_rec = self.tester.load_tcpdump_sniff_packets(inst)
> + self.logger.info("dump: {} packets".format(len(pkt_rec)))
> + if len(pkt_rec) != PACKET_COUNT:
> + self.logger.info("dump pkg: {}, the num of pkg dumped is
> incorrtct!".format(len(pkt_rec)))
> + status = False
> +
> + for pkt_r in pkt_rec:
> + #pkt_r.pktgen.pkt.show()
> + if src_ip != pkt_r.pktgen.strip_layer3("src") or dst_ip !=
> pkt_r.pktgen.strip_layer3("dst"):
> + self.logger.info("the ip of pkg dumped is incorrtct!")
> + status = False
> +
> + dump_text =
> binascii.b2a_hex(pkt_r.pktgen.pkt["Raw"].getfieldval("load"))
> + if dump_text != ''.join(payload):
> + self.logger.info("the text of pkg dumped is incorrtct!")
> + status = False
> +
> + return status
> +
> + def test_aesni_mb_aes_cbc_sha1_hmac(self):
> + if cc.is_test_skip(self):
> + return
> +
> + eal_opt_str_0 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm0.cores[-3:]),
> + "socket-mem":"512,0",
> + "w": " -w ".join(self.vm0.ports),
> +
> + "vdev":"crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"})
> +
> + crypto_ipsec_opt_str0 = cc.get_opt_str(self,
> + self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep0.cfg",
> + "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm0.cores[-2:])})
> +
> + out0 = self._run_crypto_ipsec(self.vm0_dut, eal_opt_str_0,
> crypto_ipsec_opt_str0)
> + self.logger.info(out0)
> +
> + eal_opt_str_1 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm1.cores[-3:]),
> + "socket-mem":"512,0",
> + "w": " -w ".join(self.vm1.ports),
> + "vdev":
> + "crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"})
> +
> + crypto_ipsec_opt_str1 = cc.get_opt_str(self,
> self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep1.cfg",
> "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm1.cores[-2:])})
> + out1 = self._run_crypto_ipsec(self.vm1_dut, eal_opt_str_1,
> crypto_ipsec_opt_str1)
> + self.logger.info(out1)
> +
> + result = self.send_and_dump_pkg()
> + self.verify(result, "FAILED")
> +
> + def test_virtio_aes_cbc_sha1_hmac(self):
> + if cc.is_test_skip(self):
> + return
> +
> + eal_opt_str_0 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm0.cores[-3:]),
> + "socket-mem":"512,0",
> + "w": " -w ".join(self.vm0.ports +
> self.vm0.virtio_list),
> + "vdev":None})
> +
> + crypto_ipsec_opt_str0 = cc.get_opt_str(self,
> self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep0.cfg",
> "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm0.cores[-2:])})
> + out0 = self._run_crypto_ipsec(self.vm0_dut, eal_opt_str_0,
> crypto_ipsec_opt_str0)
> + self.logger.info(out0)
> +
> + eal_opt_str_1 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm1.cores[-3:]),
> + "socket-mem":"512,0",
> + "w": " -w ".join(self.vm1.ports +
> self.vm1.virtio_list),
> + "vdev": None})
> +
> + crypto_ipsec_opt_str1 = cc.get_opt_str(self,
> self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep1.cfg",
> "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm1.cores[-2:])})
> + out1 = self._run_crypto_ipsec(self.vm1_dut, eal_opt_str_1,
> crypto_ipsec_opt_str1)
> + self.logger.info(out1)
> +
> + result = self.send_and_dump_pkg()
> + self.verify(result, "FAILED")
> +
> + def _run_crypto_ipsec(self, vm_dut, eal_opt_str, case_opt_str):
> + cmd_str = cc.get_dpdk_app_cmd_str(self.user_app,
> + eal_opt_str,
> + case_opt_str + " -l")
> + self.logger.info(cmd_str)
> + try:
> + out = vm_dut.send_expect(cmd_str, "IPSEC", 600)
> + except Exception, ex:
> + self.logger.error(ex)
> + raise ex
> +
> + return out
> +
> + def tear_down(self):
> + self.vm0_dut.send_expect("^C", "# ")
> + self.vm1_dut.send_expect("^C", "# ")
> +
> + def tear_down_all(self):
> + if self.vm0:
> + self.vm0.stop()
> + self.dut.virt_exit()
> + self.vm0 = None
> +
> + if self.vm1:
> + self.vm1.stop()
> + self.dut.virt_exit()
> + self.vm1 = None
> +
> + self.dut_execut_cmd("^C", "# ")
> + self.dut_execut_cmd("killall -s INT vhost-crypto")
> + self.dut_execut_cmd("killall -s INT qemu-system-x86_64")
> + self.dut_execut_cmd("rm -r /tmp/*")
> +
> + cc.clear_dpdk_config(self)
> --
> 2.7.4
^ permalink raw reply [flat|nested] 4+ messages in thread
* Re: [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test
2019-05-15 22:14 [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test Xinfeng Zhao
2019-05-16 6:42 ` Zhao, XinfengX
2019-05-22 8:48 ` Tu, Lijuan
@ 2019-05-27 1:01 ` Chen, Zhaoyan
2 siblings, 0 replies; 4+ messages in thread
From: Chen, Zhaoyan @ 2019-05-27 1:01 UTC (permalink / raw)
To: Zhao, XinfengX, dts; +Cc: Zhao, XinfengX, Chen, Zhaoyan
Acked-by: Zhaoyan Chen<zhaoyan.chen@intel.com>
Regards,
Zhaoyan Chen
> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Xinfeng Zhao
> Sent: Thursday, May 16, 2019 6:15 AM
> To: dts@dpdk.org
> Cc: Zhao, XinfengX <xinfengx.zhao@intel.com>
> Subject: [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test
>
> Signed-off-by: Xinfeng Zhao <xinfengx.zhao@intel.com>
> ---
> conf/virtio_ipsec_cryptodev_func.cfg | 51 ++++
> tests/TestSuite_virtio_ipsec_cryptodev_func.py | 369
> +++++++++++++++++++++++++
> 2 files changed, 420 insertions(+)
> create mode 100644 conf/virtio_ipsec_cryptodev_func.cfg
> create mode 100644 tests/TestSuite_virtio_ipsec_cryptodev_func.py
>
> diff --git a/conf/virtio_ipsec_cryptodev_func.cfg
> b/conf/virtio_ipsec_cryptodev_func.cfg
> new file mode 100644
> index 0000000..2e727c6
> --- /dev/null
> +++ b/conf/virtio_ipsec_cryptodev_func.cfg
> @@ -0,0 +1,51 @@
> +[suite]
> +# Cryptodev common options qat device id crypto_dev_id="37c9"
> +
> +# PCI Pass-through
> +vfio_pci="0000:60:00.0 0000:60:00.1 0000:3b:00.0 0000:3b:00.1"
> +
> +# default crypto device and sw device config
> +vdev="crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"
> +
> +[vm0]
> +qemu =
> + path=/root/qemu-2/bin/qemu-system-x86_64;
> +cpu =
> + model=host,number=4,cpupin=11 12 13 14; mem =
> + size=5120,hugepage=yes;
> +crypto =
> + enable=yes,opt_num=2;
> +daemon =
> + enable=yes;
> +login =
> + user=root,password=tester;
> +disk =
> + file=/root/VMs/virtio_crypto_test_710_1.img;
> +vnc =
> + displayNum=1;
> +device =
> + driver=vfio-pci,opt_host=0000:3b:00.0;
> + driver=vfio-pci,opt_host=0000:3b:00.1;
> +
> +[vm1]
> +qemu =
> + path=/root/qemu-2/bin/qemu-system-x86_64;
> +cpu =
> + model=host,number=4,cpupin=15 16 17 18; mem =
> + size=5120,hugepage=yes;
> +crypto =
> + enable=yes,opt_num=2;
> +daemon =
> + enable=yes;
> +login =
> + user=root,password=tester;
> +disk =
> + file=/root/VMs/virtio_crypto_test_710_2.img;
> +vnc =
> + displayNum=2;
> +device =
> + driver=vfio-pci,opt_host=0000:60:00.0;
> + driver=vfio-pci,opt_host=0000:60:00.1;
> diff --git a/tests/TestSuite_virtio_ipsec_cryptodev_func.py
> b/tests/TestSuite_virtio_ipsec_cryptodev_func.py
> new file mode 100644
> index 0000000..d89a93d
> --- /dev/null
> +++ b/tests/TestSuite_virtio_ipsec_cryptodev_func.py
> @@ -0,0 +1,369 @@
> +# BSD LICENSE
> +#
> +# Copyright(c) <2019>, Intel Corporation. All rights reserved.
> +# All rights reserved.
> +#
> +# Redistribution and use in source and binary forms, with or without #
> +modification, are permitted provided that the following conditions #
> +are met:
> +#
> +# * Redistributions of source code must retain the above copyright
> +# notice, this list of conditions and the following disclaimer.
> +# * Redistributions in binary form must reproduce the above copyright
> +# notice, this list of conditions and the following disclaimer in
> +# the documentation and/or other materials provided with the
> +# distribution.
> +# * Neither the name of Intel Corporation nor the names of its
> +# contributors may be used to endorse or promote products derived
> +# from this software without specific prior written permission.
> +#
> +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS #
> +"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT #
> +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
> FOR #
> +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
> #
> +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
> #
> +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT #
> +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
> #
> +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON
> ANY #
> +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT #
> +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
> #
> +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
> +"""
> +DPDK Test suite
> +Test DPDK vhost + virtio scenarios
> +"""
> +import os
> +import utils
> +import time
> +import commands
> +import binascii
> +from test_case import TestCase
> +from qemu_kvm import QEMUKvm
> +import cryptodev_common as cc
> +from packet import Packet
> +
> +class VirtioCryptodevIpsecTest(TestCase):
> + def set_up_all(self):
> + self.sample_app = "./examples/vhost_crypto/build/vhost-crypto"
> + self.user_app = "./examples/ipsec-secgw/build/ipsec-secgw "
> + self._default_ipsec_gw_opts = {
> + "p": "0x3",
> + "config": None,
> + "f": "ipsec_test.cfg",
> + "u": "0x1"
> + }
> +
> + self.vm0, self.vm0_dut = None, None
> + self.vm1, self.vm1_dut = None, None
> + self.dut.skip_setup = True
> +
> + self.dut_ports = self.dut.get_ports(self.nic)
> + self.cores = self.dut.get_core_list("1S/5C/1T")
> + self.mem_channel = self.dut.get_memory_channels()
> + self.port_mask = utils.create_mask([self.dut_ports[0]])
> +
> + self.tx_port = self.tester.get_local_port(self.dut_ports[0])
> + self.rx_port = self.tester.get_local_port(self.dut_ports[1])
> +
> + self.tx_interface = self.tester.get_interface(self.tx_port)
> + self.rx_interface = self.tester.get_interface(self.rx_port)
> +
> + self.logger.info("tx interface = " + self.tx_interface)
> + self.logger.info("rx interface = " + self.rx_interface)
> +
> + self.bind_script_path = self.dut.get_dpdk_bind_script()
> + self.vfio_pci = self.get_suite_cfg()["vfio_pci"]
> + for each in self.vfio_pci.split():
> + cmd = "echo {} > /sys/bus/pci/devices/{}/driver/unbind".format(each,
> each.replace(":", "\:"))
> + self.dut_execut_cmd(cmd)
> + self.dut.restore_interfaces()
> +
> + if not cc.is_build_skip(self):
> + self.tar_dpdk()
> + self.dut.skip_setup = False
> + cc.build_dpdk_with_cryptodev(self)
> + self.build_vhost_app()
> + cc.bind_qat_device(self, "vfio-pci")
> +
> + self.launch_vhost_switch()
> + self.bind_vfio_pci()
> +
> + self.vm0, self.vm0_dut = self.launch_virtio_dut("vm0")
> + self.vm1, self.vm1_dut = self.launch_virtio_dut("vm1")
> +
> + def set_up(self):
> + pass
> +
> + def dut_execut_cmd(self, cmdline, ex='#', timout=30):
> + return self.dut.send_expect(cmdline, ex, timout)
> +
> + def tar_dpdk(self):
> + self.dut_execut_cmd("tar -czf %s/dep/dpdk.tar.gz ../dpdk" %
> + os.getcwd(), '#', 100)
> +
> + def build_user_dpdk(self, user_dut):
> + user_dut.send_expect(
> + "sed -i
> 's/CONFIG_RTE_LIBRTE_PMD_AESNI_MB=n$/CONFIG_RTE_LIBRTE_PMD_AESNI_MB
> =y/' config/common_base", '#', 30)
> + out = user_dut.send_expect("make install T=%s" % self.target, "# ", 900)
> + self.logger.info(out)
> + assert ("Error" not in out), "Compilation error..."
> +
> + def build_vhost_app(self):
> + out = self.dut.build_dpdk_apps("./examples/vhost_crypto")
> + self.verify("Error" not in out, "Compilation error")
> + self.verify("No such" not in out, "Compilation error")
> +
> + def build_user_app(self, user_dut):
> + user_dut.send_expect("export RTE_SDK=`pwd`", '#', 30)
> + user_dut.send_expect("export RTE_TARGET=%s" % self.target, '#', 30)
> + out = user_dut.send_expect("make -C ./examples/ipsec-secgw", '#', 600)
> + self.logger.info(out)
> + self.verify("Error" not in out, "Compilation error")
> + self.verify("No such" not in out, "Compilation error")
> +
> + def get_vhost_eal(self):
> + default_eal_opts = {
> + "c": None,
> + "l": ','.join(self.cores),
> + "w": None,
> + "vdev": None,
> + "config": None,
> + "socket-mem": "2048,0",
> + "n": self.mem_channel
> + }
> + opts = default_eal_opts.copy()
> +
> + # Update options with test suite/case config file
> + for key in opts.keys():
> + if key in self.get_suite_cfg():
> + opts[key] = self.get_suite_cfg()[key]
> +
> + # Generate option string
> + opt_str = ""
> + for key,value in opts.items():
> + if value is None:
> + continue
> + dash = "-" if len(key) == 1 else "--"
> + opt_str = opt_str + "{0}{1} {2} ".format(dash, key, value)
> +
> + return opt_str
> +
> + def cfg_prepare(self, dut):
> + """
> + ipsec configuration file
> + """
> + ep0 = (
> + "#SP IPv4 rules\n"
> + "sp ipv4 out esp protect 5 pri 1 dst 192.168.105.0/24 sport 0:65535 dport
> 0:65535\n"
> + "sp ipv4 in esp protect 105 pri 1 dst 192.168.115.0/24 sport 0:65535 dport
> 0:65535\n"
> +
> + "#SA rules\n"
> + "sa out 5 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0
> auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-
> tunnel src 172.16.1.5 dst 172.16.2.5\n"
> + "sa in 105 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0
> auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-
> tunnel src 172.16.2.5 dst 172.16.1.5\n"
> +
> + "#Routing rules\n"
> + "rt ipv4 dst 172.16.2.5/32 port 0\n"
> + "rt ipv4 dst 192.168.115.0/24 port 1\n")
> +
> + ep1 = (
> + "#SP IPv4 rules\n"
> + "sp ipv4 in esp protect 5 pri 1 dst 192.168.105.0/24 sport 0:65535 dport
> 0:65535\n"
> + "sp ipv4 out esp protect 105 pri 1 dst 192.168.115.0/24 sport 0:65535 dport
> 0:65535\n"
> +
> + "#SA rules\n"
> + "sa in 5 cipher_algo aes-128-cbc cipher_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0
> auth_algo sha1-hmac auth_key 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-
> tunnel src 172.16.1.5 dst 172.16.2.5\n"
> + "sa out 105 cipher_algo aes-128-cbc cipher_key
> 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key
> 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.2.5 dst
> 172.16.1.5\n"
> +
> + "#Routing rules\n"
> + "rt ipv4 dst 172.16.1.5/32 port 0\n"
> + "rt ipv4 dst 192.168.105.0/24 port 1\n")
> +
> + self.set_cfg(dut, 'ep0.cfg', ep0)
> + self.set_cfg(dut, 'ep1.cfg', ep1)
> +
> + def set_cfg(self, dut, filename, cfg):
> + with open(filename, 'w') as f:
> + f.write(cfg)
> +
> + dut.session.copy_file_to(filename, dut.base_dir)
> + dut.session.copy_file_to(filename, dut.base_dir)
> +
> + def launch_vhost_switch(self):
> + eal_opt_str = self.get_vhost_eal()
> +
> + config = '"(%s,0,0),(%s,0,0),(%s,0,0),(%s,0,0)"' % tuple(self.cores[-4:])
> + socket_file = "%s,/tmp/vm0_crypto0.sock\
> + --socket-file=%s,/tmp/vm0_crypto1.sock\
> + --socket-file=%s,/tmp/vm1_crypto0.sock\
> + --socket-file=%s,/tmp/vm1_crypto1.sock"% tuple(self.cores[-4:])
> + self.vhost_switch_cmd = cc.get_dpdk_app_cmd_str(self.sample_app, eal_opt_str,
> + '--config %s --socket-file %s' %
> + (config, socket_file))
> +
> + self.dut_execut_cmd("rm -r /tmp/*")
> + self.dut_execut_cmd(self.vhost_switch_cmd, "socket created",
> + 30)
> +
> + def bind_vfio_pci(self):
> + commands.getoutput("modprobe vfio-pci")
> + commands.getoutput('%s -b vfio-pci %s' %
> + (os.path.join(self.dut.base_dir, self.bind_script_path),
> + self.vfio_pci))
> +
> + def set_virtio_pci(self, dut):
> + out = dut.send_expect("lspci -d:1054|awk '{{print $1}}'", "# ", 10)
> + virtio_list = out.replace("\r", "\n").replace("\n\n", "\n").split("\n")
> + dut.send_expect('modprobe uio_pci_generic', '#', 10)
> + for line in virtio_list:
> + cmd = "echo 0000:{} >
> /sys/bus/pci/devices/0000\:{}/driver/unbind".format(
> + line, line.replace(":", "\:"))
> + dut.send_expect(cmd, "# ", 10)
> + dut.send_expect('echo "1af4 1054" >
> + /sys/bus/pci/drivers/uio_pci_generic/new_id', "# ", 10)
> +
> + return virtio_list
> +
> + def launch_virtio_dut(self, vm_name):
> + vm = QEMUKvm(self.dut, vm_name, 'virtio_ipsec_cryptodev_func')
> +
> + try:
> + vm_dut = vm.start(set_target=False)
> + if vm_dut is None:
> + print('{} start failed'.format(vm_name))
> + except Exception as err:
> + raise err
> + vm_dut.restore_interfaces()
> +
> + if not self.dut.skip_setup:
> + self.build_user_dpdk(vm_dut)
> + self.build_user_app(vm_dut)
> +
> + vm_dut.setup_modules(self.target, "igb_uio", None)
> + vm_dut.bind_interfaces_linux('igb_uio')
> + vm.virtio_list = self.set_virtio_pci(vm_dut)
> + self.logger.info("{} virtio list: {}".format(vm_name, vm.virtio_list))
> + vm.cores = vm_dut.get_core_list("all")
> + self.logger.info("{} core list: {}".format(vm_name, vm.cores))
> + vm.ports = [port["pci"] for port in vm_dut.ports_info]
> + self.logger.info("{} port list: {}".format(vm_name, vm.ports))
> + self.cfg_prepare(vm_dut)
> +
> + return vm, vm_dut
> +
> + def send_and_dump_pkg(self):
> + status = True
> +
> + inst = self.tester.tcpdump_sniff_packets(self.rx_interface,
> + timeout=25)
> +
> + PACKET_COUNT = 65
> + payload = 256 * ['11']
> +
> + pkt = Packet()
> +
> + pkt.assign_layers(["ether", "ipv4", "udp", "raw"])
> + pkt.config_layer("ether", {"src": "52:00:00:00:00:00", "dst":
> "52:00:00:00:00:01"})
> + src_ip = "192.168.105.200"
> + dst_ip = "192.168.105.100"
> + pkt.config_layer("ipv4", {"src": src_ip, "dst": dst_ip})
> + pkt.config_layer("udp", {"dst": 0})
> + pkt.config_layer("raw", {"payload": payload})
> + pkt.send_pkt(tx_port=self.tx_interface, count=PACKET_COUNT)
> +
> + pkt_rec = self.tester.load_tcpdump_sniff_packets(inst)
> + self.logger.info("dump: {} packets".format(len(pkt_rec)))
> + if len(pkt_rec) != PACKET_COUNT:
> + self.logger.info("dump pkg: {}, the num of pkg dumped is
> incorrtct!".format(len(pkt_rec)))
> + status = False
> +
> + for pkt_r in pkt_rec:
> + #pkt_r.pktgen.pkt.show()
> + if src_ip != pkt_r.pktgen.strip_layer3("src") or dst_ip !=
> pkt_r.pktgen.strip_layer3("dst"):
> + self.logger.info("the ip of pkg dumped is incorrtct!")
> + status = False
> +
> + dump_text = binascii.b2a_hex(pkt_r.pktgen.pkt["Raw"].getfieldval("load"))
> + if dump_text != ''.join(payload):
> + self.logger.info("the text of pkg dumped is incorrtct!")
> + status = False
> +
> + return status
> +
> + def test_aesni_mb_aes_cbc_sha1_hmac(self):
> + if cc.is_test_skip(self):
> + return
> +
> + eal_opt_str_0 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm0.cores[-3:]),
> + "socket-mem":"512,0",
> + "w": " -w ".join(self.vm0.ports),
> +
> + "vdev":"crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"})
> +
> + crypto_ipsec_opt_str0 = cc.get_opt_str(self,
> + self._default_ipsec_gw_opts, override_opts={'f': "/root/dpdk/ep0.cfg",
> + "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm0.cores[-2:])})
> +
> + out0 = self._run_crypto_ipsec(self.vm0_dut, eal_opt_str_0,
> crypto_ipsec_opt_str0)
> + self.logger.info(out0)
> +
> + eal_opt_str_1 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm1.cores[-3:]),
> + "socket-mem":"512,0",
> + "w": " -w ".join(self.vm1.ports),
> + "vdev":
> + "crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"})
> +
> + crypto_ipsec_opt_str1 = cc.get_opt_str(self, self._default_ipsec_gw_opts,
> override_opts={'f': "/root/dpdk/ep1.cfg", "config": '"(0,0,%s),(1,0,%s)"' %
> tuple(self.vm1.cores[-2:])})
> + out1 = self._run_crypto_ipsec(self.vm1_dut, eal_opt_str_1,
> crypto_ipsec_opt_str1)
> + self.logger.info(out1)
> +
> + result = self.send_and_dump_pkg()
> + self.verify(result, "FAILED")
> +
> + def test_virtio_aes_cbc_sha1_hmac(self):
> + if cc.is_test_skip(self):
> + return
> +
> + eal_opt_str_0 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm0.cores[-3:]),
> + "socket-mem":"512,0",
> + "w": " -w ".join(self.vm0.ports + self.vm0.virtio_list),
> + "vdev":None})
> +
> + crypto_ipsec_opt_str0 = cc.get_opt_str(self, self._default_ipsec_gw_opts,
> override_opts={'f': "/root/dpdk/ep0.cfg", "config": '"(0,0,%s),(1,0,%s)"' %
> tuple(self.vm0.cores[-2:])})
> + out0 = self._run_crypto_ipsec(self.vm0_dut, eal_opt_str_0,
> crypto_ipsec_opt_str0)
> + self.logger.info(out0)
> +
> + eal_opt_str_1 = cc.get_eal_opt_str(self, {"l": ','.join(self.vm1.cores[-3:]),
> + "socket-mem":"512,0",
> + "w": " -w ".join(self.vm1.ports + self.vm1.virtio_list),
> + "vdev": None})
> +
> + crypto_ipsec_opt_str1 = cc.get_opt_str(self, self._default_ipsec_gw_opts,
> override_opts={'f': "/root/dpdk/ep1.cfg", "config": '"(0,0,%s),(1,0,%s)"' %
> tuple(self.vm1.cores[-2:])})
> + out1 = self._run_crypto_ipsec(self.vm1_dut, eal_opt_str_1,
> crypto_ipsec_opt_str1)
> + self.logger.info(out1)
> +
> + result = self.send_and_dump_pkg()
> + self.verify(result, "FAILED")
> +
> + def _run_crypto_ipsec(self, vm_dut, eal_opt_str, case_opt_str):
> + cmd_str = cc.get_dpdk_app_cmd_str(self.user_app,
> + eal_opt_str,
> + case_opt_str + " -l")
> + self.logger.info(cmd_str)
> + try:
> + out = vm_dut.send_expect(cmd_str, "IPSEC", 600)
> + except Exception, ex:
> + self.logger.error(ex)
> + raise ex
> +
> + return out
> +
> + def tear_down(self):
> + self.vm0_dut.send_expect("^C", "# ")
> + self.vm1_dut.send_expect("^C", "# ")
> +
> + def tear_down_all(self):
> + if self.vm0:
> + self.vm0.stop()
> + self.dut.virt_exit()
> + self.vm0 = None
> +
> + if self.vm1:
> + self.vm1.stop()
> + self.dut.virt_exit()
> + self.vm1 = None
> +
> + self.dut_execut_cmd("^C", "# ")
> + self.dut_execut_cmd("killall -s INT vhost-crypto")
> + self.dut_execut_cmd("killall -s INT qemu-system-x86_64")
> + self.dut_execut_cmd("rm -r /tmp/*")
> +
> + cc.clear_dpdk_config(self)
> --
> 2.7.4
^ permalink raw reply [flat|nested] 4+ messages in thread
end of thread, other threads:[~2019-05-27 1:01 UTC | newest]
Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-05-15 22:14 [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test Xinfeng Zhao
2019-05-16 6:42 ` Zhao, XinfengX
2019-05-22 8:48 ` Tu, Lijuan
2019-05-27 1:01 ` Chen, Zhaoyan
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).