test suite reviews and discussions
 help / color / mirror / Atom feed
* [dts] [PATCH V1] test_plan: add test plan for cryptodev virtio ipsec test
@ 2019-03-28 20:59 Xinfeng Zhao
  2019-04-09  6:44 ` Chen, Zhaoyan
  2019-04-15 21:28 ` Tu, Lijuan
  0 siblings, 2 replies; 3+ messages in thread
From: Xinfeng Zhao @ 2019-03-28 20:59 UTC (permalink / raw)
  To: dts; +Cc: Xinfeng Zhao

Signed-off-by: Xinfeng Zhao <xinfengx.zhao@intel.com>
---
 .../virtio_ipsec_cryptodev_func_test_plan.rst      | 178 +++++++++++++++++++++
 1 file changed, 178 insertions(+)
 create mode 100644 test_plans/virtio_ipsec_cryptodev_func_test_plan.rst

diff --git a/test_plans/virtio_ipsec_cryptodev_func_test_plan.rst b/test_plans/virtio_ipsec_cryptodev_func_test_plan.rst
new file mode 100644
index 0000000..74842ac
--- /dev/null
+++ b/test_plans/virtio_ipsec_cryptodev_func_test_plan.rst
@@ -0,0 +1,178 @@
+.. Copyright (c) <2018-2019> Intel Corporation
+   All rights reserved.
+
+   Redistribution and use in source and binary forms, with or without
+   modification, are permitted provided that the following conditions
+   are met:
+
+   - Redistributions of source code must retain the above copyright
+     notice, this list of conditions and the following disclaimer.
+
+   - Redistributions in binary form must reproduce the above copyright
+     notice, this list of conditions and the following disclaimer in
+     the documentation and/or other materials provided with the
+     distribution.
+
+   - Neither the name of Intel Corporation nor the names of its
+     contributors may be used to endorse or promote products derived
+     from this software without specific prior written permission.
+
+   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
+   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
+   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
+   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
+   COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
+   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
+   (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
+   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
+   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
+   STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
+   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
+   OF THE POSSIBILITY OF SUCH DAMAGE.
+
+=======================================
+Cryptodev virtio ipsec Application Tests
+=======================================
+
+
+Description
+===========
+
+This document provides the test plan for testing Cryptodev virtio ipsec by
+crypto ipsec-secgw application. The crypto virtio ipsec application is a DPDK app
+under DPDK app folder.
+
+Cryptodev virtio ipsec supports AESNI MB PMD, VIRTIO PMD
+
+AESNI MB PMD algorithm table
+The table below contains AESNI MB algorithms which supported in crypto virtio ipsec.
+Part of the algorithms are not supported currently.
+
++-----------+-------------------+---------------------------------------------------------------------------+
+| Algorithm |  Mode             | Detail                                                                    |
++-----------+-------------------+---------------------------------------------------------------------------+
+| aes       | cbc               | Encrypt/Decrypt;Key size: 128, 192, 256 bits                              |
++-----------+-------------------+---------------------------------------------------------------------------+
+| sha       |                   | sha1, sha2-224, sha2-384, sha2-256, sha2-512                              |
++-----------+-------------------+---------------------------------------------------------------------------+
+| hmac      |                   | Support sha implementations sha1, sha2-224, sha2-256,                     |
+|           |                   |                                                                           |
+|           |                   | sha2-384, sha2-512                                                        |
++-----------+-------------------+---------------------------------------------------------------------------+
+
+VIRTIO PMD algorithm table
+The table below contains virtio algorithms which supported in crypto virtio ipsec.
+Part of the algorithms are not supported currently.
+
++-----------+-------------------+---------------------------------------------------------------------------+
+| Algorithm |  Mode             | Detail                                                                    |
++-----------+-------------------+---------------------------------------------------------------------------+
+| aes       | cbc               | Encrypt/Decrypt;Key size: 128, 192, 256 bits                              |
++-----------+-------------------+---------------------------------------------------------------------------+
+| sha       |                   | sha1, sha2-224, sha2-384, sha2-256, sha2-512                              |
++-----------+-------------------+---------------------------------------------------------------------------+
+| hmac      |                   | Support sha implementations sha1, sha2-224, sha2-256,                     |
+|           |                   |                                                                           |
+|           |                   | sha2-384, sha2-512                                                        |
++-----------+-------------------+---------------------------------------------------------------------------+
+
+Prerequisites
+=============
+
+qemu version >= 2.12
+in qemu enable vhost-user-crypto:
+    ./configure --target-list=x86_64-softmmu --enable-vhost-crypto --prefix=/root/qemu-2.12 && make && make install
+the bin is in /root/qemu-2.12 folder, which is your specified
+
+The options of ipsec-secgw is below:
+
+   ./build/ipsec-secgw [EAL options] --
+                        -p PORTMASK -P -u PORTMASK -j FRAMESIZE
+                        -l -w REPLAY_WINOW_SIZE -e -a
+                        --config (port,queue,lcore)[,(port,queue,lcore]
+                        --single-sa SAIDX
+                        --rxoffload MASK
+                        --txoffload MASK
+                        -f CONFIG_FILE_PATH
+
+*   The "-f /path/to/config_file" option enables the application read and
+    parse the configuration file specified, and configures the application
+    with a given set of SP, SA and Routing entries accordingly.
+
+Test case setup:
+================
+
+For function test, the DUT forward UDP packets generated by scapy.
+After sending single packet from Scapy, crytpoDev function encrypt/decrypt the
+payload in packet by using algorithm setting in VM. the packet back to tester.
+
+Use TCPDump to capture the received packet on tester. Then tester parses the payload
+and compare the payload with correct answer pre-stored in scripts:
+
+   +----------+              +----------------------------------+
+   |          |              |   +--------+        +--------+   |
+   |          | -------------|-->|   VM0  | -----> |        |   |
+   |  Tester  |              |   +--------+        |   VM1  |   |
+   |          | <------------|-------------------> |        |   |
+   |          |              |                     +--------+   |
+   +----------+              +----------------------------------+
+
+In Host:
+# Build DPDK and vhost_crypto app
+      enable CONFIG_RTE_LIBRTE_VHOST in config/common_base
+      make install -j T=x86_64-native-linuxapp-gcc
+      make -C examples/vhost_crypto
+
+# Compile the latest qemu
+# Run the dpdk vhost sample
+    ./examples/vhost_crypto/build/vhost-crypto --socket-mem 2048,0 --legacy-mem -w 1a:01.0 -w 1c:01.0 -w 1e:01.0 --vdev crypto_scheduler_pmd_1,slave=0000:1a:01.0_qat_sym,slave=0000:1c:01.0_qat_sym,slave=0000:1e:01.0_qat_sym,mode=round-robin,ordering=enable -l 8,9,10,11,12 -n 6  -- --config "(9,0,0),(10,0,0),(11,0,0),(12,0,0)" --socket-file 9,/tmp/vm0_crypto0.sock --socket-file=10,/tmp/vm0_crypto1.sock --socket-file=11,/tmp/vm1_crypto0.sock --socket-file=12,/tmp/vm1_crypto1.sock
+
+# bind vfio-pci
+    usertools/dpdk-devbind.py --bind=vfio-pci 0000:60:00.0 0000:60:00.1 0000:3b:00.0 0000:3b:00.1
+
+# Start VM0 by the qemu
+    taskset -c 11,12,13,14 /root/qemu-2/bin/qemu-system-x86_64  -name vm0 -enable-kvm -pidfile /tmp/.vm0.pid
+        -daemonize -monitor unix:/tmp/vm0_monitor.sock,server,nowait
+        -net nic,vlan=0,macaddr=00:00:00:42:65:aa,model=e1000,addr=1f -net user,vlan=0,hostfwd=tcp:10.67.111.126:6000-:22
+        -cpu host -smp 4 -m 5120 -object memory-backend-file,id=mem,size=5120M,mem-path=/mnt/huge,share=on -numa node,memdev=mem -mem-prealloc
+        -chardev socket,path=/tmp/vm0_qga0.sock,server,nowait,id=vm0_qga0 -device virtio-serial -device virtserialport,chardev=vm0_qga0,name=org.qemu.guest_agent.0
+        -vnc :1
+        -chardev socket,path=/tmp/vm0_crypto0.sock,id=vm0_crypto0 -object cryptodev-vhost-user,id=cryptodev0,chardev=vm0_crypto0 -device virtio-crypto-pci,id=crypto0,cryptodev=cryptodev0
+        -chardev socket,path=/tmp/vm0_crypto1.sock,id=vm0_crypto1 -object cryptodev-vhost-user,id=cryptodev1,chardev=vm0_crypto1 -device virtio-crypto-pci,id=crypto1,cryptodev=cryptodev1
+        -drive file=/root/VMs/virtio_crypto_test_710_1.img
+        -device vfio-pci,host=0000:3b:00.0,id=pt_0
+        -device vfio-pci,host=0000:3b:00.1,id=pt_1
+
+# Start VM1 by the qemu
+    taskset -c 15,16,17,18 /root/qemu-2/bin/qemu-system-x86_64  -name vm1 -enable-kvm -pidfile /tmp/.vm1.pid
+        -daemonize -monitor unix:/tmp/vm1_monitor.sock,server,nowait
+        -net nic,vlan=0,macaddr=00:00:00:db:2e:f9,model=e1000,addr=1f -net user,vlan=0,hostfwd=tcp:10.67.111.126:6001-:22
+        -cpu host -smp 4 -m 5120 -object memory-backend-file,id=mem,size=5120M,mem-path=/mnt/huge,share=on -numa node,memdev=mem -mem-prealloc
+        -chardev socket,path=/tmp/vm1_qga0.sock,server,nowait,id=vm1_qga0 -device virtio-serial -device virtserialport,chardev=vm1_qga0,name=org.qemu.guest_agent.0
+        -vnc :2
+        -chardev socket,path=/tmp/vm1_crypto0.sock,id=vm1_crypto0 -object cryptodev-vhost-user,id=cryptodev0,chardev=vm1_crypto0 -device virtio-crypto-pci,id=crypto0,cryptodev=cryptodev0
+        -chardev socket,path=/tmp/vm1_crypto1.sock,id=vm1_crypto1 -object cryptodev-vhost-user,id=cryptodev1,chardev=vm1_crypto1 -device virtio-crypto-pci,id=crypto1,cryptodev=cryptodev1
+        -drive file=/root/VMs/virtio_crypto_test_710_2.img
+        -device vfio-pci,host=0000:60:00.0,id=pt_0
+        -device vfio-pci,host=0000:60:00.1,id=pt_1
+
+In VM
+# set virtio device
+    modprobe uio_pci_generic
+    echo -n 0000:00:04.0 > /sys/bus/pci/drivers/virtio-pci/unbind
+    echo -n 0000:00:05.0 > /sys/bus/pci/drivers/virtio-pci/unbind
+    echo "1af4 1054" > /sys/bus/pci/drivers/uio_pci_generic/new_id
+
+# Run the ipsec test cases cmd
+
+    1. AESNI_MB case Command line Eg:
+    In vm0:
+    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w 0000:00:06.0 -w 0000:00:07.0 --vdev crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2 -l 1,2,3 -n 4  -- -P  --config "(0,0,2),(1,0,3)" -u 0x1 -p 0x3 -f /root/ipsec_test0.cfg
+    In vm1:
+    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w 0000:00:06.0 -w 0000:00:07.0 --vdev crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2 -l 1,2,3 -n 4  -- -P  --config "(0,0,2),(1,0,3)" -u 0x1 -p 0x3 -f /root/ipsec_test1.cfg
+
+    2. VIRTIO case Command line Eg:
+    In vm0:
+    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w 0000:00:06.0 -w 0000:00:07.0 -w 00:04.0 -w 00:05.0 -l 1,2,3 -n 4  -- -P  --config "(0,0,2),(1,0,3)" -u 0x1 -p 0x3 -f /root/ipsec_test0.cfg
+    In vm1:
+    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w 0000:00:06.0 -w 0000:00:07.0 -w 00:04.0 -w 00:05.0 -l 1,2,3 -n 4  -- -P  --config "(0,0,2),(1,0,3)" -u 0x1 -p 0x3 -f /root/ipsec_test1.cfg
-- 
2.7.4


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [dts] [PATCH V1] test_plan: add test plan for cryptodev virtio ipsec test
  2019-03-28 20:59 [dts] [PATCH V1] test_plan: add test plan for cryptodev virtio ipsec test Xinfeng Zhao
@ 2019-04-09  6:44 ` Chen, Zhaoyan
  2019-04-15 21:28 ` Tu, Lijuan
  1 sibling, 0 replies; 3+ messages in thread
From: Chen, Zhaoyan @ 2019-04-09  6:44 UTC (permalink / raw)
  To: Zhao, XinfengX, dts; +Cc: Zhao, XinfengX, Chen, Zhaoyan

Acked-by: Zhaoyan, Chen <zhaoyan.chen@intel.com>



Regards,
Zhaoyan Chen


> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Xinfeng Zhao
> Sent: Friday, March 29, 2019 5:00 AM
> To: dts@dpdk.org
> Cc: Zhao, XinfengX <xinfengx.zhao@intel.com>
> Subject: [dts] [PATCH V1] test_plan: add test plan for cryptodev virtio ipsec test
> 
> Signed-off-by: Xinfeng Zhao <xinfengx.zhao@intel.com>
> ---
>  .../virtio_ipsec_cryptodev_func_test_plan.rst      | 178 +++++++++++++++++++++
>  1 file changed, 178 insertions(+)
>  create mode 100644 test_plans/virtio_ipsec_cryptodev_func_test_plan.rst
> 
> diff --git a/test_plans/virtio_ipsec_cryptodev_func_test_plan.rst
> b/test_plans/virtio_ipsec_cryptodev_func_test_plan.rst
> new file mode 100644
> index 0000000..74842ac
> --- /dev/null
> +++ b/test_plans/virtio_ipsec_cryptodev_func_test_plan.rst
> @@ -0,0 +1,178 @@
> +.. Copyright (c) <2018-2019> Intel Corporation
> +   All rights reserved.
> +
> +   Redistribution and use in source and binary forms, with or without
> +   modification, are permitted provided that the following conditions
> +   are met:
> +
> +   - Redistributions of source code must retain the above copyright
> +     notice, this list of conditions and the following disclaimer.
> +
> +   - Redistributions in binary form must reproduce the above copyright
> +     notice, this list of conditions and the following disclaimer in
> +     the documentation and/or other materials provided with the
> +     distribution.
> +
> +   - Neither the name of Intel Corporation nor the names of its
> +     contributors may be used to endorse or promote products derived
> +     from this software without specific prior written permission.
> +
> +   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS
> +   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> +   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
> +   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
> +   COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
> +   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
> +   (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR
> +   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
> +   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
> CONTRACT,
> +   STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
> +   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
> +   OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +=======================================
> +Cryptodev virtio ipsec Application Tests
> +=======================================
> +
> +
> +Description
> +===========
> +
> +This document provides the test plan for testing Cryptodev virtio ipsec
> +by crypto ipsec-secgw application. The crypto virtio ipsec application
> +is a DPDK app under DPDK app folder.
> +
> +Cryptodev virtio ipsec supports AESNI MB PMD, VIRTIO PMD
> +
> +AESNI MB PMD algorithm table
> +The table below contains AESNI MB algorithms which supported in crypto virtio
> ipsec.
> +Part of the algorithms are not supported currently.
> +
> ++-----------+-------------------+-------------------------------------------------------------------
> --------+
> +| Algorithm |  Mode             | Detail                                                                    |
> ++-----------+-------------------+-------------------------------------------------------------------
> --------+
> +| aes       | cbc               | Encrypt/Decrypt;Key size: 128, 192, 256 bits                              |
> ++-----------+-------------------+-------------------------------------------------------------------
> --------+
> +| sha       |                   | sha1, sha2-224, sha2-384, sha2-256, sha2-512                              |
> ++-----------+-------------------+-------------------------------------------------------------------
> --------+
> +| hmac      |                   | Support sha implementations sha1, sha2-224, sha2-256,
> |
> +|           |                   |                                                                           |
> +|           |                   | sha2-384, sha2-512                                                        |
> ++-----------+-------------------+-------------------------------------------------------------------
> --------+
> +
> +VIRTIO PMD algorithm table
> +The table below contains virtio algorithms which supported in crypto virtio ipsec.
> +Part of the algorithms are not supported currently.
> +
> ++-----------+-------------------+-------------------------------------------------------------------
> --------+
> +| Algorithm |  Mode             | Detail                                                                    |
> ++-----------+-------------------+-------------------------------------------------------------------
> --------+
> +| aes       | cbc               | Encrypt/Decrypt;Key size: 128, 192, 256 bits                              |
> ++-----------+-------------------+-------------------------------------------------------------------
> --------+
> +| sha       |                   | sha1, sha2-224, sha2-384, sha2-256, sha2-512                              |
> ++-----------+-------------------+-------------------------------------------------------------------
> --------+
> +| hmac      |                   | Support sha implementations sha1, sha2-224, sha2-256,
> |
> +|           |                   |                                                                           |
> +|           |                   | sha2-384, sha2-512                                                        |
> ++-----------+-------------------+-------------------------------------------------------------------
> --------+
> +
> +Prerequisites
> +=============
> +
> +qemu version >= 2.12
> +in qemu enable vhost-user-crypto:
> +    ./configure --target-list=x86_64-softmmu --enable-vhost-crypto
> +--prefix=/root/qemu-2.12 && make && make install the bin is in
> +/root/qemu-2.12 folder, which is your specified
> +
> +The options of ipsec-secgw is below:
> +
> +   ./build/ipsec-secgw [EAL options] --
> +                        -p PORTMASK -P -u PORTMASK -j FRAMESIZE
> +                        -l -w REPLAY_WINOW_SIZE -e -a
> +                        --config (port,queue,lcore)[,(port,queue,lcore]
> +                        --single-sa SAIDX
> +                        --rxoffload MASK
> +                        --txoffload MASK
> +                        -f CONFIG_FILE_PATH
> +
> +*   The "-f /path/to/config_file" option enables the application read and
> +    parse the configuration file specified, and configures the application
> +    with a given set of SP, SA and Routing entries accordingly.
> +
> +Test case setup:
> +================
> +
> +For function test, the DUT forward UDP packets generated by scapy.
> +After sending single packet from Scapy, crytpoDev function
> +encrypt/decrypt the payload in packet by using algorithm setting in VM. the packet
> back to tester.
> +
> +Use TCPDump to capture the received packet on tester. Then tester
> +parses the payload and compare the payload with correct answer pre-stored in
> scripts:
> +
> +   +----------+              +----------------------------------+
> +   |          |              |   +--------+        +--------+   |
> +   |          | -------------|-->|   VM0  | -----> |        |   |
> +   |  Tester  |              |   +--------+        |   VM1  |   |
> +   |          | <------------|-------------------> |        |   |
> +   |          |              |                     +--------+   |
> +   +----------+              +----------------------------------+
> +
> +In Host:
> +# Build DPDK and vhost_crypto app
> +      enable CONFIG_RTE_LIBRTE_VHOST in config/common_base
> +      make install -j T=x86_64-native-linuxapp-gcc
> +      make -C examples/vhost_crypto
> +
> +# Compile the latest qemu
> +# Run the dpdk vhost sample
> +    ./examples/vhost_crypto/build/vhost-crypto --socket-mem 2048,0
> +--legacy-mem -w 1a:01.0 -w 1c:01.0 -w 1e:01.0 --vdev
> +crypto_scheduler_pmd_1,slave=0000:1a:01.0_qat_sym,slave=0000:1c:01.0_qa
> +t_sym,slave=0000:1e:01.0_qat_sym,mode=round-robin,ordering=enable -l
> +8,9,10,11,12 -n 6  -- --config "(9,0,0),(10,0,0),(11,0,0),(12,0,0)"
> +--socket-file 9,/tmp/vm0_crypto0.sock
> +--socket-file=10,/tmp/vm0_crypto1.sock
> +--socket-file=11,/tmp/vm1_crypto0.sock
> +--socket-file=12,/tmp/vm1_crypto1.sock
> +
> +# bind vfio-pci
> +    usertools/dpdk-devbind.py --bind=vfio-pci 0000:60:00.0 0000:60:00.1
> +0000:3b:00.0 0000:3b:00.1
> +
> +# Start VM0 by the qemu
> +    taskset -c 11,12,13,14 /root/qemu-2/bin/qemu-system-x86_64  -name vm0 -
> enable-kvm -pidfile /tmp/.vm0.pid
> +        -daemonize -monitor unix:/tmp/vm0_monitor.sock,server,nowait
> +        -net nic,vlan=0,macaddr=00:00:00:42:65:aa,model=e1000,addr=1f -net
> user,vlan=0,hostfwd=tcp:10.67.111.126:6000-:22
> +        -cpu host -smp 4 -m 5120 -object memory-backend-
> file,id=mem,size=5120M,mem-path=/mnt/huge,share=on -numa
> node,memdev=mem -mem-prealloc
> +        -chardev socket,path=/tmp/vm0_qga0.sock,server,nowait,id=vm0_qga0 -
> device virtio-serial -device
> virtserialport,chardev=vm0_qga0,name=org.qemu.guest_agent.0
> +        -vnc :1
> +        -chardev socket,path=/tmp/vm0_crypto0.sock,id=vm0_crypto0 -object
> cryptodev-vhost-user,id=cryptodev0,chardev=vm0_crypto0 -device virtio-crypto-
> pci,id=crypto0,cryptodev=cryptodev0
> +        -chardev socket,path=/tmp/vm0_crypto1.sock,id=vm0_crypto1 -object
> cryptodev-vhost-user,id=cryptodev1,chardev=vm0_crypto1 -device virtio-crypto-
> pci,id=crypto1,cryptodev=cryptodev1
> +        -drive file=/root/VMs/virtio_crypto_test_710_1.img
> +        -device vfio-pci,host=0000:3b:00.0,id=pt_0
> +        -device vfio-pci,host=0000:3b:00.1,id=pt_1
> +
> +# Start VM1 by the qemu
> +    taskset -c 15,16,17,18 /root/qemu-2/bin/qemu-system-x86_64  -name vm1 -
> enable-kvm -pidfile /tmp/.vm1.pid
> +        -daemonize -monitor unix:/tmp/vm1_monitor.sock,server,nowait
> +        -net nic,vlan=0,macaddr=00:00:00:db:2e:f9,model=e1000,addr=1f -net
> user,vlan=0,hostfwd=tcp:10.67.111.126:6001-:22
> +        -cpu host -smp 4 -m 5120 -object memory-backend-
> file,id=mem,size=5120M,mem-path=/mnt/huge,share=on -numa
> node,memdev=mem -mem-prealloc
> +        -chardev socket,path=/tmp/vm1_qga0.sock,server,nowait,id=vm1_qga0 -
> device virtio-serial -device
> virtserialport,chardev=vm1_qga0,name=org.qemu.guest_agent.0
> +        -vnc :2
> +        -chardev socket,path=/tmp/vm1_crypto0.sock,id=vm1_crypto0 -object
> cryptodev-vhost-user,id=cryptodev0,chardev=vm1_crypto0 -device virtio-crypto-
> pci,id=crypto0,cryptodev=cryptodev0
> +        -chardev socket,path=/tmp/vm1_crypto1.sock,id=vm1_crypto1 -object
> cryptodev-vhost-user,id=cryptodev1,chardev=vm1_crypto1 -device virtio-crypto-
> pci,id=crypto1,cryptodev=cryptodev1
> +        -drive file=/root/VMs/virtio_crypto_test_710_2.img
> +        -device vfio-pci,host=0000:60:00.0,id=pt_0
> +        -device vfio-pci,host=0000:60:00.1,id=pt_1
> +
> +In VM
> +# set virtio device
> +    modprobe uio_pci_generic
> +    echo -n 0000:00:04.0 > /sys/bus/pci/drivers/virtio-pci/unbind
> +    echo -n 0000:00:05.0 > /sys/bus/pci/drivers/virtio-pci/unbind
> +    echo "1af4 1054" > /sys/bus/pci/drivers/uio_pci_generic/new_id
> +
> +# Run the ipsec test cases cmd
> +
> +    1. AESNI_MB case Command line Eg:
> +    In vm0:
> +    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w
> 0000:00:06.0 -w 0000:00:07.0 --vdev crypto_aesni_mb_pmd_1 --vdev
> crypto_aesni_mb_pmd_2 -l 1,2,3 -n 4  -- -P  --config "(0,0,2),(1,0,3)" -u 0x1 -p 0x3 -f
> /root/ipsec_test0.cfg
> +    In vm1:
> +    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w
> + 0000:00:06.0 -w 0000:00:07.0 --vdev crypto_aesni_mb_pmd_1 --vdev
> + crypto_aesni_mb_pmd_2 -l 1,2,3 -n 4  -- -P  --config "(0,0,2),(1,0,3)"
> + -u 0x1 -p 0x3 -f /root/ipsec_test1.cfg
> +
> +    2. VIRTIO case Command line Eg:
> +    In vm0:
> +    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w
> 0000:00:06.0 -w 0000:00:07.0 -w 00:04.0 -w 00:05.0 -l 1,2,3 -n 4  -- -P  --config
> "(0,0,2),(1,0,3)" -u 0x1 -p 0x3 -f /root/ipsec_test0.cfg
> +    In vm1:
> +    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w
> + 0000:00:06.0 -w 0000:00:07.0 -w 00:04.0 -w 00:05.0 -l 1,2,3 -n 4  --
> + -P  --config "(0,0,2),(1,0,3)" -u 0x1 -p 0x3 -f /root/ipsec_test1.cfg
> --
> 2.7.4


^ permalink raw reply	[flat|nested] 3+ messages in thread

* Re: [dts] [PATCH V1] test_plan: add test plan for cryptodev virtio ipsec test
  2019-03-28 20:59 [dts] [PATCH V1] test_plan: add test plan for cryptodev virtio ipsec test Xinfeng Zhao
  2019-04-09  6:44 ` Chen, Zhaoyan
@ 2019-04-15 21:28 ` Tu, Lijuan
  1 sibling, 0 replies; 3+ messages in thread
From: Tu, Lijuan @ 2019-04-15 21:28 UTC (permalink / raw)
  To: Zhao, XinfengX, dts; +Cc: Zhao, XinfengX

Applied, thanks

> -----Original Message-----
> From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Xinfeng Zhao
> Sent: Thursday, March 28, 2019 2:00 PM
> To: dts@dpdk.org
> Cc: Zhao, XinfengX <xinfengx.zhao@intel.com>
> Subject: [dts] [PATCH V1] test_plan: add test plan for cryptodev virtio ipsec
> test
> 
> Signed-off-by: Xinfeng Zhao <xinfengx.zhao@intel.com>
> ---
>  .../virtio_ipsec_cryptodev_func_test_plan.rst      | 178
> +++++++++++++++++++++
>  1 file changed, 178 insertions(+)
>  create mode 100644 test_plans/virtio_ipsec_cryptodev_func_test_plan.rst
> 
> diff --git a/test_plans/virtio_ipsec_cryptodev_func_test_plan.rst
> b/test_plans/virtio_ipsec_cryptodev_func_test_plan.rst
> new file mode 100644
> index 0000000..74842ac
> --- /dev/null
> +++ b/test_plans/virtio_ipsec_cryptodev_func_test_plan.rst
> @@ -0,0 +1,178 @@
> +.. Copyright (c) <2018-2019> Intel Corporation
> +   All rights reserved.
> +
> +   Redistribution and use in source and binary forms, with or without
> +   modification, are permitted provided that the following conditions
> +   are met:
> +
> +   - Redistributions of source code must retain the above copyright
> +     notice, this list of conditions and the following disclaimer.
> +
> +   - Redistributions in binary form must reproduce the above copyright
> +     notice, this list of conditions and the following disclaimer in
> +     the documentation and/or other materials provided with the
> +     distribution.
> +
> +   - Neither the name of Intel Corporation nor the names of its
> +     contributors may be used to endorse or promote products derived
> +     from this software without specific prior written permission.
> +
> +   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND
> CONTRIBUTORS
> +   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
> +   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND
> FITNESS
> +   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
> +   COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
> INDIRECT,
> +   INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES
> +   (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
> OR
> +   SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
> +   HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
> CONTRACT,
> +   STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
> +   ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF
> ADVISED
> +   OF THE POSSIBILITY OF SUCH DAMAGE.
> +
> +=======================================
> +Cryptodev virtio ipsec Application Tests
> +=======================================
> +
> +
> +Description
> +===========
> +
> +This document provides the test plan for testing Cryptodev virtio ipsec
> +by crypto ipsec-secgw application. The crypto virtio ipsec application
> +is a DPDK app under DPDK app folder.
> +
> +Cryptodev virtio ipsec supports AESNI MB PMD, VIRTIO PMD
> +
> +AESNI MB PMD algorithm table
> +The table below contains AESNI MB algorithms which supported in crypto
> virtio ipsec.
> +Part of the algorithms are not supported currently.
> +
> ++-----------+-------------------+-----------------------------------------------------------------------
> ----+
> +| Algorithm |  Mode             | Detail
> |
> ++-----------+-------------------+-----------------------------------------------------------------------
> ----+
> +| aes       | cbc               | Encrypt/Decrypt;Key size: 128, 192, 256 bits
> |
> ++-----------+-------------------+-----------------------------------------------------------------------
> ----+
> +| sha       |                   | sha1, sha2-224, sha2-384, sha2-256, sha2-512
> |
> ++-----------+-------------------+-----------------------------------------------------------------------
> ----+
> +| hmac      |                   | Support sha implementations sha1, sha2-224,
> sha2-256,                     |
> +|           |                   |                                                                           |
> +|           |                   | sha2-384, sha2-512                                                        |
> ++-----------+-------------------+-----------------------------------------------------------------------
> ----+
> +
> +VIRTIO PMD algorithm table
> +The table below contains virtio algorithms which supported in crypto virtio
> ipsec.
> +Part of the algorithms are not supported currently.
> +
> ++-----------+-------------------+-----------------------------------------------------------------------
> ----+
> +| Algorithm |  Mode             | Detail
> |
> ++-----------+-------------------+-----------------------------------------------------------------------
> ----+
> +| aes       | cbc               | Encrypt/Decrypt;Key size: 128, 192, 256 bits
> |
> ++-----------+-------------------+-----------------------------------------------------------------------
> ----+
> +| sha       |                   | sha1, sha2-224, sha2-384, sha2-256, sha2-512
> |
> ++-----------+-------------------+-----------------------------------------------------------------------
> ----+
> +| hmac      |                   | Support sha implementations sha1, sha2-224,
> sha2-256,                     |
> +|           |                   |                                                                           |
> +|           |                   | sha2-384, sha2-512                                                        |
> ++-----------+-------------------+-----------------------------------------------------------------------
> ----+
> +
> +Prerequisites
> +=============
> +
> +qemu version >= 2.12
> +in qemu enable vhost-user-crypto:
> +    ./configure --target-list=x86_64-softmmu --enable-vhost-crypto
> +--prefix=/root/qemu-2.12 && make && make install the bin is in
> +/root/qemu-2.12 folder, which is your specified
> +
> +The options of ipsec-secgw is below:
> +
> +   ./build/ipsec-secgw [EAL options] --
> +                        -p PORTMASK -P -u PORTMASK -j FRAMESIZE
> +                        -l -w REPLAY_WINOW_SIZE -e -a
> +                        --config (port,queue,lcore)[,(port,queue,lcore]
> +                        --single-sa SAIDX
> +                        --rxoffload MASK
> +                        --txoffload MASK
> +                        -f CONFIG_FILE_PATH
> +
> +*   The "-f /path/to/config_file" option enables the application read and
> +    parse the configuration file specified, and configures the application
> +    with a given set of SP, SA and Routing entries accordingly.
> +
> +Test case setup:
> +================
> +
> +For function test, the DUT forward UDP packets generated by scapy.
> +After sending single packet from Scapy, crytpoDev function
> +encrypt/decrypt the payload in packet by using algorithm setting in VM. the
> packet back to tester.
> +
> +Use TCPDump to capture the received packet on tester. Then tester
> +parses the payload and compare the payload with correct answer pre-
> stored in scripts:
> +
> +   +----------+              +----------------------------------+
> +   |          |              |   +--------+        +--------+   |
> +   |          | -------------|-->|   VM0  | -----> |        |   |
> +   |  Tester  |              |   +--------+        |   VM1  |   |
> +   |          | <------------|-------------------> |        |   |
> +   |          |              |                     +--------+   |
> +   +----------+              +----------------------------------+
> +
> +In Host:
> +# Build DPDK and vhost_crypto app
> +      enable CONFIG_RTE_LIBRTE_VHOST in config/common_base
> +      make install -j T=x86_64-native-linuxapp-gcc
> +      make -C examples/vhost_crypto
> +
> +# Compile the latest qemu
> +# Run the dpdk vhost sample
> +    ./examples/vhost_crypto/build/vhost-crypto --socket-mem 2048,0
> +--legacy-mem -w 1a:01.0 -w 1c:01.0 -w 1e:01.0 --vdev
> +crypto_scheduler_pmd_1,slave=0000:1a:01.0_qat_sym,slave=0000:1c:01.0_q
> a
> +t_sym,slave=0000:1e:01.0_qat_sym,mode=round-robin,ordering=enable -l
> +8,9,10,11,12 -n 6  -- --config "(9,0,0),(10,0,0),(11,0,0),(12,0,0)"
> +--socket-file 9,/tmp/vm0_crypto0.sock
> +--socket-file=10,/tmp/vm0_crypto1.sock
> +--socket-file=11,/tmp/vm1_crypto0.sock
> +--socket-file=12,/tmp/vm1_crypto1.sock
> +
> +# bind vfio-pci
> +    usertools/dpdk-devbind.py --bind=vfio-pci 0000:60:00.0 0000:60:00.1
> +0000:3b:00.0 0000:3b:00.1
> +
> +# Start VM0 by the qemu
> +    taskset -c 11,12,13,14 /root/qemu-2/bin/qemu-system-x86_64  -name
> vm0 -enable-kvm -pidfile /tmp/.vm0.pid
> +        -daemonize -monitor unix:/tmp/vm0_monitor.sock,server,nowait
> +        -net nic,vlan=0,macaddr=00:00:00:42:65:aa,model=e1000,addr=1f -net
> user,vlan=0,hostfwd=tcp:10.67.111.126:6000-:22
> +        -cpu host -smp 4 -m 5120 -object memory-backend-
> file,id=mem,size=5120M,mem-path=/mnt/huge,share=on -numa
> node,memdev=mem -mem-prealloc
> +        -chardev socket,path=/tmp/vm0_qga0.sock,server,nowait,id=vm0_qga0
> -device virtio-serial -device
> virtserialport,chardev=vm0_qga0,name=org.qemu.guest_agent.0
> +        -vnc :1
> +        -chardev socket,path=/tmp/vm0_crypto0.sock,id=vm0_crypto0 -object
> cryptodev-vhost-user,id=cryptodev0,chardev=vm0_crypto0 -device virtio-
> crypto-pci,id=crypto0,cryptodev=cryptodev0
> +        -chardev socket,path=/tmp/vm0_crypto1.sock,id=vm0_crypto1 -object
> cryptodev-vhost-user,id=cryptodev1,chardev=vm0_crypto1 -device virtio-
> crypto-pci,id=crypto1,cryptodev=cryptodev1
> +        -drive file=/root/VMs/virtio_crypto_test_710_1.img
> +        -device vfio-pci,host=0000:3b:00.0,id=pt_0
> +        -device vfio-pci,host=0000:3b:00.1,id=pt_1
> +
> +# Start VM1 by the qemu
> +    taskset -c 15,16,17,18 /root/qemu-2/bin/qemu-system-x86_64  -name
> vm1 -enable-kvm -pidfile /tmp/.vm1.pid
> +        -daemonize -monitor unix:/tmp/vm1_monitor.sock,server,nowait
> +        -net nic,vlan=0,macaddr=00:00:00:db:2e:f9,model=e1000,addr=1f -net
> user,vlan=0,hostfwd=tcp:10.67.111.126:6001-:22
> +        -cpu host -smp 4 -m 5120 -object memory-backend-
> file,id=mem,size=5120M,mem-path=/mnt/huge,share=on -numa
> node,memdev=mem -mem-prealloc
> +        -chardev socket,path=/tmp/vm1_qga0.sock,server,nowait,id=vm1_qga0
> -device virtio-serial -device
> virtserialport,chardev=vm1_qga0,name=org.qemu.guest_agent.0
> +        -vnc :2
> +        -chardev socket,path=/tmp/vm1_crypto0.sock,id=vm1_crypto0 -object
> cryptodev-vhost-user,id=cryptodev0,chardev=vm1_crypto0 -device virtio-
> crypto-pci,id=crypto0,cryptodev=cryptodev0
> +        -chardev socket,path=/tmp/vm1_crypto1.sock,id=vm1_crypto1 -object
> cryptodev-vhost-user,id=cryptodev1,chardev=vm1_crypto1 -device virtio-
> crypto-pci,id=crypto1,cryptodev=cryptodev1
> +        -drive file=/root/VMs/virtio_crypto_test_710_2.img
> +        -device vfio-pci,host=0000:60:00.0,id=pt_0
> +        -device vfio-pci,host=0000:60:00.1,id=pt_1
> +
> +In VM
> +# set virtio device
> +    modprobe uio_pci_generic
> +    echo -n 0000:00:04.0 > /sys/bus/pci/drivers/virtio-pci/unbind
> +    echo -n 0000:00:05.0 > /sys/bus/pci/drivers/virtio-pci/unbind
> +    echo "1af4 1054" > /sys/bus/pci/drivers/uio_pci_generic/new_id
> +
> +# Run the ipsec test cases cmd
> +
> +    1. AESNI_MB case Command line Eg:
> +    In vm0:
> +    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w
> 0000:00:06.0 -w 0000:00:07.0 --vdev crypto_aesni_mb_pmd_1 --vdev
> crypto_aesni_mb_pmd_2 -l 1,2,3 -n 4  -- -P  --config "(0,0,2),(1,0,3)" -u 0x1 -p
> 0x3 -f /root/ipsec_test0.cfg
> +    In vm1:
> +    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w
> + 0000:00:06.0 -w 0000:00:07.0 --vdev crypto_aesni_mb_pmd_1 --vdev
> + crypto_aesni_mb_pmd_2 -l 1,2,3 -n 4  -- -P  --config "(0,0,2),(1,0,3)"
> + -u 0x1 -p 0x3 -f /root/ipsec_test1.cfg
> +
> +    2. VIRTIO case Command line Eg:
> +    In vm0:
> +    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w
> 0000:00:06.0 -w 0000:00:07.0 -w 00:04.0 -w 00:05.0 -l 1,2,3 -n 4  -- -P  --config
> "(0,0,2),(1,0,3)" -u 0x1 -p 0x3 -f /root/ipsec_test0.cfg
> +    In vm1:
> +    ./examples/ipsec-secgw/build/ipsec-secgw --socket-mem 1024,0  -w
> + 0000:00:06.0 -w 0000:00:07.0 -w 00:04.0 -w 00:05.0 -l 1,2,3 -n 4  --
> + -P  --config "(0,0,2),(1,0,3)" -u 0x1 -p 0x3 -f /root/ipsec_test1.cfg
> --
> 2.7.4


^ permalink raw reply	[flat|nested] 3+ messages in thread

end of thread, other threads:[~2019-04-15 21:28 UTC | newest]

Thread overview: 3+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-03-28 20:59 [dts] [PATCH V1] test_plan: add test plan for cryptodev virtio ipsec test Xinfeng Zhao
2019-04-09  6:44 ` Chen, Zhaoyan
2019-04-15 21:28 ` Tu, Lijuan

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).