From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by dpdk.space (Postfix) with ESMTP id A6DA3A05D3 for ; Wed, 22 May 2019 10:48:42 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 5D09814EC; Wed, 22 May 2019 10:48:42 +0200 (CEST) Received: from mga12.intel.com (mga12.intel.com [192.55.52.136]) by dpdk.org (Postfix) with ESMTP id 6C997A49 for ; Wed, 22 May 2019 10:48:40 +0200 (CEST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga008.jf.intel.com ([10.7.209.65]) by fmsmga106.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 May 2019 01:48:39 -0700 X-ExtLoop1: 1 Received: from fmsmsx104.amr.corp.intel.com ([10.18.124.202]) by orsmga008.jf.intel.com with ESMTP; 22 May 2019 01:48:39 -0700 Received: from fmsmsx102.amr.corp.intel.com (10.18.124.200) by fmsmsx104.amr.corp.intel.com (10.18.124.202) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 22 May 2019 01:48:38 -0700 Received: from shsmsx108.ccr.corp.intel.com (10.239.4.97) by FMSMSX102.amr.corp.intel.com (10.18.124.200) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 22 May 2019 01:48:38 -0700 Received: from shsmsx101.ccr.corp.intel.com ([169.254.1.129]) by SHSMSX108.ccr.corp.intel.com ([169.254.8.126]) with mapi id 14.03.0415.000; Wed, 22 May 2019 16:48:36 +0800 From: "Tu, Lijuan" To: "Zhao, XinfengX" , "dts@dpdk.org" CC: "Zhao, XinfengX" Thread-Topic: [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test Thread-Index: AQHVC7BKUvkGO9sGoE6MrTT5DXZn1aZ23t/Q Date: Wed, 22 May 2019 08:48:36 +0000 Message-ID: <8CE3E05A3F976642AAB0F4675D0AD20E0BA84264@SHSMSX101.ccr.corp.intel.com> References: <1557958499-232538-1-git-send-email-xinfengx.zhao@intel.com> In-Reply-To: <1557958499-232538-1-git-send-email-xinfengx.zhao@intel.com> Accept-Language: zh-CN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.0.600.7 dlp-reaction: no-action x-ctpclassification: CTP_NT x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiYzNjZTgyYzctOGIzMC00NWRkLWE1NmYtMWRiMzkyZTRkMmQzIiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX05UIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE3LjEwLjE4MDQuNDkiLCJUcnVzdGVkTGFiZWxIYXNoIjoiTllWNmtWZ3crb2tkSmNRM3pSQXRyT25UQVRlYWxcL2VXTXFuUk1STWlsaWU0WTIzWFwvdDFEYWF0bXM0eFc4TzhcLyJ9 x-originating-ip: [10.239.127.40] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [dts] [PATCH V1] tests: add test suite and conf for cryptodev virtio ipsec test X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" Applied, thanks > -----Original Message----- > From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Xinfeng Zhao > Sent: Thursday, May 16, 2019 6:15 AM > To: dts@dpdk.org > Cc: Zhao, XinfengX > Subject: [dts] [PATCH V1] tests: add test suite and conf for cryptodev vi= rtio > ipsec test >=20 > Signed-off-by: Xinfeng Zhao > --- > conf/virtio_ipsec_cryptodev_func.cfg | 51 ++++ > tests/TestSuite_virtio_ipsec_cryptodev_func.py | 369 > +++++++++++++++++++++++++ > 2 files changed, 420 insertions(+) > create mode 100644 conf/virtio_ipsec_cryptodev_func.cfg > create mode 100644 tests/TestSuite_virtio_ipsec_cryptodev_func.py >=20 > diff --git a/conf/virtio_ipsec_cryptodev_func.cfg > b/conf/virtio_ipsec_cryptodev_func.cfg > new file mode 100644 > index 0000000..2e727c6 > --- /dev/null > +++ b/conf/virtio_ipsec_cryptodev_func.cfg > @@ -0,0 +1,51 @@ > +[suite] > +# Cryptodev common options qat device id crypto_dev_id=3D"37c9" > + > +# PCI Pass-through > +vfio_pci=3D"0000:60:00.0 0000:60:00.1 0000:3b:00.0 0000:3b:00.1" > + > +# default crypto device and sw device config > +vdev=3D"crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2" > + > +[vm0] > +qemu =3D > + path=3D/root/qemu-2/bin/qemu-system-x86_64; > +cpu =3D > + model=3Dhost,number=3D4,cpupin=3D11 12 13 14; mem =3D > + size=3D5120,hugepage=3Dyes; > +crypto =3D > + enable=3Dyes,opt_num=3D2; > +daemon =3D > + enable=3Dyes; > +login =3D > + user=3Droot,password=3Dtester; > +disk =3D > + file=3D/root/VMs/virtio_crypto_test_710_1.img; > +vnc =3D > + displayNum=3D1; > +device =3D > + driver=3Dvfio-pci,opt_host=3D0000:3b:00.0; > + driver=3Dvfio-pci,opt_host=3D0000:3b:00.1; > + > +[vm1] > +qemu =3D > + path=3D/root/qemu-2/bin/qemu-system-x86_64; > +cpu =3D > + model=3Dhost,number=3D4,cpupin=3D15 16 17 18; mem =3D > + size=3D5120,hugepage=3Dyes; > +crypto =3D > + enable=3Dyes,opt_num=3D2; > +daemon =3D > + enable=3Dyes; > +login =3D > + user=3Droot,password=3Dtester; > +disk =3D > + file=3D/root/VMs/virtio_crypto_test_710_2.img; > +vnc =3D > + displayNum=3D2; > +device =3D > + driver=3Dvfio-pci,opt_host=3D0000:60:00.0; > + driver=3Dvfio-pci,opt_host=3D0000:60:00.1; > diff --git a/tests/TestSuite_virtio_ipsec_cryptodev_func.py > b/tests/TestSuite_virtio_ipsec_cryptodev_func.py > new file mode 100644 > index 0000000..d89a93d > --- /dev/null > +++ b/tests/TestSuite_virtio_ipsec_cryptodev_func.py > @@ -0,0 +1,369 @@ > +# BSD LICENSE > +# > +# Copyright(c) <2019>, Intel Corporation. All rights reserved. > +# All rights reserved. > +# > +# Redistribution and use in source and binary forms, with or without # > +modification, are permitted provided that the following conditions # > +are met: > +# > +# * Redistributions of source code must retain the above copyright > +# notice, this list of conditions and the following disclaimer. > +# * Redistributions in binary form must reproduce the above copyright > +# notice, this list of conditions and the following disclaimer in > +# the documentation and/or other materials provided with the > +# distribution. > +# * Neither the name of Intel Corporation nor the names of its > +# contributors may be used to endorse or promote products derived > +# from this software without specific prior written permission. > +# > +# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND > CONTRIBUTORS # > +"AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT # > +LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS > FOR # > +A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE > COPYRIGHT # > +OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, > INCIDENTAL, # > +SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT > # > +LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF > USE, # > +DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND > ON ANY # > +THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT # > +(INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE > USE # > +OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. > +""" > +DPDK Test suite > +Test DPDK vhost + virtio scenarios > +""" > +import os > +import utils > +import time > +import commands > +import binascii > +from test_case import TestCase > +from qemu_kvm import QEMUKvm > +import cryptodev_common as cc > +from packet import Packet > + > +class VirtioCryptodevIpsecTest(TestCase): > + def set_up_all(self): > + self.sample_app =3D "./examples/vhost_crypto/build/vhost-crypto" > + self.user_app =3D "./examples/ipsec-secgw/build/ipsec-secgw " > + self._default_ipsec_gw_opts =3D { > + "p": "0x3", > + "config": None, > + "f": "ipsec_test.cfg", > + "u": "0x1" > + } > + > + self.vm0, self.vm0_dut =3D None, None > + self.vm1, self.vm1_dut =3D None, None > + self.dut.skip_setup =3D True > + > + self.dut_ports =3D self.dut.get_ports(self.nic) > + self.cores =3D self.dut.get_core_list("1S/5C/1T") > + self.mem_channel =3D self.dut.get_memory_channels() > + self.port_mask =3D utils.create_mask([self.dut_ports[0]]) > + > + self.tx_port =3D self.tester.get_local_port(self.dut_ports[0]) > + self.rx_port =3D self.tester.get_local_port(self.dut_ports[1]) > + > + self.tx_interface =3D self.tester.get_interface(self.tx_port) > + self.rx_interface =3D self.tester.get_interface(self.rx_port) > + > + self.logger.info("tx interface =3D " + self.tx_interface) > + self.logger.info("rx interface =3D " + self.rx_interface) > + > + self.bind_script_path =3D self.dut.get_dpdk_bind_script() > + self.vfio_pci =3D self.get_suite_cfg()["vfio_pci"] > + for each in self.vfio_pci.split(): > + cmd =3D "echo {} > /sys/bus/pci/devices/{}/driver/unbind".fo= rmat(each, > each.replace(":", "\:")) > + self.dut_execut_cmd(cmd) > + self.dut.restore_interfaces() > + > + if not cc.is_build_skip(self): > + self.tar_dpdk() > + self.dut.skip_setup =3D False > + cc.build_dpdk_with_cryptodev(self) > + self.build_vhost_app() > + cc.bind_qat_device(self, "vfio-pci") > + > + self.launch_vhost_switch() > + self.bind_vfio_pci() > + > + self.vm0, self.vm0_dut =3D self.launch_virtio_dut("vm0") > + self.vm1, self.vm1_dut =3D self.launch_virtio_dut("vm1") > + > + def set_up(self): > + pass > + > + def dut_execut_cmd(self, cmdline, ex=3D'#', timout=3D30): > + return self.dut.send_expect(cmdline, ex, timout) > + > + def tar_dpdk(self): > + self.dut_execut_cmd("tar -czf %s/dep/dpdk.tar.gz ../dpdk" % > + os.getcwd(), '#', 100) > + > + def build_user_dpdk(self, user_dut): > + user_dut.send_expect( > + "sed -i > 's/CONFIG_RTE_LIBRTE_PMD_AESNI_MB=3Dn$/CONFIG_RTE_LIBRTE_PMD_AES > NI_MB=3Dy/' config/common_base", '#', 30) > + out =3D user_dut.send_expect("make install T=3D%s" % self.target= , "# ", 900) > + self.logger.info(out) > + assert ("Error" not in out), "Compilation error..." > + > + def build_vhost_app(self): > + out =3D self.dut.build_dpdk_apps("./examples/vhost_crypto") > + self.verify("Error" not in out, "Compilation error") > + self.verify("No such" not in out, "Compilation error") > + > + def build_user_app(self, user_dut): > + user_dut.send_expect("export RTE_SDK=3D`pwd`", '#', 30) > + user_dut.send_expect("export RTE_TARGET=3D%s" % self.target, '#'= , 30) > + out =3D user_dut.send_expect("make -C ./examples/ipsec-secgw", '= #', 600) > + self.logger.info(out) > + self.verify("Error" not in out, "Compilation error") > + self.verify("No such" not in out, "Compilation error") > + > + def get_vhost_eal(self): > + default_eal_opts =3D { > + "c": None, > + "l": ','.join(self.cores), > + "w": None, > + "vdev": None, > + "config": None, > + "socket-mem": "2048,0", > + "n": self.mem_channel > + } > + opts =3D default_eal_opts.copy() > + > + # Update options with test suite/case config file > + for key in opts.keys(): > + if key in self.get_suite_cfg(): > + opts[key] =3D self.get_suite_cfg()[key] > + > + # Generate option string > + opt_str =3D "" > + for key,value in opts.items(): > + if value is None: > + continue > + dash =3D "-" if len(key) =3D=3D 1 else "--" > + opt_str =3D opt_str + "{0}{1} {2} ".format(dash, key, value) > + > + return opt_str > + > + def cfg_prepare(self, dut): > + """ > + ipsec configuration file > + """ > + ep0 =3D ( > + "#SP IPv4 rules\n" > + "sp ipv4 out esp protect 5 pri 1 dst 192.168.105.0/24 sport = 0:65535 > dport 0:65535\n" > + "sp ipv4 in esp protect 105 pri 1 dst 192.168.115.0/24 sport= 0:65535 > dport 0:65535\n" > + > + "#SA rules\n" > + "sa out 5 cipher_algo aes-128-cbc cipher_key > 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key > 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.1.5 d= st > 172.16.2.5\n" > + "sa in 105 cipher_algo aes-128-cbc cipher_key > 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key > 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.2.5 d= st > 172.16.1.5\n" > + > + "#Routing rules\n" > + "rt ipv4 dst 172.16.2.5/32 port 0\n" > + "rt ipv4 dst 192.168.115.0/24 port 1\n") > + > + ep1 =3D ( > + "#SP IPv4 rules\n" > + "sp ipv4 in esp protect 5 pri 1 dst 192.168.105.0/24 sport 0= :65535 > dport 0:65535\n" > + "sp ipv4 out esp protect 105 pri 1 dst 192.168.115.0/24 spor= t > 0:65535 dport 0:65535\n" > + > + "#SA rules\n" > + "sa in 5 cipher_algo aes-128-cbc cipher_key > 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key > 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.1.5 d= st > 172.16.2.5\n" > + "sa out 105 cipher_algo aes-128-cbc cipher_key > 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 auth_algo sha1-hmac auth_key > 0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0:0 mode ipv4-tunnel src 172.16.2.5 d= st > 172.16.1.5\n" > + > + "#Routing rules\n" > + "rt ipv4 dst 172.16.1.5/32 port 0\n" > + "rt ipv4 dst 192.168.105.0/24 port 1\n") > + > + self.set_cfg(dut, 'ep0.cfg', ep0) > + self.set_cfg(dut, 'ep1.cfg', ep1) > + > + def set_cfg(self, dut, filename, cfg): > + with open(filename, 'w') as f: > + f.write(cfg) > + > + dut.session.copy_file_to(filename, dut.base_dir) > + dut.session.copy_file_to(filename, dut.base_dir) > + > + def launch_vhost_switch(self): > + eal_opt_str =3D self.get_vhost_eal() > + > + config =3D '"(%s,0,0),(%s,0,0),(%s,0,0),(%s,0,0)"' % tuple(self.= cores[-4:]) > + socket_file =3D "%s,/tmp/vm0_crypto0.sock\ > + --socket-file=3D%s,/tmp/vm0_crypto1.sock\ > + --socket-file=3D%s,/tmp/vm1_crypto0.sock\ > + --socket-file=3D%s,/tmp/vm1_crypto1.sock"% tuple(self.cores[-4:]= ) > + self.vhost_switch_cmd =3D cc.get_dpdk_app_cmd_str(self.sample_ap= p, > eal_opt_str, > + '--config %s --socket-file %s' % > + (config, socket_file)) > + > + self.dut_execut_cmd("rm -r /tmp/*") > + self.dut_execut_cmd(self.vhost_switch_cmd, "socket created", > + 30) > + > + def bind_vfio_pci(self): > + commands.getoutput("modprobe vfio-pci") > + commands.getoutput('%s -b vfio-pci %s' % > + (os.path.join(self.dut.base_dir, self.bind_script_path), > + self.vfio_pci)) > + > + def set_virtio_pci(self, dut): > + out =3D dut.send_expect("lspci -d:1054|awk '{{print $1}}'", "# "= , 10) > + virtio_list =3D out.replace("\r", "\n").replace("\n\n", "\n").sp= lit("\n") > + dut.send_expect('modprobe uio_pci_generic', '#', 10) > + for line in virtio_list: > + cmd =3D "echo 0000:{} > > /sys/bus/pci/devices/0000\:{}/driver/unbind".format( > + line, line.replace(":", "\:")) > + dut.send_expect(cmd, "# ", 10) > + dut.send_expect('echo "1af4 1054" > > + /sys/bus/pci/drivers/uio_pci_generic/new_id', "# ", 10) > + > + return virtio_list > + > + def launch_virtio_dut(self, vm_name): > + vm =3D QEMUKvm(self.dut, vm_name, 'virtio_ipsec_cryptodev_func') > + > + try: > + vm_dut =3D vm.start(set_target=3DFalse) > + if vm_dut is None: > + print('{} start failed'.format(vm_name)) > + except Exception as err: > + raise err > + vm_dut.restore_interfaces() > + > + if not self.dut.skip_setup: > + self.build_user_dpdk(vm_dut) > + self.build_user_app(vm_dut) > + > + vm_dut.setup_modules(self.target, "igb_uio", None) > + vm_dut.bind_interfaces_linux('igb_uio') > + vm.virtio_list =3D self.set_virtio_pci(vm_dut) > + self.logger.info("{} virtio list: {}".format(vm_name, vm.virtio_= list)) > + vm.cores =3D vm_dut.get_core_list("all") > + self.logger.info("{} core list: {}".format(vm_name, vm.cores)) > + vm.ports =3D [port["pci"] for port in vm_dut.ports_info] > + self.logger.info("{} port list: {}".format(vm_name, vm.ports)) > + self.cfg_prepare(vm_dut) > + > + return vm, vm_dut > + > + def send_and_dump_pkg(self): > + status =3D True > + > + inst =3D self.tester.tcpdump_sniff_packets(self.rx_interface, > + timeout=3D25) > + > + PACKET_COUNT =3D 65 > + payload =3D 256 * ['11'] > + > + pkt =3D Packet() > + > + pkt.assign_layers(["ether", "ipv4", "udp", "raw"]) > + pkt.config_layer("ether", {"src": "52:00:00:00:00:00", "dst": > "52:00:00:00:00:01"}) > + src_ip =3D "192.168.105.200" > + dst_ip =3D "192.168.105.100" > + pkt.config_layer("ipv4", {"src": src_ip, "dst": dst_ip}) > + pkt.config_layer("udp", {"dst": 0}) > + pkt.config_layer("raw", {"payload": payload}) > + pkt.send_pkt(tx_port=3Dself.tx_interface, count=3DPACKET_COUNT) > + > + pkt_rec =3D self.tester.load_tcpdump_sniff_packets(inst) > + self.logger.info("dump: {} packets".format(len(pkt_rec))) > + if len(pkt_rec) !=3D PACKET_COUNT: > + self.logger.info("dump pkg: {}, the num of pkg dumped is > incorrtct!".format(len(pkt_rec))) > + status =3D False > + > + for pkt_r in pkt_rec: > + #pkt_r.pktgen.pkt.show() > + if src_ip !=3D pkt_r.pktgen.strip_layer3("src") or dst_ip != =3D > pkt_r.pktgen.strip_layer3("dst"): > + self.logger.info("the ip of pkg dumped is incorrtct!") > + status =3D False > + > + dump_text =3D > binascii.b2a_hex(pkt_r.pktgen.pkt["Raw"].getfieldval("load")) > + if dump_text !=3D ''.join(payload): > + self.logger.info("the text of pkg dumped is incorrtct!") > + status =3D False > + > + return status > + > + def test_aesni_mb_aes_cbc_sha1_hmac(self): > + if cc.is_test_skip(self): > + return > + > + eal_opt_str_0 =3D cc.get_eal_opt_str(self, {"l": ','.join(self.v= m0.cores[-3:]), > + "socket-mem":"512,0", > + "w": " -w ".join(self.vm= 0.ports), > + > + "vdev":"crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"}) > + > + crypto_ipsec_opt_str0 =3D cc.get_opt_str(self, > + self._default_ipsec_gw_opts, override_opts=3D{'f': "/root/dpdk/ep0.cfg"= , > + "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm0.cores[-2:])}) > + > + out0 =3D self._run_crypto_ipsec(self.vm0_dut, eal_opt_str_0, > crypto_ipsec_opt_str0) > + self.logger.info(out0) > + > + eal_opt_str_1 =3D cc.get_eal_opt_str(self, {"l": ','.join(self.v= m1.cores[-3:]), > + "socket-mem":"512,0", > + "w": " -w ".join(self.vm= 1.ports), > + "vdev": > + "crypto_aesni_mb_pmd_1 --vdev crypto_aesni_mb_pmd_2"}) > + > + crypto_ipsec_opt_str1 =3D cc.get_opt_str(self, > self._default_ipsec_gw_opts, override_opts=3D{'f': "/root/dpdk/ep1.cfg", > "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm1.cores[-2:])}) > + out1 =3D self._run_crypto_ipsec(self.vm1_dut, eal_opt_str_1, > crypto_ipsec_opt_str1) > + self.logger.info(out1) > + > + result =3D self.send_and_dump_pkg() > + self.verify(result, "FAILED") > + > + def test_virtio_aes_cbc_sha1_hmac(self): > + if cc.is_test_skip(self): > + return > + > + eal_opt_str_0 =3D cc.get_eal_opt_str(self, {"l": ','.join(self.v= m0.cores[-3:]), > + "socket-mem":"512,0", > + "w": " -w ".join(self.vm= 0.ports + > self.vm0.virtio_list), > + "vdev":None}) > + > + crypto_ipsec_opt_str0 =3D cc.get_opt_str(self, > self._default_ipsec_gw_opts, override_opts=3D{'f': "/root/dpdk/ep0.cfg", > "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm0.cores[-2:])}) > + out0 =3D self._run_crypto_ipsec(self.vm0_dut, eal_opt_str_0, > crypto_ipsec_opt_str0) > + self.logger.info(out0) > + > + eal_opt_str_1 =3D cc.get_eal_opt_str(self, {"l": ','.join(self.v= m1.cores[-3:]), > + "socket-mem":"512,0", > + "w": " -w ".join(self.vm= 1.ports + > self.vm1.virtio_list), > + "vdev": None}) > + > + crypto_ipsec_opt_str1 =3D cc.get_opt_str(self, > self._default_ipsec_gw_opts, override_opts=3D{'f': "/root/dpdk/ep1.cfg", > "config": '"(0,0,%s),(1,0,%s)"' % tuple(self.vm1.cores[-2:])}) > + out1 =3D self._run_crypto_ipsec(self.vm1_dut, eal_opt_str_1, > crypto_ipsec_opt_str1) > + self.logger.info(out1) > + > + result =3D self.send_and_dump_pkg() > + self.verify(result, "FAILED") > + > + def _run_crypto_ipsec(self, vm_dut, eal_opt_str, case_opt_str): > + cmd_str =3D cc.get_dpdk_app_cmd_str(self.user_app, > + eal_opt_str, > + case_opt_str + " -l") > + self.logger.info(cmd_str) > + try: > + out =3D vm_dut.send_expect(cmd_str, "IPSEC", 600) > + except Exception, ex: > + self.logger.error(ex) > + raise ex > + > + return out > + > + def tear_down(self): > + self.vm0_dut.send_expect("^C", "# ") > + self.vm1_dut.send_expect("^C", "# ") > + > + def tear_down_all(self): > + if self.vm0: > + self.vm0.stop() > + self.dut.virt_exit() > + self.vm0 =3D None > + > + if self.vm1: > + self.vm1.stop() > + self.dut.virt_exit() > + self.vm1 =3D None > + > + self.dut_execut_cmd("^C", "# ") > + self.dut_execut_cmd("killall -s INT vhost-crypto") > + self.dut_execut_cmd("killall -s INT qemu-system-x86_64") > + self.dut_execut_cmd("rm -r /tmp/*") > + > + cc.clear_dpdk_config(self) > -- > 2.7.4