From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by dpdk.space (Postfix) with ESMTP id F02D5A05D3 for ; Wed, 22 May 2019 10:58:19 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id BC8D414EC; Wed, 22 May 2019 10:58:19 +0200 (CEST) Received: from mga14.intel.com (mga14.intel.com [192.55.52.115]) by dpdk.org (Postfix) with ESMTP id 92AB0A49 for ; Wed, 22 May 2019 10:58:17 +0200 (CEST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga004.jf.intel.com ([10.7.209.38]) by fmsmga103.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 22 May 2019 01:58:15 -0700 X-ExtLoop1: 1 Received: from fmsmsx108.amr.corp.intel.com ([10.18.124.206]) by orsmga004.jf.intel.com with ESMTP; 22 May 2019 01:58:16 -0700 Received: from fmsmsx114.amr.corp.intel.com (10.18.116.8) by FMSMSX108.amr.corp.intel.com (10.18.124.206) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 22 May 2019 01:58:15 -0700 Received: from shsmsx103.ccr.corp.intel.com (10.239.4.69) by FMSMSX114.amr.corp.intel.com (10.18.116.8) with Microsoft SMTP Server (TLS) id 14.3.408.0; Wed, 22 May 2019 01:58:14 -0700 Received: from shsmsx101.ccr.corp.intel.com ([169.254.1.129]) by SHSMSX103.ccr.corp.intel.com ([169.254.4.70]) with mapi id 14.03.0415.000; Wed, 22 May 2019 16:58:13 +0800 From: "Tu, Lijuan" To: "Peng, Yuan" , "dts@dpdk.org" CC: "Peng, Yuan" Thread-Topic: [dts] [PATCH]test_plans: command-line parameter changed Thread-Index: AQHVCWEc2E5/GtQ780eEFvKcxwiY66Z25iYw Date: Wed, 22 May 2019 08:58:12 +0000 Message-ID: <8CE3E05A3F976642AAB0F4675D0AD20E0BA8435F@SHSMSX101.ccr.corp.intel.com> References: <1557734293-42620-1-git-send-email-yuan.peng@intel.com> In-Reply-To: <1557734293-42620-1-git-send-email-yuan.peng@intel.com> Accept-Language: zh-CN, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-version: 11.0.600.7 dlp-reaction: no-action x-ctpclassification: CTP_NT x-titus-metadata-40: eyJDYXRlZ29yeUxhYmVscyI6IiIsIk1ldGFkYXRhIjp7Im5zIjoiaHR0cDpcL1wvd3d3LnRpdHVzLmNvbVwvbnNcL0ludGVsMyIsImlkIjoiMzlhM2YzYzItYTYzYi00OTFkLWI5NTktMWIwMzcwZjIzNWFjIiwicHJvcHMiOlt7Im4iOiJDVFBDbGFzc2lmaWNhdGlvbiIsInZhbHMiOlt7InZhbHVlIjoiQ1RQX05UIn1dfV19LCJTdWJqZWN0TGFiZWxzIjpbXSwiVE1DVmVyc2lvbiI6IjE3LjEwLjE4MDQuNDkiLCJUcnVzdGVkTGFiZWxIYXNoIjoicUJoK01BNXMzMFQ4T016UWFYaUVyNkhRT3hmd29ONmVURUhLNlR4VGhJVjlPcTBYVk9cLzNhOGZYdk1ZZnNvdlUifQ== x-originating-ip: [10.239.127.40] Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 Subject: Re: [dts] [PATCH]test_plans: command-line parameter changed X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Sender: "dts" Applied, thanks > -----Original Message----- > From: dts [mailto:dts-bounces@dpdk.org] On Behalf Of Peng Yuan > Sent: Monday, May 13, 2019 3:58 PM > To: dts@dpdk.org > Cc: Peng, Yuan > Subject: [dts] [PATCH]test_plans: command-line parameter changed >=20 > Change command-line parameter of macsec_for_ixgbe_test_plan.rst >=20 > Signed-off-by: Peng Yuan >=20 > diff --git a/test_plans/macsec_for_ixgbe_test_plan.rst > b/test_plans/macsec_for_ixgbe_test_plan.rst > index 4b8a762..893e7a6 100644 > --- a/test_plans/macsec_for_ixgbe_test_plan.rst > +++ b/test_plans/macsec_for_ixgbe_test_plan.rst > @@ -73,6 +73,13 @@ Prerequisites > 1. Hardware: >=20 > * 1x Niantic NIC (2x 10G) > + port0: > + pci address: 07:00.0 > + mac address: 00:00:00:00:00:01 > + port1: > + pci address: 07:00.1 > + mac address: 00:00:00:00:00:02 > + > * 2x IXIA ports (10G) >=20 > 2. Software: > @@ -82,13 +89,13 @@ Prerequisites >=20 > 3. Added command:: >=20 > - testpmd>set macsec offload (port_id) on encrypt (on|off) replay-pr= otect > (on|off) > + testpmd> set macsec offload (port_id) on encrypt (on|off) > + replay-protect (on|off) > " Enable MACsec offload. " > - testpmd>set macsec offload (port_id) off > + testpmd> set macsec offload (port_id) off > " Disable MACsec offload. " > - testpmd>set macsec sc (tx|rx) (port_id) (mac) (pi) > + testpmd> set macsec sc (tx|rx) (port_id) (mac) (pi) > " Configure MACsec secure connection (SC). " > - testpmd>set macsec sa (tx|rx) (port_id) (idx) (an) (pn) (key) > + testpmd> set macsec sa (tx|rx) (port_id) (idx) (an) (pn) (key) > " Configure MACsec secure association (SA). " >=20 >=20 > @@ -102,255 +109,306 @@ Test Case 1: MACsec packets send and receive >=20 > 2. Config the rx port >=20 > - 1. Start the testpmd of rx port:: > + 1. Start the testpmd of rx port:: > + > + ./testpmd -c 0xf --socket-mem 1024,0 --file-prefix=3Drx -w 0000:07= :00.1 \ > + -- -i --port-topology=3Dchained > + > + 2. Set MACsec offload on:: >=20 > - ./testpmd -c 0xc --socket-mem 1024,1024 --file-prefix=3Drx -w > 0000:07:00.1 \ > - -- --port-topology=3Dchained -i --crc-strip > + testpmd> set macsec offload 0 on encrypt on replay-protect on >=20 > - 2. Set MACsec offload on:: > + Show port port tx configuration:: >=20 > - testpmd>set macsec offload 0 on encrypt on replay-protect on > + testpmd> show port 0 tx_offload configuration > + Tx Offloading Configuration of port 0 : > + Port : MACSEC_INSERT > + Queue[ 0] : >=20 > - 3. Set MACsec parameters as rx_port:: > + 3. Set MACsec parameters as rx_port:: >=20 > - testpmd>set macsec sc rx 0 00:00:00:00:00:01 0 > - testpmd>set macsec sa rx 0 0 0 0 > 00112200000000000000000000000000 > + testpmd> set macsec sc rx 0 00:00:00:00:00:01 0 > + testpmd> set macsec sa rx 0 0 0 0 > + 00112200000000000000000000000000 >=20 > - 4. Set MACsec parameters as tx_port:: > + 4. Set MACsec parameters as tx_port:: >=20 > - testpmd>set macsec sc tx 0 00:00:00:00:00:02 0 > - testpmd>set macsec sa tx 0 0 0 0 > 00112200000000000000000000000000 > + testpmd> set macsec sc tx 0 00:00:00:00:00:02 0 > + testpmd> set macsec sa tx 0 0 0 0 > + 00112200000000000000000000000000 >=20 > - 5. Set rxonly:: > + 5. Set rxonly:: >=20 > - testpmd>set fwd rxonly > + testpmd> set fwd rxonly >=20 > - 6. Start:: > + 6. Start:: >=20 > - testpmd>set promisc all on > - testpmd>start > + testpmd> set promisc all on > + testpmd> start >=20 > 3. Config the tx port >=20 > - 1. Start the testpmd of tx port:: > + 1. Start the testpmd of tx port:: > + > + ./testpmd -c 0xf0 --socket-mem 1024,0 --file-prefix=3Dtx -w 0000:0= 7:00.0 \ > + -- -i --port-topology=3Dchained --tx-offloads=3D0x00002000 > + > + 2. Set MACsec offload on:: >=20 > - ./testpmd -c 0x30 --socket-mem 1024,1024 --file-prefix=3Dtx -w > 0000:07:00.0 \ > - -- --port-topology=3Dchained -i --crc-strip --tx-offloads=3D0x8= fff > + testpmd> set macsec offload 0 on encrypt on replay-protect on >=20 > - 2. Set MACsec offload on:: > + Show port port tx configuration:: >=20 > - testpmd>set macsec offload 0 on encrypt on replay-protect on > + testpmd> show port 0 tx_offload configuration > + Tx Offloading Configuration of port 0 : > + Port : MACSEC_INSERT > + Queue[ 0] : MACSEC_INSERT >=20 > - 3. Set MACsec parameters as tx_port:: > + 3. Set MACsec parameters as tx_port:: >=20 > - testpmd>set macsec sc tx 0 00:00:00:00:00:01 0 > - testpmd>set macsec sa tx 0 0 0 0 > 00112200000000000000000000000000 > + testpmd> set macsec sc tx 0 00:00:00:00:00:01 0 > + testpmd> set macsec sa tx 0 0 0 0 > + 00112200000000000000000000000000 >=20 > - 4. Set MACsec parameters as rx_port:: > + 4. Set MACsec parameters as rx_port:: >=20 > - testpmd>set macsec sc rx 0 00:00:00:00:00:02 0 > - testpmd>set macsec sa rx 0 0 0 0 > 00112200000000000000000000000000 > + testpmd> set macsec sc rx 0 00:00:00:00:00:02 0 > + testpmd> set macsec sa rx 0 0 0 0 > + 00112200000000000000000000000000 >=20 > - 5. Set txonly:: > + 5. Set txonly:: >=20 > - testpmd>set fwd txonly > + testpmd> set fwd txonly >=20 > - 6. Start:: > + 6. Start:: >=20 > - testpmd>start > + testpmd> start >=20 > 4. Check the result:: >=20 > - testpmd>stop > - testpmd>show port xstats 0 > + testpmd> stop > + testpmd> show port xstats 0 >=20 > - stop the packet transmitting on tx_port first, then stop the packet > receiving > + Stop the packet transmitting on tx_port first, then stop the packet > + receiving > on rx_port. >=20 > - check the rx data and tx data:: > + Check the rx data and tx data:: >=20 > - tx_good_packets =3D=3D rx_good_packets > - out_pkts_encrypted =3D=3D in_pkts_ok =3D=3D tx_good_packets =3D=3D > rx_good_packets > - out_octets_encrypted =3D=3D in_octets_decrypted > - out_octets_protected =3D=3D in_octets_validated > + out_pkts_protected =3D=3D 0 > + out_pkts_encrypted =3D=3D in_pkts_ok =3D=3D tx_good_packets =3D=3D > rx_good_packets !=3D0 > + out_octets_encrypted =3D=3D in_octets_decrypted !=3D 0 > + out_octets_protected =3D=3D in_octets_validated !=3D 0 >=20 > - if you want to check the content of the packet, use the command:: > + If you want to check the content of the packet, use the command:: >=20 > - testpmd>set verbose 1 > + testpmd> set verbose 1 >=20 > - the received packets are Decrypted. > + The received packets are Decrypted. >=20 > - check the ol_flags:: > + Check the ol_flags:: >=20 > PKT_RX_IP_CKSUM_GOOD >=20 > - check the content of the packet:: > + Check the content of the packet:: > + > + hw ptype: L2_ETHER L3_IPV4 L4_UDP - sw ptype: L2_ETHER L3_IPV4 > + L4_UDP > + > + > +Test Case 2: MACsec encrypt off and replay-protect off > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D > + > +1. Start testpmd as test case 1, then set on tx port:: >=20 > - type=3D0x0800, the ptype of L2,L3,L4: L2_ETHER L3_IPV4 L4_UDP > + testpmd> set macsec offload 0 on encrypt off replay-protect on >=20 > + Other settings are the same as test case 1. >=20 > -Test Case 2: MACsec send and receive with different parameters > +2. Start packet transfer, check the rx data and tx data:: > + > + out_pkts_encrypted =3D=3D 0 > + out_pkts_protected =3D=3D in_pkts_ok =3D=3D tx_good_packets =3D=3D > rx_good_packets !=3D 0 > + in_octets_decrypted =3D=3D out_octets_encrypted =3D=3D 0 > + out_octets_protected =3D=3D in_octets_validated !=3D 0 > + > +3. Clear the port xstats, then set on tx port:: > + > + testpmd> set macsec offload 0 on encrypt on replay-protect off > + > +4. Start packet transfer, check the rx data and tx data. > + Get the same result as test case 1. > + > + > +Test Case 3: MACsec send and receive with different parameters > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D >=20 > 1. Set "idx" to 1 on both rx and tx sides. > - check the MACsec packets can be received correctly. > + Check the MACsec packets can be received correctly. >=20 > - set "idx" to 2 on both rx and tx sides. > - it can't be set successfully. > + Set "idx" to 2 on both rx and tx sides. > + It can't be set successfully. >=20 > 2. Set "an" to 1/2/3 on both rx and tx sides. > - check the MACsec packets can be received correctly. > + Check the MACsec packets can be received correctly. >=20 > - set "an " to 4 on both rx and tx sides. > - it can't be set successfully. > + Set "an " to 4 on both rx and tx sides. > + It can't be set successfully. >=20 > 3. Set "pn" to 0xffffffec on both rx and tx sides. > - rx port can receive four packets. > + Rx port can receive four packets. >=20 > - set "pn" to 0xffffffed on both rx and tx sides. > - rx port can receive three packets. > + Set "pn" to 0xffffffed on both rx and tx sides. > + Rx port can receive three packets. >=20 > - set "pn" to 0xffffffee/0xffffffef on both rx and tx sides. > - rx port can receive three packets too. But the expected number > + Set "pn" to 0xffffffee/0xffffffef on both rx and tx sides. > + Rx port can receive three packets too. But the expected number > of packets is 2/1. While the explanation that DPDK developers > gave is that it's hardware's behavior. >=20 > - Once the PN reaches a value of 0xFFFFFFF0, hardware clears > - the Enable Tx LinkSec field in the LSECTXCTRL register to 00b > - so when pn get to 0xfffffff0, the number of packets received can't > + Once the "pn" reaches a value of 0xfffffff0, hardware clears > + the Enable Tx LinkSec field in the LSECTXCTRL register to 00b. > + So when "pn" get to 0xfffffff0, the number of packets received can't > be expected. >=20 > - set "pn" to 0x100000000 on both rx and tx sides. > - it can't be set successfully. > + Set "pn" to 0x100000000 on both rx and tx sides. > + It can't be set successfully. >=20 > 4. Set "key" to 00000000000000000000000000000000 and > ffffffffffffffffffffffffffffffff on both rx and tx sides. > - check the MACsec packets can be received correctly. > + Check the MACsec packets can be received correctly. >=20 > 5. Set "pi" to 1/0xffff on both rx and tx sides. > - check the MACsec packets can not be received. > + Check the MACsec packets can not be received. >=20 > - set "pi" to 0x10000 on both rx and tx sides. > - it can't be set successfully. > + Set "pi" to 0x10000 on both rx and tx sides. > + It can't be set successfully. >=20 >=20 > -Test Case 3: MACsec packets send and normal receive > +Test Case 4: MACsec packets send and normal receive > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D >=20 > 1. Disable MACsec offload on rx port:: >=20 > - testpmd>set macsec offload 0 off > + testpmd> set macsec offload 0 off > + > + Show port port tx configuration:: > + > + testpmd> show port 0 tx_offload configuration > + Tx Offloading Configuration of port 0 : > + Port : > + Queue[ 0] : >=20 > 2. Start the the packets transfer >=20 > 3. Check the result:: >=20 > - testpmd>stop > - testpmd>show port xstats 0 > + testpmd> stop > + testpmd> show port xstats 0 >=20 > - stop the testpmd on tx_port first, then stop the testpmd on rx_port. > - the received packets are encrypted. > + Stop the testpmd on tx_port first, then stop the testpmd on rx_port. > + The received packets are encrypted. >=20 > - check the content of the packet:: > + Check the content of the packet:: >=20 > - type=3D0x88e5 sw ptype: L2_ETHER - l2_len=3D14 - Receive queue=3D= 0x0 > + hw ptype: L2_ETHER - sw ptype: L2_ETHER >=20 > - you can't find L3 and L4 information in the packet > - in_octets_decrypted and in_octets_validated doesn't increase on last = data > + You can't find L3 and L4 information in the packet > + in_octets_decrypted and in_octets_validated doesn't increase on data > transfer. >=20 >=20 > -Test Case 4: normal packet send and MACsec receive > +Test Case 5: normal packet send and MACsec receive > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D >=20 > 1. Enable MACsec offload on rx port:: >=20 > - testpmd>set macsec offload 0 on encrypt on replay-protect on > + testpmd> set macsec offload 0 on encrypt on replay-protect on >=20 > 2. Disable MACsec offload on tx port:: >=20 > - testpmd>set macsec offload 0 off > + testpmd> set macsec offload 0 off > + testpmd> show port 0 tx_offload configuration > + Tx Offloading Configuration of port 0 : > + Port : > + Queue[ 0] : MACSEC_INSERT >=20 > 3. Start the the packets transfer:: >=20 > - testpmd>start > + testpmd> start >=20 > 4. Check the result:: >=20 > - testpmd>stop > - testpmd>show port xstats 0 > + testpmd> stop > + testpmd> show port xstats 0 >=20 > - stop the testpmd on tx_port first, then stop the testpmd on rx_port. > - the received packets are not encrypted. > + Stop the testpmd on tx_port first, then stop the testpmd on rx_port. > + The received packets are not encrypted. >=20 > - check the content of the packet:: > + Check the content of the packet:: >=20 > - type=3D0x0800, the ptype of L2,L3,L4: L2_ETHER L3_IPV4 L4_UDP > + hw ptype: L2_ETHER L3_IPV4 L4_UDP - sw ptype: L2_ETHER L3_IPV4 > + L4_UDP >=20 > - in_octets_decrypted and out_pkts_encrypted doesn't increase on last > data > + in_octets_decrypted and out_pkts_encrypted doesn't increase on data > transfer. >=20 >=20 > -Test Case 5: MACsec send and receive with wrong parameters > +Test Case 6: MACsec send and receive with wrong parameters > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D >=20 > -1. Don't add "--tx-offloads=3D0x8fff" in the tx_port command line. > - the MACsec offload can't work. The tx packets are normal packets. > +1. Don't add "--tx-offloads=3D0x00002000" in the tx_port command line. > + The MACsec offload can't work. The tx packets are normal packets. >=20 > 2. Set different pn on rx and tx port, then start the data transfer. >=20 > - 1. Set the parameters as test case 1, start and stop the data transfe= r. > - check the result, rx port can receive and decrypt the packets norm= ally. > + 1. Set the parameters as test case 1, start and stop the data transfer= . > + Check the result, rx port can receive and decrypt the packets norma= lly. >=20 > - 2. Reset the pn of tx port to 0:: > + 2. Reset the pn of tx port to 0:: >=20 > - testpmd>set macsec sa tx 0 0 0 0 0011220000000000000000000000000= 0 > + testpmd> set macsec sa tx 0 0 0 0 > + 00112200000000000000000000000000 >=20 > - rx port can receive the packets until the pn equals the pn of tx p= ort:: > + Rx port can receive the packets until the pn equals the pn of tx po= rt:: >=20 > - out_pkts_encrypted =3D in_pkts_late + in_pkts_ok > + out_pkts_encrypted =3D in_pkts_late + in_pkts_ok >=20 > 3. Set different keys on rx and tx port, then start the data transfer:: >=20 > - the RX-packets=3D0, > - in_octets_decrypted =3D=3D out_octets_encrypted, > - in_pkts_notvalid =3D=3D out_pkts_encrypted, > - in_pkts_ok=3D0, > - rx_good_packets=3D0 > + the RX-packets=3D0, > + in_octets_decrypted =3D=3D out_octets_encrypted, > + in_pkts_notvalid =3D=3D out_pkts_encrypted, > + in_pkts_ok=3D0, > + rx_good_packets=3D0 >=20 > -4. Set different pi on rx and tx port(reset on rx_port), then start the = data > - transfer:: > +4. Set different pi on rx and tx port, then start the data transfer:: >=20 > - in_octets_decrypted =3D=3D out_octets_encrypted, > - in_pkts_ok =3D 0, > - in_pkts_nosci =3D=3D out_pkts_encrypted > + in_octets_decrypted =3D=3D out_octets_encrypted, > + in_pkts_ok =3D 0, > + in_pkts_nosci =3D=3D out_pkts_encrypted >=20 > 5. Set different an on rx and tx port, then start the data transfer:: >=20 > - rx_good_packets=3D0, > - in_octets_decrypted =3D=3D out_octets_encrypted, > - in_pkts_notusingsa =3D=3D out_pkts_encrypted, > - in_pkts_ok=3D0, > + rx_good_packets=3D0, > + in_octets_decrypted =3D=3D out_octets_encrypted, > + in_pkts_notusingsa =3D=3D out_pkts_encrypted, > + in_pkts_ok=3D0, >=20 > 6. Set different index on rx and tx port, then start the data transfer:: >=20 > - in_octets_decrypted =3D=3D out_octets_encrypted, > - in_pkts_ok =3D=3D out_pkts_encrypted > + in_octets_decrypted =3D=3D out_octets_encrypted, > + in_pkts_ok =3D=3D out_pkts_encrypted >=20 >=20 > -Test Case 6: performance test of MACsec offload packets - > =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D > +Test Case 7: performance test of MACsec offload packets > +=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D >=20 > 1. Tx linerate >=20 > - port0 connected to IXIA port5, port1 connected to IXIA port6, set por= t0 > + Port0 connected to IXIA port5, port1 connected to IXIA port6, set > + port0 > MACsec offload on, set fwd mac:: >=20 > - ./x86_64-native-linuxapp-gcc/app/testpmd -c 0xc -- -i \ > - --port-topology=3Dchained --crc-strip --tx-offloads=3D0x8fff > + ./testpmd -c 0xf --socket-mem 1024,0 -- -i \ > + --port-topology=3Dchained --tx-offloads=3D0x00002000 > + testpmd> set macsec offload 0 on encrypt on replay-protect on > + testpmd> set fwd mac > + testpmd> start >=20 > - on IXIA side, start IXIA port6 transmit, start the IXIA capture. > - view the IXIA port5 captured packet, the protocol is MACsec, the > EtherType > + On IXIA side, start IXIA port6 transmit, start the IXIA capture. > + View the IXIA port5 captured packet, the protocol is MACsec, the > + EtherType > is 0x88E5, and the packet length is 96bytes, while the normal packet > length > is 32bytes. >=20 > @@ -358,47 +416,47 @@ Test Case 6: performance test of MACsec offload > packets >=20 > 2. Rx linerate >=20 > - there are three ports 05:00.0 07:00.0 07:00.1. Connect 07:00.0 to 07:= 00.1 > + There are three ports 05:00.0 07:00.0 07:00.1. Connect 07:00.0 to > + 07:00.1 > with cable, connect 05:00.0 to IXIA. Bind the three ports to dpdk dri= ver. > - start two testpmd:: > - > - ./testpmd -c 0x3 --socket-mem 1024,1024 --file-prefix=3Drx -w > 0000:07:00.1 \ > - -- --port-topology=3Dchained -i --crc-strip --tx-offloads=3D0x8= fff > - > - testpmd>set macsec offload 0 on encrypt on replay-protect on > - testpmd>set macsec sc rx 0 00:00:00:00:00:01 0 > - testpmd>set macsec sa rx 0 0 0 0 > 00112200000000000000000000000000 > - testpmd>set macsec sc tx 0 00:00:00:00:00:02 0 > - testpmd>set macsec sa tx 0 0 0 0 > 00112200000000000000000000000000 > - testpmd>set fwd rxonly > - > - ./testpmd -c 0xc --socket-mem 1024,1024 --file-prefix=3Dtx -b > 0000:07:00.1 \ > - -- --port-topology=3Dchained -i --crc-strip --tx-offloads=3D0x8= fff > - > - testpmd>set macsec offload 1 on encrypt on replay-protect on > - testpmd>set macsec sc rx 1 00:00:00:00:00:02 0 > - testpmd>set macsec sa rx 1 0 0 0 > 00112200000000000000000000000000 > - testpmd>set macsec sc tx 1 00:00:00:00:00:01 0 > - testpmd>set macsec sa tx 1 0 0 0 > 00112200000000000000000000000000 > - testpmd>set fwd mac > - > - start on both two testpmd. > - start data transmit from IXIA port, the frame size is 64bytes, > + Start two testpmd:: > + > + ./testpmd -c 0xf --socket-mem 1024,0 --file-prefix=3Drx -w 0000:07= :00.1 \ > + -- -i --port-topology=3Dchained --tx-offloads=3D0x00002000 > + > + testpmd> set macsec offload 0 on encrypt on replay-protect on > + testpmd> set macsec sc rx 0 00:00:00:00:00:01 0 > + testpmd> set macsec sa rx 0 0 0 0 00112200000000000000000000000000 > + testpmd> set macsec sc tx 0 00:00:00:00:00:02 0 > + testpmd> set macsec sa tx 0 0 0 0 00112200000000000000000000000000 > + testpmd> set fwd rxonly > + > + ./testpmd -c 0xf0 --socket-mem 1024,0 --file-prefix=3Dtx -b 0000:0= 7:00.1 \ > + -- -i --port-topology=3Dchained --tx-offloads=3D0x00002000 > + > + testpmd> set macsec offload 1 on encrypt on replay-protect on > + testpmd> set macsec sc rx 1 00:00:00:00:00:02 0 > + testpmd> set macsec sa rx 1 0 0 0 00112200000000000000000000000000 > + testpmd> set macsec sc tx 1 00:00:00:00:00:01 0 > + testpmd> set macsec sa tx 1 0 0 0 00112200000000000000000000000000 > + testpmd> set fwd mac > + > + Start on both two testpmd. > + Start data transmit from IXIA port, the frame size is 64bytes, > the Ethertype is 0x0800. The rate is 14.88Mpps. >=20 > - check the linerate on rxonly port:: > + Check the linerate on rxonly port:: >=20 > - testpmd>show port stats 0 > + testpmd> show port stats 0 >=20 > It shows "Rx-pps: 10775697", so the rx %linerate is 100%. > - check the MACsec packets number on tx side:: > + Check the MACsec packets number on tx side:: >=20 > - testpmd>show port xstats 1 > + testpmd> show port xstats 1 >=20 > - on rx side:: > + On rx side:: >=20 > - testpmd>show port xstats 0 > + testpmd> show port xstats 0 >=20 > - check the rx data and tx data:: > + Check the rx data and tx data:: >=20 > - in_pkts_ok =3D=3D out_pkts_encrypted > + in_pkts_ok =3D=3D out_pkts_encrypted > -- > 2.14.3