From 87cfc7560cc1f78a70140112a298297e2c5496b6 Mon Sep 17 00:00:00 2001 From: Vratko Polak Date: Thu, 22 Mar 2018 16:48:11 +0100 Subject: CSIT-1005: Add ipsec MRR tests + 40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr.robot + 40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr.robot + 40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot + 40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr.robot + 40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr.robot + 40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr.robot Do not add test cases for 9000B framesize yet. Improve other suites to keep the style consistent. Change-Id: I03a58e8d6745083e267b9d53bb3b85efcb2ea827 Signed-off-by: Vratko Polak --- ...thip4ipsecbasetnl-ip4base-int-aes-gcm-mrr.robot | 209 ++++++++++++++++++++ ...secbasetnl-ip4base-int-aes-gcm-ndrpdrdisc.robot | 17 +- ...hip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr.robot | 209 ++++++++++++++++++++ ...ecbasetnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot | 24 +-- ...secbasetnl-ip4base-tnl-aes-gcm-ndrpdrdisc.robot | 72 ++++--- ...ecbasetnl-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot | 72 ++++--- ...ip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot | 211 +++++++++++++++++++++ ...cbasetnlsw-ip4base-int-aes-gcm-ndrpdrdisc.robot | 17 +- ...p4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr.robot | 211 +++++++++++++++++++++ ...basetnlsw-ip4base-int-cbc-sha1-ndrpdrdisc.robot | 17 +- ...cbasetnlsw-ip4base-tnl-aes-gcm-ndrpdrdisc.robot | 23 ++- ...basetnlsw-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot | 23 ++- ...ipsecscale1000tnl-ip4base-int-aes-gcm-mrr.robot | 209 ++++++++++++++++++++ ...ale1000tnl-ip4base-int-aes-gcm-ndrpdrdisc.robot | 24 +-- ...psecscale1000tnl-ip4base-int-cbc-sha1-mrr.robot | 209 ++++++++++++++++++++ ...le1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot | 24 +-- ...ale1000tnl-ip4base-tnl-aes-gcm-ndrpdrdisc.robot | 72 ++++--- ...le1000tnl-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot | 72 ++++--- ...sectptlispgpe-ip4base-cbc-sha1-ndrpdrdisc.robot | 32 ++-- 19 files changed, 1567 insertions(+), 180 deletions(-) create mode 100644 tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr.robot create mode 100644 tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr.robot create mode 100644 tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot create mode 100644 tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr.robot create mode 100644 tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr.robot create mode 100644 tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr.robot (limited to 'tests/vpp/perf/crypto') diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr.robot new file mode 100644 index 0000000000..8b1f8410d5 --- /dev/null +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr.robot @@ -0,0 +1,209 @@ +# Copyright (c) 2018 Cisco and/or its affiliates. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at: +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +*** Settings *** +| Resource | resources/libraries/robot/performance/performance_setup.robot +| Resource | resources/libraries/robot/crypto/ipsec.robot +| ... +| Force Tags | 3_NODE_SINGLE_LINK_TOPO | PERFTEST | HW_ENV | MRR +| ... | IP4FWD | IPSEC | IPSECHW | IPSECTUN | NIC_Intel-XL710 | BASE +| ... +| Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev +| Suite Teardown | Tear down 3-node performance topology +| ... +| Test Setup | Set up performance test +| Test Teardown | Tear down performance mrr test +| ... +| Documentation | *Raw results IPv4 IPsec tunnel mode performance test suite.* +| ... +| ... | *[Top] Network Topologies:* TG-DUT1-DUT2-TG 3-node circular topology +| ... | with single links between nodes. +| ... | *[Enc] Packet Encapsulations:* Eth-IPv4 on TG-DUTn, +| ... | Eth-IPv4-IPSec on DUT1-DUT2 +| ... | *[Cfg] DUT configuration:* DUT1 and DUT2 are configured with multiple +| ... | IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it +| ... | and send to another DUT, where packets are decrypted and sent back to TG +| ... | *[Ver] TG verification:* In MaxReceivedRate test TG sends traffic +| ... | at line rate and reports total received/sent packets over trial period. +| ... | Test packets are generated by TG on +| ... | links to DUTs. TG traffic profile contains two L3 flow-groups +| ... | (flow-group per direction, number of flows per flow-group equals to +| ... | number of IPSec tunnels) with all packets +| ... | containing Ethernet header, IPv4 header with IP protocol=61 and +| ... | static payload. MAC addresses are matching MAC addresses of the TG +| ... | node interfaces. Incrementing of IP.dst (IPv4 destination address) field +| ... | is applied to both streams. +| ... | *[Ref] Applicable standard specifications:* RFC4303 and RFC2544. + +*** Variables *** +# XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps +| ${s_24.5G}= | ${24500000000} +# XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps +| ${s_18.75Mpps}= | ${18750000} +| ${tg_if1_ip4}= | 192.168.10.2 +| ${dut1_if1_ip4}= | 192.168.10.1 +| ${dut1_if2_ip4}= | 172.168.1.1 +| ${dut2_if1_ip4}= | 172.168.1.2 +| ${dut2_if2_ip4}= | 192.168.20.1 +| ${tg_if2_ip4}= | 192.168.20.2 +| ${raddr_ip4}= | 20.0.0.0 +| ${laddr_ip4}= | 10.0.0.0 +| ${addr_range}= | ${32} +| ${ipsec_overhead}= | ${54} +| ${n_tunnels}= | ${1} +# Traffic profile: +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} + +*** Keywords *** +| Check RR for IPv4 routing with IPSec HW cryptodev +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling AES GCM config with ${wt} thread(s),\ +| | ... | ${wt} phy core(s), ${rxq} receive queue(s) per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for ${framesize} frames using single\ +| | ... | trial throughput test. +| | ... +| | [Arguments] | ${framesize} | ${wt} | ${rxq} +| | ... +| | # Test Variables required for test teardown +| | Set Test Variable | ${framesize} +| | ${get_framesize}= | Get Frame Size | ${framesize} +| | ${max_rate}= | Calculate pps | ${s_24.5G} +| | ... | ${get_framesize} + ${ipsec_overhead} +| | ${max_rate}= | Set Variable If +| | ... | ${max_rate} > ${s_18.75Mpps} | ${s_18.75Mpps} | ${max_rate} +| | ${encr_alg}= | Crypto Alg AES GCM 128 +| | ${auth_alg}= | Integ Alg AES GCM 128 +| | ... +| | Given Add '${wt}' worker threads and '${rxq}' rxqueues in 3-node single-link circular topology +| | And Add PCI devices to DUTs in 3-node single link topology +| | And Run Keyword If | ${get_framesize} < ${1522} +| | ... | Add no multi seg to all DUTs +| | And Add cryptodev to all DUTs | ${${wt}} +| | And Add DPDK dev default RXD to all DUTs | 2048 +| | And Add DPDK dev default TXD to all DUTs | 2048 +| | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And Initialize IPSec in 3-node circular topology +| | And VPP IPsec Create Tunnel Interfaces +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} +| | Then Traffic should pass with maximum rate | ${perf_trial_duration} +| | ... | ${max_rate}pps | ${framesize} | ${traffic_profile} + +*** Test Cases *** +| tc01-64B-1t1c-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=1 | rxq=1 + +| tc02-1518B-1t1c-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=1 | rxq=1 + +# TODO: Add check to make test fail if rx=0. +# TODO: Add 9000B test cases when they start passing. + +| tc04-IMIX-1t1c-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=1 | rxq=1 + +| tc05-64B-2t2c-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=2 | rxq=1 + +| tc06-1518B-2t2c-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=2 | rxq=1 + +| tc08-IMIX-2t2c-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=2 | rxq=1 + +| tc09-64B-4t4c-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=4 | rxq=2 + +| tc10-1518B-4t4c-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=4 | rxq=2 + +| tc12-IMIX-4t4c-ethip4ipsecbasetnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=4 | rxq=2 diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-aes-gcm-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-aes-gcm-ndrpdrdisc.robot index cd32440832..bf16ef55a9 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-aes-gcm-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-aes-gcm-ndrpdrdisc.robot @@ -55,9 +55,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_limit} | ${24500000000} +| ${s_limit}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -70,11 +70,19 @@ | ${ipsec_overhead_gcm}= | ${54} | ${n_tunnels}= | ${1} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Keywords *** | Discover NDR or PDR for IPv4 routing with IPSec HW cryptodev +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling AES GCM config with ${wt} thread(s),\ +| | ... | ${wt} phy core(s), ${rxq} receive queue(s) per NIC port. +| | ... | [Ver] Measure NDR or PDR for ${framesize} by bisecting between\ +| | ... | ${min_rate} and computed max rate, using trial loss rate measurements. +| | ... | | [Arguments] | ${wt} | ${rxq} | ${framesize} | ${min_rate} | ${search_type} +| | ... +| | # Test Variables required for test teardown | | Set Test Variable | ${framesize} | | Set Test Variable | ${min_rate} | | ${get_framesize}= | Get Frame Size | ${framesize} @@ -87,6 +95,7 @@ | | ${threshold}= | Set Variable | ${min_rate} | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 +| | ... | | Given Add '${wt}' worker threads and '${rxq}' rxqueues in 3-node single-link circular topology | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs @@ -94,7 +103,7 @@ | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr.robot new file mode 100644 index 0000000000..68f11b84d2 --- /dev/null +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr.robot @@ -0,0 +1,209 @@ +# Copyright (c) 2018 Cisco and/or its affiliates. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at: +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +*** Settings *** +| Resource | resources/libraries/robot/performance/performance_setup.robot +| Resource | resources/libraries/robot/crypto/ipsec.robot +| ... +| Force Tags | 3_NODE_SINGLE_LINK_TOPO | PERFTEST | HW_ENV | MRR +| ... | IP4FWD | IPSEC | IPSECHW | IPSECTUN | NIC_Intel-XL710 | BASE +| ... +| Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev +| Suite Teardown | Tear down 3-node performance topology +| ... +| Test Setup | Set up performance test +| Test Teardown | Tear down performance mrr test +| ... +| Documentation | *Raw results IPv4 IPsec tunnel mode performance test suite.* +| ... +| ... | *[Top] Network Topologies:* TG-DUT1-DUT2-TG 3-node circular topology +| ... | with single links between nodes. +| ... | *[Enc] Packet Encapsulations:* Eth-IPv4 on TG-DUTn, +| ... | Eth-IPv4-IPSec on DUT1-DUT2 +| ... | *[Cfg] DUT configuration:* DUT1 and DUT2 are configured with multiple +| ... | IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it +| ... | and send to another DUT, where packets are decrypted and sent back to TG +| ... | *[Ver] TG verification:* In MaxReceivedRate test TG sends traffic +| ... | at line rate and reports total received/sent packets over trial period. +| ... | Test packets are generated by TG on +| ... | links to DUTs. TG traffic profile contains two L3 flow-groups +| ... | (flow-group per direction, number of flows per flow-group equals to +| ... | number of IPSec tunnels) with all packets +| ... | containing Ethernet header, IPv4 header with IP protocol=61 and +| ... | static payload. MAC addresses are matching MAC addresses of the TG +| ... | node interfaces. Incrementing of IP.dst (IPv4 destination address) field +| ... | is applied to both streams. +| ... | *[Ref] Applicable standard specifications:* RFC4303 and RFC2544. + +*** Variables *** +# XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps +| ${s_24.5G}= | ${24500000000} +# XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps +| ${s_18.75Mpps}= | ${18750000} +| ${tg_if1_ip4}= | 192.168.10.2 +| ${dut1_if1_ip4}= | 192.168.10.1 +| ${dut1_if2_ip4}= | 172.168.1.1 +| ${dut2_if1_ip4}= | 172.168.1.2 +| ${dut2_if2_ip4}= | 192.168.20.1 +| ${tg_if2_ip4}= | 192.168.20.2 +| ${raddr_ip4}= | 20.0.0.0 +| ${laddr_ip4}= | 10.0.0.0 +| ${addr_range}= | ${32} +| ${ipsec_overhead}= | ${58} +| ${n_tunnels}= | ${1} +# Traffic profile: +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} + +*** Keywords *** +| Check RR for IPv4 routing with IPSec HW cryptodev +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling CBC-SHA1 config with ${wt} thread(s),\ +| | ... | ${wt} phy core(s), ${rxq} receive queue(s) per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for ${framesize} frames using single\ +| | ... | trial throughput test. +| | ... +| | [Arguments] | ${framesize} | ${wt} | ${rxq} +| | ... +| | # Test Variables required for test teardown +| | Set Test Variable | ${framesize} +| | ${get_framesize}= | Get Frame Size | ${framesize} +| | ${max_rate}= | Calculate pps | ${s_24.5G} +| | ... | ${get_framesize} + ${ipsec_overhead} +| | ${max_rate}= | Set Variable If +| | ... | ${max_rate} > ${s_18.75Mpps} | ${s_18.75Mpps} | ${max_rate} +| | ${encr_alg}= | Crypto Alg AES CBC 128 +| | ${auth_alg}= | Integ Alg SHA1 96 +| | ... +| | Given Add '${wt}' worker threads and '${rxq}' rxqueues in 3-node single-link circular topology +| | And Add PCI devices to DUTs in 3-node single link topology +| | And Run Keyword If | ${get_framesize} < ${1522} +| | ... | Add no multi seg to all DUTs +| | And Add cryptodev to all DUTs | ${${wt}} +| | And Add DPDK dev default RXD to all DUTs | 2048 +| | And Add DPDK dev default TXD to all DUTs | 2048 +| | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And Initialize IPSec in 3-node circular topology +| | And VPP IPsec Create Tunnel Interfaces +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} +| | Then Traffic should pass with maximum rate | ${perf_trial_duration} +| | ... | ${max_rate}pps | ${framesize} | ${traffic_profile} + +*** Test Cases *** +| tc01-64B-1t1c-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=1 | rxq=1 + +| tc02-1518B-1t1c-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=1 | rxq=1 + +# TODO: Add check to make test fail if rx=0. +# TODO: Add 9000B test cases when they start passing. + +| tc04-IMIX-1t1c-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=1 | rxq=1 + +| tc05-64B-2t2c-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=2 | rxq=1 + +| tc06-1518B-2t2c-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=2 | rxq=1 + +| tc08-IMIX-2t2c-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=2 | rxq=1 + +| tc09-64B-4t4c-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=4 | rxq=2 + +| tc10-1518B-4t4c-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=4 | rxq=2 + +| tc12-IMIX-4t4c-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=4 | rxq=2 diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot index 2749e8ec9e..745199ba84 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot @@ -19,6 +19,7 @@ | ... | IP4FWD | IPSEC | IPSECHW | IPSECTUN | NIC_Intel-XL710 | BASE | ... | Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev | ... | Suite Teardown | Tear down 3-node performance topology | ... @@ -54,9 +55,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_24.5G} | ${24500000000} +| ${s_24.5G}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -69,7 +70,7 @@ | ${ipsec_overhead}= | ${58} | ${n_tunnels}= | ${1} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Test Cases *** | tc01-64B-1t1c-ethip4ipsecbasetnl-ip4base-int-cbc-sha1-ndrdisc @@ -81,6 +82,7 @@ | | ... | | [Tags] | 64B | 1T1C | STHREAD | NDRDISC | | ... +| | # FIXME: Move repeated lines into a keyword. | | ${framesize}= | Set Variable | ${64} | | ${min_rate}= | Set Variable | ${50000} | | ${max_rate}= | Set Variable | ${s_18.75Mpps} @@ -90,13 +92,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -124,13 +126,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -159,12 +161,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -192,12 +194,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -228,12 +230,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -263,12 +265,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -297,13 +299,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -331,13 +333,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-tnl-aes-gcm-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-tnl-aes-gcm-ndrpdrdisc.robot index dc98b2af40..4df0b80ab4 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-tnl-aes-gcm-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-tnl-aes-gcm-ndrpdrdisc.robot @@ -19,6 +19,7 @@ | ... | IP4FWD | IPSEC | IPSECHW | IPSECTUN | NIC_Intel-XL710 | BASE | ... | Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev | ... | Suite Teardown | Tear down 3-node performance topology | ... @@ -54,9 +55,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_24.5G} | ${24500000000} +| ${s_24.5G}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -69,7 +70,7 @@ | ${ipsec_overhead_gcm}= | ${54} | ${n_tunnels}= | ${1} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Test Cases *** | tc01-64B-1t1c-ethip4ipsecbasetnl-ip4base-tnl-aes-gcm-ndrdisc @@ -81,6 +82,7 @@ | | ... | | [Tags] | 64B | 1T1C | STHREAD | NDRDISC | | ... +| | # FIXME: Move repeated lines into a keyword. | | ${framesize}= | Set Variable | ${64} | | ${min_rate}= | Set Variable | ${50000} | | ${max_rate}= | Set Variable | ${s_18.75Mpps} @@ -90,16 +92,18 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -127,16 +131,18 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -166,15 +172,17 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -203,15 +211,17 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -243,15 +253,17 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -282,15 +294,17 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -319,16 +333,18 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -356,16 +372,18 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot index 914855ecf5..cef8873e11 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnl-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot @@ -19,6 +19,7 @@ | ... | IP4FWD | IPSEC | IPSECHW | IPSECTUN | NIC_Intel-XL710 | BASE | ... | Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev | ... | Suite Teardown | Tear down 3-node performance topology | ... @@ -54,9 +55,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_24.5G} | ${24500000000} +| ${s_24.5G}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -69,7 +70,7 @@ | ${ipsec_overhead}= | ${58} | ${n_tunnels}= | ${1} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Test Cases *** | tc01-64B-1t1c-ethip4ipsecbasetnl-ip4base-tnl-cbc-sha1-ndrdisc @@ -81,6 +82,7 @@ | | ... | | [Tags] | 64B | 1T1C | STHREAD | NDRDISC | | ... +| | # FIXME: Move repeated lines into a keyword. | | ${framesize}= | Set Variable | ${64} | | ${min_rate}= | Set Variable | ${50000} | | ${max_rate}= | Set Variable | ${s_18.75Mpps} @@ -90,16 +92,18 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -127,16 +131,18 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -165,15 +171,17 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -201,15 +209,17 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -240,15 +250,17 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -278,15 +290,17 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -315,16 +329,18 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -352,16 +368,18 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot new file mode 100644 index 0000000000..9827848dc4 --- /dev/null +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr.robot @@ -0,0 +1,211 @@ +# Copyright (c) 2018 Cisco and/or its affiliates. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at: +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +*** Settings *** +| Resource | resources/libraries/robot/performance/performance_setup.robot +| Resource | resources/libraries/robot/crypto/ipsec.robot +| ... +| Force Tags | 3_NODE_SINGLE_LINK_TOPO | PERFTEST | HW_ENV | MRR +| ... | IP4FWD | IPSEC | IPSECSW | IPSECTUN | NIC_Intel-XL710 | BASE +| ... +| Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | SW_cryptodev +| Suite Teardown | Tear down 3-node performance topology +| ... +| Test Setup | Set up performance test +| Test Teardown | Tear down performance mrr test +| ... +| Documentation | *Raw results IPv4 IPsec tunnel mode performance test suite.* +| ... +| ... | *[Top] Network Topologies:* TG-DUT1-DUT2-TG 3-node circular topology +| ... | with single links between nodes. +| ... | *[Enc] Packet Encapsulations:* Eth-IPv4 on TG-DUTn, +| ... | Eth-IPv4-IPSec on DUT1-DUT2 +| ... | *[Cfg] DUT configuration:* DUT1 and DUT2 are configured with DPDK SW +| ... | crypto devices and multiple IPsec tunnels between them. +| ... | DUTs get IPv4 traffic from TG, encrypt it +| ... | and send to another DUT, where packets are decrypted and sent back to TG +| ... | *[Ver] TG verification:* In MaxReceivedRate test TG sends traffic +| ... | at line rate and reports total received/sent packets over trial period. +| ... | Test packets are generated by TG on +| ... | links to DUTs. TG traffic profile contains two L3 flow-groups +| ... | (flow-group per direction, number of flows per flow-group equals to +| ... | number of IPSec tunnels) with all packets +| ... | containing Ethernet header, IPv4 header with IP protocol=61 and +| ... | static payload. MAC addresses are matching MAC addresses of the TG +| ... | node interfaces. Incrementing of IP.dst (IPv4 destination address) field +| ... | is applied to both streams. +| ... | *[Ref] Applicable standard specifications:* RFC4303 and RFC2544. + +*** Variables *** +# XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps +| ${s_24.5G}= | ${24500000000} +# XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps +| ${s_18.75Mpps}= | ${18750000} +| ${tg_if1_ip4}= | 192.168.10.2 +| ${dut1_if1_ip4}= | 192.168.10.1 +| ${dut1_if2_ip4}= | 172.168.1.1 +| ${dut2_if1_ip4}= | 172.168.1.2 +| ${dut2_if2_ip4}= | 192.168.20.1 +| ${tg_if2_ip4}= | 192.168.20.2 +| ${raddr_ip4}= | 20.0.0.0 +| ${laddr_ip4}= | 10.0.0.0 +| ${addr_range}= | ${32} +| ${ipsec_overhead}= | ${54} +| ${n_tunnels}= | ${1} +# Traffic profile: +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} + +*** Keywords *** +| Check RR for IPv4 routing with IPSec SW cryptodev +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling AES GCM config with ${wt} thread(s),\ +| | ... | ${wt} phy core(s), ${rxq} receive queue(s) per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for ${framesize} frames using single\ +| | ... | trial throughput test. +| | ... +| | [Arguments] | ${framesize} | ${wt} | ${rxq} +| | ... +| | # Test Variables required for test teardown +| | Set Test Variable | ${framesize} +| | ${get_framesize}= | Get Frame Size | ${framesize} +| | ${max_rate}= | Calculate pps | ${s_24.5G} +| | ... | ${get_framesize} + ${ipsec_overhead} +| | ${max_rate}= | Set Variable If +| | ... | ${max_rate} > ${s_18.75Mpps} | ${s_18.75Mpps} | ${max_rate} +| | ${encr_alg}= | Crypto Alg AES GCM 128 +| | ${auth_alg}= | Integ Alg AES GCM 128 +| | ... +| | Given Add '${wt}' worker threads and '${rxq}' rxqueues in 3-node single-link circular topology +| | And Add PCI devices to DUTs in 3-node single link topology +| | And Run Keyword If | ${get_framesize} < ${1522} +| | ... | Add no multi seg to all DUTs +| | And Add DPDK SW cryptodev on DUTs in 3-node single-link circular topology +| | ... | aesni_gcm | ${${wt}} +| | And Add DPDK dev default RXD to all DUTs | 2048 +| | And Add DPDK dev default TXD to all DUTs | 2048 +| | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And Initialize IPSec in 3-node circular topology +| | And VPP IPsec Create Tunnel Interfaces +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} +| | Then Traffic should pass with maximum rate | ${perf_trial_duration} +| | ... | ${max_rate}pps | ${framesize} | ${traffic_profile} + +*** Test Cases *** +| tc01-64B-1t1c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${64} | wt=1 | rxq=1 + +| tc02-1518B-1t1c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${1518} | wt=1 | rxq=1 + +# TODO: Add check to make test fail if rx=0. +# TODO: Add 9000B test cases when they start passing. + +| tc04-IMIX-1t1c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=IMIX_v4_1 | wt=1 | rxq=1 + +| tc05-64B-2t2c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${64} | wt=2 | rxq=1 + +| tc06-1518B-2t2c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${1518} | wt=2 | rxq=1 + +| tc08-IMIX-2t2c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=IMIX_v4_1 | wt=2 | rxq=1 + +| tc09-64B-4t4c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${64} | wt=4 | rxq=2 + +| tc10-1518B-4t4c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${1518} | wt=4 | rxq=2 + +| tc12-IMIX-4t4c-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel AES GCM in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=IMIX_v4_1 | wt=4 | rxq=2 diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-ndrpdrdisc.robot index 883d1d363c..321e2f9ea0 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-aes-gcm-ndrpdrdisc.robot @@ -56,9 +56,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_limit} | ${24500000000} +| ${s_limit}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -71,11 +71,19 @@ | ${ipsec_overhead_gcm}= | ${54} | ${n_tunnels}= | ${1} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Keywords *** | Discover NDR or PDR for IPv4 routing with IPSec SW cryptodev +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling AES GCM config with ${wt} thread(s),\ +| | ... | ${wt} phy core(s), ${rxq} receive queue(s) per NIC port. +| | ... | [Ver] Measure NDR or PDR for ${framesize} by bisecting between\ +| | ... | ${min_rate} and computed max rate, using trial loss rate measurements. +| | ... | | [Arguments] | ${wt} | ${rxq} | ${framesize} | ${min_rate} | ${search_type} +| | ... +| | # Test Variables required for test teardown | | Set Test Variable | ${framesize} | | Set Test Variable | ${min_rate} | | ${get_framesize}= | Get Frame Size | ${framesize} @@ -88,6 +96,7 @@ | | ${threshold}= | Set Variable | ${min_rate} | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 +| | ... | | Given Add '${wt}' worker threads and '${rxq}' rxqueues in 3-node single-link circular topology | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs @@ -96,7 +105,7 @@ | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr.robot new file mode 100644 index 0000000000..8d3dfaedeb --- /dev/null +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr.robot @@ -0,0 +1,211 @@ +# Copyright (c) 2018 Cisco and/or its affiliates. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at: +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +*** Settings *** +| Resource | resources/libraries/robot/performance/performance_setup.robot +| Resource | resources/libraries/robot/crypto/ipsec.robot +| ... +| Force Tags | 3_NODE_SINGLE_LINK_TOPO | PERFTEST | HW_ENV | MRR +| ... | IP4FWD | IPSEC | IPSECSW | IPSECTUN | NIC_Intel-XL710 | BASE +| ... +| Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | SW_cryptodev +| Suite Teardown | Tear down 3-node performance topology +| ... +| Test Setup | Set up performance test +| Test Teardown | Tear down performance mrr test +| ... +| Documentation | *Raw results IPv4 IPsec tunnel mode performance test suite.* +| ... +| ... | *[Top] Network Topologies:* TG-DUT1-DUT2-TG 3-node circular topology +| ... | with single links between nodes. +| ... | *[Enc] Packet Encapsulations:* Eth-IPv4 on TG-DUTn, +| ... | Eth-IPv4-IPSec on DUT1-DUT2 +| ... | *[Cfg] DUT configuration:* DUT1 and DUT2 are configured with DPDK SW +| ... | crypto devices and multiple IPsec tunnels between them. +| ... | DUTs get IPv4 traffic from TG, encrypt it +| ... | and send to another DUT, where packets are decrypted and sent back to TG +| ... | *[Ver] TG verification:* In MaxReceivedRate test TG sends traffic +| ... | at line rate and reports total received/sent packets over trial period. +| ... | Test packets are generated by TG on +| ... | links to DUTs. TG traffic profile contains two L3 flow-groups +| ... | (flow-group per direction, number of flows per flow-group equals to +| ... | number of IPSec tunnels) with all packets +| ... | containing Ethernet header, IPv4 header with IP protocol=61 and +| ... | static payload. MAC addresses are matching MAC addresses of the TG +| ... | node interfaces. Incrementing of IP.dst (IPv4 destination address) field +| ... | is applied to both streams. +| ... | *[Ref] Applicable standard specifications:* RFC4303 and RFC2544. + +*** Variables *** +# XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps +| ${s_24.5G}= | ${24500000000} +# XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps +| ${s_18.75Mpps}= | ${18750000} +| ${tg_if1_ip4}= | 192.168.10.2 +| ${dut1_if1_ip4}= | 192.168.10.1 +| ${dut1_if2_ip4}= | 172.168.1.1 +| ${dut2_if1_ip4}= | 172.168.1.2 +| ${dut2_if2_ip4}= | 192.168.20.1 +| ${tg_if2_ip4}= | 192.168.20.2 +| ${raddr_ip4}= | 20.0.0.0 +| ${laddr_ip4}= | 10.0.0.0 +| ${addr_range}= | ${32} +| ${ipsec_overhead}= | ${54} +| ${n_tunnels}= | ${1} +# Traffic profile: +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} + +*** Keywords *** +| Check RR for IPv4 routing with IPSec SW cryptodev +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling CBC-SHA1 config with ${wt} thread(s),\ +| | ... | ${wt} phy core(s), ${rxq} receive queue(s) per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for ${framesize} frames using single\ +| | ... | trial throughput test. +| | ... +| | [Arguments] | ${framesize} | ${wt} | ${rxq} +| | ... +| | # Test Variables required for test teardown +| | Set Test Variable | ${framesize} +| | ${get_framesize}= | Get Frame Size | ${framesize} +| | ${max_rate}= | Calculate pps | ${s_24.5G} +| | ... | ${get_framesize} + ${ipsec_overhead} +| | ${max_rate}= | Set Variable If +| | ... | ${max_rate} > ${s_18.75Mpps} | ${s_18.75Mpps} | ${max_rate} +| | ${encr_alg}= | Crypto Alg AES CBC 128 +| | ${auth_alg}= | Integ Alg SHA1 96 +| | ... +| | Given Add '${wt}' worker threads and '${rxq}' rxqueues in 3-node single-link circular topology +| | And Add PCI devices to DUTs in 3-node single link topology +| | And Run Keyword If | ${get_framesize} < ${1522} +| | ... | Add no multi seg to all DUTs +| | And Add DPDK SW cryptodev on DUTs in 3-node single-link circular topology +| | ... | aesni_mb | ${${wt}} +| | And Add DPDK dev default RXD to all DUTs | 2048 +| | And Add DPDK dev default TXD to all DUTs | 2048 +| | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And Initialize IPSec in 3-node circular topology +| | And VPP IPsec Create Tunnel Interfaces +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} +| | Then Traffic should pass with maximum rate | ${perf_trial_duration} +| | ... | ${max_rate}pps | ${framesize} | ${traffic_profile} + +*** Test Cases *** +| tc01-64B-1t1c-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${64} | wt=1 | rxq=1 + +| tc02-1518B-1t1c-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${1518} | wt=1 | rxq=1 + +# TODO: Add check to make test fail if rx=0. +# TODO: Add 9000B test cases when they start passing. + +| tc04-IMIX-1t1c-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=IMIX_v4_1 | wt=1 | rxq=1 + +| tc05-64B-2t2c-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${64} | wt=2 | rxq=1 + +| tc06-1518B-2t2c-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${1518} | wt=2 | rxq=1 + +| tc08-IMIX-2t2c-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=IMIX_v4_1 | wt=2 | rxq=1 + +| tc09-64B-4t4c-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${64} | wt=4 | rxq=2 + +| tc10-1518B-4t4c-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=${1518} | wt=4 | rxq=2 + +| tc12-IMIX-4t4c-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1 IPsec tunnel CBC-SHA1 in each direction, configured\ +| | ... | with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec SW cryptodev +| | framesize=IMIX_v4_1 | wt=4 | rxq=2 diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-ndrpdrdisc.robot index 180b826ae2..499a082b42 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-int-cbc-sha1-ndrpdrdisc.robot @@ -56,9 +56,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_limit} | ${24500000000} +| ${s_limit}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -71,11 +71,19 @@ | ${ipsec_overhead_gcm}= | ${54} | ${n_tunnels}= | ${1} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Keywords *** | Discover NDR or PDR for IPv4 routing with IPSec SW cryptodev +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling CBC-SHA1 config with ${wt} thread(s),\ +| | ... | ${wt} phy core(s), ${rxq} receive queue(s) per NIC port. +| | ... | [Ver] Measure NDR or PDR for ${framesize} by bisecting between\ +| | ... | ${min_rate} and computed max rate, using trial loss rate measurements. +| | ... | | [Arguments] | ${wt} | ${rxq} | ${framesize} | ${min_rate} | ${search_type} +| | ... +| | # Test Variables required for test teardown | | Set Test Variable | ${framesize} | | Set Test Variable | ${min_rate} | | ${get_framesize}= | Get Frame Size | ${framesize} @@ -88,6 +96,7 @@ | | ${threshold}= | Set Variable | ${min_rate} | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 +| | ... | | Given Add '${wt}' worker threads and '${rxq}' rxqueues in 3-node single-link circular topology | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs @@ -96,7 +105,7 @@ | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-tnl-aes-gcm-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-tnl-aes-gcm-ndrpdrdisc.robot index 95f7c63f74..7b07691e93 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-tnl-aes-gcm-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-tnl-aes-gcm-ndrpdrdisc.robot @@ -56,9 +56,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_limit} | ${24500000000} +| ${s_limit}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -71,11 +71,19 @@ | ${ipsec_overhead_gcm}= | ${54} | ${n_tunnels}= | ${1} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Keywords *** | Discover NDR or PDR for IPv4 routing with IPSec SW cryptodev +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling AES GCM config with ${wt} thread(s),\ +| | ... | ${wt} phy core(s), ${rxq} receive queue(s) per NIC port. +| | ... | [Ver] Measure NDR or PDR for ${framesize} by bisecting between\ +| | ... | ${min_rate} and computed max rate, using trial loss rate measurements. +| | ... | | [Arguments] | ${wt} | ${rxq} | ${framesize} | ${min_rate} | ${search_type} +| | ... +| | # Test Variables required for test teardown | | Set Test Variable | ${framesize} | | Set Test Variable | ${min_rate} | | ${get_framesize}= | Get Frame Size | ${framesize} @@ -88,6 +96,7 @@ | | ${threshold}= | Set Variable | ${min_rate} | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 +| | ... | | Given Add '${wt}' worker threads and '${rxq}' rxqueues in 3-node single-link circular topology | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs @@ -96,10 +105,12 @@ | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot index f6c40a7919..ef01fb5ff0 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecbasetnlsw-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot @@ -56,9 +56,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_limit} | ${24500000000} +| ${s_limit}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -71,11 +71,19 @@ | ${ipsec_overhead_gcm}= | ${54} | ${n_tunnels}= | ${1} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Keywords *** | Discover NDR or PDR for IPv4 routing with IPSec SW cryptodev +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling CBC-SHA1 config with ${wt} thread(s),\ +| | ... | ${wt} phy core(s), ${rxq} receive queue(s) per NIC port. +| | ... | [Ver] Measure NDR or PDR for ${framesize} by bisecting between\ +| | ... | ${min_rate} and computed max rate, using trial loss rate measurements. +| | ... | | [Arguments] | ${wt} | ${rxq} | ${framesize} | ${min_rate} | ${search_type} +| | ... +| | # Test Variables required for test teardown | | Set Test Variable | ${framesize} | | Set Test Variable | ${min_rate} | | ${get_framesize}= | Get Frame Size | ${framesize} @@ -88,6 +96,7 @@ | | ${threshold}= | Set Variable | ${min_rate} | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 +| | ... | | Given Add '${wt}' worker threads and '${rxq}' rxqueues in 3-node single-link circular topology | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs @@ -96,10 +105,12 @@ | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr.robot new file mode 100644 index 0000000000..60c90194d2 --- /dev/null +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr.robot @@ -0,0 +1,209 @@ +# Copyright (c) 2018 Cisco and/or its affiliates. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at: +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +*** Settings *** +| Resource | resources/libraries/robot/performance/performance_setup.robot +| Resource | resources/libraries/robot/crypto/ipsec.robot +| ... +| Force Tags | 3_NODE_SINGLE_LINK_TOPO | PERFTEST | HW_ENV | SCALE | MRR +| ... | IP4FWD | IPSEC | IPSECHW | IPSECTUN | NIC_Intel-XL710 | TNL_1000 +| ... +| Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev +| Suite Teardown | Tear down 3-node performance topology +| ... +| Test Setup | Set up performance test +| Test Teardown | Tear down performance mrr test +| ... +| Documentation | *Raw results IPv4 IPsec tunnel mode performance test suite.* +| ... +| ... | *[Top] Network Topologies:* TG-DUT1-DUT2-TG 3-node circular topology +| ... | with single links between nodes. +| ... | *[Enc] Packet Encapsulations:* Eth-IPv4 on TG-DUTn, +| ... | Eth-IPv4-IPSec on DUT1-DUT2 +| ... | *[Cfg] DUT configuration:* DUT1 and DUT2 are configured with multiple +| ... | IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it +| ... | and send to another DUT, where packets are decrypted and sent back to TG +| ... | *[Ver] TG verification:* In MaxReceivedRate test TG sends traffic +| ... | at line rate and reports total received/sent packets over trial period. +| ... | Test packets are generated by TG on +| ... | links to DUTs. TG traffic profile contains two L3 flow-groups +| ... | (flow-group per direction, number of flows per flow-group equals to +| ... | number of IPSec tunnels) with all packets +| ... | containing Ethernet header, IPv4 header with IP protocol=61 and +| ... | static payload. MAC addresses are matching MAC addresses of the TG +| ... | node interfaces. Incrementing of IP.dst (IPv4 destination address) field +| ... | is applied to both streams. +| ... | *[Ref] Applicable standard specifications:* RFC4303 and RFC2544. + +*** Variables *** +# XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps +| ${s_24.5G}= | ${24500000000} +# XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps +| ${s_18.75Mpps}= | ${18750000} +| ${tg_if1_ip4}= | 192.168.10.2 +| ${dut1_if1_ip4}= | 192.168.10.1 +| ${dut1_if2_ip4}= | 172.168.1.1 +| ${dut2_if1_ip4}= | 172.168.1.2 +| ${dut2_if2_ip4}= | 192.168.20.1 +| ${tg_if2_ip4}= | 192.168.20.2 +| ${raddr_ip4}= | 20.0.0.0 +| ${laddr_ip4}= | 10.0.0.0 +| ${addr_range}= | ${32} +| ${ipsec_overhead}= | ${54} +| ${n_tunnels}= | ${1000} +# Traffic profile: +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} + +*** Keywords *** +| Check RR for IPv4 routing with IPSec HW cryptodev +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling AES GCM config with ${wt} thread(s),\ +| | ... | ${wt} phy core(s), ${rxq} receive queue(s) per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for ${framesize} frames using single\ +| | ... | trial throughput test. +| | ... +| | [Arguments] | ${framesize} | ${wt} | ${rxq} +| | ... +| | # Test Variables required for test teardown +| | Set Test Variable | ${framesize} +| | ${get_framesize}= | Get Frame Size | ${framesize} +| | ${max_rate}= | Calculate pps | ${s_24.5G} +| | ... | ${get_framesize} + ${ipsec_overhead} +| | ${max_rate}= | Set Variable If +| | ... | ${max_rate} > ${s_18.75Mpps} | ${s_18.75Mpps} | ${max_rate} +| | ${encr_alg}= | Crypto Alg AES GCM 128 +| | ${auth_alg}= | Integ Alg AES GCM 128 +| | ... +| | Given Add '${wt}' worker threads and '${rxq}' rxqueues in 3-node single-link circular topology +| | And Add PCI devices to DUTs in 3-node single link topology +| | And Run Keyword If | ${get_framesize} < ${1522} +| | ... | Add no multi seg to all DUTs +| | And Add cryptodev to all DUTs | ${${wt}} +| | And Add DPDK dev default RXD to all DUTs | 2048 +| | And Add DPDK dev default TXD to all DUTs | 2048 +| | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And Initialize IPSec in 3-node circular topology +| | And VPP IPsec Create Tunnel Interfaces +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} +| | Then Traffic should pass with maximum rate | ${perf_trial_duration} +| | ... | ${max_rate}pps | ${framesize} | ${traffic_profile} + +*** Test Cases *** +| tc01-64B-1t1c-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels AES GCM in each direction,\ +| | ... | configured with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=1 | rxq=1 + +| tc02-1518B-1t1c-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels AES GCM in each direction,\ +| | ... | configured with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=1 | rxq=1 + +# TODO: Add check to make test fail if rx=0. +# TODO: Add 9000B test cases when they start passing. + +| tc04-IMIX-1t1c-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels AES GCM in each direction,\ +| | ... | configured with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=1 | rxq=1 + +| tc05-64B-2t2c-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels AES GCM in each direction,\ +| | ... | configured with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=2 | rxq=1 + +| tc06-1518B-2t2c-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels AES GCM in each direction,\ +| | ... | configured with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=2 | rxq=1 + +| tc08-IMIX-2t2c-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels AES GCM in each direction,\ +| | ... | configured with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=2 | rxq=1 + +| tc09-64B-4t4c-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels AES GCM in each direction,\ +| | ... | configured with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=4 | rxq=2 + +| tc10-1518B-4t4c-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels AES GCM in each direction,\ +| | ... | configured with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=4 | rxq=2 + +| tc12-IMIX-4t4c-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels AES GCM in each direction,\ +| | ... | configured with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=4 | rxq=2 diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdrdisc.robot index dc778d8079..f6e449f1ec 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrpdrdisc.robot @@ -19,6 +19,7 @@ | ... | IP4FWD | IPSEC | IPSECHW | IPSECTUN | NIC_Intel-XL710 | TNL_1000 | ... | Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev | ... | Suite Teardown | Tear down 3-node performance topology | ... @@ -54,9 +55,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_24.5G} | ${24500000000} +| ${s_24.5G}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -69,7 +70,7 @@ | ${ipsec_overhead_gcm}= | ${54} | ${n_tunnels}= | ${1000} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Test Cases *** | tc01-64B-1t1c-ethip4ipsecscale1000tnl-ip4base-int-aes-gcm-ndrdisc @@ -81,6 +82,7 @@ | | ... | | [Tags] | 64B | 1T1C | STHREAD | NDRDISC | | ... +| | # FIXME: Move repeated lines into a keyword. | | ${framesize}= | Set Variable | ${64} | | ${min_rate}= | Set Variable | ${50000} | | ${max_rate}= | Set Variable | ${s_18.75Mpps} @@ -90,13 +92,13 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -124,13 +126,13 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -160,12 +162,12 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -194,12 +196,12 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -231,12 +233,12 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -267,12 +269,12 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -301,13 +303,13 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -335,13 +337,13 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr.robot new file mode 100644 index 0000000000..aa4ef8ac83 --- /dev/null +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr.robot @@ -0,0 +1,209 @@ +# Copyright (c) 2018 Cisco and/or its affiliates. +# Licensed under the Apache License, Version 2.0 (the "License"); +# you may not use this file except in compliance with the License. +# You may obtain a copy of the License at: +# +# http://www.apache.org/licenses/LICENSE-2.0 +# +# Unless required by applicable law or agreed to in writing, software +# distributed under the License is distributed on an "AS IS" BASIS, +# WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. +# See the License for the specific language governing permissions and +# limitations under the License. + +*** Settings *** +| Resource | resources/libraries/robot/performance/performance_setup.robot +| Resource | resources/libraries/robot/crypto/ipsec.robot +| ... +| Force Tags | 3_NODE_SINGLE_LINK_TOPO | PERFTEST | HW_ENV | SCALE | MRR +| ... | IP4FWD | IPSEC | IPSECHW | IPSECTUN | NIC_Intel-XL710 | TNL_1000 +| ... +| Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev +| Suite Teardown | Tear down 3-node performance topology +| ... +| Test Setup | Set up performance test +| Test Teardown | Tear down performance mrr test +| ... +| Documentation | *Raw results IPv4 IPsec tunnel mode performance test suite.* +| ... +| ... | *[Top] Network Topologies:* TG-DUT1-DUT2-TG 3-node circular topology +| ... | with single links between nodes. +| ... | *[Enc] Packet Encapsulations:* Eth-IPv4 on TG-DUTn, +| ... | Eth-IPv4-IPSec on DUT1-DUT2 +| ... | *[Cfg] DUT configuration:* DUT1 and DUT2 are configured with multiple +| ... | IPsec tunnels between them. DUTs get IPv4 traffic from TG, encrypt it +| ... | and send to another DUT, where packets are decrypted and sent back to TG +| ... | *[Ver] TG verification:* In MaxReceivedRate test TG sends traffic +| ... | at line rate and reports total received/sent packets over trial period. +| ... | Test packets are generated by TG on +| ... | links to DUTs. TG traffic profile contains two L3 flow-groups +| ... | (flow-group per direction, number of flows per flow-group equals to +| ... | number of IPSec tunnels) with all packets +| ... | containing Ethernet header, IPv4 header with IP protocol=61 and +| ... | static payload. MAC addresses are matching MAC addresses of the TG +| ... | node interfaces. Incrementing of IP.dst (IPv4 destination address) field +| ... | is applied to both streams. +| ... | *[Ref] Applicable standard specifications:* RFC4303 and RFC2544. + +*** Variables *** +# XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps +| ${s_24.5G}= | ${24500000000} +# XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps +| ${s_18.75Mpps}= | ${18750000} +| ${tg_if1_ip4}= | 192.168.10.2 +| ${dut1_if1_ip4}= | 192.168.10.1 +| ${dut1_if2_ip4}= | 172.168.1.1 +| ${dut2_if1_ip4}= | 172.168.1.2 +| ${dut2_if2_ip4}= | 192.168.20.1 +| ${tg_if2_ip4}= | 192.168.20.2 +| ${raddr_ip4}= | 20.0.0.0 +| ${laddr_ip4}= | 10.0.0.0 +| ${addr_range}= | ${32} +| ${ipsec_overhead}= | ${58} +| ${n_tunnels}= | ${1000} +# Traffic profile: +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} + +*** Keywords *** +| Check RR for IPv4 routing with IPSec HW cryptodev +| | [Documentation] +| | ... | [Cfg] DUT runs IPSec tunneling CBC-SHA1 config with ${wt} thread(s),\ +| | ... | ${wt} phy core(s), ${rxq} receive queue(s) per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for ${framesize} frames using single\ +| | ... | trial throughput test. +| | ... +| | [Arguments] | ${framesize} | ${wt} | ${rxq} +| | ... +| | # Test Variables required for test teardown +| | Set Test Variable | ${framesize} +| | ${get_framesize}= | Get Frame Size | ${framesize} +| | ${max_rate}= | Calculate pps | ${s_24.5G} +| | ... | ${get_framesize} + ${ipsec_overhead} +| | ${max_rate}= | Set Variable If +| | ... | ${max_rate} > ${s_18.75Mpps} | ${s_18.75Mpps} | ${max_rate} +| | ${encr_alg}= | Crypto Alg AES CBC 128 +| | ${auth_alg}= | Integ Alg SHA1 96 +| | ... +| | Given Add '${wt}' worker threads and '${rxq}' rxqueues in 3-node single-link circular topology +| | And Add PCI devices to DUTs in 3-node single link topology +| | And Run Keyword If | ${get_framesize} < ${1522} +| | ... | Add no multi seg to all DUTs +| | And Add cryptodev to all DUTs | ${${wt}} +| | And Add DPDK dev default RXD to all DUTs | 2048 +| | And Add DPDK dev default TXD to all DUTs | 2048 +| | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} +| | And Initialize IPSec in 3-node circular topology +| | And VPP IPsec Create Tunnel Interfaces +| | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} +| | ... | ${dut2_if1} | ${n_tunnels} | ${encr_alg} | ${encr_key} | ${auth_alg} +| | ... | ${auth_key} | ${laddr_ip4} | ${raddr_ip4} | ${addr_range} +| | Then Traffic should pass with maximum rate | ${perf_trial_duration} +| | ... | ${max_rate}pps | ${framesize} | ${traffic_profile} + +*** Test Cases *** +| tc01-64B-1t1c-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels CBC-SHA1 in each direction,\ +| | ... | configured with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=1 | rxq=1 + +| tc02-1518B-1t1c-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels CBC-SHA1 in each direction,\ +| | ... | configured with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=1 | rxq=1 + +# TODO: Add check to make test fail if rx=0. +# TODO: Add 9000B test cases when they start passing. + +| tc04-IMIX-1t1c-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels CBC-SHA1 in each direction,\ +| | ... | configured with 1 thread, 1 phy core, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 1T1C | STHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=1 | rxq=1 + +| tc05-64B-2t2c-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels CBC-SHA1 in each direction,\ +| | ... | configured with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=2 | rxq=1 + +| tc06-1518B-2t2c-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels CBC-SHA1 in each direction,\ +| | ... | configured with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=2 | rxq=1 + +| tc08-IMIX-2t2c-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels CBC-SHA1 in each direction,\ +| | ... | configured with 2 threads, 2 phy cores, 1 receive queue per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 2T2C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=2 | rxq=1 + +| tc09-64B-4t4c-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels CBC-SHA1 in each direction,\ +| | ... | configured with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 64B frames using single trial\ +| | ... | throughput test. +| | [Tags] | 64B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${64} | wt=4 | rxq=2 + +| tc10-1518B-4t4c-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels CBC-SHA1 in each direction,\ +| | ... | configured with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for 1518B frames using single\ +| | ... | trial throughput test. +| | [Tags] | 1518B | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=${1518} | wt=4 | rxq=2 + +| tc12-IMIX-4t4c-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-mrr +| | [Documentation] +| | ... | [Cfg] DUTs run 1000 IPsec tunnels CBC-SHA1 in each direction,\ +| | ... | configured with 4 threads, 4 phy cores, 2 receive queues per NIC port. +| | ... | [Ver] Measure MaxReceivedRate for IMIX_v4_1 frames using single\ +| | ... | trial throughput test. +| | ... | IMIX_v4_1 = (28x64B; 16x570B; 4x1518B) +| | [Tags] | IMIX | 4T4C | MTHREAD +| | ... +| | [Template] | Check RR for IPv4 routing with IPSec HW cryptodev +| | framesize=IMIX_v4_1 | wt=4 | rxq=2 diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot index 6c533f1c05..1b52ba250e 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrpdrdisc.robot @@ -19,6 +19,7 @@ | ... | IP4FWD | IPSEC | IPSECHW | IPSECTUN | NIC_Intel-XL710 | TNL_1000 | ... | Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev | ... | Suite Teardown | Tear down 3-node performance topology | ... @@ -54,9 +55,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_24.5G} | ${24500000000} +| ${s_24.5G}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -69,7 +70,7 @@ | ${ipsec_overhead}= | ${58} | ${n_tunnels}= | ${1000} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Test Cases *** | tc01-64B-1t1c-ethip4ipsecscale1000tnl-ip4base-int-cbc-sha1-ndrdisc @@ -81,6 +82,7 @@ | | ... | | [Tags] | 64B | 1T1C | STHREAD | NDRDISC | | ... +| | # FIXME: Move repeated lines into a keyword. | | ${framesize}= | Set Variable | ${64} | | ${min_rate}= | Set Variable | ${50000} | | ${max_rate}= | Set Variable | ${s_18.75Mpps} @@ -90,13 +92,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -124,13 +126,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -159,12 +161,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -192,12 +194,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -228,12 +230,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -263,12 +265,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -297,13 +299,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} @@ -331,13 +333,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology | | And VPP IPsec Create Tunnel Interfaces | | ... | ${dut1} | ${dut2} | ${dut1_if2_ip4} | ${dut2_if1_ip4} | ${dut1_if2} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-ndrpdrdisc.robot index 48d8cbccdc..dcd8d26365 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-ndrpdrdisc.robot @@ -19,6 +19,7 @@ | ... | IP4FWD | IPSEC | IPSECHW | IPSECTUN | NIC_Intel-XL710 | TNL_1000 | ... | Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev | ... | Suite Teardown | Tear down 3-node performance topology | ... @@ -54,9 +55,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_24.5G} | ${24500000000} +| ${s_24.5G}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -69,7 +70,7 @@ | ${ipsec_overhead_gcm}= | ${54} | ${n_tunnels}= | ${1000} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Test Cases *** | tc01-64B-1t1c-ethip4ipsecscale1000tnl-ip4base-tnl-aes-gcm-ndrdisc @@ -81,6 +82,7 @@ | | ... | | [Tags] | 64B | 1T1C | STHREAD | NDRDISC | | ... +| | # FIXME: Move repeated lines into a keyword. | | ${framesize}= | Set Variable | ${64} | | ${min_rate}= | Set Variable | ${50000} | | ${max_rate}= | Set Variable | ${s_18.75Mpps} @@ -90,16 +92,18 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -127,16 +131,18 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -166,15 +172,17 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -203,15 +211,17 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -243,15 +253,17 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -282,15 +294,17 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -319,16 +333,18 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -356,16 +372,18 @@ | | ${encr_alg}= | Crypto Alg AES GCM 128 | | ${auth_alg}= | Integ Alg AES GCM 128 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot index 34a08ce475..49b78c1bbb 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsecscale1000tnl-ip4base-tnl-cbc-sha1-ndrpdrdisc.robot @@ -19,6 +19,7 @@ | ... | IP4FWD | IPSEC | IPSECHW | IPSECTUN | NIC_Intel-XL710 | TNL_1000 | ... | Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev | ... | Suite Teardown | Tear down 3-node performance topology | ... @@ -54,9 +55,9 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_24.5G} | ${24500000000} +| ${s_24.5G}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${tg_if1_ip4}= | 192.168.10.2 | ${dut1_if1_ip4}= | 192.168.10.1 | ${dut1_if2_ip4}= | 172.168.1.1 @@ -69,7 +70,7 @@ | ${ipsec_overhead}= | ${58} | ${n_tunnels}= | ${1000} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4dst${n_tunnels} +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4dst${n_tunnels} *** Test Cases *** | tc01-64B-1t1c-ethip4ipsecscale1000tnl-ip4base-tnl-cbc-sha1-ndrdisc @@ -81,6 +82,7 @@ | | ... | | [Tags] | 64B | 1T1C | STHREAD | NDRDISC | | ... +| | # FIXME: Move repeated lines into a keyword. | | ${framesize}= | Set Variable | ${64} | | ${min_rate}= | Set Variable | ${50000} | | ${max_rate}= | Set Variable | ${s_18.75Mpps} @@ -90,16 +92,18 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -127,16 +131,18 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -165,15 +171,17 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -201,15 +209,17 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -240,15 +250,17 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -278,15 +290,17 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -315,16 +329,18 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} @@ -352,16 +368,18 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | When Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Initialize IPSec in 3-node circular topology -| | Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} | ${dut1_if2} -| | Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} | ${dut2_if1} +| | And Vpp Route Add | ${dut1} | ${raddr_ip4} | 8 | ${dut2_if1_ip4} +| | ... | ${dut1_if2} +| | And Vpp Route Add | ${dut2} | ${laddr_ip4} | 8 | ${dut1_if2_ip4} +| | ... | ${dut2_if1} | | And VPP IPsec Add Multiple Tunnels | | ... | ${dut1} | ${dut2} | ${dut1_if2} | ${dut2_if1} | ${n_tunnels} | | ... | ${encr_alg} | ${encr_key} | ${auth_alg} | ${auth_key} diff --git a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsectptlispgpe-ip4base-cbc-sha1-ndrpdrdisc.robot b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsectptlispgpe-ip4base-cbc-sha1-ndrpdrdisc.robot index 8d3332bbc3..1f2f6f9c18 100644 --- a/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsectptlispgpe-ip4base-cbc-sha1-ndrpdrdisc.robot +++ b/tests/vpp/perf/crypto/40ge2p1xl710-ethip4ipsectptlispgpe-ip4base-cbc-sha1-ndrpdrdisc.robot @@ -22,6 +22,7 @@ | ... | NIC_Intel-XL710 | ... | Suite Setup | Set up IPSec performance test suite | L3 | Intel-XL710 +| ... | HW_cryptodev | ... | Suite Teardown | Tear down 3-node performance topology | ... @@ -59,15 +60,15 @@ *** Variables *** # XL710-DA2 bandwidth limit ~49Gbps/2=24.5Gbps -| ${s_24.5G} | ${24500000000} +| ${s_24.5G}= | ${24500000000} # XL710-DA2 Mpps limit 37.5Mpps/2=18.75Mpps -| ${s_18.75Mpps} | ${18750000} +| ${s_18.75Mpps}= | ${18750000} | ${dut2_spi}= | ${1000} | ${dut1_spi}= | ${1001} | ${ESP_PROTO}= | ${50} | ${ipsec_overhead}= | ${54} # Traffic profile: -| ${traffic_profile} | trex-sl-3n-ethip4-ip4src253 +| ${traffic_profile}= | trex-sl-3n-ethip4-ip4src253 *** Test Cases *** | tc01-64B-1t1c-ethip4ipsectptlispgpe-ip4base-cbc-sha1-ndrdisc @@ -80,6 +81,7 @@ | | ... | | [Tags] | 64B | 1T1C | STHREAD | NDRDISC | | ... +| | # FIXME: Move repeated lines into a keyword. | | ${framesize}= | Set Variable | ${64} | | ${min_rate}= | Set Variable | ${50000} | | ${max_rate}= | Set Variable | ${s_18.75Mpps} @@ -89,13 +91,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Initialize LISP GPE IPv4 over IPsec in 3-node circular topology | | ... | ${encr_alg} | ${auth_alg} | | Then Find NDR using binary search and pps | ${framesize} | ${binary_min} @@ -121,13 +123,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Initialize LISP GPE IPv4 over IPsec in 3-node circular topology | | ... | ${encr_alg} | ${auth_alg} | | Then Find PDR using binary search and pps | ${framesize} | ${binary_min} @@ -154,12 +156,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Initialize LISP GPE IPv4 over IPsec in 3-node circular topology | | ... | ${encr_alg} | ${auth_alg} | | Then Find NDR using binary search and pps | ${framesize} | ${binary_min} @@ -185,12 +187,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Initialize LISP GPE IPv4 over IPsec in 3-node circular topology | | ... | ${encr_alg} | ${auth_alg} | | Then Find PDR using binary search and pps | ${framesize} | ${binary_min} @@ -218,12 +220,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Initialize LISP GPE IPv4 over IPsec in 3-node circular topology | | ... | ${encr_alg} | ${auth_alg} | | Then Find NDR using binary search and pps | ${framesize} | ${binary_min} @@ -250,12 +252,12 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '1' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add cryptodev to all DUTs | ${1} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Initialize LISP GPE IPv4 over IPsec in 3-node circular topology | | ... | ${encr_alg} | ${auth_alg} | | Then Find PDR using binary search and pps | ${framesize} | ${binary_min} @@ -282,13 +284,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Initialize LISP GPE IPv4 over IPsec in 3-node circular topology | | ... | ${encr_alg} | ${auth_alg} | | Then Find NDR using binary search and pps | ${framesize} | ${binary_min} @@ -314,13 +316,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '2' worker threads and '1' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${2} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Initialize LISP GPE IPv4 over IPsec in 3-node circular topology | | ... | ${encr_alg} | ${auth_alg} | | Then Find PDR using binary search and pps | ${framesize} | ${binary_min} @@ -332,7 +334,7 @@ | | [Documentation] | | ... | [Cfg] Each DUT is configured with LISP and IPsec in each direction.\ | | ... | IPsec is in transport mode. DUTs are configured with 4 threads, 4 phy\ -| | ... | cores, 2 receive queue per NIC port. +| | ... | cores, 2 receive queues per NIC port. | | ... | [Ver] Find NDR for 64 Byte frames using binary search start at 40GE\ | | ... | linerate, step 50kpps. | | ... @@ -347,13 +349,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '4' worker threads and '2' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${4} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Initialize LISP GPE IPv4 over IPsec in 3-node circular topology | | ... | ${encr_alg} | ${auth_alg} | | Then Find NDR using binary search and pps | ${framesize} | ${binary_min} @@ -364,7 +366,7 @@ | | [Documentation] | | ... | [Cfg] Each DUT is configured with LISP and IPsec in each direction.\ | | ... | IPsec is in transport mode. DUTs are configured with 4 threads, 4 phy\ -| | ... | cores, 2 receive queue per NIC port. +| | ... | cores, 2 receive queues per NIC port. | | ... | [Ver] Find NDR for 64 Byte frames using binary search start at 40GE\ | | ... | linerate, step 50kpps, LT=0.5%. | | ... @@ -379,13 +381,13 @@ | | ${encr_alg}= | Crypto Alg AES CBC 128 | | ${auth_alg}= | Integ Alg SHA1 96 | | Given Add '4' worker threads and '2' rxqueues in 3-node single-link circular topology -| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | And Add PCI devices to DUTs in 3-node single link topology | | And Add no multi seg to all DUTs | | And Add cryptodev to all DUTs | ${4} | | And Add DPDK dev default RXD to all DUTs | 2048 | | And Add DPDK dev default TXD to all DUTs | 2048 | | And Apply startup configuration on all VPP DUTs +| | And Generate keys for IPSec | ${encr_alg} | ${auth_alg} | | When Initialize LISP GPE IPv4 over IPsec in 3-node circular topology | | ... | ${encr_alg} | ${auth_alg} | | Then Find PDR using binary search and pps | ${framesize} | ${binary_min} -- cgit 1.2.3-korg