From patchwork Thu May 18 02:40:12 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Patchwork-Submitter: Yingya Han X-Patchwork-Id: 126971 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 9493242B31; Thu, 18 May 2023 04:40:21 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 9036C42BDA; Thu, 18 May 2023 04:40:21 +0200 (CEST) Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by mails.dpdk.org (Postfix) with ESMTP id 8B0AF40E25 for ; Thu, 18 May 2023 04:40:19 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1684377618; x=1715913618; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=8E4YkpnmJyFboLsPiMYjAkxfhkaED+T0YNH59ZIBuaE=; b=LVIRa7XwnRcZGOSBSdFm8ltVfda7EZGjCmhQGFxeaobjVQvJXQfz3Sb7 atHsGL1EAt9+l6+v+A69o75f/0jGJCxWF6zl55EnGbvSiQqiwc62+gpES Dr33kDs3q4b73fpaaimxGYpcYoFFfM6fQ0HqbUkUDuff5Z1VrhMK0f4H0 BiQJcpZx6Q4qzCms6Esi4unYbeH6U72H0SI4nU5rN8DqiF9o8SMZJnxup dAnUAFtkn8JqFa1Jqe0z0qUNb4UXQhn2Fp1FqCrpKk0B53+Pe4ioAYdyD JlioywAhNPc0+DgjS3OYjDzDMhXlqo1jev7z3vhXJYAmvZqKp6PrXdDpV A==; X-IronPort-AV: E=McAfee;i="6600,9927,10713"; a="417608465" X-IronPort-AV: E=Sophos;i="5.99,284,1677571200"; d="scan'208";a="417608465" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 May 2023 19:40:18 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10713"; a="826199440" X-IronPort-AV: E=Sophos;i="5.99,284,1677571200"; d="scan'208";a="826199440" Received: from dpdk-lijuan-icelake4.sh.intel.com ([10.67.119.160]) by orsmga004.jf.intel.com with ESMTP; 17 May 2023 19:40:17 -0700 From: Yingya Han To: dts@dpdk.org Cc: Yingya Han Subject: [dts][PATCH V4 1/3]test_plans: add iavf_checksum_offload_perf test plan Date: Thu, 18 May 2023 02:40:12 +0000 Message-Id: <20230518024014.120638-2-yingyax.han@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230518024014.120638-1-yingyax.han@intel.com> References: <20230518024014.120638-1-yingyax.han@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Signed-off-by: Yingya Han --- .../iavf_checksum_offload_perf_test_plan.rst | 216 ++++++++++++++++++ test_plans/index.rst | 1 + 2 files changed, 217 insertions(+) create mode 100644 test_plans/iavf_checksum_offload_perf_test_plan.rst diff --git a/test_plans/iavf_checksum_offload_perf_test_plan.rst b/test_plans/iavf_checksum_offload_perf_test_plan.rst new file mode 100644 index 00000000..bd5ebd50 --- /dev/null +++ b/test_plans/iavf_checksum_offload_perf_test_plan.rst @@ -0,0 +1,216 @@ +.. SPDX-License-Identifier: BSD-3-Clause + Copyright(c) 2023 Intel Corporation + +===================================================== +Benchmark the performance of iavf checksum forwarding +===================================================== + +Description +=========== + +Send packets with incorrect checksum, +verify dpdk can rx it and report the checksum error, +verify that the same number of packet are correctly received on the traffic +generator side. + +Prerequisites +============= + +1. Hardware: + + I40E driver NIC (IntelĀ® Ethernet 700 Series XXV710, XL710, X710) + ICE driver NIC (IntelĀ® Ethernet 800 Series E810-CQDA2, E810-XXVDA4) + +2. Software:: + + dpdk: git clone http://dpdk.org/git/dpdk + trex: git clone http://trex-tgn.cisco.com/trex/release/v2.93.tar.gz + + +Test Case +========= +The test case check the throughput result with ipv4, in the case, +we will send the bi-direction flows with line rate, then we can check the +passthrough rate. + +Common Steps +------------ +1. Bind PF ports to kernel driver(ice), then create 1 VF from each PF, + take E810-CQDA2 for example:: + + echo 1 > /sys/bus/pci/devices/0000\:17\:00.0/sriov_numvfs + echo 1 > /sys/bus/pci/devices/0000\:4b\:00.0/sriov_numvfs + +2. Ip link set VF trust on and spoofchk off on DUT:: + + ip link set $PF_INTF vf 0 trust on + ip link set $PF_INTF vf 0 spoofchk off + +3. Set vf mac address:: + + ip link set ens5f0 vf 0 mac 00:12:34:56:78:01 + ip link set ens6f0 vf 0 mac 00:12:34:56:78:02 + +4. Bind tested ports to vfio-pci:: + + #./usertools/dpdk-devbind.py -s + 0000:17:00.0 'Device 1592' if=ens5f0 drv=ice unused=vfio-pci + 0000:4b:00.0 'Device 1592' if=ens6f0 drv=ice unused=vfio-pci + #./usertools/dpdk-devbind.py -b vfio-pci + #./usertools/dpdk-devbind.py -b vfio-pci 0000:17:01.0 + #./usertools/dpdk-devbind.py -b vfio-pci 0000:4b:01.0 + +5. Start dpdk-testpmd:: + + /app/dpdk-testpmd -l 5,6 -n 8 --force-max-simd-bitwidth=512 \ + -- -i --portmask=0x3 --rxq=1 --txq=1 --txd=1024 --rxd=1024 --forward=io \ + --nb-cores=1 --enable-rx-cksum + + Note: + -force-max-simd-bitwidth: set 512 + -enable-rx-cksum: enable rx checksum + +6. Configure traffic generator to send traffic + + Test flow MAC table. + + +------+---------+------------+----------------+ + | Flow | Traffic | MAC | MAC | + | | Gen. | Src. | Dst. | + | | Port | Address | Address | + +======+=========+============+================+ + | 1 | TG0 | Random MAC | 00:12:34:56:01 | + +------+---------+------------+----------------+ + | 2 | TG1 | Random Mac | 00:12:34:56:02 | + +------+---------+------------+----------------+ + + The Flow IP table. + + +------+---------+------------+------------+ + | Flow | Traffic | IPV4 | IPV4 | + | | Gen. | Src. | Dest. | + | | Port | Address | Address | + +======+=========+============+============+ + | 1 | TG0 | Any IP | 198.18.1.0 | + +------+---------+------------+------------+ + | 2 | TG1 | Any IP | 198.18.0.0 | + +------+---------+------------+------------+ + + Set the packet length : 128 bytes-1518 bytes + The IPV4 Dest Address increase with the num 1024. + +7. Test results table. + + +-----------+------------+-------------+---------+ + | Fwd_core | Frame Size | Throughput | Rate | + +===========+============+=============+=========+ + | 1C/1T | 128 | xxxxx Mpps | xxx % | + +-----------+------------+-------------+---------+ + | 1C/1T | ... | xxxxx Mpps | xxx % | + +-----------+------------+-------------+---------+ + +Test Case 1: test_perf_disable_checksum_offload_ipv4 +---------------------------------------------------- + +1. Repeat common step 1-5. + +2. Configure traffic generator to send traffic as common step 6. + +3. Record Test results as common step 7. + +4. Config SW checksum offload:: + + testpmd>stop + testpmd>set fwd csum + testpmd>port stop all + testpmd>csum set ip sw 0 + testpmd>csum set ip sw 1 + testpmd>port start all + testpmd>start + +5. Configure traffic generator to send traffic as common step 6. + + And configure the correct or incorrect ipv4 checksum separately. + +6. Record Test results as common step 7. + +Test Case 2: test_perf_disable_checksum_offload_vxlan +----------------------------------------------------- + +1. Repeat common step 1-5. + +2. Config SW checksum offload:: + + testpmd>stop + testpmd>set fwd csum + testpmd>port stop all + testpmd>csum set ip sw 0 + testpmd>csum set ip sw 1 + testpmd>port start all + testpmd>start + +3. Set the traffic flow as below: + + Ether / IPv4 / UDP / VXLAN / Ether / IPv4 / UDP / payload + + Set the packet length : 128 bytes-1518 bytes. + + Configure the correct or incorrect inner and outer ipv4 checksum and udp checksum separately. + +4. Record Test results as common step 7. + +Test Case 3: test_perf_enable_checksum_offload_ipv4 +--------------------------------------------------- + +1. Repeat common step 1-5. + +2. Config HW checksum offload:: + + testpmd>stop + testpmd>set fwd csum + testpmd>port stop all + testpmd>csum set ip hw 0 + testpmd>csum set ip hw 1 + testpmd>port start all + testpmd>set promisc all on + testpmd>start + +3. Configure traffic generator to send traffic as common step 6. + + And configure the correct or incorrect ipv4 checksum separately. + +5. Record Test results as common step 7. + +Test Case 4: test_perf_enable_checksum_offload_vxlan +---------------------------------------------------- + +1. Repeat common step 1-5. + +2. Config HW checksum offload:: + + testpmd>stop + testpmd>set fwd csum + testpmd>port stop all + testpmd>csum set ip hw 0 + testpmd>csum set ip hw 1 + testpmd>csum set udp hw 0 + testpmd>csum set udp hw 1 + testpmd>csum set outer-ip hw 0 + testpmd>csum set outer-ip hw 1 + testpmd>csum set outer-udp hw 0 + testpmd>csum set outer-udp hw 1 + testpmd>csum parse-tunnel on 0 + testpmd>csum parse-tunnel on 1 + testpmd>port start all + testpmd>set promisc all on + testpmd>start + +3. Set the traffic flow as below: + + Ether / IPv4 / UDP / VXLAN / Ether / IPv4 / UDP / payload + + Set the packet length : 128 bytes-1518 bytes. + + Configure the correct or incorrect inner and outer ipv4 checksum and udp checksum separately. + +4. Record Test results as common step 7. diff --git a/test_plans/index.rst b/test_plans/index.rst index a0c056cd..8e10a7d5 100644 --- a/test_plans/index.rst +++ b/test_plans/index.rst @@ -80,6 +80,7 @@ The following are the test plans for the DPDK DTS automated test system. hotplug_test_plan ice_iavf_fdir_test_plan ice_iavf_fdir_gtpogre_test_plan + iavf_checksum_offload_perf_test_plan iavf_flexible_descriptor_test_plan iavf_package_driver_error_handle_test_plan iavf_fdir_protocol_agnostic_flow_test_plan From patchwork Thu May 18 02:40:13 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yingya Han X-Patchwork-Id: 126972 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id BF1CC42B33; Thu, 18 May 2023 04:40:22 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id BA71342BAC; Thu, 18 May 2023 04:40:22 +0200 (CEST) Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by mails.dpdk.org (Postfix) with ESMTP id ED38640E25 for ; Thu, 18 May 2023 04:40:20 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1684377620; x=1715913620; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=fEh4m7ftTQDWTTekSgXymktDRS5fH3jFOj5cJldMBng=; b=UAeX25LBMIvsyDB9D9XawZHIKOFGMAIWPMKHI9TEYLiyKpg9WxKJSx53 dcORMPwG5mJLRnGAfHBrCkhy2OVN/j63S5rVQrtdojIpwJjpzHFIAT/TW pzfjLnP4k02/xZPi0MfdoCv8Qw9d1B3v39iNCGouFUtOF27UJPGWE+FI+ Y8dPF3Dg7jkifFUwMbZAkSgp2znJEACGZlpiKzaX0B7vTg0nhFBbAmRWs 15IcDimnhJPMajRl2UmVe70/I6oofaSFUTHPgJQLeZX2VLPvGc9blmpbz xGapx9r+tW+MjYDv0Y8Rr/xQxQhEPOTQCzDCXHup6fb2PPuwK08TQ1D3A g==; X-IronPort-AV: E=McAfee;i="6600,9927,10713"; a="417608466" X-IronPort-AV: E=Sophos;i="5.99,284,1677571200"; d="scan'208";a="417608466" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 May 2023 19:40:19 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10713"; a="826199453" X-IronPort-AV: E=Sophos;i="5.99,284,1677571200"; d="scan'208";a="826199453" Received: from dpdk-lijuan-icelake4.sh.intel.com ([10.67.119.160]) by orsmga004.jf.intel.com with ESMTP; 17 May 2023 19:40:18 -0700 From: Yingya Han To: dts@dpdk.org Cc: Yingya Han Subject: [dts][PATCH V4 2/3]tests: add iavf_checksum_offload_perf test script Date: Thu, 18 May 2023 02:40:13 +0000 Message-Id: <20230518024014.120638-3-yingyax.han@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230518024014.120638-1-yingyax.han@intel.com> References: <20230518024014.120638-1-yingyax.han@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Signed-off-by: Yingya Han --- tests/TestSuite_iavf_checksum_offload_perf.py | 417 ++++++++++++++++++ 1 file changed, 417 insertions(+) create mode 100644 tests/TestSuite_iavf_checksum_offload_perf.py diff --git a/tests/TestSuite_iavf_checksum_offload_perf.py b/tests/TestSuite_iavf_checksum_offload_perf.py new file mode 100644 index 00000000..ea232697 --- /dev/null +++ b/tests/TestSuite_iavf_checksum_offload_perf.py @@ -0,0 +1,417 @@ +# SPDX-License-Identifier: BSD-3-Clause +# Copyright(c) 2023 Intel Corporation +# + +""" +DPDK Test suite. +""" + +import os +import re +import time + +from framework.exception import VerifyFailure +from framework.pktgen import PacketGeneratorHelper +from framework.pmd_output import PmdOutput +from framework.settings import HEADER_SIZE +from framework.test_case import TestCase + + +class TestIavfChecksumOffloadPerf(TestCase): + def set_up_all(self): + """ + Run at the start of each test suite. + PMD prerequisites. + """ + self.verify( + self.nic + in [ + "I40E_25G-25G_SFP28", + "I40E_40G-QSFP_A", + "ICE_100G-E810C_QSFP", + "ICE_25G-E810C_SFP", + "ICE_25G-E810_XXV_SFP", + ], + "NIC Unsupported: " + str(self.nic), + ) + self.dut_ports = self.dut.get_ports(self.nic) + self.verify(len(self.dut_ports) >= 1, "At least 1 port is required to test") + self.socket = self.dut.get_numa_id(self.dut_ports[0]) + + self.core_offset = 3 + self.test_content = self.get_test_content_from_cfg(self.get_suite_cfg()) + # Get dts output path + if self.logger.log_path.startswith(os.sep): + self.output_path = self.logger.log_path + else: + cur_path = os.path.dirname(os.path.dirname(os.path.realpath(__file__))) + self.output_path = os.sep.join([cur_path, self.logger.log_path]) + self.vfs_mac = ["00:12:34:56:78:0%d" % (i + 1) for i in self.dut_ports] + self.pmdout = PmdOutput(self.dut) + # Create an instance to set stream field setting + self.pktgen_helper = PacketGeneratorHelper() + self.vf_port_info = {} + self.vf_create() + + def set_up(self): + """ + Run before each test case. + It's more convenient to load suite configuration here than + set_up_all in debug mode. + """ + self.test_result = {"header": [], "date": []} + + def parse_test_config(self, config): + """ + [n]C/[mT]-[i]Q + n: how many physical core use for polling. + m: how many cpu thread use for polling, if Hyper-threading disabled + in BIOS, m equals n, if enabled, m is 2 times as n. + i: how many queues use per port, so total queues = i x nb_port + """ + pat = "(.*)/(.*)-(.*)" + result = re.findall(pat, config) + if not result: + msg = f"{config} is wrong format, please check" + raise VerifyFailure(msg) + cores, threads, queue = result[0] + _thread_num = int(int(threads[:-1]) // int(cores[:-1])) + + _thread = str(_thread_num) + "T" + _cores = str(self.core_offset + int(cores[:-1])) + "C" + cores_config = "/".join(["1S", _cores, _thread]) + queues_per_port = int(queue[:-1]) + return cores_config, _thread_num, queues_per_port + + def get_test_configs(self, test_parameters): + configs = [] + frame_sizes_grp = [] + nb_desc = self.get_suite_cfg().get("rxtx_queue_size") + for test_item, frame_sizes in sorted(test_parameters.items()): + _frame_sizes = [int(frame_size) for frame_size in frame_sizes] + frame_sizes_grp.extend([int(item) for item in _frame_sizes]) + cores, thread_num, queues = self.parse_test_config(test_item) + corelist = self.dut.get_core_list(cores, self.socket) + core_list = corelist[(self.core_offset - 1) * thread_num :] + if "2T" in cores: + core_list = core_list[1:2] + core_list[0::2] + core_list[1::2][1:] + _core_list = core_list[thread_num - 1 :] + configs.append( + [ + test_item, + _core_list, + [ + " --txd={0} --rxd={0}".format(nb_desc) + + " --rxq={0} --txq={0}".format(queues) + + " --nb-cores={}".format(len(core_list) - thread_num) + + " --enable-rx-cksum" + ], + ] + ) + return configs, sorted(set(frame_sizes_grp)) + + def get_test_content_from_cfg(self, test_content): + configs, frame_sizes = self.get_test_configs(test_content["test_parameters"]) + test_content["configs"] = configs + test_content["frame_sizes"] = frame_sizes + return test_content + + def vf_create(self): + """ + Require enough PF ports, create 1 VF from each PF. + """ + # Get vf assign method + vf_driver = self.test_content.get("vf_driver") + if vf_driver is None: + vf_driver = self.drivername + for port_id in self.dut_ports: + pf_driver = self.dut.ports_info[port_id]["port"].default_driver + self.dut.generate_sriov_vfs_by_port(port_id, 1, driver=pf_driver) + pf_pci = self.dut.ports_info[port_id]["port"].pci + sriov_vfs_port = self.dut.ports_info[port_id].get("vfs_port") + if not sriov_vfs_port: + msg = f"failed to create vf on dut port {pf_pci}" + self.logger.error(msg) + continue + self.vf_port_info[port_id] = { + "pf_pci": pf_pci, + "vf_pci": self.dut.ports_info[port_id]["port"].get_sriov_vfs_pci(), + } + pf_intf = self.dut.ports_info[port_id]["intf"] + # Set vf mac + self.dut.send_expect( + "ip link set %s vf 0 mac %s" % (pf_intf, self.vfs_mac[port_id]), "#" + ) + self.dut.send_expect("ip link set %s vf 0 trust on" % pf_intf, "#") + self.dut.send_expect("ip link set %s vf 0 spoofchk off" % pf_intf, "#") + # Bind vf to dpdk + try: + for port in sriov_vfs_port: + port.bind_driver(driver=vf_driver) + except Exception as e: + self.vf_destroy() + raise Exception(e) + + def vf_destroy(self): + """ + Destroy the setup VFs + """ + if not self.vf_port_info: + return + for port_id, _ in self.vf_port_info.items(): + self.dut.destroy_sriov_vfs_by_port(port_id) + self.dut.ports_info[port_id]["port"].bind_driver(self.drivername) + self.vf_port_info = None + + def checksum_enable(self, csum, csum_config): + self.dut.send_expect("stop", "testpmd> ", 15) + self.dut.send_expect("set fwd csum", "testpmd> ", 15) + self.dut.send_expect("port stop all", "testpmd> ", 15) + for port_id in self.dut_ports: + self.dut.send_expect("csum set ip %s %d" % (csum, port_id), "testpmd> ", 15) + if csum_config: + self.dut.send_expect( + "csum set udp %s %d" % (csum, port_id), "testpmd> ", 15 + ) + self.dut.send_expect( + "csum set outer-ip %s %d" % (csum, port_id), "testpmd> ", 15 + ) + self.dut.send_expect( + "csum set outer-udp %s %d" % (csum, port_id), "testpmd> ", 15 + ) + self.dut.send_expect( + "csum set parse-tunnel on %d" % (port_id), "testpmd> ", 15 + ) + self.dut.send_expect("port start all", "testpmd> ", 15) + if csum == "hw": + self.dut.send_expect("set promisc all on", "testpmd> ", 15) + + def start_testpmd(self, core_list, pci_para, eal, csum, csum_config): + self.pmdout.start_testpmd(core_list, eal, pci_para, socket=self.socket) + if csum: + self.checksum_enable(csum, csum_config) + self.dut.send_expect("start", "testpmd> ", 15) + + def create_pcaps_file(self, frame_size, checksum, pkt_type): + """ + Prepare traffic flow + """ + if pkt_type == "vxlan": + headers_size = sum( + [ + HEADER_SIZE[x] + for x in ["eth", "ip", "udp", "vxlan", "eth", "ip", "udp"] + ] + ) + else: + headers_size = sum([HEADER_SIZE[x] for x in ["eth", "ip"]]) + payload_size = frame_size - headers_size + pcaps = {} + # Configure the correct or incorrect checksum. + for _port in self.dut_ports: + if 1 == len(self.dut_ports): + if pkt_type == "vxlan": + if checksum == "invalid": + flow = [ + 'Ether(dst="%s")/IP(dst="192.18.1.%d",chksum=1)/UDP(chksum=1)/VXLAN(vni=0x1)/Ether()/IP(dst="192.18.%d.0,chksum=1)/UDP(chksum=1)/("X"*%d)' + % (self.vfs_mac[_port], _port, _port, payload_size) + ] + else: + flow = [ + 'Ether(dst="%s")/IP(dst="192.18.1.%d")/UDP()/VXLAN(vni=0x1)/Ether()/IP(dst="192.18.%d.0)/UDP()/("X"*%d)' + % (self.vfs_mac[_port], _port, _port, payload_size) + ] + elif pkt_type == "ipv4": + if checksum == "invalid": + flow = [ + 'Ether(dst="%s")/IP(dst="192.18.1.%d",chksum=1)/("X"*%d)' + % (self.vfs_mac[_port], _port, payload_size) + ] + else: + flow = [ + 'Ether(dst="%s")/IP(dst="192.18.1.%d")/("X"*%d)' + % (self.vfs_mac[_port], _port, payload_size) + ] + pcap = os.sep.join([self.output_path, "dst{0}.pcap".format(_port)]) + self.tester.scapy_append('wrpcap("%s", [%s])' % (pcap, ",".join(flow))) + self.tester.scapy_execute() + pcaps[_port] = [] + pcaps[_port].append(pcap) + else: + cnt = 0 + for i in range(len(self.dut_ports) ** 2)[_port * 2 : (_port + 1) * 2]: + if pkt_type == "vxlan": + if checksum == "invalid": + flow = [ + 'Ether(dst="%s")/IP(dst="192.18.%d.%d",chksum=1)/UDP(chksum=1)/VXLAN(vni=0x1)/Ether()/IP(dst="192.18.%d.0",chksum=1)/UDP(chksum=1)/("X"*%d)' + % (self.vfs_mac[_port], i, _port, i + 1, payload_size) + ] + else: + flow = [ + 'Ether(dst="%s")/IP(dst="192.18.%d.%d")/UDP()/VXLAN(vni=0x1)/Ether()/IP(dst="192.18.%d.0")/UDP()/("X"*%d)' + % (self.vfs_mac[_port], i, _port, i + 1, payload_size) + ] + elif pkt_type == "ipv4": + if checksum == "invalid": + flow = [ + 'Ether(dst="%s")/IP(dst="192.18.%d.%d",chksum=1)/("X"*%d)' + % (self.vfs_mac[_port], i, _port, payload_size) + ] + else: + flow = [ + 'Ether(dst="%s")/IP(dst="192.18.%d.%d")/("X"*%d)' + % (self.vfs_mac[_port], i, _port, payload_size) + ] + pcap = os.sep.join( + [self.output_path, "dst{0}_{1}.pcap".format(_port, cnt)] + ) + self.tester.scapy_append( + 'wrpcap("%s", [%s])' % (pcap, ",".join(flow)) + ) + self.tester.scapy_execute() + if _port not in pcaps: + pcaps[_port] = [] + pcaps[_port].append(pcap) + cnt += 1 + return pcaps + + def prepare_stream(self, pcaps): + """ + Create streams for ports, one port one stream + """ + tgen_input = [] + port_num = len(self.dut_ports) + if 1 == port_num: + txIntf = self.tester.get_local_port(self.dut_ports[0]) + rxIntf = txIntf + for pcap in pcaps[0]: + tgen_input.append((txIntf, rxIntf, pcap)) + else: + for rxPort in self.dut_ports: + if rxPort % port_num == 0 or rxPort**2 == port_num: + txIntf = self.tester.get_local_port(self.dut_ports[rxPort + 1]) + port_id = self.dut_ports[rxPort + 1] + else: + txIntf = self.tester.get_local_port(self.dut_ports[rxPort - 1]) + port_id = self.dut_ports[rxPort - 1] + rxIntf = self.tester.get_local_port(self.dut_ports[rxPort]) + for pcap in pcaps[port_id]: + tgen_input.append((txIntf, rxIntf, pcap)) + return tgen_input + + def throughput(self, frame_size, checksum, pkt_type): + pcaps = self.create_pcaps_file(frame_size, checksum, pkt_type) + tgenInput = self.prepare_stream(pcaps) + # Get traffic option + duration = self.test_content.get("test_duration") + traffic_stop_wait_time = self.test_content.get("traffic_stop_wait_time", 0) + vm_config = self.set_fields() + # Clear streams before add new streams + self.tester.pktgen.clear_streams() + streams = self.pktgen_helper.prepare_stream_from_tginput( + tgenInput, 100, vm_config, self.tester.pktgen + ) + # Set traffic option + traffic_option = { + "method": "throughput", + "duration": duration, + } + # Run packet generator + result = self.tester.pktgen.measure(streams, traffic_option) + time.sleep(traffic_stop_wait_time) + # Statistics result + _, pps = result + self.verify(pps > 0, "No traffic detected") + pps /= 1000000 + self.logger.info( + "Throughput of " + "framesize: {}, is: {} Mpps".format(frame_size, pps) + ) + return pps + + def display_result(self, datas): + # Display result table + header_row = ["Fwd Core", "Frame Size", "Throughput", "Rate"] + self.test_result["header"] = header_row + self.result_table_create(header_row) + self.test_result["data"] = [] + for data in datas: + config, frame_size, pps = data + linerate = self.wirespeed(self.nic, frame_size, len(self.dut_ports)) + percentage = pps * 100 / linerate + data_row = [ + config, + frame_size, + "{:.3f} Mpps".format(pps), + "{:.3f}%".format(percentage), + ] + self.result_table_add(data_row) + self.test_result["data"].append(data_row) + self.result_table_print() + + def perf_test(self, csum="", csum_config="", checksum="", pkt_type="ipv4"): + """ + Performance Benchmarking test + """ + pci_para = "" + for port_id in self.dut_ports: + pci_para += " -a " + self.vf_port_info[port_id]["vf_pci"][0] + results = [] + + for config, core_list, eal in self.test_content["configs"]: + self.logger.info( + ("Executing Test Using cores: {0} of config {1}, ").format( + core_list, config + ) + ) + self.start_testpmd(core_list, pci_para, eal[0], csum, csum_config) + for frame_size in self.test_content["frame_sizes"]: + self.logger.info("Test running at framesize: {}".format(frame_size)) + result = self.throughput(frame_size, checksum, pkt_type) + if result: + results.append([config, frame_size, result]) + self.dut.send_expect("stop", "testpmd> ", 15) + self.dut.send_expect("quit", "# ", 15) + self.display_result(results) + + def test_perf_disable_checksum_offload_ipv4(self): + self.perf_test() + self.perf_test(csum="sw", pkt_type="ipv4") + self.perf_test(csum="sw", checksum="invalid", pkt_type="ipv4") + + def test_perf_disable_checksum_offload_vxlan(self): + self.perf_test(csum="sw", pkt_type="vxlan") + self.perf_test(csum="sw", checksum="invalid", pkt_type="vxlan") + + def test_perf_enable_checksum_offload_ipv4(self): + self.perf_test(csum="hw", pkt_type="ipv4") + self.perf_test(csum="hw", checksum="invalid", pkt_type="ipv4") + + def test_perf_enable_checksum_offload_vxlan(self): + self.perf_test(csum="hw", csum_config="all", pkt_type="vxlan") + self.perf_test( + csum="hw", csum_config="all", checksum="invalid", pkt_type="vxlan" + ) + + def set_fields(self): + """ + Set ip protocol field behavior + """ + fields_config = { + "ip": { + "src": {"action": "random"}, + }, + } + return fields_config + + def tear_down(self): + """ + Run after each test case. + """ + pass + + def tear_down_all(self): + """ + Run after each test suite. + """ + self.vf_destroy() + self.dut.kill_all() From patchwork Thu May 18 02:40:14 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Yingya Han X-Patchwork-Id: 126973 Return-Path: X-Original-To: patchwork@inbox.dpdk.org Delivered-To: patchwork@inbox.dpdk.org Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id E4F3742B31; Thu, 18 May 2023 04:40:23 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id E103442D1A; Thu, 18 May 2023 04:40:23 +0200 (CEST) Received: from mga07.intel.com (mga07.intel.com [134.134.136.100]) by mails.dpdk.org (Postfix) with ESMTP id 05ABB40E25 for ; Thu, 18 May 2023 04:40:21 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1684377621; x=1715913621; h=from:to:cc:subject:date:message-id:in-reply-to: references:mime-version:content-transfer-encoding; bh=ea//L9+rXW+XQ6Hd8p8f/mBMUtrUl9jaXvZqIrFOHWU=; b=GtXnqWxDxuu+6/iic6a/Uil8avo58YQ/EMG0W5dLXj0oZ12otQt1l3za S50BAkhG6twj557/OdxxBqcFuaN8JWs27wsU2Jp32bbXX4FJ2Hu/BpX6p 23EbV3CDG0UtUkQ+V0OCAU+p/JgElJ/b0G4dDgf0KvwncsAv6m/zVrNrJ 4gSseRa6lv1gYOCDZ/BhTESy+W2azh+v79SnFTGjfFhugVLcdyJ/FsxMU /52oE/qhOQcRl7q7fLJGeek5ptcx47F7Ux/0TLs/fU9Iv015GASJhogG8 gD/TUiWyelaLZoybDU8V/PcmiTKD0ENmRYRe0DBxeuH+wKHwUyv7rz9VL A==; X-IronPort-AV: E=McAfee;i="6600,9927,10713"; a="417608471" X-IronPort-AV: E=Sophos;i="5.99,284,1677571200"; d="scan'208";a="417608471" Received: from orsmga004.jf.intel.com ([10.7.209.38]) by orsmga105.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 17 May 2023 19:40:20 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=McAfee;i="6600,9927,10713"; a="826199462" X-IronPort-AV: E=Sophos;i="5.99,284,1677571200"; d="scan'208";a="826199462" Received: from dpdk-lijuan-icelake4.sh.intel.com ([10.67.119.160]) by orsmga004.jf.intel.com with ESMTP; 17 May 2023 19:40:20 -0700 From: Yingya Han To: dts@dpdk.org Cc: Yingya Han Subject: [dts][PATCH V4 3/3]conf: add iavf_checksum_offload_perf configuration file Date: Thu, 18 May 2023 02:40:14 +0000 Message-Id: <20230518024014.120638-4-yingyax.han@intel.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20230518024014.120638-1-yingyax.han@intel.com> References: <20230518024014.120638-1-yingyax.han@intel.com> MIME-Version: 1.0 X-BeenThere: dts@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: test suite reviews and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dts-bounces@dpdk.org Signed-off-by: Yingya Han --- conf/iavf_checksum_offload_perf.cfg | 22 ++++++++++++++++++++++ 1 file changed, 22 insertions(+) create mode 100644 conf/iavf_checksum_offload_perf.cfg diff --git a/conf/iavf_checksum_offload_perf.cfg b/conf/iavf_checksum_offload_perf.cfg new file mode 100644 index 00000000..e7e27586 --- /dev/null +++ b/conf/iavf_checksum_offload_perf.cfg @@ -0,0 +1,22 @@ +[suite] +test_duration = 30 +traffic_stop_wait_time = 2 +rxtx_queue_size = 1024 +test_parameters = { + "1C/1T-1Q": [ + "128", + "256", + "512", + "1024", + "1280", + "1518", + ], + "1C/2T-2Q": [ + "128", + "256", + "512", + "1024", + "1280", + "1518", + ], +}