Re: [vpp-dev] CSIT IPsec AES-GCM 128 tests failing

2018-10-02 Thread Peter Mikus via Lists.Fd.Io
Many thanks!
Seems to be working [0]

[0] 
https://jenkins.fd.io/view/csit/job/csit-vpp-perf-mrr-daily-master/332/console
  Ctrl+F ipsec

Peter Mikus
Engineer - Software
Cisco Systems Limited

From: vpp-dev@lists.fd.io  On Behalf Of Radu Nicolau
Sent: Monday, October 1, 2018 5:27 PM
To: Peter Mikus -X (pmikus - PANTHEON TECHNOLOGIES at Cisco) 
Cc: vpp-dev@lists.fd.io
Subject: Re: [vpp-dev] CSIT IPsec AES-GCM 128 tests failing

This should fix it: https://gerrit.fd.io/r/#/c/15078/


From: vpp-dev@lists.fd.io<mailto:vpp-dev@lists.fd.io> 
[mailto:vpp-dev@lists.fd.io] On Behalf Of Peter Mikus via Lists.Fd.Io
Sent: Wednesday, September 26, 2018 11:27 AM
To: Nicolau, Radu mailto:radu.nico...@intel.com>>
Cc: vpp-dev@lists.fd.io<mailto:vpp-dev@lists.fd.io>
Subject: Re: [vpp-dev] CSIT IPsec AES-GCM 128 tests failing



Peter Mikus
Engineer - Software
Cisco Systems Limited

From: Nicolau, Radu mailto:radu.nico...@intel.com>>
Sent: Tuesday, September 25, 2018 8:38 PM
To: Peter Mikus -X (pmikus - PANTHEON TECHNOLOGIES at Cisco) 
mailto:pmi...@cisco.com>>
Cc: Kinsella, Ray mailto:ray.kinse...@intel.com>>
Subject: RE: CSIT IPsec AES-GCM 128 tests failing

Hi Peter,

I'm traveling this week so I won't be able to have a look, but, can you help 
with some more info?


-  Is it happening consistently?

Yes


-  What is the output of show crypto device mapping [verbose]

$ sudo vppctl show int
  Name   IdxState  MTU (L3/IP4/IP6/MPLS) 
Counter  Count
FortyGigabitEthernet88/0/01  up  9200/0/0/0
FortyGigabitEthernet88/0/12  up  9200/0/0/0 rx packets  
   173678340
rx bytes
 10420700400
drops   
   173678340
ip4 
   173678340
rx-miss 
 737
ipsec03  up   0/0/0/0   tx-error
   173678340
local00 down  0/0/0/0

$ sudo vppctl show err
   CountNode  Reason
 167158808  ipsec0-output interface is down

It is not clear to me as why ipsec0 is up but error says interface down.

$ sudo vppctl show crypto
show: unknown input `crypto'

$ sudo vppctl show ipsec
tunnel interfaces
  ipsec0 seq
   seq 0 seq-hi 0 esn 0 anti-replay 0 udp-encap 0
   local-spi 1 local-ip 172.168.1.1
   local-crypto aes-gcm-128 70394d61596b657635793046705443744c45786c
   local-integrity none
   last-seq 0 last-seq-hi 0 esn 0 anti-replay 0 window 

   remote-spi 2 remote-ip 172.168.1.2
   remote-crypto aes-gcm-128 70394d61596b657635793046705443744c45786c
   remote-integrity none



-  What is the vpp version/commit id causing the issue?

Currently using vpp v18.10-rc0~465-gb7020d6~b5194 but I did not bisect, For 
sure it is broken for several weeks now.


Regards,
Radu

From: Peter Mikus -X (pmikus - PANTHEON TECHNOLOGIES at Cisco) 
[mailto:pmi...@cisco.com]
Sent: Tuesday, September 25, 2018 3:32 PM
To: vpp-dev@lists.fd.io<mailto:vpp-dev@lists.fd.io>; Nicolau, Radu 
mailto:radu.nico...@intel.com>>
Cc: csit-...@lists.fd.io<mailto:csit-...@lists.fd.io>
Subject: CSIT IPsec AES-GCM 128 tests failing

Hello devs,

We are observing IPSec failing tests in CSIT-perf, specially and only 
combination with aes-gcm (both interface AND tunnel mode, Integ Alg AES GCM 
128).
Note: Integ Alg SHA1 96, is working.

Can you please help decrypt the error message below?

Thank you.


VAT error message (on both DUTs)
-
sw_interface_set_flags error: Unspecified Error


-Note: This error is happening when trying to get interface UP.

DUT1 config
---

sw_interface_set_flags sw_if_index 2 admin-up link-up
sw_interface_set_flags sw_if_index 1 admin-up link-up
sw_interface_dump
hw_interface_set_mtu sw_if_index 2 mtu 9200
hw_interface_set_mtu sw_if_index 1 mtu 9200
sw_interface_dump
sw_interface_add_del_address sw_if_index 2 192.168.10.1/24
sw_interface_add_del_address sw_if_index 1 172.168.1.1/24
ip_neighbor_add_del sw_if_index 2 dst 192.168.10.2 mac 68:05:ca:35:79:1c
ip_neighbor_add_del sw_if_index 1 dst 172.168.1.2 mac 68:05:ca:35:76:b1
ip_add_del_route 10.0.0.0/8 via 192.168.10.2  sw_if_index 2 resolve-attempts 10 
count 1
ipsec_tunnel_if_add_del local_spi 1 remote_spi 2 crypto_alg aes-gcm-128 
local_crypto_key 4e4d444178336b4958744a374365356235643545 remote_crypto_key 
4e4d444178336b4958744a374365356235643545  local_ip 172.168.1.1 remote_ip 
172.168.1.2
ip_add_del_route 20.0.0.0/32 via 172.168.1.2 ipsec

Re: [vpp-dev] CSIT IPsec AES-GCM 128 tests failing

2018-10-01 Thread Radu Nicolau
This should fix it: https://gerrit.fd.io/r/#/c/15078/


From: vpp-dev@lists.fd.io [mailto:vpp-dev@lists.fd.io] On Behalf Of Peter Mikus 
via Lists.Fd.Io
Sent: Wednesday, September 26, 2018 11:27 AM
To: Nicolau, Radu 
Cc: vpp-dev@lists.fd.io
Subject: Re: [vpp-dev] CSIT IPsec AES-GCM 128 tests failing



Peter Mikus
Engineer - Software
Cisco Systems Limited

From: Nicolau, Radu mailto:radu.nico...@intel.com>>
Sent: Tuesday, September 25, 2018 8:38 PM
To: Peter Mikus -X (pmikus - PANTHEON TECHNOLOGIES at Cisco) 
mailto:pmi...@cisco.com>>
Cc: Kinsella, Ray mailto:ray.kinse...@intel.com>>
Subject: RE: CSIT IPsec AES-GCM 128 tests failing

Hi Peter,

I'm traveling this week so I won't be able to have a look, but, can you help 
with some more info?


-  Is it happening consistently?

Yes


-  What is the output of show crypto device mapping [verbose]

$ sudo vppctl show int
  Name   IdxState  MTU (L3/IP4/IP6/MPLS) 
Counter  Count
FortyGigabitEthernet88/0/01  up  9200/0/0/0
FortyGigabitEthernet88/0/12  up  9200/0/0/0 rx packets  
   173678340
rx bytes
 10420700400
drops   
   173678340
ip4 
   173678340
rx-miss 
 737
ipsec03  up   0/0/0/0   tx-error
   173678340
local00 down  0/0/0/0

$ sudo vppctl show err
   CountNode  Reason
 167158808  ipsec0-output interface is down

It is not clear to me as why ipsec0 is up but error says interface down.

$ sudo vppctl show crypto
show: unknown input `crypto'

$ sudo vppctl show ipsec
tunnel interfaces
  ipsec0 seq
   seq 0 seq-hi 0 esn 0 anti-replay 0 udp-encap 0
   local-spi 1 local-ip 172.168.1.1
   local-crypto aes-gcm-128 70394d61596b657635793046705443744c45786c
   local-integrity none
   last-seq 0 last-seq-hi 0 esn 0 anti-replay 0 window 

   remote-spi 2 remote-ip 172.168.1.2
   remote-crypto aes-gcm-128 70394d61596b657635793046705443744c45786c
   remote-integrity none



-  What is the vpp version/commit id causing the issue?

Currently using vpp v18.10-rc0~465-gb7020d6~b5194 but I did not bisect, For 
sure it is broken for several weeks now.


Regards,
Radu

From: Peter Mikus -X (pmikus - PANTHEON TECHNOLOGIES at Cisco) 
[mailto:pmi...@cisco.com]
Sent: Tuesday, September 25, 2018 3:32 PM
To: vpp-dev@lists.fd.io<mailto:vpp-dev@lists.fd.io>; Nicolau, Radu 
mailto:radu.nico...@intel.com>>
Cc: csit-...@lists.fd.io<mailto:csit-...@lists.fd.io>
Subject: CSIT IPsec AES-GCM 128 tests failing

Hello devs,

We are observing IPSec failing tests in CSIT-perf, specially and only 
combination with aes-gcm (both interface AND tunnel mode, Integ Alg AES GCM 
128).
Note: Integ Alg SHA1 96, is working.

Can you please help decrypt the error message below?

Thank you.


VAT error message (on both DUTs)
-
sw_interface_set_flags error: Unspecified Error


-Note: This error is happening when trying to get interface UP.

DUT1 config
---

sw_interface_set_flags sw_if_index 2 admin-up link-up
sw_interface_set_flags sw_if_index 1 admin-up link-up
sw_interface_dump
hw_interface_set_mtu sw_if_index 2 mtu 9200
hw_interface_set_mtu sw_if_index 1 mtu 9200
sw_interface_dump
sw_interface_add_del_address sw_if_index 2 192.168.10.1/24
sw_interface_add_del_address sw_if_index 1 172.168.1.1/24
ip_neighbor_add_del sw_if_index 2 dst 192.168.10.2 mac 68:05:ca:35:79:1c
ip_neighbor_add_del sw_if_index 1 dst 172.168.1.2 mac 68:05:ca:35:76:b1
ip_add_del_route 10.0.0.0/8 via 192.168.10.2  sw_if_index 2 resolve-attempts 10 
count 1
ipsec_tunnel_if_add_del local_spi 1 remote_spi 2 crypto_alg aes-gcm-128 
local_crypto_key 4e4d444178336b4958744a374365356235643545 remote_crypto_key 
4e4d444178336b4958744a374365356235643545  local_ip 172.168.1.1 remote_ip 
172.168.1.2
ip_add_del_route 20.0.0.0/32 via 172.168.1.2 ipsec0
exec set interface unnumbered ipsec0 use FortyGigabitEthernet88/0/0
sw_interface_set_flags ipsec0 admin-up


DUT2 config
---
sw_interface_set_flags sw_if_index 2 admin-up link-up
sw_interface_set_flags sw_if_index 1 admin-up link-up
sw_interface_dump
hw_interface_set_mtu sw_if_index 2 mtu 9200
hw_interface_set_mtu sw_if_index 1 mtu 9200
sw_interface_dump
sw_interface_add_del_address sw_if_index 2 172.168.1.2/24
sw_interface_add_del_address sw_if_index 1 192.168.20.1/24
ip_neighbor_add_del sw_if_index 1 dst 192.168.20.2 mac 68:05:ca:35:79:19
ip

Re: [vpp-dev] CSIT IPsec AES-GCM 128 tests failing

2018-09-26 Thread Peter Mikus via Lists.Fd.Io


Peter Mikus
Engineer - Software
Cisco Systems Limited

From: Nicolau, Radu 
Sent: Tuesday, September 25, 2018 8:38 PM
To: Peter Mikus -X (pmikus - PANTHEON TECHNOLOGIES at Cisco) 
Cc: Kinsella, Ray 
Subject: RE: CSIT IPsec AES-GCM 128 tests failing

Hi Peter,

I'm traveling this week so I won't be able to have a look, but, can you help 
with some more info?


-  Is it happening consistently?

Yes


-  What is the output of show crypto device mapping [verbose]

$ sudo vppctl show int
  Name   IdxState  MTU (L3/IP4/IP6/MPLS) 
Counter  Count
FortyGigabitEthernet88/0/01  up  9200/0/0/0
FortyGigabitEthernet88/0/12  up  9200/0/0/0 rx packets  
   173678340
rx bytes
 10420700400
drops   
   173678340
ip4 
   173678340
rx-miss 
 737
ipsec03  up   0/0/0/0   tx-error
   173678340
local00 down  0/0/0/0

$ sudo vppctl show err
   CountNode  Reason
 167158808  ipsec0-output interface is down

It is not clear to me as why ipsec0 is up but error says interface down.

$ sudo vppctl show crypto
show: unknown input `crypto'

$ sudo vppctl show ipsec
tunnel interfaces
  ipsec0 seq
   seq 0 seq-hi 0 esn 0 anti-replay 0 udp-encap 0
   local-spi 1 local-ip 172.168.1.1
   local-crypto aes-gcm-128 70394d61596b657635793046705443744c45786c
   local-integrity none
   last-seq 0 last-seq-hi 0 esn 0 anti-replay 0 window 

   remote-spi 2 remote-ip 172.168.1.2
   remote-crypto aes-gcm-128 70394d61596b657635793046705443744c45786c
   remote-integrity none



-  What is the vpp version/commit id causing the issue?

Currently using vpp v18.10-rc0~465-gb7020d6~b5194 but I did not bisect, For 
sure it is broken for several weeks now.


Regards,
Radu

From: Peter Mikus -X (pmikus - PANTHEON TECHNOLOGIES at Cisco) 
[mailto:pmi...@cisco.com]
Sent: Tuesday, September 25, 2018 3:32 PM
To: vpp-dev@lists.fd.io; Nicolau, Radu 
mailto:radu.nico...@intel.com>>
Cc: csit-...@lists.fd.io
Subject: CSIT IPsec AES-GCM 128 tests failing

Hello devs,

We are observing IPSec failing tests in CSIT-perf, specially and only 
combination with aes-gcm (both interface AND tunnel mode, Integ Alg AES GCM 
128).
Note: Integ Alg SHA1 96, is working.

Can you please help decrypt the error message below?

Thank you.


VAT error message (on both DUTs)
-
sw_interface_set_flags error: Unspecified Error


-Note: This error is happening when trying to get interface UP.

DUT1 config
---

sw_interface_set_flags sw_if_index 2 admin-up link-up
sw_interface_set_flags sw_if_index 1 admin-up link-up
sw_interface_dump
hw_interface_set_mtu sw_if_index 2 mtu 9200
hw_interface_set_mtu sw_if_index 1 mtu 9200
sw_interface_dump
sw_interface_add_del_address sw_if_index 2 192.168.10.1/24
sw_interface_add_del_address sw_if_index 1 172.168.1.1/24
ip_neighbor_add_del sw_if_index 2 dst 192.168.10.2 mac 68:05:ca:35:79:1c
ip_neighbor_add_del sw_if_index 1 dst 172.168.1.2 mac 68:05:ca:35:76:b1
ip_add_del_route 10.0.0.0/8 via 192.168.10.2  sw_if_index 2 resolve-attempts 10 
count 1
ipsec_tunnel_if_add_del local_spi 1 remote_spi 2 crypto_alg aes-gcm-128 
local_crypto_key 4e4d444178336b4958744a374365356235643545 remote_crypto_key 
4e4d444178336b4958744a374365356235643545  local_ip 172.168.1.1 remote_ip 
172.168.1.2
ip_add_del_route 20.0.0.0/32 via 172.168.1.2 ipsec0
exec set interface unnumbered ipsec0 use FortyGigabitEthernet88/0/0
sw_interface_set_flags ipsec0 admin-up


DUT2 config
---
sw_interface_set_flags sw_if_index 2 admin-up link-up
sw_interface_set_flags sw_if_index 1 admin-up link-up
sw_interface_dump
hw_interface_set_mtu sw_if_index 2 mtu 9200
hw_interface_set_mtu sw_if_index 1 mtu 9200
sw_interface_dump
sw_interface_add_del_address sw_if_index 2 172.168.1.2/24
sw_interface_add_del_address sw_if_index 1 192.168.20.1/24
ip_neighbor_add_del sw_if_index 1 dst 192.168.20.2 mac 68:05:ca:35:79:19
ip_neighbor_add_del sw_if_index 2 dst 172.168.1.1 mac 68:05:ca:37:25:18
ip_add_del_route 20.0.0.0/8 via 192.168.20.2  sw_if_index 1 resolve-attempts 10 
count 1
ipsec_tunnel_if_add_del local_spi 2 remote_spi 1 crypto_alg aes-gcm-128 
local_crypto_key 4e4d444178336b4958744a374365356235643545 remote_crypto_key 
4e4d444178336b4958744a374365356235643545  local_ip 172.168.1.2 remote_ip 
172.168.1.1
ip_add_del_route 10.0.0.0/32 via 172.16

[vpp-dev] CSIT IPsec AES-GCM 128 tests failing

2018-09-25 Thread Peter Mikus via Lists.Fd.Io
Hello devs,

We are observing IPSec failing tests in CSIT-perf, specially and only 
combination with aes-gcm (both interface AND tunnel mode, Integ Alg AES GCM 
128).
Note: Integ Alg SHA1 96, is working.

Can you please help decrypt the error message below?

Thank you.


VAT error message (on both DUTs)
-
sw_interface_set_flags error: Unspecified Error


-Note: This error is happening when trying to get interface UP.

DUT1 config
---

sw_interface_set_flags sw_if_index 2 admin-up link-up
sw_interface_set_flags sw_if_index 1 admin-up link-up
sw_interface_dump
hw_interface_set_mtu sw_if_index 2 mtu 9200
hw_interface_set_mtu sw_if_index 1 mtu 9200
sw_interface_dump
sw_interface_add_del_address sw_if_index 2 192.168.10.1/24
sw_interface_add_del_address sw_if_index 1 172.168.1.1/24
ip_neighbor_add_del sw_if_index 2 dst 192.168.10.2 mac 68:05:ca:35:79:1c
ip_neighbor_add_del sw_if_index 1 dst 172.168.1.2 mac 68:05:ca:35:76:b1
ip_add_del_route 10.0.0.0/8 via 192.168.10.2  sw_if_index 2 resolve-attempts 10 
count 1
ipsec_tunnel_if_add_del local_spi 1 remote_spi 2 crypto_alg aes-gcm-128 
local_crypto_key 4e4d444178336b4958744a374365356235643545 remote_crypto_key 
4e4d444178336b4958744a374365356235643545  local_ip 172.168.1.1 remote_ip 
172.168.1.2
ip_add_del_route 20.0.0.0/32 via 172.168.1.2 ipsec0
exec set interface unnumbered ipsec0 use FortyGigabitEthernet88/0/0
sw_interface_set_flags ipsec0 admin-up


DUT2 config
---
sw_interface_set_flags sw_if_index 2 admin-up link-up
sw_interface_set_flags sw_if_index 1 admin-up link-up
sw_interface_dump
hw_interface_set_mtu sw_if_index 2 mtu 9200
hw_interface_set_mtu sw_if_index 1 mtu 9200
sw_interface_dump
sw_interface_add_del_address sw_if_index 2 172.168.1.2/24
sw_interface_add_del_address sw_if_index 1 192.168.20.1/24
ip_neighbor_add_del sw_if_index 1 dst 192.168.20.2 mac 68:05:ca:35:79:19
ip_neighbor_add_del sw_if_index 2 dst 172.168.1.1 mac 68:05:ca:37:25:18
ip_add_del_route 20.0.0.0/8 via 192.168.20.2  sw_if_index 1 resolve-attempts 10 
count 1
ipsec_tunnel_if_add_del local_spi 2 remote_spi 1 crypto_alg aes-gcm-128 
local_crypto_key 4e4d444178336b4958744a374365356235643545 remote_crypto_key 
4e4d444178336b4958744a374365356235643545  local_ip 172.168.1.2 remote_ip 
172.168.1.1
ip_add_del_route 10.0.0.0/32 via 172.168.1.1 ipsec0
exec set interface unnumbered ipsec0 use FortyGigabitEthernet88/0/1
sw_interface_set_flags ipsec0 admin-up


1969/12/31 16:00:00:086 warn   dpdk   EAL init args: -c 18 -n 4 
--huge-dir /run/vpp/hugepages --file-prefi
x vpp -w :88:00.1 -w :88:00.0 -w :86:01.0 --master-lcore 19 
--socket-mem 1024,1024
1969/12/31 16:00:00:967 notice dpdk   EAL: Detected 36 lcore(s)
1969/12/31 16:00:00:967 notice dpdk   EAL: Detected 2 NUMA nodes
1969/12/31 16:00:00:967 notice dpdk   EAL: Multi-process socket 
/var/run/dpdk/vpp/mp_socket
1969/12/31 16:00:00:967 notice dpdk   EAL: No free hugepages reported 
in hugepages-1048576kB
1969/12/31 16:00:00:967 notice dpdk   EAL: Probing VFIO support...
1969/12/31 16:00:00:967 notice dpdk   EAL: VFIO support initialized
1969/12/31 16:00:00:967 notice dpdk   EAL: PCI device :86:01.0 on 
NUMA socket 1
1969/12/31 16:00:00:967 notice dpdk   EAL:   probe driver: 8086:443 qat
1969/12/31 16:00:00:967 notice dpdk   qat_comp_dev_create(): 
Compression PMD not supported on QAT dh895xcc
1969/12/31 16:00:00:967 notice dpdk   EAL: PCI device :88:00.0 on 
NUMA socket 1
1969/12/31 16:00:00:967 notice dpdk   EAL:   probe driver: 8086:1583 
net_i40e
1969/12/31 16:00:00:967 notice dpdk   EAL: PCI device :88:00.1 on 
NUMA socket 1
1969/12/31 16:00:00:967 notice dpdk   EAL:   probe driver: 8086:1583 
net_i40e
1969/12/31 16:00:00:967 notice dpdk   Invalid port_id=2

Peter Mikus
Engineer - Software
Cisco Systems Limited

-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#10643): https://lists.fd.io/g/vpp-dev/message/10643
Mute This Topic: https://lists.fd.io/mt/26218774/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-