[dts] [PATCH]test_plans: remove --tx-offload from commandline

Peng Yuan yuan.peng at intel.com
Mon Dec 9 04:10:54 CET 2019


remove --tx-offloads from testpmd commandline in macsec_test_plan.rst

Signed-off-by: Peng Yuan <yuan.peng at intel.com>

diff --git a/test_plans/macsec_for_ixgbe_test_plan.rst b/test_plans/macsec_for_ixgbe_test_plan.rst
index 79b7d57..997f921 100644
--- a/test_plans/macsec_for_ixgbe_test_plan.rst
+++ b/test_plans/macsec_for_ixgbe_test_plan.rst
@@ -151,7 +151,7 @@ Test Case 1: MACsec packets send and receive
   1. Start the testpmd of tx port::
 
       ./testpmd -c 0xf0 --socket-mem 1024,0 --file-prefix=tx -w 0000:07:00.0 \
-      -- -i --port-topology=chained --tx-offloads=0x00002000
+      -- -i --port-topology=chained
 
   2. Set MACsec offload on::
 
@@ -352,10 +352,7 @@ Test Case 5: normal packet send and MACsec receive
 Test Case 6: MACsec send and receive with wrong parameters
 ==========================================================
 
-1. Don't add "--tx-offloads=0x00002000" in the tx_port command line.
-   The MACsec offload can't work. The tx packets are normal packets.
-
-2. Set different pn on rx and tx port, then start the data transfer.
+1. Set different pn on rx and tx port, then start the data transfer.
 
   1. Set the parameters as test case 1, start and stop the data transfer.
      Check the result, rx port can receive and decrypt the packets normally.
@@ -368,7 +365,7 @@ Test Case 6: MACsec send and receive with wrong parameters
 
       out_pkts_encrypted = in_pkts_late + in_pkts_ok
 
-3. Set different keys on rx and tx port, then start the data transfer::
+2. Set different keys on rx and tx port, then start the data transfer::
 
       the RX-packets=0,
       in_octets_decrypted == out_octets_encrypted,
@@ -376,20 +373,23 @@ Test Case 6: MACsec send and receive with wrong parameters
       in_pkts_ok=0,
       rx_good_packets=0
 
-4. Set different pi on rx and tx port, then start the data transfer::
+3. Set different pi on rx and tx port, then start the data transfer::
 
       in_octets_decrypted == out_octets_encrypted,
       in_pkts_ok = 0,
       in_pkts_nosci == out_pkts_encrypted
 
-5. Set different an on rx and tx port, then start the data transfer::
+   note: pi only support changed on rx side, if change pi on tx side,
+         it will be omitted.
+
+4. Set different an on rx and tx port, then start the data transfer::
 
       rx_good_packets=0,
       in_octets_decrypted == out_octets_encrypted,
       in_pkts_notusingsa == out_pkts_encrypted,
       in_pkts_ok=0,
 
-6. Set different index on rx and tx port, then start the data transfer::
+5. Set different index on rx and tx port, then start the data transfer::
 
       in_octets_decrypted == out_octets_encrypted,
       in_pkts_ok == out_pkts_encrypted
@@ -404,7 +404,7 @@ Test Case 7: performance test of MACsec offload packets
    MACsec offload on, set fwd mac::
 
       ./testpmd -c 0xf --socket-mem 1024,0 -- -i \
-      --port-topology=chained --tx-offloads=0x00002000
+      --port-topology=chained
       testpmd> set macsec offload 0 on encrypt on replay-protect on
       testpmd> set fwd mac
       testpmd> start
@@ -423,7 +423,7 @@ Test Case 7: performance test of MACsec offload packets
    Start two testpmd::
 
       ./testpmd -c 0xf --socket-mem 1024,0 --file-prefix=rx -w 0000:07:00.1 \
-      -- -i --port-topology=chained --tx-offloads=0x00002000
+      -- -i --port-topology=chained
 
       testpmd> set macsec offload 0 on encrypt on replay-protect on
       testpmd> set macsec sc rx 0 00:00:00:00:00:01 0
@@ -433,7 +433,7 @@ Test Case 7: performance test of MACsec offload packets
       testpmd> set fwd rxonly
 
       ./testpmd -c 0xf0 --socket-mem 1024,0 --file-prefix=tx -b 0000:07:00.1 \
-      -- -i --port-topology=chained --tx-offloads=0x00002000
+      -- -i --port-topology=chained
 
       testpmd> set macsec offload 1 on encrypt on replay-protect on
       testpmd> set macsec sc rx 1 00:00:00:00:00:02 0
-- 
2.17.1



More information about the dts mailing list