From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id B99DA45F2A; Tue, 24 Dec 2024 08:38:36 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 144B140668; Tue, 24 Dec 2024 08:38:18 +0100 (CET) Received: from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) by mails.dpdk.org (Postfix) with ESMTP id 8EBA940658 for ; Tue, 24 Dec 2024 08:38:16 +0100 (CET) Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 4BO7AR0G002932; Mon, 23 Dec 2024 23:38:15 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com; h= cc:content-transfer-encoding:content-type:date:from:in-reply-to :message-id:mime-version:references:subject:to; s=pfpt0220; bh=3 l0UphLrP10m3ucMXf5WiyCb54M4HQfYmOczS0xo9ac=; b=gaBJ6wozg3/r95Iv8 sn/Z1f/9NIIHXOO7bdZsfGfLxgcZpwcl+aMMLFXdGLqbT9YlPVdsRjFoaXowhy9c OrSBuBR2ZPyLoRFapuFKUx45k2ckBjuyRnadLuZcX9YgtikusbWttgdGBTP60e1w uYs4mx4ZHgS6ThdqZYdCMZXG3nwHFwro81TwOGvfb2pTW1TmNcKHpkMlG+r+Jlhq g0faoSI75VxY16CJ9v1Z/1uaEUg6MdeJ/lZgCE7FdsGDsBljbeq7ozzWkrqIu7XP mGakSW7wZJKrPbnANvH8j/AU1+Q/ccYJCNDx9krl9PSj3KSrfsnt0g8gg3p6eGXY YML0w== Received: from dc5-exch05.marvell.com ([199.233.59.128]) by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 43qrb8025n-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Mon, 23 Dec 2024 23:38:15 -0800 (PST) Received: from DC5-EXCH05.marvell.com (10.69.176.209) by DC5-EXCH05.marvell.com (10.69.176.209) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1544.4; Mon, 23 Dec 2024 23:38:14 -0800 Received: from maili.marvell.com (10.69.176.80) by DC5-EXCH05.marvell.com (10.69.176.209) with Microsoft SMTP Server id 15.2.1544.4 via Frontend Transport; Mon, 23 Dec 2024 23:38:14 -0800 Received: from IN-lckQE5Rwctls.marvell.com (IN-lckQE5Rwctls.marvell.com [10.28.163.68]) by maili.marvell.com (Postfix) with ESMTP id B8C793F705D; Mon, 23 Dec 2024 23:38:11 -0800 (PST) From: Gowrishankar Muthukrishnan To: , Akhil Goyal , Maxime Coquelin , Chenbo Xia , Fan Zhang , Jay Zhou CC: , , Rajesh Mudimadugula , Gowrishankar Muthukrishnan Subject: [v1 08/16] examples/vhost_crypto: add asymmetric support Date: Tue, 24 Dec 2024 13:07:06 +0530 Message-ID: <4a1aa2e12e412f8c83f024c1b4f5efb54bb3ac90.1735025264.git.gmuthukrishn@marvell.com> X-Mailer: git-send-email 2.37.1 In-Reply-To: References: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Proofpoint-ORIG-GUID: zF7glM9hY07FaiS5sChFrP8D0sxEw2G7 X-Proofpoint-GUID: zF7glM9hY07FaiS5sChFrP8D0sxEw2G7 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.60.29 definitions=2024-09-06_09,2024-09-06_01,2024-09-02_01 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Add symmetric support. Signed-off-by: Gowrishankar Muthukrishnan --- examples/vhost_crypto/main.c | 54 ++++++++++++++++++++++++++---------- 1 file changed, 40 insertions(+), 14 deletions(-) diff --git a/examples/vhost_crypto/main.c b/examples/vhost_crypto/main.c index 558c09a60f..8bdfc40c4b 100644 --- a/examples/vhost_crypto/main.c +++ b/examples/vhost_crypto/main.c @@ -59,6 +59,7 @@ struct vhost_crypto_options { uint32_t nb_los; uint32_t zero_copy; uint32_t guest_polling; + bool asymmetric_crypto; } options; enum { @@ -70,6 +71,8 @@ enum { OPT_ZERO_COPY_NUM, #define OPT_POLLING "guest-polling" OPT_POLLING_NUM, +#define OPT_ASYM "asymmetric-crypto" + OPT_ASYM_NUM, }; #define NB_SOCKET_FIELDS (2) @@ -202,9 +205,10 @@ vhost_crypto_usage(const char *prgname) " --%s ,SOCKET-FILE-PATH\n" " --%s (lcore,cdev_id,queue_id)[,(lcore,cdev_id,queue_id)]\n" " --%s: zero copy\n" - " --%s: guest polling\n", + " --%s: guest polling\n" + " --%s: asymmetric crypto\n", prgname, OPT_SOCKET_FILE, OPT_CONFIG, - OPT_ZERO_COPY, OPT_POLLING); + OPT_ZERO_COPY, OPT_POLLING, OPT_ASYM); } static int @@ -223,6 +227,8 @@ vhost_crypto_parse_args(int argc, char **argv) NULL, OPT_ZERO_COPY_NUM}, {OPT_POLLING, no_argument, NULL, OPT_POLLING_NUM}, + {OPT_ASYM, no_argument, + NULL, OPT_ASYM_NUM}, {NULL, 0, 0, 0} }; @@ -262,6 +268,10 @@ vhost_crypto_parse_args(int argc, char **argv) options.guest_polling = 1; break; + case OPT_ASYM_NUM: + options.asymmetric_crypto = true; + break; + default: vhost_crypto_usage(prgname); return -EINVAL; @@ -362,8 +372,8 @@ destroy_device(int vid) } static const struct rte_vhost_device_ops virtio_crypto_device_ops = { - .new_device = new_device, - .destroy_device = destroy_device, + .new_connection = new_device, + .destroy_connection = destroy_device, }; static int @@ -376,6 +386,7 @@ vhost_crypto_worker(void *arg) int callfds[VIRTIO_CRYPTO_MAX_NUM_BURST_VQS]; uint32_t lcore_id = rte_lcore_id(); uint32_t burst_size = MAX_PKT_BURST; + enum rte_crypto_op_type cop_type; uint32_t i, j, k; uint32_t to_fetch, fetched; @@ -383,9 +394,13 @@ vhost_crypto_worker(void *arg) RTE_LOG(INFO, USER1, "Processing on Core %u started\n", lcore_id); + cop_type = RTE_CRYPTO_OP_TYPE_SYMMETRIC; + if (options.asymmetric_crypto) + cop_type = RTE_CRYPTO_OP_TYPE_ASYMMETRIC; + for (i = 0; i < NB_VIRTIO_QUEUES; i++) { if (rte_crypto_op_bulk_alloc(info->cop_pool, - RTE_CRYPTO_OP_TYPE_SYMMETRIC, ops[i], + cop_type, ops[i], burst_size) < burst_size) { RTE_LOG(ERR, USER1, "Failed to alloc cops\n"); ret = -1; @@ -411,12 +426,11 @@ vhost_crypto_worker(void *arg) fetched); if (unlikely(rte_crypto_op_bulk_alloc( info->cop_pool, - RTE_CRYPTO_OP_TYPE_SYMMETRIC, + cop_type, ops[j], fetched) < fetched)) { RTE_LOG(ERR, USER1, "Failed realloc\n"); return -1; } - fetched = rte_cryptodev_dequeue_burst( info->cid, info->qid, ops_deq[j], RTE_MIN(burst_size, @@ -477,6 +491,7 @@ main(int argc, char *argv[]) struct rte_cryptodev_qp_conf qp_conf; struct rte_cryptodev_config config; struct rte_cryptodev_info dev_info; + enum rte_crypto_op_type cop_type; char name[128]; uint32_t i, j, lcore; int ret; @@ -539,12 +554,21 @@ main(int argc, char *argv[]) goto error_exit; } - snprintf(name, 127, "SESS_POOL_%u", lo->lcore_id); - info->sess_pool = rte_cryptodev_sym_session_pool_create(name, - SESSION_MAP_ENTRIES, - rte_cryptodev_sym_get_private_session_size( - info->cid), 0, 0, - rte_lcore_to_socket_id(lo->lcore_id)); + if (!options.asymmetric_crypto) { + snprintf(name, 127, "SYM_SESS_POOL_%u", lo->lcore_id); + info->sess_pool = rte_cryptodev_sym_session_pool_create(name, + SESSION_MAP_ENTRIES, + rte_cryptodev_sym_get_private_session_size( + info->cid), 0, 0, + rte_lcore_to_socket_id(lo->lcore_id)); + cop_type = RTE_CRYPTO_OP_TYPE_SYMMETRIC; + } else { + snprintf(name, 127, "ASYM_SESS_POOL_%u", lo->lcore_id); + info->sess_pool = rte_cryptodev_asym_session_pool_create(name, + SESSION_MAP_ENTRIES, 0, 64, + rte_lcore_to_socket_id(lo->lcore_id)); + cop_type = RTE_CRYPTO_OP_TYPE_ASYMMETRIC; + } if (!info->sess_pool) { RTE_LOG(ERR, USER1, "Failed to create mempool"); @@ -553,7 +577,7 @@ main(int argc, char *argv[]) snprintf(name, 127, "COPPOOL_%u", lo->lcore_id); info->cop_pool = rte_crypto_op_pool_create(name, - RTE_CRYPTO_OP_TYPE_SYMMETRIC, NB_MEMPOOL_OBJS, + cop_type, NB_MEMPOOL_OBJS, NB_CACHE_OBJS, VHOST_CRYPTO_MAX_IV_LEN, rte_lcore_to_socket_id(lo->lcore_id)); @@ -567,6 +591,8 @@ main(int argc, char *argv[]) qp_conf.nb_descriptors = NB_CRYPTO_DESCRIPTORS; qp_conf.mp_session = info->sess_pool; + if (options.asymmetric_crypto) + qp_conf.mp_session = NULL; for (j = 0; j < dev_info.max_nb_queue_pairs; j++) { ret = rte_cryptodev_queue_pair_setup(info->cid, j, -- 2.25.1