From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id B8EC84564A; Thu, 18 Jul 2024 21:57:06 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 3857B40662; Thu, 18 Jul 2024 21:57:06 +0200 (CEST) Received: from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) by mails.dpdk.org (Postfix) with ESMTP id 9FAFD402DC for ; Thu, 18 Jul 2024 21:57:04 +0200 (CEST) Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.18.1.2/8.18.1.2) with ESMTP id 46IJUpAA018566; Thu, 18 Jul 2024 12:57:03 -0700 Received: from nam10-dm6-obe.outbound.protection.outlook.com (mail-dm6nam10lp2100.outbound.protection.outlook.com [104.47.58.100]) by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 40f6mb8rxg-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=NOT); Thu, 18 Jul 2024 12:57:03 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; s=arcselector10001; d=microsoft.com; cv=none; b=pisnZk4OQh2GltYlLRTxrya9Zov1imgTiw+5wzg64ZmjvT38F2ZFd+9MFYUHqLzQz65ihZsNu4hFGYGfysM98ZkfllT7yzroWQlWIO5diqTBOxDZvvfL5vlVtD1sKBdID6PPVggCz+3szh67HZtA2m4txkB9hUDjVBZiPmPhZACTQmMNeoC68wunQoWRZrHI6Vc1R9aNTDUDWGaARR1uehOjzZI7DrSUUhde39aX9MHUc7twwaolCCfXbbgdzxy8L0tDxDZLKLNeJxxuLK6WRfOrfOGIKho2XAac8ZQDbW8h2778Z5MhGN6EjGy/3/x7N5CxqYwJcQDXHGj94fkICQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector10001; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=XTkZwVHi3JQ6FG28SdHnK2M/E8eU2C52gZgyiKozgxA=; b=GspaodiiZywA0ca+YWafSIrkNZHWaL4+moNRbOKT1vMcfkvy4V8h0x1N9+dXYfcpnv8oGOp2/UHxNcaQXJNdILGSo0/cH9qab+ShwlK7sg1q9dQrvGNI9pW/fp78PDZ9pp2NDzmDOWSEloJP5RS9KGWphWkCzooPeBuKdyvkgMfD7hJuLY37v/WAbAJG81n1T1AKgJEYtjCUVg5w5hNsRhasz6/eKK2fvuIdNMPD7fWF9qbCbpEdSr12RtYq+Mm10XsFV+92q7qEeR0yXwQqt2sMuQPub7NmJwBcRvEw/c64+hKtYByGECOf9nR1fBdoUrhuohXPnY4e/Il/ZVehyw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=marvell.com; dmarc=pass action=none header.from=marvell.com; dkim=pass header.d=marvell.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com; s=selector1; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=XTkZwVHi3JQ6FG28SdHnK2M/E8eU2C52gZgyiKozgxA=; b=iHu2Evz30Il1IGMJMiyRoEfU/4YiNGF+svtJFfdrgX0Vq3CRe0mSR3Kwbg7t22CRI0CDqvBL/SBA1KvNlt+ljA4ZnktnRF6/OL3tDlT1YCvPDdXOyYiY9WpB6I4aukh2j3uWJZt+oJ6SU/rCIKwJ2hscmhFIDKK4BkbFQLSNmGc= Received: from CO6PR18MB4484.namprd18.prod.outlook.com (2603:10b6:5:359::9) by SJ0PR18MB4493.namprd18.prod.outlook.com (2603:10b6:a03:3bb::14) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7784.16; Thu, 18 Jul 2024 19:57:00 +0000 Received: from CO6PR18MB4484.namprd18.prod.outlook.com ([fe80::3c98:dd36:4897:a51d]) by CO6PR18MB4484.namprd18.prod.outlook.com ([fe80::3c98:dd36:4897:a51d%6]) with mapi id 15.20.7784.017; Thu, 18 Jul 2024 19:57:00 +0000 From: Akhil Goyal To: Suanming Mou , Brian Dooley , "john.mcnamara@intel.com" , Kai Ji , "Kusztal, ArkadiuszX" CC: "dev@dpdk.org" Subject: RE: [PATCH v2] app/test-crypto-perf: add throughput OOP decryption Thread-Topic: [PATCH v2] app/test-crypto-perf: add throughput OOP decryption Thread-Index: AQHaehBVF2qKE+gMPkSz2YxSvF/MQbHQxeOQgCze3KA= Date: Thu, 18 Jul 2024 19:57:00 +0000 Message-ID: References: <20240105100104.908543-1-suanmingm@nvidia.com> <20240319114623.1137757-1-suanmingm@nvidia.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: CO6PR18MB4484:EE_|SJ0PR18MB4493:EE_ x-ms-office365-filtering-correlation-id: 905cd9eb-1587-4c34-3cb4-08dca763c98d x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; ARA:13230040|1800799024|366016|376014|38070700018; x-microsoft-antispam-message-info: =?us-ascii?Q?ekxOBPWRBH73pNDN2buiFuFhz2lQ+wEk/f1ixYbYlMFmvQSoz2o+bR2TnYyG?= =?us-ascii?Q?K124qHrAHLCzCFZeqUejhhiig9QAx+JiJHxvLV+ZH7EsQfvauJVouBGVx3zL?= =?us-ascii?Q?SKetpPwQnJokPqON2P/4+FQAu547nw4Elx9QKaLGpk9Lh86QWueTbC8JaCKe?= =?us-ascii?Q?ANWH0pipcQ6fJkLBD0TtbfqtsIYiJoQPGA7NgD4/YYS7u8SdSVEiUpJ7HzVv?= =?us-ascii?Q?P9uUPMrJI4asfrFAcupJ7U3ZcDAUDswYeQ9CbObruc1XZimh/62/QCdApbjf?= =?us-ascii?Q?C8hHUy7Ke5w4YFss3Ta4L8AC6MmqJs3nsiF8bi2wpHCU11LwuZsv0ddC2nIA?= =?us-ascii?Q?EGT89obey/fC+1pegd7owzXuz2O9Oi2AWvl+O9W6wnve2OGNuv6mokYUFw4Z?= =?us-ascii?Q?CJqF+XdaJ/BcMCPa3gMzAlmW+nntZf6t6I1KPGr4O2xFoo3qr/NHiMnbmu3u?= =?us-ascii?Q?L/pWdD/Sw9bt2dHN5xzmgUa7s4KtJYAhj5H7KPzwALPirKPZCI34NTbbmpHi?= =?us-ascii?Q?aILiE2ci4M1p1K5g/E6pVXt2JxsT6Dbbzl3hpycyrmmPWnZdwEGWziKfvthJ?= =?us-ascii?Q?pSeYICoQxSeIp/j9f4ryMNChor+UektNKSv+GV0ZSm172fkUoTY/pSbddFpg?= =?us-ascii?Q?k9NfxX6Ff8JRUl7gvrR0XW/X34LtXDO+Ersv4nuG+FEm3bVS/d1+4hs2c4YN?= =?us-ascii?Q?iEd+2jR+6OHqm7sL0AcbzR1UwWy9Gx8VEWEmz6qJrcFOLTBrVy2qF/qPjmSN?= =?us-ascii?Q?5gN40Rq4viQsUibbAbCGyWJw3OVZVvFcAQtanAWh45c6e2NL4Cwdj/Gl5ESp?= =?us-ascii?Q?SiGyxDrpcYE+h6g1zf2JYzw31msjwErtR4z2BUc/M9SCVzzJaCUvUplZQhHX?= =?us-ascii?Q?SI7DmIC/HaZo9H1rK019rzdPdzHD272BZqSVIvnaIgvlRKP1Z03uPdKRX8ib?= =?us-ascii?Q?dlzn7gjnT59LsL+a+8uN+eYibfKdnj6H1P98PzE9U4u4n+X0KZboNqPHd+hm?= =?us-ascii?Q?iWlrF1yz+xaAYGcYSTj1gud2VnO70dPAAvAC9GcRYnCmk9n5GvQgLaG1dY/W?= =?us-ascii?Q?9bbVspgGjS/iexYTrLGn0xjU2bC6lCIrrHy6FlbuqaPDCPD4VMNzf7xzJlwP?= =?us-ascii?Q?8NyaS1Tqu/N1pHddrRKk+9pSzhe+EyCqoVJwun2HhTKecq/5rGz3+X1VdCsQ?= =?us-ascii?Q?C9pUJK5hqgPum78U4G4tDGOBq7ufYTiVgEBBNPPqLP18Ph0HUKvCo8Zjq/TC?= =?us-ascii?Q?S5766OmOGx0JuEgC7RW6RiO3LhW1obxJfdLDffnHo0U8aWcWgWaprGhR0bSC?= =?us-ascii?Q?kckFOEsB6dmd52H7/jT/x1CFc0rS2J7cYlUrY4NXp0L0i8PLoXCeSjg+8Okp?= =?us-ascii?Q?XHdsMfs=3D?= x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:CO6PR18MB4484.namprd18.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230040)(1800799024)(366016)(376014)(38070700018); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?OIGqx5heh2p7W9PFZl6y3VMC/ltDteIogptJ6w0RbXJ6SqT+Q3eRM/UcxVii?= =?us-ascii?Q?RpeJ8ASbpKtHDvHfbkXY6tQ+vtmfkGJRPizPdQMdHd5K5lMdBJyPmaK46lcJ?= =?us-ascii?Q?ztHCJ8FTWh4l2EkxDD4qo5cNjMMm5dOt5B4WQwAjHfV/WjoUfm0k94y2QjM0?= =?us-ascii?Q?5lthlLSSq1yVe4syVYlPuhtkqrrUd040SapmHQSoGUqdfatcY9aGnc7ETjlC?= =?us-ascii?Q?pCTL4AWQvs7lK9AhMaE6/dE74j2tAJnfbm4t0ss+mS9K0em9ZMJju5d0c0Mk?= =?us-ascii?Q?nJocV6CK65FruHeyEti5SX4f3hXsOiOheS/emumBR2yNgwQt3I+7hrRIC8eY?= =?us-ascii?Q?T2gJr584mjUHD8jdo8Aaf2ebdHAV25T2mLgK+WW3SrOgL8s4GIphYd6hbgBX?= =?us-ascii?Q?dy6D+0dHi+/3nUx5aGvcFvXZciGtBNWkOH4rrasEckDG0O2YNxxmzVgp2iBl?= =?us-ascii?Q?MBLtunR5I4D+8cIvZAttUj8JCPCG0nqFCE9/CLAwtmSwp6rhV8c8uLKN3s0v?= =?us-ascii?Q?ONSmbVHlWWzJOHn1T5RpQYfvbO9JMRo0szR70Vxtkq4Vi/HxrgDh4HaQdhHw?= =?us-ascii?Q?7CtXhQyUd8gHXGJQgbndp29u6ChnFnYzSFyMDowyxJ/yXuh9+pUw73IUTfC/?= =?us-ascii?Q?00cwkz6hD/dtC6SnMencNkK0ulbw14m6OC/kODV5QJ11PJS+otFsyYWYu5Cw?= =?us-ascii?Q?OuACS95Sy2J0hJO/BefmCbcLt5hcTSenQRgfM/YcdpU2Nv+iC7GAE1D5Gtdj?= =?us-ascii?Q?EJ6bZGNKJdeXeFU5i1SgfxYhSm99B5PnMZsPlVPgdRrjG8GCvZYgbkiOpAxy?= =?us-ascii?Q?DKejWrhc2oanvlY6qICpmW80vMjL1ZWaWjV31DkcrbsKTDLwpC6dTi9MZQu5?= =?us-ascii?Q?ESji1serGFqYEUv8YbRHAqP8EiZdnHNKmuwsMjkgGT3L6UjJxyf713qPsirZ?= =?us-ascii?Q?/kRzHO2b+iNIJcJtuHvXGmCoDwd78a6RWuI91iJTh2Li3pLAhk/REMFH27pU?= =?us-ascii?Q?gyBij9MmVxe+FgwiqCGcrVPSH3gXyrcpFexlUZqyzLw+INKEydQI6e72xxZg?= =?us-ascii?Q?1ojdJkwGHa/X8ob78EnCZ5MWqCuDX7u5wJ9yIA95DLrbCji2t5TVQYaCY3Yt?= =?us-ascii?Q?GlHnuADAtCb3JVmiatkMz9+qdxkGdSKxtFhDu4Id5D3Nu+5B2+7LZR7TFum9?= =?us-ascii?Q?zhT6DFRil0/gh1okwZP78fYIijBgxkzwh0YhuwHZUTbxyI0AuddezP5RRgcX?= =?us-ascii?Q?a8MPnA7n8ArgfgazL8se1MldErY9IRjg5YyMXaiPamQQV7Ql08Ngs0ztHBh+?= =?us-ascii?Q?2yOQQwM/03rR+CEl35465HpwDT/hIu6MSbmFWm2/K9IMSq5DCKUbebTVFaJk?= =?us-ascii?Q?YsDgqmv9kifigXoxaOR0sKSY292eQlRjxyZ9wCdX7hyvxO0X7nky8pBmWMir?= =?us-ascii?Q?ytEeXFtapGFrBUKTywq9jD9NEeVZSHlnowkA0iHbdtsKGfn3gldWNAhr5dTa?= =?us-ascii?Q?ZslDEai2/QYMLTLxvXALd8ZFMJ0LjJF070Vyo/EERWiXKx/1KT8MAMdiFfBc?= =?us-ascii?Q?c+d8rNarycHWhPYykmA=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-OriginatorOrg: marvell.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: CO6PR18MB4484.namprd18.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 905cd9eb-1587-4c34-3cb4-08dca763c98d X-MS-Exchange-CrossTenant-originalarrivaltime: 18 Jul 2024 19:57:00.4544 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 70e1fb47-1155-421d-87fc-2e58f638b6e0 X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: ucIK80FGK8QG5znMG8HBVaYfgP4bRgeYmBKPtMOTKRgylFpe+zFdu+wolr0SOiVeAHkIK3O8fUo1NEW+gUXpYA== X-MS-Exchange-Transport-CrossTenantHeadersStamped: SJ0PR18MB4493 X-Proofpoint-GUID: SmulAyxgXsdORw0MTHY03bpZjVzMdppl X-Proofpoint-ORIG-GUID: SmulAyxgXsdORw0MTHY03bpZjVzMdppl X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.293,Aquarius:18.0.1039,Hydra:6.0.680,FMLib:17.12.28.16 definitions=2024-07-18_13,2024-07-18_01,2024-05-17_01 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org > Hi Brian, >=20 > Since Ciara is no longer available and you are the new maintainer, can yo= u > investigate this patch? > There were some concerns which Ciara highlighted. Can you check? >=20 Any update on this patch? > > > Subject: [PATCH v2] app/test-crypto-perf: add throughput OOP decrypti= on > > > > > > During throughput running, re-filling the test data will impact the p= erformance > > > test result. So for now, to run decrypt throughput testing is not sup= ported > since > > > the test data is not filled. > > > > > > But if user requires OOP(out-of-place) mode, the test data from sourc= e mbuf > > will > > > never be modified, and if the test data can be prepared out of the ru= nning > loop, > > > the decryption test should be fine. > > > > > > This commit adds the support of out-of-place decryption testing for > throughput. > > > > > > [1]: > > > https://urldefense.proofpoint.com/v2/url?u=3Dhttp- > > 3A__mails.dpdk.org_archives_dev_2023- > > > 2DJuly_273328.html&d=3DDwIFAg&c=3DnKjWec2b6R0mOyPaz7xtfQ&r=3DDnL7Si2wl_P > > RwpZ9TWey3eu68gBzn7DkPwuqhd6WNyo&m=3DeTj0O7iYH- > > xiTQ6dNUZpsOXPqnyC1O_- > > _IKt0j_yQ_N__vy0wIBLb_QyMQtodUrr&s=3DeDz_NLjqkUH2cYMilKEtdWImOPj5f- > > CVKV5UW8P9frk&e=3D > > > > > > Signed-off-by: Suanming Mou > > > --- > > > app/test-crypto-perf/cperf_ops.c | 5 ++- > > > app/test-crypto-perf/cperf_options_parsing.c | 8 +++++ app/test-cr= ypto- > > > perf/cperf_test_throughput.c | 34 +++++++++++++++++--- > > > 3 files changed, 41 insertions(+), 6 deletions(-) > > > > > > diff --git a/app/test-crypto-perf/cperf_ops.c b/app/test-crypto- > > perf/cperf_ops.c > > > index d3fd115bc0..714616c697 100644 > > > --- a/app/test-crypto-perf/cperf_ops.c > > > +++ b/app/test-crypto-perf/cperf_ops.c > > > @@ -644,7 +644,10 @@ cperf_set_ops_aead(struct rte_crypto_op **ops, > > > } > > > > > > if ((options->test =3D=3D CPERF_TEST_TYPE_VERIFY) || > > > - (options->test =3D=3D CPERF_TEST_TYPE_LATENCY)) { > > > + (options->test =3D=3D CPERF_TEST_TYPE_LATENCY) || > > > + (options->test =3D=3D CPERF_TEST_TYPE_THROUGHPUT && > > > + (options->aead_op =3D=3D RTE_CRYPTO_AEAD_OP_DECRYPT || > > > + options->cipher_op =3D=3D RTE_CRYPTO_CIPHER_OP_DECRYPT))) { > > > for (i =3D 0; i < nb_ops; i++) { > > > uint8_t *iv_ptr =3D rte_crypto_op_ctod_offset(ops[i], > > > uint8_t *, iv_offset); > > > diff --git a/app/test-crypto-perf/cperf_options_parsing.c b/app/test-= crypto- > > > perf/cperf_options_parsing.c > > > index 8c20974273..90526e676f 100644 > > > --- a/app/test-crypto-perf/cperf_options_parsing.c > > > +++ b/app/test-crypto-perf/cperf_options_parsing.c > > > @@ -1341,6 +1341,14 @@ cperf_options_check(struct cperf_options > > > *options) > > > } > > > } > > > > > > + if (options->test =3D=3D CPERF_TEST_TYPE_THROUGHPUT && > > > + (options->aead_op =3D=3D RTE_CRYPTO_AEAD_OP_DECRYPT || > > > + options->auth_op =3D=3D RTE_CRYPTO_AUTH_OP_VERIFY) && > > > + !options->out_of_place) { > > > + RTE_LOG(ERR, USER1, "Only out-of-place is allowed in > > > throughput decryption.\n"); > > > + return -EINVAL; > > > + } > > > > Not totally following some of this, why do we only want to add this for= OOP > > mode? > > > > For example an inplace command I can use before this patch but not afte= r: > > ./build/app/dpdk-test-crypto-perf -l 2,3 -- --ptest throughput --optype= aead -- > > aead-algo aes-gcm --aead-op decrypt --devtype crypto_qat --aead-key-sz = 16 > > > > I get an error; > > USER1: Only out-of-place is allowed in throughput decryption. > > USER1: Checking one or more user options failed > > > > Do we want to always force the user to use OOP + test vector file for t= hese > > throughput decryption tests? > > Or should we just add a warning that the throughput may not be reflecti= ng the > > "success" verify path in PMD if using inplace and the dummy data. > > > > I am not sure. > > If we do want to add the limitation on the throughput tests, these chan= ges I > think > > are ok for that. > > > > Thanks, > > Ciara > > > > > + > > > if (options->op_type =3D=3D CPERF_CIPHER_ONLY || > > > options->op_type =3D=3D CPERF_CIPHER_THEN_AUTH || > > > options->op_type =3D=3D CPERF_AUTH_THEN_CIPHER) { diff > > > --git a/app/test-crypto-perf/cperf_test_throughput.c b/app/test-crypt= o- > > > perf/cperf_test_throughput.c > > > index e3d266d7a4..b347baa913 100644 > > > --- a/app/test-crypto-perf/cperf_test_throughput.c > > > +++ b/app/test-crypto-perf/cperf_test_throughput.c > > > @@ -99,6 +99,26 @@ cperf_throughput_test_constructor(struct > rte_mempool > > > *sess_mp, > > > return NULL; > > > } > > > > > > +static void > > > +cperf_verify_init_ops(struct rte_mempool *mp __rte_unused, > > > + void *opaque_arg, > > > + void *obj, > > > + __rte_unused unsigned int i) > > > +{ > > > + uint16_t iv_offset =3D sizeof(struct rte_crypto_op) + > > > + sizeof(struct rte_crypto_sym_op); > > > + uint32_t imix_idx =3D 0; > > > + struct cperf_throughput_ctx *ctx =3D opaque_arg; > > > + struct rte_crypto_op *op =3D obj; > > > + > > > + (ctx->populate_ops)(&op, ctx->src_buf_offset, > > > + ctx->dst_buf_offset, > > > + 1, ctx->sess, ctx->options, > > > + ctx->test_vector, iv_offset, &imix_idx, NULL); > > > + > > > + cperf_mbuf_set(op->sym->m_src, ctx->options, ctx->test_vector); } > > > + > > > int > > > cperf_throughput_test_runner(void *test_ctx) { @@ -144,6 +164,9 @@ > > > cperf_throughput_test_runner(void *test_ctx) > > > uint16_t iv_offset =3D sizeof(struct rte_crypto_op) + > > > sizeof(struct rte_crypto_sym_op); > > > > > > + if (ctx->options->out_of_place) > > > + rte_mempool_obj_iter(ctx->pool, cperf_verify_init_ops, (void > > > *)ctx); > > > + > > > while (test_burst_size <=3D ctx->options->max_burst_size) { > > > uint64_t ops_enqd =3D 0, ops_enqd_total =3D 0, ops_enqd_failed =3D > > > 0; > > > uint64_t ops_deqd =3D 0, ops_deqd_total =3D 0, ops_deqd_failed =3D > > > 0; @@ -176,11 +199,12 @@ cperf_throughput_test_runner(void *test_ctx) > > > } > > > > > > /* Setup crypto op, attach mbuf etc */ > > > - (ctx->populate_ops)(ops, ctx->src_buf_offset, > > > - ctx->dst_buf_offset, > > > - ops_needed, ctx->sess, > > > - ctx->options, ctx->test_vector, > > > - iv_offset, &imix_idx, &tsc_start); > > > + if (!ctx->options->out_of_place) > > > + (ctx->populate_ops)(ops, ctx->src_buf_offset, > > > + ctx->dst_buf_offset, > > > + ops_needed, ctx->sess, > > > + ctx->options, ctx->test_vector, > > > + iv_offset, &imix_idx, > > > &tsc_start); > > > > > > /** > > > * When ops_needed is smaller than ops_enqd, the > > > -- > > > 2.34.1