From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 34ED2A00C5; Wed, 16 Feb 2022 05:47:21 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id F09AC410F7; Wed, 16 Feb 2022 05:47:20 +0100 (CET) Received: from mga06.intel.com (mga06.intel.com [134.134.136.31]) by mails.dpdk.org (Postfix) with ESMTP id 91F4F4013F for ; Wed, 16 Feb 2022 05:47:18 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=intel.com; i=@intel.com; q=dns/txt; s=Intel; t=1644986838; x=1676522838; h=from:to:subject:date:message-id:references:in-reply-to: content-transfer-encoding:mime-version; bh=wQYbAL/3DsFML5kA40Qba30b2lYHsZDN7TdBYRqTLvc=; b=nrZSzgZyE+/ew9/aEx17dh0/n94S+GF+P3Tjhm0x+Li+GGSkMRMGfdss 7YbFowbM1hMXXPQd/jdJu1JSjVdXTHq4aNcghKnfKDLRT84Q/i9vfOJ6m rtPxtY/iPfBsU7lxV33dzXdEiYpLN5pPuhkN6fimllnL+KzeQUxxTMyHb F6uAlOvtoGjf+gMC1r5aef4QgeIXb/Qe1JE/zuXWDykoKeXSlGxkKEyeD 8l/PZM5foA85eAEdZ+b3xoB/nQdrIp9h6rxd50ouMOm6vLAQAg42rocNj 3AZHoPGgWgypSDZATRHKKfe+XsFZApvZJylYrujt4UI1dKj6BWVCOV8ES A==; X-IronPort-AV: E=McAfee;i="6200,9189,10259"; a="311263695" X-IronPort-AV: E=Sophos;i="5.88,371,1635231600"; d="scan'208";a="311263695" Received: from orsmga002.jf.intel.com ([10.7.209.21]) by orsmga104.jf.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Feb 2022 20:47:04 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.88,371,1635231600"; d="scan'208";a="502848414" Received: from orsmsx603.amr.corp.intel.com ([10.22.229.16]) by orsmga002.jf.intel.com with ESMTP; 15 Feb 2022 20:47:04 -0800 Received: from orsmsx609.amr.corp.intel.com (10.22.229.22) by ORSMSX603.amr.corp.intel.com (10.22.229.16) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20; Tue, 15 Feb 2022 20:47:04 -0800 Received: from ORSEDG601.ED.cps.intel.com (10.7.248.6) by orsmsx609.amr.corp.intel.com (10.22.229.22) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2308.20 via Frontend Transport; Tue, 15 Feb 2022 20:47:04 -0800 Received: from NAM12-MW2-obe.outbound.protection.outlook.com (104.47.66.46) by edgegateway.intel.com (134.134.137.102) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2308.20; Tue, 15 Feb 2022 20:47:04 -0800 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=hLSY8swGHANHH21JHeXTXfSag8jGLuBueXteyqvOMWXmKmsz8TsFUFbEuKE63zaoP4/z5Nse/pf2aVuF5hSIf+EC7wFftHYaWNcR/CTu3PZGz9JL+GEukXUIYpRMAbW2kSx0kICqcyM5f9F8g2RqM3op6yrcXV5A2ZW52s6bT+X3K4kWhyyjFW7cMak++pzF02HiFnZUksdv2n7cPv8nWjX+lyMIZ2Rv7tFGwKlYqikOl61ZtPsAW5KJ7gxYPZ5JPr6fVZFYmx7gPSroNUKrSAoYw4kBsYc+dDT0CimuUrAp6vsBFfJgwFl5VotM/DQLOcaFUSgkJRUkh/dmcP039Q== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=3P4xwoHC0sKfm0TKTmLu3NEvJC6PBck4J+BXvqpA8eU=; b=n/dEDv7d0iNChTNwrCC6xGFTwGJi6SamuJY518Ex4L+sUHQIbO4R7CqMCywno7upc86RpPL6A94CVjspNGADd+GS9u0CLhq12mXHs9x2m+5euhU6N4glGaMcgOBQH5YsaLHxj95uvnORud+g5ZhrarWxeUMrt4Vxt3utZdLEkS0tR6jni3qP/VAzYNYitGFzuphRnapsG96dmQtnvDEC14igJ1Wxjxqd/soSju0OvZaDlgXupAHe/su4A+cfTHBzvgZ7Uc4j7NINxD2oN98IgbFGZ/fsm6rAYkOSfSow/7bglZPMQzyJ5C4Gz25qf5sWCtd19zJxrfy6vxWPanFnag== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=none; dmarc=none; dkim=none; arc=none Received: from PH0PR11MB4824.namprd11.prod.outlook.com (2603:10b6:510:38::13) by BYAPR11MB2726.namprd11.prod.outlook.com (2603:10b6:a02:be::19) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4975.18; Wed, 16 Feb 2022 04:47:02 +0000 Received: from PH0PR11MB4824.namprd11.prod.outlook.com ([fe80::2520:b8df:8b59:bf84]) by PH0PR11MB4824.namprd11.prod.outlook.com ([fe80::2520:b8df:8b59:bf84%6]) with mapi id 15.20.4975.019; Wed, 16 Feb 2022 04:47:01 +0000 From: "Gujjar, Abhinandan S" To: Shijith Thotton , "dev@dpdk.org" , "jerinj@marvell.com" Subject: RE: [PATCH v5] app/eventdev: add crypto producer mode Thread-Topic: [PATCH v5] app/eventdev: add crypto producer mode Thread-Index: AQHYIo0i5zxN6QGTtEK63AeDF/W9BayVmj/w Date: Wed, 16 Feb 2022 04:47:01 +0000 Message-ID: References: <74c3a3fcfb79b7f64588c62ca7c92502739365d0.1644337305.git.sthotton@marvell.com> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-reaction: no-action dlp-version: 11.6.200.16 authentication-results: dkim=none (message not signed) header.d=none;dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 775d8688-ac41-41f6-1fce-08d9f1075f8e x-ms-traffictypediagnostic: BYAPR11MB2726:EE_ x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:288; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:PH0PR11MB4824.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230001)(366004)(30864003)(186003)(6506007)(64756008)(55016003)(5660300002)(38070700005)(66946007)(76116006)(2906002)(86362001)(66476007)(66446008)(66556008)(8936002)(52536014)(8676002)(38100700002)(122000001)(82960400001)(33656002)(7696005)(9686003)(26005)(71200400001)(508600001)(110136005)(316002)(53546011)(83380400001)(559001)(579004); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?vyjVp5GAc6KRBlt3i7gCFZDmfFbseHfpKoIGuovovKvQhP94Eb+tFUiVqKVm?= =?us-ascii?Q?nP0RLuGtCnvgHyjeHFa6/u/beeRX1fBhjj1tLQAyvsHMU4ES0UfwfTmvPDXg?= =?us-ascii?Q?ktMgAza/n3gtVWEtpt0KHsjTOV0mM/KZu7ziPYgYhUGT1VyhZNnBWei/EFjO?= =?us-ascii?Q?Bh05h0ac3wd6ru80UxDqr/vCVl1WyKuiUD3P1wdnTkjZH3Py9nxERMDeIq6s?= =?us-ascii?Q?CWHj7GC/LiXafUu2kX5d4v0CR/ahiBYxnYUnx32h1F4Raab+bOjhVumYoGA5?= =?us-ascii?Q?ESdV57KP9j/LMbcFMpQFrriiLUvbyarNfWrzQ08WbkhvytDS4LY9pDI+dTw5?= =?us-ascii?Q?OMNVRCq+FLoknOjU3DWd9BVxP0os88sTGTWOgb+WoBA0+2voT8BjlyrgC+ks?= =?us-ascii?Q?y6v8pydV2Fdx6uzhnHby8/aDrcDmnDBju8mumeiep47a8HA5qrM7ZM8LPU/U?= =?us-ascii?Q?xsl8fmy8eK2iu3qFyKA15mj5PBOOvsFGM5j2h4qhwTHmnsaQQfV7d1ZxRQQg?= =?us-ascii?Q?+BCBkR/QGpGDo+FeocrmJLG5Ch4T7AKcURrKjTVDjWvUMyIe8DrDuKJgd3VL?= =?us-ascii?Q?PcR35uMS4Kh7KopiDV2FBv84uQoZHAuFGk6scCq+Io00exz6NAh0SjlgPiTM?= =?us-ascii?Q?dpeVXyp/ngSFg6EY9K3xFkDIvrLfVyhoK0ebQp7rBasllHZm0+aY/m93sPrr?= =?us-ascii?Q?uFEeAJxZxJAnoXsfmhkNJYf2pmfv8daVcjOQQwrxS5Yh09AG3ZFbvTtzZ7Id?= =?us-ascii?Q?c0kSE+SMHONGlryFwRYsHmSAMthAFHidhooxoDxolbe5cosV0rDRMuqSFYbF?= =?us-ascii?Q?Hhysx3jafcuk1d7uV3z72DXKcOH7Y6eRyR4AjnT+DoDH1mAXzfwGi5CFMiks?= =?us-ascii?Q?WHF58m1LRvFrxDjDA6A0QTaXXlKJJmuMM2lUaQek5mPOp24HnDmOfMV5YQII?= =?us-ascii?Q?H5OHEaq07jnDy6FOKzggq6Zrb3lfwS/ZllXsoK1+lgYkYbig/dDJ6701tmDE?= =?us-ascii?Q?0wUZdqpieBFG6I8GyNBn6qBV5/ntBQFyH3MveJGES7lWxTF0pE3jhYbrycm2?= =?us-ascii?Q?vO+lDvsOYntBZy0wsCKt1CFCA4hPjT2bWHvYsQLfBKuaH8xtjGKsVw73NzWA?= =?us-ascii?Q?JCfMFiS9RU+vzj7nLUBBfze4BIcpSmQIBVwikIBwUBu13NcMDRlQA+C6R5GY?= =?us-ascii?Q?4/XW290P6hzWNQA5cMh0ml6qC74LAj5v8ZCkStBurXFZhgG46ZN12G2WMO1i?= =?us-ascii?Q?KaHTU9bHyfJIxj7OagbiRzwmHB/YyL160ZaKqj0SA9z0nvOSuiZi9P/qlVF0?= =?us-ascii?Q?ysd3uIECZp814SjEKWiqM2UP1HDGQhYm7DmyNf1EOEu5gMXEy9sv5qybfalI?= =?us-ascii?Q?J3VWSrvr6k/+KjiI+HkZdDxIXBssE9U1k4JdnsTQVnXUxir/po6PPbTirS5+?= =?us-ascii?Q?IGBOVeS7ys3ahljydMHkj/V3eI+LCoy6R5S31y9nx+jPMXL05KE2TW6UUILH?= =?us-ascii?Q?toIC9nbt1E2B/WmScqCz+OVgflS7VOVHZYQGv5uCYTL+tPqu3zj/yy2gfqUs?= =?us-ascii?Q?3P0eo8lqmtwHDO9emIyE5kRrxKNgaLVHhcj73UZpDOPBVn3g+3yedUtVc8Ha?= =?us-ascii?Q?qFVm9MpS+iS0zUfaSnc7Y3eYPciDGfyuNwsOD8mqC3UZ8lqNdYt9HG36gR+o?= =?us-ascii?Q?ZPNP7A=3D=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: PH0PR11MB4824.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 775d8688-ac41-41f6-1fce-08d9f1075f8e X-MS-Exchange-CrossTenant-originalarrivaltime: 16 Feb 2022 04:47:01.8601 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: 6lOjKXx/hB1KIm12TzsNva5zb7DM4/Di9BLuaC5+FoTO1arA+/ysUvkPZGfGXwL6ytESd/+PwSrQy1H+zL/YEQRIslu3Q5ajA15NPYqX7bU= X-MS-Exchange-Transport-CrossTenantHeadersStamped: BYAPR11MB2726 X-OriginatorOrg: intel.com X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Hi Shijith, > -----Original Message----- > From: Shijith Thotton > Sent: Tuesday, February 15, 2022 10:27 PM > To: dev@dpdk.org; jerinj@marvell.com > Cc: Shijith Thotton ; Gujjar, Abhinandan S > > Subject: [PATCH v5] app/eventdev: add crypto producer mode >=20 > In crypto producer mode, producer core enqueues cryptodev with software > generated crypto ops and worker core dequeues crypto completion events > from the eventdev. Event crypto metadata used for above processing is pre= - > populated in each crypto session. >=20 > Parameter --prod_type_cryptodev can be used to enable crypto producer > mode. Parameter --crypto_adptr_mode can be set to select the crypto > adapter mode, 0 for OP_NEW and 1 for OP_FORWARD. >=20 > This mode can be used to measure the performance of crypto adapter. >=20 > Example: > ./dpdk-test-eventdev -l 0-2 -w -w -- \ > --prod_type_cryptodev --crypto_adptr_mode 1 --test=3Dperf_atq \ > --stlist=3Da --wlcores 1 --plcores 2 >=20 I still see error with both OP_NEW and OP_FORWARD mode. Can't run the test. root@xdp-dev:/home/intel/abhi/dpdk-next-eventdev/abhi# ./app/dpdk-test-even= tdev -l 0-8 -s 0xf0 --vdev=3Devent_sw0 --vdev=3D"crypto_null" -- --prod_ty= pe_cryptodev --crypto_adptr_mode 1 --test=3Dperf_queue --stlist=3Da --wlcor= es 1 --plcores 2 EAL: Detected CPU lcores: 96 EAL: Detected NUMA nodes: 2 EAL: Detected static linkage of DPDK EAL: Multi-process socket /var/run/dpdk/rte/mp_socket EAL: Selected IOVA mode 'PA' EAL: VFIO support initialized CRYPTODEV: Creating cryptodev crypto_null CRYPTODEV: Initialisation parameters - name: crypto_null,socket id: 0, max = queue pairs: 8 TELEMETRY: No legacy callbacks, legacy socket not created driver : event_sw test : perf_queue dev : 0 verbose_level : 1 socket_id : -1 pool_sz : 16384 main lcore : 0 nb_pkts : 67108864 nb_timers : 100000000 available lcores : {0 1 2 3 8} nb_flows : 1024 worker deq depth : 16 fwd_latency : false nb_prod_lcores : 1 producer lcores : {2} nb_worker_lcores : 1 worker lcores : {1} nb_stages : 1 nb_evdev_ports : 2 nb_evdev_queues : 1 queue_priority : false sched_type_list : {A} crypto adapter mode : OP_FORWARD nb_cryptodev : 1 prod_type : Event crypto adapter producers prod_enq_burst_sz : 1 CRYPTODEV: elt_size 0 is expanded to 208 error: perf_event_crypto_adapter_setup() crypto adapter OP_FORWARD mode uns= upported error: main() perf_queue: eventdev setup failed > Signed-off-by: Shijith Thotton > --- > v5: > * Rebased. >=20 > v4: > * Addressed comments on v3 and rebased. > * Added cryptodev cleanup in signal handler. >=20 > v3: > * Reduce dereference inside loop. >=20 > v2: > * Fix RHEL compilation warning. >=20 > app/test-eventdev/evt_common.h | 3 + > app/test-eventdev/evt_main.c | 17 +- > app/test-eventdev/evt_options.c | 27 ++ > app/test-eventdev/evt_options.h | 12 + > app/test-eventdev/evt_test.h | 6 + > app/test-eventdev/test_perf_atq.c | 49 +++ > app/test-eventdev/test_perf_common.c | 425 > ++++++++++++++++++++++++++- app/test-eventdev/test_perf_common.h | > 18 +- app/test-eventdev/test_perf_queue.c | 50 ++++ > doc/guides/tools/testeventdev.rst | 13 + > 10 files changed, 612 insertions(+), 8 deletions(-) >=20 > diff --git a/app/test-eventdev/evt_common.h b/app/test- > eventdev/evt_common.h index f466434459..2f301a7e79 100644 > --- a/app/test-eventdev/evt_common.h > +++ b/app/test-eventdev/evt_common.h > @@ -7,6 +7,7 @@ >=20 > #include > #include > +#include > #include > #include >=20 > @@ -39,6 +40,7 @@ enum evt_prod_type { > EVT_PROD_TYPE_SYNT, /* Producer type Synthetic i.e. CPU. */ > EVT_PROD_TYPE_ETH_RX_ADPTR, /* Producer type Eth Rx Adapter. > */ > EVT_PROD_TYPE_EVENT_TIMER_ADPTR, /* Producer type Timer > Adapter. */ > + EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR, /* Producer type Crypto > Adapter. */ > EVT_PROD_TYPE_MAX, > }; >=20 > @@ -77,6 +79,7 @@ struct evt_options { > uint64_t timer_tick_nsec; > uint64_t optm_timer_tick_nsec; > enum evt_prod_type prod_type; > + enum rte_event_crypto_adapter_mode crypto_adptr_mode; > }; >=20 > static inline bool > diff --git a/app/test-eventdev/evt_main.c b/app/test-eventdev/evt_main.c > index 194c980c7a..a7d6b0c1cf 100644 > --- a/app/test-eventdev/evt_main.c > +++ b/app/test-eventdev/evt_main.c > @@ -35,6 +35,9 @@ signal_handler(int signum) > if (test->ops.ethdev_destroy) > test->ops.ethdev_destroy(test, &opt); >=20 > + if (test->ops.cryptodev_destroy) > + test->ops.cryptodev_destroy(test, &opt); > + > rte_eal_mp_wait_lcore(); >=20 > if (test->ops.test_result) > @@ -162,11 +165,19 @@ main(int argc, char **argv) > } > } >=20 > + /* Test specific cryptodev setup */ > + if (test->ops.cryptodev_setup) { > + if (test->ops.cryptodev_setup(test, &opt)) { > + evt_err("%s: cryptodev setup failed", > opt.test_name); > + goto ethdev_destroy; > + } > + } > + > /* Test specific eventdev setup */ > if (test->ops.eventdev_setup) { > if (test->ops.eventdev_setup(test, &opt)) { > evt_err("%s: eventdev setup failed", opt.test_name); > - goto ethdev_destroy; > + goto cryptodev_destroy; > } > } >=20 > @@ -197,6 +208,10 @@ main(int argc, char **argv) > if (test->ops.eventdev_destroy) > test->ops.eventdev_destroy(test, &opt); >=20 > +cryptodev_destroy: > + if (test->ops.cryptodev_destroy) > + test->ops.cryptodev_destroy(test, &opt); > + > ethdev_destroy: > if (test->ops.ethdev_destroy) > test->ops.ethdev_destroy(test, &opt); diff --git a/app/test- > eventdev/evt_options.c b/app/test-eventdev/evt_options.c index > 4ae44801da..d3c704d2b3 100644 > --- a/app/test-eventdev/evt_options.c > +++ b/app/test-eventdev/evt_options.c > @@ -122,6 +122,26 @@ evt_parse_timer_prod_type_burst(struct > evt_options *opt, > return 0; > } >=20 > +static int > +evt_parse_crypto_prod_type(struct evt_options *opt, > + const char *arg __rte_unused) > +{ > + opt->prod_type =3D EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR; > + return 0; > +} > + > +static int > +evt_parse_crypto_adptr_mode(struct evt_options *opt, const char *arg) { > + uint8_t mode; > + int ret; > + > + ret =3D parser_read_uint8(&mode, arg); > + opt->crypto_adptr_mode =3D mode ? > RTE_EVENT_CRYPTO_ADAPTER_OP_FORWARD : > + > RTE_EVENT_CRYPTO_ADAPTER_OP_NEW; > + return ret; > +} > + > static int > evt_parse_test_name(struct evt_options *opt, const char *arg) { @@ -335= ,6 > +355,7 @@ usage(char *program) > "\t--queue_priority : enable queue priority\n" > "\t--deq_tmo_nsec : global dequeue timeout\n" > "\t--prod_type_ethdev : use ethernet device as producer.\n" > + "\t--prod_type_cryptodev : use crypto device as > producer.\n" > "\t--prod_type_timerdev : use event timer device as > producer.\n" > "\t expiry_nsec would be the timeout\n" > "\t in ns.\n" > @@ -345,6 +366,8 @@ usage(char *program) > "\t--timer_tick_nsec : timer tick interval in ns.\n" > "\t--max_tmo_nsec : max timeout interval in ns.\n" > "\t--expiry_nsec : event timer expiry ns.\n" > + "\t--crypto_adptr_mode : 0 for OP_NEW mode (default) > and\n" > + "\t 1 for OP_FORWARD mode.\n" > "\t--mbuf_sz : packet mbuf size.\n" > "\t--max_pkt_sz : max packet size.\n" > "\t--prod_enq_burst_sz : producer enqueue burst size.\n" > @@ -415,8 +438,10 @@ static struct option lgopts[] =3D { > { EVT_QUEUE_PRIORITY, 0, 0, 0 }, > { EVT_DEQ_TMO_NSEC, 1, 0, 0 }, > { EVT_PROD_ETHDEV, 0, 0, 0 }, > + { EVT_PROD_CRYPTODEV, 0, 0, 0 }, > { EVT_PROD_TIMERDEV, 0, 0, 0 }, > { EVT_PROD_TIMERDEV_BURST, 0, 0, 0 }, > + { EVT_CRYPTO_ADPTR_MODE, 1, 0, 0 }, > { EVT_NB_TIMERS, 1, 0, 0 }, > { EVT_NB_TIMER_ADPTRS, 1, 0, 0 }, > { EVT_TIMER_TICK_NSEC, 1, 0, 0 }, > @@ -455,8 +480,10 @@ evt_opts_parse_long(int opt_idx, struct evt_options > *opt) > { EVT_QUEUE_PRIORITY, evt_parse_queue_priority}, > { EVT_DEQ_TMO_NSEC, evt_parse_deq_tmo_nsec}, > { EVT_PROD_ETHDEV, evt_parse_eth_prod_type}, > + { EVT_PROD_CRYPTODEV, evt_parse_crypto_prod_type}, > { EVT_PROD_TIMERDEV, evt_parse_timer_prod_type}, > { EVT_PROD_TIMERDEV_BURST, > evt_parse_timer_prod_type_burst}, > + { EVT_CRYPTO_ADPTR_MODE, > evt_parse_crypto_adptr_mode}, > { EVT_NB_TIMERS, evt_parse_nb_timers}, > { EVT_NB_TIMER_ADPTRS, evt_parse_nb_timer_adptrs}, > { EVT_TIMER_TICK_NSEC, evt_parse_timer_tick_nsec}, diff -- > git a/app/test-eventdev/evt_options.h b/app/test-eventdev/evt_options.h > index 413d7092f0..2231c58801 100644 > --- a/app/test-eventdev/evt_options.h > +++ b/app/test-eventdev/evt_options.h > @@ -9,6 +9,7 @@ > #include >=20 > #include > +#include > #include > #include > #include > @@ -33,8 +34,10 @@ > #define EVT_QUEUE_PRIORITY ("queue_priority") > #define EVT_DEQ_TMO_NSEC ("deq_tmo_nsec") > #define EVT_PROD_ETHDEV ("prod_type_ethdev") > +#define EVT_PROD_CRYPTODEV ("prod_type_cryptodev") > #define EVT_PROD_TIMERDEV ("prod_type_timerdev") > #define EVT_PROD_TIMERDEV_BURST ("prod_type_timerdev_burst") > +#define EVT_CRYPTO_ADPTR_MODE ("crypto_adptr_mode") > #define EVT_NB_TIMERS ("nb_timers") > #define EVT_NB_TIMER_ADPTRS ("nb_timer_adptrs") > #define EVT_TIMER_TICK_NSEC ("timer_tick_nsec") > @@ -249,6 +252,8 @@ evt_prod_id_to_name(enum evt_prod_type > prod_type) > return "Ethdev Rx Adapter"; > case EVT_PROD_TYPE_EVENT_TIMER_ADPTR: > return "Event timer adapter"; > + case EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR: > + return "Event crypto adapter"; > } >=20 > return ""; > @@ -288,6 +293,13 @@ evt_dump_producer_type(struct evt_options *opt) > evt_dump("timer_tick_nsec", "%"PRIu64"", > opt->timer_tick_nsec); > break; > + case EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR: > + snprintf(name, EVT_PROD_MAX_NAME_LEN, > + "Event crypto adapter producers"); > + evt_dump("crypto adapter mode", "%s", > + opt->crypto_adptr_mode ? "OP_FORWARD" : > "OP_NEW"); > + evt_dump("nb_cryptodev", "%u", rte_cryptodev_count()); > + break; > } > evt_dump("prod_type", "%s", name); > } > diff --git a/app/test-eventdev/evt_test.h b/app/test-eventdev/evt_test.h > index f07d2c3336..50fa474ec2 100644 > --- a/app/test-eventdev/evt_test.h > +++ b/app/test-eventdev/evt_test.h > @@ -29,6 +29,8 @@ typedef int (*evt_test_mempool_setup_t) > (struct evt_test *test, struct evt_options *opt); typedef int > (*evt_test_ethdev_setup_t) > (struct evt_test *test, struct evt_options *opt); > +typedef int (*evt_test_cryptodev_setup_t) > + (struct evt_test *test, struct evt_options *opt); > typedef int (*evt_test_eventdev_setup_t) > (struct evt_test *test, struct evt_options *opt); typedef int > (*evt_test_launch_lcores_t) @@ -39,6 +41,8 @@ typedef void > (*evt_test_eventdev_destroy_t) > (struct evt_test *test, struct evt_options *opt); typedef void > (*evt_test_ethdev_destroy_t) > (struct evt_test *test, struct evt_options *opt); > +typedef void (*evt_test_cryptodev_destroy_t) > + (struct evt_test *test, struct evt_options *opt); > typedef void (*evt_test_mempool_destroy_t) > (struct evt_test *test, struct evt_options *opt); typedef void > (*evt_test_destroy_t) @@ -52,10 +56,12 @@ struct evt_test_ops { > evt_test_mempool_setup_t mempool_setup; > evt_test_ethdev_setup_t ethdev_setup; > evt_test_eventdev_setup_t eventdev_setup; > + evt_test_cryptodev_setup_t cryptodev_setup; > evt_test_launch_lcores_t launch_lcores; > evt_test_result_t test_result; > evt_test_eventdev_destroy_t eventdev_destroy; > evt_test_ethdev_destroy_t ethdev_destroy; > + evt_test_cryptodev_destroy_t cryptodev_destroy; > evt_test_mempool_destroy_t mempool_destroy; > evt_test_destroy_t test_destroy; > }; > diff --git a/app/test-eventdev/test_perf_atq.c b/app/test- > eventdev/test_perf_atq.c > index 8fd51004ee..67ff681666 100644 > --- a/app/test-eventdev/test_perf_atq.c > +++ b/app/test-eventdev/test_perf_atq.c > @@ -48,6 +48,22 @@ perf_atq_worker(void *arg, const int > enable_fwd_latency) > continue; > } >=20 > + if (prod_crypto_type && > + (ev.event_type =3D=3D RTE_EVENT_TYPE_CRYPTODEV)) { > + struct rte_crypto_op *op =3D ev.event_ptr; > + > + if (op->status =3D=3D RTE_CRYPTO_OP_STATUS_SUCCESS) > { > + if (op->sym->m_dst =3D=3D NULL) > + ev.event_ptr =3D op->sym->m_src; > + else > + ev.event_ptr =3D op->sym->m_dst; > + rte_crypto_op_free(op); > + } else { > + rte_crypto_op_free(op); > + continue; > + } > + } > + > if (enable_fwd_latency && !prod_timer_type) > /* first stage in pipeline, mark ts to compute fwd latency */ > atq_mark_fwd_latency(&ev); > @@ -87,6 +103,25 @@ perf_atq_worker_burst(void *arg, const int > enable_fwd_latency) > } >=20 > for (i =3D 0; i < nb_rx; i++) { > + if (prod_crypto_type && > + (ev[i].event_type =3D=3D > RTE_EVENT_TYPE_CRYPTODEV)) { > + struct rte_crypto_op *op =3D ev[i].event_ptr; > + > + if (op->status =3D=3D > + RTE_CRYPTO_OP_STATUS_SUCCESS) { > + if (op->sym->m_dst =3D=3D NULL) > + ev[i].event_ptr =3D > + op->sym->m_src; > + else > + ev[i].event_ptr =3D > + op->sym->m_dst; > + rte_crypto_op_free(op); > + } else { > + rte_crypto_op_free(op); > + continue; > + } > + } > + > if (enable_fwd_latency && !prod_timer_type) { > rte_prefetch0(ev[i+1].event_ptr); > /* first stage in pipeline. > @@ -254,6 +289,18 @@ perf_atq_eventdev_setup(struct evt_test *test, > struct evt_options *opt) > return ret; > } > } > + } else if (opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR) { > + uint8_t cdev_id, cdev_count; > + > + cdev_count =3D rte_cryptodev_count(); > + for (cdev_id =3D 0; cdev_id < cdev_count; cdev_id++) { > + ret =3D rte_cryptodev_start(cdev_id); > + if (ret) { > + evt_err("Failed to start cryptodev %u", > + cdev_id); > + return ret; > + } > + } > } >=20 > return 0; > @@ -295,12 +342,14 @@ static const struct evt_test_ops perf_atq =3D { > .opt_dump =3D perf_atq_opt_dump, > .test_setup =3D perf_test_setup, > .ethdev_setup =3D perf_ethdev_setup, > + .cryptodev_setup =3D perf_cryptodev_setup, > .mempool_setup =3D perf_mempool_setup, > .eventdev_setup =3D perf_atq_eventdev_setup, > .launch_lcores =3D perf_atq_launch_lcores, > .eventdev_destroy =3D perf_eventdev_destroy, > .mempool_destroy =3D perf_mempool_destroy, > .ethdev_destroy =3D perf_ethdev_destroy, > + .cryptodev_destroy =3D perf_cryptodev_destroy, > .test_result =3D perf_test_result, > .test_destroy =3D perf_test_destroy, > }; > diff --git a/app/test-eventdev/test_perf_common.c b/app/test- > eventdev/test_perf_common.c > index 9b73874151..7d4eab9b8e 100644 > --- a/app/test-eventdev/test_perf_common.c > +++ b/app/test-eventdev/test_perf_common.c > @@ -6,6 +6,8 @@ >=20 > #include "test_perf_common.h" >=20 > +#define NB_CRYPTODEV_DESCRIPTORS 128 > + > int > perf_test_result(struct evt_test *test, struct evt_options *opt) { @@ -= 272,6 > +274,123 @@ perf_event_timer_producer_burst(void *arg) > return 0; > } >=20 > +static inline void > +crypto_adapter_enq_op_new(struct prod_data *p) { > + struct rte_cryptodev_sym_session **crypto_sess =3D p- > >ca.crypto_sess; > + struct test_perf *t =3D p->t; > + const uint32_t nb_flows =3D t->nb_flows; > + const uint64_t nb_pkts =3D t->nb_pkts; > + struct rte_mempool *pool =3D t->pool; > + struct rte_crypto_sym_op *sym_op; > + struct evt_options *opt =3D t->opt; > + uint16_t qp_id =3D p->ca.cdev_qp_id; > + uint8_t cdev_id =3D p->ca.cdev_id; > + uint32_t flow_counter =3D 0; > + struct rte_crypto_op *op; > + struct rte_mbuf *m; > + uint64_t count =3D 0; > + uint16_t len; > + > + if (opt->verbose_level > 1) > + printf("%s(): lcore %d queue %d cdev_id %u cdev_qp_id > %u\n", > + __func__, rte_lcore_id(), p->queue_id, p->ca.cdev_id, > + p->ca.cdev_qp_id); > + > + len =3D opt->mbuf_sz ? opt->mbuf_sz : RTE_ETHER_MIN_LEN; > + > + while (count < nb_pkts && t->done =3D=3D false) { > + m =3D rte_pktmbuf_alloc(pool); > + if (m =3D=3D NULL) > + continue; > + > + rte_pktmbuf_append(m, len); > + op =3D rte_crypto_op_alloc(t->ca_op_pool, > + > RTE_CRYPTO_OP_TYPE_SYMMETRIC); > + sym_op =3D op->sym; > + sym_op->m_src =3D m; > + sym_op->cipher.data.offset =3D 0; > + sym_op->cipher.data.length =3D len; > + rte_crypto_op_attach_sym_session( > + op, crypto_sess[flow_counter++ % nb_flows]); > + > + while (rte_cryptodev_enqueue_burst(cdev_id, qp_id, &op, > 1) !=3D 1 && > + t->done =3D=3D false) > + rte_pause(); > + > + count++; > + } > +} > + > +static inline void > +crypto_adapter_enq_op_fwd(struct prod_data *p) { > + struct rte_cryptodev_sym_session **crypto_sess =3D p- > >ca.crypto_sess; > + const uint8_t dev_id =3D p->dev_id; > + const uint8_t port =3D p->port_id; > + struct test_perf *t =3D p->t; > + const uint32_t nb_flows =3D t->nb_flows; > + const uint64_t nb_pkts =3D t->nb_pkts; > + struct rte_mempool *pool =3D t->pool; > + struct evt_options *opt =3D t->opt; > + struct rte_crypto_sym_op *sym_op; > + uint32_t flow_counter =3D 0; > + struct rte_crypto_op *op; > + struct rte_event ev; > + struct rte_mbuf *m; > + uint64_t count =3D 0; > + uint16_t len; > + > + if (opt->verbose_level > 1) > + printf("%s(): lcore %d port %d queue %d cdev_id %u > cdev_qp_id %u\n", > + __func__, rte_lcore_id(), port, p->queue_id, > + p->ca.cdev_id, p->ca.cdev_qp_id); > + > + ev.event =3D 0; > + ev.op =3D RTE_EVENT_OP_FORWARD; > + ev.queue_id =3D p->queue_id; > + ev.sched_type =3D RTE_SCHED_TYPE_ATOMIC; > + ev.event_type =3D RTE_EVENT_TYPE_CPU; > + len =3D opt->mbuf_sz ? opt->mbuf_sz : RTE_ETHER_MIN_LEN; > + > + while (count < nb_pkts && t->done =3D=3D false) { > + m =3D rte_pktmbuf_alloc(pool); > + if (m =3D=3D NULL) > + continue; > + > + rte_pktmbuf_append(m, len); > + op =3D rte_crypto_op_alloc(t->ca_op_pool, > + > RTE_CRYPTO_OP_TYPE_SYMMETRIC); > + sym_op =3D op->sym; > + sym_op->m_src =3D m; > + sym_op->cipher.data.offset =3D 0; > + sym_op->cipher.data.length =3D len; > + rte_crypto_op_attach_sym_session( > + op, crypto_sess[flow_counter++ % nb_flows]); > + ev.event_ptr =3D op; > + > + while (rte_event_crypto_adapter_enqueue(dev_id, port, > &ev, 1) !=3D 1 && > + t->done =3D=3D false) > + rte_pause(); > + > + count++; > + } > +} > + > +static inline int > +perf_event_crypto_producer(void *arg) > +{ > + struct prod_data *p =3D arg; > + struct evt_options *opt =3D p->t->opt; > + > + if (opt->crypto_adptr_mode =3D=3D > RTE_EVENT_CRYPTO_ADAPTER_OP_NEW) > + crypto_adapter_enq_op_new(p); > + else > + crypto_adapter_enq_op_fwd(p); > + > + return 0; > +} > + > static int > perf_producer_wrapper(void *arg) > { > @@ -298,6 +417,8 @@ perf_producer_wrapper(void *arg) > else if (t->opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_TIMER_ADPTR && > t->opt->timdev_use_burst) > return perf_event_timer_producer_burst(arg); > + else if (t->opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR) > + return perf_event_crypto_producer(arg); > return 0; > } >=20 > @@ -405,8 +526,10 @@ perf_launch_lcores(struct evt_test *test, struct > evt_options *opt, > if (remaining <=3D 0) { > t->result =3D EVT_TEST_SUCCESS; > if (opt->prod_type =3D=3D EVT_PROD_TYPE_SYNT > || > - opt->prod_type =3D=3D > - > EVT_PROD_TYPE_EVENT_TIMER_ADPTR) { > + opt->prod_type =3D=3D > + > EVT_PROD_TYPE_EVENT_TIMER_ADPTR || > + opt->prod_type =3D=3D > + > EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR) { > t->done =3D true; > break; > } > @@ -415,7 +538,8 @@ perf_launch_lcores(struct evt_test *test, struct > evt_options *opt, >=20 > if (new_cycles - dead_lock_cycles > dead_lock_sample && > (opt->prod_type =3D=3D EVT_PROD_TYPE_SYNT || > - opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_TIMER_ADPTR)) { > + opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_TIMER_ADPTR || > + opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR)) { > remaining =3D t->outstand_pkts - processed_pkts(t); > if (dead_lock_remaining =3D=3D remaining) { > rte_event_dev_dump(opt->dev_id, stdout); > @@ -537,6 +661,80 @@ perf_event_timer_adapter_setup(struct test_perf > *t) > return 0; > } >=20 > +static int > +perf_event_crypto_adapter_setup(struct test_perf *t, struct prod_data > +*p) { > + struct evt_options *opt =3D t->opt; > + uint32_t cap; > + int ret; > + > + ret =3D rte_event_crypto_adapter_caps_get(p->dev_id, p->ca.cdev_id, > &cap); > + if (ret) { > + evt_err("Failed to get crypto adapter capabilities"); > + return ret; > + } > + > + if (((opt->crypto_adptr_mode =3D=3D > RTE_EVENT_CRYPTO_ADAPTER_OP_NEW) && > + !(cap & > RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_NEW)) || > + ((opt->crypto_adptr_mode =3D=3D > RTE_EVENT_CRYPTO_ADAPTER_OP_FORWARD) && > + !(cap & > RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_OP_FWD))) { > + evt_err("crypto adapter %s mode unsupported\n", > + opt->crypto_adptr_mode ? "OP_FORWARD" : > "OP_NEW"); > + return -EINVAL; > + } else if (!(cap & > RTE_EVENT_CRYPTO_ADAPTER_CAP_SESSION_PRIVATE_DATA)) { > + evt_err("Storing crypto session not supported"); > + return -EINVAL; > + } > + > + if (cap & > RTE_EVENT_CRYPTO_ADAPTER_CAP_INTERNAL_PORT_QP_EV_BIND) { > + struct rte_event response_info; > + > + response_info.event =3D 0; > + response_info.op =3D > + opt->crypto_adptr_mode =3D=3D > + > RTE_EVENT_CRYPTO_ADAPTER_OP_NEW ? > + RTE_EVENT_OP_NEW : > + RTE_EVENT_OP_FORWARD; > + response_info.sched_type =3D RTE_SCHED_TYPE_ATOMIC; > + response_info.event_type =3D RTE_EVENT_TYPE_CRYPTODEV; > + response_info.queue_id =3D p->queue_id; > + ret =3D rte_event_crypto_adapter_queue_pair_add( > + TEST_PERF_CA_ID, p->ca.cdev_id, p->ca.cdev_qp_id, > + &response_info); > + } else { > + ret =3D rte_event_crypto_adapter_queue_pair_add( > + TEST_PERF_CA_ID, p->ca.cdev_id, p->ca.cdev_qp_id, > NULL); > + } > + > + return ret; > +} > + > +static struct rte_cryptodev_sym_session * > +cryptodev_sym_sess_create(struct prod_data *p, struct test_perf *t) { > + struct rte_crypto_sym_xform cipher_xform; > + struct rte_cryptodev_sym_session *sess; > + > + cipher_xform.type =3D RTE_CRYPTO_SYM_XFORM_CIPHER; > + cipher_xform.cipher.algo =3D RTE_CRYPTO_CIPHER_NULL; > + cipher_xform.cipher.op =3D RTE_CRYPTO_CIPHER_OP_ENCRYPT; > + cipher_xform.next =3D NULL; > + > + sess =3D rte_cryptodev_sym_session_create(t->ca_sess_pool); > + if (sess =3D=3D NULL) { > + evt_err("Failed to create sym session"); > + return NULL; > + } > + > + if (rte_cryptodev_sym_session_init(p->ca.cdev_id, sess, > &cipher_xform, > + t->ca_sess_priv_pool)) { > + evt_err("Failed to init session"); > + return NULL; > + } > + > + return sess; > +} > + > int > perf_event_dev_port_setup(struct evt_test *test, struct evt_options *opt= , > uint8_t stride, uint8_t nb_queues, > @@ -598,6 +796,80 @@ perf_event_dev_port_setup(struct evt_test *test, > struct evt_options *opt, > ret =3D perf_event_timer_adapter_setup(t); > if (ret) > return ret; > + } else if (opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR) { > + struct rte_event_port_conf conf =3D *port_conf; > + uint8_t cdev_id =3D 0; > + uint16_t qp_id =3D 0; > + > + ret =3D rte_event_crypto_adapter_create(TEST_PERF_CA_ID, > + opt->dev_id, &conf, 0); > + if (ret) { > + evt_err("Failed to create crypto adapter"); > + return ret; > + } > + > + prod =3D 0; > + for (; port < perf_nb_event_ports(opt); port++) { > + struct rte_cryptodev_sym_session *crypto_sess; > + union rte_event_crypto_metadata m_data; > + struct prod_data *p =3D &t->prod[port]; > + uint32_t flow_id; > + > + if (qp_id =3D=3D > rte_cryptodev_queue_pair_count(cdev_id)) { > + cdev_id++; > + qp_id =3D 0; > + } > + > + p->dev_id =3D opt->dev_id; > + p->port_id =3D port; > + p->queue_id =3D prod * stride; > + p->ca.cdev_id =3D cdev_id; > + p->ca.cdev_qp_id =3D qp_id; > + p->ca.crypto_sess =3D rte_zmalloc_socket( > + NULL, sizeof(crypto_sess) * t->nb_flows, > + RTE_CACHE_LINE_SIZE, opt->socket_id); > + p->t =3D t; > + > + m_data.request_info.cdev_id =3D p->ca.cdev_id; > + m_data.request_info.queue_pair_id =3D p- > >ca.cdev_qp_id; > + m_data.response_info.op =3D > + opt->crypto_adptr_mode =3D=3D > + > RTE_EVENT_CRYPTO_ADAPTER_OP_NEW ? > + RTE_EVENT_OP_NEW : > + RTE_EVENT_OP_FORWARD; > + m_data.response_info.sched_type =3D > RTE_SCHED_TYPE_ATOMIC; > + m_data.response_info.event_type =3D > + RTE_EVENT_TYPE_CRYPTODEV; > + m_data.response_info.queue_id =3D p->queue_id; > + > + for (flow_id =3D 0; flow_id < t->nb_flows; flow_id++) { > + crypto_sess =3D cryptodev_sym_sess_create(p, > t); > + if (crypto_sess =3D=3D NULL) > + return -ENOMEM; > + > + m_data.response_info.flow_id =3D flow_id; > + rte_cryptodev_sym_session_set_user_data( > + crypto_sess, &m_data, > sizeof(m_data)); > + p->ca.crypto_sess[flow_id] =3D crypto_sess; > + } > + > + conf.event_port_cfg |=3D > + RTE_EVENT_PORT_CFG_HINT_PRODUCER | > + RTE_EVENT_PORT_CFG_HINT_CONSUMER; > + > + ret =3D rte_event_port_setup(opt->dev_id, port, > &conf); > + if (ret) { > + evt_err("failed to setup port %d", port); > + return ret; > + } > + > + ret =3D perf_event_crypto_adapter_setup(t, p); > + if (ret) > + return ret; > + > + qp_id++; > + prod++; > + } > } else { > prod =3D 0; > for ( ; port < perf_nb_event_ports(opt); port++) { @@ -659,7 > +931,8 @@ perf_opt_check(struct evt_options *opt, uint64_t nb_queues) > } >=20 > if (opt->prod_type =3D=3D EVT_PROD_TYPE_SYNT || > - opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_TIMER_ADPTR) { > + opt->prod_type =3D=3D EVT_PROD_TYPE_EVENT_TIMER_ADPTR || > + opt->prod_type =3D=3D EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR) { > /* Validate producer lcores */ > if (evt_lcores_has_overlap(opt->plcores, > rte_get_main_lcore())) { > @@ -767,8 +1040,7 @@ perf_ethdev_setup(struct evt_test *test, struct > evt_options *opt) > }, > }; >=20 > - if (opt->prod_type =3D=3D EVT_PROD_TYPE_SYNT || > - opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_TIMER_ADPTR) > + if (opt->prod_type !=3D EVT_PROD_TYPE_ETH_RX_ADPTR) > return 0; >=20 > if (!rte_eth_dev_count_avail()) { > @@ -841,6 +1113,147 @@ void perf_ethdev_destroy(struct evt_test *test, > struct evt_options *opt) > } > } >=20 > +int > +perf_cryptodev_setup(struct evt_test *test, struct evt_options *opt) { > + uint8_t cdev_count, cdev_id, nb_plcores, nb_qps; > + struct test_perf *t =3D evt_test_priv(test); > + unsigned int max_session_size; > + uint32_t nb_sessions; > + int ret; > + > + if (opt->prod_type !=3D EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR) > + return 0; > + > + cdev_count =3D rte_cryptodev_count(); > + if (cdev_count =3D=3D 0) { > + evt_err("No crypto devices available\n"); > + return -ENODEV; > + } > + > + t->ca_op_pool =3D rte_crypto_op_pool_create( > + "crypto_op_pool", RTE_CRYPTO_OP_TYPE_SYMMETRIC, > opt->pool_sz, > + 128, 0, rte_socket_id()); > + if (t->ca_op_pool =3D=3D NULL) { > + evt_err("Failed to create crypto op pool"); > + return -ENOMEM; > + } > + > + nb_sessions =3D evt_nr_active_lcores(opt->plcores) * t->nb_flows; > + t->ca_sess_pool =3D rte_cryptodev_sym_session_pool_create( > + "ca_sess_pool", nb_sessions, 0, 0, > + sizeof(union rte_event_crypto_metadata), > SOCKET_ID_ANY); > + if (t->ca_sess_pool =3D=3D NULL) { > + evt_err("Failed to create sym session pool"); > + ret =3D -ENOMEM; > + goto err; > + } > + > + max_session_size =3D 0; > + for (cdev_id =3D 0; cdev_id < cdev_count; cdev_id++) { > + unsigned int session_size; > + > + session_size =3D > + > rte_cryptodev_sym_get_private_session_size(cdev_id); > + if (session_size > max_session_size) > + max_session_size =3D session_size; > + } > + > + max_session_size +=3D sizeof(union rte_event_crypto_metadata); > + t->ca_sess_priv_pool =3D rte_mempool_create( > + "ca_sess_priv_pool", nb_sessions, max_session_size, 0, 0, > NULL, > + NULL, NULL, NULL, SOCKET_ID_ANY, 0); > + if (t->ca_sess_priv_pool =3D=3D NULL) { > + evt_err("failed to create sym session private pool"); > + ret =3D -ENOMEM; > + goto err; > + } > + > + /* > + * Calculate number of needed queue pairs, based on the amount of > + * available number of logical cores and crypto devices. For instance, > + * if there are 4 cores and 2 crypto devices, 2 queue pairs will be set > + * up per device. > + */ > + nb_plcores =3D evt_nr_active_lcores(opt->plcores); > + nb_qps =3D (nb_plcores % cdev_count) ? (nb_plcores / cdev_count) + 1 > : > + nb_plcores / cdev_count; > + for (cdev_id =3D 0; cdev_id < cdev_count; cdev_id++) { > + struct rte_cryptodev_qp_conf qp_conf; > + struct rte_cryptodev_config conf; > + struct rte_cryptodev_info info; > + int qp_id; > + > + rte_cryptodev_info_get(cdev_id, &info); > + if (nb_qps > info.max_nb_queue_pairs) { > + evt_err("Not enough queue pairs per cryptodev > (%u)", > + nb_qps); > + ret =3D -EINVAL; > + goto err; > + } > + > + conf.nb_queue_pairs =3D nb_qps; > + conf.socket_id =3D SOCKET_ID_ANY; > + conf.ff_disable =3D RTE_CRYPTODEV_FF_SECURITY; > + > + ret =3D rte_cryptodev_configure(cdev_id, &conf); > + if (ret) { > + evt_err("Failed to configure cryptodev (%u)", > cdev_id); > + goto err; > + } > + > + qp_conf.nb_descriptors =3D NB_CRYPTODEV_DESCRIPTORS; > + qp_conf.mp_session =3D t->ca_sess_pool; > + qp_conf.mp_session_private =3D t->ca_sess_priv_pool; > + > + for (qp_id =3D 0; qp_id < conf.nb_queue_pairs; qp_id++) { > + ret =3D rte_cryptodev_queue_pair_setup( > + cdev_id, qp_id, &qp_conf, > + rte_cryptodev_socket_id(cdev_id)); > + if (ret) { > + evt_err("Failed to setup queue pairs on > cryptodev %u\n", > + cdev_id); > + goto err; > + } > + } > + } > + > + return 0; > +err: > + rte_mempool_free(t->ca_op_pool); > + rte_mempool_free(t->ca_sess_pool); > + rte_mempool_free(t->ca_sess_priv_pool); > + > + return ret; > +} > + > +void > +perf_cryptodev_destroy(struct evt_test *test, struct evt_options *opt) > +{ > + uint8_t cdev_id, cdev_count =3D rte_cryptodev_count(); > + struct test_perf *t =3D evt_test_priv(test); > + uint16_t port; > + > + if (opt->prod_type !=3D EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR) > + return; > + > + for (port =3D t->nb_workers; port < perf_nb_event_ports(opt); port++) { > + struct prod_data *p =3D &t->prod[port]; > + > + rte_event_crypto_adapter_queue_pair_del( > + TEST_PERF_CA_ID, p->ca.cdev_id, p- > >ca.cdev_qp_id); > + } > + > + rte_event_crypto_adapter_free(TEST_PERF_CA_ID); > + > + for (cdev_id =3D 0; cdev_id < cdev_count; cdev_id++) > + rte_cryptodev_stop(cdev_id); > + > + rte_mempool_free(t->ca_op_pool); > + rte_mempool_free(t->ca_sess_pool); > + rte_mempool_free(t->ca_sess_priv_pool); > +} > + > int > perf_mempool_setup(struct evt_test *test, struct evt_options *opt) { di= ff -- > git a/app/test-eventdev/test_perf_common.h b/app/test- > eventdev/test_perf_common.h > index 14dcf80429..ea0907d61a 100644 > --- a/app/test-eventdev/test_perf_common.h > +++ b/app/test-eventdev/test_perf_common.h > @@ -9,9 +9,11 @@ > #include > #include >=20 > +#include > #include > #include > #include > +#include > #include > #include > #include > @@ -23,6 +25,8 @@ > #include "evt_options.h" > #include "evt_test.h" >=20 > +#define TEST_PERF_CA_ID 0 > + > struct test_perf; >=20 > struct worker_data { > @@ -33,14 +37,19 @@ struct worker_data { > struct test_perf *t; > } __rte_cache_aligned; >=20 > +struct crypto_adptr_data { > + uint8_t cdev_id; > + uint16_t cdev_qp_id; > + struct rte_cryptodev_sym_session **crypto_sess; }; > struct prod_data { > uint8_t dev_id; > uint8_t port_id; > uint8_t queue_id; > + struct crypto_adptr_data ca; > struct test_perf *t; > } __rte_cache_aligned; >=20 > - > struct test_perf { > /* Don't change the offset of "done". Signal handler use this memory > * to terminate all lcores work. > @@ -58,6 +67,9 @@ struct test_perf { > uint8_t sched_type_list[EVT_MAX_STAGES] __rte_cache_aligned; > struct rte_event_timer_adapter *timer_adptr[ > RTE_EVENT_TIMER_ADAPTER_NUM_MAX] > __rte_cache_aligned; > + struct rte_mempool *ca_op_pool; > + struct rte_mempool *ca_sess_pool; > + struct rte_mempool *ca_sess_priv_pool; > } __rte_cache_aligned; >=20 > struct perf_elt { > @@ -81,6 +93,8 @@ struct perf_elt { > const uint8_t port =3D w->port_id;\ > const uint8_t prod_timer_type =3D \ > opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_TIMER_ADPTR;\ > + const uint8_t prod_crypto_type =3D \ > + opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR;\ > uint8_t *const sched_type_list =3D &t->sched_type_list[0];\ > struct rte_mempool *const pool =3D t->pool;\ > const uint8_t nb_stages =3D t->opt->nb_stages;\ @@ -154,6 +168,7 > @@ int perf_test_result(struct evt_test *test, struct evt_options *opt); = int > perf_opt_check(struct evt_options *opt, uint64_t nb_queues); int > perf_test_setup(struct evt_test *test, struct evt_options *opt); int > perf_ethdev_setup(struct evt_test *test, struct evt_options *opt); > +int perf_cryptodev_setup(struct evt_test *test, struct evt_options > +*opt); > int perf_mempool_setup(struct evt_test *test, struct evt_options *opt); = int > perf_event_dev_port_setup(struct evt_test *test, struct evt_options *opt, > uint8_t stride, uint8_t nb_queues, > @@ -164,6 +179,7 @@ int perf_launch_lcores(struct evt_test *test, struct > evt_options *opt, void perf_opt_dump(struct evt_options *opt, uint8_t > nb_queues); void perf_test_destroy(struct evt_test *test, struct evt_opt= ions > *opt); void perf_eventdev_destroy(struct evt_test *test, struct evt_opti= ons > *opt); > +void perf_cryptodev_destroy(struct evt_test *test, struct evt_options > +*opt); > void perf_ethdev_destroy(struct evt_test *test, struct evt_options *opt)= ; > void perf_mempool_destroy(struct evt_test *test, struct evt_options *opt)= ; >=20 > diff --git a/app/test-eventdev/test_perf_queue.c b/app/test- > eventdev/test_perf_queue.c > index f4ea3a795f..dcf6d82947 100644 > --- a/app/test-eventdev/test_perf_queue.c > +++ b/app/test-eventdev/test_perf_queue.c > @@ -49,6 +49,23 @@ perf_queue_worker(void *arg, const int > enable_fwd_latency) > rte_pause(); > continue; > } > + > + if (prod_crypto_type && > + (ev.event_type =3D=3D RTE_EVENT_TYPE_CRYPTODEV)) { > + struct rte_crypto_op *op =3D ev.event_ptr; > + > + if (op->status =3D=3D RTE_CRYPTO_OP_STATUS_SUCCESS) > { > + if (op->sym->m_dst =3D=3D NULL) > + ev.event_ptr =3D op->sym->m_src; > + else > + ev.event_ptr =3D op->sym->m_dst; > + rte_crypto_op_free(op); > + } else { > + rte_crypto_op_free(op); > + continue; > + } > + } > + > if (enable_fwd_latency && !prod_timer_type) > /* first q in pipeline, mark timestamp to compute fwd > latency */ > mark_fwd_latency(&ev, nb_stages); > @@ -88,6 +105,25 @@ perf_queue_worker_burst(void *arg, const int > enable_fwd_latency) > } >=20 > for (i =3D 0; i < nb_rx; i++) { > + if (prod_crypto_type && > + (ev[i].event_type =3D=3D > RTE_EVENT_TYPE_CRYPTODEV)) { > + struct rte_crypto_op *op =3D ev[i].event_ptr; > + > + if (op->status =3D=3D > + RTE_CRYPTO_OP_STATUS_SUCCESS) { > + if (op->sym->m_dst =3D=3D NULL) > + ev[i].event_ptr =3D > + op->sym->m_src; > + else > + ev[i].event_ptr =3D > + op->sym->m_dst; > + rte_crypto_op_free(op); > + } else { > + rte_crypto_op_free(op); > + continue; > + } > + } > + > if (enable_fwd_latency && !prod_timer_type) { > rte_prefetch0(ev[i+1].event_ptr); > /* first queue in pipeline. > @@ -269,6 +305,18 @@ perf_queue_eventdev_setup(struct evt_test *test, > struct evt_options *opt) > return ret; > } > } > + } else if (opt->prod_type =3D=3D > EVT_PROD_TYPE_EVENT_CRYPTO_ADPTR) { > + uint8_t cdev_id, cdev_count; > + > + cdev_count =3D rte_cryptodev_count(); > + for (cdev_id =3D 0; cdev_id < cdev_count; cdev_id++) { > + ret =3D rte_cryptodev_start(cdev_id); > + if (ret) { > + evt_err("Failed to start cryptodev %u", > + cdev_id); > + return ret; > + } > + } > } >=20 > return 0; > @@ -311,11 +359,13 @@ static const struct evt_test_ops perf_queue =3D { > .test_setup =3D perf_test_setup, > .mempool_setup =3D perf_mempool_setup, > .ethdev_setup =3D perf_ethdev_setup, > + .cryptodev_setup =3D perf_cryptodev_setup, > .eventdev_setup =3D perf_queue_eventdev_setup, > .launch_lcores =3D perf_queue_launch_lcores, > .eventdev_destroy =3D perf_eventdev_destroy, > .mempool_destroy =3D perf_mempool_destroy, > .ethdev_destroy =3D perf_ethdev_destroy, > + .cryptodev_destroy =3D perf_cryptodev_destroy, > .test_result =3D perf_test_result, > .test_destroy =3D perf_test_destroy, > }; > diff --git a/doc/guides/tools/testeventdev.rst > b/doc/guides/tools/testeventdev.rst > index 48efb9ea6e..f7d813226d 100644 > --- a/doc/guides/tools/testeventdev.rst > +++ b/doc/guides/tools/testeventdev.rst > @@ -120,6 +120,10 @@ The following are the application command-line > options: >=20 > Use burst mode event timer adapter as producer. >=20 > +* ``--prod_type_cryptodev`` > + > + Use crypto device as producer. > + > * ``--timer_tick_nsec`` >=20 > Used to dictate number of nano seconds between bucket traversal o= f > the @@ -148,6 +152,11 @@ The following are the application command- > line options: > timeout is out of the supported range of event device it will be > adjusted to the highest/lowest supported dequeue timeout supporte= d. >=20 > +* ``--crypto_adptr_mode`` > + > + Set crypto adapter mode. Use 0 for OP_NEW (default) and 1 for > + OP_FORWARD mode. > + > * ``--mbuf_sz`` >=20 > Set packet mbuf size. Can be used to configure Jumbo Frames. Only= @@ > -420,6 +429,7 @@ Supported application command line options are > following:: > --prod_type_ethdev > --prod_type_timerdev_burst > --prod_type_timerdev > + --prod_type_cryptodev > --prod_enq_burst_sz > --timer_tick_nsec > --max_tmo_nsec > @@ -427,6 +437,7 @@ Supported application command line options are > following:: > --nb_timers > --nb_timer_adptrs > --deq_tmo_nsec > + --crypto_adptr_mode >=20 > Example > ^^^^^^^ > @@ -529,12 +540,14 @@ Supported application command line options are > following:: > --prod_type_ethdev > --prod_type_timerdev_burst > --prod_type_timerdev > + --prod_type_cryptodev > --timer_tick_nsec > --max_tmo_nsec > --expiry_nsec > --nb_timers > --nb_timer_adptrs > --deq_tmo_nsec > + --crypto_adptr_mode >=20 > Example > ^^^^^^^ > -- > 2.25.1