From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 897FFA00C2; Thu, 3 Nov 2022 18:54:02 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 4D88842D13; Thu, 3 Nov 2022 18:54:01 +0100 (CET) Received: from mx0b-0016f401.pphosted.com (mx0a-0016f401.pphosted.com [67.231.148.174]) by mails.dpdk.org (Postfix) with ESMTP id D70F142D12 for ; Thu, 3 Nov 2022 18:53:59 +0100 (CET) Received: from pps.filterd (m0045849.ppops.net [127.0.0.1]) by mx0a-0016f401.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 2A3HYGGn013475 for ; Thu, 3 Nov 2022 10:53:58 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=marvell.com; h=from : to : cc : subject : date : message-id : in-reply-to : references : mime-version : content-transfer-encoding : content-type; s=pfpt0220; bh=TrqJOGHcEYPLTe4oeyx46yiqplS7zO11doBMt8CG+64=; b=iUcIQieyx9XJg/aLpN0Ft3eFJWOlZxTY8HWzIb4WAo7eNRRAcE0PdWqQTnznpmQbse7u dmqHnglLSDpCaf0wt5N8csMG+7tV8IQFj707o4gUFYAt4ahEWvEK2sTt9Pumud+mkckv c18JvEhdVbhnUIMZbsb7XEAHvI8VUjVIrAWCeotjy/SE0YAj8zc/sURzF9JHnDmWkbfp oC2p5/eo8gRrP3/B2ORvnMqvd4sA1veB7Z9apAQ0Wxtp/A3tx3lqzOAzssH6br3BPMmn I+7GBR4TH1F8g00I14ZJZ70sSpsvxWGP9TexIbuD2qxE/ONA9PGqdxu9j4jhHNbucseJ FQ== Received: from dc5-exch02.marvell.com ([199.233.59.182]) by mx0a-0016f401.pphosted.com (PPS) with ESMTPS id 3kmj5m82xp-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT) for ; Thu, 03 Nov 2022 10:53:58 -0700 Received: from DC5-EXCH01.marvell.com (10.69.176.38) by DC5-EXCH02.marvell.com (10.69.176.39) with Microsoft SMTP Server (TLS) id 15.0.1497.18; Thu, 3 Nov 2022 10:53:56 -0700 Received: from maili.marvell.com (10.69.176.80) by DC5-EXCH01.marvell.com (10.69.176.38) with Microsoft SMTP Server id 15.0.1497.2 via Frontend Transport; Thu, 3 Nov 2022 10:53:56 -0700 Received: from localhost.localdomain (unknown [10.28.34.39]) by maili.marvell.com (Postfix) with ESMTP id CCE633F70CE; Thu, 3 Nov 2022 10:53:54 -0700 (PDT) From: Volodymyr Fialko To: , Jerin Jacob CC: , Volodymyr Fialko Subject: [PATCH 1/2] app/testeventdev: setup crypto adapter before sessions Date: Thu, 3 Nov 2022 18:53:46 +0100 Message-ID: <20221103175347.651579-2-vfialko@marvell.com> X-Mailer: git-send-email 2.25.1 In-Reply-To: <20221103175347.651579-1-vfialko@marvell.com> References: <20221103175347.651579-1-vfialko@marvell.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Proofpoint-ORIG-GUID: WJg7hHoMYBJvmtFDgq_Kni7jhPlCHS0s X-Proofpoint-GUID: WJg7hHoMYBJvmtFDgq_Kni7jhPlCHS0s X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.205,Aquarius:18.0.895,Hydra:6.0.545,FMLib:17.11.122.1 definitions=2022-11-03_04,2022-11-03_01,2022-06-22_01 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Setup crypto adapter and add queue pairs before assigning them in session metadata. Session metadata may use queue pair configuration parameters, so queue pair should be added before meta assignment. Signed-off-by: Volodymyr Fialko --- app/test-eventdev/test_perf_common.c | 16 ++++++++++------ 1 file changed, 10 insertions(+), 6 deletions(-) diff --git a/app/test-eventdev/test_perf_common.c b/app/test-eventdev/test_perf_common.c index 342480ffc7..6aae18fddb 100644 --- a/app/test-eventdev/test_perf_common.c +++ b/app/test-eventdev/test_perf_common.c @@ -998,6 +998,10 @@ perf_event_dev_port_setup(struct evt_test *test, struct evt_options *opt, RTE_CACHE_LINE_SIZE, opt->socket_id); p->t = t; + ret = perf_event_crypto_adapter_setup(t, p); + if (ret) + return ret; + m_data.request_info.cdev_id = p->ca.cdev_id; m_data.request_info.queue_pair_id = p->ca.cdev_qp_id; m_data.response_info.sched_type = RTE_SCHED_TYPE_ATOMIC; @@ -1013,12 +1017,14 @@ perf_event_dev_port_setup(struct evt_test *test, struct evt_options *opt, if (sess == NULL) return -ENOMEM; - rte_cryptodev_session_event_mdata_set( + ret = rte_cryptodev_session_event_mdata_set( cdev_id, sess, RTE_CRYPTO_OP_TYPE_SYMMETRIC, RTE_CRYPTO_OP_WITH_SESSION, &m_data, sizeof(m_data)); + if (ret) + return ret; p->ca.crypto_sess[flow_id] = sess; } else { void *sess; @@ -1026,12 +1032,14 @@ perf_event_dev_port_setup(struct evt_test *test, struct evt_options *opt, sess = cryptodev_asym_sess_create(p, t); if (sess == NULL) return -ENOMEM; - rte_cryptodev_session_event_mdata_set( + ret = rte_cryptodev_session_event_mdata_set( cdev_id, sess, RTE_CRYPTO_OP_TYPE_ASYMMETRIC, RTE_CRYPTO_OP_WITH_SESSION, &m_data, sizeof(m_data)); + if (ret) + return ret; p->ca.crypto_sess[flow_id] = sess; } } @@ -1046,10 +1054,6 @@ perf_event_dev_port_setup(struct evt_test *test, struct evt_options *opt, return ret; } - ret = perf_event_crypto_adapter_setup(t, p); - if (ret) - return ret; - qp_id++; prod++; } -- 2.25.1