examples/ipsec-secgw: enable flow based distribution
[dpdk.git] / examples / ipsec-secgw / ipsec-secgw.c
index ad16606..8ba15d2 100644 (file)
 #include <rte_eventdev.h>
 #include <rte_ip.h>
 #include <rte_ip_frag.h>
+#include <rte_alarm.h>
 
 #include "event_helper.h"
+#include "flow.h"
 #include "ipsec.h"
+#include "ipsec_worker.h"
 #include "parser.h"
 #include "sad.h"
 
 volatile bool force_quit;
 
-#define RTE_LOGTYPE_IPSEC RTE_LOGTYPE_USER1
-
 #define MAX_JUMBO_PKT_LEN  9600
 
 #define MEMPOOL_CACHE_SIZE 256
 
-#define NB_MBUF        (32000)
-
 #define CDEV_QUEUE_DESC 2048
 #define CDEV_MAP_ENTRIES 16384
-#define CDEV_MP_NB_OBJS 1024
 #define CDEV_MP_CACHE_SZ 64
 #define MAX_QUEUE_PAIRS 1
 
 #define BURST_TX_DRAIN_US 100 /* TX drain every ~100us */
 
-#define NB_SOCKETS 4
-
 /* Configure how many packets ahead to prefetch, when reading packets */
 #define PREFETCH_OFFSET        3
 
@@ -80,8 +76,6 @@ volatile bool force_quit;
 
 #define MAX_LCORE_PARAMS 1024
 
-#define UNPROTECTED_PORT(port) (unprotected_port_mask & (1 << portid))
-
 /*
  * Configurable number of RX/TX ring descriptors
  */
@@ -90,29 +84,6 @@ volatile bool force_quit;
 static uint16_t nb_rxd = IPSEC_SECGW_RX_DESC_DEFAULT;
 static uint16_t nb_txd = IPSEC_SECGW_TX_DESC_DEFAULT;
 
-#if RTE_BYTE_ORDER != RTE_LITTLE_ENDIAN
-#define __BYTES_TO_UINT64(a, b, c, d, e, f, g, h) \
-       (((uint64_t)((a) & 0xff) << 56) | \
-       ((uint64_t)((b) & 0xff) << 48) | \
-       ((uint64_t)((c) & 0xff) << 40) | \
-       ((uint64_t)((d) & 0xff) << 32) | \
-       ((uint64_t)((e) & 0xff) << 24) | \
-       ((uint64_t)((f) & 0xff) << 16) | \
-       ((uint64_t)((g) & 0xff) << 8)  | \
-       ((uint64_t)(h) & 0xff))
-#else
-#define __BYTES_TO_UINT64(a, b, c, d, e, f, g, h) \
-       (((uint64_t)((h) & 0xff) << 56) | \
-       ((uint64_t)((g) & 0xff) << 48) | \
-       ((uint64_t)((f) & 0xff) << 40) | \
-       ((uint64_t)((e) & 0xff) << 32) | \
-       ((uint64_t)((d) & 0xff) << 24) | \
-       ((uint64_t)((c) & 0xff) << 16) | \
-       ((uint64_t)((b) & 0xff) << 8) | \
-       ((uint64_t)(a) & 0xff))
-#endif
-#define ETHADDR(a, b, c, d, e, f) (__BYTES_TO_UINT64(a, b, c, d, e, f, 0, 0))
-
 #define ETHADDR_TO_UINT64(addr) __BYTES_TO_UINT64( \
                (addr)->addr_bytes[0], (addr)->addr_bytes[1], \
                (addr)->addr_bytes[2], (addr)->addr_bytes[3], \
@@ -124,11 +95,6 @@ static uint16_t nb_txd = IPSEC_SECGW_TX_DESC_DEFAULT;
 
 #define MTU_TO_FRAMELEN(x)     ((x) + RTE_ETHER_HDR_LEN + RTE_ETHER_CRC_LEN)
 
-/* port/source ethernet addr and destination ethernet addr */
-struct ethaddr_info {
-       uint64_t src, dst;
-};
-
 struct ethaddr_info ethaddr_tbl[RTE_MAX_ETHPORTS] = {
        { 0, ETHADDR(0x00, 0x16, 0x3e, 0x7e, 0x94, 0x9a) },
        { 0, ETHADDR(0x00, 0x16, 0x3e, 0x22, 0xa1, 0xd9) },
@@ -188,15 +154,16 @@ static const struct option lgopts[] = {
        {NULL, 0, 0, 0}
 };
 
+uint32_t unprotected_port_mask;
+uint32_t single_sa_idx;
 /* mask of enabled ports */
 static uint32_t enabled_port_mask;
 static uint64_t enabled_cryptodev_mask = UINT64_MAX;
-static uint32_t unprotected_port_mask;
 static int32_t promiscuous_on = 1;
 static int32_t numa_on = 1; /**< NUMA is enabled by default. */
 static uint32_t nb_lcores;
 static uint32_t single_sa;
-static uint32_t single_sa_idx;
+static uint32_t nb_bufs_in_pool;
 
 /*
  * RX/TX HW offload capabilities to enable/use on ethernet ports.
@@ -282,7 +249,7 @@ static struct rte_eth_conf port_conf = {
        },
 };
 
-static struct socket_ctx socket_ctx[NB_SOCKETS];
+struct socket_ctx socket_ctx[NB_SOCKETS];
 
 /*
  * Determine is multi-segment support required:
@@ -322,6 +289,70 @@ adjust_ipv6_pktlen(struct rte_mbuf *m, const struct rte_ipv6_hdr *iph,
        }
 }
 
+#if (STATS_INTERVAL > 0)
+
+/* Print out statistics on packet distribution */
+static void
+print_stats_cb(__rte_unused void *param)
+{
+       uint64_t total_packets_dropped, total_packets_tx, total_packets_rx;
+       float burst_percent, rx_per_call, tx_per_call;
+       unsigned int coreid;
+
+       total_packets_dropped = 0;
+       total_packets_tx = 0;
+       total_packets_rx = 0;
+
+       const char clr[] = { 27, '[', '2', 'J', '\0' };
+       const char topLeft[] = { 27, '[', '1', ';', '1', 'H', '\0' };
+
+       /* Clear screen and move to top left */
+       printf("%s%s", clr, topLeft);
+
+       printf("\nCore statistics ====================================");
+
+       for (coreid = 0; coreid < RTE_MAX_LCORE; coreid++) {
+               /* skip disabled cores */
+               if (rte_lcore_is_enabled(coreid) == 0)
+                       continue;
+               burst_percent = (float)(core_statistics[coreid].burst_rx * 100)/
+                                       core_statistics[coreid].rx;
+               rx_per_call =  (float)(core_statistics[coreid].rx)/
+                                      core_statistics[coreid].rx_call;
+               tx_per_call =  (float)(core_statistics[coreid].tx)/
+                                      core_statistics[coreid].tx_call;
+               printf("\nStatistics for core %u ------------------------------"
+                          "\nPackets received: %20"PRIu64
+                          "\nPackets sent: %24"PRIu64
+                          "\nPackets dropped: %21"PRIu64
+                          "\nBurst percent: %23.2f"
+                          "\nPackets per Rx call: %17.2f"
+                          "\nPackets per Tx call: %17.2f",
+                          coreid,
+                          core_statistics[coreid].rx,
+                          core_statistics[coreid].tx,
+                          core_statistics[coreid].dropped,
+                          burst_percent,
+                          rx_per_call,
+                          tx_per_call);
+
+               total_packets_dropped += core_statistics[coreid].dropped;
+               total_packets_tx += core_statistics[coreid].tx;
+               total_packets_rx += core_statistics[coreid].rx;
+       }
+       printf("\nAggregate statistics ==============================="
+                  "\nTotal packets received: %14"PRIu64
+                  "\nTotal packets sent: %18"PRIu64
+                  "\nTotal packets dropped: %15"PRIu64,
+                  total_packets_rx,
+                  total_packets_tx,
+                  total_packets_dropped);
+       printf("\n====================================================\n");
+
+       rte_eal_alarm_set(STATS_INTERVAL * US_PER_S, print_stats_cb, NULL);
+}
+#endif /* STATS_INTERVAL */
+
 static inline void
 prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t)
 {
@@ -367,7 +398,7 @@ prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t)
 
                /* drop packet when IPv6 header exceeds first segment length */
                if (unlikely(l3len > pkt->data_len)) {
-                       rte_pktmbuf_free(pkt);
+                       free_pkts(&pkt, 1);
                        return;
                }
 
@@ -384,7 +415,7 @@ prepare_one_packet(struct rte_mbuf *pkt, struct ipsec_traffic *t)
                /* Unknown/Unsupported type, drop the packet */
                RTE_LOG(ERR, IPSEC, "Unsupported packet type 0x%x\n",
                        rte_be_to_cpu_16(eth->ether_type));
-               rte_pktmbuf_free(pkt);
+               free_pkts(&pkt, 1);
                return;
        }
 
@@ -511,9 +542,12 @@ send_burst(struct lcore_conf *qconf, uint16_t n, uint16_t port)
        prepare_tx_burst(m_table, n, port, qconf);
 
        ret = rte_eth_tx_burst(port, queueid, m_table, n);
+
+       core_stats_update_tx(ret);
+
        if (unlikely(ret < n)) {
                do {
-                       rte_pktmbuf_free(m_table[ret]);
+                       free_pkts(&m_table[ret], 1);
                } while (++ret < n);
        }
 
@@ -559,7 +593,7 @@ send_fragment_packet(struct lcore_conf *qconf, struct rte_mbuf *m,
                        "error code: %d\n",
                        __func__, m->pkt_len, rte_errno);
 
-       rte_pktmbuf_free(m);
+       free_pkts(&m, 1);
        return len;
 }
 
@@ -584,7 +618,7 @@ send_single_packet(struct rte_mbuf *m, uint16_t port, uint8_t proto)
        } else if (frag_tbl_sz > 0)
                len = send_fragment_packet(qconf, m, port, proto);
        else
-               rte_pktmbuf_free(m);
+               free_pkts(&m, 1);
 
        /* enough pkts to be sent */
        if (unlikely(len == MAX_PKT_BURST)) {
@@ -618,19 +652,19 @@ inbound_sp_sa(struct sp_ctx *sp, struct sa_ctx *sa, struct traffic_type *ip,
                        continue;
                }
                if (res == DISCARD) {
-                       rte_pktmbuf_free(m);
+                       free_pkts(&m, 1);
                        continue;
                }
 
                /* Only check SPI match for processed IPSec packets */
                if (i < lim && ((m->ol_flags & PKT_RX_SEC_OFFLOAD) == 0)) {
-                       rte_pktmbuf_free(m);
+                       free_pkts(&m, 1);
                        continue;
                }
 
                sa_idx = res - 1;
                if (!inbound_sa_check(sa, m, sa_idx)) {
-                       rte_pktmbuf_free(m);
+                       free_pkts(&m, 1);
                        continue;
                }
                ip->pkts[j++] = m;
@@ -665,7 +699,7 @@ split46_traffic(struct ipsec_traffic *trf, struct rte_mbuf *mb[], uint32_t num)
                                        offsetof(struct ip6_hdr, ip6_nxt));
                        n6++;
                } else
-                       rte_pktmbuf_free(m);
+                       free_pkts(&m, 1);
        }
 
        trf->ip4.num = n4;
@@ -717,7 +751,7 @@ outbound_sp(struct sp_ctx *sp, struct traffic_type *ip,
                m = ip->pkts[i];
                sa_idx = ip->res[i] - 1;
                if (ip->res[i] == DISCARD)
-                       rte_pktmbuf_free(m);
+                       free_pkts(&m, 1);
                else if (ip->res[i] == BYPASS)
                        ip->pkts[j++] = m;
                else {
@@ -736,8 +770,7 @@ process_pkts_outbound(struct ipsec_ctx *ipsec_ctx,
        uint16_t idx, nb_pkts_out, i;
 
        /* Drop any IPsec traffic from protected ports */
-       for (i = 0; i < traffic->ipsec.num; i++)
-               rte_pktmbuf_free(traffic->ipsec.pkts[i]);
+       free_pkts(traffic->ipsec.pkts, traffic->ipsec.num);
 
        traffic->ipsec.num = 0;
 
@@ -777,14 +810,12 @@ process_pkts_inbound_nosp(struct ipsec_ctx *ipsec_ctx,
        uint32_t nb_pkts_in, i, idx;
 
        /* Drop any IPv4 traffic from unprotected ports */
-       for (i = 0; i < traffic->ip4.num; i++)
-               rte_pktmbuf_free(traffic->ip4.pkts[i]);
+       free_pkts(traffic->ip4.pkts, traffic->ip4.num);
 
        traffic->ip4.num = 0;
 
        /* Drop any IPv6 traffic from unprotected ports */
-       for (i = 0; i < traffic->ip6.num; i++)
-               rte_pktmbuf_free(traffic->ip6.pkts[i]);
+       free_pkts(traffic->ip6.pkts, traffic->ip6.num);
 
        traffic->ip6.num = 0;
 
@@ -820,8 +851,7 @@ process_pkts_outbound_nosp(struct ipsec_ctx *ipsec_ctx,
        struct ip *ip;
 
        /* Drop any IPsec traffic from protected ports */
-       for (i = 0; i < traffic->ipsec.num; i++)
-               rte_pktmbuf_free(traffic->ipsec.pkts[i]);
+       free_pkts(traffic->ipsec.pkts, traffic->ipsec.num);
 
        n = 0;
 
@@ -935,7 +965,7 @@ route4_pkts(struct rt_ctx *rt_ctx, struct rte_mbuf *pkts[], uint8_t nb_pkts)
                }
 
                if ((pkt_hop & RTE_LPM_LOOKUP_SUCCESS) == 0) {
-                       rte_pktmbuf_free(pkts[i]);
+                       free_pkts(&pkts[i], 1);
                        continue;
                }
                send_single_packet(pkts[i], pkt_hop & 0xff, IPPROTO_IP);
@@ -987,7 +1017,7 @@ route6_pkts(struct rt_ctx *rt_ctx, struct rte_mbuf *pkts[], uint8_t nb_pkts)
                }
 
                if (pkt_hop == -1) {
-                       rte_pktmbuf_free(pkts[i]);
+                       free_pkts(&pkts[i], 1);
                        continue;
                }
                send_single_packet(pkts[i], pkt_hop & 0xff, IPPROTO_IPV6);
@@ -1003,12 +1033,12 @@ process_pkts(struct lcore_conf *qconf, struct rte_mbuf **pkts,
        prepare_traffic(pkts, &traffic, nb_pkts);
 
        if (unlikely(single_sa)) {
-               if (UNPROTECTED_PORT(portid))
+               if (is_unprotected_port(portid))
                        process_pkts_inbound_nosp(&qconf->inbound, &traffic);
                else
                        process_pkts_outbound_nosp(&qconf->outbound, &traffic);
        } else {
-               if (UNPROTECTED_PORT(portid))
+               if (is_unprotected_port(portid))
                        process_pkts_inbound(&qconf->inbound, &traffic);
                else
                        process_pkts_outbound(&qconf->outbound, &traffic);
@@ -1119,8 +1149,8 @@ drain_outbound_crypto_queues(const struct lcore_conf *qconf,
 }
 
 /* main processing loop */
-static int32_t
-main_loop(__attribute__((unused)) void *dummy)
+void
+ipsec_poll_mode_worker(void)
 {
        struct rte_mbuf *pkts[MAX_PKT_BURST];
        uint32_t lcore_id;
@@ -1164,13 +1194,13 @@ main_loop(__attribute__((unused)) void *dummy)
                RTE_LOG(ERR, IPSEC,
                        "SAD cache init on lcore %u, failed with code: %d\n",
                        lcore_id, rc);
-               return rc;
+               return;
        }
 
        if (qconf->nb_rx_queue == 0) {
                RTE_LOG(DEBUG, IPSEC, "lcore %u has nothing to do\n",
                        lcore_id);
-               return 0;
+               return;
        }
 
        RTE_LOG(INFO, IPSEC, "entering main loop on lcore %u\n", lcore_id);
@@ -1183,7 +1213,7 @@ main_loop(__attribute__((unused)) void *dummy)
                        lcore_id, portid, queueid);
        }
 
-       while (1) {
+       while (!force_quit) {
                cur_tsc = rte_rdtsc();
 
                /* TX queue buffer drain */
@@ -1203,11 +1233,13 @@ main_loop(__attribute__((unused)) void *dummy)
                        nb_rx = rte_eth_rx_burst(portid, queueid,
                                        pkts, MAX_PKT_BURST);
 
-                       if (nb_rx > 0)
+                       if (nb_rx > 0) {
+                               core_stats_update_rx(nb_rx);
                                process_pkts(qconf, pkts, nb_rx, portid);
+                       }
 
                        /* dequeue and process completed crypto-ops */
-                       if (UNPROTECTED_PORT(portid))
+                       if (is_unprotected_port(portid))
                                drain_inbound_crypto_queues(qconf,
                                        &qconf->inbound);
                        else
@@ -1217,6 +1249,28 @@ main_loop(__attribute__((unused)) void *dummy)
        }
 }
 
+int
+check_flow_params(uint16_t fdir_portid, uint8_t fdir_qid)
+{
+       uint16_t i;
+       uint16_t portid;
+       uint8_t queueid;
+
+       for (i = 0; i < nb_lcore_params; ++i) {
+               portid = lcore_params_array[i].port_id;
+               if (portid == fdir_portid) {
+                       queueid = lcore_params_array[i].queue_id;
+                       if (queueid == fdir_qid)
+                               break;
+               }
+
+               if (i == nb_lcore_params - 1)
+                       return -1;
+       }
+
+       return 1;
+}
+
 static int32_t
 check_poll_mode_params(struct eh_conf *eh_conf)
 {
@@ -1313,6 +1367,7 @@ print_usage(const char *prgname)
                " [-e]"
                " [-a]"
                " [-c]"
+               " [-s NUMBER_OF_MBUFS_IN_PKT_POOL]"
                " -f CONFIG_FILE"
                " --config (port,queue,lcore)[,(port,queue,lcore)]"
                " [--single-sa SAIDX]"
@@ -1336,6 +1391,9 @@ print_usage(const char *prgname)
                "  -a enables SA SQN atomic behaviour\n"
                "  -c specifies inbound SAD cache size,\n"
                "     zero value disables the cache (default value: 128)\n"
+               "  -s number of mbufs in packet pool, if not specified number\n"
+               "     of mbufs will be calculated based on number of cores,\n"
+               "     ports and crypto queues\n"
                "  -f CONFIG_FILE: Configuration file\n"
                "  --config (port,queue,lcore): Rx queue configuration. In poll\n"
                "                               mode determines which queues from\n"
@@ -1343,8 +1401,10 @@ print_usage(const char *prgname)
                "                               In event mode this option is not used\n"
                "                               as packets are dynamically scheduled\n"
                "                               to cores by HW.\n"
-               "  --single-sa SAIDX: Use single SA index for outbound traffic,\n"
-               "                     bypassing the SP\n"
+               "  --single-sa SAIDX: In poll mode use single SA index for\n"
+               "                     outbound traffic, bypassing the SP\n"
+               "                     In event mode selects driver submode,\n"
+               "                     SA index value is ignored\n"
                "  --cryptodev_mask MASK: Hexadecimal bitmask of the crypto\n"
                "                         devices to configure\n"
                "  --transfer-mode MODE\n"
@@ -1538,7 +1598,7 @@ parse_args(int32_t argc, char **argv, struct eh_conf *eh_conf)
 
        argvopt = argv;
 
-       while ((opt = getopt_long(argc, argvopt, "aelp:Pu:f:j:w:c:",
+       while ((opt = getopt_long(argc, argvopt, "aelp:Pu:f:j:w:c:s:",
                                lgopts, &option_index)) != EOF) {
 
                switch (opt) {
@@ -1572,6 +1632,19 @@ parse_args(int32_t argc, char **argv, struct eh_conf *eh_conf)
                        cfgfile = optarg;
                        f_present = 1;
                        break;
+
+               case 's':
+                       ret = parse_decimal(optarg);
+                       if (ret < 0) {
+                               printf("Invalid number of buffers in a pool: "
+                                       "%s\n", optarg);
+                               print_usage(prgname);
+                               return -1;
+                       }
+
+                       nb_bufs_in_pool = ret;
+                       break;
+
                case 'j':
                        ret = parse_decimal(optarg);
                        if (ret < RTE_MBUF_DEFAULT_BUF_SIZE ||
@@ -1793,7 +1866,7 @@ check_all_ports_link_status(uint32_t port_mask)
                                        "Port%d Link Up - speed %u Mbps -%s\n",
                                                portid, link.link_speed,
                                (link.link_duplex == ETH_LINK_FULL_DUPLEX) ?
-                                       ("full-duplex") : ("half-duplex\n"));
+                                       ("full-duplex") : ("half-duplex"));
                                else
                                        printf("Port %d Link Down\n", portid);
                                continue;
@@ -1944,12 +2017,12 @@ check_cryptodev_mask(uint8_t cdev_id)
        return -1;
 }
 
-static int32_t
-cryptodevs_init(void)
+static uint16_t
+cryptodevs_init(uint16_t req_queue_num)
 {
        struct rte_cryptodev_config dev_conf;
        struct rte_cryptodev_qp_conf qp_conf;
-       uint16_t idx, max_nb_qps, qp, i;
+       uint16_t idx, max_nb_qps, qp, total_nb_qps, i;
        int16_t cdev_id;
        struct rte_hash_parameters params = { 0 };
 
@@ -1977,6 +2050,7 @@ cryptodevs_init(void)
        printf("lcore/cryptodev/qp mappings:\n");
 
        idx = 0;
+       total_nb_qps = 0;
        for (cdev_id = 0; cdev_id < rte_cryptodev_count(); cdev_id++) {
                struct rte_cryptodev_info cdev_info;
 
@@ -2007,18 +2081,21 @@ cryptodevs_init(void)
                        i++;
                }
 
+               qp = RTE_MIN(max_nb_qps, RTE_MAX(req_queue_num, qp));
                if (qp == 0)
                        continue;
 
+               total_nb_qps += qp;
                dev_conf.socket_id = rte_cryptodev_socket_id(cdev_id);
                dev_conf.nb_queue_pairs = qp;
                dev_conf.ff_disable = RTE_CRYPTODEV_FF_ASYMMETRIC_CRYPTO;
 
                uint32_t dev_max_sess = cdev_info.sym.max_nb_sessions;
-               if (dev_max_sess != 0 && dev_max_sess < CDEV_MP_NB_OBJS)
+               if (dev_max_sess != 0 &&
+                               dev_max_sess < get_nb_crypto_sessions())
                        rte_exit(EXIT_FAILURE,
                                "Device does not support at least %u "
-                               "sessions", CDEV_MP_NB_OBJS);
+                               "sessions", get_nb_crypto_sessions());
 
                if (rte_cryptodev_configure(cdev_id, &dev_conf))
                        rte_panic("Failed to initialize cryptodev %u\n",
@@ -2042,7 +2119,7 @@ cryptodevs_init(void)
 
        printf("\n");
 
-       return 0;
+       return total_nb_qps;
 }
 
 static void
@@ -2270,12 +2347,18 @@ session_pool_init(struct socket_ctx *ctx, int32_t socket_id, size_t sess_sz)
 {
        char mp_name[RTE_MEMPOOL_NAMESIZE];
        struct rte_mempool *sess_mp;
+       uint32_t nb_sess;
 
        snprintf(mp_name, RTE_MEMPOOL_NAMESIZE,
                        "sess_mp_%u", socket_id);
+       /*
+        * Doubled due to rte_security_session_create() uses one mempool for
+        * session and for session private data.
+        */
+       nb_sess = (get_nb_crypto_sessions() + CDEV_MP_CACHE_SZ *
+               rte_lcore_count()) * 2;
        sess_mp = rte_cryptodev_sym_session_pool_create(
-                       mp_name, CDEV_MP_NB_OBJS,
-                       sess_sz, CDEV_MP_CACHE_SZ, 0,
+                       mp_name, nb_sess, sess_sz, CDEV_MP_CACHE_SZ, 0,
                        socket_id);
        ctx->session_pool = sess_mp;
 
@@ -2292,11 +2375,18 @@ session_priv_pool_init(struct socket_ctx *ctx, int32_t socket_id,
 {
        char mp_name[RTE_MEMPOOL_NAMESIZE];
        struct rte_mempool *sess_mp;
+       uint32_t nb_sess;
 
        snprintf(mp_name, RTE_MEMPOOL_NAMESIZE,
                        "sess_mp_priv_%u", socket_id);
+       /*
+        * Doubled due to rte_security_session_create() uses one mempool for
+        * session and for session private data.
+        */
+       nb_sess = (get_nb_crypto_sessions() + CDEV_MP_CACHE_SZ *
+               rte_lcore_count()) * 2;
        sess_mp = rte_mempool_create(mp_name,
-                       CDEV_MP_NB_OBJS,
+                       nb_sess,
                        sess_sz,
                        CDEV_MP_CACHE_SZ,
                        0, NULL, NULL, NULL,
@@ -2696,20 +2786,36 @@ inline_sessions_free(struct sa_ctx *sa_ctx)
        }
 }
 
+static uint32_t
+calculate_nb_mbufs(uint16_t nb_ports, uint16_t nb_crypto_qp, uint32_t nb_rxq,
+               uint32_t nb_txq)
+{
+       return RTE_MAX((nb_rxq * nb_rxd +
+                       nb_ports * nb_lcores * MAX_PKT_BURST +
+                       nb_ports * nb_txq * nb_txd +
+                       nb_lcores * MEMPOOL_CACHE_SIZE +
+                       nb_crypto_qp * CDEV_QUEUE_DESC +
+                       nb_lcores * frag_tbl_sz *
+                       FRAG_TBL_BUCKET_ENTRIES),
+                      8192U);
+}
+
 int32_t
 main(int32_t argc, char **argv)
 {
        int32_t ret;
-       uint32_t lcore_id;
+       uint32_t lcore_id, nb_txq, nb_rxq = 0;
        uint32_t cdev_id;
        uint32_t i;
        uint8_t socket_id;
-       uint16_t portid;
+       uint16_t portid, nb_crypto_qp, nb_ports = 0;
        uint64_t req_rx_offloads[RTE_MAX_ETHPORTS];
        uint64_t req_tx_offloads[RTE_MAX_ETHPORTS];
        struct eh_conf *eh_conf = NULL;
        size_t sess_sz;
 
+       nb_bufs_in_pool = 0;
+
        /* init EAL */
        ret = rte_eal_init(argc, argv);
        if (ret < 0)
@@ -2758,6 +2864,31 @@ main(int32_t argc, char **argv)
 
        sess_sz = max_session_size();
 
+       /*
+        * In event mode request minimum number of crypto queues
+        * to be reserved equal to number of ports.
+        */
+       if (eh_conf->mode == EH_PKT_TRANSFER_MODE_EVENT)
+               nb_crypto_qp = rte_eth_dev_count_avail();
+       else
+               nb_crypto_qp = 0;
+
+       nb_crypto_qp = cryptodevs_init(nb_crypto_qp);
+
+       if (nb_bufs_in_pool == 0) {
+               RTE_ETH_FOREACH_DEV(portid) {
+                       if ((enabled_port_mask & (1 << portid)) == 0)
+                               continue;
+                       nb_ports++;
+                       nb_rxq += get_port_nb_rx_queues(portid);
+               }
+
+               nb_txq = nb_lcores;
+
+               nb_bufs_in_pool = calculate_nb_mbufs(nb_ports, nb_crypto_qp,
+                                               nb_rxq, nb_txq);
+       }
+
        for (lcore_id = 0; lcore_id < RTE_MAX_LCORE; lcore_id++) {
                if (rte_lcore_is_enabled(lcore_id) == 0)
                        continue;
@@ -2771,11 +2902,12 @@ main(int32_t argc, char **argv)
                if (socket_ctx[socket_id].mbuf_pool)
                        continue;
 
-               pool_init(&socket_ctx[socket_id], socket_id, NB_MBUF);
+               pool_init(&socket_ctx[socket_id], socket_id, nb_bufs_in_pool);
                session_pool_init(&socket_ctx[socket_id], socket_id, sess_sz);
                session_priv_pool_init(&socket_ctx[socket_id], socket_id,
                        sess_sz);
        }
+       printf("Number of mbufs in packet pool %d\n", nb_bufs_in_pool);
 
        RTE_ETH_FOREACH_DEV(portid) {
                if ((enabled_port_mask & (1 << portid)) == 0)
@@ -2787,8 +2919,6 @@ main(int32_t argc, char **argv)
                                req_tx_offloads[portid]);
        }
 
-       cryptodevs_init();
-
        /*
         * Set the enabled port mask in helper config for use by helper
         * sub-system. This will be used while initializing devices using
@@ -2851,10 +2981,18 @@ main(int32_t argc, char **argv)
                }
        }
 
+       flow_init();
+
        check_all_ports_link_status(enabled_port_mask);
 
+#if (STATS_INTERVAL > 0)
+       rte_eal_alarm_set(STATS_INTERVAL * US_PER_S, print_stats_cb, NULL);
+#else
+       RTE_LOG(INFO, IPSEC, "Stats display disabled\n");
+#endif /* STATS_INTERVAL */
+
        /* launch per-lcore init on every lcore */
-       rte_eal_mp_remote_launch(main_loop, NULL, CALL_MASTER);
+       rte_eal_mp_remote_launch(ipsec_launch_one_lcore, eh_conf, CALL_MASTER);
        RTE_LCORE_FOREACH_SLAVE(lcore_id) {
                if (rte_eal_wait_lcore(lcore_id) < 0)
                        return -1;