4 * Copyright(c) 2017 Intel Corporation. All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * * Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * * Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in
14 * the documentation and/or other materials provided with the
16 * * Neither the name of Intel Corporation nor the names of its
17 * contributors may be used to endorse or promote products derived
18 * from this software without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
21 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
22 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
23 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
24 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
25 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
26 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
27 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
28 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
29 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
30 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
33 #include <rte_malloc.h>
35 #include "cperf_test_common.h"
37 static struct rte_mbuf *
38 cperf_mbuf_create(struct rte_mempool *mempool,
41 const struct cperf_options *options,
42 const struct cperf_test_vector *test_vector)
44 struct rte_mbuf *mbuf;
47 (options->cipher_op == RTE_CRYPTO_CIPHER_OP_ENCRYPT) ?
48 test_vector->plaintext.data :
49 test_vector->ciphertext.data;
50 uint32_t remaining_bytes = options->max_buffer_size;
52 mbuf = rte_pktmbuf_alloc(mempool);
56 mbuf_data = (uint8_t *)rte_pktmbuf_append(mbuf, segment_sz);
57 if (mbuf_data == NULL)
60 if (options->max_buffer_size <= segment_sz) {
61 memcpy(mbuf_data, test_data, options->max_buffer_size);
62 test_data += options->max_buffer_size;
65 memcpy(mbuf_data, test_data, segment_sz);
66 test_data += segment_sz;
67 remaining_bytes -= segment_sz;
71 while (remaining_bytes) {
74 m = rte_pktmbuf_alloc(mempool);
78 rte_pktmbuf_chain(mbuf, m);
80 mbuf_data = (uint8_t *)rte_pktmbuf_append(mbuf, segment_sz);
81 if (mbuf_data == NULL)
84 if (remaining_bytes <= segment_sz) {
85 memcpy(mbuf_data, test_data, remaining_bytes);
87 test_data += remaining_bytes;
89 memcpy(mbuf_data, test_data, segment_sz);
90 remaining_bytes -= segment_sz;
91 test_data += segment_sz;
97 * If there was not enough room for the digest at the end
98 * of the last segment, allocate a new one
100 if (segments_nb != 0) {
102 m = rte_pktmbuf_alloc(mempool);
107 rte_pktmbuf_chain(mbuf, m);
108 mbuf_data = (uint8_t *)rte_pktmbuf_append(mbuf, segment_sz);
109 if (mbuf_data == NULL)
116 rte_pktmbuf_free(mbuf);
122 cperf_alloc_common_memory(const struct cperf_options *options,
123 const struct cperf_test_vector *test_vector,
124 uint8_t dev_id, size_t extra_op_priv_size,
125 struct rte_mempool **pkt_mbuf_pool_in,
126 struct rte_mempool **pkt_mbuf_pool_out,
127 struct rte_mbuf ***mbufs_in,
128 struct rte_mbuf ***mbufs_out,
129 struct rte_mempool **crypto_op_pool)
131 unsigned int mbuf_idx = 0;
132 char pool_name[32] = "";
134 snprintf(pool_name, sizeof(pool_name), "cperf_pool_in_cdev_%d",
137 uint32_t max_size = options->max_buffer_size + options->digest_sz;
138 uint16_t segments_nb = (max_size % options->segment_sz) ?
139 (max_size / options->segment_sz) + 1 :
140 max_size / options->segment_sz;
142 *pkt_mbuf_pool_in = rte_pktmbuf_pool_create(pool_name,
143 options->pool_sz * segments_nb, 0, 0,
144 RTE_PKTMBUF_HEADROOM + options->segment_sz,
147 if (*pkt_mbuf_pool_in == NULL)
150 /* Generate mbufs_in with plaintext populated for test */
151 *mbufs_in = (struct rte_mbuf **)rte_malloc(NULL,
152 (sizeof(struct rte_mbuf *) * options->pool_sz), 0);
154 for (mbuf_idx = 0; mbuf_idx < options->pool_sz; mbuf_idx++) {
155 (*mbufs_in)[mbuf_idx] = cperf_mbuf_create(
159 options, test_vector);
160 if ((*mbufs_in)[mbuf_idx] == NULL)
164 *mbufs_out = (struct rte_mbuf **)rte_zmalloc(NULL,
165 (sizeof(struct rte_mbuf *) *
166 options->pool_sz), 0);
168 if (options->out_of_place == 1) {
169 snprintf(pool_name, sizeof(pool_name), "cperf_pool_out_cdev_%d",
172 *pkt_mbuf_pool_out = rte_pktmbuf_pool_create(
173 pool_name, options->pool_sz, 0, 0,
174 RTE_PKTMBUF_HEADROOM + max_size,
177 if (*pkt_mbuf_pool_out == NULL)
180 for (mbuf_idx = 0; mbuf_idx < options->pool_sz; mbuf_idx++) {
181 (*mbufs_out)[mbuf_idx] = cperf_mbuf_create(
182 *pkt_mbuf_pool_out, max_size,
183 1, options, test_vector);
184 if ((*mbufs_out)[mbuf_idx] == NULL)
189 snprintf(pool_name, sizeof(pool_name), "cperf_op_pool_cdev_%d",
192 uint16_t priv_size = RTE_ALIGN_CEIL(test_vector->cipher_iv.length +
193 test_vector->auth_iv.length + test_vector->aead_iv.length +
194 extra_op_priv_size, 16) +
195 RTE_ALIGN_CEIL(options->aead_aad_sz, 16);
197 *crypto_op_pool = rte_crypto_op_pool_create(pool_name,
198 RTE_CRYPTO_OP_TYPE_SYMMETRIC, options->pool_sz,
199 512, priv_size, rte_socket_id());
200 if (*crypto_op_pool == NULL)
207 cperf_free_common_memory(const struct cperf_options *options,
208 struct rte_mempool *pkt_mbuf_pool_in,
209 struct rte_mempool *pkt_mbuf_pool_out,
210 struct rte_mbuf **mbufs_in,
211 struct rte_mbuf **mbufs_out,
212 struct rte_mempool *crypto_op_pool)
217 while (mbufs_in[i] != NULL &&
218 i < options->pool_sz)
219 rte_pktmbuf_free(mbufs_in[i++]);
226 while (mbufs_out[i] != NULL
227 && i < options->pool_sz)
228 rte_pktmbuf_free(mbufs_out[i++]);
233 if (pkt_mbuf_pool_in)
234 rte_mempool_free(pkt_mbuf_pool_in);
236 if (pkt_mbuf_pool_out)
237 rte_mempool_free(pkt_mbuf_pool_out);
240 rte_mempool_free(crypto_op_pool);