From patchwork Wed Nov 4 08:12:15 2015 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Alexandru Badicioiu X-Patchwork-Id: 55965 Delivered-To: patch@linaro.org Received: by 10.112.61.134 with SMTP id p6csp2279874lbr; Wed, 4 Nov 2015 00:12:42 -0800 (PST) X-Received: by 10.107.137.202 with SMTP id t71mr1860043ioi.119.1446624762446; Wed, 04 Nov 2015 00:12:42 -0800 (PST) Return-Path: Received: from lists.linaro.org (lists.linaro.org. [54.225.227.206]) by mx.google.com with ESMTP id l5si1392960igx.15.2015.11.04.00.12.41; Wed, 04 Nov 2015 00:12:42 -0800 (PST) Received-SPF: pass (google.com: domain of lng-odp-bounces@lists.linaro.org designates 54.225.227.206 as permitted sender) client-ip=54.225.227.206; Authentication-Results: mx.google.com; spf=pass (google.com: domain of lng-odp-bounces@lists.linaro.org designates 54.225.227.206 as permitted sender) smtp.mailfrom=lng-odp-bounces@lists.linaro.org Received: by lists.linaro.org (Postfix, from userid 109) id 49A7861D5D; Wed, 4 Nov 2015 08:12:41 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on ip-10-142-244-252 X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAD_ENC_HEADER,BAYES_00, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_HELO_PASS,URIBL_BLOCKED autolearn=disabled version=3.4.0 Received: from [127.0.0.1] (localhost [127.0.0.1]) by lists.linaro.org (Postfix) with ESMTP id E2C9061CB9; Wed, 4 Nov 2015 08:12:28 +0000 (UTC) X-Original-To: lng-odp@lists.linaro.org Delivered-To: lng-odp@lists.linaro.org Received: by lists.linaro.org (Postfix, from userid 109) id 818AB61D51; Wed, 4 Nov 2015 08:12:25 +0000 (UTC) Received: from na01-by2-obe.outbound.protection.outlook.com (mail-by2on0054.outbound.protection.outlook.com [207.46.100.54]) by lists.linaro.org (Postfix) with ESMTPS id F072C61C84 for ; Wed, 4 Nov 2015 08:12:22 +0000 (UTC) Received: from BLUPR0301CA0010.namprd03.prod.outlook.com (10.162.113.148) by BL2PR03MB194.namprd03.prod.outlook.com (10.255.230.142) with Microsoft SMTP Server (TLS) id 15.1.312.18; Wed, 4 Nov 2015 08:12:19 +0000 Received: from BN1AFFO11FD032.protection.gbl (2a01:111:f400:7c10::164) by BLUPR0301CA0010.outlook.office365.com (2a01:111:e400:5259::20) with Microsoft SMTP Server (TLS) id 15.1.312.18 via Frontend Transport; Wed, 4 Nov 2015 08:12:19 +0000 Authentication-Results: spf=softfail (sender IP is 192.88.168.50) smtp.mailfrom=linaro.org; linaro.org; dkim=none (message not signed) header.d=none; linaro.org; dmarc=none action=none header.from=linaro.org; Received-SPF: SoftFail (protection.outlook.com: domain of transitioning linaro.org discourages use of 192.88.168.50 as permitted sender) Received: from tx30smr01.am.freescale.net (192.88.168.50) by BN1AFFO11FD032.mail.protection.outlook.com (10.58.52.186) with Microsoft SMTP Server (TLS) id 15.1.318.9 via Frontend Transport; Wed, 4 Nov 2015 08:12:19 +0000 Received: from fsr-fed2064-008.ea.freescale.net (fsr-fed2064-008.ea.freescale.net [10.171.95.70]) by tx30smr01.am.freescale.net (8.14.3/8.14.0) with ESMTP id tA48CH0E016488; Wed, 4 Nov 2015 01:12:17 -0700 From: To: Date: Wed, 4 Nov 2015 10:12:15 +0200 Message-ID: <1446624735-2670-1-git-send-email-alexandru.badicioiu@linaro.org> X-Mailer: git-send-email 1.9.3 X-EOPAttributedMessage: 0 X-Matching-Connectors: 130910983392956602; (91ab9b29-cfa4-454e-5278-08d120cd25b8); () X-Microsoft-Exchange-Diagnostics: 1; BN1AFFO11FD032; 1:YvDaglvCpJp+YmpZ2fYno91Alf0KwbdIPXn/qBGaZvfekVH+UOz7xTjNMWCYZ2HaJNEC0uI16HnVQGiBAJJBeELRaZ3mj66+x88x/jBJvg3kUbKpRDOcFMFs9Ts1kxKt34x9MIrOxFtSbNe1wO7hsUviJaqZOkjBLpzbNZQ13AtMSvZCaZb1rElBLtvGmd0YZ1qgS14N6VFJNGVjrPOEE8+bxJffnsSrHvU9JE+fKM6E7OFSrSVGoBKQGSsGk3jUcs4+kQNmk5mFcsOesQ2nouD3Fi/QACJAuMDPx82Mu9Ih/7ghpZjbbsQUeSG0X0qw3fLn8cLAwdEgYOl1IubtbMWHpXtVwWihrLndzSR9z5p/4+oiL8F5drnY9cfF1PSY4BPPs9S2GRotvhfWTPFG6skvozPlARC9Za07qzI1kjw= X-Forefront-Antispam-Report: CIP:192.88.168.50; CTRY:US; IPV:NLI; EFV:NLI; SFV:NSPM; SFS:(10009020)(6009001)(2980300002)(189002)(199003)(48376002)(19580405001)(92566002)(19580395003)(86152002)(86362001)(575784001)(5001960100002)(77096005)(110136002)(189998001)(15975445007)(47776003)(5003940100001)(50986999)(36756003)(11100500001)(104016004)(5008740100001)(87936001)(6806005)(81156007)(5001920100001)(33646002)(97736004)(50466002)(229853001)(2351001)(5007970100001)(105596002)(50226001)(106466001); DIR:OUT; SFP:1101; SCL:1; SRVR:BL2PR03MB194; H:tx30smr01.am.freescale.net; FPR:; SPF:SoftFail; PTR:InfoDomainNonexistent; MX:1; A:1; LANG:en; MIME-Version: 1.0 X-Microsoft-Exchange-Diagnostics: 1; BL2PR03MB194; 2:C2h0/EEEc/BYsDxl7yAOtI2ryuw6I1OUSRKrptxFJgKmvLnnycGz2WOe1Ndy8iDHNBog2JNIQs0SVYZ5AsGG8JTHqNv5C3UWDeodnDYJ3ZRlN30y65LOJvFM2lmpKhe9gbIQ0o7kYkIl2zHgo0foI3A+bEGRsGup27JoUs9CY9o=; 3:N2pTAejq/dA3SuOprwz2qn+gAESVeUL/E/IXQpwsuLXv/gDbkGZ6100q2WZIVZy5X/SimYGEFALXTaT8vv4e3Q8MnpdkNV0zwRs+xKPqQE6iXv9YO08FvoQdyKDaWwOvLXrGxOZxe0V7fGIlBx40U5RTeO0THQrHflJZ3O1rCaF3taSSRMDqkUVM+3Jy+wof+S8qbLYei60uCBaQspzeJ0mcoqcdDYQFZ3TJDl/wcGw=; 25:DkMwPotEVLXStbLZtQ8X7bh4mLr1qE4wsvHa1tvcQG20cTj5PMqzWAQDMfQB4GBJJ2HkgyIvh7IWTVo2SVi199NSJMaA421V1etnPkUlhPlKjmdj/5hxSqdARiGglvRrOLF71dZetieFdEdDaNAWLGbP4S4hP/jmXh1Zy8urQULn/TvhYmftlwq1Q/yB9IvDG/aaVDLahqmsDE4nPLHvvZhGj8vEjNQugJuFl3aD2yxQ+c8451ViEvCTxRN/Rea8 X-Microsoft-Antispam: UriScan:;BCL:0;PCL:0;RULEID:;SRVR:BL2PR03MB194; X-Microsoft-Antispam-PRVS: X-Exchange-Antispam-Report-Test: UriScan:; X-Exchange-Antispam-Report-CFA-Test: BCL:0; PCL:0; RULEID:(601004)(2401047)(520078)(8121501046)(5005006)(10201501046)(3002001); SRVR:BL2PR03MB194; BCL:0; PCL:0; RULEID:(400006); SRVR:BL2PR03MB194; X-Microsoft-Exchange-Diagnostics: 1; BL2PR03MB194; 4:mG8cW1RNmpghjq73MoO6wMMIZCvnNOn/Jfcg7RBXUTiHRgxxiBke4fP6Jxybt9mbpxzQjd5SRwVcGAlsmPwqPiO8m5Cpr7VpHZmQgy8g1KPGmN9BCJSt57selV3Y2ahWCioK4nv7uRdbu+x5LLzdOMqo5qNuW5VLqEgMwShvrYAFX6cHRK8sdrGiEYE86j/glZVUdCdVrCHPBrVrHAEQcg5H5y/PMsM/RSA2mUqefSuHNDLYs8Y9IrymFtREJzdSLf7M8ZY4hmVvYP1Q7LJu8J+TXtKgN2upYUJOiLlLp53bKvVH98gEks7LJa8XSXEDkgTGPs5/U2U5HCMqP1yUAXhdwOHwvAdOmGP71prwDa/Fr7U4cpV8HSR9K4XIYSBh X-Forefront-PRVS: 0750463DC9 X-Microsoft-Exchange-Diagnostics: =?us-ascii?Q?1; BL2PR03MB194; 23:rZoHAW1HhdDUlzjy22uSIwviJ+qaJX8fjojAPvUMZM?= =?us-ascii?Q?rFrULlKazD+6Guti3wa3W9suy5GGcHr7n4L6W1O5kFE8l3AGQNrwVWOB2X+b?= =?us-ascii?Q?5oR7QzOU4PoeWhx7wqsbKQhcLl+PUlJ9fufIiPCv5/FTmYuJYjgengjguZ2x?= =?us-ascii?Q?QOr64Lm6U6+TY+axLvzmOrRKCGOHNstUDvk42PS3frRiZ8HH92rcfYDl2CaS?= =?us-ascii?Q?61PxfgEkjxaUZCHgo6uEJ1HcR9biqMk4V2lCPUp4sYdjGbveUcMorvXWWIOH?= =?us-ascii?Q?JIwLuy9hWsThRzl/E27Z+qI6K8UGe0mzZDUbY/uHJaH4KoSVkS7JBbgoTlQF?= =?us-ascii?Q?2p2FCtGjaG3zKlgqLIAfOqsYqJ2Hl6nqW9laIQ7dJUn8K0GGrp5mua6g2M7G?= =?us-ascii?Q?2Rhb0KVy3Ny46Kpj8IwR0svBE3b346ZnSaWaTMJCdvkZuEGc4ctv4Evo1DD0?= =?us-ascii?Q?NlnHwwq+PJ0y6RJWboxrYYZVnULHwr/mKkk7BNIxigv9hEesVUBNQz6pQl6j?= =?us-ascii?Q?6Yd4bTftnebrlIaphtz3k3MlttTFjK0gGynlElsA7P3IwewR/3lMW/UIjGlU?= =?us-ascii?Q?pk9xaLps8rquEo6CqvbRUZusMbteu7Vso00eh73SxDwEQGckVuPD7pqFEH8Y?= =?us-ascii?Q?9lSZaVwnm0OTPUDvaMrlR7mcW06woi9xZ6qpDyzYQbPrkqGH9t99EBJGOuWP?= =?us-ascii?Q?6HoB6IV0JH8/p9jRcuZTqGok3dLfVM0wp+cOTlgdFRPlChFs59lYAdMcZmoj?= =?us-ascii?Q?5ETgHj2keOfBPUuZPYNCVrAB9767fQGUw+3F4m1plMSvTnFG10eKAVtci+5H?= =?us-ascii?Q?mXTf2bnBCchoPtjm7Use7KXsZiJqdaqvIl4JFK5Le6vJ12cZodCQFnpkJJG7?= =?us-ascii?Q?G8fjfq/Wvk61JPBgXKrqXGaSiX+4g8M5QSYlUcSqBDAbyzNPBcsAfBRh94HI?= =?us-ascii?Q?Mz43NtUdgsRvHkfxQp7cHLLB6ixNwpk3yOvr4M16vWyySTtLk9yDANQWyqfW?= =?us-ascii?Q?ExEE8jlVyaz3ihl3H564kC?= X-Microsoft-Exchange-Diagnostics: 1; BL2PR03MB194; 5:AUqpJmCEMzdrgR3XFQPu8Z5dpJaHho7vkX8mpJIKKtLWS0M7cJ6gf/dzpbmg1dLJPjosvhdn0OPYfdYRCoDDOi5D5Jgg5pR4j+JyCHckg+g6dfKqZ8QmTJ+91Ji0068QDCfwgfYCcp1NOzOsuyqKi+dbxnX5VOCAt2vMAQv1Fvs=; 24:t1yXfI1cEv+KwyIKZ8D2Rm1Hg0Cds2H7DyQ2Y28e4jpRHE7zeBFSllXzllsa2k59N3GE7/2vSAtjyQxVLhU3WU/IEwjOJuxDaPqM7lpncJ8= SpamDiagnosticOutput: 1:23 SpamDiagnosticMetadata: NSPM X-MS-Exchange-CrossTenant-OriginalArrivalTime: 04 Nov 2015 08:12:19.1084 (UTC) X-MS-Exchange-CrossTenant-Id: 5afe0b00-7697-4969-b663-5eab37d5f47e X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=5afe0b00-7697-4969-b663-5eab37d5f47e; Ip=[192.88.168.50]; Helo=[tx30smr01.am.freescale.net] X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: BL2PR03MB194 X-Topics: crypto patch Subject: [lng-odp] [PATCH v2] test: performance: add crypto test X-BeenThere: lng-odp@lists.linaro.org X-Mailman-Version: 2.1.16 Precedence: list List-Id: "The OpenDataPlane \(ODP\) List" List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: lng-odp-bounces@lists.linaro.org Sender: "lng-odp" From: Alexandru Badicioiu Test program to measure crypto operation performance. Measures the time required to launch and get the result of ODP crypto operations in async and sync API mode with configurable payload size, crypto algorithms and iteration number. Both asynchronous scheduled and polled are supported. In scheduled mode a separate worker thread is used to get the crypto completion events. Output packet can be reused as the input of the next operation or a new packet can be allocated for each operation. Based on a previous work : https://lists.linaro.org/pipermail/lng-odp/2014-September/003251.html. Signed-off-by: Alexandru Badicioiu v1 --- - replaced cspeed with crypto - removed unused parameter core_count v2 -- - alphabetical order in Makefile.am - replaced pool params memset with init call --- test/performance/Makefile.am | 5 +- test/performance/odp_crypto.c | 935 ++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 939 insertions(+), 1 deletion(-) create mode 100644 test/performance/odp_crypto.c diff --git a/test/performance/Makefile.am b/test/performance/Makefile.am index 721615b..78374cd 100644 --- a/test/performance/Makefile.am +++ b/test/performance/Makefile.am @@ -2,7 +2,7 @@ include $(top_srcdir)/test/Makefile.inc TESTS_ENVIRONMENT += TEST_DIR=${builddir} -EXECUTABLES = odp_atomic$(EXEEXT) odp_pktio_perf$(EXEEXT) +EXECUTABLES = odp_atomic$(EXEEXT) odp_crypto$(EXEEXT) odp_pktio_perf$(EXEEXT) COMPILE_ONLY = odp_l2fwd$(EXEEXT) \ odp_scheduling$(EXEEXT) @@ -18,6 +18,8 @@ bin_PROGRAMS = $(EXECUTABLES) $(COMPILE_ONLY) odp_atomic_LDFLAGS = $(AM_LDFLAGS) -static odp_atomic_CFLAGS = $(AM_CFLAGS) -I${top_srcdir}/test +odp_crypto_LDFLAGS = $(AM_LDFLAGS) -static +odp_crypto_CFLAGS = $(AM_CFLAGS) -I${top_srcdir}/test odp_scheduling_LDFLAGS = $(AM_LDFLAGS) -static odp_scheduling_CFLAGS = $(AM_CFLAGS) -I${top_srcdir}/test @@ -25,6 +27,7 @@ noinst_HEADERS = \ $(top_srcdir)/test/test_debug.h dist_odp_atomic_SOURCES = odp_atomic.c +dist_odp_crypto_SOURCES = odp_crypto.c dist_odp_scheduling_SOURCES = odp_scheduling.c dist_odp_pktio_perf_SOURCES = odp_pktio_perf.c diff --git a/test/performance/odp_crypto.c b/test/performance/odp_crypto.c new file mode 100644 index 0000000..38f2187 --- /dev/null +++ b/test/performance/odp_crypto.c @@ -0,0 +1,935 @@ +/* Copyright (c) 2015, Linaro Limited + * All rights reserved. + * + * SPDX-License-Identifier: BSD-3-Clause + */ + +#ifndef _GNU_SOURCE +#define _GNU_SOURCE +#endif /* _GNU_SOURCE */ + +#include +#include +#include +#include +#include +#include +#include + +#include +#include + +#define app_err(fmt, ...) \ + fprintf(stderr, "%s:%d:%s(): Error: " fmt, __FILE__, \ + __LINE__, __func__, ##__VA_ARGS__) + +/** @def SHM_PKT_POOL_SIZE + * @brief Size of the shared memory block + */ +#define SHM_PKT_POOL_SIZE (512 * 2048 * 2) + +/** @def SHM_PKT_POOL_BUF_SIZE + * @brief Buffer size of the packet pool buffer + */ +#define SHM_PKT_POOL_BUF_SIZE (1024 * 32) + +static uint8_t test_iv[8] = "01234567"; + +static uint8_t test_key16[16] = { 0x01, 0x02, 0x03, 0x04, 0x05, + 0x06, 0x07, 0x08, 0x09, 0x0a, + 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, + 0x10, +}; + +static uint8_t test_key24[24] = { 0x01, 0x02, 0x03, 0x04, 0x05, + 0x06, 0x07, 0x08, 0x09, 0x0a, + 0x0b, 0x0c, 0x0d, 0x0e, 0x0f, + 0x10, 0x11, 0x12, 0x13, 0x14, + 0x15, 0x16, 0x17, 0x18 +}; + +/** + * Structure that holds template for session create call + * for different algorithms supported by test + */ +typedef struct { + const char *name; /**< Algorithm name */ + odp_crypto_session_params_t session; /**< Prefilled crypto session params */ + unsigned int hash_adjust; /**< Size of hash */ +} crypto_alg_config_t; + +/** + * Parsed command line crypto arguments. Describes test configuration. + */ +typedef struct { + /** + * If non zero prints content of packets. Enabled by -d or + * --debug option. + */ + int debug_packets; + + /** + * If non zero Try to run crypto operation in place. Note some + * implementation may not support such mode. Enabled by -n or + * --inplace option. + */ + int in_place; + + /** + * If non zeor output of previous operation taken as input for + * next encrypt operations. Enabled by -r or --reuse option. + */ + int reuse_packet; + + /** + * Maximum number of outstanding encryption requests. Note code + * poll for results over queue and if nothing is available it can + * submit more encryption requests up to maximum number specified by + * this option. Specified through -f or --flight option. + */ + int in_flight; + + /** + * Number of iteration to repeat crypto operation to get good + * average number. Specified through -i or --terations option. + * Default is 10000. + */ + int iteration_count; + + /** + * Maximum sessions. Currently is not used. + */ + int max_sessions; + + /** + * Payload size to test. If 0 set of predefined payload sizes + * is tested. Specified through -p or --payload option. + */ + int payload_length; + + /** + * Pointer to selected algorithm to test. If NULL all available + * alogorthims are tested. Name of algorithm is passed through + * -a or --algorithm option. + */ + crypto_alg_config_t *alg_config; + + /** + * Use scheduler to get completion events from crypto operation. + * Specified through -s argument. + * */ + int schedule; + + /* + * Poll completion queue for crypto completion events. + * Specified through -p argument. + */ + int poll; +} crypto_args_t; + +/* + * Helper structure that holds averages for test of one algorithm + * for given payload size. + */ +typedef struct { + /** + * Elapsed time for one crypto operation. + */ + double elapsed; + + /** + * CPU time spent pre one crypto operation by whole process + * i.e include current and all other threads in process. + * It is filled with 'getrusage(RUSAGE_SELF, ...)' call. + */ + double rusage_self; + + /** + * CPU time spent per one crypto operation by current thread + * only. It is filled with 'getrusage(RUSAGE_THREAD, ...)' + * call. + */ + double rusage_thread; +} crypto_run_result_t; + +/** + * Structure holds one snap to misc times of current process. + */ +typedef struct { + struct timeval tv; /**< Elapsed time */ + struct rusage ru_self; /**< Rusage value for whole process */ + struct rusage ru_thread; /**< Rusage value for current thread */ +} time_record_t; + +static void parse_args(int argc, char *argv[], crypto_args_t *cargs); +static void usage(char *progname); + +/** + * Set of predefined payloads. Make sure that maximum payload + * size is not bigger than SHM_PKT_POOL_BUF_SIZE. May relax when + * implementation start support segmented buffers/packets. + */ +static unsigned int payloads[] = { + 16, + 64, + 256, + 1024, + 8192, + 16384 +}; + +/** + * Set of known algorithms to test + */ +static crypto_alg_config_t algs_config[] = { + { + .name = "3des-cbc-null", + .session = { + .cipher_alg = ODP_CIPHER_ALG_3DES_CBC, + .cipher_key = { + .data = test_key24, + .length = sizeof(test_key24) + }, + .iv = { + .data = test_iv, + .length = 8, + }, + .auth_alg = ODP_AUTH_ALG_NULL + }, + }, + { + .name = "3des-cbc-hmac-md5-96", + .session = { + .cipher_alg = ODP_CIPHER_ALG_3DES_CBC, + .cipher_key = { + .data = test_key24, + .length = sizeof(test_key24) + }, + .iv = { + .data = test_iv, + .length = 8, + }, + .auth_alg = ODP_AUTH_ALG_MD5_96, + .auth_key = { + .data = test_key16, + .length = sizeof(test_key16) + } + }, + .hash_adjust = 12 + }, + { + .name = "null-hmac-md5-96", + .session = { + .cipher_alg = ODP_CIPHER_ALG_NULL, + .auth_alg = ODP_AUTH_ALG_MD5_96, + .auth_key = { + .data = test_key16, + .length = sizeof(test_key16) + } + }, + .hash_adjust = 12 + }, +}; + +/** + * Find corresponding config for given name. Returns NULL + * if config for given name is not found. + */ +static crypto_alg_config_t * +find_config_by_name(const char *name) { + unsigned int i; + crypto_alg_config_t *ret = NULL; + + for (i = 0; i < (sizeof(algs_config) / sizeof(crypto_alg_config_t)); + i++) { + if (strcmp(algs_config[i].name, name) == 0) { + ret = algs_config + i; + break; + } + } + return ret; +} + +/** + * Helper function that prints list of algorithms that this + * test understands. + */ +static void +print_config_names(const char *prefix) { + unsigned int i; + + for (i = 0; i < (sizeof(algs_config) / sizeof(crypto_alg_config_t)); + i++) { + printf("%s %s\n", prefix, algs_config[i].name); + } +} + +/** + * Snap current time values and put them into 'rec'. + */ +static void +fill_time_record(time_record_t *rec) +{ + gettimeofday(&rec->tv, NULL); + getrusage(RUSAGE_SELF, &rec->ru_self); + getrusage(RUSAGE_THREAD, &rec->ru_thread); +} + +/** + * Calculated CPU time difference for given two rusage structures. + * Note it adds user space and system time together. + */ +static unsigned long long +get_rusage_diff(struct rusage *start, struct rusage *end) +{ + unsigned long long rusage_diff; + unsigned long long rusage_start; + unsigned long long rusage_end; + + rusage_start = (start->ru_utime.tv_sec * 1000000) + + (start->ru_utime.tv_usec); + rusage_start += (start->ru_stime.tv_sec * 1000000) + + (start->ru_stime.tv_usec); + + rusage_end = (end->ru_utime.tv_sec * 1000000) + + (end->ru_utime.tv_usec); + rusage_end += (end->ru_stime.tv_sec * 1000000) + + (end->ru_stime.tv_usec); + + rusage_diff = rusage_end - rusage_start; + + return rusage_diff; +} + +/** + * Get diff for RUSAGE_SELF (whole process) between two time snap + * records. + */ +static unsigned long long +get_rusage_self_diff(time_record_t *start, time_record_t *end) +{ + return get_rusage_diff(&start->ru_self, &end->ru_self); +} + +/** + * Get diff for RUSAGE_THREAD (current thread only) between two + * time snap records. + */ +static unsigned long long +get_rusage_thread_diff(time_record_t *start, time_record_t *end) +{ + return get_rusage_diff(&start->ru_thread, &end->ru_thread); +} + +/** + * Get diff of elapsed time between two time snap records + */ +static unsigned long long +get_elapsed_usec(time_record_t *start, time_record_t *end) +{ + unsigned long long s; + unsigned long long e; + + s = (start->tv.tv_sec * 1000000) + + (start->tv.tv_usec); + e = (end->tv.tv_sec * 1000000) + + (end->tv.tv_usec); + + return e - s; +} + +#define REPORT_HEADER "\n%30.30s %15s %15s %15s %15s %15s %15s\n" +#define REPORT_LINE "%30.30s %15d %15d %15.3f %15.3f %15.3f %15d\n" + +/** + * Print header line for our report. + */ +static void +print_result_header(void) +{ + printf(REPORT_HEADER, + "algorithm", "avg over #", "payload (bytes)", "elapsed (us)", + "rusg self (us)", "rusg thrd (us)", "throughput (Kb)"); +} + +/** + * Print one line of our report. + */ +static void +print_result(crypto_args_t *cargs, + unsigned int payload_length, + crypto_alg_config_t *config, + crypto_run_result_t *result) +{ + unsigned int throughput; + + throughput = (1000000.0 / result->elapsed) * payload_length / 1024; + printf(REPORT_LINE, + config->name, cargs->iteration_count, payload_length, + result->elapsed, result->rusage_self, result->rusage_thread, + throughput); +} + +/** + * Print piece of memory with given size. + */ +static void +print_mem(const char *msg, + const unsigned char *ptr, + unsigned int len) +{ + unsigned i, j; + char c; + char line[81]; + char *p; + + if (msg) + printf("\n%s (bytes size = %d)", msg, len); + + for (i = 0; i < len; i += 16) { + p = line; + sprintf(p, "\n%04x ", i); p += 8; + + for (j = 0; j < 16; j++) { + if (i + j == len) + break; + + sprintf(p, " %02x", (ptr)[i + j]); p += 3; + } + + for (; j < 16; j++) { + sprintf(p, " "); p += 3; + } + + sprintf(p, " "); p += 3; + + for (j = 0; j < 16; j++) { + if (i + j == len) + break; + c = (ptr)[i + j]; + *p++ = (' ' <= c && c <= '~') ? c : '.'; + } + + *p = '\0'; + printf("%s", line); + } + printf("\n"); +} + +/** + * Create ODP crypto session for given config. + */ +static int +create_session_from_config(odp_crypto_session_t *session, + crypto_alg_config_t *config, + crypto_args_t *cargs) +{ + odp_crypto_session_params_t params; + enum odp_crypto_ses_create_err ses_create_rc; + odp_pool_t pkt_pool; + odp_queue_t out_queue; + + memcpy(¶ms, &config->session, sizeof(odp_crypto_session_params_t)); + params.op = ODP_CRYPTO_OP_ENCODE; + params.pref_mode = ODP_CRYPTO_SYNC; + + /* Lookup the packet pool */ + pkt_pool = odp_pool_lookup("packet_pool"); + if (pkt_pool == ODP_POOL_INVALID) { + app_err("packet_pool pool not found\n"); + return -1; + } + params.output_pool = pkt_pool; + + if (cargs->schedule || cargs->poll) { + out_queue = odp_queue_lookup("crypto-out"); + if (out_queue == ODP_QUEUE_INVALID) { + app_err("crypto-out queue not found\n"); + return -1; + } + params.compl_queue = out_queue; + + } else { + params.compl_queue = ODP_QUEUE_INVALID; + } + if (odp_crypto_session_create(¶ms, session, + &ses_create_rc)) { + app_err("crypto session create failed.\n"); + return -1; + } + + return 0; +} + +/** + * Run measurement iterations for given config and payload size. + * Result of run returned in 'result' out parameter. + */ +static int +run_measure_one(crypto_args_t *cargs, + crypto_alg_config_t *config, + odp_crypto_session_t *session, + unsigned int payload_length, + crypto_run_result_t *result) +{ + odp_crypto_op_params_t params; + + odp_pool_t pkt_pool; + odp_queue_t out_queue; + odp_packet_t pkt; + int rc = 0; + + odp_bool_t posted = 0; + + pkt_pool = odp_pool_lookup("packet_pool"); + if (pkt_pool == ODP_POOL_INVALID) { + app_err("pkt_pool not found\n"); + return -1; + } + + out_queue = odp_queue_lookup("crypto-out"); + if (cargs->schedule || cargs->poll) { + if (out_queue == ODP_QUEUE_INVALID) { + app_err("crypto-out queue not found\n"); + return -1; + } + } + + pkt = odp_packet_alloc(pkt_pool, payload_length); + if (pkt == ODP_PACKET_INVALID) { + app_err("failed to allocate buffer\n"); + return -1; + } + + void *mem = odp_packet_data(pkt); + + memset(mem, 1, payload_length); + + time_record_t start, end; + int packets_sent = 0; + int packets_received = 0; + + /* Initialize parameters block */ + memset(¶ms, 0, sizeof(params)); + params.session = *session; + + params.cipher_range.offset = 0; + params.cipher_range.length = payload_length; + + params.auth_range.offset = 0; + params.auth_range.length = payload_length; + params.hash_result_offset = payload_length; + + if (cargs->reuse_packet) { + params.pkt = pkt; + params.out_pkt = cargs->in_place ? pkt : + ODP_PACKET_INVALID; + } + + fill_time_record(&start); + + while ((packets_sent < cargs->iteration_count) || + (packets_received < cargs->iteration_count)) { + void *mem; + odp_crypto_op_result_t result; + + if ((packets_sent < cargs->iteration_count) && + (packets_sent - packets_received < + cargs->in_flight)) { + if (!cargs->reuse_packet) { + /* + * For in place test we use just one + * statically allocated buffer. + * For now in place test we have to + * allocate and initialize packet + * every time. + * Note we leaked one packet here. + */ + pkt = odp_packet_alloc(pkt_pool, + payload_length); + if (pkt == ODP_PACKET_INVALID) { + app_err("failed to allocate buffer\n"); + rc = -1; + } else { + void *mem = odp_packet_data(pkt); + + memset(mem, 1, payload_length); + } + params.pkt = pkt; + params.out_pkt = cargs->in_place ? pkt : + ODP_PACKET_INVALID; + } + + if (cargs->debug_packets) { + mem = odp_packet_data(params.pkt); + print_mem("Packet before encryption:", + mem, payload_length); + } + + rc = odp_crypto_operation(¶ms, &posted, + &result); + if (rc) + app_err("failed odp_crypto_operation: rc = %d\n", + rc); + else + packets_sent++; + } + + if (!posted) { + packets_received++; + if (cargs->debug_packets) { + mem = odp_packet_data(params.out_pkt); + print_mem("Imediately encrypted packet", mem, + payload_length + + config->hash_adjust); + } + if (!cargs->in_place) { + if (cargs->reuse_packet) { + params.pkt = params.out_pkt; + params.out_pkt = ODP_PACKET_INVALID; + } else { + odp_packet_free(params.out_pkt); + } + } + } else { + odp_event_t ev; + odp_crypto_compl_t compl; + odp_crypto_op_result_t result; + odp_packet_t out_pkt; + + if (cargs->schedule) + ev = odp_schedule(NULL, + ODP_SCHED_NO_WAIT); + else + ev = odp_queue_deq(out_queue); + + while (ev != ODP_EVENT_INVALID) { + compl = odp_crypto_compl_from_event(ev); + odp_crypto_compl_result(compl, &result); + odp_crypto_compl_free(compl); + out_pkt = result.pkt; + + if (cargs->debug_packets) { + mem = odp_packet_data(out_pkt); + print_mem("Receieved encrypted packet", + mem, + payload_length + + config->hash_adjust); + } + if (cargs->reuse_packet) { + params.pkt = out_pkt; + params.out_pkt = ODP_PACKET_INVALID; + } else { + odp_packet_free(out_pkt); + } + packets_received++; + if (cargs->schedule) + ev = odp_schedule(NULL, + ODP_SCHED_NO_WAIT); + else + ev = odp_queue_deq(out_queue); + }; + } + } + + fill_time_record(&end); + + { + double count; + + count = get_elapsed_usec(&start, &end); + result->elapsed = count / + cargs->iteration_count; + + count = get_rusage_self_diff(&start, &end); + result->rusage_self = count / + cargs->iteration_count; + + count = get_rusage_thread_diff(&start, &end); + result->rusage_thread = count / + cargs->iteration_count; + } + + return rc; +} + +/** + * Process one algorithm. Note if paload size is specicified it is + * only one run. Or iterate over set of predefined payloads. + */ +static int +run_measure_one_config(crypto_args_t *cargs, + crypto_alg_config_t *config) +{ + crypto_run_result_t result; + odp_crypto_session_t session; + int rc = 0; + + if (create_session_from_config(&session, config, cargs)) + rc = -1; + + if (!rc) { + if (cargs->payload_length) { + rc = run_measure_one(cargs, config, &session, + cargs->payload_length, &result); + if (!rc) { + print_result_header(); + print_result(cargs, cargs->payload_length, + config, &result); + } + } else { + unsigned int i; + + print_result_header(); + for (i = 0; + i < (sizeof(payloads) / sizeof(unsigned int)); + i++) { + rc = run_measure_one(cargs, config, &session, + payloads[i], &result); + if (rc) + break; + print_result(cargs, payloads[i], + config, &result); + } + } + } + + if (session != ODP_CRYPTO_SESSION_INVALID) + odp_crypto_session_destroy(session); + return rc; +} + +typedef struct thr_arg { + crypto_args_t crypto_args; + crypto_alg_config_t *crypto_alg_config; +} thr_arg_t; + +static void *run_thr_func(void *arg) +{ + thr_arg_t *thr_args = (thr_arg_t *)arg; + + run_measure_one_config(&thr_args->crypto_args, + thr_args->crypto_alg_config); + return NULL; +} + +int main(int argc, char *argv[]) +{ + crypto_args_t cargs; + odp_pool_t pool; + odp_queue_param_t qparam; + odp_pool_param_t params; + odph_linux_pthread_t thr; + odp_queue_t out_queue = ODP_QUEUE_INVALID; + thr_arg_t thr_arg; + int num_workers = 1; + odp_cpumask_t cpumask; + char cpumaskstr[ODP_CPUMASK_STR_SIZE]; + + /* Parse and store the application arguments */ + parse_args(argc, argv, &cargs); + + /* Init ODP before calling anything else */ + if (odp_init_global(NULL, NULL)) { + app_err("ODP global init failed.\n"); + exit(EXIT_FAILURE); + } + + /* Init this thread */ + odp_init_local(ODP_THREAD_WORKER); + + /* Create packet pool */ + odp_pool_param_init(¶ms); + params.pkt.seg_len = SHM_PKT_POOL_BUF_SIZE; + params.pkt.len = SHM_PKT_POOL_BUF_SIZE; + params.pkt.num = SHM_PKT_POOL_SIZE / SHM_PKT_POOL_BUF_SIZE; + params.type = ODP_POOL_PACKET; + pool = odp_pool_create("packet_pool", ¶ms); + + if (pool == ODP_POOL_INVALID) { + app_err("packet pool create failed.\n"); + exit(EXIT_FAILURE); + } + odp_pool_print(pool); + + if (cargs.schedule) { + qparam.sched.prio = ODP_SCHED_PRIO_DEFAULT; + qparam.sched.sync = ODP_SCHED_SYNC_NONE; + qparam.sched.group = ODP_SCHED_GROUP_ALL; + out_queue = odp_queue_create("crypto-out", + ODP_QUEUE_TYPE_SCHED, &qparam); + } else if (cargs.poll) { + out_queue = odp_queue_create("crypto-out", + ODP_QUEUE_TYPE_POLL, NULL); + } + if (cargs.schedule || cargs.poll) { + if (out_queue == ODP_QUEUE_INVALID) { + app_err("crypto-out queue create failed.\n"); + exit(EXIT_FAILURE); + } + } + + if (cargs.schedule) { + printf("Run in async scheduled mode\n"); + + thr_arg.crypto_args = cargs; + thr_arg.crypto_alg_config = cargs.alg_config; + num_workers = odp_cpumask_def_worker(&cpumask, + num_workers); + (void)odp_cpumask_to_str(&cpumask, cpumaskstr, + sizeof(cpumaskstr)); + printf("num worker threads: %i\n", + num_workers); + printf("first CPU: %i\n", + odp_cpumask_first(&cpumask)); + printf("cpu mask: %s\n", + cpumaskstr); + } else if (cargs.poll) { + printf("Run in async poll mode\n"); + } else { + printf("Run in sync mode\n"); + } + + if (cargs.alg_config) { + if (cargs.schedule) { + odph_linux_pthread_create(&thr, &cpumask, + run_thr_func, &thr_arg); + odph_linux_pthread_join(&thr, num_workers); + } else { + run_measure_one_config(&cargs, cargs.alg_config); + } + } else { + unsigned int i; + + for (i = 0; + i < (sizeof(algs_config) / sizeof(crypto_alg_config_t)); + i++) { + run_measure_one_config(&cargs, algs_config + i); + } + } + + return 0; +} + +static void parse_args(int argc, char *argv[], crypto_args_t *cargs) +{ + int opt; + int long_index; + static struct option longopts[] = { + {"algorithm", optional_argument, NULL, 'a'}, + {"debug", no_argument, NULL, 'd'}, + {"flight", optional_argument, NULL, 'f'}, + {"help", no_argument, NULL, 'h'}, + {"iterations", optional_argument, NULL, 'i'}, + {"inplace", no_argument, NULL, 'n'}, + {"payload", optional_argument, NULL, 'l'}, + {"sessions", optional_argument, NULL, 'm'}, + {"reuse", no_argument, NULL, 'r'}, + {"poll", no_argument, NULL, 'p'}, + {"schedule", no_argument, NULL, 's'}, + {NULL, 0, NULL, 0} + }; + + cargs->in_place = 0; + cargs->in_flight = 1; + cargs->debug_packets = 0; + cargs->iteration_count = 10000; + cargs->payload_length = 0; + cargs->alg_config = NULL; + cargs->reuse_packet = 0; + cargs->schedule = 0; + + while (1) { + opt = getopt_long(argc, argv, "+a:c:df:hi:m:nl:spr", + longopts, &long_index); + + if (opt == -1) + break; /* No more options */ + + switch (opt) { + case 'a': + cargs->alg_config = find_config_by_name(optarg); + if (!cargs->alg_config) { + printf("cannot test crypto '%s' configuration\n", + optarg); + usage(argv[0]); + exit(-1); + } + case 'd': + cargs->debug_packets = 1; + break; + case 'i': + cargs->iteration_count = atoi(optarg); + break; + case 'f': + cargs->in_flight = atoi(optarg); + break; + case 'h': + usage(argv[0]); + exit(EXIT_SUCCESS); + break; + case 'm': + cargs->max_sessions = atoi(optarg); + break; + case 'n': + cargs->in_place = 1; + break; + case 'l': + cargs->payload_length = atoi(optarg); + break; + case 'r': + cargs->reuse_packet = 1; + break; + case 's': + cargs->schedule = 1; + break; + case 'p': + cargs->poll = 1; + break; + default: + break; + } + } + + optind = 1; /* reset 'extern optind' from the getopt lib */ + + if ((cargs->in_flight > 1) && cargs->reuse_packet) { + printf("-f (in flight > 1) and -r (reuse packet) options are not compatible\n"); + usage(argv[0]); + exit(-1); + } + if (cargs->schedule && cargs->poll) { + printf("-s (schedule) and -p (poll) options are not compatible\n"); + usage(argv[0]); + exit(-1); + } +} + +/** + * Prinf usage information + */ +static void usage(char *progname) +{ + printf("\n" + "Usage: %s OPTIONS\n" + " E.g. %s -i 100000\n" + "\n" + "OpenDataPlane crypto speed measure.\n" + "Optional OPTIONS\n" + " -a, --algorithm Specify algorithm name (default all)\n" + " Supported values are:\n", + progname, progname); + + print_config_names(" "); + printf(" -d, --debug Enable dump of processed packets.\n" + " -f, --flight Max number of packet processed in parallel (default 1)\n" + " -i, --iterations Number of iterations.\n" + " -n, --inplace Encrypt on place.\n" + " -l, --payload Payload length.\n" + " -r, --reuse Output encrypted packet is passed as input\n" + " to next encrypt iteration.\n" + " -s, --schedule Use scheduler for completion events.\n" + " -p, --poll Poll completion queue for completion events.\n" + " -h, --help Display help and exit.\n" + "\n"); +}