> -----Original Message-----
> From: Akhil Goyal [mailto:akhil.go...@nxp.com]
> Sent: Wednesday, January 2, 2019 2:29 PM
> To: Ananyev, Konstantin <konstantin.anan...@intel.com>; dev@dpdk.org
> Subject: Re: [dpdk-dev] [PATCH v5 00/10] examples/ipsec-secgw: make app to 
> use ipsec library
> 
> 
> 
> On 1/2/2019 6:31 PM, Ananyev, Konstantin wrote:
> > Hi Akhil,
> >
> >> Hi Konstantin,
> >>
> >> I just got results on running the ipsec-secgw on NXP hardware.
> > Thanks for doing that.
> > We don't have NXP HW, so would need more help from you.
> >
> >> with -l option, I got a seg fault while running traffic. gdb suggest
> >> that pkt_func is not filled up and is NULL.
> >> #1  0x00000000004689bc in rte_ipsec_pkt_crypto_prepare (ss=0x17ad82d80,
> >> mb=0xffffffffe498, cop=0xffffffffdfc0, num=1)
> >>       at
> >> /home/akhil/netperf/dpdk_up/dpdk-next-crypto/arm64-dpaa-linuxapp-gcc/include/rte_ipsec.h:115
> >> (gdb)  p /x *ss
> >> $1 = {sa = 0x17ad7ea40, type = 0x3, {crypto = {ses = 0x165a4e900},
> >> security = {ses = 0x165a4e900, ctx = 0x0, ol_flags = 0x0}}, pkt_func = {
> >>       prepare = 0x0, process = 0x0}}
> >>
> > I guess I understand the reason:
> > right now rte_ipsec_session_prepare() expects that
> > for all modes except RTE_SECURITY_ACTION_TYPE_NONE
> > security.ctx to be not NULL.
> > Which as I understand is not necessary for lookaside-proto.
> > Could you try the fix below?
> > If it would work as expected, I'll include these changes into v6?
> It did not crash this time with the below fix but the performance is
> very very poor(~95% drop) if I use -l option with lookaside mode.
> I have not analyzed the issue yet. Will be doing it on Friday.

Did you run it with your previous change applied?
With drain_crypto_queues() moved under 'if (unlikely(diff_tsc > drain_tsc))'
condition?
If so, that could be the reason for such slowdown, see my other mail
regarding it.
Can you try to revert it (yes it would mean 5% drop for legacy mode)
and  try again ((yes it would mean 5% drop for legacy mode,
but we can deal with it later)?

Konstantin

> >
> > ---
> >   examples/ipsec-secgw/ipsec_process.c | 24 ++++++++++++++++++++----
> >   lib/librte_ipsec/ses.c               | 11 +++++++++--
> >   2 files changed, 29 insertions(+), 6 deletions(-)
> >
> > diff --git a/examples/ipsec-secgw/ipsec_process.c 
> > b/examples/ipsec-secgw/ipsec_process.c
> > index 7ab378f6a..e403c461a 100644
> > --- a/examples/ipsec-secgw/ipsec_process.c
> > +++ b/examples/ipsec-secgw/ipsec_process.c
> > @@ -87,19 +87,36 @@ enqueue_cop_bulk(struct cdev_qp *cqp, struct 
> > rte_crypto_op *cop[], uint32_t num)
> >   }
> >
> >   static inline int
> > -fill_ipsec_session(struct rte_ipsec_session *ss, const struct ipsec_sa *sa)
> > +fill_ipsec_session(struct rte_ipsec_session *ss, struct ipsec_ctx *ctx,
> > +   struct ipsec_sa *sa)
> >   {
> > +   int32_t rc;
> > +
> >     /* setup crypto section */
> >     if (ss->type == RTE_SECURITY_ACTION_TYPE_NONE) {
> > +           if (sa->crypto_session == NULL) {
> > +                   rc = create_session(ctx, sa);
> > +                   if (rc != 0)
> > +                           return rc;
> > +           }
> >             ss->crypto.ses = sa->crypto_session;
> >     /* setup session action type */
> >     } else {
> > +           if (sa->sec_session == NULL) {
> > +                   rc = create_session(ctx, sa);
> > +                   if (rc != 0)
> > +                           return rc;
> > +           }
> >             ss->security.ses = sa->sec_session;
> >             ss->security.ctx = sa->security_ctx;
> >             ss->security.ol_flags = sa->ol_flags;
> >     }
> >
> > -   return rte_ipsec_session_prepare(ss);
> > +   rc = rte_ipsec_session_prepare(ss);
> > +   if (rc != 0)
> > +           memset(ss, 0, sizeof(*ss));
> > +
> > +   return rc;
> >   }
> >
> >   /*
> > @@ -209,8 +226,7 @@ ipsec_process(struct ipsec_ctx *ctx, struct 
> > ipsec_traffic *trf)
> >
> >             /* no valid HW session for that SA, try to create one */
> >             if (ips->crypto.ses == NULL &&
> > -                           (create_session(ctx, sa) != 0 ||
> > -                           fill_ipsec_session(ips, sa) != 0))
> > +                           fill_ipsec_session(ips, ctx, sa) != 0)
> >                     k = 0;
> >
> >             /* process packets inline */
> > diff --git a/lib/librte_ipsec/ses.c b/lib/librte_ipsec/ses.c
> > index 562c1423e..11580970e 100644
> > --- a/lib/librte_ipsec/ses.c
> > +++ b/lib/librte_ipsec/ses.c
> > @@ -14,8 +14,15 @@ session_check(struct rte_ipsec_session *ss)
> >     if (ss->type == RTE_SECURITY_ACTION_TYPE_NONE) {
> >             if (ss->crypto.ses == NULL)
> >                     return -EINVAL;
> > -   } else if (ss->security.ses == NULL || ss->security.ctx == NULL)
> > -           return -EINVAL;
> > +   } else {
> > +           if (ss->security.ses == NULL)
> > +                   return -EINVAL;
> > +           if ((ss->type == RTE_SECURITY_ACTION_TYPE_INLINE_CRYPTO ||
> > +                           ss->type ==
> > +                           RTE_SECURITY_ACTION_TYPE_INLINE_PROTOCOL) &&
> > +                           ss->security.ctx == NULL)
> > +                   return -EINVAL;
> > +   }
> >
> >     return 0;
> >   }

Reply via email to