Received: by 2002:a05:6359:c8b:b0:c7:702f:21d4 with SMTP id go11csp4994812rwb; Wed, 21 Sep 2022 01:24:54 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5JjofY2PW5zuznl/BZUTHb6ooLO/d1ZVv0jW7E4wpu2ePJWVlArN9gmn0BNU7uvIfTzB7Z X-Received: by 2002:a17:903:2c9:b0:172:57d5:d6f0 with SMTP id s9-20020a17090302c900b0017257d5d6f0mr3718748plk.61.1663748693903; Wed, 21 Sep 2022 01:24:53 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1663748693; cv=none; d=google.com; s=arc-20160816; b=ia957yWgQujHWFMkSFhegBlLNA9OXkd2PcY9NIeR56JutLLhAHB70sLQkL16hb3vcW T3tuFvCT+uCmkXL4WziRJSXHta1d2O7IvcNJczS5NnQOcIhXn13BPEDW6j8ZOaPa6dhv vLrqV6aXLPpeeHZ3Rd6cWm6PJMU64JBl3mo4GADz7U09vDebOhhoxch9t5N2YwZgWdnP KWn3ry+78pyB6k7xCr7yA0xOLjI1KKhxO1OpBM6Kn7s4030Av23T2DcTSwQL/iOpZyMq 4cA4BfiBHJDMgH0lE8PLlxXtq1lH9Z8eZn1XvgjluqhuLApujWyRxiQtcPpeFDI9m1GV B2Vw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:subject:user-agent:mime-version:date:message-id; bh=2qd8GFKoTThj5AyDdBRDht2X+cYDebKqVP6SUH1oVBM=; b=b0Mo3+/w96y13fv0H0GSD5pjv48Zh3PI8z2EWPkgkx7772yszD18c7tL9l4SR8M6Z/ jidjg0weNaLsVRgLxpC3R9nLABXSeUN6Gxtsut4kARPzLclGaeUMxRN4v63ZV7/LigK4 a3v9Iui8H0pH5DkVI5xOsEKPWoTH4Rvijbl5c91TstNyKvgYTnghIj5jIpB+MJTrzU/g X0N+OkE0DY3cnwYIiekUhZKUmKO4UpUadW7rf/KnC/8qXL7r/VWDjgR1/J7/Rv2b2kJk KSrF48vg4jcLY933MZ0nEuLhbxBbtqEEgHhMBI6CEs5kkOEqYpYobb8GdoUsFv2zC7nc Qp3g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id 1-20020a631341000000b0043a006b10c9si2161393pgt.368.2022.09.21.01.24.42; Wed, 21 Sep 2022 01:24:53 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=huawei.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231239AbiIUIUG (ORCPT + 99 others); Wed, 21 Sep 2022 04:20:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37298 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231410AbiIUITn (ORCPT ); Wed, 21 Sep 2022 04:19:43 -0400 Received: from szxga01-in.huawei.com (szxga01-in.huawei.com [45.249.212.187]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 0B9D1895ED; Wed, 21 Sep 2022 01:19:25 -0700 (PDT) Received: from dggpemm500024.china.huawei.com (unknown [172.30.72.55]) by szxga01-in.huawei.com (SkyGuard) with ESMTP id 4MXWTT6X3SzpTtm; Wed, 21 Sep 2022 16:16:29 +0800 (CST) Received: from dggpemm500005.china.huawei.com (7.185.36.74) by dggpemm500024.china.huawei.com (7.185.36.203) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Wed, 21 Sep 2022 16:19:18 +0800 Received: from [10.67.103.158] (10.67.103.158) by dggpemm500005.china.huawei.com (7.185.36.74) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2375.31; Wed, 21 Sep 2022 16:19:18 +0800 Message-ID: <3dd984c1-d17f-0a6a-c52e-87e161f867fc@huawei.com> Date: Wed, 21 Sep 2022 16:19:18 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:102.0) Gecko/20100101 Thunderbird/102.1.2 Subject: Re: [RFC PATCH 0/6] crypto: benchmark - add the crypto benchmark To: Herbert Xu CC: , , , References: <20220919120537.39258-1-shenyang39@huawei.com> From: Yang Shen In-Reply-To: Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit X-Originating-IP: [10.67.103.158] X-ClientProxiedBy: dggems704-chm.china.huawei.com (10.3.19.181) To dggpemm500005.china.huawei.com (7.185.36.74) X-CFilter-Loop: Reflected X-Spam-Status: No, score=-7.9 required=5.0 tests=BAYES_00,NICE_REPLY_A, RCVD_IN_DNSWL_MED,SPF_HELO_NONE,SPF_PASS autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org 在 2022/9/20 16:28, Herbert Xu 写道: > On Mon, Sep 19, 2022 at 08:05:31PM +0800, Yang Shen wrote: >> Add crypto benchmark - A tool to help the users quickly get the >> performance of a algorithm registered in crypto. > Please explain how this relates to the existing speed testing > functionality in tcrypt. > > Thanks, In fact, the purpose for I is to get a crypto benchmark tool which is customizable and easy to called. For example, I test the hardware performance every rc1 to check whether the modification of the common module affects it. For me, I need to test the mutil threads, mutil numas, mutil requests of one tfm and so on. These test cases are used to simulate some service scenarios. And in these cases, I can find if any common module apply a patch that has an impact on us. I know the tcrypt.ko has the speed test cases. But the tcrypt.ko test case is fixed. If I understand correctly, the design model of tcrypt.ko is test the algorithms with determined case conditions. It can provide some standardized testing to ensure that the implementation of the algorithm meets the requirements. This is a reasonable developer test tool, but it is not flexible enough for testers and users. There are two main reasons for this: 1> For testers, the performance is not only related to algorithms and algorithm configurations. Many configurations may have obvious effect on performance which are not provided on tcrypt.ko. Of course, this problem can fix by add these as module parameters. 2> For users, a friendly tool is that they can use the tool directly rather to need to watch the source code to know how to use it. In tcrypt.ko, users need to get the 'mode' number of case they want to test if exist. So this tool's original intention is to allow users test more complex scenarios and get the parameters usage directly. If I have any misunderstanding about tcrypt.ko, please correct me. And I'll try to use the tcrytp.ko to meet my request. Thanks, Yang