From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 0FBB743B86 for ; Tue, 5 Mar 2024 10:55:16 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 0717342E32; Tue, 5 Mar 2024 10:55:16 +0100 (CET) Received: from NAM12-MW2-obe.outbound.protection.outlook.com (mail-mw2nam12on2042.outbound.protection.outlook.com [40.107.244.42]) by mails.dpdk.org (Postfix) with ESMTP id 1EE354014F for ; Tue, 5 Mar 2024 10:55:15 +0100 (CET) ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=K8i4deB/LrS+p2nTa0c7JrZB+35bTb7RigP/8Zgy6BBJby7CUDMttj7qJPIksIdalE4ge1v8RtcWVxRTShA3hgk/cf5xpMgDmjbD0b/2AgVW1f0u+2tvLTF/dEwG7oLNfmO3md9XfUWD9Ad2RvSEoR7GkKCLP4VSs0FgGY39EIpnam2tkWqTNjncjIQ7J0AyAlzpXwv0yxA9VG5enmezBfjYuCWcmrGQxJgenlNDm1krYYPoMyFJ+Flxtm2p6cI6+1TwGofEJHiD0xKqmryrCLFUVnaPmom5jpIOfrtY5pOq7tGhWdBP9CEZ57LXvfryVCP8CgW2KYXnLpn7epR2TA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=9lwjLRvhLE5NXQA7L4clq/l7+fXApI+yGRgy8T7zICQ=; b=E8ZWChQJaQQpoXgqQI0dAuwSX7XfxCz4gKikYULReL2+d6O9ycqTDSA33toWFhSuO+nA1U5ltSsUBnGy+qcaF0YFS6sou/ekEoSD1nvMgGrdiaYiBSxGHgRPtw7Q5YgN16GoxS/gB0SQGq5nR58ZDD+b4zpCGzkUN5NxF4xMhfgKu5mRK5T55pn4tUaBkg5yPFnH4ShFEF534W1PTIqubBPOVQoRqhO02QK3BrJAB8mYP15HPjmnpETOcMd93rBgd6dDzYcXeXQoMUrfVaXEpF8s5kMTItTbdG0XXP1/UlkpKBFQUCciQBOf/ZEPoMM4/++Zkhm2htfyMcgHiI0Znw== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass (sender ip is 216.228.117.161) smtp.rcpttodomain=corigine.com smtp.mailfrom=nvidia.com; dmarc=pass (p=reject sp=reject pct=100) action=none header.from=nvidia.com; dkim=none (message not signed); arc=none (0) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=Nvidia.com; s=selector2; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=9lwjLRvhLE5NXQA7L4clq/l7+fXApI+yGRgy8T7zICQ=; b=jlMnM+U1I3orFUYc8iaMNAf5zKG0W6t+e9LjciBhuyqYcnE0FhKCRzqy/AIQHtk3+m+Z8PnZCeEMa/ceahVeC2rspJz9BX6wRJ1b9ofiCkOVertWDO+9mU5vLElH5BL4qVWz9D45xb+QhX+QXEqV0bz3pGy9nE1geGrMADn4L0NOwxlux+/eUQUhureku/B8un4xQAWlZyz0zLZ/hIJaua4reRU2hFVkDR99AsDHQLvnQa4eOscF2/DW9uAzzgMccA/ZgQRw7Qq3zhELcVlruy/di70WV8+RbiKRsMvOF8bC3Uu7eA6Erz4AR2dOdo8M0NYlbcV9UnhwLwfgn0KriQ== Received: from BYAPR01CA0012.prod.exchangelabs.com (2603:10b6:a02:80::25) by SN7PR12MB7131.namprd12.prod.outlook.com (2603:10b6:806:2a3::9) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.38; Tue, 5 Mar 2024 09:55:09 +0000 Received: from SJ5PEPF000001D3.namprd05.prod.outlook.com (2603:10b6:a02:80:cafe::86) by BYAPR01CA0012.outlook.office365.com (2603:10b6:a02:80::25) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7339.39 via Frontend Transport; Tue, 5 Mar 2024 09:55:09 +0000 X-MS-Exchange-Authentication-Results: spf=pass (sender IP is 216.228.117.161) smtp.mailfrom=nvidia.com; dkim=none (message not signed) header.d=none;dmarc=pass action=none header.from=nvidia.com; Received-SPF: Pass (protection.outlook.com: domain of nvidia.com designates 216.228.117.161 as permitted sender) receiver=protection.outlook.com; client-ip=216.228.117.161; helo=mail.nvidia.com; pr=C Received: from mail.nvidia.com (216.228.117.161) by SJ5PEPF000001D3.mail.protection.outlook.com (10.167.242.55) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7362.11 via Frontend Transport; Tue, 5 Mar 2024 09:55:09 +0000 Received: from rnnvmail201.nvidia.com (10.129.68.8) by mail.nvidia.com (10.129.200.67) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.986.41; Tue, 5 Mar 2024 01:54:57 -0800 Received: from nvidia.com (10.126.231.35) by rnnvmail201.nvidia.com (10.129.68.8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1258.12; Tue, 5 Mar 2024 01:54:55 -0800 From: Xueming Li To: Chaoyong He CC: Long Wu , Peng Zhang , "dpdk stable" Subject: patch 'net/nfp: fix resource leak for exit of CoreNIC firmware' has been queued to stable release 23.11.1 Date: Tue, 5 Mar 2024 17:46:58 +0800 Message-ID: <20240305094757.439387-78-xuemingl@nvidia.com> X-Mailer: git-send-email 2.34.1 In-Reply-To: <20240305094757.439387-1-xuemingl@nvidia.com> References: <20240305094757.439387-1-xuemingl@nvidia.com> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Content-Type: text/plain X-Originating-IP: [10.126.231.35] X-ClientProxiedBy: rnnvmail202.nvidia.com (10.129.68.7) To rnnvmail201.nvidia.com (10.129.68.8) X-EOPAttributedMessage: 0 X-MS-PublicTrafficType: Email X-MS-TrafficTypeDiagnostic: SJ5PEPF000001D3:EE_|SN7PR12MB7131:EE_ X-MS-Office365-Filtering-Correlation-Id: 5dfce8e4-e21c-45d0-883b-08dc3cfa57bf X-MS-Exchange-SenderADCheck: 1 X-MS-Exchange-AntiSpam-Relay: 0 X-Microsoft-Antispam: BCL:0; X-Microsoft-Antispam-Message-Info: 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 X-Forefront-Antispam-Report: CIP:216.228.117.161; CTRY:US; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:mail.nvidia.com; PTR:dc6edge2.nvidia.com; CAT:NONE; SFS:(13230031)(36860700004)(376005)(82310400014); DIR:OUT; SFP:1101; X-OriginatorOrg: Nvidia.com X-MS-Exchange-CrossTenant-OriginalArrivalTime: 05 Mar 2024 09:55:09.1272 (UTC) X-MS-Exchange-CrossTenant-Network-Message-Id: 5dfce8e4-e21c-45d0-883b-08dc3cfa57bf X-MS-Exchange-CrossTenant-Id: 43083d15-7273-40c1-b7db-39efd9ccc17a X-MS-Exchange-CrossTenant-OriginalAttributedTenantConnectingIp: TenantId=43083d15-7273-40c1-b7db-39efd9ccc17a; Ip=[216.228.117.161]; Helo=[mail.nvidia.com] X-MS-Exchange-CrossTenant-AuthSource: SJ5PEPF000001D3.namprd05.prod.outlook.com X-MS-Exchange-CrossTenant-AuthAs: Anonymous X-MS-Exchange-CrossTenant-FromEntityHeader: HybridOnPrem X-MS-Exchange-Transport-CrossTenantHeadersStamped: SN7PR12MB7131 X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 23.11.1 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 03/31/24. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://git.dpdk.org/dpdk-stable/log/?h=23.11-staging This queued commit can be viewed at: https://git.dpdk.org/dpdk-stable/commit/?h=23.11-staging&id=e65a677895f1bd39b984971021ded9264874992d Thanks. Xueming Li --- >From e65a677895f1bd39b984971021ded9264874992d Mon Sep 17 00:00:00 2001 From: Chaoyong He Date: Mon, 4 Dec 2023 09:57:16 +0800 Subject: [PATCH] net/nfp: fix resource leak for exit of CoreNIC firmware Cc: Xueming Li [ upstream commit 66d5f53d3e1beebf31de3b3b2e15371ffe322866 ] Fix the resource leak problem in the exit logic of CoreNIC firmware. Fixes: 646ea79ce481 ("net/nfp: move PF functions into its own file") Signed-off-by: Chaoyong He Reviewed-by: Long Wu Reviewed-by: Peng Zhang --- drivers/net/nfp/nfp_ethdev.c | 91 +++++++++++++++++++++++++------- drivers/net/nfp/nfp_net_common.h | 1 + 2 files changed, 72 insertions(+), 20 deletions(-) diff --git a/drivers/net/nfp/nfp_ethdev.c b/drivers/net/nfp/nfp_ethdev.c index bb0ddf3d54..5e473d9c16 100644 --- a/drivers/net/nfp/nfp_ethdev.c +++ b/drivers/net/nfp/nfp_ethdev.c @@ -322,6 +322,55 @@ nfp_net_uninit(struct rte_eth_dev *eth_dev) nfp_cpp_area_release_free(net_hw->mac_stats_area); } +static void +nfp_cleanup_port_app_fw_nic(struct nfp_pf_dev *pf_dev, + uint8_t id) +{ + struct rte_eth_dev *eth_dev; + struct nfp_app_fw_nic *app_fw_nic; + + app_fw_nic = pf_dev->app_fw_priv; + if (app_fw_nic->ports[id] != NULL) { + eth_dev = app_fw_nic->ports[id]->eth_dev; + if (eth_dev != NULL) + nfp_net_uninit(eth_dev); + + app_fw_nic->ports[id] = NULL; + } +} + +static void +nfp_uninit_app_fw_nic(struct nfp_pf_dev *pf_dev) +{ + nfp_cpp_area_release_free(pf_dev->ctrl_area); + rte_free(pf_dev->app_fw_priv); +} + +void +nfp_pf_uninit(struct nfp_pf_dev *pf_dev) +{ + nfp_cpp_area_release_free(pf_dev->qc_area); + free(pf_dev->sym_tbl); + if (pf_dev->multi_pf.enabled) { + nfp_net_keepalive_stop(&pf_dev->multi_pf); + nfp_net_keepalive_uninit(&pf_dev->multi_pf); + } + free(pf_dev->nfp_eth_table); + free(pf_dev->hwinfo); + nfp_cpp_free(pf_dev->cpp); + rte_free(pf_dev); +} + +static int +nfp_pf_secondary_uninit(struct nfp_pf_dev *pf_dev) +{ + free(pf_dev->sym_tbl); + nfp_cpp_free(pf_dev->cpp); + rte_free(pf_dev); + + return 0; +} + /* Reset and stop device. The device can not be restarted. */ static int nfp_net_close(struct rte_eth_dev *dev) @@ -333,8 +382,19 @@ nfp_net_close(struct rte_eth_dev *dev) struct rte_pci_device *pci_dev; struct nfp_app_fw_nic *app_fw_nic; - if (rte_eal_process_type() != RTE_PROC_PRIMARY) + /* + * In secondary process, a released eth device can be found by its name + * in shared memory. + * If the state of the eth device is RTE_ETH_DEV_UNUSED, it means the + * eth device has been released. + */ + if (rte_eal_process_type() == RTE_PROC_SECONDARY) { + if (dev->state == RTE_ETH_DEV_UNUSED) + return 0; + + nfp_pf_secondary_uninit(dev->process_private); return 0; + } hw = dev->data->dev_private; pf_dev = hw->pf_dev; @@ -351,16 +411,17 @@ nfp_net_close(struct rte_eth_dev *dev) nfp_net_close_tx_queue(dev); nfp_net_close_rx_queue(dev); - /* Clear ipsec */ - nfp_ipsec_uninit(dev); - /* Cancel possible impending LSC work here before releasing the port */ rte_eal_alarm_cancel(nfp_net_dev_interrupt_delayed_handler, (void *)dev); /* Only free PF resources after all physical ports have been closed */ /* Mark this port as unused and free device priv resources */ nn_cfg_writeb(&hw->super, NFP_NET_CFG_LSC, 0xff); - app_fw_nic->ports[hw->idx] = NULL; + + if (pf_dev->app_fw_id != NFP_APP_FW_CORE_NIC) + return -EINVAL; + + nfp_cleanup_port_app_fw_nic(pf_dev, hw->idx); for (i = 0; i < app_fw_nic->total_phyports; i++) { id = nfp_function_id_get(pf_dev, i); @@ -370,26 +431,16 @@ nfp_net_close(struct rte_eth_dev *dev) return 0; } - /* Now it is safe to free all PF resources */ - PMD_INIT_LOG(INFO, "Freeing PF resources"); - if (pf_dev->multi_pf.enabled) { - nfp_net_keepalive_stop(&pf_dev->multi_pf); - nfp_net_keepalive_uninit(&pf_dev->multi_pf); - } - nfp_cpp_area_free(pf_dev->ctrl_area); - nfp_cpp_area_free(pf_dev->qc_area); - free(pf_dev->hwinfo); - free(pf_dev->sym_tbl); - nfp_cpp_free(pf_dev->cpp); - rte_free(app_fw_nic); - rte_free(pf_dev); - + /* Enable in nfp_net_start() */ rte_intr_disable(pci_dev->intr_handle); - /* Unregister callback func from eal lib */ + /* Register in nfp_net_init() */ rte_intr_callback_unregister(pci_dev->intr_handle, nfp_net_dev_interrupt_handler, (void *)dev); + nfp_uninit_app_fw_nic(pf_dev); + nfp_pf_uninit(pf_dev); + return 0; } diff --git a/drivers/net/nfp/nfp_net_common.h b/drivers/net/nfp/nfp_net_common.h index 30fea7ae02..ded491cbdc 100644 --- a/drivers/net/nfp/nfp_net_common.h +++ b/drivers/net/nfp/nfp_net_common.h @@ -272,6 +272,7 @@ int nfp_net_flow_ctrl_get(struct rte_eth_dev *dev, struct rte_eth_fc_conf *fc_conf); int nfp_net_flow_ctrl_set(struct rte_eth_dev *dev, struct rte_eth_fc_conf *fc_conf); +void nfp_pf_uninit(struct nfp_pf_dev *pf_dev); #define NFP_PRIV_TO_APP_FW_NIC(app_fw_priv)\ ((struct nfp_app_fw_nic *)app_fw_priv) -- 2.34.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2024-03-05 17:39:33.334851778 +0800 +++ 0077-net-nfp-fix-resource-leak-for-exit-of-CoreNIC-firmwa.patch 2024-03-05 17:39:30.813566494 +0800 @@ -1 +1 @@ -From 66d5f53d3e1beebf31de3b3b2e15371ffe322866 Mon Sep 17 00:00:00 2001 +From e65a677895f1bd39b984971021ded9264874992d Mon Sep 17 00:00:00 2001 @@ -4,0 +5,3 @@ +Cc: Xueming Li + +[ upstream commit 66d5f53d3e1beebf31de3b3b2e15371ffe322866 ] @@ -9 +11,0 @@ -Cc: stable@dpdk.org @@ -20 +22 @@ -index 6fdde105ba..537b4fe792 100644 +index bb0ddf3d54..5e473d9c16 100644 @@ -23 +25 @@ -@@ -329,6 +329,55 @@ nfp_net_uninit(struct rte_eth_dev *eth_dev) +@@ -322,6 +322,55 @@ nfp_net_uninit(struct rte_eth_dev *eth_dev) @@ -79 +81 @@ -@@ -340,8 +389,19 @@ nfp_net_close(struct rte_eth_dev *dev) +@@ -333,8 +382,19 @@ nfp_net_close(struct rte_eth_dev *dev) @@ -100 +102 @@ -@@ -358,16 +418,17 @@ nfp_net_close(struct rte_eth_dev *dev) +@@ -351,16 +411,17 @@ nfp_net_close(struct rte_eth_dev *dev) @@ -122 +124 @@ -@@ -377,26 +438,16 @@ nfp_net_close(struct rte_eth_dev *dev) +@@ -370,26 +431,16 @@ nfp_net_close(struct rte_eth_dev *dev)