From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by inbox.dpdk.org (Postfix) with ESMTP id 24DB1A0353 for ; Tue, 5 Nov 2019 11:14:13 +0100 (CET) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 025232BA2; Tue, 5 Nov 2019 11:14:13 +0100 (CET) Received: from us-smtp-delivery-1.mimecast.com (us-smtp-2.mimecast.com [207.211.31.81]) by dpdk.org (Postfix) with ESMTP id E77312BA2 for ; Tue, 5 Nov 2019 11:14:11 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1572948851; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=ckiHEl6uGTVq/kcEgGB0FtzJBPQWCgNP1+ZvNzSWFE8=; b=BE6wpfsLCo1R0SlPzb/lXmrNYoMfAbMbSPVqLlKRD2l9qpPEqklXjs9rhZPyQ5SCMSJf0C socM+WJHgq5FZ+LtXAlrrY2Q+pXIBpJ90JWSgk1ndyy9ILtGbfneFL28ep3i0KMZTZC0Mp 4/WszcJNA4J6qEcX6EFDkTusm1D/5A8= Received: from mail-vk1-f198.google.com (mail-vk1-f198.google.com [209.85.221.198]) (Using TLS) by relay.mimecast.com with ESMTP id us-mta-265-BEiW3eWdOXSKGWFLrcVAHw-1; Tue, 05 Nov 2019 05:14:10 -0500 Received: by mail-vk1-f198.google.com with SMTP id l24so302795vkm.17 for ; Tue, 05 Nov 2019 02:14:09 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GQWLjWn6F7uJ41CczViaQRq50iBSeCwR5cus3sSxTh4=; b=seABCSuL16o2Q+KnV+X3cCS9ZbaRcRNDiHRUYH5KbNIRbm7mjLhk1RA5SX0cBJ8yIf usdBiOD6a+TMJHj94ZhanLIjmAAE47wiveErruc1XMBdQy/RPopQ4EbK5rO7i0F4NPdP iB5tP5swVVbwLKeRHCNoICin/QfDywPY+KfAWEZDlFT39YoSixuQexSNfgHll/NiEq8Q Z6ApS+4yZLPbCPkC21fUshtSv/Bco8IcNb+4dOhDj5EXAszXgekkoQu6ziOD7H7rcpuc hG3DuA9/D2aVuGNwvuF7S+N5TdlY5nDW4M3Voav4frtjJNiVXQ+vUB92grasjRdKW+cf P9uA== X-Gm-Message-State: APjAAAU1hpwAk3hyfgDfVWCU6NMmZzX586mGv1Bkn14GtDWeWhSFMMuY QUer0f8mIJXMALyakoFGv+3dU/nfHwPvWLcCnCjjET0ybdirbHiQwE9dEMhD96SBSDffwv1abL0 eOmrmgYJa9UmYvBUqCQjeHQc= X-Received: by 2002:a1f:60ce:: with SMTP id u197mr13899663vkb.80.1572948849372; Tue, 05 Nov 2019 02:14:09 -0800 (PST) X-Google-Smtp-Source: APXvYqxHP/dNn8ukSydcdP0vbpbO2si9Y+THIAbS1uGM53+W5Rl99us2jArZeQ4SDL4aIhfxOP4PfZzy+60Y6hm2ueI= X-Received: by 2002:a1f:60ce:: with SMTP id u197mr13899650vkb.80.1572948848967; Tue, 05 Nov 2019 02:14:08 -0800 (PST) MIME-Version: 1.0 References: <20190724082031.45546-1-yasufum.o@gmail.com> <20191101090413.17997-1-yasufum.o@gmail.com> <20191101090413.17997-2-yasufum.o@gmail.com> <05605cac-693e-042a-a3cb-6506b1ec653e@intel.com> In-Reply-To: <05605cac-693e-042a-a3cb-6506b1ec653e@intel.com> From: David Marchand Date: Tue, 5 Nov 2019 11:13:57 +0100 Message-ID: To: "Burakov, Anatoly" , Yasufumi Ogawa Cc: "Ananyev, Konstantin" , dev , dpdk stable , Yasufumi Ogawa X-MC-Unique: BEiW3eWdOXSKGWFLrcVAHw-1 X-Mimecast-Spam-Score: 0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable Subject: Re: [dpdk-stable] [PATCH v6 1/1] fbarray: fix duplicated fbarray file in secondary X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Sender: "stable" Hello Anatoly, Yasufumi, On Mon, Nov 4, 2019 at 11:20 AM Burakov, Anatoly wrote: > > On 01-Nov-19 9:04 AM, yasufum.o@gmail.com wrote: > > From: Yasufumi Ogawa > > > > In secondary_msl_create_walk(), it creates a file for fbarrays with its > > PID for reserving unique name among secondary processes. However, it > > does not work if several secondaries run as app containers because each > > of containerized secondary has PID 1, and failed to reserve unique name > > other than first one. To reserve unique name in each of containers, use > > hostname in addition to PID. > > > > Cc: stable@dpdk.org We can't backport this as is, see below. > > > > Signed-off-by: Yasufumi Ogawa > > --- > > lib/librte_eal/common/include/rte_fbarray.h | 2 +- > > lib/librte_eal/linux/eal/eal_memalloc.c | 11 ++++++++--- > > 2 files changed, 9 insertions(+), 4 deletions(-) > > > > diff --git a/lib/librte_eal/common/include/rte_fbarray.h b/lib/librte_e= al/common/include/rte_fbarray.h > > index 6dccdbec9..5c2815093 100644 > > --- a/lib/librte_eal/common/include/rte_fbarray.h > > +++ b/lib/librte_eal/common/include/rte_fbarray.h > > @@ -39,7 +39,7 @@ extern "C" { > > #include > > #include > > > > -#define RTE_FBARRAY_NAME_LEN 64 > > +#define RTE_FBARRAY_NAME_LEN NAME_MAX The change on RTE_FBARRAY_NAME_LEN breaks the ABI, so we cannot backport this as is. For 19.11, we can allow this breakage, but we need an update of the release notes. Besides, what is the impact in terms of memory consumption? > > > > struct rte_fbarray { > > char name[RTE_FBARRAY_NAME_LEN]; /**< name associated with an arr= ay */ > > diff --git a/lib/librte_eal/linux/eal/eal_memalloc.c b/lib/librte_eal/l= inux/eal/eal_memalloc.c > > index af6d0d023..24f0275c9 100644 > > --- a/lib/librte_eal/linux/eal/eal_memalloc.c > > +++ b/lib/librte_eal/linux/eal/eal_memalloc.c > > @@ -1365,6 +1365,7 @@ secondary_msl_create_walk(const struct rte_memseg= _list *msl, > > struct rte_memseg_list *primary_msl, *local_msl; > > char name[PATH_MAX]; > > int msl_idx, ret; > > + char hostname[HOST_NAME_MAX] =3D { 0 }; > > > > if (msl->external) > > return 0; > > @@ -1373,9 +1374,13 @@ secondary_msl_create_walk(const struct rte_memse= g_list *msl, > > primary_msl =3D &mcfg->memsegs[msl_idx]; > > local_msl =3D &local_memsegs[msl_idx]; > > > > - /* create distinct fbarrays for each secondary */ > > - snprintf(name, RTE_FBARRAY_NAME_LEN, "%s_%i", > > - primary_msl->memseg_arr.name, getpid()); > > + /* Create distinct fbarrays for each secondary by using PID and > > + * hostname. The reason why using hostname is because PID could b= e > > + * duplicated among secondaries if it is launched in a container. > > + */ > > + gethostname(hostname, HOST_NAME_MAX); Personal preference, s/HOST_NAME_MAX/sizeof(hostname)/. hostname[] is HOST_NAME_MAX bytes long. In the worst case, we can get a non NULL terminated hostname string. " gethostname() returns the null-terminated hostname in the character array name, which has a length of len bytes. If the null-terminated hostname is too large to fit, then the name is truncated, and no error is returned (but see NOTES below). POSIX.1-2001 says that if such truncation occurs, then it is unspecified whether the returned buffer includes a terminating null byte. ... NOTES SUSv2 guarantees that "Host names are limited to 255 bytes". POSIX.1-2001 guarantees that "Host names (not including the terminating null byte) are limited to HOST_NAME_MAX bytes". On Linux, HOST_NAME_MAX is defined with the value 64, which has been the limit since Linux 1.0 (earlier kernels imposed a limit of 8 bytes). " How about making hostname[] HOST_NAME_MAX+1 bytes long? > > + snprintf(name, RTE_FBARRAY_NAME_LEN, "%s_%s_%d", > > + primary_msl->memseg_arr.name, hostname, (int)getp= id()); > > > > ret =3D rte_fbarray_init(&local_msl->memseg_arr, name, > > primary_msl->memseg_arr.len, > > > > I think the order should be reversed. Both containers and non-containers > can have their hostname set, and RTE_FBARRAY_NAME_LEN is of fairly > limited length, so if the hostname is long enough, the PID never gets > into the name string, resulting in duplicates. It is better have pid firs= t. Anatoly, On the principle, it seems better, yes. Just the comment on RTE_FBARRAY_NAME_LEN indicates that you missed the change at the top of the patch. What do you think of this change? --=20 David Marchand