* [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome
@ 2018-04-30 17:20 Aaron Conole
2018-04-30 17:20 ` [dpdk-stable] [PATCH 1/2] nfp: unlink the appropriate lock file Aaron Conole
` (3 more replies)
0 siblings, 4 replies; 19+ messages in thread
From: Aaron Conole @ 2018-04-30 17:20 UTC (permalink / raw)
To: stable
Cc: Alejandro Lucero, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron,
Pablo Cascon, Kevin Traynor, Adrien Mazarguil
Even when trying to use the Netronome cards via VFIO, there is a
lock file being requested, which requires root access. This series
fixes an issue with the nfp driver lock release always releasing
'nfp0' (which isn't a bug in practice for other reasons) as well
as allowing the lock file location to be configured by the application
or user via the HOME environment variable (similar to other resources
in the DPDK framework).
This series is only applicable to the stable tree because the nfp
driver is completely rewritten for later versions of DPDK.
Aaron Conole (2):
nfp: unlink the appropriate lock file
nfp: allow for non-root user
drivers/net/nfp/nfp_nfpu.c | 25 +++++++++++++++++++++----
1 file changed, 21 insertions(+), 4 deletions(-)
--
2.14.3
^ permalink raw reply [flat|nested] 19+ messages in thread
* [dpdk-stable] [PATCH 1/2] nfp: unlink the appropriate lock file
2018-04-30 17:20 [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome Aaron Conole
@ 2018-04-30 17:20 ` Aaron Conole
2018-04-30 17:20 ` [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user Aaron Conole
` (2 subsequent siblings)
3 siblings, 0 replies; 19+ messages in thread
From: Aaron Conole @ 2018-04-30 17:20 UTC (permalink / raw)
To: stable
Cc: Alejandro Lucero, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron,
Pablo Cascon, Kevin Traynor, Adrien Mazarguil
The nfpu_close needs to unlink the lock file associated with the
nfp descriptor, not lock file 0.
Fixes: d12206e00590 ("net/nfp: add NSP user space interface")
Cc: stable@dpdk.org
Signed-off-by: Aaron Conole <aconole@redhat.com>
---
drivers/net/nfp/nfp_nfpu.c | 6 +++++-
1 file changed, 5 insertions(+), 1 deletion(-)
diff --git a/drivers/net/nfp/nfp_nfpu.c b/drivers/net/nfp/nfp_nfpu.c
index f11afef35..2ed985ff4 100644
--- a/drivers/net/nfp/nfp_nfpu.c
+++ b/drivers/net/nfp/nfp_nfpu.c
@@ -101,8 +101,12 @@ nfpu_open(struct rte_pci_device *pci_dev, nfpu_desc_t *desc, int nfp)
int
nfpu_close(nfpu_desc_t *desc)
{
+ char lockname[30];
+
rte_free(desc->nspu);
close(desc->lock);
- unlink("/var/lock/nfp0");
+
+ snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d", desc->nfp);
+ unlink(lockname);
return 0;
}
--
2.14.3
^ permalink raw reply [flat|nested] 19+ messages in thread
* [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user
2018-04-30 17:20 [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome Aaron Conole
2018-04-30 17:20 ` [dpdk-stable] [PATCH 1/2] nfp: unlink the appropriate lock file Aaron Conole
@ 2018-04-30 17:20 ` Aaron Conole
2018-05-08 13:09 ` Eelco Chaudron
2018-05-09 17:05 ` Alejandro Lucero
2018-04-30 18:02 ` [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome Kevin Traynor
2018-05-01 10:36 ` Luca Boccassi
3 siblings, 2 replies; 19+ messages in thread
From: Aaron Conole @ 2018-04-30 17:20 UTC (permalink / raw)
To: stable
Cc: Alejandro Lucero, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron,
Pablo Cascon, Kevin Traynor, Adrien Mazarguil
Currently, the nfp lock files are taken from the global lock file
location, which will work when the user is running as root. However,
some distributions and applications (notably ovs 2.8+ on RHEL/Fedora)
run as a non-root user.
Acked-by: Alejandro Lucero <alejandro.lucero@netronome.com>
Signed-off-by: Aaron Conole <aconole@redhat.com>
---
drivers/net/nfp/nfp_nfpu.c | 23 ++++++++++++++++++-----
1 file changed, 18 insertions(+), 5 deletions(-)
diff --git a/drivers/net/nfp/nfp_nfpu.c b/drivers/net/nfp/nfp_nfpu.c
index 2ed985ff4..ae2e07220 100644
--- a/drivers/net/nfp/nfp_nfpu.c
+++ b/drivers/net/nfp/nfp_nfpu.c
@@ -18,6 +18,22 @@
#define NFP_CFG_EXP_BAR 7
#define NFP_CFG_EXP_BAR_CFG_BASE 0x30000
+#define NFP_LOCKFILE_PATH_FMT "%s/nfp%d"
+
+/* get nfp lock file path (/var/lock if root, $HOME otherwise) */
+static void
+nspu_get_lockfile_path(char *buffer, int bufsz, nfpu_desc_t *desc)
+{
+ const char *dir = "/var/lock";
+ const char *home_dir = getenv("HOME");
+
+ if (getuid() != 0 && home_dir != NULL)
+ dir = home_dir;
+
+ /* use current prefix as file path */
+ snprintf(buffer, bufsz, NFP_LOCKFILE_PATH_FMT, dir,
+ desc->nfp);
+}
/* There could be other NFP userspace tools using the NSP interface.
* Make sure there is no other process using it and locking the access for
@@ -30,9 +46,7 @@ nspv_aquire_process_lock(nfpu_desc_t *desc)
struct flock lock;
char lockname[30];
- memset(&lock, 0, sizeof(lock));
-
- snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d", desc->nfp);
+ nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
/* Using S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH */
desc->lock = open(lockname, O_RDWR | O_CREAT, 0666);
@@ -106,7 +120,6 @@ nfpu_close(nfpu_desc_t *desc)
rte_free(desc->nspu);
close(desc->lock);
- snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d", desc->nfp);
- unlink(lockname);
+ nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
return 0;
}
--
2.14.3
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome
2018-04-30 17:20 [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome Aaron Conole
2018-04-30 17:20 ` [dpdk-stable] [PATCH 1/2] nfp: unlink the appropriate lock file Aaron Conole
2018-04-30 17:20 ` [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user Aaron Conole
@ 2018-04-30 18:02 ` Kevin Traynor
2018-05-06 6:34 ` Yuanhan Liu
2018-05-01 10:36 ` Luca Boccassi
3 siblings, 1 reply; 19+ messages in thread
From: Kevin Traynor @ 2018-04-30 18:02 UTC (permalink / raw)
To: Aaron Conole, stable
Cc: Alejandro Lucero, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron,
Pablo Cascon, Adrien Mazarguil
On 04/30/2018 06:20 PM, Aaron Conole wrote:
> Even when trying to use the Netronome cards via VFIO, there is a
> lock file being requested, which requires root access. This series
> fixes an issue with the nfp driver lock release always releasing
> 'nfp0' (which isn't a bug in practice for other reasons) as well
> as allowing the lock file location to be configured by the application
> or user via the HOME environment variable (similar to other resources
> in the DPDK framework).
>
> This series is only applicable to the stable tree because the nfp
> driver is completely rewritten for later versions of DPDK.
>
Hi Yuanhan, I think we would like to get this into the next 17.11 stable
release if possible. Not sure when you are merging patches into the tree
for it?
Kevin.
> Aaron Conole (2):
> nfp: unlink the appropriate lock file
> nfp: allow for non-root user
>
> drivers/net/nfp/nfp_nfpu.c | 25 +++++++++++++++++++++----
> 1 file changed, 21 insertions(+), 4 deletions(-)
>
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome
2018-04-30 17:20 [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome Aaron Conole
` (2 preceding siblings ...)
2018-04-30 18:02 ` [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome Kevin Traynor
@ 2018-05-01 10:36 ` Luca Boccassi
2018-05-03 10:30 ` Luca Boccassi
3 siblings, 1 reply; 19+ messages in thread
From: Luca Boccassi @ 2018-05-01 10:36 UTC (permalink / raw)
To: Aaron Conole, stable
Cc: Alejandro Lucero, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron,
Pablo Cascon, Kevin Traynor, Adrien Mazarguil
On Mon, 2018-04-30 at 13:20 -0400, Aaron Conole wrote:
> Even when trying to use the Netronome cards via VFIO, there is a
> lock file being requested, which requires root access. This series
> fixes an issue with the nfp driver lock release always releasing
> 'nfp0' (which isn't a bug in practice for other reasons) as well
> as allowing the lock file location to be configured by the
> application
> or user via the HOME environment variable (similar to other resources
> in the DPDK framework).
>
> This series is only applicable to the stable tree because the nfp
> driver is completely rewritten for later versions of DPDK.
>
> Aaron Conole (2):
> nfp: unlink the appropriate lock file
> nfp: allow for non-root user
>
> drivers/net/nfp/nfp_nfpu.c | 25 +++++++++++++++++++++----
> 1 file changed, 21 insertions(+), 4 deletions(-)
Series applied to 18.02, thanks.
--
Kind regards,
Luca Boccassi
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome
2018-05-01 10:36 ` Luca Boccassi
@ 2018-05-03 10:30 ` Luca Boccassi
2018-05-03 12:25 ` Alejandro Lucero
0 siblings, 1 reply; 19+ messages in thread
From: Luca Boccassi @ 2018-05-03 10:30 UTC (permalink / raw)
To: Aaron Conole, stable
Cc: Alejandro Lucero, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron,
Pablo Cascon, Kevin Traynor, Adrien Mazarguil
On Tue, 2018-05-01 at 11:36 +0100, Luca Boccassi wrote:
> On Mon, 2018-04-30 at 13:20 -0400, Aaron Conole wrote:
> > Even when trying to use the Netronome cards via VFIO, there is a
> > lock file being requested, which requires root access. This series
> > fixes an issue with the nfp driver lock release always releasing
> > 'nfp0' (which isn't a bug in practice for other reasons) as well
> > as allowing the lock file location to be configured by the
> > application
> > or user via the HOME environment variable (similar to other
> > resources
> > in the DPDK framework).
> >
> > This series is only applicable to the stable tree because the nfp
> > driver is completely rewritten for later versions of DPDK.
> >
> > Aaron Conole (2):
> > nfp: unlink the appropriate lock file
> > nfp: allow for non-root user
> >
> > drivers/net/nfp/nfp_nfpu.c | 25 +++++++++++++++++++++----
> > 1 file changed, 21 insertions(+), 4 deletions(-)
>
> Series applied to 18.02, thanks.
I just noticed this is not in dpdk/master yet, is it scheduled for a
later release?
--
Kind regards,
Luca Boccassi
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome
2018-05-03 10:30 ` Luca Boccassi
@ 2018-05-03 12:25 ` Alejandro Lucero
2018-05-03 12:57 ` Luca Boccassi
0 siblings, 1 reply; 19+ messages in thread
From: Alejandro Lucero @ 2018-05-03 12:25 UTC (permalink / raw)
To: Luca Boccassi
Cc: Aaron Conole, stable, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron,
Pablo Cascon, Kevin Traynor, Adrien Mazarguil
This fixes can not be applied to master because that code was changed and
it is not there anymore.
So it these fixes are going to be applied just to stable versions.
On Thu, May 3, 2018 at 11:30 AM, Luca Boccassi <bluca@debian.org> wrote:
> On Tue, 2018-05-01 at 11:36 +0100, Luca Boccassi wrote:
> > On Mon, 2018-04-30 at 13:20 -0400, Aaron Conole wrote:
> > > Even when trying to use the Netronome cards via VFIO, there is a
> > > lock file being requested, which requires root access. This series
> > > fixes an issue with the nfp driver lock release always releasing
> > > 'nfp0' (which isn't a bug in practice for other reasons) as well
> > > as allowing the lock file location to be configured by the
> > > application
> > > or user via the HOME environment variable (similar to other
> > > resources
> > > in the DPDK framework).
> > >
> > > This series is only applicable to the stable tree because the nfp
> > > driver is completely rewritten for later versions of DPDK.
> > >
> > > Aaron Conole (2):
> > > nfp: unlink the appropriate lock file
> > > nfp: allow for non-root user
> > >
> > > drivers/net/nfp/nfp_nfpu.c | 25 +++++++++++++++++++++----
> > > 1 file changed, 21 insertions(+), 4 deletions(-)
> >
> > Series applied to 18.02, thanks.
>
> I just noticed this is not in dpdk/master yet, is it scheduled for a
> later release?
>
> --
> Kind regards,
> Luca Boccassi
>
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome
2018-05-03 12:25 ` Alejandro Lucero
@ 2018-05-03 12:57 ` Luca Boccassi
0 siblings, 0 replies; 19+ messages in thread
From: Luca Boccassi @ 2018-05-03 12:57 UTC (permalink / raw)
To: Alejandro Lucero
Cc: Aaron Conole, stable, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron,
Pablo Cascon, Kevin Traynor, Adrien Mazarguil
On Thu, 2018-05-03 at 13:25 +0100, Alejandro Lucero wrote:
> This fixes can not be applied to master because that code was changed
> and
> it is not there anymore.
>
> So it these fixes are going to be applied just to stable versions.
Ok, makese sense, thanks. Will push to 18.02.2 with the next batch.
> On Thu, May 3, 2018 at 11:30 AM, Luca Boccassi <bluca@debian.org>
> wrote:
>
> > On Tue, 2018-05-01 at 11:36 +0100, Luca Boccassi wrote:
> > > On Mon, 2018-04-30 at 13:20 -0400, Aaron Conole wrote:
> > > > Even when trying to use the Netronome cards via VFIO, there is
> > > > a
> > > > lock file being requested, which requires root access. This
> > > > series
> > > > fixes an issue with the nfp driver lock release always
> > > > releasing
> > > > 'nfp0' (which isn't a bug in practice for other reasons) as
> > > > well
> > > > as allowing the lock file location to be configured by the
> > > > application
> > > > or user via the HOME environment variable (similar to other
> > > > resources
> > > > in the DPDK framework).
> > > >
> > > > This series is only applicable to the stable tree because the
> > > > nfp
> > > > driver is completely rewritten for later versions of DPDK.
> > > >
> > > > Aaron Conole (2):
> > > > nfp: unlink the appropriate lock file
> > > > nfp: allow for non-root user
> > > >
> > > > drivers/net/nfp/nfp_nfpu.c | 25 +++++++++++++++++++++----
> > > > 1 file changed, 21 insertions(+), 4 deletions(-)
> > >
> > > Series applied to 18.02, thanks.
> >
> > I just noticed this is not in dpdk/master yet, is it scheduled for
> > a
> > later release?
> >
> > --
> > Kind regards,
> > Luca Boccassi
> >
--
Kind regards,
Luca Boccassi
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome
2018-04-30 18:02 ` [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome Kevin Traynor
@ 2018-05-06 6:34 ` Yuanhan Liu
2018-05-08 9:23 ` Kevin Traynor
0 siblings, 1 reply; 19+ messages in thread
From: Yuanhan Liu @ 2018-05-06 6:34 UTC (permalink / raw)
To: Kevin Traynor
Cc: Aaron Conole, stable, Alejandro Lucero, Ferruh Yigit,
Eelco Chaudron, Pablo Cascon, Adrien Mazarguil
On Mon, Apr 30, 2018 at 07:02:29PM +0100, Kevin Traynor wrote:
> On 04/30/2018 06:20 PM, Aaron Conole wrote:
> > Even when trying to use the Netronome cards via VFIO, there is a
> > lock file being requested, which requires root access. This series
> > fixes an issue with the nfp driver lock release always releasing
> > 'nfp0' (which isn't a bug in practice for other reasons) as well
> > as allowing the lock file location to be configured by the application
> > or user via the HOME environment variable (similar to other resources
> > in the DPDK framework).
> >
> > This series is only applicable to the stable tree because the nfp
> > driver is completely rewritten for later versions of DPDK.
> >
>
> Hi Yuanhan, I think we would like to get this into the next 17.11 stable
> release if possible. Not sure when you are merging patches into the tree
> for it?
Hi,
I have just applied it to dpdk-stable/17.11. It will be part of 17.11.3
LTS release.
Thanks.
--yliu
>
> Kevin.
>
> > Aaron Conole (2):
> > nfp: unlink the appropriate lock file
> > nfp: allow for non-root user
> >
> > drivers/net/nfp/nfp_nfpu.c | 25 +++++++++++++++++++++----
> > 1 file changed, 21 insertions(+), 4 deletions(-)
> >
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome
2018-05-06 6:34 ` Yuanhan Liu
@ 2018-05-08 9:23 ` Kevin Traynor
2018-05-14 14:23 ` Kevin Traynor
0 siblings, 1 reply; 19+ messages in thread
From: Kevin Traynor @ 2018-05-08 9:23 UTC (permalink / raw)
To: Yuanhan Liu
Cc: Aaron Conole, stable, Alejandro Lucero, Ferruh Yigit,
Eelco Chaudron, Pablo Cascon, Adrien Mazarguil
On 05/06/2018 07:34 AM, Yuanhan Liu wrote:
> On Mon, Apr 30, 2018 at 07:02:29PM +0100, Kevin Traynor wrote:
>> On 04/30/2018 06:20 PM, Aaron Conole wrote:
>>> Even when trying to use the Netronome cards via VFIO, there is a
>>> lock file being requested, which requires root access. This series
>>> fixes an issue with the nfp driver lock release always releasing
>>> 'nfp0' (which isn't a bug in practice for other reasons) as well
>>> as allowing the lock file location to be configured by the application
>>> or user via the HOME environment variable (similar to other resources
>>> in the DPDK framework).
>>>
>>> This series is only applicable to the stable tree because the nfp
>>> driver is completely rewritten for later versions of DPDK.
>>>
>>
>> Hi Yuanhan, I think we would like to get this into the next 17.11 stable
>> release if possible. Not sure when you are merging patches into the tree
>> for it?
>
> Hi,
>
> I have just applied it to dpdk-stable/17.11. It will be part of 17.11.3
> LTS release.
>
Hi,
They don't appear to be on the branch? Maybe you have a private 'next'
branch or something in your workflow, but reporting in case something
still needs to be pushed.
thanks,
Kevin.
> Thanks.
>
> --yliu
>>
>> Kevin.
>>
>>> Aaron Conole (2):
>>> nfp: unlink the appropriate lock file
>>> nfp: allow for non-root user
>>>
>>> drivers/net/nfp/nfp_nfpu.c | 25 +++++++++++++++++++++----
>>> 1 file changed, 21 insertions(+), 4 deletions(-)
>>>
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user
2018-04-30 17:20 ` [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user Aaron Conole
@ 2018-05-08 13:09 ` Eelco Chaudron
2018-05-08 13:20 ` Aaron Conole
2018-05-09 17:05 ` Alejandro Lucero
1 sibling, 1 reply; 19+ messages in thread
From: Eelco Chaudron @ 2018-05-08 13:09 UTC (permalink / raw)
To: Aaron Conole, stable
Cc: Alejandro Lucero, Ferruh Yigit, Yuanhan Liu, Pablo Cascon,
Kevin Traynor, Adrien Mazarguil
On 30/04/18 19:20, Aaron Conole wrote:
> Currently, the nfp lock files are taken from the global lock file
> location, which will work when the user is running as root. However,
> some distributions and applications (notably ovs 2.8+ on RHEL/Fedora)
> run as a non-root user.
>
> Acked-by: Alejandro Lucero <alejandro.lucero@netronome.com>
> Signed-off-by: Aaron Conole <aconole@redhat.com>
> ---
> drivers/net/nfp/nfp_nfpu.c | 23 ++++++++++++++++++-----
> 1 file changed, 18 insertions(+), 5 deletions(-)
>
> diff --git a/drivers/net/nfp/nfp_nfpu.c b/drivers/net/nfp/nfp_nfpu.c
> index 2ed985ff4..ae2e07220 100644
> --- a/drivers/net/nfp/nfp_nfpu.c
> +++ b/drivers/net/nfp/nfp_nfpu.c
> @@ -18,6 +18,22 @@
> #define NFP_CFG_EXP_BAR 7
>
> #define NFP_CFG_EXP_BAR_CFG_BASE 0x30000
> +#define NFP_LOCKFILE_PATH_FMT "%s/nfp%d"
> +
> +/* get nfp lock file path (/var/lock if root, $HOME otherwise) */
> +static void
> +nspu_get_lockfile_path(char *buffer, int bufsz, nfpu_desc_t *desc)
> +{
> + const char *dir = "/var/lock";
> + const char *home_dir = getenv("HOME");
> +
> + if (getuid() != 0 && home_dir != NULL)
> + dir = home_dir;
> +
> + /* use current prefix as file path */
> + snprintf(buffer, bufsz, NFP_LOCKFILE_PATH_FMT, dir,
> + desc->nfp);
> +}
>
> /* There could be other NFP userspace tools using the NSP interface.
> * Make sure there is no other process using it and locking the access for
> @@ -30,9 +46,7 @@ nspv_aquire_process_lock(nfpu_desc_t *desc)
> struct flock lock;
> char lockname[30];
>
> - memset(&lock, 0, sizeof(lock));
> -
> - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d", desc->nfp);
> + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
>
> /* Using S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH */
> desc->lock = open(lockname, O_RDWR | O_CREAT, 0666);
> @@ -106,7 +120,6 @@ nfpu_close(nfpu_desc_t *desc)
> rte_free(desc->nspu);
> close(desc->lock);
>
> - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d", desc->nfp);
> - unlink(lockname);
Sorry for being late, but was this unlink() removed by accident? And
should be below nspu_get_lockfile_path()
> + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
> return 0;
> }
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user
2018-05-08 13:09 ` Eelco Chaudron
@ 2018-05-08 13:20 ` Aaron Conole
0 siblings, 0 replies; 19+ messages in thread
From: Aaron Conole @ 2018-05-08 13:20 UTC (permalink / raw)
To: Eelco Chaudron
Cc: stable, Alejandro Lucero, Ferruh Yigit, Yuanhan Liu,
Pablo Cascon, Kevin Traynor, Adrien Mazarguil
Eelco Chaudron <echaudro@redhat.com> writes:
> On 30/04/18 19:20, Aaron Conole wrote:
>> Currently, the nfp lock files are taken from the global lock file
>> location, which will work when the user is running as root. However,
>> some distributions and applications (notably ovs 2.8+ on RHEL/Fedora)
>> run as a non-root user.
>>
>> Acked-by: Alejandro Lucero <alejandro.lucero@netronome.com>
>> Signed-off-by: Aaron Conole <aconole@redhat.com>
>> ---
>> drivers/net/nfp/nfp_nfpu.c | 23 ++++++++++++++++++-----
>> 1 file changed, 18 insertions(+), 5 deletions(-)
>>
>> diff --git a/drivers/net/nfp/nfp_nfpu.c b/drivers/net/nfp/nfp_nfpu.c
>> index 2ed985ff4..ae2e07220 100644
>> --- a/drivers/net/nfp/nfp_nfpu.c
>> +++ b/drivers/net/nfp/nfp_nfpu.c
>> @@ -18,6 +18,22 @@
>> #define NFP_CFG_EXP_BAR 7
>> #define NFP_CFG_EXP_BAR_CFG_BASE 0x30000
>> +#define NFP_LOCKFILE_PATH_FMT "%s/nfp%d"
>> +
>> +/* get nfp lock file path (/var/lock if root, $HOME otherwise) */
>> +static void
>> +nspu_get_lockfile_path(char *buffer, int bufsz, nfpu_desc_t *desc)
>> +{
>> + const char *dir = "/var/lock";
>> + const char *home_dir = getenv("HOME");
>> +
>> + if (getuid() != 0 && home_dir != NULL)
>> + dir = home_dir;
>> +
>> + /* use current prefix as file path */
>> + snprintf(buffer, bufsz, NFP_LOCKFILE_PATH_FMT, dir,
>> + desc->nfp);
>> +}
>> /* There could be other NFP userspace tools using the NSP
>> interface.
>> * Make sure there is no other process using it and locking the access for
>> @@ -30,9 +46,7 @@ nspv_aquire_process_lock(nfpu_desc_t *desc)
>> struct flock lock;
>> char lockname[30];
>> - memset(&lock, 0, sizeof(lock));
>> -
>> - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d", desc->nfp);
>> + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
>> /* Using S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH |
>> S_IWOTH */
>> desc->lock = open(lockname, O_RDWR | O_CREAT, 0666);
>> @@ -106,7 +120,6 @@ nfpu_close(nfpu_desc_t *desc)
>> rte_free(desc->nspu);
>> close(desc->lock);
>> - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d",
>> desc->nfp);
>> - unlink(lockname);
> Sorry for being late, but was this unlink() removed by accident? And
> should be below nspu_get_lockfile_path()
That looks like a bug. If you have a patch already to go, please submit
it. If not, I can cook one up.
Thanks for the catch, Eelco!
>> + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
>> return 0;
>> }
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user
2018-04-30 17:20 ` [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user Aaron Conole
2018-05-08 13:09 ` Eelco Chaudron
@ 2018-05-09 17:05 ` Alejandro Lucero
2018-05-09 17:53 ` Aaron Conole
1 sibling, 1 reply; 19+ messages in thread
From: Alejandro Lucero @ 2018-05-09 17:05 UTC (permalink / raw)
To: Aaron Conole
Cc: stable, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron, Pablo Cascon,
Kevin Traynor, Adrien Mazarguil
I have been thinking about this, and there was something that did not seem
right to me, although I could not explain what exactly. But this was
because we have been thinking about VFIO and we have forgotten UIO. The
point is, the lock is not required with VFIO but it is with UIO, and I'm
afraid the way we are trying to solve the non-root user problem is not the
right one.
With VFIO the BARs mapping is done through the kernel VFIO driver, so once
the device is bound to the driver, and someone tries to use that device,
the VFIO driver ensures there will not be another user trying to access the
device. However, with UIO the driver is not doing the BAR mapping but it is
the app using the sysfs resource files for that device. It could be, and in
fact it is easy to happen, two DPDK apps using the same device, because
with DPDK apps there is no awareness of what other DPDK apps are doing. It
is in this case where the lock is required, and creating the lock file in
the user's home directory is not going to help.
I know RH is just interested in using VFIO, but there are other potential
NFP PMD users who may want to use UIO instead, and the current solution
does not offer the right protection in that case. Maybe the lock patch
could be created based on the driver the device is bound to, leaving
/var/lock for UIO and the suggested path for the VFIO case. Or even no lock
at all for the VFIO case.
On Mon, Apr 30, 2018 at 6:20 PM, Aaron Conole <aconole@redhat.com> wrote:
> Currently, the nfp lock files are taken from the global lock file
> location, which will work when the user is running as root. However,
> some distributions and applications (notably ovs 2.8+ on RHEL/Fedora)
> run as a non-root user.
>
> Acked-by: Alejandro Lucero <alejandro.lucero@netronome.com>
> Signed-off-by: Aaron Conole <aconole@redhat.com>
> ---
> drivers/net/nfp/nfp_nfpu.c | 23 ++++++++++++++++++-----
> 1 file changed, 18 insertions(+), 5 deletions(-)
>
> diff --git a/drivers/net/nfp/nfp_nfpu.c b/drivers/net/nfp/nfp_nfpu.c
> index 2ed985ff4..ae2e07220 100644
> --- a/drivers/net/nfp/nfp_nfpu.c
> +++ b/drivers/net/nfp/nfp_nfpu.c
> @@ -18,6 +18,22 @@
> #define NFP_CFG_EXP_BAR 7
>
> #define NFP_CFG_EXP_BAR_CFG_BASE 0x30000
> +#define NFP_LOCKFILE_PATH_FMT "%s/nfp%d"
> +
> +/* get nfp lock file path (/var/lock if root, $HOME otherwise) */
> +static void
> +nspu_get_lockfile_path(char *buffer, int bufsz, nfpu_desc_t *desc)
> +{
> + const char *dir = "/var/lock";
> + const char *home_dir = getenv("HOME");
> +
> + if (getuid() != 0 && home_dir != NULL)
> + dir = home_dir;
> +
> + /* use current prefix as file path */
> + snprintf(buffer, bufsz, NFP_LOCKFILE_PATH_FMT, dir,
> + desc->nfp);
> +}
>
> /* There could be other NFP userspace tools using the NSP interface.
> * Make sure there is no other process using it and locking the access for
> @@ -30,9 +46,7 @@ nspv_aquire_process_lock(nfpu_desc_t *desc)
> struct flock lock;
> char lockname[30];
>
> - memset(&lock, 0, sizeof(lock));
> -
> - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d", desc->nfp);
> + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
>
> /* Using S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH
> */
> desc->lock = open(lockname, O_RDWR | O_CREAT, 0666);
> @@ -106,7 +120,6 @@ nfpu_close(nfpu_desc_t *desc)
> rte_free(desc->nspu);
> close(desc->lock);
>
> - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d", desc->nfp);
> - unlink(lockname);
> + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
> return 0;
> }
> --
> 2.14.3
>
>
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user
2018-05-09 17:05 ` Alejandro Lucero
@ 2018-05-09 17:53 ` Aaron Conole
2018-05-09 19:44 ` Alejandro Lucero
0 siblings, 1 reply; 19+ messages in thread
From: Aaron Conole @ 2018-05-09 17:53 UTC (permalink / raw)
To: Alejandro Lucero
Cc: stable, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron, Pablo Cascon,
Kevin Traynor, Adrien Mazarguil
Alejandro Lucero <alejandro.lucero@netronome.com> writes:
> I have been thinking about this, and there was something that did not seem right to me, although I
> could not explain what exactly. But this was because we have been thinking about VFIO and we have
> forgotten UIO. The point is, the lock is not required with VFIO but it is with UIO, and I'm afraid the
> way we are trying to solve the non-root user problem is not the right one.
Okay, makes sense.
> With VFIO the BARs mapping is done through the kernel VFIO driver, so once the device is bound to
> the driver, and someone tries to use that device, the VFIO driver ensures there will not be another
> user trying to access the device. However, with UIO the driver is not doing the BAR mapping but it is
> the app using the sysfs resource files for that device. It could be, and in fact it is easy to happen, two
> DPDK apps using the same device, because with DPDK apps there is no awareness of what other
> DPDK apps are doing. It is in this case where the lock is required, and creating the lock file in the
> user's home directory is not going to help.
Also makes sense.
> I know RH is just interested in using VFIO, but there are other potential NFP PMD users who may
> want to use UIO instead, and the current solution does not offer the right protection in that case.
> Maybe the lock patch could be created based on the driver the device is bound to, leaving /var/lock
> for UIO and the suggested path for the VFIO case. Or even no lock at all for the VFIO case.
Well, yes and no. For instance, in the uio case, they will be running
most likely as the root user (because to run as non-root in the uio case
would cause other problems). And in that case, $HOME for all
applications will be root, yes? I think then, it won't matter.
I do agree with no lock for the vfio case would be best. Is it relevant
for the newer NFP driver? I haven't had a look yet. If so, then I
think your proposals are fine there.
For the older one, I only know of one patch that needs to go in (which
fixes the accidentally lost unlink() call). After that, I wouldn't
expect more changes in this area (since each one risks stability of the
code base for a driver that has been replaced).
> On Mon, Apr 30, 2018 at 6:20 PM, Aaron Conole <aconole@redhat.com> wrote:
>
> Currently, the nfp lock files are taken from the global lock file
> location, which will work when the user is running as root. However,
> some distributions and applications (notably ovs 2.8+ on RHEL/Fedora)
> run as a non-root user.
>
> Acked-by: Alejandro Lucero <alejandro.lucero@netronome.com>
> Signed-off-by: Aaron Conole <aconole@redhat.com>
> ---
> drivers/net/nfp/nfp_nfpu.c | 23 ++++++++++++++++++-----
> 1 file changed, 18 insertions(+), 5 deletions(-)
>
> diff --git a/drivers/net/nfp/nfp_nfpu.c b/drivers/net/nfp/nfp_nfpu.c
> index 2ed985ff4..ae2e07220 100644
> --- a/drivers/net/nfp/nfp_nfpu.c
> +++ b/drivers/net/nfp/nfp_nfpu.c
> @@ -18,6 +18,22 @@
> #define NFP_CFG_EXP_BAR 7
>
> #define NFP_CFG_EXP_BAR_CFG_BASE 0x30000
> +#define NFP_LOCKFILE_PATH_FMT "%s/nfp%d"
> +
> +/* get nfp lock file path (/var/lock if root, $HOME otherwise) */
> +static void
> +nspu_get_lockfile_path(char *buffer, int bufsz, nfpu_desc_t *desc)
> +{
> + const char *dir = "/var/lock";
> + const char *home_dir = getenv("HOME");
> +
> + if (getuid() != 0 && home_dir != NULL)
> + dir = home_dir;
> +
> + /* use current prefix as file path */
> + snprintf(buffer, bufsz, NFP_LOCKFILE_PATH_FMT, dir,
> + desc->nfp);
> +}
>
> /* There could be other NFP userspace tools using the NSP interface.
> * Make sure there is no other process using it and locking the access for
> @@ -30,9 +46,7 @@ nspv_aquire_process_lock(nfpu_desc_t *desc)
> struct flock lock;
> char lockname[30];
>
> - memset(&lock, 0, sizeof(lock));
> -
> - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d", desc->nfp);
> + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
>
> /* Using S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH | S_IWOTH */
> desc->lock = open(lockname, O_RDWR | O_CREAT, 0666);
> @@ -106,7 +120,6 @@ nfpu_close(nfpu_desc_t *desc)
> rte_free(desc->nspu);
> close(desc->lock);
>
> - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d", desc->nfp);
> - unlink(lockname);
> + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
> return 0;
> }
> --
> 2.14.3
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user
2018-05-09 17:53 ` Aaron Conole
@ 2018-05-09 19:44 ` Alejandro Lucero
2018-05-10 12:00 ` Alejandro Lucero
0 siblings, 1 reply; 19+ messages in thread
From: Alejandro Lucero @ 2018-05-09 19:44 UTC (permalink / raw)
To: Aaron Conole
Cc: stable, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron, Pablo Cascon,
Kevin Traynor, Adrien Mazarguil
On Wed, May 9, 2018 at 6:53 PM, Aaron Conole <aconole@redhat.com> wrote:
> Alejandro Lucero <alejandro.lucero@netronome.com> writes:
>
> > I have been thinking about this, and there was something that did not
> seem right to me, although I
> > could not explain what exactly. But this was because we have been
> thinking about VFIO and we have
> > forgotten UIO. The point is, the lock is not required with VFIO but it
> is with UIO, and I'm afraid the
> > way we are trying to solve the non-root user problem is not the right
> one.
>
> Okay, makes sense.
>
> > With VFIO the BARs mapping is done through the kernel VFIO driver, so
> once the device is bound to
> > the driver, and someone tries to use that device, the VFIO driver
> ensures there will not be another
> > user trying to access the device. However, with UIO the driver is not
> doing the BAR mapping but it is
> > the app using the sysfs resource files for that device. It could be, and
> in fact it is easy to happen, two
> > DPDK apps using the same device, because with DPDK apps there is no
> awareness of what other
> > DPDK apps are doing. It is in this case where the lock is required, and
> creating the lock file in the
> > user's home directory is not going to help.
>
> Also makes sense.
>
> > I know RH is just interested in using VFIO, but there are other
> potential NFP PMD users who may
> > want to use UIO instead, and the current solution does not offer the
> right protection in that case.
> > Maybe the lock patch could be created based on the driver the device is
> bound to, leaving /var/lock
> > for UIO and the suggested path for the VFIO case. Or even no lock at all
> for the VFIO case.
>
> Well, yes and no. For instance, in the uio case, they will be running
> most likely as the root user (because to run as non-root in the uio case
> would cause other problems). And in that case, $HOME for all
> applications will be root, yes? I think then, it won't matter.
>
>
I think "most likely" is not enough. If RH wants to run OVS as non-root,
don't you think there could be other people with same necessities? and
using UIO because IOMMU is not available?
> I do agree with no lock for the vfio case would be best. Is it relevant
> for the newer NFP driver? I haven't had a look yet. If so, then I
> think your proposals are fine there.
>
> For the older one, I only know of one patch that needs to go in (which
> fixes the accidentally lost unlink() call). After that, I wouldn't
> expect more changes in this area (since each one risks stability of the
> code base for a driver that has been replaced).
>
> > On Mon, Apr 30, 2018 at 6:20 PM, Aaron Conole <aconole@redhat.com>
> wrote:
> >
> > Currently, the nfp lock files are taken from the global lock file
> > location, which will work when the user is running as root. However,
> > some distributions and applications (notably ovs 2.8+ on RHEL/Fedora)
> > run as a non-root user.
> >
> > Acked-by: Alejandro Lucero <alejandro.lucero@netronome.com>
> > Signed-off-by: Aaron Conole <aconole@redhat.com>
> > ---
> > drivers/net/nfp/nfp_nfpu.c | 23 ++++++++++++++++++-----
> > 1 file changed, 18 insertions(+), 5 deletions(-)
> >
> > diff --git a/drivers/net/nfp/nfp_nfpu.c b/drivers/net/nfp/nfp_nfpu.c
> > index 2ed985ff4..ae2e07220 100644
> > --- a/drivers/net/nfp/nfp_nfpu.c
> > +++ b/drivers/net/nfp/nfp_nfpu.c
> > @@ -18,6 +18,22 @@
> > #define NFP_CFG_EXP_BAR 7
> >
> > #define NFP_CFG_EXP_BAR_CFG_BASE 0x30000
> > +#define NFP_LOCKFILE_PATH_FMT "%s/nfp%d"
> > +
> > +/* get nfp lock file path (/var/lock if root, $HOME otherwise) */
> > +static void
> > +nspu_get_lockfile_path(char *buffer, int bufsz, nfpu_desc_t *desc)
> > +{
> > + const char *dir = "/var/lock";
> > + const char *home_dir = getenv("HOME");
> > +
> > + if (getuid() != 0 && home_dir != NULL)
> > + dir = home_dir;
> > +
> > + /* use current prefix as file path */
> > + snprintf(buffer, bufsz, NFP_LOCKFILE_PATH_FMT, dir,
> > + desc->nfp);
> > +}
> >
> > /* There could be other NFP userspace tools using the NSP interface.
> > * Make sure there is no other process using it and locking the access
> for
> > @@ -30,9 +46,7 @@ nspv_aquire_process_lock(nfpu_desc_t *desc)
> > struct flock lock;
> > char lockname[30];
> >
> > - memset(&lock, 0, sizeof(lock));
> > -
> > - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d",
> desc->nfp);
> > + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
> >
> > /* Using S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH |
> S_IWOTH */
> > desc->lock = open(lockname, O_RDWR | O_CREAT, 0666);
> > @@ -106,7 +120,6 @@ nfpu_close(nfpu_desc_t *desc)
> > rte_free(desc->nspu);
> > close(desc->lock);
> >
> > - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d",
> desc->nfp);
> > - unlink(lockname);
> > + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
> > return 0;
> > }
> > --
> > 2.14.3
>
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user
2018-05-09 19:44 ` Alejandro Lucero
@ 2018-05-10 12:00 ` Alejandro Lucero
0 siblings, 0 replies; 19+ messages in thread
From: Alejandro Lucero @ 2018-05-10 12:00 UTC (permalink / raw)
To: Aaron Conole
Cc: stable, Ferruh Yigit, Yuanhan Liu, Eelco Chaudron, Pablo Cascon,
Kevin Traynor, Adrien Mazarguil
On Wed, May 9, 2018 at 8:44 PM, Alejandro Lucero <
alejandro.lucero@netronome.com> wrote:
>
>
> On Wed, May 9, 2018 at 6:53 PM, Aaron Conole <aconole@redhat.com> wrote:
>
>> Alejandro Lucero <alejandro.lucero@netronome.com> writes:
>>
>> > I have been thinking about this, and there was something that did not
>> seem right to me, although I
>> > could not explain what exactly. But this was because we have been
>> thinking about VFIO and we have
>> > forgotten UIO. The point is, the lock is not required with VFIO but it
>> is with UIO, and I'm afraid the
>> > way we are trying to solve the non-root user problem is not the right
>> one.
>>
>> Okay, makes sense.
>>
>> > With VFIO the BARs mapping is done through the kernel VFIO driver, so
>> once the device is bound to
>> > the driver, and someone tries to use that device, the VFIO driver
>> ensures there will not be another
>> > user trying to access the device. However, with UIO the driver is not
>> doing the BAR mapping but it is
>> > the app using the sysfs resource files for that device. It could be,
>> and in fact it is easy to happen, two
>> > DPDK apps using the same device, because with DPDK apps there is no
>> awareness of what other
>> > DPDK apps are doing. It is in this case where the lock is required, and
>> creating the lock file in the
>> > user's home directory is not going to help.
>>
>> Also makes sense.
>>
>> > I know RH is just interested in using VFIO, but there are other
>> potential NFP PMD users who may
>> > want to use UIO instead, and the current solution does not offer the
>> right protection in that case.
>> > Maybe the lock patch could be created based on the driver the device is
>> bound to, leaving /var/lock
>> > for UIO and the suggested path for the VFIO case. Or even no lock at
>> all for the VFIO case.
>>
>> Well, yes and no. For instance, in the uio case, they will be running
>> most likely as the root user (because to run as non-root in the uio case
>> would cause other problems). And in that case, $HOME for all
>> applications will be root, yes? I think then, it won't matter.
>>
>>
> I think "most likely" is not enough. If RH wants to run OVS as non-root,
> don't you think there could be other people with same necessities? and
> using UIO because IOMMU is not available?
>
>
I have been doing some tests and it turns out it is not possible to run
DPDK apps as non-root user. There are several files that need to be
accessed and it does require to give permissions beforehand to that
non-root user, which can be done. But it is not possible for non-root users
to get the hugepages physical addresses, because the pagemap file at
/proc/self/ is just accessible to root and this file is created by the
kernel when the process is created. For VFIO, the hugepages physical
address is not required by the PMD but just IOVAs, and the VFIO driver will
create the IOMMU mappings with those IOVAs and the right physical addresses.
Therefore, I think it is safe enough to keep the user home directory for
the lock file, which for the UIO case will always be the root directory.
> I do agree with no lock for the vfio case would be best. Is it relevant
>> for the newer NFP driver? I haven't had a look yet. If so, then I
>> think your proposals are fine there.
>>
>> For the older one, I only know of one patch that needs to go in (which
>> fixes the accidentally lost unlink() call). After that, I wouldn't
>> expect more changes in this area (since each one risks stability of the
>> code base for a driver that has been replaced).
>>
>> > On Mon, Apr 30, 2018 at 6:20 PM, Aaron Conole <aconole@redhat.com>
>> wrote:
>> >
>> > Currently, the nfp lock files are taken from the global lock file
>> > location, which will work when the user is running as root. However,
>> > some distributions and applications (notably ovs 2.8+ on RHEL/Fedora)
>> > run as a non-root user.
>> >
>> > Acked-by: Alejandro Lucero <alejandro.lucero@netronome.com>
>> > Signed-off-by: Aaron Conole <aconole@redhat.com>
>> > ---
>> > drivers/net/nfp/nfp_nfpu.c | 23 ++++++++++++++++++-----
>> > 1 file changed, 18 insertions(+), 5 deletions(-)
>> >
>> > diff --git a/drivers/net/nfp/nfp_nfpu.c b/drivers/net/nfp/nfp_nfpu.c
>> > index 2ed985ff4..ae2e07220 100644
>> > --- a/drivers/net/nfp/nfp_nfpu.c
>> > +++ b/drivers/net/nfp/nfp_nfpu.c
>> > @@ -18,6 +18,22 @@
>> > #define NFP_CFG_EXP_BAR 7
>> >
>> > #define NFP_CFG_EXP_BAR_CFG_BASE 0x30000
>> > +#define NFP_LOCKFILE_PATH_FMT "%s/nfp%d"
>> > +
>> > +/* get nfp lock file path (/var/lock if root, $HOME otherwise) */
>> > +static void
>> > +nspu_get_lockfile_path(char *buffer, int bufsz, nfpu_desc_t *desc)
>> > +{
>> > + const char *dir = "/var/lock";
>> > + const char *home_dir = getenv("HOME");
>> > +
>> > + if (getuid() != 0 && home_dir != NULL)
>> > + dir = home_dir;
>> > +
>> > + /* use current prefix as file path */
>> > + snprintf(buffer, bufsz, NFP_LOCKFILE_PATH_FMT, dir,
>> > + desc->nfp);
>> > +}
>> >
>> > /* There could be other NFP userspace tools using the NSP interface.
>> > * Make sure there is no other process using it and locking the
>> access for
>> > @@ -30,9 +46,7 @@ nspv_aquire_process_lock(nfpu_desc_t *desc)
>> > struct flock lock;
>> > char lockname[30];
>> >
>> > - memset(&lock, 0, sizeof(lock));
>> > -
>> > - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d",
>> desc->nfp);
>> > + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
>> >
>> > /* Using S_IRUSR | S_IWUSR | S_IRGRP | S_IWGRP | S_IROTH |
>> S_IWOTH */
>> > desc->lock = open(lockname, O_RDWR | O_CREAT, 0666);
>> > @@ -106,7 +120,6 @@ nfpu_close(nfpu_desc_t *desc)
>> > rte_free(desc->nspu);
>> > close(desc->lock);
>> >
>> > - snprintf(lockname, sizeof(lockname), "/var/lock/nfp%d",
>> desc->nfp);
>> > - unlink(lockname);
>> > + nspu_get_lockfile_path(lockname, sizeof(lockname), desc);
>> > return 0;
>> > }
>> > --
>> > 2.14.3
>>
>
>
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome
2018-05-08 9:23 ` Kevin Traynor
@ 2018-05-14 14:23 ` Kevin Traynor
2018-05-20 7:19 ` Yuanhan Liu
0 siblings, 1 reply; 19+ messages in thread
From: Kevin Traynor @ 2018-05-14 14:23 UTC (permalink / raw)
To: Yuanhan Liu
Cc: Aaron Conole, stable, Alejandro Lucero, Ferruh Yigit,
Eelco Chaudron, Pablo Cascon, Adrien Mazarguil, Thomas Monjalon
Ping Yuanhan - can you clarify question below? Also, can you let us know
when you are planning further backports to 17.11 stable branch?
thanks,
Kevin.
On 05/08/2018 10:23 AM, Kevin Traynor wrote:
> On 05/06/2018 07:34 AM, Yuanhan Liu wrote:
>> On Mon, Apr 30, 2018 at 07:02:29PM +0100, Kevin Traynor wrote:
>>> On 04/30/2018 06:20 PM, Aaron Conole wrote:
>>>> Even when trying to use the Netronome cards via VFIO, there is a
>>>> lock file being requested, which requires root access. This series
>>>> fixes an issue with the nfp driver lock release always releasing
>>>> 'nfp0' (which isn't a bug in practice for other reasons) as well
>>>> as allowing the lock file location to be configured by the application
>>>> or user via the HOME environment variable (similar to other resources
>>>> in the DPDK framework).
>>>>
>>>> This series is only applicable to the stable tree because the nfp
>>>> driver is completely rewritten for later versions of DPDK.
>>>>
>>>
>>> Hi Yuanhan, I think we would like to get this into the next 17.11 stable
>>> release if possible. Not sure when you are merging patches into the tree
>>> for it?
>>
>> Hi,
>>
>> I have just applied it to dpdk-stable/17.11. It will be part of 17.11.3
>> LTS release.
>>
>
> Hi,
>
> They don't appear to be on the branch? Maybe you have a private 'next'
> branch or something in your workflow, but reporting in case something
> still needs to be pushed.
>
> thanks,
> Kevin.
>
>> Thanks.
>>
>> --yliu
>>>
>>> Kevin.
>>>
>>>> Aaron Conole (2):
>>>> nfp: unlink the appropriate lock file
>>>> nfp: allow for non-root user
>>>>
>>>> drivers/net/nfp/nfp_nfpu.c | 25 +++++++++++++++++++++----
>>>> 1 file changed, 21 insertions(+), 4 deletions(-)
>>>>
>
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome
2018-05-14 14:23 ` Kevin Traynor
@ 2018-05-20 7:19 ` Yuanhan Liu
2018-05-22 10:45 ` Kevin Traynor
0 siblings, 1 reply; 19+ messages in thread
From: Yuanhan Liu @ 2018-05-20 7:19 UTC (permalink / raw)
To: Kevin Traynor
Cc: Aaron Conole, stable, Alejandro Lucero, Ferruh Yigit,
Eelco Chaudron, Pablo Cascon, Adrien Mazarguil, Thomas Monjalon
On Mon, May 14, 2018 at 03:23:41PM +0100, Kevin Traynor wrote:
> Ping Yuanhan - can you clarify question below? Also, can you let us know
Hi Kevin,
Sorry for being late: I just have very little time at weekends. I planned
to handle it last week, but I had to do something else.
And to your question: yes, they are not pushed yet: I should have done that
weeks ago though.
I will push them today.
> when you are planning further backports to 17.11 stable branch?
I just want to know do you expect something else to be released in 17.11.3?
If so, could you do a list, just for making sure I don't miss it.
--yliu
>
> thanks,
> Kevin.
>
> On 05/08/2018 10:23 AM, Kevin Traynor wrote:
> > On 05/06/2018 07:34 AM, Yuanhan Liu wrote:
> >> On Mon, Apr 30, 2018 at 07:02:29PM +0100, Kevin Traynor wrote:
> >>> On 04/30/2018 06:20 PM, Aaron Conole wrote:
> >>>> Even when trying to use the Netronome cards via VFIO, there is a
> >>>> lock file being requested, which requires root access. This series
> >>>> fixes an issue with the nfp driver lock release always releasing
> >>>> 'nfp0' (which isn't a bug in practice for other reasons) as well
> >>>> as allowing the lock file location to be configured by the application
> >>>> or user via the HOME environment variable (similar to other resources
> >>>> in the DPDK framework).
> >>>>
> >>>> This series is only applicable to the stable tree because the nfp
> >>>> driver is completely rewritten for later versions of DPDK.
> >>>>
> >>>
> >>> Hi Yuanhan, I think we would like to get this into the next 17.11 stable
> >>> release if possible. Not sure when you are merging patches into the tree
> >>> for it?
> >>
> >> Hi,
> >>
> >> I have just applied it to dpdk-stable/17.11. It will be part of 17.11.3
> >> LTS release.
> >>
> >
> > Hi,
> >
> > They don't appear to be on the branch? Maybe you have a private 'next'
> > branch or something in your workflow, but reporting in case something
> > still needs to be pushed.
> >
> > thanks,
> > Kevin.
> >
> >> Thanks.
> >>
> >> --yliu
> >>>
> >>> Kevin.
> >>>
> >>>> Aaron Conole (2):
> >>>> nfp: unlink the appropriate lock file
> >>>> nfp: allow for non-root user
> >>>>
> >>>> drivers/net/nfp/nfp_nfpu.c | 25 +++++++++++++++++++++----
> >>>> 1 file changed, 21 insertions(+), 4 deletions(-)
> >>>>
> >
^ permalink raw reply [flat|nested] 19+ messages in thread
* Re: [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome
2018-05-20 7:19 ` Yuanhan Liu
@ 2018-05-22 10:45 ` Kevin Traynor
0 siblings, 0 replies; 19+ messages in thread
From: Kevin Traynor @ 2018-05-22 10:45 UTC (permalink / raw)
To: Yuanhan Liu
Cc: Aaron Conole, stable, Alejandro Lucero, Ferruh Yigit,
Eelco Chaudron, Pablo Cascon, Adrien Mazarguil, Thomas Monjalon
On 05/20/2018 08:19 AM, Yuanhan Liu wrote:
> On Mon, May 14, 2018 at 03:23:41PM +0100, Kevin Traynor wrote:
>> Ping Yuanhan - can you clarify question below? Also, can you let us know
>
> Hi Kevin,
>
> Sorry for being late: I just have very little time at weekends. I planned
> to handle it last week, but I had to do something else.
>
> And to your question: yes, they are not pushed yet: I should have done that
> weeks ago though.
>
> I will push them today.
>
Hi Yuanhan, thanks - I see them now.
>> when you are planning further backports to 17.11 stable branch?
>
> I just want to know do you expect something else to be released in 17.11.3?
> If so, could you do a list, just for making sure I don't miss it.
>
I ran git-log-fixes and it gave a list of 253 post v18.02 fixes in head
of master (not including typo/base drv fixes) that look relevant for
17.11, with another 20 unclear as they are missing 'Fixes:' tag. On the
17.11 branch there's 99 fixes from v17.11.1..HEAD.
There might a few discrepancies in accounting due to different
18.02.0/17.11.1 release dates etc, but at that number it seems like
there are fixes missing - unless they are not suitable for backport for
some other criteria?
I made a list of all fixes that look relevant on master and 17.11
branches, it's quite long, I will send separately.
One unusual case that is needed is a fix for a fix that is not on master
but is on stable branches. The fix is here:
http://dpdk.org/browse/dpdk-stable/commit/?h=18.02&id=e89e323e4ce58f2cbbc7afcc2d5dc7ce66075e81
thanks,
Kevin.
> --yliu
>>
>> thanks,
>> Kevin.
>>
>> On 05/08/2018 10:23 AM, Kevin Traynor wrote:
>>> On 05/06/2018 07:34 AM, Yuanhan Liu wrote:
>>>> On Mon, Apr 30, 2018 at 07:02:29PM +0100, Kevin Traynor wrote:
>>>>> On 04/30/2018 06:20 PM, Aaron Conole wrote:
>>>>>> Even when trying to use the Netronome cards via VFIO, there is a
>>>>>> lock file being requested, which requires root access. This series
>>>>>> fixes an issue with the nfp driver lock release always releasing
>>>>>> 'nfp0' (which isn't a bug in practice for other reasons) as well
>>>>>> as allowing the lock file location to be configured by the application
>>>>>> or user via the HOME environment variable (similar to other resources
>>>>>> in the DPDK framework).
>>>>>>
>>>>>> This series is only applicable to the stable tree because the nfp
>>>>>> driver is completely rewritten for later versions of DPDK.
>>>>>>
>>>>>
>>>>> Hi Yuanhan, I think we would like to get this into the next 17.11 stable
>>>>> release if possible. Not sure when you are merging patches into the tree
>>>>> for it?
>>>>
>>>> Hi,
>>>>
>>>> I have just applied it to dpdk-stable/17.11. It will be part of 17.11.3
>>>> LTS release.
>>>>
>>>
>>> Hi,
>>>
>>> They don't appear to be on the branch? Maybe you have a private 'next'
>>> branch or something in your workflow, but reporting in case something
>>> still needs to be pushed.
>>>
>>> thanks,
>>> Kevin.
>>>
>>>> Thanks.
>>>>
>>>> --yliu
>>>>>
>>>>> Kevin.
>>>>>
>>>>>> Aaron Conole (2):
>>>>>> nfp: unlink the appropriate lock file
>>>>>> nfp: allow for non-root user
>>>>>>
>>>>>> drivers/net/nfp/nfp_nfpu.c | 25 +++++++++++++++++++++----
>>>>>> 1 file changed, 21 insertions(+), 4 deletions(-)
>>>>>>
>>>
^ permalink raw reply [flat|nested] 19+ messages in thread
end of thread, other threads:[~2018-05-22 10:45 UTC | newest]
Thread overview: 19+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2018-04-30 17:20 [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome Aaron Conole
2018-04-30 17:20 ` [dpdk-stable] [PATCH 1/2] nfp: unlink the appropriate lock file Aaron Conole
2018-04-30 17:20 ` [dpdk-stable] [PATCH 2/2] nfp: allow for non-root user Aaron Conole
2018-05-08 13:09 ` Eelco Chaudron
2018-05-08 13:20 ` Aaron Conole
2018-05-09 17:05 ` Alejandro Lucero
2018-05-09 17:53 ` Aaron Conole
2018-05-09 19:44 ` Alejandro Lucero
2018-05-10 12:00 ` Alejandro Lucero
2018-04-30 18:02 ` [dpdk-stable] [PATCH 0/2] nfp: support non-root user for the Netronome Kevin Traynor
2018-05-06 6:34 ` Yuanhan Liu
2018-05-08 9:23 ` Kevin Traynor
2018-05-14 14:23 ` Kevin Traynor
2018-05-20 7:19 ` Yuanhan Liu
2018-05-22 10:45 ` Kevin Traynor
2018-05-01 10:36 ` Luca Boccassi
2018-05-03 10:30 ` Luca Boccassi
2018-05-03 12:25 ` Alejandro Lucero
2018-05-03 12:57 ` Luca Boccassi
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).