* [dpdk-dev] [PATCH] cryptodev: free memzone when releasing cryptodev
@ 2019-05-30 17:07 Junxiao Shi
2019-06-27 14:03 ` Akhil Goyal
` (2 more replies)
0 siblings, 3 replies; 8+ messages in thread
From: Junxiao Shi @ 2019-05-30 17:07 UTC (permalink / raw)
To: dev
When a cryptodev is created in a primary process,
rte_cryptodev_data_alloc reserves a memzone.
However, this memzone was not released when the cryptodev
is uninitialized. After that, new cryptodev cannot be
created due to memzone name conflict.
This commit frees the memzone when a cryptodev is
uninitialized, fixing this bug. This approach is chosen
instead of keeping and reusing the old memzone, because
the new cryptodev could belong to a different NUMA socket.
Also, rte_cryptodev_data pointer is now properly recorded
in cryptodev_globals.data array.
Bugzilla ID: 105
Signed-off-by: Junxiao Shi <git@mail1.yoursunny.com>
---
lib/librte_cryptodev/rte_cryptodev.c | 44 +++++++++++++++++++++++++++++++-----
1 file changed, 38 insertions(+), 6 deletions(-)
diff --git a/lib/librte_cryptodev/rte_cryptodev.c b/lib/librte_cryptodev/rte_cryptodev.c
index 00c2cf4..666dfea 100644
--- a/lib/librte_cryptodev/rte_cryptodev.c
+++ b/lib/librte_cryptodev/rte_cryptodev.c
@@ -653,6 +653,31 @@ rte_cryptodev_data_alloc(uint8_t dev_id, struct rte_cryptodev_data **data,
return 0;
}
+static inline int
+rte_cryptodev_data_free(uint8_t dev_id, struct rte_cryptodev_data **data)
+{
+ char mz_name[RTE_CRYPTODEV_NAME_MAX_LEN];
+ const struct rte_memzone *mz;
+ int n;
+
+ /* generate memzone name */
+ n = snprintf(mz_name, sizeof(mz_name), "rte_cryptodev_data_%u", dev_id);
+ if (n >= (int)sizeof(mz_name))
+ return -EINVAL;
+
+ mz = rte_memzone_lookup(mz_name);
+ if (mz == NULL)
+ return -ENOMEM;
+
+ RTE_ASSERT(*data == mz->addr);
+ *data = NULL;
+
+ if (rte_eal_process_type() == RTE_PROC_PRIMARY)
+ return rte_memzone_free(mz);
+
+ return 0;
+}
+
static uint8_t
rte_cryptodev_find_free_device_index(void)
{
@@ -687,16 +712,16 @@ rte_cryptodev_pmd_allocate(const char *name, int socket_id)
cryptodev = rte_cryptodev_pmd_get_dev(dev_id);
if (cryptodev->data == NULL) {
- struct rte_cryptodev_data *cryptodev_data =
- cryptodev_globals.data[dev_id];
+ struct rte_cryptodev_data **cryptodev_data =
+ &cryptodev_globals.data[dev_id];
- int retval = rte_cryptodev_data_alloc(dev_id, &cryptodev_data,
+ int retval = rte_cryptodev_data_alloc(dev_id, cryptodev_data,
socket_id);
- if (retval < 0 || cryptodev_data == NULL)
+ if (retval < 0 || *cryptodev_data == NULL)
return NULL;
- cryptodev->data = cryptodev_data;
+ cryptodev->data = *cryptodev_data;
strlcpy(cryptodev->data->name, name,
RTE_CRYPTODEV_NAME_MAX_LEN);
@@ -724,13 +749,20 @@ rte_cryptodev_pmd_release_device(struct rte_cryptodev *cryptodev)
if (cryptodev == NULL)
return -EINVAL;
+ uint8_t dev_id = cryptodev->data->dev_id;
+
/* Close device only if device operations have been set */
if (cryptodev->dev_ops) {
- ret = rte_cryptodev_close(cryptodev->data->dev_id);
+ ret = rte_cryptodev_close(dev_id);
if (ret < 0)
return ret;
}
+ struct rte_cryptodev_data **cryptodev_data = &cryptodev_globals.data[dev_id];
+ ret = rte_cryptodev_data_free(dev_id, cryptodev_data);
+ if (ret < 0)
+ return ret;
+
cryptodev->attached = RTE_CRYPTODEV_DETACHED;
cryptodev_globals.nb_devs--;
return 0;
--
2.7.4
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [PATCH] cryptodev: free memzone when releasing cryptodev
2019-05-30 17:07 [dpdk-dev] [PATCH] cryptodev: free memzone when releasing cryptodev Junxiao Shi
@ 2019-06-27 14:03 ` Akhil Goyal
2019-06-28 5:46 ` [dpdk-dev] [EXT] " Anoob Joseph
2019-06-28 19:11 ` [dpdk-dev] [PATCH v2] " Junxiao Shi
2 siblings, 0 replies; 8+ messages in thread
From: Akhil Goyal @ 2019-06-27 14:03 UTC (permalink / raw)
To: Junxiao Shi, dev
Cc: pablo.de.lara.guarch, Trahe, Fiona, Shally Verma, anoobj
>
> When a cryptodev is created in a primary process,
> rte_cryptodev_data_alloc reserves a memzone.
> However, this memzone was not released when the cryptodev
> is uninitialized. After that, new cryptodev cannot be
> created due to memzone name conflict.
>
> This commit frees the memzone when a cryptodev is
> uninitialized, fixing this bug. This approach is chosen
> instead of keeping and reusing the old memzone, because
> the new cryptodev could belong to a different NUMA socket.
>
> Also, rte_cryptodev_data pointer is now properly recorded
> in cryptodev_globals.data array.
>
> Bugzilla ID: 105
>
> Signed-off-by: Junxiao Shi <git@mail1.yoursunny.com>
> ---
Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [EXT] [PATCH] cryptodev: free memzone when releasing cryptodev
2019-05-30 17:07 [dpdk-dev] [PATCH] cryptodev: free memzone when releasing cryptodev Junxiao Shi
2019-06-27 14:03 ` Akhil Goyal
@ 2019-06-28 5:46 ` Anoob Joseph
2019-06-28 6:15 ` Akhil Goyal
2019-06-28 19:11 ` [dpdk-dev] [PATCH v2] " Junxiao Shi
2 siblings, 1 reply; 8+ messages in thread
From: Anoob Joseph @ 2019-06-28 5:46 UTC (permalink / raw)
To: Junxiao Shi, dev, Akhil Goyal; +Cc: De Lara Guarch, Pablo
Hi,
Please see inline.
Thanks,
Anoob
> -----Original Message-----
> From: dev <dev-bounces@dpdk.org> On Behalf Of Junxiao Shi
> Sent: Thursday, May 30, 2019 10:38 PM
> To: dev@dpdk.org
> Subject: [EXT] [dpdk-dev] [PATCH] cryptodev: free memzone when releasing
> cryptodev
>
> External Email
>
> ----------------------------------------------------------------------
> When a cryptodev is created in a primary process, rte_cryptodev_data_alloc
> reserves a memzone.
> However, this memzone was not released when the cryptodev is uninitialized.
> After that, new cryptodev cannot be created due to memzone name conflict.
>
> This commit frees the memzone when a cryptodev is uninitialized, fixing this
> bug. This approach is chosen instead of keeping and reusing the old memzone,
> because the new cryptodev could belong to a different NUMA socket.
>
> Also, rte_cryptodev_data pointer is now properly recorded in
> cryptodev_globals.data array.
>
> Bugzilla ID: 105
>
> Signed-off-by: Junxiao Shi <git@mail1.yoursunny.com>
> ---
> lib/librte_cryptodev/rte_cryptodev.c | 44
> +++++++++++++++++++++++++++++++-----
> 1 file changed, 38 insertions(+), 6 deletions(-)
>
> diff --git a/lib/librte_cryptodev/rte_cryptodev.c
> b/lib/librte_cryptodev/rte_cryptodev.c
> index 00c2cf4..666dfea 100644
> --- a/lib/librte_cryptodev/rte_cryptodev.c
> +++ b/lib/librte_cryptodev/rte_cryptodev.c
> @@ -653,6 +653,31 @@ rte_cryptodev_data_alloc(uint8_t dev_id, struct
> rte_cryptodev_data **data,
> return 0;
> }
>
> +static inline int
> +rte_cryptodev_data_free(uint8_t dev_id, struct rte_cryptodev_data
> +**data) {
> + char mz_name[RTE_CRYPTODEV_NAME_MAX_LEN];
> + const struct rte_memzone *mz;
> + int n;
> +
> + /* generate memzone name */
> + n = snprintf(mz_name, sizeof(mz_name), "rte_cryptodev_data_%u",
> dev_id);
> + if (n >= (int)sizeof(mz_name))
> + return -EINVAL;
[Anoob] Is the above check needed?
> +
> + mz = rte_memzone_lookup(mz_name);
> + if (mz == NULL)
> + return -ENOMEM;
[Anoob] Is the return value correct? Shouldn't it be -EINVAL?
@Akhil, thoughts?
> +
> + RTE_ASSERT(*data == mz->addr);
> + *data = NULL;
> +
> + if (rte_eal_process_type() == RTE_PROC_PRIMARY)
> + return rte_memzone_free(mz);
> +
> + return 0;
> +}
> +
> static uint8_t
> rte_cryptodev_find_free_device_index(void)
> {
> @@ -687,16 +712,16 @@ rte_cryptodev_pmd_allocate(const char *name, int
> socket_id)
> cryptodev = rte_cryptodev_pmd_get_dev(dev_id);
>
> if (cryptodev->data == NULL) {
> - struct rte_cryptodev_data *cryptodev_data =
> - cryptodev_globals.data[dev_id];
> + struct rte_cryptodev_data **cryptodev_data =
> + &cryptodev_globals.data[dev_id];
>
> - int retval = rte_cryptodev_data_alloc(dev_id, &cryptodev_data,
> + int retval = rte_cryptodev_data_alloc(dev_id, cryptodev_data,
> socket_id);
>
> - if (retval < 0 || cryptodev_data == NULL)
> + if (retval < 0 || *cryptodev_data == NULL)
> return NULL;
>
> - cryptodev->data = cryptodev_data;
> + cryptodev->data = *cryptodev_data;
>
> strlcpy(cryptodev->data->name, name,
> RTE_CRYPTODEV_NAME_MAX_LEN);
> @@ -724,13 +749,20 @@ rte_cryptodev_pmd_release_device(struct
> rte_cryptodev *cryptodev)
> if (cryptodev == NULL)
> return -EINVAL;
>
> + uint8_t dev_id = cryptodev->data->dev_id;
> +
[Anoob] Variables need to be declared at the start of the function.
https://doc.dpdk.org/guides/contributing/coding_style.html
> /* Close device only if device operations have been set */
> if (cryptodev->dev_ops) {
> - ret = rte_cryptodev_close(cryptodev->data->dev_id);
> + ret = rte_cryptodev_close(dev_id);
> if (ret < 0)
> return ret;
> }
>
> + struct rte_cryptodev_data **cryptodev_data =
> &cryptodev_globals.data[dev_id];
[Anoob] Same comment as above
> + ret = rte_cryptodev_data_free(dev_id, cryptodev_data);
> + if (ret < 0)
> + return ret;
> +
> cryptodev->attached = RTE_CRYPTODEV_DETACHED;
> cryptodev_globals.nb_devs--;
> return 0;
> --
> 2.7.4
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [EXT] [PATCH] cryptodev: free memzone when releasing cryptodev
2019-06-28 5:46 ` [dpdk-dev] [EXT] " Anoob Joseph
@ 2019-06-28 6:15 ` Akhil Goyal
2019-06-28 7:03 ` Anoob Joseph
0 siblings, 1 reply; 8+ messages in thread
From: Akhil Goyal @ 2019-06-28 6:15 UTC (permalink / raw)
To: Anoob Joseph, Junxiao Shi, dev; +Cc: De Lara Guarch, Pablo
Hi Anoob,
> >
> > ----------------------------------------------------------------------
> > When a cryptodev is created in a primary process, rte_cryptodev_data_alloc
> > reserves a memzone.
> > However, this memzone was not released when the cryptodev is uninitialized.
> > After that, new cryptodev cannot be created due to memzone name conflict.
> >
> > This commit frees the memzone when a cryptodev is uninitialized, fixing this
> > bug. This approach is chosen instead of keeping and reusing the old memzone,
> > because the new cryptodev could belong to a different NUMA socket.
> >
> > Also, rte_cryptodev_data pointer is now properly recorded in
> > cryptodev_globals.data array.
> >
> > Bugzilla ID: 105
> >
> > Signed-off-by: Junxiao Shi <git@mail1.yoursunny.com>
> > ---
> > lib/librte_cryptodev/rte_cryptodev.c | 44
> > +++++++++++++++++++++++++++++++-----
> > 1 file changed, 38 insertions(+), 6 deletions(-)
> >
> > diff --git a/lib/librte_cryptodev/rte_cryptodev.c
> > b/lib/librte_cryptodev/rte_cryptodev.c
> > index 00c2cf4..666dfea 100644
> > --- a/lib/librte_cryptodev/rte_cryptodev.c
> > +++ b/lib/librte_cryptodev/rte_cryptodev.c
> > @@ -653,6 +653,31 @@ rte_cryptodev_data_alloc(uint8_t dev_id, struct
> > rte_cryptodev_data **data,
> > return 0;
> > }
> >
> > +static inline int
> > +rte_cryptodev_data_free(uint8_t dev_id, struct rte_cryptodev_data
> > +**data) {
> > + char mz_name[RTE_CRYPTODEV_NAME_MAX_LEN];
> > + const struct rte_memzone *mz;
> > + int n;
> > +
> > + /* generate memzone name */
> > + n = snprintf(mz_name, sizeof(mz_name), "rte_cryptodev_data_%u",
> > dev_id);
> > + if (n >= (int)sizeof(mz_name))
> > + return -EINVAL;
>
> [Anoob] Is the above check needed?
I believe this being used while creating the memzone, so same logic is used while freeing it.
Just to be safe.
>
> > +
> > + mz = rte_memzone_lookup(mz_name);
> > + if (mz == NULL)
> > + return -ENOMEM;
>
> [Anoob] Is the return value correct? Shouldn't it be -EINVAL?
>
> @Akhil, thoughts?
I believe ENOMEM is correct, as there is no memory associated with the cryptodev_data.
>
> > +
> > + RTE_ASSERT(*data == mz->addr);
> > + *data = NULL;
> > +
> > + if (rte_eal_process_type() == RTE_PROC_PRIMARY)
> > + return rte_memzone_free(mz);
> > +
> > + return 0;
> > +}
> > +
> > static uint8_t
> > rte_cryptodev_find_free_device_index(void)
> > {
> > @@ -687,16 +712,16 @@ rte_cryptodev_pmd_allocate(const char *name, int
> > socket_id)
> > cryptodev = rte_cryptodev_pmd_get_dev(dev_id);
> >
> > if (cryptodev->data == NULL) {
> > - struct rte_cryptodev_data *cryptodev_data =
> > - cryptodev_globals.data[dev_id];
> > + struct rte_cryptodev_data **cryptodev_data =
> > + &cryptodev_globals.data[dev_id];
> >
> > - int retval = rte_cryptodev_data_alloc(dev_id, &cryptodev_data,
> > + int retval = rte_cryptodev_data_alloc(dev_id, cryptodev_data,
> > socket_id);
> >
> > - if (retval < 0 || cryptodev_data == NULL)
> > + if (retval < 0 || *cryptodev_data == NULL)
> > return NULL;
> >
> > - cryptodev->data = cryptodev_data;
> > + cryptodev->data = *cryptodev_data;
> >
> > strlcpy(cryptodev->data->name, name,
> > RTE_CRYPTODEV_NAME_MAX_LEN);
> > @@ -724,13 +749,20 @@ rte_cryptodev_pmd_release_device(struct
> > rte_cryptodev *cryptodev)
> > if (cryptodev == NULL)
> > return -EINVAL;
> >
> > + uint8_t dev_id = cryptodev->data->dev_id;
> > +
>
> [Anoob] Variables need to be declared at the start of the function.
> https://doc.dpdk.org/guides/contributing/coding_style.html
>
> > /* Close device only if device operations have been set */
> > if (cryptodev->dev_ops) {
> > - ret = rte_cryptodev_close(cryptodev->data->dev_id);
> > + ret = rte_cryptodev_close(dev_id);
> > if (ret < 0)
> > return ret;
> > }
> >
> > + struct rte_cryptodev_data **cryptodev_data =
> > &cryptodev_globals.data[dev_id];
>
> [Anoob] Same comment as above
>
> > + ret = rte_cryptodev_data_free(dev_id, cryptodev_data);
> > + if (ret < 0)
> > + return ret;
> > +
> > cryptodev->attached = RTE_CRYPTODEV_DETACHED;
> > cryptodev_globals.nb_devs--;
> > return 0;
> > --
> > 2.7.4
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [EXT] [PATCH] cryptodev: free memzone when releasing cryptodev
2019-06-28 6:15 ` Akhil Goyal
@ 2019-06-28 7:03 ` Anoob Joseph
2019-06-28 7:09 ` Anoob Joseph
0 siblings, 1 reply; 8+ messages in thread
From: Anoob Joseph @ 2019-06-28 7:03 UTC (permalink / raw)
To: Akhil Goyal, Junxiao Shi, dev; +Cc: De Lara Guarch, Pablo
Hi Akhil,
Please see inline.
Thanks,
Anoob
> -----Original Message-----
> From: Akhil Goyal <akhil.goyal@nxp.com>
> Sent: Friday, June 28, 2019 11:45 AM
> To: Anoob Joseph <anoobj@marvell.com>; Junxiao Shi
> <git@mail1.yoursunny.com>; dev@dpdk.org
> Cc: De Lara Guarch, Pablo <pablo.de.lara.guarch@intel.com>
> Subject: RE: [EXT] [dpdk-dev] [PATCH] cryptodev: free memzone when
> releasing cryptodev
>
> Hi Anoob,
> > >
> > > --------------------------------------------------------------------
> > > -- When a cryptodev is created in a primary process,
> > > rte_cryptodev_data_alloc reserves a memzone.
> > > However, this memzone was not released when the cryptodev is
> uninitialized.
> > > After that, new cryptodev cannot be created due to memzone name
> conflict.
> > >
> > > This commit frees the memzone when a cryptodev is uninitialized,
> > > fixing this bug. This approach is chosen instead of keeping and
> > > reusing the old memzone, because the new cryptodev could belong to a
> different NUMA socket.
> > >
> > > Also, rte_cryptodev_data pointer is now properly recorded in
> > > cryptodev_globals.data array.
> > >
> > > Bugzilla ID: 105
> > >
> > > Signed-off-by: Junxiao Shi <git@mail1.yoursunny.com>
> > > ---
> > > lib/librte_cryptodev/rte_cryptodev.c | 44
> > > +++++++++++++++++++++++++++++++-----
> > > 1 file changed, 38 insertions(+), 6 deletions(-)
> > >
> > > diff --git a/lib/librte_cryptodev/rte_cryptodev.c
> > > b/lib/librte_cryptodev/rte_cryptodev.c
> > > index 00c2cf4..666dfea 100644
> > > --- a/lib/librte_cryptodev/rte_cryptodev.c
> > > +++ b/lib/librte_cryptodev/rte_cryptodev.c
> > > @@ -653,6 +653,31 @@ rte_cryptodev_data_alloc(uint8_t dev_id, struct
> > > rte_cryptodev_data **data,
> > > return 0;
> > > }
> > >
> > > +static inline int
> > > +rte_cryptodev_data_free(uint8_t dev_id, struct rte_cryptodev_data
> > > +**data) {
> > > + char mz_name[RTE_CRYPTODEV_NAME_MAX_LEN];
[Anoob] Shouldn't we use RTE_MEMZONE_NAMESIZE instead? I guess this is also coming from the existing code in rte_cryptodev_data_alloc(). May be we should fix that as well?
> > > + const struct rte_memzone *mz;
> > > + int n;
> > > +
> > > + /* generate memzone name */
> > > + n = snprintf(mz_name, sizeof(mz_name),
> "rte_cryptodev_data_%u",
> > > dev_id);
> > > + if (n >= (int)sizeof(mz_name))
> > > + return -EINVAL;
> >
> > [Anoob] Is the above check needed?
> I believe this being used while creating the memzone, so same logic is used
> while freeing it.
> Just to be safe.
>
[Anoob] Thinking bit more, it seems like we are trying to capture a situation when the name is getting truncated because of insufficient buffer space. So it is safe to have I guess. But even in that case, 'n' will not be greater than the "size" field passed (which happens to be sizeof(mz_name) in our case).
My opinion is '==' might make more sense. But I leave that to your judgement.
> >
> > > +
> > > + mz = rte_memzone_lookup(mz_name);
> > > + if (mz == NULL)
> > > + return -ENOMEM;
> >
> > [Anoob] Is the return value correct? Shouldn't it be -EINVAL?
> >
> > @Akhil, thoughts?
>
>
> I believe ENOMEM is correct, as there is no memory associated with the
> cryptodev_data.
[Anoob] Agreed.
>
> >
> > > +
> > > + RTE_ASSERT(*data == mz->addr);
> > > + *data = NULL;
> > > +
> > > + if (rte_eal_process_type() == RTE_PROC_PRIMARY)
> > > + return rte_memzone_free(mz);
> > > +
> > > + return 0;
> > > +}
> > > +
> > > static uint8_t
> > > rte_cryptodev_find_free_device_index(void)
> > > {
> > > @@ -687,16 +712,16 @@ rte_cryptodev_pmd_allocate(const char
> *name,
> > > int
> > > socket_id)
> > > cryptodev = rte_cryptodev_pmd_get_dev(dev_id);
> > >
> > > if (cryptodev->data == NULL) {
> > > - struct rte_cryptodev_data *cryptodev_data =
> > > - cryptodev_globals.data[dev_id];
> > > + struct rte_cryptodev_data **cryptodev_data =
> > > + &cryptodev_globals.data[dev_id];
> > >
> > > - int retval = rte_cryptodev_data_alloc(dev_id,
> &cryptodev_data,
> > > + int retval = rte_cryptodev_data_alloc(dev_id,
> cryptodev_data,
> > > socket_id);
> > >
> > > - if (retval < 0 || cryptodev_data == NULL)
> > > + if (retval < 0 || *cryptodev_data == NULL)
> > > return NULL;
> > >
> > > - cryptodev->data = cryptodev_data;
> > > + cryptodev->data = *cryptodev_data;
> > >
> > > strlcpy(cryptodev->data->name, name,
> > > RTE_CRYPTODEV_NAME_MAX_LEN);
> > > @@ -724,13 +749,20 @@ rte_cryptodev_pmd_release_device(struct
> > > rte_cryptodev *cryptodev)
> > > if (cryptodev == NULL)
> > > return -EINVAL;
> > >
> > > + uint8_t dev_id = cryptodev->data->dev_id;
> > > +
> >
> > [Anoob] Variables need to be declared at the start of the function.
> > https://doc.dpdk.org/guides/contributing/coding_style.html
> >
> > > /* Close device only if device operations have been set */
> > > if (cryptodev->dev_ops) {
> > > - ret = rte_cryptodev_close(cryptodev->data->dev_id);
> > > + ret = rte_cryptodev_close(dev_id);
> > > if (ret < 0)
> > > return ret;
> > > }
> > >
> > > + struct rte_cryptodev_data **cryptodev_data =
> > > &cryptodev_globals.data[dev_id];
> >
> > [Anoob] Same comment as above
> >
> > > + ret = rte_cryptodev_data_free(dev_id, cryptodev_data);
> > > + if (ret < 0)
> > > + return ret;
> > > +
> > > cryptodev->attached = RTE_CRYPTODEV_DETACHED;
> > > cryptodev_globals.nb_devs--;
> > > return 0;
> > > --
> > > 2.7.4
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [EXT] [PATCH] cryptodev: free memzone when releasing cryptodev
2019-06-28 7:03 ` Anoob Joseph
@ 2019-06-28 7:09 ` Anoob Joseph
0 siblings, 0 replies; 8+ messages in thread
From: Anoob Joseph @ 2019-06-28 7:09 UTC (permalink / raw)
To: Anoob Joseph, Akhil Goyal, Junxiao Shi, dev; +Cc: De Lara Guarch, Pablo
Hi Akhil,
One correction. Please see inline.
Thanks,
Anoob
> -----Original Message-----
> From: dev <dev-bounces@dpdk.org> On Behalf Of Anoob Joseph
> Sent: Friday, June 28, 2019 12:34 PM
> To: Akhil Goyal <akhil.goyal@nxp.com>; Junxiao Shi
> <git@mail1.yoursunny.com>; dev@dpdk.org
> Cc: De Lara Guarch, Pablo <pablo.de.lara.guarch@intel.com>
> Subject: Re: [dpdk-dev] [EXT] [PATCH] cryptodev: free memzone when
> releasing cryptodev
>
> Hi Akhil,
>
> Please see inline.
>
> Thanks,
> Anoob
>
> > -----Original Message-----
> > From: Akhil Goyal <akhil.goyal@nxp.com>
> > Sent: Friday, June 28, 2019 11:45 AM
> > To: Anoob Joseph <anoobj@marvell.com>; Junxiao Shi
> > <git@mail1.yoursunny.com>; dev@dpdk.org
> > Cc: De Lara Guarch, Pablo <pablo.de.lara.guarch@intel.com>
> > Subject: RE: [EXT] [dpdk-dev] [PATCH] cryptodev: free memzone when
> > releasing cryptodev
> >
> > Hi Anoob,
> > > >
> > > > ------------------------------------------------------------------
> > > > --
> > > > -- When a cryptodev is created in a primary process,
> > > > rte_cryptodev_data_alloc reserves a memzone.
> > > > However, this memzone was not released when the cryptodev is
> > uninitialized.
> > > > After that, new cryptodev cannot be created due to memzone name
> > conflict.
> > > >
> > > > This commit frees the memzone when a cryptodev is uninitialized,
> > > > fixing this bug. This approach is chosen instead of keeping and
> > > > reusing the old memzone, because the new cryptodev could belong to
> > > > a
> > different NUMA socket.
> > > >
> > > > Also, rte_cryptodev_data pointer is now properly recorded in
> > > > cryptodev_globals.data array.
> > > >
> > > > Bugzilla ID: 105
> > > >
> > > > Signed-off-by: Junxiao Shi <git@mail1.yoursunny.com>
> > > > ---
> > > > lib/librte_cryptodev/rte_cryptodev.c | 44
> > > > +++++++++++++++++++++++++++++++-----
> > > > 1 file changed, 38 insertions(+), 6 deletions(-)
> > > >
> > > > diff --git a/lib/librte_cryptodev/rte_cryptodev.c
> > > > b/lib/librte_cryptodev/rte_cryptodev.c
> > > > index 00c2cf4..666dfea 100644
> > > > --- a/lib/librte_cryptodev/rte_cryptodev.c
> > > > +++ b/lib/librte_cryptodev/rte_cryptodev.c
> > > > @@ -653,6 +653,31 @@ rte_cryptodev_data_alloc(uint8_t dev_id,
> > > > struct rte_cryptodev_data **data,
> > > > return 0;
> > > > }
> > > >
> > > > +static inline int
> > > > +rte_cryptodev_data_free(uint8_t dev_id, struct rte_cryptodev_data
> > > > +**data) {
> > > > + char mz_name[RTE_CRYPTODEV_NAME_MAX_LEN];
>
> [Anoob] Shouldn't we use RTE_MEMZONE_NAMESIZE instead? I guess this is
> also coming from the existing code in rte_cryptodev_data_alloc(). May be
> we should fix that as well?
>
> > > > + const struct rte_memzone *mz;
> > > > + int n;
> > > > +
> > > > + /* generate memzone name */
> > > > + n = snprintf(mz_name, sizeof(mz_name),
> > "rte_cryptodev_data_%u",
> > > > dev_id);
> > > > + if (n >= (int)sizeof(mz_name))
> > > > + return -EINVAL;
> > >
> > > [Anoob] Is the above check needed?
> > I believe this being used while creating the memzone, so same logic is
> > used while freeing it.
> > Just to be safe.
> >
>
> [Anoob] Thinking bit more, it seems like we are trying to capture a situation
> when the name is getting truncated because of insufficient buffer space. So
> it is safe to have I guess. But even in that case, 'n' will not be greater than the
> "size" field passed (which happens to be sizeof(mz_name) in our case).
>
> My opinion is '==' might make more sense. But I leave that to your
> judgement.
[Anoob] The check has to be retained.
"The number of characters that would have been written if n had been sufficiently large, not counting the terminating null character."
Please ignore my earlier comments.
>
> > >
> > > > +
> > > > + mz = rte_memzone_lookup(mz_name);
> > > > + if (mz == NULL)
> > > > + return -ENOMEM;
> > >
> > > [Anoob] Is the return value correct? Shouldn't it be -EINVAL?
> > >
> > > @Akhil, thoughts?
> >
> >
> > I believe ENOMEM is correct, as there is no memory associated with the
> > cryptodev_data.
>
> [Anoob] Agreed.
>
> >
> > >
> > > > +
> > > > + RTE_ASSERT(*data == mz->addr);
> > > > + *data = NULL;
> > > > +
> > > > + if (rte_eal_process_type() == RTE_PROC_PRIMARY)
> > > > + return rte_memzone_free(mz);
> > > > +
> > > > + return 0;
> > > > +}
> > > > +
> > > > static uint8_t
> > > > rte_cryptodev_find_free_device_index(void)
> > > > {
> > > > @@ -687,16 +712,16 @@ rte_cryptodev_pmd_allocate(const char
> > *name,
> > > > int
> > > > socket_id)
> > > > cryptodev = rte_cryptodev_pmd_get_dev(dev_id);
> > > >
> > > > if (cryptodev->data == NULL) {
> > > > - struct rte_cryptodev_data *cryptodev_data =
> > > > - cryptodev_globals.data[dev_id];
> > > > + struct rte_cryptodev_data **cryptodev_data =
> > > > + &cryptodev_globals.data[dev_id];
> > > >
> > > > - int retval = rte_cryptodev_data_alloc(dev_id,
> > &cryptodev_data,
> > > > + int retval = rte_cryptodev_data_alloc(dev_id,
> > cryptodev_data,
> > > > socket_id);
> > > >
> > > > - if (retval < 0 || cryptodev_data == NULL)
> > > > + if (retval < 0 || *cryptodev_data == NULL)
> > > > return NULL;
> > > >
> > > > - cryptodev->data = cryptodev_data;
> > > > + cryptodev->data = *cryptodev_data;
> > > >
> > > > strlcpy(cryptodev->data->name, name,
> > > > RTE_CRYPTODEV_NAME_MAX_LEN);
> > > > @@ -724,13 +749,20 @@ rte_cryptodev_pmd_release_device(struct
> > > > rte_cryptodev *cryptodev)
> > > > if (cryptodev == NULL)
> > > > return -EINVAL;
> > > >
> > > > + uint8_t dev_id = cryptodev->data->dev_id;
> > > > +
> > >
> > > [Anoob] Variables need to be declared at the start of the function.
> > > https://doc.dpdk.org/guides/contributing/coding_style.html
> > >
> > > > /* Close device only if device operations have been set */
> > > > if (cryptodev->dev_ops) {
> > > > - ret = rte_cryptodev_close(cryptodev->data->dev_id);
> > > > + ret = rte_cryptodev_close(dev_id);
> > > > if (ret < 0)
> > > > return ret;
> > > > }
> > > >
> > > > + struct rte_cryptodev_data **cryptodev_data =
> > > > &cryptodev_globals.data[dev_id];
> > >
> > > [Anoob] Same comment as above
> > >
> > > > + ret = rte_cryptodev_data_free(dev_id, cryptodev_data);
> > > > + if (ret < 0)
> > > > + return ret;
> > > > +
> > > > cryptodev->attached = RTE_CRYPTODEV_DETACHED;
> > > > cryptodev_globals.nb_devs--;
> > > > return 0;
> > > > --
> > > > 2.7.4
^ permalink raw reply [flat|nested] 8+ messages in thread
* [dpdk-dev] [PATCH v2] cryptodev: free memzone when releasing cryptodev
2019-05-30 17:07 [dpdk-dev] [PATCH] cryptodev: free memzone when releasing cryptodev Junxiao Shi
2019-06-27 14:03 ` Akhil Goyal
2019-06-28 5:46 ` [dpdk-dev] [EXT] " Anoob Joseph
@ 2019-06-28 19:11 ` Junxiao Shi
2019-07-01 11:48 ` Akhil Goyal
2 siblings, 1 reply; 8+ messages in thread
From: Junxiao Shi @ 2019-06-28 19:11 UTC (permalink / raw)
To: dev
When a cryptodev is created in a primary process,
rte_cryptodev_data_alloc reserves a memzone.
However, this memzone was not released when the cryptodev
is uninitialized. After that, new cryptodev cannot be
created due to memzone name conflict.
This commit frees the memzone when a cryptodev is
uninitialized, fixing this bug. This approach is chosen
instead of keeping and reusing the old memzone, because
the new cryptodev could belong to a different NUMA socket.
Also, rte_cryptodev_data pointer is now properly recorded
in cryptodev_globals.data array.
Bugzilla ID: 105
Signed-off-by: Junxiao Shi <git@mail1.yoursunny.com>
---
lib/librte_cryptodev/rte_cryptodev.c | 46 ++++++++++++++++++++++++++++++------
1 file changed, 39 insertions(+), 7 deletions(-)
diff --git a/lib/librte_cryptodev/rte_cryptodev.c b/lib/librte_cryptodev/rte_cryptodev.c
index 00c2cf4..a7a0d4b 100644
--- a/lib/librte_cryptodev/rte_cryptodev.c
+++ b/lib/librte_cryptodev/rte_cryptodev.c
@@ -627,7 +627,7 @@ static inline int
rte_cryptodev_data_alloc(uint8_t dev_id, struct rte_cryptodev_data **data,
int socket_id)
{
- char mz_name[RTE_CRYPTODEV_NAME_MAX_LEN];
+ char mz_name[RTE_MEMZONE_NAMESIZE];
const struct rte_memzone *mz;
int n;
@@ -653,6 +653,31 @@ rte_cryptodev_data_alloc(uint8_t dev_id, struct rte_cryptodev_data **data,
return 0;
}
+static inline int
+rte_cryptodev_data_free(uint8_t dev_id, struct rte_cryptodev_data **data)
+{
+ char mz_name[RTE_MEMZONE_NAMESIZE];
+ const struct rte_memzone *mz;
+ int n;
+
+ /* generate memzone name */
+ n = snprintf(mz_name, sizeof(mz_name), "rte_cryptodev_data_%u", dev_id);
+ if (n >= (int)sizeof(mz_name))
+ return -EINVAL;
+
+ mz = rte_memzone_lookup(mz_name);
+ if (mz == NULL)
+ return -ENOMEM;
+
+ RTE_ASSERT(*data == mz->addr);
+ *data = NULL;
+
+ if (rte_eal_process_type() == RTE_PROC_PRIMARY)
+ return rte_memzone_free(mz);
+
+ return 0;
+}
+
static uint8_t
rte_cryptodev_find_free_device_index(void)
{
@@ -687,16 +712,16 @@ rte_cryptodev_pmd_allocate(const char *name, int socket_id)
cryptodev = rte_cryptodev_pmd_get_dev(dev_id);
if (cryptodev->data == NULL) {
- struct rte_cryptodev_data *cryptodev_data =
- cryptodev_globals.data[dev_id];
+ struct rte_cryptodev_data **cryptodev_data =
+ &cryptodev_globals.data[dev_id];
- int retval = rte_cryptodev_data_alloc(dev_id, &cryptodev_data,
+ int retval = rte_cryptodev_data_alloc(dev_id, cryptodev_data,
socket_id);
- if (retval < 0 || cryptodev_data == NULL)
+ if (retval < 0 || *cryptodev_data == NULL)
return NULL;
- cryptodev->data = cryptodev_data;
+ cryptodev->data = *cryptodev_data;
strlcpy(cryptodev->data->name, name,
RTE_CRYPTODEV_NAME_MAX_LEN);
@@ -720,17 +745,24 @@ int
rte_cryptodev_pmd_release_device(struct rte_cryptodev *cryptodev)
{
int ret;
+ uint8_t dev_id;
if (cryptodev == NULL)
return -EINVAL;
+ dev_id = cryptodev->data->dev_id;
+
/* Close device only if device operations have been set */
if (cryptodev->dev_ops) {
- ret = rte_cryptodev_close(cryptodev->data->dev_id);
+ ret = rte_cryptodev_close(dev_id);
if (ret < 0)
return ret;
}
+ ret = rte_cryptodev_data_free(dev_id, &cryptodev_globals.data[dev_id]);
+ if (ret < 0)
+ return ret;
+
cryptodev->attached = RTE_CRYPTODEV_DETACHED;
cryptodev_globals.nb_devs--;
return 0;
--
2.7.4
^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [PATCH v2] cryptodev: free memzone when releasing cryptodev
2019-06-28 19:11 ` [dpdk-dev] [PATCH v2] " Junxiao Shi
@ 2019-07-01 11:48 ` Akhil Goyal
0 siblings, 0 replies; 8+ messages in thread
From: Akhil Goyal @ 2019-07-01 11:48 UTC (permalink / raw)
To: Junxiao Shi, dev
>
> When a cryptodev is created in a primary process,
> rte_cryptodev_data_alloc reserves a memzone.
> However, this memzone was not released when the cryptodev
> is uninitialized. After that, new cryptodev cannot be
> created due to memzone name conflict.
>
> This commit frees the memzone when a cryptodev is
> uninitialized, fixing this bug. This approach is chosen
> instead of keeping and reusing the old memzone, because
> the new cryptodev could belong to a different NUMA socket.
>
> Also, rte_cryptodev_data pointer is now properly recorded
> in cryptodev_globals.data array.
>
> Bugzilla ID: 105
>
> Signed-off-by: Junxiao Shi <git@mail1.yoursunny.com>
> ---
Acked-by: Akhil Goyal <akhil.goyal@nxp.com>
Applied to dpdk-next-crypto
Thanks.
^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2019-07-01 11:48 UTC | newest]
Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2019-05-30 17:07 [dpdk-dev] [PATCH] cryptodev: free memzone when releasing cryptodev Junxiao Shi
2019-06-27 14:03 ` Akhil Goyal
2019-06-28 5:46 ` [dpdk-dev] [EXT] " Anoob Joseph
2019-06-28 6:15 ` Akhil Goyal
2019-06-28 7:03 ` Anoob Joseph
2019-06-28 7:09 ` Anoob Joseph
2019-06-28 19:11 ` [dpdk-dev] [PATCH v2] " Junxiao Shi
2019-07-01 11:48 ` Akhil Goyal
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).