| a95d7054 | 05-Apr-2022 |
David Marchand <[email protected]> |
eal: factorize lcore main loop
All OS implementations provide the same main loop. Introduce helpers (shared for Linux and FreeBSD) to handle synchronisation between main and threads and factorize th
eal: factorize lcore main loop
All OS implementations provide the same main loop. Introduce helpers (shared for Linux and FreeBSD) to handle synchronisation between main and threads and factorize the rest as common code. Thread id are now logged as string in a common format across OS.
Note: - this change also fixes Windows EAL: worker threads cpu affinity was incorrectly reported in log.
- libabigail flags this change as breaking ABI in clang builds: 1 function with some indirect sub-type change:
[C] 'function int rte_eal_remote_launch(int (void*)*, void*, unsigned int)' at eal_common_launch.c:35:1 has some indirect sub-type changes: parameter 1 of type 'int (void*)*' changed: in pointed to type 'function type int (void*)' at rte_launch.h:31:1: entity changed from 'function type int (void*)' to 'typedef lcore_function_t' at rte_launch.h:31:1 type size hasn't changed
This is being investigated on libabigail side. For now, we don't have much choice but to waive reports on this symbol.
Signed-off-by: David Marchand <[email protected]> Acked-by: Morten Brørup <[email protected]> Acked-by: Tyler Retzlaff <[email protected]>
show more ...
|
| e8dc971b | 13-Nov-2021 |
Stephen Hemminger <[email protected]> |
eal: cleanup multiprocess hotplug resources
When rte_eal_cleanup is called, hotplug should unregister the resources associated with the multi-process server.
Signed-off-by: Stephen Hemminger <steph
eal: cleanup multiprocess hotplug resources
When rte_eal_cleanup is called, hotplug should unregister the resources associated with the multi-process server.
Signed-off-by: Stephen Hemminger <[email protected]>
show more ...
|
| 1835a22f | 09-Feb-2022 |
Stephen Hemminger <[email protected]> |
support systemd service convention for runtime directory
Systemd.exec supports configuring the runtime directory of a service via RuntimeDirectory=. This creates the directory with the necessary per
support systemd service convention for runtime directory
Systemd.exec supports configuring the runtime directory of a service via RuntimeDirectory=. This creates the directory with the necessary permissions which actual service may not have if running in container.
The change to DPDK is to look for the environment RUNTIME_DIRECTORY first and use that in preference to the fallback alternatives.
Signed-off-by: Stephen Hemminger <[email protected]> Acked-by: Bruce Richardson <[email protected]> Reviewed-by: Morten Brørup <[email protected]>
show more ...
|
| 32b4771c | 03-Feb-2022 |
Dmitry Kozlyuk <[email protected]> |
eal/linux: allow hugepage file reuse
Linux EAL ensured that mapped hugepages are clean by always mapping from newly created files: existing hugepage backing files were always removed. In this case,
eal/linux: allow hugepage file reuse
Linux EAL ensured that mapped hugepages are clean by always mapping from newly created files: existing hugepage backing files were always removed. In this case, the kernel clears the page to prevent data leaks, because the mapped memory may contain leftover data from the previous process that was using this memory. Clearing takes the bulk of the time spent in mmap(2), increasing EAL initialization time.
Introduce a mode to keep existing files and reuse them in order to speed up initial memory allocation in EAL. Hugepages mapped from such files may contain data left by the previous process that used this memory, so RTE_MEMSEG_FLAG_DIRTY is set for their segments. If multiple hugepages are mapped from the same file: 1. When fallocate(2) is used, all memory mapped from this file is considered dirty, because it is unknown which parts of the file are holes. 2. When ftruncate(3) is used, memory mapped from this file is considered dirty unless the file is extended to create a new mapping, which implies clean memory.
Signed-off-by: Dmitry Kozlyuk <[email protected]> Reviewed-by: Anatoly Burakov <[email protected]>
show more ...
|
| 7e2083e4 | 01-Nov-2021 |
Harman Kalra <[email protected]> |
eal/linux: check interrupt file descriptor validity
This patch fixes coverity issue by adding a check for negative event fd value.
Coverity issue: 373711, 373694 Fixes: c2bd9367e18f ("lib: remove d
eal/linux: check interrupt file descriptor validity
This patch fixes coverity issue by adding a check for negative event fd value.
Coverity issue: 373711, 373694 Fixes: c2bd9367e18f ("lib: remove direct access to interrupt handle")
Signed-off-by: Harman Kalra <[email protected]> Acked-by: David Marchand <[email protected]>
show more ...
|