In case of failure of a test in macsec autotest, the buffers were not getting cleaned. Added appropriate code to clean the buffers.
Fixes: 993ea577a006 ("test/security: add inline MACsec cases") Cc: sta...@dpdk.org Signed-off-by: Akhil Goyal <gak...@marvell.com> --- - Used rte_pktmbuf_free_bulk as suggested by Stephen. app/test/test_security_inline_macsec.c | 65 +++++++++++++++++--------- 1 file changed, 44 insertions(+), 21 deletions(-) diff --git a/app/test/test_security_inline_macsec.c b/app/test/test_security_inline_macsec.c index 59b1b8a6a6..f11e9da8c3 100644 --- a/app/test/test_security_inline_macsec.c +++ b/app/test/test_security_inline_macsec.c @@ -952,8 +952,7 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs tx_pkts_burst[j]->ol_flags |= RTE_MBUF_F_TX_MACSEC; } if (tx_pkts_burst[j] == NULL) { - while (j--) - rte_pktmbuf_free(tx_pkts_burst[j]); + rte_pktmbuf_free_bulk(tx_pkts_burst, j); ret = TEST_FAILED; goto out; } @@ -965,8 +964,7 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs opts->ar_td[k]->secure_pkt.data, opts->ar_td[k]->secure_pkt.len); if (tx_pkts_burst[j] == NULL) { - while (j--) - rte_pktmbuf_free(tx_pkts_burst[j]); + rte_pktmbuf_free_bulk(tx_pkts_burst, j); ret = TEST_FAILED; goto out; } @@ -993,8 +991,7 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs tx_pkts_burst[j]->ol_flags |= RTE_MBUF_F_TX_MACSEC; } if (tx_pkts_burst[j] == NULL) { - while (j--) - rte_pktmbuf_free(tx_pkts_burst[j]); + rte_pktmbuf_free_bulk(tx_pkts_burst, j); ret = TEST_FAILED; goto out; } @@ -1016,7 +1013,9 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs id = rte_security_macsec_sa_create(ctx, &sa_conf); if (id < 0) { printf("MACsec SA create failed : %d.\n", id); - return TEST_FAILED; + rte_pktmbuf_free_bulk(tx_pkts_burst, j); + ret = TEST_FAILED; + goto out; } rx_sa_id[i][an] = (uint16_t)id; } @@ -1025,6 +1024,8 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs id = rte_security_macsec_sc_create(ctx, &sc_conf); if (id < 0) { printf("MACsec SC create failed : %d.\n", id); + rte_pktmbuf_free_bulk(tx_pkts_burst, j); + ret = TEST_FAILED; goto out; } rx_sc_id[i] = (uint16_t)id; @@ -1032,19 +1033,26 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs /* Create Inline IPsec session. */ ret = fill_session_conf(td[i], port_id, opts, &sess_conf, RTE_SECURITY_MACSEC_DIR_RX, rx_sc_id[i], tci_off); - if (ret) - return TEST_FAILED; - + if (ret) { + rte_pktmbuf_free_bulk(tx_pkts_burst, j); + ret = TEST_FAILED; + goto out; + } rx_sess[i] = rte_security_session_create(ctx, &sess_conf, sess_pool); if (rx_sess[i] == NULL) { printf("SEC Session init failed.\n"); - return TEST_FAILED; + rte_pktmbuf_free_bulk(tx_pkts_burst, j); + ret = TEST_FAILED; + goto out; } ret = create_default_flow(td[i], port_id, RTE_SECURITY_MACSEC_DIR_RX, rx_sess[i]); - if (ret) + if (ret) { + rte_pktmbuf_free_bulk(tx_pkts_burst, j); + ret = TEST_FAILED; goto out; + } } if (op == MCS_ENCAP || op == MCS_ENCAP_DECAP || op == MCS_AUTH_ONLY || op == MCS_AUTH_VERIFY) { @@ -1057,7 +1065,9 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs id = rte_security_macsec_sa_create(ctx, &sa_conf); if (id < 0) { printf("MACsec SA create failed : %d.\n", id); - return TEST_FAILED; + rte_pktmbuf_free_bulk(tx_pkts_burst, j); + ret = TEST_FAILED; + goto out; } tx_sa_id[i][0] = (uint16_t)id; tx_sa_id[i][1] = MCS_INVALID_SA; @@ -1071,6 +1081,8 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs id = rte_security_macsec_sa_create(ctx, &sa_conf); if (id < 0) { printf("MACsec rekey SA create failed : %d.\n", id); + rte_pktmbuf_free_bulk(tx_pkts_burst, j); + ret = TEST_FAILED; goto out; } tx_sa_id[i][1] = (uint16_t)id; @@ -1080,6 +1092,8 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs id = rte_security_macsec_sc_create(ctx, &sc_conf); if (id < 0) { printf("MACsec SC create failed : %d.\n", id); + rte_pktmbuf_free_bulk(tx_pkts_burst, j); + ret = TEST_FAILED; goto out; } tx_sc_id[i] = (uint16_t)id; @@ -1087,19 +1101,26 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs /* Create Inline IPsec session. */ ret = fill_session_conf(td[i], port_id, opts, &sess_conf, RTE_SECURITY_MACSEC_DIR_TX, tx_sc_id[i], tci_off); - if (ret) - return TEST_FAILED; - + if (ret) { + rte_pktmbuf_free_bulk(tx_pkts_burst, j); + ret = TEST_FAILED; + goto out; + } tx_sess[i] = rte_security_session_create(ctx, &sess_conf, sess_pool); if (tx_sess[i] == NULL) { printf("SEC Session init failed.\n"); - return TEST_FAILED; + rte_pktmbuf_free_bulk(tx_pkts_burst, j); + ret = TEST_FAILED; + goto out; } ret = create_default_flow(td[i], port_id, RTE_SECURITY_MACSEC_DIR_TX, tx_sess[i]); - if (ret) + if (ret) { + rte_pktmbuf_free_bulk(tx_pkts_burst, j); + ret = TEST_FAILED; goto out; + } } } @@ -1116,6 +1137,7 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs rte_pause(); + j = 0; /* Receive back packet on loopback interface. */ do { nb_rx += rte_eth_rx_burst(port_id, 0, @@ -1129,8 +1151,7 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs if (nb_rx != nb_sent) { printf("\nUnable to RX all %d packets, received(%i)", nb_sent, nb_rx); - while (--nb_rx >= 0) - rte_pktmbuf_free(rx_pkts_burst[nb_rx]); + rte_pktmbuf_free_bulk(rx_pkts_burst, nb_rx); ret = TEST_FAILED; if (opts->check_sectag_interrupts == 1) ret = TEST_SUCCESS; @@ -1154,7 +1175,9 @@ test_macsec(const struct mcs_test_vector *td[], enum mcs_op op, const struct mcs id = rte_security_macsec_sa_create(ctx, &sa_conf); if (id < 0) { printf("MACsec SA create failed : %d.\n", id); - return TEST_FAILED; + rte_pktmbuf_free_bulk(rx_pkts_burst, nb_rx); + ret = TEST_FAILED; + goto out; } tx_sa_id[0][0] = (uint16_t)id; break; -- 2.25.1