Hi Dmitry,
> alloc_sz = RTE_ALIGN_CEIL(RTE_ALIGN_CEIL(elt_size, align) +
> MALLOC_ELEM_OVERHEAD, pg_sz);
>
I am submitting a patch regarding this
> 2. Alignment calculation depends on whether we allocated new pages or not:
>
> malloc_heap_alloc_on_heap_id(align = 0) ->
> heap_allo
calculating n_seg.
Bugzilla ID: 800
Signed-off-by: Fidaullah Noonari
---
lib/eal/common/malloc_heap.c | 2 +-
lib/eal/common/malloc_mp.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/lib/eal/common/malloc_heap.c b/lib/eal/common/malloc_heap.c
index a3d26fcbea..27a52266ad
when app is launched with -m proc-info exit without
rte_eal_cleanup() causing memory leakage. This commit resolves the
memory leakage issue and closes app properly.
Bugzilla id: 898
Signed-off-by: Fidaullah Noonari
---
app/proc-info/main.c | 3 ++-
1 file changed, 2 insertions(+), 1 deletion
binding with vfio driver, when IOMMU is disabled, causes program to crash.
this patch adds a flag for noiommmu-mode. when this is set, if IOMMU is
disabled, it changes vfio into unsafe noiommu mode and prints warning
message.
Signed-off-by: Fidaullah Noonari
---
usertools/dpdk-devbind.py | 45
In try_expand_heap() alloc_sz is calculated which may result in
unnecessary allocation of whole huge page, this may cause allocation
limit from system or eal
In response to this mail:
Signed-off-by: Fidaullah Noonari
---
lib/eal/common/malloc_heap.c | 2 +-
lib/eal/common/malloc_mp.c | 2
://inbox.dpdk.org/dev/CAEYuUWCnRZNwxiOHEeTHw0Gy9aFJRLZtvAG9g=smuuvuemc...@mail.gmail.com/
Signed-off-by: Fidaullah Noonari
---
lib/eal/common/malloc_heap.c | 2 +-
lib/eal/common/malloc_mp.c | 2 +-
2 files changed, 2 insertions(+), 2 deletions(-)
diff --git a/lib/eal/common/malloc_heap.c b/lib/eal/common
when app is launched with -m proc-info exit without
rte_eal_cleanup() causing memory leakage. This commit resolves the
memory leakage issue and closes app properly.
Bugzilla id: 898
Signed-off-by: Fidaullah Noonari
---
app/proc-info/main.c | 3 +++
1 file changed, 3 insertions(+)
diff --git a
binding with vfio driver, when IOMMU is disabled, causes program to crash.
this patch checks for IOMMU support, if it is disabled, changes vfio
into unsafe noiommu mode and prints a warning message.
Signed-off-by: Fidaullah Noonari
---
usertools/dpdk-devbind.py | 25 +
1
I agree with your suggestion. I would add new flag for noiommu and
submit v2 for the patch.
On Tue, Mar 8, 2022 at 5:57 PM Bruce Richardson
wrote:
>
> On Tue, Mar 08, 2022 at 05:49:01PM +0500, Fidaullah Noonari wrote:
> > binding with vfio driver, when IOMMU is disabled, causes prog
binding with vfio driver, when IOMMU is disabled, causes program to crash.
this patch adds a flag for noiommmu-mode. when this is set, if IOMMU is
disabled, it changes vfio into unsafe noiommu mode and prints warning
message.
Signed-off-by: Fidaullah Noonari
---
usertools/dpdk-devbind.py | 39
binding with vfio driver, when IOMMU is disabled, causes program to crash.
this patch adds a flag for noiommmu-mode. when this is set, if IOMMU is
disabled, it changes vfio into unsafe noiommu mode and prints warning
message.
Signed-off-by: Fidaullah Noonari
---
usertools/dpdk-devbind.py | 47
11 matches
Mail list logo