eal: fix dependency in multi-process detection
Currently, we need runtime dir to put all of our runtime info in, including the DPDK shared config. However, we use the shared config to determine our proc type, and this happens earlier than we actually create the config dir and thus can know where to place the config file. Fix this by moving runtime dir creation right after the EAL arguments parsing, but before proc type autodetection. Also, previously we were creating the config file unconditionally, even if we specified no_shconf - fix it by only creating the config file if no_shconf is not set. Fixes: adf1d867361c ("eal: move runtime config file to new location") Signed-off-by: Anatoly Burakov <anatoly.burakov@intel.com> Tested-by: Lei Yao <lei.a.yao@intel.com>
This commit is contained in:
parent
d5dd22c9f6
commit
e4ea1bbd6e
@ -286,12 +286,17 @@ eal_proc_type_detect(void)
|
||||
enum rte_proc_type_t ptype = RTE_PROC_PRIMARY;
|
||||
const char *pathname = eal_runtime_config_path();
|
||||
|
||||
/* if we can open the file but not get a write-lock we are a secondary
|
||||
* process. NOTE: if we get a file handle back, we keep that open
|
||||
* and don't close it to prevent a race condition between multiple opens */
|
||||
if (((mem_cfg_fd = open(pathname, O_RDWR)) >= 0) &&
|
||||
(fcntl(mem_cfg_fd, F_SETLK, &wr_lock) < 0))
|
||||
ptype = RTE_PROC_SECONDARY;
|
||||
/* if there no shared config, there can be no secondary processes */
|
||||
if (!internal_config.no_shconf) {
|
||||
/* if we can open the file but not get a write-lock we are a
|
||||
* secondary process. NOTE: if we get a file handle back, we
|
||||
* keep that open and don't close it to prevent a race condition
|
||||
* between multiple opens.
|
||||
*/
|
||||
if (((mem_cfg_fd = open(pathname, O_RDWR)) >= 0) &&
|
||||
(fcntl(mem_cfg_fd, F_SETLK, &wr_lock) < 0))
|
||||
ptype = RTE_PROC_SECONDARY;
|
||||
}
|
||||
|
||||
RTE_LOG(INFO, EAL, "Auto-detected process type: %s\n",
|
||||
ptype == RTE_PROC_PRIMARY ? "PRIMARY" : "SECONDARY");
|
||||
@ -468,6 +473,14 @@ eal_parse_args(int argc, char **argv)
|
||||
}
|
||||
}
|
||||
|
||||
/* create runtime data directory */
|
||||
if (internal_config.no_shconf == 0 &&
|
||||
eal_create_runtime_dir() < 0) {
|
||||
RTE_LOG(ERR, EAL, "Cannot create runtime directory\n");
|
||||
ret = -1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (eal_adjust_config(&internal_config) != 0) {
|
||||
ret = -1;
|
||||
goto out;
|
||||
@ -600,14 +613,6 @@ rte_eal_init(int argc, char **argv)
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* create runtime data directory */
|
||||
if (internal_config.no_shconf == 0 &&
|
||||
eal_create_runtime_dir() < 0) {
|
||||
rte_eal_init_alert("Cannot create runtime directory\n");
|
||||
rte_errno = EACCES;
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* FreeBSD always uses legacy memory model */
|
||||
internal_config.legacy_mem = true;
|
||||
|
||||
|
@ -344,12 +344,17 @@ eal_proc_type_detect(void)
|
||||
enum rte_proc_type_t ptype = RTE_PROC_PRIMARY;
|
||||
const char *pathname = eal_runtime_config_path();
|
||||
|
||||
/* if we can open the file but not get a write-lock we are a secondary
|
||||
* process. NOTE: if we get a file handle back, we keep that open
|
||||
* and don't close it to prevent a race condition between multiple opens */
|
||||
if (((mem_cfg_fd = open(pathname, O_RDWR)) >= 0) &&
|
||||
(fcntl(mem_cfg_fd, F_SETLK, &wr_lock) < 0))
|
||||
ptype = RTE_PROC_SECONDARY;
|
||||
/* if there no shared config, there can be no secondary processes */
|
||||
if (!internal_config.no_shconf) {
|
||||
/* if we can open the file but not get a write-lock we are a
|
||||
* secondary process. NOTE: if we get a file handle back, we
|
||||
* keep that open and don't close it to prevent a race condition
|
||||
* between multiple opens.
|
||||
*/
|
||||
if (((mem_cfg_fd = open(pathname, O_RDWR)) >= 0) &&
|
||||
(fcntl(mem_cfg_fd, F_SETLK, &wr_lock) < 0))
|
||||
ptype = RTE_PROC_SECONDARY;
|
||||
}
|
||||
|
||||
RTE_LOG(INFO, EAL, "Auto-detected process type: %s\n",
|
||||
ptype == RTE_PROC_PRIMARY ? "PRIMARY" : "SECONDARY");
|
||||
@ -692,6 +697,14 @@ eal_parse_args(int argc, char **argv)
|
||||
}
|
||||
}
|
||||
|
||||
/* create runtime data directory */
|
||||
if (internal_config.no_shconf == 0 &&
|
||||
eal_create_runtime_dir() < 0) {
|
||||
RTE_LOG(ERR, EAL, "Cannot create runtime directory\n");
|
||||
ret = -1;
|
||||
goto out;
|
||||
}
|
||||
|
||||
if (eal_adjust_config(&internal_config) != 0) {
|
||||
ret = -1;
|
||||
goto out;
|
||||
@ -831,14 +844,6 @@ rte_eal_init(int argc, char **argv)
|
||||
return -1;
|
||||
}
|
||||
|
||||
/* create runtime data directory */
|
||||
if (internal_config.no_shconf == 0 &&
|
||||
eal_create_runtime_dir() < 0) {
|
||||
rte_eal_init_alert("Cannot create runtime directory\n");
|
||||
rte_errno = EACCES;
|
||||
return -1;
|
||||
}
|
||||
|
||||
if (eal_plugins_init() < 0) {
|
||||
rte_eal_init_alert("Cannot init plugins\n");
|
||||
rte_errno = EINVAL;
|
||||
|
Loading…
x
Reference in New Issue
Block a user