[dpdk-dev] [PATCH v2] mbuf: use refcnt = 0 when debugging

Chas Williams 3chas3 at gmail.com
Thu Sep 7 17:55:39 CEST 2017


On Wed, 2017-09-06 at 14:53 +0000, Ananyev, Konstantin wrote:
> 
> > -----Original Message-----
> > From: Chas Williams [mailto:3chas3 at gmail.com]
> > Sent: Wednesday, September 6, 2017 2:56 PM
> > To: Ananyev, Konstantin <konstantin.ananyev at intel.com>; Nicolau, Radu <radu.nicolau at intel.com>; dev at dpdk.org
> > Cc: olivier.matz at 6wind.com; cw817q at att.com
> > Subject: Re: [dpdk-dev] [PATCH v2] mbuf: use refcnt = 0 when debugging
> > 
> > On Wed, 2017-09-06 at 11:58 +0000, Ananyev, Konstantin wrote:
> > >
> > > > -----Original Message-----
> > > > From: dev [mailto:dev-bounces at dpdk.org] On Behalf Of Chas Williams
> > > > Sent: Wednesday, September 6, 2017 11:46 AM
> > > > To: Nicolau, Radu <radu.nicolau at intel.com>; dev at dpdk.org
> > > > Cc: olivier.matz at 6wind.com; cw817q at att.com
> > > > Subject: Re: [dpdk-dev] [PATCH v2] mbuf: use refcnt = 0 when debugging
> > > >
> > > > [Note: My former email address is going away eventually.  I am moving the
> > > > conversation to my other email address which is a bit more permanent.]
> > > >
> > > > On Mon, 2017-09-04 at 15:27 +0100, Radu Nicolau wrote:
> > > > >
> > > > > On 8/7/2017 5:11 PM, Charles (Chas) Williams wrote:
> > > > > > After commit 8f094a9ac5d7 ("mbuf: set mbuf fields while in pool") is it
> > > > > > much harder to detect a "double free".  If the developer makes a copy
> > > > > > of an mbuf pointer and frees it twice, this condition is never detected
> > > > > > and the mbuf gets returned to the pool twice.
> > > > > >
> > > > > > Since this requires extra work to track, make this behavior conditional
> > > > > > on CONFIG_RTE_LIBRTE_MBUF_DEBUG.
> > > > > >
> > > > > > Signed-off-by: Chas Williams <ciwillia at brocade.com>
> > > > > > ---
> > > > > >
> > > > > > @@ -1304,10 +1329,13 @@ rte_pktmbuf_prefree_seg(struct rte_mbuf *m)
> > > > > >   			m->next = NULL;
> > > > > >   			m->nb_segs = 1;
> > > > > >   		}
> > > > > > +#ifdef RTE_LIBRTE_MBUF_DEBUG
> > > > > > +		rte_mbuf_refcnt_set(m, RTE_MBUF_UNUSED_CNT);
> > > > > > +#endif
> > > > > >
> > > > > >   		return m;
> > > > > >
> > > > > > -       } else if (rte_atomic16_add_return(&m->refcnt_atomic, -1) == 0) {
> > > > > > +	} else if (rte_mbuf_refcnt_update(m, -1) == 0) {
> > > > > Why replace the use of atomic operation?
> > > >
> > > > It doesn't.  rte_mbuf_refcnt_update() is also atomic(ish) but it slightly more
> > > > optimal.  This whole section is a little hazy actually.  It looks like
> > > > rte_pktmbuf_prefree_seg() unwraps rte_mbuf_refcnt_update() so they can avoid
> > > > setting the refcnt when the refcnt is already the 'correct' value.
> > >
> > > You don't need to use refcnt_update() here - if you take that path it already means
> > > that m->refcnt_atomic != 1.
> > > In fact, I think using refcnt_update () here might be a bit slower - as it means extra read.
> > > Konstantin
> > 
> > Yes, that is somewhat the point.  If a mbuf can have a refcnt of 0,
> > then we want to go into rte_mbuf_refcnt_update() which detects 0 -> -1.
> 
> Woulnd't __rte_mbuf_sanity_check(m, 0) at the start of prefree_seg()
> already catch it?
> Konstantin

Yes!  I didn't notice that so I will just drop change and issue a v3 today
sometime.

Thanks!
 
> > I could explicitly check this in prefree_seg but I was just restored the
> > previous call into refcnt_update.  I could explicitly check for refcnt =
> > 0 in prefree_seg() but since we do have a routine for this...
> > 
> > > > > >
> > > > > >
> > > > > >   		if (RTE_MBUF_INDIRECT(m))
> > > > > > @@ -1317,7 +1345,7 @@ rte_pktmbuf_prefree_seg(struct rte_mbuf *m)
> > > > > >   			m->next = NULL;
> > > > > >   			m->nb_segs = 1;
> > > > > >   		}
> > > > > > -		rte_mbuf_refcnt_set(m, 1);
> > > > > > +		rte_mbuf_refcnt_set(m, RTE_MBUF_UNUSED_CNT);
> > > > > >
> > > > > >   		return m;
> > > > > >   	}
> > > > > Reviewed-by:  Radu Nicolau <radu.nicolau at intel.com>
> > > >
> > > > Thanks for the review.


More information about the dev mailing list