4 * Copyright(c) 2010-2014 Intel Corporation. All rights reserved.
5 * Copyright(c) 2014 6WIND S.A.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
12 * * Redistributions of source code must retain the above copyright
13 * notice, this list of conditions and the following disclaimer.
14 * * Redistributions in binary form must reproduce the above copyright
15 * notice, this list of conditions and the following disclaimer in
16 * the documentation and/or other materials provided with the
18 * * Neither the name of Intel Corporation nor the names of its
19 * contributors may be used to endorse or promote products derived
20 * from this software without specific prior written permission.
22 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
24 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR
25 * A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT
26 * OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
27 * SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT
28 * LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
29 * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY
30 * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT
31 * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
32 * OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
50 #include <rte_debug.h>
51 #include <rte_string_fns.h>
55 #ifdef RTE_LIBRTE_XEN_DOM0
56 #define DEFAULT_MEM_SIZE "30"
58 #define DEFAULT_MEM_SIZE "8"
60 #define mp_flag "--proc-type=secondary"
61 #define no_hpet "--no-hpet"
62 #define no_huge "--no-huge"
63 #define no_shconf "--no-shconf"
64 #define pci_whitelist "--pci-whitelist"
66 #define memtest "memtest"
67 #define memtest1 "memtest1"
68 #define memtest2 "memtest2"
69 #define SOCKET_MEM_STRLEN (RTE_MAX_NUMA_NODES * 10)
70 #define launch_proc(ARGV) process_dup(ARGV, \
71 sizeof(ARGV)/(sizeof(ARGV[0])), __func__)
73 enum hugepage_action {
74 HUGEPAGE_CHECK_EXISTS = 0,
75 HUGEPAGE_CHECK_LOCKED,
80 /* if string contains a hugepage path */
82 get_hugepage_path(char * src, int src_len, char * dst, int dst_len)
85 char *tokens[NUM_TOKENS];
87 /* if we couldn't properly split the string */
88 if (rte_strsplit(src, src_len, tokens, NUM_TOKENS, ' ') < NUM_TOKENS)
91 if (strncmp(tokens[2], "hugetlbfs", sizeof("hugetlbfs")) == 0) {
92 snprintf(dst, dst_len, "%s", tokens[1]);
99 * Cycles through hugepage directories and looks for hugepage
100 * files associated with a given prefix. Depending on value of
101 * action, the hugepages are checked if they exist, checked if
102 * they can be locked, or are simply deleted.
104 * Returns 1 if it finds at least one hugepage matching the action
105 * Returns 0 if no matching hugepages were found
106 * Returns -1 if it encounters an error
109 process_hugefiles(const char * prefix, enum hugepage_action action)
111 FILE * hugedir_handle = NULL;
112 DIR * hugepage_dir = NULL;
113 struct dirent *dirent = NULL;
115 char hugefile_prefix[PATH_MAX] = {0};
116 char hugedir[PATH_MAX] = {0};
117 char line[PATH_MAX] = {0};
119 int fd, lck_result, result = 0;
121 const int prefix_len = snprintf(hugefile_prefix,
122 sizeof(hugefile_prefix), "%smap_", prefix);
123 if (prefix_len <= 0 || prefix_len >= (int)sizeof(hugefile_prefix)
124 || prefix_len >= (int)sizeof(dirent->d_name)) {
125 printf("Error creating hugefile filename prefix\n");
129 /* get hugetlbfs mountpoints from /proc/mounts */
130 hugedir_handle = fopen("/proc/mounts", "r");
132 if (hugedir_handle == NULL) {
133 printf("Error parsing /proc/mounts!\n");
137 /* read and parse script output */
138 while (fgets(line, sizeof(line), hugedir_handle) != NULL) {
140 /* check if we have a hugepage filesystem path */
141 if (!get_hugepage_path(line, sizeof(line), hugedir, sizeof(hugedir)))
144 /* check if directory exists */
145 if ((hugepage_dir = opendir(hugedir)) == NULL) {
146 fclose(hugedir_handle);
147 printf("Error reading %s: %s\n", hugedir, strerror(errno));
151 while ((dirent = readdir(hugepage_dir)) != NULL) {
152 if (memcmp(dirent->d_name, hugefile_prefix, prefix_len) != 0)
156 case HUGEPAGE_CHECK_EXISTS:
158 /* file exists, return */
163 case HUGEPAGE_DELETE:
165 char file_path[PATH_MAX] = {0};
167 snprintf(file_path, sizeof(file_path),
168 "%s/%s", hugedir, dirent->d_name);
171 if (remove(file_path) < 0) {
172 printf("Error deleting %s - %s!\n",
173 dirent->d_name, strerror(errno));
174 closedir(hugepage_dir);
181 case HUGEPAGE_CHECK_LOCKED:
183 /* try and lock the file */
184 fd = openat(dirfd(hugepage_dir), dirent->d_name, O_RDONLY);
186 /* this shouldn't happen */
188 printf("Error opening %s - %s!\n",
189 dirent->d_name, strerror(errno));
190 closedir(hugepage_dir);
195 /* non-blocking lock */
196 lck_result = flock(fd, LOCK_EX | LOCK_NB);
198 /* if lock succeeds, there's something wrong */
199 if (lck_result != -1) {
202 /* unlock the resulting lock */
205 closedir(hugepage_dir);
212 /* shouldn't happen */
217 } /* read hugepage directory */
218 closedir(hugepage_dir);
219 } /* read /proc/mounts */
221 fclose(hugedir_handle);
225 #ifdef RTE_EXEC_ENV_LINUXAPP
227 * count the number of "node*" files in /sys/devices/system/node/
230 get_number_of_sockets(void)
232 struct dirent *dirent = NULL;
233 const char * nodedir = "/sys/devices/system/node/";
237 /* check if directory exists */
238 if ((dir = opendir(nodedir)) == NULL) {
239 /* if errno==ENOENT this means we don't have NUMA support */
240 if (errno == ENOENT) {
241 printf("No NUMA nodes detected: assuming 1 available socket\n");
244 printf("Error opening %s: %s\n", nodedir, strerror(errno));
248 while ((dirent = readdir(dir)) != NULL)
249 if (strncmp(dirent->d_name, "node", sizeof("node") - 1) == 0)
258 get_current_prefix(char * prefix, int size)
260 char path[PATH_MAX] = {0};
261 char buf[PATH_MAX] = {0};
263 /* get file for config (fd is always 3) */
264 snprintf(path, sizeof(path), "/proc/self/fd/%d", 3);
266 /* return NULL on error */
267 if (readlink(path, buf, sizeof(buf)) == -1)
270 /* get the basename */
271 snprintf(buf, sizeof(buf), "%s", basename(buf));
273 /* copy string all the way from second char up to start of _config */
274 snprintf(prefix, size, "%.*s",
275 (int)(strnlen(buf, sizeof(buf)) - sizeof("_config")),
282 * Test that the app doesn't run with invalid whitelist option.
283 * Final tests ensures it does run with valid options as sanity check (one
284 * test for with Domain+BDF, second for just with BDF)
287 test_whitelist_flag(void)
290 #ifdef RTE_EXEC_ENV_BSDAPP
291 /* BSD target doesn't support prefixes at this point */
292 const char * prefix = "";
294 char prefix[PATH_MAX], tmp[PATH_MAX];
295 if (get_current_prefix(tmp, sizeof(tmp)) == NULL) {
296 printf("Error - unable to get current prefix!\n");
299 snprintf(prefix, sizeof(prefix), "--file-prefix=%s", tmp);
302 const char *wlinval[][11] = {
303 {prgname, prefix, mp_flag, "-n", "1", "-c", "1",
304 pci_whitelist, "error", "", ""},
305 {prgname, prefix, mp_flag, "-n", "1", "-c", "1",
306 pci_whitelist, "0:0:0", "", ""},
307 {prgname, prefix, mp_flag, "-n", "1", "-c", "1",
308 pci_whitelist, "0:error:0.1", "", ""},
309 {prgname, prefix, mp_flag, "-n", "1", "-c", "1",
310 pci_whitelist, "0:0:0.1error", "", ""},
311 {prgname, prefix, mp_flag, "-n", "1", "-c", "1",
312 pci_whitelist, "error0:0:0.1", "", ""},
313 {prgname, prefix, mp_flag, "-n", "1", "-c", "1",
314 pci_whitelist, "0:0:0.1.2", "", ""},
316 /* Test with valid whitelist option */
317 const char *wlval1[] = {prgname, prefix, mp_flag, "-n", "1", "-c", "1",
318 pci_whitelist, "00FF:09:0B.3"};
319 const char *wlval2[] = {prgname, prefix, mp_flag, "-n", "1", "-c", "1",
320 pci_whitelist, "09:0B.3", pci_whitelist, "0a:0b.1"};
321 const char *wlval3[] = {prgname, prefix, mp_flag, "-n", "1", "-c", "1",
322 pci_whitelist, "09:0B.3,type=test",
323 pci_whitelist, "08:00.1,type=normal",
326 for (i = 0; i < sizeof(wlinval) / sizeof(wlinval[0]); i++) {
327 if (launch_proc(wlinval[i]) == 0) {
328 printf("Error - process did run ok with invalid "
329 "whitelist parameter\n");
333 if (launch_proc(wlval1) != 0 ) {
334 printf("Error - process did not run ok with valid whitelist\n");
337 if (launch_proc(wlval2) != 0 ) {
338 printf("Error - process did not run ok with valid whitelist value set\n");
341 if (launch_proc(wlval3) != 0 ) {
342 printf("Error - process did not run ok with valid whitelist + args\n");
350 * Test that the app doesn't run with invalid blacklist option.
351 * Final test ensures it does run with valid options as sanity check
354 test_invalid_b_flag(void)
356 #ifdef RTE_EXEC_ENV_BSDAPP
357 /* BSD target doesn't support prefixes at this point */
358 const char * prefix = "";
360 char prefix[PATH_MAX], tmp[PATH_MAX];
361 if (get_current_prefix(tmp, sizeof(tmp)) == NULL) {
362 printf("Error - unable to get current prefix!\n");
365 snprintf(prefix, sizeof(prefix), "--file-prefix=%s", tmp);
368 const char *blinval[][9] = {
369 {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-b", "error"},
370 {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-b", "0:0:0"},
371 {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-b", "0:error:0.1"},
372 {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-b", "0:0:0.1error"},
373 {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-b", "error0:0:0.1"},
374 {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-b", "0:0:0.1.2"},
376 /* Test with valid blacklist option */
377 const char *blval[] = {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-b", "FF:09:0B.3"};
381 for (i = 0; i != sizeof (blinval) / sizeof (blinval[0]); i++) {
382 if (launch_proc(blinval[i]) == 0) {
383 printf("Error - process did run ok with invalid "
384 "blacklist parameter\n");
388 if (launch_proc(blval) != 0) {
389 printf("Error - process did not run ok with valid blacklist value\n");
396 * Test that the app doesn't run with invalid vdev option.
397 * Final test ensures it does run with valid options as sanity check
399 #ifdef RTE_LIBRTE_PMD_RING
401 test_invalid_vdev_flag(void)
403 #ifdef RTE_EXEC_ENV_BSDAPP
404 /* BSD target doesn't support prefixes at this point, and we also need to
405 * run another primary process here */
406 const char * prefix = no_shconf;
408 const char * prefix = "--file-prefix=vdev";
411 /* Test with invalid vdev option */
412 const char *vdevinval[] = {prgname, prefix, "-n", "1",
413 "-c", "1", vdev, "eth_dummy"};
415 /* Test with valid vdev option */
416 const char *vdevval1[] = {prgname, prefix, "-n", "1",
417 "-c", "1", vdev, "eth_ring0"};
419 const char *vdevval2[] = {prgname, prefix, "-n", "1",
420 "-c", "1", vdev, "eth_ring0,args=test"};
422 const char *vdevval3[] = {prgname, prefix, "-n", "1",
423 "-c", "1", vdev, "eth_ring0,nodeaction=r1:0:CREATE"};
425 if (launch_proc(vdevinval) == 0) {
426 printf("Error - process did run ok with invalid "
431 if (launch_proc(vdevval1) != 0) {
432 printf("Error - process did not run ok with valid vdev value\n");
436 if (launch_proc(vdevval2) != 0) {
437 printf("Error - process did not run ok with valid vdev value,"
438 "with dummy args\n");
442 if (launch_proc(vdevval3) != 0) {
443 printf("Error - process did not run ok with valid vdev value,"
444 "with valid args\n");
452 * Test that the app doesn't run with invalid -r option.
455 test_invalid_r_flag(void)
457 #ifdef RTE_EXEC_ENV_BSDAPP
458 /* BSD target doesn't support prefixes at this point */
459 const char * prefix = "";
461 char prefix[PATH_MAX], tmp[PATH_MAX];
462 if (get_current_prefix(tmp, sizeof(tmp)) == NULL) {
463 printf("Error - unable to get current prefix!\n");
466 snprintf(prefix, sizeof(prefix), "--file-prefix=%s", tmp);
469 const char *rinval[][9] = {
470 {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-r", "error"},
471 {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-r", "0"},
472 {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-r", "-1"},
473 {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-r", "17"},
475 /* Test with valid blacklist option */
476 const char *rval[] = {prgname, prefix, mp_flag, "-n", "1", "-c", "1", "-r", "16"};
480 for (i = 0; i != sizeof (rinval) / sizeof (rinval[0]); i++) {
481 if (launch_proc(rinval[i]) == 0) {
482 printf("Error - process did run ok with invalid "
483 "-r (rank) parameter\n");
487 if (launch_proc(rval) != 0) {
488 printf("Error - process did not run ok with valid -r (rank) value\n");
495 * Test that the app doesn't run without the coremask/corelist flags. In all cases
496 * should give an error and fail to run
499 test_missing_c_flag(void)
501 #ifdef RTE_EXEC_ENV_BSDAPP
502 /* BSD target doesn't support prefixes at this point */
503 const char * prefix = "";
505 char prefix[PATH_MAX], tmp[PATH_MAX];
506 if (get_current_prefix(tmp, sizeof(tmp)) == NULL) {
507 printf("Error - unable to get current prefix!\n");
510 snprintf(prefix, sizeof(prefix), "--file-prefix=%s", tmp);
513 /* -c flag but no coremask value */
514 const char *argv1[] = { prgname, prefix, mp_flag, "-n", "3", "-c"};
515 /* No -c or -l flag at all */
516 const char *argv2[] = { prgname, prefix, mp_flag, "-n", "3"};
517 /* bad coremask value */
518 const char *argv3[] = { prgname, prefix, mp_flag, "-n", "3", "-c", "error" };
519 /* sanity check of tests - valid coremask value */
520 const char *argv4[] = { prgname, prefix, mp_flag, "-n", "3", "-c", "1" };
521 /* -l flag but no corelist value */
522 const char *argv5[] = { prgname, prefix, mp_flag, "-n", "3", "-l"};
523 const char *argv6[] = { prgname, prefix, mp_flag, "-n", "3", "-l", " " };
524 /* bad corelist values */
525 const char *argv7[] = { prgname, prefix, mp_flag, "-n", "3", "-l", "error" };
526 const char *argv8[] = { prgname, prefix, mp_flag, "-n", "3", "-l", "1-" };
527 const char *argv9[] = { prgname, prefix, mp_flag, "-n", "3", "-l", "1," };
528 const char *argv10[] = { prgname, prefix, mp_flag, "-n", "3", "-l", "1#2" };
529 /* sanity check test - valid corelist value */
530 const char *argv11[] = { prgname, prefix, mp_flag, "-n", "3", "-l", "1-2,3" };
532 if (launch_proc(argv1) == 0
533 || launch_proc(argv2) == 0
534 || launch_proc(argv3) == 0) {
535 printf("Error - process ran without error when missing -c flag\n");
538 if (launch_proc(argv4) != 0) {
539 printf("Error - process did not run ok with valid coremask value\n");
543 if (launch_proc(argv5) == 0
544 || launch_proc(argv6) == 0
545 || launch_proc(argv7) == 0
546 || launch_proc(argv8) == 0
547 || launch_proc(argv9) == 0
548 || launch_proc(argv10) == 0) {
549 printf("Error - process ran without error with invalid -l flag\n");
552 if (launch_proc(argv11) != 0) {
553 printf("Error - process did not run ok with valid corelist value\n");
560 * Test that the app doesn't run without the -n flag. In all cases
561 * should give an error and fail to run.
562 * Since -n is not compulsory for MP, we instead use --no-huge and --no-shconf
566 test_missing_n_flag(void)
568 #ifdef RTE_EXEC_ENV_BSDAPP
569 /* BSD target doesn't support prefixes at this point */
570 const char * prefix = "";
572 char prefix[PATH_MAX], tmp[PATH_MAX];
573 if (get_current_prefix(tmp, sizeof(tmp)) == NULL) {
574 printf("Error - unable to get current prefix!\n");
577 snprintf(prefix, sizeof(prefix), "--file-prefix=%s", tmp);
580 /* -n flag but no value */
581 const char *argv1[] = { prgname, prefix, no_huge, no_shconf, "-c", "1", "-n"};
582 /* No -n flag at all */
583 const char *argv2[] = { prgname, prefix, no_huge, no_shconf, "-c", "1"};
584 /* bad numeric value */
585 const char *argv3[] = { prgname, prefix, no_huge, no_shconf, "-c", "1", "-n", "e" };
586 /* out-of-range value */
587 const char *argv4[] = { prgname, prefix, no_huge, no_shconf, "-c", "1", "-n", "9" };
588 /* sanity test - check with good value */
589 const char *argv5[] = { prgname, prefix, no_huge, no_shconf, "-c", "1", "-n", "2" };
591 if (launch_proc(argv1) == 0
592 || launch_proc(argv2) == 0
593 || launch_proc(argv3) == 0
594 || launch_proc(argv4) == 0) {
595 printf("Error - process ran without error when missing -n flag\n");
598 if (launch_proc(argv5) != 0) {
599 printf("Error - process did not run ok with valid num-channel value\n");
606 * Test that the app runs with HPET, and without HPET
609 test_no_hpet_flag(void)
611 char prefix[PATH_MAX], tmp[PATH_MAX];
613 #ifdef RTE_EXEC_ENV_BSDAPP
616 if (get_current_prefix(tmp, sizeof(tmp)) == NULL) {
617 printf("Error - unable to get current prefix!\n");
620 snprintf(prefix, sizeof(prefix), "--file-prefix=%s", tmp);
623 const char *argv1[] = {prgname, prefix, mp_flag, no_hpet, "-c", "1", "-n", "2"};
624 /* Without --no-hpet */
625 const char *argv2[] = {prgname, prefix, mp_flag, "-c", "1", "-n", "2"};
627 if (launch_proc(argv1) != 0) {
628 printf("Error - process did not run ok with --no-hpet flag\n");
631 if (launch_proc(argv2) != 0) {
632 printf("Error - process did not run ok without --no-hpet flag\n");
639 * Test that the app runs with --no-huge and doesn't run when either
640 * -m or --socket-mem are specified with --no-huge.
643 test_no_huge_flag(void)
645 #ifdef RTE_EXEC_ENV_BSDAPP
646 /* BSD target doesn't support prefixes at this point, and we also need to
647 * run another primary process here */
648 const char * prefix = no_shconf;
650 const char * prefix = "--file-prefix=nohuge";
654 const char *argv1[] = {prgname, prefix, no_huge, "-c", "1", "-n", "2"};
655 /* With --no-huge and -m */
656 const char *argv2[] = {prgname, prefix, no_huge, "-c", "1", "-n", "2",
657 "-m", DEFAULT_MEM_SIZE};
659 /* With --no-huge and --socket-mem */
660 const char *argv3[] = {prgname, prefix, no_huge, "-c", "1", "-n", "2",
661 "--socket-mem=" DEFAULT_MEM_SIZE};
662 /* With --no-huge, -m and --socket-mem */
663 const char *argv4[] = {prgname, prefix, no_huge, "-c", "1", "-n", "2",
664 "-m", DEFAULT_MEM_SIZE, "--socket-mem=" DEFAULT_MEM_SIZE};
665 if (launch_proc(argv1) != 0) {
666 printf("Error - process did not run ok with --no-huge flag\n");
669 if (launch_proc(argv2) == 0) {
670 printf("Error - process run ok with --no-huge and -m flags\n");
673 #ifdef RTE_EXEC_ENV_BSDAPP
674 /* BSD target does not support NUMA, hence no --socket-mem tests */
678 if (launch_proc(argv3) == 0) {
679 printf("Error - process run ok with --no-huge and --socket-mem "
683 if (launch_proc(argv4) == 0) {
684 printf("Error - process run ok with --no-huge, -m and "
685 "--socket-mem flags\n");
691 #ifdef RTE_LIBRTE_XEN_DOM0
693 test_dom0_misc_flags(void)
695 char prefix[PATH_MAX], tmp[PATH_MAX];
697 if (get_current_prefix(tmp, sizeof(tmp)) == NULL) {
698 printf("Error - unable to get current prefix!\n");
701 snprintf(prefix, sizeof(prefix), "--file-prefix=%s", tmp);
703 /* check that some general flags don't prevent things from working.
704 * All cases, apart from the first, app should run.
705 * No futher testing of output done.
707 /* sanity check - failure with invalid option */
708 const char *argv0[] = {prgname, prefix, mp_flag, "-c", "1", "--invalid-opt"};
711 const char *argv1[] = {prgname, prefix, mp_flag, "-c", "1", "--no-pci"};
713 const char *argv2[] = {prgname, prefix, mp_flag, "-c", "1", "-v"};
714 /* With valid --syslog */
715 const char *argv3[] = {prgname, prefix, mp_flag, "-c", "1",
716 "--syslog", "syslog"};
717 /* With empty --syslog (should fail) */
718 const char *argv4[] = {prgname, prefix, mp_flag, "-c", "1", "--syslog"};
719 /* With invalid --syslog */
720 const char *argv5[] = {prgname, prefix, mp_flag, "-c", "1", "--syslog", "error"};
721 /* With no-sh-conf */
722 const char *argv6[] = {prgname, "-c", "1", "-n", "2", "-m", "20",
723 "--no-shconf", "--file-prefix=noshconf" };
725 if (launch_proc(argv0) == 0) {
726 printf("Error - process ran ok with invalid flag\n");
729 if (launch_proc(argv1) != 0) {
730 printf("Error - process did not run ok with --no-pci flag\n");
733 if (launch_proc(argv2) != 0) {
734 printf("Error - process did not run ok with -v flag\n");
737 if (launch_proc(argv3) != 0) {
738 printf("Error - process did not run ok with --syslog flag\n");
741 if (launch_proc(argv4) == 0) {
742 printf("Error - process run ok with empty --syslog flag\n");
745 if (launch_proc(argv5) == 0) {
746 printf("Error - process run ok with invalid --syslog flag\n");
749 if (launch_proc(argv6) != 0) {
750 printf("Error - process did not run ok with --no-shconf flag\n");
758 test_misc_flags(void)
760 char hugepath[PATH_MAX] = {0};
761 #ifdef RTE_EXEC_ENV_BSDAPP
762 /* BSD target doesn't support prefixes at this point */
763 const char * prefix = "";
764 const char * nosh_prefix = "";
766 char prefix[PATH_MAX], tmp[PATH_MAX];
767 const char * nosh_prefix = "--file-prefix=noshconf";
768 FILE * hugedir_handle = NULL;
769 char line[PATH_MAX] = {0};
770 unsigned i, isempty = 1;
771 if (get_current_prefix(tmp, sizeof(tmp)) == NULL) {
772 printf("Error - unable to get current prefix!\n");
775 snprintf(prefix, sizeof(prefix), "--file-prefix=%s", tmp);
778 * get first valid hugepage path
781 /* get hugetlbfs mountpoints from /proc/mounts */
782 hugedir_handle = fopen("/proc/mounts", "r");
784 if (hugedir_handle == NULL) {
785 printf("Error opening /proc/mounts!\n");
789 /* read /proc/mounts */
790 while (fgets(line, sizeof(line), hugedir_handle) != NULL) {
792 /* find first valid hugepath */
793 if (get_hugepage_path(line, sizeof(line), hugepath, sizeof(hugepath)))
797 fclose(hugedir_handle);
799 /* check if path is not empty */
800 for (i = 0; i < sizeof(hugepath); i++)
801 if (hugepath[i] != '\0')
805 printf("No mounted hugepage dir found!\n");
811 /* check that some general flags don't prevent things from working.
812 * All cases, apart from the first, app should run.
813 * No futher testing of output done.
815 /* sanity check - failure with invalid option */
816 const char *argv0[] = {prgname, prefix, mp_flag, "-c", "1", "--invalid-opt"};
819 const char *argv1[] = {prgname, prefix, mp_flag, "-c", "1", "--no-pci"};
821 const char *argv2[] = {prgname, prefix, mp_flag, "-c", "1", "-v"};
822 /* With valid --syslog */
823 const char *argv3[] = {prgname, prefix, mp_flag, "-c", "1",
824 "--syslog", "syslog"};
825 /* With empty --syslog (should fail) */
826 const char *argv4[] = {prgname, prefix, mp_flag, "-c", "1", "--syslog"};
827 /* With invalid --syslog */
828 const char *argv5[] = {prgname, prefix, mp_flag, "-c", "1", "--syslog", "error"};
829 /* With no-sh-conf */
830 const char *argv6[] = {prgname, "-c", "1", "-n", "2", "-m", DEFAULT_MEM_SIZE,
831 no_shconf, nosh_prefix };
833 #ifdef RTE_EXEC_ENV_BSDAPP
836 /* With --huge-dir */
837 const char *argv7[] = {prgname, "-c", "1", "-n", "2", "-m", DEFAULT_MEM_SIZE,
838 "--file-prefix=hugedir", "--huge-dir", hugepath};
839 /* With empty --huge-dir (should fail) */
840 const char *argv8[] = {prgname, "-c", "1", "-n", "2", "-m", DEFAULT_MEM_SIZE,
841 "--file-prefix=hugedir", "--huge-dir"};
842 /* With invalid --huge-dir */
843 const char *argv9[] = {prgname, "-c", "1", "-n", "2", "-m", DEFAULT_MEM_SIZE,
844 "--file-prefix=hugedir", "--huge-dir", "invalid"};
845 /* Secondary process with invalid --huge-dir (should run as flag has no
846 * effect on secondary processes) */
847 const char *argv10[] = {prgname, prefix, mp_flag, "-c", "1", "--huge-dir", "invalid"};
849 /* try running with base-virtaddr param */
850 const char *argv11[] = {prgname, "--file-prefix=virtaddr",
851 "-c", "1", "-n", "2", "--base-virtaddr=0x12345678"};
853 /* try running with --vfio-intr INTx flag */
854 const char *argv12[] = {prgname, "--file-prefix=intr",
855 "-c", "1", "-n", "2", "--vfio-intr=legacy"};
857 /* try running with --vfio-intr MSI flag */
858 const char *argv13[] = {prgname, "--file-prefix=intr",
859 "-c", "1", "-n", "2", "--vfio-intr=msi"};
861 /* try running with --vfio-intr MSI-X flag */
862 const char *argv14[] = {prgname, "--file-prefix=intr",
863 "-c", "1", "-n", "2", "--vfio-intr=msix"};
865 /* try running with --vfio-intr invalid flag */
866 const char *argv15[] = {prgname, "--file-prefix=intr",
867 "-c", "1", "-n", "2", "--vfio-intr=invalid"};
870 if (launch_proc(argv0) == 0) {
871 printf("Error - process ran ok with invalid flag\n");
874 if (launch_proc(argv1) != 0) {
875 printf("Error - process did not run ok with --no-pci flag\n");
878 if (launch_proc(argv2) != 0) {
879 printf("Error - process did not run ok with -v flag\n");
882 if (launch_proc(argv3) != 0) {
883 printf("Error - process did not run ok with --syslog flag\n");
886 if (launch_proc(argv4) == 0) {
887 printf("Error - process run ok with empty --syslog flag\n");
890 if (launch_proc(argv5) == 0) {
891 printf("Error - process run ok with invalid --syslog flag\n");
894 if (launch_proc(argv6) != 0) {
895 printf("Error - process did not run ok with --no-shconf flag\n");
898 #ifdef RTE_EXEC_ENV_BSDAPP
901 if (launch_proc(argv7) != 0) {
902 printf("Error - process did not run ok with --huge-dir flag\n");
905 if (launch_proc(argv8) == 0) {
906 printf("Error - process run ok with empty --huge-dir flag\n");
909 if (launch_proc(argv9) == 0) {
910 printf("Error - process run ok with invalid --huge-dir flag\n");
913 if (launch_proc(argv10) != 0) {
914 printf("Error - secondary process did not run ok with invalid --huge-dir flag\n");
917 if (launch_proc(argv11) != 0) {
918 printf("Error - process did not run ok with --base-virtaddr parameter\n");
921 if (launch_proc(argv12) != 0) {
922 printf("Error - process did not run ok with "
923 "--vfio-intr INTx parameter\n");
926 if (launch_proc(argv13) != 0) {
927 printf("Error - process did not run ok with "
928 "--vfio-intr MSI parameter\n");
931 if (launch_proc(argv14) != 0) {
932 printf("Error - process did not run ok with "
933 "--vfio-intr MSI-X parameter\n");
936 if (launch_proc(argv15) == 0) {
937 printf("Error - process run ok with "
938 "--vfio-intr invalid parameter\n");
946 test_file_prefix(void)
949 * 1. check if current process hugefiles are locked
950 * 2. try to run secondary process without a corresponding primary process
951 * (while failing to run, it will also remove any unused hugepage files)
952 * 3. check if current process hugefiles are still in place and are locked
953 * 4. run a primary process with memtest1 prefix
954 * 5. check if memtest1 hugefiles are created
955 * 6. run a primary process with memtest2 prefix
956 * 7. check that only memtest2 hugefiles are present in the hugedir
959 #ifdef RTE_EXEC_ENV_BSDAPP
963 /* this should fail unless the test itself is run with "memtest" prefix */
964 const char *argv0[] = {prgname, mp_flag, "-c", "1", "-n", "2", "-m", DEFAULT_MEM_SIZE,
965 "--file-prefix=" memtest };
967 /* primary process with memtest1 */
968 const char *argv1[] = {prgname, "-c", "1", "-n", "2", "-m", DEFAULT_MEM_SIZE,
969 "--file-prefix=" memtest1 };
971 /* primary process with memtest2 */
972 const char *argv2[] = {prgname, "-c", "1", "-n", "2", "-m", DEFAULT_MEM_SIZE,
973 "--file-prefix=" memtest2 };
976 if (get_current_prefix(prefix, sizeof(prefix)) == NULL) {
977 printf("Error - unable to get current prefix!\n");
980 #ifdef RTE_LIBRTE_XEN_DOM0
984 /* check if files for current prefix are present */
985 if (process_hugefiles(prefix, HUGEPAGE_CHECK_EXISTS) != 1) {
986 printf("Error - hugepage files for %s were not created!\n", prefix);
990 /* checks if files for current prefix are locked */
991 if (process_hugefiles(prefix, HUGEPAGE_CHECK_LOCKED) != 1) {
992 printf("Error - hugepages for current process aren't locked!\n");
996 /* check if files for secondary process are present */
997 if (process_hugefiles(memtest, HUGEPAGE_CHECK_EXISTS) == 1) {
998 /* check if they are not locked */
999 if (process_hugefiles(memtest, HUGEPAGE_CHECK_LOCKED) == 1) {
1000 printf("Error - hugepages for current process are locked!\n");
1003 /* they aren't locked, delete them */
1005 if (process_hugefiles(memtest, HUGEPAGE_DELETE) != 1) {
1006 printf("Error - deleting hugepages failed!\n");
1012 if (launch_proc(argv0) == 0) {
1013 printf("Error - secondary process ran ok without primary process\n");
1017 /* check if files for current prefix are present */
1018 if (process_hugefiles(prefix, HUGEPAGE_CHECK_EXISTS) != 1) {
1019 printf("Error - hugepage files for %s were not created!\n", prefix);
1023 /* checks if files for current prefix are locked */
1024 if (process_hugefiles(prefix, HUGEPAGE_CHECK_LOCKED) != 1) {
1025 printf("Error - hugepages for current process aren't locked!\n");
1029 if (launch_proc(argv1) != 0) {
1030 printf("Error - failed to run with --file-prefix=%s\n", memtest);
1034 /* check if memtest1_map0 is present */
1035 if (process_hugefiles(memtest1, HUGEPAGE_CHECK_EXISTS) != 1) {
1036 printf("Error - hugepage files for %s were not created!\n", memtest1);
1040 if (launch_proc(argv2) != 0) {
1041 printf("Error - failed to run with --file-prefix=%s\n", memtest2);
1045 /* check if hugefiles for memtest2 are present */
1046 if (process_hugefiles(memtest2, HUGEPAGE_CHECK_EXISTS) != 1) {
1047 printf("Error - hugepage files for %s were not created!\n", memtest2);
1051 /* check if hugefiles for memtest1 are present */
1052 if (process_hugefiles(memtest1, HUGEPAGE_CHECK_EXISTS) != 0) {
1053 printf("Error - hugepage files for %s were not deleted!\n", memtest1);
1061 * Tests for correct handling of -m and --socket-mem flags
1064 test_memory_flags(void)
1066 #ifdef RTE_EXEC_ENV_BSDAPP
1067 /* BSD target doesn't support prefixes at this point */
1068 const char * prefix = "";
1070 char prefix[PATH_MAX], tmp[PATH_MAX];
1071 if (get_current_prefix(tmp, sizeof(tmp)) == NULL) {
1072 printf("Error - unable to get current prefix!\n");
1075 snprintf(prefix, sizeof(prefix), "--file-prefix=%s", tmp);
1078 /* valid -m flag and mp flag */
1079 const char *argv0[] = {prgname, prefix, mp_flag, "-c", "10",
1080 "-n", "2", "-m", DEFAULT_MEM_SIZE};
1083 const char *argv1[] = {prgname, "-c", "10", "-n", "2",
1084 "--file-prefix=" memtest, "-m", DEFAULT_MEM_SIZE};
1086 /* invalid (zero) --socket-mem flag */
1087 const char *argv2[] = {prgname, "-c", "10", "-n", "2",
1088 "--file-prefix=" memtest, "--socket-mem=0,0,0,0"};
1090 /* invalid (incomplete) --socket-mem flag */
1091 const char *argv3[] = {prgname, "-c", "10", "-n", "2",
1092 "--file-prefix=" memtest, "--socket-mem=2,2,"};
1094 /* invalid (mixed with invalid data) --socket-mem flag */
1095 const char *argv4[] = {prgname, "-c", "10", "-n", "2",
1096 "--file-prefix=" memtest, "--socket-mem=2,2,Fred"};
1098 /* invalid (with numeric value as last character) --socket-mem flag */
1099 const char *argv5[] = {prgname, "-c", "10", "-n", "2",
1100 "--file-prefix=" memtest, "--socket-mem=2,2,Fred0"};
1102 /* invalid (with empty socket) --socket-mem flag */
1103 const char *argv6[] = {prgname, "-c", "10", "-n", "2",
1104 "--file-prefix=" memtest, "--socket-mem=2,,2"};
1106 /* invalid (null) --socket-mem flag */
1107 const char *argv7[] = {prgname, "-c", "10", "-n", "2",
1108 "--file-prefix=" memtest, "--socket-mem="};
1110 /* valid --socket-mem specified together with -m flag */
1111 const char *argv8[] = {prgname, "-c", "10", "-n", "2",
1112 "--file-prefix=" memtest, "-m", DEFAULT_MEM_SIZE, "--socket-mem=2,2"};
1114 /* construct an invalid socket mask with 2 megs on each socket plus
1115 * extra 2 megs on socket that doesn't exist on current system */
1116 char invalid_socket_mem[SOCKET_MEM_STRLEN];
1117 char buf[SOCKET_MEM_STRLEN]; /* to avoid copying string onto itself */
1119 #ifdef RTE_EXEC_ENV_BSDAPP
1120 int i, num_sockets = 1;
1122 int i, num_sockets = get_number_of_sockets();
1125 if (num_sockets <= 0 || num_sockets > RTE_MAX_NUMA_NODES) {
1126 printf("Error - cannot get number of sockets!\n");
1130 snprintf(invalid_socket_mem, sizeof(invalid_socket_mem), "--socket-mem=");
1132 /* add one extra socket */
1133 for (i = 0; i < num_sockets + 1; i++) {
1134 snprintf(buf, sizeof(buf), "%s%s", invalid_socket_mem, DEFAULT_MEM_SIZE);
1135 snprintf(invalid_socket_mem, sizeof(invalid_socket_mem), "%s", buf);
1137 if (num_sockets + 1 - i > 1) {
1138 snprintf(buf, sizeof(buf), "%s,", invalid_socket_mem);
1139 snprintf(invalid_socket_mem, sizeof(invalid_socket_mem), "%s", buf);
1143 /* construct a valid socket mask with 2 megs on each existing socket */
1144 char valid_socket_mem[SOCKET_MEM_STRLEN];
1146 snprintf(valid_socket_mem, sizeof(valid_socket_mem), "--socket-mem=");
1148 /* add one extra socket */
1149 for (i = 0; i < num_sockets; i++) {
1150 snprintf(buf, sizeof(buf), "%s%s", valid_socket_mem, DEFAULT_MEM_SIZE);
1151 snprintf(valid_socket_mem, sizeof(valid_socket_mem), "%s", buf);
1153 if (num_sockets - i > 1) {
1154 snprintf(buf, sizeof(buf), "%s,", valid_socket_mem);
1155 snprintf(valid_socket_mem, sizeof(valid_socket_mem), "%s", buf);
1159 /* invalid --socket-mem flag (with extra socket) */
1160 const char *argv9[] = {prgname, "-c", "10", "-n", "2",
1161 "--file-prefix=" memtest, invalid_socket_mem};
1163 /* valid --socket-mem flag */
1164 const char *argv10[] = {prgname, "-c", "10", "-n", "2",
1165 "--file-prefix=" memtest, valid_socket_mem};
1167 if (launch_proc(argv0) != 0) {
1168 printf("Error - secondary process failed with valid -m flag !\n");
1172 #ifdef RTE_EXEC_ENV_BSDAPP
1173 /* no other tests are applicable to BSD */
1177 if (launch_proc(argv1) != 0) {
1178 printf("Error - process failed with valid -m flag!\n");
1181 #ifdef RTE_LIBRTE_XEN_DOM0
1184 if (launch_proc(argv2) == 0) {
1185 printf("Error - process run ok with invalid (zero) --socket-mem!\n");
1189 if (launch_proc(argv3) == 0) {
1190 printf("Error - process run ok with invalid "
1191 "(incomplete) --socket-mem!\n");
1195 if (launch_proc(argv4) == 0) {
1196 printf("Error - process run ok with invalid "
1197 "(mixed with invalid input) --socket-mem!\n");
1201 if (launch_proc(argv5) == 0) {
1202 printf("Error - process run ok with invalid "
1203 "(mixed with invalid input with a numeric value as "
1204 "last character) --socket-mem!\n");
1208 if (launch_proc(argv6) == 0) {
1209 printf("Error - process run ok with invalid "
1210 "(with empty socket) --socket-mem!\n");
1214 if (launch_proc(argv7) == 0) {
1215 printf("Error - process run ok with invalid (null) --socket-mem!\n");
1219 if (launch_proc(argv8) == 0) {
1220 printf("Error - process run ok with --socket-mem and -m specified!\n");
1224 if (launch_proc(argv9) == 0) {
1225 printf("Error - process run ok with extra socket in --socket-mem!\n");
1229 if (launch_proc(argv10) != 0) {
1230 printf("Error - process failed with valid --socket-mem!\n");
1238 test_eal_flags(void)
1242 ret = test_missing_c_flag();
1244 printf("Error in test_missing_c_flag()\n");
1248 ret = test_missing_n_flag();
1250 printf("Error in test_missing_n_flag()\n");
1254 ret = test_no_hpet_flag();
1256 printf("Error in test_no_hpet_flag()\n");
1260 ret = test_no_huge_flag();
1262 printf("Error in test_no_huge_flag()\n");
1266 ret = test_whitelist_flag();
1268 printf("Error in test_invalid_whitelist_flag()\n");
1272 ret = test_invalid_b_flag();
1274 printf("Error in test_invalid_b_flag()\n");
1278 #ifdef RTE_LIBRTE_PMD_RING
1279 ret = test_invalid_vdev_flag();
1281 printf("Error in test_invalid_vdev_flag()\n");
1285 ret = test_invalid_r_flag();
1287 printf("Error in test_invalid_r_flag()\n");
1291 ret = test_memory_flags();
1293 printf("Error in test_memory_flags()\n");
1297 ret = test_file_prefix();
1299 printf("Error in test_file_prefix()\n");
1303 #ifdef RTE_LIBRTE_XEN_DOM0
1304 ret = test_dom0_misc_flags();
1306 ret = test_misc_flags();
1309 printf("Error in test_misc_flags()");
1316 static struct test_command eal_flags_cmd = {
1317 .command = "eal_flags_autotest",
1318 .callback = test_eal_flags,
1320 REGISTER_TEST_COMMAND(eal_flags_cmd);