This is an automated email from the git hooks/post-receive script. It was generated because a ref change was pushed to the repository containing the project "".
The branch, api-next has been updated via 0b2b26281c0d1d8d00d69f9829e32c9a99b7af0f (commit) via 1bc1b6fed4c75b3bd9305d2c9e646efc50de5fb3 (commit) from 859293ad9b3c862264bb0fbfe8e7037b5e04d084 (commit)
Those revisions listed above that are new to this repository have not appeared on any other notification email; so we list those revisions in full, below.
- Log ----------------------------------------------------------------- commit 0b2b26281c0d1d8d00d69f9829e32c9a99b7af0f Author: Dmitry Eremin-Solenikov dmitry.ereminsolenikov@linaro.org Date: Thu Aug 24 04:58:46 2017 +0300
test: performance: crypto: free crypto-out queue
Free crypto-out queue if it was created.
Signed-off-by: Dmitry Eremin-Solenikov dmitry.ereminsolenikov@linaro.org Reviewed-by: Bill Fischofer bill.fischofer@linaro.org Signed-off-by: Maxim Uvarov maxim.uvarov@linaro.org
diff --git a/test/common_plat/performance/odp_crypto.c b/test/common_plat/performance/odp_crypto.c index 8449f1fc..9fc13400 100644 --- a/test/common_plat/performance/odp_crypto.c +++ b/test/common_plat/performance/odp_crypto.c @@ -835,6 +835,8 @@ int main(int argc, char *argv[]) } }
+ if (cargs.schedule || cargs.poll) + odp_queue_destroy(out_queue); if (odp_pool_destroy(pool)) { app_err("Error: pool destroy\n"); exit(EXIT_FAILURE);
commit 1bc1b6fed4c75b3bd9305d2c9e646efc50de5fb3 Author: Dmitry Eremin-Solenikov dmitry.ereminsolenikov@linaro.org Date: Thu Aug 24 04:58:46 2017 +0300
test: performance: crypto: fix packet freeing
With new packet reference code, ODP has become stricter on packet double free errors, highlighting several bugs in packet handling code in crypto performance test. Fix packet double-free errors.
Signed-off-by: Dmitry Eremin-Solenikov dmitry.ereminsolenikov@linaro.org Reviewed-by: Bill Fischofer bill.fischofer@linaro.org Signed-off-by: Maxim Uvarov maxim.uvarov@linaro.org
diff --git a/test/common_plat/performance/odp_crypto.c b/test/common_plat/performance/odp_crypto.c index 7a25ffdc..8449f1fc 100644 --- a/test/common_plat/performance/odp_crypto.c +++ b/test/common_plat/performance/odp_crypto.c @@ -560,6 +560,8 @@ run_measure_one(crypto_args_t *cargs, if (rc <= 0) { app_err("failed odp_crypto_packet_op_enq: rc = %d\n", rc); + if (!cargs->reuse_packet) + odp_packet_free(pkt); break; } packets_sent += rc; @@ -569,6 +571,8 @@ run_measure_one(crypto_args_t *cargs, if (rc <= 0) { app_err("failed odp_crypto_packet_op: rc = %d\n", rc); + if (!cargs->reuse_packet) + odp_packet_free(pkt); break; } packets_sent += rc; @@ -582,16 +586,14 @@ run_measure_one(crypto_args_t *cargs, config->session. auth_digest_len); } - if (!cargs->in_place) { - if (cargs->reuse_packet) - pkt = out_pkt; - else - odp_packet_free(out_pkt); - } + if (cargs->reuse_packet) + pkt = out_pkt; + else + odp_packet_free(out_pkt); } }
- if (out_queue != ODP_QUEUE_INVALID) { + if (cargs->schedule || cargs->poll) { odp_event_t ev; odp_crypto_packet_result_t result; odp_packet_t out_pkt; @@ -646,7 +648,7 @@ run_measure_one(crypto_args_t *cargs, cargs->iteration_count; }
- if (ODP_PACKET_INVALID != pkt) + if (cargs->reuse_packet) odp_packet_free(pkt);
return rc < 0 ? rc : 0;
-----------------------------------------------------------------------
Summary of changes: test/common_plat/performance/odp_crypto.c | 20 ++++++++++++-------- 1 file changed, 12 insertions(+), 8 deletions(-)
hooks/post-receive