From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: 
Received: from mail-yb1-f182.google.com (mail-yb1-f182.google.com
 [209.85.219.182]) by dpdk.org (Postfix) with ESMTP id B1F735F1D
 for ; Wed, 10 Apr 2019 13:33:52 +0200 (CEST)
Received: by mail-yb1-f182.google.com with SMTP id u187so653509ybg.11
 for ; Wed, 10 Apr 2019 04:33:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=MKuXOJ/8U5eR0jdn/d5d2psgiKW7y88gBNpfhQnVS1M=;
 b=njYpbzmReq+p/mV3kQmr3NM+bKk92YfgaC7jWSbAbtQI1W6WZqphzCWMJwwZexFtR+
 Pz+V6NqBNs8NpQ58E1ww8sVkwjmO+trA3Vb4WQn0N7J9JUZh5GZQDvG59139cVMplcZj
 80ZkuE708c9XsTJItXuniC9vJYRPkH+28q5GZLSlceMXnB9TNpJ80k//guLB03i4VPxZ
 kmkb1O18aJEKMj0s687gP6Ks8RyBLrolmBfHj5wr8HbhPCLIRh01Zt/4dsn42av2bweF
 SlOLBEJjanxK+zwO33TyvTg3B0NWNmt9eOvARZWOGJ50CHL3AnNpIxx51RJEp7b6bTTG
 cTww==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=MKuXOJ/8U5eR0jdn/d5d2psgiKW7y88gBNpfhQnVS1M=;
 b=sKADm5s3iHj0r8KYOh+6R3J095Ex1EhQNYsTz7f47UBKjwS7d/Hda14Gry0MhDmrXL
 PO2dnFPPBi3fc1TWfZJe+c+czhooLFOCzuoZCbVbAQ4Es06ULFw4feipLkSgYNPM+kWM
 YP1hne2z5J9KY0hrevmssfLkE6pdW2HQooWOrIxQ3gAvUxhIGGE7MmECaH7OYP7GwsYp
 JHjks+YbqfX+OrXP6iDsc+iCpsQSED/o9x0UXLIOy0wvi6dKCRc2mcYGi+lSVco1Lcpg
 Y2Oz7e4bakSiruuxQ0ZtM0vW7A456tu4JetUUzp6Vr2bGHCBX7OdmDiFOGpVQFGvECNW
 YOHw==
X-Gm-Message-State: APjAAAWUmM5zJ/qG2hAD3GcVuUqLzlRimGPAgvrFmgSaSZVonmVz23o6
 BzqP021Gv8B4DvdnMg4XHkGDD/7Ck5f44H/b8+0=
X-Google-Smtp-Source: APXvYqz98vfaWUyecR6AzFUG78uFW0WobGzW+JVc19Zj/c4Nvxj1h3pIntaEnJPR4U63PqOcYDNc7PxG/3wzy1jNvLk=
X-Received: by 2002:a25:9b43:: with SMTP id u3mr16693291ybo.24.1554896032178; 
 Wed, 10 Apr 2019 04:33:52 -0700 (PDT)
MIME-Version: 1.0
References: 
 
In-Reply-To: 
From: =?UTF-8?B?UHJ6ZW15c8WCYXcgT8WCdGFyemV3c2tp?= 
Date: Wed, 10 Apr 2019 13:39:58 +0200
Message-ID: 
To: David Marchand 
Cc: Chas Williams <3chas3@gmail.com>, dev 
X-Mailman-Approved-At: Wed, 10 Apr 2019 16:02:30 +0200
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [dpdk-dev] [Bug 248] Bonding PMD: Invalid array dimension in TX
 burst for 802.3ad mode with fast queue leads to SEGFAULT
X-BeenThere: dev@dpdk.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DPDK patches and discussions 
List-Unsubscribe: ,
 
List-Archive: 
List-Post: 
List-Help: 
List-Subscribe: ,
 
X-List-Received-Date: Wed, 10 Apr 2019 11:33:52 -0000
Hello David,
I can merge these fixes and run our system using patched DPDK version. Then
report back any problems / improvements I observe. I can also walk through
source code changes and check for anything questionable.
Unfortunately I lack deep enough understanding of DPDK source code to test
these fixes comprehensively and I have been short on time recently as well,
so that's the best I can do right now.
Best Regards,
Przemys=C5=82aw O=C5=82tarzewski
On Tue, Apr 9, 2019 at 4:51 PM David Marchand 
wrote:
>
>
> On Tue, Apr 9, 2019 at 4:45 PM  wrote:
>
>> https://bugs.dpdk.org/show_bug.cgi?id=3D248
>>
>>             Bug ID: 248
>>            Summary: Bonding PMD: Invalid array dimension in TX burst for
>>                     802.3ad mode with fast queue leads to SEGFAULT
>>            Product: DPDK
>>            Version: 18.11
>>           Hardware: All
>>                 OS: All
>>             Status: CONFIRMED
>>           Severity: major
>>           Priority: Normal
>>          Component: ethdev
>>           Assignee: dev@dpdk.org
>>           Reporter: p.oltarzewski@gmail.com
>>   Target Milestone: ---
>>
>> DPDK 18.11.1
>>
>> In drivers/net/bonding/rte_eth_bond_pmd.c::bond_ethdev_tx_burst_8023ad,
>> bufs_slave_port_idxs array is defined as follows (lines 1293-1294):
>>
>>     /* Mapping array generated by hash function to map mbufs to slaves *=
/
>>     uint16_t bufs_slave_port_idxs[RTE_MAX_ETHPORTS] =3D { 0 };
>>
>> Array dimension should be equal to number of packets being transmitted
>> (nb_pkts) - as correctly implemented in
>> rte_eth_bond_pmd.c::bond_ethdev_tx_burst_balance.
>>
>> Invalid array dimension causes overflow when number of transmitted
>> packets is
>> greater than RTE_MAX_ETHPORTS. Some areas of memory end up overwritten
>> (in my
>> particular case, slave_nb_bufs array), which leads to SIGSEGV and crash.
>>
>> To work around the issue, ensure that number of packets transmitted in a
>> single
>> burst is no greater than RTE_MAX_ETHPORTS.
>>
>> To fix it, it should be sufficient to define bufs_slave_port_idxs as a
>> variable-length array, as in bond_ethdev_tx_burst_balance:
>>
>>     /* Mapping array generated by hash function to map mbufs to slaves *=
/
>>     uint16_t bufs_slave_port_idxs[nb_bufs];
>>
>
> I have a series of fixes for this, and on the rx parts as well but did no=
t
> have time to properly check them.
> Would you have some time to test it if I send it ?
>
>
> --
> David Marchand
>
From mboxrd@z Thu Jan  1 00:00:00 1970
Return-Path: 
Received: from dpdk.org (dpdk.org [92.243.14.124])
	by dpdk.space (Postfix) with ESMTP id DD963A0096
	for ; Wed, 10 Apr 2019 16:02:32 +0200 (CEST)
Received: from [92.243.14.124] (localhost [127.0.0.1])
	by dpdk.org (Postfix) with ESMTP id 8D1101B14D;
	Wed, 10 Apr 2019 16:02:32 +0200 (CEST)
Received: from mail-yb1-f182.google.com (mail-yb1-f182.google.com
 [209.85.219.182]) by dpdk.org (Postfix) with ESMTP id B1F735F1D
 for ; Wed, 10 Apr 2019 13:33:52 +0200 (CEST)
Received: by mail-yb1-f182.google.com with SMTP id u187so653509ybg.11
 for ; Wed, 10 Apr 2019 04:33:52 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
 h=mime-version:references:in-reply-to:from:date:message-id:subject:to
 :cc; bh=MKuXOJ/8U5eR0jdn/d5d2psgiKW7y88gBNpfhQnVS1M=;
 b=njYpbzmReq+p/mV3kQmr3NM+bKk92YfgaC7jWSbAbtQI1W6WZqphzCWMJwwZexFtR+
 Pz+V6NqBNs8NpQ58E1ww8sVkwjmO+trA3Vb4WQn0N7J9JUZh5GZQDvG59139cVMplcZj
 80ZkuE708c9XsTJItXuniC9vJYRPkH+28q5GZLSlceMXnB9TNpJ80k//guLB03i4VPxZ
 kmkb1O18aJEKMj0s687gP6Ks8RyBLrolmBfHj5wr8HbhPCLIRh01Zt/4dsn42av2bweF
 SlOLBEJjanxK+zwO33TyvTg3B0NWNmt9eOvARZWOGJ50CHL3AnNpIxx51RJEp7b6bTTG
 cTww==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
 d=1e100.net; s=20161025;
 h=x-gm-message-state:mime-version:references:in-reply-to:from:date
 :message-id:subject:to:cc;
 bh=MKuXOJ/8U5eR0jdn/d5d2psgiKW7y88gBNpfhQnVS1M=;
 b=sKADm5s3iHj0r8KYOh+6R3J095Ex1EhQNYsTz7f47UBKjwS7d/Hda14Gry0MhDmrXL
 PO2dnFPPBi3fc1TWfZJe+c+czhooLFOCzuoZCbVbAQ4Es06ULFw4feipLkSgYNPM+kWM
 YP1hne2z5J9KY0hrevmssfLkE6pdW2HQooWOrIxQ3gAvUxhIGGE7MmECaH7OYP7GwsYp
 JHjks+YbqfX+OrXP6iDsc+iCpsQSED/o9x0UXLIOy0wvi6dKCRc2mcYGi+lSVco1Lcpg
 Y2Oz7e4bakSiruuxQ0ZtM0vW7A456tu4JetUUzp6Vr2bGHCBX7OdmDiFOGpVQFGvECNW
 YOHw==
X-Gm-Message-State: APjAAAWUmM5zJ/qG2hAD3GcVuUqLzlRimGPAgvrFmgSaSZVonmVz23o6
 BzqP021Gv8B4DvdnMg4XHkGDD/7Ck5f44H/b8+0=
X-Google-Smtp-Source: APXvYqz98vfaWUyecR6AzFUG78uFW0WobGzW+JVc19Zj/c4Nvxj1h3pIntaEnJPR4U63PqOcYDNc7PxG/3wzy1jNvLk=
X-Received: by 2002:a25:9b43:: with SMTP id u3mr16693291ybo.24.1554896032178; 
 Wed, 10 Apr 2019 04:33:52 -0700 (PDT)
MIME-Version: 1.0
References: 
 
In-Reply-To: 
From: =?UTF-8?B?UHJ6ZW15c8WCYXcgT8WCdGFyemV3c2tp?= 
Date: Wed, 10 Apr 2019 13:39:58 +0200
Message-ID:
 
To: David Marchand 
Cc: Chas Williams <3chas3@gmail.com>, dev 
X-Mailman-Approved-At: Wed, 10 Apr 2019 16:02:30 +0200
Content-Type: text/plain; charset="UTF-8"
Content-Transfer-Encoding: quoted-printable
X-Content-Filtered-By: Mailman/MimeDel 2.1.15
Subject: Re: [dpdk-dev] [Bug 248] Bonding PMD: Invalid array dimension in TX
 burst for 802.3ad mode with fast queue leads to SEGFAULT
X-BeenThere: dev@dpdk.org
X-Mailman-Version: 2.1.15
Precedence: list
List-Id: DPDK patches and discussions 
List-Unsubscribe: ,
 
List-Archive: 
List-Post: 
List-Help: 
List-Subscribe: ,
 
Errors-To: dev-bounces@dpdk.org
Sender: "dev" 
Message-ID: <20190410113958.kzao8U2oVZsU8bRGYNrPYKO9fJzhKgXXpwxB3I09IZY@z>
Hello David,
I can merge these fixes and run our system using patched DPDK version. Then
report back any problems / improvements I observe. I can also walk through
source code changes and check for anything questionable.
Unfortunately I lack deep enough understanding of DPDK source code to test
these fixes comprehensively and I have been short on time recently as well,
so that's the best I can do right now.
Best Regards,
Przemys=C5=82aw O=C5=82tarzewski
On Tue, Apr 9, 2019 at 4:51 PM David Marchand 
wrote:
>
>
> On Tue, Apr 9, 2019 at 4:45 PM  wrote:
>
>> https://bugs.dpdk.org/show_bug.cgi?id=3D248
>>
>>             Bug ID: 248
>>            Summary: Bonding PMD: Invalid array dimension in TX burst for
>>                     802.3ad mode with fast queue leads to SEGFAULT
>>            Product: DPDK
>>            Version: 18.11
>>           Hardware: All
>>                 OS: All
>>             Status: CONFIRMED
>>           Severity: major
>>           Priority: Normal
>>          Component: ethdev
>>           Assignee: dev@dpdk.org
>>           Reporter: p.oltarzewski@gmail.com
>>   Target Milestone: ---
>>
>> DPDK 18.11.1
>>
>> In drivers/net/bonding/rte_eth_bond_pmd.c::bond_ethdev_tx_burst_8023ad,
>> bufs_slave_port_idxs array is defined as follows (lines 1293-1294):
>>
>>     /* Mapping array generated by hash function to map mbufs to slaves *=
/
>>     uint16_t bufs_slave_port_idxs[RTE_MAX_ETHPORTS] =3D { 0 };
>>
>> Array dimension should be equal to number of packets being transmitted
>> (nb_pkts) - as correctly implemented in
>> rte_eth_bond_pmd.c::bond_ethdev_tx_burst_balance.
>>
>> Invalid array dimension causes overflow when number of transmitted
>> packets is
>> greater than RTE_MAX_ETHPORTS. Some areas of memory end up overwritten
>> (in my
>> particular case, slave_nb_bufs array), which leads to SIGSEGV and crash.
>>
>> To work around the issue, ensure that number of packets transmitted in a
>> single
>> burst is no greater than RTE_MAX_ETHPORTS.
>>
>> To fix it, it should be sufficient to define bufs_slave_port_idxs as a
>> variable-length array, as in bond_ethdev_tx_burst_balance:
>>
>>     /* Mapping array generated by hash function to map mbufs to slaves *=
/
>>     uint16_t bufs_slave_port_idxs[nb_bufs];
>>
>
> I have a series of fixes for this, and on the rx parts as well but did no=
t
> have time to properly check them.
> Would you have some time to test it if I send it ?
>
>
> --
> David Marchand
>