From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 9587CA0545; Tue, 11 Oct 2022 11:41:04 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 6B5A242BCC; Tue, 11 Oct 2022 11:41:04 +0200 (CEST) Received: from inbox.dpdk.org (inbox.dpdk.org [95.142.172.178]) by mails.dpdk.org (Postfix) with ESMTP id DEC4342829 for ; Tue, 11 Oct 2022 11:41:02 +0200 (CEST) Received: by inbox.dpdk.org (Postfix, from userid 33) id 503EFA0547; Tue, 11 Oct 2022 11:41:02 +0200 (CEST) From: bugzilla@dpdk.org To: dev@dpdk.org Subject: [Bug 1097] i40e: TSO breaks when MSS spans more than 8 data fragments Date: Tue, 11 Oct 2022 09:41:02 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: DPDK X-Bugzilla-Component: ethdev X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: ivan.malov@oktetlabs.ru X-Bugzilla-Status: UNCONFIRMED X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: dev@dpdk.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter target_milestone Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://bugs.dpdk.org/ Auto-Submitted: auto-generated X-Auto-Response-Suppress: All MIME-Version: 1.0 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org https://bugs.dpdk.org/show_bug.cgi?id=3D1097 Bug ID: 1097 Summary: i40e: TSO breaks when MSS spans more than 8 data fragments Product: DPDK Version: unspecified Hardware: All OS: All Status: UNCONFIRMED Severity: normal Priority: Normal Component: ethdev Assignee: dev@dpdk.org Reporter: ivan.malov@oktetlabs.ru Target Milestone: --- We've been running opensource ethdev tests [1] lately and we've come across= a bug in TSO: https://ts-factory.io/bublik/v2/log/100333?focusId=3D102700&mode=3DtreeAndi= nfoAndlog . In the above example, a TSO transaction with MSS=3D4000 is requested for a = packet bearing 6000 bytes of payload, with the first 4000 bytes spanning data loca= ted in 13 mbuf segments. As a result, no packets are seen on the opposite end of the wire, and the following log is produced: i40e_dev_alarm_handler(): ICR0: malicious programming detected i40e_handle_mdd_event(): Malicious Driver Detection event 0x02 on TX queue = 1 PF number 0x00 VF number 0x00 device 0000:01:00.0 i40e_handle_mdd_event(): TX driver issue detected on PF According to https://github.com/torvalds/linux/blob/master/drivers/net/ethernet/intel/i4= 0e/i40e_txrx.c#L3416 , the "HW can't DMA more than 8 buffers to build a packet on the wire". By = the looks of it, Tx prepare method in the PMD turns a blind eye to crossing this boundary. Hence the error. Apparrently, Tx prepare in i40e shall either turn such transactions down or linearise the superframe data to some extent. [1] http://mails.dpdk.org/archives/dev/2022-October/251663.html --=20 You are receiving this mail because: You are the assignee for the bug.=