DPDK patches and discussions
 help / color / mirror / Atom feed
From: bugzilla@dpdk.org
To: dev@dpdk.org
Subject: [dpdk-dev] [Bug 835] Previous patch introduced bugs in rte_ipv4_fragment_packet functions
Date: Mon, 25 Oct 2021 07:44:39 +0000	[thread overview]
Message-ID: <bug-835-3@http.bugs.dpdk.org/> (raw)

https://bugs.dpdk.org/show_bug.cgi?id=835

            Bug ID: 835
           Summary: Previous patch introduced bugs in
                    rte_ipv4_fragment_packet functions
           Product: DPDK
           Version: unspecified
          Hardware: All
                OS: All
            Status: UNCONFIRMED
          Severity: critical
          Priority: High
         Component: other
          Assignee: dev@dpdk.org
          Reporter: chcchc88@163.com
                CC: konstantin.ananyev@intel.com
  Target Milestone: ---

Overview:
The patch 567473433b7e("ip_frag: fix fragmenting IPv4 fragment") introduces
a bug and needs to be rolled back. This is because the patch
and variables "flag_offset" conflict with each other.

>> diff --git a/lib/ip_frag/rte_ipv4_fragmentation.c
>> b/lib/ip_frag/rte_ipv4_fragmentation.c
>> index 2e7739d..fead5a9 100644
>> --- a/lib/ip_frag/rte_ipv4_fragmentation.c
>> +++ b/lib/ip_frag/rte_ipv4_fragmentation.c
>> @@ -75,7 +75,7 @@ static inline void __free_fragments(struct rte_mbuf *mb[],
>> uint32_t num)
>>      uint32_t out_pkt_pos, in_seg_data_pos;
>>      uint32_t more_in_segs;
>>      uint16_t fragment_offset, flag_offset, frag_size, header_len;
>> -    uint16_t frag_bytes_remaining;
>> +    uint16_t frag_bytes_remaining, not_last_frag;
>> 
>>      /*
>>       * Formal parameter checking.
>> @@ -116,7 +116,9 @@ static inline void __free_fragments(struct rte_mbuf
>> *mb[], uint32_t num)
>>      in_seg = pkt_in;
>>      in_seg_data_pos = header_len;
>>      out_pkt_pos = 0;
>> -    fragment_offset = 0;
>> +    fragment_offset = (uint16_t)((flag_offset &
>> +        RTE_IPV4_HDR_OFFSET_MASK) << RTE_IPV4_HDR_FO_SHIFT);
>> +    not_last_frag = (uint16_t)(flag_offset & IPV4_HDR_MF_MASK);
>> 
>>      more_in_segs = 1;
>>      while (likely(more_in_segs)) {
>> @@ -186,7 +188,8 @@ static inline void __free_fragments(struct rte_mbuf
>> *mb[], uint32_t num)
>> 
>>              __fill_ipv4hdr_frag(out_hdr, in_hdr, header_len,
>>                  (uint16_t)out_pkt->pkt_len,
>> -                flag_offset, fragment_offset, more_in_segs);
>> +                flag_offset, fragment_offset,
>> +                not_last_frag || more_in_segs);
>> 
>>              fragment_offset = (uint16_t)(fragment_offset +
>>                  out_pkt->pkt_len - header_len);

"flag_offset" or “fofs” contains all the information about fragment,so this
patch is no longer needed.

flag_offset = rte_cpu_to_be_16(in_hdr->fragment_offset);

static inline void __fill_ipv4hdr_frag(struct rte_ipv4_hdr *dst,
                const struct rte_ipv4_hdr *src, uint16_t header_len,
                uint16_t len, uint16_t fofs, uint16_t dofs, uint32_t mf)
{
        rte_memcpy(dst, src, header_len);
        fofs = (uint16_t)(fofs + (dofs >> RTE_IPV4_HDR_FO_SHIFT));
        fofs = (uint16_t)(fofs | mf << RTE_IPV4_HDR_MF_SHIFT);
        dst->fragment_offset = rte_cpu_to_be_16(fofs);
        dst->total_length = rte_cpu_to_be_16(len);
        dst->hdr_checksum = 0;
}

Steps to Reproduce:
1) Use a fragment that is not the last fragment to test
rte_ipv4_fragment_packet function:MTU is 68,ip pkt_size is 104(not include ip
header len), MF is 1,fragment_offset is 13.
2) Start the test to see the fragmenting results: the values of fragment number
and fragment_offset.

Actual Results:
fragment number: 3
fragment_offset: 0x201A 0x2020 0x2026

Expected Results:
fragment number: 3
fragment_offset: 0x200D 0x2013 0x2019

Build Date & Hardware:
Build 2021-10-25 on Linux OS 3.10.0

-- 
You are receiving this mail because:
You are the assignee for the bug.

                 reply	other threads:[~2021-10-25  7:44 UTC|newest]

Thread overview: [no followups] expand[flat|nested]  mbox.gz  Atom feed

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=bug-835-3@http.bugs.dpdk.org/ \
    --to=bugzilla@dpdk.org \
    --cc=dev@dpdk.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).