DPDK patches and discussions
 help / color / mirror / Atom feed
* [dpdk-dev] [Bug 835] Previous patch introduced bugs in rte_ipv4_fragment_packet functions
@ 2021-10-25  7:44 bugzilla
  0 siblings, 0 replies; only message in thread
From: bugzilla @ 2021-10-25  7:44 UTC (permalink / raw)
  To: dev

https://bugs.dpdk.org/show_bug.cgi?id=835

            Bug ID: 835
           Summary: Previous patch introduced bugs in
                    rte_ipv4_fragment_packet functions
           Product: DPDK
           Version: unspecified
          Hardware: All
                OS: All
            Status: UNCONFIRMED
          Severity: critical
          Priority: High
         Component: other
          Assignee: dev@dpdk.org
          Reporter: chcchc88@163.com
                CC: konstantin.ananyev@intel.com
  Target Milestone: ---

Overview:
The patch 567473433b7e("ip_frag: fix fragmenting IPv4 fragment") introduces
a bug and needs to be rolled back. This is because the patch
and variables "flag_offset" conflict with each other.

>> diff --git a/lib/ip_frag/rte_ipv4_fragmentation.c
>> b/lib/ip_frag/rte_ipv4_fragmentation.c
>> index 2e7739d..fead5a9 100644
>> --- a/lib/ip_frag/rte_ipv4_fragmentation.c
>> +++ b/lib/ip_frag/rte_ipv4_fragmentation.c
>> @@ -75,7 +75,7 @@ static inline void __free_fragments(struct rte_mbuf *mb[],
>> uint32_t num)
>>      uint32_t out_pkt_pos, in_seg_data_pos;
>>      uint32_t more_in_segs;
>>      uint16_t fragment_offset, flag_offset, frag_size, header_len;
>> -    uint16_t frag_bytes_remaining;
>> +    uint16_t frag_bytes_remaining, not_last_frag;
>> 
>>      /*
>>       * Formal parameter checking.
>> @@ -116,7 +116,9 @@ static inline void __free_fragments(struct rte_mbuf
>> *mb[], uint32_t num)
>>      in_seg = pkt_in;
>>      in_seg_data_pos = header_len;
>>      out_pkt_pos = 0;
>> -    fragment_offset = 0;
>> +    fragment_offset = (uint16_t)((flag_offset &
>> +        RTE_IPV4_HDR_OFFSET_MASK) << RTE_IPV4_HDR_FO_SHIFT);
>> +    not_last_frag = (uint16_t)(flag_offset & IPV4_HDR_MF_MASK);
>> 
>>      more_in_segs = 1;
>>      while (likely(more_in_segs)) {
>> @@ -186,7 +188,8 @@ static inline void __free_fragments(struct rte_mbuf
>> *mb[], uint32_t num)
>> 
>>              __fill_ipv4hdr_frag(out_hdr, in_hdr, header_len,
>>                  (uint16_t)out_pkt->pkt_len,
>> -                flag_offset, fragment_offset, more_in_segs);
>> +                flag_offset, fragment_offset,
>> +                not_last_frag || more_in_segs);
>> 
>>              fragment_offset = (uint16_t)(fragment_offset +
>>                  out_pkt->pkt_len - header_len);

"flag_offset" or “fofs” contains all the information about fragment,so this
patch is no longer needed.

flag_offset = rte_cpu_to_be_16(in_hdr->fragment_offset);

static inline void __fill_ipv4hdr_frag(struct rte_ipv4_hdr *dst,
                const struct rte_ipv4_hdr *src, uint16_t header_len,
                uint16_t len, uint16_t fofs, uint16_t dofs, uint32_t mf)
{
        rte_memcpy(dst, src, header_len);
        fofs = (uint16_t)(fofs + (dofs >> RTE_IPV4_HDR_FO_SHIFT));
        fofs = (uint16_t)(fofs | mf << RTE_IPV4_HDR_MF_SHIFT);
        dst->fragment_offset = rte_cpu_to_be_16(fofs);
        dst->total_length = rte_cpu_to_be_16(len);
        dst->hdr_checksum = 0;
}

Steps to Reproduce:
1) Use a fragment that is not the last fragment to test
rte_ipv4_fragment_packet function:MTU is 68,ip pkt_size is 104(not include ip
header len), MF is 1,fragment_offset is 13.
2) Start the test to see the fragmenting results: the values of fragment number
and fragment_offset.

Actual Results:
fragment number: 3
fragment_offset: 0x201A 0x2020 0x2026

Expected Results:
fragment number: 3
fragment_offset: 0x200D 0x2013 0x2019

Build Date & Hardware:
Build 2021-10-25 on Linux OS 3.10.0

-- 
You are receiving this mail because:
You are the assignee for the bug.

^ permalink raw reply	[flat|nested] only message in thread

only message in thread, other threads:[~2021-10-25  7:44 UTC | newest]

Thread overview: (only message) (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2021-10-25  7:44 [dpdk-dev] [Bug 835] Previous patch introduced bugs in rte_ipv4_fragment_packet functions bugzilla

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).