From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from dpdk.org (dpdk.org [92.243.14.124]) by dpdk.space (Postfix) with ESMTP id DD963A0096 for ; Wed, 10 Apr 2019 16:02:32 +0200 (CEST) Received: from [92.243.14.124] (localhost [127.0.0.1]) by dpdk.org (Postfix) with ESMTP id 8D1101B14D; Wed, 10 Apr 2019 16:02:32 +0200 (CEST) Received: from mail-yb1-f182.google.com (mail-yb1-f182.google.com [209.85.219.182]) by dpdk.org (Postfix) with ESMTP id B1F735F1D for ; Wed, 10 Apr 2019 13:33:52 +0200 (CEST) Received: by mail-yb1-f182.google.com with SMTP id u187so653509ybg.11 for ; Wed, 10 Apr 2019 04:33:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=MKuXOJ/8U5eR0jdn/d5d2psgiKW7y88gBNpfhQnVS1M=; b=njYpbzmReq+p/mV3kQmr3NM+bKk92YfgaC7jWSbAbtQI1W6WZqphzCWMJwwZexFtR+ Pz+V6NqBNs8NpQ58E1ww8sVkwjmO+trA3Vb4WQn0N7J9JUZh5GZQDvG59139cVMplcZj 80ZkuE708c9XsTJItXuniC9vJYRPkH+28q5GZLSlceMXnB9TNpJ80k//guLB03i4VPxZ kmkb1O18aJEKMj0s687gP6Ks8RyBLrolmBfHj5wr8HbhPCLIRh01Zt/4dsn42av2bweF SlOLBEJjanxK+zwO33TyvTg3B0NWNmt9eOvARZWOGJ50CHL3AnNpIxx51RJEp7b6bTTG cTww== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=MKuXOJ/8U5eR0jdn/d5d2psgiKW7y88gBNpfhQnVS1M=; b=sKADm5s3iHj0r8KYOh+6R3J095Ex1EhQNYsTz7f47UBKjwS7d/Hda14Gry0MhDmrXL PO2dnFPPBi3fc1TWfZJe+c+czhooLFOCzuoZCbVbAQ4Es06ULFw4feipLkSgYNPM+kWM YP1hne2z5J9KY0hrevmssfLkE6pdW2HQooWOrIxQ3gAvUxhIGGE7MmECaH7OYP7GwsYp JHjks+YbqfX+OrXP6iDsc+iCpsQSED/o9x0UXLIOy0wvi6dKCRc2mcYGi+lSVco1Lcpg Y2Oz7e4bakSiruuxQ0ZtM0vW7A456tu4JetUUzp6Vr2bGHCBX7OdmDiFOGpVQFGvECNW YOHw== X-Gm-Message-State: APjAAAWUmM5zJ/qG2hAD3GcVuUqLzlRimGPAgvrFmgSaSZVonmVz23o6 BzqP021Gv8B4DvdnMg4XHkGDD/7Ck5f44H/b8+0= X-Google-Smtp-Source: APXvYqz98vfaWUyecR6AzFUG78uFW0WobGzW+JVc19Zj/c4Nvxj1h3pIntaEnJPR4U63PqOcYDNc7PxG/3wzy1jNvLk= X-Received: by 2002:a25:9b43:: with SMTP id u3mr16693291ybo.24.1554896032178; Wed, 10 Apr 2019 04:33:52 -0700 (PDT) MIME-Version: 1.0 References: In-Reply-To: From: =?UTF-8?B?UHJ6ZW15c8WCYXcgT8WCdGFyemV3c2tp?= Date: Wed, 10 Apr 2019 13:39:58 +0200 Message-ID: To: David Marchand Cc: Chas Williams <3chas3@gmail.com>, dev X-Mailman-Approved-At: Wed, 10 Apr 2019 16:02:30 +0200 Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Content-Filtered-By: Mailman/MimeDel 2.1.15 Subject: Re: [dpdk-dev] [Bug 248] Bonding PMD: Invalid array dimension in TX burst for 802.3ad mode with fast queue leads to SEGFAULT X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" Message-ID: <20190410113958.kzao8U2oVZsU8bRGYNrPYKO9fJzhKgXXpwxB3I09IZY@z> Hello David, I can merge these fixes and run our system using patched DPDK version. Then report back any problems / improvements I observe. I can also walk through source code changes and check for anything questionable. Unfortunately I lack deep enough understanding of DPDK source code to test these fixes comprehensively and I have been short on time recently as well, so that's the best I can do right now. Best Regards, Przemys=C5=82aw O=C5=82tarzewski On Tue, Apr 9, 2019 at 4:51 PM David Marchand wrote: > > > On Tue, Apr 9, 2019 at 4:45 PM wrote: > >> https://bugs.dpdk.org/show_bug.cgi?id=3D248 >> >> Bug ID: 248 >> Summary: Bonding PMD: Invalid array dimension in TX burst for >> 802.3ad mode with fast queue leads to SEGFAULT >> Product: DPDK >> Version: 18.11 >> Hardware: All >> OS: All >> Status: CONFIRMED >> Severity: major >> Priority: Normal >> Component: ethdev >> Assignee: dev@dpdk.org >> Reporter: p.oltarzewski@gmail.com >> Target Milestone: --- >> >> DPDK 18.11.1 >> >> In drivers/net/bonding/rte_eth_bond_pmd.c::bond_ethdev_tx_burst_8023ad, >> bufs_slave_port_idxs array is defined as follows (lines 1293-1294): >> >> /* Mapping array generated by hash function to map mbufs to slaves *= / >> uint16_t bufs_slave_port_idxs[RTE_MAX_ETHPORTS] =3D { 0 }; >> >> Array dimension should be equal to number of packets being transmitted >> (nb_pkts) - as correctly implemented in >> rte_eth_bond_pmd.c::bond_ethdev_tx_burst_balance. >> >> Invalid array dimension causes overflow when number of transmitted >> packets is >> greater than RTE_MAX_ETHPORTS. Some areas of memory end up overwritten >> (in my >> particular case, slave_nb_bufs array), which leads to SIGSEGV and crash. >> >> To work around the issue, ensure that number of packets transmitted in a >> single >> burst is no greater than RTE_MAX_ETHPORTS. >> >> To fix it, it should be sufficient to define bufs_slave_port_idxs as a >> variable-length array, as in bond_ethdev_tx_burst_balance: >> >> /* Mapping array generated by hash function to map mbufs to slaves *= / >> uint16_t bufs_slave_port_idxs[nb_bufs]; >> > > I have a series of fixes for this, and on the rx parts as well but did no= t > have time to properly check them. > Would you have some time to test it if I send it ? > > > -- > David Marchand >