DPDK patches and discussions
 help / color / mirror / Atom feed
* [Bug 1273] eth_memif_rx segfault when burst size is greater than 32
@ 2023-08-14 15:26 bugzilla
  2023-09-06 14:20 ` bugzilla
                   ` (2 more replies)
  0 siblings, 3 replies; 4+ messages in thread
From: bugzilla @ 2023-08-14 15:26 UTC (permalink / raw)
  To: dev

[-- Attachment #1: Type: text/plain, Size: 1461 bytes --]

https://bugs.dpdk.org/show_bug.cgi?id=1273

            Bug ID: 1273
           Summary: eth_memif_rx segfault when burst size is greater than
                    32
           Product: DPDK
           Version: 23.03
          Hardware: All
                OS: Linux
            Status: UNCONFIRMED
          Severity: normal
          Priority: Normal
         Component: ethdev
          Assignee: dev@dpdk.org
          Reporter: sunnylandh@gmail.com
  Target Milestone: ---

When rte_eth_rx_burst() is called on an memif device with a burst size greater
than 32, there's a segfault in eth_memif_rx() function.

  Thread 1 "x" received signal SIGSEGV, Segmentation fault.
  0x00007ffff7a116d1 in eth_memif_rx (queue=0x1b73051c0, bufs=0x7fffffffd320,
nb_pkts=<optimized out>) at ../drivers/net/memif/rte_eth_memif.c:360
  360                             mbuf = mbuf_head;
  (gdb) bt
  #0  0x00007ffff7a116d1 in eth_memif_rx (queue=0x1b73051c0,
bufs=0x7fffffffd320, nb_pkts=<optimized out>) at
../drivers/net/memif/rte_eth_memif.c:360
  #1  0x000055555555554e in rte_eth_rx_burst (nb_pkts=<optimized out>,
rx_pkts=0x7fffffffd220, queue_id=0, port_id=0) at
/usr/local/include/rte_ethdev.h:5918
  #2  rxloop (queue=0, mp=<optimized out>, burstSize=<optimized out>, port=0)
at x.c:51
  #3  main (argc=<optimized out>, argv=<optimized out>) at x.c:103

-- 
You are receiving this mail because:
You are the assignee for the bug.

[-- Attachment #2: Type: text/html, Size: 3376 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Bug 1273] eth_memif_rx segfault when burst size is greater than 32
  2023-08-14 15:26 [Bug 1273] eth_memif_rx segfault when burst size is greater than 32 bugzilla
@ 2023-09-06 14:20 ` bugzilla
  2023-09-06 14:22 ` bugzilla
  2023-10-11 16:46 ` bugzilla
  2 siblings, 0 replies; 4+ messages in thread
From: bugzilla @ 2023-09-06 14:20 UTC (permalink / raw)
  To: dev

[-- Attachment #1: Type: text/plain, Size: 564 bytes --]

https://bugs.dpdk.org/show_bug.cgi?id=1273

JoyceKong (joyce.kong@arm.com) changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|IN_PROGRESS                 |RESOLVED
         Resolution|---                         |FIXED

--- Comment #5 from JoyceKong (joyce.kong@arm.com) ---
https://patches.dpdk.org/project/dpdk/patch/20230904071041.3403495-1-joyce.kong@arm.com/

-- 
You are receiving this mail because:
You are the assignee for the bug.

[-- Attachment #2: Type: text/html, Size: 2689 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Bug 1273] eth_memif_rx segfault when burst size is greater than 32
  2023-08-14 15:26 [Bug 1273] eth_memif_rx segfault when burst size is greater than 32 bugzilla
  2023-09-06 14:20 ` bugzilla
@ 2023-09-06 14:22 ` bugzilla
  2023-10-11 16:46 ` bugzilla
  2 siblings, 0 replies; 4+ messages in thread
From: bugzilla @ 2023-09-06 14:22 UTC (permalink / raw)
  To: dev

[-- Attachment #1: Type: text/plain, Size: 658 bytes --]

https://bugs.dpdk.org/show_bug.cgi?id=1273

David Marchand (david.marchand@redhat.com) changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Resolution|FIXED                       |---
             Status|RESOLVED                    |CONFIRMED
                 CC|                            |david.marchand@redhat.com

--- Comment #6 from David Marchand (david.marchand@redhat.com) ---
This patch is not merged.
Don't mark as resolved until the fix makes it into DPDK.

-- 
You are receiving this mail because:
You are the assignee for the bug.

[-- Attachment #2: Type: text/html, Size: 2782 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

* [Bug 1273] eth_memif_rx segfault when burst size is greater than 32
  2023-08-14 15:26 [Bug 1273] eth_memif_rx segfault when burst size is greater than 32 bugzilla
  2023-09-06 14:20 ` bugzilla
  2023-09-06 14:22 ` bugzilla
@ 2023-10-11 16:46 ` bugzilla
  2 siblings, 0 replies; 4+ messages in thread
From: bugzilla @ 2023-10-11 16:46 UTC (permalink / raw)
  To: dev

[-- Attachment #1: Type: text/plain, Size: 567 bytes --]

https://bugs.dpdk.org/show_bug.cgi?id=1273

David Marchand (david.marchand@redhat.com) changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
         Resolution|---                         |FIXED
             Status|CONFIRMED                   |RESOLVED

--- Comment #7 from David Marchand (david.marchand@redhat.com) ---
Fixed in cd7b0da68287 ("net/memif: fix crash with large Rx burst").

-- 
You are receiving this mail because:
You are the assignee for the bug.

[-- Attachment #2: Type: text/html, Size: 2613 bytes --]

^ permalink raw reply	[flat|nested] 4+ messages in thread

end of thread, other threads:[~2023-10-11 16:46 UTC | newest]

Thread overview: 4+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2023-08-14 15:26 [Bug 1273] eth_memif_rx segfault when burst size is greater than 32 bugzilla
2023-09-06 14:20 ` bugzilla
2023-09-06 14:22 ` bugzilla
2023-10-11 16:46 ` bugzilla

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).