From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id E6152A0542 for ; Fri, 11 Nov 2022 11:34:34 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id E15A840150; Fri, 11 Nov 2022 11:34:34 +0100 (CET) Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by mails.dpdk.org (Postfix) with ESMTP id 7FF7A4014F for ; Fri, 11 Nov 2022 11:34:31 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1668162871; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=ZjnKrcTU8FjOzrdizePFXP3kzp8Gxc8d6kT6nbqmE2s=; b=ZOu6jTYm3YDCKMdiL5yk9YN3w+vOrNCSObg8L/ka1/a5GYKyS33f2aphJCqyrKAaoi3QSk sGYvA3WdRKkVBw/6Q9O7h2gpKeGCSorXrfJ9LkOVJlLy0Ql7YHghSfuVga0eSQNINFo8e/ wzSmLKBrB9v7TUfRgF/haYBDLt+VkcI= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-556-jbXZ65JDNe2Bnf9Jxx9liA-1; Fri, 11 Nov 2022 05:34:27 -0500 X-MC-Unique: jbXZ65JDNe2Bnf9Jxx9liA-1 Received: from smtp.corp.redhat.com (int-mx04.intmail.prod.int.rdu2.redhat.com [10.11.54.4]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 4E7A0800B30; Fri, 11 Nov 2022 10:34:27 +0000 (UTC) Received: from rh.redhat.com (unknown [10.39.195.104]) by smtp.corp.redhat.com (Postfix) with ESMTP id C3C4E200E28D; Fri, 11 Nov 2022 10:34:25 +0000 (UTC) From: Kevin Traynor To: Peng Zhang Cc: Chaoyong He , =?UTF-8?q?Niklas=20S=C3=B6derlund?= , dpdk stable Subject: patch 'net/nfp: fix internal buffer size and MTU check' has been queued to stable release 21.11.3 Date: Fri, 11 Nov 2022 10:33:05 +0000 Message-Id: <20221111103337.307408-15-ktraynor@redhat.com> In-Reply-To: <20221111103337.307408-1-ktraynor@redhat.com> References: <20221111103337.307408-1-ktraynor@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.4 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-BeenThere: stable@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: patches for DPDK stable branches List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: stable-bounces@dpdk.org Hi, FYI, your patch has been queued to stable release 21.11.3 Note it hasn't been pushed to http://dpdk.org/browse/dpdk-stable yet. It will be pushed if I get no objections before 11/14/22. So please shout if anyone has objections. Also note that after the patch there's a diff of the upstream commit vs the patch applied to the branch. This will indicate if there was any rebasing needed to apply to the stable branch. If there were code changes for rebasing (ie: not only metadata diffs), please double check that the rebase was correctly done. Queued patches are on a temporary branch at: https://github.com/kevintraynor/dpdk-stable This queued commit can be viewed at: https://github.com/kevintraynor/dpdk-stable/commit/a38a7de14d3ba2745f78f7685f60fc10f5af5c91 Thanks. Kevin --- >From a38a7de14d3ba2745f78f7685f60fc10f5af5c91 Mon Sep 17 00:00:00 2001 From: Peng Zhang Date: Fri, 21 Oct 2022 14:27:46 +0800 Subject: [PATCH] net/nfp: fix internal buffer size and MTU check MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit [ upstream commit dbad6f64f9210afc50566a87f0e25f925c3b0f90 ] When MTU is bigger than hw->flbufsz, it can't work. hw->flbufsz is set in the nfp_net_rx_queue_setup(). At first, in the nfp_net_configure(), the hw->flbufsz isn't set the value, it just judge the initialized value and MTU, it is unreasonable. Now, it just check the MTU can't be more than the NFP_FRAME_SIZE_MAX in the nfp_net_configure(), when hw->flbufsz is set the value, in the nfp_net_start(), judge the hw->flbufsz and MTU. Fixes: 5c305e218f15 ("net/nfp: fix initialization") Signed-off-by: Peng Zhang Reviewed-by: Chaoyong He Reviewed-by: Niklas Söderlund --- drivers/net/nfp/nfp_common.c | 6 +++--- drivers/net/nfp/nfp_ethdev.c | 8 +++++++- drivers/net/nfp/nfp_ethdev_vf.c | 1 - 3 files changed, 10 insertions(+), 5 deletions(-) diff --git a/drivers/net/nfp/nfp_common.c b/drivers/net/nfp/nfp_common.c index 34e3a03edd..b81eec58d3 100644 --- a/drivers/net/nfp/nfp_common.c +++ b/drivers/net/nfp/nfp_common.c @@ -178,7 +178,7 @@ nfp_net_configure(struct rte_eth_dev *dev) /* Checking MTU set */ - if (rxmode->mtu > hw->flbufsz) { - PMD_INIT_LOG(INFO, "MTU (%u) larger then current mbufsize (%u) not supported", - rxmode->mtu, hw->flbufsz); + if (rxmode->mtu > NFP_FRAME_SIZE_MAX) { + PMD_INIT_LOG(ERR, "MTU (%u) larger than NFP_FRAME_SIZE_MAX (%u) not supported", + rxmode->mtu, NFP_FRAME_SIZE_MAX); return -ERANGE; } diff --git a/drivers/net/nfp/nfp_ethdev.c b/drivers/net/nfp/nfp_ethdev.c index 67a77f0567..74f4c1edeb 100644 --- a/drivers/net/nfp/nfp_ethdev.c +++ b/drivers/net/nfp/nfp_ethdev.c @@ -133,4 +133,11 @@ nfp_net_start(struct rte_eth_dev *dev) } + /* Checking MTU set */ + if (dev->data->mtu > hw->flbufsz) { + PMD_INIT_LOG(ERR, "MTU (%u) can't be larger than the current NFP_FRAME_SIZE (%u)", + dev->data->mtu, hw->flbufsz); + return -ERANGE; + } + rte_intr_enable(intr_handle); @@ -503,5 +510,4 @@ nfp_net_init(struct rte_eth_dev *eth_dev) hw->max_mtu = nn_cfg_readl(hw, NFP_NET_CFG_MAX_MTU); hw->mtu = RTE_ETHER_MTU; - hw->flbufsz = RTE_ETHER_MTU; /* VLAN insertion is incompatible with LSOv2 */ diff --git a/drivers/net/nfp/nfp_ethdev_vf.c b/drivers/net/nfp/nfp_ethdev_vf.c index 0781f34764..0034d68ea6 100644 --- a/drivers/net/nfp/nfp_ethdev_vf.c +++ b/drivers/net/nfp/nfp_ethdev_vf.c @@ -370,5 +370,4 @@ nfp_netvf_init(struct rte_eth_dev *eth_dev) hw->max_mtu = nn_cfg_readl(hw, NFP_NET_CFG_MAX_MTU); hw->mtu = RTE_ETHER_MTU; - hw->flbufsz = RTE_ETHER_MTU; /* VLAN insertion is incompatible with LSOv2 */ -- 2.38.1 --- Diff of the applied patch vs upstream commit (please double-check if non-empty: --- --- - 2022-11-11 10:32:17.449832653 +0000 +++ 0015-net-nfp-fix-internal-buffer-size-and-MTU-check.patch 2022-11-11 10:32:17.035300611 +0000 @@ -1 +1 @@ -From dbad6f64f9210afc50566a87f0e25f925c3b0f90 Mon Sep 17 00:00:00 2001 +From a38a7de14d3ba2745f78f7685f60fc10f5af5c91 Mon Sep 17 00:00:00 2001 @@ -8,0 +9,2 @@ +[ upstream commit dbad6f64f9210afc50566a87f0e25f925c3b0f90 ] + @@ -20 +21,0 @@ -Cc: stable@dpdk.org @@ -32 +33 @@ -index 9be2e215d5..277ea2381b 100644 +index 34e3a03edd..b81eec58d3 100644 @@ -47 +48 @@ -index f11a1b6eb2..fc36c4d1b6 100644 +index 67a77f0567..74f4c1edeb 100644 @@ -50 +51 @@ -@@ -115,4 +115,11 @@ nfp_net_start(struct rte_eth_dev *dev) +@@ -133,4 +133,11 @@ nfp_net_start(struct rte_eth_dev *dev) @@ -62 +63 @@ -@@ -603,5 +610,4 @@ nfp_net_init(struct rte_eth_dev *eth_dev) +@@ -503,5 +510,4 @@ nfp_net_init(struct rte_eth_dev *eth_dev) @@ -69 +70 @@ -index 6c6caefcb7..d1427b63bc 100644 +index 0781f34764..0034d68ea6 100644 @@ -72 +73 @@ -@@ -367,5 +367,4 @@ nfp_netvf_init(struct rte_eth_dev *eth_dev) +@@ -370,5 +370,4 @@ nfp_netvf_init(struct rte_eth_dev *eth_dev)