On Tue, Apr 9, 2019 at 4:45 PM <bugzi...@dpdk.org> wrote:

> https://bugs.dpdk.org/show_bug.cgi?id=248
>
>             Bug ID: 248
>            Summary: Bonding PMD: Invalid array dimension in TX burst for
>                     802.3ad mode with fast queue leads to SEGFAULT
>            Product: DPDK
>            Version: 18.11
>           Hardware: All
>                 OS: All
>             Status: CONFIRMED
>           Severity: major
>           Priority: Normal
>          Component: ethdev
>           Assignee: dev@dpdk.org
>           Reporter: p.oltarzew...@gmail.com
>   Target Milestone: ---
>
> DPDK 18.11.1
>
> In drivers/net/bonding/rte_eth_bond_pmd.c::bond_ethdev_tx_burst_8023ad,
> bufs_slave_port_idxs array is defined as follows (lines 1293-1294):
>
>     /* Mapping array generated by hash function to map mbufs to slaves */
>     uint16_t bufs_slave_port_idxs[RTE_MAX_ETHPORTS] = { 0 };
>
> Array dimension should be equal to number of packets being transmitted
> (nb_pkts) - as correctly implemented in
> rte_eth_bond_pmd.c::bond_ethdev_tx_burst_balance.
>
> Invalid array dimension causes overflow when number of transmitted packets
> is
> greater than RTE_MAX_ETHPORTS. Some areas of memory end up overwritten (in
> my
> particular case, slave_nb_bufs array), which leads to SIGSEGV and crash.
>
> To work around the issue, ensure that number of packets transmitted in a
> single
> burst is no greater than RTE_MAX_ETHPORTS.
>
> To fix it, it should be sufficient to define bufs_slave_port_idxs as a
> variable-length array, as in bond_ethdev_tx_burst_balance:
>
>     /* Mapping array generated by hash function to map mbufs to slaves */
>     uint16_t bufs_slave_port_idxs[nb_bufs];
>

I have a series of fixes for this, and on the rx parts as well but did not
have time to properly check them.
Would you have some time to test it if I send it ?


-- 
David Marchand

Reply via email to