-----Original Message-----
From: Maxime Coquelin <maxime.coque...@redhat.com>
Sent: Tuesday, January 31, 2023 5:29 AM
To: Vargas, Hernan <hernan.var...@intel.com>; dev@dpdk.org;
gak...@marvell.com; Rix, Tom <t...@redhat.com>
Cc: Chautru, Nicolas <nicolas.chau...@intel.com>; Zhang, Qi Z
<qi.z.zh...@intel.com>
Subject: Re: [PATCH v1 08/13] test/bbdev: extend support for large TB
On 1/17/23 17:50, Hernan Vargas wrote:
Add support for large TB when it cannot fit into a true mbuf.
Signed-off-by: Hernan Vargas <hernan.var...@intel.com>
---
app/test-bbdev/test_bbdev_perf.c | 21 ++++++++++++---------
1 file changed, 12 insertions(+), 9 deletions(-)
diff --git a/app/test-bbdev/test_bbdev_perf.c
b/app/test-bbdev/test_bbdev_perf.c
index 69b86cdeb1..fdf7a28ba2 100644
--- a/app/test-bbdev/test_bbdev_perf.c
+++ b/app/test-bbdev/test_bbdev_perf.c
@@ -1072,8 +1072,6 @@ init_op_data_objs(struct rte_bbdev_op_data
*bufs,
* Special case when DPDK mbuf cannot handle
* the required input size
*/
- printf("Warning: Larger input size than DPDK mbuf
%d\n",
- seg->length);
large_input = true;
}
bufs[i].data = m_head;
@@ -2030,6 +2028,7 @@ validate_op_chain(struct rte_bbdev_op_data
*op,
struct rte_mbuf *m = op->data;
uint8_t nb_dst_segments = orig_op->nb_segments;
uint32_t total_data_size = 0;
+ bool ignore_mbuf = false; /* ignore mbuf limitations */
TEST_ASSERT(nb_dst_segments == m->nb_segs,
"Number of segments differ in original (%u) and filled
(%u) op",
@@ -2042,21 +2041,25 @@ validate_op_chain(struct rte_bbdev_op_data
*op,
uint16_t data_len = rte_pktmbuf_data_len(m) - offset;
total_data_size += orig_op->segments[i].length;
- TEST_ASSERT(orig_op->segments[i].length == data_len,
- "Length of segment differ in original (%u) and
filled (%u) op",
- orig_op->segments[i].length, data_len);
+ if (orig_op->segments[i].length >
RTE_BBDEV_LDPC_E_MAX_MBUF)
+ ignore_mbuf = true;
+ if (!ignore_mbuf)
+ TEST_ASSERT(orig_op->segments[i].length ==
data_len,
+ "Length of segment differ in original
(%u) and filled (%u) op",
+ orig_op->segments[i].length,
data_len);
TEST_ASSERT_BUFFERS_ARE_EQUAL(orig_op-
segments[i].addr,
rte_pktmbuf_mtod_offset(m, uint32_t *,
offset),
- data_len,
+ orig_op->segments[i].length,
Isn't it ending up in performing out of bounds access in the mbuf?