RE: [PATCH dpdk 0/2] IPv6: Fix coverity issues

2024-11-24 Thread Mcnamara, John
> -Original Message-
> From: David Marchand 
> Sent: Tuesday, November 5, 2024 9:06 PM
> To: Mcnamara, John ; Patrick Robb
> 
> Cc: dev@dpdk.org; Robin Jarry ; Morten Brørup
> 
> Subject: Re: [PATCH dpdk 0/2] IPv6: Fix coverity issues
> 
> Hello John, Patrick,
> 
> On Thu, Oct 24, 2024 at 5:20 PM Robin Jarry  wrote:
> >
> > Here are fixes for three coverity issues:
> 
> This series fixes two coverity issues. The fixes look correct.
> But the Coverity reports are not obvious to me.
> 
> Is there a way to pass those fixes through Coverity to confirm the two
> issues are indeed fixed?

There is no easy way to do that. The Coverity analysis only runs on the main 
after patches have been merged. It isn't structured to allow patch or fix based 
analysis.


[PATCH] vhost: clear ring addresses when getting vring base

2024-11-24 Thread jianping.zhao
From: "Jianping.zhao" 

Clear ring addresses during vring base retrieval to handle guest reboot
scenarios correctly. This is particularly important for vdpa-blk devices
where the following issue occurs:

When a guest OS with vdpa-blk device reboots, during UEFI stage, only
one vring is actually used and configured. However, QEMU still sends
enable messages for all configured queues. The remaining queues retain
their addresses from before reboot, which reference invalid memory
mappings in the rebooted guest.

The issue manifests in vq_is_ready():

static bool
vq_is_ready(struct virtio_net *dev, struct vhost_virtqueue *vq)
{
/* Only checks pointer validity, not address freshness */
rings_ok = vq->desc && vq->avail && vq->used;
...
}

vq_is_ready() incorrectly considers these queues as ready because it
only checks if desc/avail/used pointers are non-NULL, but cannot
detect that these addresses are stale from the previous boot.

Clear the ring addresses in vhost_user_get_vring_base() to force
the guest driver to reconfigure them before use. This ensures that
vq_is_ready() will return false for queues with stale addresses
until they are properly reconfigured by the guest driver.

Fixes: 3ea7052f4b1b ("vhost: postpone rings addresses translation")
Cc: sta...@dpdk.org
Cc: Maxime Coquelin 
Cc: Chenbo Xia 

Signed-off-by: jianping.zhao 
---
 lib/vhost/vhost_user.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/lib/vhost/vhost_user.c b/lib/vhost/vhost_user.c
index 6d92ad904e..52d8078d7c 100644
--- a/lib/vhost/vhost_user.c
+++ b/lib/vhost/vhost_user.c
@@ -2277,6 +2277,7 @@ vhost_user_get_vring_base(struct virtio_net **pdev,

rte_rwlock_write_lock(&vq->access_lock);
vring_invalidate(dev, vq);
+   memset(&vq->ring_addrs, 0, sizeof(struct vhost_vring_addr));
rte_rwlock_write_unlock(&vq->access_lock);

return RTE_VHOST_MSG_RESULT_REPLY;
--
2.34.1



[PATCH v2] vhost/user: clear ring addresses when getting vring base

2024-11-24 Thread Jianping Zhao
Clear ring addresses during vring base retrieval to handle guest reboot
scenarios correctly. This is particularly important for vdpa-blk devices
where the following issue occurs:

When a guest OS with vdpa-blk device reboots, during UEFI stage, only
one vring is actually used and configured. However, QEMU still sends
enable messages for all configured queues. The remaining queues retain
their addresses from before reboot, which reference invalid memory
mappings in the rebooted guest.

The issue manifests in vq_is_ready():

static bool
vq_is_ready(struct virtio_net *dev, struct vhost_virtqueue *vq)
{
/* Only checks pointer validity, not address freshness */
rings_ok = vq->desc && vq->avail && vq->used;
...
}

vq_is_ready() incorrectly considers these queues as ready because it
only checks if desc/avail/used pointers are non-NULL, but cannot
detect that these addresses are stale from the previous boot.

Clear the ring addresses in vhost_user_get_vring_base() to force
the guest driver to reconfigure them before use. This ensures that
vq_is_ready() will return false for queues with stale addresses
until they are properly reconfigured by the guest driver.

Fixes: 3ea7052f4b1b ("vhost: postpone rings addresses translation")

Signed-off-by: Jianping Zhao 
---
 lib/vhost/vhost_user.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/lib/vhost/vhost_user.c b/lib/vhost/vhost_user.c
index 6d92ad904e..52d8078d7c 100644
--- a/lib/vhost/vhost_user.c
+++ b/lib/vhost/vhost_user.c
@@ -2277,6 +2277,7 @@ vhost_user_get_vring_base(struct virtio_net **pdev,
 
rte_rwlock_write_lock(&vq->access_lock);
vring_invalidate(dev, vq);
+   memset(&vq->ring_addrs, 0, sizeof(struct vhost_vring_addr));
rte_rwlock_write_unlock(&vq->access_lock);
 
return RTE_VHOST_MSG_RESULT_REPLY;
-- 
2.34.1



[PATCH v3] vhost/user: clear ring addresses when getting vring base

2024-11-24 Thread Jianping Zhao
Clear ring addresses during vring base retrieval to handle guest reboot
scenarios correctly. This is particularly important for vdpa-blk devices
where the following issue occurs:

When a guest OS with vdpa-blk device reboots, during UEFI stage, only
one vring is actually used and configured. However, QEMU still sends
enable messages for all configured queues. The remaining queues retain
their addresses from before reboot, which reference invalid memory
mappings in the rebooted guest.

The issue manifests in vq_is_ready():

static bool
vq_is_ready(struct virtio_net *dev, struct vhost_virtqueue *vq)
{
/* Only checks pointer validity, not address freshness */
rings_ok = vq->desc && vq->avail && vq->used;
...
}

vq_is_ready() incorrectly considers these queues as ready because it
only checks if desc/avail/used pointers are non-NULL, but cannot
detect that these addresses are stale from the previous boot.

Clear the ring addresses in vhost_user_get_vring_base() to force
the guest driver to reconfigure them before use. This ensures that
vq_is_ready() will return false for queues with stale addresses
until they are properly reconfigured by the guest driver.

Fixes: 3ea7052f4b1b ("vhost: postpone rings addresses translation")

Signed-off-by: Jianping Zhao 
---
 lib/vhost/vhost_user.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/lib/vhost/vhost_user.c b/lib/vhost/vhost_user.c
index 6d92ad904e..52d8078d7c 100644
--- a/lib/vhost/vhost_user.c
+++ b/lib/vhost/vhost_user.c
@@ -2277,6 +2277,7 @@ vhost_user_get_vring_base(struct virtio_net **pdev,
 
rte_rwlock_write_lock(&vq->access_lock);
vring_invalidate(dev, vq);
+   memset(&vq->ring_addrs, 0, sizeof(struct vhost_vring_addr));
rte_rwlock_write_unlock(&vq->access_lock);
 
return RTE_VHOST_MSG_RESULT_REPLY;
-- 
2.34.1



[PATCH v1] net/i40e: updated latest recommended matching list

2024-11-24 Thread hailinx
Signed-off-by: hailinx 
---
 doc/guides/nics/i40e.rst | 8 
 1 file changed, 8 insertions(+)

diff --git a/doc/guides/nics/i40e.rst b/doc/guides/nics/i40e.rst
index ca6caa0cff..35585efc44 100644
--- a/doc/guides/nics/i40e.rst
+++ b/doc/guides/nics/i40e.rst
@@ -104,6 +104,10 @@ For X710/XL710/XXV710,
+--+---+--+
| DPDK version | Kernel driver version | Firmware version |
+==+===+==+
+   |24.11 | 2.26.8|   9.52   |
+   +--+---+--+
+   |24.07 | 2.25.9|   9.50   |
+   +--+---+--+
|24.03 | 2.24.6|   9.40   |
+--+---+--+
|23.11 | 2.23.17   |   9.30   |
@@ -171,6 +175,10 @@ For X722,
+--+---+--+
| DPDK version | Kernel driver version | Firmware version |
+==+===+==+
+   |24.11 | 2.26.8|   6.50   |
+   +--+---+--+
+   |24.07 | 2.25.9|   6.50   |
+   +--+---+--+
|24.03 | 2.24.6|   6.20   |
+--+---+--+
|23.11 | 2.23.17   |   6.20   |
-- 
2.25.1



Recall: [PATCH v1] net/ice: updated latest recommended matching list

2024-11-24 Thread Xu, HailinX
Xu, HailinX would like to recall the message, "[PATCH v1] net/ice: updated 
latest recommended matching list".

[PATCH v1] net/ice: updated latest recommended matching list

2024-11-24 Thread hailinx
Signed-off-by: hailinx 
---
 doc/guides/nics/ice.rst | 4 
 1 file changed, 4 insertions(+)

diff --git a/doc/guides/nics/ice.rst b/doc/guides/nics/ice.rst
index eac1f2627b..a32fb27b24 100644
--- a/doc/guides/nics/ice.rst
+++ b/doc/guides/nics/ice.rst
@@ -79,6 +79,10 @@ are listed in the Tested Platforms section of the Release 
Notes for each release

+---+---+-+---+--+---+
|24.03  | 1.13.7|  1.3.35 |  1.3.45   |1.3.13|  
  4.4|

+---+---+-+---+--+---+
+   |24.07  | 1.14.11   |  1.3.36 |  1.3.46   |1.3.14|  
  4.5|
+   
+---+---+-+---+--+---+
+   |24.07  | 1.15.4|  1.3.36 |  1.3.46   |1.3.14|  
  4.6|
+   
+---+---+-+---+--+---+
 
 Dynamic Device Personalization (DDP) package loading
 
-- 
2.25.1



[PATCH] vhost: clear ring addresses when getting vring base

2024-11-24 Thread jianping.zhao
Clear ring addresses during vring base retrieval to handle guest reboot
scenarios correctly. This is particularly important for vdpa-blk devices
where the following issue occurs:

When a guest OS with vdpa-blk device reboots, during UEFI stage, only
one vring is actually used and configured. However, QEMU still sends
enable messages for all configured queues. The remaining queues retain
their addresses from before reboot, which reference invalid memory
mappings in the rebooted guest.

The issue manifests in vq_is_ready():

static bool
vq_is_ready(struct virtio_net *dev, struct vhost_virtqueue *vq)
{
/* Only checks pointer validity, not address freshness */
rings_ok = vq->desc && vq->avail && vq->used;
...
}

vq_is_ready() incorrectly considers these queues as ready because it
only checks if desc/avail/used pointers are non-NULL, but cannot
detect that these addresses are stale from the previous boot.

Clear the ring addresses in vhost_user_get_vring_base() to force
the guest driver to reconfigure them before use. This ensures that
vq_is_ready() will return false for queues with stale addresses
until they are properly reconfigured by the guest driver.

Fixes: 3ea7052f4b1b ("vhost: postpone rings addresses translation")

Signed-off-by: jianping.zhao 
---
 lib/vhost/vhost_user.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/lib/vhost/vhost_user.c b/lib/vhost/vhost_user.c
index 6d92ad904e..52d8078d7c 100644
--- a/lib/vhost/vhost_user.c
+++ b/lib/vhost/vhost_user.c
@@ -2277,6 +2277,7 @@ vhost_user_get_vring_base(struct virtio_net **pdev,
 
rte_rwlock_write_lock(&vq->access_lock);
vring_invalidate(dev, vq);
+   memset(&vq->ring_addrs, 0, sizeof(struct vhost_vring_addr));
rte_rwlock_write_unlock(&vq->access_lock);
 
return RTE_VHOST_MSG_RESULT_REPLY;
-- 
2.34.1



[PATCH v1] net/ice: updated latest recommended matching list

2024-11-24 Thread hailinx
Signed-off-by: hailinx 
---
 doc/guides/nics/ice.rst | 4 
 1 file changed, 4 insertions(+)

diff --git a/doc/guides/nics/ice.rst b/doc/guides/nics/ice.rst
index eac1f2627b..a32fb27b24 100644
--- a/doc/guides/nics/ice.rst
+++ b/doc/guides/nics/ice.rst
@@ -79,6 +79,10 @@ are listed in the Tested Platforms section of the Release 
Notes for each release

+---+---+-+---+--+---+
|24.03  | 1.13.7|  1.3.35 |  1.3.45   |1.3.13|  
  4.4|

+---+---+-+---+--+---+
+   |24.07  | 1.14.11   |  1.3.36 |  1.3.46   |1.3.14|  
  4.5|
+   
+---+---+-+---+--+---+
+   |24.11  | 1.15.4|  1.3.36 |  1.3.46   |1.3.14|  
  4.6|
+   
+---+---+-+---+--+---+
 
 Dynamic Device Personalization (DDP) package loading
 
-- 
2.25.1



Re: [PATCH] net/txgbe: fix a mass of interrupts

2024-11-24 Thread Stephen Hemminger
On Tue, 19 Nov 2024 10:02:23 +0800
Jiawen Wu  wrote:

> On Tue, Nov 19, 2024 3:59 AM, Ferruh Yigit wrote:
> > On 11/15/2024 8:33 AM, Jiawen Wu wrote:  
> > > Since firmware version 0x20010, GPIO interrupt enable is set to 0xd by
> > > default, which means enable bit 0 'tx_fault'. And GPIO interrupt polarity
> > > is set to 0xd by default too, which means these interrupts are rising-edge
> > > sensitive.
> > >
> > > So when unplug the SFP module, GPIO line 0 'tx_fault' is 0 -> 1 triggers
> > > the interrupt. However, the interrupt is not cleared. And GPIO interrupt
> > > mask is enabled and disabled to trigger the MISC interrupt repeatedly.
> > >
> > > Since this 'tx_fault' interrupt does not make much sense, simply clear it
> > > to fix the issue.
> > >
> > > Signed-off-by: Jiawen Wu 
> > >  
> > 
> > Hi Jiawen,
> > 
> > Can you please provide a fixes tag?
> > Also I believe you would like to backport this fix, if so please add the
> > stable tag as well.  
> 
> I have thought about it. But there are two changes based on two commits:
> 1. d3bb4a04eac1 ("net/txgbe: add SFP hotplug identification")
> 2. 12011b11a3d6 ("net/txgbe: adapt to MNG veto bit setting")
> 
> Should I split the patch and add fixes tags separately?
> 
> 

It is ok, as is. I can add the fixes tag for you.
The purpose of the fixes is to help with discovering patches that need
to go into stable.

Applied to next-net


Re: [PATCH] app/testpmd: add L4 port to verbose output

2024-11-24 Thread Stephen Hemminger
On Thu, 15 Aug 2024 15:20:51 +0100
Alex Chapman  wrote:

> To help distinguish packets we want to add more identifiable
> information and print port number for all packets.
> This will make packet metadata more uniform as previously it
> only printed port number for encapsulated packets.
> 
> Bugzilla-ID: 1517
> 
> Signed-off-by: Alex Chapman 
> Reviewed-by: Luca Vizzarro 
> Reviewed-by: Paul Szczepanek 

Having more diagnostic output here is a good idea, the output
is pretty verbose. So both printing here and having it in the
dissect output is helpful.

Applied to next-net


DPDK Release Status Meeting 2024-11-21

2024-11-24 Thread Mcnamara, John
Release status meeting minutes 2024-11-21
=

Agenda:
* Release Dates
* Subtrees
* Roadmaps
* LTS
* Defects
* Opens

Participants:
* ARM
* Debian/Microsoft
* Intel
* Marvell
* Nvidia


Release Dates
-

The following are the current/updated working dates for 24.11:

- Proposal deadline (RFC/v1 patches): 7 September 2024
- API freeze (-rc1): 19 October 2024
- PMD features freeze (-rc2): 12 November 2024
- Builtin applications features freeze (-rc3): 20 November 2024
- Release: 29 November 2023

https://core.dpdk.org/roadmap/#dates


Subtrees


* next-net
  * RC3 released.

* next-net-intel
  * Most fixes merged in RC3.

* next-net-mlx
  * Merged for RC3.

* next-net-mvl
  * No update.

* next-eventdev
  * No update.

* next-baseband
  * No update.

* next-virtio
  * No update.

* next-crypto
  * Merged for RC3.

* next-dts
  * No merges past RC3 except for fixes.

* main
  * Docs and minor fixes only for RC4.
  * RC3 released on 20 November
  * RC4 targeted for 26 November 2024
  * Release targeted for 29 November 2024



**Note**:
We will look to move this meeting to a US friendly time slot at
the start of December.


LTS
---

Status of the current LTSes

* 23.11.3 - In progress.
* 22.11.7 - In progress.
* 21.11.9 - In progress.

* 20.11.10 - Will only be updated with CVE and critical fixes.
* 19.11.15 - Will only be updated with CVE and critical fixes.


* Distros
  * Debian 12 contains DPDK v22.11
  * Ubuntu 24.04 contains DPDK v23.11
  * Ubuntu 23.04 contains DPDK v22.11
  * RHEL 8/9 contains DPDK 23.11

Defects
---

* Bugzilla links, 'Bugs',  added for hosted projects
  * https://www.dpdk.org/hosted-projects/



DPDK Release Status Meetings


The DPDK Release Status Meeting is intended for DPDK Committers to discuss the
status of the master tree and sub-trees, and for project managers to track
progress or milestone dates.

The meeting occurs on every Thursday at 9:30 DST over Jitsi on 
https://meet.jit.si/DPDK

You don't need an invite to join the meeting but if you want a calendar 
reminder just
send an email to "John McNamara john.mcnam...@intel.com" for the invite.


Re: [PATCH v3 3/3] net/hns3: fix Rx packet without CRC data

2024-11-24 Thread Stephen Hemminger
On Fri, 19 Jul 2024 17:04:15 +0800
Jie Hai  wrote:

> From: Dengdui Huang 
> 
> When KEEP_CRC offload is enabled, the CRC data is still stripped
> in following cases:
> 1. For HIP08 network engine, the packet type is TCP and the length
>is less than or equal to 60B.
> 2. For HIP09 network engine, the packet type is IP and the length
>is less than or equal to 60B.
> 
> So driver has to recaculate packet CRC for this rare scenarios.
> 
> In addition, to avoid impacting performance, KEEP_CRC is not
> supported when NEON or SVE algorithm is used.
> 
> Fixes: 8973d7c4ca12 ("net/hns3: support keeping CRC")
> Cc: sta...@dpdk.org
> 
> Signed-off-by: Dengdui Huang 
> Acked-by: Huisong Li 

> +static inline void
> +hns3_recalculate_crc(struct rte_mbuf *m)
> +{
> + char *append_data;
> + uint32_t crc;
> +
> + crc = rte_net_crc_calc(rte_pktmbuf_mtod(m, void *),
> +m->data_len, RTE_NET_CRC32_ETH);
> +
> + /*
> +  * The hns3 driver requires that mbuf size must be at least 512B.
> +  * When CRC is stripped by hardware, the pkt_len must be less than
> +  * or equal to 60B. Therefore, the space of the mbuf is enough
> +  * to insert the CRC.
> +  *
> +  * In addition, after CRC is stripped by hardware, pkt_len and data_len
> +  * do not contain the CRC length. Therefore, after CRC data is appended
> +  * by PMD again, both pkt_len and data_len add the CRC length.
> +  */
> + append_data = rte_pktmbuf_append(m, RTE_NET_CRC32_ETH);
> + /* The CRC data is binary data and does not care about the byte order. 
> */
> + rte_memcpy(append_data, (void *)&crc, RTE_NET_CRC32_ETH);
> +}

Ok, but minor nits for future.
Trying to phase out use of rte_memcpy(), rte_memcpy() has no advantage except
in certain cases of unaligned variable length copies mostly on older non x86 
distros.
And regular memcpy() enables compiler to do more checking.

And you don't need a void * cast there, in C there is implicit cast to void * 
there.

Applied to next-net


[PATCH 2/3] eventdev: fix uninitialized variable

2024-11-24 Thread Wenwu Ma
This patch fixes the variable 'events' may be used uninitialized.

Fixes: 7901eac3409a ("eventdev: add crypto adapter implementation")
Cc: sta...@dpdk.org

Signed-off-by: Wenwu Ma 
---
 lib/eventdev/rte_event_crypto_adapter.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/lib/eventdev/rte_event_crypto_adapter.c 
b/lib/eventdev/rte_event_crypto_adapter.c
index 939ca1cad9..1ca839510b 100644
--- a/lib/eventdev/rte_event_crypto_adapter.c
+++ b/lib/eventdev/rte_event_crypto_adapter.c
@@ -685,6 +685,7 @@ eca_ops_enqueue_burst(struct event_crypto_adapter *adapter,
nb_ev = 0;
retry = 0;
nb_enqueued = 0;
+   memset(events, 0, sizeof(events));
num = RTE_MIN(num, BATCH_SIZE);
for (i = 0; i < num; i++) {
struct rte_event *ev = &events[nb_ev++];
-- 
2.34.1



[PATCH 1/3] net/bnxt: fix uninitialized variable

2024-11-24 Thread Wenwu Ma
This patch fixes the variable 'total_pages' may be used uninitialized.

Fixes: 80317ff6adfd ("net/bnxt/tf_core: support Thor2")
Cc: sta...@dpdk.org

Signed-off-by: Wenwu Ma 
---
 drivers/net/bnxt/tf_core/v3/tfc_tbl_scope.c | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/drivers/net/bnxt/tf_core/v3/tfc_tbl_scope.c 
b/drivers/net/bnxt/tf_core/v3/tfc_tbl_scope.c
index 1770069295..3aed78dbeb 100644
--- a/drivers/net/bnxt/tf_core/v3/tfc_tbl_scope.c
+++ b/drivers/net/bnxt/tf_core/v3/tfc_tbl_scope.c
@@ -439,7 +439,7 @@ static int alloc_link_pbl(struct tfc_ts_mem_cfg *mem_cfg, 
uint32_t page_size,
char mz_name[RTE_MEMZONE_NAMESIZE];
int mz_size;
uint64_t total_size;
-   uint32_t total_pages;
+   uint32_t total_pages = 0;
 
/* tf_em_size_page_tbl_lvl */
rc = num_pages_get(mem_cfg, page_size);
-- 
2.34.1



[PATCH 0/3] fix uninitialized variable

2024-11-24 Thread Wenwu Ma
fix uninitialized variables in batches

Wenwu Ma (3):
  net/bnxt: fix uninitialized variable
  eventdev: fix uninitialized variable
  eventdev: fix uninitialized variable

 drivers/net/bnxt/tf_core/v3/tfc_tbl_scope.c | 2 +-
 lib/eventdev/rte_event_crypto_adapter.c | 1 +
 lib/eventdev/rte_event_dma_adapter.c| 1 +
 3 files changed, 3 insertions(+), 1 deletion(-)

-- 
2.34.1



[PATCH 3/3] eventdev: fix uninitialized variable

2024-11-24 Thread Wenwu Ma
This patch fixes the variable 'events' may be used uninitialized.

Fixes: 3c89e8c42022 ("eventdev/dma: support adapter service function")
Cc: sta...@dpdk.org

Signed-off-by: Wenwu Ma 
---
 lib/eventdev/rte_event_dma_adapter.c | 1 +
 1 file changed, 1 insertion(+)

diff --git a/lib/eventdev/rte_event_dma_adapter.c 
b/lib/eventdev/rte_event_dma_adapter.c
index ff2bc408c1..3c05fb615f 100644
--- a/lib/eventdev/rte_event_dma_adapter.c
+++ b/lib/eventdev/rte_event_dma_adapter.c
@@ -655,6 +655,7 @@ edma_ops_enqueue_burst(struct event_dma_adapter *adapter, 
struct rte_event_dma_a
nb_ev = 0;
retry = 0;
nb_enqueued = 0;
+   memset(events, 0, sizeof(events));
num = RTE_MIN(num, DMA_BATCH_SIZE);
for (i = 0; i < num; i++) {
struct rte_event *ev = &events[nb_ev++];
-- 
2.34.1