http://bugs.dpdk.org/show_bug.cgi?id=1889
Bug ID: 1889
Summary: r8169: rtl_xmit_pkts breaks tx_burst ownership
contract on invalid mbufs
Product: DPDK
Version: 25.11
Hardware: All
OS: All
Status: UNCONFIRMED
Severity: minor
Priority: Normal
Component: ethdev
Assignee: [email protected]
Reporter: [email protected]
Target Milestone: ---
`rtl_xmit_pkts()` in `drivers/net/r8169/r8169_rxtx.c` returns a short
count when it encounters an invalid mbuf, violating the `rte_eth_tx_burst()`
ownership contract. This can cause callers to retry an unfixable packet
indefinitely.
## Description
In `rtl_xmit_pkts()` (r8169_rxtx.c, line ~1974), the mbuf validation
check uses `break` to exit the transmit loop when it encounters an invalid
packet:
```c
for (nb_tx = 0; nb_tx < nb_pkts; nb_tx++) {
tx_pkt = *tx_pkts++;
if (txq->tx_free < tx_pkt->nb_segs)
break;
/* Check mbuf is valid */
if (tx_pkt->nb_segs == 0 || tx_pkt->pkt_len == 0 ||
(tx_pkt->nb_segs > 1 && tx_pkt->next == NULL))
break;
rtl_xmit_pkt(hw, txq, tx_pkt);
}
```
The `rte_eth_tx_burst()` contract requires:
- `tx_pkts[0..n-1]`: ownership transferred to the driver (consumed).
- `tx_pkts[n..nb_pkts-1]`: untouched, still owned by the caller.
When the driver encounters an invalid mbuf at index `nb_tx` and breaks,
that invalid packet becomes the first "unconsumed" packet returned to the
caller. Applications using the standard retry pattern will attempt to
re-transmit the unfixable packet indefinitely:
```c
/* Common application pattern that becomes an infinite loop */
do {
n = rte_eth_tx_burst(port, txq, &mbufs[sent], nb_pkts - sent);
sent += n;
} while (sent < nb_pkts);
```
Per the clarified `rte_eth_tx_burst()` semantics: if a packet cannot be
transmitted due to an error, the driver must still consume it, free the
mbuf, and count it via `tx_errors`. Stopping at the error packet is
incorrect.
Note: the `txq->tx_free < tx_pkt->nb_segs` check (ring full) correctly
uses `break` — the driver genuinely cannot accept the packet, and the
caller should retry later.
## Steps to Reproduce
1. Construct an mbuf with `pkt_len == 0` or `nb_segs == 0` or a
multi-segment mbuf with a NULL `next` pointer.
2. Submit it in the middle of a burst to `rte_eth_tx_burst()` on an r8169
port.
3. Observe that the return value leaves the invalid mbuf as the first
unconsumed packet.
4. A retry loop will stall forever on that packet.
## Suggested Fix
Replace the `break` on invalid mbufs with consume-and-continue:
```c
/* Check mbuf is valid */
if (tx_pkt->nb_segs == 0 || tx_pkt->pkt_len == 0 ||
(tx_pkt->nb_segs > 1 && tx_pkt->next == NULL)) {
rte_pktmbuf_free(tx_pkt);
txq->sw_stats.tx_errors++;
continue;
}
```
This ensures the erroneous packet is consumed (freed), counted in
statistics, and does not block subsequent valid packets in the burst.
--
You are receiving this mail because:
You are the assignee for the bug.