Hi,
My big issue I have been trying to resolve is when I send packets from a 
particular pcap file the DPDK mbufs retrieved from rte_eth_rx_burst() after 
short time showed the mbufs with refcnt not 1.  I then modified our application 
to set the mbuf to 10 and when the error hit the rte_eth_rx_burst() would then 
provide mbufs with refcnt set to 10 or 9.  I found testing other pcap files 
they did not cause any failures.  So, I then analyzed this one pcap file and 
found that it had "malformed packet (Exception occurred)".  I then removed this 
one malformed packet from the pcap file and replayed the modified pcap file and 
no errors occurred.  I think when our application retransmitted this malformed 
packet it messed up the DPDK mempool and Malicious Driver Detection event 
occurred.

Thanks,
Ed

-----Original Message-----
From: Stephen Hemminger <step...@networkplumber.org> 
Sent: Tuesday, April 15, 2025 8:02 PM
To: Lombardo, Ed <ed.lomba...@netscout.com>
Cc: Dmitry Kozlyuk <dmitry.kozl...@gmail.com>; users@dpdk.org
Subject: Re: mbuf refcnt issue

External Email: This message originated outside of NETSCOUT. Do not click links 
or open attachments unless you recognize the sender and know the content is 
safe.

On Tue, 15 Apr 2025 13:10:18 +0000
"Lombardo, Ed" <ed.lomba...@netscout.com> wrote:

> Hi,
> I enabled more logging, and I see the following ICE Driver Malicious Driver 
> Detection event 6 and 7, in the dpdk_log.txt when failure occurs.
> 
> EAL: Allocated 2112 bytes of per-lcore data with a 64-byte alignment
> ICE_INIT: ice_load_pkg_type(): Active package is: 1.3.35.0, ICE OS 
> Default Package (single VLAN mode)
> ICE_INIT: ice_load_pkg_type(): Active package is: 1.3.35.0, ICE OS 
> Default Package (single VLAN mode)
> MBUF: Registered dynamic field rte_dynfield_timestamp (sz=8, al=8, 
> fl=0x0) -> 96
> MBUF: Registered dynamic flag rte_dynflag_rx_timestamp (fl=0x0) -> 23
> MBUF: Registered dynamic field rte_mbuf_dynfield_udata64 (sz=8, al=8, 
> fl=0x0) -> 104
> ICE_DRIVER: ice_interrupt_handler(): OICR: MDD event
> ICE_DRIVER: ice_interrupt_handler(): Malicious Driver Detection event 
> 7 by TCLAN on TX queue 2 PF# 0
> ICE_DRIVER: ice_interrupt_handler(): Malicious Driver Detection event 
> 6 by TDPU on TX queue 2 PF# 0
> 
> Are malformed packets handled by DPDK, can malformed packets corrupt the 
> mbufs?
> 
> Thanks,
> Ed

I do not know. The malicious driver detection is when application asks to send 
a packet on a VF that is not for that VF. I.e source MAC or VLAN mismatch.

Reply via email to