get:
Show a patch.

patch:
Update a patch.

put:
Update a patch.

GET /api/patches/84242/?format=api
HTTP 200 OK
Allow: GET, PUT, PATCH, HEAD, OPTIONS
Content-Type: application/json
Vary: Accept

{
    "id": 84242,
    "url": "https://patches.dpdk.org/api/patches/84242/?format=api",
    "web_url": "https://patches.dpdk.org/project/dpdk/patch/20201116140224.8464-7-getelson@nvidia.com/",
    "project": {
        "id": 1,
        "url": "https://patches.dpdk.org/api/projects/1/?format=api",
        "name": "DPDK",
        "link_name": "dpdk",
        "list_id": "dev.dpdk.org",
        "list_email": "dev@dpdk.org",
        "web_url": "http://core.dpdk.org",
        "scm_url": "git://dpdk.org/dpdk",
        "webscm_url": "http://git.dpdk.org/dpdk",
        "list_archive_url": "https://inbox.dpdk.org/dev",
        "list_archive_url_format": "https://inbox.dpdk.org/dev/{}",
        "commit_url_format": ""
    },
    "msgid": "<20201116140224.8464-7-getelson@nvidia.com>",
    "list_archive_url": "https://inbox.dpdk.org/dev/20201116140224.8464-7-getelson@nvidia.com",
    "date": "2020-11-16T14:02:23",
    "name": "[v5,6/6] net/mlx5: fix crash in tunnel offload setup",
    "commit_ref": null,
    "pull_url": null,
    "state": "accepted",
    "archived": true,
    "hash": "b83efca99e6ceea20a3d2a41d21eb24030cf63a9",
    "submitter": {
        "id": 1882,
        "url": "https://patches.dpdk.org/api/people/1882/?format=api",
        "name": "Gregory Etelson",
        "email": "getelson@nvidia.com"
    },
    "delegate": {
        "id": 3268,
        "url": "https://patches.dpdk.org/api/users/3268/?format=api",
        "username": "rasland",
        "first_name": "Raslan",
        "last_name": "Darawsheh",
        "email": "rasland@nvidia.com"
    },
    "mbox": "https://patches.dpdk.org/project/dpdk/patch/20201116140224.8464-7-getelson@nvidia.com/mbox/",
    "series": [
        {
            "id": 13906,
            "url": "https://patches.dpdk.org/api/series/13906/?format=api",
            "web_url": "https://patches.dpdk.org/project/dpdk/list/?series=13906",
            "date": "2020-11-16T14:02:17",
            "name": "restore tunnel offload functionality in mlx5",
            "version": 5,
            "mbox": "https://patches.dpdk.org/series/13906/mbox/"
        }
    ],
    "comments": "https://patches.dpdk.org/api/patches/84242/comments/",
    "check": "fail",
    "checks": "https://patches.dpdk.org/api/patches/84242/checks/",
    "tags": {},
    "related": [],
    "headers": {
        "Return-Path": "<dev-bounces@dpdk.org>",
        "X-Original-To": "patchwork@inbox.dpdk.org",
        "Delivered-To": "patchwork@inbox.dpdk.org",
        "Received": [
            "from dpdk.org (dpdk.org [92.243.14.124])\n\tby inbox.dpdk.org (Postfix) with ESMTP id 5DA24A04B5;\n\tMon, 16 Nov 2020 15:05:12 +0100 (CET)",
            "from [92.243.14.124] (localhost [127.0.0.1])\n\tby dpdk.org (Postfix) with ESMTP id 0E188C930;\n\tMon, 16 Nov 2020 15:03:26 +0100 (CET)",
            "from hqnvemgate24.nvidia.com (hqnvemgate24.nvidia.com\n [216.228.121.143]) by dpdk.org (Postfix) with ESMTP id 14008C924\n for <dev@dpdk.org>; Mon, 16 Nov 2020 15:03:24 +0100 (CET)",
            "from hqmail.nvidia.com (Not Verified[216.228.121.13]) by\n hqnvemgate24.nvidia.com (using TLS: TLSv1.2, AES256-SHA)\n id <B5fb286b50001>; Mon, 16 Nov 2020 06:03:33 -0800",
            "from nvidia.com (10.124.1.5) by HQMAIL107.nvidia.com (172.20.187.13)\n with Microsoft SMTP Server (TLS) id 15.0.1473.3;\n Mon, 16 Nov 2020 14:03:20 +0000"
        ],
        "From": "Gregory Etelson <getelson@nvidia.com>",
        "To": "<dev@dpdk.org>",
        "CC": "<getelson@nvidia.com>, <matan@nvidia.com>, <rasland@nvidia.com>,\n Viacheslav Ovsiienko <viacheslavo@nvidia.com>, Shahaf Shuler\n <shahafs@nvidia.com>, Xueming Li <xuemingl@nvidia.com>",
        "Date": "Mon, 16 Nov 2020 16:02:23 +0200",
        "Message-ID": "<20201116140224.8464-7-getelson@nvidia.com>",
        "X-Mailer": "git-send-email 2.29.2",
        "In-Reply-To": "<20201116140224.8464-1-getelson@nvidia.com>",
        "References": "<20201111071417.21177-1-getelson@nvidia.com>\n <20201116140224.8464-1-getelson@nvidia.com>",
        "MIME-Version": "1.0",
        "Content-Transfer-Encoding": "quoted-printable",
        "Content-Type": "text/plain",
        "X-Originating-IP": "[10.124.1.5]",
        "X-ClientProxiedBy": "HQMAIL101.nvidia.com (172.20.187.10) To\n HQMAIL107.nvidia.com (172.20.187.13)",
        "DKIM-Signature": "v=1; a=rsa-sha256; c=relaxed/relaxed; d=nvidia.com; s=n1;\n t=1605535413; bh=Bvioau6wNrYgYkDjo/tL4CBi2P/1WQIcyI7EZCAiqWU=;\n h=From:To:CC:Subject:Date:Message-ID:X-Mailer:In-Reply-To:\n References:MIME-Version:Content-Transfer-Encoding:Content-Type:\n X-Originating-IP:X-ClientProxiedBy;\n b=C84LA83TFKo4fY9SNd3koFwh7wzxqzj81r7GKlk1sNhGsZsUWXlujmBw72iZvY24i\n ZAouhlXnRvoS0He2SB72jJUaaMuM+lHLg2wmCs26wsv91L4G4orbCeIv0AVCFfDsn1\n u6QgmqHxG3Zrz3HfnUOpNGoduWZTxOyqDV/Q2R5TyqafQ6yHMbjNF/c85cOMnOOOgk\n nIYGgGVtT9Wh52nkNfVEcIBr4AkamJhzhkmqPsry0sD+xfqs0qqV94ipYDINZuz6jW\n lTJCij/Rj8Gk7D+T7/px9Leaz0xsP8TKJKZY5krrBqoRwxyjSbpp056e6KvVeycGjv\n 9Jd79LwHJnK7A==",
        "Subject": "[dpdk-dev] [PATCH v5 6/6] net/mlx5: fix crash in tunnel offload\n\tsetup",
        "X-BeenThere": "dev@dpdk.org",
        "X-Mailman-Version": "2.1.15",
        "Precedence": "list",
        "List-Id": "DPDK patches and discussions <dev.dpdk.org>",
        "List-Unsubscribe": "<https://mails.dpdk.org/options/dev>,\n <mailto:dev-request@dpdk.org?subject=unsubscribe>",
        "List-Archive": "<http://mails.dpdk.org/archives/dev/>",
        "List-Post": "<mailto:dev@dpdk.org>",
        "List-Help": "<mailto:dev-request@dpdk.org?subject=help>",
        "List-Subscribe": "<https://mails.dpdk.org/listinfo/dev>,\n <mailto:dev-request@dpdk.org?subject=subscribe>",
        "Errors-To": "dev-bounces@dpdk.org",
        "Sender": "\"dev\" <dev-bounces@dpdk.org>"
    },
    "content": "The new flow table resource management API triggered a PMD crash in\ntunnel offload mode, when tunnel match flow rule was inserted before\ntunnel set rule.\n\nReason for the crash was double flow table registration. The table was\nregistered by the tunnel offload code for the first time and once\nmore by PMD code, as part of general table processing. The table\ncounter was decremented only once during the rule destruction and\ncaused a resource leak that triggered the crash.\n\nThe patch updates PMD registration with tunnel offload parameters and\nremoves table registration in tunnel related code.\n\nFixes: 663ad57dabb2 (\"net/mlx5: make flow table cache thread safe\")\n\nSigned-off-by: Gregory Etelson <getelson@nvidia.com>\nAcked-by: Viacheslav Ovsiienko <viacheslavo@nvidia.com>\n---\n drivers/net/mlx5/mlx5_flow.c    |  2 +-\n drivers/net/mlx5/mlx5_flow_dv.c | 39 +++++++++++++++++----------------\n 2 files changed, 21 insertions(+), 20 deletions(-)",
    "diff": "diff --git a/drivers/net/mlx5/mlx5_flow.c b/drivers/net/mlx5/mlx5_flow.c\nindex 2fe8648341..b9e1c30713 100644\n--- a/drivers/net/mlx5/mlx5_flow.c\n+++ b/drivers/net/mlx5/mlx5_flow.c\n@@ -6773,7 +6773,7 @@ mlx5_flow_group_to_table(struct rte_eth_dev *dev,\n \t\tstandard_translation = true;\n \t}\n \tDRV_LOG(DEBUG,\n-\t\t\"port %u group=%#x transfer=%d external=%d fdb_def_rule=%d translate=%s\",\n+\t\t\"port %u group=%u transfer=%d external=%d fdb_def_rule=%d translate=%s\",\n \t\tdev->data->port_id, group, grp_info->transfer,\n \t\tgrp_info->external, grp_info->fdb_def_rule,\n \t\tstandard_translation ? \"STANDARD\" : \"TUNNEL\");\ndiff --git a/drivers/net/mlx5/mlx5_flow_dv.c b/drivers/net/mlx5/mlx5_flow_dv.c\nindex 25ab9adee6..5e230a3c25 100644\n--- a/drivers/net/mlx5/mlx5_flow_dv.c\n+++ b/drivers/net/mlx5/mlx5_flow_dv.c\n@@ -8042,6 +8042,8 @@ flow_dv_tbl_resource_get(struct rte_eth_dev *dev,\n \t\t\t\t   \"cannot get table\");\n \t\treturn NULL;\n \t}\n+\tDRV_LOG(DEBUG, \"Table_id %u tunnel %u group %u registered.\",\n+\t\ttable_id, tunnel ? tunnel->tunnel_id : 0, group_id);\n \ttbl_data = container_of(entry, struct mlx5_flow_tbl_data_entry, entry);\n \treturn &tbl_data->tbl;\n }\n@@ -8080,7 +8082,7 @@ flow_dv_tbl_remove_cb(struct mlx5_hlist *list,\n \t\tif (he)\n \t\t\tmlx5_hlist_unregister(tunnel_grp_hash, he);\n \t\tDRV_LOG(DEBUG,\n-\t\t\t\"Table_id %#x tunnel %u group %u released.\",\n+\t\t\t\"Table_id %u tunnel %u group %u released.\",\n \t\t\ttable_id,\n \t\t\ttbl_data->tunnel ?\n \t\t\ttbl_data->tunnel->tunnel_id : 0,\n@@ -8192,6 +8194,8 @@ flow_dv_matcher_register(struct rte_eth_dev *dev,\n \t\t\t struct mlx5_flow_dv_matcher *ref,\n \t\t\t union mlx5_flow_tbl_key *key,\n \t\t\t struct mlx5_flow *dev_flow,\n+\t\t\t const struct mlx5_flow_tunnel *tunnel,\n+\t\t\t uint32_t group_id,\n \t\t\t struct rte_flow_error *error)\n {\n \tstruct mlx5_cache_entry *entry;\n@@ -8203,8 +8207,14 @@ flow_dv_matcher_register(struct rte_eth_dev *dev,\n \t\t.data = ref,\n \t};\n \n-\ttbl = flow_dv_tbl_resource_get(dev, key->table_id, key->direction,\n-\t\t\t\t       key->domain, false, NULL, 0, 0, error);\n+\t/**\n+\t * tunnel offload API requires this registration for cases when\n+\t * tunnel match rule was inserted before tunnel set rule.\n+\t */\n+\ttbl = flow_dv_tbl_resource_get(dev, key->table_id,\n+\t\t\t\t       key->direction, key->domain,\n+\t\t\t\t       dev_flow->external, tunnel,\n+\t\t\t\t       group_id, 0, error);\n \tif (!tbl)\n \t\treturn -rte_errno;\t/* No need to refill the error info */\n \ttbl_data = container_of(tbl, struct mlx5_flow_tbl_data_entry, tbl);\n@@ -9611,10 +9621,14 @@ flow_dv_translate(struct rte_eth_dev *dev,\n \t\t/*\n \t\t * do not add decap action if match rule drops packet\n \t\t * HW rejects rules with decap & drop\n+\t\t *\n+\t\t * if tunnel match rule was inserted before matching tunnel set\n+\t\t * rule flow table used in the match rule must be registered.\n+\t\t * current implementation handles that in the\n+\t\t * flow_dv_match_register() at the function end.\n \t\t */\n \t\tbool add_decap = true;\n \t\tconst struct rte_flow_action *ptr = actions;\n-\t\tstruct mlx5_flow_tbl_resource *tbl;\n \n \t\tfor (; ptr->type != RTE_FLOW_ACTION_TYPE_END; ptr++) {\n \t\t\tif (ptr->type == RTE_FLOW_ACTION_TYPE_DROP) {\n@@ -9631,20 +9645,6 @@ flow_dv_translate(struct rte_eth_dev *dev,\n \t\t\t\t\tdev_flow->dv.encap_decap->action;\n \t\t\taction_flags |= MLX5_FLOW_ACTION_DECAP;\n \t\t}\n-\t\t/*\n-\t\t * bind table_id with <group, table> for tunnel match rule.\n-\t\t * Tunnel set rule establishes that bind in JUMP action handler.\n-\t\t * Required for scenario when application creates tunnel match\n-\t\t * rule before tunnel set rule.\n-\t\t */\n-\t\ttbl = flow_dv_tbl_resource_get(dev, table, attr->egress,\n-\t\t\t\t\t       attr->transfer,\n-\t\t\t\t\t       !!dev_flow->external, tunnel,\n-\t\t\t\t\t       attr->group, 0, error);\n-\t\tif (!tbl)\n-\t\t\treturn rte_flow_error_set\n-\t\t\t       (error, EINVAL, RTE_FLOW_ERROR_TYPE_ACTION,\n-\t\t\t       actions, \"cannot register tunnel group\");\n \t}\n \tfor (; !actions_end ; actions++) {\n \t\tconst struct rte_flow_action_queue *queue;\n@@ -10474,7 +10474,8 @@ flow_dv_translate(struct rte_eth_dev *dev,\n \ttbl_key.domain = attr->transfer;\n \ttbl_key.direction = attr->egress;\n \ttbl_key.table_id = dev_flow->dv.group;\n-\tif (flow_dv_matcher_register(dev, &matcher, &tbl_key, dev_flow, error))\n+\tif (flow_dv_matcher_register(dev, &matcher, &tbl_key, dev_flow,\n+\t\t\t\t     tunnel, attr->group, error))\n \t\treturn -rte_errno;\n \treturn 0;\n }\n",
    "prefixes": [
        "v5",
        "6/6"
    ]
}