On Tue, 15 Apr 2025 13:10:18 +0000
"Lombardo, Ed" <ed.lomba...@netscout.com> wrote:

> Hi,
> I enabled more logging, and I see the following ICE Driver Malicious Driver 
> Detection event 6 and 7, in the dpdk_log.txt when failure occurs.
> 
> EAL: Allocated 2112 bytes of per-lcore data with a 64-byte alignment
> ICE_INIT: ice_load_pkg_type(): Active package is: 1.3.35.0, ICE OS Default 
> Package (single VLAN mode)
> ICE_INIT: ice_load_pkg_type(): Active package is: 1.3.35.0, ICE OS Default 
> Package (single VLAN mode)
> MBUF: Registered dynamic field rte_dynfield_timestamp (sz=8, al=8, fl=0x0) -> 
> 96
> MBUF: Registered dynamic flag rte_dynflag_rx_timestamp (fl=0x0) -> 23
> MBUF: Registered dynamic field rte_mbuf_dynfield_udata64 (sz=8, al=8, fl=0x0) 
> -> 104
> ICE_DRIVER: ice_interrupt_handler(): OICR: MDD event
> ICE_DRIVER: ice_interrupt_handler(): Malicious Driver Detection event 7 by 
> TCLAN on TX queue 2 PF# 0
> ICE_DRIVER: ice_interrupt_handler(): Malicious Driver Detection event 6 by 
> TDPU on TX queue 2 PF# 0
> 
> Are malformed packets handled by DPDK, can malformed packets corrupt the 
> mbufs?
> 
> Thanks,
> Ed

I do not know. The malicious driver detection is when application asks
to send a packet on a VF that is not for that VF. I.e source MAC or VLAN 
mismatch.

Reply via email to