Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1752287Ab3FQQUc (ORCPT ); Mon, 17 Jun 2013 12:20:32 -0400 Received: from webmail.solarflare.com ([12.187.104.25]:39495 "EHLO webmail.solarflare.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751170Ab3FQQUa (ORCPT ); Mon, 17 Jun 2013 12:20:30 -0400 Message-ID: <1371486020.2086.27.camel@bwh-desktop.uk.level5networks.com> Subject: Re: [PATCH 0/2] fix kernel crash with macvtap on top of LRO From: Ben Hutchings To: Rusty Russell CC: "Michael S. Tsirkin" , David Miller , , , , Date: Mon, 17 Jun 2013 17:20:20 +0100 In-Reply-To: <87wqptplhw.fsf@rustcorp.com.au> References: <1360193660.32217.39.camel@deadeye.wl.decadent.org.uk> <1360207111.28557.47.camel@edumazet-glaptop> <1360254046.3605.8.camel@bwh-desktop.uk.solarflarecom.com> <20130207.131420.1211188723341167971.davem@davemloft.net> <20130610070710.GA673@redhat.com> <1371048996.1894.15.camel@bwh-desktop.uk.level5networks.com> <20130612190033.GB3462@redhat.com> <87wqptplhw.fsf@rustcorp.com.au> Organization: Solarflare Content-Type: text/plain; charset="UTF-8" X-Mailer: Evolution 3.6.4 (3.6.4-3.fc18) MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Originating-IP: [10.17.20.137] X-TM-AS-Product-Ver: SMEX-10.0.0.1412-7.000.1014-19948.004 X-TM-AS-Result: No--51.292400-0.000000-31 X-TM-AS-User-Approved-Sender: Yes X-TM-AS-User-Blocked-Sender: No Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 3854 Lines: 85 On Mon, 2013-06-17 at 11:05 +0930, Rusty Russell wrote: > "Michael S. Tsirkin" writes: > > On Wed, Jun 12, 2013 at 03:56:36PM +0100, Ben Hutchings wrote: > >> On Mon, 2013-06-10 at 10:07 +0300, Michael S. Tsirkin wrote: > >> > On Thu, Feb 07, 2013 at 01:14:20PM -0500, David Miller wrote: > >> > > From: Ben Hutchings > >> > > Date: Thu, 7 Feb 2013 16:20:46 +0000 > >> > > > >> > > > If the consensus is still that we must preserve packets exactly (aside > >> > > > from the usual modifications by IP routers) then LRO should be disabled > >> > > > on all devices for which forwarding is enabled. > >> > > > >> > > I believe this is still undoubtedly the consensus. > >> > > >> > With virtio we are getting packets from a linux host, > >> > so we could thinkably preserve packets exactly > >> > even with LRO. I am guessing other hardware could be > >> > doing this as well. > >> > > >> > I am not sure what information would need to be preserved - > >> > could someone help clarify please? > >> > >> Some LRO implementations may not preserve: > >> > >> - Packet boundaries > >> - TSO/GSO produces packets all the same size, except possibly for the > >> last one. GRO therefore flushes a flow after merging a packet with > >> a different segment size. > >> - IPv4 TTL, IPv6 hop-limit, TCP timestamp > >> - TSO/GSO will put the same values in all packets. GRO flushes a flow > >> if they change. > >> - IPv4 fragment ID > >> - TSO/GSO produces consecutive fragment IDs. GRO flushes a flow > >> if it sees a non-consecutive fragment ID. > >> - MAC header, IPv4 TOS, IPv6 traffic class > >> - Should be the same for all packets in a flow. GRO actually checks > >> and flushes a flow if they change. > >> > >> Ben. > > > > Thanks! > > > > Okay so since LRO in virtio is actually running on top > > of GRO/TSO in linux, looks like the only things worth preserving > > that we don't preserve at the moment are the packet > > boundaries, for which it's enough to report > > the first segment size to guest - we have the total length, > > from that we can calculate the last segment size. > > Isn't this reflected in virtio_net_hdr->gso_size? > > But the bigger point here is that we shouldn't be feeding guests LRO > packets which don't meet the stricter GRO requirements, as we don't know > what the guest is doing with them. It might be forwarding them itself. > > I thought LRO was deprecated and GRO was the new hotness, but I haven't > been following. Do we still care about LRO? The old software LRO implementation, inet_lro, is deprecated in favour of GRO and is now only used by one or two drivers. Hardware/firmware implementations of LRO are still in use and not deprecated, but we try to disable them on devices for which forwarding is enabled because of this information loss. The problem I was talking about is this: you can put macvlan on top of a device that has LRO enabled, and then if the macvtap/macvlan device is used for forwarding the output packets might not look the same as those originally received. So LRO should be disabled on the underlying device whenever forwarding is enabled on the macvtap/macvlan device; however we can't necessarily tell when that happens as the forwarding might be done inside a VM. Maybe this is just too obscure a use case to worry much about getting it right automatically. Ben. -- Ben Hutchings, Staff Engineer, Solarflare Not speaking for my employer; that's the marketing department's job. They asked us to note that Solarflare product names are trademarked. -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/