Received: by 10.223.176.46 with SMTP id f43csp2358167wra; Sun, 21 Jan 2018 18:12:59 -0800 (PST) X-Google-Smtp-Source: AH8x226WixbIIgl/qJ2ftPqrKuG1O0kCs0zF8yjtZDDmTZ2rn0bTnoScD5d8gr9cYsQVAjxgaexd X-Received: by 2002:a17:902:930c:: with SMTP id bc12-v6mr2658406plb.328.1516587179380; Sun, 21 Jan 2018 18:12:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1516587179; cv=none; d=google.com; s=arc-20160816; b=Xqqtaxx37aZWNzQtqzBrV9TzkKReKOtq1KoQPFVZyIraO7bkd6VyNYsFOQKrzB5o26 /0yIVm0CUBHJCzbMg05YofnasH7COPsbeKygmfh7N35iPPmgFxc+3a8s/CJrUVMi+sRE 95Zd/lKFhAFqOBGLd60coAboXzryZeffUtWopXN6jQkdP5rsf1tZgwR9NjyI0ubQaAxm 5hmdYO2Nk545fLdcLxKmsZmzggjn7E2f5DDEx6qnV7jCd0jp4+UqlQd9Pu4doOjKnBLd RNES69ZQAcnOsBlCfaUh3WKJM31wq/qKAJxYOAg+N6YYdSqZ5bS3CwroURQClefUsiVo /7KQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding :content-language:in-reply-to:mime-version:user-agent:date :message-id:from:references:cc:to:subject:dkim-signature :arc-authentication-results; bh=DRB3OWgEmkafEdNybuI8ZNzYesEmdshqc2M/nAGiFIw=; b=WoMOyELoz1YqKuL64sB750XhnOgJVt0iMbzYV/3uRem17K5xxjjhGztwx8HNpbBRBX irtuY1ub+4r8s/ySUvft+SMJhIpsJwuw5AqwBcF/YsNxU9EX2DjJ9tb4fwPifHcSsLxX oKNDeqK6hMSp7+2ZlRrpvuFwkkE1yZ+gYhWsEefi5M+dWjWrT0RKVFkJH1UvyBD82Vuu lMFp8mMTos6mcpkbQrSJSEg8oV8BIzrfpoOcDOdNv1ffVkjF+UNdH6pt43dGIBmxPUZy A4g3VSQ22zQt26QumxyaqbiIGO5PXW56QtrUx1jGLahQJmOQK0K84AslpxSQwyj96wOD uDGg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=texKRAzd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id h123si12819151pgc.417.2018.01.21.18.12.45; Sun, 21 Jan 2018 18:12:59 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@oracle.com header.s=corp-2017-10-26 header.b=texKRAzd; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=oracle.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1751156AbeAVCMX (ORCPT + 99 others); Sun, 21 Jan 2018 21:12:23 -0500 Received: from aserp2120.oracle.com ([141.146.126.78]:44852 "EHLO aserp2120.oracle.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751113AbeAVCMV (ORCPT ); Sun, 21 Jan 2018 21:12:21 -0500 Received: from pps.filterd (aserp2120.oracle.com [127.0.0.1]) by aserp2120.oracle.com (8.16.0.22/8.16.0.22) with SMTP id w0M2CGYm094524; Mon, 22 Jan 2018 02:12:16 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=subject : to : cc : references : from : message-id : date : mime-version : in-reply-to : content-type : content-transfer-encoding; s=corp-2017-10-26; bh=DRB3OWgEmkafEdNybuI8ZNzYesEmdshqc2M/nAGiFIw=; b=texKRAzdrj0391MuVC9z2lEsbcgNr0gR0onU435duZdUqVao4ckB+COk1YEue0iiAu3u hCIV8RDq9fRCSS2jBqSoKWo3DQscOzxmbrvHzyJL3Ayha0DSzX3RENwbgvg57MFiUESv zbG3a1mAR63ZRs5g5kYZH/a94T3MjBxhBdOMcu7gggr+0XfRz4zGWC+QJouTQn1CkMgg WeHAFt5+/BVjMPiOLu3BpdsdA82u0MaFDHkGG+SITRfk6Bn0iEOjXmpDuviB/rR6Xv5x pCx/Fju2sG9QL8HSV508Zg6wHcQZyM7ZPjx9KwIJa4XOUzPcC0P/Mzq0marKinysZdZE xQ== Received: from userv0022.oracle.com (userv0022.oracle.com [156.151.31.74]) by aserp2120.oracle.com with ESMTP id 2fn4ne08bb-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Mon, 22 Jan 2018 02:12:16 +0000 Received: from aserv0121.oracle.com (aserv0121.oracle.com [141.146.126.235]) by userv0022.oracle.com (8.14.4/8.14.4) with ESMTP id w0M2CFmT029213 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=FAIL); Mon, 22 Jan 2018 02:12:15 GMT Received: from abhmp0007.oracle.com (abhmp0007.oracle.com [141.146.116.13]) by aserv0121.oracle.com (8.14.4/8.13.8) with ESMTP id w0M2CE3u007141; Mon, 22 Jan 2018 02:12:14 GMT Received: from [10.182.69.179] (/10.182.69.179) by default (Oracle Beehive Gateway v4.0) with ESMTP ; Sun, 21 Jan 2018 18:12:14 -0800 Subject: Re: [PATCH] net/mlx4_en: ensure rx_desc updating reaches HW before prod db updating To: Tariq Toukan , Eric Dumazet , Jason Gunthorpe Cc: junxiao.bi@oracle.com, netdev@vger.kernel.org, linux-rdma@vger.kernel.org, linux-kernel@vger.kernel.org, Saeed Mahameed References: <1515728542-3060-1-git-send-email-jianchao.w.wang@oracle.com> <20180112163247.GB15974@ziepe.ca> <1515775567.131759.42.camel@gmail.com> <53b1ac4d-a294-eb98-149e-65d7954243da@oracle.com> <1516376999.3606.39.camel@gmail.com> <339a7156-9ef1-1f3c-30b8-3cc3558d124e@mellanox.com> From: "jianchao.wang" Message-ID: Date: Mon, 22 Jan 2018 10:12:14 +0800 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:52.0) Gecko/20100101 Thunderbird/52.5.0 MIME-Version: 1.0 In-Reply-To: <339a7156-9ef1-1f3c-30b8-3cc3558d124e@mellanox.com> Content-Type: text/plain; charset=utf-8 Content-Language: en-US Content-Transfer-Encoding: 8bit X-Proofpoint-Virus-Version: vendor=nai engine=5900 definitions=8781 signatures=668655 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 suspectscore=2 malwarescore=0 phishscore=0 bulkscore=0 spamscore=0 mlxscore=0 mlxlogscore=999 adultscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.0.1-1711220000 definitions=main-1801220027 Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi Tariq and all Many thanks for your kindly and detailed response and comment. On 01/22/2018 12:24 AM, Tariq Toukan wrote: > > > On 21/01/2018 11:31 AM, Tariq Toukan wrote: >> >> >> On 19/01/2018 5:49 PM, Eric Dumazet wrote: >>> On Fri, 2018-01-19 at 23:16 +0800, jianchao.wang wrote: >>>> Hi Tariq >>>> >>>> Very sad that the crash was reproduced again after applied the patch. > > Memory barriers vary for different Archs, can you please share more details regarding arch and repro steps?The hardware is HP ProLiant DL380 Gen9/ProLiant DL380 Gen9, BIOS P89 12/27/2015 The xen is installed. The crash occurred in DOM0. Regarding to the repro steps, it is a customer's test which does heavy disk I/O over NFS storage without any guest. The patch that can fix this issue is as follow: --- a/drivers/net/ethernet/mellanox/mlx4/en_rx.c +++ b/drivers/net/ethernet/mellanox/mlx4/en_rx.c @@ -1005,6 +1005,7 @@ out: wmb(); /* ensure HW sees CQ consumer before we post new buffers */ ring->cons = cq->mcq.cons_index; mlx4_en_refill_rx_buffers(priv, ring); + wmb(); mlx4_en_update_rx_prod_db(ring); return polled; } Thanks Jianchao > >>>> >>>> --- a/drivers/net/ethernet/mellanox/mlx4/en_rx.c >>>> +++ b/drivers/net/ethernet/mellanox/mlx4/en_rx.c >>>> @@ -252,6 +252,7 @@ static inline bool mlx4_en_is_ring_empty(struct mlx4_en_rx_ring *ring) >>>>   static inline void mlx4_en_update_rx_prod_db(struct mlx4_en_rx_ring *ring) >>>>   { >>>> +    dma_wmb(); >>> >>> So... is wmb() here fixing the issue ? >>> >>>>       *ring->wqres.db.db = cpu_to_be32(ring->prod & 0xffff); >>>>   } >>>> >>>> I analyzed the kdump, it should be a memory corruption. >>>> >>>> Thanks >>>> Jianchao >> >> Hmm, this is actually consistent with the example below [1]. >> >> AIU from the example, it seems that the dma_wmb/dma_rmb barriers are good for synchronizing cpu/device accesses to the "Streaming DMA mapped" buffers (the descriptors, went through the dma_map_page() API), but not for the doorbell (a coherent memory, typically allocated via dma_alloc_coherent) that requires using the stronger wmb() barrier. >> >> >> [1] Documentation/memory-barriers.txt >> >>   (*) dma_wmb(); >>   (*) dma_rmb(); >> >>       These are for use with consistent memory to guarantee the ordering >>       of writes or reads of shared memory accessible to both the CPU and a >>       DMA capable device. >> >>       For example, consider a device driver that shares memory with a device >>       and uses a descriptor status value to indicate if the descriptor belongs >>       to the device or the CPU, and a doorbell to notify it when new >>       descriptors are available: >> >>      if (desc->status != DEVICE_OWN) { >>          /* do not read data until we own descriptor */ >>          dma_rmb(); >> >>          /* read/modify data */ >>          read_data = desc->data; >>          desc->data = write_data; >> >>          /* flush modifications before status update */ >>          dma_wmb(); >> >>          /* assign ownership */ >>          desc->status = DEVICE_OWN; >> >>          /* force memory to sync before notifying device via MMIO */ >>          wmb(); >> >>          /* notify device of new descriptors */ >>          writel(DESC_NOTIFY, doorbell); >>      } >> >>       The dma_rmb() allows us guarantee the device has released ownership >>       before we read the data from the descriptor, and the dma_wmb() allows >>       us to guarantee the data is written to the descriptor before the device >>       can see it now has ownership.  The wmb() is needed to guarantee that the >>       cache coherent memory writes have completed before attempting a write to >>       the cache incoherent MMIO region. >> >>       See Documentation/DMA-API.txt for more information on consistent memory. >> >> >>>> On 01/15/2018 01:50 PM, jianchao.wang wrote: >>>>> Hi Tariq >>>>> >>>>> Thanks for your kindly response. >>>>> >>>>> On 01/14/2018 05:47 PM, Tariq Toukan wrote: >>>>>> Thanks Jianchao for your patch. >>>>>> >>>>>> And Thank you guys for your reviews, much appreciated. >>>>>> I was off-work on Friday and Saturday. >>>>>> >>>>>> On 14/01/2018 4:40 AM, jianchao.wang wrote: >>>>>>> Dear all >>>>>>> >>>>>>> Thanks for the kindly response and reviewing. That's really appreciated. >>>>>>> >>>>>>> On 01/13/2018 12:46 AM, Eric Dumazet wrote: >>>>>>>>> Does this need to be dma_wmb(), and should it be in >>>>>>>>> mlx4_en_update_rx_prod_db ? >>>>>>>>> >>>>>>>> >>>>>>>> +1 on dma_wmb() >>>>>>>> >>>>>>>> On what architecture bug was observed ? >>>>>>> >>>>>>> This issue was observed on x86-64. >>>>>>> And I will send a new patch, in which replace wmb() with dma_wmb(), to customer >>>>>>> to confirm. >>>>>> >>>>>> +1 on dma_wmb, let us know once customer confirms. >>>>>> Please place it within mlx4_en_update_rx_prod_db as suggested. >>>>> >>>>> Yes, I have recommended it to customer. >>>>> Once I get the result, I will share it here. >>>>>> All other calls to mlx4_en_update_rx_prod_db are in control/slow path so I prefer being on the safe side, and care less about bulking the barrier. >>>>>> >>>>>> Thanks, >>>>>> Tariq >>>>>> >>> --  >>> To unsubscribe from this list: send the line "unsubscribe linux-rdma" in >>> the body of a message to majordomo@vger.kernel.org >>> More majordomo info at  https://urldefense.proofpoint.com/v2/url?u=http-3A__vger.kernel.org_majordomo-2Dinfo.html&d=DwIDaQ&c=RoP1YumCXCgaWHvlZYR8PZh8Bv7qIrMUB65eapI_JnE&r=7WdAxUBeiTUTCy8v-7zXyr4qk7sx26ATvfo6QSTvZyQ&m=s8_-sqvK_-1EHwvxh5DBpBIakIb0lpcn0fN6zbFxgpk&s=q3jITeGfYvYPdMo8vqfURwAbUNbSrVi2pkJfmPVGUH8&e= >>> >