Received: by 2002:a05:6a10:16a7:0:0:0:0 with SMTP id gp39csp3515010pxb; Mon, 9 Nov 2020 13:17:26 -0800 (PST) X-Google-Smtp-Source: ABdhPJzZz5rvl9Gp+YTQbKlfO584KKcKXMq8TurAv3m+2qbhzJAXcYmUyJB2AwZB8iDWc152rD2X X-Received: by 2002:a17:906:3092:: with SMTP id 18mr16836532ejv.43.1604956646396; Mon, 09 Nov 2020 13:17:26 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1604956646; cv=none; d=google.com; s=arc-20160816; b=HtxBV57MSRFNejOEY9jhersfQ4yQVuHFEJjQderpYj7/CxckyEiG54K14EczGn6snl mjYMldoPRILqtHUK8Scw193xzeu8HTIwupjvkWfw97VEO0Q3pEXx4X4X5RZWl6SI3W/v ewfVQRX6uLbSKfYRS+99kMm6fzUAPR3hz8/ijpStzWZ3I2GDZqwLe7DNYMXU2mnnKycP qdlErPEyglO7ckPQLugABwgDmISFCoSUEck74JWIpxIqKOKS2u0TEJPWnHcV5TxFJ0i0 ebbxnPtEehoBMS9xQgg4QfQcYHhpluldSpEWgrYBNJFQEngVUo7lT0DZ7EHZZ/gA139F wreA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:subject:reply-to:cc:from:to:dkim-signature:date; bh=zTOBwWAH6JdA/Q03nXi6Nv+Ot9+RM1svymVRReyFZ/8=; b=ksFIMzqsBZUz/fIkvuJDHPUHJd1KETCX9k7ypvwbAJTkGbH9KIM4L6xE6wHBbhecB6 m7gcsHkU6T8cjI7O2E+B51PlhhVgQrrALzhmOYI9HFi8zxmARVRkY+OQaFPMbxKPHsue Am/IRJ1fiqQr4NE/nZLtZewSxr+8JdkaxsRakS7dZhgpoxds/1LndzQePZQH1gxO6Vlp VeeBv70cJTks/+EIzHRlavANoYrBqadFi6OJns/NVAPmSJ+2+wHVksv7vAsTIo70pVXt yR0y/TKZgdT/lyhVK2qbcxtC7BhrrT2HikQI6v8N1/zPE+yUlTGirLRYLaZAj3e68xye IeGg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@pm.me header.s=protonmail header.b=h62fmhbf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=pm.me Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b7si7800310ejj.658.2020.11.09.13.17.03; Mon, 09 Nov 2020 13:17:26 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@pm.me header.s=protonmail header.b=h62fmhbf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=pm.me Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730554AbgKIVPf (ORCPT + 99 others); Mon, 9 Nov 2020 16:15:35 -0500 Received: from mail-40133.protonmail.ch ([185.70.40.133]:41199 "EHLO mail-40133.protonmail.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725946AbgKIVPc (ORCPT ); Mon, 9 Nov 2020 16:15:32 -0500 Date: Mon, 09 Nov 2020 21:15:19 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pm.me; s=protonmail; t=1604956528; bh=zTOBwWAH6JdA/Q03nXi6Nv+Ot9+RM1svymVRReyFZ/8=; h=Date:To:From:Cc:Reply-To:Subject:From; b=h62fmhbfhOQh29yjgA3Xy2EV/wnNK+6x2cCmxLhCpZOYToq+Wxq/DKNc4C3L7qly+ fhI8MT7TLwEmLfVel4vhk+bByJHsNON9hYijHc0KcPPqXATGQSLf9YoRmliXcx9YRR oivPpGExOwk4+cP7XL0CqUsb79xq3JJWVNPjSh1QfpUw3VYwjGs1xHCq+yzm29xXUp oYbgnAQfcN6pBO1CWZepGdKrAQLQXTBlhGAkzpNr315v/KjAOdyQHoNE2kUQ+wE2pw ADlyQrF79KqzyPbtnlc7pwp+RjhGVit/JxSOSux+tEWPbD2z7QxbtkmP+kd/l6SJcw Q2JPLlNI3x9og== To: "David S. Miller" , Jakub Kicinski From: Alexander Lobakin Cc: Alexey Kuznetsov , Hideaki YOSHIFUJI , Paolo Abeni , Willem de Bruijn , Steffen Klassert , Alexander Lobakin , netdev@vger.kernel.org, linux-kernel@vger.kernel.org Reply-To: Alexander Lobakin Subject: [PATCH v3 net] net: udp: fix Fast/frag0 UDP GRO Message-ID: MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-1.2 required=10.0 tests=ALL_TRUSTED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF shortcircuit=no autolearn=disabled version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mailout.protonmail.ch Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org While testing UDP GSO fraglists forwarding through driver that uses Fast GRO (via napi_gro_frags()), I was observing lots of out-of-order iperf packets: [ ID] Interval Transfer Bitrate Jitter [SUM] 0.0-40.0 sec 12106 datagrams received out-of-order Simple switch to napi_gro_receive() any other method without frag0 shortcut completely resolved them. I've found that UDP GRO uses udp_hdr(skb) in its .gro_receive() callback. While it's probably OK for non-frag0 paths (when all headers or even the entire frame are already in skb->data), this inline points to junk when using Fast GRO (napi_gro_frags() or napi_gro_receive() with only Ethernet header in skb->data and all the rest in shinfo->frags) and breaks GRO packet compilation and the packet flow itself. To support both modes, skb_gro_header_fast() + skb_gro_header_slow() are typically used. UDP even has an inline helper that makes use of them, udp_gro_udphdr(). Use that instead of troublemaking udp_hdr() to get rid of the out-of-order delivers. Present since the introduction of plain UDP GRO in 5.0-rc1. Since v2 [1]: - dropped redundant check introduced in v2 as it's performed right before (thanks to Eric); - udp_hdr() switched to data + off for skbs from list (also Eric); - fixed possible malfunction of {,__}udp{4,6}_lib_lookup_skb() with Fast/frag0 due to ip{,v6}_hdr() usage (Willem). Since v1 [2]: - added a NULL pointer check for "uh" as suggested by Willem. [1] https://lore.kernel.org/netdev/0eaG8xtbtKY1dEKCTKUBubGiC9QawGgB3tVZtNqV= dY@cp4-web-030.plabs.ch [2] https://lore.kernel.org/netdev/YazU6GEzBdpyZMDMwJirxDX7B4sualpDG68ADZYv= JI@cp4-web-034.plabs.ch Fixes: e20cf8d3f1f7 ("udp: implement GRO for plain UDP sockets.") Signed-off-by: Alexander Lobakin --- net/ipv4/udp.c | 4 ++-- net/ipv4/udp_offload.c | 9 ++++++--- net/ipv6/udp.c | 4 ++-- 3 files changed, 10 insertions(+), 7 deletions(-) diff --git a/net/ipv4/udp.c b/net/ipv4/udp.c index 09f0a23d1a01..948ddc9a0212 100644 --- a/net/ipv4/udp.c +++ b/net/ipv4/udp.c @@ -534,7 +534,7 @@ static inline struct sock *__udp4_lib_lookup_skb(struct= sk_buff *skb, =09=09=09=09=09=09 __be16 sport, __be16 dport, =09=09=09=09=09=09 struct udp_table *udptable) { -=09const struct iphdr *iph =3D ip_hdr(skb); +=09const struct iphdr *iph =3D skb_gro_network_header(skb); =20 =09return __udp4_lib_lookup(dev_net(skb->dev), iph->saddr, sport, =09=09=09=09 iph->daddr, dport, inet_iif(skb), @@ -544,7 +544,7 @@ static inline struct sock *__udp4_lib_lookup_skb(struct= sk_buff *skb, struct sock *udp4_lib_lookup_skb(struct sk_buff *skb, =09=09=09=09 __be16 sport, __be16 dport) { -=09const struct iphdr *iph =3D ip_hdr(skb); +=09const struct iphdr *iph =3D skb_gro_network_header(skb); =20 =09return __udp4_lib_lookup(dev_net(skb->dev), iph->saddr, sport, =09=09=09=09 iph->daddr, dport, inet_iif(skb), diff --git a/net/ipv4/udp_offload.c b/net/ipv4/udp_offload.c index e67a66fbf27b..dbc4d17c55e9 100644 --- a/net/ipv4/udp_offload.c +++ b/net/ipv4/udp_offload.c @@ -366,11 +366,11 @@ static struct sk_buff *udp4_ufo_fragment(struct sk_bu= ff *skb, static struct sk_buff *udp_gro_receive_segment(struct list_head *head, =09=09=09=09=09 struct sk_buff *skb) { -=09struct udphdr *uh =3D udp_hdr(skb); +=09struct udphdr *uh =3D udp_gro_udphdr(skb); =09struct sk_buff *pp =3D NULL; =09struct udphdr *uh2; =09struct sk_buff *p; -=09unsigned int ulen; +=09u32 ulen, off; =09int ret =3D 0; =20 =09/* requires non zero csum, for symmetry with GSO */ @@ -385,6 +385,9 @@ static struct sk_buff *udp_gro_receive_segment(struct l= ist_head *head, =09=09NAPI_GRO_CB(skb)->flush =3D 1; =09=09return NULL; =09} + +=09off =3D skb_gro_offset(skb); + =09/* pull encapsulating udp header */ =09skb_gro_pull(skb, sizeof(struct udphdr)); =20 @@ -392,7 +395,7 @@ static struct sk_buff *udp_gro_receive_segment(struct l= ist_head *head, =09=09if (!NAPI_GRO_CB(p)->same_flow) =09=09=09continue; =20 -=09=09uh2 =3D udp_hdr(p); +=09=09uh2 =3D (void *)p->data + off; =20 =09=09/* Match ports only, as csum is always non zero */ =09=09if ((*(u32 *)&uh->source !=3D *(u32 *)&uh2->source)) { diff --git a/net/ipv6/udp.c b/net/ipv6/udp.c index 29d9691359b9..a256ecce76b2 100644 --- a/net/ipv6/udp.c +++ b/net/ipv6/udp.c @@ -269,7 +269,7 @@ static struct sock *__udp6_lib_lookup_skb(struct sk_buf= f *skb, =09=09=09=09=09 __be16 sport, __be16 dport, =09=09=09=09=09 struct udp_table *udptable) { -=09const struct ipv6hdr *iph =3D ipv6_hdr(skb); +=09const struct ipv6hdr *iph =3D skb_gro_network_header(skb); =20 =09return __udp6_lib_lookup(dev_net(skb->dev), &iph->saddr, sport, =09=09=09=09 &iph->daddr, dport, inet6_iif(skb), @@ -279,7 +279,7 @@ static struct sock *__udp6_lib_lookup_skb(struct sk_buf= f *skb, struct sock *udp6_lib_lookup_skb(struct sk_buff *skb, =09=09=09=09 __be16 sport, __be16 dport) { -=09const struct ipv6hdr *iph =3D ipv6_hdr(skb); +=09const struct ipv6hdr *iph =3D skb_gro_network_header(skb); =20 =09return __udp6_lib_lookup(dev_net(skb->dev), &iph->saddr, sport, =09=09=09=09 &iph->daddr, dport, inet6_iif(skb), --=20 2.29.2