Received: by 2002:a05:6a10:17d3:0:0:0:0 with SMTP id hz19csp2714270pxb; Tue, 13 Apr 2021 08:28:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJy/eT4tlz3jO0HaL/n1rgkdFRdv3WoszhpTS/LvyQDAA8fTomLXJYv2ADrKdCSqbtnzzIPN X-Received: by 2002:a17:906:c010:: with SMTP id e16mr33074367ejz.214.1618327723730; Tue, 13 Apr 2021 08:28:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1618327723; cv=none; d=google.com; s=arc-20160816; b=kgiN7sZyOj8RG5ZId2dmpvyj7rEwAzhijnvm75Rdoqh8gtB/9yYoh3UgYAatO60JDT YQQB/zhG2p7GZoJVdh5ZGma+RhKIrrC7JovHVESL/yjHkso+uHBD03i5SNiE7HbY4JKU V/I6x17AA0c4L5Nz1+azDEa5ADKcPGVGMbOF/0yS3op5N/fC0Vsw3b/2D5D1tMcILKP9 6NP5Eweg5RxpMygow7ke93DUvGh1AbO4tGwctCVfnDN/QakLk2TA5RyedeV+rLyYjiDu Ksop+A97cRMbYopcgVVMBvyCIV6kKQ3Dg6ZlymGnLGbyYjO5eUXnkna+dhkgkGZwX44x CCSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:subject:message-id:date:from:in-reply-to :references:mime-version:dkim-signature; bh=/mG+7TE16wzw/LGXUKa6TF83xtW+W10dYBi8pyRFa14=; b=wZmxLNuiroKT/Y41Bi3qZV/25cnJRvWRAzRa3uOMMX0+lpiVY3wuJrjiBDJ1Z2pasf I1m+yVJdnMorWfa3yWsVutkbBq9IWvvSHK7AvZCXytzbNbvm4t6STRDNWdkOpDPLJDPy fIxg3YpVqWxKJDPV/U0VAjPRDtxQR32PBJoIJLLG3/CdzLuO2RUZTM32KTfxlfyUg35k HmbucllJTdrKpuGi6vnFOmfritgGy1nQnp24aoylrce5L4ntfi9uQxV0KutlaOYRG5vK noAfN92AGeBVHUf6tZSytgEjYOiSycIR2Tk/kYDd0SBMpoH1uDdf51oUexBmFnZWQvKO gm+w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=OLTBZP0b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id h16si10639478ede.206.2021.04.13.08.28.19; Tue, 13 Apr 2021 08:28:43 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=OLTBZP0b; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S243793AbhDMNeV (ORCPT + 99 others); Tue, 13 Apr 2021 09:34:21 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:47004 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S239771AbhDMNeM (ORCPT ); Tue, 13 Apr 2021 09:34:12 -0400 Received: from mail-yb1-xb35.google.com (mail-yb1-xb35.google.com [IPv6:2607:f8b0:4864:20::b35]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id CED35C061756 for ; Tue, 13 Apr 2021 06:33:52 -0700 (PDT) Received: by mail-yb1-xb35.google.com with SMTP id x8so13000604ybx.2 for ; Tue, 13 Apr 2021 06:33:52 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=/mG+7TE16wzw/LGXUKa6TF83xtW+W10dYBi8pyRFa14=; b=OLTBZP0bcHIYA1nkyTqCRAIuZVEnm4coraIOfgxBfh4T1U1N2PkRjWVQp+2VHcR2q8 o2cTUSinxfLr9SiIURiqhAvFLW4S6cp1sLyAz3k+WteVb9i6e9I0NY9W2nj+IGx4YvEf XhJ6fQg6AQn49w4tB61crL797RMM6oV0/eVjzEHUG5yZPeBhFX4tt2J8EL+UfZFc53VR JtqR3i0/EqEwUZkXVMQTR4ra1qzmEcjn+/B+WVgtJonHPuaz34K8zwnrDzyntC3zrbDT j7CmUNa1bQOzwjfN1APM5kcqBvHMltadOJN0GJy9BGDUhU9j2gYwJ00uPaQe9QzJ5VkR OrVA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=/mG+7TE16wzw/LGXUKa6TF83xtW+W10dYBi8pyRFa14=; b=dsa/8+z3tAOb69YV2MQx+gihgfN+ny04zlY5kDEkzhps7RdvVV7r4O9UGCPimqwECm tDhvJTYqGsaAZDR2aa7fg3pRqZbD3Joi7NtJjh2nWSAYEJ5n9swLzlcPz7UqKIkT9Jzt NLnM/M+T4Vq7/yDGPzCVbnJApxVZBncY3HUujAyt6peFgTVgO45XPkPVF/ln7k1zNwHH uU5hbf4jGxWH9V90qnBm3D747mt32XXfoshePFx6aYcau5utT4x7LRwDV5qE6DpCMDF8 QYtCo5VBm2HEwmtulIsxai7yWd6aSBXgvWlCqfXnClOpeZDpbnsAhEfvoTNdS32JK1Kn /p6A== X-Gm-Message-State: AOAM532evp5VYaEV7kg5PQ0hKc+mf1hUiS4mMpnCniHh8DGh8e99ycwK UPuce0lkMpPs/7/lpu/lL+QdnIXFb22FFpt/mt888g== X-Received: by 2002:a25:850b:: with SMTP id w11mr45509205ybk.518.1618320831671; Tue, 13 Apr 2021 06:33:51 -0700 (PDT) MIME-Version: 1.0 References: <20210412051445.GA47322@roeck-us.net> <20210413085538-mutt-send-email-mst@kernel.org> In-Reply-To: From: Eric Dumazet Date: Tue, 13 Apr 2021 15:33:40 +0200 Message-ID: Subject: Re: Linux 5.12-rc7 To: "Michael S. Tsirkin" Cc: Linus Torvalds , Guenter Roeck , Xuan Zhuo , Linux Kernel Mailing List , Netdev Content-Type: text/plain; charset="UTF-8" Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 13, 2021 at 3:27 PM Eric Dumazet wrote: > > On Tue, Apr 13, 2021 at 2:57 PM Michael S. Tsirkin wrote: > > > > On Mon, Apr 12, 2021 at 06:47:07PM +0200, Eric Dumazet wrote: > > > On Mon, Apr 12, 2021 at 6:31 PM Eric Dumazet wrote: > > > > > > > > On Mon, Apr 12, 2021 at 6:28 PM Linus Torvalds > > > > wrote: > > > > > > > > > > On Sun, Apr 11, 2021 at 10:14 PM Guenter Roeck wrote: > > > > > > > > > > > > Qemu test results: > > > > > > total: 460 pass: 459 fail: 1 > > > > > > Failed tests: > > > > > > sh:rts7751r2dplus_defconfig:ata:net,virtio-net:rootfs > > > > > > > > > > > > The failure bisects to commit 0f6925b3e8da ("virtio_net: Do not pull payload in > > > > > > skb->head"). It is a spurious problem - the test passes roughly every other > > > > > > time. When the failure is seen, udhcpc fails to get an IP address and aborts > > > > > > with SIGTERM. So far I have only seen this with the "sh" architecture. > > > > > > > > > > Hmm. Let's add in some more of the people involved in that commit, and > > > > > also netdev. > > > > > > > > > > Nothing in there looks like it should have any interaction with > > > > > architecture, so that "it happens on sh" sounds odd, but maybe it's > > > > > some particular interaction with the qemu environment. > > > > > > > > Yes, maybe. > > > > > > > > I spent few hours on this, and suspect a buggy memcpy() implementation > > > > on SH, but this was not conclusive. > > > > > > > > By pulling one extra byte, the problem goes away. > > > > > > > > Strange thing is that the udhcpc process does not go past sendto(). > > > > > > This is the patch working around the issue. Unfortunately I was not > > > able to root-cause it (I really suspect something on SH) > > > > > > diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c > > > index 0824e6999e49957f7aaf7c990f6259792d42f32b..fd890a951beea03bdf24406809042666eb972655 > > > 100644 > > > --- a/drivers/net/virtio_net.c > > > +++ b/drivers/net/virtio_net.c > > > @@ -408,11 +408,17 @@ static struct sk_buff *page_to_skb(struct > > > virtnet_info *vi, > > > > > > /* Copy all frame if it fits skb->head, otherwise > > > * we let virtio_net_hdr_to_skb() and GRO pull headers as needed. > > > + * > > > + * Apparently, pulling only the Ethernet Header triggers a bug > > > on qemu-system-sh4. > > > + * Since GRO aggregation really cares of IPv4/IPv6, pull 20 bytes > > > + * more to work around this bug : These 20 bytes can not belong > > > + * to UDP/TCP payload. > > > + * As a bonus, this makes GRO slightly faster for IPv4 (one less copy). > > > */ > > > > Question: do we still want to do this for performance reasons? > > We also have the hdr_len coming from the device which is > > just skb_headlen on the host. > > Well, putting 20 bytes in skb->head will disable frag0 optimization. > > The change would only benefit to sh architecture :) > > About hdr_len, I suppose we could try it, with appropriate safety checks. I have added traces, hdr_len seems to be 0 with the qemu-system-sh4 I am using. Have I understood you correctly ? diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c index 0824e6999e49957f7aaf7c990f6259792d42f32b..f024860f7dc260d4efbc35a3b8ffd358bd0da894 100644 --- a/drivers/net/virtio_net.c +++ b/drivers/net/virtio_net.c @@ -399,9 +399,10 @@ static struct sk_buff *page_to_skb(struct virtnet_info *vi, hdr_padded_len = sizeof(struct padded_vnet_hdr); /* hdr_valid means no XDP, so we can copy the vnet header */ - if (hdr_valid) + if (hdr_valid) { memcpy(hdr, p, hdr_len); - + pr_err("hdr->hdr_len=%u\n", hdr->hdr.hdr_len); + } len -= hdr_len; offset += hdr_padded_len; p += hdr_padded_len;