Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp3234304rwb; Mon, 15 Aug 2022 21:53:34 -0700 (PDT) X-Google-Smtp-Source: AA6agR6k26NeShizQ1hR9alkVQeT/oTiROvUKzMrqJxg8gRsAkdtO9nUHYaydnKBp5cicBR0Mjaz X-Received: by 2002:a17:907:12d7:b0:730:6d62:4ef7 with SMTP id vp23-20020a17090712d700b007306d624ef7mr11854037ejb.133.1660625614329; Mon, 15 Aug 2022 21:53:34 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660625614; cv=none; d=google.com; s=arc-20160816; b=XrYRfT/Z7Frza9w/UIVa6eYa5r2NyqXTcPTPDI8gTRTmXjlMBK8VIux2NYTrTpdJsL anIEIhLR6RJNNt1qL+cNkUZIWlSmtek4DSDA1mrLw+pDjdwAJf4Q2GQOAL9YOGXivdrR cmufEwnMMDOEtNI6KpTJz1jhm3wAGRI9CoeNmLNvY6ATi1Z4rUquC60UFhSOZl4Fng/y a6Fme6tTCZP1JUkPvdE2lbh6z6QLmypWhLPrKilKLalfX44N1XAfYrzMSUpYcwzEKsfD 8PZQsyTslI0cIlUMiOH7nzh3yTrK49zFEWsuWeWcDkuqc0RkcNJpgp0JDeUcjrXwOYgF CjaQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=i1RagYWszqaSjhWpfjC6egbrOKZNG+z96AnlUoGxM5s=; b=sHr0UutJBFZIWKDx0brGcGb+LDBcXHRxAM2mUtmP6kH90vQ9wrtySnj3sYmkpAHhU2 X2dkG2GZzP2UQMyL2XpbyWgGdBEW+iPt9HvHERYaEix2TcxBPk39W1HyN3pYVVBpCAPY homNxHkyvdV48eWwh0I4CDI9xNoDbDeGRpgoLNSjuZTCHn7mt0lRU8AxTV8dp66qeAFw BEP3nZj+Co+jdsX4g1T1iH8LB0gsqQLMdWEui+zvUU2b+oyHoa3uRa7kzZOtucs1MPuU f25tX12IAnD61ZTyjsezk3I30UXIBYEDrL+dDj4QQZ8pcmy4GY8MoTIPJK16G/FCnU7d nlTw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=dN2PJoGY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id e19-20020a056402191300b0043dcf90c94asi10689428edz.67.2022.08.15.21.53.07; Mon, 15 Aug 2022 21:53:34 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=dN2PJoGY; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232864AbiHPEuA (ORCPT + 99 others); Tue, 16 Aug 2022 00:50:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:56790 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232977AbiHPEqS (ORCPT ); Tue, 16 Aug 2022 00:46:18 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 8EDE231B for ; Mon, 15 Aug 2022 13:42:59 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1660596178; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=i1RagYWszqaSjhWpfjC6egbrOKZNG+z96AnlUoGxM5s=; b=dN2PJoGYkdzx9mAvyQrurZkM73ICl+cDptkoovnBZkNzu4EwXyXq+ZYIk3BZQjBT876O1C Vl5aed/yF8m0FT9Do8F85s44MzKqhnrH3ZacIQzDC8Herh+pd4UUhRwcRnE9MHBrFxLe46 FPSFO97wXfowH/dWyQQXNob7N5iA4/c= Received: from mail-ed1-f71.google.com (mail-ed1-f71.google.com [209.85.208.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-35-et5PrJHbNrewJIJM2py1-Q-1; Mon, 15 Aug 2022 16:42:57 -0400 X-MC-Unique: et5PrJHbNrewJIJM2py1-Q-1 Received: by mail-ed1-f71.google.com with SMTP id z6-20020a05640240c600b0043e1d52fd98so5480009edb.22 for ; Mon, 15 Aug 2022 13:42:57 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc; bh=i1RagYWszqaSjhWpfjC6egbrOKZNG+z96AnlUoGxM5s=; b=T/ndligsvoz9CJVe/G5lE6EvwhTGW4wzBvm63AZ6PH9s2kYtwDKKsGT581MoxDys9v fEWAvSszTLWa2AB6OaV8Rritt1nxQqBishROJB4HNx0y+VYe/0hS4dXhmG3Kf2DZSJco QkYTofy5zjEXdaU7MzAv3wCoRUoURu6uQRAxhj7UhmyYE05Jxq6fMuB1HDe3clKb5ZM6 Rge1H0G8UNmxI1Ai2T4yeNunijlrEwAtzBBRe3LoTJMvjVIRUqqoednDh5ZekftS4Q7v o0eVlwu6JxpKGwrOmr6RPQAUk3efyfKShzP3VJdR/Cndl5lb0coyrvy5QVp4G65GTinp NUig== X-Gm-Message-State: ACgBeo14YUQ94wcTKhQq8zDb9AiGngvTncFFKDbAlYpEgTrtjNmVfJy5 kuTMbLoSd+32+/3uL9kwG6v6hlyi1zDhU5vi23X3KFQ8Wb2uRPfli1Se2tCZ4Owhw/LAnfe/KDI z69y0hW7jdr5qVJiIMYDp3WK9 X-Received: by 2002:aa7:cb83:0:b0:443:3f15:84fe with SMTP id r3-20020aa7cb83000000b004433f1584femr14740028edt.17.1660596176536; Mon, 15 Aug 2022 13:42:56 -0700 (PDT) X-Received: by 2002:aa7:cb83:0:b0:443:3f15:84fe with SMTP id r3-20020aa7cb83000000b004433f1584femr14740015edt.17.1660596176355; Mon, 15 Aug 2022 13:42:56 -0700 (PDT) Received: from redhat.com ([2.55.43.215]) by smtp.gmail.com with ESMTPSA id g1-20020a1709061e0100b00730a8190f54sm4421436ejj.102.2022.08.15.13.42.53 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 15 Aug 2022 13:42:55 -0700 (PDT) Date: Mon, 15 Aug 2022 16:42:51 -0400 From: "Michael S. Tsirkin" To: Guenter Roeck Cc: linux-kernel@vger.kernel.org, Xuan Zhuo , Jason Wang , Andres Freund , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , virtualization@lists.linux-foundation.org, netdev@vger.kernel.org, Linus Torvalds , Jens Axboe , James Bottomley , "Martin K. Petersen" , Greg KH , c@redhat.com Subject: Re: [PATCH] virtio_net: Revert "virtio_net: set the default max ring size by find_vqs()" Message-ID: <20220815164013-mutt-send-email-mst@kernel.org> References: <20220815090521.127607-1-mst@redhat.com> <20220815203426.GA509309@roeck-us.net> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20220815203426.GA509309@roeck-us.net> X-Spam-Status: No, score=-2.8 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_LOW, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Mon, Aug 15, 2022 at 01:34:26PM -0700, Guenter Roeck wrote: > On Mon, Aug 15, 2022 at 05:16:50AM -0400, Michael S. Tsirkin wrote: > > This reverts commit 762faee5a2678559d3dc09d95f8f2c54cd0466a7. > > > > This has been reported to trip up guests on GCP (Google Cloud). Why is > > not yet clear - to be debugged, but the patch itself has several other > > issues: > > > > - It treats unknown speed as < 10G > > - It leaves userspace no way to find out the ring size set by hypervisor > > - It tests speed when link is down > > - It ignores the virtio spec advice: > > Both \field{speed} and \field{duplex} can change, thus the driver > > is expected to re-read these values after receiving a > > configuration change notification. > > - It is not clear the performance impact has been tested properly > > > > Revert the patch for now. > > > > Link: https://lore.kernel.org/r/20220814212610.GA3690074%40roeck-us.net > > Link: https://lore.kernel.org/r/20220815070203.plwjx7b3cyugpdt7%40awork3.anarazel.de > > Link: https://lore.kernel.org/r/3df6bb82-1951-455d-a768-e9e1513eb667%40www.fastmail.com > > Link: https://lore.kernel.org/r/FCDC5DDE-3CDD-4B8A-916F-CA7D87B547CE%40anarazel.de > > Fixes: 762faee5a267 ("virtio_net: set the default max ring size by find_vqs()") > > Cc: Xuan Zhuo > > Cc: Jason Wang > > Signed-off-by: Michael S. Tsirkin > > Tested-by: Andres Freund > > I ran this patch through a total of 14 syskaller tests, 2 test runs each on > 7 different crashes reported by syzkaller (as reported to the linux-kernel > mailing list). No problems were reported. I also ran a single cross-check > with one of the syzkaller runs on top of v6.0-rc1, without this patch. > That test run failed. > > Overall, I think we can call this fixed. > > Guenter It's more of a work around though since we don't yet have the root cause for this. I suspect a GCP hypervisor bug at the moment. This is excercising a path we previously only took on GFP_KERNEL allocation failures during probe, I don't think that happens a lot. -- MST