From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1754496AbcHWTBm (ORCPT ); Tue, 23 Aug 2016 15:01:42 -0400 Received: from mx1.redhat.com ([209.132.183.28]:34406 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752958AbcHWTBi (ORCPT ); Tue, 23 Aug 2016 15:01:38 -0400 From: Vitaly Kuznetsov To: David Vrabel Cc: , Juergen Gross , Patrick Talbert , , , Boris Ostrovsky Subject: Re: [Xen-devel] [PATCH net-next] xen-netfront: avoid packet loss when ethernet header crosses page boundary References: <1471880577-21380-1-git-send-email-vkuznets@redhat.com> <57BB2E7B.5040303@citrix.com> Date: Tue, 23 Aug 2016 20:51:44 +0200 In-Reply-To: <57BB2E7B.5040303@citrix.com> (David Vrabel's message of "Mon, 22 Aug 2016 17:55:23 +0100") Message-ID: <87twebb9of.fsf@vitty.brq.redhat.com> User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/25.0.95 (gnu/linux) MIME-Version: 1.0 Content-Type: text/plain X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.39]); Tue, 23 Aug 2016 18:51:54 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org David Vrabel writes: > On 22/08/16 16:42, Vitaly Kuznetsov wrote: >> >> I see two ways to fix the issue: >> - Change the 'wire' protocol between netfront and netback to start keeping >> the original SKB structure. We'll have to add a flag indicating the fact >> that the particular request is a part of the original linear part and not >> a frag. We'll need to know the length of the linear part to pre-allocate >> memory. > > I don't think there needs to be a protocol change. I think the check in > netback is bogus -- it's the total packet length that must be > > HLEN_ETH. The upper layers will pull any headers from the frags as > needed I'm afraid this is not always true, just removing the check leads us to the following: [ 495.442186] kernel BUG at ./include/linux/skbuff.h:1927! [ 495.468789] invalid opcode: 0000 [#1] SMP [ 495.490094] Modules linked in: tun loop bridge stp llc intel_rapl sb_edac edac_core x86_pkg_temp_thermal ipmi_ssif igb coretemp iTCO_wdt crct10dif_pclmul crc32_pclmul ptp ipmi_si iTCO_vendor_support ghash_clmulni_intel hpwdt ipmi_msghandler ioatdma hpilo pps_core lpc_ich acpi_power_meter wmi fjes tpm_tis dca shpchp tpm_tis_core tpm nfsd auth_rpcgss nfs_acl lockd xenfs grace xen_privcmd sunrpc xfs libcrc32c mgag200 i2c_algo_bit drm_kms_helper ttm drm crc32c_intel serio_raw xen_scsiback target_core_mod xen_pciback xen_netback xen_blkback xen_gntalloc xen_gntdev xen_evtchn [ 495.749431] CPU: 0 PID: 0 Comm: swapper/0 Not tainted 4.8.0-rc3+ #2 [ 495.782648] Hardware name: HP ProLiant DL380e Gen8, BIOS P73 08/20/2012 [ 495.817578] task: ffffffff81c0d500 task.stack: ffffffff81c00000 [ 495.847805] RIP: e030:[] [] eth_type_trans+0xf0/0x130 [ 495.888942] RSP: e02b:ffff880429203d70 EFLAGS: 00010297 [ 495.916005] RAX: 0000000000000014 RBX: ffff88041f7bf200 RCX: 0000000000000000 [ 495.952133] RDX: ffff88041ed76c40 RSI: ffff88041ad6b000 RDI: ffff88041f7bf200 [ 495.988919] RBP: ffff880429203d80 R08: 0000000000000000 R09: ffff88041ed76cf0 [ 496.025782] R10: 0000160000000000 R11: ffffc900041aa2f8 R12: 000000000000000a [ 496.061351] R13: ffffc900041b0200 R14: 000000000000000b R15: ffffc900041aa2a0 [ 496.098178] FS: 00007fa2b9442880(0000) GS:ffff880429200000(0000) knlGS:0000000000000000 [ 496.139767] CS: e033 DS: 0000 ES: 0000 CR0: 0000000080050033 [ 496.169105] CR2: 00005558e4d43ea0 CR3: 000000042024e000 CR4: 0000000000042660 [ 496.206816] Stack: [ 496.216904] 000000000000000b 51859c5d87cdd22f ffff880429203e68 ffffffffc002dd59 [ 496.254093] ffffffff8155eed0 51859c5d87cdd22f ffff88041a450000 0000000a22d66f70 [ 496.292351] ffff88041a450000 ffffc900041ad9e0 ffffc900041aa3c0 ffff88041f7bf200 [ 496.330823] Call Trace: [ 496.343397] [ 496.352992] [] xenvif_tx_action+0x569/0x8b0 [xen_netback] [ 496.389933] [] ? scsi_put_command+0x80/0xd0 [ 496.418810] [] ? __napi_schedule+0x47/0x50 [ 496.449097] [] ? xenvif_tx_interrupt+0x50/0x60 [xen_netback] [ 496.485804] [] ? __handle_irq_event_percpu+0x8d/0x190 ... -- Vitaly From mboxrd@z Thu Jan 1 00:00:00 1970 From: Vitaly Kuznetsov Subject: Re: [PATCH net-next] xen-netfront: avoid packet loss when ethernet header crosses page boundary Date: Tue, 23 Aug 2016 20:51:44 +0200 Message-ID: <87twebb9of.fsf@vitty.brq.redhat.com> References: <1471880577-21380-1-git-send-email-vkuznets@redhat.com> <57BB2E7B.5040303@citrix.com> Mime-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: base64 Cc: Juergen Gross , Patrick Talbert , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, xen-devel@lists.xenproject.org, Boris Ostrovsky To: David Vrabel Return-path: In-Reply-To: <57BB2E7B.5040303@citrix.com> (David Vrabel's message of "Mon, 22 Aug 2016 17:55:23 +0100") List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Errors-To: xen-devel-bounces@lists.xen.org Sender: "Xen-devel" List-Id: netdev.vger.kernel.org RGF2aWQgVnJhYmVsIDxkYXZpZC52cmFiZWxAY2l0cml4LmNvbT4gd3JpdGVzOgoKPiBPbiAyMi8w OC8xNiAxNjo0MiwgVml0YWx5IEt1em5ldHNvdiB3cm90ZToKPj4gCj4+IEkgc2VlIHR3byB3YXlz IHRvIGZpeCB0aGUgaXNzdWU6Cj4+IC0gQ2hhbmdlIHRoZSAnd2lyZScgcHJvdG9jb2wgYmV0d2Vl biBuZXRmcm9udCBhbmQgbmV0YmFjayB0byBzdGFydCBrZWVwaW5nCj4+ICAgdGhlIG9yaWdpbmFs IFNLQiBzdHJ1Y3R1cmUuIFdlJ2xsIGhhdmUgdG8gYWRkIGEgZmxhZyBpbmRpY2F0aW5nIHRoZSBm YWN0Cj4+ICAgdGhhdCB0aGUgcGFydGljdWxhciByZXF1ZXN0IGlzIGEgcGFydCBvZiB0aGUgb3Jp Z2luYWwgbGluZWFyIHBhcnQgYW5kIG5vdAo+PiAgIGEgZnJhZy4gV2UnbGwgbmVlZCB0byBrbm93 IHRoZSBsZW5ndGggb2YgdGhlIGxpbmVhciBwYXJ0IHRvIHByZS1hbGxvY2F0ZQo+PiAgIG1lbW9y eS4KPgo+IEkgZG9uJ3QgdGhpbmsgdGhlcmUgbmVlZHMgdG8gYmUgYSBwcm90b2NvbCBjaGFuZ2Uu ICBJIHRoaW5rIHRoZSBjaGVjayBpbgo+IG5ldGJhY2sgaXMgYm9ndXMgLS0gaXQncyB0aGUgdG90 YWwgcGFja2V0IGxlbmd0aCB0aGF0IG11c3QgYmUgPgo+IEhMRU5fRVRILiAgVGhlIHVwcGVyIGxh eWVycyB3aWxsIHB1bGwgYW55IGhlYWRlcnMgZnJvbSB0aGUgZnJhZ3MgYXMKPiBuZWVkZWQKCkkn bSBhZnJhaWQgdGhpcyBpcyBub3QgYWx3YXlzIHRydWUsIGp1c3QgcmVtb3ZpbmcgdGhlIGNoZWNr IGxlYWRzIHVzIHRvCnRoZSBmb2xsb3dpbmc6CgpbICA0OTUuNDQyMTg2XSBrZXJuZWwgQlVHIGF0 IC4vaW5jbHVkZS9saW51eC9za2J1ZmYuaDoxOTI3ISAKWyAgNDk1LjQ2ODc4OV0gaW52YWxpZCBv cGNvZGU6IDAwMDAgWyMxXSBTTVAgClsgIDQ5NS40OTAwOTRdIE1vZHVsZXMgbGlua2VkIGluOiB0 dW4gbG9vcCBicmlkZ2Ugc3RwIGxsYyBpbnRlbF9yYXBsIHNiX2VkYWMgZWRhY19jb3JlIHg4Nl9w a2dfdGVtcF90aGVybWFsIGlwbWlfc3NpZiBpZ2IgY29yZXRlbXAgaVRDT193ZHQgY3JjdDEwZGlm X3BjbG11bCBjcmMzMl9wY2xtdWwgcHRwIGlwbWlfc2kgaVRDT192ZW5kb3Jfc3VwcG9ydCBnaGFz aF9jbG11bG5pX2ludGVsIGhwd2R0IGlwbWlfbXNnaGFuZGxlciBpb2F0ZG1hIGhwaWxvIHBwc19j b3JlIGxwY19pY2ggYWNwaV9wb3dlcl9tZXRlciB3bWkgZmplcyB0cG1fdGlzIGRjYSBzaHBjaHAg dHBtX3Rpc19jb3JlIHRwbSBuZnNkIGF1dGhfcnBjZ3NzIG5mc19hY2wgbG9ja2QgeGVuZnMgZ3Jh Y2UgeGVuX3ByaXZjbWQgc3VucnBjIHhmcyBsaWJjcmMzMmMgbWdhZzIwMCBpMmNfYWxnb19iaXQg ZHJtX2ttc19oZWxwZXIgdHRtIGRybSBjcmMzMmNfaW50ZWwgc2VyaW9fcmF3IHhlbl9zY3NpYmFj ayB0YXJnZXRfY29yZV9tb2QgeGVuX3BjaWJhY2sgeGVuX25ldGJhY2sgeGVuX2Jsa2JhY2sgeGVu X2dudGFsbG9jIHhlbl9nbnRkZXYgeGVuX2V2dGNobiAKWyAgNDk1Ljc0OTQzMV0gQ1BVOiAwIFBJ RDogMCBDb21tOiBzd2FwcGVyLzAgTm90IHRhaW50ZWQgNC44LjAtcmMzKyAjMiAKWyAgNDk1Ljc4 MjY0OF0gSGFyZHdhcmUgbmFtZTogSFAgUHJvTGlhbnQgREwzODBlIEdlbjgsIEJJT1MgUDczIDA4 LzIwLzIwMTIgClsgIDQ5NS44MTc1NzhdIHRhc2s6IGZmZmZmZmZmODFjMGQ1MDAgdGFzay5zdGFj azogZmZmZmZmZmY4MWMwMDAwMCAKWyAgNDk1Ljg0NzgwNV0gUklQOiBlMDMwOls8ZmZmZmZmZmY4 MTZmNjhhMD5dICBbPGZmZmZmZmZmODE2ZjY4YTA+XSBldGhfdHlwZV90cmFucysweGYwLzB4MTMw IApbICA0OTUuODg4OTQyXSBSU1A6IGUwMmI6ZmZmZjg4MDQyOTIwM2Q3MCAgRUZMQUdTOiAwMDAx MDI5NyAKWyAgNDk1LjkxNjAwNV0gUkFYOiAwMDAwMDAwMDAwMDAwMDE0IFJCWDogZmZmZjg4MDQx ZjdiZjIwMCBSQ1g6IDAwMDAwMDAwMDAwMDAwMDAgClsgIDQ5NS45NTIxMzNdIFJEWDogZmZmZjg4 MDQxZWQ3NmM0MCBSU0k6IGZmZmY4ODA0MWFkNmIwMDAgUkRJOiBmZmZmODgwNDFmN2JmMjAwIApb ICA0OTUuOTg4OTE5XSBSQlA6IGZmZmY4ODA0MjkyMDNkODAgUjA4OiAwMDAwMDAwMDAwMDAwMDAw IFIwOTogZmZmZjg4MDQxZWQ3NmNmMCAKWyAgNDk2LjAyNTc4Ml0gUjEwOiAwMDAwMTYwMDAwMDAw MDAwIFIxMTogZmZmZmM5MDAwNDFhYTJmOCBSMTI6IDAwMDAwMDAwMDAwMDAwMGEgClsgIDQ5Ni4w NjEzNTFdIFIxMzogZmZmZmM5MDAwNDFiMDIwMCBSMTQ6IDAwMDAwMDAwMDAwMDAwMGIgUjE1OiBm ZmZmYzkwMDA0MWFhMmEwIApbICA0OTYuMDk4MTc4XSBGUzogIDAwMDA3ZmEyYjk0NDI4ODAoMDAw MCkgR1M6ZmZmZjg4MDQyOTIwMDAwMCgwMDAwKSBrbmxHUzowMDAwMDAwMDAwMDAwMDAwIApbICA0 OTYuMTM5NzY3XSBDUzogIGUwMzMgRFM6IDAwMDAgRVM6IDAwMDAgQ1IwOiAwMDAwMDAwMDgwMDUw MDMzIApbICA0OTYuMTY5MTA1XSBDUjI6IDAwMDA1NTU4ZTRkNDNlYTAgQ1IzOiAwMDAwMDAwNDIw MjRlMDAwIENSNDogMDAwMDAwMDAwMDA0MjY2MCAKWyAgNDk2LjIwNjgxNl0gU3RhY2s6IApbICA0 OTYuMjE2OTA0XSAgMDAwMDAwMDAwMDAwMDAwYiA1MTg1OWM1ZDg3Y2RkMjJmIGZmZmY4ODA0Mjky MDNlNjggZmZmZmZmZmZjMDAyZGQ1OSAKWyAgNDk2LjI1NDA5M10gIGZmZmZmZmZmODE1NWVlZDAg NTE4NTljNWQ4N2NkZDIyZiBmZmZmODgwNDFhNDUwMDAwIDAwMDAwMDBhMjJkNjZmNzAgClsgIDQ5 Ni4yOTIzNTFdICBmZmZmODgwNDFhNDUwMDAwIGZmZmZjOTAwMDQxYWQ5ZTAgZmZmZmM5MDAwNDFh YTNjMCBmZmZmODgwNDFmN2JmMjAwIApbICA0OTYuMzMwODIzXSBDYWxsIFRyYWNlOiAKWyAgNDk2 LjM0MzM5N10gIDxJUlE+ICAKWyAgNDk2LjM1Mjk5Ml0gIFs8ZmZmZmZmZmZjMDAyZGQ1OT5dIHhl bnZpZl90eF9hY3Rpb24rMHg1NjkvMHg4YjAgW3hlbl9uZXRiYWNrXSAKWyAgNDk2LjM4OTkzM10g IFs8ZmZmZmZmZmY4MTU1ZWVkMD5dID8gc2NzaV9wdXRfY29tbWFuZCsweDgwLzB4ZDAgClsgIDQ5 Ni40MTg4MTBdICBbPGZmZmZmZmZmODE2Y2NjMDc+XSA/IF9fbmFwaV9zY2hlZHVsZSsweDQ3LzB4 NTAgClsgIDQ5Ni40NDkwOTddICBbPGZmZmZmZmZmYzAwMzExZjA+XSA/IHhlbnZpZl90eF9pbnRl cnJ1cHQrMHg1MC8weDYwIFt4ZW5fbmV0YmFja10gClsgIDQ5Ni40ODU4MDRdICBbPGZmZmZmZmZm ODExMDFiZWQ+XSA/IF9faGFuZGxlX2lycV9ldmVudF9wZXJjcHUrMHg4ZC8weDE5MCAKLi4uCgot LSAKICBWaXRhbHkKCl9fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19fX19f X19fClhlbi1kZXZlbCBtYWlsaW5nIGxpc3QKWGVuLWRldmVsQGxpc3RzLnhlbi5vcmcKaHR0cHM6 Ly9saXN0cy54ZW4ub3JnL3hlbi1kZXZlbAo=