* [dpdk-stable] [PATCH] nfp: handle packets with length 0 as usual ones @ 2017-08-11 10:05 Alejandro Lucero 2017-08-18 15:10 ` [dpdk-stable] [dpdk-dev] " Ferruh Yigit 0 siblings, 1 reply; 6+ messages in thread From: Alejandro Lucero @ 2017-08-11 10:05 UTC (permalink / raw) To: dev; +Cc: stable A DPDK app could, whatever the reason, send packets with size 0. The PMD is not sending those packets, which does make sense, but the problem is the mbuf is not released either. That leads to mbufs not being available, because the app trusts the PMD will do it. Although this is a problem related to app wrong behaviour, we should harden the PMD in this regard. Not sending a packet with size 0 could be problematic, needing special handling inside the PMD xmit function. It could be a burst of those packets, which can be easily handled, but it could also be a single packet in a burst, what is harder to handle. It would be simpler to just send that kind of packets, which will likely be dropped by the hw at some point. The main problem is how the fw/hw handles the DMA, because a dma read to a hypothetical 0x0 address could trigger an IOMMU error. It turns out, it is safe to send a descriptor with packet size 0 to the hardware: the DMA never happens, from the PCIe point of view. Signed-off-by: Alejandro Lucero <alejandro.lucero@netronome.com> --- drivers/net/nfp/nfp_net.c | 17 ++++++++++++----- 1 file changed, 12 insertions(+), 5 deletions(-) diff --git a/drivers/net/nfp/nfp_net.c b/drivers/net/nfp/nfp_net.c index 92b03c4..679a91b 100644 --- a/drivers/net/nfp/nfp_net.c +++ b/drivers/net/nfp/nfp_net.c @@ -2094,7 +2094,7 @@ uint32_t nfp_net_txq_full(struct nfp_net_txq *txq) */ pkt_size = pkt->pkt_len; - while (pkt_size) { + while (pkt) { /* Copying TSO, VLAN and cksum info */ *txds = txd; @@ -2126,17 +2126,24 @@ uint32_t nfp_net_txq_full(struct nfp_net_txq *txq) txq->wr_p = 0; pkt_size -= dma_size; - if (!pkt_size) { + if (!pkt_size) /* End of packet */ txds->offset_eop |= PCIE_DESC_TX_EOP; - } else { + else txds->offset_eop &= PCIE_DESC_TX_OFFSET_MASK; - pkt = pkt->next; - } + + pkt = pkt->next; /* Referencing next free TX descriptor */ txds = &txq->txds[txq->wr_p]; lmbuf = &txq->txbufs[txq->wr_p].mbuf; issued_descs++; + + /* Double-checking if we have to use chained mbuf. + * It seems there are some apps which could wrongly + * have zeroed mbufs chained leading to send null + * descriptors to the hw. */ + if (!pkt_size) + break; } i++; } -- 1.9.1 ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [dpdk-stable] [dpdk-dev] [PATCH] nfp: handle packets with length 0 as usual ones 2017-08-11 10:05 [dpdk-stable] [PATCH] nfp: handle packets with length 0 as usual ones Alejandro Lucero @ 2017-08-18 15:10 ` Ferruh Yigit 2017-08-18 16:23 ` Alejandro Lucero 0 siblings, 1 reply; 6+ messages in thread From: Ferruh Yigit @ 2017-08-18 15:10 UTC (permalink / raw) To: Alejandro Lucero, dev; +Cc: stable On 8/11/2017 11:05 AM, Alejandro Lucero wrote: > A DPDK app could, whatever the reason, send packets with size 0. > The PMD is not sending those packets, which does make sense, > but the problem is the mbuf is not released either. That leads > to mbufs not being available, because the app trusts the > PMD will do it. > > Although this is a problem related to app wrong behaviour, we > should harden the PMD in this regard. Not sending a packet with > size 0 could be problematic, needing special handling inside the > PMD xmit function. It could be a burst of those packets, which can > be easily handled, but it could also be a single packet in a burst, > what is harder to handle. > > It would be simpler to just send that kind of packets, which will > likely be dropped by the hw at some point. The main problem is how > the fw/hw handles the DMA, because a dma read to a hypothetical 0x0 > address could trigger an IOMMU error. It turns out, it is safe to > send a descriptor with packet size 0 to the hardware: the DMA never > happens, from the PCIe point of view. > > Signed-off-by: Alejandro Lucero <alejandro.lucero@netronome.com> > --- > drivers/net/nfp/nfp_net.c | 17 ++++++++++++----- > 1 file changed, 12 insertions(+), 5 deletions(-) > > diff --git a/drivers/net/nfp/nfp_net.c b/drivers/net/nfp/nfp_net.c > index 92b03c4..679a91b 100644 > --- a/drivers/net/nfp/nfp_net.c > +++ b/drivers/net/nfp/nfp_net.c > @@ -2094,7 +2094,7 @@ uint32_t nfp_net_txq_full(struct nfp_net_txq *txq) > */ > pkt_size = pkt->pkt_len; > > - while (pkt_size) { > + while (pkt) { > /* Copying TSO, VLAN and cksum info */ > *txds = txd; > > @@ -2126,17 +2126,24 @@ uint32_t nfp_net_txq_full(struct nfp_net_txq *txq) > txq->wr_p = 0; > > pkt_size -= dma_size; > - if (!pkt_size) { > + if (!pkt_size) > /* End of packet */ > txds->offset_eop |= PCIE_DESC_TX_EOP; > - } else { > + else > txds->offset_eop &= PCIE_DESC_TX_OFFSET_MASK; > - pkt = pkt->next; > - } > + > + pkt = pkt->next; > /* Referencing next free TX descriptor */ > txds = &txq->txds[txq->wr_p]; > lmbuf = &txq->txbufs[txq->wr_p].mbuf; > issued_descs++; > + > + /* Double-checking if we have to use chained mbuf. > + * It seems there are some apps which could wrongly > + * have zeroed mbufs chained leading to send null > + * descriptors to the hw. */ > + if (!pkt_size) > + break; For the case chained mbufs with all are zero size [1], won't this cause next mbufs not freed because rte_pktmbuf_free_seg(*lmbuf) used? [1] As you mentioned in the commit log, this not correct thing to do, but since patch is trying to harden PMD for this wrong application behavior.. > } > i++; > } > ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [dpdk-stable] [dpdk-dev] [PATCH] nfp: handle packets with length 0 as usual ones 2017-08-18 15:10 ` [dpdk-stable] [dpdk-dev] " Ferruh Yigit @ 2017-08-18 16:23 ` Alejandro Lucero 2017-08-21 10:34 ` Ferruh Yigit 0 siblings, 1 reply; 6+ messages in thread From: Alejandro Lucero @ 2017-08-18 16:23 UTC (permalink / raw) To: Ferruh Yigit; +Cc: dev, stable On Fri, Aug 18, 2017 at 4:10 PM, Ferruh Yigit <ferruh.yigit@intel.com> wrote: > On 8/11/2017 11:05 AM, Alejandro Lucero wrote: > > A DPDK app could, whatever the reason, send packets with size 0. > > The PMD is not sending those packets, which does make sense, > > but the problem is the mbuf is not released either. That leads > > to mbufs not being available, because the app trusts the > > PMD will do it. > > > > Although this is a problem related to app wrong behaviour, we > > should harden the PMD in this regard. Not sending a packet with > > size 0 could be problematic, needing special handling inside the > > PMD xmit function. It could be a burst of those packets, which can > > be easily handled, but it could also be a single packet in a burst, > > what is harder to handle. > > > > It would be simpler to just send that kind of packets, which will > > likely be dropped by the hw at some point. The main problem is how > > the fw/hw handles the DMA, because a dma read to a hypothetical 0x0 > > address could trigger an IOMMU error. It turns out, it is safe to > > send a descriptor with packet size 0 to the hardware: the DMA never > > happens, from the PCIe point of view. > > > > Signed-off-by: Alejandro Lucero <alejandro.lucero@netronome.com> > > --- > > drivers/net/nfp/nfp_net.c | 17 ++++++++++++----- > > 1 file changed, 12 insertions(+), 5 deletions(-) > > > > diff --git a/drivers/net/nfp/nfp_net.c b/drivers/net/nfp/nfp_net.c > > index 92b03c4..679a91b 100644 > > --- a/drivers/net/nfp/nfp_net.c > > +++ b/drivers/net/nfp/nfp_net.c > > @@ -2094,7 +2094,7 @@ uint32_t nfp_net_txq_full(struct nfp_net_txq *txq) > > */ > > pkt_size = pkt->pkt_len; > > > > - while (pkt_size) { > > + while (pkt) { > > /* Copying TSO, VLAN and cksum info */ > > *txds = txd; > > > > @@ -2126,17 +2126,24 @@ uint32_t nfp_net_txq_full(struct nfp_net_txq > *txq) > > txq->wr_p = 0; > > > > pkt_size -= dma_size; > > - if (!pkt_size) { > > + if (!pkt_size) > > /* End of packet */ > > txds->offset_eop |= PCIE_DESC_TX_EOP; > > - } else { > > + else > > txds->offset_eop &= > PCIE_DESC_TX_OFFSET_MASK; > > - pkt = pkt->next; > > - } > > + > > + pkt = pkt->next; > > /* Referencing next free TX descriptor */ > > txds = &txq->txds[txq->wr_p]; > > lmbuf = &txq->txbufs[txq->wr_p].mbuf; > > issued_descs++; > > + > > + /* Double-checking if we have to use chained mbuf. > > + * It seems there are some apps which could wrongly > > + * have zeroed mbufs chained leading to send null > > + * descriptors to the hw. */ > > + if (!pkt_size) > > + break; > > For the case chained mbufs with all are zero size [1], won't this cause > next mbufs not freed because rte_pktmbuf_free_seg(*lmbuf) used? > > Good point. Being honest, we had the problem with mbufs and size 0, and this last check was not initially there. But we saw performance being low after the change, and the only thing which could explain it was this sort of chained mbufs. There was not mbuf allocation problem at all. It was like more (null) packets being sent to the hardware now. This last check solved the performance problem. Once I have said that, I have to admit my explanation implies some serious problem when handling mbufs, and something the app is doing really badly, so I could understand someone saying this is hidden a serious problem and should not be there. [1] > As you mentioned in the commit log, this not correct thing to do, but > since patch is trying to harden PMD for this wrong application behavior.. > If you consider this last check should not be there, I'll be glad to remove it. > > > } > > i++; > > } > > > > ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [dpdk-stable] [dpdk-dev] [PATCH] nfp: handle packets with length 0 as usual ones 2017-08-18 16:23 ` Alejandro Lucero @ 2017-08-21 10:34 ` Ferruh Yigit 2017-08-21 13:08 ` Alejandro Lucero 0 siblings, 1 reply; 6+ messages in thread From: Ferruh Yigit @ 2017-08-21 10:34 UTC (permalink / raw) To: Alejandro Lucero; +Cc: dev, stable On 8/18/2017 5:23 PM, Alejandro Lucero wrote: > > > On Fri, Aug 18, 2017 at 4:10 PM, Ferruh Yigit <ferruh.yigit@intel.com > <mailto:ferruh.yigit@intel.com>> wrote: > > On 8/11/2017 11:05 AM, Alejandro Lucero wrote: > > A DPDK app could, whatever the reason, send packets with size 0. > > The PMD is not sending those packets, which does make sense, > > but the problem is the mbuf is not released either. That leads > > to mbufs not being available, because the app trusts the > > PMD will do it. > > > > Although this is a problem related to app wrong behaviour, we > > should harden the PMD in this regard. Not sending a packet with > > size 0 could be problematic, needing special handling inside the > > PMD xmit function. It could be a burst of those packets, which can > > be easily handled, but it could also be a single packet in a burst, > > what is harder to handle. > > > > It would be simpler to just send that kind of packets, which will > > likely be dropped by the hw at some point. The main problem is how > > the fw/hw handles the DMA, because a dma read to a hypothetical 0x0 > > address could trigger an IOMMU error. It turns out, it is safe to > > send a descriptor with packet size 0 to the hardware: the DMA never > > happens, from the PCIe point of view. > > > > Signed-off-by: Alejandro Lucero <alejandro.lucero@netronome.com > <mailto:alejandro.lucero@netronome.com>> > > --- > > drivers/net/nfp/nfp_net.c | 17 ++++++++++++----- > > 1 file changed, 12 insertions(+), 5 deletions(-) > > > > diff --git a/drivers/net/nfp/nfp_net.c b/drivers/net/nfp/nfp_net.c > > index 92b03c4..679a91b 100644 > > --- a/drivers/net/nfp/nfp_net.c > > +++ b/drivers/net/nfp/nfp_net.c > > @@ -2094,7 +2094,7 @@ uint32_t nfp_net_txq_full(struct nfp_net_txq > *txq) > > */ > > pkt_size = pkt->pkt_len; > > > > - while (pkt_size) { > > + while (pkt) { > > /* Copying TSO, VLAN and cksum info */ > > *txds = txd; > > > > @@ -2126,17 +2126,24 @@ uint32_t nfp_net_txq_full(struct > nfp_net_txq *txq) > > txq->wr_p = 0; > > > > pkt_size -= dma_size; > > - if (!pkt_size) { > > + if (!pkt_size) > > /* End of packet */ > > txds->offset_eop |= PCIE_DESC_TX_EOP; > > - } else { > > + else > > txds->offset_eop &= > PCIE_DESC_TX_OFFSET_MASK; > > - pkt = pkt->next; > > - } > > + > > + pkt = pkt->next; > > /* Referencing next free TX descriptor */ > > txds = &txq->txds[txq->wr_p]; > > lmbuf = &txq->txbufs[txq->wr_p].mbuf; > > issued_descs++; > > + > > + /* Double-checking if we have to use chained > mbuf. > > + * It seems there are some apps which could > wrongly > > + * have zeroed mbufs chained leading to send > null > > + * descriptors to the hw. */ > > + if (!pkt_size) > > + break; > > For the case chained mbufs with all are zero size [1], won't this cause > next mbufs not freed because rte_pktmbuf_free_seg(*lmbuf) used? > > > Good point. Being honest, we had the problem with mbufs and size 0, and > this last check > was not initially there. But we saw performance being low after the > change, and the only thing > which could explain it was this sort of chained mbufs. There was not > mbuf allocation problem at > all. It was like more (null) packets being sent to the hardware now. > This last check solved the > performance problem. I assume performance problem is with the chained mbufs with 0 size, I believe this should be fixed in application, not in PMD level. And if application is sending chained mbufs with 0 size, with above code it will eventually be out off mbufs, since they are not freed, and same problem will occur that this patch is trying to avoid, but perhaps in longer run. > > Once I have said that, I have to admit my explanation implies some > serious problem when > handling mbufs, and something the app is doing really badly, so I could > understand someone > saying this is hidden a serious problem and should not be there. > > [1] > As you mentioned in the commit log, this not correct thing to do, but > since patch is trying to harden PMD for this wrong application > behavior.. > > > If you consider this last check should not be there, I'll be glad to > remove it. > > > > > } > > i++; > > } > > > > ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [dpdk-stable] [dpdk-dev] [PATCH] nfp: handle packets with length 0 as usual ones 2017-08-21 10:34 ` Ferruh Yigit @ 2017-08-21 13:08 ` Alejandro Lucero 2017-08-21 13:25 ` Ferruh Yigit 0 siblings, 1 reply; 6+ messages in thread From: Alejandro Lucero @ 2017-08-21 13:08 UTC (permalink / raw) To: Ferruh Yigit; +Cc: dev, stable On Mon, Aug 21, 2017 at 11:34 AM, Ferruh Yigit <ferruh.yigit@intel.com> wrote: > On 8/18/2017 5:23 PM, Alejandro Lucero wrote: > > > > > > On Fri, Aug 18, 2017 at 4:10 PM, Ferruh Yigit <ferruh.yigit@intel.com > > <mailto:ferruh.yigit@intel.com>> wrote: > > > > On 8/11/2017 11:05 AM, Alejandro Lucero wrote: > > > A DPDK app could, whatever the reason, send packets with size 0. > > > The PMD is not sending those packets, which does make sense, > > > but the problem is the mbuf is not released either. That leads > > > to mbufs not being available, because the app trusts the > > > PMD will do it. > > > > > > Although this is a problem related to app wrong behaviour, we > > > should harden the PMD in this regard. Not sending a packet with > > > size 0 could be problematic, needing special handling inside the > > > PMD xmit function. It could be a burst of those packets, which can > > > be easily handled, but it could also be a single packet in a burst, > > > what is harder to handle. > > > > > > It would be simpler to just send that kind of packets, which will > > > likely be dropped by the hw at some point. The main problem is how > > > the fw/hw handles the DMA, because a dma read to a hypothetical 0x0 > > > address could trigger an IOMMU error. It turns out, it is safe to > > > send a descriptor with packet size 0 to the hardware: the DMA never > > > happens, from the PCIe point of view. > > > > > > Signed-off-by: Alejandro Lucero <alejandro.lucero@netronome.com > > <mailto:alejandro.lucero@netronome.com>> > > > --- > > > drivers/net/nfp/nfp_net.c | 17 ++++++++++++----- > > > 1 file changed, 12 insertions(+), 5 deletions(-) > > > > > > diff --git a/drivers/net/nfp/nfp_net.c b/drivers/net/nfp/nfp_net.c > > > index 92b03c4..679a91b 100644 > > > --- a/drivers/net/nfp/nfp_net.c > > > +++ b/drivers/net/nfp/nfp_net.c > > > @@ -2094,7 +2094,7 @@ uint32_t nfp_net_txq_full(struct nfp_net_txq > > *txq) > > > */ > > > pkt_size = pkt->pkt_len; > > > > > > - while (pkt_size) { > > > + while (pkt) { > > > /* Copying TSO, VLAN and cksum info */ > > > *txds = txd; > > > > > > @@ -2126,17 +2126,24 @@ uint32_t nfp_net_txq_full(struct > > nfp_net_txq *txq) > > > txq->wr_p = 0; > > > > > > pkt_size -= dma_size; > > > - if (!pkt_size) { > > > + if (!pkt_size) > > > /* End of packet */ > > > txds->offset_eop |= PCIE_DESC_TX_EOP; > > > - } else { > > > + else > > > txds->offset_eop &= > > PCIE_DESC_TX_OFFSET_MASK; > > > - pkt = pkt->next; > > > - } > > > + > > > + pkt = pkt->next; > > > /* Referencing next free TX descriptor */ > > > txds = &txq->txds[txq->wr_p]; > > > lmbuf = &txq->txbufs[txq->wr_p].mbuf; > > > issued_descs++; > > > + > > > + /* Double-checking if we have to use chained > > mbuf. > > > + * It seems there are some apps which could > > wrongly > > > + * have zeroed mbufs chained leading to send > > null > > > + * descriptors to the hw. */ > > > + if (!pkt_size) > > > + break; > > > > For the case chained mbufs with all are zero size [1], won't this > cause > > next mbufs not freed because rte_pktmbuf_free_seg(*lmbuf) used? > > > > > > Good point. Being honest, we had the problem with mbufs and size 0, and > > this last check > > was not initially there. But we saw performance being low after the > > change, and the only thing > > which could explain it was this sort of chained mbufs. There was not > > mbuf allocation problem at > > all. It was like more (null) packets being sent to the hardware now. > > This last check solved the > > performance problem. > > I assume performance problem is with the chained mbufs with 0 size, I > believe this should be fixed in application, not in PMD level. > > And if application is sending chained mbufs with 0 size, with above code > it will eventually be out off mbufs, since they are not freed, and same > problem will occur that this patch is trying to avoid, but perhaps in > longer run. > > This is definitely an app problem and maybe that last check should be avoided and to process that chained mbuf, whatever is it coming from, if "pkt = pkt->next" is not null. Are you OK of I send another version without that last if clause? > > > > Once I have said that, I have to admit my explanation implies some > > serious problem when > > handling mbufs, and something the app is doing really badly, so I could > > understand someone > > saying this is hidden a serious problem and should not be there. > > > > [1] > > As you mentioned in the commit log, this not correct thing to do, but > > since patch is trying to harden PMD for this wrong application > > behavior.. > > > > > > If you consider this last check should not be there, I'll be glad to > > remove it. > > > > > > > > > } > > > i++; > > > } > > > > > > > > > ^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [dpdk-stable] [dpdk-dev] [PATCH] nfp: handle packets with length 0 as usual ones 2017-08-21 13:08 ` Alejandro Lucero @ 2017-08-21 13:25 ` Ferruh Yigit 0 siblings, 0 replies; 6+ messages in thread From: Ferruh Yigit @ 2017-08-21 13:25 UTC (permalink / raw) To: Alejandro Lucero; +Cc: dev, stable On 8/21/2017 2:08 PM, Alejandro Lucero wrote: > > > On Mon, Aug 21, 2017 at 11:34 AM, Ferruh Yigit <ferruh.yigit@intel.com > <mailto:ferruh.yigit@intel.com>> wrote: > > On 8/18/2017 5:23 PM, Alejandro Lucero wrote: > > > > > > On Fri, Aug 18, 2017 at 4:10 PM, Ferruh Yigit <ferruh.yigit@intel.com <mailto:ferruh.yigit@intel.com> > > <mailto:ferruh.yigit@intel.com <mailto:ferruh.yigit@intel.com>>> wrote: > > > > On 8/11/2017 11:05 AM, Alejandro Lucero wrote: > > > A DPDK app could, whatever the reason, send packets with size 0. > > > The PMD is not sending those packets, which does make sense, > > > but the problem is the mbuf is not released either. That leads > > > to mbufs not being available, because the app trusts the > > > PMD will do it. > > > > > > Although this is a problem related to app wrong behaviour, we > > > should harden the PMD in this regard. Not sending a packet with > > > size 0 could be problematic, needing special handling inside the > > > PMD xmit function. It could be a burst of those packets, which can > > > be easily handled, but it could also be a single packet in a burst, > > > what is harder to handle. > > > > > > It would be simpler to just send that kind of packets, which will > > > likely be dropped by the hw at some point. The main problem is how > > > the fw/hw handles the DMA, because a dma read to a hypothetical 0x0 > > > address could trigger an IOMMU error. It turns out, it is safe to > > > send a descriptor with packet size 0 to the hardware: the DMA never > > > happens, from the PCIe point of view. > > > > > > Signed-off-by: Alejandro Lucero <alejandro.lucero@netronome.com <mailto:alejandro.lucero@netronome.com> > > <mailto:alejandro.lucero@netronome.com > <mailto:alejandro.lucero@netronome.com>>> > > > --- > > > drivers/net/nfp/nfp_net.c | 17 ++++++++++++----- > > > 1 file changed, 12 insertions(+), 5 deletions(-) > > > > > > diff --git a/drivers/net/nfp/nfp_net.c > b/drivers/net/nfp/nfp_net.c > > > index 92b03c4..679a91b 100644 > > > --- a/drivers/net/nfp/nfp_net.c > > > +++ b/drivers/net/nfp/nfp_net.c > > > @@ -2094,7 +2094,7 @@ uint32_t nfp_net_txq_full(struct > nfp_net_txq > > *txq) > > > */ > > > pkt_size = pkt->pkt_len; > > > > > > - while (pkt_size) { > > > + while (pkt) { > > > /* Copying TSO, VLAN and cksum info */ > > > *txds = txd; > > > > > > @@ -2126,17 +2126,24 @@ uint32_t nfp_net_txq_full(struct > > nfp_net_txq *txq) > > > txq->wr_p = 0; > > > > > > pkt_size -= dma_size; > > > - if (!pkt_size) { > > > + if (!pkt_size) > > > /* End of packet */ > > > txds->offset_eop |= > PCIE_DESC_TX_EOP; > > > - } else { > > > + else > > > txds->offset_eop &= > > PCIE_DESC_TX_OFFSET_MASK; > > > - pkt = pkt->next; > > > - } > > > + > > > + pkt = pkt->next; > > > /* Referencing next free TX descriptor */ > > > txds = &txq->txds[txq->wr_p]; > > > lmbuf = &txq->txbufs[txq->wr_p].mbuf; > > > issued_descs++; > > > + > > > + /* Double-checking if we have to use > chained > > mbuf. > > > + * It seems there are some apps which > could > > wrongly > > > + * have zeroed mbufs chained leading > to send > > null > > > + * descriptors to the hw. */ > > > + if (!pkt_size) > > > + break; > > > > For the case chained mbufs with all are zero size [1], won't > this cause > > next mbufs not freed because rte_pktmbuf_free_seg(*lmbuf) used? > > > > > > Good point. Being honest, we had the problem with mbufs and size > 0, and > > this last check > > was not initially there. But we saw performance being low after the > > change, and the only thing > > which could explain it was this sort of chained mbufs. There was not > > mbuf allocation problem at > > all. It was like more (null) packets being sent to the hardware now. > > This last check solved the > > performance problem. > > I assume performance problem is with the chained mbufs with 0 size, I > believe this should be fixed in application, not in PMD level. > > And if application is sending chained mbufs with 0 size, with above code > it will eventually be out off mbufs, since they are not freed, and same > problem will occur that this patch is trying to avoid, but perhaps in > longer run. > > > This is definitely an app problem and maybe that last check should be > avoided and to process that chained mbuf, whatever is it coming from, if > "pkt = pkt->next" is not null. > > Are you OK of I send another version without that last if clause? Yes, thank you. > > > > > > > Once I have said that, I have to admit my explanation implies some > > serious problem when > > handling mbufs, and something the app is doing really badly, so I > could > > understand someone > > saying this is hidden a serious problem and should not be there. > > > > [1] > > As you mentioned in the commit log, this not correct thing to > do, but > > since patch is trying to harden PMD for this wrong application > > behavior.. > > > > > > If you consider this last check should not be there, I'll be glad to > > remove it. > > > > > > > > > } > > > i++; > > > } > > > > > > > > > ^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2017-08-21 13:25 UTC | newest] Thread overview: 6+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2017-08-11 10:05 [dpdk-stable] [PATCH] nfp: handle packets with length 0 as usual ones Alejandro Lucero 2017-08-18 15:10 ` [dpdk-stable] [dpdk-dev] " Ferruh Yigit 2017-08-18 16:23 ` Alejandro Lucero 2017-08-21 10:34 ` Ferruh Yigit 2017-08-21 13:08 ` Alejandro Lucero 2017-08-21 13:25 ` Ferruh Yigit
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).