patches for DPDK stable branches
 help / color / mirror / Atom feed
From: Ferruh Yigit <ferruh.yigit@intel.com>
To: Alejandro Lucero <alejandro.lucero@netronome.com>
Cc: dev <dev@dpdk.org>, stable@dpdk.org
Subject: Re: [dpdk-stable] [dpdk-dev] [PATCH] nfp: handle packets with length 0 as usual ones
Date: Mon, 21 Aug 2017 14:25:38 +0100	[thread overview]
Message-ID: <99cbc1dc-7ae1-0e7b-4577-cbac67e6b763@intel.com> (raw)
In-Reply-To: <CAD+H992YbYrEvPOnM5K45Rk994_mZYU_C0oD1hyoB_MdRBsgMQ@mail.gmail.com>

On 8/21/2017 2:08 PM, Alejandro Lucero wrote:
> 
> 
> On Mon, Aug 21, 2017 at 11:34 AM, Ferruh Yigit <ferruh.yigit@intel.com
> <mailto:ferruh.yigit@intel.com>> wrote:
> 
>     On 8/18/2017 5:23 PM, Alejandro Lucero wrote:
>     >
>     >
>     > On Fri, Aug 18, 2017 at 4:10 PM, Ferruh Yigit <ferruh.yigit@intel.com <mailto:ferruh.yigit@intel.com>
>     > <mailto:ferruh.yigit@intel.com <mailto:ferruh.yigit@intel.com>>> wrote:
>     >
>     >     On 8/11/2017 11:05 AM, Alejandro Lucero wrote:
>     >     > A DPDK app could, whatever the reason, send packets with size 0.
>     >     > The PMD is not sending those packets, which does make sense,
>     >     > but the problem is the mbuf is not released either. That leads
>     >     > to mbufs not being available, because the app trusts the
>     >     > PMD will do it.
>     >     >
>     >     > Although this is a problem related to app wrong behaviour, we
>     >     > should harden the PMD in this regard. Not sending a packet with
>     >     > size 0 could be problematic, needing special handling inside the
>     >     > PMD xmit function. It could be a burst of those packets, which can
>     >     > be easily handled, but it could also be a single packet in a burst,
>     >     > what is harder to handle.
>     >     >
>     >     > It would be simpler to just send that kind of packets, which will
>     >     > likely be dropped by the hw at some point. The main problem is how
>     >     > the fw/hw handles the DMA, because a dma read to a hypothetical 0x0
>     >     > address could trigger an IOMMU error. It turns out, it is safe to
>     >     > send a descriptor with packet size 0 to the hardware: the DMA never
>     >     > happens, from the PCIe point of view.
>     >     >
>     >     > Signed-off-by: Alejandro Lucero <alejandro.lucero@netronome.com <mailto:alejandro.lucero@netronome.com>
>     >     <mailto:alejandro.lucero@netronome.com
>     <mailto:alejandro.lucero@netronome.com>>>
>     >     > ---
>     >     >  drivers/net/nfp/nfp_net.c | 17 ++++++++++++-----
>     >     >  1 file changed, 12 insertions(+), 5 deletions(-)
>     >     >
>     >     > diff --git a/drivers/net/nfp/nfp_net.c
>     b/drivers/net/nfp/nfp_net.c
>     >     > index 92b03c4..679a91b 100644
>     >     > --- a/drivers/net/nfp/nfp_net.c
>     >     > +++ b/drivers/net/nfp/nfp_net.c
>     >     > @@ -2094,7 +2094,7 @@ uint32_t nfp_net_txq_full(struct
>     nfp_net_txq
>     >     *txq)
>     >     >                */
>     >     >               pkt_size = pkt->pkt_len;
>     >     >
>     >     > -             while (pkt_size) {
>     >     > +             while (pkt) {
>     >     >                       /* Copying TSO, VLAN and cksum info */
>     >     >                       *txds = txd;
>     >     >
>     >     > @@ -2126,17 +2126,24 @@ uint32_t nfp_net_txq_full(struct
>     >     nfp_net_txq *txq)
>     >     >                               txq->wr_p = 0;
>     >     >
>     >     >                       pkt_size -= dma_size;
>     >     > -                     if (!pkt_size) {
>     >     > +                     if (!pkt_size)
>     >     >                               /* End of packet */
>     >     >                               txds->offset_eop |=
>     PCIE_DESC_TX_EOP;
>     >     > -                     } else {
>     >     > +                     else
>     >     >                               txds->offset_eop &=
>     >     PCIE_DESC_TX_OFFSET_MASK;
>     >     > -                             pkt = pkt->next;
>     >     > -                     }
>     >     > +
>     >     > +                     pkt = pkt->next;
>     >     >                       /* Referencing next free TX descriptor */
>     >     >                       txds = &txq->txds[txq->wr_p];
>     >     >                       lmbuf = &txq->txbufs[txq->wr_p].mbuf;
>     >     >                       issued_descs++;
>     >     > +
>     >     > +                     /* Double-checking if we have to use
>     chained
>     >     mbuf.
>     >     > +                      * It seems there are some apps which
>     could
>     >     wrongly
>     >     > +                      * have zeroed mbufs chained leading
>     to send
>     >     null
>     >     > +                      * descriptors to the hw. */
>     >     > +                     if (!pkt_size)
>     >     > +                             break;
>     >
>     >     For the case chained mbufs with all are zero size [1], won't
>     this cause
>     >     next mbufs not freed because rte_pktmbuf_free_seg(*lmbuf) used?
>     >
>     >
>     > Good point. Being honest, we had the problem with mbufs and size
>     0, and
>     > this last check
>     > was not initially there. But we saw performance being low after the
>     > change, and the only thing
>     > which could explain it was this sort of chained mbufs. There was not
>     > mbuf allocation problem at
>     > all. It was like more (null) packets being sent to the hardware now.
>     > This last check solved the
>     > performance problem.
> 
>     I assume performance problem is with the chained mbufs with 0 size, I
>     believe this should be fixed in application, not in PMD level.
> 
>     And if application is sending chained mbufs with 0 size, with above code
>     it will eventually be out off mbufs, since they are not freed, and same
>     problem will occur that this patch is trying to avoid, but perhaps in
>     longer run.
> 
> 
> This is definitely an app problem and maybe that last check should be
> avoided and to process that chained mbuf, whatever is it coming from, if
> "pkt = pkt->next" is not null.
> 
> Are you OK of I send another version without that last if clause?

Yes, thank you.

>  
>  
> 
>     >
>     > Once I have said that, I have to admit my explanation implies some
>     > serious problem when
>     > handling mbufs, and something the app is doing really badly, so I
>     could
>     > understand someone
>     > saying this is hidden a serious problem and should not be there. 
>     >
>     >     [1]
>     >     As you mentioned in the commit log, this not correct thing to
>     do, but
>     >     since patch is trying to harden PMD for this wrong application
>     >     behavior..
>     >
>     >
>     > If you consider this last check should not be there, I'll be glad to
>     > remove it.
>     >  
>     >
>     >
>     >     >               }
>     >     >               i++;
>     >     >       }
>     >     >
>     >
>     >
> 
> 

      reply	other threads:[~2017-08-21 13:25 UTC|newest]

Thread overview: 6+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2017-08-11 10:05 [dpdk-stable] " Alejandro Lucero
2017-08-18 15:10 ` [dpdk-stable] [dpdk-dev] " Ferruh Yigit
2017-08-18 16:23   ` Alejandro Lucero
2017-08-21 10:34     ` Ferruh Yigit
2017-08-21 13:08       ` Alejandro Lucero
2017-08-21 13:25         ` Ferruh Yigit [this message]

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=99cbc1dc-7ae1-0e7b-4577-cbac67e6b763@intel.com \
    --to=ferruh.yigit@intel.com \
    --cc=alejandro.lucero@netronome.com \
    --cc=dev@dpdk.org \
    --cc=stable@dpdk.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).