lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <3EF78217-44AA-44F6-99DC-86FF1CC03A94@vmware.com>
Date:   Wed, 15 Mar 2023 02:27:14 +0000
From:   Ronak Doshi <doshir@...are.com>
To:     Yunsheng Lin <linyunsheng@...wei.com>,
        "netdev@...r.kernel.org" <netdev@...r.kernel.org>
CC:     "stable@...r.kernel.org" <stable@...r.kernel.org>,
        Pv-drivers <Pv-drivers@...are.com>,
        "David S. Miller" <davem@...emloft.net>,
        Eric Dumazet <edumazet@...gle.com>,
        Jakub Kicinski <kuba@...nel.org>,
        Paolo Abeni <pabeni@...hat.com>,
        Guolin Yang <gyang@...are.com>,
        open list <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH net] vmxnet3: use gro callback when UPT is enabled


> On 3/14/23, 6:52 PM, "Yunsheng Lin" <linyunsheng@...wei.com <mailto:linyunsheng@...wei.com>> wrote:
>
> Does clearing the NETIF_F_GRO for netdev->features bring back the performance?
> If no, maybe there is something need investigating.

Yes, it does. Simply using netif_receive_skb works fine.

> Checking rq->shared->updateRxProd in the driver to decide if gro is allow does not seems right to
> me, as the netstack has used the NETIF_F_GRO checking in netif_elide_gro().
>
updateRxProd is NOT being used to determine if GRO is allowed. It is being used to indicate UPT is
active, so the driver should just use GRO callback. This is as good as having only GRO callback for UPT driver
which you were suggesting earlier.

> Does clearing NETIF_F_GRO for netdev->features during the driver init process works for your
> case?

No this does not work as UPT mode can be enabled/disabled at runtime without guest being informed.
This is para-virtualized driver and does not know if the guest is being run in emulation or UPT.

> As netdev->hw_features is for the driver to advertise the hw's capability, and the driver
> can enable/disable specific capability by setting netdev->features during the driver init
> process, and user can get to enable/disable specific capability using ethtool later if user
> need to.

As I mentioned above, guest is not informed at runtime about UPT status. So, we need this
mechanism to avoid performance penalty.

Thanks,
Ronak



Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ