On Fri, May 14, 2021 at 3:39 AM Yuri Benditovich <yuri.benditovich@xxxxxxxxxx> wrote: > > On Fri, May 14, 2021 at 10:16 AM Jason Wang <jasowang@xxxxxxxxxx> wrote: > > > > On Fri, May 14, 2021 at 4:35 AM Willem de Bruijn > > <willemdebruijn.kernel@xxxxxxxxx> wrote: > > > > > > > > But surprisingly when TUN receives TUN_F_UFO it does not propagate it > > > > > anywhere, there is no corresponding NETIF flag. > > > > > > > > (It looks like I drop the community and other ccs accidentally, adding > > > > them back and sorry) > > > > > > > > Actually, there is one, NETIF_F_GSO_UDP. > > > > > > > > Kernel used to have NETIF_F_UFO, but it was removed due to bugs and > > > > the lack of real hardware support. Then we found it breaks uABI, so > > > > Willem tries to make it appear for userspace again, and then it was > > > > renamed to NETIF_F_GSO_UDP. > > > > > > > > But I think it's a bug that we don't proporate TUN_F_UFO to NETIF > > > > flag, this is a must for the driver that doesn't support > > > > VIRTIO_NET_F_GUEST_UFO. I just try to disable all offloads and > > > > mrg_rxbuf, then netperf UDP_STREAM from host to guest gives me bad > > > > length packet in the guest. > > > > > > > > Willem, I think we probably need to fix this. > > > > > > We had to add back support for the kernel to accept UFO packets from > > > userspace over tuntap. > > > > > > The kernel does not generate such packets, so a guest should never be > > > concerned of receiving UFO packets. > > > > That's my feeling as well. > > > > But when I: > > > > 1) turn off all guest gso feature and mrg rx buffers, in this case > > virtio-net will only allocate 1500 bytes for each packet > > 2) doing netperf (UDP_STREAM) from local host to guest, I see packet > > were truncated in the guest > > Is it possible that the virtio-net does not disable UFO offload? > IMO it sets NETIF_F_LRO too bravely. After we removed UFO completely, we found that guests may be migrated from old hosts with UFO support to newer without. And that they do not renegotiate features, so will continue to send UFO packets. I added back the absolute minimum support for UFO: for a host to be able to accept such UFO packets from userspace. But no device can advertise or negotiate the NETIF_F_USO feature again. If these packets arrive on the egress path, they will be immediately software segmented (or fragmented) in skb_segment. So the host will not forward such packets to another guest. The behavior that Jason is experiencing, truncated packets received in a guest from the host, sound unrelated to this feature to me. Can you see what the original UDP datagram length is? Are these packets just marginally larger, or indeed clearly U[SF]O packets well beyond any reasonable MTU size? Another option is that this is related to the host stack support for UDP_GRO. The stack can now build large packets, segments these on demand if needed (e.g., if such a packet arrives at a local socket that does not advertise UDP_GRO). Perhaps somehow such packets escape un-segmented to a guest. Do any devices where these packets may originate have features NETIF_F_GRO_UDP_FWD or NETIF_F_GRO_FRAGLIST enabled? _______________________________________________ Virtualization mailing list Virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linuxfoundation.org/mailman/listinfo/virtualization