From ecfff64811c179cb4205184dd1f7bf9d35baf699 Mon Sep 17 00:00:00 2001 From: jiangheng Date: Mon, 19 Jun 2023 01:02:11 +0800 Subject: [PATCH] gro:fix gro with tcp push flag --- 0021-gro-fix-gro-with-tcp-push-flag.patch | 85 +++++++++++++++++++++++ dpdk.spec | 6 +- 2 files changed, 90 insertions(+), 1 deletion(-) create mode 100644 0021-gro-fix-gro-with-tcp-push-flag.patch diff --git a/0021-gro-fix-gro-with-tcp-push-flag.patch b/0021-gro-fix-gro-with-tcp-push-flag.patch new file mode 100644 index 0000000..ec67eaf --- /dev/null +++ b/0021-gro-fix-gro-with-tcp-push-flag.patch @@ -0,0 +1,85 @@ +From f541da70a5fdb553dc0cb71b3de54065dd245c2d Mon Sep 17 00:00:00 2001 +From: jiangheng +Date: Mon, 19 Jun 2023 00:56:38 +0800 +Subject: [PATCH] gro:fix gro with tcp push flag + +TCP data packets sometimes carry a PUSH flag. Currently, +only the packets that do not have PUSH flag can be GROed. +The packets that have a PUSH flag cannot be GROed, the packets +that cannot be processed by GRO are placed last. +In this case, the received packets may be out of order. +For example, there are two packets mbuf1 and mbuf2. mbuf1 +contains PUSH flag, mbuf2 does not contain PUSH flag. +After GRO processing, mbuf2 is sent for processing before mbuf1. +This out-of-order will affect TCP processing performance and +lead to unnecessary dup-ACK. + +Referring to the Linux kernel implementation, packets with PUSH +flag can also perform GRO. And if one of the packets containing +PUSH flag, the packets after GRO will carry PUSH flag. + +Reference: https://mails.dpdk.org/archives/stable/2022-July/039759.html +--- + lib/gro/gro_tcp4.c | 3 ++- + lib/gro/gro_tcp4.h | 16 +++++++++++++--- + 2 files changed, 15 insertions(+), 4 deletions(-) + +diff --git a/lib/gro/gro_tcp4.c b/lib/gro/gro_tcp4.c +index d92e5dd..69b1b17 100644 +--- a/lib/gro/gro_tcp4.c ++++ b/lib/gro/gro_tcp4.c +@@ -221,10 +221,11 @@ gro_tcp4_reassemble(struct rte_mbuf *pkt, + hdr_len = pkt->l2_len + pkt->l3_len + pkt->l4_len; + + /* +- * Don't process the packet which has FIN, SYN, RST, PSH, URG, ECE ++ * Don't process the packet which has FIN, SYN, RST, URG, ECE + * or CWR set. + */ + if (tcp_hdr->tcp_flags != RTE_TCP_ACK_FLAG) ++ if (tcp_hdr->tcp_flags & (~(RTE_TCP_ACK_FLAG | RTE_TCP_PSH_FLAG))) + return -1; + + /* trim the tail padding bytes */ +diff --git a/lib/gro/gro_tcp4.h b/lib/gro/gro_tcp4.h +index bb875a5..3e08222 100644 +--- a/lib/gro/gro_tcp4.h ++++ b/lib/gro/gro_tcp4.h +@@ -212,7 +212,8 @@ merge_two_tcp4_packets(struct gro_tcp4_item *item, + uint16_t l2_offset) + { + struct rte_mbuf *pkt_head, *pkt_tail, *lastseg; +- uint16_t hdr_len, l2_len; ++ struct rte_tcp_hdr *head_tcp_hdr, *tail_tcp_hdr; ++ uint16_t hdr_len, l2_len, l3_offset; + + if (cmp > 0) { + pkt_head = item->firstseg; +@@ -223,13 +224,22 @@ merge_two_tcp4_packets(struct gro_tcp4_item *item, + } + + /* check if the IPv4 packet length is greater than the max value */ +- hdr_len = l2_offset + pkt_head->l2_len + pkt_head->l3_len + +- pkt_head->l4_len; ++ l3_offset = l2_offset + pkt_head->l2_len + pkt_head->l3_len; ++ hdr_len = l3_offset + pkt_head->l4_len; + l2_len = l2_offset > 0 ? pkt_head->outer_l2_len : pkt_head->l2_len; + if (unlikely(pkt_head->pkt_len - l2_len + pkt_tail->pkt_len - + hdr_len > MAX_IPV4_PKT_LENGTH)) + return 0; + ++ /* merge push flag to pkt_head */ ++ tail_tcp_hdr = rte_pktmbuf_mtod_offset(pkt_tail, ++ struct rte_tcp_hdr *, l3_offset); ++ if (tail_tcp_hdr->tcp_flags & RTE_TCP_PSH_FLAG) { ++ head_tcp_hdr = rte_pktmbuf_mtod_offset(pkt_head, ++ struct rte_tcp_hdr *, l3_offset); ++ head_tcp_hdr->tcp_flags |= RTE_TCP_PSH_FLAG; ++ } ++ + /* remove the packet header for the tail packet */ + rte_pktmbuf_adj(pkt_tail, hdr_len); + +-- +2.27.0 + diff --git a/dpdk.spec b/dpdk.spec index d526932..e6a3e84 100644 --- a/dpdk.spec +++ b/dpdk.spec @@ -1,6 +1,6 @@ Name: dpdk Version: 21.11 -Release: 49 +Release: 50 Packager: packaging@6wind.com URL: http://dpdk.org %global source_version 21.11 @@ -336,6 +336,7 @@ Patch6312: 0312-app-testpmd-fix-segment-fault-with-invalid-queue-ID.patch Patch6313: 0313-net-hns3-fix-IMP-reset-trigger.patch Patch9020: 0020-pdump-fix-pcap_dump-coredump-caused-by-incorrect-pkt_len.patch +Patch9021: 0021-gro-fix-gro-with-tcp-push-flag.patch Summary: Data Plane Development Kit core Group: System Environment/Libraries @@ -480,6 +481,9 @@ strip -g $RPM_BUILD_ROOT/lib/modules/%{kern_devel_ver}/extra/dpdk/igb_uio.ko /usr/sbin/depmod %changelog +* Mon Jun 19 2023 jiangheng - 21.11-50 +- gro: fix gro with tcp push flag + * Tue Jun 13 2023 jiangheng - 21.11-49 - pdump: fix pcap_dump coredump caused by incorrect pkt_len -- Gitee