Hi, we are currently testing the Mellanox ConnectX-5 100G NIC with DPDK 17.08 as well as dpdk-net-next and are experiencing mbuf leaks as well as crashes (and in some instances even kernel panics in a mlx5 module) under certain load conditions.
We initially saw these issues only in our own DPDK-based application and it took some effort to reproduce this in one of the DPDK example applications. However with the attached patch to the load-balancer example we can reproduce the issues reliably. The patch may look weird at first but I will explain why I made these changes: * the sleep introduced in the worker threads simulates heavy processing which causes the software rx rings to fill up under load. If the rings are large enough (I increased the ring size with the load-balancer command line option as you can see in the example call further down) the mbuf pool may run empty and I believe this leads to a malfunction in the mlx5 driver. As soon as this happens the NIC will stop forwarding traffic, probably because the driver cannot allocate mbufs for the packets received by the NIC. Unfortunately when this happens most of the mbufs will never return to the mbuf pool so that even when the traffic stops the pool will remain almost empty and the application will not forward traffic even at a very low rate. * the use of the reference count in the mbuf in addition to the situation described above is what makes the mlx5 DPDK driver crash almost immediately under load. In our application we rely on this feature to be able to forward the packet quickly and still send the packet to a worker thread for analysis and finally free the packet when analysis is done. Here I simulated this by increasing the mbuf reference count immediately after receiving the mbuf from the driver and then calling rte_pktmbuf_free in the worker thread which should only decrement the reference count again and not actually free the mbuf. We executed the patched load-balancer application with the following command line: ./build/load_balancer -l 3-7 -n 4 -- --rx "(0,0,3),(1,0,3)" --tx "(0,3),(1,3)" --w "4" --lpm "16.0.0.0/8=>0; 48.0.0.0/8=>1;" --pos-lb 29 --rsz "1024, 32768, 1024, 1024" Then we generated traffic using the t-rex traffic generator and the sfr test case. On our machine the issues start to happen when the traffic exceeds ~6 Gbps but this may vary depending on how powerful the test machine is (by the way we were able to reproduce this on different types of hardware). A typical stacktrace looks like this: Thread 1 "load_balancer" received signal SIGSEGV, Segmentation fault. 0x0000000000614475 in _mm_storeu_si128 (__B=..., __P=<optimized out>) at /usr/lib/gcc/x86_64-linux-gnu/5/include/emmintrin.h:716 716 __builtin_ia32_storedqu ((char *)__P, (__v16qi)__B); (gdb) bt #0 0x0000000000614475 in _mm_storeu_si128 (__B=..., __P=<optimized out>) at /usr/lib/gcc/x86_64-linux-gnu/5/include/emmintrin.h:716 #1 rxq_cq_decompress_v (elts=0x7fff3732bef0, cq=0x7ffff7f99380, rxq=0x7fff3732a980) at /root/dpdk-next-net/drivers/net/mlx5/mlx5_rxtx_vec_sse.c:679 #2 rxq_burst_v (pkts_n=<optimized out>, pkts=0xa7c7b0 <app+432944>, rxq=0x7fff3732a980) at /root/dpdk-next-net/drivers/net/mlx5/mlx5_rxtx_vec_sse.c:1242 #3 mlx5_rx_burst_vec (dpdk_rxq=0x7fff3732a980, pkts=<optimized out>, pkts_n=<optimized out>) at /root/dpdk-next-net/drivers/net/mlx5/mlx5_rxtx_vec_sse.c:1277 #4 0x000000000043c11d in rte_eth_rx_burst (nb_pkts=3599, rx_pkts=0xa7c7b0 <app+432944>, queue_id=0, port_id=0 '\000') at /root/dpdk-next-net//x86_64-native-linuxapp-gcc/include/rte_ethdev.h:2781 #5 app_lcore_io_rx (lp=lp@entry=0xa7c700 <app+432768>, n_workers=n_workers@entry=1, bsz_rd=bsz_rd@entry=144, bsz_wr=bsz_wr@entry=144, pos_lb=pos_lb@entry=29 '\035') at /root/dpdk-next-net/examples/load_balancer/runtime.c:198 #6 0x0000000000447dc0 in app_lcore_main_loop_io () at /root/dpdk-next-net/examples/load_balancer/runtime.c:485 #7 app_lcore_main_loop (arg=<optimized out>) at /root/dpdk-next-net/examples/load_balancer/runtime.c:669 #8 0x0000000000495e8b in rte_eal_mp_remote_launch () #9 0x0000000000441e0d in main (argc=<optimized out>, argv=<optimized out>) at /root/dpdk-next-net/examples/load_balancer/main.c:99 The crash does not always happen at the exact same spot but in our tests always in the same function. In a few instances instead of an application crash the system froze completely with what appeared to be a kernel panic. The last output looked like a crash in the interrupt handler of a mlx5 module but unfortunately I cannot provide the exact output right now. All tests were performed under Ubuntu 16.04 server running a 4.4.0-96-generic kernel and the lasted Mellanox OFED MLNX_OFED_LINUX-4.1-1.0.2.0-ubuntu16.04-x86_64 was used. Any help with this issue is greatly appreciated. Best regards, Martin
diff --git a/config/common_base b/config/common_base index 439f3cc..12b71e9 100644 --- a/config/common_base +++ b/config/common_base @@ -220,7 +220,7 @@ CONFIG_RTE_LIBRTE_MLX4_TX_MP_CACHE=8 # # Compile burst-oriented Mellanox ConnectX-4 & ConnectX-5 (MLX5) PMD # -CONFIG_RTE_LIBRTE_MLX5_PMD=n +CONFIG_RTE_LIBRTE_MLX5_PMD=y CONFIG_RTE_LIBRTE_MLX5_DEBUG=n CONFIG_RTE_LIBRTE_MLX5_TX_MP_CACHE=8 diff --git a/examples/load_balancer/runtime.c b/examples/load_balancer/runtime.c index e54b785..d448100 100644 --- a/examples/load_balancer/runtime.c +++ b/examples/load_balancer/runtime.c @@ -41,6 +41,7 @@ #include <stdarg.h> #include <errno.h> #include <getopt.h> +#include <unistd.h> #include <rte_common.h> #include <rte_byteorder.h> @@ -133,6 +134,8 @@ app_lcore_io_rx_buffer_to_send ( uint32_t pos; int ret; + rte_pktmbuf_refcnt_update(mbuf, 1); + pos = lp->rx.mbuf_out[worker].n_mbufs; lp->rx.mbuf_out[worker].array[pos ++] = mbuf; if (likely(pos < bsz)) { @@ -521,6 +524,8 @@ app_lcore_worker( continue; #endif + usleep(20); + APP_WORKER_PREFETCH1(rte_pktmbuf_mtod(lp->mbuf_in.array[0], unsigned char *)); APP_WORKER_PREFETCH0(lp->mbuf_in.array[1]); @@ -530,6 +535,8 @@ app_lcore_worker( uint32_t ipv4_dst, pos; uint32_t port; + rte_pktmbuf_free(lp->mbuf_in.array[j]); + if (likely(j < bsz_rd - 1)) { APP_WORKER_PREFETCH1(rte_pktmbuf_mtod(lp->mbuf_in.array[j+1], unsigned char *)); }