Received: by 10.192.165.148 with SMTP id m20csp4076933imm; Mon, 23 Apr 2018 18:44:49 -0700 (PDT) X-Google-Smtp-Source: AIpwx49ecG9zojXaCvi7s4K00TQZnH4Gu9GTehK/Ug/wcb0GDhOQW645T/ofSLR3v2hwd7w93kjn X-Received: by 10.101.76.77 with SMTP id l13mr11335110pgr.46.1524534289494; Mon, 23 Apr 2018 18:44:49 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524534289; cv=none; d=google.com; s=arc-20160816; b=QyS//VMTitrQvosRcqx+GO4RzzXrrceY/lDRTkm79+j5G51oyiBnw3u8K0l5wc7Yxc 62VvJE2V8hMGoAx8012qQ2BsHfemkja5AKJg+33idtu4Wsc5VP3mIXru2GE+CKukZ8qX PerGsv92/NPrVR1miwbg5+jyDlAzpV3UGOwboLVeUZBH/533IklJeIfiWYIiPy1TNYB3 i6tnQATQ8zm+r4Py8jXM9ZFHY7jr5rVRZOD0Iin0UE+95RUwpBfg/cc7GchC60tX2JAi ivzGVsMpoGhoIXFY01eQ05GfjZNXOh29n2Nat8A12O1pIJZAvyzWPfkgyLmgVYM4xqTd xf5A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:in-reply-to:content-transfer-encoding :content-disposition:mime-version:references:message-id:subject:cc :to:from:date:arc-authentication-results; bh=IfxhRYeODdhdpEdgvtlSYZkhYpNV29nDA3/Jlt3gElQ=; b=e2RQRPuT0PxjMOzDFvKIjgaqAknln0zP6exbmRVaSNF/W1QUa/6pYrCab5WZI/Lmdv SE1q2c6h1pohSEt7HCq9/ERx8E62+c0wc1i+0PQbwtBtMW/eoz2P40cX6qk8l7MMoLUN hO8jYZHq+9IbYS3ngMvsUOMGMxrLr3zs5Japedpsi9TZ13xAq4wSg2+OoBOLlPyJFKiQ 6lN64Qtg+8yRNqDz0YeuKMy5CvSU/U948gv/bML4zY5sDpQ/EpBnmuEjK6Kmxjj1gjCq a0UIdjBKM+PJNBmkUpzTvdiZ8WuYulvjV3uKVmaHf0HviykwXr2vSbZiFdGi5wfvF9pu EuTw== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g12-v6si13022204plt.304.2018.04.23.18.44.34; Mon, 23 Apr 2018 18:44:49 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S932739AbeDXBn2 (ORCPT + 99 others); Mon, 23 Apr 2018 21:43:28 -0400 Received: from mx3-rdu2.redhat.com ([66.187.233.73]:36460 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S932670AbeDXBnZ (ORCPT ); Mon, 23 Apr 2018 21:43:25 -0400 Received: from smtp.corp.redhat.com (int-mx03.intmail.prod.int.rdu2.redhat.com [10.11.54.3]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id 29580818533A; Tue, 24 Apr 2018 01:43:25 +0000 (UTC) Received: from redhat.com (ovpn-123-116.rdu2.redhat.com [10.10.123.116]) by smtp.corp.redhat.com (Postfix) with ESMTP id 7E1CD1134CD2; Tue, 24 Apr 2018 01:43:22 +0000 (UTC) Date: Tue, 24 Apr 2018 04:43:22 +0300 From: "Michael S. Tsirkin" To: Tiwei Bie Cc: Jason Wang , wexu@redhat.com, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, jfreimann@redhat.com Subject: Re: [RFC v2] virtio: support packed ring Message-ID: <20180424044250-mutt-send-email-mst@kernel.org> References: <20180401141216.8969-1-tiwei.bie@intel.com> <515e635b-bc80-9b8d-72f9-b390ae5103ec@redhat.com> <20180423092908.77rii3gi7dcaf7o6@debian> <20180424040258-mutt-send-email-mst@kernel.org> <20180424011638.vf6f22dnl7ufnnij@debian> <20180424042913-mutt-send-email-mst@kernel.org> <20180424013747.hmr4ytqe7gdqfhdt@debian> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: <20180424013747.hmr4ytqe7gdqfhdt@debian> X-Scanned-By: MIMEDefang 2.78 on 10.11.54.3 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Tue, 24 Apr 2018 01:43:25 +0000 (UTC) X-Greylist: inspected by milter-greylist-4.5.16 (mx1.redhat.com [10.11.55.8]); Tue, 24 Apr 2018 01:43:25 +0000 (UTC) for IP:'10.11.54.3' DOMAIN:'int-mx03.intmail.prod.int.rdu2.redhat.com' HELO:'smtp.corp.redhat.com' FROM:'mst@redhat.com' RCPT:'' Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, Apr 24, 2018 at 09:37:47AM +0800, Tiwei Bie wrote: > On Tue, Apr 24, 2018 at 04:29:51AM +0300, Michael S. Tsirkin wrote: > > On Tue, Apr 24, 2018 at 09:16:38AM +0800, Tiwei Bie wrote: > > > On Tue, Apr 24, 2018 at 04:05:07AM +0300, Michael S. Tsirkin wrote: > > > > On Tue, Apr 24, 2018 at 08:54:52AM +0800, Jason Wang wrote: > > > > > > > > > > > > > > > On 2018年04月23日 17:29, Tiwei Bie wrote: > > > > > > On Mon, Apr 23, 2018 at 01:42:14PM +0800, Jason Wang wrote: > > > > > > > On 2018年04月01日 22:12, Tiwei Bie wrote: > > > > > > > > Hello everyone, > > > > > > > > > > > > > > > > This RFC implements packed ring support for virtio driver. > > > > > > > > > > > > > > > > The code was tested with DPDK vhost (testpmd/vhost-PMD) implemented > > > > > > > > by Jens at http://dpdk.org/ml/archives/dev/2018-January/089417.html > > > > > > > > Minor changes are needed for the vhost code, e.g. to kick the guest. > > > > > > > > > > > > > > > > TODO: > > > > > > > > - Refinements and bug fixes; > > > > > > > > - Split into small patches; > > > > > > > > - Test indirect descriptor support; > > > > > > > > - Test/fix event suppression support; > > > > > > > > - Test devices other than net; > > > > > > > > > > > > > > > > RFC v1 -> RFC v2: > > > > > > > > - Add indirect descriptor support - compile test only; > > > > > > > > - Add event suppression supprt - compile test only; > > > > > > > > - Move vring_packed_init() out of uapi (Jason, MST); > > > > > > > > - Merge two loops into one in virtqueue_add_packed() (Jason); > > > > > > > > - Split vring_unmap_one() for packed ring and split ring (Jason); > > > > > > > > - Avoid using '%' operator (Jason); > > > > > > > > - Rename free_head -> next_avail_idx (Jason); > > > > > > > > - Add comments for virtio_wmb() in virtqueue_add_packed() (Jason); > > > > > > > > - Some other refinements and bug fixes; > > > > > > > > > > > > > > > > Thanks! > > > > > > > > > > > > > > > > Signed-off-by: Tiwei Bie > > > > > > > > --- > > > > > > > > drivers/virtio/virtio_ring.c | 1094 +++++++++++++++++++++++++++++------- > > > > > > > > include/linux/virtio_ring.h | 8 +- > > > > > > > > include/uapi/linux/virtio_config.h | 12 +- > > > > > > > > include/uapi/linux/virtio_ring.h | 61 ++ > > > > > > > > 4 files changed, 980 insertions(+), 195 deletions(-) > > > > > > > > > > > > > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > > > > > > > index 71458f493cf8..0515dca34d77 100644 > > > > > > > > --- a/drivers/virtio/virtio_ring.c > > > > > > > > +++ b/drivers/virtio/virtio_ring.c > > > > > > > > @@ -58,14 +58,15 @@ > > > > > > > [...] > > > > > > > > > > > > > > > + > > > > > > > > + if (vq->indirect) { > > > > > > > > + u32 len; > > > > > > > > + > > > > > > > > + desc = vq->desc_state[head].indir_desc; > > > > > > > > + /* Free the indirect table, if any, now that it's unmapped. */ > > > > > > > > + if (!desc) > > > > > > > > + goto out; > > > > > > > > + > > > > > > > > + len = virtio32_to_cpu(vq->vq.vdev, > > > > > > > > + vq->vring_packed.desc[head].len); > > > > > > > > + > > > > > > > > + BUG_ON(!(vq->vring_packed.desc[head].flags & > > > > > > > > + cpu_to_virtio16(vq->vq.vdev, VRING_DESC_F_INDIRECT))); > > > > > > > It looks to me spec does not force to keep VRING_DESC_F_INDIRECT here. So we > > > > > > > can safely remove this BUG_ON() here. > > > > > > > > > > > > > > > + BUG_ON(len == 0 || len % sizeof(struct vring_packed_desc)); > > > > > > > Len could be ignored for used descriptor according to the spec, so we need > > > > > > > remove this BUG_ON() too. > > > > > > Yeah, you're right! The BUG_ON() isn't right. I'll remove it. > > > > > > And I think something related to this in the spec isn't very > > > > > > clear currently. > > > > > > > > > > > > In the spec, there are below words: > > > > > > > > > > > > https://github.com/oasis-tcs/virtio-spec/blob/d4fec517dfcf/packed-ring.tex#L272 > > > > > > """ > > > > > > In descriptors with VIRTQ_DESC_F_INDIRECT set VIRTQ_DESC_F_WRITE > > > > > > is reserved and is ignored by the device. > > > > > > """ > > > > > > > > > > > > So when device writes back an used descriptor in this case, > > > > > > device may not set the VIRTQ_DESC_F_WRITE flag as the flag > > > > > > is reserved and should be ignored. > > > > > > > > > > > > https://github.com/oasis-tcs/virtio-spec/blob/d4fec517dfcf/packed-ring.tex#L170 > > > > > > """ > > > > > > Element Length is reserved for used descriptors without the > > > > > > VIRTQ_DESC_F_WRITE flag, and is ignored by drivers. > > > > > > """ > > > > > > > > > > > > And this is the way how driver ignores the `len` in an used > > > > > > descriptor. > > > > > > > > > > > > https://github.com/oasis-tcs/virtio-spec/blob/d4fec517dfcf/packed-ring.tex#L241 > > > > > > """ > > > > > > To increase ring capacity the driver can store a (read-only > > > > > > by the device) table of indirect descriptors anywhere in memory, > > > > > > and insert a descriptor in the main virtqueue (with \field{Flags} > > > > > > bit VIRTQ_DESC_F_INDIRECT on) that refers to a buffer element > > > > > > containing this indirect descriptor table; > > > > > > """ > > > > > > > > > > > > So the indirect descriptors in the table are read-only by > > > > > > the device. And the only descriptor which is writeable by > > > > > > the device is the descriptor in the main virtqueue (with > > > > > > Flags bit VIRTQ_DESC_F_INDIRECT on). So if we ignore the > > > > > > `len` in this descriptor, we won't be able to get the > > > > > > length of the data written by the device. > > > > > > > > > > > > So I think the `len` in this descriptor will carry the > > > > > > length of the data written by the device (if the buffers > > > > > > are writable to the device) even if the VIRTQ_DESC_F_WRITE > > > > > > isn't set by the device. How do you think? > > > > > > > > > > Yes I think so. But we'd better need clarification from Michael. > > > > > > > > I think if you use a descriptor, and you want to supply len > > > > to guest, you set VIRTQ_DESC_F_WRITE in the used descriptor. > > > > Spec also says you must not set VIRTQ_DESC_F_INDIRECT then. > > > > If that's a problem we could look at relaxing that last requirement - > > > > does driver want INDIRECT in used descriptor to match > > > > the value in the avail descriptor for some reason? > > > > > > For indirect, driver needs some way to get the length > > > of the data written by the driver. And the descriptors > > > in the indirect table is read-only, so the only place > > > device could put this value is the descriptor with the > > > VIRTQ_DESC_F_INDIRECT flag set. > > > > when writing out used descriptor, device should set VIRTQ_DESC_F_WRITE > > (and clear VIRTQ_DESC_F_INDIRECT). > > So the spec allows device to set VIRTQ_DESC_F_WRITE bit > when writing out an used descriptor even if the corresponding > descriptors it just parsed don't have the VIRTQ_DESC_F_WRITE > bit set? > > Best regards, > Tiwei Bie I think so. In a used descriptor, VIRTQ_DESC_F_WRITE just means length is valid. -- MST