Received: by 2002:a05:6a10:f347:0:0:0:0 with SMTP id d7csp1715957pxu; Fri, 27 Nov 2020 13:33:45 -0800 (PST) X-Google-Smtp-Source: ABdhPJyxidnVPT3CJ/FFv5v/uTa1OZPfZE/GeGyGkYWRNL5Z40yJYfKYuWNF/G9icoOndU5wqHeJ X-Received: by 2002:a17:906:1e0c:: with SMTP id g12mr10075123ejj.115.1606512824841; Fri, 27 Nov 2020 13:33:44 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1606512824; cv=none; d=google.com; s=arc-20160816; b=X51x9aBbZOiE7CZjqJDBbDyGGk3NGuSomoGa3z5VbAN8PNZCTMSN78HiEBbfevtSW5 RXJndbnJEC1vCoBotttkToqFK14saNBm9uC6yXnrn4fq46kc7AgVvxoBgYODXNCU2eux 0eFqL1jN4pl2+o2FzRk5OG51aSBVPwNnLGSre/95rLkJ4Ug14OZ28W+J6mkapBrMVLRw eYP/VkWnpUHDgMm+46EZ/cQhulP+e8Kj4i58W+RnaG4/j1NbGNyQtTTUwumoRycdvK/2 VjEHkUfWSQWdSXAAjh7FDzHO1j0vG+9GH0WjdoP2UJ8M5SLshzJGk1AkZURRMERjbCEU 2oWA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:content-language :in-reply-to:mime-version:user-agent:date:message-id:from:references :cc:to:subject; bh=VPSpXnrJLBY66Z2kynZKEzwf0Fpo0NT8Jy+iO8CcpU4=; b=nzaii0K1VSZR/bGPPOND0DRVXv6H8wayE8d0RpjzN9TjmjLWjk7yETDSVtiWiy5Sz2 qJiwljEa4xnsl8ssNTbWRXT/hxcC+omU4U94SEylGLFS5CNYAiKraHSrTm3dSQ85TEQt RW30TfCAQQ8Ub7/+9v4P1h5Lt/RgNkuVn/QKfW0Lu/Uzm5FAfy5EuIkelbM3QKlvXyGF lLCkmwCTzM/zCy2XJBZkDwiPpP1MvbCc7qZHw5vGfy0bhrRedAfsUfDgFWwhd+w/CZi8 S7mPlib9zso0ciCsAjkcvHcCEVLvZsvcG4VuRcufEoHlobjENa9P7d9qj/TNCyzoyjJR h+Dg== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id p23si6114664ejm.470.2020.11.27.13.33.21; Fri, 27 Nov 2020 13:33:44 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730724AbgK0VbJ (ORCPT + 99 others); Fri, 27 Nov 2020 16:31:09 -0500 Received: from www62.your-server.de ([213.133.104.62]:36840 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727468AbgK0V37 (ORCPT ); Fri, 27 Nov 2020 16:29:59 -0500 Received: from sslproxy03.your-server.de ([88.198.220.132]) by www62.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92.3) (envelope-from ) id 1kilJD-0003hM-2h; Fri, 27 Nov 2020 22:29:39 +0100 Received: from [85.7.101.30] (helo=pc-9.home) by sslproxy03.your-server.de with esmtpsa (TLSv1.3:TLS_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1kilJC-000JbS-Nu; Fri, 27 Nov 2020 22:29:38 +0100 Subject: Re: [PATCH bpf v2 2/2] xsk: change the tx writeable condition To: Xuan Zhuo , magnus.karlsson@gmail.com Cc: =?UTF-8?B?QmrDtnJuIFTDtnBlbA==?= , Magnus Karlsson , Jonathan Lemon , "David S. Miller" , Jakub Kicinski , Alexei Starovoitov , Jesper Dangaard Brouer , John Fastabend , Martin KaFai Lau , Song Liu , Yonghong Song , Andrii Nakryiko , KP Singh , "open list:XDP SOCKETS (AF_XDP)" , "open list:XDP SOCKETS (AF_XDP)" , open list References: <4fd58d473f4548dc6e9e24ea9876c802d5d584b4.1606285978.git.xuanzhuo@linux.alibaba.com> From: Daniel Borkmann Message-ID: <15bae73e-e753-123a-7535-0ab5c1178b40@iogearbox.net> Date: Fri, 27 Nov 2020 22:29:37 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: <4fd58d473f4548dc6e9e24ea9876c802d5d584b4.1606285978.git.xuanzhuo@linux.alibaba.com> Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.102.4/26001/Fri Nov 27 14:45:56 2020) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 11/25/20 7:48 AM, Xuan Zhuo wrote: > Modify the tx writeable condition from the queue is not full to the > number of present tx queues is less than the half of the total number > of queues. Because the tx queue not full is a very short time, this will > cause a large number of EPOLLOUT events, and cause a large number of > process wake up. > > Signed-off-by: Xuan Zhuo This one doesn't apply cleanly against bpf tree, please rebase. Small comment inline while looking over the patch: > --- > net/xdp/xsk.c | 16 +++++++++++++--- > net/xdp/xsk_queue.h | 6 ++++++ > 2 files changed, 19 insertions(+), 3 deletions(-) > > diff --git a/net/xdp/xsk.c b/net/xdp/xsk.c > index 0df8651..22e35e9 100644 > --- a/net/xdp/xsk.c > +++ b/net/xdp/xsk.c > @@ -211,6 +211,14 @@ static int __xsk_rcv(struct xdp_sock *xs, struct xdp_buff *xdp, u32 len, > return 0; > } > > +static bool xsk_tx_writeable(struct xdp_sock *xs) > +{ > + if (xskq_cons_present_entries(xs->tx) > xs->tx->nentries / 2) > + return false; > + > + return true; > +} > + > static bool xsk_is_bound(struct xdp_sock *xs) > { > if (READ_ONCE(xs->state) == XSK_BOUND) { > @@ -296,7 +304,8 @@ void xsk_tx_release(struct xsk_buff_pool *pool) > rcu_read_lock(); > list_for_each_entry_rcu(xs, &pool->xsk_tx_list, tx_list) { > __xskq_cons_release(xs->tx); > - xs->sk.sk_write_space(&xs->sk); > + if (xsk_tx_writeable(xs)) > + xs->sk.sk_write_space(&xs->sk); > } > rcu_read_unlock(); > } > @@ -499,7 +508,8 @@ static int xsk_generic_xmit(struct sock *sk) > > out: > if (sent_frame) > - sk->sk_write_space(sk); > + if (xsk_tx_writeable(xs)) > + sk->sk_write_space(sk); > > mutex_unlock(&xs->mutex); > return err; > @@ -556,7 +566,7 @@ static __poll_t xsk_poll(struct file *file, struct socket *sock, > > if (xs->rx && !xskq_prod_is_empty(xs->rx)) > mask |= EPOLLIN | EPOLLRDNORM; > - if (xs->tx && !xskq_cons_is_full(xs->tx)) > + if (xs->tx && xsk_tx_writeable(xs)) > mask |= EPOLLOUT | EPOLLWRNORM; > > return mask; > diff --git a/net/xdp/xsk_queue.h b/net/xdp/xsk_queue.h > index b936c46..b655004 100644 > --- a/net/xdp/xsk_queue.h > +++ b/net/xdp/xsk_queue.h > @@ -307,6 +307,12 @@ static inline bool xskq_cons_is_full(struct xsk_queue *q) > q->nentries; > } > > +static inline __u64 xskq_cons_present_entries(struct xsk_queue *q) Types prefixed with __ are mainly for user-space facing things like uapi headers, so in-kernel should be u64. Is there a reason this is not done as u32 (and thus same as producer and producer)? > +{ > + /* No barriers needed since data is not accessed */ > + return READ_ONCE(q->ring->producer) - READ_ONCE(q->ring->consumer); > +} > + > /* Functions for producers */ > > static inline u32 xskq_prod_nb_free(struct xsk_queue *q, u32 max) >