Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp404585rdb; Thu, 30 Nov 2023 07:51:01 -0800 (PST) X-Google-Smtp-Source: AGHT+IEpVnFAv5H6CkxFyEpbtaPXM/UJ2ALMM9Zpk3UTpLXdZUOnesNwTm5OS25raoV8aWqU6Bic X-Received: by 2002:a17:902:c653:b0:1ce:5ca7:1070 with SMTP id s19-20020a170902c65300b001ce5ca71070mr22644252pls.16.1701359460627; Thu, 30 Nov 2023 07:51:00 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701359460; cv=none; d=google.com; s=arc-20160816; b=dv4PRBzaqEdH53CgS3a0AYUXoYMJtzki2Yy33ax9a0SsTbupaM6AVbAptzLE2CLedp QnDDXh1gtbOD9GGdKsyEk8ftssbvBCvXRbkEvynkdRPLZ++GtrNznM0hrhPAdHB09sHd 3E+WNLcS/8A5t62YWQAf+6eguWWcCx5AgCFV3r/IolZt4iDcihInD5yVW6LIz3km626F /YAopx75eg9sUUaFgEuCXsnisTesaCPSFNFpjelkWgfJ4ScOXyU8hAJpmx3dFaKXZiXC BX13I1HTKA3FredbiEoHYSwGV19UC+wL9Nz+5C2crfkPNhIgLXw1NfatrfN3tQL4RVqR CD7A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-filter; bh=GPspWvvW9bTH7lAgniND5YEprjoaTp1JsWWZlfyZifw=; fh=EJzIx9Irl6RtpVJ3AQLPCQ6E60aA27nrAkHsJNNeSA8=; b=g8qBOIIcs/Gl2JSrZv8MPtRi6S7LWR+yEHJ6g2OyYhn2lp9Apx5wzPkUMWdTr+mvUo 4pC5TC/hdnEoshkTty6C/J9Zjn6V/2a2GH4KFhlPitUTJF6P+u1/MFfuv2f/3tMi2tkF fqkgYCi3ZFIY91WTqeYMSZ/w6IrB+sYim+Zb0Z3n7Mb0i13T9/F3Z64yyud5siWv9Asr gnlgvmoLh++eiJ58Vo9g4FdrdGLxMiPEjT+B8+ygK8gQDptHRVRUhibkQBwXDTH+8ev8 pTZCDjhLftGFI9iBTJT/iaGkbxFH4sFvFexOeva7UzWLJE5DGHlHM4AT5AUBKqJuIR0S wsKA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@salutedevices.com header.s=mail header.b=ccQ32oTx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=salutedevices.com Return-Path: Received: from morse.vger.email (morse.vger.email. [23.128.96.31]) by mx.google.com with ESMTPS id c7-20020a170902d48700b001c430af53b8si1507141plg.574.2023.11.30.07.50.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 07:51:00 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) client-ip=23.128.96.31; Authentication-Results: mx.google.com; dkim=pass header.i=@salutedevices.com header.s=mail header.b=ccQ32oTx; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.31 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=salutedevices.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by morse.vger.email (Postfix) with ESMTP id 019F58095F4C; Thu, 30 Nov 2023 07:50:13 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at morse.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S235215AbjK3Pt4 (ORCPT + 99 others); Thu, 30 Nov 2023 10:49:56 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:59294 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S232208AbjK3Ptz (ORCPT ); Thu, 30 Nov 2023 10:49:55 -0500 Received: from mx1.sberdevices.ru (mx2.sberdevices.ru [45.89.224.132]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 651AFD4A; Thu, 30 Nov 2023 07:49:59 -0800 (PST) Received: from p-infra-ksmg-sc-msk02 (localhost [127.0.0.1]) by mx1.sberdevices.ru (Postfix) with ESMTP id B72E912001D; Thu, 30 Nov 2023 18:49:56 +0300 (MSK) DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.sberdevices.ru B72E912001D DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=salutedevices.com; s=mail; t=1701359396; bh=GPspWvvW9bTH7lAgniND5YEprjoaTp1JsWWZlfyZifw=; h=Message-ID:Date:MIME-Version:Subject:To:From:Content-Type:From; b=ccQ32oTxDnCS4PBVSk9uB+qXD5NZDVetvjG2tz/iG6rqpBSxa6lE7FPTHkmEjKWC3 L5/p7VnChZ7J8YeaPoJpg/MyJh06+VAmKeBteLGAkZ2Xcsqo859mNIYv5UAcrEJ05+ +r3nVuAr3mFCApHazDV75mHWI8GsDh5GTDis2Xrz2BQyObPgE2B9pAQmIRbd9l2pP9 fzIWebEAeoA2Oahh7Xq60TUnZN69XeODfS0rWkyeXtpnhIkvJyNyn+7f4rIGuabE+m TvsvoG3Zd3ZU8xypfP7vC+gZDop1zP7QQf2KltdwxZrCEF5BGgD51cUxp93wTWDQaO 8nb5Urs781UkQ== Received: from p-i-exch-sc-m01.sberdevices.ru (p-i-exch-sc-m01.sberdevices.ru [172.16.192.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.sberdevices.ru (Postfix) with ESMTPS; Thu, 30 Nov 2023 18:49:54 +0300 (MSK) Received: from [192.168.0.106] (100.64.160.123) by p-i-exch-sc-m01.sberdevices.ru (172.16.192.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Thu, 30 Nov 2023 18:49:54 +0300 Message-ID: Date: Thu, 30 Nov 2023 18:41:56 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.7.1 Subject: Re: [PATCH net-next v5 2/3] virtio/vsock: send credit update during setting SO_RCVLOWAT Content-Language: en-US To: Stefano Garzarella , "Michael S. Tsirkin" CC: Stefan Hajnoczi , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Jason Wang , Bobby Eshleman , , , , , , References: <20231130130840.253733-1-avkrasnov@salutedevices.com> <20231130130840.253733-3-avkrasnov@salutedevices.com> <20231130084044-mutt-send-email-mst@kernel.org> <02de8982-ec4a-b3b2-e8e5-1bca28cfc01b@salutedevices.com> <20231130085445-mutt-send-email-mst@kernel.org> From: Arseniy Krasnov In-Reply-To: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [100.64.160.123] X-ClientProxiedBy: p-i-exch-sc-m02.sberdevices.ru (172.16.192.103) To p-i-exch-sc-m01.sberdevices.ru (172.16.192.107) X-KSMG-Rule-ID: 10 X-KSMG-Message-Action: clean X-KSMG-AntiSpam-Lua-Profiles: 181744 [Nov 30 2023] X-KSMG-AntiSpam-Version: 6.0.0.2 X-KSMG-AntiSpam-Envelope-From: avkrasnov@salutedevices.com X-KSMG-AntiSpam-Rate: 0 X-KSMG-AntiSpam-Status: not_detected X-KSMG-AntiSpam-Method: none X-KSMG-AntiSpam-Auth: dkim=none X-KSMG-AntiSpam-Info: LuaCore: 5 0.3.5 98d108ddd984cca1d7e65e595eac546a62b0144b, {Tracking_uf_ne_domains}, {Tracking_from_domain_doesnt_match_to}, 100.64.160.123:7.1.2;127.0.0.199:7.1.2;p-i-exch-sc-m01.sberdevices.ru:7.1.1,5.0.1;salutedevices.com:7.1.1;d41d8cd98f00b204e9800998ecf8427e.com:7.1.1;lore.kernel.org:7.1.1, FromAlignment: s, ApMailHostAddress: 100.64.160.123 X-MS-Exchange-Organization-SCL: -1 X-KSMG-AntiSpam-Interceptor-Info: scan successful X-KSMG-AntiPhishing: Clean, bases: 2023/11/30 10:41:00 X-KSMG-LinksScanning: Clean, bases: 2023/11/30 14:39:00 X-KSMG-AntiVirus: Kaspersky Secure Mail Gateway, version 2.0.1.6960, bases: 2023/11/30 13:53:00 #22585260 X-KSMG-AntiVirus-Status: Clean, skipped X-Spam-Status: No, score=-3.0 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on morse.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (morse.vger.email [0.0.0.0]); Thu, 30 Nov 2023 07:50:14 -0800 (PST) On 30.11.2023 17:11, Stefano Garzarella wrote: > On Thu, Nov 30, 2023 at 08:58:58AM -0500, Michael S. Tsirkin wrote: >> On Thu, Nov 30, 2023 at 04:43:34PM +0300, Arseniy Krasnov wrote: >>> >>> >>> On 30.11.2023 16:42, Michael S. Tsirkin wrote: >>> > On Thu, Nov 30, 2023 at 04:08:39PM +0300, Arseniy Krasnov wrote: >>> >> Send credit update message when SO_RCVLOWAT is updated and it is bigger >>> >> than number of bytes in rx queue. It is needed, because 'poll()' will >>> >> wait until number of bytes in rx queue will be not smaller than >>> >> SO_RCVLOWAT, so kick sender to send more data. Otherwise mutual hungup >>> >> for tx/rx is possible: sender waits for free space and receiver is >>> >> waiting data in 'poll()'. >>> >> >>> >> Signed-off-by: Arseniy Krasnov >>> >> --- >>> >>  Changelog: >>> >>  v1 -> v2: >>> >>   * Update commit message by removing 'This patch adds XXX' manner. >>> >>   * Do not initialize 'send_update' variable - set it directly during >>> >>     first usage. >>> >>  v3 -> v4: >>> >>   * Fit comment in 'virtio_transport_notify_set_rcvlowat()' to 80 chars. >>> >>  v4 -> v5: >>> >>   * Do not change callbacks order in transport structures. >>> >> >>> >>  drivers/vhost/vsock.c                   |  1 + >>> >>  include/linux/virtio_vsock.h            |  1 + >>> >>  net/vmw_vsock/virtio_transport.c        |  1 + >>> >>  net/vmw_vsock/virtio_transport_common.c | 27 +++++++++++++++++++++++++ >>> >>  net/vmw_vsock/vsock_loopback.c          |  1 + >>> >>  5 files changed, 31 insertions(+) >>> >> >>> >> diff --git a/drivers/vhost/vsock.c b/drivers/vhost/vsock.c >>> >> index f75731396b7e..4146f80db8ac 100644 >>> >> --- a/drivers/vhost/vsock.c >>> >> +++ b/drivers/vhost/vsock.c >>> >> @@ -451,6 +451,7 @@ static struct virtio_transport vhost_transport = { >>> >>          .notify_buffer_size       = virtio_transport_notify_buffer_size, >>> >> >>> >>          .read_skb = virtio_transport_read_skb, >>> >> +        .notify_set_rcvlowat      = virtio_transport_notify_set_rcvlowat >>> >>      }, >>> >> >>> >>      .send_pkt = vhost_transport_send_pkt, >>> >> diff --git a/include/linux/virtio_vsock.h b/include/linux/virtio_vsock.h >>> >> index ebb3ce63d64d..c82089dee0c8 100644 >>> >> --- a/include/linux/virtio_vsock.h >>> >> +++ b/include/linux/virtio_vsock.h >>> >> @@ -256,4 +256,5 @@ void virtio_transport_put_credit(struct virtio_vsock_sock *vvs, u32 credit); >>> >>  void virtio_transport_deliver_tap_pkt(struct sk_buff *skb); >>> >>  int virtio_transport_purge_skbs(void *vsk, struct sk_buff_head *list); >>> >>  int virtio_transport_read_skb(struct vsock_sock *vsk, skb_read_actor_t read_actor); >>> >> +int virtio_transport_notify_set_rcvlowat(struct vsock_sock *vsk, int val); >>> >>  #endif /* _LINUX_VIRTIO_VSOCK_H */ >>> >> diff --git a/net/vmw_vsock/virtio_transport.c b/net/vmw_vsock/virtio_transport.c >>> >> index af5bab1acee1..8007593a3a93 100644 >>> >> --- a/net/vmw_vsock/virtio_transport.c >>> >> +++ b/net/vmw_vsock/virtio_transport.c >>> >> @@ -539,6 +539,7 @@ static struct virtio_transport virtio_transport = { >>> >>          .notify_buffer_size       = virtio_transport_notify_buffer_size, >>> >> >>> >>          .read_skb = virtio_transport_read_skb, >>> >> +        .notify_set_rcvlowat      = virtio_transport_notify_set_rcvlowat >>> >>      }, >>> >> >>> >>      .send_pkt = virtio_transport_send_pkt, >>> >> diff --git a/net/vmw_vsock/virtio_transport_common.c b/net/vmw_vsock/virtio_transport_common.c >>> >> index f6dc896bf44c..1cb556ad4597 100644 >>> >> --- a/net/vmw_vsock/virtio_transport_common.c >>> >> +++ b/net/vmw_vsock/virtio_transport_common.c >>> >> @@ -1684,6 +1684,33 @@ int virtio_transport_read_skb(struct vsock_sock *vsk, skb_read_actor_t recv_acto >>> >>  } >>> >>  EXPORT_SYMBOL_GPL(virtio_transport_read_skb); >>> >> >>> >> +int virtio_transport_notify_set_rcvlowat(struct vsock_sock *vsk, >> int val) >>> >> +{ >>> >> +    struct virtio_vsock_sock *vvs = vsk->trans; >>> >> +    bool send_update; >>> >> + >>> >> +    spin_lock_bh(&vvs->rx_lock); >>> >> + >>> >> +    /* If number of available bytes is less than new SO_RCVLOWAT value, >>> >> +     * kick sender to send more data, because sender may sleep in >> its >>> >> +     * 'send()' syscall waiting for enough space at our side. >>> >> +     */ >>> >> +    send_update = vvs->rx_bytes < val; >>> >> + >>> >> +    spin_unlock_bh(&vvs->rx_lock); >>> >> + >>> >> +    if (send_update) { >>> >> +        int err; >>> >> + >>> >> +        err = virtio_transport_send_credit_update(vsk); >>> >> +        if (err < 0) >>> >> +            return err; >>> >> +    } >>> >> + >>> >> +    return 0; >>> >> +} >>> > >>> > >>> > I find it strange that this will send a credit update >>> > even if nothing changed since this was called previously. >>> > I'm not sure whether this is a problem protocol-wise, >>> > but it certainly was not envisioned when the protocol was >>> > built. WDYT? >>> >>> >From virtio spec I found: >>> >>> It is also valid to send a VIRTIO_VSOCK_OP_CREDIT_UPDATE packet without previously receiving a >>> VIRTIO_VSOCK_OP_CREDIT_REQUEST packet. This allows communicating updates any time a change >>> in buffer space occurs. >>> So I guess there is no limitations to send such type of packet, e.g. it is not >>> required to be a reply for some another packet. Please, correct me if im wrong. >>> >>> Thanks, Arseniy >> >> >> Absolutely. My point was different - with this patch it is possible >> that you are not adding any credits at all since the previous >> VIRTIO_VSOCK_OP_CREDIT_UPDATE. > > I think the problem we're solving here is that since as an optimization we avoid sending the update for every byte we consume, but we put a threshold, then we make sure we update the peer. > > A credit update contains a snapshot and sending it the same as the previous one should not create any problem. > > My doubt now is that we only do this when we set RCVLOWAT , should we also do something when we consume bytes to avoid the optimization we have? @Michael, Stefano just reproduced problem during bytes reading, but there is already old fix for this, which we forget to merge:) I think it must be included to this patchset. https://lore.kernel.org/netdev/f304eabe-d2ef-11b1-f115-6967632f0339@sberdevices.ru/ Thanks, Arseniy > > Stefano >