Received: by 2002:a05:7412:b10a:b0:f3:1519:9f41 with SMTP id az10csp488788rdb; Thu, 30 Nov 2023 09:49:59 -0800 (PST) X-Google-Smtp-Source: AGHT+IED8FDUs7X6x5lRcEzAIw/qBsyIbPCyE9ijiLVDC5vDblCNlG9ZTT5FxVyOsyRZtQNe4sY1 X-Received: by 2002:a05:6a00:1797:b0:6be:334c:6fd1 with SMTP id s23-20020a056a00179700b006be334c6fd1mr27103705pfg.26.1701366599577; Thu, 30 Nov 2023 09:49:59 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1701366599; cv=none; d=google.com; s=arc-20160816; b=mUU7JaU1jQwqb+KvT7x8zDvkLOI2v6tHviMupfjMTQ5iASbW+OB8qqW9iv7mCR22IA 9h4qqWGclkcgRtbdiV87k6GVsso3di/3cOaqyh2/uLzaLumzEmS8QgAB8pF8JLKUR2kl /dGX4wtDT4uZ00c8hX505JMl4lv+T4s+dyzPrDlJLUtkHIsvWgSiVHoPSKgvIYakd6SG IzENKhV/YVln4IQlXKKHRS9kcaIpr6WArY0YAEIJr7gE1N3kxh8yZztZtIoDtSqwsR8E e2XmrMv2CVhwP1zl5Qops5DQ/HkH6Z7Kut/eudkYenf75mdBdOJ3D4Z2RWF2lavnrgeN bNmg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:message-id:subject:cc:to:from:date:dkim-signature; bh=RZA0GAnzMmQmnt7J4v4F0BWd31On6guabFGK6t1c+KI=; fh=Byr09h+pb1qvbbK9RaQV3iPvS8SLIiLJRvf1hmRMt4s=; b=MQdusnQUszFruDm+lB0PnVSLrHQ7q2DvuYNKl/GzYgdnUDARmNWoV0glHSLD9PNajR Tg/fmsLkFiVxQ2WsPwamHV7KvSRFCstJ2u5/qwprjfq9NCotu9MKa8yO/TJOUxEPYTjp dnO1ahqO6s6zOHd0xBa+9mHOmX2FY9ok2+fUDgJUp3vIxA7VuzfaeYW0Aslnw90IMedA YCYdD5rk4cjfuYhslJUUO6phFmL7vlbhdBDcUFz71ZmxTbzdvE9UIhjGCYVUqJbwFBjO IvyFwtrok0SjdU9p6xNipEdb8dmkebAxRt1aQRzkpsrPcKbkJQzu8Jo1Z8EjNlWmzX1I Nxng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Vn+Q4i7z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id i14-20020a63220e000000b00578b63123desi1751958pgi.789.2023.11.30.09.49.59 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 09:49:59 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Vn+Q4i7z; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id C8DDB82CC45C; Thu, 30 Nov 2023 09:49:54 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346520AbjK3Rtf (ORCPT + 99 others); Thu, 30 Nov 2023 12:49:35 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37996 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230045AbjK3Rte (ORCPT ); Thu, 30 Nov 2023 12:49:34 -0500 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6CE2091 for ; Thu, 30 Nov 2023 09:49:40 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1701366579; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=RZA0GAnzMmQmnt7J4v4F0BWd31On6guabFGK6t1c+KI=; b=Vn+Q4i7zfhrvBwiieMxCZSGfP2EIQYw0g9QatyZ3Lusqwk5iWnrqXaO5oihG6bSESXAlF+ P7OL9FHaeJGZoboKpEJ+bLogIZU5b+0Ugq9N6fz+z3ekzqlr0p4ccuTkwIL8W4j3Dik6+u 7eoWLaOs6rjR5h8oC8ZBsapTCxOswa0= Received: from mail-ed1-f71.google.com (mail-ed1-f71.google.com [209.85.208.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-412-JTJahpqPOoaH2Y7nPiF6eg-1; Thu, 30 Nov 2023 12:49:38 -0500 X-MC-Unique: JTJahpqPOoaH2Y7nPiF6eg-1 Received: by mail-ed1-f71.google.com with SMTP id 4fb4d7f45d1cf-543f45ab457so921249a12.1 for ; Thu, 30 Nov 2023 09:49:37 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1701366576; x=1701971376; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=RZA0GAnzMmQmnt7J4v4F0BWd31On6guabFGK6t1c+KI=; b=lIU9zbjn2bQtGgl5Yclm7MqmMgDj+enPFsWiYJd8pRdjDSvZJ50HP/g1gHecxAWIIo 254ACDY4exhPrSv6Cw5gYS72xTOmkIWlWZEh+Z29FVZbMNEDWFJlkYkqlo+pUk8Iksp5 XFxqa0Xbq0w65B09qf2/AVguxdMBq5OH3t5TcVtRSAZhkF6DrdffnqukBEDAm0LerEvU IXS5BTtbM0r+89XB/NM7X4r3qXM5HMbgylIWVfPJmeS0/VZJaSV1Av4r9iDrSK8hp9JU 1lQ91oqldDmJpESB3QC0uJJizXma9A9kaYgmjrbWBcxscqL4Ad8p1L2nREVZpqTpXAoO 3r2g== X-Gm-Message-State: AOJu0YxDaBhMrwSmlmmOtT36811eX5JceNYcMPzVu/1p8pYRzfiTCdqw u+G2xnqRi15KNKNG2BKvRmt/iZUcOA5mMZ7wv7RzG+NOZBfAaHjH1ntaMSke/69ZsVhV0/PHc3y TODDSLpySUlTnVsaSZ+AwjF4XxvSgl0Xi X-Received: by 2002:a50:9ea7:0:b0:54b:e77:5dda with SMTP id a36-20020a509ea7000000b0054b0e775ddamr164247edf.3.1701366576235; Thu, 30 Nov 2023 09:49:36 -0800 (PST) X-Received: by 2002:a05:600c:4e87:b0:40b:4fd5:2b31 with SMTP id f7-20020a05600c4e8700b0040b4fd52b31mr2100wmq.36.1701366048081; Thu, 30 Nov 2023 09:40:48 -0800 (PST) Received: from redhat.com ([2.55.10.128]) by smtp.gmail.com with ESMTPSA id n26-20020a05600c3b9a00b0040b34409d43sm2727966wms.11.2023.11.30.09.40.45 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Nov 2023 09:40:47 -0800 (PST) Date: Thu, 30 Nov 2023 12:40:43 -0500 From: "Michael S. Tsirkin" To: Stefano Garzarella Cc: Arseniy Krasnov , Stefan Hajnoczi , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Jason Wang , Bobby Eshleman , kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, kernel@sberdevices.ru, oxffffaa@gmail.com Subject: Re: [PATCH net-next v5 2/3] virtio/vsock: send credit update during setting SO_RCVLOWAT Message-ID: <20231130123815-mutt-send-email-mst@kernel.org> References: <20231130130840.253733-1-avkrasnov@salutedevices.com> <20231130130840.253733-3-avkrasnov@salutedevices.com> <20231130084044-mutt-send-email-mst@kernel.org> <02de8982-ec4a-b3b2-e8e5-1bca28cfc01b@salutedevices.com> <20231130085445-mutt-send-email-mst@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-0.9 required=5.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Thu, 30 Nov 2023 09:49:55 -0800 (PST) On Thu, Nov 30, 2023 at 03:11:19PM +0100, Stefano Garzarella wrote: > On Thu, Nov 30, 2023 at 08:58:58AM -0500, Michael S. Tsirkin wrote: > > On Thu, Nov 30, 2023 at 04:43:34PM +0300, Arseniy Krasnov wrote: > > > > > > > > > On 30.11.2023 16:42, Michael S. Tsirkin wrote: > > > > On Thu, Nov 30, 2023 at 04:08:39PM +0300, Arseniy Krasnov wrote: > > > >> Send credit update message when SO_RCVLOWAT is updated and it is bigger > > > >> than number of bytes in rx queue. It is needed, because 'poll()' will > > > >> wait until number of bytes in rx queue will be not smaller than > > > >> SO_RCVLOWAT, so kick sender to send more data. Otherwise mutual hungup > > > >> for tx/rx is possible: sender waits for free space and receiver is > > > >> waiting data in 'poll()'. > > > >> > > > >> Signed-off-by: Arseniy Krasnov > > > >> --- > > > >> Changelog: > > > >> v1 -> v2: > > > >> * Update commit message by removing 'This patch adds XXX' manner. > > > >> * Do not initialize 'send_update' variable - set it directly during > > > >> first usage. > > > >> v3 -> v4: > > > >> * Fit comment in 'virtio_transport_notify_set_rcvlowat()' to 80 chars. > > > >> v4 -> v5: > > > >> * Do not change callbacks order in transport structures. > > > >> > > > >> drivers/vhost/vsock.c | 1 + > > > >> include/linux/virtio_vsock.h | 1 + > > > >> net/vmw_vsock/virtio_transport.c | 1 + > > > >> net/vmw_vsock/virtio_transport_common.c | 27 +++++++++++++++++++++++++ > > > >> net/vmw_vsock/vsock_loopback.c | 1 + > > > >> 5 files changed, 31 insertions(+) > > > >> > > > >> diff --git a/drivers/vhost/vsock.c b/drivers/vhost/vsock.c > > > >> index f75731396b7e..4146f80db8ac 100644 > > > >> --- a/drivers/vhost/vsock.c > > > >> +++ b/drivers/vhost/vsock.c > > > >> @@ -451,6 +451,7 @@ static struct virtio_transport vhost_transport = { > > > >> .notify_buffer_size = virtio_transport_notify_buffer_size, > > > >> > > > >> .read_skb = virtio_transport_read_skb, > > > >> + .notify_set_rcvlowat = virtio_transport_notify_set_rcvlowat > > > >> }, > > > >> > > > >> .send_pkt = vhost_transport_send_pkt, > > > >> diff --git a/include/linux/virtio_vsock.h b/include/linux/virtio_vsock.h > > > >> index ebb3ce63d64d..c82089dee0c8 100644 > > > >> --- a/include/linux/virtio_vsock.h > > > >> +++ b/include/linux/virtio_vsock.h > > > >> @@ -256,4 +256,5 @@ void virtio_transport_put_credit(struct virtio_vsock_sock *vvs, u32 credit); > > > >> void virtio_transport_deliver_tap_pkt(struct sk_buff *skb); > > > >> int virtio_transport_purge_skbs(void *vsk, struct sk_buff_head *list); > > > >> int virtio_transport_read_skb(struct vsock_sock *vsk, skb_read_actor_t read_actor); > > > >> +int virtio_transport_notify_set_rcvlowat(struct vsock_sock *vsk, int val); > > > >> #endif /* _LINUX_VIRTIO_VSOCK_H */ > > > >> diff --git a/net/vmw_vsock/virtio_transport.c b/net/vmw_vsock/virtio_transport.c > > > >> index af5bab1acee1..8007593a3a93 100644 > > > >> --- a/net/vmw_vsock/virtio_transport.c > > > >> +++ b/net/vmw_vsock/virtio_transport.c > > > >> @@ -539,6 +539,7 @@ static struct virtio_transport virtio_transport = { > > > >> .notify_buffer_size = virtio_transport_notify_buffer_size, > > > >> > > > >> .read_skb = virtio_transport_read_skb, > > > >> + .notify_set_rcvlowat = virtio_transport_notify_set_rcvlowat > > > >> }, > > > >> > > > >> .send_pkt = virtio_transport_send_pkt, > > > >> diff --git a/net/vmw_vsock/virtio_transport_common.c b/net/vmw_vsock/virtio_transport_common.c > > > >> index f6dc896bf44c..1cb556ad4597 100644 > > > >> --- a/net/vmw_vsock/virtio_transport_common.c > > > >> +++ b/net/vmw_vsock/virtio_transport_common.c > > > >> @@ -1684,6 +1684,33 @@ int virtio_transport_read_skb(struct vsock_sock *vsk, skb_read_actor_t recv_acto > > > >> } > > > >> EXPORT_SYMBOL_GPL(virtio_transport_read_skb); > > > >> > > > >> +int virtio_transport_notify_set_rcvlowat(struct vsock_sock *vsk, > > > >> int val) > > > >> +{ > > > >> + struct virtio_vsock_sock *vvs = vsk->trans; > > > >> + bool send_update; > > > >> + > > > >> + spin_lock_bh(&vvs->rx_lock); > > > >> + > > > >> + /* If number of available bytes is less than new SO_RCVLOWAT value, > > > >> + * kick sender to send more data, because sender may sleep in > > > >> its > > > >> + * 'send()' syscall waiting for enough space at our side. > > > >> + */ > > > >> + send_update = vvs->rx_bytes < val; > > > >> + > > > >> + spin_unlock_bh(&vvs->rx_lock); > > > >> + > > > >> + if (send_update) { > > > >> + int err; > > > >> + > > > >> + err = virtio_transport_send_credit_update(vsk); > > > >> + if (err < 0) > > > >> + return err; > > > >> + } > > > >> + > > > >> + return 0; > > > >> +} > > > > > > > > > > > > I find it strange that this will send a credit update > > > > even if nothing changed since this was called previously. > > > > I'm not sure whether this is a problem protocol-wise, > > > > but it certainly was not envisioned when the protocol was > > > > built. WDYT? > > > > > > >From virtio spec I found: > > > > > > It is also valid to send a VIRTIO_VSOCK_OP_CREDIT_UPDATE packet without previously receiving a > > > VIRTIO_VSOCK_OP_CREDIT_REQUEST packet. This allows communicating updates any time a change > > > in buffer space occurs. > > > So I guess there is no limitations to send such type of packet, e.g. it is not > > > required to be a reply for some another packet. Please, correct me if im wrong. > > > > > > Thanks, Arseniy > > > > > > Absolutely. My point was different - with this patch it is possible > > that you are not adding any credits at all since the previous > > VIRTIO_VSOCK_OP_CREDIT_UPDATE. > > I think the problem we're solving here is that since as an optimization we > avoid sending the update for every byte we consume, but we put a threshold, > then we make sure we update the peer. > > A credit update contains a snapshot and sending it the same as the previous > one should not create any problem. Well it consumes a buffer on the other side. > My doubt now is that we only do this when we set RCVLOWAT , should we also > do something when we consume bytes to avoid the optimization we have? > > Stefano Isn't this why we have credit request? -- MST