Received: by 2002:a05:7412:8d10:b0:f3:1519:9f41 with SMTP id bj16csp4742463rdb; Tue, 12 Dec 2023 08:08:10 -0800 (PST) X-Google-Smtp-Source: AGHT+IFynVXU3b/Dpvqx7kItrMi3IMVl0JX+1UEUKJk3CD/k05b7j0h3dCNq0Ox3xISOGeFRHxVh X-Received: by 2002:a17:90a:678b:b0:286:6cc1:273 with SMTP id o11-20020a17090a678b00b002866cc10273mr2789660pjj.62.1702397289792; Tue, 12 Dec 2023 08:08:09 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1702397289; cv=none; d=google.com; s=arc-20160816; b=0FNaR+/1DNMgGU6P80nonxiD8j2T/7/4k5JSEQOZQAhmzKwVvVB63TXltWhEcDqrZe JRfOWPNKsLYYaW7rJxe2FEvFCcMWljZMDdOiqV5dz5vqRAaYkaaVQnVDM2kBA7s2I/A3 HKBv6P7o1YNzqYDBuABEdPlmbFx3ZMHKe4q3+/8Df5Xh7lLyl584TmV0hCaRdHF06V3a I1gSAcaHVbisdHzpCak0dHBzvfl94SkF5QNIrGoc6Ytit3gaHiJ9FONxJLFGl8AaZuSf mn+rl3/T4S8tE7rqfv5NsXlUiCXkujXv3BzDhBu5eUS7giEtFm6IuV/yNt+we3Yotr3t W9Sw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature:dkim-filter; bh=iO5xcYncpR7QA6FIyuk49NEwnJymKjT3DGzZbDJaCJI=; fh=YtSViko0S4mzjRL+vIBcPZ6MScNClfhalnj7Ll4mpO4=; b=Q9xPsn5qVk20Gy6cS6O5gLHdLf0HbHQijcIzWaV/JFTK3nFuvbfiAU7F5+P25Nn1gh 7DEk/Q5ck0dPLYUHPwpsLRAOLUvBBA0r4sdaFOUcenmdGjBecQ5E7/TuIpdlD2TDt5/m m3EW4gJLUxUZ+myOtOmVD5WbLwVG9e9L39XNx+L8cQMDH6aFHqdD23oqZla/5c6x5Tzw kwaTuypgZXvfdj4ZTTMiNFQzxIQwHRuZH9cxjdUuHN7Jj5wJ9jm8qhRwwq+S2N7z2Sm3 eVF0KnGY7RQvmPXaeVx8pWqpkKLttDvrFKl1QRp6NX/piPjEdPouCIDSbHZH3dxkSrQK 4ZkA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@salutedevices.com header.s=mail header.b=d0Iygxhq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=salutedevices.com Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id u19-20020a17090ae01300b002864c15489dsi8119961pjy.173.2023.12.12.08.08.08 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 12 Dec 2023 08:08:09 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@salutedevices.com header.s=mail header.b=d0Iygxhq; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=salutedevices.com Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id 4F3C880AD966; Tue, 12 Dec 2023 08:08:06 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346535AbjLLQHn (ORCPT + 99 others); Tue, 12 Dec 2023 11:07:43 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:45888 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346525AbjLLQHk (ORCPT ); Tue, 12 Dec 2023 11:07:40 -0500 Received: from mx1.sberdevices.ru (mx1.sberdevices.ru [37.18.73.165]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 082E58E; Tue, 12 Dec 2023 08:07:42 -0800 (PST) Received: from p-infra-ksmg-sc-msk01 (localhost [127.0.0.1]) by mx1.sberdevices.ru (Postfix) with ESMTP id 5109E100049; Tue, 12 Dec 2023 19:07:23 +0300 (MSK) DKIM-Filter: OpenDKIM Filter v2.11.0 mx1.sberdevices.ru 5109E100049 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=salutedevices.com; s=mail; t=1702397243; bh=iO5xcYncpR7QA6FIyuk49NEwnJymKjT3DGzZbDJaCJI=; h=Message-ID:Date:MIME-Version:Subject:To:From:Content-Type:From; b=d0IygxhqC6tFXv1UoowiikiZor7Pzdy0DpEOfaUQcQYL3r2ndJ3fyFpAgfyEIdB+E JDQmisvhqwEQb19p6nvcK6I2Y4Pr21TJi4EEtW7POYMghVv0vBgEu4mrEs1e49HtW2 15lFnO9w7gUGU4KHxL2x7IMWy4rcEO/gwntBah+4pJp4Mr3vvbIWN1Kc+7Q6gHJ0bi QwGfEdislpmX44Ttt07XYmdRKzCLhKO3p94Va7RyygEAFpqEyI1/30/pCqQv2fBGP7 3JcA7U78WcGmFGm0VnAfV9T9Shehdexn/zcbdFMqbGk8mBk19ZHLjYMYE817dKErE3 AixxVRwEnETSA== Received: from smtp.sberdevices.ru (p-i-exch-sc-m01.sberdevices.ru [172.16.192.107]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by mx1.sberdevices.ru (Postfix) with ESMTPS; Tue, 12 Dec 2023 19:07:22 +0300 (MSK) Received: from [192.168.0.106] (100.64.160.123) by p-i-exch-sc-m01.sberdevices.ru (172.16.192.107) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.2.1118.40; Tue, 12 Dec 2023 19:07:22 +0300 Message-ID: Date: Tue, 12 Dec 2023 18:59:03 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.7.1 Subject: Re: [PATCH net-next v8 0/4] send credit update during setting SO_RCVLOWAT Content-Language: en-US To: "Michael S. Tsirkin" CC: Stefan Hajnoczi , Stefano Garzarella , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Jason Wang , Bobby Eshleman , , , , , , References: <20231211211658.2904268-1-avkrasnov@salutedevices.com> <20231212105423-mutt-send-email-mst@kernel.org> From: Arseniy Krasnov In-Reply-To: <20231212105423-mutt-send-email-mst@kernel.org> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Originating-IP: [100.64.160.123] X-ClientProxiedBy: p-i-exch-sc-m01.sberdevices.ru (172.16.192.107) To p-i-exch-sc-m01.sberdevices.ru (172.16.192.107) X-KSMG-Rule-ID: 10 X-KSMG-Message-Action: clean X-KSMG-AntiSpam-Lua-Profiles: 182067 [Dec 12 2023] X-KSMG-AntiSpam-Version: 6.1.0.3 X-KSMG-AntiSpam-Envelope-From: avkrasnov@salutedevices.com X-KSMG-AntiSpam-Rate: 0 X-KSMG-AntiSpam-Status: not_detected X-KSMG-AntiSpam-Method: none X-KSMG-AntiSpam-Auth: dkim=none X-KSMG-AntiSpam-Info: LuaCore: 7 0.3.7 6d6bf5bd8eea7373134f756a2fd73e9456bb7d1a, {Tracking_uf_ne_domains}, {Tracking_from_domain_doesnt_match_to}, lore.kernel.org:7.1.1;git.kernel.org:7.1.1;100.64.160.123:7.1.2;smtp.sberdevices.ru:7.1.1,5.0.1;salutedevices.com:7.1.1;127.0.0.199:7.1.2;d41d8cd98f00b204e9800998ecf8427e.com:7.1.1, FromAlignment: s, ApMailHostAddress: 100.64.160.123 X-MS-Exchange-Organization-SCL: -1 X-KSMG-AntiSpam-Interceptor-Info: scan successful X-KSMG-AntiPhishing: Clean, bases: 2023/12/12 13:39:00 X-KSMG-LinksScanning: Clean, bases: 2023/12/12 13:39:00 X-KSMG-AntiVirus: Kaspersky Secure Mail Gateway, version 2.0.1.6960, bases: 2023/12/12 12:50:00 #22667219 X-KSMG-AntiVirus-Status: Clean, skipped X-Spam-Status: No, score=-3.4 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, NICE_REPLY_A,SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Tue, 12 Dec 2023 08:08:06 -0800 (PST) On 12.12.2023 18:54, Michael S. Tsirkin wrote: > On Tue, Dec 12, 2023 at 12:16:54AM +0300, Arseniy Krasnov wrote: >> Hello, >> >> DESCRIPTION >> >> This patchset fixes old problem with hungup of both rx/tx sides and adds >> test for it. This happens due to non-default SO_RCVLOWAT value and >> deferred credit update in virtio/vsock. Link to previous old patchset: >> https://lore.kernel.org/netdev/39b2e9fd-601b-189d-39a9-914e5574524c@sberdevices.ru/ > > > Patchset: > > Acked-by: Michael S. Tsirkin Thanks! > > > But I worry whether we actually need 3/8 in net not in net-next. Because of "Fixes" tag ? I think this problem is not critical and reproducible only in special cases, but i'm not familiar with netdev process so good, so I don't have strong opinion. I guess @Stefano knows better. Thanks, Arseniy > > Thanks! > >> Here is what happens step by step: >> >> TEST >> >> INITIAL CONDITIONS >> >> 1) Vsock buffer size is 128KB. >> 2) Maximum packet size is also 64KB as defined in header (yes it is >> hardcoded, just to remind about that value). >> 3) SO_RCVLOWAT is default, e.g. 1 byte. >> >> >> STEPS >> >> SENDER RECEIVER >> 1) sends 128KB + 1 byte in a >> single buffer. 128KB will >> be sent, but for 1 byte >> sender will wait for free >> space at peer. Sender goes >> to sleep. >> >> >> 2) reads 64KB, credit update not sent >> 3) sets SO_RCVLOWAT to 64KB + 1 >> 4) poll() -> wait forever, there is >> only 64KB available to read. >> >> So in step 4) receiver also goes to sleep, waiting for enough data or >> connection shutdown message from the sender. Idea to fix it is that rx >> kicks tx side to continue transmission (and may be close connection) >> when rx changes number of bytes to be woken up (e.g. SO_RCVLOWAT) and >> this value is bigger than number of available bytes to read. >> >> I've added small test for this, but not sure as it uses hardcoded value >> for maximum packet length, this value is defined in kernel header and >> used to control deferred credit update. And as this is not available to >> userspace, I can't control test parameters correctly (if one day this >> define will be changed - test may become useless). >> >> Head for this patchset is: >> https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=021b0c952f226236f2edf89c737efb9a28d1422d >> >> Link to v1: >> https://lore.kernel.org/netdev/20231108072004.1045669-1-avkrasnov@salutedevices.com/ >> Link to v2: >> https://lore.kernel.org/netdev/20231119204922.2251912-1-avkrasnov@salutedevices.com/ >> Link to v3: >> https://lore.kernel.org/netdev/20231122180510.2297075-1-avkrasnov@salutedevices.com/ >> Link to v4: >> https://lore.kernel.org/netdev/20231129212519.2938875-1-avkrasnov@salutedevices.com/ >> Link to v5: >> https://lore.kernel.org/netdev/20231130130840.253733-1-avkrasnov@salutedevices.com/ >> Link to v6: >> https://lore.kernel.org/netdev/20231205064806.2851305-1-avkrasnov@salutedevices.com/ >> Link to v7: >> https://lore.kernel.org/netdev/20231206211849.2707151-1-avkrasnov@salutedevices.com/ >> >> Changelog: >> v1 -> v2: >> * Patchset rebased and tested on new HEAD of net-next (see hash above). >> * New patch is added as 0001 - it removes return from SO_RCVLOWAT set >> callback in 'af_vsock.c' when transport callback is set - with that >> we can set 'sk_rcvlowat' only once in 'af_vsock.c' and in future do >> not copy-paste it to every transport. It was discussed in v1. >> * See per-patch changelog after ---. >> v2 -> v3: >> * See changelog after --- in 0003 only (0001 and 0002 still same). >> v3 -> v4: >> * Patchset rebased and tested on new HEAD of net-next (see hash above). >> * See per-patch changelog after ---. >> v4 -> v5: >> * Change patchset tag 'RFC' -> 'net-next'. >> * See per-patch changelog after ---. >> v5 -> v6: >> * New patch 0003 which sends credit update during reading bytes from >> socket. >> * See per-patch changelog after ---. >> v6 -> v7: >> * Patchset rebased and tested on new HEAD of net-next (see hash above). >> * See per-patch changelog after ---. >> v7 -> v8: >> * See per-patch changelog after ---. >> >> Arseniy Krasnov (4): >> vsock: update SO_RCVLOWAT setting callback >> virtio/vsock: send credit update during setting SO_RCVLOWAT >> virtio/vsock: fix logic which reduces credit update messages >> vsock/test: two tests to check credit update logic >> >> drivers/vhost/vsock.c | 1 + >> include/linux/virtio_vsock.h | 1 + >> include/net/af_vsock.h | 2 +- >> net/vmw_vsock/af_vsock.c | 9 +- >> net/vmw_vsock/hyperv_transport.c | 4 +- >> net/vmw_vsock/virtio_transport.c | 1 + >> net/vmw_vsock/virtio_transport_common.c | 43 +++++- >> net/vmw_vsock/vsock_loopback.c | 1 + >> tools/testing/vsock/vsock_test.c | 175 ++++++++++++++++++++++++ >> 9 files changed, 229 insertions(+), 8 deletions(-) >> >> -- >> 2.25.1 >