From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 772A6C7618D for ; Tue, 21 Mar 2023 10:40:38 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230328AbjCUKkg (ORCPT ); Tue, 21 Mar 2023 06:40:36 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37648 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229527AbjCUKkd (ORCPT ); Tue, 21 Mar 2023 06:40:33 -0400 Received: from mx.sberdevices.ru (mx.sberdevices.ru [45.89.227.171]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 9163112CC0; Tue, 21 Mar 2023 03:40:27 -0700 (PDT) Received: from s-lin-edge02.sberdevices.ru (localhost [127.0.0.1]) by mx.sberdevices.ru (Postfix) with ESMTP id 568605FD2D; Tue, 21 Mar 2023 13:40:23 +0300 (MSK) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=sberdevices.ru; s=mail; t=1679395223; bh=DD+yQxyiPVwCtYeMRrkjbgY0b9PL/Zx/D/E977JmgQw=; h=Message-ID:Date:MIME-Version:Subject:To:From:Content-Type; b=mFS8Fy5nLw0tJQrnyVhfv9jfa23TLPKaDFRZdfqw58O0+Ui3QBJKWO3EMs90SQYvC RYHkSj3fv9kL4VDQmfpz+rdeVwjJh1VlAWH4cPLfTr23J9xT0WTKWrUkSpUxR7DZ93 9hsZ4UbzujGm/eufC+/4pBiwXIJhRTlhe2zJwbQ8cVhJlCyDE0qlcZOGT2C+Hdi1/h cT6iha9T3RdYT41bfypQXdEkvbfaGJchwp/GNFaDZBCN8W/EKf7iUaF1moJ/7Nn9Z4 ZHDFNHs1YX0ldBeeCz1u6YL+9SEY/ukqyIw/WopjFCq5i2WpFNM3WW7EYHBlnipXB/ djdz5xehenCeQ== Received: from S-MS-EXCH01.sberdevices.ru (S-MS-EXCH01.sberdevices.ru [172.16.1.4]) by mx.sberdevices.ru (Postfix) with ESMTP; Tue, 21 Mar 2023 13:40:18 +0300 (MSK) Message-ID: Date: Tue, 21 Mar 2023 13:36:55 +0300 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:102.0) Gecko/20100101 Thunderbird/102.7.1 Subject: Re: [RFC PATCH v3] virtio/vsock: allocate multiple skbuffs on tx Content-Language: en-US To: Stefano Garzarella CC: Stefan Hajnoczi , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Bobby Eshleman , , , , , , References: <20230321084002.5anjcr3ikw3ynbse@sgarzare-redhat> From: Arseniy Krasnov In-Reply-To: <20230321084002.5anjcr3ikw3ynbse@sgarzare-redhat> Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 8bit X-Originating-IP: [172.16.1.6] X-ClientProxiedBy: S-MS-EXCH01.sberdevices.ru (172.16.1.4) To S-MS-EXCH01.sberdevices.ru (172.16.1.4) X-KSMG-Rule-ID: 4 X-KSMG-Message-Action: clean X-KSMG-AntiSpam-Status: not scanned, disabled by settings X-KSMG-AntiSpam-Interceptor-Info: not scanned X-KSMG-AntiPhishing: not scanned, disabled by settings X-KSMG-AntiVirus: Kaspersky Secure Mail Gateway, version 1.1.2.30, bases: 2023/03/21 07:59:00 #20981652 X-KSMG-AntiVirus-Status: Clean, skipped Precedence: bulk List-ID: X-Mailing-List: kvm@vger.kernel.org On 21.03.2023 11:40, Stefano Garzarella wrote: > On Tue, Mar 21, 2023 at 12:31:48AM +0300, Arseniy Krasnov wrote: >> This adds small optimization for tx path: instead of allocating single >> skbuff on every call to transport, allocate multiple skbuff's until >> credit space allows, thus trying to send as much as possible data without >> return to af_vsock.c. >> >> Signed-off-by: Arseniy Krasnov >> --- >> Link to v1: >> https://lore.kernel.org/netdev/2c52aa26-8181-d37a-bccd-a86bd3cbc6e1@sberdevices.ru/ >> Link to v2: >> https://lore.kernel.org/netdev/ea5725eb-6cb5-cf15-2938-34e335a442fa@sberdevices.ru/ >> >> Changelog: >> v1 -> v2: >> - If sent something, return number of bytes sent (even in >>   case of error). Return error only if failed to sent first >>   skbuff. >> >> v2 -> v3: >> - Handle case when transport callback returns unexpected value which >>   is not equal to 'skb->len'. Break loop. >> - Don't check for zero value of 'rest_len' before calling >>   'virtio_transport_put_credit()'. Decided to add this check directly >>   to 'virtio_transport_put_credit()' in separate patch. >> >> net/vmw_vsock/virtio_transport_common.c | 59 +++++++++++++++++++------ >> 1 file changed, 45 insertions(+), 14 deletions(-) >> >> diff --git a/net/vmw_vsock/virtio_transport_common.c b/net/vmw_vsock/virtio_transport_common.c >> index 6564192e7f20..e0b2c6ecbe22 100644 >> --- a/net/vmw_vsock/virtio_transport_common.c >> +++ b/net/vmw_vsock/virtio_transport_common.c >> @@ -196,7 +196,8 @@ static int virtio_transport_send_pkt_info(struct vsock_sock *vsk, >>     const struct virtio_transport *t_ops; >>     struct virtio_vsock_sock *vvs; >>     u32 pkt_len = info->pkt_len; >> -    struct sk_buff *skb; >> +    u32 rest_len; >> +    int ret; >> >>     info->type = virtio_transport_get_type(sk_vsock(vsk)); >> >> @@ -216,10 +217,6 @@ static int virtio_transport_send_pkt_info(struct vsock_sock *vsk, >> >>     vvs = vsk->trans; >> >> -    /* we can send less than pkt_len bytes */ >> -    if (pkt_len > VIRTIO_VSOCK_MAX_PKT_BUF_SIZE) >> -        pkt_len = VIRTIO_VSOCK_MAX_PKT_BUF_SIZE; >> - >>     /* virtio_transport_get_credit might return less than pkt_len credit */ >>     pkt_len = virtio_transport_get_credit(vvs, pkt_len); >> >> @@ -227,17 +224,51 @@ static int virtio_transport_send_pkt_info(struct vsock_sock *vsk, >>     if (pkt_len == 0 && info->op == VIRTIO_VSOCK_OP_RW) >>         return pkt_len; >> >> -    skb = virtio_transport_alloc_skb(info, pkt_len, >> -                     src_cid, src_port, >> -                     dst_cid, dst_port); >> -    if (!skb) { >> -        virtio_transport_put_credit(vvs, pkt_len); >> -        return -ENOMEM; >> -    } >> +    ret = 0; >> +    rest_len = pkt_len; >> + >> +    do { >> +        struct sk_buff *skb; >> +        size_t skb_len; >> + >> +        skb_len = min_t(u32, VIRTIO_VSOCK_MAX_PKT_BUF_SIZE, rest_len); >> + >> +        skb = virtio_transport_alloc_skb(info, skb_len, >> +                         src_cid, src_port, >> +                         dst_cid, dst_port); >> +        if (!skb) { >> +            ret = -ENOMEM; >> +            break; >> +        } >> + >> +        virtio_transport_inc_tx_pkt(vvs, skb); >> >> -    virtio_transport_inc_tx_pkt(vvs, skb); >> +        ret = t_ops->send_pkt(skb); >> >> -    return t_ops->send_pkt(skb); >> +        if (ret < 0) >> +            break; >> + >> +        /* Both virtio and vhost 'send_pkt()' returns 'skb_len', >> +         * but for reliability use 'ret' instead of 'skb_len'. >> +         * Also if partial send happens (e.g. 'ret' != 'skb_len') >> +         * somehow, we break this loop, but account such returned >> +         * value in 'virtio_transport_put_credit()'. >> +         */ >> +        rest_len -= ret; >> + >> +        if (ret != skb_len) { >> +            ret = -EFAULT; > > Okay, but `ret` will be overwritten by the check we have before the > return ... > Yes, you're right, this assignment has no effect, since 'rest_len' is already changed and ret will be changed. I'll fix it. Thanks, Arseniy >> +            break; >> +        } >> +    } while (rest_len); >> + >> +    virtio_transport_put_credit(vvs, rest_len); >> + >> +    /* Return number of bytes, if any data has been sent. */ >> +    if (rest_len != pkt_len) >> +        ret = pkt_len - rest_len; > > ... here. > > Since we don't expect this condition for now, perhaps we can avoid > setting ret with -EFAULT, but we can add a WARN_ONCE (interrupting the > loop as you did here). > > This way we return the partial length as we did before. > > Thanks, > Stefano > >> + >> +    return ret; >> } >> >> static bool virtio_transport_inc_rx_pkt(struct virtio_vsock_sock *vvs, >> --  >> 2.25.1 >> >