From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8A3C3C6FD1D for ; Thu, 30 Mar 2023 06:46:27 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230077AbjC3GqZ (ORCPT ); Thu, 30 Mar 2023 02:46:25 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34754 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230113AbjC3GqR (ORCPT ); Thu, 30 Mar 2023 02:46:17 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 95ECF5FEB for ; Wed, 29 Mar 2023 23:44:56 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1680158692; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=uOR4AABgXY6rT1UM0saCrM1Os02S42xCRn/OKU3aRlo=; b=So9JqLmI1RpacCLj54C/jula3vWGM933SQplv0zTYSOZiVMwpjbtzejMyYRVF45V8xDO7f qMz5E/X3YwaTZ6qk8EzPDIh1RT1Tcbpmw6e7TJyFD3/OBHf8PxaJdcBzH2o+qR8KeNssqo Iyf3clLfbokzWKY05UdL0r6+EZ92PQE= Received: from mail-wm1-f72.google.com (mail-wm1-f72.google.com [209.85.128.72]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-549-B4EvlMpeP32ZBboxD9QbeQ-1; Thu, 30 Mar 2023 02:44:49 -0400 X-MC-Unique: B4EvlMpeP32ZBboxD9QbeQ-1 Received: by mail-wm1-f72.google.com with SMTP id j27-20020a05600c1c1b00b003edd2023418so9900679wms.4 for ; Wed, 29 Mar 2023 23:44:49 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680158689; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=uOR4AABgXY6rT1UM0saCrM1Os02S42xCRn/OKU3aRlo=; b=D2BHKCdvlRHDHwjThE4XCVnj+PjaIIElznOsXFgKYblTg/iyIJQDyATjTBNFcq5G7y 3Lgjqth9UUO2O7/Vr3kHTPIp6rRKuKOq15PCbCmTd5Ip6GaeaMCfLvIptot5CAOBr1Ro lNI8Zq5IDa1aSfnu7RaKbCVcLjLwvhX3t41IM8qXlX6EV1h0RcwmzsjeejgsLEZTehDz awcEao5wGVyBbmSHoXCo1UcrWZ9Hx1mbBe3iobdZpYTPiJmfabhXdJYOKp8Jszlhr0zo P4TnBRYUUEuj1ccMFKwpi99zThgXYNWnRJR0WLXh9rvY+hH1SJR4BYErv6yowA3wfYwq 46XA== X-Gm-Message-State: AAQBX9dQFoxAT+N22+QHLmG/gNS9CE4gcsYb4NEmvvZoiVmgfF9cezIQ dBO3+X9P2+YY5C9u3vrYepiIZidFy4z2TtNt7QW4Hue+EowRK2dHYPBsEBV1QtWg4SbmfMcwBqz SbFs+z5ysuXG1gzxpPSrd6kiG X-Received: by 2002:a7b:c045:0:b0:3ef:6fee:8057 with SMTP id u5-20020a7bc045000000b003ef6fee8057mr9121727wmc.25.1680158688798; Wed, 29 Mar 2023 23:44:48 -0700 (PDT) X-Google-Smtp-Source: AKy350b9YXLwf8YQAIK1wJbojYDvpMv6wMNdBsep+spzdVpXknozxcuIotMCTlq+T8/9wIqhpHiyXQ== X-Received: by 2002:a7b:c045:0:b0:3ef:6fee:8057 with SMTP id u5-20020a7bc045000000b003ef6fee8057mr9121710wmc.25.1680158688488; Wed, 29 Mar 2023 23:44:48 -0700 (PDT) Received: from redhat.com ([2.52.159.107]) by smtp.gmail.com with ESMTPSA id f17-20020a05600c4e9100b003ede3f5c81fsm5062688wmq.41.2023.03.29.23.44.46 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 29 Mar 2023 23:44:47 -0700 (PDT) Date: Thu, 30 Mar 2023 02:44:44 -0400 From: "Michael S. Tsirkin" To: Xuan Zhuo Cc: Willem de Bruijn , netdev@vger.kernel.org, virtualization@lists.linux-foundation.org, Jakub Kicinski , Wei Wang , David Miller , linux-kernel@vger.kernel.org Subject: Re: [PATCH v3 3/4] virtio: fix up virtio_disable_cb Message-ID: <20230330024220-mutt-send-email-mst@kernel.org> References: <20210526082423.47837-1-mst@redhat.com> <20210526082423.47837-4-mst@redhat.com> <1680156457.5551112-5-xuanzhuo@linux.alibaba.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <1680156457.5551112-5-xuanzhuo@linux.alibaba.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Mar 30, 2023 at 02:07:37PM +0800, Xuan Zhuo wrote: > On Wed, 26 May 2021 04:24:40 -0400, "Michael S. Tsirkin" wrote: > > virtio_disable_cb is currently a nop for split ring with event index. > > This is because it used to be always called from a callback when we know > > device won't trigger more events until we update the index. However, > > now that we run with interrupts enabled a lot we also poll without a > > callback so that is different: disabling callbacks will help reduce the > > number of spurious interrupts. > > Further, if using event index with a packed ring, and if being called > > from a callback, we actually do disable interrupts which is unnecessary. > > > > Fix both issues by tracking whenever we get a callback. If that is > > the case disabling interrupts with event index can be a nop. > > If not the case disable interrupts. Note: with a split ring > > there's no explicit "no interrupts" value. For now we write > > a fixed value so our chance of triggering an interupt > > is 1/ring size. It's probably better to write something > > related to the last used index there to reduce the chance > > even further. For now I'm keeping it simple. > > > Don't understand, is this patch necessary? For this patch set, we can do without > this patch. > > So doest this patch optimize virtqueue_disable_cb() by reducing a modification of > vring_used_event(&vq-> split.vring)? > > Or I miss something. > > Thanks. Before this patch virtqueue_disable_cb did nothing at all for the common case of event index enabled, so calling it from virtio net would not help matters. But the patch is from 2021, isn't it a bit too late to argue? If you have a cleanup or an optimization in mind, please post a patch. > > > > Signed-off-by: Michael S. Tsirkin > > --- > > drivers/virtio/virtio_ring.c | 26 +++++++++++++++++++++++++- > > 1 file changed, 25 insertions(+), 1 deletion(-) > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > index 71e16b53e9c1..88f0b16b11b8 100644 > > --- a/drivers/virtio/virtio_ring.c > > +++ b/drivers/virtio/virtio_ring.c > > @@ -113,6 +113,9 @@ struct vring_virtqueue { > > /* Last used index we've seen. */ > > u16 last_used_idx; > > > > + /* Hint for event idx: already triggered no need to disable. */ > > + bool event_triggered; > > + > > union { > > /* Available for split ring */ > > struct { > > @@ -739,7 +742,10 @@ static void virtqueue_disable_cb_split(struct virtqueue *_vq) > > > > if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) { > > vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > > - if (!vq->event) > > + if (vq->event) > > + /* TODO: this is a hack. Figure out a cleaner value to write. */ > > + vring_used_event(&vq->split.vring) = 0x0; > > + else > > vq->split.vring.avail->flags = > > cpu_to_virtio16(_vq->vdev, > > vq->split.avail_flags_shadow); > > @@ -1605,6 +1611,7 @@ static struct virtqueue *vring_create_virtqueue_packed( > > vq->weak_barriers = weak_barriers; > > vq->broken = false; > > vq->last_used_idx = 0; > > + vq->event_triggered = false; > > vq->num_added = 0; > > vq->packed_ring = true; > > vq->use_dma_api = vring_use_dma_api(vdev); > > @@ -1919,6 +1926,12 @@ void virtqueue_disable_cb(struct virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > + /* If device triggered an event already it won't trigger one again: > > + * no need to disable. > > + */ > > + if (vq->event_triggered) > > + return; > > + > > if (vq->packed_ring) > > virtqueue_disable_cb_packed(_vq); > > else > > @@ -1942,6 +1955,9 @@ unsigned virtqueue_enable_cb_prepare(struct virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > + if (vq->event_triggered) > > + vq->event_triggered = false; > > + > > return vq->packed_ring ? virtqueue_enable_cb_prepare_packed(_vq) : > > virtqueue_enable_cb_prepare_split(_vq); > > } > > @@ -2005,6 +2021,9 @@ bool virtqueue_enable_cb_delayed(struct virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > + if (vq->event_triggered) > > + vq->event_triggered = false; > > + > > return vq->packed_ring ? virtqueue_enable_cb_delayed_packed(_vq) : > > virtqueue_enable_cb_delayed_split(_vq); > > } > > @@ -2044,6 +2063,10 @@ irqreturn_t vring_interrupt(int irq, void *_vq) > > if (unlikely(vq->broken)) > > return IRQ_HANDLED; > > > > + /* Just a hint for performance: so it's ok that this can be racy! */ > > + if (vq->event) > > + vq->event_triggered = true; > > + > > pr_debug("virtqueue callback for %p (%p)\n", vq, vq->vq.callback); > > if (vq->vq.callback) > > vq->vq.callback(&vq->vq); > > @@ -2083,6 +2106,7 @@ struct virtqueue *__vring_new_virtqueue(unsigned int index, > > vq->weak_barriers = weak_barriers; > > vq->broken = false; > > vq->last_used_idx = 0; > > + vq->event_triggered = false; > > vq->num_added = 0; > > vq->use_dma_api = vring_use_dma_api(vdev); > > #ifdef DEBUG > > -- > > MST > > > > _______________________________________________ > > Virtualization mailing list > > Virtualization@lists.linux-foundation.org > > https://lists.linuxfoundation.org/mailman/listinfo/virtualization