From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id CCA7AC433FF for ; Mon, 29 Jul 2019 19:10:27 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 9FC672073F for ; Mon, 29 Jul 2019 19:10:27 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729162AbfG2TKY (ORCPT ); Mon, 29 Jul 2019 15:10:24 -0400 Received: from mail-vk1-f196.google.com ([209.85.221.196]:44134 "EHLO mail-vk1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729047AbfG2TKX (ORCPT ); Mon, 29 Jul 2019 15:10:23 -0400 Received: by mail-vk1-f196.google.com with SMTP id w186so3846282vkd.11 for ; Mon, 29 Jul 2019 12:10:22 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to; bh=okCdMq9mPshN0DGM4+W0kc8Ipb0i9EdacMckArHhxzo=; b=Ajix8n0aDRyxJ9qcTiI4+I/vjjD/SRZYP/rNZMo4krRBE65gu1h40fAsIS7mNK8QBE AWr0KvyqIEWB4rIbaTfenNVXFhxPn4Ajy0hVV/zpb/Sk8TlZhd9xX6JErdW8KVMXadnQ 72uwVsSabNmdsfEfLd33G+rHeHZL2P+KJF6/U+HEJyaTFDROS3IZYtsSoprk8MpRUScG 6uXivs0OwYRawAlAYaDMi5j6IJekVKlkQPVihfj3I69lY0b8apVEVtMM/2Bj2OJJqmi7 VntXPMSaIva03b2L+/yfMg6tVsW2tz68ufQggms9NbB+pxSSMmrGmaZreFOAwuYXPz0H Mu2g== X-Gm-Message-State: APjAAAX90V39se7a4qc5++LmHoL0kW5dbk9dy1jp9buFN92GxsaHJ1hT M3Kw74AWC23JCPYppa5QCjyI5g== X-Google-Smtp-Source: APXvYqxJuGfM/8WOBGep+SmJ6LLdsnWULNoYX2FfsgUCqsSEV+3gjCfQbmSagDu0KtvY3LdWGK3TWw== X-Received: by 2002:a1f:728b:: with SMTP id n133mr42422085vkc.84.1564427422314; Mon, 29 Jul 2019 12:10:22 -0700 (PDT) Received: from redhat.com (bzq-79-181-91-42.red.bezeqint.net. [79.181.91.42]) by smtp.gmail.com with ESMTPSA id i137sm29091929vkd.24.2019.07.29.12.10.18 (version=TLS1_3 cipher=AEAD-AES256-GCM-SHA384 bits=256/256); Mon, 29 Jul 2019 12:10:21 -0700 (PDT) Date: Mon, 29 Jul 2019 15:10:15 -0400 From: "Michael S. Tsirkin" To: Stefano Garzarella Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, Stefan Hajnoczi , "David S. Miller" , virtualization@lists.linux-foundation.org, Jason Wang , kvm@vger.kernel.org Subject: Re: [PATCH v4 1/5] vsock/virtio: limit the memory used per-socket Message-ID: <20190729143622-mutt-send-email-mst@kernel.org> References: <20190717113030.163499-1-sgarzare@redhat.com> <20190717113030.163499-2-sgarzare@redhat.com> <20190729095956-mutt-send-email-mst@kernel.org> <20190729153656.zk4q4rob5oi6iq7l@steredhat> <20190729114302-mutt-send-email-mst@kernel.org> <20190729161903.yhaj5rfcvleexkhc@steredhat> <20190729165056.r32uzj6om3o6vfvp@steredhat> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190729165056.r32uzj6om3o6vfvp@steredhat> Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org On Mon, Jul 29, 2019 at 06:50:56PM +0200, Stefano Garzarella wrote: > On Mon, Jul 29, 2019 at 06:19:03PM +0200, Stefano Garzarella wrote: > > On Mon, Jul 29, 2019 at 11:49:02AM -0400, Michael S. Tsirkin wrote: > > > On Mon, Jul 29, 2019 at 05:36:56PM +0200, Stefano Garzarella wrote: > > > > On Mon, Jul 29, 2019 at 10:04:29AM -0400, Michael S. Tsirkin wrote: > > > > > On Wed, Jul 17, 2019 at 01:30:26PM +0200, Stefano Garzarella wrote: > > > > > > Since virtio-vsock was introduced, the buffers filled by the host > > > > > > and pushed to the guest using the vring, are directly queued in > > > > > > a per-socket list. These buffers are preallocated by the guest > > > > > > with a fixed size (4 KB). > > > > > > > > > > > > The maximum amount of memory used by each socket should be > > > > > > controlled by the credit mechanism. > > > > > > The default credit available per-socket is 256 KB, but if we use > > > > > > only 1 byte per packet, the guest can queue up to 262144 of 4 KB > > > > > > buffers, using up to 1 GB of memory per-socket. In addition, the > > > > > > guest will continue to fill the vring with new 4 KB free buffers > > > > > > to avoid starvation of other sockets. > > > > > > > > > > > > This patch mitigates this issue copying the payload of small > > > > > > packets (< 128 bytes) into the buffer of last packet queued, in > > > > > > order to avoid wasting memory. > > > > > > > > > > > > Reviewed-by: Stefan Hajnoczi > > > > > > Signed-off-by: Stefano Garzarella > > > > > > > > > > This is good enough for net-next, but for net I think we > > > > > should figure out how to address the issue completely. > > > > > Can we make the accounting precise? What happens to > > > > > performance if we do? > > > > > > > > > > > > > In order to do more precise accounting maybe we can use the buffer size, > > > > instead of payload size when we update the credit available. > > > > In this way, the credit available for each socket will reflect the memory > > > > actually used. > > > > > > > > I should check better, because I'm not sure what happen if the peer sees > > > > 1KB of space available, then it sends 1KB of payload (using a 4KB > > > > buffer). > > > > > > > > The other option is to copy each packet in a new buffer like I did in > > > > the v2 [2], but this forces us to make a copy for each packet that does > > > > not fill the entire buffer, perhaps too expensive. > > > > > > > > [2] https://patchwork.kernel.org/patch/10938741/ > > > > > > > > > > > > Thanks, > > > > Stefano > > > > > > Interesting. You are right, and at some level the protocol forces copies. > > > > > > We could try to detect that the actual memory is getting close to > > > admin limits and force copies on queued packets after the fact. > > > Is that practical? > > > > Yes, I think it is doable! > > We can decrease the credit available with the buffer size queued, and > > when the buffer size of packet to queue is bigger than the credit > > available, we can copy it. > > > > > > > > And yes we can extend the credit accounting to include buffer size. > > > That's a protocol change but maybe it makes sense. > > > > Since we send to the other peer the credit available, maybe this > > change can be backwards compatible (I'll check better this). > > What I said was wrong. > > We send a counter (increased when the user consumes the packets) and the > "buf_alloc" (the max memory allowed) to the other peer. > It makes a difference between a local counter (increased when the > packets are sent) and the remote counter to calculate the credit available: > > u32 virtio_transport_get_credit(struct virtio_vsock_sock *vvs, u32 credit) > { > u32 ret; > > spin_lock_bh(&vvs->tx_lock); > ret = vvs->peer_buf_alloc - (vvs->tx_cnt - vvs->peer_fwd_cnt); > if (ret > credit) > ret = credit; > vvs->tx_cnt += ret; > spin_unlock_bh(&vvs->tx_lock); > > return ret; > } > > Maybe I can play with "buf_alloc" to take care of bytes queued but not > used. > > Thanks, > Stefano Right. And the idea behind it all was that if we send a credit to remote then we have space for it. I think the basic idea was that if we have actual allocated memory and can copy data there, then we send the credit to remote. Of course that means an extra copy every packet. So as an optimization, it seems that we just assume that we will be able to allocate a new buffer. First this is not the best we can do. We can actually do allocate memory in the socket before sending credit. If packet is small then we copy it there. If packet is big then we queue the packet, take the buffer out of socket and add it to the virtqueue. Second question is what to do about medium sized packets. Packet is 1K but buffer is 4K, what do we do? And here I wonder - why don't we add the 3K buffer to the vq? -- MST