From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 58ACFC761A6 for ; Thu, 30 Mar 2023 14:04:16 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp1.osuosl.org (Postfix) with ESMTP id C98A884356; Thu, 30 Mar 2023 14:04:15 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org C98A884356 Authentication-Results: smtp1.osuosl.org; dkim=fail reason="signature verification failed" (1024-bit key) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=cnFFvQVk X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp1.osuosl.org ([127.0.0.1]) by localhost (smtp1.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id TZaFJ_da-tuy; Thu, 30 Mar 2023 14:04:14 +0000 (UTC) Received: from lists.linuxfoundation.org (lf-lists.osuosl.org [140.211.9.56]) by smtp1.osuosl.org (Postfix) with ESMTPS id 29F5B83FA9; Thu, 30 Mar 2023 14:04:14 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 29F5B83FA9 Received: from lf-lists.osuosl.org (localhost [127.0.0.1]) by lists.linuxfoundation.org (Postfix) with ESMTP id 00243C0037; Thu, 30 Mar 2023 14:04:13 +0000 (UTC) Received: from smtp1.osuosl.org (smtp1.osuosl.org [140.211.166.138]) by lists.linuxfoundation.org (Postfix) with ESMTP id D6736C002F for ; Thu, 30 Mar 2023 14:04:12 +0000 (UTC) Received: from localhost (localhost [127.0.0.1]) by smtp1.osuosl.org (Postfix) with ESMTP id A53E9842E1 for ; Thu, 30 Mar 2023 14:04:12 +0000 (UTC) DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org A53E9842E1 X-Virus-Scanned: amavisd-new at osuosl.org Received: from smtp1.osuosl.org ([127.0.0.1]) by localhost (smtp1.osuosl.org [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id vMQDdfIsiJ5Y for ; Thu, 30 Mar 2023 14:04:11 +0000 (UTC) X-Greylist: domain auto-whitelisted by SQLgrey-1.8.0 DKIM-Filter: OpenDKIM Filter v2.11.0 smtp1.osuosl.org 7794C840A8 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by smtp1.osuosl.org (Postfix) with ESMTPS id 7794C840A8 for ; Thu, 30 Mar 2023 14:04:11 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1680185050; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=tTBdaSwbBU7yvMf5yJjwPQAmSwIig1jMctqroIy2Uf0=; b=cnFFvQVkp98do7iie8CpIs6S/nQglUuF/kOBZoqpai/qNvxiG2XgtyhBRNCfoQDMjZPYxp NzDGDpSxGZh1z26m6Zvlo4bPqfLcZSowUeUw5ufyw+YQSvFptgyZuWVdkr42FCWNJGGFQC 0sRSV6lT9cjGCQHUsh93bHYX9JDrFFk= Received: from mail-wm1-f70.google.com (mail-wm1-f70.google.com [209.85.128.70]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-626-7Bskrtq2NjiIHFdrU4Unag-1; Thu, 30 Mar 2023 10:04:08 -0400 X-MC-Unique: 7Bskrtq2NjiIHFdrU4Unag-1 Received: by mail-wm1-f70.google.com with SMTP id r11-20020a05600c458b00b003eea8d25f06so9880661wmo.1 for ; Thu, 30 Mar 2023 07:04:08 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1680185047; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:from:date:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=tTBdaSwbBU7yvMf5yJjwPQAmSwIig1jMctqroIy2Uf0=; b=6YxjXhHpz8QRQx+X1HngTCPbqxqbwkW1h+Y1zTDb4HvIlNz0kckbeCGQ5e+vqooN8u 7S74A6ovT2J3epSOUHzkXaKZM63ZDaKOVOwLW3wqfzEq8k3h0dssoM1x3M5IJSXHyPwT bSSiDFMY1nMw/w2Jnsg9QwWgQ+/zAKV7DO2AVHca/e7QqmsTF0E/Kg5eIJz79+awD/Fd gxTMw+GPKeGY8TXFziXW5XAFOSPCZXSCjELLBVtCkIC4RO9FbNnv4Y91WQEHIAMEEAC+ U99VjlASGkfUWUcEYxBEi5Zr5gVIzxxXgBSGJSSiXXJ8Tez8MPU5viSF4rfjKBULAH91 rPHw== X-Gm-Message-State: AAQBX9dWD37AZv+VxuODnMxI1m3VPqXjs3D97q61x8if6OAk5Gc8MPRe /mh5ZgON6PuV9zkYGjJdLDhtwcF0VX6Vn0PFqNo/GNp4+2REaHIc8Hy3S0TSMc5a8wmuP425GCS dFrIHvUkfom8Q9CWPBJBrr9xQSzakwt3KvCi7fib6JQ== X-Received: by 2002:adf:fd47:0:b0:2dc:cad4:87b9 with SMTP id h7-20020adffd47000000b002dccad487b9mr20764972wrs.68.1680185047554; Thu, 30 Mar 2023 07:04:07 -0700 (PDT) X-Google-Smtp-Source: AKy350baz3ZKnOOUo2PwHSQ/hKwGrXzV97e3RmZVOT6SkIIWFbJS2PWUhgbo4anxuinm8NAuAgc/Ow== X-Received: by 2002:adf:fd47:0:b0:2dc:cad4:87b9 with SMTP id h7-20020adffd47000000b002dccad487b9mr20764942wrs.68.1680185047192; Thu, 30 Mar 2023 07:04:07 -0700 (PDT) Received: from redhat.com ([2.52.159.107]) by smtp.gmail.com with ESMTPSA id e9-20020adffc49000000b002be5bdbe40csm32969834wrs.27.2023.03.30.07.04.05 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 30 Mar 2023 07:04:06 -0700 (PDT) Date: Thu, 30 Mar 2023 10:04:03 -0400 From: "Michael S. Tsirkin" To: Xuan Zhuo Subject: Re: [PATCH v3 3/4] virtio: fix up virtio_disable_cb Message-ID: <20230330100219-mutt-send-email-mst@kernel.org> References: <20210526082423.47837-1-mst@redhat.com> <20210526082423.47837-4-mst@redhat.com> <1680156457.5551112-5-xuanzhuo@linux.alibaba.com> <20230330024220-mutt-send-email-mst@kernel.org> <1680159261.1588428-1-xuanzhuo@linux.alibaba.com> MIME-Version: 1.0 In-Reply-To: <1680159261.1588428-1-xuanzhuo@linux.alibaba.com> X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Disposition: inline Cc: Willem de Bruijn , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, virtualization@lists.linux-foundation.org, Jakub Kicinski , Wei Wang , David Miller X-BeenThere: virtualization@lists.linux-foundation.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: Linux virtualization List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Errors-To: virtualization-bounces@lists.linux-foundation.org Sender: "Virtualization" On Thu, Mar 30, 2023 at 02:54:21PM +0800, Xuan Zhuo wrote: > On Thu, 30 Mar 2023 02:44:44 -0400, "Michael S. Tsirkin" wrote: > > On Thu, Mar 30, 2023 at 02:07:37PM +0800, Xuan Zhuo wrote: > > > On Wed, 26 May 2021 04:24:40 -0400, "Michael S. Tsirkin" wrote: > > > > virtio_disable_cb is currently a nop for split ring with event index. > > > > This is because it used to be always called from a callback when we know > > > > device won't trigger more events until we update the index. However, > > > > now that we run with interrupts enabled a lot we also poll without a > > > > callback so that is different: disabling callbacks will help reduce the > > > > number of spurious interrupts. > > > > Further, if using event index with a packed ring, and if being called > > > > from a callback, we actually do disable interrupts which is unnecessary. > > > > > > > > Fix both issues by tracking whenever we get a callback. If that is > > > > the case disabling interrupts with event index can be a nop. > > > > If not the case disable interrupts. Note: with a split ring > > > > there's no explicit "no interrupts" value. For now we write > > > > a fixed value so our chance of triggering an interupt > > > > is 1/ring size. It's probably better to write something > > > > related to the last used index there to reduce the chance > > > > even further. For now I'm keeping it simple. > > > > > > > > > Don't understand, is this patch necessary? For this patch set, we can do without > > > this patch. > > > > > > So doest this patch optimize virtqueue_disable_cb() by reducing a modification of > > > vring_used_event(&vq-> split.vring)? > > > > > > Or I miss something. > > > > > > Thanks. > > > > Before this patch virtqueue_disable_cb did nothing at all > > for the common case of event index enabled, so > > calling it from virtio net would not help matters. > > I agree with these codes: > > - if (!vq->event) > + if (vq->event) > + /* TODO: this is a hack. Figure out a cleaner value to write. */ > + vring_used_event(&vq->split.vring) = 0x0; > + else > > > I just don't understand event_triggered. The comment near it says it all: /* Hint for event idx: already triggered no need to disable. */ the write into event idx is potentially expensive since it can invalidate cache for another processor (depending on the CPU). > > > > But the patch is from 2021, isn't it a bit too late to argue? > > If you have a cleanup or an optimization in mind, please > > post a patch. > > Sorry, I just have some problems, I don't oppose it. At least it can reduce the > modification of vring_used_event(&vq->split.vring). I think it is also beneficial. > > Thanks very much. > > > > > > > > > > > > Signed-off-by: Michael S. Tsirkin > > > > --- > > > > drivers/virtio/virtio_ring.c | 26 +++++++++++++++++++++++++- > > > > 1 file changed, 25 insertions(+), 1 deletion(-) > > > > > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > > > index 71e16b53e9c1..88f0b16b11b8 100644 > > > > --- a/drivers/virtio/virtio_ring.c > > > > +++ b/drivers/virtio/virtio_ring.c > > > > @@ -113,6 +113,9 @@ struct vring_virtqueue { > > > > /* Last used index we've seen. */ > > > > u16 last_used_idx; > > > > > > > > + /* Hint for event idx: already triggered no need to disable. */ > > > > + bool event_triggered; > > > > + > > > > union { > > > > /* Available for split ring */ > > > > struct { > > > > @@ -739,7 +742,10 @@ static void virtqueue_disable_cb_split(struct virtqueue *_vq) > > > > > > > > if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) { > > > > vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > > > > - if (!vq->event) > > > > + if (vq->event) > > > > + /* TODO: this is a hack. Figure out a cleaner value to write. */ > > > > + vring_used_event(&vq->split.vring) = 0x0; > > > > + else > > > > vq->split.vring.avail->flags = > > > > cpu_to_virtio16(_vq->vdev, > > > > vq->split.avail_flags_shadow); > > > > @@ -1605,6 +1611,7 @@ static struct virtqueue *vring_create_virtqueue_packed( > > > > vq->weak_barriers = weak_barriers; > > > > vq->broken = false; > > > > vq->last_used_idx = 0; > > > > + vq->event_triggered = false; > > > > vq->num_added = 0; > > > > vq->packed_ring = true; > > > > vq->use_dma_api = vring_use_dma_api(vdev); > > > > @@ -1919,6 +1926,12 @@ void virtqueue_disable_cb(struct virtqueue *_vq) > > > > { > > > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > > > > > + /* If device triggered an event already it won't trigger one again: > > > > + * no need to disable. > > > > + */ > > > > + if (vq->event_triggered) > > > > + return; > > > > + > > > > if (vq->packed_ring) > > > > virtqueue_disable_cb_packed(_vq); > > > > else > > > > @@ -1942,6 +1955,9 @@ unsigned virtqueue_enable_cb_prepare(struct virtqueue *_vq) > > > > { > > > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > > > > > + if (vq->event_triggered) > > > > + vq->event_triggered = false; > > > > + > > > > return vq->packed_ring ? virtqueue_enable_cb_prepare_packed(_vq) : > > > > virtqueue_enable_cb_prepare_split(_vq); > > > > } > > > > @@ -2005,6 +2021,9 @@ bool virtqueue_enable_cb_delayed(struct virtqueue *_vq) > > > > { > > > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > > > > > + if (vq->event_triggered) > > > > + vq->event_triggered = false; > > > > + > > > > return vq->packed_ring ? virtqueue_enable_cb_delayed_packed(_vq) : > > > > virtqueue_enable_cb_delayed_split(_vq); > > > > } > > > > @@ -2044,6 +2063,10 @@ irqreturn_t vring_interrupt(int irq, void *_vq) > > > > if (unlikely(vq->broken)) > > > > return IRQ_HANDLED; > > > > > > > > + /* Just a hint for performance: so it's ok that this can be racy! */ > > > > + if (vq->event) > > > > + vq->event_triggered = true; > > > > + > > > > pr_debug("virtqueue callback for %p (%p)\n", vq, vq->vq.callback); > > > > if (vq->vq.callback) > > > > vq->vq.callback(&vq->vq); > > > > @@ -2083,6 +2106,7 @@ struct virtqueue *__vring_new_virtqueue(unsigned int index, > > > > vq->weak_barriers = weak_barriers; > > > > vq->broken = false; > > > > vq->last_used_idx = 0; > > > > + vq->event_triggered = false; > > > > vq->num_added = 0; > > > > vq->use_dma_api = vring_use_dma_api(vdev); > > > > #ifdef DEBUG > > > > -- > > > > MST > > > > > > > > _______________________________________________ > > > > Virtualization mailing list > > > > Virtualization@lists.linux-foundation.org > > > > https://lists.linuxfoundation.org/mailman/listinfo/virtualization > > _______________________________________________ Virtualization mailing list Virtualization@lists.linux-foundation.org https://lists.linuxfoundation.org/mailman/listinfo/virtualization