Message ID | 20230325105633.58592-1-huangjie.albert@bytedance.com |
---|---|
State | New |
Headers |
Return-Path: <linux-kernel-owner@vger.kernel.org> Delivered-To: ouuuleilei@gmail.com Received: by 2002:a59:b0ea:0:b0:3b6:4342:cba0 with SMTP id b10csp335413vqo; Sat, 25 Mar 2023 04:05:23 -0700 (PDT) X-Google-Smtp-Source: AK7set8bnWZuprlBSnRvb3SZxL/w1N8TaqeN2hKsWrRpxJgXJ1DxInW6R6qJH5/nWirFrfXcbs7J X-Received: by 2002:a05:6a20:b291:b0:da:717e:6ada with SMTP id ei17-20020a056a20b29100b000da717e6adamr5650396pzb.59.1679742323351; Sat, 25 Mar 2023 04:05:23 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1679742323; cv=none; d=google.com; s=arc-20160816; b=Np0I1ywpuY7mdSXVNFby6ST6iA5jEpdJcnp09hLSKhXz51IfEOykRmUTZiYPsuby9S VJoTbhAeezd3IB/qOutqhPfmRFsj2i3/DMdtZba6smeqNUBji5U3k7rzUtoPRRH+WLmQ Q4WL2GaR+PFB0SFJFuyrbLKrnMz009DZpupqvbSCo9St/yC63r6NjVAh9nHlM2Py3zIM pTPUihSjklg/zIzqrnbao15DrvK+BDKADR5gLw2fFTXx6AscKR2Yg0hMBxm3R3eZtGxI H/+NOn8U+etzHj95zRDO2ftYK7azeORVN2gsB8Ok/KUO7qxpEIgC2a67m2/rlwy3y79a zWJw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=tUmNpRj9iLzMHNJowxi+GGj1Iad+xEZ1rbuOVmNiyCg=; b=cMi1eIP4Cj3XQ8etWNeXKnfCCPA7l349hRG3H7ljcFnt5OOVi4Wqpt1pcQO6vJP7oP NWAVnChbwvL4vzfDQQHDxfOfU9yGOP+MqzcakhyuCSgRB4vUm0hRInURYpLsrjSTE4XV AcCV6sz09NTS3EO5A8wp4RQZ5YChPAZGqc7afDlV54LdKE5m1736FaDU1vxH6NcXDlPs kHz/HKL8KhPvmWX+wsOMBCYZfUdBrjD9asSWrnq7PMEc3l40iSz18WM0nuyv8uzFJ5gB Ulpe8dgbBUSEn7e7it/hYbWbO7SPB+6Di8oyYUhAOP/KgVywg2KYUslbY+vJ1qxTLUiK Fe5w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@bytedance.com header.s=google header.b=kTLmLyXD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=bytedance.com Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m128-20020a632686000000b0050b3083b64fsi2561341pgm.429.2023.03.25.04.05.01; Sat, 25 Mar 2023 04:05:23 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@bytedance.com header.s=google header.b=kTLmLyXD; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=bytedance.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230380AbjCYK5D (ORCPT <rfc822;makky5685@gmail.com> + 99 others); Sat, 25 Mar 2023 06:57:03 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51680 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229505AbjCYK5B (ORCPT <rfc822;linux-kernel@vger.kernel.org>); Sat, 25 Mar 2023 06:57:01 -0400 Received: from mail-pf1-x431.google.com (mail-pf1-x431.google.com [IPv6:2607:f8b0:4864:20::431]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7EBD714211 for <linux-kernel@vger.kernel.org>; Sat, 25 Mar 2023 03:56:58 -0700 (PDT) Received: by mail-pf1-x431.google.com with SMTP id cu12so2742114pfb.13 for <linux-kernel@vger.kernel.org>; Sat, 25 Mar 2023 03:56:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=bytedance.com; s=google; t=1679741818; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:from:to:cc:subject:date:message-id:reply-to; bh=tUmNpRj9iLzMHNJowxi+GGj1Iad+xEZ1rbuOVmNiyCg=; b=kTLmLyXDjAbBndnWWfzUnEBbt1RE+b1y2qZluTh30nWzWEZyjKSzgnyw47OvZABmJJ OH7ZINStV3QO8x7nL1JGCgKgepfs4Gy/lBGV/TT6r1yjM3xc4XMUWZQ/IzhjVijhVKN+ 4eVNtGGnLz+y481WGFU3Ni49jKNUTL+piHZrPU6QEhlUEInn01LYABPF0LJlsNuf3lPm AwfkBtV5HBMTMRaZnlkMRsJD66A78oROvWI8L87UligCFUtDXB+T2yyymx2UKRMWaIqh 2E7LgbwbpNecC1RbHlidWP34pHuayTW4DdomLbwaWR1OcZdWsIfm8uxv0NqTCJkfjIj+ iSMA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; t=1679741818; h=content-transfer-encoding:mime-version:message-id:date:subject:cc :to:from:x-gm-message-state:from:to:cc:subject:date:message-id :reply-to; bh=tUmNpRj9iLzMHNJowxi+GGj1Iad+xEZ1rbuOVmNiyCg=; b=6wHiPhiGkXt8z4nZ1EP7xKZ7ebaVrVUBtQUH8NbPeHT+ykeaUm2F6je/mB5QhCdoLg Dxoor8xPIHKiSNFvMGqWt9Ubj19oqAc08zjp0l8naGQ/47uPkQ/2nCQkrox6GL/qdjFz CGWqQJTaz12GPiWy69N0IlplAH2BL/dTaFnI1q54rQumbIxmXq87cLGSH9n3pBZrDHRc U3aha63qL8bHl5wzeOoEIAhi1oxIdo44WE6hL22zL8mnEGvS6WbyV6xiQRXSNSoEJcFv rvmr6oULwZeZMEUcT+eWQWvTKZijf5aQXTrlxNdGW0zRTtTQr4kRuImRDl3f8Zs4p3Ld cpaA== X-Gm-Message-State: AAQBX9ckjTVErga4dj1Eev02xrc4I9+5lr0VrbgcRydwZ0WZe/X/7L47 y/QogflpPs8Adu9kZx1sopUJYEWNCBY2BjlBCXs= X-Received: by 2002:a62:8496:0:b0:627:f659:a771 with SMTP id k144-20020a628496000000b00627f659a771mr6633520pfd.12.1679741817897; Sat, 25 Mar 2023 03:56:57 -0700 (PDT) Received: from localhost.localdomain ([139.177.225.235]) by smtp.gmail.com with ESMTPSA id p21-20020aa78615000000b005dd98927cc5sm11206072pfn.76.2023.03.25.03.56.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 25 Mar 2023 03:56:57 -0700 (PDT) From: Albert Huang <huangjie.albert@bytedance.com> To: Jason Wang <jasowang@redhat.com>, "Michael S. Tsirkin" <mst@redhat.com> Cc: Albert Huang <huangjie.albert@bytedance.com>, virtualization@lists.linux-foundation.org, linux-kernel@vger.kernel.org Subject: [PATCH v2] virtio_ring: don't update event idx on get_buf Date: Sat, 25 Mar 2023 18:56:33 +0800 Message-Id: <20230325105633.58592-1-huangjie.albert@bytedance.com> X-Mailer: git-send-email 2.37.0 (Apple Git-136) MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.2 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: <linux-kernel.vger.kernel.org> X-Mailing-List: linux-kernel@vger.kernel.org X-getmail-retrieved-from-mailbox: =?utf-8?q?INBOX?= X-GMAIL-THRID: =?utf-8?q?1761337486535201806?= X-GMAIL-MSGID: =?utf-8?q?1761337486535201806?= |
Series |
[v2] virtio_ring: don't update event idx on get_buf
|
|
Commit Message
黄杰
March 25, 2023, 10:56 a.m. UTC
in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, the vq->event_triggered will be set to true. It will no longer be set to false. Unless we explicitly call virtqueue_enable_cb_delayed or virtqueue_enable_cb_prepare. If we disable the napi_tx, it will only be called when the tx ring buffer is relatively small. Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap every time we call virtqueue_get_buf_ctx. This will bring more interruptions. To summarize: 1) event_triggered was set to true in vring_interrupt() 2) after this nothing will happen for virtqueue_disable_cb() so VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled then it tries to publish new event To fix, if event_triggered is set to true, do not update vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap Tested with iperf: iperf3 tcp stream: vm1 -----------------> vm2 vm2 just receives tcp data stream from vm1, and sends the ack to vm1, there are many tx interrupts in vm2. but without event_triggered there are just a few tx interrupts. Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> Signed-off-by: Michael S. Tsirkin <mst@redhat.com> --- drivers/virtio/virtio_ring.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-)
Comments
On Sat, 25 Mar 2023 18:56:33 +0800, Albert Huang <huangjie.albert@bytedance.com> wrote: > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > the vq->event_triggered will be set to true. It will no longer be set to > false. Unless we explicitly call virtqueue_enable_cb_delayed or > virtqueue_enable_cb_prepare. > > If we disable the napi_tx, it will only be called when the tx ring > buffer is relatively small. > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > To summarize: > 1) event_triggered was set to true in vring_interrupt() > 2) after this nothing will happen for virtqueue_disable_cb() so > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > then it tries to publish new event > > To fix, if event_triggered is set to true, do not update > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > Tested with iperf: > iperf3 tcp stream: > vm1 -----------------> vm2 > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > there are many tx interrupts in vm2. > but without event_triggered there are just a few tx interrupts. > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> Reviewed-by: Xuan Zhuo <xuanzhuo@linux.alibaba.com> > --- > drivers/virtio/virtio_ring.c | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > index cbeeea1b0439..1c36fa477966 100644 > --- a/drivers/virtio/virtio_ring.c > +++ b/drivers/virtio/virtio_ring.c > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > /* If we expect an interrupt for the next entry, tell host > * by writing event index and flush out the write before > * the read in the next get_buf call. */ > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > + !vq->event_triggered)) > virtio_store_mb(vq->weak_barriers, > &vring_used_event(&vq->split.vring), > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > * by writing event index and flush out the write before > * the read in the next get_buf call. > */ > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > + !vq->event_triggered)) > virtio_store_mb(vq->weak_barriers, > &vq->packed.vring.driver->off_wrap, > cpu_to_le16(vq->last_used_idx)); > -- > 2.37.0 (Apple Git-136) >
is the below same as what I posted or different? how? On Sat, Mar 25, 2023 at 06:56:33PM +0800, Albert Huang wrote: > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > the vq->event_triggered will be set to true. It will no longer be set to > false. Unless we explicitly call virtqueue_enable_cb_delayed or > virtqueue_enable_cb_prepare. > > If we disable the napi_tx, it will only be called when the tx ring > buffer is relatively small. > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > To summarize: > 1) event_triggered was set to true in vring_interrupt() > 2) after this nothing will happen for virtqueue_disable_cb() so > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > then it tries to publish new event > > To fix, if event_triggered is set to true, do not update > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > Tested with iperf: > iperf3 tcp stream: > vm1 -----------------> vm2 > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > there are many tx interrupts in vm2. > but without event_triggered there are just a few tx interrupts. > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> what is this exactly? > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> > --- > drivers/virtio/virtio_ring.c | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > index cbeeea1b0439..1c36fa477966 100644 > --- a/drivers/virtio/virtio_ring.c > +++ b/drivers/virtio/virtio_ring.c > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > /* If we expect an interrupt for the next entry, tell host > * by writing event index and flush out the write before > * the read in the next get_buf call. */ > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > + !vq->event_triggered)) > virtio_store_mb(vq->weak_barriers, > &vring_used_event(&vq->split.vring), > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > * by writing event index and flush out the write before > * the read in the next get_buf call. > */ > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > + !vq->event_triggered)) > virtio_store_mb(vq->weak_barriers, > &vq->packed.vring.driver->off_wrap, > cpu_to_le16(vq->last_used_idx)); > -- > 2.37.0 (Apple Git-136)
Hi Michael, Albert, Albert Huang wrote on Sat, Mar 25, 2023 at 06:56:33PM +0800: > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > the vq->event_triggered will be set to true. It will no longer be set to > false. Unless we explicitly call virtqueue_enable_cb_delayed or > virtqueue_enable_cb_prepare. This patch (commited as 35395770f803 ("virtio_ring: don't update event idx on get_buf") in next-20230327 apparently breaks 9p, as reported by Luis in https://lkml.kernel.org/r/ZCI+7Wg5OclSlE8c@bombadil.infradead.org I've just hit had a look at recent patches[1] and reverted this to test and I can mount again, so I'm pretty sure this is the culprit, but I didn't look at the content at all yet so cannot advise further. It might very well be that we need some extra handling for 9p specifically that can be added separately if required. [1] git log 0ec57cfa721fbd36b4c4c0d9ccc5d78a78f7fa35..HEAD drivers/virtio/ This can be reproduced with a simple mount, run qemu with some -virtfs argument and `mount -t 9p -o debug=65535 tag mountpoint` will hang after these messages: 9pnet: -- p9_virtio_request (83): 9p debug: virtio request 9pnet: -- p9_virtio_request (83): virtio request kicked So I suspect we're just not getting a callback. I'll have a closer look after work, but any advice meanwhile will be appreciated! (I'm sure Luis would also like a temporary drop from -next until this is figured out, but I'll leave this up to you) > > If we disable the napi_tx, it will only be called when the tx ring > buffer is relatively small. > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > To summarize: > 1) event_triggered was set to true in vring_interrupt() > 2) after this nothing will happen for virtqueue_disable_cb() so > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > then it tries to publish new event > > To fix, if event_triggered is set to true, do not update > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > Tested with iperf: > iperf3 tcp stream: > vm1 -----------------> vm2 > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > there are many tx interrupts in vm2. > but without event_triggered there are just a few tx interrupts. > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> > --- > drivers/virtio/virtio_ring.c | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > index cbeeea1b0439..1c36fa477966 100644 > --- a/drivers/virtio/virtio_ring.c > +++ b/drivers/virtio/virtio_ring.c > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > /* If we expect an interrupt for the next entry, tell host > * by writing event index and flush out the write before > * the read in the next get_buf call. */ > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > + !vq->event_triggered)) > virtio_store_mb(vq->weak_barriers, > &vring_used_event(&vq->split.vring), > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > * by writing event index and flush out the write before > * the read in the next get_buf call. > */ > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > + !vq->event_triggered)) > virtio_store_mb(vq->weak_barriers, > &vq->packed.vring.driver->off_wrap, > cpu_to_le16(vq->last_used_idx));
On Tue, Mar 28, 2023 at 10:13 AM Dominique Martinet <asmadeus@codewreck.org> wrote: > > Hi Michael, Albert, > > Albert Huang wrote on Sat, Mar 25, 2023 at 06:56:33PM +0800: > > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > > the vq->event_triggered will be set to true. It will no longer be set to > > false. Unless we explicitly call virtqueue_enable_cb_delayed or > > virtqueue_enable_cb_prepare. > > This patch (commited as 35395770f803 ("virtio_ring: don't update event > idx on get_buf") in next-20230327 apparently breaks 9p, as reported by > Luis in https://lkml.kernel.org/r/ZCI+7Wg5OclSlE8c@bombadil.infradead.org > > I've just hit had a look at recent patches[1] and reverted this to test > and I can mount again, so I'm pretty sure this is the culprit, but I > didn't look at the content at all yet so cannot advise further. > It might very well be that we need some extra handling for 9p > specifically that can be added separately if required. > > [1] git log 0ec57cfa721fbd36b4c4c0d9ccc5d78a78f7fa35..HEAD drivers/virtio/ > > > This can be reproduced with a simple mount, run qemu with some -virtfs > argument and `mount -t 9p -o debug=65535 tag mountpoint` will hang after > these messages: > 9pnet: -- p9_virtio_request (83): 9p debug: virtio request > 9pnet: -- p9_virtio_request (83): virtio request kicked > > So I suspect we're just not getting a callback. I think so. The patch assumes the driver will call virtqueue_disable/enable_cb() which is not the case of the 9p driver. So after the first interrupt, event_triggered will be set to true forever. Thanks > > > I'll have a closer look after work, but any advice meanwhile will be > appreciated! > (I'm sure Luis would also like a temporary drop from -next until > this is figured out, but I'll leave this up to you) > > > > > > If we disable the napi_tx, it will only be called when the tx ring > > buffer is relatively small. > > > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > > > To summarize: > > 1) event_triggered was set to true in vring_interrupt() > > 2) after this nothing will happen for virtqueue_disable_cb() so > > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > > then it tries to publish new event > > > > To fix, if event_triggered is set to true, do not update > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > Tested with iperf: > > iperf3 tcp stream: > > vm1 -----------------> vm2 > > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > > there are many tx interrupts in vm2. > > but without event_triggered there are just a few tx interrupts. > > > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> > > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> > > --- > > drivers/virtio/virtio_ring.c | 6 ++++-- > > 1 file changed, 4 insertions(+), 2 deletions(-) > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > index cbeeea1b0439..1c36fa477966 100644 > > --- a/drivers/virtio/virtio_ring.c > > +++ b/drivers/virtio/virtio_ring.c > > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > > /* If we expect an interrupt for the next entry, tell host > > * by writing event index and flush out the write before > > * the read in the next get_buf call. */ > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > > + !vq->event_triggered)) > > virtio_store_mb(vq->weak_barriers, > > &vring_used_event(&vq->split.vring), > > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > > * by writing event index and flush out the write before > > * the read in the next get_buf call. > > */ > > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > > + !vq->event_triggered)) > > virtio_store_mb(vq->weak_barriers, > > &vq->packed.vring.driver->off_wrap, > > cpu_to_le16(vq->last_used_idx)); >
Jason Wang <jasowang@redhat.com> 于2023年3月28日周二 10:59写道: > > On Tue, Mar 28, 2023 at 10:13 AM Dominique Martinet > <asmadeus@codewreck.org> wrote: > > > > Hi Michael, Albert, > > > > Albert Huang wrote on Sat, Mar 25, 2023 at 06:56:33PM +0800: > > > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > > > the vq->event_triggered will be set to true. It will no longer be set to > > > false. Unless we explicitly call virtqueue_enable_cb_delayed or > > > virtqueue_enable_cb_prepare. > > > > This patch (commited as 35395770f803 ("virtio_ring: don't update event > > idx on get_buf") in next-20230327 apparently breaks 9p, as reported by > > Luis in https://lkml.kernel.org/r/ZCI+7Wg5OclSlE8c@bombadil.infradead.org > > > > I've just hit had a look at recent patches[1] and reverted this to test > > and I can mount again, so I'm pretty sure this is the culprit, but I > > didn't look at the content at all yet so cannot advise further. > > It might very well be that we need some extra handling for 9p > > specifically that can be added separately if required. > > > > [1] git log 0ec57cfa721fbd36b4c4c0d9ccc5d78a78f7fa35..HEAD drivers/virtio/ > > > > > > This can be reproduced with a simple mount, run qemu with some -virtfs > > argument and `mount -t 9p -o debug=65535 tag mountpoint` will hang after > > these messages: > > 9pnet: -- p9_virtio_request (83): 9p debug: virtio request > > 9pnet: -- p9_virtio_request (83): virtio request kicked > > > > So I suspect we're just not getting a callback. > > I think so. The patch assumes the driver will call > virtqueue_disable/enable_cb() which is not the case of the 9p driver. > > So after the first interrupt, event_triggered will be set to true forever. > > Thanks > Hi: Wang Yes, This patch assumes that all virtio-related drivers will call virtqueue_disable/enable_cb(). Thank you for raising this issue. It seems that napi_tx is only related to virtue_net. I'm thinking if we need to refactor napi_tx instead of implementing it inside virtio_ring. Thanks > > > > > > I'll have a closer look after work, but any advice meanwhile will be > > appreciated! > > (I'm sure Luis would also like a temporary drop from -next until > > this is figured out, but I'll leave this up to you) > > > > > > > > > > If we disable the napi_tx, it will only be called when the tx ring > > > buffer is relatively small. > > > > > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > > > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > > > > > To summarize: > > > 1) event_triggered was set to true in vring_interrupt() > > > 2) after this nothing will happen for virtqueue_disable_cb() so > > > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > > > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > > > then it tries to publish new event > > > > > > To fix, if event_triggered is set to true, do not update > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > > Tested with iperf: > > > iperf3 tcp stream: > > > vm1 -----------------> vm2 > > > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > > > there are many tx interrupts in vm2. > > > but without event_triggered there are just a few tx interrupts. > > > > > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > > > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > > > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> > > > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> > > > --- > > > drivers/virtio/virtio_ring.c | 6 ++++-- > > > 1 file changed, 4 insertions(+), 2 deletions(-) > > > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > > index cbeeea1b0439..1c36fa477966 100644 > > > --- a/drivers/virtio/virtio_ring.c > > > +++ b/drivers/virtio/virtio_ring.c > > > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > > > /* If we expect an interrupt for the next entry, tell host > > > * by writing event index and flush out the write before > > > * the read in the next get_buf call. */ > > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > > > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > > > + !vq->event_triggered)) > > > virtio_store_mb(vq->weak_barriers, > > > &vring_used_event(&vq->split.vring), > > > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > > > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > > > * by writing event index and flush out the write before > > > * the read in the next get_buf call. > > > */ > > > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > > > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > > > + !vq->event_triggered)) > > > virtio_store_mb(vq->weak_barriers, > > > &vq->packed.vring.driver->off_wrap, > > > cpu_to_le16(vq->last_used_idx)); > > >
On Tue, Mar 28, 2023 at 11:09 AM 黄杰 <huangjie.albert@bytedance.com> wrote: > > Jason Wang <jasowang@redhat.com> 于2023年3月28日周二 10:59写道: > > > > On Tue, Mar 28, 2023 at 10:13 AM Dominique Martinet > > <asmadeus@codewreck.org> wrote: > > > > > > Hi Michael, Albert, > > > > > > Albert Huang wrote on Sat, Mar 25, 2023 at 06:56:33PM +0800: > > > > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > > > > the vq->event_triggered will be set to true. It will no longer be set to > > > > false. Unless we explicitly call virtqueue_enable_cb_delayed or > > > > virtqueue_enable_cb_prepare. > > > > > > This patch (commited as 35395770f803 ("virtio_ring: don't update event > > > idx on get_buf") in next-20230327 apparently breaks 9p, as reported by > > > Luis in https://lkml.kernel.org/r/ZCI+7Wg5OclSlE8c@bombadil.infradead.org > > > > > > I've just hit had a look at recent patches[1] and reverted this to test > > > and I can mount again, so I'm pretty sure this is the culprit, but I > > > didn't look at the content at all yet so cannot advise further. > > > It might very well be that we need some extra handling for 9p > > > specifically that can be added separately if required. > > > > > > [1] git log 0ec57cfa721fbd36b4c4c0d9ccc5d78a78f7fa35..HEAD drivers/virtio/ > > > > > > > > > This can be reproduced with a simple mount, run qemu with some -virtfs > > > argument and `mount -t 9p -o debug=65535 tag mountpoint` will hang after > > > these messages: > > > 9pnet: -- p9_virtio_request (83): 9p debug: virtio request > > > 9pnet: -- p9_virtio_request (83): virtio request kicked > > > > > > So I suspect we're just not getting a callback. > > > > I think so. The patch assumes the driver will call > > virtqueue_disable/enable_cb() which is not the case of the 9p driver. > > > > So after the first interrupt, event_triggered will be set to true forever. > > > > Thanks > > > > Hi: Wang > > Yes, This patch assumes that all virtio-related drivers will call > virtqueue_disable/enable_cb(). > Thank you for raising this issue. > > It seems that napi_tx is only related to virtue_net. I'm thinking if > we need to refactor > napi_tx instead of implementing it inside virtio_ring. We can hear from others. I think it's better not to workaround virtio_ring issues in a specific driver. It might just add more hacks. We should correctly set VRING_AVAIL_F_NO_INTERRUPT, Do you think the following might work (not even a compile test)? diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c index 41144b5246a8..12f4efb6dc54 100644 --- a/drivers/virtio/virtio_ring.c +++ b/drivers/virtio/virtio_ring.c @@ -852,16 +852,16 @@ static void virtqueue_disable_cb_split(struct virtqueue *_vq) { struct vring_virtqueue *vq = to_vvq(_vq); - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) { - vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; - if (vq->event) - /* TODO: this is a hack. Figure out a cleaner value to write. */ - vring_used_event(&vq->split.vring) = 0x0; - else - vq->split.vring.avail->flags = - cpu_to_virtio16(_vq->vdev, - vq->split.avail_flags_shadow); - } + if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) + vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; + + if (vq->event && !vq->event_triggered) + /* TODO: this is a hack. Figure out a cleaner value to write. */ + vring_used_event(&vq->split.vring) = 0x0; + else + vq->split.vring.avail->flags = + cpu_to_virtio16(_vq->vdev, + vq->split.avail_flags_shadow); } static unsigned int virtqueue_enable_cb_prepare_split(struct virtqueue *_vq) @@ -1697,8 +1697,10 @@ static void virtqueue_disable_cb_packed(struct virtqueue *_vq) { struct vring_virtqueue *vq = to_vvq(_vq); - if (vq->packed.event_flags_shadow != VRING_PACKED_EVENT_FLAG_DISABLE) { + if (!(vq->packed.event_flags_shadow & VRING_PACKED_EVENT_FLAG_DISABLE)) vq->packed.event_flags_shadow = VRING_PACKED_EVENT_FLAG_DISABLE; + + if (vq->event_triggered) vq->packed.vring.driver->flags = cpu_to_le16(vq->packed.event_flags_shadow); } @@ -2330,12 +2332,6 @@ void virtqueue_disable_cb(struct virtqueue *_vq) { struct vring_virtqueue *vq = to_vvq(_vq); - /* If device triggered an event already it won't trigger one again: - * no need to disable. - */ - if (vq->event_triggered) - return; - if (vq->packed_ring) virtqueue_disable_cb_packed(_vq); else Thanks > > Thanks > > > > > > > > > > I'll have a closer look after work, but any advice meanwhile will be > > > appreciated! > > > (I'm sure Luis would also like a temporary drop from -next until > > > this is figured out, but I'll leave this up to you) > > > > > > > > > > > > > > If we disable the napi_tx, it will only be called when the tx ring > > > > buffer is relatively small. > > > > > > > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > > > > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > > > > > > > To summarize: > > > > 1) event_triggered was set to true in vring_interrupt() > > > > 2) after this nothing will happen for virtqueue_disable_cb() so > > > > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > > > > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > > > > then it tries to publish new event > > > > > > > > To fix, if event_triggered is set to true, do not update > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > > > > Tested with iperf: > > > > iperf3 tcp stream: > > > > vm1 -----------------> vm2 > > > > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > > > > there are many tx interrupts in vm2. > > > > but without event_triggered there are just a few tx interrupts. > > > > > > > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > > > > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > > > > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> > > > > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> > > > > --- > > > > drivers/virtio/virtio_ring.c | 6 ++++-- > > > > 1 file changed, 4 insertions(+), 2 deletions(-) > > > > > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > > > index cbeeea1b0439..1c36fa477966 100644 > > > > --- a/drivers/virtio/virtio_ring.c > > > > +++ b/drivers/virtio/virtio_ring.c > > > > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > > > > /* If we expect an interrupt for the next entry, tell host > > > > * by writing event index and flush out the write before > > > > * the read in the next get_buf call. */ > > > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > > > > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > > > > + !vq->event_triggered)) > > > > virtio_store_mb(vq->weak_barriers, > > > > &vring_used_event(&vq->split.vring), > > > > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > > > > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > > > > * by writing event index and flush out the write before > > > > * the read in the next get_buf call. > > > > */ > > > > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > > > > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > > > > + !vq->event_triggered)) > > > > virtio_store_mb(vq->weak_barriers, > > > > &vq->packed.vring.driver->off_wrap, > > > > cpu_to_le16(vq->last_used_idx)); > > > > > >
On Tue, Mar 28, 2023 at 11:13:32AM +0900, Dominique Martinet wrote: > Hi Michael, Albert, > > Albert Huang wrote on Sat, Mar 25, 2023 at 06:56:33PM +0800: > > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > > the vq->event_triggered will be set to true. It will no longer be set to > > false. Unless we explicitly call virtqueue_enable_cb_delayed or > > virtqueue_enable_cb_prepare. > > This patch (commited as 35395770f803 ("virtio_ring: don't update event > idx on get_buf") in next-20230327 apparently breaks 9p, as reported by > Luis in https://lkml.kernel.org/r/ZCI+7Wg5OclSlE8c@bombadil.infradead.org Spot on, reverting that commit fixes it. Luis
Jason Wang <jasowang@redhat.com> 于2023年3月28日周二 11:40写道: > > On Tue, Mar 28, 2023 at 11:09 AM 黄杰 <huangjie.albert@bytedance.com> wrote: > > > > Jason Wang <jasowang@redhat.com> 于2023年3月28日周二 10:59写道: > > > > > > On Tue, Mar 28, 2023 at 10:13 AM Dominique Martinet > > > <asmadeus@codewreck.org> wrote: > > > > > > > > Hi Michael, Albert, > > > > > > > > Albert Huang wrote on Sat, Mar 25, 2023 at 06:56:33PM +0800: > > > > > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > > > > > the vq->event_triggered will be set to true. It will no longer be set to > > > > > false. Unless we explicitly call virtqueue_enable_cb_delayed or > > > > > virtqueue_enable_cb_prepare. > > > > > > > > This patch (commited as 35395770f803 ("virtio_ring: don't update event > > > > idx on get_buf") in next-20230327 apparently breaks 9p, as reported by > > > > Luis in https://lkml.kernel.org/r/ZCI+7Wg5OclSlE8c@bombadil.infradead.org > > > > > > > > I've just hit had a look at recent patches[1] and reverted this to test > > > > and I can mount again, so I'm pretty sure this is the culprit, but I > > > > didn't look at the content at all yet so cannot advise further. > > > > It might very well be that we need some extra handling for 9p > > > > specifically that can be added separately if required. > > > > > > > > [1] git log 0ec57cfa721fbd36b4c4c0d9ccc5d78a78f7fa35..HEAD drivers/virtio/ > > > > > > > > > > > > This can be reproduced with a simple mount, run qemu with some -virtfs > > > > argument and `mount -t 9p -o debug=65535 tag mountpoint` will hang after > > > > these messages: > > > > 9pnet: -- p9_virtio_request (83): 9p debug: virtio request > > > > 9pnet: -- p9_virtio_request (83): virtio request kicked > > > > > > > > So I suspect we're just not getting a callback. > > > > > > I think so. The patch assumes the driver will call > > > virtqueue_disable/enable_cb() which is not the case of the 9p driver. > > > > > > So after the first interrupt, event_triggered will be set to true forever. > > > > > > Thanks > > > > > > > Hi: Wang > > > > Yes, This patch assumes that all virtio-related drivers will call > > virtqueue_disable/enable_cb(). > > Thank you for raising this issue. > > > > It seems that napi_tx is only related to virtue_net. I'm thinking if > > we need to refactor > > napi_tx instead of implementing it inside virtio_ring. > > We can hear from others. > > I think it's better not to workaround virtio_ring issues in a specific > driver. It might just add more hacks. We should correctly set > VRING_AVAIL_F_NO_INTERRUPT, > > Do you think the following might work (not even a compile test)? > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > index 41144b5246a8..12f4efb6dc54 100644 > --- a/drivers/virtio/virtio_ring.c > +++ b/drivers/virtio/virtio_ring.c > @@ -852,16 +852,16 @@ static void virtqueue_disable_cb_split(struct > virtqueue *_vq) > { > struct vring_virtqueue *vq = to_vvq(_vq); > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) { > - vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > - if (vq->event) > - /* TODO: this is a hack. Figure out a cleaner > value to write. */ > - vring_used_event(&vq->split.vring) = 0x0; > - else > - vq->split.vring.avail->flags = > - cpu_to_virtio16(_vq->vdev, > - vq->split.avail_flags_shadow); > - } > + if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > + vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > + > + if (vq->event && !vq->event_triggered) > + /* TODO: this is a hack. Figure out a cleaner value to write. */ > + vring_used_event(&vq->split.vring) = 0x0; > + else > + vq->split.vring.avail->flags = > + cpu_to_virtio16(_vq->vdev, > + vq->split.avail_flags_shadow); > } > > static unsigned int virtqueue_enable_cb_prepare_split(struct virtqueue *_vq) > @@ -1697,8 +1697,10 @@ static void virtqueue_disable_cb_packed(struct > virtqueue *_vq) > { > struct vring_virtqueue *vq = to_vvq(_vq); > > - if (vq->packed.event_flags_shadow != VRING_PACKED_EVENT_FLAG_DISABLE) { > + if (!(vq->packed.event_flags_shadow & VRING_PACKED_EVENT_FLAG_DISABLE)) > vq->packed.event_flags_shadow = VRING_PACKED_EVENT_FLAG_DISABLE; > + > + if (vq->event_triggered) > vq->packed.vring.driver->flags = > cpu_to_le16(vq->packed.event_flags_shadow); > } > @@ -2330,12 +2332,6 @@ void virtqueue_disable_cb(struct virtqueue *_vq) > { > struct vring_virtqueue *vq = to_vvq(_vq); > > - /* If device triggered an event already it won't trigger one again: > - * no need to disable. > - */ > - if (vq->event_triggered) > - return; > - > if (vq->packed_ring) > virtqueue_disable_cb_packed(_vq); > else > > Thanks > Hi, This patch seems to address the issue I initially raised and also avoids the problem with virtio-9P. but maybe this is a better choice: diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c index 307e139cb11d..6784d155c781 100644 --- a/drivers/virtio/virtio_ring.c +++ b/drivers/virtio/virtio_ring.c @@ -812,6 +812,10 @@ static void virtqueue_disable_cb_split(struct virtqueue *_vq) if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) { vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; + + if (vq->event_triggered) + return; + if (vq->event) /* TODO: this is a hack. Figure out a cleaner value to write. */ vring_used_event(&vq->split.vring) = 0x0; @@ -1546,6 +1550,10 @@ static void virtqueue_disable_cb_packed(struct virtqueue *_vq) if (vq->packed.event_flags_shadow != VRING_PACKED_EVENT_FLAG_DISABLE) { vq->packed.event_flags_shadow = VRING_PACKED_EVENT_FLAG_DISABLE; + + if (vq->event_triggered) + return; + vq->packed.vring.driver->flags = cpu_to_le16(vq->packed.event_flags_shadow); } @@ -2063,12 +2071,6 @@ void virtqueue_disable_cb(struct virtqueue *_vq) { struct vring_virtqueue *vq = to_vvq(_vq); - /* If device triggered an event already it won't trigger one again: - * no need to disable. - */ - if (vq->event_triggered) - return; - if (vq->packed_ring) virtqueue_disable_cb_packed(_vq); else Does Michael have any other suggestions? Thanks. > > > > Thanks > > > > > > > > > > > > > > I'll have a closer look after work, but any advice meanwhile will be > > > > appreciated! > > > > (I'm sure Luis would also like a temporary drop from -next until > > > > this is figured out, but I'll leave this up to you) > > > > > > > > > > > > > > > > > > If we disable the napi_tx, it will only be called when the tx ring > > > > > buffer is relatively small. > > > > > > > > > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > > > > > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > > > > > > > > > To summarize: > > > > > 1) event_triggered was set to true in vring_interrupt() > > > > > 2) after this nothing will happen for virtqueue_disable_cb() so > > > > > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > > > > > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > > > > > then it tries to publish new event > > > > > > > > > > To fix, if event_triggered is set to true, do not update > > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > > > > > > Tested with iperf: > > > > > iperf3 tcp stream: > > > > > vm1 -----------------> vm2 > > > > > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > > > > > there are many tx interrupts in vm2. > > > > > but without event_triggered there are just a few tx interrupts. > > > > > > > > > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > > > > > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > > > > > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> > > > > > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> > > > > > --- > > > > > drivers/virtio/virtio_ring.c | 6 ++++-- > > > > > 1 file changed, 4 insertions(+), 2 deletions(-) > > > > > > > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > > > > index cbeeea1b0439..1c36fa477966 100644 > > > > > --- a/drivers/virtio/virtio_ring.c > > > > > +++ b/drivers/virtio/virtio_ring.c > > > > > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > > > > > /* If we expect an interrupt for the next entry, tell host > > > > > * by writing event index and flush out the write before > > > > > * the read in the next get_buf call. */ > > > > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > > > > > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > > > > > + !vq->event_triggered)) > > > > > virtio_store_mb(vq->weak_barriers, > > > > > &vring_used_event(&vq->split.vring), > > > > > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > > > > > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > > > > > * by writing event index and flush out the write before > > > > > * the read in the next get_buf call. > > > > > */ > > > > > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > > > > > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > > > > > + !vq->event_triggered)) > > > > > virtio_store_mb(vq->weak_barriers, > > > > > &vq->packed.vring.driver->off_wrap, > > > > > cpu_to_le16(vq->last_used_idx)); > > > > > > > > > >
On Tue, Mar 28, 2023 at 05:09:19PM +0800, 黄杰 wrote: > Jason Wang <jasowang@redhat.com> 于2023年3月28日周二 11:40写道: > > > > On Tue, Mar 28, 2023 at 11:09 AM 黄杰 <huangjie.albert@bytedance.com> wrote: > > > > > > Jason Wang <jasowang@redhat.com> 于2023年3月28日周二 10:59写道: > > > > > > > > On Tue, Mar 28, 2023 at 10:13 AM Dominique Martinet > > > > <asmadeus@codewreck.org> wrote: > > > > > > > > > > Hi Michael, Albert, > > > > > > > > > > Albert Huang wrote on Sat, Mar 25, 2023 at 06:56:33PM +0800: > > > > > > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > > > > > > the vq->event_triggered will be set to true. It will no longer be set to > > > > > > false. Unless we explicitly call virtqueue_enable_cb_delayed or > > > > > > virtqueue_enable_cb_prepare. > > > > > > > > > > This patch (commited as 35395770f803 ("virtio_ring: don't update event > > > > > idx on get_buf") in next-20230327 apparently breaks 9p, as reported by > > > > > Luis in https://lkml.kernel.org/r/ZCI+7Wg5OclSlE8c@bombadil.infradead.org > > > > > > > > > > I've just hit had a look at recent patches[1] and reverted this to test > > > > > and I can mount again, so I'm pretty sure this is the culprit, but I > > > > > didn't look at the content at all yet so cannot advise further. > > > > > It might very well be that we need some extra handling for 9p > > > > > specifically that can be added separately if required. > > > > > > > > > > [1] git log 0ec57cfa721fbd36b4c4c0d9ccc5d78a78f7fa35..HEAD drivers/virtio/ > > > > > > > > > > > > > > > This can be reproduced with a simple mount, run qemu with some -virtfs > > > > > argument and `mount -t 9p -o debug=65535 tag mountpoint` will hang after > > > > > these messages: > > > > > 9pnet: -- p9_virtio_request (83): 9p debug: virtio request > > > > > 9pnet: -- p9_virtio_request (83): virtio request kicked > > > > > > > > > > So I suspect we're just not getting a callback. > > > > > > > > I think so. The patch assumes the driver will call > > > > virtqueue_disable/enable_cb() which is not the case of the 9p driver. > > > > > > > > So after the first interrupt, event_triggered will be set to true forever. > > > > > > > > Thanks > > > > > > > > > > Hi: Wang > > > > > > Yes, This patch assumes that all virtio-related drivers will call > > > virtqueue_disable/enable_cb(). > > > Thank you for raising this issue. > > > > > > It seems that napi_tx is only related to virtue_net. I'm thinking if > > > we need to refactor > > > napi_tx instead of implementing it inside virtio_ring. > > > > We can hear from others. > > > > I think it's better not to workaround virtio_ring issues in a specific > > driver. It might just add more hacks. We should correctly set > > VRING_AVAIL_F_NO_INTERRUPT, > > > > Do you think the following might work (not even a compile test)? > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > index 41144b5246a8..12f4efb6dc54 100644 > > --- a/drivers/virtio/virtio_ring.c > > +++ b/drivers/virtio/virtio_ring.c > > @@ -852,16 +852,16 @@ static void virtqueue_disable_cb_split(struct > > virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) { > > - vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > > - if (vq->event) > > - /* TODO: this is a hack. Figure out a cleaner > > value to write. */ > > - vring_used_event(&vq->split.vring) = 0x0; > > - else > > - vq->split.vring.avail->flags = > > - cpu_to_virtio16(_vq->vdev, > > - vq->split.avail_flags_shadow); > > - } > > + if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > > + vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > > + > > + if (vq->event && !vq->event_triggered) > > + /* TODO: this is a hack. Figure out a cleaner value to write. */ > > + vring_used_event(&vq->split.vring) = 0x0; > > + else > > + vq->split.vring.avail->flags = > > + cpu_to_virtio16(_vq->vdev, > > + vq->split.avail_flags_shadow); > > } > > > > static unsigned int virtqueue_enable_cb_prepare_split(struct virtqueue *_vq) > > @@ -1697,8 +1697,10 @@ static void virtqueue_disable_cb_packed(struct > > virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > - if (vq->packed.event_flags_shadow != VRING_PACKED_EVENT_FLAG_DISABLE) { > > + if (!(vq->packed.event_flags_shadow & VRING_PACKED_EVENT_FLAG_DISABLE)) > > vq->packed.event_flags_shadow = VRING_PACKED_EVENT_FLAG_DISABLE; > > + > > + if (vq->event_triggered) > > vq->packed.vring.driver->flags = > > cpu_to_le16(vq->packed.event_flags_shadow); > > } > > @@ -2330,12 +2332,6 @@ void virtqueue_disable_cb(struct virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > - /* If device triggered an event already it won't trigger one again: > > - * no need to disable. > > - */ > > - if (vq->event_triggered) > > - return; > > - > > if (vq->packed_ring) > > virtqueue_disable_cb_packed(_vq); > > else > > > > Thanks > > > > Hi, This patch seems to address the issue I initially raised and also > avoids the problem with virtio-9P. > > but maybe this is a better choice: > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > index 307e139cb11d..6784d155c781 100644 > --- a/drivers/virtio/virtio_ring.c > +++ b/drivers/virtio/virtio_ring.c > @@ -812,6 +812,10 @@ static void virtqueue_disable_cb_split(struct > virtqueue *_vq) > > if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) { > vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > + > + if (vq->event_triggered) > + return; > + > if (vq->event) > /* TODO: this is a hack. Figure out a cleaner > value to write. */ > vring_used_event(&vq->split.vring) = 0x0; > @@ -1546,6 +1550,10 @@ static void virtqueue_disable_cb_packed(struct > virtqueue *_vq) > > if (vq->packed.event_flags_shadow != VRING_PACKED_EVENT_FLAG_DISABLE) { > vq->packed.event_flags_shadow = VRING_PACKED_EVENT_FLAG_DISABLE; > + > + if (vq->event_triggered) > + return; > + > vq->packed.vring.driver->flags = > cpu_to_le16(vq->packed.event_flags_shadow); > } > @@ -2063,12 +2071,6 @@ void virtqueue_disable_cb(struct virtqueue *_vq) > { > struct vring_virtqueue *vq = to_vvq(_vq); > > - /* If device triggered an event already it won't trigger one again: > - * no need to disable. > - */ > - if (vq->event_triggered) > - return; > - > if (vq->packed_ring) > virtqueue_disable_cb_packed(_vq); > else > > Does Michael have any other suggestions? > > Thanks. Hmm what bothers me is this breaks the underlying assumption that shadow is an exact match of the shared memory. Need to check this does not cascade. But I am still trying to get my head around what the issue is. > > > > > > Thanks > > > > > > > > > > > > > > > > > > I'll have a closer look after work, but any advice meanwhile will be > > > > > appreciated! > > > > > (I'm sure Luis would also like a temporary drop from -next until > > > > > this is figured out, but I'll leave this up to you) > > > > > > > > > > > > > > > > > > > > > > If we disable the napi_tx, it will only be called when the tx ring > > > > > > buffer is relatively small. > > > > > > > > > > > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > > > > > > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > > > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > > > > > > > > > > > To summarize: > > > > > > 1) event_triggered was set to true in vring_interrupt() > > > > > > 2) after this nothing will happen for virtqueue_disable_cb() so > > > > > > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > > > > > > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > > > > > > then it tries to publish new event > > > > > > > > > > > > To fix, if event_triggered is set to true, do not update > > > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > > > > > > > > Tested with iperf: > > > > > > iperf3 tcp stream: > > > > > > vm1 -----------------> vm2 > > > > > > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > > > > > > there are many tx interrupts in vm2. > > > > > > but without event_triggered there are just a few tx interrupts. > > > > > > > > > > > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > > > > > > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > > > > > > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> > > > > > > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> > > > > > > --- > > > > > > drivers/virtio/virtio_ring.c | 6 ++++-- > > > > > > 1 file changed, 4 insertions(+), 2 deletions(-) > > > > > > > > > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > > > > > index cbeeea1b0439..1c36fa477966 100644 > > > > > > --- a/drivers/virtio/virtio_ring.c > > > > > > +++ b/drivers/virtio/virtio_ring.c > > > > > > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > > > > > > /* If we expect an interrupt for the next entry, tell host > > > > > > * by writing event index and flush out the write before > > > > > > * the read in the next get_buf call. */ > > > > > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > > > > > > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > > > > > > + !vq->event_triggered)) > > > > > > virtio_store_mb(vq->weak_barriers, > > > > > > &vring_used_event(&vq->split.vring), > > > > > > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > > > > > > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > > > > > > * by writing event index and flush out the write before > > > > > > * the read in the next get_buf call. > > > > > > */ > > > > > > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > > > > > > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > > > > > > + !vq->event_triggered)) > > > > > > virtio_store_mb(vq->weak_barriers, > > > > > > &vq->packed.vring.driver->off_wrap, > > > > > > cpu_to_le16(vq->last_used_idx)); > > > > > > > > > > > > > >
On Tue, Mar 28, 2023 at 11:39:59AM +0800, Jason Wang wrote: > On Tue, Mar 28, 2023 at 11:09 AM 黄杰 <huangjie.albert@bytedance.com> wrote: > > > > Jason Wang <jasowang@redhat.com> 于2023年3月28日周二 10:59写道: > > > > > > On Tue, Mar 28, 2023 at 10:13 AM Dominique Martinet > > > <asmadeus@codewreck.org> wrote: > > > > > > > > Hi Michael, Albert, > > > > > > > > Albert Huang wrote on Sat, Mar 25, 2023 at 06:56:33PM +0800: > > > > > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > > > > > the vq->event_triggered will be set to true. It will no longer be set to > > > > > false. Unless we explicitly call virtqueue_enable_cb_delayed or > > > > > virtqueue_enable_cb_prepare. > > > > > > > > This patch (commited as 35395770f803 ("virtio_ring: don't update event > > > > idx on get_buf") in next-20230327 apparently breaks 9p, as reported by > > > > Luis in https://lkml.kernel.org/r/ZCI+7Wg5OclSlE8c@bombadil.infradead.org > > > > > > > > I've just hit had a look at recent patches[1] and reverted this to test > > > > and I can mount again, so I'm pretty sure this is the culprit, but I > > > > didn't look at the content at all yet so cannot advise further. > > > > It might very well be that we need some extra handling for 9p > > > > specifically that can be added separately if required. > > > > > > > > [1] git log 0ec57cfa721fbd36b4c4c0d9ccc5d78a78f7fa35..HEAD drivers/virtio/ > > > > > > > > > > > > This can be reproduced with a simple mount, run qemu with some -virtfs > > > > argument and `mount -t 9p -o debug=65535 tag mountpoint` will hang after > > > > these messages: > > > > 9pnet: -- p9_virtio_request (83): 9p debug: virtio request > > > > 9pnet: -- p9_virtio_request (83): virtio request kicked > > > > > > > > So I suspect we're just not getting a callback. > > > > > > I think so. The patch assumes the driver will call > > > virtqueue_disable/enable_cb() which is not the case of the 9p driver. > > > > > > So after the first interrupt, event_triggered will be set to true forever. > > > > > > Thanks > > > > > > > Hi: Wang > > > > Yes, This patch assumes that all virtio-related drivers will call > > virtqueue_disable/enable_cb(). > > Thank you for raising this issue. > > > > It seems that napi_tx is only related to virtue_net. I'm thinking if > > we need to refactor > > napi_tx instead of implementing it inside virtio_ring. > > We can hear from others. > > I think it's better not to workaround virtio_ring issues in a specific > driver. It might just add more hacks. We should correctly set > VRING_AVAIL_F_NO_INTERRUPT, I am still stuck trying to understand why we don't set it. How does event_triggered end up getting set without event index support? Thanks!
On Tue, Mar 28, 2023 at 05:09:19PM +0800, 黄杰 wrote: > Jason Wang <jasowang@redhat.com> 于2023年3月28日周二 11:40写道: > > > > On Tue, Mar 28, 2023 at 11:09 AM 黄杰 <huangjie.albert@bytedance.com> wrote: > > > > > > Jason Wang <jasowang@redhat.com> 于2023年3月28日周二 10:59写道: > > > > > > > > On Tue, Mar 28, 2023 at 10:13 AM Dominique Martinet > > > > <asmadeus@codewreck.org> wrote: > > > > > > > > > > Hi Michael, Albert, > > > > > > > > > > Albert Huang wrote on Sat, Mar 25, 2023 at 06:56:33PM +0800: > > > > > > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > > > > > > the vq->event_triggered will be set to true. It will no longer be set to > > > > > > false. Unless we explicitly call virtqueue_enable_cb_delayed or > > > > > > virtqueue_enable_cb_prepare. > > > > > > > > > > This patch (commited as 35395770f803 ("virtio_ring: don't update event > > > > > idx on get_buf") in next-20230327 apparently breaks 9p, as reported by > > > > > Luis in https://lkml.kernel.org/r/ZCI+7Wg5OclSlE8c@bombadil.infradead.org > > > > > > > > > > I've just hit had a look at recent patches[1] and reverted this to test > > > > > and I can mount again, so I'm pretty sure this is the culprit, but I > > > > > didn't look at the content at all yet so cannot advise further. > > > > > It might very well be that we need some extra handling for 9p > > > > > specifically that can be added separately if required. > > > > > > > > > > [1] git log 0ec57cfa721fbd36b4c4c0d9ccc5d78a78f7fa35..HEAD drivers/virtio/ > > > > > > > > > > > > > > > This can be reproduced with a simple mount, run qemu with some -virtfs > > > > > argument and `mount -t 9p -o debug=65535 tag mountpoint` will hang after > > > > > these messages: > > > > > 9pnet: -- p9_virtio_request (83): 9p debug: virtio request > > > > > 9pnet: -- p9_virtio_request (83): virtio request kicked > > > > > > > > > > So I suspect we're just not getting a callback. > > > > > > > > I think so. The patch assumes the driver will call > > > > virtqueue_disable/enable_cb() which is not the case of the 9p driver. > > > > > > > > So after the first interrupt, event_triggered will be set to true forever. > > > > > > > > Thanks > > > > > > > > > > Hi: Wang > > > > > > Yes, This patch assumes that all virtio-related drivers will call > > > virtqueue_disable/enable_cb(). > > > Thank you for raising this issue. > > > > > > It seems that napi_tx is only related to virtue_net. I'm thinking if > > > we need to refactor > > > napi_tx instead of implementing it inside virtio_ring. > > > > We can hear from others. > > > > I think it's better not to workaround virtio_ring issues in a specific > > driver. It might just add more hacks. We should correctly set > > VRING_AVAIL_F_NO_INTERRUPT, > > > > Do you think the following might work (not even a compile test)? > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > index 41144b5246a8..12f4efb6dc54 100644 > > --- a/drivers/virtio/virtio_ring.c > > +++ b/drivers/virtio/virtio_ring.c > > @@ -852,16 +852,16 @@ static void virtqueue_disable_cb_split(struct > > virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) { > > - vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > > - if (vq->event) > > - /* TODO: this is a hack. Figure out a cleaner > > value to write. */ > > - vring_used_event(&vq->split.vring) = 0x0; > > - else > > - vq->split.vring.avail->flags = > > - cpu_to_virtio16(_vq->vdev, > > - vq->split.avail_flags_shadow); > > - } > > + if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > > + vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > > + > > + if (vq->event && !vq->event_triggered) > > + /* TODO: this is a hack. Figure out a cleaner value to write. */ > > + vring_used_event(&vq->split.vring) = 0x0; > > + else > > + vq->split.vring.avail->flags = > > + cpu_to_virtio16(_vq->vdev, > > + vq->split.avail_flags_shadow); > > } > > > > static unsigned int virtqueue_enable_cb_prepare_split(struct virtqueue *_vq) > > @@ -1697,8 +1697,10 @@ static void virtqueue_disable_cb_packed(struct > > virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > - if (vq->packed.event_flags_shadow != VRING_PACKED_EVENT_FLAG_DISABLE) { > > + if (!(vq->packed.event_flags_shadow & VRING_PACKED_EVENT_FLAG_DISABLE)) > > vq->packed.event_flags_shadow = VRING_PACKED_EVENT_FLAG_DISABLE; > > + > > + if (vq->event_triggered) > > vq->packed.vring.driver->flags = > > cpu_to_le16(vq->packed.event_flags_shadow); > > } > > @@ -2330,12 +2332,6 @@ void virtqueue_disable_cb(struct virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > - /* If device triggered an event already it won't trigger one again: > > - * no need to disable. > > - */ > > - if (vq->event_triggered) > > - return; > > - > > if (vq->packed_ring) > > virtqueue_disable_cb_packed(_vq); > > else > > > > Thanks > > > > Hi, This patch seems to address the issue I initially raised and also > avoids the problem with virtio-9P. > > but maybe this is a better choice: > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > index 307e139cb11d..6784d155c781 100644 > --- a/drivers/virtio/virtio_ring.c > +++ b/drivers/virtio/virtio_ring.c > @@ -812,6 +812,10 @@ static void virtqueue_disable_cb_split(struct > virtqueue *_vq) > > if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) { > vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > + > + if (vq->event_triggered) > + return; > + > if (vq->event) > /* TODO: this is a hack. Figure out a cleaner > value to write. */ > vring_used_event(&vq->split.vring) = 0x0; > @@ -1546,6 +1550,10 @@ static void virtqueue_disable_cb_packed(struct > virtqueue *_vq) > > if (vq->packed.event_flags_shadow != VRING_PACKED_EVENT_FLAG_DISABLE) { > vq->packed.event_flags_shadow = VRING_PACKED_EVENT_FLAG_DISABLE; > + > + if (vq->event_triggered) > + return; > + > vq->packed.vring.driver->flags = > cpu_to_le16(vq->packed.event_flags_shadow); > } > @@ -2063,12 +2071,6 @@ void virtqueue_disable_cb(struct virtqueue *_vq) > { > struct vring_virtqueue *vq = to_vvq(_vq); > > - /* If device triggered an event already it won't trigger one again: > - * no need to disable. > - */ > - if (vq->event_triggered) > - return; > - > if (vq->packed_ring) > virtqueue_disable_cb_packed(_vq); > else > > Does Michael have any other suggestions? > > Thanks. Oh I finally understand I think. The issue is with event index enabled. interrupt fires once, we set event index to 0x0. since shadow is not set then we never update it again. I agree, your patch is a good fix, just please copy the comment you are removing to the two places where we check event_triggered now. I dropped patch v2 from my tree and please post v3 with this fixup squashed. Thanks a lot! Apropos if we fixed all drivers to call disable/enable_cb explicitly we could remove branch on data path, but it's a lot of work and it's easy to miss some drivers. > > > > > > Thanks > > > > > > > > > > > > > > > > > > I'll have a closer look after work, but any advice meanwhile will be > > > > > appreciated! > > > > > (I'm sure Luis would also like a temporary drop from -next until > > > > > this is figured out, but I'll leave this up to you) > > > > > > > > > > > > > > > > > > > > > > If we disable the napi_tx, it will only be called when the tx ring > > > > > > buffer is relatively small. > > > > > > > > > > > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > > > > > > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > > > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > > > > > > > > > > > To summarize: > > > > > > 1) event_triggered was set to true in vring_interrupt() > > > > > > 2) after this nothing will happen for virtqueue_disable_cb() so > > > > > > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > > > > > > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > > > > > > then it tries to publish new event > > > > > > > > > > > > To fix, if event_triggered is set to true, do not update > > > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > > > > > > > > Tested with iperf: > > > > > > iperf3 tcp stream: > > > > > > vm1 -----------------> vm2 > > > > > > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > > > > > > there are many tx interrupts in vm2. > > > > > > but without event_triggered there are just a few tx interrupts. > > > > > > > > > > > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > > > > > > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > > > > > > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> > > > > > > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> > > > > > > --- > > > > > > drivers/virtio/virtio_ring.c | 6 ++++-- > > > > > > 1 file changed, 4 insertions(+), 2 deletions(-) > > > > > > > > > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > > > > > index cbeeea1b0439..1c36fa477966 100644 > > > > > > --- a/drivers/virtio/virtio_ring.c > > > > > > +++ b/drivers/virtio/virtio_ring.c > > > > > > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > > > > > > /* If we expect an interrupt for the next entry, tell host > > > > > > * by writing event index and flush out the write before > > > > > > * the read in the next get_buf call. */ > > > > > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > > > > > > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > > > > > > + !vq->event_triggered)) > > > > > > virtio_store_mb(vq->weak_barriers, > > > > > > &vring_used_event(&vq->split.vring), > > > > > > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > > > > > > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > > > > > > * by writing event index and flush out the write before > > > > > > * the read in the next get_buf call. > > > > > > */ > > > > > > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > > > > > > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > > > > > > + !vq->event_triggered)) > > > > > > virtio_store_mb(vq->weak_barriers, > > > > > > &vq->packed.vring.driver->off_wrap, > > > > > > cpu_to_le16(vq->last_used_idx)); > > > > > > > > > > > > > >
On Sat, Mar 25, 2023 at 06:56:33PM +0800, Albert Huang wrote: > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > the vq->event_triggered will be set to true. It will no longer be set to > false. Unless we explicitly call virtqueue_enable_cb_delayed or > virtqueue_enable_cb_prepare. > > If we disable the napi_tx, it will only be called when the tx ring > buffer is relatively small. > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > To summarize: > 1) event_triggered was set to true in vring_interrupt() > 2) after this nothing will happen for virtqueue_disable_cb() so > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > then it tries to publish new event > > To fix, if event_triggered is set to true, do not update > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > Tested with iperf: > iperf3 tcp stream: > vm1 -----------------> vm2 > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > there are many tx interrupts in vm2. > but without event_triggered there are just a few tx interrupts. > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> dropped for now due to breakage of 9p. Pls post v3 with the fix you suggested (moving the check of vq->event_triggered). > --- > drivers/virtio/virtio_ring.c | 6 ++++-- > 1 file changed, 4 insertions(+), 2 deletions(-) > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > index cbeeea1b0439..1c36fa477966 100644 > --- a/drivers/virtio/virtio_ring.c > +++ b/drivers/virtio/virtio_ring.c > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > /* If we expect an interrupt for the next entry, tell host > * by writing event index and flush out the write before > * the read in the next get_buf call. */ > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > + !vq->event_triggered)) > virtio_store_mb(vq->weak_barriers, > &vring_used_event(&vq->split.vring), > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > * by writing event index and flush out the write before > * the read in the next get_buf call. > */ > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > + !vq->event_triggered)) > virtio_store_mb(vq->weak_barriers, > &vq->packed.vring.driver->off_wrap, > cpu_to_le16(vq->last_used_idx)); > -- > 2.37.0 (Apple Git-136)
On Tue, Mar 28, 2023 at 11:39:59AM +0800, Jason Wang wrote: > On Tue, Mar 28, 2023 at 11:09 AM 黄杰 <huangjie.albert@bytedance.com> wrote: > > > > Jason Wang <jasowang@redhat.com> 于2023年3月28日周二 10:59写道: > > > > > > On Tue, Mar 28, 2023 at 10:13 AM Dominique Martinet > > > <asmadeus@codewreck.org> wrote: > > > > > > > > Hi Michael, Albert, > > > > > > > > Albert Huang wrote on Sat, Mar 25, 2023 at 06:56:33PM +0800: > > > > > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > > > > > the vq->event_triggered will be set to true. It will no longer be set to > > > > > false. Unless we explicitly call virtqueue_enable_cb_delayed or > > > > > virtqueue_enable_cb_prepare. > > > > > > > > This patch (commited as 35395770f803 ("virtio_ring: don't update event > > > > idx on get_buf") in next-20230327 apparently breaks 9p, as reported by > > > > Luis in https://lkml.kernel.org/r/ZCI+7Wg5OclSlE8c@bombadil.infradead.org > > > > > > > > I've just hit had a look at recent patches[1] and reverted this to test > > > > and I can mount again, so I'm pretty sure this is the culprit, but I > > > > didn't look at the content at all yet so cannot advise further. > > > > It might very well be that we need some extra handling for 9p > > > > specifically that can be added separately if required. > > > > > > > > [1] git log 0ec57cfa721fbd36b4c4c0d9ccc5d78a78f7fa35..HEAD drivers/virtio/ > > > > > > > > > > > > This can be reproduced with a simple mount, run qemu with some -virtfs > > > > argument and `mount -t 9p -o debug=65535 tag mountpoint` will hang after > > > > these messages: > > > > 9pnet: -- p9_virtio_request (83): 9p debug: virtio request > > > > 9pnet: -- p9_virtio_request (83): virtio request kicked > > > > > > > > So I suspect we're just not getting a callback. > > > > > > I think so. The patch assumes the driver will call > > > virtqueue_disable/enable_cb() which is not the case of the 9p driver. > > > > > > So after the first interrupt, event_triggered will be set to true forever. > > > > > > Thanks > > > > > > > Hi: Wang > > > > Yes, This patch assumes that all virtio-related drivers will call > > virtqueue_disable/enable_cb(). > > Thank you for raising this issue. > > > > It seems that napi_tx is only related to virtue_net. I'm thinking if > > we need to refactor > > napi_tx instead of implementing it inside virtio_ring. > > We can hear from others. > > I think it's better not to workaround virtio_ring issues in a specific > driver. It might just add more hacks. We should correctly set > VRING_AVAIL_F_NO_INTERRUPT, > > Do you think the following might work (not even a compile test)? ok but: > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > index 41144b5246a8..12f4efb6dc54 100644 > --- a/drivers/virtio/virtio_ring.c > +++ b/drivers/virtio/virtio_ring.c > @@ -852,16 +852,16 @@ static void virtqueue_disable_cb_split(struct > virtqueue *_vq) > { > struct vring_virtqueue *vq = to_vvq(_vq); > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) { > - vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > - if (vq->event) > - /* TODO: this is a hack. Figure out a cleaner > value to write. */ > - vring_used_event(&vq->split.vring) = 0x0; > - else > - vq->split.vring.avail->flags = > - cpu_to_virtio16(_vq->vdev, > - vq->split.avail_flags_shadow); > - } > + if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > + vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > + > + if (vq->event && !vq->event_triggered) > + /* TODO: this is a hack. Figure out a cleaner value to write. */ > + vring_used_event(&vq->split.vring) = 0x0; > + else > + vq->split.vring.avail->flags = > + cpu_to_virtio16(_vq->vdev, > + vq->split.avail_flags_shadow); > } > > static unsigned int virtqueue_enable_cb_prepare_split(struct virtqueue *_vq) > @@ -1697,8 +1697,10 @@ static void virtqueue_disable_cb_packed(struct > virtqueue *_vq) > { > struct vring_virtqueue *vq = to_vvq(_vq); > > - if (vq->packed.event_flags_shadow != VRING_PACKED_EVENT_FLAG_DISABLE) { > + if (!(vq->packed.event_flags_shadow & VRING_PACKED_EVENT_FLAG_DISABLE)) > vq->packed.event_flags_shadow = VRING_PACKED_EVENT_FLAG_DISABLE; > + > + if (vq->event_triggered) I don't get this one. if event_triggered why do you still want to write into driver flags? it won't trigger again anytime soon. > vq->packed.vring.driver->flags = > cpu_to_le16(vq->packed.event_flags_shadow); > } > @@ -2330,12 +2332,6 @@ void virtqueue_disable_cb(struct virtqueue *_vq) > { > struct vring_virtqueue *vq = to_vvq(_vq); > > - /* If device triggered an event already it won't trigger one again: > - * no need to disable. > - */ > - if (vq->event_triggered) > - return; > - > if (vq->packed_ring) > virtqueue_disable_cb_packed(_vq); > else > > Thanks I think I prefer Huang Albert's other patch - are you ok with it? > > > > Thanks > > > > > > > > > > > > > > I'll have a closer look after work, but any advice meanwhile will be > > > > appreciated! > > > > (I'm sure Luis would also like a temporary drop from -next until > > > > this is figured out, but I'll leave this up to you) > > > > > > > > > > > > > > > > > > If we disable the napi_tx, it will only be called when the tx ring > > > > > buffer is relatively small. > > > > > > > > > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > > > > > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > > > > > > > > > To summarize: > > > > > 1) event_triggered was set to true in vring_interrupt() > > > > > 2) after this nothing will happen for virtqueue_disable_cb() so > > > > > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > > > > > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > > > > > then it tries to publish new event > > > > > > > > > > To fix, if event_triggered is set to true, do not update > > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > > > > > > Tested with iperf: > > > > > iperf3 tcp stream: > > > > > vm1 -----------------> vm2 > > > > > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > > > > > there are many tx interrupts in vm2. > > > > > but without event_triggered there are just a few tx interrupts. > > > > > > > > > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > > > > > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > > > > > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> > > > > > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> > > > > > --- > > > > > drivers/virtio/virtio_ring.c | 6 ++++-- > > > > > 1 file changed, 4 insertions(+), 2 deletions(-) > > > > > > > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > > > > index cbeeea1b0439..1c36fa477966 100644 > > > > > --- a/drivers/virtio/virtio_ring.c > > > > > +++ b/drivers/virtio/virtio_ring.c > > > > > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > > > > > /* If we expect an interrupt for the next entry, tell host > > > > > * by writing event index and flush out the write before > > > > > * the read in the next get_buf call. */ > > > > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > > > > > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > > > > > + !vq->event_triggered)) > > > > > virtio_store_mb(vq->weak_barriers, > > > > > &vring_used_event(&vq->split.vring), > > > > > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > > > > > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > > > > > * by writing event index and flush out the write before > > > > > * the read in the next get_buf call. > > > > > */ > > > > > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > > > > > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > > > > > + !vq->event_triggered)) > > > > > virtio_store_mb(vq->weak_barriers, > > > > > &vq->packed.vring.driver->off_wrap, > > > > > cpu_to_le16(vq->last_used_idx)); > > > > > > > > >
On Wed, Mar 29, 2023 at 1:42 PM Michael S. Tsirkin <mst@redhat.com> wrote: > > On Tue, Mar 28, 2023 at 11:39:59AM +0800, Jason Wang wrote: > > On Tue, Mar 28, 2023 at 11:09 AM 黄杰 <huangjie.albert@bytedance.com> wrote: > > > > > > Jason Wang <jasowang@redhat.com> 于2023年3月28日周二 10:59写道: > > > > > > > > On Tue, Mar 28, 2023 at 10:13 AM Dominique Martinet > > > > <asmadeus@codewreck.org> wrote: > > > > > > > > > > Hi Michael, Albert, > > > > > > > > > > Albert Huang wrote on Sat, Mar 25, 2023 at 06:56:33PM +0800: > > > > > > in virtio_net, if we disable the napi_tx, when we triger a tx interrupt, > > > > > > the vq->event_triggered will be set to true. It will no longer be set to > > > > > > false. Unless we explicitly call virtqueue_enable_cb_delayed or > > > > > > virtqueue_enable_cb_prepare. > > > > > > > > > > This patch (commited as 35395770f803 ("virtio_ring: don't update event > > > > > idx on get_buf") in next-20230327 apparently breaks 9p, as reported by > > > > > Luis in https://lkml.kernel.org/r/ZCI+7Wg5OclSlE8c@bombadil.infradead.org > > > > > > > > > > I've just hit had a look at recent patches[1] and reverted this to test > > > > > and I can mount again, so I'm pretty sure this is the culprit, but I > > > > > didn't look at the content at all yet so cannot advise further. > > > > > It might very well be that we need some extra handling for 9p > > > > > specifically that can be added separately if required. > > > > > > > > > > [1] git log 0ec57cfa721fbd36b4c4c0d9ccc5d78a78f7fa35..HEAD drivers/virtio/ > > > > > > > > > > > > > > > This can be reproduced with a simple mount, run qemu with some -virtfs > > > > > argument and `mount -t 9p -o debug=65535 tag mountpoint` will hang after > > > > > these messages: > > > > > 9pnet: -- p9_virtio_request (83): 9p debug: virtio request > > > > > 9pnet: -- p9_virtio_request (83): virtio request kicked > > > > > > > > > > So I suspect we're just not getting a callback. > > > > > > > > I think so. The patch assumes the driver will call > > > > virtqueue_disable/enable_cb() which is not the case of the 9p driver. > > > > > > > > So after the first interrupt, event_triggered will be set to true forever. > > > > > > > > Thanks > > > > > > > > > > Hi: Wang > > > > > > Yes, This patch assumes that all virtio-related drivers will call > > > virtqueue_disable/enable_cb(). > > > Thank you for raising this issue. > > > > > > It seems that napi_tx is only related to virtue_net. I'm thinking if > > > we need to refactor > > > napi_tx instead of implementing it inside virtio_ring. > > > > We can hear from others. > > > > I think it's better not to workaround virtio_ring issues in a specific > > driver. It might just add more hacks. We should correctly set > > VRING_AVAIL_F_NO_INTERRUPT, > > > > Do you think the following might work (not even a compile test)? > > > ok but: > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > index 41144b5246a8..12f4efb6dc54 100644 > > --- a/drivers/virtio/virtio_ring.c > > +++ b/drivers/virtio/virtio_ring.c > > @@ -852,16 +852,16 @@ static void virtqueue_disable_cb_split(struct > > virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) { > > - vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > > - if (vq->event) > > - /* TODO: this is a hack. Figure out a cleaner > > value to write. */ > > - vring_used_event(&vq->split.vring) = 0x0; > > - else > > - vq->split.vring.avail->flags = > > - cpu_to_virtio16(_vq->vdev, > > - vq->split.avail_flags_shadow); > > - } > > + if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > > + vq->split.avail_flags_shadow |= VRING_AVAIL_F_NO_INTERRUPT; > > + > > + if (vq->event && !vq->event_triggered) > > + /* TODO: this is a hack. Figure out a cleaner value to write. */ > > + vring_used_event(&vq->split.vring) = 0x0; > > + else > > + vq->split.vring.avail->flags = > > + cpu_to_virtio16(_vq->vdev, > > + vq->split.avail_flags_shadow); > > } > > > > static unsigned int virtqueue_enable_cb_prepare_split(struct virtqueue *_vq) > > @@ -1697,8 +1697,10 @@ static void virtqueue_disable_cb_packed(struct > > virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > - if (vq->packed.event_flags_shadow != VRING_PACKED_EVENT_FLAG_DISABLE) { > > + if (!(vq->packed.event_flags_shadow & VRING_PACKED_EVENT_FLAG_DISABLE)) > > vq->packed.event_flags_shadow = VRING_PACKED_EVENT_FLAG_DISABLE; > > + > > + if (vq->event_triggered) > > I don't get this one. if event_triggered why do you still want to > write into driver flags? it won't trigger again anytime soon. Should be a typo. > > > vq->packed.vring.driver->flags = > > cpu_to_le16(vq->packed.event_flags_shadow); > > } > > @@ -2330,12 +2332,6 @@ void virtqueue_disable_cb(struct virtqueue *_vq) > > { > > struct vring_virtqueue *vq = to_vvq(_vq); > > > > - /* If device triggered an event already it won't trigger one again: > > - * no need to disable. > > - */ > > - if (vq->event_triggered) > > - return; > > - > > if (vq->packed_ring) > > virtqueue_disable_cb_packed(_vq); > > else > > > > Thanks > > I think I prefer Huang Albert's other patch - are you ok with it? Yes. Thanks > > > > > > > Thanks > > > > > > > > > > > > > > > > > > I'll have a closer look after work, but any advice meanwhile will be > > > > > appreciated! > > > > > (I'm sure Luis would also like a temporary drop from -next until > > > > > this is figured out, but I'll leave this up to you) > > > > > > > > > > > > > > > > > > > > > > If we disable the napi_tx, it will only be called when the tx ring > > > > > > buffer is relatively small. > > > > > > > > > > > > Because event_triggered is true. Therefore, VRING_AVAIL_F_NO_INTERRUPT or > > > > > > VRING_PACKED_EVENT_FLAG_DISABLE will not be set. So we update > > > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > > every time we call virtqueue_get_buf_ctx. This will bring more interruptions. > > > > > > > > > > > > To summarize: > > > > > > 1) event_triggered was set to true in vring_interrupt() > > > > > > 2) after this nothing will happen for virtqueue_disable_cb() so > > > > > > VRING_AVAIL_F_NO_INTERRUPT is not set in avail_flags_shadow > > > > > > 3) virtqueue_get_buf_ctx_split() will still think the cb is enabled > > > > > > then it tries to publish new event > > > > > > > > > > > > To fix, if event_triggered is set to true, do not update > > > > > > vring_used_event(&vq->split.vring) or vq->packed.vring.driver->off_wrap > > > > > > > > > > > > Tested with iperf: > > > > > > iperf3 tcp stream: > > > > > > vm1 -----------------> vm2 > > > > > > vm2 just receives tcp data stream from vm1, and sends the ack to vm1, > > > > > > there are many tx interrupts in vm2. > > > > > > but without event_triggered there are just a few tx interrupts. > > > > > > > > > > > > Fixes: 8d622d21d248 ("virtio: fix up virtio_disable_cb") > > > > > > Signed-off-by: Albert Huang <huangjie.albert@bytedance.com> > > > > > > Message-Id: <20230321085953.24949-1-huangjie.albert@bytedance.com> > > > > > > Signed-off-by: Michael S. Tsirkin <mst@redhat.com> > > > > > > --- > > > > > > drivers/virtio/virtio_ring.c | 6 ++++-- > > > > > > 1 file changed, 4 insertions(+), 2 deletions(-) > > > > > > > > > > > > diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c > > > > > > index cbeeea1b0439..1c36fa477966 100644 > > > > > > --- a/drivers/virtio/virtio_ring.c > > > > > > +++ b/drivers/virtio/virtio_ring.c > > > > > > @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, > > > > > > /* If we expect an interrupt for the next entry, tell host > > > > > > * by writing event index and flush out the write before > > > > > > * the read in the next get_buf call. */ > > > > > > - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) > > > > > > + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && > > > > > > + !vq->event_triggered)) > > > > > > virtio_store_mb(vq->weak_barriers, > > > > > > &vring_used_event(&vq->split.vring), > > > > > > cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); > > > > > > @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, > > > > > > * by writing event index and flush out the write before > > > > > > * the read in the next get_buf call. > > > > > > */ > > > > > > - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) > > > > > > + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && > > > > > > + !vq->event_triggered)) > > > > > > virtio_store_mb(vq->weak_barriers, > > > > > > &vq->packed.vring.driver->off_wrap, > > > > > > cpu_to_le16(vq->last_used_idx)); > > > > > > > > > > > > >
diff --git a/drivers/virtio/virtio_ring.c b/drivers/virtio/virtio_ring.c index cbeeea1b0439..1c36fa477966 100644 --- a/drivers/virtio/virtio_ring.c +++ b/drivers/virtio/virtio_ring.c @@ -914,7 +914,8 @@ static void *virtqueue_get_buf_ctx_split(struct virtqueue *_vq, /* If we expect an interrupt for the next entry, tell host * by writing event index and flush out the write before * the read in the next get_buf call. */ - if (!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT)) + if (unlikely(!(vq->split.avail_flags_shadow & VRING_AVAIL_F_NO_INTERRUPT) && + !vq->event_triggered)) virtio_store_mb(vq->weak_barriers, &vring_used_event(&vq->split.vring), cpu_to_virtio16(_vq->vdev, vq->last_used_idx)); @@ -1744,7 +1745,8 @@ static void *virtqueue_get_buf_ctx_packed(struct virtqueue *_vq, * by writing event index and flush out the write before * the read in the next get_buf call. */ - if (vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC) + if (unlikely(vq->packed.event_flags_shadow == VRING_PACKED_EVENT_FLAG_DESC && + !vq->event_triggered)) virtio_store_mb(vq->weak_barriers, &vq->packed.vring.driver->off_wrap, cpu_to_le16(vq->last_used_idx));