From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-6.9 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY,SPF_PASS autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8A6EBC6786C for ; Fri, 14 Dec 2018 12:36:54 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 5487E20892 for ; Fri, 14 Dec 2018 12:36:54 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 5487E20892 Authentication-Results: mail.kernel.org; dmarc=fail (p=none dis=none) header.from=redhat.com Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1731157AbeLNMgx (ORCPT ); Fri, 14 Dec 2018 07:36:53 -0500 Received: from mx1.redhat.com ([209.132.183.28]:50526 "EHLO mx1.redhat.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1730860AbeLNMgs (ORCPT ); Fri, 14 Dec 2018 07:36:48 -0500 Received: from smtp.corp.redhat.com (int-mx08.intmail.prod.int.phx2.redhat.com [10.5.11.23]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.redhat.com (Postfix) with ESMTPS id B5F2FC0578FA; Fri, 14 Dec 2018 12:36:47 +0000 (UTC) Received: from redhat.com (ovpn-121-101.rdu2.redhat.com [10.10.121.101]) by smtp.corp.redhat.com (Postfix) with ESMTP id 77D3F261A6; Fri, 14 Dec 2018 12:36:46 +0000 (UTC) Date: Fri, 14 Dec 2018 07:36:45 -0500 From: "Michael S. Tsirkin" To: Jason Wang Cc: kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Subject: Re: [PATCH net-next 3/3] vhost: access vq metadata through kernel virtual address Message-ID: <20181214073332-mutt-send-email-mst@kernel.org> References: <20181213101022.12475-1-jasowang@redhat.com> <20181213101022.12475-4-jasowang@redhat.com> <20181213102713-mutt-send-email-mst@kernel.org> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: X-Scanned-By: MIMEDefang 2.84 on 10.5.11.23 X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.5.16 (mx1.redhat.com [10.5.110.31]); Fri, 14 Dec 2018 12:36:47 +0000 (UTC) Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, Dec 14, 2018 at 11:57:35AM +0800, Jason Wang wrote: > > On 2018/12/13 下午11:44, Michael S. Tsirkin wrote: > > On Thu, Dec 13, 2018 at 06:10:22PM +0800, Jason Wang wrote: > > > It was noticed that the copy_user() friends that was used to access > > > virtqueue metdata tends to be very expensive for dataplane > > > implementation like vhost since it involves lots of software check, > > > speculation barrier, hardware feature toggling (e.g SMAP). The > > > extra cost will be more obvious when transferring small packets. > > > > > > This patch tries to eliminate those overhead by pin vq metadata pages > > > and access them through vmap(). During SET_VRING_ADDR, we will setup > > > those mappings and memory accessors are modified to use pointers to > > > access the metadata directly. > > > > > > Note, this was only done when device IOTLB is not enabled. We could > > > use similar method to optimize it in the future. > > > > > > Tests shows about ~24% improvement on TX PPS when using virtio-user + > > > vhost_net + xdp1 on TAP (CONFIG_HARDENED_USERCOPY is not enabled): > > > > > > Before: ~5.0Mpps > > > After: ~6.1Mpps > > > > > > Signed-off-by: Jason Wang > > > --- > > > drivers/vhost/vhost.c | 178 ++++++++++++++++++++++++++++++++++++++++++ > > > drivers/vhost/vhost.h | 11 +++ > > > 2 files changed, 189 insertions(+) > > > > > > diff --git a/drivers/vhost/vhost.c b/drivers/vhost/vhost.c > > > index bafe39d2e637..1bd24203afb6 100644 > > > --- a/drivers/vhost/vhost.c > > > +++ b/drivers/vhost/vhost.c > > > @@ -443,6 +443,9 @@ void vhost_dev_init(struct vhost_dev *dev, > > > vq->indirect = NULL; > > > vq->heads = NULL; > > > vq->dev = dev; > > > + memset(&vq->avail_ring, 0, sizeof(vq->avail_ring)); > > > + memset(&vq->used_ring, 0, sizeof(vq->used_ring)); > > > + memset(&vq->desc_ring, 0, sizeof(vq->desc_ring)); > > > mutex_init(&vq->mutex); > > > vhost_vq_reset(dev, vq); > > > if (vq->handle_kick) > > > @@ -614,6 +617,102 @@ static void vhost_clear_msg(struct vhost_dev *dev) > > > spin_unlock(&dev->iotlb_lock); > > > } > > > +static int vhost_init_vmap(struct vhost_vmap *map, unsigned long uaddr, > > > + size_t size, int write) > > > +{ > > > + struct page **pages; > > > + int npages = DIV_ROUND_UP(size, PAGE_SIZE); > > > + int npinned; > > > + void *vaddr; > > > + > > > + pages = kmalloc_array(npages, sizeof(struct page *), GFP_KERNEL); > > > + if (!pages) > > > + return -ENOMEM; > > > + > > > + npinned = get_user_pages_fast(uaddr, npages, write, pages); > > > + if (npinned != npages) > > > + goto err; > > > + > > As I said I have doubts about the whole approach, but this > > implementation in particular isn't a good idea > > as it keeps the page around forever. > > So no THP, no NUMA rebalancing, > > > This is the price of all GUP users not only vhost itself. Yes. GUP is just not a great interface for vhost to use. > What's more > important, the goal is not to be left too much behind for other backends > like DPDK or AF_XDP (all of which are using GUP). So these guys assume userspace knows what it's doing. We can't assume that. > > > userspace-controlled > > amount of memory locked up and not accounted for. > > > It's pretty easy to add this since the slow path was still kept. If we > exceeds the limitation, we can switch back to slow path. > > > > > Don't get me wrong it's a great patch in an ideal world. > > But then in an ideal world no barriers smap etc are necessary at all. > > > Again, this is only for metadata accessing not the data which has been used > for years for real use cases. > > For SMAP, it makes senses for the address that kernel can not forcast. But > it's not the case for the vhost metadata since we know the address will be > accessed very frequently. For speculation barrier, it helps nothing for the > data path of vhost which is a kthread. I don't see how a kthread makes any difference. We do have a validation step which makes some difference. > Packet or AF_XDP benefit from > accessing metadata directly, we should do it as well. > > Thanks