lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 25 Jun 2015 17:47:34 +0800
From:	Jason Wang <jasowang@...hat.com>
To:	Julio Faracco <jcfaracco@...il.com>,
	"Michael S. Tsirkin" <mst@...hat.com>
CC:	linux-kernel@...r.kernel.org,
	Rusty Russell <rusty@...tcorp.com.au>,
	virtualization@...ts.linux-foundation.org, netdev@...r.kernel.org
Subject: Re: [RFC] virtio_net: Adding tx_timeout function.



On 06/25/2015 09:31 AM, Julio Faracco wrote:
> 2015-06-24 3:10 GMT-03:00 Michael S. Tsirkin <mst@...hat.com>:
>> On Tue, Jun 23, 2015 at 10:44:29PM -0300, Julio Faracco wrote:
>>> virtio_net paravirtualized driver does not have a tx_timeout() function to
>>> guarantee that the driver will recover properly after receiving a timeout
>>> during a transmission of a packet. This patch add this feature and throw a
>>> timeout exception after 5 HZ. Considering some tests, this is the best
>>> time to use here.
>>>
>>> Signed-off-by: Julio Faracco <jcfaracco@...il.com>
>>> Cc: Jason Wang <jasowang@...hat.com>
>> Looks like a bunch of locks and flushes are missing in this patch.  IMHO
>> that's just too painful with current hardware.  IMO the right thing to
>> do here is to add ability to reset specific queues to hardware.
>>
> I agree, Michael. This model is the default one resetting the device
> due to transmission timeout.
> To have a better performance, only some queues must be reset.

Resetting device during tx hang is much more important. I don't see much
value of caring the performance in this case and at least most of the
drivers does not care.

And we could not assume it was just an issue of a specific queue, it
maybe a bug of guest driver, qemu or even host stack. So resetting the
whole devices make more sense.

Btw, I think it's better to print a warning with a dump of each queue state.

>
>>> ---
>>>  drivers/net/virtio_net.c |   69 +++++++++++++++++++++++++++++++++++++++++++++-
>>>  1 file changed, 68 insertions(+), 1 deletion(-)
>>>
>>> diff --git a/drivers/net/virtio_net.c b/drivers/net/virtio_net.c
>>> index 63c7810..75ac45c 100644
>>> --- a/drivers/net/virtio_net.c
>>> +++ b/drivers/net/virtio_net.c
>>> @@ -135,6 +135,9 @@ struct virtnet_info {
>>>       /* Work struct for config space updates */
>>>       struct work_struct config_work;
>>>
>>> +     /* Work struct for resetting the virtio-net driver. */
>>> +     struct work_struct reset_task;
>>> +
>>>       /* Does the affinity hint is set for virtqueues? */
>>>       bool affinity_hint_set;
>>>
>>> @@ -1394,6 +1397,18 @@ static int virtnet_change_mtu(struct net_device *dev, int new_mtu)
>>>       return 0;
>>>  }
>>>
>>> +static void virtnet_tx_timeout(struct net_device *dev)
>>> +{
>>> +     struct virtnet_info *vi = netdev_priv(dev);
>>> +
>>> +     dev_warn(&dev->dev, "TX Timeout exception with latency: %ld\n",
>>> +              jiffies - dev_trans_start(dev));
>>> +
>>> +     schedule_work(&vi->reset_task);
>> What if after this triggers user does something
>> to the device (e.g. attempts to remove it)?
>> Or if a packet is transmitted or used?
> At some point, this work must be canceled.
> Yes, you are right. Specially, when the driver is being removed.
>>> +}
>>> +
>>> +static void virtnet_reset_task(struct work_struct *work);
>>> +
>>>  static const struct net_device_ops virtnet_netdev = {
>>>       .ndo_open            = virtnet_open,
>>>       .ndo_stop            = virtnet_close,
>>> @@ -1405,6 +1420,7 @@ static const struct net_device_ops virtnet_netdev = {
>>>       .ndo_get_stats64     = virtnet_stats,
>>>       .ndo_vlan_rx_add_vid = virtnet_vlan_rx_add_vid,
>>>       .ndo_vlan_rx_kill_vid = virtnet_vlan_rx_kill_vid,
>>> +     .ndo_tx_timeout      = virtnet_tx_timeout,
>>>  #ifdef CONFIG_NET_POLL_CONTROLLER
>>>       .ndo_poll_controller = virtnet_netpoll,
>>>  #endif
>>> @@ -1750,6 +1766,7 @@ static int virtnet_probe(struct virtio_device *vdev)
>>>       dev->netdev_ops = &virtnet_netdev;
>>>       dev->features = NETIF_F_HIGHDMA;
>>>
>>> +     dev->watchdog_timeo = 5 * HZ;
>>>       dev->ethtool_ops = &virtnet_ethtool_ops;
>>>       SET_NETDEV_DEV(dev, &vdev->dev);
>>>
>>> @@ -1811,6 +1828,7 @@ static int virtnet_probe(struct virtio_device *vdev)
>>>       }
>>>
>>>       INIT_WORK(&vi->config_work, virtnet_config_changed_work);
>>> +     INIT_WORK(&vi->reset_task, virtnet_reset_task);
>>>
>>>       /* If we can receive ANY GSO packets, we must allocate large ones. */
>>>       if (virtio_has_feature(vdev, VIRTIO_NET_F_GUEST_TSO4) ||
>>> @@ -1891,7 +1909,7 @@ static int virtnet_probe(struct virtio_device *vdev)
>>>               netif_carrier_on(dev);
>>>       }
>>>
>>> -     pr_debug("virtnet: registered device %s with %d RX and TX vq's\n",
>>> +     pr_debug("virtio_net: registered device %s with %d RX and TX vq's\n",
>>>                dev->name, max_queue_pairs);
>>>
>>>       return 0;
>>> @@ -2001,6 +2019,55 @@ static int virtnet_restore(struct virtio_device *vdev)
>>>  }
>>>  #endif
>>>
>>> +static void virtnet_reset_task(struct work_struct *work)
>>> +{
>>> +     struct virtnet_info *vi =
>>> +             container_of(work, struct virtnet_info, reset_task);
>>> +     struct net_device *dev = vi->dev;
>>> +     struct virtio_device *vdev = vi->vdev;
>>> +     int err, i;
>>> +
>>> +     flush_work(&vi->config_work);
>>> +
>>> +     netif_device_detach(vi->dev);
>>> +     cancel_delayed_work_sync(&vi->refill);
>>> +
>>> +     if (netif_running(vi->dev)) {
>>> +             for (i = 0; i < vi->max_queue_pairs; i++) {
>>> +                     napi_disable(&vi->rq[i].napi);
>>> +                     napi_hash_del(&vi->rq[i].napi);
>>> +                     netif_napi_del(&vi->rq[i].napi);
>>> +             }
>>> +     }
>>> +
>>> +     remove_vq_common(vi);
>>> +
>>> +     dev->stats.tx_errors++;
>>> +
>>> +     err = init_vqs(vi);
>>> +     if (err) {
>>> +             dev_warn(&dev->dev, "virtio_net: virtqueue initialization failed.\n");
>>> +             return;
>>> +     }
>>> +
>>> +     virtio_device_ready(vdev);
>>> +
>>> +     if (netif_running(vi->dev)) {
>>> +             for (i = 0; i < vi->curr_queue_pairs; i++)
>>> +                     if (!try_fill_recv(vi, &vi->rq[i], GFP_KERNEL))
>>> +                             schedule_delayed_work(&vi->refill, 0);
>>> +
>>> +             for (i = 0; i < vi->max_queue_pairs; i++)
>>> +                     virtnet_napi_enable(&vi->rq[i]);
>>> +     }
>>> +
>>> +     netif_device_attach(vi->dev);
>>> +
>>> +     rtnl_lock();
>>> +     virtnet_set_queues(vi, vi->curr_queue_pairs);
>>> +     rtnl_unlock();
>> Won't this lose a bunch of state, like mac addresses,
>> multicast, rx mode, etc etc?
> I will rebase this patch with the properly changes and locks.
> After, I will resend it.
>
> Thanks for your opinion, Michael.
>>
>>> +}
>>> +
>>>  static struct virtio_device_id id_table[] = {
>>>       { VIRTIO_ID_NET, VIRTIO_DEV_ANY_ID },
>>>       { 0 },
>>> --
>>> 1.7.10.4

--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ