[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAJ8uoz2TYFcDLE0ObnSeEBUGGFq=dquiTxCtk323LBNj6twZpw@mail.gmail.com>
Date: Mon, 14 Dec 2020 09:58:23 +0100
From: Magnus Karlsson <magnus.karlsson@...il.com>
To: Xuan Zhuo <xuanzhuo@...ux.alibaba.com>
Cc: "Karlsson, Magnus" <magnus.karlsson@...el.com>,
Björn Töpel <bjorn.topel@...el.com>,
Jonathan Lemon <jonathan.lemon@...il.com>,
"David S. Miller" <davem@...emloft.net>,
Jakub Kicinski <kuba@...nel.org>,
Alexei Starovoitov <ast@...nel.org>,
Daniel Borkmann <daniel@...earbox.net>,
Jesper Dangaard Brouer <hawk@...nel.org>,
John Fastabend <john.fastabend@...il.com>,
Andrii Nakryiko <andrii@...nel.org>,
Martin KaFai Lau <kafai@...com>,
Song Liu <songliubraving@...com>, Yonghong Song <yhs@...com>,
KP Singh <kpsingh@...omium.org>,
"open list:XDP SOCKETS <netdev@...r.kernel.org>, open list:XDP SOCKETS
<bpf@...r.kernel.org>, open list" <linux-kernel@...r.kernel.org>
Subject: Re: [PATCH bpf-next] xsk: save the undone skb
On Sat, Dec 12, 2020 at 9:47 AM Xuan Zhuo <xuanzhuo@...ux.alibaba.com> wrote:
>
> On Fri, 11 Dec 2020 16:32:06 +0100, Magnus Karlsson <magnus.karlsson@...il.com> wrote:
> > On Fri, Dec 11, 2020 at 2:12 PM Xuan Zhuo <xuanzhuo@...ux.alibaba.com> wrote:
> > >
> > > We can reserve the skb. When sending fails, NETDEV_TX_BUSY or
> > > xskq_prod_reserve fails. As long as skb is successfully generated and
> > > successfully configured, we can reserve skb if we encounter exceptions
> > > later.
> > >
> > > Especially when NETDEV_TX_BUSY fails, there is no need to deal with
> > > the problem that xskq_prod_reserve has been updated.
> > >
> > > Signed-off-by: Xuan Zhuo <xuanzhuo@...ux.alibaba.com>
> > > ---
> > > include/net/xdp_sock.h | 3 +++
> > > net/xdp/xsk.c | 36 +++++++++++++++++++++++++++---------
> > > 2 files changed, 30 insertions(+), 9 deletions(-)
> > >
> > > diff --git a/include/net/xdp_sock.h b/include/net/xdp_sock.h
> > > index 4f4e93b..fead0c9 100644
> > > --- a/include/net/xdp_sock.h
> > > +++ b/include/net/xdp_sock.h
> > > @@ -76,6 +76,9 @@ struct xdp_sock {
> > > struct mutex mutex;
> > > struct xsk_queue *fq_tmp; /* Only as tmp storage before bind */
> > > struct xsk_queue *cq_tmp; /* Only as tmp storage before bind */
> > > +
> > > + struct sk_buff *skb_undone;
> > > + bool skb_undone_reserve;
> > > };
> > >
> > > #ifdef CONFIG_XDP_SOCKETS
> > > diff --git a/net/xdp/xsk.c b/net/xdp/xsk.c
> > > index e28c682..1051024 100644
> > > --- a/net/xdp/xsk.c
> > > +++ b/net/xdp/xsk.c
> > > @@ -435,6 +435,19 @@ static int xsk_generic_xmit(struct sock *sk)
> > > if (xs->queue_id >= xs->dev->real_num_tx_queues)
> > > goto out;
> > >
> > > + if (xs->skb_undone) {
> > > + if (xs->skb_undone_reserve) {
> > > + if (xskq_prod_reserve(xs->pool->cq))
> > > + goto out;
> > > +
> > > + xs->skb_undone_reserve = false;
> > > + }
> > > +
> > > + skb = xs->skb_undone;
> > > + xs->skb_undone = NULL;
> > > + goto xmit;
> > > + }
> > > +
> > > while (xskq_cons_peek_desc(xs->tx, &desc, xs->pool)) {
> > > char *buffer;
> > > u64 addr;
> > > @@ -454,12 +467,7 @@ static int xsk_generic_xmit(struct sock *sk)
> > > addr = desc.addr;
> > > buffer = xsk_buff_raw_get_data(xs->pool, addr);
> > > err = skb_store_bits(skb, 0, buffer, len);
> > > - /* This is the backpressure mechanism for the Tx path.
> > > - * Reserve space in the completion queue and only proceed
> > > - * if there is space in it. This avoids having to implement
> > > - * any buffering in the Tx path.
> > > - */
> > > - if (unlikely(err) || xskq_prod_reserve(xs->pool->cq)) {
> > > + if (unlikely(err)) {
> > > kfree_skb(skb);
> > > goto out;
> > > }
> > > @@ -470,12 +478,22 @@ static int xsk_generic_xmit(struct sock *sk)
> > > skb_shinfo(skb)->destructor_arg = (void *)(long)desc.addr;
> > > skb->destructor = xsk_destruct_skb;
> > >
> > > + /* This is the backpressure mechanism for the Tx path.
> > > + * Reserve space in the completion queue and only proceed
> > > + * if there is space in it. This avoids having to implement
> > > + * any buffering in the Tx path.
> > > + */
> > > + if (xskq_prod_reserve(xs->pool->cq)) {
> > > + xs->skb_undone_reserve = true;
> > > + xs->skb_undone = skb;
> > > + goto out;
> > > + }
> > > +
> > > +xmit:
> >
> > This will not work in the general case since we cannot guarantee that
> > the application does not replace the packet in the Tx ring before it
> > calls send() again. This is fully legal. I also do not like to
> > introduce state between calls. Much simpler to have it stateless which
> > means less error prone.
> >
> > On the positive side, I will submit a patch that improves performance
> > of this transmit function by using the new batch interfaces I
> > introduced a month ago. With this patch I get a throughput improvement
> > of between 15 and 25% for the txpush benchmark in xdpsock. This is
> > much more than you will get from this patch. It also avoids the
> > problem you are addressing here completely. I will submit the patch
> > next week after the bug fix in this code has trickled down to
> > bpf-next. Hope you will like the throughput improvement that it
> > provides.
>
> In fact, we can also call xskq_cons_release before save the undone skb and
> exiting this function, so do not worry about the users modifying the data
> in tx. Of course, I understand that you want to have it stateless.
> I agree with this. I will give up this idea temporarily.
>
> But here in the case of NETDEV_TX_BUSY, xskq_prod_reserve has been called,
> but skb is released directly without xsk_destruct_skb, this should be a bug.
Yes, you are correct. In this case the reservation in the cq is not
rolled back and we really make the ring one entry smaller. After
enough of these errors, the ring will be of size zero and the socket
will stop working for transmit. Thank you so much for spotting this. I
believe this was introduced when I tried to make NETDEV_TX_BUSY not
drop packets and instead give the user a chance to just resend them.
This part seems to be in dire need of some solid tests contributed to
the new xsk selftests.
I will bundle this fix as patch 2 in a patch set with the other race
that you found. I need the locking of that one to be able to safely
back out the reservation.
> >
> > > err = __dev_direct_xmit(skb, xs->queue_id);
> > > if (err == NETDEV_TX_BUSY) {
> > > /* Tell user-space to retry the send */
> > > - skb->destructor = sock_wfree;
> > > - /* Free skb without triggering the perf drop trace */
> > > - consume_skb(skb);
> > > + xs->skb_undone = skb;
> > > err = -EAGAIN;
> > > goto out;
> > > }
> > > --
> > > 1.8.3.1
> > >
Powered by blists - more mailing lists