* Re: [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local. @ 2016-04-06 5:11 Ilya Maximets 2016-04-06 5:38 ` Yuanhan Liu 0 siblings, 1 reply; 8+ messages in thread From: Ilya Maximets @ 2016-04-06 5:11 UTC (permalink / raw) To: Flavio Leitner, Yuanhan Liu Cc: dev, Sergey Dyasly, Thomas Monjalon, Xie, Huawei ------- Original Message ------- Sender : Flavio Leitner<fbl@sysclose.org> Date : Apr 06, 2016 07:14 (GMT+03:00) Title : Re: [RFC] vhost-user public struct refactor (was Re: [dpdk-dev] [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local. On Tue, Apr 05, 2016 at 01:47:33PM +0800, Yuanhan Liu wrote: > On Fri, Feb 19, 2016 at 03:06:50PM +0800, Yuanhan Liu wrote: > > On Fri, Feb 19, 2016 at 09:32:41AM +0300, Ilya Maximets wrote: > > > Array of buf_vector's is just an array for temporary storing information > > > about available descriptors. It used only locally in virtio_dev_merge_rx() > > > and there is no reason for that array to be shared. > > > > > > Fix that by allocating local buf_vec inside virtio_dev_merge_rx(). > > > > > > Signed-off-by: Ilya Maximets > > > --- > > > lib/librte_vhost/rte_virtio_net.h | 1 - > > > lib/librte_vhost/vhost_rxtx.c | 45 ++++++++++++++++++++------------------- > > > 2 files changed, 23 insertions(+), 23 deletions(-) > > > > > > diff --git a/lib/librte_vhost/rte_virtio_net.h b/lib/librte_vhost/rte_virtio_net.h > > > index 10dcb90..ae1e4fb 100644 > > > --- a/lib/librte_vhost/rte_virtio_net.h > > > +++ b/lib/librte_vhost/rte_virtio_net.h > > > @@ -91,7 +91,6 @@ struct vhost_virtqueue { > > > int kickfd; /**< Currently unused as polling mode is enabled. */ > > > int enabled; > > > uint64_t reserved[16]; /**< Reserve some spaces for future extension. */ > > > - struct buf_vector buf_vec[BUF_VECTOR_MAX]; /**< for scatter RX. */ > > > } __rte_cache_aligned; > > > > I like this kind of cleanup, however, it breaks ABI. > > So, I was considering to add vhost-user Tx delayed-copy (or zero copy) > support recently, which comes to yet another ABI violation, as we need > add a new field to virtio_memory_regions struct to do guest phys addr > to host phys addr translation. You may ask, however, that why do we need > expose virtio_memory_regions struct to users at all? > > You are right, we don't have to. And here is the thing: we exposed way > too many fields (or even structures) than necessary. Say, vhost_virtqueue > struct should NOT be exposed to user at all: application just need to > tell the right queue id to locate a specific queue, and that's all. > The structure should be defined in an internal header file. With that, > we could do any changes to it we want, without worrying about that we > may offense the painful ABI rules. > > Similar changes could be done to virtio_net struct as well, just exposing > very few fields that are necessary and moving all others to an internal > structure. > > Huawei then suggested a more radical yet much cleaner one: just exposing > a virtio_net handle to application, just like the way kernel exposes an > fd to user for locating a specific file. However, it's more than an ABI > change; it's also an API change: some fields are referenced by applications, > such as flags, virt_qp_nb. We could expose some new functions to access > them though. > > I'd vote for this one, as it sounds very clean to me. This would also > solve the block issue of this patch. Though it would break OVS, I'm thinking > that'd be okay, as OVS has dependence on DPDK version: what we need to > do is just to send few patches to OVS, and let it points to next release, > say DPDK v16.07. Flavio, please correct me if I'm wrong. > There is a plan to use vHost PMD, so from OVS point of view the virtio > stuff would be hidden because vhost PMD would look like just as a > regular ethernet, right? But we still need to have access to virtqueue_enabe/disable notifications to work properly. How this will be done if virtqueue will be hidden from user? Best regards, Ilya Maximets. ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local. 2016-04-06 5:11 [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local Ilya Maximets @ 2016-04-06 5:38 ` Yuanhan Liu 0 siblings, 0 replies; 8+ messages in thread From: Yuanhan Liu @ 2016-04-06 5:38 UTC (permalink / raw) To: Ilya Maximets Cc: Flavio Leitner, dev, Sergey Dyasly, Thomas Monjalon, Xie, Huawei On Wed, Apr 06, 2016 at 05:11:01AM +0000, Ilya Maximets wrote: > > There is a plan to use vHost PMD, so from OVS point of view the virtio > > stuff would be hidden because vhost PMD would look like just as a > > regular ethernet, right? > > But we still need to have access to virtqueue_enabe/disable notifications to > work properly. How this will be done if virtqueue will be hidden from user? Do you mean vring_state_changed() callback? It will not be removed. BTW, when using vhost pmd, you will not be aware of such callback: it will be translated to a RTE_ETH_EVENT_QUEUE_STATE interrupt. OTOH, I have a simple git grep of "vq" from ovs dpdk netdev code, it returns nothing. So, I don't think that will matter? --yliu ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local.
@ 2016-04-06 6:00 Ilya Maximets
0 siblings, 0 replies; 8+ messages in thread
From: Ilya Maximets @ 2016-04-06 6:00 UTC (permalink / raw)
To: Yuanhan Liu
Cc: Flavio Leitner, dev, Sergey Dyasly, Thomas Monjalon, Xie, Huawei
------- Original Message -------
Sender : Yuanhan Liu<yuanhan.liu@linux.intel.com>
Date : Apr 06, 2016 08:38 (GMT+03:00)
Title : Re: Re: [RFC] vhost-user public struct refactor (was Re: [dpdk-dev] [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local.
On Wed, Apr 06, 2016 at 05:11:01AM +0000, Ilya Maximets wrote:
> > > There is a plan to use vHost PMD, so from OVS point of view the virtio
> > > stuff would be hidden because vhost PMD would look like just as a
> > > regular ethernet, right?
> >
> > But we still need to have access to virtqueue_enabe/disable notifications to
> > work properly. How this will be done if virtqueue will be hidden from user?
>
> Do you mean vring_state_changed() callback? It will not be removed.
> BTW, when using vhost pmd, you will not be aware of such callback:
> it will be translated to a RTE_ETH_EVENT_QUEUE_STATE interrupt.
>
> OTOH, I have a simple git grep of "vq" from ovs dpdk netdev code,
> it returns nothing. So, I don't think that will matter?
OK, thanks for clarifying.
I guess, all should be fine in that case. Thank you.
Best regards, Ilya Maximets.
^ permalink raw reply [flat|nested] 8+ messages in thread
* [dpdk-dev] [PATCH RFC 0/4] Thread safe rte_vhost_enqueue_burst(). @ 2016-02-19 6:32 Ilya Maximets 2016-02-19 6:32 ` [dpdk-dev] [PATCH RFC 2/4] vhost: make buf vector for scatter RX local Ilya Maximets 0 siblings, 1 reply; 8+ messages in thread From: Ilya Maximets @ 2016-02-19 6:32 UTC (permalink / raw) To: dev, Huawei Xie, Yuanhan Liu; +Cc: Ilya Maximets, Dyasly Sergey Implementation of rte_vhost_enqueue_burst() based on lockless ring-buffer algorithm and contains almost all to be thread-safe, but it's not. This set adds required changes. First patch in set is a standalone patch that fixes many times discussed issue with barriers on different architectures. Second and third adds fixes to make rte_vhost_enqueue_burst thread safe. Last is a documentation fix. Ilya Maximets (4): vhost: use SMP barriers instead of compiler ones. vhost: make buf vector for scatter RX local. vhost: avoid reordering of used->idx and last_used_idx updating. doc: add note about rte_vhost_enqueue_burst thread safety. .../prog_guide/thread_safety_dpdk_functions.rst | 1 + lib/librte_vhost/rte_virtio_net.h | 1 - lib/librte_vhost/vhost_rxtx.c | 67 ++++++++++++---------- 3 files changed, 39 insertions(+), 30 deletions(-) -- 2.5.0 ^ permalink raw reply [flat|nested] 8+ messages in thread
* [dpdk-dev] [PATCH RFC 2/4] vhost: make buf vector for scatter RX local. 2016-02-19 6:32 [dpdk-dev] [PATCH RFC 0/4] Thread safe rte_vhost_enqueue_burst() Ilya Maximets @ 2016-02-19 6:32 ` Ilya Maximets 2016-02-19 7:06 ` Yuanhan Liu 0 siblings, 1 reply; 8+ messages in thread From: Ilya Maximets @ 2016-02-19 6:32 UTC (permalink / raw) To: dev, Huawei Xie, Yuanhan Liu; +Cc: Ilya Maximets, Dyasly Sergey Array of buf_vector's is just an array for temporary storing information about available descriptors. It used only locally in virtio_dev_merge_rx() and there is no reason for that array to be shared. Fix that by allocating local buf_vec inside virtio_dev_merge_rx(). Signed-off-by: Ilya Maximets <i.maximets@samsung.com> --- lib/librte_vhost/rte_virtio_net.h | 1 - lib/librte_vhost/vhost_rxtx.c | 45 ++++++++++++++++++++------------------- 2 files changed, 23 insertions(+), 23 deletions(-) diff --git a/lib/librte_vhost/rte_virtio_net.h b/lib/librte_vhost/rte_virtio_net.h index 10dcb90..ae1e4fb 100644 --- a/lib/librte_vhost/rte_virtio_net.h +++ b/lib/librte_vhost/rte_virtio_net.h @@ -91,7 +91,6 @@ struct vhost_virtqueue { int kickfd; /**< Currently unused as polling mode is enabled. */ int enabled; uint64_t reserved[16]; /**< Reserve some spaces for future extension. */ - struct buf_vector buf_vec[BUF_VECTOR_MAX]; /**< for scatter RX. */ } __rte_cache_aligned; diff --git a/lib/librte_vhost/vhost_rxtx.c b/lib/librte_vhost/vhost_rxtx.c index 411dd95..9095fb1 100644 --- a/lib/librte_vhost/vhost_rxtx.c +++ b/lib/librte_vhost/vhost_rxtx.c @@ -295,7 +295,7 @@ virtio_dev_rx(struct virtio_net *dev, uint16_t queue_id, static inline uint32_t __attribute__((always_inline)) copy_from_mbuf_to_vring(struct virtio_net *dev, uint32_t queue_id, uint16_t res_base_idx, uint16_t res_end_idx, - struct rte_mbuf *pkt) + struct rte_mbuf *pkt, struct buf_vector *buf_vec) { uint32_t vec_idx = 0; uint32_t entry_success = 0; @@ -325,7 +325,7 @@ copy_from_mbuf_to_vring(struct virtio_net *dev, uint32_t queue_id, */ vq = dev->virtqueue[queue_id]; - vb_addr = gpa_to_vva(dev, vq->buf_vec[vec_idx].buf_addr); + vb_addr = gpa_to_vva(dev, buf_vec[vec_idx].buf_addr); vb_hdr_addr = vb_addr; /* Prefetch buffer address. */ @@ -345,19 +345,19 @@ copy_from_mbuf_to_vring(struct virtio_net *dev, uint32_t queue_id, seg_avail = rte_pktmbuf_data_len(pkt); vb_offset = vq->vhost_hlen; - vb_avail = vq->buf_vec[vec_idx].buf_len - vq->vhost_hlen; + vb_avail = buf_vec[vec_idx].buf_len - vq->vhost_hlen; entry_len = vq->vhost_hlen; if (vb_avail == 0) { uint32_t desc_idx = - vq->buf_vec[vec_idx].desc_idx; + buf_vec[vec_idx].desc_idx; if ((vq->desc[desc_idx].flags & VRING_DESC_F_NEXT) == 0) { /* Update used ring with desc information */ vq->used->ring[cur_idx & (vq->size - 1)].id - = vq->buf_vec[vec_idx].desc_idx; + = buf_vec[vec_idx].desc_idx; vq->used->ring[cur_idx & (vq->size - 1)].len = entry_len; @@ -367,12 +367,12 @@ copy_from_mbuf_to_vring(struct virtio_net *dev, uint32_t queue_id, } vec_idx++; - vb_addr = gpa_to_vva(dev, vq->buf_vec[vec_idx].buf_addr); + vb_addr = gpa_to_vva(dev, buf_vec[vec_idx].buf_addr); /* Prefetch buffer address. */ rte_prefetch0((void *)(uintptr_t)vb_addr); vb_offset = 0; - vb_avail = vq->buf_vec[vec_idx].buf_len; + vb_avail = buf_vec[vec_idx].buf_len; } cpy_len = RTE_MIN(vb_avail, seg_avail); @@ -399,11 +399,11 @@ copy_from_mbuf_to_vring(struct virtio_net *dev, uint32_t queue_id, * entry reach to its end. * But the segment doesn't complete. */ - if ((vq->desc[vq->buf_vec[vec_idx].desc_idx].flags & + if ((vq->desc[buf_vec[vec_idx].desc_idx].flags & VRING_DESC_F_NEXT) == 0) { /* Update used ring with desc information */ vq->used->ring[cur_idx & (vq->size - 1)].id - = vq->buf_vec[vec_idx].desc_idx; + = buf_vec[vec_idx].desc_idx; vq->used->ring[cur_idx & (vq->size - 1)].len = entry_len; entry_len = 0; @@ -413,9 +413,9 @@ copy_from_mbuf_to_vring(struct virtio_net *dev, uint32_t queue_id, vec_idx++; vb_addr = gpa_to_vva(dev, - vq->buf_vec[vec_idx].buf_addr); + buf_vec[vec_idx].buf_addr); vb_offset = 0; - vb_avail = vq->buf_vec[vec_idx].buf_len; + vb_avail = buf_vec[vec_idx].buf_len; cpy_len = RTE_MIN(vb_avail, seg_avail); } else { /* @@ -434,7 +434,7 @@ copy_from_mbuf_to_vring(struct virtio_net *dev, uint32_t queue_id, * from buf_vec. */ uint32_t desc_idx = - vq->buf_vec[vec_idx].desc_idx; + buf_vec[vec_idx].desc_idx; if ((vq->desc[desc_idx].flags & VRING_DESC_F_NEXT) == 0) { @@ -456,9 +456,9 @@ copy_from_mbuf_to_vring(struct virtio_net *dev, uint32_t queue_id, /* Get next buffer from buf_vec. */ vec_idx++; vb_addr = gpa_to_vva(dev, - vq->buf_vec[vec_idx].buf_addr); + buf_vec[vec_idx].buf_addr); vb_avail = - vq->buf_vec[vec_idx].buf_len; + buf_vec[vec_idx].buf_len; vb_offset = 0; } @@ -471,7 +471,7 @@ copy_from_mbuf_to_vring(struct virtio_net *dev, uint32_t queue_id, */ /* Update used ring with desc information */ vq->used->ring[cur_idx & (vq->size - 1)].id - = vq->buf_vec[vec_idx].desc_idx; + = buf_vec[vec_idx].desc_idx; vq->used->ring[cur_idx & (vq->size - 1)].len = entry_len; entry_success++; @@ -485,7 +485,7 @@ copy_from_mbuf_to_vring(struct virtio_net *dev, uint32_t queue_id, static inline void __attribute__((always_inline)) update_secure_len(struct vhost_virtqueue *vq, uint32_t id, - uint32_t *secure_len, uint32_t *vec_idx) + uint32_t *secure_len, uint32_t *vec_idx, struct buf_vector *buf_vec) { uint16_t wrapped_idx = id & (vq->size - 1); uint32_t idx = vq->avail->ring[wrapped_idx]; @@ -496,9 +496,9 @@ update_secure_len(struct vhost_virtqueue *vq, uint32_t id, do { next_desc = 0; len += vq->desc[idx].len; - vq->buf_vec[vec_id].buf_addr = vq->desc[idx].addr; - vq->buf_vec[vec_id].buf_len = vq->desc[idx].len; - vq->buf_vec[vec_id].desc_idx = idx; + buf_vec[vec_id].buf_addr = vq->desc[idx].addr; + buf_vec[vec_id].buf_len = vq->desc[idx].len; + buf_vec[vec_id].desc_idx = idx; vec_id++; if (vq->desc[idx].flags & VRING_DESC_F_NEXT) { @@ -523,6 +523,7 @@ virtio_dev_merge_rx(struct virtio_net *dev, uint16_t queue_id, uint16_t avail_idx; uint16_t res_base_idx, res_cur_idx; uint8_t success = 0; + struct buf_vector buf_vec[BUF_VECTOR_MAX]; LOG_DEBUG(VHOST_DATA, "(%"PRIu64") virtio_dev_merge_rx()\n", dev->device_fh); @@ -561,8 +562,8 @@ virtio_dev_merge_rx(struct virtio_net *dev, uint16_t queue_id, if (unlikely(res_cur_idx == avail_idx)) goto merge_rx_exit; - update_secure_len(vq, res_cur_idx, - &secure_len, &vec_idx); + update_secure_len(vq, res_cur_idx, &secure_len, + &vec_idx, buf_vec); res_cur_idx++; } while (pkt_len > secure_len); @@ -573,7 +574,7 @@ virtio_dev_merge_rx(struct virtio_net *dev, uint16_t queue_id, } while (success == 0); entry_success = copy_from_mbuf_to_vring(dev, queue_id, - res_base_idx, res_cur_idx, pkts[pkt_idx]); + res_base_idx, res_cur_idx, pkts[pkt_idx], buf_vec); rte_smp_wmb(); -- 2.5.0 ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [PATCH RFC 2/4] vhost: make buf vector for scatter RX local. 2016-02-19 6:32 ` [dpdk-dev] [PATCH RFC 2/4] vhost: make buf vector for scatter RX local Ilya Maximets @ 2016-02-19 7:06 ` Yuanhan Liu 2016-04-05 5:47 ` [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local Yuanhan Liu 0 siblings, 1 reply; 8+ messages in thread From: Yuanhan Liu @ 2016-02-19 7:06 UTC (permalink / raw) To: Ilya Maximets; +Cc: dev, Dyasly Sergey On Fri, Feb 19, 2016 at 09:32:41AM +0300, Ilya Maximets wrote: > Array of buf_vector's is just an array for temporary storing information > about available descriptors. It used only locally in virtio_dev_merge_rx() > and there is no reason for that array to be shared. > > Fix that by allocating local buf_vec inside virtio_dev_merge_rx(). > > Signed-off-by: Ilya Maximets <i.maximets@samsung.com> > --- > lib/librte_vhost/rte_virtio_net.h | 1 - > lib/librte_vhost/vhost_rxtx.c | 45 ++++++++++++++++++++------------------- > 2 files changed, 23 insertions(+), 23 deletions(-) > > diff --git a/lib/librte_vhost/rte_virtio_net.h b/lib/librte_vhost/rte_virtio_net.h > index 10dcb90..ae1e4fb 100644 > --- a/lib/librte_vhost/rte_virtio_net.h > +++ b/lib/librte_vhost/rte_virtio_net.h > @@ -91,7 +91,6 @@ struct vhost_virtqueue { > int kickfd; /**< Currently unused as polling mode is enabled. */ > int enabled; > uint64_t reserved[16]; /**< Reserve some spaces for future extension. */ > - struct buf_vector buf_vec[BUF_VECTOR_MAX]; /**< for scatter RX. */ > } __rte_cache_aligned; I like this kind of cleanup, however, it breaks ABI. --yliu ^ permalink raw reply [flat|nested] 8+ messages in thread
* [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local. 2016-02-19 7:06 ` Yuanhan Liu @ 2016-04-05 5:47 ` Yuanhan Liu 2016-04-05 8:37 ` Thomas Monjalon 2016-04-06 4:14 ` Flavio Leitner 0 siblings, 2 replies; 8+ messages in thread From: Yuanhan Liu @ 2016-04-05 5:47 UTC (permalink / raw) To: Ilya Maximets Cc: dev, Dyasly Sergey, Thomas Monjalon, Flavio Leitner, Xie, Huawei On Fri, Feb 19, 2016 at 03:06:50PM +0800, Yuanhan Liu wrote: > On Fri, Feb 19, 2016 at 09:32:41AM +0300, Ilya Maximets wrote: > > Array of buf_vector's is just an array for temporary storing information > > about available descriptors. It used only locally in virtio_dev_merge_rx() > > and there is no reason for that array to be shared. > > > > Fix that by allocating local buf_vec inside virtio_dev_merge_rx(). > > > > Signed-off-by: Ilya Maximets <i.maximets@samsung.com> > > --- > > lib/librte_vhost/rte_virtio_net.h | 1 - > > lib/librte_vhost/vhost_rxtx.c | 45 ++++++++++++++++++++------------------- > > 2 files changed, 23 insertions(+), 23 deletions(-) > > > > diff --git a/lib/librte_vhost/rte_virtio_net.h b/lib/librte_vhost/rte_virtio_net.h > > index 10dcb90..ae1e4fb 100644 > > --- a/lib/librte_vhost/rte_virtio_net.h > > +++ b/lib/librte_vhost/rte_virtio_net.h > > @@ -91,7 +91,6 @@ struct vhost_virtqueue { > > int kickfd; /**< Currently unused as polling mode is enabled. */ > > int enabled; > > uint64_t reserved[16]; /**< Reserve some spaces for future extension. */ > > - struct buf_vector buf_vec[BUF_VECTOR_MAX]; /**< for scatter RX. */ > > } __rte_cache_aligned; > > I like this kind of cleanup, however, it breaks ABI. So, I was considering to add vhost-user Tx delayed-copy (or zero copy) support recently, which comes to yet another ABI violation, as we need add a new field to virtio_memory_regions struct to do guest phys addr to host phys addr translation. You may ask, however, that why do we need expose virtio_memory_regions struct to users at all? You are right, we don't have to. And here is the thing: we exposed way too many fields (or even structures) than necessary. Say, vhost_virtqueue struct should NOT be exposed to user at all: application just need to tell the right queue id to locate a specific queue, and that's all. The structure should be defined in an internal header file. With that, we could do any changes to it we want, without worrying about that we may offense the painful ABI rules. Similar changes could be done to virtio_net struct as well, just exposing very few fields that are necessary and moving all others to an internal structure. Huawei then suggested a more radical yet much cleaner one: just exposing a virtio_net handle to application, just like the way kernel exposes an fd to user for locating a specific file. However, it's more than an ABI change; it's also an API change: some fields are referenced by applications, such as flags, virt_qp_nb. We could expose some new functions to access them though. I'd vote for this one, as it sounds very clean to me. This would also solve the block issue of this patch. Though it would break OVS, I'm thinking that'd be okay, as OVS has dependence on DPDK version: what we need to do is just to send few patches to OVS, and let it points to next release, say DPDK v16.07. Flavio, please correct me if I'm wrong. Thoughts/comments? --yliu ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local. 2016-04-05 5:47 ` [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local Yuanhan Liu @ 2016-04-05 8:37 ` Thomas Monjalon 2016-04-05 14:06 ` Yuanhan Liu 2016-04-06 4:14 ` Flavio Leitner 1 sibling, 1 reply; 8+ messages in thread From: Thomas Monjalon @ 2016-04-05 8:37 UTC (permalink / raw) To: Yuanhan Liu Cc: dev, Ilya Maximets, Dyasly Sergey, Flavio Leitner, Xie, Huawei 2016-04-05 13:47, Yuanhan Liu: > So, I was considering to add vhost-user Tx delayed-copy (or zero copy) > support recently, which comes to yet another ABI violation, as we need > add a new field to virtio_memory_regions struct to do guest phys addr > to host phys addr translation. You may ask, however, that why do we need > expose virtio_memory_regions struct to users at all? > > You are right, we don't have to. And here is the thing: we exposed way > too many fields (or even structures) than necessary. Say, vhost_virtqueue > struct should NOT be exposed to user at all: application just need to > tell the right queue id to locate a specific queue, and that's all. > The structure should be defined in an internal header file. With that, > we could do any changes to it we want, without worrying about that we > may offense the painful ABI rules. > > Similar changes could be done to virtio_net struct as well, just exposing > very few fields that are necessary and moving all others to an internal > structure. > > Huawei then suggested a more radical yet much cleaner one: just exposing > a virtio_net handle to application, just like the way kernel exposes an > fd to user for locating a specific file. However, it's more than an ABI > change; it's also an API change: some fields are referenced by applications, > such as flags, virt_qp_nb. We could expose some new functions to access > them though. > > I'd vote for this one, as it sounds very clean to me. This would also > solve the block issue of this patch. Though it would break OVS, I'm thinking > that'd be okay, as OVS has dependence on DPDK version: what we need to > do is just to send few patches to OVS, and let it points to next release, > say DPDK v16.07. Flavio, please correct me if I'm wrong. > > Thoughts/comments? Do you plan to send a deprecation notice to change API in 16.07? ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local. 2016-04-05 8:37 ` Thomas Monjalon @ 2016-04-05 14:06 ` Yuanhan Liu 0 siblings, 0 replies; 8+ messages in thread From: Yuanhan Liu @ 2016-04-05 14:06 UTC (permalink / raw) To: Thomas Monjalon Cc: dev, Ilya Maximets, Dyasly Sergey, Flavio Leitner, Xie, Huawei On Tue, Apr 05, 2016 at 10:37:13AM +0200, Thomas Monjalon wrote: > 2016-04-05 13:47, Yuanhan Liu: > > So, I was considering to add vhost-user Tx delayed-copy (or zero copy) > > support recently, which comes to yet another ABI violation, as we need > > add a new field to virtio_memory_regions struct to do guest phys addr > > to host phys addr translation. You may ask, however, that why do we need > > expose virtio_memory_regions struct to users at all? > > > > You are right, we don't have to. And here is the thing: we exposed way > > too many fields (or even structures) than necessary. Say, vhost_virtqueue > > struct should NOT be exposed to user at all: application just need to > > tell the right queue id to locate a specific queue, and that's all. > > The structure should be defined in an internal header file. With that, > > we could do any changes to it we want, without worrying about that we > > may offense the painful ABI rules. > > > > Similar changes could be done to virtio_net struct as well, just exposing > > very few fields that are necessary and moving all others to an internal > > structure. > > > > Huawei then suggested a more radical yet much cleaner one: just exposing > > a virtio_net handle to application, just like the way kernel exposes an > > fd to user for locating a specific file. However, it's more than an ABI > > change; it's also an API change: some fields are referenced by applications, > > such as flags, virt_qp_nb. We could expose some new functions to access > > them though. > > > > I'd vote for this one, as it sounds very clean to me. This would also > > solve the block issue of this patch. Though it would break OVS, I'm thinking > > that'd be okay, as OVS has dependence on DPDK version: what we need to > > do is just to send few patches to OVS, and let it points to next release, > > say DPDK v16.07. Flavio, please correct me if I'm wrong. > > > > Thoughts/comments? > > Do you plan to send a deprecation notice to change API in 16.07? Yes, I planned to, shortly. Before that, I'd ask for comments first. --yliu ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local. 2016-04-05 5:47 ` [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local Yuanhan Liu 2016-04-05 8:37 ` Thomas Monjalon @ 2016-04-06 4:14 ` Flavio Leitner 2016-04-06 4:54 ` Yuanhan Liu 1 sibling, 1 reply; 8+ messages in thread From: Flavio Leitner @ 2016-04-06 4:14 UTC (permalink / raw) To: Yuanhan Liu Cc: Ilya Maximets, dev, Dyasly Sergey, Thomas Monjalon, Xie, Huawei On Tue, Apr 05, 2016 at 01:47:33PM +0800, Yuanhan Liu wrote: > On Fri, Feb 19, 2016 at 03:06:50PM +0800, Yuanhan Liu wrote: > > On Fri, Feb 19, 2016 at 09:32:41AM +0300, Ilya Maximets wrote: > > > Array of buf_vector's is just an array for temporary storing information > > > about available descriptors. It used only locally in virtio_dev_merge_rx() > > > and there is no reason for that array to be shared. > > > > > > Fix that by allocating local buf_vec inside virtio_dev_merge_rx(). > > > > > > Signed-off-by: Ilya Maximets <i.maximets@samsung.com> > > > --- > > > lib/librte_vhost/rte_virtio_net.h | 1 - > > > lib/librte_vhost/vhost_rxtx.c | 45 ++++++++++++++++++++------------------- > > > 2 files changed, 23 insertions(+), 23 deletions(-) > > > > > > diff --git a/lib/librte_vhost/rte_virtio_net.h b/lib/librte_vhost/rte_virtio_net.h > > > index 10dcb90..ae1e4fb 100644 > > > --- a/lib/librte_vhost/rte_virtio_net.h > > > +++ b/lib/librte_vhost/rte_virtio_net.h > > > @@ -91,7 +91,6 @@ struct vhost_virtqueue { > > > int kickfd; /**< Currently unused as polling mode is enabled. */ > > > int enabled; > > > uint64_t reserved[16]; /**< Reserve some spaces for future extension. */ > > > - struct buf_vector buf_vec[BUF_VECTOR_MAX]; /**< for scatter RX. */ > > > } __rte_cache_aligned; > > > > I like this kind of cleanup, however, it breaks ABI. > > So, I was considering to add vhost-user Tx delayed-copy (or zero copy) > support recently, which comes to yet another ABI violation, as we need > add a new field to virtio_memory_regions struct to do guest phys addr > to host phys addr translation. You may ask, however, that why do we need > expose virtio_memory_regions struct to users at all? > > You are right, we don't have to. And here is the thing: we exposed way > too many fields (or even structures) than necessary. Say, vhost_virtqueue > struct should NOT be exposed to user at all: application just need to > tell the right queue id to locate a specific queue, and that's all. > The structure should be defined in an internal header file. With that, > we could do any changes to it we want, without worrying about that we > may offense the painful ABI rules. > > Similar changes could be done to virtio_net struct as well, just exposing > very few fields that are necessary and moving all others to an internal > structure. > > Huawei then suggested a more radical yet much cleaner one: just exposing > a virtio_net handle to application, just like the way kernel exposes an > fd to user for locating a specific file. However, it's more than an ABI > change; it's also an API change: some fields are referenced by applications, > such as flags, virt_qp_nb. We could expose some new functions to access > them though. > > I'd vote for this one, as it sounds very clean to me. This would also > solve the block issue of this patch. Though it would break OVS, I'm thinking > that'd be okay, as OVS has dependence on DPDK version: what we need to > do is just to send few patches to OVS, and let it points to next release, > say DPDK v16.07. Flavio, please correct me if I'm wrong. There is a plan to use vHost PMD, so from OVS point of view the virtio stuff would be hidden because vhost PMD would look like just as a regular ethernet, right? I think we are waiting for 16.04 to be released with that so we can start push changes to OVS as well. -- fbl ^ permalink raw reply [flat|nested] 8+ messages in thread
* Re: [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local. 2016-04-06 4:14 ` Flavio Leitner @ 2016-04-06 4:54 ` Yuanhan Liu 0 siblings, 0 replies; 8+ messages in thread From: Yuanhan Liu @ 2016-04-06 4:54 UTC (permalink / raw) To: Flavio Leitner Cc: Ilya Maximets, dev, Dyasly Sergey, Thomas Monjalon, Xie, Huawei On Wed, Apr 06, 2016 at 01:14:09AM -0300, Flavio Leitner wrote: > > > > I'd vote for this one, as it sounds very clean to me. This would also > > solve the block issue of this patch. Though it would break OVS, I'm thinking > > that'd be okay, as OVS has dependence on DPDK version: what we need to > > do is just to send few patches to OVS, and let it points to next release, > > say DPDK v16.07. Flavio, please correct me if I'm wrong. > > There is a plan to use vHost PMD, Great. > so from OVS point of view the virtio > stuff would be hidden because vhost PMD would look like just as a > regular ethernet, right? Yes. --yliu ^ permalink raw reply [flat|nested] 8+ messages in thread
end of thread, other threads:[~2016-04-06 6:00 UTC | newest] Thread overview: 8+ messages (download: mbox.gz / follow: Atom feed) -- links below jump to the message on this page -- 2016-04-06 5:11 [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local Ilya Maximets 2016-04-06 5:38 ` Yuanhan Liu -- strict thread matches above, loose matches on Subject: below -- 2016-04-06 6:00 Ilya Maximets 2016-02-19 6:32 [dpdk-dev] [PATCH RFC 0/4] Thread safe rte_vhost_enqueue_burst() Ilya Maximets 2016-02-19 6:32 ` [dpdk-dev] [PATCH RFC 2/4] vhost: make buf vector for scatter RX local Ilya Maximets 2016-02-19 7:06 ` Yuanhan Liu 2016-04-05 5:47 ` [dpdk-dev] [RFC] vhost-user public struct refactor (was Re: [PATCH RFC 2/4] vhost: make buf vector for scatter RX) local Yuanhan Liu 2016-04-05 8:37 ` Thomas Monjalon 2016-04-05 14:06 ` Yuanhan Liu 2016-04-06 4:14 ` Flavio Leitner 2016-04-06 4:54 ` Yuanhan Liu
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).