From patchwork Thu Sep 26 19:29:27 2019
Content-Type: text/plain; charset="utf-8"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
X-Patchwork-Submitter: William Tu
X-Patchwork-Id: 1168136
Return-Path:
X-Original-To: incoming@patchwork.ozlabs.org
Delivered-To: patchwork-incoming@bilbo.ozlabs.org
Authentication-Results: ozlabs.org;
spf=pass (mailfrom) smtp.mailfrom=openvswitch.org
(client-ip=140.211.169.12; helo=mail.linuxfoundation.org;
envelope-from=ovs-dev-bounces@openvswitch.org;
receiver=)
Authentication-Results: ozlabs.org;
dmarc=fail (p=none dis=none) header.from=gmail.com
Authentication-Results: ozlabs.org;
dkim=fail reason="signature verification failed" (2048-bit key;
unprotected) header.d=gmail.com header.i=@gmail.com
header.b="CzRXBb+/"; dkim-atps=neutral
Received: from mail.linuxfoundation.org (mail.linuxfoundation.org
[140.211.169.12])
(using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256
bits)) (No client certificate requested)
by ozlabs.org (Postfix) with ESMTPS id 46fQ4V4VyHz9sN1
for ;
Fri, 27 Sep 2019 05:30:18 +1000 (AEST)
Received: from mail.linux-foundation.org (localhost [127.0.0.1])
by mail.linuxfoundation.org (Postfix) with ESMTP id 609EBD7C;
Thu, 26 Sep 2019 19:30:16 +0000 (UTC)
X-Original-To: dev@openvswitch.org
Delivered-To: ovs-dev@mail.linuxfoundation.org
Received: from smtp1.linuxfoundation.org (smtp1.linux-foundation.org
[172.17.192.35])
by mail.linuxfoundation.org (Postfix) with ESMTPS id 5E92DCB6
for ; Thu, 26 Sep 2019 19:30:15 +0000 (UTC)
X-Greylist: whitelisted by SQLgrey-1.7.6
Received: from mail-pf1-f194.google.com (mail-pf1-f194.google.com
[209.85.210.194])
by smtp1.linuxfoundation.org (Postfix) with ESMTPS id 3CEBF8A0
for ; Thu, 26 Sep 2019 19:30:14 +0000 (UTC)
Received: by mail-pf1-f194.google.com with SMTP id y5so87261pfo.4
for ; Thu, 26 Sep 2019 12:30:14 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025;
h=from:to:cc:subject:date:message-id;
bh=+McazQhsc/v0MsDAQKE8bLUFDNBPW5JmCZZvkre7ptQ=;
b=CzRXBb+/BQWVWo6mGZ6167FMDTXaz6r+N9GwRELHof1satpbN0j7YTTG4SJj5iRMtx
9B29zlSDpY6KK8Tu8oEeIyexlIjPdvEOrCE/Ir16hQ3iwewzW10AbyHgbXtPKih0MeGo
Kri97aDgxoiO+f9MdSfrCbcaeHbRP/Xd6r6rVK3uM190hh6R0FsQwoxhSihyN5N61DyA
v3Z+pRWf7FqTQk6XWi8FaOCRH1bLS2alDnbp0Umnsg19BT58f1SqAAjZSglQyygDoXio
Sy4HiOpCko6Pxblc5idiX4hjOd3pTl4/hscq3K+IXWYQKH93+uO70re+ZIANpV2TYJYe
kcvw==
X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed;
d=1e100.net; s=20161025;
h=x-gm-message-state:from:to:cc:subject:date:message-id;
bh=+McazQhsc/v0MsDAQKE8bLUFDNBPW5JmCZZvkre7ptQ=;
b=URWINm/Ypo4RCRSOfxYhCE0U4Xl4y73cIKljXPzQnvYtgdlP6JKCIWxWRe9/RD3nVR
2Q2Hj4fXs1rS8b9HMc+X1AAuHAm4NY21lOM5eajkp0fiTl5jmYgOWXDPY1eObLYtvzjV
rMAbx6Gzr84gUIilp7ijlVDBuoS3VVRllrnOmTTUktV61YnSJVSLRKrl9eNwo9uciBKo
Zs0d90XLP+1Lkh+1Pyoun0/AQ/5u8+sccTti4tEPNjr9g2pIblWPSzZgDXSeH+eXqY0v
m+8cAlvRfepHjSs9QS2lsAEMkBBnfHa3iztCF0IwMHn7ZAuiOzAuHR9kBfJ6uKFPW0qX
hpOw==
X-Gm-Message-State: APjAAAWIfcJKLKSyoOlygWFbLxZIJxozJog9bZ0+TV+nNK1FjTGpNpF5
7YvgIqOOPYmq3bobsVfcBkQnpFhTImk=
X-Google-Smtp-Source:
APXvYqyuFciFJzIlYDsXY4jfLH8GWyuYiDiEDze2oLkuKi85ugjoNxbqxQqfd3cJfwUf/A3OtOE9xg==
X-Received: by 2002:a17:90a:bc49:: with SMTP id
t9mr5298981pjv.21.1569526213282;
Thu, 26 Sep 2019 12:30:13 -0700 (PDT)
Received: from sc9-mailhost3.vmware.com ([66.170.99.1])
by smtp.gmail.com with ESMTPSA id
t12sm2838416pjq.18.2019.09.26.12.30.12
(version=TLS1_2 cipher=ECDHE-RSA-AES128-SHA bits=128/128);
Thu, 26 Sep 2019 12:30:12 -0700 (PDT)
From: William Tu
To: dev@openvswitch.org
Date: Thu, 26 Sep 2019 12:29:27 -0700
Message-Id: <1569526167-71339-1-git-send-email-u9012063@gmail.com>
X-Mailer: git-send-email 2.7.4
X-Spam-Status: No, score=-1.7 required=5.0 tests=BAYES_00,DKIM_SIGNED,
DKIM_VALID,DKIM_VALID_AU,FREEMAIL_ENVFROM_END_DIGIT,FREEMAIL_FROM,
RCVD_IN_DNSWL_NONE autolearn=no version=3.3.1
X-Spam-Checker-Version: SpamAssassin 3.3.1 (2010-03-16) on
smtp1.linux-foundation.org
Cc: i.maximets@ovn.org
Subject: [ovs-dev] [PATCHv5] netdev-afxdp: Add need_wakeup supprt.
X-BeenThere: ovs-dev@openvswitch.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id:
List-Unsubscribe: ,
List-Archive:
List-Post:
List-Help:
List-Subscribe: ,
MIME-Version: 1.0
Sender: ovs-dev-bounces@openvswitch.org
Errors-To: ovs-dev-bounces@openvswitch.org
The patch adds support for using need_wakeup flag in AF_XDP rings.
A new option, use_need_wakeup, is added. When this option is used,
it means that OVS has to explicitly wake up the kernel RX, using poll()
syscall and wake up TX, using sendto() syscall. This feature improves
the performance by avoiding unnecessary sendto syscalls for TX.
For RX, instead of kernel always busy-spinning on fille queue, OVS wakes
up the kernel RX processing when fill queue is replenished.
The need_wakeup feature is merged into Linux kernel bpf-next tee with commit
77cd0d7b3f25 ("xsk: add support for need_wakeup flag in AF_XDP rings") and
OVS enables it by default. Running the feature before this version causes
xsk bind fails, please use options:use_need_wakeup=false to disable it.
If users enable it but runs in an older version of libbpf, then the
need_wakeup feature has no effect, and a warning message is logged.
For virtual interface, it's better set use_need_wakeup=false, since
the virtual device's AF_XDP xmit is synchronous: the sendto syscall
enters kernel and process the TX packet on tx queue directly.
On Intel Xeon E5-2620 v3 2.4GHz system, performance of physical port
to physical port improves from 6.1Mpps to 7.3Mpps.
Suggested-by: Ilya Maximets
Signed-off-by: William Tu
Acked-by: Eelco Chaudron
---
v5:
- address feedback from Ilya
- update commit msg about kernel version using bpf-next tree
- remove __func__, and use DBG in log_
- fix alignment
- remove the kernel version requirement for need_wakeup, we can
wait until tag is available
v4:
- move use_need_wakeup check inside xsk_rx_wakeup_if_needed
v3:
- add warning when user enables it but libbpf not support it
- revise documentation
v2:
- address feedbacks from Ilya and Eelco
- add options:use_need_wakeup, default to true
- remove poll timeout=1sec, make poll() return immediately
- naming change: rename to xsk_rx_wakeup_if_needing
- fix indents and return value for errno
---
Documentation/intro/install/afxdp.rst | 15 ++++-
acinclude.m4 | 5 ++
lib/netdev-afxdp.c | 108 ++++++++++++++++++++++++++++++----
lib/netdev-linux-private.h | 2 +
vswitchd/vswitch.xml | 12 ++++
5 files changed, 126 insertions(+), 16 deletions(-)
diff --git a/Documentation/intro/install/afxdp.rst b/Documentation/intro/install/afxdp.rst
index 820e9d993d8f..545516b2bbec 100644
--- a/Documentation/intro/install/afxdp.rst
+++ b/Documentation/intro/install/afxdp.rst
@@ -176,9 +176,18 @@ in :doc:`general`::
ovs-vswitchd ...
ovs-vsctl -- add-br br0 -- set Bridge br0 datapath_type=netdev
-Make sure your device driver support AF_XDP, and to use 1 PMD (on core 4)
-on 1 queue (queue 0) device, configure these options: **pmd-cpu-mask,
-pmd-rxq-affinity, and n_rxq**. The **xdpmode** can be "drv" or "skb"::
+Make sure your device driver support AF_XDP, netdev-afxdp supports
+the following additional options (see man ovs-vswitchd.conf.db for
+more details):
+
+ * **xdpmode**: use "drv" for driver mode, or "skb" for skb mode.
+
+ * **use_need_wakeup**: disable by setting to "false", otherwise default
+ is "true"
+
+For example, to use 1 PMD (on core 4) on 1 queue (queue 0) device,
+configure these options: **pmd-cpu-mask, pmd-rxq-affinity, and n_rxq**.
+The **xdpmode** can be "drv" or "skb"::
ethtool -L enp2s0 combined 1
ovs-vsctl set Open_vSwitch . other_config:pmd-cpu-mask=0x10
diff --git a/acinclude.m4 b/acinclude.m4
index f0e38898b17a..f1ecb86adf7c 100644
--- a/acinclude.m4
+++ b/acinclude.m4
@@ -276,6 +276,11 @@ AC_DEFUN([OVS_CHECK_LINUX_AF_XDP], [
[Define to 1 if AF_XDP support is available and enabled.])
LIBBPF_LDADD=" -lbpf -lelf"
AC_SUBST([LIBBPF_LDADD])
+
+ AC_CHECK_DECL([xsk_ring_prod__needs_wakeup], [
+ AC_DEFINE([HAVE_XDP_NEED_WAKEUP], [1],
+ [XDP need wakeup support detected in xsk.h.])
+ ], [], [[#include ]])
fi
AM_CONDITIONAL([HAVE_AF_XDP], test "$AF_XDP_ENABLE" = true)
])
diff --git a/lib/netdev-afxdp.c b/lib/netdev-afxdp.c
index 6e01803272aa..fee9413bfd0a 100644
--- a/lib/netdev-afxdp.c
+++ b/lib/netdev-afxdp.c
@@ -26,6 +26,7 @@
#include
#include
#include
+#include
#include
#include
#include
@@ -82,7 +83,7 @@ BUILD_ASSERT_DECL(PROD_NUM_DESCS == CONS_NUM_DESCS);
#define UMEM2DESC(elem, base) ((uint64_t)((char *)elem - (char *)base))
static struct xsk_socket_info *xsk_configure(int ifindex, int xdp_queue_id,
- int mode);
+ int mode, bool use_need_wakeup);
static void xsk_remove_xdp_program(uint32_t ifindex, int xdpmode);
static void xsk_destroy(struct xsk_socket_info *xsk);
static int xsk_configure_all(struct netdev *netdev);
@@ -117,6 +118,54 @@ struct xsk_socket_info {
atomic_uint64_t tx_dropped;
};
+#ifdef HAVE_XDP_NEED_WAKEUP
+static inline void
+xsk_rx_wakeup_if_needed(struct xsk_umem_info *umem,
+ struct netdev *netdev, int fd)
+{
+ struct netdev_linux *dev = netdev_linux_cast(netdev);
+ struct pollfd pfd;
+ int ret;
+
+ if (!dev->use_need_wakeup) {
+ return;
+ }
+
+ if (xsk_ring_prod__needs_wakeup(&umem->fq)) {
+ pfd.fd = fd;
+ pfd.events = POLLIN;
+
+ ret = poll(&pfd, 1, 0);
+ if (OVS_UNLIKELY(ret < 0)) {
+ VLOG_WARN_RL(&rl, "%s: error polling rx fd: %s.",
+ netdev_get_name(netdev),
+ ovs_strerror(errno));
+ }
+ }
+}
+
+static inline bool
+xsk_tx_need_wakeup(struct xsk_socket_info *xsk_info)
+{
+ return xsk_ring_prod__needs_wakeup(&xsk_info->tx);
+}
+
+#else /* !HAVE_XDP_NEED_WAKEUP */
+static inline void
+xsk_rx_wakeup_if_needed(struct xsk_umem_info *umem OVS_UNUSED,
+ struct netdev *netdev OVS_UNUSED,
+ int fd OVS_UNUSED)
+{
+ /* Nothing. */
+}
+
+static inline bool
+xsk_tx_need_wakeup(struct xsk_socket_info *xsk_info OVS_UNUSED)
+{
+ return true;
+}
+#endif /* HAVE_XDP_NEED_WAKEUP */
+
static void
netdev_afxdp_cleanup_unused_pool(struct unused_pool *pool)
{
@@ -234,7 +283,7 @@ xsk_configure_umem(void *buffer, uint64_t size, int xdpmode)
static struct xsk_socket_info *
xsk_configure_socket(struct xsk_umem_info *umem, uint32_t ifindex,
- uint32_t queue_id, int xdpmode)
+ uint32_t queue_id, int xdpmode, bool use_need_wakeup)
{
struct xsk_socket_config cfg;
struct xsk_socket_info *xsk;
@@ -257,6 +306,12 @@ xsk_configure_socket(struct xsk_umem_info *umem, uint32_t ifindex,
cfg.xdp_flags = XDP_FLAGS_UPDATE_IF_NOEXIST | XDP_FLAGS_SKB_MODE;
}
+ if (use_need_wakeup) {
+#ifdef HAVE_XDP_NEED_WAKEUP
+ cfg.bind_flags |= XDP_USE_NEED_WAKEUP;
+#endif
+ }
+
if (if_indextoname(ifindex, devname) == NULL) {
VLOG_ERR("ifindex %d to devname failed (%s)",
ifindex, ovs_strerror(errno));
@@ -267,9 +322,11 @@ xsk_configure_socket(struct xsk_umem_info *umem, uint32_t ifindex,
ret = xsk_socket__create(&xsk->xsk, devname, queue_id, umem->umem,
&xsk->rx, &xsk->tx, &cfg);
if (ret) {
- VLOG_ERR("xsk_socket__create failed (%s) mode: %s qid: %d",
+ VLOG_ERR("xsk_socket__create failed (%s) mode: %s "
+ "use_need_wakeup: %s qid: %d",
ovs_strerror(errno),
xdpmode == XDP_COPY ? "SKB": "DRV",
+ use_need_wakeup ? "true" : "false",
queue_id);
free(xsk);
return NULL;
@@ -311,7 +368,8 @@ xsk_configure_socket(struct xsk_umem_info *umem, uint32_t ifindex,
}
static struct xsk_socket_info *
-xsk_configure(int ifindex, int xdp_queue_id, int xdpmode)
+xsk_configure(int ifindex, int xdp_queue_id, int xdpmode,
+ bool use_need_wakeup)
{
struct xsk_socket_info *xsk;
struct xsk_umem_info *umem;
@@ -334,7 +392,8 @@ xsk_configure(int ifindex, int xdp_queue_id, int xdpmode)
VLOG_DBG("Allocated umem pool at 0x%"PRIxPTR, (uintptr_t) umem);
- xsk = xsk_configure_socket(umem, ifindex, xdp_queue_id, xdpmode);
+ xsk = xsk_configure_socket(umem, ifindex, xdp_queue_id, xdpmode,
+ use_need_wakeup);
if (!xsk) {
/* Clean up umem and xpacket pool. */
if (xsk_umem__delete(umem->umem)) {
@@ -365,9 +424,12 @@ xsk_configure_all(struct netdev *netdev)
/* Configure each queue. */
for (i = 0; i < n_rxq; i++) {
- VLOG_INFO("%s: configure queue %d mode %s", __func__, i,
- dev->xdpmode == XDP_COPY ? "SKB" : "DRV");
- xsk_info = xsk_configure(ifindex, i, dev->xdpmode);
+ VLOG_DBG("%s: configure queue %d mode %s use_need_wakeup %s.",
+ netdev_get_name(netdev), i,
+ dev->xdpmode == XDP_COPY ? "SKB" : "DRV",
+ dev->use_need_wakeup ? "true" : "false");
+ xsk_info = xsk_configure(ifindex, i, dev->xdpmode,
+ dev->use_need_wakeup);
if (!xsk_info) {
VLOG_ERR("Failed to create AF_XDP socket on queue %d.", i);
dev->xsks[i] = NULL;
@@ -459,6 +521,7 @@ netdev_afxdp_set_config(struct netdev *netdev, const struct smap *args,
struct netdev_linux *dev = netdev_linux_cast(netdev);
const char *str_xdpmode;
int xdpmode, new_n_rxq;
+ bool need_wakeup;
ovs_mutex_lock(&dev->mutex);
new_n_rxq = MAX(smap_get_int(args, "n_rxq", NR_QUEUE), 1);
@@ -481,10 +544,19 @@ netdev_afxdp_set_config(struct netdev *netdev, const struct smap *args,
return EINVAL;
}
+ need_wakeup = smap_get_bool(args, "use_need_wakeup", true);
+ if (need_wakeup) {
+#ifndef HAVE_XDP_NEED_WAKEUP
+ VLOG_WARN("XDP need_wakeup is not supported in libbpf.");
+#endif
+ }
+
if (dev->requested_n_rxq != new_n_rxq
- || dev->requested_xdpmode != xdpmode) {
+ || dev->requested_xdpmode != xdpmode
+ || dev->requested_need_wakeup != need_wakeup) {
dev->requested_n_rxq = new_n_rxq;
dev->requested_xdpmode = xdpmode;
+ dev->requested_need_wakeup = need_wakeup;
netdev_request_reconfigure(netdev);
}
ovs_mutex_unlock(&dev->mutex);
@@ -499,7 +571,9 @@ netdev_afxdp_get_config(const struct netdev *netdev, struct smap *args)
ovs_mutex_lock(&dev->mutex);
smap_add_format(args, "n_rxq", "%d", netdev->n_rxq);
smap_add_format(args, "xdpmode", "%s",
- dev->xdpmode == XDP_ZEROCOPY ? "drv" : "skb");
+ dev->xdpmode == XDP_ZEROCOPY ? "drv" : "skb");
+ smap_add_format(args, "use_need_wakeup", "%s",
+ dev->use_need_wakeup ? "true" : "false");
ovs_mutex_unlock(&dev->mutex);
return 0;
}
@@ -515,6 +589,7 @@ netdev_afxdp_reconfigure(struct netdev *netdev)
if (netdev->n_rxq == dev->requested_n_rxq
&& dev->xdpmode == dev->requested_xdpmode
+ && dev->use_need_wakeup == dev->requested_need_wakeup
&& dev->xsks) {
goto out;
}
@@ -538,6 +613,7 @@ netdev_afxdp_reconfigure(struct netdev *netdev)
* when no device is in DRV mode.
*/
}
+ dev->use_need_wakeup = dev->requested_need_wakeup;
err = xsk_configure_all(netdev);
if (err) {
@@ -660,6 +736,7 @@ netdev_afxdp_rxq_recv(struct netdev_rxq *rxq_, struct dp_packet_batch *batch,
rcvd = xsk_ring_cons__peek(&xsk_info->rx, BATCH_SIZE, &idx_rx);
if (!rcvd) {
+ xsk_rx_wakeup_if_needed(umem, netdev, rx->fd);
return EAGAIN;
}
@@ -704,11 +781,15 @@ netdev_afxdp_rxq_recv(struct netdev_rxq *rxq_, struct dp_packet_batch *batch,
}
static inline int
-kick_tx(struct xsk_socket_info *xsk_info, int xdpmode)
+kick_tx(struct xsk_socket_info *xsk_info, int xdpmode, bool use_need_wakeup)
{
int ret, retries;
static const int KERNEL_TX_BATCH_SIZE = 16;
+ if (use_need_wakeup && !xsk_tx_need_wakeup(xsk_info)) {
+ return 0;
+ }
+
/* In SKB_MODE packet transmission is synchronous, and the kernel xmits
* only TX_BATCH_SIZE(16) packets for a single sendmsg syscall.
* So, we have to kick the kernel (n_packets / 16) times to be sure that
@@ -880,7 +961,7 @@ __netdev_afxdp_batch_send(struct netdev *netdev, int qid,
&orig);
COVERAGE_INC(afxdp_tx_full);
afxdp_complete_tx(xsk_info);
- kick_tx(xsk_info, dev->xdpmode);
+ kick_tx(xsk_info, dev->xdpmode, dev->use_need_wakeup);
error = ENOMEM;
goto out;
}
@@ -904,7 +985,7 @@ __netdev_afxdp_batch_send(struct netdev *netdev, int qid,
xsk_ring_prod__submit(&xsk_info->tx, dp_packet_batch_size(batch));
xsk_info->outstanding_tx += dp_packet_batch_size(batch);
- ret = kick_tx(xsk_info, dev->xdpmode);
+ ret = kick_tx(xsk_info, dev->xdpmode, dev->use_need_wakeup);
if (OVS_UNLIKELY(ret)) {
VLOG_WARN_RL(&rl, "%s: error sending AF_XDP packet: %s.",
netdev_get_name(netdev), ovs_strerror(ret));
@@ -974,6 +1055,7 @@ netdev_afxdp_construct(struct netdev *netdev)
dev->requested_n_rxq = NR_QUEUE;
dev->requested_xdpmode = XDP_COPY;
+ dev->requested_need_wakeup = true;
dev->xsks = NULL;
dev->tx_locks = NULL;
diff --git a/lib/netdev-linux-private.h b/lib/netdev-linux-private.h
index a350be151147..c14f2fb81bb0 100644
--- a/lib/netdev-linux-private.h
+++ b/lib/netdev-linux-private.h
@@ -102,6 +102,8 @@ struct netdev_linux {
int requested_n_rxq;
int xdpmode; /* AF_XDP running mode: driver or skb. */
int requested_xdpmode;
+ bool use_need_wakeup;
+ bool requested_need_wakeup;
struct ovs_spin *tx_locks; /* spin lock array for TX queues. */
#endif
};
diff --git a/vswitchd/vswitch.xml b/vswitchd/vswitch.xml
index 01304a5ed2c2..24d061891956 100644
--- a/vswitchd/vswitch.xml
+++ b/vswitchd/vswitch.xml
@@ -3122,6 +3122,18 @@ ovs-vsctl add-port br0 p0 -- set Interface p0 type=patch options:peer=p1 \
+
+
+ Specifies whether to use need_wakeup feature in afxdp netdev.
+ If enabled, OVS explicitly wakes up the kernel RX, using poll()
+ syscall and wakes up TX, using sendto() syscall. For physical
+ devices, this feature improves the performance by avoiding
+ unnecessary sendto syscalls.
+ Defaults is true.
+
+
+