Re: [PATCH 2/2] virtio-net: dynamic network offloads configuration

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On Wed, Mar 27, 2013 at 8:11 PM, Michael S. Tsirkin <mst@xxxxxxxxxx> wrote:
On Wed, Mar 27, 2013 at 07:48:18PM +0200, Dmitry Fleytman wrote:
> Michael, thanks for review.
> See my comments inline.
>
> On Wed, Mar 27, 2013 at 5:26 PM, Michael S. Tsirkin <mst@xxxxxxxxxx> wrote:
>
>     On Wed, Mar 27, 2013 at 03:43:18PM +0200, Dmitry Fleytman wrote:
>     > From: Dmitry Fleytman <dfleytma@xxxxxxxxxx>
>     >
>     > Virtio-net driver currently negotiates network offloads
>     > on startup via features mechanism and have no ability to
>     > change offloads state later.
>     > This patch introduced a new control command that allows
>     > to configure device network offloads state dynamically.
>     > The patch also introduces a new feature flag
>     > VIRTIO_NET_F_CTRL_OFFLD.
>     >
>     > Signed-off-by: Dmitry Fleytman <dfleytma@xxxxxxxxxx>
>     > ---
>     >  hw/virtio-net.c | 110
>     +++++++++++++++++++++++++++++++++++++++++++++++---------
>     >  hw/virtio-net.h |  19 ++++++++++
>     >  2 files changed, 113 insertions(+), 16 deletions(-)
>     >
>     > diff --git a/hw/virtio-net.c b/hw/virtio-net.c
>     > index 4bb49eb..0c23126 100644
>     > --- a/hw/virtio-net.c
>     > +++ b/hw/virtio-net.c
>     > @@ -21,7 +21,7 @@
>     >  #include "hw/virtio-net.h"
>     >  #include "hw/vhost_net.h"
>     >
>     > -#define VIRTIO_NET_VM_VERSION    11
>     > +#define VIRTIO_NET_VM_VERSION    12
>
>     This will break cross-version migration, we do it differently now:
>     - disable feature with old machine types
>
>     - only pass offloads around if feature set
>
>     - same for receive side
>
>
>
> [DF] Not sure I got your idea.
> [DF] Current logic aimed ensure proper operation in all old <--> new migration
> cases:

AFAIK if you change VIRTIO_NET_VM_VERSION old host willl fail to parse
it.

Oh, it could be I missed this. I'll double-check.


 
> [DF] In case of old<-->new migration host doesn't expose 
> VIRTIO_NET_F_CTRL_OFFLD

> [DF] offload feature so guest is unable to use it, after migration to a newer
> host nothing changes.
> [DF] In case of new<-->old migration all offloads negotiated on startup via
> features will be enabled (old logic)
> [DF] and guest will be unable to change offloads state via control channel
> anymore.
> [DF] The second case is a little bit problematic because some offloads that
> were originally disabled
> [DF] may become enabled after migration but it doesn't look like there is a
> better solution.
> [DF] Do I miss something?
>  
>
>     >
>     >  #define MAC_TABLE_ENTRIES    64
>     >  #define MAX_VLAN    (1 << 12)   /* Per 802.1Q definition */
>     > @@ -360,6 +360,48 @@ static uint32_t virtio_net_bad_features(VirtIODevice
>     *vdev)
>     >      return features;
>     >  }
>     >
>     > +static void virtio_net_apply_offloads(VirtIONet *n)
>     > +{
>     > +    tap_set_offload(qemu_get_subqueue(n->nic, 0)->peer,
>     > +                    !!(n->curr_offloads &
>     VIRTIO_NET_OFFLOAD_GUEST_CSUM),
>     > +                    !!(n->curr_offloads &
>     VIRTIO_NET_OFFLOAD_GUEST_TSO4),
>     > +                    !!(n->curr_offloads &
>     VIRTIO_NET_OFFLOAD_GUEST_TSO6),
>     > +                    !!(n->curr_offloads & VIRTIO_NET_OFFLOAD_GUEST_ECN),
>     > +                    !!(n->curr_offloads &
>     VIRTIO_NET_OFFLOAD_GUEST_UFO));
>     > +}
>     > +
>     > +static uint32_t virtio_net_offloads_by_features(uint32_t features)
>     > +{
>     > +    uint32_t offloads = 0;
>     > +
>     > +    if ((1 << VIRTIO_NET_F_GUEST_CSUM) & features) {
>     > +        offloads |= VIRTIO_NET_OFFLOAD_GUEST_CSUM;
>     > +    }
>     > +
>     > +    if ((1 << VIRTIO_NET_F_GUEST_TSO4) & features) {
>     > +        offloads |= VIRTIO_NET_OFFLOAD_GUEST_TSO4;
>     > +    }
>     > +
>     > +    if ((1 << VIRTIO_NET_F_GUEST_TSO6) & features) {
>     > +        offloads |= VIRTIO_NET_OFFLOAD_GUEST_TSO6;
>     > +    }
>     > +
>     > +    if ((1 << VIRTIO_NET_F_GUEST_ECN) & features) {
>     > +        offloads |= VIRTIO_NET_OFFLOAD_GUEST_ECN;
>     > +    }
>     > +
>     > +    if ((1 << VIRTIO_NET_F_GUEST_UFO) & features) {
>     > +        offloads |= VIRTIO_NET_OFFLOAD_GUEST_UFO;
>     > +    }
>     > +
>     > +    return offloads;
>     > +}
>     > +
>     > +static inline uint32_t virtio_net_supported_offloads(VirtIONet *n)
>     > +{
>     > +    return virtio_net_offloads_by_features(n->vdev.guest_features);
>     > +}
>     > +
>     >  static void virtio_net_set_features(VirtIODevice *vdev, uint32_t
>     features)
>     >  {
>     >      VirtIONet *n = to_virtio_net(vdev);
>     > @@ -371,12 +413,8 @@ static void virtio_net_set_features(VirtIODevice
>     *vdev, uint32_t features)
>     >      virtio_net_set_mrg_rx_bufs(n, !!(features & (1 <<
>     VIRTIO_NET_F_MRG_RXBUF)));
>     >
>     >      if (n->has_vnet_hdr) {
>     > -        tap_set_offload(qemu_get_subqueue(n->nic, 0)->peer,
>     > -                        (features >> VIRTIO_NET_F_GUEST_CSUM) & 1,
>     > -                        (features >> VIRTIO_NET_F_GUEST_TSO4) & 1,
>     > -                        (features >> VIRTIO_NET_F_GUEST_TSO6) & 1,
>     > -                        (features >> VIRTIO_NET_F_GUEST_ECN)  & 1,
>     > -                        (features >> VIRTIO_NET_F_GUEST_UFO)  & 1);
>     > +        n->curr_offloads = virtio_net_offloads_by_features(features);
>     > +        virtio_net_apply_offloads(n);
>     >      }
>     >
>     >      for (i = 0;  i < n->max_queues; i++) {
>     > @@ -422,6 +460,42 @@ static int virtio_net_handle_rx_mode(VirtIONet *n,
>     uint8_t cmd,
>     >      return VIRTIO_NET_OK;
>     >  }
>     >
>     > +static int virtio_net_handle_offloads(VirtIONet *n, uint8_t cmd,
>     > +                                     struct iovec *iov, unsigned int
>     iov_cnt)
>     > +{
>     > +    uint32_t offloads;
>     > +    size_t s;
>     > +
>     > +    if (!((1 << VIRTIO_NET_F_CTRL_OFFLD) & n->vdev.guest_features)) {
>     > +        return VIRTIO_NET_ERR;
>     > +    }
>     > +
>     > +    s = iov_to_buf(iov, iov_cnt, 0, &offloads, sizeof(offloads));
>     > +    if (s != sizeof(offloads)) {
>     > +        return VIRTIO_NET_ERR;
>     > +    }
>     > +
>     > +    if (cmd == VIRTIO_NET_CTRL_OFFLOADS_SET) {
>     > +        uint32_t supported_offloads;
>     > +
>     > +        if (!n->has_vnet_hdr) {
>     > +            return VIRTIO_NET_ERR;
>     > +        }
>     > +
>     > +        supported_offloads = virtio_net_supported_offloads(n);
>     > +        if (offloads & ~supported_offloads) {
>     > +            return VIRTIO_NET_ERR;
>     > +        }
>     > +
>     > +        n->curr_offloads = offloads;
>     > +        virtio_net_apply_offloads(n);
>
>     In the spec you said that only features
>     available in the offloads can be
>     enabled. Probably a good idea to validate
>     and error if that's not the case.
>
>
> [DF] Not sure I understood correctly this part,
> [DF] Isn't following check enough to ensure this:
> [DF] > +        supported_offloads = virtio_net_supported_offloads(n);
> [DF] > +        if (offloads & ~supported_offloads) {
> [DF] > +            return VIRTIO_NET_ERR;
>
>
>
>     > +
>     > +        return VIRTIO_NET_OK;
>     > +    } else {
>     > +        return VIRTIO_NET_ERR;
>     > +    }
>     > +}
>     > +
>     >  static int virtio_net_handle_mac(VirtIONet *n, uint8_t cmd,
>     >                                   struct iovec *iov, unsigned int
>     iov_cnt)
>     >  {
>     > @@ -590,6 +664,8 @@ static void virtio_net_handle_ctrl(VirtIODevice
>     *vdev, VirtQueue *vq)
>     >              status = virtio_net_handle_vlan_table(n, ctrl.cmd, iov,
>     iov_cnt);
>     >          } else if (ctrl.class == VIRTIO_NET_CTRL_MQ) {
>     >              status = virtio_net_handle_mq(n, ctrl.cmd, &elem);
>     > +        } else if (ctrl.class == VIRTIO_NET_CTRL_OFFLOADS) {
>     > +            status = virtio_net_handle_offloads(n, ctrl.cmd, iov,
>     iov_cnt);
>     >          }
>     >
>     >          s = iov_from_buf(elem.in_sg, elem.in_num, 0, &status, sizeof
>     (status));
>     > @@ -1099,6 +1175,7 @@ static void virtio_net_save(QEMUFile *f, void
>     *opaque)
>     >              qemu_put_be32(f, n->vqs[i].tx_waiting);
>     >          }
>     >      }
>     > +    qemu_put_be32(f, n->curr_offloads);
>
>     >  }
>     >
>     >  static int virtio_net_load(QEMUFile *f, void *opaque, int version_id)
>     > @@ -1155,15 +1232,6 @@ static int virtio_net_load(QEMUFile *f, void
>     *opaque, int version_id)
>     >              error_report("virtio-net: saved image requires vnet_hdr=
>     on");
>     >              return -1;
>     >          }
>     > -
>     > -        if (n->has_vnet_hdr) {
>     > -            tap_set_offload(qemu_get_queue(n->nic)->peer,
>     > -                    (n->vdev.guest_features >> VIRTIO_NET_F_GUEST_CSUM)
>     & 1,
>     > -                    (n->vdev.guest_features >> VIRTIO_NET_F_GUEST_TSO4)
>     & 1,
>     > -                    (n->vdev.guest_features >> VIRTIO_NET_F_GUEST_TSO6)
>     & 1,
>     > -                    (n->vdev.guest_features >> VIRTIO_NET_F_GUEST_ECN)  
>     & 1,
>     > -                    (n->vdev.guest_features >> VIRTIO_NET_F_GUEST_UFO)  
>     & 1);
>     > -        }
>     >      }
>     >
>     >      if (version_id >= 9) {
>     > @@ -1197,6 +1265,16 @@ static int virtio_net_load(QEMUFile *f, void
>     *opaque, int version_id)
>     >          }
>     >      }
>     >
>     > +    if (version_id >= 11) {
>     > +        n->curr_offloads = qemu_get_be32(f);
>     > +    } else {
>     > +        n->curr_offloads = virtio_net_supported_offloads(n);
>     > +    }
>     > +
>     > +    if (n->has_vnet_hdr) {
>     > +        virtio_net_apply_offloads(n);
>     > +    }
>     > +
>     >      virtio_net_set_queues(n);
>     >
>     >      /* Find the first multicast entry in the saved MAC filter */
>     > diff --git a/hw/virtio-net.h b/hw/virtio-net.h
>     > index 4d1a8cd..649a4e8 100644
>     > --- a/hw/virtio-net.h
>     > +++ b/hw/virtio-net.h
>     > @@ -27,6 +27,8 @@
>     >  /* The feature bitmap for virtio net */
>     >  #define VIRTIO_NET_F_CSUM       0       /* Host handles pkts w/ partial
>     csum */
>     >  #define VIRTIO_NET_F_GUEST_CSUM 1       /* Guest handles pkts w/ partial
>     csum */
>     > +#define VIRTIO_NET_F_CTRL_OFFLD 2       /* Control channel offload
>     > +                                         * configuration support */
>     >  #define VIRTIO_NET_F_MAC        5       /* Host has given MAC address. *
>     /
>     >  #define VIRTIO_NET_F_GSO        6       /* Host handles pkts w/ any GSO
>     type */
>     >  #define VIRTIO_NET_F_GUEST_TSO4 7       /* Guest can handle TSOv4 in. */
>     > @@ -182,6 +184,7 @@ typedef struct VirtIONet {
>     >      uint16_t max_queues;
>     >      uint16_t curr_queues;
>     >      size_t config_size;
>     > +    uint32_t curr_offloads;
>     >  } VirtIONet;
>     >
>     >  #define VIRTIO_NET_CTRL_MAC    1
>     > @@ -221,6 +224,21 @@ struct virtio_net_ctrl_mq {
>     >   #define VIRTIO_NET_CTRL_MQ_VQ_PAIRS_MIN        1
>     >   #define VIRTIO_NET_CTRL_MQ_VQ_PAIRS_MAX        0x8000
>     >
>     > +/*
>     > + * Control network offloads
>     > + *
>     > + * Dynamic offloads are available with the
>     > + * VIRTIO_NET_F_CTRL_OFFLD feature bit.
>     > + */
>     > +#define VIRTIO_NET_CTRL_OFFLOADS   5
>     > + #define VIRTIO_NET_CTRL_OFFLOADS_SET        0
>     > +
>     > +#define VIRTIO_NET_OFFLOAD_GUEST_CSUM       1
>     > +#define VIRTIO_NET_OFFLOAD_GUEST_TSO4       2
>     > +#define VIRTIO_NET_OFFLOAD_GUEST_TSO6       4
>     > +#define VIRTIO_NET_OFFLOAD_GUEST_ECN        8
>     > +#define VIRTIO_NET_OFFLOAD_GUEST_UFO       16
>     > +
>     >  #define DEFINE_VIRTIO_NET_FEATURES(_state, _field) \
>     >          DEFINE_VIRTIO_COMMON_FEATURES(_state, _field), \
>     >          DEFINE_PROP_BIT("csum", _state, _field, VIRTIO_NET_F_CSUM,
>     true), \
>     > @@ -241,6 +259,7 @@ struct virtio_net_ctrl_mq {
>     >          DEFINE_PROP_BIT("ctrl_vlan", _state, _field,
>     VIRTIO_NET_F_CTRL_VLAN, true), \
>     >          DEFINE_PROP_BIT("ctrl_rx_extra", _state, _field,
>     VIRTIO_NET_F_CTRL_RX_EXTRA, true), \
>     >          DEFINE_PROP_BIT("ctrl_mac_addr", _state, _field,
>     VIRTIO_NET_F_CTRL_MAC_ADDR, true), \
>     > +        DEFINE_PROP_BIT("ctrl_offload", _state, _field,
>     VIRTIO_NET_F_CTRL_OFFLD, true), \
>     >          DEFINE_PROP_BIT("mq", _state, _field, VIRTIO_NET_F_MQ, false)
>     >
>     >  #endif
>     > --
>     > 1.8.1.4
>
>

_______________________________________________
Virtualization mailing list
Virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx
https://lists.linuxfoundation.org/mailman/listinfo/virtualization

[Index of Archives]     [KVM Development]     [Libvirt Development]     [Libvirt Users]     [CentOS Virtualization]     [Netdev]     [Ethernet Bridging]     [Linux Wireless]     [Kernel Newbies]     [Security]     [Linux for Hams]     [Netfilter]     [Bugtraq]     [Yosemite Forum]     [MIPS Linux]     [ARM Linux]     [Linux RAID]     [Linux Admin]     [Samba]

  Powered by Linux