From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 8EE1EC77B7F for ; Wed, 26 Apr 2023 13:08:12 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id B06C96B00CD; Wed, 26 Apr 2023 09:08:11 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id AB6306B00CE; Wed, 26 Apr 2023 09:08:11 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 9A4CB6B00CF; Wed, 26 Apr 2023 09:08:11 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0013.hostedemail.com [216.40.44.13]) by kanga.kvack.org (Postfix) with ESMTP id 8B9276B00CD for ; Wed, 26 Apr 2023 09:08:11 -0400 (EDT) Received: from smtpin25.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay05.hostedemail.com (Postfix) with ESMTP id 3F7AE402CB for ; Wed, 26 Apr 2023 13:08:11 +0000 (UTC) X-FDA: 80723570382.25.CAEE4BD Received: from out30-124.freemail.mail.aliyun.com (out30-124.freemail.mail.aliyun.com [115.124.30.124]) by imf14.hostedemail.com (Postfix) with ESMTP id 0AA25100008 for ; Wed, 26 Apr 2023 13:08:07 +0000 (UTC) Authentication-Results: imf14.hostedemail.com; dkim=none; dmarc=pass (policy=none) header.from=alibaba.com; spf=pass (imf14.hostedemail.com: domain of alibuda@linux.alibaba.com designates 115.124.30.124 as permitted sender) smtp.mailfrom=alibuda@linux.alibaba.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1682514489; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=AXi7+l5xLn8/Af1B/TIH6cHfh2FUGUUoNalfUcox3ks=; b=L2PpYJLJ/8E6mmAHn+iPZPZJkBsLhFrsv3WhB83HTunlNNgnowq3GLJ8IGObscJnVopa9i RtFuSxk9osIpXGEefBod3UCTJGHygMAJisXLjoZAPTP92HbS/LOWuCjvf1vlY/scJ8s4nh terYUXj7AUR7yn33u3wIHCI3zSkSSd8= ARC-Authentication-Results: i=1; imf14.hostedemail.com; dkim=none; dmarc=pass (policy=none) header.from=alibaba.com; spf=pass (imf14.hostedemail.com: domain of alibuda@linux.alibaba.com designates 115.124.30.124 as permitted sender) smtp.mailfrom=alibuda@linux.alibaba.com ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1682514489; a=rsa-sha256; cv=none; b=jxj00t4kTBUFgtVibYa4ETiYl8UYmFIRmaxlbUlmsbcnfqBTWZF555oK9E7RwJaRQyhDt1 6d0dR4t5quvnTlvsnUVfgzMjS8W7nmAykHYnaBvoO51aiVhrR1aws+xPlfNhuf2IW7MD1Z 2Ayvcn7x3IYjl9q+eiF63lUb8CesF4U= X-Alimail-AntiSpam:AC=PASS;BC=-1|-1;BR=01201311R461e4;CH=green;DM=||false|;DS=||;FP=0|-1|-1|-1|0|-1|-1|-1;HT=ay29a033018045168;MF=alibuda@linux.alibaba.com;NM=1;PH=DS;RN=21;SR=0;TI=SMTPD_---0Vh3QWc2_1682514478; Received: from 30.221.144.140(mailfrom:alibuda@linux.alibaba.com fp:SMTPD_---0Vh3QWc2_1682514478) by smtp.aliyun-inc.com; Wed, 26 Apr 2023 21:08:00 +0800 Message-ID: <4253f27c-2c5e-3033-14b3-6e31ee344e8b@linux.alibaba.com> Date: Wed, 26 Apr 2023 21:07:58 +0800 MIME-Version: 1.0 User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10.15; rv:102.0) Gecko/20100101 Thunderbird/102.10.0 Subject: Re: [PATCH v3 51/55] smc: Drop smc_sendpage() in favour of smc_sendmsg() + MSG_SPLICE_PAGES Content-Language: en-US To: David Howells , Matthew Wilcox , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni Cc: Al Viro , Christoph Hellwig , Jens Axboe , Jeff Layton , Christian Brauner , Chuck Lever III , Linus Torvalds , netdev@vger.kernel.org, linux-fsdevel@vger.kernel.org, linux-kernel@vger.kernel.org, linux-mm@kvack.org, Karsten Graul , Wenjia Zhang , Jan Karcher , linux-s390@vger.kernel.org References: <20230331160914.1608208-1-dhowells@redhat.com> <20230331160914.1608208-52-dhowells@redhat.com> From: "D. Wythe" In-Reply-To: <20230331160914.1608208-52-dhowells@redhat.com> Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Rspamd-Server: rspam05 X-Rspamd-Queue-Id: 0AA25100008 X-Stat-Signature: aszipabkdqd6wd8noq8ih1dk75x8ojoe X-Rspam-User: X-HE-Tag: 1682514487-443593 X-HE-Meta: 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 2aTynIbP zOmZvKqctf36HDNKSTdYaYIS7JEDH8MmC10C09TYxUkUW5n8O53CGFTsy788459c/g9CB3y+7HMijLGxYEScg20Mag0VT4mKj4jpI6761E9iz6v/zTUkcpbyFZc9K0aCAbuNpeJmNmJYQRSREnNxnuNXmBBFuq0Fn83pHV4/ZFymVHp5aeZZlcxoK+gmgLYio7T10YTC3ccBBfB/prm9I+oIrl8Afgs8rP72RUErsvOZrwMta1+7C4H/ke/LfWKkI3yYJ9LDpEbgniJZKcLm7SsHvA7aDLL3fDoAWOqaWlFBs0Z5HA2niZ6ltDS1Ggb8Zlh4IKbeRxRTEanE/eHoE2IKclhxL+cu39DQlsqWpwLDO9XZ+JGEXVoEQcxg+RW0QrhEA X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Hi David, Fallback is one of the most important features of SMC, which automatically downgrades to TCP when SMC discovers that the peer does not support SMC. After fallback, SMC hopes the the ability can be consistent with that of TCP sock. If you delete the smc_sendpage, when fallback occurs, it means that the sock after the fallback loses the ability of  sendpage( tcp_sendpage). Thanks D. Wythe On 4/1/23 12:09 AM, David Howells wrote: > Drop the smc_sendpage() code as smc_sendmsg() just passes the call down to > the underlying TCP socket and smc_tx_sendpage() is just a wrapper around > its sendmsg implementation. > > Signed-off-by: David Howells > cc: Karsten Graul > cc: Wenjia Zhang > cc: Jan Karcher > cc: "David S. Miller" > cc: Eric Dumazet > cc: Jakub Kicinski > cc: Paolo Abeni > cc: Jens Axboe > cc: Matthew Wilcox > cc: linux-s390@vger.kernel.org > cc: netdev@vger.kernel.org > --- > net/smc/af_smc.c | 29 ----------------------------- > net/smc/smc_stats.c | 2 +- > net/smc/smc_stats.h | 1 - > net/smc/smc_tx.c | 16 ---------------- > net/smc/smc_tx.h | 2 -- > 5 files changed, 1 insertion(+), 49 deletions(-) > > diff --git a/net/smc/af_smc.c b/net/smc/af_smc.c > index a4cccdfdc00a..d4113c8a7cda 100644 > --- a/net/smc/af_smc.c > +++ b/net/smc/af_smc.c > @@ -3125,34 +3125,6 @@ static int smc_ioctl(struct socket *sock, unsigned int cmd, > return put_user(answ, (int __user *)arg); > } > > -static ssize_t smc_sendpage(struct socket *sock, struct page *page, > - int offset, size_t size, int flags) > -{ > - struct sock *sk = sock->sk; > - struct smc_sock *smc; > - int rc = -EPIPE; > - > - smc = smc_sk(sk); > - lock_sock(sk); > - if (sk->sk_state != SMC_ACTIVE) { > - release_sock(sk); > - goto out; > - } > - release_sock(sk); > - if (smc->use_fallback) { > - rc = kernel_sendpage(smc->clcsock, page, offset, > - size, flags); > - } else { > - lock_sock(sk); > - rc = smc_tx_sendpage(smc, page, offset, size, flags); > - release_sock(sk); > - SMC_STAT_INC(smc, sendpage_cnt); > - } > - > -out: > - return rc; > -} > - > /* Map the affected portions of the rmbe into an spd, note the number of bytes > * to splice in conn->splice_pending, and press 'go'. Delays consumer cursor > * updates till whenever a respective page has been fully processed. > @@ -3224,7 +3196,6 @@ static const struct proto_ops smc_sock_ops = { > .sendmsg = smc_sendmsg, > .recvmsg = smc_recvmsg, > .mmap = sock_no_mmap, > - .sendpage = smc_sendpage, > .splice_read = smc_splice_read, > }; > > diff --git a/net/smc/smc_stats.c b/net/smc/smc_stats.c > index e80e34f7ac15..ca14c0f3a07d 100644 > --- a/net/smc/smc_stats.c > +++ b/net/smc/smc_stats.c > @@ -227,7 +227,7 @@ static int smc_nl_fill_stats_tech_data(struct sk_buff *skb, > SMC_NLA_STATS_PAD)) > goto errattr; > if (nla_put_u64_64bit(skb, SMC_NLA_STATS_T_SENDPAGE_CNT, > - smc_tech->sendpage_cnt, > + 0, > SMC_NLA_STATS_PAD)) > goto errattr; > if (nla_put_u64_64bit(skb, SMC_NLA_STATS_T_CORK_CNT, > diff --git a/net/smc/smc_stats.h b/net/smc/smc_stats.h > index 84b7ecd8c05c..b60fe1eb37ab 100644 > --- a/net/smc/smc_stats.h > +++ b/net/smc/smc_stats.h > @@ -71,7 +71,6 @@ struct smc_stats_tech { > u64 clnt_v2_succ_cnt; > u64 srv_v1_succ_cnt; > u64 srv_v2_succ_cnt; > - u64 sendpage_cnt; > u64 urg_data_cnt; > u64 splice_cnt; > u64 cork_cnt; > diff --git a/net/smc/smc_tx.c b/net/smc/smc_tx.c > index f4b6a71ac488..d31ce8209fa2 100644 > --- a/net/smc/smc_tx.c > +++ b/net/smc/smc_tx.c > @@ -298,22 +298,6 @@ int smc_tx_sendmsg(struct smc_sock *smc, struct msghdr *msg, size_t len) > return rc; > } > > -int smc_tx_sendpage(struct smc_sock *smc, struct page *page, int offset, > - size_t size, int flags) > -{ > - struct msghdr msg = {.msg_flags = flags}; > - char *kaddr = kmap(page); > - struct kvec iov; > - int rc; > - > - iov.iov_base = kaddr + offset; > - iov.iov_len = size; > - iov_iter_kvec(&msg.msg_iter, ITER_SOURCE, &iov, 1, size); > - rc = smc_tx_sendmsg(smc, &msg, size); > - kunmap(page); > - return rc; > -} > - > /***************************** sndbuf consumer *******************************/ > > /* sndbuf consumer: actual data transfer of one target chunk with ISM write */ > diff --git a/net/smc/smc_tx.h b/net/smc/smc_tx.h > index 34b578498b1f..a59f370b8b43 100644 > --- a/net/smc/smc_tx.h > +++ b/net/smc/smc_tx.h > @@ -31,8 +31,6 @@ void smc_tx_pending(struct smc_connection *conn); > void smc_tx_work(struct work_struct *work); > void smc_tx_init(struct smc_sock *smc); > int smc_tx_sendmsg(struct smc_sock *smc, struct msghdr *msg, size_t len); > -int smc_tx_sendpage(struct smc_sock *smc, struct page *page, int offset, > - size_t size, int flags); > int smc_tx_sndbuf_nonempty(struct smc_connection *conn); > void smc_tx_sndbuf_nonfull(struct smc_sock *smc); > void smc_tx_consumer_update(struct smc_connection *conn, bool force);