Received: by 10.192.165.148 with SMTP id m20csp904966imm; Wed, 25 Apr 2018 09:23:54 -0700 (PDT) X-Google-Smtp-Source: AIpwx48GhdRYXMKI2T8mEONxJ+DKaCmvL8oRqnyzpf0j3H6GECxeVcBY6Gh81pRkFlE7vrJhh5F8 X-Received: by 10.101.76.77 with SMTP id l13mr16907242pgr.46.1524673434308; Wed, 25 Apr 2018 09:23:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524673434; cv=none; d=google.com; s=arc-20160816; b=tE48CJmThI6Xb+jo6LsxbXn2YDsTM/Z01I8r6kEMghO2vVcMEIMxkwNivuLMyct5vn 4QV/vsz4eGWczjhvzgskYv/rxmmcz3McqQ4rU6d9Ps++BU7J1CpbgIHJ6ytDyXaGglqa HNvgDj7CYwOuqpS/P32iKfWGBqh/Ui74OLkc+CWSfx446hlwAL2e2XL+dG5/ifYX7IIF qiGDvY6P5MX1N4rj+0LhgK8XFPNYYm21FjJCU3jJLfdDM54rYL0kxx4Tr1qIwccDYLmQ ZNEBeVl2Qpxa3q5blhqoC721OhOGJpjsddTAEGRJJh7wnoI+wG/z0zsZ+rFG9JBxXWAZ LdvA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dmarc-filter :arc-authentication-results; bh=oh5lCYZaFUbHwWZEPFHbcVQItonRsvmSAOSVlDhT4Hg=; b=gHddWkEFbvPVrknBiiGaJqhMK/J0GcBaahHax/m7sus+AuIMzaR73fQBRLx0mE33jB mTKoX6ZzfHH0hKPpai86hjYZJi/zmQDgdW6enUrmIiCGjZ8l5oEuoh9hIo8Qy6i1ZwPi eyu9YyPELP3ETuwy1MXzBhKan8Ih41Vr3XYaOejcZh4oyvvQYm44yKPxa+yVURKwb3xS Dn4OcpAKqho9uUUzxpMecDpMIZdF45z2ctpsGgYrs5by7AFZExZ8vJvgWZHlb71TKgWO nffwuIr0BjFiqvruF++lI7eZkep3uXbMJz2mDSIBQxYHJvOc94R0Ikyhgf6UXqdjg3WQ fpuA== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b10-v6si14921118plb.177.2018.04.25.09.23.39; Wed, 25 Apr 2018 09:23:54 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1755993AbeDYQWh (ORCPT + 99 others); Wed, 25 Apr 2018 12:22:37 -0400 Received: from mail.kernel.org ([198.145.29.99]:50932 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755413AbeDYQWY (ORCPT ); Wed, 25 Apr 2018 12:22:24 -0400 Received: from mail-wr0-f181.google.com (mail-wr0-f181.google.com [209.85.128.181]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (No client certificate requested) by mail.kernel.org (Postfix) with ESMTPSA id 4CE9021835 for ; Wed, 25 Apr 2018 16:22:23 +0000 (UTC) DMARC-Filter: OpenDMARC Filter v1.3.2 mail.kernel.org 4CE9021835 Authentication-Results: mail.kernel.org; dmarc=none (p=none dis=none) header.from=kernel.org Authentication-Results: mail.kernel.org; spf=none smtp.mailfrom=luto@kernel.org Received: by mail-wr0-f181.google.com with SMTP id o4-v6so3641022wrm.0 for ; Wed, 25 Apr 2018 09:22:23 -0700 (PDT) X-Gm-Message-State: ALQs6tD+xC3VyNhYgxJmqkWt6aSAaQc1fBvQNJYoa5RJxurWgcxz5who aFPBJchIbSESL5XiGi9Yps9/vnFIRq+a8bOcb1w9Yw== X-Received: by 2002:adf:88a3:: with SMTP id f32-v6mr23509549wrf.199.1524673341749; Wed, 25 Apr 2018 09:22:21 -0700 (PDT) MIME-Version: 1.0 Received: by 10.28.247.15 with HTTP; Wed, 25 Apr 2018 09:22:01 -0700 (PDT) In-Reply-To: <20180425160413.GC8546@bombadil.infradead.org> References: <20180425052722.73022-1-edumazet@google.com> <20180425052722.73022-2-edumazet@google.com> <20180425062859.GA23914@infradead.org> <5cd31eba-63b5-9160-0a2e-f441340df0d3@gmail.com> <20180425160413.GC8546@bombadil.infradead.org> From: Andy Lutomirski Date: Wed, 25 Apr 2018 09:22:01 -0700 X-Gmail-Original-Message-ID: Message-ID: Subject: Re: [PATCH net-next 1/2] tcp: add TCP_ZEROCOPY_RECEIVE support for zerocopy receive To: Matthew Wilcox Cc: Eric Dumazet , Christoph Hellwig , Eric Dumazet , "David S . Miller" , netdev , Andy Lutomirski , linux-kernel , linux-mm , Soheil Hassas Yeganeh Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Wed, Apr 25, 2018 at 9:04 AM, Matthew Wilcox wrote: > On Wed, Apr 25, 2018 at 06:01:02AM -0700, Eric Dumazet wrote: >> On 04/24/2018 11:28 PM, Christoph Hellwig wrote: >> > On Tue, Apr 24, 2018 at 10:27:21PM -0700, Eric Dumazet wrote: >> >> When adding tcp mmap() implementation, I forgot that socket lock >> >> had to be taken before current->mm->mmap_sem. syzbot eventually caught >> >> the bug. >> >> >> >> Since we can not lock the socket in tcp mmap() handler we have to >> >> split the operation in two phases. >> >> >> >> 1) mmap() on a tcp socket simply reserves VMA space, and nothing else. >> >> This operation does not involve any TCP locking. >> >> >> >> 2) setsockopt(fd, IPPROTO_TCP, TCP_ZEROCOPY_RECEIVE, ...) implements >> >> the transfert of pages from skbs to one VMA. >> >> This operation only uses down_read(¤t->mm->mmap_sem) after >> >> holding TCP lock, thus solving the lockdep issue. >> >> >> >> This new implementation was suggested by Andy Lutomirski with great details. >> > >> > Thanks, this looks much more sensible to me. >> > >> >> Thanks Christoph >> >> Note the high cost of zap_page_range(), needed to avoid -EBUSY being returned >> from vm_insert_page() the second time TCP_ZEROCOPY_RECEIVE is used on one VMA. >> >> Ideally a vm_replace_page() would avoid this cost ? > > If you don't zap the page range, any of the CPUs in the system where > any thread in this task have ever run may have a TLB entry pointing to > this page ... if the page is being recycled into the page allocator, > then that page might end up as a slab page or page table or page cache > while the other CPU still have access to it. Indeed. This is one of the reasons that Linus has generally been quite vocal that he doesn't like MMU-based zerocopy schemes. > > You could hang onto the page until you've built up a sufficiently large > batch, then bulk-invalidate all of the TLB entries, but we start to get > into weirdnesses on different CPU architectures. The existing mmu_gather code should already handle this at least moderately well. If it's not, then it should be fixed. On x86, there is no operation to flush a range of addresses. You can flush one address or you can flush all of them. If you flush one page at a time, then you might never recover the performance of a plain old memcpy(). If you flush all of them, then you're hurting the performance of everything else in the task. In general, I suspect that the zerocopy receive mechanism will only really be a win in single-threaded applications that consume large amounts of receive bandwidth on a single TCP socket using lots of memory and don't do all that much else.