Received: by 10.192.165.148 with SMTP id m20csp2240561imm; Thu, 26 Apr 2018 07:59:40 -0700 (PDT) X-Google-Smtp-Source: AIpwx49c84JkrbnrTdDhxxSVFDkiMRfSUumaY8cElbOrlUPhI2eFkvP2+ysn1d+y3feFP74ZpGxc X-Received: by 2002:a17:902:3181:: with SMTP id x1-v6mr34551784plb.198.1524754780120; Thu, 26 Apr 2018 07:59:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1524754780; cv=none; d=google.com; s=arc-20160816; b=wn6kVrVAKqqYHtTYcVTCxJw5OGL244bSTYo4qb1ROyOoyXyleiJ2p8UTCTd+RQBMVk dX0HK4Kd0U0oB9MQl2fwLldJmUK+QLWO35AEGtQatLujYKWPItHmrhT6NV+YFj0RKbnU gF6QotZ0yQBIlt+jXxroAVgPBVIYQCGYQjP9Y2m482TD+gBbUCMMCv2kLItj0aLm5xTc TqVWy31xnjNBCoasC7d4YSsFmQDkULLvw22atxEFv5FovN9Y66clz1/IViyaR2NUffx3 DoABb6OARQNBTSwZRu2mRzFev10i28g2Cyv0hWaNdkhD3efOUUrByWtggeLDrCuJz1um uNWQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :references:in-reply-to:mime-version:dkim-signature :arc-authentication-results; bh=wEOd+FvQkRXmG/4NHu9nVWXdNs+LSytjWlJrmJn1Z/A=; b=AHYtalmN78s4PYDBgKMg1Mp795eppVkGbInsoBube7TfMrMvSVrDXkXGGTXdpOqXko MHFsUoHz9nyAp4PKHpoBdkWPKbslr0b8HkOXXcCSaR/kEBe+zAoZC2N6jw6CFpjWMJjG A9E2E2DwKQ25SjQ3GwVPwL6jRswYdO5Kpd8P0m5vw7QSIc/KEBEkWmcyl0A5HlXy7FGw YLlXN2FlUQmtvJVDkyAE+gW42MFOt/CrkXYQvKWuvLfnqGRgPelBR8kDy7PcHtkOZ7wG BmcSiiq2kFKaUpw0UvXYxTkCpDOpvj/8gFGvsngAMqnmWDjDO7JazTBsijfDrN16JC24 ZiOg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=BxK1q9S/; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id b66-v6si17989014plb.107.2018.04.26.07.59.26; Thu, 26 Apr 2018 07:59:40 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20161025 header.b=BxK1q9S/; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1756551AbeDZO6T (ORCPT + 99 others); Thu, 26 Apr 2018 10:58:19 -0400 Received: from mail-it0-f66.google.com ([209.85.214.66]:50228 "EHLO mail-it0-f66.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1755172AbeDZO6R (ORCPT ); Thu, 26 Apr 2018 10:58:17 -0400 Received: by mail-it0-f66.google.com with SMTP id p3-v6so24242530itc.0 for ; Thu, 26 Apr 2018 07:58:17 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20161025; h=mime-version:in-reply-to:references:from:date:message-id:subject:to :cc; bh=wEOd+FvQkRXmG/4NHu9nVWXdNs+LSytjWlJrmJn1Z/A=; b=BxK1q9S/wHYmBniuP1SJv0hGus6hsJL8NzT4fc6kxRWeG8EePSqxCScoSg14eQPC4K oFGD611ghuFRfkHZZnQJjbFdPuLIDsZmJcIFyaRygQ8Aab6x+FFF7UVZUvEpzoYIst4T GY4WcJQp2ax7NnnnoRofaXeORruE/8eiNbx2ZPP3b8l4bZeE/LZVLl7p6IiijDErm+XU oio7m8iFPGpyYqxyVWLSB8U4sBUX1JuOK0WDZgqE++umj7omMpFp6wkgP+g01iKdy/D7 TLB3bhgPQL/BMsP4EUbpp4dHAbYV5CEsNABRIg5EGqpZlP4cX+YGHhxT3Ks6p7pR7R3k cXrg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:in-reply-to:references:from:date :message-id:subject:to:cc; bh=wEOd+FvQkRXmG/4NHu9nVWXdNs+LSytjWlJrmJn1Z/A=; b=pM9Yx/lrOCwdEK1NskjIWOh5Ko//7TJLXuui5D8aWH9PzLJ/n4G/1wXnTKbV2G1eBU +aopU4C2lvqhyYKa+8Tho6nZE8zI2fKabzhG/ysjwEvsU2ZHWu8MXw9ggpcx/mX589Rh Sr3yig3yJydn/VAfr5eMExWtzHYTJ72Qan6tYa+QOn4wxY8YDfG7/b+5zKmGyczY8wSG yOgnzdaNgOVNrjbRZ7/GMonkwjwYOjaAzCGS77k7QeWQasY9CCxCSoTGDIEhnKDROVfF r3Bb3dtQMJVV78WpborqyP6fBA+qW+JTNaciOGIrwvap6rFEskyD2Uwu75ENqDpdKWfz tusA== X-Gm-Message-State: ALQs6tC+o4vd/FIKdtpvKfapmN6bU8KAR5WlnuvCiVsBsgjq6A08aEX6 JCDDbBkeBFjf1TDUEwGiu6JguwY+VIeuuxwaApr66A== X-Received: by 2002:a24:df04:: with SMTP id r4-v6mr27610276itg.105.1524754696656; Thu, 26 Apr 2018 07:58:16 -0700 (PDT) MIME-Version: 1.0 Received: by 2002:a4f:8641:0:0:0:0:0 with HTTP; Thu, 26 Apr 2018 07:57:36 -0700 (PDT) In-Reply-To: <20180426145056.220325-3-edumazet@google.com> References: <20180426145056.220325-1-edumazet@google.com> <20180426145056.220325-3-edumazet@google.com> From: Soheil Hassas Yeganeh Date: Thu, 26 Apr 2018 10:57:36 -0400 Message-ID: Subject: Re: [PATCH v3 net-next 2/2] selftests: net: tcp_mmap must use TCP_ZEROCOPY_RECEIVE To: Eric Dumazet Cc: "David S . Miller" , netdev , Andy Lutomirski , linux-kernel , linux-mm , Ka-Cheong Poon , Eric Dumazet Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Thu, Apr 26, 2018 at 10:50 AM, Eric Dumazet wrote: > After prior kernel change, mmap() on TCP socket only reserves VMA. > > We have to use getsockopt(fd, IPPROTO_TCP, TCP_ZEROCOPY_RECEIVE, ...) > to perform the transfert of pages from skbs in TCP receive queue into such VMA. > > struct tcp_zerocopy_receive { > __u64 address; /* in: address of mapping */ > __u32 length; /* in/out: number of bytes to map/mapped */ > __u32 recv_skip_hint; /* out: amount of bytes to skip */ > }; > > After a successful getsockopt(...TCP_ZEROCOPY_RECEIVE...), @length contains > number of bytes that were mapped, and @recv_skip_hint contains number of bytes > that should be read using conventional read()/recv()/recvmsg() system calls, > to skip a sequence of bytes that can not be mapped, because not properly page > aligned. > > Signed-off-by: Eric Dumazet > Cc: Andy Lutomirski > Cc: Soheil Hassas Yeganeh Acked-by: Soheil Hassas Yeganeh Thank you, again! > --- > tools/testing/selftests/net/tcp_mmap.c | 64 +++++++++++++++----------- > 1 file changed, 37 insertions(+), 27 deletions(-) > > diff --git a/tools/testing/selftests/net/tcp_mmap.c b/tools/testing/selftests/net/tcp_mmap.c > index dea342fe6f4e88b5709d2ac37b2fc9a2a320bf44..77f762780199ff1f69f9f6b3f18e72deddb69f5e 100644 > --- a/tools/testing/selftests/net/tcp_mmap.c > +++ b/tools/testing/selftests/net/tcp_mmap.c > @@ -76,9 +76,10 @@ > #include > #include > #include > -#include > #include > #include > +#include > +#include > > #ifndef MSG_ZEROCOPY > #define MSG_ZEROCOPY 0x4000000 > @@ -134,11 +135,12 @@ void hash_zone(void *zone, unsigned int length) > void *child_thread(void *arg) > { > unsigned long total_mmap = 0, total = 0; > + struct tcp_zerocopy_receive zc; > unsigned long delta_usec; > int flags = MAP_SHARED; > struct timeval t0, t1; > char *buffer = NULL; > - void *oaddr = NULL; > + void *addr = NULL; > double throughput; > struct rusage ru; > int lu, fd; > @@ -153,41 +155,46 @@ void *child_thread(void *arg) > perror("malloc"); > goto error; > } > + if (zflg) { > + addr = mmap(NULL, chunk_size, PROT_READ, flags, fd, 0); > + if (addr == (void *)-1) > + zflg = 0; > + } > while (1) { > struct pollfd pfd = { .fd = fd, .events = POLLIN, }; > int sub; > > poll(&pfd, 1, 10000); > if (zflg) { > - void *naddr; > + socklen_t zc_len = sizeof(zc); > + int res; > > - naddr = mmap(oaddr, chunk_size, PROT_READ, flags, fd, 0); > - if (naddr == (void *)-1) { > - if (errno == EAGAIN) { > - /* That is if SO_RCVLOWAT is buggy */ > - usleep(1000); > - continue; > - } > - if (errno == EINVAL) { > - flags = MAP_SHARED; > - oaddr = NULL; > - goto fallback; > - } > - if (errno != EIO) > - perror("mmap()"); > + zc.address = (__u64)addr; > + zc.length = chunk_size; > + zc.recv_skip_hint = 0; > + res = getsockopt(fd, IPPROTO_TCP, TCP_ZEROCOPY_RECEIVE, > + &zc, &zc_len); > + if (res == -1) > break; > + > + if (zc.length) { > + assert(zc.length <= chunk_size); > + total_mmap += zc.length; > + if (xflg) > + hash_zone(addr, zc.length); > + total += zc.length; > } > - total_mmap += chunk_size; > - if (xflg) > - hash_zone(naddr, chunk_size); > - total += chunk_size; > - if (!keepflag) { > - flags |= MAP_FIXED; > - oaddr = naddr; > + if (zc.recv_skip_hint) { > + assert(zc.recv_skip_hint <= chunk_size); > + lu = read(fd, buffer, zc.recv_skip_hint); > + if (lu > 0) { > + if (xflg) > + hash_zone(buffer, lu); > + total += lu; > + } > } > continue; > } > -fallback: > sub = 0; > while (sub < chunk_size) { > lu = read(fd, buffer + sub, chunk_size - sub); > @@ -228,6 +235,8 @@ void *child_thread(void *arg) > error: > free(buffer); > close(fd); > + if (zflg) > + munmap(addr, chunk_size); > pthread_exit(0); > } > > @@ -371,7 +380,8 @@ int main(int argc, char *argv[]) > setup_sockaddr(cfg_family, host, &listenaddr); > > if (mss && > - setsockopt(fdlisten, SOL_TCP, TCP_MAXSEG, &mss, sizeof(mss)) == -1) { > + setsockopt(fdlisten, IPPROTO_TCP, TCP_MAXSEG, > + &mss, sizeof(mss)) == -1) { > perror("setsockopt TCP_MAXSEG"); > exit(1); > } > @@ -402,7 +412,7 @@ int main(int argc, char *argv[]) > setup_sockaddr(cfg_family, host, &addr); > > if (mss && > - setsockopt(fd, SOL_TCP, TCP_MAXSEG, &mss, sizeof(mss)) == -1) { > + setsockopt(fd, IPPROTO_TCP, TCP_MAXSEG, &mss, sizeof(mss)) == -1) { > perror("setsockopt TCP_MAXSEG"); > exit(1); > } > -- > 2.17.0.484.g0c8726318c-goog >