Received: by 2002:a05:6358:45e:b0:b5:b6eb:e1f9 with SMTP id 30csp638878rwe; Thu, 1 Sep 2022 05:37:16 -0700 (PDT) X-Google-Smtp-Source: AA6agR7H5Rnor/TzRtpw7OHje5gcwEYX3kh0V7pgB4yWdEyuyHDRPJZiW+S8AHElI93HRKDUlNIe X-Received: by 2002:a17:90a:9bc6:b0:1fd:8d49:901c with SMTP id b6-20020a17090a9bc600b001fd8d49901cmr8347022pjw.124.1662035836241; Thu, 01 Sep 2022 05:37:16 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1662035836; cv=none; d=google.com; s=arc-20160816; b=U7amKo5wuI0sb9W7226EmtEARpFrPH3efnrv+gjzrGPRLYi7WnWZObLPsK1hlo+430 1vGIclGeWrth+APTZ8byqt5IyQi153bqkYo8eZvsvw/j5RWy0ew5itaINYIVGNlvrc8p J6dPypYkzu2uWlWiAzxDBQeInIQKW5u3C/8xy2fFzE991kidEKcY1BulpeOQyYmcGCSg RHrn08DqiEFLaLDqLHQM0tza3BvjMrgSDrTZVEAdiROMJscf9OYo4mVVw1EuAknnJxaO FLtFZERhcstPIwT2bagDjFPH9obH17qmtd7vIJVcwG5H/dYBY/q1MH1LMBYVwGTgc9W6 PeSw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:cc:to:from :subject:organization:dkim-signature; bh=u/VisaIuDwQPL/j6BsI0dXcRMhVm18M62DV4g+QfZJE=; b=rv1GLxX9/cb3qk9Akqf2iqE34DjuMP53/yU6MdtMHyFBIB1iF5GrpeIIaVVJYTWu8V 6nr04NbjQUgKvwzMWHfauYQbIJlwGEdVk3YFH8kdLMaUacFxifnq9Y+mIjABhTNX1j2w AIT6zL+pElIKDE8IBYMYFpY05JtOqVcI+3/yTTpc/VOnXCyxhnR0UiMExOa/yhM9LYQ1 Nw2KBrlIsPeB7PYwKS0NpXz1vqOgRs1Dz5QGRXwNgJ/VyMnNMw/SeustxjOLRMEX+d1N WZczjpEFyNAR4CaFQsGH54d4g6OY0T27U5PA73jgYf60TWOkxUzsFvy+xuZbbnSL4jLa DdJQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZVTPu7bZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id m1-20020a655301000000b0042b1e17d98csi7465614pgq.438.2022.09.01.05.36.53; Thu, 01 Sep 2022 05:37:16 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=ZVTPu7bZ; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233703AbiIAM2G (ORCPT + 99 others); Thu, 1 Sep 2022 08:28:06 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:46270 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233622AbiIAM1U (ORCPT ); Thu, 1 Sep 2022 08:27:20 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 433C312856A for ; Thu, 1 Sep 2022 05:27:12 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1662035230; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding: in-reply-to:in-reply-to:references:references; bh=u/VisaIuDwQPL/j6BsI0dXcRMhVm18M62DV4g+QfZJE=; b=ZVTPu7bZUY8YNeGxJzeH/8so8hkauuEHn6HeoSu2RwMeat3ZknfS/Sa8K9wklf0ZELOjeL 9Ko3ZhDzHeQARf7cyDGsBRfo6CVlHzlIvE62bIFJecDuuekM2iQJWVkg4MoEVgzYKSEIRK VopBTj1HPh799OQrFo9hGDg4ENuM+X8= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-642-FDcA-BFiM4mgFdJWDaCPTA-1; Thu, 01 Sep 2022 08:27:06 -0400 X-MC-Unique: FDcA-BFiM4mgFdJWDaCPTA-1 Received: from smtp.corp.redhat.com (int-mx06.intmail.prod.int.rdu2.redhat.com [10.11.54.6]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 611C2185A794; Thu, 1 Sep 2022 12:27:06 +0000 (UTC) Received: from warthog.procyon.org.uk (unknown [10.33.36.72]) by smtp.corp.redhat.com (Postfix) with ESMTP id BD0C92166B26; Thu, 1 Sep 2022 12:27:05 +0000 (UTC) Organization: Red Hat UK Ltd. Registered Address: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SI4 1TE, United Kingdom. Registered in England and Wales under Company Registration No. 3798903 Subject: [PATCH net v3 6/6] rxrpc: Remove rxrpc_get_reply_time() which is no longer used From: David Howells To: netdev@vger.kernel.org Cc: dhowells@redhat.com, linux-afs@lists.infradead.org, linux-kernel@vger.kernel.org Date: Thu, 01 Sep 2022 13:27:05 +0100 Message-ID: <166203522513.271364.1375040456844056298.stgit@warthog.procyon.org.uk> In-Reply-To: <166203518656.271364.567426359603115318.stgit@warthog.procyon.org.uk> References: <166203518656.271364.567426359603115318.stgit@warthog.procyon.org.uk> User-Agent: StGit/1.5 MIME-Version: 1.0 Content-Type: text/plain; charset="utf-8" Content-Transfer-Encoding: 7bit X-Scanned-By: MIMEDefang 2.78 on 10.11.54.6 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_NONE,T_SCC_BODY_TEXT_LINE autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Remove rxrpc_get_reply_time() as that is no longer used now that the call issue time is used instead of the reply time. Signed-off-by: David Howells --- Documentation/networking/rxrpc.rst | 11 --------- include/net/af_rxrpc.h | 2 -- net/rxrpc/recvmsg.c | 43 ------------------------------------ 3 files changed, 56 deletions(-) diff --git a/Documentation/networking/rxrpc.rst b/Documentation/networking/rxrpc.rst index 39c2249c7aa7..39494a6ea739 100644 --- a/Documentation/networking/rxrpc.rst +++ b/Documentation/networking/rxrpc.rst @@ -1055,17 +1055,6 @@ The kernel interface functions are as follows: first function to change. Note that this must be called in TASK_RUNNING state. - (#) Get reply timestamp:: - - bool rxrpc_kernel_get_reply_time(struct socket *sock, - struct rxrpc_call *call, - ktime_t *_ts) - - This allows the timestamp on the first DATA packet of the reply of a - client call to be queried, provided that it is still in the Rx ring. If - successful, the timestamp will be stored into ``*_ts`` and true will be - returned; false will be returned otherwise. - (#) Get remote client epoch:: u32 rxrpc_kernel_get_epoch(struct socket *sock, diff --git a/include/net/af_rxrpc.h b/include/net/af_rxrpc.h index cee5f83c0f11..b69ca695935c 100644 --- a/include/net/af_rxrpc.h +++ b/include/net/af_rxrpc.h @@ -66,8 +66,6 @@ int rxrpc_kernel_charge_accept(struct socket *, rxrpc_notify_rx_t, void rxrpc_kernel_set_tx_length(struct socket *, struct rxrpc_call *, s64); bool rxrpc_kernel_check_life(const struct socket *, const struct rxrpc_call *); u32 rxrpc_kernel_get_epoch(struct socket *, struct rxrpc_call *); -bool rxrpc_kernel_get_reply_time(struct socket *, struct rxrpc_call *, - ktime_t *); bool rxrpc_kernel_call_is_complete(struct rxrpc_call *); void rxrpc_kernel_set_max_life(struct socket *, struct rxrpc_call *, unsigned long); diff --git a/net/rxrpc/recvmsg.c b/net/rxrpc/recvmsg.c index 250f23bc1c07..7e39c262fd79 100644 --- a/net/rxrpc/recvmsg.c +++ b/net/rxrpc/recvmsg.c @@ -771,46 +771,3 @@ int rxrpc_kernel_recv_data(struct socket *sock, struct rxrpc_call *call, goto out; } EXPORT_SYMBOL(rxrpc_kernel_recv_data); - -/** - * rxrpc_kernel_get_reply_time - Get timestamp on first reply packet - * @sock: The socket that the call exists on - * @call: The call to query - * @_ts: Where to put the timestamp - * - * Retrieve the timestamp from the first DATA packet of the reply if it is - * in the ring. Returns true if successful, false if not. - */ -bool rxrpc_kernel_get_reply_time(struct socket *sock, struct rxrpc_call *call, - ktime_t *_ts) -{ - struct sk_buff *skb; - rxrpc_seq_t hard_ack, top, seq; - bool success = false; - - mutex_lock(&call->user_mutex); - - if (READ_ONCE(call->state) != RXRPC_CALL_CLIENT_RECV_REPLY) - goto out; - - hard_ack = call->rx_hard_ack; - if (hard_ack != 0) - goto out; - - seq = hard_ack + 1; - top = smp_load_acquire(&call->rx_top); - if (after(seq, top)) - goto out; - - skb = call->rxtx_buffer[seq & RXRPC_RXTX_BUFF_MASK]; - if (!skb) - goto out; - - *_ts = skb_get_ktime(skb); - success = true; - -out: - mutex_unlock(&call->user_mutex); - return success; -} -EXPORT_SYMBOL(rxrpc_kernel_get_reply_time);