Received: by 2002:a05:6358:3188:b0:123:57c1:9b43 with SMTP id q8csp16734345rwd; Mon, 26 Jun 2023 14:28:59 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ50JzRu0oQq8IuF2HjS3Uan57EIfOinqjJ2NV6BlyhSZM/1+dxBduaw82kis3oEtQXa5elW X-Received: by 2002:a17:90a:38a1:b0:25e:886b:c6b with SMTP id x30-20020a17090a38a100b0025e886b0c6bmr26042565pjb.48.1687814938649; Mon, 26 Jun 2023 14:28:58 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1687814938; cv=none; d=google.com; s=arc-20160816; b=KMR7CvfpiEWPzs5PbioJSEKSWY6vmwdwt8Zt/n2s+hvH2uZn+5LQBeKWbCLB/Vel/m Gt3ZyxWypLx+f4ot2AS1hGKz/XKbyG+MAQcHDWL3z6jtj3B4nEPHdJcbJlZBVwDEAvLX 4SQ06i7N6rFbsne+oJ5j9sXLd6d28CMP5A2xUiAbPrRAfVXBdiZogJv0aPlCFUsj4/XI +sA91S1nQ9nT0d5KtkAw2DUW8650F6+8VMqm0/I+LrF74NFPiTn+KN/ynjYG7qmKxr/b l1J0+GDxwZL8/iaDq2UMK0zCcOL8PuI9uCa+Mx0NCqDe+ExJUGYADA6xSaMRVAW1MXnP wpOw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:message-id:date:content-transfer-encoding :content-id:mime-version:subject:cc:to:from:organization :dkim-signature; bh=zoYbYjXCLmeIdE6+bMsHqSDvhA5clgc9BJCnHW8/lPM=; fh=s8XM9GBEiSvfgtS9Tj5i3FqEGSmn3XpISTScX8Gyn44=; b=MzN66kAQYfE+AZjBr/bzarSoaNs8m1aeEb80xDFfiVIUg90zeS4YROFs7QtcTG8IFy sjQQnmReFo9YbT5TMvWP90B62X/I4ZGVBu0n41ZDFJ6GUiB9HIXPu4zvWpMIg9i7ABHg Npn3K8q+OY7Y4cOaWCl9BtsG721Lsbuw2gj39NJWhJpI2aSxBg/E3DBLU+4EHf3WnB3P RKmGjXJ0KACANwHSJhlwI+IRxSA/FZUYZalrpgqAjnXCj+o6s9TY/5eJmwZa1Q4KGRA6 LTbnKDPEP3rS4qs/C/fd+ySs5IaZOM1MJQydzCbA+02svR697JB2f/3SpQXf+rcrkXy+ lw1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Jm1gMk9i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id i18-20020a17090ad35200b0025675c51fa1si8287095pjx.126.2023.06.26.14.28.47; Mon, 26 Jun 2023 14:28:58 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=Jm1gMk9i; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229799AbjFZVGM (ORCPT + 99 others); Mon, 26 Jun 2023 17:06:12 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54000 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229487AbjFZVGK (ORCPT ); Mon, 26 Jun 2023 17:06:10 -0400 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.133.124]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id BE760DC for ; Mon, 26 Jun 2023 14:05:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1687813523; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=zoYbYjXCLmeIdE6+bMsHqSDvhA5clgc9BJCnHW8/lPM=; b=Jm1gMk9ix9DE/CtJsGeO4WA+P38lCmGaFdH0RUP19PWzhxlWyg6+Pfh631GCStcl1nByEm enozrtA811y7XhhQ044O5867oVPklPTY4RJ/N2+sT4+5xzY9uzp/bGSP/znow1sGM1LmRl IorSSrrBH3icVg2DRqcim3FpUrdtNAQ= Received: from mimecast-mx02.redhat.com (mimecast-mx02.redhat.com [66.187.233.88]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-86-b_tiPeuqMi-ZKDAP7xOr8Q-1; Mon, 26 Jun 2023 17:05:16 -0400 X-MC-Unique: b_tiPeuqMi-ZKDAP7xOr8Q-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 1F66B8C7C2F; Mon, 26 Jun 2023 21:05:03 +0000 (UTC) Received: from warthog.procyon.org.uk (unknown [10.42.28.4]) by smtp.corp.redhat.com (Postfix) with ESMTP id A5E94401061; Mon, 26 Jun 2023 21:05:01 +0000 (UTC) Organization: Red Hat UK Ltd. Registered Address: Red Hat UK Ltd, Amberley Place, 107-111 Peascod Street, Windsor, Berkshire, SI4 1TE, United Kingdom. Registered in England and Wales under Company Registration No. 3798903 From: David Howells To: Ilya Dryomov , netdev@vger.kernel.org cc: dhowells@redhat.com, Xiubo Li , Jeff Layton , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , Jens Axboe , Matthew Wilcox , ceph-devel@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH net-next v2] libceph: Partially revert changes to support MSG_SPLICE_PAGES MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-ID: <3111634.1687813501.1@warthog.procyon.org.uk> Content-Transfer-Encoding: quoted-printable Date: Mon, 26 Jun 2023 22:05:01 +0100 Message-ID: <3111635.1687813501@warthog.procyon.org.uk> X-Scanned-By: MIMEDefang 3.1 on 10.11.54.10 X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, RCVD_IN_MSPIKE_H5,RCVD_IN_MSPIKE_WL,SPF_HELO_NONE,SPF_NONE, T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Fix the mishandling of MSG_DONTWAIT and also reinstates the per-page checking of the source pages (which might have come from a DIO write by userspace) by partially reverting the changes to support MSG_SPLICE_PAGES and doing things a little differently. In messenger_v1: (1) The ceph_tcp_sendpage() is resurrected and the callers reverted to us= e that. (2) The callers now pass MSG_MORE unconditionally. Previously, they were passing in MSG_MORE|MSG_SENDPAGE_NOTLAST and then degrading that to just MSG_MORE on the last call to ->sendpage(). (3) Make ceph_tcp_sendpage() a wrapper around sendmsg() rather than sendpage(), setting MSG_SPLICE_PAGES if sendpage_ok() returns true on the page. In messenger_v2: (4) Bring back do_try_sendpage() and make the callers use that. (5) Make do_try_sendpage() use sendmsg() for both cases and set MSG_SPLICE_PAGES if sendpage_ok() is set. Fixes: 40a8c17aa770 ("ceph: Use sendmsg(MSG_SPLICE_PAGES) rather than send= page") Fixes: fa094ccae1e7 ("ceph: Use sendmsg(MSG_SPLICE_PAGES) rather than send= page()") Reported-by: Ilya Dryomov Link: https://lore.kernel.org/r/CAOi1vP9vjLfk3W+AJFeexC93jqPaPUn2dD_4Nrzxw= oZTbYfOnw@mail.gmail.com/ Link: https://lore.kernel.org/r/CAOi1vP_Bn918j24S94MuGyn+Gxk212btw7yWeDrRc= W1U8pc_BA@mail.gmail.com/ Signed-off-by: David Howells cc: Ilya Dryomov cc: Xiubo Li cc: Jeff Layton cc: "David S. Miller" cc: Eric Dumazet cc: Jakub Kicinski cc: Paolo Abeni cc: Jens Axboe cc: Matthew Wilcox cc: ceph-devel@vger.kernel.org cc: netdev@vger.kernel.org Link: https://lore.kernel.org/r/3101881.1687801973@warthog.procyon.org.uk/= # v1 --- Notes: ver #2) - Removed mention of MSG_SENDPAGE_NOTLAST in comments. - Changed some refs to sendpage to MSG_SPLICE_PAGES in comments. - Init msg_iter in ceph_tcp_sendpage(). - Move setting of MSG_SPLICE_PAGES in do_try_sendpage() next to comme= nt and adjust how it is cleared. net/ceph/messenger_v1.c | 58 ++++++++++++++++++++----------- net/ceph/messenger_v2.c | 88 ++++++++++++++++++++++++++++++++++++++----= ------ 2 files changed, 107 insertions(+), 39 deletions(-) diff --git a/net/ceph/messenger_v1.c b/net/ceph/messenger_v1.c index 814579f27f04..51a6f28aa798 100644 --- a/net/ceph/messenger_v1.c +++ b/net/ceph/messenger_v1.c @@ -74,6 +74,39 @@ static int ceph_tcp_sendmsg(struct socket *sock, struct= kvec *iov, return r; } = +/* + * @more: MSG_MORE or 0. + */ +static int ceph_tcp_sendpage(struct socket *sock, struct page *page, + int offset, size_t size, int more) +{ + struct msghdr msg =3D { + .msg_flags =3D MSG_DONTWAIT | MSG_NOSIGNAL | more, + }; + struct bio_vec bvec; + int ret; + + /* + * MSG_SPLICE_PAGES cannot properly handle pages with page_count =3D=3D = 0, + * we need to fall back to sendmsg if that's the case. + * + * Same goes for slab pages: skb_can_coalesce() allows + * coalescing neighboring slab objects into a single frag which + * triggers one of hardened usercopy checks. + */ + if (sendpage_ok(page)) + msg.msg_flags |=3D MSG_SPLICE_PAGES; + + bvec_set_page(&bvec, page, size, offset); + iov_iter_bvec(&msg.msg_iter, ITER_DEST, &bvec, 1, size); + + ret =3D sock_sendmsg(sock, &msg); + if (ret =3D=3D -EAGAIN) + ret =3D 0; + + return ret; +} + static void con_out_kvec_reset(struct ceph_connection *con) { BUG_ON(con->v1.out_skip); @@ -450,10 +483,6 @@ static int write_partial_message_data(struct ceph_con= nection *con) */ crc =3D do_datacrc ? le32_to_cpu(msg->footer.data_crc) : 0; while (cursor->total_resid) { - struct bio_vec bvec; - struct msghdr msghdr =3D { - .msg_flags =3D MSG_SPLICE_PAGES, - }; struct page *page; size_t page_offset; size_t length; @@ -465,13 +494,8 @@ static int write_partial_message_data(struct ceph_con= nection *con) } = page =3D ceph_msg_data_next(cursor, &page_offset, &length); - if (length !=3D cursor->total_resid) - msghdr.msg_flags |=3D MSG_MORE; - - bvec_set_page(&bvec, page, length, page_offset); - iov_iter_bvec(&msghdr.msg_iter, ITER_SOURCE, &bvec, 1, length); - - ret =3D sock_sendmsg(con->sock, &msghdr); + ret =3D ceph_tcp_sendpage(con->sock, page, page_offset, length, + MSG_MORE); if (ret <=3D 0) { if (do_datacrc) msg->footer.data_crc =3D cpu_to_le32(crc); @@ -501,22 +525,14 @@ static int write_partial_message_data(struct ceph_co= nnection *con) */ static int write_partial_skip(struct ceph_connection *con) { - struct bio_vec bvec; - struct msghdr msghdr =3D { - .msg_flags =3D MSG_SPLICE_PAGES | MSG_MORE, - }; int ret; = dout("%s %p %d left\n", __func__, con, con->v1.out_skip); while (con->v1.out_skip > 0) { size_t size =3D min(con->v1.out_skip, (int)PAGE_SIZE); = - if (size =3D=3D con->v1.out_skip) - msghdr.msg_flags &=3D ~MSG_MORE; - bvec_set_page(&bvec, ZERO_PAGE(0), size, 0); - iov_iter_bvec(&msghdr.msg_iter, ITER_SOURCE, &bvec, 1, size); - - ret =3D sock_sendmsg(con->sock, &msghdr); + ret =3D ceph_tcp_sendpage(con->sock, ceph_zero_page, 0, size, + MSG_MORE); if (ret <=3D 0) goto out; con->v1.out_skip -=3D ret; diff --git a/net/ceph/messenger_v2.c b/net/ceph/messenger_v2.c index 87ac97073e75..1a888b86a494 100644 --- a/net/ceph/messenger_v2.c +++ b/net/ceph/messenger_v2.c @@ -117,38 +117,90 @@ static int ceph_tcp_recv(struct ceph_connection *con= ) return ret; } = +static int do_sendmsg(struct socket *sock, struct iov_iter *it) +{ + struct msghdr msg =3D { .msg_flags =3D CEPH_MSG_FLAGS }; + int ret; + + msg.msg_iter =3D *it; + while (iov_iter_count(it)) { + ret =3D sock_sendmsg(sock, &msg); + if (ret <=3D 0) { + if (ret =3D=3D -EAGAIN) + ret =3D 0; + return ret; + } + + iov_iter_advance(it, ret); + } + + WARN_ON(msg_data_left(&msg)); + return 1; +} + +static int do_try_sendpage(struct socket *sock, struct iov_iter *it) +{ + struct msghdr msg =3D { .msg_flags =3D CEPH_MSG_FLAGS }; + struct bio_vec bv; + int ret; + + if (WARN_ON(!iov_iter_is_bvec(it))) + return -EINVAL; + + while (iov_iter_count(it)) { + /* iov_iter_iovec() for ITER_BVEC */ + bvec_set_page(&bv, it->bvec->bv_page, + min(iov_iter_count(it), + it->bvec->bv_len - it->iov_offset), + it->bvec->bv_offset + it->iov_offset); + + /* + * MSG_SPLICE_PAGES cannot properly handle pages with + * page_count =3D=3D 0, we need to fall back to sendmsg if + * that's the case. + * + * Same goes for slab pages: skb_can_coalesce() allows + * coalescing neighboring slab objects into a single frag + * which triggers one of hardened usercopy checks. + */ + if (sendpage_ok(bv.bv_page)) + msg.msg_flags |=3D MSG_SPLICE_PAGES; + else + msg.msg_flags &=3D ~MSG_SPLICE_PAGES; + + iov_iter_bvec(&msg.msg_iter, ITER_SOURCE, &bv, 1, bv.bv_len); + ret =3D sock_sendmsg(sock, &msg); + if (ret <=3D 0) { + if (ret =3D=3D -EAGAIN) + ret =3D 0; + return ret; + } + + iov_iter_advance(it, ret); + } + + return 1; +} + /* * Write as much as possible. The socket is expected to be corked, * so we don't bother with MSG_MORE here. * * Return: - * >0 - done, nothing (else) to write + * 1 - done, nothing (else) to write * 0 - socket is full, need to wait * <0 - error */ static int ceph_tcp_send(struct ceph_connection *con) { - struct msghdr msg =3D { - .msg_iter =3D con->v2.out_iter, - .msg_flags =3D CEPH_MSG_FLAGS, - }; int ret; = - if (WARN_ON(!iov_iter_is_bvec(&con->v2.out_iter))) - return -EINVAL; - - if (con->v2.out_iter_sendpage) - msg.msg_flags |=3D MSG_SPLICE_PAGES; - dout("%s con %p have %zu try_sendpage %d\n", __func__, con, iov_iter_count(&con->v2.out_iter), con->v2.out_iter_sendpage); - - ret =3D sock_sendmsg(con->sock, &msg); - if (ret > 0) - iov_iter_advance(&con->v2.out_iter, ret); - else if (ret =3D=3D -EAGAIN) - ret =3D 0; - + if (con->v2.out_iter_sendpage) + ret =3D do_try_sendpage(con->sock, &con->v2.out_iter); + else + ret =3D do_sendmsg(con->sock, &con->v2.out_iter); dout("%s con %p ret %d left %zu\n", __func__, con, ret, iov_iter_count(&con->v2.out_iter)); return ret;