Received: by 2002:a89:2c3:0:b0:1ed:23cc:44d1 with SMTP id d3csp758156lqs; Tue, 5 Mar 2024 16:07:16 -0800 (PST) X-Forwarded-Encrypted: i=3; AJvYcCXqRVkqb/SUhUgBS+bPMX7YaSHek+ELkUIDKCF6quKMSjuH7MooXYJvir2fimY1hwnseAwBSwktp0PGjkgQHrQtkICF3hO67U0jSoXaUQ== X-Google-Smtp-Source: AGHT+IEK+svNKTdog7yQ44tktYeAfwxieS12/tqaFCQZ4XFAVoZoLpJcxQTN8Hnn9DyzFbm2Qm/O X-Received: by 2002:a05:6402:22c2:b0:565:edd9:1acb with SMTP id dm2-20020a05640222c200b00565edd91acbmr9804858edb.23.1709683636455; Tue, 05 Mar 2024 16:07:16 -0800 (PST) ARC-Seal: i=2; a=rsa-sha256; t=1709683636; cv=pass; d=google.com; s=arc-20160816; b=ELIBOOvLX5ZUTfx7I/MdBCjXsL17WZY2iY0cmTK5IwLn+bfT7mVH0oCWppg6wLPx2A nmz2AWq3KYlsZCJXke4O8F3J9XPMOM9QMUOl6iwaVR1KZevw1oG054bH1FZphnWzeJpW 24kCc9mD9perOsXAqW1hlv2iO8f9KU773Tu7JhEi6PAvkutcfoN5Zw3Wmqh7FjH1TO6R yq9S6B7/2aWoiy1R700k1RE9Jio7gngpOi5fyqjSVsvKSdYPoKsTZMmr9nt6UCboZSlN 7Hhp2+DQxptx40VKe6o/KZ6rJHZxqDysQQ8Tw8AOiP+Ah61CKoTyEN73jE81gO1UI4sl QTfw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=content-transfer-encoding:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:message-id:date:subject:cc:to :from:dkim-signature; bh=xdQpR6nGNQSwgQzXohmRNIlmapAF5yuNDCp4QrQg6rc=; fh=q57guTEQuQjr4wZ8UPMYcYs16UB2YUlwHD3uz+JphnY=; b=L9kh25ivmltHaYH+ciP7LSRELpWK3ibyrIk0FaP7CNIN6pTNHqc7Lf/hI+7oAAge9D 2lFod8qNgH/txKGXkLEro6Nh4VgF8jBMB2jvQf+3KwmeHOn2zHwXCql9iD/yWv2j3+Wv LoFKTdG5E8H8sqOnLITwikTDPn8OUgXwXp7KTT1J+w9YZyiIu7txH91XYvXKi/gTf++2 mJutwvRmxHtVeEtoCPk9p6Ow5eCHo35SKqSbvW96f4ZPBulCjUKskpZCPNnZrtheh6FS eIzAMz8gfqVkKJYEjRKErELAQCFggGcsfkGhIuSikIhngBSdg9G5nZZHQ8ditsM4Y9GZ D5ZA==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=B5DhP8p1; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-93134-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-93134-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Return-Path: Received: from am.mirrors.kernel.org (am.mirrors.kernel.org. [2604:1380:4601:e00::3]) by mx.google.com with ESMTPS id k30-20020a508ade000000b00566e532d898si4263897edk.391.2024.03.05.16.07.16 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 05 Mar 2024 16:07:16 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel+bounces-93134-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) client-ip=2604:1380:4601:e00::3; Authentication-Results: mx.google.com; dkim=pass header.i=@redhat.com header.s=mimecast20190719 header.b=B5DhP8p1; arc=pass (i=1 spf=pass spfdomain=redhat.com dkim=pass dkdomain=redhat.com dmarc=pass fromdomain=redhat.com); spf=pass (google.com: domain of linux-kernel+bounces-93134-linux.lists.archive=gmail.com@vger.kernel.org designates 2604:1380:4601:e00::3 as permitted sender) smtp.mailfrom="linux-kernel+bounces-93134-linux.lists.archive=gmail.com@vger.kernel.org"; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=redhat.com Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by am.mirrors.kernel.org (Postfix) with ESMTPS id C510E1F25060 for ; Wed, 6 Mar 2024 00:07:15 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id DB915A50; Wed, 6 Mar 2024 00:07:08 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b="B5DhP8p1" Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 0C53F173 for ; Wed, 6 Mar 2024 00:07:05 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=170.10.129.124 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709683627; cv=none; b=Qhmvo/o0nU4/NzVTIFMlV0X5v7OjyTHMXrskc8Um+fE71oVkjbq4mbzo6wlaX8QOZtv7r3CZ4o+xC3D78bLo9bG5SCWgP8A+qjJfzXn6mt5srpiD0I8D74f19qCqS3K20pTIgSqCKUGSrYCaUMLr0/TPZZQRNTma3DZJuM4qHOk= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1709683627; c=relaxed/simple; bh=YHxWUegg/GDq2N8NRWgUY7fv8zPBdzuoIORPdAdcqzw=; h=From:To:Cc:Subject:Date:Message-ID:MIME-Version; b=LRX15/IZEkLnY/UYAQwcZnS80jQAa8XyPmFrLM1PUDD0eOTAh3BkNX70totRjOJ7tro9/yEIPS+Fl1rn54YqC7u1vpXaqwil4Hm/tOZaSAeyj+U+B9PtAYP3k44dpEmL39BTMkRZiR/l44qoWrLsU8X5tqX8I4hbzsGb2KHjvvw= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com; spf=pass smtp.mailfrom=redhat.com; dkim=pass (1024-bit key) header.d=redhat.com header.i=@redhat.com header.b=B5DhP8p1; arc=none smtp.client-ip=170.10.129.124 Authentication-Results: smtp.subspace.kernel.org; dmarc=pass (p=none dis=none) header.from=redhat.com Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1709683625; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=xdQpR6nGNQSwgQzXohmRNIlmapAF5yuNDCp4QrQg6rc=; b=B5DhP8p1aFh99TAOshhCjLBbIyyak7E6iUuucE6Ye+ZJN0NZ+clWHIG358Be55z8BuCoX6 sslsirfGlHlVHmwDExjkS4WZhtv+khbO0IvL0CQ51MmsB2yLMdHWy51V9Qne+DG4pOJ2gi iudrW1ujy7szHRrcslHWmBQnv2oMeOM= Received: from mimecast-mx02.redhat.com (mx-ext.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_256_GCM_SHA384) id us-mta-665-WiZ4oU2zP_ufMSMVECWenA-1; Tue, 05 Mar 2024 19:07:01 -0500 X-MC-Unique: WiZ4oU2zP_ufMSMVECWenA-1 Received: from smtp.corp.redhat.com (int-mx05.intmail.prod.int.rdu2.redhat.com [10.11.54.5]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (2048 bits) server-digest SHA256) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 1E94A3C02450; Wed, 6 Mar 2024 00:07:01 +0000 (UTC) Received: from warthog.procyon.org.com (unknown [10.42.28.114]) by smtp.corp.redhat.com (Postfix) with ESMTP id B194E16A9B; Wed, 6 Mar 2024 00:06:59 +0000 (UTC) From: David Howells To: netdev@vger.kernel.org Cc: David Howells , Marc Dionne , Simon Horman , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , linux-afs@lists.infradead.org, linux-kernel@vger.kernel.org Subject: [PATCH net-next v3 00/21] rxrpc: Miscellaneous changes and make use of MSG_SPLICE_PAGES Date: Wed, 6 Mar 2024 00:06:30 +0000 Message-ID: <20240306000655.1100294-1-dhowells@redhat.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Transfer-Encoding: 8bit X-Scanned-By: MIMEDefang 3.4.1 on 10.11.54.5 Here are some changes to AF_RXRPC: (1) Cache the transmission serial number of ACK and DATA packets in the rxrpc_txbuf struct and log this in the retransmit tracepoint. (2) Don't use atomics on rxrpc_txbuf::flags[*] and cache the intended wire header flags there too to avoid duplication. (3) Cache the wire checksum in rxrpc_txbuf to make it easier to create jumbo packets in future (which will require altering the wire header to a jumbo header and restoring it back again for retransmission). (4) Fix the protocol names in the wire ACK trailer struct. (5) Strip all the barriers and atomics out of the call timer tracking[*]. (6) Remove atomic handling from call->tx_transmitted and call->acks_prev_seq[*]. (7) Don't bother resetting the DF flag after UDP packet transmission. To change it, we now call directly into UDP code, so it's quick just to set it every time. (8) Merge together the DF/non-DF branches of the DATA transmission to reduce duplication in the code. (9) Add a kvec array into rxrpc_txbuf and start moving things over to it. This paves the way for using page frags. (10) Split (sub)packet preparation and timestamping out of the DATA transmission function. This helps pave the way for future jumbo packet generation. (11) In rxkad, don't pick values out of the wire header stored in rxrpc_txbuf, buf rather find them elsewhere so we can remove the wire header from there. (12) Move rxrpc_send_ACK() to output.c so that it can be merged with rxrpc_send_ack_packet(). (13) Use rxrpc_txbuf::kvec[0] to access the wire header for the packet rather than directly accessing the copy in rxrpc_txbuf. This will allow that to be removed to a page frag. (14) Switch from keeping the transmission buffers in rxrpc_txbuf allocated in the slab to allocating them using page fragment allocators. There are separate allocators for DATA packets (which persist for a while) and control packets (which are discarded immediately). We can then turn on MSG_SPLICE_PAGES when transmitting DATA and ACK packets. We can also get rid of the RCU cleanup on rxrpc_txbufs, preferring instead to release the page frags as soon as possible. (15) Parse received packets before handling timeouts as the former may reset the latter. (16) Make sure we don't retransmit DATA packets after all the packets have been ACK'd. (17) Differentiate traces for PING ACK transmission. (18) Switch to keeping timeouts as ktime_t rather than a number of jiffies as the latter is too coarse a granularity. Only set the call timer at the end of the call event function from the aggregate of all the timeouts, thereby reducing the number of timer calls made. In future, it might be possible to reduce the number of timers from one per call to one per I/O thread and to use a high-precision timer. (19) Record RTT probes after successful transmission rather than recording it before and then cancelling it after if unsuccessful[*]. This allows a number of calls to get the current time to be removed. (20) Clean up the resend algorithm as there's now no need to walk the transmission buffer under lock[*]. DATA packets can be retransmitted as soon as they're found rather than being queued up and transmitted when the locked is dropped. (21) When initially parsing a received ACK packet, extract some of the fields from the ack info to the skbuff private data. This makes it easier to do path MTU discovery in the future when the call to which a PING RESPONSE ACK refers has been deallocated. [*] Possible with the move of almost all code from softirq context to the I/O thread. The patches are tagged here: git://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git tags/rxrpc-iothread-20240305 And can be found on this branch: http://git.kernel.org/cgit/linux/kernel/git/dhowells/linux-fs.git/log/?h=rxrpc-iothread David Link: https://lore.kernel.org/r/20240301163807.385573-1-dhowells@redhat.com/ # v1 Link: https://lore.kernel.org/r/20240304084322.705539-1-dhowells@redhat.com/ # v2 Changes ======= ver #3) - Use passed-in gfp in rxkad_alloc_txbuf() rather than GFP_KRNEL. - Adjust rxkad_alloc_txbuf()'s txb check to put return in if-statement. ver #2) - Removed an unused variable. - Use ktime_to_us() rather than dividing a ktime by 1000 in tracepoints. David Howells (21): rxrpc: Record the Tx serial in the rxrpc_txbuf and retransmit trace rxrpc: Convert rxrpc_txbuf::flags into a mask and don't use atomics rxrpc: Note cksum in txbuf rxrpc: Fix the names of the fields in the ACK trailer struct rxrpc: Strip barriers and atomics off of timer tracking rxrpc: Remove atomic handling on some fields only used in I/O thread rxrpc: Do lazy DF flag resetting rxrpc: Merge together DF/non-DF branches of data Tx function rxrpc: Add a kvec[] to the rxrpc_txbuf struct rxrpc: Split up the DATA packet transmission function rxrpc: Don't pick values out of the wire header when setting up security rxrpc: Move rxrpc_send_ACK() to output.c with rxrpc_send_ack_packet() rxrpc: Use rxrpc_txbuf::kvec[0] instead of rxrpc_txbuf::wire rxrpc: Do zerocopy using MSG_SPLICE_PAGES and page frags rxrpc: Parse received packets before dealing with timeouts rxrpc: Don't permit resending after all Tx packets acked rxrpc: Differentiate PING ACK transmission traces. rxrpc: Use ktimes for call timeout tracking and set the timer lazily rxrpc: Record probes after transmission and reduce number of time-gets rxrpc: Clean up the resend algorithm rxrpc: Extract useful fields from a received ACK to skb priv data include/trace/events/rxrpc.h | 198 ++++++++-------- net/rxrpc/af_rxrpc.c | 12 +- net/rxrpc/ar-internal.h | 88 ++++--- net/rxrpc/call_event.c | 327 ++++++++++++-------------- net/rxrpc/call_object.c | 56 ++--- net/rxrpc/conn_client.c | 4 +- net/rxrpc/conn_event.c | 16 +- net/rxrpc/conn_object.c | 4 + net/rxrpc/input.c | 116 +++++---- net/rxrpc/insecure.c | 11 +- net/rxrpc/io_thread.c | 11 + net/rxrpc/local_object.c | 3 + net/rxrpc/misc.c | 8 +- net/rxrpc/output.c | 441 +++++++++++++++++------------------ net/rxrpc/proc.c | 10 +- net/rxrpc/protocol.h | 6 +- net/rxrpc/rtt.c | 36 +-- net/rxrpc/rxkad.c | 57 ++--- net/rxrpc/sendmsg.c | 63 ++--- net/rxrpc/sysctl.c | 16 +- net/rxrpc/txbuf.c | 174 +++++++++++--- 21 files changed, 853 insertions(+), 804 deletions(-)