Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1757884AbZAIVZY (ORCPT ); Fri, 9 Jan 2009 16:25:24 -0500 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S1756949AbZAIVYe (ORCPT ); Fri, 9 Jan 2009 16:24:34 -0500 Received: from 1wt.eu ([62.212.114.60]:1329 "EHLO 1wt.eu" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1757502AbZAIVYc (ORCPT ); Fri, 9 Jan 2009 16:24:32 -0500 Date: Fri, 9 Jan 2009 22:24:00 +0100 From: Willy Tarreau To: Eric Dumazet Cc: David Miller , ben@zeus.com, jarkao2@gmail.com, mingo@elte.hu, linux-kernel@vger.kernel.org, netdev@vger.kernel.org, jens.axboe@oracle.com Subject: Re: [PATCH] tcp: splice as many packets as possible at once Message-ID: <20090109212400.GA3727@1wt.eu> References: <20090108173028.GA22531@1wt.eu> <49667534.5060501@zeus.com> <20090108.135515.85489589.davem@davemloft.net> <4966F2F4.9080901@cosmosbay.com> <49677074.5090802@cosmosbay.com> <20090109185448.GA1999@1wt.eu> <4967B8C5.10803@cosmosbay.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4967B8C5.10803@cosmosbay.com> User-Agent: Mutt/1.5.11 Sender: linux-kernel-owner@vger.kernel.org List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 2030 Lines: 63 On Fri, Jan 09, 2009 at 09:51:17PM +0100, Eric Dumazet wrote: (...) > > Also, in your second mail, you're saying that your change > > might return more data than requested by the user. I can't > > find why, could you please explain to me, as I'm still quite > > ignorant in this area ? > > Well, I just tested various user programs and indeed got this > strange result : > > Here I call splice() with len=1000 (0x3e8), and you can see > it gives a result of 1460 at the second call. huh, not nice indeed! While looking at the code to see how this could be possible, I came across this minor thing (unrelated IMHO) : if (__skb_splice_bits(skb, &offset, &tlen, &spd)) goto done; >>>>>> else if (!tlen) <<<<<< goto done; /* * now see if we have a frag_list to map */ if (skb_shinfo(skb)->frag_list) { struct sk_buff *list = skb_shinfo(skb)->frag_list; for (; list && tlen; list = list->next) { if (__skb_splice_bits(list, &offset, &tlen, &spd)) break; } } done: Above on the enlighted line, we'd better remove the else and leave a plain "if (!tlen)". Otherwise, when the first call to __skb_splice_bits() zeroes tlen, we still enter the if and evaluate the for condition for nothing. But let's leave that for later. > I suspect a bug in splice code, that my patch just exposed. I've checked in skb_splice_bits() and below and can't see how we can move more than the requested len. However, with your change, I don't clearly see how we break out of the loop in tcp_read_sock(). Maybe we first read 1000 then loop again and read remaining data ? I suspect that we should at least exit when ((struct tcp_splice_state *)desc->arg.data)->len = 0. At least that's something easy to add just before or after !desc->count for a test. Regards, Willy -- To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/