[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <202411121942.9DAb3SoN-lkp@intel.com>
Date: Tue, 12 Nov 2024 19:32:33 +0800
From: kernel test robot <lkp@...el.com>
To: John Ousterhout <ouster@...stanford.edu>, netdev@...r.kernel.org,
linux-api@...r.kernel.org
Cc: llvm@...ts.linux.dev, oe-kbuild-all@...ts.linux.dev,
John Ousterhout <ouster@...stanford.edu>
Subject: Re: [PATCH net-next v2 12/12] net: homa: create Makefile and Kconfig
Hi John,
kernel test robot noticed the following build errors:
[auto build test ERROR on net-next/main]
url: https://github.com/intel-lab-lkp/linux/commits/John-Ousterhout/net-homa-define-user-visible-API-for-Homa/20241112-074535
base: net-next/main
patch link: https://lore.kernel.org/r/20241111234006.5942-13-ouster%40cs.stanford.edu
patch subject: [PATCH net-next v2 12/12] net: homa: create Makefile and Kconfig
config: hexagon-allmodconfig (https://download.01.org/0day-ci/archive/20241112/202411121942.9DAb3SoN-lkp@intel.com/config)
compiler: clang version 20.0.0git (https://github.com/llvm/llvm-project 592c0fe55f6d9a811028b5f3507be91458ab2713)
reproduce (this is a W=1 build): (https://download.01.org/0day-ci/archive/20241112/202411121942.9DAb3SoN-lkp@intel.com/reproduce)
If you fix the issue in a separate patch/commit (i.e. not just a new version of
the same patch/commit), kindly add following tags
| Reported-by: kernel test robot <lkp@...el.com>
| Closes: https://lore.kernel.org/oe-kbuild-all/202411121942.9DAb3SoN-lkp@intel.com/
All error/warnings (new ones prefixed by >>):
In file included from net/homa/homa_outgoing.c:7:
In file included from net/homa/homa_impl.h:12:
In file included from include/linux/audit.h:13:
In file included from include/linux/ptrace.h:10:
In file included from include/linux/pid_namespace.h:7:
In file included from include/linux/mm.h:2213:
include/linux/vmstat.h:518:36: warning: arithmetic between different enumeration types ('enum node_stat_item' and 'enum lru_list') [-Wenum-enum-conversion]
518 | return node_stat_name(NR_LRU_BASE + lru) + 3; // skip "nr_"
| ~~~~~~~~~~~ ^ ~~~
In file included from net/homa/homa_outgoing.c:7:
In file included from net/homa/homa_impl.h:13:
In file included from include/linux/icmp.h:16:
In file included from include/linux/skbuff.h:17:
In file included from include/linux/bvec.h:10:
In file included from include/linux/highmem.h:12:
In file included from include/linux/hardirq.h:11:
In file included from ./arch/hexagon/include/generated/asm/hardirq.h:1:
In file included from include/asm-generic/hardirq.h:17:
In file included from include/linux/irq.h:20:
In file included from include/linux/io.h:14:
In file included from arch/hexagon/include/asm/io.h:328:
include/asm-generic/io.h:548:31: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
548 | val = __raw_readb(PCI_IOBASE + addr);
| ~~~~~~~~~~ ^
include/asm-generic/io.h:561:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
561 | val = __le16_to_cpu((__le16 __force)__raw_readw(PCI_IOBASE + addr));
| ~~~~~~~~~~ ^
include/uapi/linux/byteorder/little_endian.h:37:51: note: expanded from macro '__le16_to_cpu'
37 | #define __le16_to_cpu(x) ((__force __u16)(__le16)(x))
| ^
In file included from net/homa/homa_outgoing.c:7:
In file included from net/homa/homa_impl.h:13:
In file included from include/linux/icmp.h:16:
In file included from include/linux/skbuff.h:17:
In file included from include/linux/bvec.h:10:
In file included from include/linux/highmem.h:12:
In file included from include/linux/hardirq.h:11:
In file included from ./arch/hexagon/include/generated/asm/hardirq.h:1:
In file included from include/asm-generic/hardirq.h:17:
In file included from include/linux/irq.h:20:
In file included from include/linux/io.h:14:
In file included from arch/hexagon/include/asm/io.h:328:
include/asm-generic/io.h:574:61: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
574 | val = __le32_to_cpu((__le32 __force)__raw_readl(PCI_IOBASE + addr));
| ~~~~~~~~~~ ^
include/uapi/linux/byteorder/little_endian.h:35:51: note: expanded from macro '__le32_to_cpu'
35 | #define __le32_to_cpu(x) ((__force __u32)(__le32)(x))
| ^
In file included from net/homa/homa_outgoing.c:7:
In file included from net/homa/homa_impl.h:13:
In file included from include/linux/icmp.h:16:
In file included from include/linux/skbuff.h:17:
In file included from include/linux/bvec.h:10:
In file included from include/linux/highmem.h:12:
In file included from include/linux/hardirq.h:11:
In file included from ./arch/hexagon/include/generated/asm/hardirq.h:1:
In file included from include/asm-generic/hardirq.h:17:
In file included from include/linux/irq.h:20:
In file included from include/linux/io.h:14:
In file included from arch/hexagon/include/asm/io.h:328:
include/asm-generic/io.h:585:33: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
585 | __raw_writeb(value, PCI_IOBASE + addr);
| ~~~~~~~~~~ ^
include/asm-generic/io.h:595:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
595 | __raw_writew((u16 __force)cpu_to_le16(value), PCI_IOBASE + addr);
| ~~~~~~~~~~ ^
include/asm-generic/io.h:605:59: warning: performing pointer arithmetic on a null pointer has undefined behavior [-Wnull-pointer-arithmetic]
605 | __raw_writel((u32 __force)cpu_to_le32(value), PCI_IOBASE + addr);
| ~~~~~~~~~~ ^
>> net/homa/homa_outgoing.c:108:2: warning: comparison of distinct pointer types ('typeof ((segs)) *' (aka 'int *') and 'uint64_t *' (aka 'unsigned long long *')) [-Wcompare-distinct-pointer-types]
108 | do_div(segs, max_seg_data);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~
include/asm-generic/div64.h:222:28: note: expanded from macro 'do_div'
222 | (void)(((typeof((n)) *)0) == ((uint64_t *)0)); \
| ~~~~~~~~~~~~~~~~~~ ^ ~~~~~~~~~~~~~~~
>> net/homa/homa_outgoing.c:108:2: error: incompatible pointer types passing 'int *' to parameter of type 'uint64_t *' (aka 'unsigned long long *') [-Werror,-Wincompatible-pointer-types]
108 | do_div(segs, max_seg_data);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~
include/asm-generic/div64.h:238:22: note: expanded from macro 'do_div'
238 | __rem = __div64_32(&(n), __base); \
| ^~~~
include/asm-generic/div64.h:213:38: note: passing argument to parameter 'dividend' here
213 | extern uint32_t __div64_32(uint64_t *dividend, uint32_t divisor);
| ^
>> net/homa/homa_outgoing.c:108:2: warning: shift count >= width of type [-Wshift-count-overflow]
108 | do_div(segs, max_seg_data);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~
include/asm-generic/div64.h:234:25: note: expanded from macro 'do_div'
234 | } else if (likely(((n) >> 32) == 0)) { \
| ^ ~~
include/linux/compiler.h:76:40: note: expanded from macro 'likely'
76 | # define likely(x) __builtin_expect(!!(x), 1)
| ^
>> net/homa/homa_outgoing.c:233:2: warning: comparison of distinct pointer types ('typeof ((segs_per_gso)) *' (aka 'int *') and 'uint64_t *' (aka 'unsigned long long *')) [-Wcompare-distinct-pointer-types]
233 | do_div(segs_per_gso, max_seg_data);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/asm-generic/div64.h:222:28: note: expanded from macro 'do_div'
222 | (void)(((typeof((n)) *)0) == ((uint64_t *)0)); \
| ~~~~~~~~~~~~~~~~~~ ^ ~~~~~~~~~~~~~~~
net/homa/homa_outgoing.c:233:2: error: incompatible pointer types passing 'int *' to parameter of type 'uint64_t *' (aka 'unsigned long long *') [-Werror,-Wincompatible-pointer-types]
233 | do_div(segs_per_gso, max_seg_data);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/asm-generic/div64.h:238:22: note: expanded from macro 'do_div'
238 | __rem = __div64_32(&(n), __base); \
| ^~~~
include/asm-generic/div64.h:213:38: note: passing argument to parameter 'dividend' here
213 | extern uint32_t __div64_32(uint64_t *dividend, uint32_t divisor);
| ^
net/homa/homa_outgoing.c:233:2: warning: shift count >= width of type [-Wshift-count-overflow]
233 | do_div(segs_per_gso, max_seg_data);
| ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~
include/asm-generic/div64.h:234:25: note: expanded from macro 'do_div'
234 | } else if (likely(((n) >> 32) == 0)) { \
| ^ ~~
include/linux/compiler.h:76:40: note: expanded from macro 'likely'
76 | # define likely(x) __builtin_expect(!!(x), 1)
| ^
net/homa/homa_outgoing.c:809:6: warning: variable 'checks' set but not used [-Wunused-but-set-variable]
809 | int checks = 0;
| ^
12 warnings and 2 errors generated.
vim +108 net/homa/homa_outgoing.c
cb3634a259a2944 John Ousterhout 2024-11-11 78
cb3634a259a2944 John Ousterhout 2024-11-11 79 /**
cb3634a259a2944 John Ousterhout 2024-11-11 80 * homa_new_data_packet() - Allocate a new sk_buff and fill it with a Homa
cb3634a259a2944 John Ousterhout 2024-11-11 81 * data packet. The resulting packet will be a GSO packet that will eventually
cb3634a259a2944 John Ousterhout 2024-11-11 82 * be segmented by the NIC.
cb3634a259a2944 John Ousterhout 2024-11-11 83 * @rpc: RPC that packet will belong to (msgout must have been
cb3634a259a2944 John Ousterhout 2024-11-11 84 * initialized).
cb3634a259a2944 John Ousterhout 2024-11-11 85 * @iter: Describes location(s) of (remaining) message data in user
cb3634a259a2944 John Ousterhout 2024-11-11 86 * space.
cb3634a259a2944 John Ousterhout 2024-11-11 87 * @offset: Offset in the message of the first byte of data in this
cb3634a259a2944 John Ousterhout 2024-11-11 88 * packet.
cb3634a259a2944 John Ousterhout 2024-11-11 89 * @length: How many bytes of data to include in the skb. Caller must
cb3634a259a2944 John Ousterhout 2024-11-11 90 * ensure that this amount of data isn't too much for a
cb3634a259a2944 John Ousterhout 2024-11-11 91 * well-formed GSO packet, and that iter has at least this
cb3634a259a2944 John Ousterhout 2024-11-11 92 * much data.
cb3634a259a2944 John Ousterhout 2024-11-11 93 * @max_seg_data: Maximum number of bytes of message data that can go in
cb3634a259a2944 John Ousterhout 2024-11-11 94 * a single segment of the GSO packet.
cb3634a259a2944 John Ousterhout 2024-11-11 95 * Return: A pointer to the new packet, or a negative errno.
cb3634a259a2944 John Ousterhout 2024-11-11 96 */
cb3634a259a2944 John Ousterhout 2024-11-11 97 struct sk_buff *homa_new_data_packet(struct homa_rpc *rpc,
cb3634a259a2944 John Ousterhout 2024-11-11 98 struct iov_iter *iter, int offset,
cb3634a259a2944 John Ousterhout 2024-11-11 99 int length, int max_seg_data)
cb3634a259a2944 John Ousterhout 2024-11-11 100 {
cb3634a259a2944 John Ousterhout 2024-11-11 101 struct homa_skb_info *homa_info;
cb3634a259a2944 John Ousterhout 2024-11-11 102 int segs, err, gso_size;
cb3634a259a2944 John Ousterhout 2024-11-11 103 struct data_header *h;
cb3634a259a2944 John Ousterhout 2024-11-11 104 struct sk_buff *skb;
cb3634a259a2944 John Ousterhout 2024-11-11 105
cb3634a259a2944 John Ousterhout 2024-11-11 106 /* Initialize the overall skb. */
cb3634a259a2944 John Ousterhout 2024-11-11 107 segs = length + max_seg_data - 1;
cb3634a259a2944 John Ousterhout 2024-11-11 @108 do_div(segs, max_seg_data);
cb3634a259a2944 John Ousterhout 2024-11-11 109 skb = homa_skb_new_tx(sizeof32(*h) + length
cb3634a259a2944 John Ousterhout 2024-11-11 110 + segs * sizeof32(struct seg_header));
cb3634a259a2944 John Ousterhout 2024-11-11 111 if (!skb)
cb3634a259a2944 John Ousterhout 2024-11-11 112 return ERR_PTR(-ENOMEM);
cb3634a259a2944 John Ousterhout 2024-11-11 113
cb3634a259a2944 John Ousterhout 2024-11-11 114 /* Fill in the Homa header (which will be replicated in every
cb3634a259a2944 John Ousterhout 2024-11-11 115 * network packet by GSO).
cb3634a259a2944 John Ousterhout 2024-11-11 116 */
cb3634a259a2944 John Ousterhout 2024-11-11 117 h = (struct data_header *)skb_put(skb, sizeof(struct data_header));
cb3634a259a2944 John Ousterhout 2024-11-11 118 h->common.sport = htons(rpc->hsk->port);
cb3634a259a2944 John Ousterhout 2024-11-11 119 h->common.dport = htons(rpc->dport);
cb3634a259a2944 John Ousterhout 2024-11-11 120 h->common.sequence = htonl(offset);
cb3634a259a2944 John Ousterhout 2024-11-11 121 h->common.type = DATA;
cb3634a259a2944 John Ousterhout 2024-11-11 122 homa_set_doff(h, sizeof(struct data_header));
cb3634a259a2944 John Ousterhout 2024-11-11 123 h->common.checksum = 0;
cb3634a259a2944 John Ousterhout 2024-11-11 124 h->common.sender_id = cpu_to_be64(rpc->id);
cb3634a259a2944 John Ousterhout 2024-11-11 125 h->message_length = htonl(rpc->msgout.length);
cb3634a259a2944 John Ousterhout 2024-11-11 126 h->incoming = h->message_length;
cb3634a259a2944 John Ousterhout 2024-11-11 127 h->ack.client_id = 0;
cb3634a259a2944 John Ousterhout 2024-11-11 128 homa_peer_get_acks(rpc->peer, 1, &h->ack);
cb3634a259a2944 John Ousterhout 2024-11-11 129 h->retransmit = 0;
cb3634a259a2944 John Ousterhout 2024-11-11 130 h->seg.offset = htonl(offset);
cb3634a259a2944 John Ousterhout 2024-11-11 131
cb3634a259a2944 John Ousterhout 2024-11-11 132 homa_info = homa_get_skb_info(skb);
cb3634a259a2944 John Ousterhout 2024-11-11 133 homa_info->next_skb = NULL;
cb3634a259a2944 John Ousterhout 2024-11-11 134 homa_info->wire_bytes = length + segs * (sizeof(struct data_header)
cb3634a259a2944 John Ousterhout 2024-11-11 135 + rpc->hsk->ip_header_length + HOMA_ETH_OVERHEAD);
cb3634a259a2944 John Ousterhout 2024-11-11 136 homa_info->data_bytes = length;
cb3634a259a2944 John Ousterhout 2024-11-11 137 homa_info->seg_length = max_seg_data;
cb3634a259a2944 John Ousterhout 2024-11-11 138 homa_info->offset = offset;
cb3634a259a2944 John Ousterhout 2024-11-11 139
cb3634a259a2944 John Ousterhout 2024-11-11 140 if (segs > 1) {
cb3634a259a2944 John Ousterhout 2024-11-11 141 homa_set_doff(h, sizeof(struct data_header) -
cb3634a259a2944 John Ousterhout 2024-11-11 142 sizeof32(struct seg_header));
cb3634a259a2944 John Ousterhout 2024-11-11 143 gso_size = max_seg_data + sizeof(struct seg_header);
cb3634a259a2944 John Ousterhout 2024-11-11 144 err = homa_fill_data_interleaved(rpc, skb, iter);
cb3634a259a2944 John Ousterhout 2024-11-11 145 } else {
cb3634a259a2944 John Ousterhout 2024-11-11 146 gso_size = max_seg_data;
cb3634a259a2944 John Ousterhout 2024-11-11 147 err = homa_skb_append_from_iter(rpc->hsk->homa, skb, iter,
cb3634a259a2944 John Ousterhout 2024-11-11 148 length);
cb3634a259a2944 John Ousterhout 2024-11-11 149 }
cb3634a259a2944 John Ousterhout 2024-11-11 150 if (err)
cb3634a259a2944 John Ousterhout 2024-11-11 151 goto error;
cb3634a259a2944 John Ousterhout 2024-11-11 152
cb3634a259a2944 John Ousterhout 2024-11-11 153 if (segs > 1) {
cb3634a259a2944 John Ousterhout 2024-11-11 154 skb_shinfo(skb)->gso_segs = segs;
cb3634a259a2944 John Ousterhout 2024-11-11 155 skb_shinfo(skb)->gso_size = gso_size;
cb3634a259a2944 John Ousterhout 2024-11-11 156
cb3634a259a2944 John Ousterhout 2024-11-11 157 /* It's unclear what gso_type should be used to force software
cb3634a259a2944 John Ousterhout 2024-11-11 158 * GSO; the value below seems to work...
cb3634a259a2944 John Ousterhout 2024-11-11 159 */
cb3634a259a2944 John Ousterhout 2024-11-11 160 skb_shinfo(skb)->gso_type =
cb3634a259a2944 John Ousterhout 2024-11-11 161 rpc->hsk->homa->gso_force_software ? 0xd : SKB_GSO_TCPV6;
cb3634a259a2944 John Ousterhout 2024-11-11 162 }
cb3634a259a2944 John Ousterhout 2024-11-11 163 return skb;
cb3634a259a2944 John Ousterhout 2024-11-11 164
cb3634a259a2944 John Ousterhout 2024-11-11 165 error:
cb3634a259a2944 John Ousterhout 2024-11-11 166 homa_skb_free_tx(rpc->hsk->homa, skb);
cb3634a259a2944 John Ousterhout 2024-11-11 167 return ERR_PTR(err);
cb3634a259a2944 John Ousterhout 2024-11-11 168 }
cb3634a259a2944 John Ousterhout 2024-11-11 169
cb3634a259a2944 John Ousterhout 2024-11-11 170 /**
cb3634a259a2944 John Ousterhout 2024-11-11 171 * homa_message_out_fill() - Initializes information for sending a message
cb3634a259a2944 John Ousterhout 2024-11-11 172 * for an RPC (either request or response); copies the message data from
cb3634a259a2944 John Ousterhout 2024-11-11 173 * user space and (possibly) begins transmitting the message.
cb3634a259a2944 John Ousterhout 2024-11-11 174 * @rpc: RPC for which to send message; this function must not
cb3634a259a2944 John Ousterhout 2024-11-11 175 * previously have been called for the RPC. Must be locked. The RPC
cb3634a259a2944 John Ousterhout 2024-11-11 176 * will be unlocked while copying data, but will be locked again
cb3634a259a2944 John Ousterhout 2024-11-11 177 * before returning.
cb3634a259a2944 John Ousterhout 2024-11-11 178 * @iter: Describes location(s) of message data in user space.
cb3634a259a2944 John Ousterhout 2024-11-11 179 * @xmit: Nonzero means this method should start transmitting packets;
cb3634a259a2944 John Ousterhout 2024-11-11 180 * transmission will be overlapped with copying from user space.
cb3634a259a2944 John Ousterhout 2024-11-11 181 * Zero means the caller will initiate transmission after this
cb3634a259a2944 John Ousterhout 2024-11-11 182 * function returns.
cb3634a259a2944 John Ousterhout 2024-11-11 183 *
cb3634a259a2944 John Ousterhout 2024-11-11 184 * Return: 0 for success, or a negative errno for failure. It is possible
cb3634a259a2944 John Ousterhout 2024-11-11 185 * for the RPC to be freed while this function is active. If that
cb3634a259a2944 John Ousterhout 2024-11-11 186 * happens, copying will cease, -EINVAL will be returned, and
cb3634a259a2944 John Ousterhout 2024-11-11 187 * rpc->state will be RPC_DEAD.
cb3634a259a2944 John Ousterhout 2024-11-11 188 */
cb3634a259a2944 John Ousterhout 2024-11-11 189 int homa_message_out_fill(struct homa_rpc *rpc, struct iov_iter *iter, int xmit)
cb3634a259a2944 John Ousterhout 2024-11-11 190 __releases(&rpc->bucket->lock)
cb3634a259a2944 John Ousterhout 2024-11-11 191 __acquires(&rpc->bucket->lock)
cb3634a259a2944 John Ousterhout 2024-11-11 192 {
cb3634a259a2944 John Ousterhout 2024-11-11 193 /* Geometry information for packets:
cb3634a259a2944 John Ousterhout 2024-11-11 194 * mtu: largest size for an on-the-wire packet (including
cb3634a259a2944 John Ousterhout 2024-11-11 195 * all headers through IP header, but not Ethernet
cb3634a259a2944 John Ousterhout 2024-11-11 196 * header).
cb3634a259a2944 John Ousterhout 2024-11-11 197 * max_seg_data: largest amount of Homa message data that fits
cb3634a259a2944 John Ousterhout 2024-11-11 198 * in an on-the-wire packet (after segmentation).
cb3634a259a2944 John Ousterhout 2024-11-11 199 * max_gso_data: largest amount of Homa message data that fits
cb3634a259a2944 John Ousterhout 2024-11-11 200 * in a GSO packet (before segmentation).
cb3634a259a2944 John Ousterhout 2024-11-11 201 */
cb3634a259a2944 John Ousterhout 2024-11-11 202 int mtu, max_seg_data, max_gso_data;
cb3634a259a2944 John Ousterhout 2024-11-11 203
cb3634a259a2944 John Ousterhout 2024-11-11 204 int overlap_xmit, segs_per_gso;
cb3634a259a2944 John Ousterhout 2024-11-11 205 struct sk_buff **last_link;
cb3634a259a2944 John Ousterhout 2024-11-11 206 struct dst_entry *dst;
cb3634a259a2944 John Ousterhout 2024-11-11 207
cb3634a259a2944 John Ousterhout 2024-11-11 208 /* Bytes of the message that haven't yet been copied into skbs. */
cb3634a259a2944 John Ousterhout 2024-11-11 209 int bytes_left;
cb3634a259a2944 John Ousterhout 2024-11-11 210
cb3634a259a2944 John Ousterhout 2024-11-11 211 int gso_size;
cb3634a259a2944 John Ousterhout 2024-11-11 212 int err;
cb3634a259a2944 John Ousterhout 2024-11-11 213
cb3634a259a2944 John Ousterhout 2024-11-11 214 homa_message_out_init(rpc, iter->count);
cb3634a259a2944 John Ousterhout 2024-11-11 215 if (unlikely(rpc->msgout.length > HOMA_MAX_MESSAGE_LENGTH ||
cb3634a259a2944 John Ousterhout 2024-11-11 216 rpc->msgout.length == 0)) {
cb3634a259a2944 John Ousterhout 2024-11-11 217 err = -EINVAL;
cb3634a259a2944 John Ousterhout 2024-11-11 218 goto error;
cb3634a259a2944 John Ousterhout 2024-11-11 219 }
cb3634a259a2944 John Ousterhout 2024-11-11 220
cb3634a259a2944 John Ousterhout 2024-11-11 221 /* Compute the geometry of packets. */
cb3634a259a2944 John Ousterhout 2024-11-11 222 dst = homa_get_dst(rpc->peer, rpc->hsk);
cb3634a259a2944 John Ousterhout 2024-11-11 223 mtu = dst_mtu(dst);
cb3634a259a2944 John Ousterhout 2024-11-11 224 max_seg_data = mtu - rpc->hsk->ip_header_length
cb3634a259a2944 John Ousterhout 2024-11-11 225 - sizeof(struct data_header);
cb3634a259a2944 John Ousterhout 2024-11-11 226 gso_size = dst->dev->gso_max_size;
cb3634a259a2944 John Ousterhout 2024-11-11 227 if (gso_size > rpc->hsk->homa->max_gso_size)
cb3634a259a2944 John Ousterhout 2024-11-11 228 gso_size = rpc->hsk->homa->max_gso_size;
cb3634a259a2944 John Ousterhout 2024-11-11 229
cb3634a259a2944 John Ousterhout 2024-11-11 230 /* Round gso_size down to an even # of mtus. */
cb3634a259a2944 John Ousterhout 2024-11-11 231 segs_per_gso = gso_size - rpc->hsk->ip_header_length
cb3634a259a2944 John Ousterhout 2024-11-11 232 - sizeof(struct data_header);
cb3634a259a2944 John Ousterhout 2024-11-11 @233 do_div(segs_per_gso, max_seg_data);
cb3634a259a2944 John Ousterhout 2024-11-11 234 if (segs_per_gso == 0)
cb3634a259a2944 John Ousterhout 2024-11-11 235 segs_per_gso = 1;
cb3634a259a2944 John Ousterhout 2024-11-11 236 max_gso_data = segs_per_gso * max_seg_data;
cb3634a259a2944 John Ousterhout 2024-11-11 237
cb3634a259a2944 John Ousterhout 2024-11-11 238 overlap_xmit = rpc->msgout.length > 2 * max_gso_data;
cb3634a259a2944 John Ousterhout 2024-11-11 239 atomic_or(RPC_COPYING_FROM_USER, &rpc->flags);
cb3634a259a2944 John Ousterhout 2024-11-11 240 homa_skb_stash_pages(rpc->hsk->homa, rpc->msgout.length);
cb3634a259a2944 John Ousterhout 2024-11-11 241
cb3634a259a2944 John Ousterhout 2024-11-11 242 /* Each iteration of the loop below creates one GSO packet. */
cb3634a259a2944 John Ousterhout 2024-11-11 243 last_link = &rpc->msgout.packets;
cb3634a259a2944 John Ousterhout 2024-11-11 244 for (bytes_left = rpc->msgout.length; bytes_left > 0; ) {
cb3634a259a2944 John Ousterhout 2024-11-11 245 int skb_data_bytes, offset;
cb3634a259a2944 John Ousterhout 2024-11-11 246 struct sk_buff *skb;
cb3634a259a2944 John Ousterhout 2024-11-11 247
cb3634a259a2944 John Ousterhout 2024-11-11 248 homa_rpc_unlock(rpc);
cb3634a259a2944 John Ousterhout 2024-11-11 249 skb_data_bytes = max_gso_data;
cb3634a259a2944 John Ousterhout 2024-11-11 250 offset = rpc->msgout.length - bytes_left;
cb3634a259a2944 John Ousterhout 2024-11-11 251 if (skb_data_bytes > bytes_left)
cb3634a259a2944 John Ousterhout 2024-11-11 252 skb_data_bytes = bytes_left;
cb3634a259a2944 John Ousterhout 2024-11-11 253 skb = homa_new_data_packet(rpc, iter, offset, skb_data_bytes,
cb3634a259a2944 John Ousterhout 2024-11-11 254 max_seg_data);
cb3634a259a2944 John Ousterhout 2024-11-11 255 if (unlikely(!skb)) {
cb3634a259a2944 John Ousterhout 2024-11-11 256 err = PTR_ERR(skb);
cb3634a259a2944 John Ousterhout 2024-11-11 257 homa_rpc_lock(rpc, "homa_message_out_fill");
cb3634a259a2944 John Ousterhout 2024-11-11 258 goto error;
cb3634a259a2944 John Ousterhout 2024-11-11 259 }
cb3634a259a2944 John Ousterhout 2024-11-11 260 bytes_left -= skb_data_bytes;
cb3634a259a2944 John Ousterhout 2024-11-11 261
cb3634a259a2944 John Ousterhout 2024-11-11 262 homa_rpc_lock(rpc, "homa_message_out_fill2");
cb3634a259a2944 John Ousterhout 2024-11-11 263 if (rpc->state == RPC_DEAD) {
cb3634a259a2944 John Ousterhout 2024-11-11 264 /* RPC was freed while we were copying. */
cb3634a259a2944 John Ousterhout 2024-11-11 265 err = -EINVAL;
cb3634a259a2944 John Ousterhout 2024-11-11 266 homa_skb_free_tx(rpc->hsk->homa, skb);
cb3634a259a2944 John Ousterhout 2024-11-11 267 goto error;
cb3634a259a2944 John Ousterhout 2024-11-11 268 }
cb3634a259a2944 John Ousterhout 2024-11-11 269 *last_link = skb;
cb3634a259a2944 John Ousterhout 2024-11-11 270 last_link = &(homa_get_skb_info(skb)->next_skb);
cb3634a259a2944 John Ousterhout 2024-11-11 271 *last_link = NULL;
cb3634a259a2944 John Ousterhout 2024-11-11 272 rpc->msgout.num_skbs++;
cb3634a259a2944 John Ousterhout 2024-11-11 273 rpc->msgout.copied_from_user = rpc->msgout.length - bytes_left;
cb3634a259a2944 John Ousterhout 2024-11-11 274 if (overlap_xmit && list_empty(&rpc->throttled_links) && xmit)
cb3634a259a2944 John Ousterhout 2024-11-11 275 homa_add_to_throttled(rpc);
cb3634a259a2944 John Ousterhout 2024-11-11 276 }
cb3634a259a2944 John Ousterhout 2024-11-11 277 atomic_andnot(RPC_COPYING_FROM_USER, &rpc->flags);
cb3634a259a2944 John Ousterhout 2024-11-11 278 if (!overlap_xmit && xmit)
cb3634a259a2944 John Ousterhout 2024-11-11 279 homa_xmit_data(rpc, false);
cb3634a259a2944 John Ousterhout 2024-11-11 280 return 0;
cb3634a259a2944 John Ousterhout 2024-11-11 281
cb3634a259a2944 John Ousterhout 2024-11-11 282 error:
cb3634a259a2944 John Ousterhout 2024-11-11 283 atomic_andnot(RPC_COPYING_FROM_USER, &rpc->flags);
cb3634a259a2944 John Ousterhout 2024-11-11 284 return err;
cb3634a259a2944 John Ousterhout 2024-11-11 285 }
cb3634a259a2944 John Ousterhout 2024-11-11 286
--
0-DAY CI Kernel Test Service
https://github.com/intel/lkp-tests/wiki
Powered by blists - more mailing lists