[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

Re: [Xen-devel] [PATCH] netvm: check for page == NULL when propogating the skb->pfmemalloc flag



On Wed, Aug 22, 2012 at 11:26:47AM +0100, Ian Campbell wrote:
> On Wed, 2012-08-08 at 23:50 +0100, David Miller wrote:
> > Just use something like a call to __pskb_pull_tail(skb, len) and all
> > that other crap around that area can simply be deleted.
> 
> I think you mean something like this, which works for me, although I've
> only lightly tested it.
> 

I've tested it heavily and works great.

Tested-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
and I took a look at it too and:

Acked-by: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
> Ian.
> 
> 8<----------------------------------------
> 
> >From 9e47e3e87a33b45974448649a97859a479183041 Mon Sep 17 00:00:00 2001
> From: Ian Campbell <ian.campbell@xxxxxxxxxx>
> Date: Wed, 22 Aug 2012 10:15:29 +0100
> Subject: [PATCH] xen-netfront: use __pskb_pull_tail to ensure linear area is 
> big enough on RX
> 
> I'm slightly concerned by the "only in exceptional circumstances"
> comment on __pskb_pull_tail but the structure of an skb just created
> by netfront shouldn't hit any of the especially slow cases.
> 
> This approach still does slightly more work than the old way, since if
> we pull up the entire first frag we now have to shuffle everything
> down where before we just received into the right place in the first
> place.
> 
> Signed-off-by: Ian Campbell <ian.campbell@xxxxxxxxxx>
> Cc: Konrad Rzeszutek Wilk <konrad.wilk@xxxxxxxxxx>
> Cc: Jeremy Fitzhardinge <jeremy@xxxxxxxx>
> Cc: Mel Gorman <mgorman@xxxxxxx>
> Cc: xen-devel@xxxxxxxxxxxxxxxxxxx
> Cc: netdev@xxxxxxxxxxxxxxx
> Cc: linux-kernel@xxxxxxxxxxxxxxx
> ---
>  drivers/net/xen-netfront.c |   39 ++++++++++-----------------------------
>  1 files changed, 10 insertions(+), 29 deletions(-)
> 
> diff --git a/drivers/net/xen-netfront.c b/drivers/net/xen-netfront.c
> index 3089990..650f79a 100644
> --- a/drivers/net/xen-netfront.c
> +++ b/drivers/net/xen-netfront.c
> @@ -57,8 +57,7 @@
>  static const struct ethtool_ops xennet_ethtool_ops;
>  
>  struct netfront_cb {
> -     struct page *page;
> -     unsigned offset;
> +     int pull_to;
>  };
>  
>  #define NETFRONT_SKB_CB(skb) ((struct netfront_cb *)((skb)->cb))
> @@ -867,15 +866,9 @@ static int handle_incoming_queue(struct net_device *dev,
>       struct sk_buff *skb;
>  
>       while ((skb = __skb_dequeue(rxq)) != NULL) {
> -             struct page *page = NETFRONT_SKB_CB(skb)->page;
> -             void *vaddr = page_address(page);
> -             unsigned offset = NETFRONT_SKB_CB(skb)->offset;
> -
> -             memcpy(skb->data, vaddr + offset,
> -                    skb_headlen(skb));
> +             int pull_to = NETFRONT_SKB_CB(skb)->pull_to;
>  
> -             if (page != skb_frag_page(&skb_shinfo(skb)->frags[0]))
> -                     __free_page(page);
> +             __pskb_pull_tail(skb, pull_to - skb_headlen(skb));
>  
>               /* Ethernet work: Delayed to here as it peeks the header. */
>               skb->protocol = eth_type_trans(skb, dev);
> @@ -913,7 +906,6 @@ static int xennet_poll(struct napi_struct *napi, int 
> budget)
>       struct sk_buff_head errq;
>       struct sk_buff_head tmpq;
>       unsigned long flags;
> -     unsigned int len;
>       int err;
>  
>       spin_lock(&np->rx_lock);
> @@ -955,24 +947,13 @@ err:
>                       }
>               }
>  
> -             NETFRONT_SKB_CB(skb)->page =
> -                     skb_frag_page(&skb_shinfo(skb)->frags[0]);
> -             NETFRONT_SKB_CB(skb)->offset = rx->offset;
> -
> -             len = rx->status;
> -             if (len > RX_COPY_THRESHOLD)
> -                     len = RX_COPY_THRESHOLD;
> -             skb_put(skb, len);
> +             NETFRONT_SKB_CB(skb)->pull_to = rx->status;
> +             if (NETFRONT_SKB_CB(skb)->pull_to > RX_COPY_THRESHOLD)
> +                     NETFRONT_SKB_CB(skb)->pull_to = RX_COPY_THRESHOLD;
>  
> -             if (rx->status > len) {
> -                     skb_shinfo(skb)->frags[0].page_offset =
> -                             rx->offset + len;
> -                     skb_frag_size_set(&skb_shinfo(skb)->frags[0], 
> rx->status - len);
> -                     skb->data_len = rx->status - len;
> -             } else {
> -                     __skb_fill_page_desc(skb, 0, NULL, 0, 0);
> -                     skb_shinfo(skb)->nr_frags = 0;
> -             }
> +             skb_shinfo(skb)->frags[0].page_offset = rx->offset;
> +             skb_frag_size_set(&skb_shinfo(skb)->frags[0], rx->status);
> +             skb->data_len = rx->status;
>  
>               i = xennet_fill_frags(np, skb, &tmpq);
>  
> @@ -999,7 +980,7 @@ err:
>                * receive throughout using the standard receive
>                * buffer size was cut by 25%(!!!).
>                */
> -             skb->truesize += skb->data_len - (RX_COPY_THRESHOLD - len);
> +             skb->truesize += skb->data_len - RX_COPY_THRESHOLD;
>               skb->len += skb->data_len;
>  
>               if (rx->flags & XEN_NETRXF_csum_blank)
> -- 
> 1.7.2.5
> 
> 
> 
> --
> To unsubscribe, send a message with 'unsubscribe linux-mm' in
> the body to majordomo@xxxxxxxxxx  For more info on Linux MM,
> see: http://www.linux-mm.org/ .
> Don't email: <a href=mailto:"dont@xxxxxxxxx";> email@xxxxxxxxx </a>
> 

_______________________________________________
Xen-devel mailing list
Xen-devel@xxxxxxxxxxxxx
http://lists.xen.org/xen-devel


 


Rackspace

Lists.xenproject.org is hosted with RackSpace, monitoring our
servers 24x7x365 and backed by RackSpace's Fanatical Support®.