* [RFC][PATCHSET] reduce messing with iovecs in cifs
@ 2016-04-09 20:43 ` Al Viro
0 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:43 UTC (permalink / raw)
To: linux-cifs-u79uwXL29TY76Z2rM5mHXA; +Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA
Now that sendmsg/recvmsg do not mangle iovecs and are capable of
handling bvec-based ->msg_iter, we can seriously reduce the amount of PITA
in cifs. The series below is completely untested, and I would appreciate
comments/review/testing/etc.
I'll post the individual patches in followups; for those who prefer to use
git it can be found in
git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs.git sendmsg.cifs
1/6: [net] drop 'size' argument of sock_recvmsg()
should go via net-next; does what it says.
2/6: cifs: merge the hash calculation helpers
takes the common parts of {cifs,smb2,smb3}_calc_signature() into a
common helper.
3/6: cifs: quit playing games with draining iovecs
Switch smb_send_kvec() to passing msghdr (and thus iov_iter) and
make it use sock_sendmsg() - that allows to avoid draining iovecs, since
->msg_iter will be advanced properly and all we need is to keep it around
between the calls of sock_sendmsg(), rather than reinitializing it on each
loop iteration. The same thing allows to get rid of messing with kmap()
when sending the stuff in ->rq_pages[] - ITER_BVEC will do the right thing.
4/6: cifs: no need to wank with copying and advancing iovec on recvmsg side either
Similar to the previous - use sock_recvmsg() in cifs_readv_from_socket()
and there's no need to modify iovecs, or allocate a copy especially for
such modifications, etc.
5/6: cifs_readv_receive: use cifs_read_from_socket()
building a 1-element iovec array for cifs_readv_from_socket() is
an overkill - simple cifs_read_from_socket() will do just fine.
6/6: cifs: don't bother with kmap on read_pages side
Similar to the other half of 3/6: we can use ITER_BVEC for
read-into-page case. Just make cifs_readv_from_socket() take msghdr from
caller and use a helper that would feed it a bvec-backed ->msg_iter.
^ permalink raw reply [flat|nested] 31+ messages in thread
* [RFC][PATCHSET] reduce messing with iovecs in cifs
@ 2016-04-09 20:43 ` Al Viro
0 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:43 UTC (permalink / raw)
To: linux-cifs; +Cc: linux-kernel
Now that sendmsg/recvmsg do not mangle iovecs and are capable of
handling bvec-based ->msg_iter, we can seriously reduce the amount of PITA
in cifs. The series below is completely untested, and I would appreciate
comments/review/testing/etc.
I'll post the individual patches in followups; for those who prefer to use
git it can be found in
git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs.git sendmsg.cifs
1/6: [net] drop 'size' argument of sock_recvmsg()
should go via net-next; does what it says.
2/6: cifs: merge the hash calculation helpers
takes the common parts of {cifs,smb2,smb3}_calc_signature() into a
common helper.
3/6: cifs: quit playing games with draining iovecs
Switch smb_send_kvec() to passing msghdr (and thus iov_iter) and
make it use sock_sendmsg() - that allows to avoid draining iovecs, since
->msg_iter will be advanced properly and all we need is to keep it around
between the calls of sock_sendmsg(), rather than reinitializing it on each
loop iteration. The same thing allows to get rid of messing with kmap()
when sending the stuff in ->rq_pages[] - ITER_BVEC will do the right thing.
4/6: cifs: no need to wank with copying and advancing iovec on recvmsg side either
Similar to the previous - use sock_recvmsg() in cifs_readv_from_socket()
and there's no need to modify iovecs, or allocate a copy especially for
such modifications, etc.
5/6: cifs_readv_receive: use cifs_read_from_socket()
building a 1-element iovec array for cifs_readv_from_socket() is
an overkill - simple cifs_read_from_socket() will do just fine.
6/6: cifs: don't bother with kmap on read_pages side
Similar to the other half of 3/6: we can use ITER_BVEC for
read-into-page case. Just make cifs_readv_from_socket() take msghdr from
caller and use a helper that would feed it a bvec-backed ->msg_iter.
^ permalink raw reply [flat|nested] 31+ messages in thread
* [PATCH 1/6] [net] drop 'size' argument of sock_recvmsg()
2016-04-09 20:43 ` Al Viro
@ 2016-04-09 20:50 ` Al Viro
-1 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:50 UTC (permalink / raw)
To: linux-cifs-u79uwXL29TY76Z2rM5mHXA; +Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA
all callers have it equal to msg_data_left(msg).
Signed-off-by: Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
---
drivers/target/iscsi/iscsi_target_util.c | 5 ++---
include/linux/net.h | 3 +--
net/socket.c | 23 ++++++++++-------------
3 files changed, 13 insertions(+), 18 deletions(-)
diff --git a/drivers/target/iscsi/iscsi_target_util.c b/drivers/target/iscsi/iscsi_target_util.c
index 428b0d9..5772038 100644
--- a/drivers/target/iscsi/iscsi_target_util.c
+++ b/drivers/target/iscsi/iscsi_target_util.c
@@ -1283,9 +1283,8 @@ static int iscsit_do_rx_data(
iov_iter_kvec(&msg.msg_iter, READ | ITER_KVEC,
count->iov, count->iov_count, data);
- while (total_rx < data) {
- rx_loop = sock_recvmsg(conn->sock, &msg,
- (data - total_rx), MSG_WAITALL);
+ while (msg_data_left(&msg)) {
+ rx_loop = sock_recvmsg(conn->sock, &msg, MSG_WAITALL);
if (rx_loop <= 0) {
pr_debug("rx_loop: %d total_rx: %d\n",
rx_loop, total_rx);
diff --git a/include/linux/net.h b/include/linux/net.h
index 49175e4..72c1e06 100644
--- a/include/linux/net.h
+++ b/include/linux/net.h
@@ -218,8 +218,7 @@ int sock_create_lite(int family, int type, int proto, struct socket **res);
struct socket *sock_alloc(void);
void sock_release(struct socket *sock);
int sock_sendmsg(struct socket *sock, struct msghdr *msg);
-int sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
- int flags);
+int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags);
struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname);
struct socket *sockfd_lookup(int fd, int *err);
struct socket *sock_from_file(struct file *file, int *err);
diff --git a/net/socket.c b/net/socket.c
index 5f77a8e..956426e3 100644
--- a/net/socket.c
+++ b/net/socket.c
@@ -709,17 +709,16 @@ void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
- size_t size, int flags)
+ int flags)
{
- return sock->ops->recvmsg(sock, msg, size, flags);
+ return sock->ops->recvmsg(sock, msg, msg_data_left(msg), flags);
}
-int sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
- int flags)
+int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
{
- int err = security_socket_recvmsg(sock, msg, size, flags);
+ int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
- return err ?: sock_recvmsg_nosec(sock, msg, size, flags);
+ return err ?: sock_recvmsg_nosec(sock, msg, flags);
}
EXPORT_SYMBOL(sock_recvmsg);
@@ -746,7 +745,7 @@ int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
iov_iter_kvec(&msg->msg_iter, READ | ITER_KVEC, vec, num, size);
set_fs(KERNEL_DS);
- result = sock_recvmsg(sock, msg, size, flags);
+ result = sock_recvmsg(sock, msg, flags);
set_fs(oldfs);
return result;
}
@@ -796,7 +795,7 @@ static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
if (!iov_iter_count(to)) /* Match SYS5 behaviour */
return 0;
- res = sock_recvmsg(sock, &msg, iov_iter_count(to), msg.msg_flags);
+ res = sock_recvmsg(sock, &msg, msg.msg_flags);
*to = msg.msg_iter;
return res;
}
@@ -1696,7 +1695,7 @@ SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
msg.msg_iocb = NULL;
if (sock->file->f_flags & O_NONBLOCK)
flags |= MSG_DONTWAIT;
- err = sock_recvmsg(sock, &msg, iov_iter_count(&msg.msg_iter), flags);
+ err = sock_recvmsg(sock, &msg, flags);
if (err >= 0 && addr != NULL) {
err2 = move_addr_to_user(&address,
@@ -2073,7 +2072,7 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
struct iovec iovstack[UIO_FASTIOV];
struct iovec *iov = iovstack;
unsigned long cmsg_ptr;
- int total_len, len;
+ int len;
ssize_t err;
/* kernel mode address */
@@ -2091,7 +2090,6 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
err = copy_msghdr_from_user(msg_sys, msg, &uaddr, &iov);
if (err < 0)
return err;
- total_len = iov_iter_count(&msg_sys->msg_iter);
cmsg_ptr = (unsigned long)msg_sys->msg_control;
msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
@@ -2101,8 +2099,7 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
if (sock->file->f_flags & O_NONBLOCK)
flags |= MSG_DONTWAIT;
- err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys,
- total_len, flags);
+ err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys, flags);
if (err < 0)
goto out_freeiov;
len = err;
--
2.8.0.rc3
^ permalink raw reply related [flat|nested] 31+ messages in thread
* [PATCH 1/6] [net] drop 'size' argument of sock_recvmsg()
@ 2016-04-09 20:50 ` Al Viro
0 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:50 UTC (permalink / raw)
To: linux-cifs; +Cc: linux-kernel
all callers have it equal to msg_data_left(msg).
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
---
drivers/target/iscsi/iscsi_target_util.c | 5 ++---
include/linux/net.h | 3 +--
net/socket.c | 23 ++++++++++-------------
3 files changed, 13 insertions(+), 18 deletions(-)
diff --git a/drivers/target/iscsi/iscsi_target_util.c b/drivers/target/iscsi/iscsi_target_util.c
index 428b0d9..5772038 100644
--- a/drivers/target/iscsi/iscsi_target_util.c
+++ b/drivers/target/iscsi/iscsi_target_util.c
@@ -1283,9 +1283,8 @@ static int iscsit_do_rx_data(
iov_iter_kvec(&msg.msg_iter, READ | ITER_KVEC,
count->iov, count->iov_count, data);
- while (total_rx < data) {
- rx_loop = sock_recvmsg(conn->sock, &msg,
- (data - total_rx), MSG_WAITALL);
+ while (msg_data_left(&msg)) {
+ rx_loop = sock_recvmsg(conn->sock, &msg, MSG_WAITALL);
if (rx_loop <= 0) {
pr_debug("rx_loop: %d total_rx: %d\n",
rx_loop, total_rx);
diff --git a/include/linux/net.h b/include/linux/net.h
index 49175e4..72c1e06 100644
--- a/include/linux/net.h
+++ b/include/linux/net.h
@@ -218,8 +218,7 @@ int sock_create_lite(int family, int type, int proto, struct socket **res);
struct socket *sock_alloc(void);
void sock_release(struct socket *sock);
int sock_sendmsg(struct socket *sock, struct msghdr *msg);
-int sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
- int flags);
+int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags);
struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname);
struct socket *sockfd_lookup(int fd, int *err);
struct socket *sock_from_file(struct file *file, int *err);
diff --git a/net/socket.c b/net/socket.c
index 5f77a8e..956426e3 100644
--- a/net/socket.c
+++ b/net/socket.c
@@ -709,17 +709,16 @@ void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
- size_t size, int flags)
+ int flags)
{
- return sock->ops->recvmsg(sock, msg, size, flags);
+ return sock->ops->recvmsg(sock, msg, msg_data_left(msg), flags);
}
-int sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
- int flags)
+int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
{
- int err = security_socket_recvmsg(sock, msg, size, flags);
+ int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
- return err ?: sock_recvmsg_nosec(sock, msg, size, flags);
+ return err ?: sock_recvmsg_nosec(sock, msg, flags);
}
EXPORT_SYMBOL(sock_recvmsg);
@@ -746,7 +745,7 @@ int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
iov_iter_kvec(&msg->msg_iter, READ | ITER_KVEC, vec, num, size);
set_fs(KERNEL_DS);
- result = sock_recvmsg(sock, msg, size, flags);
+ result = sock_recvmsg(sock, msg, flags);
set_fs(oldfs);
return result;
}
@@ -796,7 +795,7 @@ static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
if (!iov_iter_count(to)) /* Match SYS5 behaviour */
return 0;
- res = sock_recvmsg(sock, &msg, iov_iter_count(to), msg.msg_flags);
+ res = sock_recvmsg(sock, &msg, msg.msg_flags);
*to = msg.msg_iter;
return res;
}
@@ -1696,7 +1695,7 @@ SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
msg.msg_iocb = NULL;
if (sock->file->f_flags & O_NONBLOCK)
flags |= MSG_DONTWAIT;
- err = sock_recvmsg(sock, &msg, iov_iter_count(&msg.msg_iter), flags);
+ err = sock_recvmsg(sock, &msg, flags);
if (err >= 0 && addr != NULL) {
err2 = move_addr_to_user(&address,
@@ -2073,7 +2072,7 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
struct iovec iovstack[UIO_FASTIOV];
struct iovec *iov = iovstack;
unsigned long cmsg_ptr;
- int total_len, len;
+ int len;
ssize_t err;
/* kernel mode address */
@@ -2091,7 +2090,6 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
err = copy_msghdr_from_user(msg_sys, msg, &uaddr, &iov);
if (err < 0)
return err;
- total_len = iov_iter_count(&msg_sys->msg_iter);
cmsg_ptr = (unsigned long)msg_sys->msg_control;
msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
@@ -2101,8 +2099,7 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
if (sock->file->f_flags & O_NONBLOCK)
flags |= MSG_DONTWAIT;
- err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys,
- total_len, flags);
+ err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys, flags);
if (err < 0)
goto out_freeiov;
len = err;
--
2.8.0.rc3
^ permalink raw reply related [flat|nested] 31+ messages in thread
* [PATCH 2/6] cifs: merge the hash calculation helpers
2016-04-09 20:43 ` Al Viro
(?)
@ 2016-04-09 20:50 ` Al Viro
[not found] ` <20160409205056.GH25498-3bDd1+5oDREiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
2016-04-19 16:12 ` Jeff Layton
-1 siblings, 2 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:50 UTC (permalink / raw)
To: linux-cifs; +Cc: linux-kernel
three practically identical copies...
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
---
fs/cifs/cifsencrypt.c | 97 ++++++++++++++++++++++++-------------------
fs/cifs/cifsproto.h | 3 ++
fs/cifs/smb2transport.c | 107 +++++-------------------------------------------
3 files changed, 67 insertions(+), 140 deletions(-)
diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
index 4897dac..6aeb8d4 100644
--- a/fs/cifs/cifsencrypt.c
+++ b/fs/cifs/cifsencrypt.c
@@ -66,45 +66,15 @@ cifs_crypto_shash_md5_allocate(struct TCP_Server_Info *server)
return 0;
}
-/*
- * Calculate and return the CIFS signature based on the mac key and SMB PDU.
- * The 16 byte signature must be allocated by the caller. Note we only use the
- * 1st eight bytes and that the smb header signature field on input contains
- * the sequence number before this function is called. Also, this function
- * should be called with the server->srv_mutex held.
- */
-static int cifs_calc_signature(struct smb_rqst *rqst,
- struct TCP_Server_Info *server, char *signature)
+int __cifs_calc_signature(struct smb_rqst *rqst,
+ struct TCP_Server_Info *server, char *signature,
+ struct shash_desc *shash)
{
int i;
int rc;
struct kvec *iov = rqst->rq_iov;
int n_vec = rqst->rq_nvec;
- if (iov == NULL || signature == NULL || server == NULL)
- return -EINVAL;
-
- if (!server->secmech.sdescmd5) {
- rc = cifs_crypto_shash_md5_allocate(server);
- if (rc) {
- cifs_dbg(VFS, "%s: Can't alloc md5 crypto\n", __func__);
- return -1;
- }
- }
-
- rc = crypto_shash_init(&server->secmech.sdescmd5->shash);
- if (rc) {
- cifs_dbg(VFS, "%s: Could not init md5\n", __func__);
- return rc;
- }
-
- rc = crypto_shash_update(&server->secmech.sdescmd5->shash,
- server->session_key.response, server->session_key.len);
- if (rc) {
- cifs_dbg(VFS, "%s: Could not update with response\n", __func__);
- return rc;
- }
-
for (i = 0; i < n_vec; i++) {
if (iov[i].iov_len == 0)
continue;
@@ -117,12 +87,10 @@ static int cifs_calc_signature(struct smb_rqst *rqst,
if (i == 0) {
if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
break; /* nothing to sign or corrupt header */
- rc =
- crypto_shash_update(&server->secmech.sdescmd5->shash,
+ rc = crypto_shash_update(shash,
iov[i].iov_base + 4, iov[i].iov_len - 4);
} else {
- rc =
- crypto_shash_update(&server->secmech.sdescmd5->shash,
+ rc = crypto_shash_update(shash,
iov[i].iov_base, iov[i].iov_len);
}
if (rc) {
@@ -134,21 +102,64 @@ static int cifs_calc_signature(struct smb_rqst *rqst,
/* now hash over the rq_pages array */
for (i = 0; i < rqst->rq_npages; i++) {
- struct kvec p_iov;
+ void *kaddr = kmap(rqst->rq_pages[i]);
+ size_t len = rqst->rq_pagesz;
+
+ if (i == rqst->rq_npages - 1)
+ len = rqst->rq_tailsz;
+
+ crypto_shash_update(shash, kaddr, len);
- cifs_rqst_page_to_kvec(rqst, i, &p_iov);
- crypto_shash_update(&server->secmech.sdescmd5->shash,
- p_iov.iov_base, p_iov.iov_len);
kunmap(rqst->rq_pages[i]);
}
- rc = crypto_shash_final(&server->secmech.sdescmd5->shash, signature);
+ rc = crypto_shash_final(shash, signature);
if (rc)
- cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__);
+ cifs_dbg(VFS, "%s: Could not generate hash\n", __func__);
return rc;
}
+/*
+ * Calculate and return the CIFS signature based on the mac key and SMB PDU.
+ * The 16 byte signature must be allocated by the caller. Note we only use the
+ * 1st eight bytes and that the smb header signature field on input contains
+ * the sequence number before this function is called. Also, this function
+ * should be called with the server->srv_mutex held.
+ */
+static int cifs_calc_signature(struct smb_rqst *rqst,
+ struct TCP_Server_Info *server, char *signature)
+{
+ int rc;
+
+ if (!rqst->rq_iov || !signature || !server)
+ return -EINVAL;
+
+ if (!server->secmech.sdescmd5) {
+ rc = cifs_crypto_shash_md5_allocate(server);
+ if (rc) {
+ cifs_dbg(VFS, "%s: Can't alloc md5 crypto\n", __func__);
+ return -1;
+ }
+ }
+
+ rc = crypto_shash_init(&server->secmech.sdescmd5->shash);
+ if (rc) {
+ cifs_dbg(VFS, "%s: Could not init md5\n", __func__);
+ return rc;
+ }
+
+ rc = crypto_shash_update(&server->secmech.sdescmd5->shash,
+ server->session_key.response, server->session_key.len);
+ if (rc) {
+ cifs_dbg(VFS, "%s: Could not update with response\n", __func__);
+ return rc;
+ }
+
+ return __cifs_calc_signature(rqst, server, signature,
+ &server->secmech.sdescmd5->shash);
+}
+
/* must be called with server->srv_mutex held */
int cifs_sign_rqst(struct smb_rqst *rqst, struct TCP_Server_Info *server,
__u32 *pexpected_response_sequence_number)
diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
index eed7ff5..d9b4f44 100644
--- a/fs/cifs/cifsproto.h
+++ b/fs/cifs/cifsproto.h
@@ -512,4 +512,7 @@ int cifs_create_mf_symlink(unsigned int xid, struct cifs_tcon *tcon,
struct cifs_sb_info *cifs_sb,
const unsigned char *path, char *pbuf,
unsigned int *pbytes_written);
+int __cifs_calc_signature(struct smb_rqst *rqst,
+ struct TCP_Server_Info *server, char *signature,
+ struct shash_desc *shash);
#endif /* _CIFSPROTO_H */
diff --git a/fs/cifs/smb2transport.c b/fs/cifs/smb2transport.c
index 8732a43..bc9a7b6 100644
--- a/fs/cifs/smb2transport.c
+++ b/fs/cifs/smb2transport.c
@@ -135,11 +135,10 @@ smb2_find_smb_ses(struct smb2_hdr *smb2hdr, struct TCP_Server_Info *server)
int
smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
{
- int i, rc;
+ int rc;
unsigned char smb2_signature[SMB2_HMACSHA256_SIZE];
unsigned char *sigptr = smb2_signature;
struct kvec *iov = rqst->rq_iov;
- int n_vec = rqst->rq_nvec;
struct smb2_hdr *smb2_pdu = (struct smb2_hdr *)iov[0].iov_base;
struct cifs_ses *ses;
@@ -171,53 +170,11 @@ smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
return rc;
}
- for (i = 0; i < n_vec; i++) {
- if (iov[i].iov_len == 0)
- continue;
- if (iov[i].iov_base == NULL) {
- cifs_dbg(VFS, "null iovec entry\n");
- return -EIO;
- }
- /*
- * The first entry includes a length field (which does not get
- * signed that occupies the first 4 bytes before the header).
- */
- if (i == 0) {
- if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
- break; /* nothing to sign or corrupt header */
- rc =
- crypto_shash_update(
- &server->secmech.sdeschmacsha256->shash,
- iov[i].iov_base + 4, iov[i].iov_len - 4);
- } else {
- rc =
- crypto_shash_update(
- &server->secmech.sdeschmacsha256->shash,
- iov[i].iov_base, iov[i].iov_len);
- }
- if (rc) {
- cifs_dbg(VFS, "%s: Could not update with payload\n",
- __func__);
- return rc;
- }
- }
-
- /* now hash over the rq_pages array */
- for (i = 0; i < rqst->rq_npages; i++) {
- struct kvec p_iov;
-
- cifs_rqst_page_to_kvec(rqst, i, &p_iov);
- crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
- p_iov.iov_base, p_iov.iov_len);
- kunmap(rqst->rq_pages[i]);
- }
-
- rc = crypto_shash_final(&server->secmech.sdeschmacsha256->shash,
- sigptr);
- if (rc)
- cifs_dbg(VFS, "%s: Could not generate sha256 hash\n", __func__);
+ rc = __cifs_calc_signature(rqst, server, sigptr,
+ &server->secmech.sdeschmacsha256->shash);
- memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
+ if (!rc)
+ memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
return rc;
}
@@ -395,12 +352,10 @@ generate_smb311signingkey(struct cifs_ses *ses)
int
smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
{
- int i;
int rc = 0;
unsigned char smb3_signature[SMB2_CMACAES_SIZE];
unsigned char *sigptr = smb3_signature;
struct kvec *iov = rqst->rq_iov;
- int n_vec = rqst->rq_nvec;
struct smb2_hdr *smb2_pdu = (struct smb2_hdr *)iov[0].iov_base;
struct cifs_ses *ses;
@@ -431,54 +386,12 @@ smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
cifs_dbg(VFS, "%s: Could not init cmac aes\n", __func__);
return rc;
}
+
+ rc = __cifs_calc_signature(rqst, server, sigptr,
+ &server->secmech.sdesccmacaes->shash);
- for (i = 0; i < n_vec; i++) {
- if (iov[i].iov_len == 0)
- continue;
- if (iov[i].iov_base == NULL) {
- cifs_dbg(VFS, "null iovec entry");
- return -EIO;
- }
- /*
- * The first entry includes a length field (which does not get
- * signed that occupies the first 4 bytes before the header).
- */
- if (i == 0) {
- if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
- break; /* nothing to sign or corrupt header */
- rc =
- crypto_shash_update(
- &server->secmech.sdesccmacaes->shash,
- iov[i].iov_base + 4, iov[i].iov_len - 4);
- } else {
- rc =
- crypto_shash_update(
- &server->secmech.sdesccmacaes->shash,
- iov[i].iov_base, iov[i].iov_len);
- }
- if (rc) {
- cifs_dbg(VFS, "%s: Couldn't update cmac aes with payload\n",
- __func__);
- return rc;
- }
- }
-
- /* now hash over the rq_pages array */
- for (i = 0; i < rqst->rq_npages; i++) {
- struct kvec p_iov;
-
- cifs_rqst_page_to_kvec(rqst, i, &p_iov);
- crypto_shash_update(&server->secmech.sdesccmacaes->shash,
- p_iov.iov_base, p_iov.iov_len);
- kunmap(rqst->rq_pages[i]);
- }
-
- rc = crypto_shash_final(&server->secmech.sdesccmacaes->shash,
- sigptr);
- if (rc)
- cifs_dbg(VFS, "%s: Could not generate cmac aes\n", __func__);
-
- memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
+ if (!rc)
+ memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
return rc;
}
--
2.8.0.rc3
^ permalink raw reply related [flat|nested] 31+ messages in thread
* [PATCH 3/6] cifs: quit playing games with draining iovecs
2016-04-09 20:43 ` Al Viro
@ 2016-04-09 20:51 ` Al Viro
-1 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:51 UTC (permalink / raw)
To: linux-cifs-u79uwXL29TY76Z2rM5mHXA; +Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA
... and use ITER_BVEC for the page part of request to send
Signed-off-by: Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
---
fs/cifs/cifsproto.h | 2 -
fs/cifs/transport.c | 141 +++++++++++++++-------------------------------------
2 files changed, 41 insertions(+), 102 deletions(-)
diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
index d9b4f44..7d5f53a 100644
--- a/fs/cifs/cifsproto.h
+++ b/fs/cifs/cifsproto.h
@@ -37,8 +37,6 @@ extern void cifs_buf_release(void *);
extern struct smb_hdr *cifs_small_buf_get(void);
extern void cifs_small_buf_release(void *);
extern void free_rsp_buf(int, void *);
-extern void cifs_rqst_page_to_kvec(struct smb_rqst *rqst, unsigned int idx,
- struct kvec *iov);
extern int smb_send(struct TCP_Server_Info *, struct smb_hdr *,
unsigned int /* length */);
extern unsigned int _get_xid(void);
diff --git a/fs/cifs/transport.c b/fs/cifs/transport.c
index 87abe8e..206a597 100644
--- a/fs/cifs/transport.c
+++ b/fs/cifs/transport.c
@@ -124,41 +124,32 @@ cifs_delete_mid(struct mid_q_entry *mid)
/*
* smb_send_kvec - send an array of kvecs to the server
* @server: Server to send the data to
- * @iov: Pointer to array of kvecs
- * @n_vec: length of kvec array
+ * @smb_msg: Message to send
* @sent: amount of data sent on socket is stored here
*
* Our basic "send data to server" function. Should be called with srv_mutex
* held. The caller is responsible for handling the results.
*/
static int
-smb_send_kvec(struct TCP_Server_Info *server, struct kvec *iov, size_t n_vec,
- size_t *sent)
+smb_send_kvec(struct TCP_Server_Info *server, struct msghdr *smb_msg,
+ size_t *sent)
{
int rc = 0;
- int i = 0;
- struct msghdr smb_msg;
- unsigned int remaining;
- size_t first_vec = 0;
+ int retries = 0;
struct socket *ssocket = server->ssocket;
*sent = 0;
- smb_msg.msg_name = (struct sockaddr *) &server->dstaddr;
- smb_msg.msg_namelen = sizeof(struct sockaddr);
- smb_msg.msg_control = NULL;
- smb_msg.msg_controllen = 0;
+ smb_msg->msg_name = (struct sockaddr *) &server->dstaddr;
+ smb_msg->msg_namelen = sizeof(struct sockaddr);
+ smb_msg->msg_control = NULL;
+ smb_msg->msg_controllen = 0;
if (server->noblocksnd)
- smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
+ smb_msg->msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
else
- smb_msg.msg_flags = MSG_NOSIGNAL;
-
- remaining = 0;
- for (i = 0; i < n_vec; i++)
- remaining += iov[i].iov_len;
+ smb_msg->msg_flags = MSG_NOSIGNAL;
- i = 0;
- while (remaining) {
+ while (msg_data_left(smb_msg)) {
/*
* If blocking send, we try 3 times, since each can block
* for 5 seconds. For nonblocking we have to try more
@@ -177,35 +168,21 @@ smb_send_kvec(struct TCP_Server_Info *server, struct kvec *iov, size_t n_vec,
* after the retries we will kill the socket and
* reconnect which may clear the network problem.
*/
- rc = kernel_sendmsg(ssocket, &smb_msg, &iov[first_vec],
- n_vec - first_vec, remaining);
+ rc = sock_sendmsg(ssocket, smb_msg);
if (rc == -EAGAIN) {
- i++;
- if (i >= 14 || (!server->noblocksnd && (i > 2))) {
+ retries++;
+ if (retries >= 14 ||
+ (!server->noblocksnd && (retries > 2))) {
cifs_dbg(VFS, "sends on sock %p stuck for 15 seconds\n",
ssocket);
- rc = -EAGAIN;
- break;
+ return -EAGAIN;
}
- msleep(1 << i);
+ msleep(1 << retries);
continue;
}
if (rc < 0)
- break;
-
- /* send was at least partially successful */
- *sent += rc;
-
- if (rc == remaining) {
- remaining = 0;
- break;
- }
-
- if (rc > remaining) {
- cifs_dbg(VFS, "sent %d requested %d\n", rc, remaining);
- break;
- }
+ return rc;
if (rc == 0) {
/* should never happen, letting socket clear before
@@ -215,59 +192,11 @@ smb_send_kvec(struct TCP_Server_Info *server, struct kvec *iov, size_t n_vec,
continue;
}
- remaining -= rc;
-
- /* the line below resets i */
- for (i = first_vec; i < n_vec; i++) {
- if (iov[i].iov_len) {
- if (rc > iov[i].iov_len) {
- rc -= iov[i].iov_len;
- iov[i].iov_len = 0;
- } else {
- iov[i].iov_base += rc;
- iov[i].iov_len -= rc;
- first_vec = i;
- break;
- }
- }
- }
-
- i = 0; /* in case we get ENOSPC on the next send */
- rc = 0;
+ /* send was at least partially successful */
+ *sent += rc;
+ retries = 0; /* in case we get ENOSPC on the next send */
}
- return rc;
-}
-
-/**
- * rqst_page_to_kvec - Turn a slot in the smb_rqst page array into a kvec
- * @rqst: pointer to smb_rqst
- * @idx: index into the array of the page
- * @iov: pointer to struct kvec that will hold the result
- *
- * Helper function to convert a slot in the rqst->rq_pages array into a kvec.
- * The page will be kmapped and the address placed into iov_base. The length
- * will then be adjusted according to the ptailoff.
- */
-void
-cifs_rqst_page_to_kvec(struct smb_rqst *rqst, unsigned int idx,
- struct kvec *iov)
-{
- /*
- * FIXME: We could avoid this kmap altogether if we used
- * kernel_sendpage instead of kernel_sendmsg. That will only
- * work if signing is disabled though as sendpage inlines the
- * page directly into the fraglist. If userspace modifies the
- * page after we calculate the signature, then the server will
- * reject it and may break the connection. kernel_sendmsg does
- * an extra copy of the data and avoids that issue.
- */
- iov->iov_base = kmap(rqst->rq_pages[idx]);
-
- /* if last page, don't send beyond this offset into page */
- if (idx == (rqst->rq_npages - 1))
- iov->iov_len = rqst->rq_tailsz;
- else
- iov->iov_len = rqst->rq_pagesz;
+ return 0;
}
static unsigned long
@@ -299,8 +228,9 @@ smb_send_rqst(struct TCP_Server_Info *server, struct smb_rqst *rqst)
unsigned int smb_buf_length = get_rfc1002_length(iov[0].iov_base);
unsigned long send_length;
unsigned int i;
- size_t total_len = 0, sent;
+ size_t total_len = 0, sent, size;
struct socket *ssocket = server->ssocket;
+ struct msghdr smb_msg;
int val = 1;
if (ssocket == NULL)
@@ -321,7 +251,13 @@ smb_send_rqst(struct TCP_Server_Info *server, struct smb_rqst *rqst)
kernel_setsockopt(ssocket, SOL_TCP, TCP_CORK,
(char *)&val, sizeof(val));
- rc = smb_send_kvec(server, iov, n_vec, &sent);
+ size = 0;
+ for (i = 0; i < n_vec; i++)
+ size += iov[i].iov_len;
+
+ iov_iter_kvec(&smb_msg.msg_iter, WRITE | ITER_KVEC, iov, n_vec, size);
+
+ rc = smb_send_kvec(server, &smb_msg, &sent);
if (rc < 0)
goto uncork;
@@ -329,11 +265,16 @@ smb_send_rqst(struct TCP_Server_Info *server, struct smb_rqst *rqst)
/* now walk the page array and send each page in it */
for (i = 0; i < rqst->rq_npages; i++) {
- struct kvec p_iov;
-
- cifs_rqst_page_to_kvec(rqst, i, &p_iov);
- rc = smb_send_kvec(server, &p_iov, 1, &sent);
- kunmap(rqst->rq_pages[i]);
+ size_t len = i == rqst->rq_npages - 1
+ ? rqst->rq_tailsz
+ : rqst->rq_pagesz;
+ struct bio_vec bvec = {
+ .bv_page = rqst->rq_pages[i],
+ .bv_len = len
+ };
+ iov_iter_bvec(&smb_msg.msg_iter, WRITE | ITER_BVEC,
+ &bvec, 1, len);
+ rc = smb_send_kvec(server, &smb_msg, &sent);
if (rc < 0)
break;
--
2.8.0.rc3
^ permalink raw reply related [flat|nested] 31+ messages in thread
* [PATCH 3/6] cifs: quit playing games with draining iovecs
@ 2016-04-09 20:51 ` Al Viro
0 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:51 UTC (permalink / raw)
To: linux-cifs; +Cc: linux-kernel
... and use ITER_BVEC for the page part of request to send
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
---
fs/cifs/cifsproto.h | 2 -
fs/cifs/transport.c | 141 +++++++++++++++-------------------------------------
2 files changed, 41 insertions(+), 102 deletions(-)
diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
index d9b4f44..7d5f53a 100644
--- a/fs/cifs/cifsproto.h
+++ b/fs/cifs/cifsproto.h
@@ -37,8 +37,6 @@ extern void cifs_buf_release(void *);
extern struct smb_hdr *cifs_small_buf_get(void);
extern void cifs_small_buf_release(void *);
extern void free_rsp_buf(int, void *);
-extern void cifs_rqst_page_to_kvec(struct smb_rqst *rqst, unsigned int idx,
- struct kvec *iov);
extern int smb_send(struct TCP_Server_Info *, struct smb_hdr *,
unsigned int /* length */);
extern unsigned int _get_xid(void);
diff --git a/fs/cifs/transport.c b/fs/cifs/transport.c
index 87abe8e..206a597 100644
--- a/fs/cifs/transport.c
+++ b/fs/cifs/transport.c
@@ -124,41 +124,32 @@ cifs_delete_mid(struct mid_q_entry *mid)
/*
* smb_send_kvec - send an array of kvecs to the server
* @server: Server to send the data to
- * @iov: Pointer to array of kvecs
- * @n_vec: length of kvec array
+ * @smb_msg: Message to send
* @sent: amount of data sent on socket is stored here
*
* Our basic "send data to server" function. Should be called with srv_mutex
* held. The caller is responsible for handling the results.
*/
static int
-smb_send_kvec(struct TCP_Server_Info *server, struct kvec *iov, size_t n_vec,
- size_t *sent)
+smb_send_kvec(struct TCP_Server_Info *server, struct msghdr *smb_msg,
+ size_t *sent)
{
int rc = 0;
- int i = 0;
- struct msghdr smb_msg;
- unsigned int remaining;
- size_t first_vec = 0;
+ int retries = 0;
struct socket *ssocket = server->ssocket;
*sent = 0;
- smb_msg.msg_name = (struct sockaddr *) &server->dstaddr;
- smb_msg.msg_namelen = sizeof(struct sockaddr);
- smb_msg.msg_control = NULL;
- smb_msg.msg_controllen = 0;
+ smb_msg->msg_name = (struct sockaddr *) &server->dstaddr;
+ smb_msg->msg_namelen = sizeof(struct sockaddr);
+ smb_msg->msg_control = NULL;
+ smb_msg->msg_controllen = 0;
if (server->noblocksnd)
- smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
+ smb_msg->msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
else
- smb_msg.msg_flags = MSG_NOSIGNAL;
-
- remaining = 0;
- for (i = 0; i < n_vec; i++)
- remaining += iov[i].iov_len;
+ smb_msg->msg_flags = MSG_NOSIGNAL;
- i = 0;
- while (remaining) {
+ while (msg_data_left(smb_msg)) {
/*
* If blocking send, we try 3 times, since each can block
* for 5 seconds. For nonblocking we have to try more
@@ -177,35 +168,21 @@ smb_send_kvec(struct TCP_Server_Info *server, struct kvec *iov, size_t n_vec,
* after the retries we will kill the socket and
* reconnect which may clear the network problem.
*/
- rc = kernel_sendmsg(ssocket, &smb_msg, &iov[first_vec],
- n_vec - first_vec, remaining);
+ rc = sock_sendmsg(ssocket, smb_msg);
if (rc == -EAGAIN) {
- i++;
- if (i >= 14 || (!server->noblocksnd && (i > 2))) {
+ retries++;
+ if (retries >= 14 ||
+ (!server->noblocksnd && (retries > 2))) {
cifs_dbg(VFS, "sends on sock %p stuck for 15 seconds\n",
ssocket);
- rc = -EAGAIN;
- break;
+ return -EAGAIN;
}
- msleep(1 << i);
+ msleep(1 << retries);
continue;
}
if (rc < 0)
- break;
-
- /* send was at least partially successful */
- *sent += rc;
-
- if (rc == remaining) {
- remaining = 0;
- break;
- }
-
- if (rc > remaining) {
- cifs_dbg(VFS, "sent %d requested %d\n", rc, remaining);
- break;
- }
+ return rc;
if (rc == 0) {
/* should never happen, letting socket clear before
@@ -215,59 +192,11 @@ smb_send_kvec(struct TCP_Server_Info *server, struct kvec *iov, size_t n_vec,
continue;
}
- remaining -= rc;
-
- /* the line below resets i */
- for (i = first_vec; i < n_vec; i++) {
- if (iov[i].iov_len) {
- if (rc > iov[i].iov_len) {
- rc -= iov[i].iov_len;
- iov[i].iov_len = 0;
- } else {
- iov[i].iov_base += rc;
- iov[i].iov_len -= rc;
- first_vec = i;
- break;
- }
- }
- }
-
- i = 0; /* in case we get ENOSPC on the next send */
- rc = 0;
+ /* send was at least partially successful */
+ *sent += rc;
+ retries = 0; /* in case we get ENOSPC on the next send */
}
- return rc;
-}
-
-/**
- * rqst_page_to_kvec - Turn a slot in the smb_rqst page array into a kvec
- * @rqst: pointer to smb_rqst
- * @idx: index into the array of the page
- * @iov: pointer to struct kvec that will hold the result
- *
- * Helper function to convert a slot in the rqst->rq_pages array into a kvec.
- * The page will be kmapped and the address placed into iov_base. The length
- * will then be adjusted according to the ptailoff.
- */
-void
-cifs_rqst_page_to_kvec(struct smb_rqst *rqst, unsigned int idx,
- struct kvec *iov)
-{
- /*
- * FIXME: We could avoid this kmap altogether if we used
- * kernel_sendpage instead of kernel_sendmsg. That will only
- * work if signing is disabled though as sendpage inlines the
- * page directly into the fraglist. If userspace modifies the
- * page after we calculate the signature, then the server will
- * reject it and may break the connection. kernel_sendmsg does
- * an extra copy of the data and avoids that issue.
- */
- iov->iov_base = kmap(rqst->rq_pages[idx]);
-
- /* if last page, don't send beyond this offset into page */
- if (idx == (rqst->rq_npages - 1))
- iov->iov_len = rqst->rq_tailsz;
- else
- iov->iov_len = rqst->rq_pagesz;
+ return 0;
}
static unsigned long
@@ -299,8 +228,9 @@ smb_send_rqst(struct TCP_Server_Info *server, struct smb_rqst *rqst)
unsigned int smb_buf_length = get_rfc1002_length(iov[0].iov_base);
unsigned long send_length;
unsigned int i;
- size_t total_len = 0, sent;
+ size_t total_len = 0, sent, size;
struct socket *ssocket = server->ssocket;
+ struct msghdr smb_msg;
int val = 1;
if (ssocket == NULL)
@@ -321,7 +251,13 @@ smb_send_rqst(struct TCP_Server_Info *server, struct smb_rqst *rqst)
kernel_setsockopt(ssocket, SOL_TCP, TCP_CORK,
(char *)&val, sizeof(val));
- rc = smb_send_kvec(server, iov, n_vec, &sent);
+ size = 0;
+ for (i = 0; i < n_vec; i++)
+ size += iov[i].iov_len;
+
+ iov_iter_kvec(&smb_msg.msg_iter, WRITE | ITER_KVEC, iov, n_vec, size);
+
+ rc = smb_send_kvec(server, &smb_msg, &sent);
if (rc < 0)
goto uncork;
@@ -329,11 +265,16 @@ smb_send_rqst(struct TCP_Server_Info *server, struct smb_rqst *rqst)
/* now walk the page array and send each page in it */
for (i = 0; i < rqst->rq_npages; i++) {
- struct kvec p_iov;
-
- cifs_rqst_page_to_kvec(rqst, i, &p_iov);
- rc = smb_send_kvec(server, &p_iov, 1, &sent);
- kunmap(rqst->rq_pages[i]);
+ size_t len = i == rqst->rq_npages - 1
+ ? rqst->rq_tailsz
+ : rqst->rq_pagesz;
+ struct bio_vec bvec = {
+ .bv_page = rqst->rq_pages[i],
+ .bv_len = len
+ };
+ iov_iter_bvec(&smb_msg.msg_iter, WRITE | ITER_BVEC,
+ &bvec, 1, len);
+ rc = smb_send_kvec(server, &smb_msg, &sent);
if (rc < 0)
break;
--
2.8.0.rc3
^ permalink raw reply related [flat|nested] 31+ messages in thread
* [PATCH 4/6] cifs: no need to wank with copying and advancing iovec on recvmsg side either
2016-04-09 20:43 ` Al Viro
@ 2016-04-09 20:52 ` Al Viro
-1 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:52 UTC (permalink / raw)
To: linux-cifs-u79uwXL29TY76Z2rM5mHXA; +Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA
Signed-off-by: Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
---
fs/cifs/cifsglob.h | 2 --
fs/cifs/connect.c | 72 ++++--------------------------------------------------
2 files changed, 5 insertions(+), 69 deletions(-)
diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
index d21da9f..df03c5e 100644
--- a/fs/cifs/cifsglob.h
+++ b/fs/cifs/cifsglob.h
@@ -615,8 +615,6 @@ struct TCP_Server_Info {
bool sec_mskerberos; /* supports legacy MS Kerberos */
bool large_buf; /* is current buffer large? */
struct delayed_work echo; /* echo ping workqueue job */
- struct kvec *iov; /* reusable kvec array for receives */
- unsigned int nr_iov; /* number of kvecs in array */
char *smallbuf; /* pointer to current "small" buffer */
char *bigbuf; /* pointer to current "big" buffer */
unsigned int total_read; /* total amount of data read in this pass */
diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
index a763cd3..eb42665 100644
--- a/fs/cifs/connect.c
+++ b/fs/cifs/connect.c
@@ -501,77 +501,20 @@ server_unresponsive(struct TCP_Server_Info *server)
return false;
}
-/*
- * kvec_array_init - clone a kvec array, and advance into it
- * @new: pointer to memory for cloned array
- * @iov: pointer to original array
- * @nr_segs: number of members in original array
- * @bytes: number of bytes to advance into the cloned array
- *
- * This function will copy the array provided in iov to a section of memory
- * and advance the specified number of bytes into the new array. It returns
- * the number of segments in the new array. "new" must be at least as big as
- * the original iov array.
- */
-static unsigned int
-kvec_array_init(struct kvec *new, struct kvec *iov, unsigned int nr_segs,
- size_t bytes)
-{
- size_t base = 0;
-
- while (bytes || !iov->iov_len) {
- int copy = min(bytes, iov->iov_len);
-
- bytes -= copy;
- base += copy;
- if (iov->iov_len == base) {
- iov++;
- nr_segs--;
- base = 0;
- }
- }
- memcpy(new, iov, sizeof(*iov) * nr_segs);
- new->iov_base += base;
- new->iov_len -= base;
- return nr_segs;
-}
-
-static struct kvec *
-get_server_iovec(struct TCP_Server_Info *server, unsigned int nr_segs)
-{
- struct kvec *new_iov;
-
- if (server->iov && nr_segs <= server->nr_iov)
- return server->iov;
-
- /* not big enough -- allocate a new one and release the old */
- new_iov = kmalloc(sizeof(*new_iov) * nr_segs, GFP_NOFS);
- if (new_iov) {
- kfree(server->iov);
- server->iov = new_iov;
- server->nr_iov = nr_segs;
- }
- return new_iov;
-}
-
int
cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
unsigned int nr_segs, unsigned int to_read)
{
int length = 0;
int total_read;
- unsigned int segs;
struct msghdr smb_msg;
- struct kvec *iov;
-
- iov = get_server_iovec(server, nr_segs);
- if (!iov)
- return -ENOMEM;
smb_msg.msg_control = NULL;
smb_msg.msg_controllen = 0;
+ iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC,
+ iov_orig, nr_segs, to_read);
- for (total_read = 0; to_read; total_read += length, to_read -= length) {
+ for (total_read = 0; msg_data_left(&smb_msg); total_read += length) {
try_to_freeze();
if (server_unresponsive(server)) {
@@ -579,10 +522,7 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
break;
}
- segs = kvec_array_init(iov, iov_orig, nr_segs, total_read);
-
- length = kernel_recvmsg(server->ssocket, &smb_msg,
- iov, segs, to_read, 0);
+ length = sock_recvmsg(server->ssocket, &smb_msg, 0);
if (server->tcpStatus == CifsExiting) {
total_read = -ESHUTDOWN;
@@ -603,8 +543,7 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
length = 0;
continue;
} else if (length <= 0) {
- cifs_dbg(FYI, "Received no data or error: expecting %d\n"
- "got %d", to_read, length);
+ cifs_dbg(FYI, "Received no data or error: %d\n", length);
cifs_reconnect(server);
total_read = -ECONNABORTED;
break;
@@ -783,7 +722,6 @@ static void clean_demultiplex_info(struct TCP_Server_Info *server)
}
kfree(server->hostname);
- kfree(server->iov);
kfree(server);
length = atomic_dec_return(&tcpSesAllocCount);
--
2.8.0.rc3
^ permalink raw reply related [flat|nested] 31+ messages in thread
* [PATCH 4/6] cifs: no need to wank with copying and advancing iovec on recvmsg side either
@ 2016-04-09 20:52 ` Al Viro
0 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:52 UTC (permalink / raw)
To: linux-cifs; +Cc: linux-kernel
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
---
fs/cifs/cifsglob.h | 2 --
fs/cifs/connect.c | 72 ++++--------------------------------------------------
2 files changed, 5 insertions(+), 69 deletions(-)
diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
index d21da9f..df03c5e 100644
--- a/fs/cifs/cifsglob.h
+++ b/fs/cifs/cifsglob.h
@@ -615,8 +615,6 @@ struct TCP_Server_Info {
bool sec_mskerberos; /* supports legacy MS Kerberos */
bool large_buf; /* is current buffer large? */
struct delayed_work echo; /* echo ping workqueue job */
- struct kvec *iov; /* reusable kvec array for receives */
- unsigned int nr_iov; /* number of kvecs in array */
char *smallbuf; /* pointer to current "small" buffer */
char *bigbuf; /* pointer to current "big" buffer */
unsigned int total_read; /* total amount of data read in this pass */
diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
index a763cd3..eb42665 100644
--- a/fs/cifs/connect.c
+++ b/fs/cifs/connect.c
@@ -501,77 +501,20 @@ server_unresponsive(struct TCP_Server_Info *server)
return false;
}
-/*
- * kvec_array_init - clone a kvec array, and advance into it
- * @new: pointer to memory for cloned array
- * @iov: pointer to original array
- * @nr_segs: number of members in original array
- * @bytes: number of bytes to advance into the cloned array
- *
- * This function will copy the array provided in iov to a section of memory
- * and advance the specified number of bytes into the new array. It returns
- * the number of segments in the new array. "new" must be at least as big as
- * the original iov array.
- */
-static unsigned int
-kvec_array_init(struct kvec *new, struct kvec *iov, unsigned int nr_segs,
- size_t bytes)
-{
- size_t base = 0;
-
- while (bytes || !iov->iov_len) {
- int copy = min(bytes, iov->iov_len);
-
- bytes -= copy;
- base += copy;
- if (iov->iov_len == base) {
- iov++;
- nr_segs--;
- base = 0;
- }
- }
- memcpy(new, iov, sizeof(*iov) * nr_segs);
- new->iov_base += base;
- new->iov_len -= base;
- return nr_segs;
-}
-
-static struct kvec *
-get_server_iovec(struct TCP_Server_Info *server, unsigned int nr_segs)
-{
- struct kvec *new_iov;
-
- if (server->iov && nr_segs <= server->nr_iov)
- return server->iov;
-
- /* not big enough -- allocate a new one and release the old */
- new_iov = kmalloc(sizeof(*new_iov) * nr_segs, GFP_NOFS);
- if (new_iov) {
- kfree(server->iov);
- server->iov = new_iov;
- server->nr_iov = nr_segs;
- }
- return new_iov;
-}
-
int
cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
unsigned int nr_segs, unsigned int to_read)
{
int length = 0;
int total_read;
- unsigned int segs;
struct msghdr smb_msg;
- struct kvec *iov;
-
- iov = get_server_iovec(server, nr_segs);
- if (!iov)
- return -ENOMEM;
smb_msg.msg_control = NULL;
smb_msg.msg_controllen = 0;
+ iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC,
+ iov_orig, nr_segs, to_read);
- for (total_read = 0; to_read; total_read += length, to_read -= length) {
+ for (total_read = 0; msg_data_left(&smb_msg); total_read += length) {
try_to_freeze();
if (server_unresponsive(server)) {
@@ -579,10 +522,7 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
break;
}
- segs = kvec_array_init(iov, iov_orig, nr_segs, total_read);
-
- length = kernel_recvmsg(server->ssocket, &smb_msg,
- iov, segs, to_read, 0);
+ length = sock_recvmsg(server->ssocket, &smb_msg, 0);
if (server->tcpStatus == CifsExiting) {
total_read = -ESHUTDOWN;
@@ -603,8 +543,7 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
length = 0;
continue;
} else if (length <= 0) {
- cifs_dbg(FYI, "Received no data or error: expecting %d\n"
- "got %d", to_read, length);
+ cifs_dbg(FYI, "Received no data or error: %d\n", length);
cifs_reconnect(server);
total_read = -ECONNABORTED;
break;
@@ -783,7 +722,6 @@ static void clean_demultiplex_info(struct TCP_Server_Info *server)
}
kfree(server->hostname);
- kfree(server->iov);
kfree(server);
length = atomic_dec_return(&tcpSesAllocCount);
--
2.8.0.rc3
^ permalink raw reply related [flat|nested] 31+ messages in thread
* [PATCH 5/6] cifs_readv_receive: use cifs_read_from_socket()
2016-04-09 20:43 ` Al Viro
@ 2016-04-09 20:52 ` Al Viro
-1 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:52 UTC (permalink / raw)
To: linux-cifs-u79uwXL29TY76Z2rM5mHXA; +Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA
Signed-off-by: Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
---
fs/cifs/cifssmb.c | 11 ++++-------
1 file changed, 4 insertions(+), 7 deletions(-)
diff --git a/fs/cifs/cifssmb.c b/fs/cifs/cifssmb.c
index 76fcb50..3da077a 100644
--- a/fs/cifs/cifssmb.c
+++ b/fs/cifs/cifssmb.c
@@ -1447,10 +1447,8 @@ cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
len = min_t(unsigned int, buflen, server->vals->read_rsp_size) -
HEADER_SIZE(server) + 1;
- rdata->iov.iov_base = buf + HEADER_SIZE(server) - 1;
- rdata->iov.iov_len = len;
-
- length = cifs_readv_from_socket(server, &rdata->iov, 1, len);
+ length = cifs_read_from_socket(server,
+ buf + HEADER_SIZE(server) - 1, len);
if (length < 0)
return length;
server->total_read += length;
@@ -1502,9 +1500,8 @@ cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
len = data_offset - server->total_read;
if (len > 0) {
/* read any junk before data into the rest of smallbuf */
- rdata->iov.iov_base = buf + server->total_read;
- rdata->iov.iov_len = len;
- length = cifs_readv_from_socket(server, &rdata->iov, 1, len);
+ length = cifs_read_from_socket(server,
+ buf + server->total_read, len);
if (length < 0)
return length;
server->total_read += length;
--
2.8.0.rc3
^ permalink raw reply related [flat|nested] 31+ messages in thread
* [PATCH 5/6] cifs_readv_receive: use cifs_read_from_socket()
@ 2016-04-09 20:52 ` Al Viro
0 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:52 UTC (permalink / raw)
To: linux-cifs; +Cc: linux-kernel
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
---
fs/cifs/cifssmb.c | 11 ++++-------
1 file changed, 4 insertions(+), 7 deletions(-)
diff --git a/fs/cifs/cifssmb.c b/fs/cifs/cifssmb.c
index 76fcb50..3da077a 100644
--- a/fs/cifs/cifssmb.c
+++ b/fs/cifs/cifssmb.c
@@ -1447,10 +1447,8 @@ cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
len = min_t(unsigned int, buflen, server->vals->read_rsp_size) -
HEADER_SIZE(server) + 1;
- rdata->iov.iov_base = buf + HEADER_SIZE(server) - 1;
- rdata->iov.iov_len = len;
-
- length = cifs_readv_from_socket(server, &rdata->iov, 1, len);
+ length = cifs_read_from_socket(server,
+ buf + HEADER_SIZE(server) - 1, len);
if (length < 0)
return length;
server->total_read += length;
@@ -1502,9 +1500,8 @@ cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
len = data_offset - server->total_read;
if (len > 0) {
/* read any junk before data into the rest of smallbuf */
- rdata->iov.iov_base = buf + server->total_read;
- rdata->iov.iov_len = len;
- length = cifs_readv_from_socket(server, &rdata->iov, 1, len);
+ length = cifs_read_from_socket(server,
+ buf + server->total_read, len);
if (length < 0)
return length;
server->total_read += length;
--
2.8.0.rc3
^ permalink raw reply related [flat|nested] 31+ messages in thread
* [PATCH 6/6] cifs: don't bother with kmap on read_pages side
2016-04-09 20:43 ` Al Viro
@ 2016-04-09 20:53 ` Al Viro
-1 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:53 UTC (permalink / raw)
To: linux-cifs-u79uwXL29TY76Z2rM5mHXA; +Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA
just do ITER_BVEC recvmsg
Signed-off-by: Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
---
fs/cifs/cifsproto.h | 7 +++---
fs/cifs/connect.c | 65 ++++++++++++++++++++++++++++-------------------------
fs/cifs/file.c | 53 ++++++++++++++-----------------------------
3 files changed, 55 insertions(+), 70 deletions(-)
diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
index 7d5f53a..0f9a6bc 100644
--- a/fs/cifs/cifsproto.h
+++ b/fs/cifs/cifsproto.h
@@ -179,10 +179,9 @@ extern int set_cifs_acl(struct cifs_ntsd *, __u32, struct inode *,
extern void dequeue_mid(struct mid_q_entry *mid, bool malformed);
extern int cifs_read_from_socket(struct TCP_Server_Info *server, char *buf,
- unsigned int to_read);
-extern int cifs_readv_from_socket(struct TCP_Server_Info *server,
- struct kvec *iov_orig, unsigned int nr_segs,
- unsigned int to_read);
+ unsigned int to_read);
+extern int cifs_read_page_from_socket(struct TCP_Server_Info *server,
+ struct page *page, unsigned int to_read);
extern void cifs_setup_cifs_sb(struct smb_vol *pvolume_info,
struct cifs_sb_info *cifs_sb);
extern int cifs_match_super(struct super_block *, void *);
diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
index eb42665..e33c5e0 100644
--- a/fs/cifs/connect.c
+++ b/fs/cifs/connect.c
@@ -501,39 +501,34 @@ server_unresponsive(struct TCP_Server_Info *server)
return false;
}
-int
-cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
- unsigned int nr_segs, unsigned int to_read)
+static int
+cifs_readv_from_socket(struct TCP_Server_Info *server, struct msghdr *smb_msg)
{
int length = 0;
int total_read;
- struct msghdr smb_msg;
- smb_msg.msg_control = NULL;
- smb_msg.msg_controllen = 0;
- iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC,
- iov_orig, nr_segs, to_read);
+ smb_msg->msg_control = NULL;
+ smb_msg->msg_controllen = 0;
- for (total_read = 0; msg_data_left(&smb_msg); total_read += length) {
+ for (total_read = 0; msg_data_left(smb_msg); total_read += length) {
try_to_freeze();
- if (server_unresponsive(server)) {
- total_read = -ECONNABORTED;
- break;
- }
+ if (server_unresponsive(server))
+ return -ECONNABORTED;
- length = sock_recvmsg(server->ssocket, &smb_msg, 0);
+ length = sock_recvmsg(server->ssocket, smb_msg, 0);
- if (server->tcpStatus == CifsExiting) {
- total_read = -ESHUTDOWN;
- break;
- } else if (server->tcpStatus == CifsNeedReconnect) {
+ if (server->tcpStatus == CifsExiting)
+ return -ESHUTDOWN;
+
+ if (server->tcpStatus == CifsNeedReconnect) {
cifs_reconnect(server);
- total_read = -ECONNABORTED;
- break;
- } else if (length == -ERESTARTSYS ||
- length == -EAGAIN ||
- length == -EINTR) {
+ return -ECONNABORTED;
+ }
+
+ if (length == -ERESTARTSYS ||
+ length == -EAGAIN ||
+ length == -EINTR) {
/*
* Minimum sleep to prevent looping, allowing socket
* to clear and app threads to set tcpStatus
@@ -542,11 +537,12 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
usleep_range(1000, 2000);
length = 0;
continue;
- } else if (length <= 0) {
+ }
+
+ if (length <= 0) {
cifs_dbg(FYI, "Received no data or error: %d\n", length);
cifs_reconnect(server);
- total_read = -ECONNABORTED;
- break;
+ return -ECONNABORTED;
}
}
return total_read;
@@ -556,12 +552,21 @@ int
cifs_read_from_socket(struct TCP_Server_Info *server, char *buf,
unsigned int to_read)
{
- struct kvec iov;
+ struct msghdr smb_msg;
+ struct kvec iov = {.iov_base = buf, .iov_len = to_read};
+ iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC, &iov, 1, to_read);
- iov.iov_base = buf;
- iov.iov_len = to_read;
+ return cifs_readv_from_socket(server, &smb_msg);
+}
- return cifs_readv_from_socket(server, &iov, 1, to_read);
+int
+cifs_read_page_from_socket(struct TCP_Server_Info *server, struct page *page,
+ unsigned int to_read)
+{
+ struct msghdr smb_msg;
+ struct bio_vec bv = {.bv_page = page, .bv_len = to_read};
+ iov_iter_bvec(&smb_msg.msg_iter, READ | ITER_BVEC, &bv, 1, to_read);
+ return cifs_readv_from_socket(server, &smb_msg);
}
static bool
diff --git a/fs/cifs/file.c b/fs/cifs/file.c
index ff882ae..0f71867 100644
--- a/fs/cifs/file.c
+++ b/fs/cifs/file.c
@@ -2855,39 +2855,31 @@ cifs_uncached_read_into_pages(struct TCP_Server_Info *server,
int result = 0;
unsigned int i;
unsigned int nr_pages = rdata->nr_pages;
- struct kvec iov;
rdata->got_bytes = 0;
rdata->tailsz = PAGE_SIZE;
for (i = 0; i < nr_pages; i++) {
struct page *page = rdata->pages[i];
+ size_t n;
- if (len >= PAGE_SIZE) {
- /* enough data to fill the page */
- iov.iov_base = kmap(page);
- iov.iov_len = PAGE_SIZE;
- cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
- i, iov.iov_base, iov.iov_len);
- len -= PAGE_SIZE;
- } else if (len > 0) {
- /* enough for partial page, fill and zero the rest */
- iov.iov_base = kmap(page);
- iov.iov_len = len;
- cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
- i, iov.iov_base, iov.iov_len);
- memset(iov.iov_base + len, '\0', PAGE_SIZE - len);
- rdata->tailsz = len;
- len = 0;
- } else {
+ if (len <= 0) {
/* no need to hold page hostage */
rdata->pages[i] = NULL;
rdata->nr_pages--;
put_page(page);
continue;
}
-
- result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
- kunmap(page);
+ n = len;
+ if (len >= PAGE_SIZE) {
+ /* enough data to fill the page */
+ n = PAGE_SIZE;
+ len -= n;
+ } else {
+ zero_user(page, len, PAGE_SIZE - len);
+ rdata->tailsz = len;
+ len = 0;
+ }
+ result = cifs_read_page_from_socket(server, page, n);
if (result < 0)
break;
@@ -3303,7 +3295,6 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
u64 eof;
pgoff_t eof_index;
unsigned int nr_pages = rdata->nr_pages;
- struct kvec iov;
/* determine the eof that the server (probably) has */
eof = CIFS_I(rdata->mapping->host)->server_eof;
@@ -3314,23 +3305,14 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
rdata->tailsz = PAGE_CACHE_SIZE;
for (i = 0; i < nr_pages; i++) {
struct page *page = rdata->pages[i];
+ size_t n = PAGE_CACHE_SIZE;
if (len >= PAGE_CACHE_SIZE) {
- /* enough data to fill the page */
- iov.iov_base = kmap(page);
- iov.iov_len = PAGE_CACHE_SIZE;
- cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
- i, page->index, iov.iov_base, iov.iov_len);
len -= PAGE_CACHE_SIZE;
} else if (len > 0) {
/* enough for partial page, fill and zero the rest */
- iov.iov_base = kmap(page);
- iov.iov_len = len;
- cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
- i, page->index, iov.iov_base, iov.iov_len);
- memset(iov.iov_base + len,
- '\0', PAGE_CACHE_SIZE - len);
- rdata->tailsz = len;
+ zero_user(page, len, PAGE_CACHE_SIZE - len);
+ n = rdata->tailsz = len;
len = 0;
} else if (page->index > eof_index) {
/*
@@ -3360,8 +3342,7 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
continue;
}
- result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
- kunmap(page);
+ result = cifs_read_page_from_socket(server, page, n);
if (result < 0)
break;
--
2.8.0.rc3
^ permalink raw reply related [flat|nested] 31+ messages in thread
* [PATCH 6/6] cifs: don't bother with kmap on read_pages side
@ 2016-04-09 20:53 ` Al Viro
0 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-09 20:53 UTC (permalink / raw)
To: linux-cifs; +Cc: linux-kernel
just do ITER_BVEC recvmsg
Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
---
fs/cifs/cifsproto.h | 7 +++---
fs/cifs/connect.c | 65 ++++++++++++++++++++++++++++-------------------------
fs/cifs/file.c | 53 ++++++++++++++-----------------------------
3 files changed, 55 insertions(+), 70 deletions(-)
diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
index 7d5f53a..0f9a6bc 100644
--- a/fs/cifs/cifsproto.h
+++ b/fs/cifs/cifsproto.h
@@ -179,10 +179,9 @@ extern int set_cifs_acl(struct cifs_ntsd *, __u32, struct inode *,
extern void dequeue_mid(struct mid_q_entry *mid, bool malformed);
extern int cifs_read_from_socket(struct TCP_Server_Info *server, char *buf,
- unsigned int to_read);
-extern int cifs_readv_from_socket(struct TCP_Server_Info *server,
- struct kvec *iov_orig, unsigned int nr_segs,
- unsigned int to_read);
+ unsigned int to_read);
+extern int cifs_read_page_from_socket(struct TCP_Server_Info *server,
+ struct page *page, unsigned int to_read);
extern void cifs_setup_cifs_sb(struct smb_vol *pvolume_info,
struct cifs_sb_info *cifs_sb);
extern int cifs_match_super(struct super_block *, void *);
diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
index eb42665..e33c5e0 100644
--- a/fs/cifs/connect.c
+++ b/fs/cifs/connect.c
@@ -501,39 +501,34 @@ server_unresponsive(struct TCP_Server_Info *server)
return false;
}
-int
-cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
- unsigned int nr_segs, unsigned int to_read)
+static int
+cifs_readv_from_socket(struct TCP_Server_Info *server, struct msghdr *smb_msg)
{
int length = 0;
int total_read;
- struct msghdr smb_msg;
- smb_msg.msg_control = NULL;
- smb_msg.msg_controllen = 0;
- iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC,
- iov_orig, nr_segs, to_read);
+ smb_msg->msg_control = NULL;
+ smb_msg->msg_controllen = 0;
- for (total_read = 0; msg_data_left(&smb_msg); total_read += length) {
+ for (total_read = 0; msg_data_left(smb_msg); total_read += length) {
try_to_freeze();
- if (server_unresponsive(server)) {
- total_read = -ECONNABORTED;
- break;
- }
+ if (server_unresponsive(server))
+ return -ECONNABORTED;
- length = sock_recvmsg(server->ssocket, &smb_msg, 0);
+ length = sock_recvmsg(server->ssocket, smb_msg, 0);
- if (server->tcpStatus == CifsExiting) {
- total_read = -ESHUTDOWN;
- break;
- } else if (server->tcpStatus == CifsNeedReconnect) {
+ if (server->tcpStatus == CifsExiting)
+ return -ESHUTDOWN;
+
+ if (server->tcpStatus == CifsNeedReconnect) {
cifs_reconnect(server);
- total_read = -ECONNABORTED;
- break;
- } else if (length == -ERESTARTSYS ||
- length == -EAGAIN ||
- length == -EINTR) {
+ return -ECONNABORTED;
+ }
+
+ if (length == -ERESTARTSYS ||
+ length == -EAGAIN ||
+ length == -EINTR) {
/*
* Minimum sleep to prevent looping, allowing socket
* to clear and app threads to set tcpStatus
@@ -542,11 +537,12 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
usleep_range(1000, 2000);
length = 0;
continue;
- } else if (length <= 0) {
+ }
+
+ if (length <= 0) {
cifs_dbg(FYI, "Received no data or error: %d\n", length);
cifs_reconnect(server);
- total_read = -ECONNABORTED;
- break;
+ return -ECONNABORTED;
}
}
return total_read;
@@ -556,12 +552,21 @@ int
cifs_read_from_socket(struct TCP_Server_Info *server, char *buf,
unsigned int to_read)
{
- struct kvec iov;
+ struct msghdr smb_msg;
+ struct kvec iov = {.iov_base = buf, .iov_len = to_read};
+ iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC, &iov, 1, to_read);
- iov.iov_base = buf;
- iov.iov_len = to_read;
+ return cifs_readv_from_socket(server, &smb_msg);
+}
- return cifs_readv_from_socket(server, &iov, 1, to_read);
+int
+cifs_read_page_from_socket(struct TCP_Server_Info *server, struct page *page,
+ unsigned int to_read)
+{
+ struct msghdr smb_msg;
+ struct bio_vec bv = {.bv_page = page, .bv_len = to_read};
+ iov_iter_bvec(&smb_msg.msg_iter, READ | ITER_BVEC, &bv, 1, to_read);
+ return cifs_readv_from_socket(server, &smb_msg);
}
static bool
diff --git a/fs/cifs/file.c b/fs/cifs/file.c
index ff882ae..0f71867 100644
--- a/fs/cifs/file.c
+++ b/fs/cifs/file.c
@@ -2855,39 +2855,31 @@ cifs_uncached_read_into_pages(struct TCP_Server_Info *server,
int result = 0;
unsigned int i;
unsigned int nr_pages = rdata->nr_pages;
- struct kvec iov;
rdata->got_bytes = 0;
rdata->tailsz = PAGE_SIZE;
for (i = 0; i < nr_pages; i++) {
struct page *page = rdata->pages[i];
+ size_t n;
- if (len >= PAGE_SIZE) {
- /* enough data to fill the page */
- iov.iov_base = kmap(page);
- iov.iov_len = PAGE_SIZE;
- cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
- i, iov.iov_base, iov.iov_len);
- len -= PAGE_SIZE;
- } else if (len > 0) {
- /* enough for partial page, fill and zero the rest */
- iov.iov_base = kmap(page);
- iov.iov_len = len;
- cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
- i, iov.iov_base, iov.iov_len);
- memset(iov.iov_base + len, '\0', PAGE_SIZE - len);
- rdata->tailsz = len;
- len = 0;
- } else {
+ if (len <= 0) {
/* no need to hold page hostage */
rdata->pages[i] = NULL;
rdata->nr_pages--;
put_page(page);
continue;
}
-
- result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
- kunmap(page);
+ n = len;
+ if (len >= PAGE_SIZE) {
+ /* enough data to fill the page */
+ n = PAGE_SIZE;
+ len -= n;
+ } else {
+ zero_user(page, len, PAGE_SIZE - len);
+ rdata->tailsz = len;
+ len = 0;
+ }
+ result = cifs_read_page_from_socket(server, page, n);
if (result < 0)
break;
@@ -3303,7 +3295,6 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
u64 eof;
pgoff_t eof_index;
unsigned int nr_pages = rdata->nr_pages;
- struct kvec iov;
/* determine the eof that the server (probably) has */
eof = CIFS_I(rdata->mapping->host)->server_eof;
@@ -3314,23 +3305,14 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
rdata->tailsz = PAGE_CACHE_SIZE;
for (i = 0; i < nr_pages; i++) {
struct page *page = rdata->pages[i];
+ size_t n = PAGE_CACHE_SIZE;
if (len >= PAGE_CACHE_SIZE) {
- /* enough data to fill the page */
- iov.iov_base = kmap(page);
- iov.iov_len = PAGE_CACHE_SIZE;
- cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
- i, page->index, iov.iov_base, iov.iov_len);
len -= PAGE_CACHE_SIZE;
} else if (len > 0) {
/* enough for partial page, fill and zero the rest */
- iov.iov_base = kmap(page);
- iov.iov_len = len;
- cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
- i, page->index, iov.iov_base, iov.iov_len);
- memset(iov.iov_base + len,
- '\0', PAGE_CACHE_SIZE - len);
- rdata->tailsz = len;
+ zero_user(page, len, PAGE_CACHE_SIZE - len);
+ n = rdata->tailsz = len;
len = 0;
} else if (page->index > eof_index) {
/*
@@ -3360,8 +3342,7 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
continue;
}
- result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
- kunmap(page);
+ result = cifs_read_page_from_socket(server, page, n);
if (result < 0)
break;
--
2.8.0.rc3
^ permalink raw reply related [flat|nested] 31+ messages in thread
* Re: [RFC][PATCHSET] reduce messing with iovecs in cifs
2016-04-09 20:43 ` Al Viro
@ 2016-04-11 2:43 ` Shirish Pargaonkar
-1 siblings, 0 replies; 31+ messages in thread
From: Shirish Pargaonkar @ 2016-04-11 2:43 UTC (permalink / raw)
To: Al Viro; +Cc: linux-cifs, LKML
Looking at the series. I briefly looked at 2/6 and looks correct but
would add tested-by once I test that patch
against a SMB server.
On Sat, Apr 9, 2016 at 3:43 PM, Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org> wrote:
> Now that sendmsg/recvmsg do not mangle iovecs and are capable of
> handling bvec-based ->msg_iter, we can seriously reduce the amount of PITA
> in cifs. The series below is completely untested, and I would appreciate
> comments/review/testing/etc.
>
> I'll post the individual patches in followups; for those who prefer to use
> git it can be found in
> git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs.git sendmsg.cifs
>
> 1/6: [net] drop 'size' argument of sock_recvmsg()
> should go via net-next; does what it says.
>
> 2/6: cifs: merge the hash calculation helpers
> takes the common parts of {cifs,smb2,smb3}_calc_signature() into a
> common helper.
>
> 3/6: cifs: quit playing games with draining iovecs
> Switch smb_send_kvec() to passing msghdr (and thus iov_iter) and
> make it use sock_sendmsg() - that allows to avoid draining iovecs, since
> ->msg_iter will be advanced properly and all we need is to keep it around
> between the calls of sock_sendmsg(), rather than reinitializing it on each
> loop iteration. The same thing allows to get rid of messing with kmap()
> when sending the stuff in ->rq_pages[] - ITER_BVEC will do the right thing.
>
> 4/6: cifs: no need to wank with copying and advancing iovec on recvmsg side either
> Similar to the previous - use sock_recvmsg() in cifs_readv_from_socket()
> and there's no need to modify iovecs, or allocate a copy especially for
> such modifications, etc.
>
> 5/6: cifs_readv_receive: use cifs_read_from_socket()
> building a 1-element iovec array for cifs_readv_from_socket() is
> an overkill - simple cifs_read_from_socket() will do just fine.
>
> 6/6: cifs: don't bother with kmap on read_pages side
> Similar to the other half of 3/6: we can use ITER_BVEC for
> read-into-page case. Just make cifs_readv_from_socket() take msghdr from
> caller and use a helper that would feed it a bvec-backed ->msg_iter.
> --
> To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
> the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [RFC][PATCHSET] reduce messing with iovecs in cifs
@ 2016-04-11 2:43 ` Shirish Pargaonkar
0 siblings, 0 replies; 31+ messages in thread
From: Shirish Pargaonkar @ 2016-04-11 2:43 UTC (permalink / raw)
To: Al Viro; +Cc: linux-cifs, LKML
Looking at the series. I briefly looked at 2/6 and looks correct but
would add tested-by once I test that patch
against a SMB server.
On Sat, Apr 9, 2016 at 3:43 PM, Al Viro <viro@zeniv.linux.org.uk> wrote:
> Now that sendmsg/recvmsg do not mangle iovecs and are capable of
> handling bvec-based ->msg_iter, we can seriously reduce the amount of PITA
> in cifs. The series below is completely untested, and I would appreciate
> comments/review/testing/etc.
>
> I'll post the individual patches in followups; for those who prefer to use
> git it can be found in
> git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs.git sendmsg.cifs
>
> 1/6: [net] drop 'size' argument of sock_recvmsg()
> should go via net-next; does what it says.
>
> 2/6: cifs: merge the hash calculation helpers
> takes the common parts of {cifs,smb2,smb3}_calc_signature() into a
> common helper.
>
> 3/6: cifs: quit playing games with draining iovecs
> Switch smb_send_kvec() to passing msghdr (and thus iov_iter) and
> make it use sock_sendmsg() - that allows to avoid draining iovecs, since
> ->msg_iter will be advanced properly and all we need is to keep it around
> between the calls of sock_sendmsg(), rather than reinitializing it on each
> loop iteration. The same thing allows to get rid of messing with kmap()
> when sending the stuff in ->rq_pages[] - ITER_BVEC will do the right thing.
>
> 4/6: cifs: no need to wank with copying and advancing iovec on recvmsg side either
> Similar to the previous - use sock_recvmsg() in cifs_readv_from_socket()
> and there's no need to modify iovecs, or allocate a copy especially for
> such modifications, etc.
>
> 5/6: cifs_readv_receive: use cifs_read_from_socket()
> building a 1-element iovec array for cifs_readv_from_socket() is
> an overkill - simple cifs_read_from_socket() will do just fine.
>
> 6/6: cifs: don't bother with kmap on read_pages side
> Similar to the other half of 3/6: we can use ITER_BVEC for
> read-into-page case. Just make cifs_readv_from_socket() take msghdr from
> caller and use a helper that would feed it a bvec-backed ->msg_iter.
> --
> To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 2/6] cifs: merge the hash calculation helpers
2016-04-09 20:50 ` [PATCH 2/6] cifs: merge the hash calculation helpers Al Viro
@ 2016-04-13 5:07 ` Shirish Pargaonkar
2016-04-19 16:12 ` Jeff Layton
1 sibling, 0 replies; 31+ messages in thread
From: Shirish Pargaonkar @ 2016-04-13 5:07 UTC (permalink / raw)
To: Al Viro; +Cc: linux-cifs, LKML
Looks correct.
Tested with -o vers=1.0, -o vers=2.0, and -o vers=2.1.
Will test using mount option vers=3.0 as soon as I find a server.
Reviewed-by: Shirish Pargaonkar <shirishpargaonkar-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
Tested-by: Shirish Pargaonkar <shirishpargaonkar-Re5JQEeQqe8AvxtiuMwx3w@public.gmane.org>
On Sat, Apr 9, 2016 at 3:50 PM, Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org> wrote:
> three practically identical copies...
>
> Signed-off-by: Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
> ---
> fs/cifs/cifsencrypt.c | 97 ++++++++++++++++++++++++-------------------
> fs/cifs/cifsproto.h | 3 ++
> fs/cifs/smb2transport.c | 107 +++++-------------------------------------------
> 3 files changed, 67 insertions(+), 140 deletions(-)
>
> diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
> index 4897dac..6aeb8d4 100644
> --- a/fs/cifs/cifsencrypt.c
> +++ b/fs/cifs/cifsencrypt.c
> @@ -66,45 +66,15 @@ cifs_crypto_shash_md5_allocate(struct TCP_Server_Info *server)
> return 0;
> }
>
> -/*
> - * Calculate and return the CIFS signature based on the mac key and SMB PDU.
> - * The 16 byte signature must be allocated by the caller. Note we only use the
> - * 1st eight bytes and that the smb header signature field on input contains
> - * the sequence number before this function is called. Also, this function
> - * should be called with the server->srv_mutex held.
> - */
> -static int cifs_calc_signature(struct smb_rqst *rqst,
> - struct TCP_Server_Info *server, char *signature)
> +int __cifs_calc_signature(struct smb_rqst *rqst,
> + struct TCP_Server_Info *server, char *signature,
> + struct shash_desc *shash)
> {
> int i;
> int rc;
> struct kvec *iov = rqst->rq_iov;
> int n_vec = rqst->rq_nvec;
>
> - if (iov == NULL || signature == NULL || server == NULL)
> - return -EINVAL;
> -
> - if (!server->secmech.sdescmd5) {
> - rc = cifs_crypto_shash_md5_allocate(server);
> - if (rc) {
> - cifs_dbg(VFS, "%s: Can't alloc md5 crypto\n", __func__);
> - return -1;
> - }
> - }
> -
> - rc = crypto_shash_init(&server->secmech.sdescmd5->shash);
> - if (rc) {
> - cifs_dbg(VFS, "%s: Could not init md5\n", __func__);
> - return rc;
> - }
> -
> - rc = crypto_shash_update(&server->secmech.sdescmd5->shash,
> - server->session_key.response, server->session_key.len);
> - if (rc) {
> - cifs_dbg(VFS, "%s: Could not update with response\n", __func__);
> - return rc;
> - }
> -
> for (i = 0; i < n_vec; i++) {
> if (iov[i].iov_len == 0)
> continue;
> @@ -117,12 +87,10 @@ static int cifs_calc_signature(struct smb_rqst *rqst,
> if (i == 0) {
> if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
> break; /* nothing to sign or corrupt header */
> - rc =
> - crypto_shash_update(&server->secmech.sdescmd5->shash,
> + rc = crypto_shash_update(shash,
> iov[i].iov_base + 4, iov[i].iov_len - 4);
> } else {
> - rc =
> - crypto_shash_update(&server->secmech.sdescmd5->shash,
> + rc = crypto_shash_update(shash,
> iov[i].iov_base, iov[i].iov_len);
> }
> if (rc) {
> @@ -134,21 +102,64 @@ static int cifs_calc_signature(struct smb_rqst *rqst,
>
> /* now hash over the rq_pages array */
> for (i = 0; i < rqst->rq_npages; i++) {
> - struct kvec p_iov;
> + void *kaddr = kmap(rqst->rq_pages[i]);
> + size_t len = rqst->rq_pagesz;
> +
> + if (i == rqst->rq_npages - 1)
> + len = rqst->rq_tailsz;
> +
> + crypto_shash_update(shash, kaddr, len);
>
> - cifs_rqst_page_to_kvec(rqst, i, &p_iov);
> - crypto_shash_update(&server->secmech.sdescmd5->shash,
> - p_iov.iov_base, p_iov.iov_len);
> kunmap(rqst->rq_pages[i]);
> }
>
> - rc = crypto_shash_final(&server->secmech.sdescmd5->shash, signature);
> + rc = crypto_shash_final(shash, signature);
> if (rc)
> - cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__);
> + cifs_dbg(VFS, "%s: Could not generate hash\n", __func__);
>
> return rc;
> }
>
> +/*
> + * Calculate and return the CIFS signature based on the mac key and SMB PDU.
> + * The 16 byte signature must be allocated by the caller. Note we only use the
> + * 1st eight bytes and that the smb header signature field on input contains
> + * the sequence number before this function is called. Also, this function
> + * should be called with the server->srv_mutex held.
> + */
> +static int cifs_calc_signature(struct smb_rqst *rqst,
> + struct TCP_Server_Info *server, char *signature)
> +{
> + int rc;
> +
> + if (!rqst->rq_iov || !signature || !server)
> + return -EINVAL;
> +
> + if (!server->secmech.sdescmd5) {
> + rc = cifs_crypto_shash_md5_allocate(server);
> + if (rc) {
> + cifs_dbg(VFS, "%s: Can't alloc md5 crypto\n", __func__);
> + return -1;
> + }
> + }
> +
> + rc = crypto_shash_init(&server->secmech.sdescmd5->shash);
> + if (rc) {
> + cifs_dbg(VFS, "%s: Could not init md5\n", __func__);
> + return rc;
> + }
> +
> + rc = crypto_shash_update(&server->secmech.sdescmd5->shash,
> + server->session_key.response, server->session_key.len);
> + if (rc) {
> + cifs_dbg(VFS, "%s: Could not update with response\n", __func__);
> + return rc;
> + }
> +
> + return __cifs_calc_signature(rqst, server, signature,
> + &server->secmech.sdescmd5->shash);
> +}
> +
> /* must be called with server->srv_mutex held */
> int cifs_sign_rqst(struct smb_rqst *rqst, struct TCP_Server_Info *server,
> __u32 *pexpected_response_sequence_number)
> diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
> index eed7ff5..d9b4f44 100644
> --- a/fs/cifs/cifsproto.h
> +++ b/fs/cifs/cifsproto.h
> @@ -512,4 +512,7 @@ int cifs_create_mf_symlink(unsigned int xid, struct cifs_tcon *tcon,
> struct cifs_sb_info *cifs_sb,
> const unsigned char *path, char *pbuf,
> unsigned int *pbytes_written);
> +int __cifs_calc_signature(struct smb_rqst *rqst,
> + struct TCP_Server_Info *server, char *signature,
> + struct shash_desc *shash);
> #endif /* _CIFSPROTO_H */
> diff --git a/fs/cifs/smb2transport.c b/fs/cifs/smb2transport.c
> index 8732a43..bc9a7b6 100644
> --- a/fs/cifs/smb2transport.c
> +++ b/fs/cifs/smb2transport.c
> @@ -135,11 +135,10 @@ smb2_find_smb_ses(struct smb2_hdr *smb2hdr, struct TCP_Server_Info *server)
> int
> smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> {
> - int i, rc;
> + int rc;
> unsigned char smb2_signature[SMB2_HMACSHA256_SIZE];
> unsigned char *sigptr = smb2_signature;
> struct kvec *iov = rqst->rq_iov;
> - int n_vec = rqst->rq_nvec;
> struct smb2_hdr *smb2_pdu = (struct smb2_hdr *)iov[0].iov_base;
> struct cifs_ses *ses;
>
> @@ -171,53 +170,11 @@ smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> return rc;
> }
>
> - for (i = 0; i < n_vec; i++) {
> - if (iov[i].iov_len == 0)
> - continue;
> - if (iov[i].iov_base == NULL) {
> - cifs_dbg(VFS, "null iovec entry\n");
> - return -EIO;
> - }
> - /*
> - * The first entry includes a length field (which does not get
> - * signed that occupies the first 4 bytes before the header).
> - */
> - if (i == 0) {
> - if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
> - break; /* nothing to sign or corrupt header */
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdeschmacsha256->shash,
> - iov[i].iov_base + 4, iov[i].iov_len - 4);
> - } else {
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdeschmacsha256->shash,
> - iov[i].iov_base, iov[i].iov_len);
> - }
> - if (rc) {
> - cifs_dbg(VFS, "%s: Could not update with payload\n",
> - __func__);
> - return rc;
> - }
> - }
> -
> - /* now hash over the rq_pages array */
> - for (i = 0; i < rqst->rq_npages; i++) {
> - struct kvec p_iov;
> -
> - cifs_rqst_page_to_kvec(rqst, i, &p_iov);
> - crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
> - p_iov.iov_base, p_iov.iov_len);
> - kunmap(rqst->rq_pages[i]);
> - }
> -
> - rc = crypto_shash_final(&server->secmech.sdeschmacsha256->shash,
> - sigptr);
> - if (rc)
> - cifs_dbg(VFS, "%s: Could not generate sha256 hash\n", __func__);
> + rc = __cifs_calc_signature(rqst, server, sigptr,
> + &server->secmech.sdeschmacsha256->shash);
>
> - memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
> + if (!rc)
> + memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
>
> return rc;
> }
> @@ -395,12 +352,10 @@ generate_smb311signingkey(struct cifs_ses *ses)
> int
> smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> {
> - int i;
> int rc = 0;
> unsigned char smb3_signature[SMB2_CMACAES_SIZE];
> unsigned char *sigptr = smb3_signature;
> struct kvec *iov = rqst->rq_iov;
> - int n_vec = rqst->rq_nvec;
> struct smb2_hdr *smb2_pdu = (struct smb2_hdr *)iov[0].iov_base;
> struct cifs_ses *ses;
>
> @@ -431,54 +386,12 @@ smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> cifs_dbg(VFS, "%s: Could not init cmac aes\n", __func__);
> return rc;
> }
> +
> + rc = __cifs_calc_signature(rqst, server, sigptr,
> + &server->secmech.sdesccmacaes->shash);
>
> - for (i = 0; i < n_vec; i++) {
> - if (iov[i].iov_len == 0)
> - continue;
> - if (iov[i].iov_base == NULL) {
> - cifs_dbg(VFS, "null iovec entry");
> - return -EIO;
> - }
> - /*
> - * The first entry includes a length field (which does not get
> - * signed that occupies the first 4 bytes before the header).
> - */
> - if (i == 0) {
> - if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
> - break; /* nothing to sign or corrupt header */
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdesccmacaes->shash,
> - iov[i].iov_base + 4, iov[i].iov_len - 4);
> - } else {
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdesccmacaes->shash,
> - iov[i].iov_base, iov[i].iov_len);
> - }
> - if (rc) {
> - cifs_dbg(VFS, "%s: Couldn't update cmac aes with payload\n",
> - __func__);
> - return rc;
> - }
> - }
> -
> - /* now hash over the rq_pages array */
> - for (i = 0; i < rqst->rq_npages; i++) {
> - struct kvec p_iov;
> -
> - cifs_rqst_page_to_kvec(rqst, i, &p_iov);
> - crypto_shash_update(&server->secmech.sdesccmacaes->shash,
> - p_iov.iov_base, p_iov.iov_len);
> - kunmap(rqst->rq_pages[i]);
> - }
> -
> - rc = crypto_shash_final(&server->secmech.sdesccmacaes->shash,
> - sigptr);
> - if (rc)
> - cifs_dbg(VFS, "%s: Could not generate cmac aes\n", __func__);
> -
> - memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
> + if (!rc)
> + memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
>
> return rc;
> }
> --
> 2.8.0.rc3
>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
> the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 2/6] cifs: merge the hash calculation helpers
@ 2016-04-13 5:07 ` Shirish Pargaonkar
0 siblings, 0 replies; 31+ messages in thread
From: Shirish Pargaonkar @ 2016-04-13 5:07 UTC (permalink / raw)
To: Al Viro; +Cc: linux-cifs, LKML
Looks correct.
Tested with -o vers=1.0, -o vers=2.0, and -o vers=2.1.
Will test using mount option vers=3.0 as soon as I find a server.
Reviewed-by: Shirish Pargaonkar <shirishpargaonkar@gmail.com>
Tested-by: Shirish Pargaonkar <shirishpargaonkar@gmail.com>
On Sat, Apr 9, 2016 at 3:50 PM, Al Viro <viro@zeniv.linux.org.uk> wrote:
> three practically identical copies...
>
> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
> ---
> fs/cifs/cifsencrypt.c | 97 ++++++++++++++++++++++++-------------------
> fs/cifs/cifsproto.h | 3 ++
> fs/cifs/smb2transport.c | 107 +++++-------------------------------------------
> 3 files changed, 67 insertions(+), 140 deletions(-)
>
> diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
> index 4897dac..6aeb8d4 100644
> --- a/fs/cifs/cifsencrypt.c
> +++ b/fs/cifs/cifsencrypt.c
> @@ -66,45 +66,15 @@ cifs_crypto_shash_md5_allocate(struct TCP_Server_Info *server)
> return 0;
> }
>
> -/*
> - * Calculate and return the CIFS signature based on the mac key and SMB PDU.
> - * The 16 byte signature must be allocated by the caller. Note we only use the
> - * 1st eight bytes and that the smb header signature field on input contains
> - * the sequence number before this function is called. Also, this function
> - * should be called with the server->srv_mutex held.
> - */
> -static int cifs_calc_signature(struct smb_rqst *rqst,
> - struct TCP_Server_Info *server, char *signature)
> +int __cifs_calc_signature(struct smb_rqst *rqst,
> + struct TCP_Server_Info *server, char *signature,
> + struct shash_desc *shash)
> {
> int i;
> int rc;
> struct kvec *iov = rqst->rq_iov;
> int n_vec = rqst->rq_nvec;
>
> - if (iov == NULL || signature == NULL || server == NULL)
> - return -EINVAL;
> -
> - if (!server->secmech.sdescmd5) {
> - rc = cifs_crypto_shash_md5_allocate(server);
> - if (rc) {
> - cifs_dbg(VFS, "%s: Can't alloc md5 crypto\n", __func__);
> - return -1;
> - }
> - }
> -
> - rc = crypto_shash_init(&server->secmech.sdescmd5->shash);
> - if (rc) {
> - cifs_dbg(VFS, "%s: Could not init md5\n", __func__);
> - return rc;
> - }
> -
> - rc = crypto_shash_update(&server->secmech.sdescmd5->shash,
> - server->session_key.response, server->session_key.len);
> - if (rc) {
> - cifs_dbg(VFS, "%s: Could not update with response\n", __func__);
> - return rc;
> - }
> -
> for (i = 0; i < n_vec; i++) {
> if (iov[i].iov_len == 0)
> continue;
> @@ -117,12 +87,10 @@ static int cifs_calc_signature(struct smb_rqst *rqst,
> if (i == 0) {
> if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
> break; /* nothing to sign or corrupt header */
> - rc =
> - crypto_shash_update(&server->secmech.sdescmd5->shash,
> + rc = crypto_shash_update(shash,
> iov[i].iov_base + 4, iov[i].iov_len - 4);
> } else {
> - rc =
> - crypto_shash_update(&server->secmech.sdescmd5->shash,
> + rc = crypto_shash_update(shash,
> iov[i].iov_base, iov[i].iov_len);
> }
> if (rc) {
> @@ -134,21 +102,64 @@ static int cifs_calc_signature(struct smb_rqst *rqst,
>
> /* now hash over the rq_pages array */
> for (i = 0; i < rqst->rq_npages; i++) {
> - struct kvec p_iov;
> + void *kaddr = kmap(rqst->rq_pages[i]);
> + size_t len = rqst->rq_pagesz;
> +
> + if (i == rqst->rq_npages - 1)
> + len = rqst->rq_tailsz;
> +
> + crypto_shash_update(shash, kaddr, len);
>
> - cifs_rqst_page_to_kvec(rqst, i, &p_iov);
> - crypto_shash_update(&server->secmech.sdescmd5->shash,
> - p_iov.iov_base, p_iov.iov_len);
> kunmap(rqst->rq_pages[i]);
> }
>
> - rc = crypto_shash_final(&server->secmech.sdescmd5->shash, signature);
> + rc = crypto_shash_final(shash, signature);
> if (rc)
> - cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__);
> + cifs_dbg(VFS, "%s: Could not generate hash\n", __func__);
>
> return rc;
> }
>
> +/*
> + * Calculate and return the CIFS signature based on the mac key and SMB PDU.
> + * The 16 byte signature must be allocated by the caller. Note we only use the
> + * 1st eight bytes and that the smb header signature field on input contains
> + * the sequence number before this function is called. Also, this function
> + * should be called with the server->srv_mutex held.
> + */
> +static int cifs_calc_signature(struct smb_rqst *rqst,
> + struct TCP_Server_Info *server, char *signature)
> +{
> + int rc;
> +
> + if (!rqst->rq_iov || !signature || !server)
> + return -EINVAL;
> +
> + if (!server->secmech.sdescmd5) {
> + rc = cifs_crypto_shash_md5_allocate(server);
> + if (rc) {
> + cifs_dbg(VFS, "%s: Can't alloc md5 crypto\n", __func__);
> + return -1;
> + }
> + }
> +
> + rc = crypto_shash_init(&server->secmech.sdescmd5->shash);
> + if (rc) {
> + cifs_dbg(VFS, "%s: Could not init md5\n", __func__);
> + return rc;
> + }
> +
> + rc = crypto_shash_update(&server->secmech.sdescmd5->shash,
> + server->session_key.response, server->session_key.len);
> + if (rc) {
> + cifs_dbg(VFS, "%s: Could not update with response\n", __func__);
> + return rc;
> + }
> +
> + return __cifs_calc_signature(rqst, server, signature,
> + &server->secmech.sdescmd5->shash);
> +}
> +
> /* must be called with server->srv_mutex held */
> int cifs_sign_rqst(struct smb_rqst *rqst, struct TCP_Server_Info *server,
> __u32 *pexpected_response_sequence_number)
> diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
> index eed7ff5..d9b4f44 100644
> --- a/fs/cifs/cifsproto.h
> +++ b/fs/cifs/cifsproto.h
> @@ -512,4 +512,7 @@ int cifs_create_mf_symlink(unsigned int xid, struct cifs_tcon *tcon,
> struct cifs_sb_info *cifs_sb,
> const unsigned char *path, char *pbuf,
> unsigned int *pbytes_written);
> +int __cifs_calc_signature(struct smb_rqst *rqst,
> + struct TCP_Server_Info *server, char *signature,
> + struct shash_desc *shash);
> #endif /* _CIFSPROTO_H */
> diff --git a/fs/cifs/smb2transport.c b/fs/cifs/smb2transport.c
> index 8732a43..bc9a7b6 100644
> --- a/fs/cifs/smb2transport.c
> +++ b/fs/cifs/smb2transport.c
> @@ -135,11 +135,10 @@ smb2_find_smb_ses(struct smb2_hdr *smb2hdr, struct TCP_Server_Info *server)
> int
> smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> {
> - int i, rc;
> + int rc;
> unsigned char smb2_signature[SMB2_HMACSHA256_SIZE];
> unsigned char *sigptr = smb2_signature;
> struct kvec *iov = rqst->rq_iov;
> - int n_vec = rqst->rq_nvec;
> struct smb2_hdr *smb2_pdu = (struct smb2_hdr *)iov[0].iov_base;
> struct cifs_ses *ses;
>
> @@ -171,53 +170,11 @@ smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> return rc;
> }
>
> - for (i = 0; i < n_vec; i++) {
> - if (iov[i].iov_len == 0)
> - continue;
> - if (iov[i].iov_base == NULL) {
> - cifs_dbg(VFS, "null iovec entry\n");
> - return -EIO;
> - }
> - /*
> - * The first entry includes a length field (which does not get
> - * signed that occupies the first 4 bytes before the header).
> - */
> - if (i == 0) {
> - if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
> - break; /* nothing to sign or corrupt header */
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdeschmacsha256->shash,
> - iov[i].iov_base + 4, iov[i].iov_len - 4);
> - } else {
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdeschmacsha256->shash,
> - iov[i].iov_base, iov[i].iov_len);
> - }
> - if (rc) {
> - cifs_dbg(VFS, "%s: Could not update with payload\n",
> - __func__);
> - return rc;
> - }
> - }
> -
> - /* now hash over the rq_pages array */
> - for (i = 0; i < rqst->rq_npages; i++) {
> - struct kvec p_iov;
> -
> - cifs_rqst_page_to_kvec(rqst, i, &p_iov);
> - crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
> - p_iov.iov_base, p_iov.iov_len);
> - kunmap(rqst->rq_pages[i]);
> - }
> -
> - rc = crypto_shash_final(&server->secmech.sdeschmacsha256->shash,
> - sigptr);
> - if (rc)
> - cifs_dbg(VFS, "%s: Could not generate sha256 hash\n", __func__);
> + rc = __cifs_calc_signature(rqst, server, sigptr,
> + &server->secmech.sdeschmacsha256->shash);
>
> - memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
> + if (!rc)
> + memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
>
> return rc;
> }
> @@ -395,12 +352,10 @@ generate_smb311signingkey(struct cifs_ses *ses)
> int
> smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> {
> - int i;
> int rc = 0;
> unsigned char smb3_signature[SMB2_CMACAES_SIZE];
> unsigned char *sigptr = smb3_signature;
> struct kvec *iov = rqst->rq_iov;
> - int n_vec = rqst->rq_nvec;
> struct smb2_hdr *smb2_pdu = (struct smb2_hdr *)iov[0].iov_base;
> struct cifs_ses *ses;
>
> @@ -431,54 +386,12 @@ smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> cifs_dbg(VFS, "%s: Could not init cmac aes\n", __func__);
> return rc;
> }
> +
> + rc = __cifs_calc_signature(rqst, server, sigptr,
> + &server->secmech.sdesccmacaes->shash);
>
> - for (i = 0; i < n_vec; i++) {
> - if (iov[i].iov_len == 0)
> - continue;
> - if (iov[i].iov_base == NULL) {
> - cifs_dbg(VFS, "null iovec entry");
> - return -EIO;
> - }
> - /*
> - * The first entry includes a length field (which does not get
> - * signed that occupies the first 4 bytes before the header).
> - */
> - if (i == 0) {
> - if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
> - break; /* nothing to sign or corrupt header */
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdesccmacaes->shash,
> - iov[i].iov_base + 4, iov[i].iov_len - 4);
> - } else {
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdesccmacaes->shash,
> - iov[i].iov_base, iov[i].iov_len);
> - }
> - if (rc) {
> - cifs_dbg(VFS, "%s: Couldn't update cmac aes with payload\n",
> - __func__);
> - return rc;
> - }
> - }
> -
> - /* now hash over the rq_pages array */
> - for (i = 0; i < rqst->rq_npages; i++) {
> - struct kvec p_iov;
> -
> - cifs_rqst_page_to_kvec(rqst, i, &p_iov);
> - crypto_shash_update(&server->secmech.sdesccmacaes->shash,
> - p_iov.iov_base, p_iov.iov_len);
> - kunmap(rqst->rq_pages[i]);
> - }
> -
> - rc = crypto_shash_final(&server->secmech.sdesccmacaes->shash,
> - sigptr);
> - if (rc)
> - cifs_dbg(VFS, "%s: Could not generate cmac aes\n", __func__);
> -
> - memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
> + if (!rc)
> + memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
>
> return rc;
> }
> --
> 2.8.0.rc3
>
> --
> To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 5/6] cifs_readv_receive: use cifs_read_from_socket()
2016-04-09 20:52 ` Al Viro
@ 2016-04-19 15:01 ` Jeff Layton
-1 siblings, 0 replies; 31+ messages in thread
From: Jeff Layton @ 2016-04-19 15:01 UTC (permalink / raw)
To: Al Viro, linux-cifs-u79uwXL29TY76Z2rM5mHXA
Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA
On Sat, 2016-04-09 at 21:52 +0100, Al Viro wrote:
> Signed-off-by: Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
> ---
> fs/cifs/cifssmb.c | 11 ++++-------
> 1 file changed, 4 insertions(+), 7 deletions(-)
>
> diff --git a/fs/cifs/cifssmb.c b/fs/cifs/cifssmb.c
> index 76fcb50..3da077a 100644
> --- a/fs/cifs/cifssmb.c
> +++ b/fs/cifs/cifssmb.c
> @@ -1447,10 +1447,8 @@ cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
> len = min_t(unsigned int, buflen, server->vals->read_rsp_size) -
> HEADER_SIZE(server) + 1;
>
> - rdata->iov.iov_base = buf + HEADER_SIZE(server) - 1;
> - rdata->iov.iov_len = len;
> -
> - length = cifs_readv_from_socket(server, &rdata->iov, 1, len);
> + length = cifs_read_from_socket(server,
> + buf + HEADER_SIZE(server) - 1, len);
> if (length < 0)
> return length;
> server->total_read += length;
> @@ -1502,9 +1500,8 @@ cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
> len = data_offset - server->total_read;
> if (len > 0) {
> /* read any junk before data into the rest of smallbuf */
> - rdata->iov.iov_base = buf + server->total_read;
> - rdata->iov.iov_len = len;
> - length = cifs_readv_from_socket(server, &rdata->iov, 1, len);
> + length = cifs_read_from_socket(server,
> + buf + server->total_read, len);
> if (length < 0)
> return length;
> server->total_read += length;
This one is orthogonal to the rest. Looks good though.
Reviewed-by: Jeff Layton <jlayton-vpEMnDpepFuMZCB2o+C8xQ@public.gmane.org>
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 5/6] cifs_readv_receive: use cifs_read_from_socket()
@ 2016-04-19 15:01 ` Jeff Layton
0 siblings, 0 replies; 31+ messages in thread
From: Jeff Layton @ 2016-04-19 15:01 UTC (permalink / raw)
To: Al Viro, linux-cifs; +Cc: linux-kernel
On Sat, 2016-04-09 at 21:52 +0100, Al Viro wrote:
> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
> ---
> fs/cifs/cifssmb.c | 11 ++++-------
> 1 file changed, 4 insertions(+), 7 deletions(-)
>
> diff --git a/fs/cifs/cifssmb.c b/fs/cifs/cifssmb.c
> index 76fcb50..3da077a 100644
> --- a/fs/cifs/cifssmb.c
> +++ b/fs/cifs/cifssmb.c
> @@ -1447,10 +1447,8 @@ cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
> len = min_t(unsigned int, buflen, server->vals->read_rsp_size) -
> HEADER_SIZE(server) + 1;
>
> - rdata->iov.iov_base = buf + HEADER_SIZE(server) - 1;
> - rdata->iov.iov_len = len;
> -
> - length = cifs_readv_from_socket(server, &rdata->iov, 1, len);
> + length = cifs_read_from_socket(server,
> + buf + HEADER_SIZE(server) - 1, len);
> if (length < 0)
> return length;
> server->total_read += length;
> @@ -1502,9 +1500,8 @@ cifs_readv_receive(struct TCP_Server_Info *server, struct mid_q_entry *mid)
> len = data_offset - server->total_read;
> if (len > 0) {
> /* read any junk before data into the rest of smallbuf */
> - rdata->iov.iov_base = buf + server->total_read;
> - rdata->iov.iov_len = len;
> - length = cifs_readv_from_socket(server, &rdata->iov, 1, len);
> + length = cifs_read_from_socket(server,
> + buf + server->total_read, len);
> if (length < 0)
> return length;
> server->total_read += length;
This one is orthogonal to the rest. Looks good though.
Reviewed-by: Jeff Layton <jlayton@poochiereds.net>
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 1/6] [net] drop 'size' argument of sock_recvmsg()
2016-04-09 20:50 ` Al Viro
@ 2016-04-19 16:03 ` Jeff Layton
-1 siblings, 0 replies; 31+ messages in thread
From: Jeff Layton @ 2016-04-19 16:03 UTC (permalink / raw)
To: Al Viro, linux-cifs-u79uwXL29TY76Z2rM5mHXA
Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA
On Sat, 2016-04-09 at 21:50 +0100, Al Viro wrote:
> all callers have it equal to msg_data_left(msg).
>
> Signed-off-by: Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
> ---
> drivers/target/iscsi/iscsi_target_util.c | 5 ++---
> include/linux/net.h | 3 +--
> net/socket.c | 23 ++++++++++-------------
> 3 files changed, 13 insertions(+), 18 deletions(-)
>
> diff --git a/drivers/target/iscsi/iscsi_target_util.c b/drivers/target/iscsi/iscsi_target_util.c
> index 428b0d9..5772038 100644
> --- a/drivers/target/iscsi/iscsi_target_util.c
> +++ b/drivers/target/iscsi/iscsi_target_util.c
> @@ -1283,9 +1283,8 @@ static int iscsit_do_rx_data(
> iov_iter_kvec(&msg.msg_iter, READ | ITER_KVEC,
> count->iov, count->iov_count, data);
>
> - while (total_rx < data) {
> - rx_loop = sock_recvmsg(conn->sock, &msg,
> - (data - total_rx), MSG_WAITALL);
> + while (msg_data_left(&msg)) {
> + rx_loop = sock_recvmsg(conn->sock, &msg, MSG_WAITALL);
> if (rx_loop <= 0) {
> pr_debug("rx_loop: %d total_rx: %d\n",
> rx_loop, total_rx);
> diff --git a/include/linux/net.h b/include/linux/net.h
> index 49175e4..72c1e06 100644
> --- a/include/linux/net.h
> +++ b/include/linux/net.h
> @@ -218,8 +218,7 @@ int sock_create_lite(int family, int type, int proto, struct socket **res);
> struct socket *sock_alloc(void);
> void sock_release(struct socket *sock);
> int sock_sendmsg(struct socket *sock, struct msghdr *msg);
> -int sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
> - int flags);
> +int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags);
> struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname);
> struct socket *sockfd_lookup(int fd, int *err);
> struct socket *sock_from_file(struct file *file, int *err);
> diff --git a/net/socket.c b/net/socket.c
> index 5f77a8e..956426e3 100644
> --- a/net/socket.c
> +++ b/net/socket.c
> @@ -709,17 +709,16 @@ void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
> EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
>
> static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
> - size_t size, int flags)
> + int flags)
> {
> - return sock->ops->recvmsg(sock, msg, size, flags);
> + return sock->ops->recvmsg(sock, msg, msg_data_left(msg), flags);
> }
>
> -int sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
> - int flags)
> +int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
> {
> - int err = security_socket_recvmsg(sock, msg, size, flags);
> + int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
>
> - return err ?: sock_recvmsg_nosec(sock, msg, size, flags);
> + return err ?: sock_recvmsg_nosec(sock, msg, flags);
> }
> EXPORT_SYMBOL(sock_recvmsg);
>
> @@ -746,7 +745,7 @@ int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
>
> iov_iter_kvec(&msg->msg_iter, READ | ITER_KVEC, vec, num, size);
> set_fs(KERNEL_DS);
> - result = sock_recvmsg(sock, msg, size, flags);
> + result = sock_recvmsg(sock, msg, flags);
> set_fs(oldfs);
> return result;
> }
> @@ -796,7 +795,7 @@ static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
> if (!iov_iter_count(to)) /* Match SYS5 behaviour */
> return 0;
>
> - res = sock_recvmsg(sock, &msg, iov_iter_count(to), msg.msg_flags);
> + res = sock_recvmsg(sock, &msg, msg.msg_flags);
> *to = msg.msg_iter;
> return res;
> }
> @@ -1696,7 +1695,7 @@ SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
> msg.msg_iocb = NULL;
> if (sock->file->f_flags & O_NONBLOCK)
> flags |= MSG_DONTWAIT;
> - err = sock_recvmsg(sock, &msg, iov_iter_count(&msg.msg_iter), flags);
> + err = sock_recvmsg(sock, &msg, flags);
>
> if (err >= 0 && addr != NULL) {
> err2 = move_addr_to_user(&address,
> @@ -2073,7 +2072,7 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
> struct iovec iovstack[UIO_FASTIOV];
> struct iovec *iov = iovstack;
> unsigned long cmsg_ptr;
> - int total_len, len;
> + int len;
> ssize_t err;
>
> /* kernel mode address */
> @@ -2091,7 +2090,6 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
> err = copy_msghdr_from_user(msg_sys, msg, &uaddr, &iov);
> if (err < 0)
> return err;
> - total_len = iov_iter_count(&msg_sys->msg_iter);
>
> cmsg_ptr = (unsigned long)msg_sys->msg_control;
> msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
> @@ -2101,8 +2099,7 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
>
> if (sock->file->f_flags & O_NONBLOCK)
> flags |= MSG_DONTWAIT;
> - err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys,
> - total_len, flags);
> + err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys, flags);
> if (err < 0)
> goto out_freeiov;
> len = err;
Looks good. Assuming that the corresponding change to sock_recvmsg is
merged.
Reviewed-by: Jeff Layton <jlayton-vpEMnDpepFuMZCB2o+C8xQ@public.gmane.org>
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 1/6] [net] drop 'size' argument of sock_recvmsg()
@ 2016-04-19 16:03 ` Jeff Layton
0 siblings, 0 replies; 31+ messages in thread
From: Jeff Layton @ 2016-04-19 16:03 UTC (permalink / raw)
To: Al Viro, linux-cifs; +Cc: linux-kernel
On Sat, 2016-04-09 at 21:50 +0100, Al Viro wrote:
> all callers have it equal to msg_data_left(msg).
>
> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
> ---
> drivers/target/iscsi/iscsi_target_util.c | 5 ++---
> include/linux/net.h | 3 +--
> net/socket.c | 23 ++++++++++-------------
> 3 files changed, 13 insertions(+), 18 deletions(-)
>
> diff --git a/drivers/target/iscsi/iscsi_target_util.c b/drivers/target/iscsi/iscsi_target_util.c
> index 428b0d9..5772038 100644
> --- a/drivers/target/iscsi/iscsi_target_util.c
> +++ b/drivers/target/iscsi/iscsi_target_util.c
> @@ -1283,9 +1283,8 @@ static int iscsit_do_rx_data(
> iov_iter_kvec(&msg.msg_iter, READ | ITER_KVEC,
> count->iov, count->iov_count, data);
>
> - while (total_rx < data) {
> - rx_loop = sock_recvmsg(conn->sock, &msg,
> - (data - total_rx), MSG_WAITALL);
> + while (msg_data_left(&msg)) {
> + rx_loop = sock_recvmsg(conn->sock, &msg, MSG_WAITALL);
> if (rx_loop <= 0) {
> pr_debug("rx_loop: %d total_rx: %d\n",
> rx_loop, total_rx);
> diff --git a/include/linux/net.h b/include/linux/net.h
> index 49175e4..72c1e06 100644
> --- a/include/linux/net.h
> +++ b/include/linux/net.h
> @@ -218,8 +218,7 @@ int sock_create_lite(int family, int type, int proto, struct socket **res);
> struct socket *sock_alloc(void);
> void sock_release(struct socket *sock);
> int sock_sendmsg(struct socket *sock, struct msghdr *msg);
> -int sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
> - int flags);
> +int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags);
> struct file *sock_alloc_file(struct socket *sock, int flags, const char *dname);
> struct socket *sockfd_lookup(int fd, int *err);
> struct socket *sock_from_file(struct file *file, int *err);
> diff --git a/net/socket.c b/net/socket.c
> index 5f77a8e..956426e3 100644
> --- a/net/socket.c
> +++ b/net/socket.c
> @@ -709,17 +709,16 @@ void __sock_recv_ts_and_drops(struct msghdr *msg, struct sock *sk,
> EXPORT_SYMBOL_GPL(__sock_recv_ts_and_drops);
>
> static inline int sock_recvmsg_nosec(struct socket *sock, struct msghdr *msg,
> - size_t size, int flags)
> + int flags)
> {
> - return sock->ops->recvmsg(sock, msg, size, flags);
> + return sock->ops->recvmsg(sock, msg, msg_data_left(msg), flags);
> }
>
> -int sock_recvmsg(struct socket *sock, struct msghdr *msg, size_t size,
> - int flags)
> +int sock_recvmsg(struct socket *sock, struct msghdr *msg, int flags)
> {
> - int err = security_socket_recvmsg(sock, msg, size, flags);
> + int err = security_socket_recvmsg(sock, msg, msg_data_left(msg), flags);
>
> - return err ?: sock_recvmsg_nosec(sock, msg, size, flags);
> + return err ?: sock_recvmsg_nosec(sock, msg, flags);
> }
> EXPORT_SYMBOL(sock_recvmsg);
>
> @@ -746,7 +745,7 @@ int kernel_recvmsg(struct socket *sock, struct msghdr *msg,
>
> iov_iter_kvec(&msg->msg_iter, READ | ITER_KVEC, vec, num, size);
> set_fs(KERNEL_DS);
> - result = sock_recvmsg(sock, msg, size, flags);
> + result = sock_recvmsg(sock, msg, flags);
> set_fs(oldfs);
> return result;
> }
> @@ -796,7 +795,7 @@ static ssize_t sock_read_iter(struct kiocb *iocb, struct iov_iter *to)
> if (!iov_iter_count(to)) /* Match SYS5 behaviour */
> return 0;
>
> - res = sock_recvmsg(sock, &msg, iov_iter_count(to), msg.msg_flags);
> + res = sock_recvmsg(sock, &msg, msg.msg_flags);
> *to = msg.msg_iter;
> return res;
> }
> @@ -1696,7 +1695,7 @@ SYSCALL_DEFINE6(recvfrom, int, fd, void __user *, ubuf, size_t, size,
> msg.msg_iocb = NULL;
> if (sock->file->f_flags & O_NONBLOCK)
> flags |= MSG_DONTWAIT;
> - err = sock_recvmsg(sock, &msg, iov_iter_count(&msg.msg_iter), flags);
> + err = sock_recvmsg(sock, &msg, flags);
>
> if (err >= 0 && addr != NULL) {
> err2 = move_addr_to_user(&address,
> @@ -2073,7 +2072,7 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
> struct iovec iovstack[UIO_FASTIOV];
> struct iovec *iov = iovstack;
> unsigned long cmsg_ptr;
> - int total_len, len;
> + int len;
> ssize_t err;
>
> /* kernel mode address */
> @@ -2091,7 +2090,6 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
> err = copy_msghdr_from_user(msg_sys, msg, &uaddr, &iov);
> if (err < 0)
> return err;
> - total_len = iov_iter_count(&msg_sys->msg_iter);
>
> cmsg_ptr = (unsigned long)msg_sys->msg_control;
> msg_sys->msg_flags = flags & (MSG_CMSG_CLOEXEC|MSG_CMSG_COMPAT);
> @@ -2101,8 +2099,7 @@ static int ___sys_recvmsg(struct socket *sock, struct user_msghdr __user *msg,
>
> if (sock->file->f_flags & O_NONBLOCK)
> flags |= MSG_DONTWAIT;
> - err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys,
> - total_len, flags);
> + err = (nosec ? sock_recvmsg_nosec : sock_recvmsg)(sock, msg_sys, flags);
> if (err < 0)
> goto out_freeiov;
> len = err;
Looks good. Assuming that the corresponding change to sock_recvmsg is
merged.
Reviewed-by: Jeff Layton <jlayton@poochiereds.net>
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 2/6] cifs: merge the hash calculation helpers
2016-04-09 20:50 ` [PATCH 2/6] cifs: merge the hash calculation helpers Al Viro
[not found] ` <20160409205056.GH25498-3bDd1+5oDREiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
@ 2016-04-19 16:12 ` Jeff Layton
1 sibling, 0 replies; 31+ messages in thread
From: Jeff Layton @ 2016-04-19 16:12 UTC (permalink / raw)
To: Al Viro, linux-cifs; +Cc: linux-kernel
On Sat, 2016-04-09 at 21:50 +0100, Al Viro wrote:
> three practically identical copies...
>
> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
> ---
> fs/cifs/cifsencrypt.c | 97 ++++++++++++++++++++++++-------------------
> fs/cifs/cifsproto.h | 3 ++
> fs/cifs/smb2transport.c | 107 +++++-------------------------------------------
> 3 files changed, 67 insertions(+), 140 deletions(-)
>
> diff --git a/fs/cifs/cifsencrypt.c b/fs/cifs/cifsencrypt.c
> index 4897dac..6aeb8d4 100644
> --- a/fs/cifs/cifsencrypt.c
> +++ b/fs/cifs/cifsencrypt.c
> @@ -66,45 +66,15 @@ cifs_crypto_shash_md5_allocate(struct TCP_Server_Info *server)
> return 0;
> }
>
> -/*
> - * Calculate and return the CIFS signature based on the mac key and SMB PDU.
> - * The 16 byte signature must be allocated by the caller. Note we only use the
> - * 1st eight bytes and that the smb header signature field on input contains
> - * the sequence number before this function is called. Also, this function
> - * should be called with the server->srv_mutex held.
> - */
> -static int cifs_calc_signature(struct smb_rqst *rqst,
> - struct TCP_Server_Info *server, char *signature)
> +int __cifs_calc_signature(struct smb_rqst *rqst,
> + struct TCP_Server_Info *server, char *signature,
> + struct shash_desc *shash)
> {
> int i;
> int rc;
> struct kvec *iov = rqst->rq_iov;
> int n_vec = rqst->rq_nvec;
>
> - if (iov == NULL || signature == NULL || server == NULL)
> - return -EINVAL;
> -
> - if (!server->secmech.sdescmd5) {
> - rc = cifs_crypto_shash_md5_allocate(server);
> - if (rc) {
> - cifs_dbg(VFS, "%s: Can't alloc md5 crypto\n", __func__);
> - return -1;
> - }
> - }
> -
> - rc = crypto_shash_init(&server->secmech.sdescmd5->shash);
> - if (rc) {
> - cifs_dbg(VFS, "%s: Could not init md5\n", __func__);
> - return rc;
> - }
> -
> - rc = crypto_shash_update(&server->secmech.sdescmd5->shash,
> - server->session_key.response, server->session_key.len);
> - if (rc) {
> - cifs_dbg(VFS, "%s: Could not update with response\n", __func__);
> - return rc;
> - }
> -
> for (i = 0; i < n_vec; i++) {
> if (iov[i].iov_len == 0)
> continue;
> @@ -117,12 +87,10 @@ static int cifs_calc_signature(struct smb_rqst *rqst,
> if (i == 0) {
> if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
> break; /* nothing to sign or corrupt header */
> - rc =
> - crypto_shash_update(&server->secmech.sdescmd5->shash,
> + rc = crypto_shash_update(shash,
> iov[i].iov_base + 4, iov[i].iov_len - 4);
> } else {
> - rc =
> - crypto_shash_update(&server->secmech.sdescmd5->shash,
> + rc = crypto_shash_update(shash,
> iov[i].iov_base, iov[i].iov_len);
> }
> if (rc) {
> @@ -134,21 +102,64 @@ static int cifs_calc_signature(struct smb_rqst *rqst,
>
> /* now hash over the rq_pages array */
> for (i = 0; i < rqst->rq_npages; i++) {
> - struct kvec p_iov;
> + void *kaddr = kmap(rqst->rq_pages[i]);
> + size_t len = rqst->rq_pagesz;
> +
> + if (i == rqst->rq_npages - 1)
> + len = rqst->rq_tailsz;
> +
> + crypto_shash_update(shash, kaddr, len);
>
> - cifs_rqst_page_to_kvec(rqst, i, &p_iov);
> - crypto_shash_update(&server->secmech.sdescmd5->shash,
> - p_iov.iov_base, p_iov.iov_len);
> kunmap(rqst->rq_pages[i]);
> }
>
> - rc = crypto_shash_final(&server->secmech.sdescmd5->shash, signature);
> + rc = crypto_shash_final(shash, signature);
> if (rc)
> - cifs_dbg(VFS, "%s: Could not generate md5 hash\n", __func__);
> + cifs_dbg(VFS, "%s: Could not generate hash\n", __func__);
>
> return rc;
> }
>
> +/*
> + * Calculate and return the CIFS signature based on the mac key and SMB PDU.
> + * The 16 byte signature must be allocated by the caller. Note we only use the
> + * 1st eight bytes and that the smb header signature field on input contains
> + * the sequence number before this function is called. Also, this function
> + * should be called with the server->srv_mutex held.
> + */
> +static int cifs_calc_signature(struct smb_rqst *rqst,
> + struct TCP_Server_Info *server, char *signature)
> +{
> + int rc;
> +
> + if (!rqst->rq_iov || !signature || !server)
> + return -EINVAL;
> +
> + if (!server->secmech.sdescmd5) {
> + rc = cifs_crypto_shash_md5_allocate(server);
> + if (rc) {
> + cifs_dbg(VFS, "%s: Can't alloc md5 crypto\n", __func__);
> + return -1;
> + }
> + }
> +
> + rc = crypto_shash_init(&server->secmech.sdescmd5->shash);
> + if (rc) {
> + cifs_dbg(VFS, "%s: Could not init md5\n", __func__);
> + return rc;
> + }
> +
> + rc = crypto_shash_update(&server->secmech.sdescmd5->shash,
> + server->session_key.response, server->session_key.len);
> + if (rc) {
> + cifs_dbg(VFS, "%s: Could not update with response\n", __func__);
> + return rc;
> + }
> +
> + return __cifs_calc_signature(rqst, server, signature,
> + &server->secmech.sdescmd5->shash);
> +}
> +
> /* must be called with server->srv_mutex held */
> int cifs_sign_rqst(struct smb_rqst *rqst, struct TCP_Server_Info *server,
> __u32 *pexpected_response_sequence_number)
> diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
> index eed7ff5..d9b4f44 100644
> --- a/fs/cifs/cifsproto.h
> +++ b/fs/cifs/cifsproto.h
> @@ -512,4 +512,7 @@ int cifs_create_mf_symlink(unsigned int xid, struct cifs_tcon *tcon,
> struct cifs_sb_info *cifs_sb,
> const unsigned char *path, char *pbuf,
> unsigned int *pbytes_written);
> +int __cifs_calc_signature(struct smb_rqst *rqst,
> + struct TCP_Server_Info *server, char *signature,
> + struct shash_desc *shash);
> #endif /* _CIFSPROTO_H */
> diff --git a/fs/cifs/smb2transport.c b/fs/cifs/smb2transport.c
> index 8732a43..bc9a7b6 100644
> --- a/fs/cifs/smb2transport.c
> +++ b/fs/cifs/smb2transport.c
> @@ -135,11 +135,10 @@ smb2_find_smb_ses(struct smb2_hdr *smb2hdr, struct TCP_Server_Info *server)
> int
> smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> {
> - int i, rc;
> + int rc;
> unsigned char smb2_signature[SMB2_HMACSHA256_SIZE];
> unsigned char *sigptr = smb2_signature;
> struct kvec *iov = rqst->rq_iov;
> - int n_vec = rqst->rq_nvec;
> struct smb2_hdr *smb2_pdu = (struct smb2_hdr *)iov[0].iov_base;
> struct cifs_ses *ses;
>
> @@ -171,53 +170,11 @@ smb2_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> return rc;
> }
>
> - for (i = 0; i < n_vec; i++) {
> - if (iov[i].iov_len == 0)
> - continue;
> - if (iov[i].iov_base == NULL) {
> - cifs_dbg(VFS, "null iovec entry\n");
> - return -EIO;
> - }
> - /*
> - * The first entry includes a length field (which does not get
> - * signed that occupies the first 4 bytes before the header).
> - */
> - if (i == 0) {
> - if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
> - break; /* nothing to sign or corrupt header */
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdeschmacsha256->shash,
> - iov[i].iov_base + 4, iov[i].iov_len - 4);
> - } else {
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdeschmacsha256->shash,
> - iov[i].iov_base, iov[i].iov_len);
> - }
> - if (rc) {
> - cifs_dbg(VFS, "%s: Could not update with payload\n",
> - __func__);
> - return rc;
> - }
> - }
> -
> - /* now hash over the rq_pages array */
> - for (i = 0; i < rqst->rq_npages; i++) {
> - struct kvec p_iov;
> -
> - cifs_rqst_page_to_kvec(rqst, i, &p_iov);
> - crypto_shash_update(&server->secmech.sdeschmacsha256->shash,
> - p_iov.iov_base, p_iov.iov_len);
> - kunmap(rqst->rq_pages[i]);
> - }
> -
> - rc = crypto_shash_final(&server->secmech.sdeschmacsha256->shash,
> - sigptr);
> - if (rc)
> - cifs_dbg(VFS, "%s: Could not generate sha256 hash\n", __func__);
> + rc = __cifs_calc_signature(rqst, server, sigptr,
> + &server->secmech.sdeschmacsha256->shash);
>
> - memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
> + if (!rc)
> + memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
>
> return rc;
> }
> @@ -395,12 +352,10 @@ generate_smb311signingkey(struct cifs_ses *ses)
> int
> smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> {
> - int i;
> int rc = 0;
> unsigned char smb3_signature[SMB2_CMACAES_SIZE];
> unsigned char *sigptr = smb3_signature;
> struct kvec *iov = rqst->rq_iov;
> - int n_vec = rqst->rq_nvec;
> struct smb2_hdr *smb2_pdu = (struct smb2_hdr *)iov[0].iov_base;
> struct cifs_ses *ses;
>
> @@ -431,54 +386,12 @@ smb3_calc_signature(struct smb_rqst *rqst, struct TCP_Server_Info *server)
> cifs_dbg(VFS, "%s: Could not init cmac aes\n", __func__);
> return rc;
> }
> +
> + rc = __cifs_calc_signature(rqst, server, sigptr,
> + &server->secmech.sdesccmacaes->shash);
>
> - for (i = 0; i < n_vec; i++) {
> - if (iov[i].iov_len == 0)
> - continue;
> - if (iov[i].iov_base == NULL) {
> - cifs_dbg(VFS, "null iovec entry");
> - return -EIO;
> - }
> - /*
> - * The first entry includes a length field (which does not get
> - * signed that occupies the first 4 bytes before the header).
> - */
> - if (i == 0) {
> - if (iov[0].iov_len <= 8) /* cmd field at offset 9 */
> - break; /* nothing to sign or corrupt header */
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdesccmacaes->shash,
> - iov[i].iov_base + 4, iov[i].iov_len - 4);
> - } else {
> - rc =
> - crypto_shash_update(
> - &server->secmech.sdesccmacaes->shash,
> - iov[i].iov_base, iov[i].iov_len);
> - }
> - if (rc) {
> - cifs_dbg(VFS, "%s: Couldn't update cmac aes with payload\n",
> - __func__);
> - return rc;
> - }
> - }
> -
> - /* now hash over the rq_pages array */
> - for (i = 0; i < rqst->rq_npages; i++) {
> - struct kvec p_iov;
> -
> - cifs_rqst_page_to_kvec(rqst, i, &p_iov);
> - crypto_shash_update(&server->secmech.sdesccmacaes->shash,
> - p_iov.iov_base, p_iov.iov_len);
> - kunmap(rqst->rq_pages[i]);
> - }
> -
> - rc = crypto_shash_final(&server->secmech.sdesccmacaes->shash,
> - sigptr);
> - if (rc)
> - cifs_dbg(VFS, "%s: Could not generate cmac aes\n", __func__);
> -
> - memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
> + if (!rc)
> + memcpy(smb2_pdu->Signature, sigptr, SMB2_SIGNATURE_SIZE);
>
> return rc;
> }
Nice. Long overdue cleanup.
Reviewed-by: Jeff Layton <jlayton@poochiereds.net>
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 3/6] cifs: quit playing games with draining iovecs
2016-04-09 20:51 ` Al Viro
@ 2016-04-19 17:53 ` Jeff Layton
-1 siblings, 0 replies; 31+ messages in thread
From: Jeff Layton @ 2016-04-19 17:53 UTC (permalink / raw)
To: Al Viro, linux-cifs-u79uwXL29TY76Z2rM5mHXA
Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA
On Sat, 2016-04-09 at 21:51 +0100, Al Viro wrote:
> ... and use ITER_BVEC for the page part of request to send
>
> Signed-off-by: Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
> ---
> fs/cifs/cifsproto.h | 2 -
> fs/cifs/transport.c | 141 +++++++++++++++---------------------------
> ----------
> 2 files changed, 41 insertions(+), 102 deletions(-)
>
> diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
> index d9b4f44..7d5f53a 100644
> --- a/fs/cifs/cifsproto.h
> +++ b/fs/cifs/cifsproto.h
> @@ -37,8 +37,6 @@ extern void cifs_buf_release(void *);
> extern struct smb_hdr *cifs_small_buf_get(void);
> extern void cifs_small_buf_release(void *);
> extern void free_rsp_buf(int, void *);
> -extern void cifs_rqst_page_to_kvec(struct smb_rqst *rqst, unsigned
> int idx,
> - struct kvec *iov);
> extern int smb_send(struct TCP_Server_Info *, struct smb_hdr *,
> unsigned int /* length */);
> extern unsigned int _get_xid(void);
> diff --git a/fs/cifs/transport.c b/fs/cifs/transport.c
> index 87abe8e..206a597 100644
> --- a/fs/cifs/transport.c
> +++ b/fs/cifs/transport.c
> @@ -124,41 +124,32 @@ cifs_delete_mid(struct mid_q_entry *mid)
> /*
> * smb_send_kvec - send an array of kvecs to the server
> * @server: Server to send the data to
> - * @iov: Pointer to array of kvecs
> - * @n_vec: length of kvec array
> + * @smb_msg: Message to send
> * @sent: amount of data sent on socket is stored here
> *
> * Our basic "send data to server" function. Should be called with
> srv_mutex
> * held. The caller is responsible for handling the results.
> */
> static int
> -smb_send_kvec(struct TCP_Server_Info *server, struct kvec *iov,
> size_t n_vec,
> - size_t *sent)
> +smb_send_kvec(struct TCP_Server_Info *server, struct msghdr
> *smb_msg,
> + size_t *sent)
> {
> int rc = 0;
> - int i = 0;
> - struct msghdr smb_msg;
> - unsigned int remaining;
> - size_t first_vec = 0;
> + int retries = 0;
> struct socket *ssocket = server->ssocket;
>
> *sent = 0;
>
> - smb_msg.msg_name = (struct sockaddr *) &server->dstaddr;
> - smb_msg.msg_namelen = sizeof(struct sockaddr);
> - smb_msg.msg_control = NULL;
> - smb_msg.msg_controllen = 0;
> + smb_msg->msg_name = (struct sockaddr *) &server->dstaddr;
> + smb_msg->msg_namelen = sizeof(struct sockaddr);
> + smb_msg->msg_control = NULL;
> + smb_msg->msg_controllen = 0;
> if (server->noblocksnd)
> - smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
> + smb_msg->msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
> else
> - smb_msg.msg_flags = MSG_NOSIGNAL;
> -
> - remaining = 0;
> - for (i = 0; i < n_vec; i++)
> - remaining += iov[i].iov_len;
> + smb_msg->msg_flags = MSG_NOSIGNAL;
>
> - i = 0;
> - while (remaining) {
> + while (msg_data_left(smb_msg)) {
> /*
> * If blocking send, we try 3 times, since each can
> block
> * for 5 seconds. For nonblocking we have to try
> more
> @@ -177,35 +168,21 @@ smb_send_kvec(struct TCP_Server_Info *server,
> struct kvec *iov, size_t n_vec,
> * after the retries we will kill the socket and
> * reconnect which may clear the network problem.
> */
> - rc = kernel_sendmsg(ssocket, &smb_msg,
> &iov[first_vec],
> - n_vec - first_vec, remaining);
> + rc = sock_sendmsg(ssocket, smb_msg);
> if (rc == -EAGAIN) {
> - i++;
> - if (i >= 14 || (!server->noblocksnd && (i >
> 2))) {
> + retries++;
> + if (retries >= 14 ||
> + (!server->noblocksnd && (retries > 2)))
> {
> cifs_dbg(VFS, "sends on sock %p
> stuck for 15 seconds\n",
> ssocket);
> - rc = -EAGAIN;
> - break;
> + return -EAGAIN;
> }
> - msleep(1 << i);
> + msleep(1 << retries);
> continue;
> }
>
> if (rc < 0)
> - break;
> -
> - /* send was at least partially successful */
> - *sent += rc;
> -
> - if (rc == remaining) {
> - remaining = 0;
> - break;
> - }
> -
> - if (rc > remaining) {
> - cifs_dbg(VFS, "sent %d requested %d\n", rc,
> remaining);
> - break;
> - }
> + return rc;
>
> if (rc == 0) {
> /* should never happen, letting socket clear
> before
> @@ -215,59 +192,11 @@ smb_send_kvec(struct TCP_Server_Info *server,
> struct kvec *iov, size_t n_vec,
> continue;
> }
>
> - remaining -= rc;
> -
> - /* the line below resets i */
> - for (i = first_vec; i < n_vec; i++) {
> - if (iov[i].iov_len) {
> - if (rc > iov[i].iov_len) {
> - rc -= iov[i].iov_len;
> - iov[i].iov_len = 0;
> - } else {
> - iov[i].iov_base += rc;
> - iov[i].iov_len -= rc;
> - first_vec = i;
> - break;
> - }
> - }
> - }
> -
> - i = 0; /* in case we get ENOSPC on the next send */
> - rc = 0;
> + /* send was at least partially successful */
> + *sent += rc;
> + retries = 0; /* in case we get ENOSPC on the next
> send */
> }
> - return rc;
> -}
> -
> -/**
> - * rqst_page_to_kvec - Turn a slot in the smb_rqst page array into a
> kvec
> - * @rqst: pointer to smb_rqst
> - * @idx: index into the array of the page
> - * @iov: pointer to struct kvec that will hold the result
> - *
> - * Helper function to convert a slot in the rqst->rq_pages array
> into a kvec.
> - * The page will be kmapped and the address placed into iov_base.
> The length
> - * will then be adjusted according to the ptailoff.
> - */
> -void
> -cifs_rqst_page_to_kvec(struct smb_rqst *rqst, unsigned int idx,
> - struct kvec *iov)
> -{
> - /*
> - * FIXME: We could avoid this kmap altogether if we used
> - * kernel_sendpage instead of kernel_sendmsg. That will only
> - * work if signing is disabled though as sendpage inlines
> the
> - * page directly into the fraglist. If userspace modifies
> the
> - * page after we calculate the signature, then the server
> will
> - * reject it and may break the connection. kernel_sendmsg
> does
> - * an extra copy of the data and avoids that issue.
> - */
> - iov->iov_base = kmap(rqst->rq_pages[idx]);
> -
> - /* if last page, don't send beyond this offset into page */
> - if (idx == (rqst->rq_npages - 1))
> - iov->iov_len = rqst->rq_tailsz;
> - else
> - iov->iov_len = rqst->rq_pagesz;
> + return 0;
> }
>
> static unsigned long
> @@ -299,8 +228,9 @@ smb_send_rqst(struct TCP_Server_Info *server,
> struct smb_rqst *rqst)
> unsigned int smb_buf_length =
> get_rfc1002_length(iov[0].iov_base);
> unsigned long send_length;
> unsigned int i;
> - size_t total_len = 0, sent;
> + size_t total_len = 0, sent, size;
> struct socket *ssocket = server->ssocket;
> + struct msghdr smb_msg;
> int val = 1;
>
> if (ssocket == NULL)
> @@ -321,7 +251,13 @@ smb_send_rqst(struct TCP_Server_Info *server,
> struct smb_rqst *rqst)
> kernel_setsockopt(ssocket, SOL_TCP, TCP_CORK,
> (char *)&val, sizeof(val));
>
> - rc = smb_send_kvec(server, iov, n_vec, &sent);
> + size = 0;
> + for (i = 0; i < n_vec; i++)
> + size += iov[i].iov_len;
> +
> + iov_iter_kvec(&smb_msg.msg_iter, WRITE | ITER_KVEC, iov,
> n_vec, size);
> +
> + rc = smb_send_kvec(server, &smb_msg, &sent);
> if (rc < 0)
> goto uncork;
>
> @@ -329,11 +265,16 @@ smb_send_rqst(struct TCP_Server_Info *server,
> struct smb_rqst *rqst)
>
> /* now walk the page array and send each page in it */
> for (i = 0; i < rqst->rq_npages; i++) {
> - struct kvec p_iov;
> -
> - cifs_rqst_page_to_kvec(rqst, i, &p_iov);
> - rc = smb_send_kvec(server, &p_iov, 1, &sent);
> - kunmap(rqst->rq_pages[i]);
> + size_t len = i == rqst->rq_npages - 1
> + ? rqst->rq_tailsz
> + : rqst->rq_pagesz;
> + struct bio_vec bvec = {
> + .bv_page = rqst->rq_pages[i],
> + .bv_len = len
> + };
> + iov_iter_bvec(&smb_msg.msg_iter, WRITE | ITER_BVEC,
> + &bvec, 1, len);
> + rc = smb_send_kvec(server, &smb_msg, &sent);
> if (rc < 0)
> break;
>
What's the advantage of using iov_iter_bvec over iov_iter_kvec ?
That said...
Acked-by: Jeff Layton <jlayton-vpEMnDpepFuMZCB2o+C8xQ@public.gmane.org>
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 3/6] cifs: quit playing games with draining iovecs
@ 2016-04-19 17:53 ` Jeff Layton
0 siblings, 0 replies; 31+ messages in thread
From: Jeff Layton @ 2016-04-19 17:53 UTC (permalink / raw)
To: Al Viro, linux-cifs; +Cc: linux-kernel
On Sat, 2016-04-09 at 21:51 +0100, Al Viro wrote:
> ... and use ITER_BVEC for the page part of request to send
>
> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
> ---
> fs/cifs/cifsproto.h | 2 -
> fs/cifs/transport.c | 141 +++++++++++++++---------------------------
> ----------
> 2 files changed, 41 insertions(+), 102 deletions(-)
>
> diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
> index d9b4f44..7d5f53a 100644
> --- a/fs/cifs/cifsproto.h
> +++ b/fs/cifs/cifsproto.h
> @@ -37,8 +37,6 @@ extern void cifs_buf_release(void *);
> extern struct smb_hdr *cifs_small_buf_get(void);
> extern void cifs_small_buf_release(void *);
> extern void free_rsp_buf(int, void *);
> -extern void cifs_rqst_page_to_kvec(struct smb_rqst *rqst, unsigned
> int idx,
> - struct kvec *iov);
> extern int smb_send(struct TCP_Server_Info *, struct smb_hdr *,
> unsigned int /* length */);
> extern unsigned int _get_xid(void);
> diff --git a/fs/cifs/transport.c b/fs/cifs/transport.c
> index 87abe8e..206a597 100644
> --- a/fs/cifs/transport.c
> +++ b/fs/cifs/transport.c
> @@ -124,41 +124,32 @@ cifs_delete_mid(struct mid_q_entry *mid)
> /*
> * smb_send_kvec - send an array of kvecs to the server
> * @server: Server to send the data to
> - * @iov: Pointer to array of kvecs
> - * @n_vec: length of kvec array
> + * @smb_msg: Message to send
> * @sent: amount of data sent on socket is stored here
> *
> * Our basic "send data to server" function. Should be called with
> srv_mutex
> * held. The caller is responsible for handling the results.
> */
> static int
> -smb_send_kvec(struct TCP_Server_Info *server, struct kvec *iov,
> size_t n_vec,
> - size_t *sent)
> +smb_send_kvec(struct TCP_Server_Info *server, struct msghdr
> *smb_msg,
> + size_t *sent)
> {
> int rc = 0;
> - int i = 0;
> - struct msghdr smb_msg;
> - unsigned int remaining;
> - size_t first_vec = 0;
> + int retries = 0;
> struct socket *ssocket = server->ssocket;
>
> *sent = 0;
>
> - smb_msg.msg_name = (struct sockaddr *) &server->dstaddr;
> - smb_msg.msg_namelen = sizeof(struct sockaddr);
> - smb_msg.msg_control = NULL;
> - smb_msg.msg_controllen = 0;
> + smb_msg->msg_name = (struct sockaddr *) &server->dstaddr;
> + smb_msg->msg_namelen = sizeof(struct sockaddr);
> + smb_msg->msg_control = NULL;
> + smb_msg->msg_controllen = 0;
> if (server->noblocksnd)
> - smb_msg.msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
> + smb_msg->msg_flags = MSG_DONTWAIT + MSG_NOSIGNAL;
> else
> - smb_msg.msg_flags = MSG_NOSIGNAL;
> -
> - remaining = 0;
> - for (i = 0; i < n_vec; i++)
> - remaining += iov[i].iov_len;
> + smb_msg->msg_flags = MSG_NOSIGNAL;
>
> - i = 0;
> - while (remaining) {
> + while (msg_data_left(smb_msg)) {
> /*
> * If blocking send, we try 3 times, since each can
> block
> * for 5 seconds. For nonblocking we have to try
> more
> @@ -177,35 +168,21 @@ smb_send_kvec(struct TCP_Server_Info *server,
> struct kvec *iov, size_t n_vec,
> * after the retries we will kill the socket and
> * reconnect which may clear the network problem.
> */
> - rc = kernel_sendmsg(ssocket, &smb_msg,
> &iov[first_vec],
> - n_vec - first_vec, remaining);
> + rc = sock_sendmsg(ssocket, smb_msg);
> if (rc == -EAGAIN) {
> - i++;
> - if (i >= 14 || (!server->noblocksnd && (i >
> 2))) {
> + retries++;
> + if (retries >= 14 ||
> + (!server->noblocksnd && (retries > 2)))
> {
> cifs_dbg(VFS, "sends on sock %p
> stuck for 15 seconds\n",
> ssocket);
> - rc = -EAGAIN;
> - break;
> + return -EAGAIN;
> }
> - msleep(1 << i);
> + msleep(1 << retries);
> continue;
> }
>
> if (rc < 0)
> - break;
> -
> - /* send was at least partially successful */
> - *sent += rc;
> -
> - if (rc == remaining) {
> - remaining = 0;
> - break;
> - }
> -
> - if (rc > remaining) {
> - cifs_dbg(VFS, "sent %d requested %d\n", rc,
> remaining);
> - break;
> - }
> + return rc;
>
> if (rc == 0) {
> /* should never happen, letting socket clear
> before
> @@ -215,59 +192,11 @@ smb_send_kvec(struct TCP_Server_Info *server,
> struct kvec *iov, size_t n_vec,
> continue;
> }
>
> - remaining -= rc;
> -
> - /* the line below resets i */
> - for (i = first_vec; i < n_vec; i++) {
> - if (iov[i].iov_len) {
> - if (rc > iov[i].iov_len) {
> - rc -= iov[i].iov_len;
> - iov[i].iov_len = 0;
> - } else {
> - iov[i].iov_base += rc;
> - iov[i].iov_len -= rc;
> - first_vec = i;
> - break;
> - }
> - }
> - }
> -
> - i = 0; /* in case we get ENOSPC on the next send */
> - rc = 0;
> + /* send was at least partially successful */
> + *sent += rc;
> + retries = 0; /* in case we get ENOSPC on the next
> send */
> }
> - return rc;
> -}
> -
> -/**
> - * rqst_page_to_kvec - Turn a slot in the smb_rqst page array into a
> kvec
> - * @rqst: pointer to smb_rqst
> - * @idx: index into the array of the page
> - * @iov: pointer to struct kvec that will hold the result
> - *
> - * Helper function to convert a slot in the rqst->rq_pages array
> into a kvec.
> - * The page will be kmapped and the address placed into iov_base.
> The length
> - * will then be adjusted according to the ptailoff.
> - */
> -void
> -cifs_rqst_page_to_kvec(struct smb_rqst *rqst, unsigned int idx,
> - struct kvec *iov)
> -{
> - /*
> - * FIXME: We could avoid this kmap altogether if we used
> - * kernel_sendpage instead of kernel_sendmsg. That will only
> - * work if signing is disabled though as sendpage inlines
> the
> - * page directly into the fraglist. If userspace modifies
> the
> - * page after we calculate the signature, then the server
> will
> - * reject it and may break the connection. kernel_sendmsg
> does
> - * an extra copy of the data and avoids that issue.
> - */
> - iov->iov_base = kmap(rqst->rq_pages[idx]);
> -
> - /* if last page, don't send beyond this offset into page */
> - if (idx == (rqst->rq_npages - 1))
> - iov->iov_len = rqst->rq_tailsz;
> - else
> - iov->iov_len = rqst->rq_pagesz;
> + return 0;
> }
>
> static unsigned long
> @@ -299,8 +228,9 @@ smb_send_rqst(struct TCP_Server_Info *server,
> struct smb_rqst *rqst)
> unsigned int smb_buf_length =
> get_rfc1002_length(iov[0].iov_base);
> unsigned long send_length;
> unsigned int i;
> - size_t total_len = 0, sent;
> + size_t total_len = 0, sent, size;
> struct socket *ssocket = server->ssocket;
> + struct msghdr smb_msg;
> int val = 1;
>
> if (ssocket == NULL)
> @@ -321,7 +251,13 @@ smb_send_rqst(struct TCP_Server_Info *server,
> struct smb_rqst *rqst)
> kernel_setsockopt(ssocket, SOL_TCP, TCP_CORK,
> (char *)&val, sizeof(val));
>
> - rc = smb_send_kvec(server, iov, n_vec, &sent);
> + size = 0;
> + for (i = 0; i < n_vec; i++)
> + size += iov[i].iov_len;
> +
> + iov_iter_kvec(&smb_msg.msg_iter, WRITE | ITER_KVEC, iov,
> n_vec, size);
> +
> + rc = smb_send_kvec(server, &smb_msg, &sent);
> if (rc < 0)
> goto uncork;
>
> @@ -329,11 +265,16 @@ smb_send_rqst(struct TCP_Server_Info *server,
> struct smb_rqst *rqst)
>
> /* now walk the page array and send each page in it */
> for (i = 0; i < rqst->rq_npages; i++) {
> - struct kvec p_iov;
> -
> - cifs_rqst_page_to_kvec(rqst, i, &p_iov);
> - rc = smb_send_kvec(server, &p_iov, 1, &sent);
> - kunmap(rqst->rq_pages[i]);
> + size_t len = i == rqst->rq_npages - 1
> + ? rqst->rq_tailsz
> + : rqst->rq_pagesz;
> + struct bio_vec bvec = {
> + .bv_page = rqst->rq_pages[i],
> + .bv_len = len
> + };
> + iov_iter_bvec(&smb_msg.msg_iter, WRITE | ITER_BVEC,
> + &bvec, 1, len);
> + rc = smb_send_kvec(server, &smb_msg, &sent);
> if (rc < 0)
> break;
>
What's the advantage of using iov_iter_bvec over iov_iter_kvec ?
That said...
Acked-by: Jeff Layton <jlayton@poochiereds.net>
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 4/6] cifs: no need to wank with copying and advancing iovec on recvmsg side either
2016-04-09 20:52 ` Al Viro
@ 2016-04-19 17:55 ` Jeff Layton
-1 siblings, 0 replies; 31+ messages in thread
From: Jeff Layton @ 2016-04-19 17:55 UTC (permalink / raw)
To: Al Viro, linux-cifs-u79uwXL29TY76Z2rM5mHXA
Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA
On Sat, 2016-04-09 at 21:52 +0100, Al Viro wrote:
> Signed-off-by: Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
> ---
> fs/cifs/cifsglob.h | 2 --
> fs/cifs/connect.c | 72 ++++--------------------------------------------------
> 2 files changed, 5 insertions(+), 69 deletions(-)
>
> diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
> index d21da9f..df03c5e 100644
> --- a/fs/cifs/cifsglob.h
> +++ b/fs/cifs/cifsglob.h
> @@ -615,8 +615,6 @@ struct TCP_Server_Info {
> bool sec_mskerberos; /* supports legacy MS Kerberos */
> bool large_buf; /* is current buffer large? */
> struct delayed_work echo; /* echo ping workqueue job */
> - struct kvec *iov; /* reusable kvec array for receives */
> - unsigned int nr_iov; /* number of kvecs in array */
> char *smallbuf; /* pointer to current "small" buffer */
> char *bigbuf; /* pointer to current "big" buffer */
> unsigned int total_read; /* total amount of data read in this pass */
> diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
> index a763cd3..eb42665 100644
> --- a/fs/cifs/connect.c
> +++ b/fs/cifs/connect.c
> @@ -501,77 +501,20 @@ server_unresponsive(struct TCP_Server_Info *server)
> return false;
> }
>
> -/*
> - * kvec_array_init - clone a kvec array, and advance into it
> - * @new: pointer to memory for cloned array
> - * @iov: pointer to original array
> - * @nr_segs: number of members in original array
> - * @bytes: number of bytes to advance into the cloned array
> - *
> - * This function will copy the array provided in iov to a section of memory
> - * and advance the specified number of bytes into the new array. It returns
> - * the number of segments in the new array. "new" must be at least as big as
> - * the original iov array.
> - */
> -static unsigned int
> -kvec_array_init(struct kvec *new, struct kvec *iov, unsigned int nr_segs,
> - size_t bytes)
> -{
> - size_t base = 0;
> -
> - while (bytes || !iov->iov_len) {
> - int copy = min(bytes, iov->iov_len);
> -
> - bytes -= copy;
> - base += copy;
> - if (iov->iov_len == base) {
> - iov++;
> - nr_segs--;
> - base = 0;
> - }
> - }
> - memcpy(new, iov, sizeof(*iov) * nr_segs);
> - new->iov_base += base;
> - new->iov_len -= base;
> - return nr_segs;
> -}
> -
> -static struct kvec *
> -get_server_iovec(struct TCP_Server_Info *server, unsigned int nr_segs)
> -{
> - struct kvec *new_iov;
> -
> - if (server->iov && nr_segs <= server->nr_iov)
> - return server->iov;
> -
> - /* not big enough -- allocate a new one and release the old */
> - new_iov = kmalloc(sizeof(*new_iov) * nr_segs, GFP_NOFS);
> - if (new_iov) {
> - kfree(server->iov);
> - server->iov = new_iov;
> - server->nr_iov = nr_segs;
> - }
> - return new_iov;
> -}
> -
> int
> cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
> unsigned int nr_segs, unsigned int to_read)
> {
> int length = 0;
> int total_read;
> - unsigned int segs;
> struct msghdr smb_msg;
> - struct kvec *iov;
> -
> - iov = get_server_iovec(server, nr_segs);
> - if (!iov)
> - return -ENOMEM;
>
> smb_msg.msg_control = NULL;
> smb_msg.msg_controllen = 0;
> + iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC,
> + iov_orig, nr_segs, to_read);
>
> - for (total_read = 0; to_read; total_read += length, to_read -= length) {
> + for (total_read = 0; msg_data_left(&smb_msg); total_read += length) {
> try_to_freeze();
>
> if (server_unresponsive(server)) {
> @@ -579,10 +522,7 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
> break;
> }
>
> - segs = kvec_array_init(iov, iov_orig, nr_segs, total_read);
> -
> - length = kernel_recvmsg(server->ssocket, &smb_msg,
> - iov, segs, to_read, 0);
> + length = sock_recvmsg(server->ssocket, &smb_msg, 0);
>
> if (server->tcpStatus == CifsExiting) {
> total_read = -ESHUTDOWN;
> @@ -603,8 +543,7 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
> length = 0;
> continue;
> } else if (length <= 0) {
> - cifs_dbg(FYI, "Received no data or error: expecting %d\n"
> - "got %d", to_read, length);
> + cifs_dbg(FYI, "Received no data or error: %d\n", length);
> cifs_reconnect(server);
> total_read = -ECONNABORTED;
> break;
> @@ -783,7 +722,6 @@ static void clean_demultiplex_info(struct TCP_Server_Info *server)
> }
>
> kfree(server->hostname);
> - kfree(server->iov);
> kfree(server);
>
> length = atomic_dec_return(&tcpSesAllocCount);
Good riddance.
Reviewed-by: Jeff Layton <jlayton-vpEMnDpepFuMZCB2o+C8xQ@public.gmane.org>
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 4/6] cifs: no need to wank with copying and advancing iovec on recvmsg side either
@ 2016-04-19 17:55 ` Jeff Layton
0 siblings, 0 replies; 31+ messages in thread
From: Jeff Layton @ 2016-04-19 17:55 UTC (permalink / raw)
To: Al Viro, linux-cifs; +Cc: linux-kernel
On Sat, 2016-04-09 at 21:52 +0100, Al Viro wrote:
> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
> ---
> fs/cifs/cifsglob.h | 2 --
> fs/cifs/connect.c | 72 ++++--------------------------------------------------
> 2 files changed, 5 insertions(+), 69 deletions(-)
>
> diff --git a/fs/cifs/cifsglob.h b/fs/cifs/cifsglob.h
> index d21da9f..df03c5e 100644
> --- a/fs/cifs/cifsglob.h
> +++ b/fs/cifs/cifsglob.h
> @@ -615,8 +615,6 @@ struct TCP_Server_Info {
> bool sec_mskerberos; /* supports legacy MS Kerberos */
> bool large_buf; /* is current buffer large? */
> struct delayed_work echo; /* echo ping workqueue job */
> - struct kvec *iov; /* reusable kvec array for receives */
> - unsigned int nr_iov; /* number of kvecs in array */
> char *smallbuf; /* pointer to current "small" buffer */
> char *bigbuf; /* pointer to current "big" buffer */
> unsigned int total_read; /* total amount of data read in this pass */
> diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
> index a763cd3..eb42665 100644
> --- a/fs/cifs/connect.c
> +++ b/fs/cifs/connect.c
> @@ -501,77 +501,20 @@ server_unresponsive(struct TCP_Server_Info *server)
> return false;
> }
>
> -/*
> - * kvec_array_init - clone a kvec array, and advance into it
> - * @new: pointer to memory for cloned array
> - * @iov: pointer to original array
> - * @nr_segs: number of members in original array
> - * @bytes: number of bytes to advance into the cloned array
> - *
> - * This function will copy the array provided in iov to a section of memory
> - * and advance the specified number of bytes into the new array. It returns
> - * the number of segments in the new array. "new" must be at least as big as
> - * the original iov array.
> - */
> -static unsigned int
> -kvec_array_init(struct kvec *new, struct kvec *iov, unsigned int nr_segs,
> - size_t bytes)
> -{
> - size_t base = 0;
> -
> - while (bytes || !iov->iov_len) {
> - int copy = min(bytes, iov->iov_len);
> -
> - bytes -= copy;
> - base += copy;
> - if (iov->iov_len == base) {
> - iov++;
> - nr_segs--;
> - base = 0;
> - }
> - }
> - memcpy(new, iov, sizeof(*iov) * nr_segs);
> - new->iov_base += base;
> - new->iov_len -= base;
> - return nr_segs;
> -}
> -
> -static struct kvec *
> -get_server_iovec(struct TCP_Server_Info *server, unsigned int nr_segs)
> -{
> - struct kvec *new_iov;
> -
> - if (server->iov && nr_segs <= server->nr_iov)
> - return server->iov;
> -
> - /* not big enough -- allocate a new one and release the old */
> - new_iov = kmalloc(sizeof(*new_iov) * nr_segs, GFP_NOFS);
> - if (new_iov) {
> - kfree(server->iov);
> - server->iov = new_iov;
> - server->nr_iov = nr_segs;
> - }
> - return new_iov;
> -}
> -
> int
> cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
> unsigned int nr_segs, unsigned int to_read)
> {
> int length = 0;
> int total_read;
> - unsigned int segs;
> struct msghdr smb_msg;
> - struct kvec *iov;
> -
> - iov = get_server_iovec(server, nr_segs);
> - if (!iov)
> - return -ENOMEM;
>
> smb_msg.msg_control = NULL;
> smb_msg.msg_controllen = 0;
> + iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC,
> + iov_orig, nr_segs, to_read);
>
> - for (total_read = 0; to_read; total_read += length, to_read -= length) {
> + for (total_read = 0; msg_data_left(&smb_msg); total_read += length) {
> try_to_freeze();
>
> if (server_unresponsive(server)) {
> @@ -579,10 +522,7 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
> break;
> }
>
> - segs = kvec_array_init(iov, iov_orig, nr_segs, total_read);
> -
> - length = kernel_recvmsg(server->ssocket, &smb_msg,
> - iov, segs, to_read, 0);
> + length = sock_recvmsg(server->ssocket, &smb_msg, 0);
>
> if (server->tcpStatus == CifsExiting) {
> total_read = -ESHUTDOWN;
> @@ -603,8 +543,7 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
> length = 0;
> continue;
> } else if (length <= 0) {
> - cifs_dbg(FYI, "Received no data or error: expecting %d\n"
> - "got %d", to_read, length);
> + cifs_dbg(FYI, "Received no data or error: %d\n", length);
> cifs_reconnect(server);
> total_read = -ECONNABORTED;
> break;
> @@ -783,7 +722,6 @@ static void clean_demultiplex_info(struct TCP_Server_Info *server)
> }
>
> kfree(server->hostname);
> - kfree(server->iov);
> kfree(server);
>
> length = atomic_dec_return(&tcpSesAllocCount);
Good riddance.
Reviewed-by: Jeff Layton <jlayton@poochiereds.net>
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 6/6] cifs: don't bother with kmap on read_pages side
2016-04-09 20:53 ` Al Viro
@ 2016-04-19 18:24 ` Jeff Layton
-1 siblings, 0 replies; 31+ messages in thread
From: Jeff Layton @ 2016-04-19 18:24 UTC (permalink / raw)
To: Al Viro, linux-cifs-u79uwXL29TY76Z2rM5mHXA
Cc: linux-kernel-u79uwXL29TY76Z2rM5mHXA
On Sat, 2016-04-09 at 21:53 +0100, Al Viro wrote:
> just do ITER_BVEC recvmsg
>
> Signed-off-by: Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
> ---
> fs/cifs/cifsproto.h | 7 +++---
> fs/cifs/connect.c | 65 ++++++++++++++++++++++++++++-------------------------
> fs/cifs/file.c | 53 ++++++++++++++-----------------------------
> 3 files changed, 55 insertions(+), 70 deletions(-)
>
> diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
> index 7d5f53a..0f9a6bc 100644
> --- a/fs/cifs/cifsproto.h
> +++ b/fs/cifs/cifsproto.h
> @@ -179,10 +179,9 @@ extern int set_cifs_acl(struct cifs_ntsd *, __u32, struct inode *,
>
> extern void dequeue_mid(struct mid_q_entry *mid, bool malformed);
> extern int cifs_read_from_socket(struct TCP_Server_Info *server, char *buf,
> - unsigned int to_read);
> -extern int cifs_readv_from_socket(struct TCP_Server_Info *server,
> - struct kvec *iov_orig, unsigned int nr_segs,
> - unsigned int to_read);
> + unsigned int to_read);
> +extern int cifs_read_page_from_socket(struct TCP_Server_Info *server,
> + struct page *page, unsigned int to_read);
> extern void cifs_setup_cifs_sb(struct smb_vol *pvolume_info,
> struct cifs_sb_info *cifs_sb);
> extern int cifs_match_super(struct super_block *, void *);
> diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
> index eb42665..e33c5e0 100644
> --- a/fs/cifs/connect.c
> +++ b/fs/cifs/connect.c
> @@ -501,39 +501,34 @@ server_unresponsive(struct TCP_Server_Info *server)
> return false;
> }
>
> -int
> -cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
> - unsigned int nr_segs, unsigned int to_read)
> +static int
> +cifs_readv_from_socket(struct TCP_Server_Info *server, struct msghdr *smb_msg)
> {
> int length = 0;
> int total_read;
> - struct msghdr smb_msg;
>
> - smb_msg.msg_control = NULL;
> - smb_msg.msg_controllen = 0;
> - iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC,
> - iov_orig, nr_segs, to_read);
> + smb_msg->msg_control = NULL;
> + smb_msg->msg_controllen = 0;
>
> - for (total_read = 0; msg_data_left(&smb_msg); total_read += length) {
> + for (total_read = 0; msg_data_left(smb_msg); total_read += length) {
> try_to_freeze();
>
> - if (server_unresponsive(server)) {
> - total_read = -ECONNABORTED;
> - break;
> - }
> + if (server_unresponsive(server))
> + return -ECONNABORTED;
>
> - length = sock_recvmsg(server->ssocket, &smb_msg, 0);
> + length = sock_recvmsg(server->ssocket, smb_msg, 0);
>
> - if (server->tcpStatus == CifsExiting) {
> - total_read = -ESHUTDOWN;
> - break;
> - } else if (server->tcpStatus == CifsNeedReconnect) {
> + if (server->tcpStatus == CifsExiting)
> + return -ESHUTDOWN;
> +
> + if (server->tcpStatus == CifsNeedReconnect) {
> cifs_reconnect(server);
> - total_read = -ECONNABORTED;
> - break;
> - } else if (length == -ERESTARTSYS ||
> - length == -EAGAIN ||
> - length == -EINTR) {
> + return -ECONNABORTED;
> + }
> +
> + if (length == -ERESTARTSYS ||
> + length == -EAGAIN ||
> + length == -EINTR) {
> /*
> * Minimum sleep to prevent looping, allowing socket
> * to clear and app threads to set tcpStatus
> @@ -542,11 +537,12 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
> usleep_range(1000, 2000);
> length = 0;
> continue;
> - } else if (length <= 0) {
> + }
> +
> + if (length <= 0) {
> cifs_dbg(FYI, "Received no data or error: %d\n", length);
> cifs_reconnect(server);
> - total_read = -ECONNABORTED;
> - break;
> + return -ECONNABORTED;
> }
> }
> return total_read;
> @@ -556,12 +552,21 @@ int
> cifs_read_from_socket(struct TCP_Server_Info *server, char *buf,
> unsigned int to_read)
> {
> - struct kvec iov;
> + struct msghdr smb_msg;
> + struct kvec iov = {.iov_base = buf, .iov_len = to_read};
> + iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC, &iov, 1, to_read);
>
> - iov.iov_base = buf;
> - iov.iov_len = to_read;
> + return cifs_readv_from_socket(server, &smb_msg);
> +}
>
> - return cifs_readv_from_socket(server, &iov, 1, to_read);
> +int
> +cifs_read_page_from_socket(struct TCP_Server_Info *server, struct page *page,
> + unsigned int to_read)
> +{
> + struct msghdr smb_msg;
> + struct bio_vec bv = {.bv_page = page, .bv_len = to_read};
> + iov_iter_bvec(&smb_msg.msg_iter, READ | ITER_BVEC, &bv, 1, to_read);
> + return cifs_readv_from_socket(server, &smb_msg);
> }
>
> static bool
> diff --git a/fs/cifs/file.c b/fs/cifs/file.c
> index ff882ae..0f71867 100644
> --- a/fs/cifs/file.c
> +++ b/fs/cifs/file.c
> @@ -2855,39 +2855,31 @@ cifs_uncached_read_into_pages(struct TCP_Server_Info *server,
> int result = 0;
> unsigned int i;
> unsigned int nr_pages = rdata->nr_pages;
> - struct kvec iov;
>
> rdata->got_bytes = 0;
> rdata->tailsz = PAGE_SIZE;
> for (i = 0; i < nr_pages; i++) {
> struct page *page = rdata->pages[i];
> + size_t n;
>
> - if (len >= PAGE_SIZE) {
> - /* enough data to fill the page */
> - iov.iov_base = kmap(page);
> - iov.iov_len = PAGE_SIZE;
> - cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
> - i, iov.iov_base, iov.iov_len);
> - len -= PAGE_SIZE;
> - } else if (len > 0) {
> - /* enough for partial page, fill and zero the rest */
> - iov.iov_base = kmap(page);
> - iov.iov_len = len;
> - cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
> - i, iov.iov_base, iov.iov_len);
> - memset(iov.iov_base + len, '\0', PAGE_SIZE - len);
> - rdata->tailsz = len;
> - len = 0;
> - } else {
> + if (len <= 0) {
> /* no need to hold page hostage */
> rdata->pages[i] = NULL;
> rdata->nr_pages--;
> put_page(page);
> continue;
> }
> -
> - result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
> - kunmap(page);
> + n = len;
> + if (len >= PAGE_SIZE) {
> + /* enough data to fill the page */
> + n = PAGE_SIZE;
> + len -= n;
> + } else {
> + zero_user(page, len, PAGE_SIZE - len);
> + rdata->tailsz = len;
> + len = 0;
> + }
> + result = cifs_read_page_from_socket(server, page, n);
> if (result < 0)
> break;
>
> @@ -3303,7 +3295,6 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
> u64 eof;
> pgoff_t eof_index;
> unsigned int nr_pages = rdata->nr_pages;
> - struct kvec iov;
>
> /* determine the eof that the server (probably) has */
> eof = CIFS_I(rdata->mapping->host)->server_eof;
> @@ -3314,23 +3305,14 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
> rdata->tailsz = PAGE_CACHE_SIZE;
> for (i = 0; i < nr_pages; i++) {
> struct page *page = rdata->pages[i];
> + size_t n = PAGE_CACHE_SIZE;
>
> if (len >= PAGE_CACHE_SIZE) {
> - /* enough data to fill the page */
> - iov.iov_base = kmap(page);
> - iov.iov_len = PAGE_CACHE_SIZE;
> - cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
> - i, page->index, iov.iov_base, iov.iov_len);
> len -= PAGE_CACHE_SIZE;
> } else if (len > 0) {
> /* enough for partial page, fill and zero the rest */
> - iov.iov_base = kmap(page);
> - iov.iov_len = len;
> - cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
> - i, page->index, iov.iov_base, iov.iov_len);
> - memset(iov.iov_base + len,
> - '\0', PAGE_CACHE_SIZE - len);
> - rdata->tailsz = len;
> + zero_user(page, len, PAGE_CACHE_SIZE - len);
> + n = rdata->tailsz = len;
> len = 0;
> } else if (page->index > eof_index) {
> /*
> @@ -3360,8 +3342,7 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
> continue;
> }
>
> - result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
> - kunmap(page);
> + result = cifs_read_page_from_socket(server, page, n);
> if (result < 0)
> break;
>
Reviewed-by: Jeff Layton <jlayton-vpEMnDpepFuMZCB2o+C8xQ@public.gmane.org>
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 6/6] cifs: don't bother with kmap on read_pages side
@ 2016-04-19 18:24 ` Jeff Layton
0 siblings, 0 replies; 31+ messages in thread
From: Jeff Layton @ 2016-04-19 18:24 UTC (permalink / raw)
To: Al Viro, linux-cifs; +Cc: linux-kernel
On Sat, 2016-04-09 at 21:53 +0100, Al Viro wrote:
> just do ITER_BVEC recvmsg
>
> Signed-off-by: Al Viro <viro@zeniv.linux.org.uk>
> ---
> fs/cifs/cifsproto.h | 7 +++---
> fs/cifs/connect.c | 65 ++++++++++++++++++++++++++++-------------------------
> fs/cifs/file.c | 53 ++++++++++++++-----------------------------
> 3 files changed, 55 insertions(+), 70 deletions(-)
>
> diff --git a/fs/cifs/cifsproto.h b/fs/cifs/cifsproto.h
> index 7d5f53a..0f9a6bc 100644
> --- a/fs/cifs/cifsproto.h
> +++ b/fs/cifs/cifsproto.h
> @@ -179,10 +179,9 @@ extern int set_cifs_acl(struct cifs_ntsd *, __u32, struct inode *,
>
> extern void dequeue_mid(struct mid_q_entry *mid, bool malformed);
> extern int cifs_read_from_socket(struct TCP_Server_Info *server, char *buf,
> - unsigned int to_read);
> -extern int cifs_readv_from_socket(struct TCP_Server_Info *server,
> - struct kvec *iov_orig, unsigned int nr_segs,
> - unsigned int to_read);
> + unsigned int to_read);
> +extern int cifs_read_page_from_socket(struct TCP_Server_Info *server,
> + struct page *page, unsigned int to_read);
> extern void cifs_setup_cifs_sb(struct smb_vol *pvolume_info,
> struct cifs_sb_info *cifs_sb);
> extern int cifs_match_super(struct super_block *, void *);
> diff --git a/fs/cifs/connect.c b/fs/cifs/connect.c
> index eb42665..e33c5e0 100644
> --- a/fs/cifs/connect.c
> +++ b/fs/cifs/connect.c
> @@ -501,39 +501,34 @@ server_unresponsive(struct TCP_Server_Info *server)
> return false;
> }
>
> -int
> -cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
> - unsigned int nr_segs, unsigned int to_read)
> +static int
> +cifs_readv_from_socket(struct TCP_Server_Info *server, struct msghdr *smb_msg)
> {
> int length = 0;
> int total_read;
> - struct msghdr smb_msg;
>
> - smb_msg.msg_control = NULL;
> - smb_msg.msg_controllen = 0;
> - iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC,
> - iov_orig, nr_segs, to_read);
> + smb_msg->msg_control = NULL;
> + smb_msg->msg_controllen = 0;
>
> - for (total_read = 0; msg_data_left(&smb_msg); total_read += length) {
> + for (total_read = 0; msg_data_left(smb_msg); total_read += length) {
> try_to_freeze();
>
> - if (server_unresponsive(server)) {
> - total_read = -ECONNABORTED;
> - break;
> - }
> + if (server_unresponsive(server))
> + return -ECONNABORTED;
>
> - length = sock_recvmsg(server->ssocket, &smb_msg, 0);
> + length = sock_recvmsg(server->ssocket, smb_msg, 0);
>
> - if (server->tcpStatus == CifsExiting) {
> - total_read = -ESHUTDOWN;
> - break;
> - } else if (server->tcpStatus == CifsNeedReconnect) {
> + if (server->tcpStatus == CifsExiting)
> + return -ESHUTDOWN;
> +
> + if (server->tcpStatus == CifsNeedReconnect) {
> cifs_reconnect(server);
> - total_read = -ECONNABORTED;
> - break;
> - } else if (length == -ERESTARTSYS ||
> - length == -EAGAIN ||
> - length == -EINTR) {
> + return -ECONNABORTED;
> + }
> +
> + if (length == -ERESTARTSYS ||
> + length == -EAGAIN ||
> + length == -EINTR) {
> /*
> * Minimum sleep to prevent looping, allowing socket
> * to clear and app threads to set tcpStatus
> @@ -542,11 +537,12 @@ cifs_readv_from_socket(struct TCP_Server_Info *server, struct kvec *iov_orig,
> usleep_range(1000, 2000);
> length = 0;
> continue;
> - } else if (length <= 0) {
> + }
> +
> + if (length <= 0) {
> cifs_dbg(FYI, "Received no data or error: %d\n", length);
> cifs_reconnect(server);
> - total_read = -ECONNABORTED;
> - break;
> + return -ECONNABORTED;
> }
> }
> return total_read;
> @@ -556,12 +552,21 @@ int
> cifs_read_from_socket(struct TCP_Server_Info *server, char *buf,
> unsigned int to_read)
> {
> - struct kvec iov;
> + struct msghdr smb_msg;
> + struct kvec iov = {.iov_base = buf, .iov_len = to_read};
> + iov_iter_kvec(&smb_msg.msg_iter, READ | ITER_KVEC, &iov, 1, to_read);
>
> - iov.iov_base = buf;
> - iov.iov_len = to_read;
> + return cifs_readv_from_socket(server, &smb_msg);
> +}
>
> - return cifs_readv_from_socket(server, &iov, 1, to_read);
> +int
> +cifs_read_page_from_socket(struct TCP_Server_Info *server, struct page *page,
> + unsigned int to_read)
> +{
> + struct msghdr smb_msg;
> + struct bio_vec bv = {.bv_page = page, .bv_len = to_read};
> + iov_iter_bvec(&smb_msg.msg_iter, READ | ITER_BVEC, &bv, 1, to_read);
> + return cifs_readv_from_socket(server, &smb_msg);
> }
>
> static bool
> diff --git a/fs/cifs/file.c b/fs/cifs/file.c
> index ff882ae..0f71867 100644
> --- a/fs/cifs/file.c
> +++ b/fs/cifs/file.c
> @@ -2855,39 +2855,31 @@ cifs_uncached_read_into_pages(struct TCP_Server_Info *server,
> int result = 0;
> unsigned int i;
> unsigned int nr_pages = rdata->nr_pages;
> - struct kvec iov;
>
> rdata->got_bytes = 0;
> rdata->tailsz = PAGE_SIZE;
> for (i = 0; i < nr_pages; i++) {
> struct page *page = rdata->pages[i];
> + size_t n;
>
> - if (len >= PAGE_SIZE) {
> - /* enough data to fill the page */
> - iov.iov_base = kmap(page);
> - iov.iov_len = PAGE_SIZE;
> - cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
> - i, iov.iov_base, iov.iov_len);
> - len -= PAGE_SIZE;
> - } else if (len > 0) {
> - /* enough for partial page, fill and zero the rest */
> - iov.iov_base = kmap(page);
> - iov.iov_len = len;
> - cifs_dbg(FYI, "%u: iov_base=%p iov_len=%zu\n",
> - i, iov.iov_base, iov.iov_len);
> - memset(iov.iov_base + len, '\0', PAGE_SIZE - len);
> - rdata->tailsz = len;
> - len = 0;
> - } else {
> + if (len <= 0) {
> /* no need to hold page hostage */
> rdata->pages[i] = NULL;
> rdata->nr_pages--;
> put_page(page);
> continue;
> }
> -
> - result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
> - kunmap(page);
> + n = len;
> + if (len >= PAGE_SIZE) {
> + /* enough data to fill the page */
> + n = PAGE_SIZE;
> + len -= n;
> + } else {
> + zero_user(page, len, PAGE_SIZE - len);
> + rdata->tailsz = len;
> + len = 0;
> + }
> + result = cifs_read_page_from_socket(server, page, n);
> if (result < 0)
> break;
>
> @@ -3303,7 +3295,6 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
> u64 eof;
> pgoff_t eof_index;
> unsigned int nr_pages = rdata->nr_pages;
> - struct kvec iov;
>
> /* determine the eof that the server (probably) has */
> eof = CIFS_I(rdata->mapping->host)->server_eof;
> @@ -3314,23 +3305,14 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
> rdata->tailsz = PAGE_CACHE_SIZE;
> for (i = 0; i < nr_pages; i++) {
> struct page *page = rdata->pages[i];
> + size_t n = PAGE_CACHE_SIZE;
>
> if (len >= PAGE_CACHE_SIZE) {
> - /* enough data to fill the page */
> - iov.iov_base = kmap(page);
> - iov.iov_len = PAGE_CACHE_SIZE;
> - cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
> - i, page->index, iov.iov_base, iov.iov_len);
> len -= PAGE_CACHE_SIZE;
> } else if (len > 0) {
> /* enough for partial page, fill and zero the rest */
> - iov.iov_base = kmap(page);
> - iov.iov_len = len;
> - cifs_dbg(FYI, "%u: idx=%lu iov_base=%p iov_len=%zu\n",
> - i, page->index, iov.iov_base, iov.iov_len);
> - memset(iov.iov_base + len,
> - '\0', PAGE_CACHE_SIZE - len);
> - rdata->tailsz = len;
> + zero_user(page, len, PAGE_CACHE_SIZE - len);
> + n = rdata->tailsz = len;
> len = 0;
> } else if (page->index > eof_index) {
> /*
> @@ -3360,8 +3342,7 @@ cifs_readpages_read_into_pages(struct TCP_Server_Info *server,
> continue;
> }
>
> - result = cifs_readv_from_socket(server, &iov, 1, iov.iov_len);
> - kunmap(page);
> + result = cifs_read_page_from_socket(server, page, n);
> if (result < 0)
> break;
>
Reviewed-by: Jeff Layton <jlayton@poochiereds.net>
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [PATCH 3/6] cifs: quit playing games with draining iovecs
2016-04-19 17:53 ` Jeff Layton
(?)
@ 2016-04-19 22:41 ` Al Viro
-1 siblings, 0 replies; 31+ messages in thread
From: Al Viro @ 2016-04-19 22:41 UTC (permalink / raw)
To: Jeff Layton; +Cc: linux-cifs, linux-kernel
On Tue, Apr 19, 2016 at 01:53:17PM -0400, Jeff Layton wrote:
> What's the advantage of using iov_iter_bvec over iov_iter_kvec ?
No need to screw with kmap() in the caller; moreover, when it comes to actual
copying it gets away with kmap_atomic() just around the memcpy(), which is
considerably cheaper.
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [RFC][PATCHSET] reduce messing with iovecs in cifs
2016-04-09 20:43 ` Al Viro
@ 2016-04-25 3:22 ` Steve French
-1 siblings, 0 replies; 31+ messages in thread
From: Steve French @ 2016-04-25 3:22 UTC (permalink / raw)
To: Al Viro; +Cc: linux-cifs-u79uwXL29TY76Z2rM5mHXA, LKML
Reviewed-by: Steve French <steve.french-7I+n7zu2hftEKMMhf/gKZA@public.gmane.org>
Let me know if you want any of them to go in via the cifs tree or
prefer going in through your tree (other than patch 1 which could go
in the net-next tree are you indicated)
On Sat, Apr 9, 2016 at 3:43 PM, Al Viro <viro-RmSDqhL/yNMiFSDQTTA3OLVCufUGDwFn@public.gmane.org> wrote:
> Now that sendmsg/recvmsg do not mangle iovecs and are capable of
> handling bvec-based ->msg_iter, we can seriously reduce the amount of PITA
> in cifs. The series below is completely untested, and I would appreciate
> comments/review/testing/etc.
>
> I'll post the individual patches in followups; for those who prefer to use
> git it can be found in
> git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs.git sendmsg.cifs
>
> 1/6: [net] drop 'size' argument of sock_recvmsg()
> should go via net-next; does what it says.
>
> 2/6: cifs: merge the hash calculation helpers
> takes the common parts of {cifs,smb2,smb3}_calc_signature() into a
> common helper.
>
> 3/6: cifs: quit playing games with draining iovecs
> Switch smb_send_kvec() to passing msghdr (and thus iov_iter) and
> make it use sock_sendmsg() - that allows to avoid draining iovecs, since
> ->msg_iter will be advanced properly and all we need is to keep it around
> between the calls of sock_sendmsg(), rather than reinitializing it on each
> loop iteration. The same thing allows to get rid of messing with kmap()
> when sending the stuff in ->rq_pages[] - ITER_BVEC will do the right thing.
>
> 4/6: cifs: no need to wank with copying and advancing iovec on recvmsg side either
> Similar to the previous - use sock_recvmsg() in cifs_readv_from_socket()
> and there's no need to modify iovecs, or allocate a copy especially for
> such modifications, etc.
>
> 5/6: cifs_readv_receive: use cifs_read_from_socket()
> building a 1-element iovec array for cifs_readv_from_socket() is
> an overkill - simple cifs_read_from_socket() will do just fine.
>
> 6/6: cifs: don't bother with kmap on read_pages side
> Similar to the other half of 3/6: we can use ITER_BVEC for
> read-into-page case. Just make cifs_readv_from_socket() take msghdr from
> caller and use a helper that would feed it a bvec-backed ->msg_iter.
> --
> To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
> the body of a message to majordomo-u79uwXL29TY76Z2rM5mHXA@public.gmane.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
--
Thanks,
Steve
^ permalink raw reply [flat|nested] 31+ messages in thread
* Re: [RFC][PATCHSET] reduce messing with iovecs in cifs
@ 2016-04-25 3:22 ` Steve French
0 siblings, 0 replies; 31+ messages in thread
From: Steve French @ 2016-04-25 3:22 UTC (permalink / raw)
To: Al Viro; +Cc: linux-cifs, LKML
Reviewed-by: Steve French <steve.french@primarydata.com>
Let me know if you want any of them to go in via the cifs tree or
prefer going in through your tree (other than patch 1 which could go
in the net-next tree are you indicated)
On Sat, Apr 9, 2016 at 3:43 PM, Al Viro <viro@zeniv.linux.org.uk> wrote:
> Now that sendmsg/recvmsg do not mangle iovecs and are capable of
> handling bvec-based ->msg_iter, we can seriously reduce the amount of PITA
> in cifs. The series below is completely untested, and I would appreciate
> comments/review/testing/etc.
>
> I'll post the individual patches in followups; for those who prefer to use
> git it can be found in
> git://git.kernel.org/pub/scm/linux/kernel/git/viro/vfs.git sendmsg.cifs
>
> 1/6: [net] drop 'size' argument of sock_recvmsg()
> should go via net-next; does what it says.
>
> 2/6: cifs: merge the hash calculation helpers
> takes the common parts of {cifs,smb2,smb3}_calc_signature() into a
> common helper.
>
> 3/6: cifs: quit playing games with draining iovecs
> Switch smb_send_kvec() to passing msghdr (and thus iov_iter) and
> make it use sock_sendmsg() - that allows to avoid draining iovecs, since
> ->msg_iter will be advanced properly and all we need is to keep it around
> between the calls of sock_sendmsg(), rather than reinitializing it on each
> loop iteration. The same thing allows to get rid of messing with kmap()
> when sending the stuff in ->rq_pages[] - ITER_BVEC will do the right thing.
>
> 4/6: cifs: no need to wank with copying and advancing iovec on recvmsg side either
> Similar to the previous - use sock_recvmsg() in cifs_readv_from_socket()
> and there's no need to modify iovecs, or allocate a copy especially for
> such modifications, etc.
>
> 5/6: cifs_readv_receive: use cifs_read_from_socket()
> building a 1-element iovec array for cifs_readv_from_socket() is
> an overkill - simple cifs_read_from_socket() will do just fine.
>
> 6/6: cifs: don't bother with kmap on read_pages side
> Similar to the other half of 3/6: we can use ITER_BVEC for
> read-into-page case. Just make cifs_readv_from_socket() take msghdr from
> caller and use a helper that would feed it a bvec-backed ->msg_iter.
> --
> To unsubscribe from this list: send the line "unsubscribe linux-cifs" in
> the body of a message to majordomo@vger.kernel.org
> More majordomo info at http://vger.kernel.org/majordomo-info.html
--
Thanks,
Steve
^ permalink raw reply [flat|nested] 31+ messages in thread
end of thread, other threads:[~2016-04-25 3:22 UTC | newest]
Thread overview: 31+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-04-09 20:43 [RFC][PATCHSET] reduce messing with iovecs in cifs Al Viro
2016-04-09 20:43 ` Al Viro
2016-04-09 20:50 ` [PATCH 2/6] cifs: merge the hash calculation helpers Al Viro
[not found] ` <20160409205056.GH25498-3bDd1+5oDREiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
2016-04-13 5:07 ` Shirish Pargaonkar
2016-04-13 5:07 ` Shirish Pargaonkar
2016-04-19 16:12 ` Jeff Layton
[not found] ` <20160409204301.GF25498-3bDd1+5oDREiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
2016-04-09 20:50 ` [PATCH 1/6] [net] drop 'size' argument of sock_recvmsg() Al Viro
2016-04-09 20:50 ` Al Viro
[not found] ` <20160409205029.GG25498-3bDd1+5oDREiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
2016-04-19 16:03 ` Jeff Layton
2016-04-19 16:03 ` Jeff Layton
2016-04-09 20:51 ` [PATCH 3/6] cifs: quit playing games with draining iovecs Al Viro
2016-04-09 20:51 ` Al Viro
[not found] ` <20160409205129.GI25498-3bDd1+5oDREiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
2016-04-19 17:53 ` Jeff Layton
2016-04-19 17:53 ` Jeff Layton
2016-04-19 22:41 ` Al Viro
2016-04-09 20:52 ` [PATCH 4/6] cifs: no need to wank with copying and advancing iovec on recvmsg side either Al Viro
2016-04-09 20:52 ` Al Viro
[not found] ` <20160409205210.GJ25498-3bDd1+5oDREiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
2016-04-19 17:55 ` Jeff Layton
2016-04-19 17:55 ` Jeff Layton
2016-04-09 20:52 ` [PATCH 5/6] cifs_readv_receive: use cifs_read_from_socket() Al Viro
2016-04-09 20:52 ` Al Viro
[not found] ` <20160409205236.GK25498-3bDd1+5oDREiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
2016-04-19 15:01 ` Jeff Layton
2016-04-19 15:01 ` Jeff Layton
2016-04-09 20:53 ` [PATCH 6/6] cifs: don't bother with kmap on read_pages side Al Viro
2016-04-09 20:53 ` Al Viro
[not found] ` <20160409205304.GL25498-3bDd1+5oDREiFSDQTTA3OLVCufUGDwFn@public.gmane.org>
2016-04-19 18:24 ` Jeff Layton
2016-04-19 18:24 ` Jeff Layton
2016-04-11 2:43 ` [RFC][PATCHSET] reduce messing with iovecs in cifs Shirish Pargaonkar
2016-04-11 2:43 ` Shirish Pargaonkar
2016-04-25 3:22 ` Steve French
2016-04-25 3:22 ` Steve French
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.