[PATCH 08/18] nvme-tcp: do not set MSG_SENDPAGE_NOTLAST
Hannes Reinecke
hare at suse.de
Mon Apr 17 08:25:39 PDT 2023
On 4/17/23 17:10, Sagi Grimberg wrote:
> nak from me.
>
>> MSG_SENDPAGE_NOTLAST was introduced with commit 35f9c09fe9c7
>> ("tcp: tcp_sendpages() should call tcp_push() once") to fix issues
>> with the ->sendfile() call, and the implication seems to be that
>> the flag should be strictly internal to sendfile.
>
> no, the use case was to allow sendpage consumers to build larger
> tso packets for large payloads (splice being the primary one), nvme-tcp
> also benefits from it (as do others), just like sendfile.
>
>> Hence we shouldn't be setting it on nvme-tcp, and anyway doing
>> so will cause TLS sending invalid data.
>
> That is something else. I don't recall the full details on the
> discussion with Jakub, but it was not my intention to strike
> it altogether, just remove it if !sendpage_ok.
>
But then we're running afoul with tls_sw_do_sendpage(), which uses
MSG_SENDPAGE_NOTLAST as a record indicator. Forwarding
MSG_SENDPAGE_NOTLAST to tls results in incorrect TLS records on the wire
and a transmission stall.
Took me days to figure that out.
If you have a better idea, I'm all ears.
Cheers,
Hannes
--
Dr. Hannes Reinecke Kernel Storage Architect
hare at suse.de +49 911 74053 688
SUSE Software Solutions GmbH, Maxfeldstr. 5, 90409 Nürnberg
HRB 36809 (AG Nürnberg), Geschäftsführer: Ivo Totev, Andrew
Myers, Andrew McDonald, Martje Boudien Moerman
More information about the Linux-nvme
mailing list