From: Sagi Grimberg <sagi@grimberg.me>
To: Hannes Reinecke <hare@suse.de>, Jakub Kicinski <kuba@kernel.org>
Cc: Christoph Hellwig <hch@lst.de>, Keith Busch <kbusch@kernel.org>,
linux-nvme@lists.infradead.org,
Eric Dumazet <edumazet@google.com>,
Paolo Abeni <pabeni@redhat.com>,
netdev@vger.kernel.org, Boris Pismenny <boris.pismenny@gmail.com>
Subject: Re: [PATCH 4/4] net/tls: implement ->read_sock()
Date: Wed, 21 Jun 2023 12:49:21 +0300 [thread overview]
Message-ID: <476d2cd9-ae32-a4e6-4549-52c3863d4049@grimberg.me> (raw)
In-Reply-To: <f8d789df-8ca7-9f9a-457d-4c87e2ca6d0a@suse.de>
On 6/21/23 12:08, Hannes Reinecke wrote:
> On 6/21/23 10:39, Sagi Grimberg wrote:
>>
>>>> On Tue, 20 Jun 2023 16:21:22 +0300 Sagi Grimberg wrote:
>>>>>> + err = tls_rx_reader_lock(sk, ctx, true);
>>>>>> + if (err < 0)
>>>>>> + return err;
>>>>>
>>>>> Unlike recvmsg or splice_read, the caller of read_sock is assumed to
>>>>> have the socket locked, and tls_rx_reader_lock also calls lock_sock,
>>>>> how is this not a deadlock?
>>>>
>>>> Yeah :|
>>>>
>>>>> I'm not exactly clear why the lock is needed here or what is the
>>>>> subtle
>>>>> distinction between tls_rx_reader_lock and what lock_sock provides.
>>>>
>>>> It's a bit of a workaround for the consistency of the data stream.
>>>> There's bunch of state in the TLS ULP and waiting for mem or data
>>>> releases and re-takes the socket lock. So to stop the flow annoying
>>>> corner case races I slapped a lock around all of the reader.
>>>>
>>>> IMHO depending on the socket lock for anything non-trivial and outside
>>>> of the socket itself is a bad idea in general.
>>>>
>>>> The immediate need at the time was that if you did a read() and someone
>>>> else did a peek() at the same time from a stream of A B C D you may
>>>> read
>>>> A D B C.
>>>
>>> Leaving me ever so confused.
>>>
>>> read_sock() is a generic interface; we cannot require a protocol
>>> specific lock before calling it.
>>>
>>> What to do now?
>>> Drop the tls_rx_read_lock from read_sock() again?
>>
>> Probably just need to synchronize the readers by splitting that from
>> tls_rx_reader_lock:
>> --
>> diff --git a/net/tls/tls_sw.c b/net/tls/tls_sw.c
>> index 53f944e6d8ef..53404c3fdcc6 100644
>> --- a/net/tls/tls_sw.c
>> +++ b/net/tls/tls_sw.c
>> @@ -1845,13 +1845,10 @@ tls_read_flush_backlog(struct sock *sk, struct
>> tls_prot_info *prot,
>> return sk_flush_backlog(sk);
>> }
>>
>> -static int tls_rx_reader_lock(struct sock *sk, struct
>> tls_sw_context_rx *ctx,
>> - bool nonblock)
>> +static int tls_rx_reader_acquire(struct sock *sk, struct
>> tls_sw_context_rx *ctx,
>> + bool nonblock)
>> {
>> long timeo;
>> - int err;
>> -
>> - lock_sock(sk);
>>
>> timeo = sock_rcvtimeo(sk, nonblock);
>>
>> @@ -1865,26 +1862,30 @@ static int tls_rx_reader_lock(struct sock *sk,
>> struct tls_sw_context_rx *ctx,
>> !READ_ONCE(ctx->reader_present), &wait);
>> remove_wait_queue(&ctx->wq, &wait);
>>
>> - if (timeo <= 0) {
>> - err = -EAGAIN;
>> - goto err_unlock;
>> - }
>> - if (signal_pending(current)) {
>> - err = sock_intr_errno(timeo);
>> - goto err_unlock;
>> - }
>> + if (timeo <= 0)
>> + return -EAGAIN;
>> + if (signal_pending(current))
>> + return sock_intr_errno(timeo);
>> }
>>
>> WRITE_ONCE(ctx->reader_present, 1);
>>
>> return 0;
>> +}
>>
>> -err_unlock:
>> - release_sock(sk);
>> +static int tls_rx_reader_lock(struct sock *sk, struct
>> tls_sw_context_rx *ctx,
>> + bool nonblock)
>> +{
>> + int err;
>> +
>> + lock_sock(sk);
>> + err = tls_rx_reader_acquire(sk, ctx, nonblock);
>> + if (err)
>> + release_sock(sk);
>> return err;
>> }
>>
>> -static void tls_rx_reader_unlock(struct sock *sk, struct
>> tls_sw_context_rx *ctx)
>> +static void tls_rx_reader_release(struct sock *sk, struct
>> tls_sw_context_rx *ctx)
>> {
>> if (unlikely(ctx->reader_contended)) {
>> if (wq_has_sleeper(&ctx->wq))
>> @@ -1896,6 +1897,11 @@ static void tls_rx_reader_unlock(struct sock
>> *sk, struct tls_sw_context_rx *ctx)
>> }
>>
>> WRITE_ONCE(ctx->reader_present, 0);
>> +}
>> +
>> +static void tls_rx_reader_unlock(struct sock *sk, struct
>> tls_sw_context_rx *ctx)
>> +{
>> + tls_rx_reader_release(sk, ctx);
>> release_sock(sk);
>> }
>> --
>>
>> Then read_sock can just acquire/release.
>
> Good suggestion.
> Will be including it in the next round.
Maybe more appropriate helper names would be
tls_rx_reader_enter / tls_rx_reader_exit.
Whatever Jakub prefers...
next prev parent reply other threads:[~2023-06-21 9:49 UTC|newest]
Thread overview: 18+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-06-20 10:28 [PATCHv5 0/4] net/tls: fixes for NVMe-over-TLS Hannes Reinecke
2023-06-20 10:28 ` [PATCH 1/4] net/tls: handle MSG_EOR for tls_sw TX flow Hannes Reinecke
2023-06-20 10:28 ` [PATCH 2/4] net/tls: handle MSG_EOR for tls_device " Hannes Reinecke
2023-06-20 17:12 ` Sabrina Dubroca
2023-06-21 6:09 ` Hannes Reinecke
2023-06-20 10:28 ` [PATCH 3/4] selftests/net/tls: add test for MSG_EOR Hannes Reinecke
2023-06-20 10:28 ` [PATCH 4/4] net/tls: implement ->read_sock() Hannes Reinecke
2023-06-20 13:21 ` Sagi Grimberg
2023-06-20 17:08 ` Jakub Kicinski
2023-06-21 6:44 ` Hannes Reinecke
2023-06-21 8:39 ` Sagi Grimberg
2023-06-21 9:08 ` Hannes Reinecke
2023-06-21 9:49 ` Sagi Grimberg [this message]
2023-06-21 19:31 ` Jakub Kicinski
-- strict thread matches above, loose matches on Subject: below --
2023-06-14 6:22 [PATCHv4 0/4] net/tls: fixes for NVMe-over-TLS Hannes Reinecke
2023-06-14 6:22 ` [PATCH 4/4] net/tls: implement ->read_sock() Hannes Reinecke
2023-06-17 6:28 ` Jakub Kicinski
2023-06-17 14:08 ` Simon Horman
2023-06-19 8:16 ` Dan Carpenter
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=476d2cd9-ae32-a4e6-4549-52c3863d4049@grimberg.me \
--to=sagi@grimberg.me \
--cc=boris.pismenny@gmail.com \
--cc=edumazet@google.com \
--cc=hare@suse.de \
--cc=hch@lst.de \
--cc=kbusch@kernel.org \
--cc=kuba@kernel.org \
--cc=linux-nvme@lists.infradead.org \
--cc=netdev@vger.kernel.org \
--cc=pabeni@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).