* [RFC] netlink_ack: send a capped message in case of error
@ 2015-08-23 22:06 Christophe Ricard
2015-08-23 22:06 ` [RFC] netlink: netlink_ack " Christophe Ricard
0 siblings, 1 reply; 6+ messages in thread
From: Christophe Ricard @ 2015-08-23 22:06 UTC (permalink / raw)
To: pablo, jbenc, sameo; +Cc: netdev, davem, Christophe Ricard
Hi,
I have found with netlink we can miss a ack message when exchanging large buffers.
I came across this "bug ?" when doing some tests on the NFC subsytem by trying to
send extended APDU to a secure element (up to 65K) or when sending specific device
firmware data (up to 8K) (NFC_ATTR_SE_APDU & NFC_ATTR_VENDOR_DATA).
After some search on the web, i found this topic was already threated by Jiri Benc in November 2013:
- http://patchwork.ozlabs.org/patch/290976/
- http://www.spinics.net/lists/netdev/msg256938.html
I haven't found any update or any fix in recent kernel.
I liked the netlink message cap approach.
Do you have any update ?
Do you think a netlink message cap in netlink_ack in case of an error is an acceptable approach ?
Best Regards
Christophe
Christophe Ricard (1):
netlink: netlink_ack send a capped message in case of error
net/netlink/af_netlink.c | 17 +++++++++++++----
1 file changed, 13 insertions(+), 4 deletions(-)
--
2.1.4
^ permalink raw reply [flat|nested] 6+ messages in thread
* [RFC] netlink: netlink_ack send a capped message in case of error
2015-08-23 22:06 [RFC] netlink_ack: send a capped message in case of error Christophe Ricard
@ 2015-08-23 22:06 ` Christophe Ricard
2015-08-24 3:27 ` Scott Feldman
0 siblings, 1 reply; 6+ messages in thread
From: Christophe Ricard @ 2015-08-23 22:06 UTC (permalink / raw)
To: pablo, jbenc, sameo; +Cc: netdev, davem, Christophe Ricard
Currently, ACK in case of error contains a full copy of the originating
message. This can cause lost ACKs with large netlink messages, especially
after commit c05cdb1b864f ("netlink: allow large data transfers from
user-space").
Send back a capped message instead.
Signed-off-by: Christophe Ricard <christophe-h.ricard@st.com>
---
net/netlink/af_netlink.c | 17 +++++++++++++----
1 file changed, 13 insertions(+), 4 deletions(-)
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
index 67d2104..9df862c 100644
--- a/net/netlink/af_netlink.c
+++ b/net/netlink/af_netlink.c
@@ -85,6 +85,9 @@ struct listeners {
#define NETLINK_F_RECV_NO_ENOBUFS 0x8
#define NETLINK_F_LISTEN_ALL_NSID 0x10
+/* Arbitrary value for a small message less than PAGE_SIZE */
+#define NETLINK_ERR_MESSAGE_CAP 128
+
static inline int netlink_is_kernel(struct sock *sk)
{
return nlk_sk(sk)->flags & NETLINK_F_KERNEL_SOCKET;
@@ -2873,10 +2876,15 @@ void netlink_ack(struct sk_buff *in_skb, struct nlmsghdr *nlh, int err)
struct nlmsghdr *rep;
struct nlmsgerr *errmsg;
size_t payload = sizeof(*errmsg);
+ size_t size = 0;
- /* error messages get the original request appened */
- if (err)
- payload += nlmsg_len(nlh);
+ /* error messages get a cap request appened */
+ if (err) {
+ payload += nlmsg_len(nlh) > NETLINK_ERR_MESSAGE_CAP ?
+ NETLINK_ERR_MESSAGE_CAP : nlmsg_len(nlh);
+ size = nlmsg_len(nlh) > NETLINK_ERR_MESSAGE_CAP ?
+ (NETLINK_ERR_MESSAGE_CAP + NLMSG_HDRLEN) : nlh->nlmsg_len;
+ }
skb = netlink_alloc_skb(in_skb->sk, nlmsg_total_size(payload),
NETLINK_CB(in_skb).portid, GFP_KERNEL);
@@ -2898,7 +2906,8 @@ void netlink_ack(struct sk_buff *in_skb, struct nlmsghdr *nlh, int err)
NLMSG_ERROR, payload, 0);
errmsg = nlmsg_data(rep);
errmsg->error = err;
- memcpy(&errmsg->msg, nlh, err ? nlh->nlmsg_len : sizeof(*nlh));
+
+ memcpy(&errmsg->msg, nlh, err ? size : sizeof(*nlh));
netlink_unicast(in_skb->sk, skb, NETLINK_CB(in_skb).portid, MSG_DONTWAIT);
}
EXPORT_SYMBOL(netlink_ack);
--
2.1.4
^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [RFC] netlink: netlink_ack send a capped message in case of error
2015-08-23 22:06 ` [RFC] netlink: netlink_ack " Christophe Ricard
@ 2015-08-24 3:27 ` Scott Feldman
[not found] ` <CALD+uuz7NHdWU0qqogu6_cs81Ng6gpcCPFUr4WUF+hpQPMaysg@mail.gmail.com>
0 siblings, 1 reply; 6+ messages in thread
From: Scott Feldman @ 2015-08-24 3:27 UTC (permalink / raw)
To: Christophe Ricard
Cc: Pablo Neira Ayuso, jbenc, sameo, Netdev, David S. Miller,
Christophe Ricard
On Sun, Aug 23, 2015 at 3:06 PM, Christophe Ricard
<christophe.ricard@gmail.com> wrote:
> Currently, ACK in case of error contains a full copy of the originating
> message. This can cause lost ACKs with large netlink messages, especially
> after commit c05cdb1b864f ("netlink: allow large data transfers from
> user-space").
>
> Send back a capped message instead.
>
> Signed-off-by: Christophe Ricard <christophe-h.ricard@st.com>
> ---
> net/netlink/af_netlink.c | 17 +++++++++++++----
> 1 file changed, 13 insertions(+), 4 deletions(-)
>
> diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
> index 67d2104..9df862c 100644
> --- a/net/netlink/af_netlink.c
> +++ b/net/netlink/af_netlink.c
> @@ -85,6 +85,9 @@ struct listeners {
> #define NETLINK_F_RECV_NO_ENOBUFS 0x8
> #define NETLINK_F_LISTEN_ALL_NSID 0x10
>
> +/* Arbitrary value for a small message less than PAGE_SIZE */
> +#define NETLINK_ERR_MESSAGE_CAP 128
> +
> static inline int netlink_is_kernel(struct sock *sk)
> {
> return nlk_sk(sk)->flags & NETLINK_F_KERNEL_SOCKET;
> @@ -2873,10 +2876,15 @@ void netlink_ack(struct sk_buff *in_skb, struct nlmsghdr *nlh, int err)
> struct nlmsghdr *rep;
> struct nlmsgerr *errmsg;
> size_t payload = sizeof(*errmsg);
> + size_t size = 0;
>
> - /* error messages get the original request appened */
> - if (err)
> - payload += nlmsg_len(nlh);
> + /* error messages get a cap request appened */
> + if (err) {
> + payload += nlmsg_len(nlh) > NETLINK_ERR_MESSAGE_CAP ?
> + NETLINK_ERR_MESSAGE_CAP : nlmsg_len(nlh);
> + size = nlmsg_len(nlh) > NETLINK_ERR_MESSAGE_CAP ?
> + (NETLINK_ERR_MESSAGE_CAP + NLMSG_HDRLEN) : nlh->nlmsg_len;
> + }
This arbitrary cap can truncate the msg at unfortunate boundaries,
leaving nests open or slicing a TLV attr in half. So the receiver app
now needs to handle those cases or ignore the payload. But if
ignoring the payload, might as well not include the payload in the
first place, using the flag idea talked about earlier.
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [RFC] netlink: netlink_ack send a capped message in case of error
[not found] ` <CALD+uuz7NHdWU0qqogu6_cs81Ng6gpcCPFUr4WUF+hpQPMaysg@mail.gmail.com>
@ 2015-08-24 18:56 ` Pablo Neira Ayuso
2015-08-25 4:19 ` David Miller
0 siblings, 1 reply; 6+ messages in thread
From: Pablo Neira Ayuso @ 2015-08-24 18:56 UTC (permalink / raw)
To: Christophe Ricard
Cc: Scott Feldman, jbenc, Samuel Ortiz, Netdev, David S. Miller,
Christophe Ricard
[-- Attachment #1: Type: text/plain, Size: 499 bytes --]
On Mon, Aug 24, 2015 at 10:08:22AM +0200, Christophe Ricard wrote:
> Hi Scott,
>
> I think i understand the potential limitation of my solution.
> I saw something was proposed by Jiri Benc who pushed an additional flag to
> tell if the payload can be ignored in case of an error.
> http://patchwork.ozlabs.org/patch/290976/
>
> Do you think this one is acceptable ? I am not sure to understand David
> last comment.
I think David suggests something like the (completely untested)
attached patch.
[-- Attachment #2: 0001-netlink-add-NETLINK_CAP_ACK-socket-option.patch --]
[-- Type: text/x-diff, Size: 3074 bytes --]
>From 3aa0deafb5648427d154e26920d9d85f89dab190 Mon Sep 17 00:00:00 2001
From: Pablo Neira Ayuso <pablo@netfilter.org>
Date: Mon, 24 Aug 2015 20:23:45 +0200
Subject: [PATCH RFC] netlink: add NETLINK_CAP_ACK socket option
Since commit c05cdb1b864f ("netlink: allow large data transfers from
user-space"), the kernel may fail to allocate the necessary room for the
acknowledgement message back to userspace. This patch introduces a new socket
option that trims off the payload of the original netlink message.
The netlink message header is still included, so the user can guess from the
sequence number what is the message that has triggered the acknowledgment.
Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org>
---
include/uapi/linux/netlink.h | 1 +
net/netlink/af_netlink.c | 25 +++++++++++++++++++++++--
2 files changed, 24 insertions(+), 2 deletions(-)
diff --git a/include/uapi/linux/netlink.h b/include/uapi/linux/netlink.h
index cf6a65c..6f3fe16 100644
--- a/include/uapi/linux/netlink.h
+++ b/include/uapi/linux/netlink.h
@@ -110,6 +110,7 @@ struct nlmsgerr {
#define NETLINK_TX_RING 7
#define NETLINK_LISTEN_ALL_NSID 8
#define NETLINK_LIST_MEMBERSHIPS 9
+#define NETLINK_CAP_ACK 10
struct nl_pktinfo {
__u32 group;
diff --git a/net/netlink/af_netlink.c b/net/netlink/af_netlink.c
index 67d2104..baa5973 100644
--- a/net/netlink/af_netlink.c
+++ b/net/netlink/af_netlink.c
@@ -84,6 +84,7 @@ struct listeners {
#define NETLINK_F_BROADCAST_SEND_ERROR 0x4
#define NETLINK_F_RECV_NO_ENOBUFS 0x8
#define NETLINK_F_LISTEN_ALL_NSID 0x10
+#define NETLINK_F_CAP_ACK 0x20
static inline int netlink_is_kernel(struct sock *sk)
{
@@ -2258,6 +2259,13 @@ static int netlink_setsockopt(struct socket *sock, int level, int optname,
nlk->flags &= ~NETLINK_F_LISTEN_ALL_NSID;
err = 0;
break;
+ case NETLINK_CAP_ACK:
+ if (val)
+ nlk->flags |= NETLINK_F_CAP_ACK;
+ else
+ nlk->flags &= ~NETLINK_F_CAP_ACK;
+ err = 0;
+ break;
default:
err = -ENOPROTOOPT;
}
@@ -2332,6 +2340,16 @@ static int netlink_getsockopt(struct socket *sock, int level, int optname,
netlink_table_ungrab();
break;
}
+ case NETLINK_CAP_ACK:
+ if (len < sizeof(int))
+ return -EINVAL;
+ len = sizeof(int);
+ val = nlk->flags & NETLINK_F_CAP_ACK ? 1 : 0;
+ if (put_user(len, optlen) ||
+ put_user(val, optval))
+ return -EFAULT;
+ err = 0;
+ break;
default:
err = -ENOPROTOOPT;
}
@@ -2869,13 +2887,16 @@ EXPORT_SYMBOL(__netlink_dump_start);
void netlink_ack(struct sk_buff *in_skb, struct nlmsghdr *nlh, int err)
{
+ struct netlink_sock *nlk = nlk_sk(in_skb->sk);
struct sk_buff *skb;
struct nlmsghdr *rep;
struct nlmsgerr *errmsg;
size_t payload = sizeof(*errmsg);
- /* error messages get the original request appened */
- if (err)
+ /* Error messages get the original request appended, unless the user
+ * requests to cap the error message.
+ */
+ if (!(nlk->flags & NETLINK_F_CAP_ACK) && err)
payload += nlmsg_len(nlh);
skb = netlink_alloc_skb(in_skb->sk, nlmsg_total_size(payload),
--
1.7.10.4
^ permalink raw reply related [flat|nested] 6+ messages in thread
* Re: [RFC] netlink: netlink_ack send a capped message in case of error
2015-08-24 18:56 ` Pablo Neira Ayuso
@ 2015-08-25 4:19 ` David Miller
2015-08-25 19:22 ` Christophe Ricard
0 siblings, 1 reply; 6+ messages in thread
From: David Miller @ 2015-08-25 4:19 UTC (permalink / raw)
To: pablo; +Cc: christophe.ricard, sfeldma, jbenc, sameo, netdev,
christophe-h.ricard
From: Pablo Neira Ayuso <pablo@netfilter.org>
Date: Mon, 24 Aug 2015 20:56:37 +0200
> On Mon, Aug 24, 2015 at 10:08:22AM +0200, Christophe Ricard wrote:
>> Hi Scott,
>>
>> I think i understand the potential limitation of my solution.
>> I saw something was proposed by Jiri Benc who pushed an additional flag to
>> tell if the payload can be ignored in case of an error.
>> http://patchwork.ozlabs.org/patch/290976/
>>
>> Do you think this one is acceptable ? I am not sure to understand David
>> last comment.
>
> I think David suggests something like the (completely untested)
> attached patch.
Yes, echo'ing the entire message back in an ACK is really pointless.
Especially since if the user really is interested in noticing ACKs
it can very easily keep the original request around and match on
sequence number, as Pablo's patch's commit message suggests.
We're stuck with the current behavior by default, but we can add the
new ACK feature to deal with the issue in the long term.
^ permalink raw reply [flat|nested] 6+ messages in thread
* Re: [RFC] netlink: netlink_ack send a capped message in case of error
2015-08-25 4:19 ` David Miller
@ 2015-08-25 19:22 ` Christophe Ricard
0 siblings, 0 replies; 6+ messages in thread
From: Christophe Ricard @ 2015-08-25 19:22 UTC (permalink / raw)
To: David Miller, pablo; +Cc: sfeldma, jbenc, sameo, netdev, christophe-h.ricard
Hi David, Pablo,
I gave try to your proposed patch.
Changes in netlink_getsockopt and netlink_setsockopt are working fine.
Changes in netlink_ack looks not to be addressing the correct socket.
I will send an updated version in few minutes.
Best Regards
Christophe
On 25/08/2015 06:19, David Miller wrote:
> From: Pablo Neira Ayuso <pablo@netfilter.org>
> Date: Mon, 24 Aug 2015 20:56:37 +0200
>
>> On Mon, Aug 24, 2015 at 10:08:22AM +0200, Christophe Ricard wrote:
>>> Hi Scott,
>>>
>>> I think i understand the potential limitation of my solution.
>>> I saw something was proposed by Jiri Benc who pushed an additional flag to
>>> tell if the payload can be ignored in case of an error.
>>> http://patchwork.ozlabs.org/patch/290976/
>>>
>>> Do you think this one is acceptable ? I am not sure to understand David
>>> last comment.
>> I think David suggests something like the (completely untested)
>> attached patch.
> Yes, echo'ing the entire message back in an ACK is really pointless.
>
> Especially since if the user really is interested in noticing ACKs
> it can very easily keep the original request around and match on
> sequence number, as Pablo's patch's commit message suggests.
>
> We're stuck with the current behavior by default, but we can add the
> new ACK feature to deal with the issue in the long term.
^ permalink raw reply [flat|nested] 6+ messages in thread
end of thread, other threads:[~2015-08-25 19:22 UTC | newest]
Thread overview: 6+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2015-08-23 22:06 [RFC] netlink_ack: send a capped message in case of error Christophe Ricard
2015-08-23 22:06 ` [RFC] netlink: netlink_ack " Christophe Ricard
2015-08-24 3:27 ` Scott Feldman
[not found] ` <CALD+uuz7NHdWU0qqogu6_cs81Ng6gpcCPFUr4WUF+hpQPMaysg@mail.gmail.com>
2015-08-24 18:56 ` Pablo Neira Ayuso
2015-08-25 4:19 ` David Miller
2015-08-25 19:22 ` Christophe Ricard
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).