2022-05-14 03:28:39

by Guangguan Wang

[permalink] [raw]
Subject: [PATCH net-next v2] net/smc: align the connect behaviour with TCP

Connect with O_NONBLOCK will not be completed immediately
and returns -EINPROGRESS. It is possible to use selector/poll
for completion by selecting the socket for writing. After select
indicates writability, a second connect function call will return
0 to indicate connected successfully as TCP does, but smc returns
-EISCONN. Use socket state for smc to indicate connect state, which
can help smc aligning the connect behaviour with TCP.

Signed-off-by: Guangguan Wang <[email protected]>
Acked-by: Karsten Graul <[email protected]>
---
net/smc/af_smc.c | 50 ++++++++++++++++++++++++++++++++++++++++++++----
1 file changed, 46 insertions(+), 4 deletions(-)

diff --git a/net/smc/af_smc.c b/net/smc/af_smc.c
index fce16b9d6e1a..5f70642a8044 100644
--- a/net/smc/af_smc.c
+++ b/net/smc/af_smc.c
@@ -1544,9 +1544,29 @@ static int smc_connect(struct socket *sock, struct sockaddr *addr,
goto out_err;

lock_sock(sk);
+ switch (sock->state) {
+ default:
+ rc = -EINVAL;
+ goto out;
+ case SS_CONNECTED:
+ rc = sk->sk_state == SMC_ACTIVE ? -EISCONN : -EINVAL;
+ goto out;
+ case SS_CONNECTING:
+ if (sk->sk_state == SMC_ACTIVE)
+ goto connected;
+ break;
+ case SS_UNCONNECTED:
+ sock->state = SS_CONNECTING;
+ break;
+ }
+
switch (sk->sk_state) {
default:
goto out;
+ case SMC_CLOSED:
+ rc = sock_error(sk) ? : -ECONNABORTED;
+ sock->state = SS_UNCONNECTED;
+ goto out;
case SMC_ACTIVE:
rc = -EISCONN;
goto out;
@@ -1565,20 +1585,24 @@ static int smc_connect(struct socket *sock, struct sockaddr *addr,
goto out;

sock_hold(&smc->sk); /* sock put in passive closing */
- if (smc->use_fallback)
+ if (smc->use_fallback) {
+ sock->state = rc ? SS_CONNECTING : SS_CONNECTED;
goto out;
+ }
if (flags & O_NONBLOCK) {
if (queue_work(smc_hs_wq, &smc->connect_work))
smc->connect_nonblock = 1;
rc = -EINPROGRESS;
+ goto out;
} else {
rc = __smc_connect(smc);
if (rc < 0)
goto out;
- else
- rc = 0; /* success cases including fallback */
}

+connected:
+ rc = 0;
+ sock->state = SS_CONNECTED;
out:
release_sock(sk);
out_err:
@@ -1693,6 +1717,7 @@ struct sock *smc_accept_dequeue(struct sock *parent,
}
if (new_sock) {
sock_graft(new_sk, new_sock);
+ new_sock->state = SS_CONNECTED;
if (isk->use_fallback) {
smc_sk(new_sk)->clcsock->file = new_sock->file;
isk->clcsock->file->private_data = isk->clcsock;
@@ -2424,7 +2449,7 @@ static int smc_listen(struct socket *sock, int backlog)

rc = -EINVAL;
if ((sk->sk_state != SMC_INIT && sk->sk_state != SMC_LISTEN) ||
- smc->connect_nonblock)
+ smc->connect_nonblock || sock->state != SS_UNCONNECTED)
goto out;

rc = 0;
@@ -2716,6 +2741,17 @@ static int smc_shutdown(struct socket *sock, int how)

lock_sock(sk);

+ if (sock->state == SS_CONNECTING) {
+ if (sk->sk_state == SMC_ACTIVE)
+ sock->state = SS_CONNECTED;
+ else if (sk->sk_state == SMC_PEERCLOSEWAIT1 ||
+ sk->sk_state == SMC_PEERCLOSEWAIT2 ||
+ sk->sk_state == SMC_APPCLOSEWAIT1 ||
+ sk->sk_state == SMC_APPCLOSEWAIT2 ||
+ sk->sk_state == SMC_APPFINCLOSEWAIT)
+ sock->state = SS_DISCONNECTING;
+ }
+
rc = -ENOTCONN;
if ((sk->sk_state != SMC_ACTIVE) &&
(sk->sk_state != SMC_PEERCLOSEWAIT1) &&
@@ -2729,6 +2765,7 @@ static int smc_shutdown(struct socket *sock, int how)
sk->sk_shutdown = smc->clcsock->sk->sk_shutdown;
if (sk->sk_shutdown == SHUTDOWN_MASK) {
sk->sk_state = SMC_CLOSED;
+ sk->sk_socket->state = SS_UNCONNECTED;
sock_put(sk);
}
goto out;
@@ -2754,6 +2791,10 @@ static int smc_shutdown(struct socket *sock, int how)
/* map sock_shutdown_cmd constants to sk_shutdown value range */
sk->sk_shutdown |= how + 1;

+ if (sk->sk_state == SMC_CLOSED)
+ sock->state = SS_UNCONNECTED;
+ else
+ sock->state = SS_DISCONNECTING;
out:
release_sock(sk);
return rc ? rc : rc1;
@@ -3139,6 +3180,7 @@ static int __smc_create(struct net *net, struct socket *sock, int protocol,

rc = -ENOBUFS;
sock->ops = &smc_sock_ops;
+ sock->state = SS_UNCONNECTED;
sk = smc_sock_alloc(net, sock, protocol);
if (!sk)
goto out;
--
2.24.3 (Apple Git-128)



2022-05-16 20:05:13

by patchwork-bot+netdevbpf

[permalink] [raw]
Subject: Re: [PATCH net-next v2] net/smc: align the connect behaviour with TCP

Hello:

This patch was applied to netdev/net-next.git (master)
by David S. Miller <[email protected]>:

On Fri, 13 May 2022 10:24:53 +0800 you wrote:
> Connect with O_NONBLOCK will not be completed immediately
> and returns -EINPROGRESS. It is possible to use selector/poll
> for completion by selecting the socket for writing. After select
> indicates writability, a second connect function call will return
> 0 to indicate connected successfully as TCP does, but smc returns
> -EISCONN. Use socket state for smc to indicate connect state, which
> can help smc aligning the connect behaviour with TCP.
>
> [...]

Here is the summary with links:
- [net-next,v2] net/smc: align the connect behaviour with TCP
https://git.kernel.org/netdev/net-next/c/3aba103006bc

You are awesome, thank you!
--
Deet-doot-dot, I am a bot.
https://korg.docs.kernel.org/patchwork/pwbot.html



2022-05-23 12:27:03

by Karsten Graul

[permalink] [raw]
Subject: Re: [PATCH net-next v2] net/smc: align the connect behaviour with TCP

On 13/05/2022 04:24, Guangguan Wang wrote:
> Connect with O_NONBLOCK will not be completed immediately
> and returns -EINPROGRESS. It is possible to use selector/poll
> for completion by selecting the socket for writing. After select
> indicates writability, a second connect function call will return
> 0 to indicate connected successfully as TCP does, but smc returns
> -EISCONN. Use socket state for smc to indicate connect state, which
> can help smc aligning the connect behaviour with TCP.
>
> Signed-off-by: Guangguan Wang <[email protected]>
> Acked-by: Karsten Graul <[email protected]>
> ---
> net/smc/af_smc.c | 50 ++++++++++++++++++++++++++++++++++++++++++++----
> 1 file changed, 46 insertions(+), 4 deletions(-)
>
> diff --git a/net/smc/af_smc.c b/net/smc/af_smc.c
> index fce16b9d6e1a..5f70642a8044 100644
> --- a/net/smc/af_smc.c
> +++ b/net/smc/af_smc.c
> @@ -1544,9 +1544,29 @@ static int smc_connect(struct socket *sock, struct sockaddr *addr,
> goto out_err;
>
> lock_sock(sk);
> + switch (sock->state) {
> + default:
> + rc = -EINVAL;
> + goto out;
> + case SS_CONNECTED:
> + rc = sk->sk_state == SMC_ACTIVE ? -EISCONN : -EINVAL;
> + goto out;
> + case SS_CONNECTING:
> + if (sk->sk_state == SMC_ACTIVE)
> + goto connected;

I stumbled over this when thinking about the fallback processing. If for whatever reason
fallback==true during smc_connect(), the "if (smc->use_fallback)" below would set sock->state
to e.g. SS_CONNECTED. But in the fallback case sk_state keeps SMC_INIT. So during the next call
the SS_CONNECTING case above would break because sk_state in NOT SMC_ACTIVE, and we would end
up calling kernel_connect() again. Which seems to be no problem when kernel_connect() returns
-EISCONN and we return this to the caller. But is this how it should work, or does it work by chance?

> + break;
> + case SS_UNCONNECTED:
> + sock->state = SS_CONNECTING;
> + break;
> + }
> +
> switch (sk->sk_state) {
> default:
> goto out;
> + case SMC_CLOSED:
> + rc = sock_error(sk) ? : -ECONNABORTED;
> + sock->state = SS_UNCONNECTED;
> + goto out;
> case SMC_ACTIVE:
> rc = -EISCONN;
> goto out;
> @@ -1565,20 +1585,24 @@ static int smc_connect(struct socket *sock, struct sockaddr *addr,
> goto out;
>
> sock_hold(&smc->sk); /* sock put in passive closing */
> - if (smc->use_fallback)
> + if (smc->use_fallback) {
> + sock->state = rc ? SS_CONNECTING : SS_CONNECTED;
> goto out;
> + }
> if (flags & O_NONBLOCK) {
> if (queue_work(smc_hs_wq, &smc->connect_work))
> smc->connect_nonblock = 1;
> rc = -EINPROGRESS;
> + goto out;
> } else {
> rc = __smc_connect(smc);
> if (rc < 0)
> goto out;
> - else
> - rc = 0; /* success cases including fallback */
> }
>
> +connected:
> + rc = 0;
> + sock->state = SS_CONNECTED;
> out:
> release_sock(sk);
> out_err:
> @@ -1693,6 +1717,7 @@ struct sock *smc_accept_dequeue(struct sock *parent,
> }
> if (new_sock) {
> sock_graft(new_sk, new_sock);
> + new_sock->state = SS_CONNECTED;
> if (isk->use_fallback) {
> smc_sk(new_sk)->clcsock->file = new_sock->file;
> isk->clcsock->file->private_data = isk->clcsock;
> @@ -2424,7 +2449,7 @@ static int smc_listen(struct socket *sock, int backlog)
>
> rc = -EINVAL;
> if ((sk->sk_state != SMC_INIT && sk->sk_state != SMC_LISTEN) ||
> - smc->connect_nonblock)
> + smc->connect_nonblock || sock->state != SS_UNCONNECTED)
> goto out;
>
> rc = 0;
> @@ -2716,6 +2741,17 @@ static int smc_shutdown(struct socket *sock, int how)
>
> lock_sock(sk);
>
> + if (sock->state == SS_CONNECTING) {
> + if (sk->sk_state == SMC_ACTIVE)
> + sock->state = SS_CONNECTED;
> + else if (sk->sk_state == SMC_PEERCLOSEWAIT1 ||
> + sk->sk_state == SMC_PEERCLOSEWAIT2 ||
> + sk->sk_state == SMC_APPCLOSEWAIT1 ||
> + sk->sk_state == SMC_APPCLOSEWAIT2 ||
> + sk->sk_state == SMC_APPFINCLOSEWAIT)
> + sock->state = SS_DISCONNECTING;
> + }
> +
> rc = -ENOTCONN;
> if ((sk->sk_state != SMC_ACTIVE) &&
> (sk->sk_state != SMC_PEERCLOSEWAIT1) &&
> @@ -2729,6 +2765,7 @@ static int smc_shutdown(struct socket *sock, int how)
> sk->sk_shutdown = smc->clcsock->sk->sk_shutdown;
> if (sk->sk_shutdown == SHUTDOWN_MASK) {
> sk->sk_state = SMC_CLOSED;
> + sk->sk_socket->state = SS_UNCONNECTED;
> sock_put(sk);
> }
> goto out;
> @@ -2754,6 +2791,10 @@ static int smc_shutdown(struct socket *sock, int how)
> /* map sock_shutdown_cmd constants to sk_shutdown value range */
> sk->sk_shutdown |= how + 1;
>
> + if (sk->sk_state == SMC_CLOSED)
> + sock->state = SS_UNCONNECTED;
> + else
> + sock->state = SS_DISCONNECTING;
> out:
> release_sock(sk);
> return rc ? rc : rc1;
> @@ -3139,6 +3180,7 @@ static int __smc_create(struct net *net, struct socket *sock, int protocol,
>
> rc = -ENOBUFS;
> sock->ops = &smc_sock_ops;
> + sock->state = SS_UNCONNECTED;
> sk = smc_sock_alloc(net, sock, protocol);
> if (!sk)
> goto out;

--
Karsten

2022-05-24 08:08:28

by Guangguan Wang

[permalink] [raw]
Subject: Re: [PATCH net-next v2] net/smc: align the connect behaviour with TCP



On 2022/5/23 20:24, Karsten Graul wrote:
> On 13/05/2022 04:24, Guangguan Wang wrote:
>> Connect with O_NONBLOCK will not be completed immediately
>> and returns -EINPROGRESS. It is possible to use selector/poll
>> for completion by selecting the socket for writing. After select
>> indicates writability, a second connect function call will return
>> 0 to indicate connected successfully as TCP does, but smc returns
>> -EISCONN. Use socket state for smc to indicate connect state, which
>> can help smc aligning the connect behaviour with TCP.
>>
>> Signed-off-by: Guangguan Wang <[email protected]>
>> Acked-by: Karsten Graul <[email protected]>
>> ---
>> net/smc/af_smc.c | 50 ++++++++++++++++++++++++++++++++++++++++++++----
>> 1 file changed, 46 insertions(+), 4 deletions(-)
>>
>> diff --git a/net/smc/af_smc.c b/net/smc/af_smc.c
>> index fce16b9d6e1a..5f70642a8044 100644
>> --- a/net/smc/af_smc.c
>> +++ b/net/smc/af_smc.c
>> @@ -1544,9 +1544,29 @@ static int smc_connect(struct socket *sock, struct sockaddr *addr,
>> goto out_err;
>>
>> lock_sock(sk);
>> + switch (sock->state) {
>> + default:
>> + rc = -EINVAL;
>> + goto out;
>> + case SS_CONNECTED:
>> + rc = sk->sk_state == SMC_ACTIVE ? -EISCONN : -EINVAL;
>> + goto out;
>> + case SS_CONNECTING:
>> + if (sk->sk_state == SMC_ACTIVE)
>> + goto connected;
>
> I stumbled over this when thinking about the fallback processing. If for whatever reason
> fallback==true during smc_connect(), the "if (smc->use_fallback)" below would set sock->state
> to e.g. SS_CONNECTED. But in the fallback case sk_state keeps SMC_INIT. So during the next call
> the SS_CONNECTING case above would break because sk_state in NOT SMC_ACTIVE, and we would end
> up calling kernel_connect() again. Which seems to be no problem when kernel_connect() returns
> -EISCONN and we return this to the caller. But is this how it should work, or does it work by chance?
>

Since the sk_state keeps SMC_INIT and does not correctly indicate the state of clcsock, it should end
up calling kernel_connect() again to get the actual connection state of clcsock.

And I'm sorry there is a problem that if sock->state==SS_CONNECTED and sk_state==SMC_INIT, further call
of smc_connect will return -EINVAL where -EISCONN is preferred.
The steps to reproduce:
1)switch fallback before connect, such as setsockopt TCP_FASTOPEN
2)connect with noblocking and returns -EINPROGRESS. (sock->state changes to SS_CONNECTING)
3) end up calling connect with noblocking again and returns 0. (kernel_connect() returns 0 and sock->state changes to
SS_CONNECTED but sk->sk_state stays SMC_INIT)
4) call connect again, maybe by mistake, will return -EINVAL, but -EISCONN is preferred.

What do you think about if we synchronize the sk_state to SMC_ACTIVE instead of keeping SMC_INIT when clcsock
connected successfully in fallback case described above.

...
if (smc->use_fallback) {
sock->state = rc ? SS_CONNECTING : SS_CONNECTED;
if (!rc)
sk->sk_state = SMC_ACTIVE; /* synchronize sk_state from SMC_INIT to SMC_ACTIVE */
goto out;
}
...

>> + break;
>> + case SS_UNCONNECTED:
>> + sock->state = SS_CONNECTING;
>> + break;
>> + }
>> +
>> switch (sk->sk_state) {
>> default:
>> goto out;
>> + case SMC_CLOSED:
>> + rc = sock_error(sk) ? : -ECONNABORTED;
>> + sock->state = SS_UNCONNECTED;
>> + goto out;
>> case SMC_ACTIVE:
>> rc = -EISCONN;
>> goto out;
>> @@ -1565,20 +1585,24 @@ static int smc_connect(struct socket *sock, struct sockaddr *addr,
>> goto out;
>>
>> sock_hold(&smc->sk); /* sock put in passive closing */
>> - if (smc->use_fallback)
>> + if (smc->use_fallback) {
>> + sock->state = rc ? SS_CONNECTING : SS_CONNECTED;
>> goto out;
>> + }
>> if (flags & O_NONBLOCK) {
>> if (queue_work(smc_hs_wq, &smc->connect_work))
>> smc->connect_nonblock = 1;
>> rc = -EINPROGRESS;
>> + goto out;
>> } else {
>> rc = __smc_connect(smc);
>> if (rc < 0)
>> goto out;
>> - else
>> - rc = 0; /* success cases including fallback */
>> }
>>
>> +connected:
>> + rc = 0;
>> + sock->state = SS_CONNECTED;
>> out:
>> release_sock(sk);
>> out_err:

2022-05-24 18:12:25

by Karsten Graul

[permalink] [raw]
Subject: Re: [PATCH net-next v2] net/smc: align the connect behaviour with TCP

On 24/05/2022 04:59, Guangguan Wang wrote:
>
>
> On 2022/5/23 20:24, Karsten Graul wrote:
>> On 13/05/2022 04:24, Guangguan Wang wrote:
>>> Connect with O_NONBLOCK will not be completed immediately
>>> and returns -EINPROGRESS. It is possible to use selector/poll
>>> for completion by selecting the socket for writing. After select
>>> indicates writability, a second connect function call will return
>>> 0 to indicate connected successfully as TCP does, but smc returns
>>> -EISCONN. Use socket state for smc to indicate connect state, which
>>> can help smc aligning the connect behaviour with TCP.
>>>
>>> Signed-off-by: Guangguan Wang <[email protected]>
>>> Acked-by: Karsten Graul <[email protected]>
>>> ---
>>> net/smc/af_smc.c | 50 ++++++++++++++++++++++++++++++++++++++++++++----
>>> 1 file changed, 46 insertions(+), 4 deletions(-)
>>>
>>> diff --git a/net/smc/af_smc.c b/net/smc/af_smc.c
>>> index fce16b9d6e1a..5f70642a8044 100644
>>> --- a/net/smc/af_smc.c
>>> +++ b/net/smc/af_smc.c
>>> @@ -1544,9 +1544,29 @@ static int smc_connect(struct socket *sock, struct sockaddr *addr,
>>> goto out_err;
>>>
>>> lock_sock(sk);
>>> + switch (sock->state) {
>>> + default:
>>> + rc = -EINVAL;
>>> + goto out;
>>> + case SS_CONNECTED:
>>> + rc = sk->sk_state == SMC_ACTIVE ? -EISCONN : -EINVAL;
>>> + goto out;
>>> + case SS_CONNECTING:
>>> + if (sk->sk_state == SMC_ACTIVE)
>>> + goto connected;
>>
>> I stumbled over this when thinking about the fallback processing. If for whatever reason
>> fallback==true during smc_connect(), the "if (smc->use_fallback)" below would set sock->state
>> to e.g. SS_CONNECTED. But in the fallback case sk_state keeps SMC_INIT. So during the next call
>> the SS_CONNECTING case above would break because sk_state in NOT SMC_ACTIVE, and we would end
>> up calling kernel_connect() again. Which seems to be no problem when kernel_connect() returns
>> -EISCONN and we return this to the caller. But is this how it should work, or does it work by chance?
>>
>
> Since the sk_state keeps SMC_INIT and does not correctly indicate the state of clcsock, it should end
> up calling kernel_connect() again to get the actual connection state of clcsock.
>
> And I'm sorry there is a problem that if sock->state==SS_CONNECTED and sk_state==SMC_INIT, further call
> of smc_connect will return -EINVAL where -EISCONN is preferred.
> The steps to reproduce:
> 1)switch fallback before connect, such as setsockopt TCP_FASTOPEN
> 2)connect with noblocking and returns -EINPROGRESS. (sock->state changes to SS_CONNECTING)
> 3) end up calling connect with noblocking again and returns 0. (kernel_connect() returns 0 and sock->state changes to
> SS_CONNECTED but sk->sk_state stays SMC_INIT)
> 4) call connect again, maybe by mistake, will return -EINVAL, but -EISCONN is preferred.
>
> What do you think about if we synchronize the sk_state to SMC_ACTIVE instead of keeping SMC_INIT when clcsock
> connected successfully in fallback case described above.
>
> ...

I start thinking that the fix in 86434744 introduced a problem. Before that fix a connect with
fallback always reached __smc_connect() and on top of that function in case of fallback
smc_connect_fallback() is called, which itself sets sk_state to SMC_ACTIVE.

86434744 removed that code path and I wonder what it actually fixed, because at this time the
fallback check in __smc_connect() was already present.

Without that "goto out;" the state would be set correctly in smc_connect_fallback(), and the
socket close processing would work as expected.

2022-05-25 01:19:10

by Karsten Graul

[permalink] [raw]
Subject: Re: [PATCH net-next v2] net/smc: align the connect behaviour with TCP

On 24/05/2022 14:57, [email protected] wrote:
>>>
>>>
>>> On 2022/5/23 20:24, Karsten Graul wrote:
>>>> On 13/05/2022 04:24, Guangguan Wang wrote:
>>>>> Connect with O_NONBLOCK will not be completed immediately
>>>>> and returns -EINPROGRESS. It is possible to use selector/poll
>>>>> for completion by selecting the socket for writing. After select
>>>>> indicates writability, a second connect function call will return
>>>>> 0 to indicate connected successfully as TCP does, but smc returns
>>>>> -EISCONN. Use socket state for smc to indicate connect state, which
>>>>> can help smc aligning the connect behaviour with TCP.
>>>>>
>>>>> Signed-off-by: Guangguan Wang <[email protected]>
>>>>> Acked-by: Karsten Graul <[email protected]>
>>>>> ---
>>>>> net/smc/af_smc.c | 50 ++++++++++++++++++++++++++++++++++++++++++++----
>>>>> 1 file changed, 46 insertions(+), 4 deletions(-)
>>>>>
>>>>> diff --git a/net/smc/af_smc.c b/net/smc/af_smc.c
>>>>> index fce16b9d6e1a..5f70642a8044 100644
>>>>> --- a/net/smc/af_smc.c
>>>>> +++ b/net/smc/af_smc.c
>>>>> @@ -1544,9 +1544,29 @@ static int smc_connect(struct socket *sock, struct sockaddr *addr,
>>>>> goto out_err;
>>>>>
>>>>> lock_sock(sk);
>>>>> + switch (sock->state) {
>>>>> + default:
>>>>> + rc = -EINVAL;
>>>>> + goto out;
>>>>> + case SS_CONNECTED:
>>>>> + rc = sk->sk_state == SMC_ACTIVE ? -EISCONN : -EINVAL;
>>>>> + goto out;
>>>>> + case SS_CONNECTING:
>>>>> + if (sk->sk_state == SMC_ACTIVE)
>>>>> + goto connected;
>>>>
>>>> I stumbled over this when thinking about the fallback processing. If for whatever reason
>>>> fallback==true during smc_connect(), the "if (smc->use_fallback)" below would set sock->state
>>>> to e.g. SS_CONNECTED. But in the fallback case sk_state keeps SMC_INIT. So during the next call
>>>> the SS_CONNECTING case above would break because sk_state in NOT SMC_ACTIVE, and we would end
>>>> up calling kernel_connect() again. Which seems to be no problem when kernel_connect() returns
>>>> -EISCONN and we return this to the caller. But is this how it should work, or does it work by chance?
>>>>
>>>
>>> Since the sk_state keeps SMC_INIT and does not correctly indicate the state of clcsock, it should end
>>> up calling kernel_connect() again to get the actual connection state of clcsock.
>>>
>>> And I'm sorry there is a problem that if sock->state==SS_CONNECTED and sk_state==SMC_INIT, further call
>>> of smc_connect will return -EINVAL where -EISCONN is preferred.
>>> The steps to reproduce:
>>> 1)switch fallback before connect, such as setsockopt TCP_FASTOPEN
>>> 2)connect with noblocking and returns -EINPROGRESS. (sock->state changes to SS_CONNECTING)
>>> 3) end up calling connect with noblocking again and returns 0. (kernel_connect() returns 0 and sock->state changes to
>>> SS_CONNECTED but sk->sk_state stays SMC_INIT)
>>> 4) call connect again, maybe by mistake, will return -EINVAL, but -EISCONN is preferred.
>>>
>>> What do you think about if we synchronize the sk_state to SMC_ACTIVE instead of keeping SMC_INIT when clcsock
>>> connected successfully in fallback case described above.
>>>
>>> ...
>>
>> I start thinking that the fix in 86434744 introduced a problem. Before that fix a connect with
>> fallback always reached __smc_connect() and on top of that function in case of fallback
>> smc_connect_fallback() is called, which itself sets sk_state to SMC_ACTIVE.
>>
>> 86434744 removed that code path and I wonder what it actually fixed, because at this time the
>> fallback check in __smc_connect() was already present.
>>
>> Without that "goto out;" the state would be set correctly in smc_connect_fallback(), and the
>> socket close processing would work as expected.
>
> I think it is OK without that "goto out;". And I guess the purpose of "goto out;" is to avoid calling __smc_connect(),
> because it is impossible to establish an rdma channel at this time.

Yes that was the purpose, but this disabled all the extra processing that should be done
for fallback sockets during connect().


2022-05-25 09:04:15

by Yacan Liu

[permalink] [raw]
Subject: Re: [PATCH net-next v2] net/smc: align the connect behaviour with TCP

> >
> >
> > On 2022/5/23 20:24, Karsten Graul wrote:
> >> On 13/05/2022 04:24, Guangguan Wang wrote:
> >>> Connect with O_NONBLOCK will not be completed immediately
> >>> and returns -EINPROGRESS. It is possible to use selector/poll
> >>> for completion by selecting the socket for writing. After select
> >>> indicates writability, a second connect function call will return
> >>> 0 to indicate connected successfully as TCP does, but smc returns
> >>> -EISCONN. Use socket state for smc to indicate connect state, which
> >>> can help smc aligning the connect behaviour with TCP.
> >>>
> >>> Signed-off-by: Guangguan Wang <[email protected]>
> >>> Acked-by: Karsten Graul <[email protected]>
> >>> ---
> >>> net/smc/af_smc.c | 50 ++++++++++++++++++++++++++++++++++++++++++++----
> >>> 1 file changed, 46 insertions(+), 4 deletions(-)
> >>>
> >>> diff --git a/net/smc/af_smc.c b/net/smc/af_smc.c
> >>> index fce16b9d6e1a..5f70642a8044 100644
> >>> --- a/net/smc/af_smc.c
> >>> +++ b/net/smc/af_smc.c
> >>> @@ -1544,9 +1544,29 @@ static int smc_connect(struct socket *sock, struct sockaddr *addr,
> >>> goto out_err;
> >>>
> >>> lock_sock(sk);
> >>> + switch (sock->state) {
> >>> + default:
> >>> + rc = -EINVAL;
> >>> + goto out;
> >>> + case SS_CONNECTED:
> >>> + rc = sk->sk_state == SMC_ACTIVE ? -EISCONN : -EINVAL;
> >>> + goto out;
> >>> + case SS_CONNECTING:
> >>> + if (sk->sk_state == SMC_ACTIVE)
> >>> + goto connected;
> >>
> >> I stumbled over this when thinking about the fallback processing. If for whatever reason
> >> fallback==true during smc_connect(), the "if (smc->use_fallback)" below would set sock->state
> >> to e.g. SS_CONNECTED. But in the fallback case sk_state keeps SMC_INIT. So during the next call
> >> the SS_CONNECTING case above would break because sk_state in NOT SMC_ACTIVE, and we would end
> >> up calling kernel_connect() again. Which seems to be no problem when kernel_connect() returns
> >> -EISCONN and we return this to the caller. But is this how it should work, or does it work by chance?
> >>
> >
> > Since the sk_state keeps SMC_INIT and does not correctly indicate the state of clcsock, it should end
> > up calling kernel_connect() again to get the actual connection state of clcsock.
> >
> > And I'm sorry there is a problem that if sock->state==SS_CONNECTED and sk_state==SMC_INIT, further call
> > of smc_connect will return -EINVAL where -EISCONN is preferred.
> > The steps to reproduce:
> > 1)switch fallback before connect, such as setsockopt TCP_FASTOPEN
> > 2)connect with noblocking and returns -EINPROGRESS. (sock->state changes to SS_CONNECTING)
> > 3) end up calling connect with noblocking again and returns 0. (kernel_connect() returns 0 and sock->state changes to
> > SS_CONNECTED but sk->sk_state stays SMC_INIT)
> > 4) call connect again, maybe by mistake, will return -EINVAL, but -EISCONN is preferred.
> >
> > What do you think about if we synchronize the sk_state to SMC_ACTIVE instead of keeping SMC_INIT when clcsock
> > connected successfully in fallback case described above.
> >
> > ...
>
> I start thinking that the fix in 86434744 introduced a problem. Before that fix a connect with
> fallback always reached __smc_connect() and on top of that function in case of fallback
> smc_connect_fallback() is called, which itself sets sk_state to SMC_ACTIVE.
>
> 86434744 removed that code path and I wonder what it actually fixed, because at this time the
> fallback check in __smc_connect() was already present.
>
> Without that "goto out;" the state would be set correctly in smc_connect_fallback(), and the
> socket close processing would work as expected.

I think it is OK without that "goto out;". And I guess the purpose of "goto out;" is to avoid calling __smc_connect(),
because it is impossible to establish an rdma channel at this time.


2022-06-29 21:15:28

by Wenjia Zhang

[permalink] [raw]
Subject: Re: [PATCH net-next v2] net/smc: align the connect behaviour with TCP



On 24.05.22 15:05, Karsten Graul wrote:
> On 24/05/2022 14:57, [email protected] wrote:
>>>>
>>>>
>>>> On 2022/5/23 20:24, Karsten Graul wrote:
>>>>> On 13/05/2022 04:24, Guangguan Wang wrote:
>>>>>> Connect with O_NONBLOCK will not be completed immediately
>>>>>> and returns -EINPROGRESS. It is possible to use selector/poll
>>>>>> for completion by selecting the socket for writing. After select
>>>>>> indicates writability, a second connect function call will return
>>>>>> 0 to indicate connected successfully as TCP does, but smc returns
>>>>>> -EISCONN. Use socket state for smc to indicate connect state, which
>>>>>> can help smc aligning the connect behaviour with TCP.
>>>>>>
>>>>>> Signed-off-by: Guangguan Wang <[email protected]>
>>>>>> Acked-by: Karsten Graul <[email protected]>
>>>>>> ---
>>>>>> net/smc/af_smc.c | 50 ++++++++++++++++++++++++++++++++++++++++++++----
>>>>>> 1 file changed, 46 insertions(+), 4 deletions(-)
>>>>>>
>>>>>> diff --git a/net/smc/af_smc.c b/net/smc/af_smc.c
>>>>>> index fce16b9d6e1a..5f70642a8044 100644
>>>>>> --- a/net/smc/af_smc.c
>>>>>> +++ b/net/smc/af_smc.c
>>>>>> @@ -1544,9 +1544,29 @@ static int smc_connect(struct socket *sock, struct sockaddr *addr,
>>>>>> goto out_err;
>>>>>>
>>>>>> lock_sock(sk);
>>>>>> + switch (sock->state) {
>>>>>> + default:
>>>>>> + rc = -EINVAL;
>>>>>> + goto out;
>>>>>> + case SS_CONNECTED:
>>>>>> + rc = sk->sk_state == SMC_ACTIVE ? -EISCONN : -EINVAL;
>>>>>> + goto out;
>>>>>> + case SS_CONNECTING:
>>>>>> + if (sk->sk_state == SMC_ACTIVE)
>>>>>> + goto connected;
>>>>>
>>>>> I stumbled over this when thinking about the fallback processing. If for whatever reason
>>>>> fallback==true during smc_connect(), the "if (smc->use_fallback)" below would set sock->state
>>>>> to e.g. SS_CONNECTED. But in the fallback case sk_state keeps SMC_INIT. So during the next call
>>>>> the SS_CONNECTING case above would break because sk_state in NOT SMC_ACTIVE, and we would end
>>>>> up calling kernel_connect() again. Which seems to be no problem when kernel_connect() returns
>>>>> -EISCONN and we return this to the caller. But is this how it should work, or does it work by chance?
>>>>>
>>>>
>>>> Since the sk_state keeps SMC_INIT and does not correctly indicate the state of clcsock, it should end
>>>> up calling kernel_connect() again to get the actual connection state of clcsock.
>>>>
>>>> And I'm sorry there is a problem that if sock->state==SS_CONNECTED and sk_state==SMC_INIT, further call
>>>> of smc_connect will return -EINVAL where -EISCONN is preferred.
>>>> The steps to reproduce:
>>>> 1)switch fallback before connect, such as setsockopt TCP_FASTOPEN
>>>> 2)connect with noblocking and returns -EINPROGRESS. (sock->state changes to SS_CONNECTING)
>>>> 3) end up calling connect with noblocking again and returns 0. (kernel_connect() returns 0 and sock->state changes to
>>>> SS_CONNECTED but sk->sk_state stays SMC_INIT)
>>>> 4) call connect again, maybe by mistake, will return -EINVAL, but -EISCONN is preferred.
>>>>
>>>> What do you think about if we synchronize the sk_state to SMC_ACTIVE instead of keeping SMC_INIT when clcsock
>>>> connected successfully in fallback case described above.
>>>>
>>>> ...
>>>
>>> I start thinking that the fix in 86434744 introduced a problem. Before that fix a connect with
>>> fallback always reached __smc_connect() and on top of that function in case of fallback
>>> smc_connect_fallback() is called, which itself sets sk_state to SMC_ACTIVE.
>>>
>>> 86434744 removed that code path and I wonder what it actually fixed, because at this time the
>>> fallback check in __smc_connect() was already present.
>>>
>>> Without that "goto out;" the state would be set correctly in smc_connect_fallback(), and the
>>> socket close processing would work as expected.
>>
>> I think it is OK without that "goto out;". And I guess the purpose of "goto out;" is to avoid calling __smc_connect(),
>> because it is impossible to establish an rdma channel at this time.
>
> Yes that was the purpose, but this disabled all the extra processing that should be done
> for fallback sockets during connect().
>
Since Karsten's suggestion, we didn't hear from you any more. We just
want to know:

- What do you think about the commit (86434744)? Could it be the trigger
of the problem you met?

- Have you ever tried to just remove the following lines from
smc_connection(), and check if your scenario could run correctly?

if (smc->use_fallback)
goto out;

In our opinion, we don't see the necessity of the patch, if partly
reverting the commit (86434744) could solve the problem.

2022-06-30 14:48:23

by Guangguan Wang

[permalink] [raw]
Subject: Re: [PATCH net-next v2] net/smc: align the connect behaviour with TCP



On 2022/6/30 04:09, Wenjia Zhang wrote:
>
> Since Karsten's suggestion, we didn't hear from you any more. We just want to know:
>
> - What do you think about the commit (86434744)? Could it be the trigger of the problem you met?
>
> - Have you ever tried to just remove the following lines from smc_connection(), and check if your scenario could run correctly?
>
> if (smc->use_fallback)
>               goto out;
>
> In our opinion, we don't see the necessity of the patch, if partly reverting the commit (86434744) could solve the problem.

I'm so sorry I missed the last emails for this discussion.

Yes, commit (86434744) is the trigger of the problem described in
https://lore.kernel.org/linux-s390/[email protected]/#t .

And I have tested just remove the following lines from smc_connection() can solve the above problem.
if (smc->use_fallback)
goto out;

I aggree that partly reverting the commit (86434744) is a better solution.

Thanks,
Guangguan Wang

2022-06-30 20:37:45

by Wenjia Zhang

[permalink] [raw]
Subject: Re: [PATCH net-next v2] net/smc: align the connect behaviour with TCP



On 30.06.22 16:29, Guangguan Wang wrote:
> I'm so sorry I missed the last emails for this discussion.
>
> Yes, commit (86434744) is the trigger of the problem described in
> https://lore.kernel.org/linux-s390/[email protected]/#t .
>
> And I have tested just remove the following lines from smc_connection() can solve the above problem.
> if (smc->use_fallback)
> goto out;
>
> I aggree that partly reverting the commit (86434744) is a better solution.
>
> Thanks,
> Guangguan Wang
Thank you for your effort!
Would you like to revert this patch? We'll revert the commit (86434744)
partly.

2022-07-01 02:26:46

by Guangguan Wang

[permalink] [raw]
Subject: Re: [PATCH net-next v2] net/smc: align the connect behaviour with TCP



On 2022/7/1 04:16, Wenjia Zhang wrote:
>
>
> On 30.06.22 16:29, Guangguan Wang wrote:
>> I'm so sorry I missed the last emails for this discussion.
>>
>> Yes, commit (86434744) is the trigger of the problem described in
>> https://lore.kernel.org/linux-s390/[email protected]/#t  .
>>
>> And I have tested just remove the following lines from smc_connection() can solve the above problem.
>> if (smc->use_fallback)
>>       goto out;
>>
>> I aggree that partly reverting the commit (86434744) is a better solution.
>>
>> Thanks,
>> Guangguan Wang
> Thank you for your effort!
> Would you like to revert this patch? We'll revert the commit (86434744) partly.

Did you mean revert commit (3aba1030)?
Sorry, I think I led to a misunderstanding. I mean commit (86434744) is the trigger of the problem I replied
in email https://lore.kernel.org/linux-s390/[email protected]/#t, not
the problem that commit (3aba1030) resolved for.

So I think the final solution is to remove the following lines from smc_connection() based on the current code.
if (smc->use_fallback) {
sock->state = rc ? SS_CONNECTING : SS_CONNECTED;
goto out;
}

Thanks,
Guangguan Wang

2022-07-01 13:11:15

by Wenjia Zhang

[permalink] [raw]
Subject: Re: [PATCH net-next v2] net/smc: align the connect behaviour with TCP



On 01.07.22 04:03, Guangguan Wang wrote:
>
>
> On 2022/7/1 04:16, Wenjia Zhang wrote:
>>
>>
>> On 30.06.22 16:29, Guangguan Wang wrote:
>>> I'm so sorry I missed the last emails for this discussion.
>>>
>>> Yes, commit (86434744) is the trigger of the problem described in
>>> https://lore.kernel.org/linux-s390/[email protected]/#t  .
>>>
>>> And I have tested just remove the following lines from smc_connection() can solve the above problem.
>>> if (smc->use_fallback)
>>>       goto out;
>>>
>>> I aggree that partly reverting the commit (86434744) is a better solution.
>>>
>>> Thanks,
>>> Guangguan Wang
>> Thank you for your effort!
>> Would you like to revert this patch? We'll revert the commit (86434744) partly.
>
> Did you mean revert commit (3aba1030)?
> Sorry, I think I led to a misunderstanding. I mean commit (86434744) is the trigger of the problem I replied
> in email https://lore.kernel.org/linux-s390/[email protected]/#t, not
> the problem that commit (3aba1030) resolved for.
>
> So I think the final solution is to remove the following lines from smc_connection() based on the current code.
> if (smc->use_fallback) {
> sock->state = rc ? SS_CONNECTING : SS_CONNECTED;
> goto out;
> }
>
> Thanks,
> Guangguan Wang
That would be also ok for us, thanks!