Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp1103304rdh; Fri, 27 Oct 2023 05:04:56 -0700 (PDT) X-Google-Smtp-Source: AGHT+IFwnoUUzHqM8VuSmt3a8T2UcttY3fxL+hcYHM5hCQ4QGjcp7SqHJxaCegXGW0sWEhFYTBC0 X-Received: by 2002:a81:ac09:0:b0:5a8:47f9:dda with SMTP id k9-20020a81ac09000000b005a847f90ddamr2835920ywh.21.1698408295835; Fri, 27 Oct 2023 05:04:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698408295; cv=none; d=google.com; s=arc-20160816; b=MydVFzDghX8w+vFRETH1NAcSnEeBKCEomF8siqqENwJoKoon4bOo/n68MPyG6BsUdU aYhcuHIoDxYJdBRw/djpy3BrG0sqX801Zx98HWf+1fRFXoNvpF0AcBkDN9noE3C73VMN HzC7okZBCXpKU2w+1ixodKCsnPYWx2AS3WxCCyxNB/Ior3drDxxlUuz1AVmdN1JHhg61 boI/GfESrVFNlTS60j9RqflL88bn/PIbEWaOR6NAlYySd/PmEM6s0t+LvaaXa8jceD8j No3USbPGdW74xCaywxN9RLi/3JnmVzcc6rw/dV9a2u4tmCIOlnUCu14FfaVD817GKPbh X0TQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:user-agent:in-reply-to:content-disposition :mime-version:references:message-id:subject:cc:to:from:date; bh=1nfY4B1NtUmZAmPr/su3ynGFPaOJPTKsJFzRMXp1aU8=; fh=yf7Ecdn/QotwWQoxAp2BoyCpjX2p4dSJgFefQwYSGJs=; b=Rb3zk2NHcGDH+ESRa749ff/2kGVVlAe3kbGeVjJfOKnhGb0lpBTEZ9NZaJnD9OzZ73 CfaDxOyD/Tsu+CYEbOcFqYrQjyVPDI5n15S9nZqZFuPAfQj7OGjPfpUEDmB0DOXnUuLw v8iRiX7IuBs5w5ufnD9GccKGGVPuPgNZ55oxdXrIeuJy9dN9aIoXyvp0WeF2QVSESi5T qozlUgeTZutARYSGGbTO4PCON93UjkNVG6lF1kd5lz2zYLPehW9hCXKQVe1HApQoRjLy PR+EUCPsYxrgE9HwjrbOA28dLqbPGf6gG+RhIP0Fs8bDz/1ydasVx1N1Bc7PzZBKfnC6 QH7g== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from groat.vger.email (groat.vger.email. [2620:137:e000::3:5]) by mx.google.com with ESMTPS id ew8-20020a05690c2f8800b005a4f6bf071csi1123731ywb.531.2023.10.27.05.04.55 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Fri, 27 Oct 2023 05:04:55 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) client-ip=2620:137:e000::3:5; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:5 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by groat.vger.email (Postfix) with ESMTP id 9E2B8832FDA2; Fri, 27 Oct 2023 05:04:52 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at groat.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345740AbjJ0MEk (ORCPT + 99 others); Fri, 27 Oct 2023 08:04:40 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:54058 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1345539AbjJ0MEj (ORCPT ); Fri, 27 Oct 2023 08:04:39 -0400 Received: from metis.whiteo.stw.pengutronix.de (metis.whiteo.stw.pengutronix.de [IPv6:2a0a:edc0:2:b01:1d::104]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 7C70FC9 for ; Fri, 27 Oct 2023 05:04:37 -0700 (PDT) Received: from drehscheibe.grey.stw.pengutronix.de ([2a0a:edc0:0:c01:1d::a2]) by metis.whiteo.stw.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1qwLZp-0001Rd-Fa; Fri, 27 Oct 2023 14:04:33 +0200 Received: from [2a0a:edc0:2:b01:1d::c0] (helo=ptx.whiteo.stw.pengutronix.de) by drehscheibe.grey.stw.pengutronix.de with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1qwLZo-004d6Z-Dy; Fri, 27 Oct 2023 14:04:32 +0200 Received: from sha by ptx.whiteo.stw.pengutronix.de with local (Exim 4.92) (envelope-from ) id 1qwLZo-00Gbnc-Ai; Fri, 27 Oct 2023 14:04:32 +0200 Date: Fri, 27 Oct 2023 14:04:32 +0200 From: Sascha Hauer To: Paolo Abeni Cc: netdev@vger.kernel.org, linux-kernel@vger.kernel.org, "David S . Miller" , Jakub Kicinski , Jens Axboe , kernel@pengutronix.de Subject: Re: [PATCH] net: Do not break out of sk_stream_wait_memory() with TIF_NOTIFY_SIGNAL Message-ID: <20231027120432.GB3359458@pengutronix.de> References: <20231023121346.4098160-1-s.hauer@pengutronix.de> <20231026070310.GY3359458@pengutronix.de> <8404022493c5ceda74807a3407e5a087425678e2.camel@redhat.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <8404022493c5ceda74807a3407e5a087425678e2.camel@redhat.com> X-Sent-From: Pengutronix Hildesheim X-URL: http://www.pengutronix.de/ X-Accept-Language: de,en X-Accept-Content-Type: text/plain User-Agent: Mutt/1.10.1 (2018-07-13) X-SA-Exim-Connect-IP: 2a0a:edc0:0:c01:1d::a2 X-SA-Exim-Mail-From: sha@pengutronix.de X-SA-Exim-Scanned: No (on metis.whiteo.stw.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on groat.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (groat.vger.email [0.0.0.0]); Fri, 27 Oct 2023 05:04:52 -0700 (PDT) On Thu, Oct 26, 2023 at 10:49:18AM +0200, Paolo Abeni wrote: > On Thu, 2023-10-26 at 09:03 +0200, Sascha Hauer wrote: > > On Tue, Oct 24, 2023 at 03:56:17PM +0200, Paolo Abeni wrote: > > > On Mon, 2023-10-23 at 14:13 +0200, Sascha Hauer wrote: > > > > It can happen that a socket sends the remaining data at close() time. > > > > With io_uring and KTLS it can happen that sk_stream_wait_memory() bails > > > > out with -512 (-ERESTARTSYS) because TIF_NOTIFY_SIGNAL is set for the > > > > current task. This flag has been set in io_req_normal_work_add() by > > > > calling task_work_add(). > > > > > > > > It seems signal_pending() is too broad, so this patch replaces it with > > > > task_sigpending(), thus ignoring the TIF_NOTIFY_SIGNAL flag. > > > > > > This looks dangerous, at best. Other possible legit users setting > > > TIF_NOTIFY_SIGNAL will be broken. > > > > > > Can't you instead clear TIF_NOTIFY_SIGNAL in io_run_task_work() ? > > > > I don't have an idea how io_run_task_work() comes into play here, but it > > seems it already clears TIF_NOTIFY_SIGNAL: > > > > static inline int io_run_task_work(void) > > { > > /* > > * Always check-and-clear the task_work notification signal. With how > > * signaling works for task_work, we can find it set with nothing to > > * run. We need to clear it for that case, like get_signal() does. > > */ > > if (test_thread_flag(TIF_NOTIFY_SIGNAL)) > > clear_notify_signal(); > > ... > > } > > I see, io_run_task_work() is too late, sk_stream_wait_memory() is > already woken up. > > I still think this patch is unsafe. What about explicitly handling the > restart in tls_sw_release_resources_tx() ? The main point is that such > function is called by inet_release() and the latter can't be re- > started. I don't think there's anything I can do in tls_sw_release_resources_tx(). When entering this function TIF_NOTIFY_SIGNAL is not (yet) set. It gets set at some point while tls_sw_release_resources_tx() is running. I find it set when tls_tx_records() returns with -ERESTARTSYS. I tried clearing TIF_NOTIFY_SIGNAL then and called tls_tx_records() again, but that doesn't work. Sascha -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |