Received: by 2002:ab2:620c:0:b0:1ef:ffd0:ce49 with SMTP id o12csp780927lqt; Tue, 19 Mar 2024 03:50:36 -0700 (PDT) X-Forwarded-Encrypted: i=3; AJvYcCXvoUmAMjxKqHnXbOc0f0zsLSd00dlMrWk2AIIHs2/ghZBn9CS8rMGByhW68cPOu89pq4GX3Zmd3UAEowD+0m0dA8+7r79S7DMQmI8e4g== X-Google-Smtp-Source: AGHT+IGkE+aoX8jm/75ATD2DjfdbqFMjyW1WEODrP2I/pdEmEuX5TJbm+n/0tDXfjcx6jTfriTRx X-Received: by 2002:a05:620a:384c:b0:789:f096:a917 with SMTP id po12-20020a05620a384c00b00789f096a917mr2059769qkn.41.1710845436556; Tue, 19 Mar 2024 03:50:36 -0700 (PDT) ARC-Seal: i=2; a=rsa-sha256; t=1710845436; cv=pass; d=google.com; s=arc-20160816; b=rVyAvG3StJqULl/baWRAxYY6+0L/x9l5KJTytSgFx7YHYN2iolex4rp6cNlm8DxrHy A9aGSMm1RqxAf6f7G6T5+dVZds5ZCcARj4QT/ZpLrm5QzCGNuXsGU5jLLPq0wZXlpaVw tFsDk4JwYzygn2tiP5bNBy7uMADFciWXkIMNtumdIRdj0WjZ4q47fstWHfKhUyO1++8G GDzSgL8fbkZXoAKp7++7Qyf8OMmsM/ulMKAKmzgBIsSwFOQbnSWXfSAtuFsKPaaCYu+Y bnsRMLY/ey3FpuCTkQK2ZL7AQKz7SmYliEzXGbZs5XTYZBuZC+Gr/WzHEuN/9MUD3wvQ pGyw== ARC-Message-Signature: i=2; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=in-reply-to:content-disposition:mime-version:list-unsubscribe :list-subscribe:list-id:precedence:references:message-id:subject:cc :to:from:date; bh=ZK7kHWMKtH5PVxIBFxKPO9tquMzu127L3iJK1lY8sYU=; fh=RHn31SeYtJYyA1CUptjCN2YuoMG3JRo5ER9plaSd3hM=; b=iTcl0yrvhhnrUb+LR3yT0G+U9fLSKOcwgpQHe+o+uJdKILJI9+TC1inPlMTbLb9Enj xVP8ZQX1ghjoFtQDEGK35h4LmaBLs6XthZBP8skpdlvJe4Y5Zov7iP/jcqSsIeh/qyJ/ SrFp91RajeZvA/Qx6al8Um9StE7yxi1k8i49iEViq8ro+vWi6ZqHmTNxqcLN1rm2h3gO MBD3W+emF02jnFmjHPolMUdFJeMkI6u17P+avYZxNR4fOY9RFV8KUD9KVcvMQ59xaEHC kRjmNUHsqYGIDQ94qO5GsTCO/I1ATuAhCz1GB2rtxa3lnP/8+L6LbIq9PmqDOj6tVaHb PvVw==; dara=google.com ARC-Authentication-Results: i=2; mx.google.com; arc=pass (i=1 spf=pass spfdomain=pengutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-107418-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-107418-linux.lists.archive=gmail.com@vger.kernel.org" Return-Path: Received: from ny.mirrors.kernel.org (ny.mirrors.kernel.org. [147.75.199.223]) by mx.google.com with ESMTPS id vq22-20020a05620a559600b00789f0372eb2si6239252qkn.154.2024.03.19.03.50.36 for (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 19 Mar 2024 03:50:36 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel+bounces-107418-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) client-ip=147.75.199.223; Authentication-Results: mx.google.com; arc=pass (i=1 spf=pass spfdomain=pengutronix.de); spf=pass (google.com: domain of linux-kernel+bounces-107418-linux.lists.archive=gmail.com@vger.kernel.org designates 147.75.199.223 as permitted sender) smtp.mailfrom="linux-kernel+bounces-107418-linux.lists.archive=gmail.com@vger.kernel.org" Received: from smtp.subspace.kernel.org (wormhole.subspace.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ny.mirrors.kernel.org (Postfix) with ESMTPS id 49B331C22380 for ; Tue, 19 Mar 2024 10:50:36 +0000 (UTC) Received: from localhost.localdomain (localhost.localdomain [127.0.0.1]) by smtp.subspace.kernel.org (Postfix) with ESMTP id 96E5E7E11C; Tue, 19 Mar 2024 10:50:13 +0000 (UTC) Received: from metis.whiteo.stw.pengutronix.de (metis.whiteo.stw.pengutronix.de [185.203.201.7]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.subspace.kernel.org (Postfix) with ESMTPS id 393DB4F8A9 for ; Tue, 19 Mar 2024 10:50:09 +0000 (UTC) Authentication-Results: smtp.subspace.kernel.org; arc=none smtp.client-ip=185.203.201.7 ARC-Seal:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710845413; cv=none; b=BcGR0jW38dtL6w9Ed2oyFz2xt3nnh3jK9PZgxcqU1K7/9NUbhovw2Yz8eNI5bDRE86Q2fYMLJCuzb9Z6b22MQanASFlVIeILSMLuIz2Uman3kmIq3kaMwRpgCv9Pjo3CLApFUfZdSvEQA3uD8/oM4QfWw83kTrNpaobJaK9oLxI= ARC-Message-Signature:i=1; a=rsa-sha256; d=subspace.kernel.org; s=arc-20240116; t=1710845413; c=relaxed/simple; bh=xqv4EgS8mHvM2qs+1DYNGILQWcWFrc1cXZ0pMI0SaDU=; h=Date:From:To:Cc:Subject:Message-ID:References:MIME-Version: Content-Type:Content-Disposition:In-Reply-To; b=ALZRZCiHDa9cFMN0N19PkX24N3iWxgOPmqtqH5b3jeTZnwshwUXlc/2a86MfJLmJpCXUvJj70Un9AgLna7w9IplsCEG/cSoVcbVw+N+fwZko8jeV04qzgjFw/tO1lt6q6tgzZDhngTxFQukpDc0pGQr7f/n7lvinL4pE8yFm1K4= ARC-Authentication-Results:i=1; smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=pengutronix.de; spf=pass smtp.mailfrom=pengutronix.de; arc=none smtp.client-ip=185.203.201.7 Authentication-Results: smtp.subspace.kernel.org; dmarc=none (p=none dis=none) header.from=pengutronix.de Authentication-Results: smtp.subspace.kernel.org; spf=pass smtp.mailfrom=pengutronix.de Received: from drehscheibe.grey.stw.pengutronix.de ([2a0a:edc0:0:c01:1d::a2]) by metis.whiteo.stw.pengutronix.de with esmtps (TLS1.3:ECDHE_RSA_AES_256_GCM_SHA384:256) (Exim 4.92) (envelope-from ) id 1rmX2i-0001N5-V2; Tue, 19 Mar 2024 11:50:04 +0100 Received: from [2a0a:edc0:2:b01:1d::c5] (helo=pty.whiteo.stw.pengutronix.de) by drehscheibe.grey.stw.pengutronix.de with esmtps (TLS1.3) tls TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384 (Exim 4.94.2) (envelope-from ) id 1rmX2i-007FuF-7o; Tue, 19 Mar 2024 11:50:04 +0100 Received: from sha by pty.whiteo.stw.pengutronix.de with local (Exim 4.96) (envelope-from ) id 1rmX2i-0070ad-0V; Tue, 19 Mar 2024 11:50:04 +0100 Date: Tue, 19 Mar 2024 11:50:04 +0100 From: Sascha Hauer To: Pavel Begunkov Cc: netdev@vger.kernel.org, kernel@pengutronix.de, linux-kernel@vger.kernel.org, Paolo Abeni , Jens Axboe , io-uring@vger.kernel.org Subject: Re: [PATCH] net: Do not break out of sk_stream_wait_memory() with TIF_NOTIFY_SIGNAL Message-ID: References: <20240315100159.3898944-1-s.hauer@pengutronix.de> <7b82679f-9b69-4568-a61d-03eb1e4afc18@gmail.com> <0a556650-9627-48ee-9707-05d7cab33f0f@gmail.com> Precedence: bulk X-Mailing-List: linux-kernel@vger.kernel.org List-Id: List-Subscribe: List-Unsubscribe: MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <0a556650-9627-48ee-9707-05d7cab33f0f@gmail.com> X-Sent-From: Pengutronix Hildesheim X-URL: http://www.pengutronix.de/ X-Accept-Language: de,en X-Accept-Content-Type: text/plain X-SA-Exim-Connect-IP: 2a0a:edc0:0:c01:1d::a2 X-SA-Exim-Mail-From: sha@pengutronix.de X-SA-Exim-Scanned: No (on metis.whiteo.stw.pengutronix.de); SAEximRunCond expanded to false X-PTX-Original-Recipient: linux-kernel@vger.kernel.org On Mon, Mar 18, 2024 at 01:19:19PM +0000, Pavel Begunkov wrote: > On 3/18/24 12:10, Sascha Hauer wrote: > > On Fri, Mar 15, 2024 at 05:02:05PM +0000, Pavel Begunkov wrote: > > > On 3/15/24 10:01, Sascha Hauer wrote: > > > > It can happen that a socket sends the remaining data at close() time. > > > > With io_uring and KTLS it can happen that sk_stream_wait_memory() bails > > > > out with -512 (-ERESTARTSYS) because TIF_NOTIFY_SIGNAL is set for the > > > > current task. This flag has been set in io_req_normal_work_add() by > > > > calling task_work_add(). > > > > > > The entire idea of task_work is to interrupt syscalls and let io_uring > > > do its job, otherwise it wouldn't free resources it might be holding, > > > and even potentially forever block the syscall. > > > > > > I'm not that sure about connect / close (are they not restartable?), > > > but it doesn't seem to be a good idea for sk_stream_wait_memory(), > > > which is the normal TCP blocking send path. I'm thinking of some kinds > > > of cases with a local TCP socket pair, the tx queue is full as well > > > and the rx queue of the other end, and io_uring has to run to receive > > > the data. > > There is another case, let's say the IO is done via io-wq > (io_uring's worker thread pool) and hits the waiting. Now the > request can't get cancelled, which is done by interrupting the > task with TIF_NOTIFY_SIGNAL. User requested request cancellations > is one thing, but we'd need to check if io_uring can ever be closed > in this case. > > > > > If interruptions are not welcome you can use different io_uring flags, > > > see IORING_SETUP_COOP_TASKRUN and/or IORING_SETUP_DEFER_TASKRUN. > > > > I tried with different combinations of these flags. For example > > IORING_SETUP_TASKRUN_FLAG | IORING_SETUP_SINGLE_ISSUER | IORING_SETUP_DEFER_TASKRUN > > makes the issue less likely, but nevertheless it still happens. > > > > However, reading the documentation of these flags, they shall provide > > hints to the kernel for optimizations, but it should work without these > > flags, right? > > That's true, and I guess there are other cases as well, like > io-wq and perhaps even a stray fput. > > > > > Maybe I'm missing something, why not restart your syscall? > > > > The problem comes with TLS. Normally with synchronous encryption all > > data on a socket is written during write(). When asynchronous > > encryption comes into play, then not all data is written during write(), > > but instead the remaining data is written at close() time. > > Was it considered to do the final cleanup in workqueue > and only then finalising the release? No, but I don't really understand what you mean here. Could you elaborate? Sascha -- Pengutronix e.K. | | Steuerwalder Str. 21 | http://www.pengutronix.de/ | 31137 Hildesheim, Germany | Phone: +49-5121-206917-0 | Amtsgericht Hildesheim, HRA 2686 | Fax: +49-5121-206917-5555 |