RE: [PATCH] bpf, sockmap: Do not read sk_receive_queue in tcp_bpf_recvmsg if strparser enabled

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> -----Original Message-----
> From: John Fastabend [mailto:john.fastabend@xxxxxxxxx]
> Sent: Monday, October 18, 2021 9:54 PM
> To: Jakub Sitnicki <jakub@xxxxxxxxxxxxxx>; liujian (CE)
> <liujian56@xxxxxxxxxx>
> Cc: john.fastabend@xxxxxxxxx; daniel@xxxxxxxxxxxxx; lmb@xxxxxxxxxxxxxx;
> edumazet@xxxxxxxxxx; davem@xxxxxxxxxxxxx; kuba@xxxxxxxxxx;
> yoshfuji@xxxxxxxxxxxxxx; dsahern@xxxxxxxxxx; ast@xxxxxxxxxx;
> andrii@xxxxxxxxxx; kafai@xxxxxx; songliubraving@xxxxxx; yhs@xxxxxx;
> kpsingh@xxxxxxxxxx; netdev@xxxxxxxxxxxxxxx; bpf@xxxxxxxxxxxxxxx
> Subject: Re: [PATCH] bpf, sockmap: Do not read sk_receive_queue in
> tcp_bpf_recvmsg if strparser enabled
> 
> Jakub Sitnicki wrote:
> > On Fri, Oct 15, 2021 at 10:01 AM CEST, Liu Jian wrote:
> > > If the strparser function of sk is turned on, all received data
> > > needs to be processed by strparser first.
> > >
> > > Fixes: 604326b41a6fb ("bpf, sockmap: convert to generic sk_msg
> > > interface")
> > > Signed-off-by: Liu Jian <liujian56@xxxxxxxxxx>
> > > ---
> >
> > [...]
> >
> > >  net/core/skmsg.c      | 5 +++++
> > >  net/ipv4/tcp_bpf.c    | 9 ++++++---
> > >  3 files changed, 17 insertions(+), 3 deletions(-)
> > >
> > > diff --git a/include/linux/skmsg.h b/include/linux/skmsg.h index
> > > 94e2a1f6e58d..25e92dff04aa 100644
> > > --- a/include/linux/skmsg.h
> > > +++ b/include/linux/skmsg.h
> > > @@ -390,6 +390,7 @@ void sk_psock_stop(struct sk_psock *psock, bool
> > > wait);  int sk_psock_init_strp(struct sock *sk, struct sk_psock
> > > *psock);  void sk_psock_start_strp(struct sock *sk, struct sk_psock
> > > *psock);  void sk_psock_stop_strp(struct sock *sk, struct sk_psock
> > > *psock);
> > > +bool sk_psock_strparser_started(struct sock *sk);
> > >  #else
> > >  static inline int sk_psock_init_strp(struct sock *sk, struct
> > > sk_psock *psock)  { @@ -403,6 +404,11 @@ static inline void
> > > sk_psock_start_strp(struct sock *sk, struct sk_psock *psock)  static
> > > inline void sk_psock_stop_strp(struct sock *sk, struct sk_psock
> > > *psock)  {  }
> > > +
> > > +static inline bool sk_psock_strparser_started(struct sock *sk) {
> > > +	return false;
> > > +}
> > >  #endif
> > >
> > >  void sk_psock_start_verdict(struct sock *sk, struct sk_psock
> > > *psock); diff --git a/net/core/skmsg.c b/net/core/skmsg.c index
> > > e85b7f8491b9..dd64ef854f3e 100644
> > > --- a/net/core/skmsg.c
> > > +++ b/net/core/skmsg.c
> > > @@ -1105,6 +1105,11 @@ void sk_psock_start_strp(struct sock *sk,
> struct sk_psock *psock)
> > >  	sk->sk_write_space = sk_psock_write_space;  }
> > >
> > > +bool sk_psock_strparser_started(struct sock *sk) {
> > > +	return sk->sk_data_ready == sk_psock_strp_data_ready;
> >
> > What if kTLS is configured on the socket? I think this check won't work then.
> 
> Liu, did you see this. I think its a bit cleaner, avoids the extra parser check in
> hotpath, and should solve the issue?
> 
> https://patchwork.kernel.org/project/netdevbpf/patch/20211011191647.418
> 704-3-john.fastabend@xxxxxxxxx/
> 
> I think it should also address Jakub's concern.
> 
I am sorry, I did not see the patch before.
I think it can solve my issue, please ignore my patch.
Thanks.

> Thanks,
> John
> 
> >
> > > +}
> > > +
> > >  void sk_psock_stop_strp(struct sock *sk, struct sk_psock *psock)  {
> > >  	if (!psock->saved_data_ready)
> >
> > [...]
> 





[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux