From patchwork Wed Jun 7 14:05:45 2023 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: David Howells X-Patchwork-Id: 13270776 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from kanga.kvack.org (kanga.kvack.org [205.233.56.17]) by smtp.lore.kernel.org (Postfix) with ESMTP id 02329C7EE23 for ; Wed, 7 Jun 2023 14:30:19 +0000 (UTC) Received: by kanga.kvack.org (Postfix) id 689956B0071; Wed, 7 Jun 2023 10:30:19 -0400 (EDT) Received: by kanga.kvack.org (Postfix, from userid 40) id 6391C6B0072; Wed, 7 Jun 2023 10:30:19 -0400 (EDT) X-Delivered-To: int-list-linux-mm@kvack.org Received: by kanga.kvack.org (Postfix, from userid 63042) id 501668E0001; Wed, 7 Jun 2023 10:30:19 -0400 (EDT) X-Delivered-To: linux-mm@kvack.org Received: from relay.hostedemail.com (smtprelay0017.hostedemail.com [216.40.44.17]) by kanga.kvack.org (Postfix) with ESMTP id 41A476B0071 for ; Wed, 7 Jun 2023 10:30:19 -0400 (EDT) Received: from smtpin27.hostedemail.com (a10.router.float.18 [10.200.18.1]) by unirelay10.hostedemail.com (Postfix) with ESMTP id AFEB5C01FB for ; Wed, 7 Jun 2023 14:30:18 +0000 (UTC) X-FDA: 80876186916.27.32CEFA4 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by imf11.hostedemail.com (Postfix) with ESMTP id EA76340035 for ; Wed, 7 Jun 2023 14:30:15 +0000 (UTC) Authentication-Results: imf11.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=hxD5xqAk; spf=pass (imf11.hostedemail.com: domain of dhowells@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=dhowells@redhat.com; dmarc=pass (policy=none) header.from=redhat.com ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=hostedemail.com; s=arc-20220608; t=1686148216; h=from:from:sender:reply-to:subject:subject:date:date: message-id:message-id:to:to:cc:cc:mime-version:mime-version: content-type:content-transfer-encoding:content-transfer-encoding: in-reply-to:references:dkim-signature; bh=4dKRVpJXGIxcDZ6S9HnUKeAF9KTVhi9D43sPUNTGZ3E=; b=bwJmurbmD1WXCPAl+X3Lo/RfpuPTm6ffxJhMXAWyh/nfMiBUBqItLkjIGf7Z+uYGeh5Jcq qYKp2PPFuD+Y8VjJmGeTy1wqiLNJcvLcrosRIwkbpnoANiRVj+GtLuxmbZxB7Fxzo+VvkK VlVAiTP3a2IncJBevQNIHa58I46Hl1g= ARC-Seal: i=1; s=arc-20220608; d=hostedemail.com; t=1686148216; a=rsa-sha256; cv=none; b=abozB6i2De/nHE76fo3THNBRoKP4vSPkA50jd/TB9fqS8kyVeAr/dyi2c2bfzuLT5eXHiy 99LPM0kNVOAzAykMW5GJ4nHWAfinUyiFMalNFjYYoxyci6dW9Gn4Gj1mQQm+DVrBrRtcCC E5yk8qxFS2On24VH9elYikKOd12J6HA= ARC-Authentication-Results: i=1; imf11.hostedemail.com; dkim=pass header.d=redhat.com header.s=mimecast20190719 header.b=hxD5xqAk; spf=pass (imf11.hostedemail.com: domain of dhowells@redhat.com designates 170.10.129.124 as permitted sender) smtp.mailfrom=dhowells@redhat.com; dmarc=pass (policy=none) header.from=redhat.com DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1686148215; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version: content-transfer-encoding:content-transfer-encoding; bh=4dKRVpJXGIxcDZ6S9HnUKeAF9KTVhi9D43sPUNTGZ3E=; b=hxD5xqAklorDdbSPJRnxY6aPr5JhfjXpoIP1KJ9BzKM+1AwIAEh5UAHKcfOZZ24Y9VL2lr z//7gmXHuP3qmNVhRRxxA8wAbkb+guW/TyG20lOjrGrVc/KrTJsN3WOIg7/+H9P9FYtZ7m +5BBUTysxZUvLTIXZZrcrWiHdN7zvX4= Received: from mimecast-mx02.redhat.com (mx3-rdu2.redhat.com [66.187.233.73]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id us-mta-135-a1atBA5ROOKUYcmceGoKpA-1; Wed, 07 Jun 2023 10:06:05 -0400 X-MC-Unique: a1atBA5ROOKUYcmceGoKpA-1 Received: from smtp.corp.redhat.com (int-mx10.intmail.prod.int.rdu2.redhat.com [10.11.54.10]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by mimecast-mx02.redhat.com (Postfix) with ESMTPS id 9D03A3C0D849; Wed, 7 Jun 2023 14:06:04 +0000 (UTC) Received: from warthog.procyon.org.uk (unknown [10.42.28.182]) by smtp.corp.redhat.com (Postfix) with ESMTP id 33FCD403367; Wed, 7 Jun 2023 14:06:02 +0000 (UTC) From: David Howells To: netdev@vger.kernel.org, Linus Torvalds Cc: David Howells , Chuck Lever , Boris Pismenny , John Fastabend , Jakub Kicinski , "David S. Miller" , Eric Dumazet , Paolo Abeni , Willem de Bruijn , David Ahern , Matthew Wilcox , Jens Axboe , linux-mm@kvack.org, linux-kernel@vger.kernel.org Subject: [PATCH net-next v5 00/14] splice, net: Rewrite splice-to-socket, fix SPLICE_F_MORE and handle MSG_SPLICE_PAGES in AF_TLS Date: Wed, 7 Jun 2023 15:05:45 +0100 Message-ID: <20230607140559.2263470-1-dhowells@redhat.com> MIME-Version: 1.0 X-Scanned-By: MIMEDefang 3.1 on 10.11.54.10 X-Rspamd-Queue-Id: EA76340035 X-Rspam-User: X-Stat-Signature: ur63c4e3k9qpigudwd6cfwgsrwqy7g9w X-Rspamd-Server: rspam03 X-HE-Tag: 1686148215-177170 X-HE-Meta: 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 gpaatLv/ D4qBbpTERRV51aOUmOihgbxu9R0RapvVyWpN6HxQmXCCAVmagVwtJCqHPgXi2BYkNFZeD9Ha9NQGLOtMft1m3v7KakB98VOQey3WU4pxZb7loxnDtwJhEKj7UhS6huUHIq78TJTnod//5sqS273+h2nfiMTlP0TjEPtiN1HpVpfpGtXvJVRz7yt3wXF8XgzetDBfsWSZKDcrzrhjF79E30co4IxUkl6+8BXV6sYA+FAE6FegTf42qLCGWtn8aYWceXv68/deBu/UgEoVSWQIaOsGKuOHGfCZCW+sP8OPdYlYLQE8P+VQTJb3oFrO+N54MMMlzyMOlSsB+Qa713jUZrgaVqH0TefUYs7Tz6Z+QkXEUx4iofojaY2Wn0Nihg8aZEIJIYyZyg261I0VenS+sKtqDRc/H1uFAyadbXkMqNppjGauOETmgQPTK2Q== X-Bogosity: Ham, tests=bogofilter, spamicity=0.000000, version=1.2.4 Sender: owner-linux-mm@kvack.org Precedence: bulk X-Loop: owner-majordomo@kvack.org List-ID: Here are patches to do the following: (1) Block MSG_SENDPAGE_* flags from leaking into ->sendmsg() from userspace, whilst allowing splice_to_socket() to pass them in. (2) Allow MSG_SPLICE_PAGES to be passed into tls_*_sendmsg(). Until support is added, it will be ignored and a splice-driven sendmsg() will be treated like a normal sendmsg(). TCP, UDP, AF_UNIX and Chelsio-TLS already handle the flag in net-next. (3) Replace a chain of functions to splice-to-sendpage with a single function to splice via sendmsg() with MSG_SPLICE_PAGES. This allows a bunch of pages to be spliced from a pipe in a single call using a bio_vec[] and pushes the main processing loop down into the bowels of the protocol driver rather than repeatedly calling in with a page at a time. (4) Provide a ->splice_eof() op[2] that allows splice to signal to its output that the input observed a premature EOF and that the caller didn't flag SPLICE_F_MORE, thereby allowing a corked socket to be flushed. This attempts to maintain the current behaviour. It is also not called if we didn't manage to read any data and so didn't called the actor function. This needs routing though several layers to get it down to the network protocol. [!] Note that I chose not to pass in any flags - I'm not sure it's particularly useful to pass in the splice flags; I also elected not to return any error code - though we might actually want to do that. (5) Provide tls_{device,sw}_splice_eof() to flush a pending TLS record if there is one. (6) Provide splice_eof() for UDP, TCP, Chelsio-TLS and AF_KCM. AF_UNIX doesn't seem to pay attention to the MSG_MORE or MSG_SENDPAGE_NOTLAST flags. (7) Alter the behaviour of sendfile() and fix SPLICE_F_MORE/MSG_MORE signalling[1] such SPLICE_F_MORE is always signalled until we have read sufficient data to finish the request. If we get a zero-length before we've managed to splice sufficient data, we now leave the socket expecting more data and leave it to userspace to deal with it. (8) Make AF_TLS handle the MSG_SPLICE_PAGES internal sendmsg flag. MSG_SPLICE_PAGES is an internal hint that tells the protocol that it should splice the pages supplied if it can. Its sendpage implementations are then turned into wrappers around that. I've pushed the patches here also: https://git.kernel.org/pub/scm/linux/kernel/git/dhowells/linux-fs.git/log/?h=sendpage-2-tls David Changes ======= ver #5) - In splice_to_socket(), preclear ret in case len == 0. - Provide ->splice_eof() for UDP, TCP, Chelsio-TLS and AF_KCM. ver #4) - Switch to using ->splice_eof() to signal premature EOF to the splice output[2]. ver #3) - Include the splice-to-socket rewrite patch. - Fix SPLICE_F_MORE/MSG_MORE signalling. - Allow AF_TLS to accept sendmsg() with MSG_SPLICE_PAGES before it is handled. - Allow a zero-length send() to a TLS socket to flush an outstanding record. - Address TLS kselftest failure. ver #2) - Dropped the slab data copying. - "rls_" should be "tls_". - Attempted to fix splice_direct_to_actor(). - Blocked MSG_SENDPAGE_* from being set by userspace. Link: https://lore.kernel.org/r/499791.1685485603@warthog.procyon.org.uk/ [1] Link: https://lore.kernel.org/r/CAHk-=wh=V579PDYvkpnTobCLGczbgxpMgGmmhqiTyE34Cpi5Gg@mail.gmail.com/ [2] Link: https://git.kernel.org/pub/scm/linux/kernel/git/netdev/net-next.git/commit/?id=51c78a4d532efe9543a4df019ff405f05c6157f6 # part 1 Link: https://lore.kernel.org/r/20230524153311.3625329-1-dhowells@redhat.com/ # v1 David Howells (14): net: Block MSG_SENDPAGE_* from being passed to sendmsg() by userspace tls: Allow MSG_SPLICE_PAGES but treat it as normal sendmsg splice, net: Use sendmsg(MSG_SPLICE_PAGES) rather than ->sendpage() splice, net: Add a splice_eof op to file-ops and socket-ops tls/sw: Use splice_eof() to flush tls/device: Use splice_eof() to flush ipv4, ipv6: Use splice_eof() to flush chelsio/chtls: Use splice_eof() to flush kcm: Use splice_eof() to flush splice, net: Fix SPLICE_F_MORE signalling in splice_direct_to_actor() tls/sw: Support MSG_SPLICE_PAGES tls/sw: Convert tls_sw_sendpage() to use MSG_SPLICE_PAGES tls/device: Support MSG_SPLICE_PAGES tls/device: Convert tls_device_sendpage() to use MSG_SPLICE_PAGES .../chelsio/inline_crypto/chtls/chtls.h | 1 + .../chelsio/inline_crypto/chtls/chtls_io.c | 9 + .../chelsio/inline_crypto/chtls/chtls_main.c | 1 + fs/splice.c | 207 +++++++++++--- include/linux/fs.h | 3 +- include/linux/net.h | 1 + include/linux/socket.h | 4 +- include/linux/splice.h | 3 + include/net/inet_common.h | 1 + include/net/sock.h | 1 + include/net/tcp.h | 1 + include/net/udp.h | 1 + net/ipv4/af_inet.c | 18 ++ net/ipv4/tcp.c | 16 ++ net/ipv4/tcp_ipv4.c | 1 + net/ipv4/udp.c | 16 ++ net/ipv6/af_inet6.c | 1 + net/ipv6/tcp_ipv6.c | 1 + net/ipv6/udp.c | 18 ++ net/kcm/kcmsock.c | 15 ++ net/socket.c | 36 +-- net/tls/tls.h | 2 + net/tls/tls_device.c | 110 ++++---- net/tls/tls_main.c | 4 + net/tls/tls_sw.c | 253 ++++++++++-------- 25 files changed, 485 insertions(+), 239 deletions(-)