From mboxrd@z Thu Jan 1 00:00:00 1970 Authentication-Results: passt.top; dmarc=none (p=none dis=none) header.from=gibson.dropbear.id.au Authentication-Results: passt.top; dkim=pass (2048-bit key; secure) header.d=gibson.dropbear.id.au header.i=@gibson.dropbear.id.au header.a=rsa-sha256 header.s=202602 header.b=FFEL4qLF; dkim-atps=neutral Received: from mail.ozlabs.org (gandalf.ozlabs.org [150.107.74.76]) by passt.top (Postfix) with ESMTPS id 418885A0265 for ; Thu, 21 May 2026 16:46:00 +0200 (CEST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gibson.dropbear.id.au; s=202602; t=1779374756; bh=qE383MbT3/I/JqqQEc3HtlnhVkpJprNYQTd5SXFov4E=; h=Date:From:To:Cc:Subject:References:In-Reply-To:From; b=FFEL4qLFii74RmX6Pn4arhxE7y/PFWG6iB0fcwuAjdompz9HD2K2AyWN0i9OxUNWP lZKgbFfm8xdiD23/xEeDla7WwFU2nhrunWWDLFd5Gf4yvDYeJhsMjJ8gljGilIJiyy jTfWhiWY8i8vZ6Vf7V2FCoZURHGJH+fack99oUbOeXVIeV5rumn6TyUto33Ij6N9Gs yLSVcQQyhUmvdbVwSegcBvDUTljjkWwADHnn11eID1Ev2P0h0r2Oai5A3XmcSCO2vy zLCjTHB6X6eBnEyb3JvusZn7EsWqj2RA7zZCcTNyOCtsQom2wro2q6ivYw/9+ra6ip WHdE79lZMhyTA== Received: by gandalf.ozlabs.org (Postfix, from userid 1007) id 4gLrnJ6nYgz4wK0; Fri, 22 May 2026 00:45:56 +1000 (AEST) Date: Thu, 21 May 2026 23:51:04 +1000 From: David Gibson To: Stefano Brivio Subject: Re: [PATCH 5/6] tcp_splice: Simplify EPOLLRDHUP / eof / FIN handling Message-ID: References: <20260520130851.436931-1-david@gibson.dropbear.id.au> <20260520130851.436931-6-david@gibson.dropbear.id.au> <20260520223003.37ceb0f8@elisabeth> <20260521074030.0e15b36e@elisabeth> <20260521091512.1ede0a84@elisabeth> MIME-Version: 1.0 Content-Type: multipart/signed; micalg=pgp-sha512; protocol="application/pgp-signature"; boundary="/0myd5Y+mAoDhZjZ" Content-Disposition: inline In-Reply-To: <20260521091512.1ede0a84@elisabeth> Message-ID-Hash: OOBQTO5E4VZNCEG3RZFQTXGT53FNIEVH X-Message-ID-Hash: OOBQTO5E4VZNCEG3RZFQTXGT53FNIEVH X-MailFrom: dgibson@gandalf.ozlabs.org X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: passt-dev@passt.top, Paul Holzinger X-Mailman-Version: 3.3.8 Precedence: list List-Id: Development discussion and patches for passt Archived-At: Archived-At: List-Archive: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: --/0myd5Y+mAoDhZjZ Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On Thu, May 21, 2026 at 09:15:13AM +0200, Stefano Brivio wrote: > On Thu, 21 May 2026 16:56:43 +1000 > David Gibson wrote: >=20 > > On Thu, May 21, 2026 at 07:40:31AM +0200, Stefano Brivio wrote: > > > On Thu, 21 May 2026 12:03:33 +1000 > > > David Gibson wrote: > > > =20 > > > > On Wed, May 20, 2026 at 10:30:04PM +0200, Stefano Brivio wrote: =20 > > > > > On Wed, 20 May 2026 23:08:50 +1000 > > > > > David Gibson wrote: > > > > > =20 > > > > > > There are two ways we can tell one of our sockets has received = a FIN. We > > > > > > can either see an EPOLLRDHUP epoll event, or we can get a zero-= length read > > > > > > (EOF) on the socket. We currently use both, in a mildly confus= ing way: > > > > > > we only set the FIN_RCVD() flag based on the EPOLLRDHUP event, = but then > > > > > > some other close out logic is based on seeing an EOF. > > > > > >=20 > > > > > > Simplify this by setting the flag based on only the EOF. To ma= ke sure we > > > > > > don't miss an event if we get an EPOLLRDHUP with no data, we tr= igger the > > > > > > forwarding path for EPOLLRDHUP as well as EPOLLIN. > > > > > >=20 > > > > > > Signed-off-by: David Gibson > > > > > > --- > > > > > > tcp_splice.c | 14 +++++--------- > > > > > > 1 file changed, 5 insertions(+), 9 deletions(-) > > > > > >=20 > > > > > > diff --git a/tcp_splice.c b/tcp_splice.c > > > > > > index 8fbd490f..b45f0060 100644 > > > > > > --- a/tcp_splice.c > > > > > > +++ b/tcp_splice.c > > > > > > @@ -487,7 +487,6 @@ static int tcp_splice_forward(struct ctx *c= , struct > > > > > > uint8_t lowat_set_flag =3D RCVLOWAT_SET(fromsidei); > > > > > > uint8_t lowat_act_flag =3D RCVLOWAT_ACT(fromsidei); > > > > > > int never_read =3D 1; > > > > > > - int eof =3D 0; > > > > > > =20 > > > > > > while (1) { > > > > > > ssize_t readlen, written; > > > > > > @@ -510,7 +509,7 @@ retry: > > > > > > flow_trace(conn, "%zi from read-side call", readlen); > > > > > > =20 > > > > > > if (!readlen) { > > > > > > - eof =3D 1; > > > > > > + conn_event(conn, FIN_RCVD(fromsidei)); =20 > > > > >=20 > > > > > I'm not sure if I really found a concrete issue with this, but it= looks > > > > > a bit scary, because it changes the semantics of FIN_RCVD, which = used to > > > > > mean that we infer we received a FIN, regardless of whether we're= done > > > > > processing all data from that half of the connection. > > > > >=20 > > > > > Now FIN_RCVD is only set if we actually processed all the data an= d we > > > > > hit the end of file. =20 > > > >=20 > > > > True. But the only place that tested FIN_RCVD was at the end of > > > > tcp_splice_forward(), conditional on 'eof' anyway. In a sense, this > > > > was the cause of bug202 - we had FIN_RCVD set, but we didn't process > > > > it and shutdown() on the other side, because we didn't have eof. = =20 > > >=20 > > > That sounds like a good motivation to clean this up, just two concerns > > > below: > > > =20 > > > > > The (potential) issue I see here is that we get EPOLLRDHUP, splic= e() > > > > > returns -1 with EAGAIN in errno because we had no room in the pip= e, > > > > > and it would have returned 0 instead. > > > > >=20 > > > > > Will we ever get our zero-sized "read" later? If not, we might ha= ve > > > > > missed EPOLLRDHUP *and* the end of file. I'm not entirely sure we= have > > > > > guarantees in that sense from splice(). =20 > > > >=20 > > > > It's not really about guarantees from splice. I'm pretty sure this= is > > > > ok, reasoning as follows. > > > >=20 > > > > Consider all the exit points from the loop body: > > > > - Each return is a return -1, so we kill the connection anyway. T= hey > > > > don't matter > > > > - Each continue, goto retry and the end of the body will do the re= ad > > > > side splice() again, so get another chance to see the EOF > > > > - That leaves just the breaks > > > >=20 > > > > Consider each break (there are three, since patch 2 of this series) > > > > if (written < 0) { > > > > if (!conn->pending[fromsidei]) > > > > break; > > > >=20 > > > > (1) The pipe is empty and the write-splice returned EAGAIN, so it > > > > didn't remove data from the pipe. =20 > > >=20 > > > You're assuming that !conn->pending[fromsidei] means that the pipe is > > > empty. From what we see of it, it is. =20 > >=20 > > It does mean the pipe is empty. Everything we put in, we've taken > > out. There cannot be anything in there. > >=20 > > > What the kernel can do with it, though, is different. It might return > > > EAGAIN even if we think we should have space, because it's resizing it > > > under memory pressure or anything like that. Or it delays freeing up > > > space or accounting for whatever reason. =20 > >=20 > > Theoretically, I suppose. But !pending doesn't just mean the pipe is > > not full it means it's completely completely empty. Not being able to > > put any bytes at all into an empty pipe would be *very* surprising. > > So much so that if it happened in practice, I suspect we wouldn't be > > safe not having epoll events on the pipe ends, so that we can be > > notified when it deigns to accept some data. >=20 > We can get 512-byte pipes, I actually saw that happening in practice > with either: Sure.. so? We can still put some bytes into it if it's empty. > - people setting low values for ulimits >=20 > - the user (or just pasta itself) having a lot of pipes open >=20 > and if I recall correctly that's where I saw the case of a supposedly > empty pipe giving us EAGAIN. That was years ago though and I didn't > specifically fix that. I mean.. that sounds like a kernel bug. If we do have to handle that case we'll need epoll events on the pipe ends, since none of the socket events we monitor will trigger when the pipe becomes writable. > We currently probe the size based on the value we can have for 32 pipes > (TCP_SPLICE_PIPE_POOL_SIZE). By making that 4096 or so you should get > rather small pipes. >=20 > Things might already be broken with them, I haven't checked the > behaviour in a long while. I think 512 bytes was the lower bound I hit. >=20 > > > So it would be nice to make this part robust to that. I thought setti= ng > > > FIN_RCVD on EPOLLRDHUP was a good way to achieve that. > > > =20 > > > > Therefore, the pipe must have been > > > > empty before the write-splice. Which means the read-splice can't h= ave > > > > blocked on a full pipe. > > > > conn_event(conn, OUT_WAIT(!fromsidei)); > > > > break; > > > > } > > > >=20 > > > > (2) The pipe is non-empty and the write-splice returned EAGAIN, so = it > > > > must have blocked on the output socket. We've set OUT_WAIT(), so > > > > we'll get an EPOLLOUT at some point which will cause us to read-spl= ice > > > > again, meaning we get another chance to see the EOF. =20 > > >=20 > > > ...later. But what if we don't get a zero-sized read *at all*? I'm not > > > sure if splice() guarantees we do get one if we reach end-of-file. = =20 > >=20 > > > That's something valid and very well established for read() and recv(= ), > > > but splice() is a bit weird. The documentation says: > > >=20 > > > A return value of 0 means end of input. > > >=20 > > > but I wouldn't assume we'll *always* get at least one in case of EOF.= =20 > >=20 > > What else could we plausibly get? >=20 > -1 with EBADF, probably with EPOLLERR, because something timed out? EBADF makes no sense, the fds are still valid, even if they're at EOF. > But I guess you're right, as long as we're not in the EPOLLERR category > of things, we should consistently get 0, even if we read multiple > times. >=20 > I had in mind some kernel behaviour where we get 0 once, and then -1 > (EAGAIN?) because... go figure. But no, it can't happen. I think the logic should be ok as long as we see a 0 once, even if we get EAGAINs after that. Another way to look at this - if we had to monitor EPOLLRDHUP to get this right, splice() would be unusable from blocking / synchronous code, which I don't think is the case. >=20 > > > > [...] > > > > if (conn->events & FIN_RCVD(fromsidei)) > > > > break; > > > > (3) By the new semantics of FIN_RCVD, we *have* seen the EOF. > > > > =20 > > > > > The existing implementation distinguishes between end-of-file we = hit in > > > > > a given iteration, and EPOLLRDHUP we might have seen at any time. > > > > > That was actually intended. =20 > > > >=20 > > > > It might be intended, but I can't see that we did anything with that > > > > information. =20 > > >=20 > > > We always set FIN_RCVD on it. You're right, if we only checked that on > > > 'eof', that didn't solve much, but that wasn't necessarily intended. = My > > > original intention was to make setting of FIN_RCVD (or whatever it was > > > originally) robust. =20 > >=20 > > Ok, well. I've spotted other changes to make in the vicinity that I > > think will make some of this easier to reason about anyway. So I'll > > consider your points as I rework this and other patches. > >=20 > > > > That said the conditions on which we exit / retry this loop are pre= tty > > > > darn confusing. I'll see if I can improve them. =20 > > >=20 > > > --=20 > > > Stefano >=20 > --=20 > Stefano >=20 --=20 David Gibson (he or they) | I'll have my music baroque, and my code david AT gibson.dropbear.id.au | minimalist, thank you, not the other way | around. http://www.ozlabs.org/~dgibson --/0myd5Y+mAoDhZjZ Content-Type: application/pgp-signature; name=signature.asc -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEO+dNsU4E3yXUXRK2zQJF27ox2GcFAmoPDcIACgkQzQJF27ox 2GcO0RAAjG1tTizpFlGw5yVqgIm1i95o6iTHq+NExwyIlSKVircloxMBhp9GT38p QpQTE3SL4V8WIAyzDkNFe6Yq5x6vZa/+SqXX1RxMkIbfsRnhu417nZck090ekPte Xt35wdvb4w/JXzPINaBl4G3Imsc/EvcDIaEPD3qb64E9BDccfrefp3N9VHfK7G6p PKmA9gjbSadmbInpvDKH3dvI5fI/ihI9xzT6tiptHsvFtUpkW5kfSJ9Wb0A2l0lK IdRL27zZFX7/PCeMVSzC6oP2XHee/4pnNiD9K+dI68aWQSN30fnpF/Yy/cZN5RdF ZqWl+FYDNR4Aa+mTDKiX6Ot01LIPYqVrhemNWM2p2vFGljksInyf4mcaPadgt3Hs PUcDqpJRZSYDgwXppU5pK5xEFgSv7l1pNEldhHwjB91+d51u3PcHbK8C30XQBfQT YXoBkN4IPbGNWKR6a+DbJjpFyTfS42FI/6DyVKcL+xbMjx2PYDkoWbZ1rO4kDGsX 2OOXyNYESyiWCHHqx5Bk/mebd8rq+DYKOYboQWZ/ZujLyzSBsRWwRJwP2rsM28k5 x0Cvlq/OFC7Ym2hfcHlVUt1zz1G4LWEpiVYG+Dn2vcHu97DPJrTMHkT/VEk6PCIb TXMOzokzW1WkIT9LQfr0WIQJ+Xe6+tUUrqV0L5QBjBWNLs4v+pI= =ciPU -----END PGP SIGNATURE----- --/0myd5Y+mAoDhZjZ--