On Sun, Jun 26, 2022 at 11:26:13PM +0200, Jeremie Courreges-Anglas wrote:
> On Mon, Jun 27 2022, Vitaliy Makkoveev <[email protected]> wrote:
> > On Sun, Jun 26, 2022 at 10:39:10PM +0200, Alexander Bluhm wrote:
> >> On Sun, Jun 26, 2022 at 07:45:57PM +0300, Vitaliy Makkoveev wrote:
> >> > This extra serialization is not required. In packet processing path we
> >> > have shared netlock held, but we do read-only access on per session
> >> > `flags' and `ifindex'. We always modify them from ioctl(2) path with
> >> > exclusive netlock held. The rest of pipex(4) session is immutable or
> >> > uses per-session locks.
> >>
> >> I was wondering about pipex_enable variable. It is documented as
> >> protected by netlock.
> >> net/pipex.c:int pipex_enable = 0; /* [N] */
> >>
> >> But I did not find NET_LOCK() in pipex_sysctl() or its callers.
> >> Should we grab net lock there or in net_sysctl() in the write path?
> >> Although only an integer is set atomically, it looks strange if
> >> such a value is changed while we are in the middle of packet
> >> processing.
> >>
> >
> > I guess it should be declared as atomic. We use ifq_set_maxlen(...,1)
> > hack so we don't cross netlock borders in pipex(4) output path, but it's
> > expected we could cross them. We never check `pipex_enable' within
> > (*if_qstart)() and we don't worry it's not serialized with the rest of
> > stack. Also we will process already enqueued pipex(4) packets regardless
> > on `pipex_enable' state.
> >
> > But this means we need to use local copy of `pipex_enable' within
> > pppx_if_output(), otherwise we loose consistency.
>
> FWIW pipex_enable_local = READ_ONCE(pipex_enable) would prevent the
> compiler from reading the global value twice.
Or use atomic_load_int() to prevent over optimization.
I would prefer atomic_...() access for [A] variables.
bluhm
> > Index: sys/net/if_pppx.c
> > ===================================================================
> > RCS file: /cvs/src/sys/net/if_pppx.c,v
> > retrieving revision 1.116
> > diff -u -p -r1.116 if_pppx.c
> > --- sys/net/if_pppx.c 26 Jun 2022 15:50:21 -0000 1.116
> > +++ sys/net/if_pppx.c 26 Jun 2022 21:14:02 -0000
> > @@ -817,7 +817,9 @@ pppx_if_output(struct ifnet *ifp, struct
> > struct pppx_if *pxi = (struct pppx_if *)ifp->if_softc;
> > struct pppx_hdr *th;
> > int error = 0;
> > - int proto;
> > + int pipex_enable_local, proto;
> > +
> > + pipex_enable_local = pipex_enable;
> >
> > NET_ASSERT_LOCKED();
> >
> > @@ -831,7 +833,7 @@ pppx_if_output(struct ifnet *ifp, struct
> > if (ifp->if_bpf)
> > bpf_mtap_af(ifp->if_bpf, dst->sa_family, m, BPF_DIRECTION_OUT);
> > #endif
> > - if (pipex_enable) {
> > + if (pipex_enable_local) {
> > switch (dst->sa_family) {
> > #ifdef INET6
> > case AF_INET6:
> > @@ -856,7 +858,7 @@ pppx_if_output(struct ifnet *ifp, struct
> > }
> > *mtod(m, int *) = proto;
> >
> > - if (pipex_enable)
> > + if (pipex_enable_local)
> > error = if_enqueue(ifp, m);
> > else {
> > M_PREPEND(m, sizeof(struct pppx_hdr), M_DONTWAIT);
> > Index: sys/net/pipex.c
> > ===================================================================
> > RCS file: /cvs/src/sys/net/pipex.c,v
> > retrieving revision 1.138
> > diff -u -p -r1.138 pipex.c
> > --- sys/net/pipex.c 26 Jun 2022 15:50:21 -0000 1.138
> > +++ sys/net/pipex.c 26 Jun 2022 21:14:02 -0000
> > @@ -94,7 +94,7 @@ struct pool mppe_key_pool;
> > * L pipex_list_mtx
> > */
> >
> > -int pipex_enable = 0; /* [N] */
> > +int pipex_enable = 0; /* [A] */
> > struct pipex_hash_head
> > pipex_session_list, /* [L] master session
> > list */
> > pipex_close_wait_list, /* [L] expired session list */
> >
>
> --
> jca | PGP : 0x1524E7EE / 5135 92C1 AD36 5293 2BDF DDCC 0DFA 74AE 1524 E7EE