From: John Fastabend <john.fastabend@gmail.com>
To: Maciej Fijalkowski <maciej.fijalkowski@intel.com>,
daniel@iogearbox.net, ast@kernel.org, bpf@vger.kernel.org,
netdev@vger.kernel.org
Cc: andrii@kernel.org, toke@redhat.com, bjorn.topel@intel.com,
magnus.karlsson@intel.com, ciara.loftus@intel.com,
Maciej Fijalkowski <maciej.fijalkowski@intel.com>
Subject: RE: [PATCH bpf-next 1/3] libbpf: xsk: use bpf_link
Date: Mon, 15 Feb 2021 12:49:27 -0800 [thread overview]
Message-ID: <602ade57ddb9c_3ed41208a1@john-XPS-13-9370.notmuch> (raw)
In-Reply-To: <20210215154638.4627-2-maciej.fijalkowski@intel.com>
Maciej Fijalkowski wrote:
> Currently, if there are multiple xdpsock instances running on a single
> interface and in case one of the instances is terminated, the rest of
> them are left in an inoperable state due to the fact of unloaded XDP
> prog from interface.
>
> To address that, step away from setting bpf prog in favour of bpf_link.
> This means that refcounting of BPF resources will be done automatically
> by bpf_link itself.
>
> When setting up BPF resources during xsk socket creation, check whether
> bpf_link for a given ifindex already exists via set of calls to
> bpf_link_get_next_id -> bpf_link_get_fd_by_id -> bpf_obj_get_info_by_fd
> and comparing the ifindexes from bpf_link and xsk socket.
>
> If there's no bpf_link yet, create one for a given XDP prog and unload
> explicitly existing prog if XDP_FLAGS_UPDATE_IF_NOEXIST is not set.
>
> If bpf_link is already at a given ifindex and underlying program is not
> AF-XDP one, bail out or update the bpf_link's prog given the presence of
> XDP_FLAGS_UPDATE_IF_NOEXIST.
>
> Signed-off-by: Maciej Fijalkowski <maciej.fijalkowski@intel.com>
> ---
> tools/lib/bpf/xsk.c | 143 +++++++++++++++++++++++++++++++++++++-------
> 1 file changed, 122 insertions(+), 21 deletions(-)
[...]
> +static int xsk_create_bpf_link(struct xsk_socket *xsk)
> +{
> + /* bpf_link only accepts XDP_FLAGS_MODES, but xsk->config.xdp_flags
> + * might have set XDP_FLAGS_UPDATE_IF_NOEXIST
> + */
> + DECLARE_LIBBPF_OPTS(bpf_link_create_opts, opts,
> + .flags = (xsk->config.xdp_flags & XDP_FLAGS_MODES));
> + struct xsk_ctx *ctx = xsk->ctx;
> + __u32 prog_id;
> + int link_fd;
> + int err;
> +
> + /* for !XDP_FLAGS_UPDATE_IF_NOEXIST, unload the program first, if any,
> + * so that bpf_link can be attached
> + */
> + if (!(xsk->config.xdp_flags & XDP_FLAGS_UPDATE_IF_NOEXIST)) {
> + err = bpf_get_link_xdp_id(ctx->ifindex, &prog_id, xsk->config.xdp_flags);
> + if (err) {
> + pr_warn("getting XDP prog id failed\n");
> + return err;
> + }
> + if (prog_id) {
> + err = bpf_set_link_xdp_fd(ctx->ifindex, -1, 0);
> + if (err < 0) {
> + pr_warn("detaching XDP prog failed\n");
> + return err;
> + }
> + }
> }
>
> - ctx->prog_fd = prog_fd;
> + link_fd = bpf_link_create(ctx->prog_fd, xsk->ctx->ifindex, BPF_XDP, &opts);
> + if (link_fd < 0) {
> + pr_warn("bpf_link_create failed: %s\n", strerror(errno));
> + return link_fd;
> + }
> +
This can leave the system in a bad state where it unloaded the XDP program
above, but then failed to create the link. So we should somehow fix that
if possible or at minimum put a note somewhere so users can't claim they
shouldn't know this.
Also related, its not good for real systems to let XDP program go missing
for some period of time. I didn't check but we should make
XDP_FLAGS_UPDATE_IF_NOEXIST the default if its not already.
> + ctx->link_fd = link_fd;
> return 0;
> }
>
[...]
> +static int xsk_link_lookup(struct xsk_ctx *ctx, __u32 *prog_id)
> +{
> + __u32 link_len = sizeof(struct bpf_link_info);
> + struct bpf_link_info link_info;
> + __u32 id = 0;
> + int err;
> + int fd;
> +
> + while (true) {
> + err = bpf_link_get_next_id(id, &id);
> + if (err) {
> + if (errno == ENOENT)
> + break;
> + pr_warn("can't get next link: %s\n", strerror(errno));
> + break;
> + }
> +
> + fd = bpf_link_get_fd_by_id(id);
> + if (fd < 0) {
> + if (errno == ENOENT)
> + continue;
> + pr_warn("can't get link by id (%u): %s\n", id, strerror(errno));
> + break;
> + }
> +
> + memset(&link_info, 0, link_len);
> + err = bpf_obj_get_info_by_fd(fd, &link_info, &link_len);
> + if (err) {
> + pr_warn("can't get link info: %s\n", strerror(errno));
> + close(fd);
> + break;
> + }
> + if (link_info.xdp.ifindex == ctx->ifindex) {
> + ctx->link_fd = fd;
> + *prog_id = link_info.prog_id;
> + break;
> + }
> + close(fd);
> + }
> +
> + return errno == ENOENT ? 0 : err;
But, err wont be set in fd < 0 case? I guess we don't want to return 0 if
bpf_link_get_fd_by_id fails. Although I really don't like the construct
here that much. I think just `return err` and ensuring err is set correctly
would be more clear. At least the fd error case needs to be handled
though.
> +}
> +
next prev parent reply other threads:[~2021-02-15 20:50 UTC|newest]
Thread overview: 37+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-02-15 15:46 [PATCH bpf-next 0/3] Introduce bpf_link in libbpf's xsk Maciej Fijalkowski
2021-02-15 15:46 ` [PATCH bpf-next 1/3] libbpf: xsk: use bpf_link Maciej Fijalkowski
2021-02-15 17:07 ` Toke Høiland-Jørgensen
2021-02-15 17:38 ` Björn Töpel
2021-02-15 19:35 ` Toke Høiland-Jørgensen
2021-02-16 2:01 ` Maciej Fijalkowski
2021-02-16 9:15 ` Björn Töpel
2021-02-16 10:27 ` Toke Høiland-Jørgensen
2021-02-16 20:15 ` Maciej Fijalkowski
2021-02-15 20:22 ` John Fastabend
2021-02-15 21:38 ` Toke Høiland-Jørgensen
2021-02-16 0:18 ` John Fastabend
2021-02-16 2:23 ` Maciej Fijalkowski
2021-02-16 9:23 ` Björn Töpel
2021-02-16 10:36 ` Toke Høiland-Jørgensen
2021-02-23 1:15 ` Andrii Nakryiko
2021-02-17 2:23 ` Dan Siemon
2021-02-17 7:16 ` Magnus Karlsson
2021-02-17 7:36 ` Magnus Karlsson
2021-02-16 2:10 ` Maciej Fijalkowski
2021-02-15 20:49 ` John Fastabend [this message]
2021-02-16 2:38 ` Maciej Fijalkowski
2021-02-16 18:19 ` John Fastabend
2021-02-16 20:10 ` Maciej Fijalkowski
2021-02-16 9:20 ` Björn Töpel
2021-02-16 10:39 ` Toke Høiland-Jørgensen
2021-02-16 19:15 ` John Fastabend
2021-02-16 20:50 ` Maciej Fijalkowski
2021-02-16 21:17 ` John Fastabend
2021-02-15 15:46 ` [PATCH bpf-next 2/3] libbpf: clear map_info before each bpf_obj_get_info_by_fd Maciej Fijalkowski
2021-02-15 20:33 ` John Fastabend
2021-02-16 2:42 ` Maciej Fijalkowski
2021-02-15 15:46 ` [PATCH bpf-next 3/3] samples: bpf: do not unload prog within xdpsock Maciej Fijalkowski
2021-02-15 20:24 ` John Fastabend
2021-02-16 9:22 ` Björn Töpel
2021-02-16 14:15 ` Maciej Fijalkowski
2021-02-15 16:07 ` [PATCH bpf-next 0/3] Introduce bpf_link in libbpf's xsk Björn Töpel
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=602ade57ddb9c_3ed41208a1@john-XPS-13-9370.notmuch \
--to=john.fastabend@gmail.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bjorn.topel@intel.com \
--cc=bpf@vger.kernel.org \
--cc=ciara.loftus@intel.com \
--cc=daniel@iogearbox.net \
--cc=maciej.fijalkowski@intel.com \
--cc=magnus.karlsson@intel.com \
--cc=netdev@vger.kernel.org \
--cc=toke@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).