From: Lorenz Bauer <lmb@cloudflare.com> To: Alexei Starovoitov <alexei.starovoitov@gmail.com> Cc: "Toke Høiland-Jørgensen" <toke@redhat.com>, "Edward Cree" <ecree@solarflare.com>, "John Fastabend" <john.fastabend@gmail.com>, "Daniel Borkmann" <daniel@iogearbox.net>, "Alexei Starovoitov" <ast@kernel.org>, "Martin KaFai Lau" <kafai@fb.com>, "Song Liu" <songliubraving@fb.com>, "Yonghong Song" <yhs@fb.com>, "Marek Majkowski" <marek@cloudflare.com>, "Alan Maguire" <alan.maguire@oracle.com>, "Jesper Dangaard Brouer" <brouer@redhat.com>, "David Miller" <davem@davemloft.net>, Networking <netdev@vger.kernel.org>, bpf <bpf@vger.kernel.org> Subject: Re: static and dynamic linking. Was: [PATCH bpf-next v3 1/5] bpf: Support chain calling multiple BPF Date: Mon, 18 Nov 2019 13:29:00 +0000 [thread overview] Message-ID: <CACAyw9-Sx8jBY2HiO0idLk_HE5R5R229w5qEqVkaQ92YUKM0kg@mail.gmail.com> (raw) In-Reply-To: <20191115230229.qd6plwnvrmcm4pfo@ast-mbp.dhcp.thefacebook.com> On Fri, 15 Nov 2019 at 23:02, Alexei Starovoitov <alexei.starovoitov@gmail.com> wrote: > > imo all bpf attach api-s that are not FD-based are fragile and error prone > operationally. We've seen people adding a ton of TC ingress progs because of > bugs. Then there were issues with roolet being removed due to bugs. The issues > with overriding wrong entries in prog_array. When multiple teams working on > common infra having globally visible and unprotected state is dangerous. imo > XDP and TC have to move to FD based api. When application holds the 'link fd' > that attached program will not be detached by anything else accidentally. > The operation 'attach rootlet XDP prog to netdev eth0' should return FD. > While that FD is held by application (or pinned in bpffs) nothing should be > able to override XDP prog on that eth0. We don't have such api yet, but I think > it's necessary. Ok, I wasn't aware you're planning this. Having a separate fd for the link resolves my concerns, since now the lifetime of the program and the link are independent. Re: the rootlet example, the API would be load (with attach_prog_fd) followed by override / attach (without arguments?) which then returns a "link fd"? > Same thing with replacing rootlet's placeholder subprogram with > fw1. When fw1's application links fw1 prog into rootlet nothing should be able > to break that attachment. But if fw1 application crashes that fw1 prog will be > auto-detached from rootlet. The admin can ssh into the box and kill fw1. The > packets will flow into rootlet and will flow into dummy placeholder. No > cleanups to worry about. Nice! > > I'd much prefer if the API didn't require attach_prog_fd and id at > > load time, and > > rather have an explicit replace_sub_prog(prog_fd, btf_id, sub_prog_fd). > > The verifier has to see the target prog and its full BTF at load time. The > fentry prog needs target prog's BTF. XDP replacement prog needs target prog's > BTF too. So prog_fd+btf_id has to be passed at load time. I think > tgt_prog->refcnt++ should be done at load time too. The ugly alternative would > be to do tgt_prog->refcnt++ before verification. Then after verification > duplicate tgt_prog BTF, store it somewhere, and do tgr_prog->refcnt--. Then > later during attach/replace compare saved BTF with tgt_prog's BTF. That's imo a > ton of unncessary work for the kernel. I've not looked at the fentry patch set, so I don't understand the technical reasons why having prog_fd at load time is necessary, I'm just not a fan of the implied UAPI. I'll take a look, hopefully I'll understand the trade off better afterwards. -- Lorenz Bauer | Systems Engineer 6th Floor, County Hall/The Riverside Building, SE1 7PB, UK www.cloudflare.com
next prev parent reply other threads:[~2019-11-18 13:29 UTC|newest] Thread overview: 55+ messages / expand[flat|nested] mbox.gz Atom feed top 2019-10-07 17:20 [PATCH bpf-next v3 0/5] xdp: Support multiple programs on a single interface through chain calls Toke Høiland-Jørgensen 2019-10-07 17:20 ` [PATCH bpf-next v3 1/5] bpf: Support chain calling multiple BPF programs after each other Toke Høiland-Jørgensen 2019-10-07 20:42 ` Alexei Starovoitov 2019-10-08 8:07 ` Toke Høiland-Jørgensen 2019-10-09 1:51 ` Alexei Starovoitov 2019-10-09 8:03 ` Toke Høiland-Jørgensen 2019-10-10 4:41 ` Alexei Starovoitov 2019-10-14 12:35 ` Toke Høiland-Jørgensen 2019-10-14 17:08 ` John Fastabend 2019-10-14 18:48 ` Toke Høiland-Jørgensen 2019-10-15 16:30 ` Edward Cree 2019-10-15 16:42 ` Toke Høiland-Jørgensen 2019-10-15 18:33 ` Edward Cree 2019-10-17 12:11 ` Toke Høiland-Jørgensen 2019-10-22 17:27 ` Edward Cree 2019-10-22 18:07 ` Toke Høiland-Jørgensen 2019-11-12 2:51 ` static and dynamic linking. Was: [PATCH bpf-next v3 1/5] bpf: Support chain calling multiple BPF Alexei Starovoitov 2019-11-12 16:20 ` Toke Høiland-Jørgensen 2019-11-12 19:52 ` Alexei Starovoitov 2019-11-12 21:25 ` Edward Cree 2019-11-12 23:18 ` Alexei Starovoitov 2019-11-13 18:30 ` Edward Cree 2019-11-13 18:51 ` Andrii Nakryiko 2019-11-15 2:13 ` Alexei Starovoitov 2019-11-15 16:56 ` John Fastabend 2019-11-12 23:25 ` John Fastabend 2019-11-13 0:21 ` Alexei Starovoitov 2019-11-13 5:33 ` John Fastabend 2019-11-15 1:50 ` Alexei Starovoitov 2019-11-15 16:39 ` John Fastabend 2019-11-14 15:41 ` Toke Høiland-Jørgensen 2019-11-12 16:32 ` Edward Cree 2019-11-15 11:48 ` Lorenz Bauer 2019-11-15 23:02 ` Alexei Starovoitov 2019-11-18 13:29 ` Lorenz Bauer [this message] 2019-10-21 23:51 ` [PATCH bpf-next v3 1/5] bpf: Support chain calling multiple BPF programs after each other Edward Cree 2019-10-16 2:28 ` Alexei Starovoitov 2019-10-16 8:27 ` Jesper Dangaard Brouer 2019-10-16 10:35 ` Daniel Borkmann 2019-10-16 11:16 ` Toke Høiland-Jørgensen 2019-10-16 13:51 ` Toke Høiland-Jørgensen 2019-10-19 20:09 ` bpf indirect calls Alexei Starovoitov 2019-10-20 10:58 ` Toke Høiland-Jørgensen 2019-10-25 16:30 ` Alexei Starovoitov 2019-10-27 12:15 ` Toke Høiland-Jørgensen 2019-10-09 10:19 ` [PATCH bpf-next v3 1/5] bpf: Support chain calling multiple BPF programs after each other Jesper Dangaard Brouer 2019-10-09 17:57 ` Alexei Starovoitov 2019-10-07 17:20 ` [PATCH bpf-next v3 2/5] bpf: Add support for setting chain call sequence for programs Toke Høiland-Jørgensen 2019-10-07 20:38 ` Daniel Borkmann 2019-10-08 8:09 ` Toke Høiland-Jørgensen 2019-10-07 17:20 ` [PATCH bpf-next v3 3/5] tools: Update bpf.h header for program chain calls Toke Høiland-Jørgensen 2019-10-07 17:20 ` [PATCH bpf-next v3 4/5] libbpf: Add syscall wrappers for BPF_PROG_CHAIN_* commands Toke Høiland-Jørgensen 2019-10-07 17:20 ` [PATCH bpf-next v3 5/5] selftests: Add tests for XDP chain calls Toke Høiland-Jørgensen 2019-10-07 18:58 ` [PATCH bpf-next v3 0/5] xdp: Support multiple programs on a single interface through " John Fastabend 2019-10-08 8:42 ` Toke Høiland-Jørgensen
Reply instructions: You may reply publicly to this message via plain-text email using any one of the following methods: * Save the following mbox file, import it into your mail client, and reply-to-all from there: mbox Avoid top-posting and favor interleaved quoting: https://en.wikipedia.org/wiki/Posting_style#Interleaved_style * Reply using the --to, --cc, and --in-reply-to switches of git-send-email(1): git send-email \ --in-reply-to=CACAyw9-Sx8jBY2HiO0idLk_HE5R5R229w5qEqVkaQ92YUKM0kg@mail.gmail.com \ --to=lmb@cloudflare.com \ --cc=alan.maguire@oracle.com \ --cc=alexei.starovoitov@gmail.com \ --cc=ast@kernel.org \ --cc=bpf@vger.kernel.org \ --cc=brouer@redhat.com \ --cc=daniel@iogearbox.net \ --cc=davem@davemloft.net \ --cc=ecree@solarflare.com \ --cc=john.fastabend@gmail.com \ --cc=kafai@fb.com \ --cc=marek@cloudflare.com \ --cc=netdev@vger.kernel.org \ --cc=songliubraving@fb.com \ --cc=toke@redhat.com \ --cc=yhs@fb.com \ --subject='Re: static and dynamic linking. Was: [PATCH bpf-next v3 1/5] bpf: Support chain calling multiple BPF' \ /path/to/YOUR_REPLY https://kernel.org/pub/software/scm/git/docs/git-send-email.html * If your mail client supports setting the In-Reply-To header via mailto: links, try the mailto: link
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox; as well as URLs for NNTP newsgroup(s).