Message ID | 20210719214834.125484-2-john.fastabend@gmail.com |
---|---|
State | Superseded |
Headers | show |
Series | [bpf,1/3] bpf, sockmap: zap ingress queues after stopping strparser | expand |
On Mon, Jul 19, 2021 at 11:48 PM CEST, John Fastabend wrote: > We don't want strparser to run and pass skbs into skmsg handlers when > the psock is null. We just sk_drop them in this case. When removing > a live socket from map it means extra drops that we do not need to > incur. Move the zap below strparser close to avoid this condition. > > This way we stop the stream parser first stopping it from processing > packets and then delete the psock. > > Fixes: a136678c0bdbb ("bpf: sk_msg, zap ingress queue on psock down") > Signed-off-by: John Fastabend <john.fastabend@gmail.com> > --- To confirm my understanding - the extra drops can happen because currently we are racing to clear SK_PSOCK_TX_ENABLED flag in sk_psock_drop with sk_psock_verdict_apply, which checks the flag before pushing skb onto psock->ingress_skb queue (or possibly straight into psock->ingress_msg queue on no redirect).
Jakub Sitnicki wrote: > On Mon, Jul 19, 2021 at 11:48 PM CEST, John Fastabend wrote: > > We don't want strparser to run and pass skbs into skmsg handlers when > > the psock is null. We just sk_drop them in this case. When removing > > a live socket from map it means extra drops that we do not need to > > incur. Move the zap below strparser close to avoid this condition. > > > > This way we stop the stream parser first stopping it from processing > > packets and then delete the psock. > > > > Fixes: a136678c0bdbb ("bpf: sk_msg, zap ingress queue on psock down") > > Signed-off-by: John Fastabend <john.fastabend@gmail.com> > > --- > > To confirm my understanding - the extra drops can happen because > currently we are racing to clear SK_PSOCK_TX_ENABLED flag in > sk_psock_drop with sk_psock_verdict_apply, which checks the flag before > pushing skb onto psock->ingress_skb queue (or possibly straight into > psock->ingress_msg queue on no redirect). Correct. If strparser hands a skb to the sk_psock_* handlers then before they enqueue the packet the flag is checked and the packet will be dropped in this case. I noticed this while testing. So rather than letting packets get into sk_psock_* handlers this patch just stops the strparser.
diff --git a/net/core/skmsg.c b/net/core/skmsg.c index 15d71288e741..28115ef742e8 100644 --- a/net/core/skmsg.c +++ b/net/core/skmsg.c @@ -773,8 +773,6 @@ static void sk_psock_destroy(struct work_struct *work) void sk_psock_drop(struct sock *sk, struct sk_psock *psock) { - sk_psock_stop(psock, false); - write_lock_bh(&sk->sk_callback_lock); sk_psock_restore_proto(sk, psock); rcu_assign_sk_user_data(sk, NULL); @@ -784,6 +782,8 @@ void sk_psock_drop(struct sock *sk, struct sk_psock *psock) sk_psock_stop_verdict(sk, psock); write_unlock_bh(&sk->sk_callback_lock); + sk_psock_stop(psock, false); + INIT_RCU_WORK(&psock->rwork, sk_psock_destroy); queue_rcu_work(system_wq, &psock->rwork); }
We don't want strparser to run and pass skbs into skmsg handlers when the psock is null. We just sk_drop them in this case. When removing a live socket from map it means extra drops that we do not need to incur. Move the zap below strparser close to avoid this condition. This way we stop the stream parser first stopping it from processing packets and then delete the psock. Fixes: a136678c0bdbb ("bpf: sk_msg, zap ingress queue on psock down") Signed-off-by: John Fastabend <john.fastabend@gmail.com> --- net/core/skmsg.c | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-)