All of lore.kernel.org
 help / color / mirror / Atom feed
From: Alexander Lobakin <aleksander.lobakin@intel.com>
To: Jason Xing <kerneljasonxing@gmail.com>,
	Maciej Fijalkowski <maciej.fijalkowski@intel.com>
Cc: <davem@davemloft.net>, <edumazet@google.com>, <kuba@kernel.org>,
	<pabeni@redhat.com>, <bjorn@kernel.org>,
	<magnus.karlsson@intel.com>, <jonathan.lemon@gmail.com>,
	<sdf@fomichev.me>, <ast@kernel.org>, <daniel@iogearbox.net>,
	<hawk@kernel.org>, <john.fastabend@gmail.com>,
	<bpf@vger.kernel.org>, <netdev@vger.kernel.org>,
	Jason Xing <kernelxing@tencent.com>
Subject: Re: [PATCH net v3 8/8] xsk: don't support AF_XDP on 32-bit architectures
Date: Thu, 23 Apr 2026 14:14:52 +0200	[thread overview]
Message-ID: <f78a505b-6be1-4b4b-86f4-005d709e0253@intel.com> (raw)
In-Reply-To: <CAL+tcoBH9qm0Ce=vBuCResVEbC_9a1D2VofTW73Uo+t519Ui0A@mail.gmail.com>

From: Jason Xing <kerneljasonxing@gmail.com>
Date: Thu, 23 Apr 2026 07:49:58 +0800

> On Thu, Apr 23, 2026 at 12:58 AM Maciej Fijalkowski
> <maciej.fijalkowski@intel.com> wrote:
>>
>> On Thu, Apr 23, 2026 at 12:37:07AM +0800, Jason Xing wrote:
>>> On Thu, Apr 23, 2026 at 12:10 AM Alexander Lobakin
>>> <aleksander.lobakin@intel.com> wrote:
>>>>
>>>> From: Jason Xing <kerneljasonxing@gmail.com>
>>>> Date: Wed, 22 Apr 2026 11:36:50 +0800
>>>>
>>>>> From: Jason Xing <kernelxing@tencent.com>
>>>>>
>>>>> In copy mode TX, xsk_skb_destructor_set_addr() stores the 64-bit
>>>>> descriptor address into skb_shinfo(skb)->destructor_arg (void *) via a
>>>>> uintptr_t cast:
>>>>>
>>>>>     skb_shinfo(skb)->destructor_arg = (void *)((uintptr_t)addr | 0x1UL);
>>>>>
>>>>> On 32-bit architectures uintptr_t is 32 bits, so the upper 32 bits of
>>>>> the descriptor address are silently dropped. In XDP_ZEROCOPY unaligned
>>>>> mode the chunk offset is encoded in bits 48-63 of the descriptor
>>>>> address (XSK_UNALIGNED_BUF_OFFSET_SHIFT = 48), meaning the offset is
>>>>> lost entirely. The completion queue then returns a truncated address to
>>>>> userspace, making buffer recycling impossible.
>>>>
>>>> What if we relax the restriction a bit? For example, refuse to configure
>>>
>>> As to the bug itself, yes, It only affects the unaligned mode.
>>>
>>> I wonder if we can support this after someone requires us to support
>>> 32-bit arch and use it in the real world, then we can use the previous
>>> patch to complete the full support (which doesn't harm the path on
>>> 64-bit arch).
>>>
>>> The code looks like this based on your suggestion. Just for the record.
>>> diff --git a/net/xdp/xdp_umem.c b/net/xdp/xdp_umem.c
>>> index 58da2f4f4397..03417b04592f 100644
>>> --- a/net/xdp/xdp_umem.c
>>> +++ b/net/xdp/xdp_umem.c
>>> @@ -177,6 +177,9 @@ static int xdp_umem_reg(struct xdp_umem *umem,
>>> struct xdp_umem_reg *mr)
>>> if (mr->flags & ~XDP_UMEM_FLAGS_VALID)
>>> return -EINVAL;
>>> + if (!IS_ENABLED(CONFIG_64BIT) && unaligned_chunks)
>>> + return -EOPNOTSUPP;
>>> +
>>> if (!unaligned_chunks && !is_power_of_2(chunk_size))
>>> return -EINVAL;
>>>
>>> Actually I'm fine with either of them. Right now I'm not so sure which
>>> direction this patch should take :)
>>
>> Abstracting from discussion, that is not a patch we would want against
>> -net. We should not forbid 32bit on stable kernels, maybe there is someone
>> in the 'basement' using 32bit xsk on stable kernel. Plus the fixes tag vs
>> patch's content looks weird ;)
> 
> Sorry, I don't follow this. Any specific suggestions on how to move forward?

Maciej just says that if we go the first route (forbid 32-bit arches),
then this commit should not go to the stable/LTS kernels.
But

> 
> Now we have three approaches w/o the fixes tag:
> 1. completely forbid 32-bit arch
> 2. only forbid unaligned mode on 32-bit arch
> 3. completely fix/modify the allocation logic of the first frag on
> 32-bit (see the v2-0008 patch)
> 
> I'm wondering how to proceed with that?

I've just reread the v2 thread (I realized I missed it earlier) and to
me, the v2-0008 (route 3) solution looks good. It introduces a bit of
overhead, but only for 32-bit arches, where the XSk performance will
never be push-it-to-the-limit anyway (esp. given that this is skb mode).

So I'd personally vote for number 3. 47 insertions(+), 7 deletions(-) is
not a big deal. And for 64-bit arches, there won't be any object code
changes at all (unconditional `return 0` and checking the return value
of xsk_skb_init_misc() will be optimized out by the compiler).

Number 2 is also okay-ish, if we're sure that addr is always 32-bit on
32-bit arches in the aligned mode. But given that you already has a
proper fix (n. 3) which allows to not forbid anything at all, I believe
it's more preferred to fix rather than disable.

+ as mentioned above, if you go route number 3, the series could be sent
to -net and the fix would eventually hit the stable/LTS trees, but I
don't think we can disable/forbid something in the stable kernels.

> 
> Thanks,
> Jason
Thanks,
Olek

  reply	other threads:[~2026-04-23 12:15 UTC|newest]

Thread overview: 25+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2026-04-22  3:36 [PATCH net v3 0/8] xsk: fix bugs around xsk skb allocation Jason Xing
2026-04-22  3:36 ` [PATCH net v3 1/8] xsk: reject sw-csum UMEM binding to IFF_TX_SKB_NO_LINEAR devices Jason Xing
2026-04-22  3:36 ` [PATCH net v3 2/8] xsk: handle NULL dereference of the skb without frags issue Jason Xing
2026-04-22  3:36 ` [PATCH net v3 3/8] xsk: fix use-after-free of xs->skb in xsk_build_skb() free_err path Jason Xing
2026-04-22 16:31   ` Stanislav Fomichev
2026-04-25  4:17   ` sashiko-bot
2026-04-27  2:34     ` Jason Xing
2026-04-22  3:36 ` [PATCH net v3 4/8] xsk: prevent CQ desync when freeing half-built skbs in xsk_build_skb() Jason Xing
2026-04-22 16:31   ` Stanislav Fomichev
2026-04-22  3:36 ` [PATCH net v3 5/8] xsk: avoid skb leak in XDP_TX_METADATA case Jason Xing
2026-04-22 16:31   ` Stanislav Fomichev
2026-04-22  3:36 ` [PATCH net v3 6/8] xsk: free the skb when hitting the upper bound MAX_SKB_FRAGS Jason Xing
2026-04-22 16:31   ` Stanislav Fomichev
2026-04-22  3:36 ` [PATCH net v3 7/8] xsk: fix xsk_addrs slab leak on multi-buffer error path Jason Xing
2026-04-22  3:36 ` [PATCH net v3 8/8] xsk: don't support AF_XDP on 32-bit architectures Jason Xing
2026-04-22 16:09   ` Alexander Lobakin
2026-04-22 16:37     ` Jason Xing
2026-04-22 16:58       ` Maciej Fijalkowski
2026-04-22 23:49         ` Jason Xing
2026-04-23 12:14           ` Alexander Lobakin [this message]
2026-04-23 13:03             ` Jason Xing
2026-04-22 17:00       ` Alexander Lobakin
2026-04-22 16:31   ` Stanislav Fomichev
2026-04-22 20:27   ` David Laight
2026-04-22 23:45     ` Jason Xing

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=f78a505b-6be1-4b4b-86f4-005d709e0253@intel.com \
    --to=aleksander.lobakin@intel.com \
    --cc=ast@kernel.org \
    --cc=bjorn@kernel.org \
    --cc=bpf@vger.kernel.org \
    --cc=daniel@iogearbox.net \
    --cc=davem@davemloft.net \
    --cc=edumazet@google.com \
    --cc=hawk@kernel.org \
    --cc=john.fastabend@gmail.com \
    --cc=jonathan.lemon@gmail.com \
    --cc=kerneljasonxing@gmail.com \
    --cc=kernelxing@tencent.com \
    --cc=kuba@kernel.org \
    --cc=maciej.fijalkowski@intel.com \
    --cc=magnus.karlsson@intel.com \
    --cc=netdev@vger.kernel.org \
    --cc=pabeni@redhat.com \
    --cc=sdf@fomichev.me \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.