* [PATCH bpf 0/2] Two fixes for cpu-map
@ 2023-07-29 9:51 Hou Tao
2023-07-29 9:51 ` [PATCH bpf 1/2] bpf, cpumap: Make sure kthread is running before map update returns Hou Tao
` (2 more replies)
0 siblings, 3 replies; 7+ messages in thread
From: Hou Tao @ 2023-07-29 9:51 UTC (permalink / raw)
To: bpf
Cc: netdev, David S . Miller, Jakub Kicinski, Jesper Dangaard Brouer,
John Fastabend, Björn Töpel,
Toke Høiland-Jørgensen, Martin KaFai Lau,
Alexei Starovoitov, Andrii Nakryiko, Song Liu, Hao Luo,
Yonghong Song, Daniel Borkmann, KP Singh, Stanislav Fomichev,
Jiri Olsa, Pu Lehui, houtao1
From: Hou Tao <houtao1@huawei.com>
Hi,
The patchset fixes two reported warning in cpu-map when running
xdp_redirect_cpu and some RT threads concurrently. Patch #1 fixes
the warning in __cpu_map_ring_cleanup() when kthread is stopped
prematurely. Patch #2 fixes the warning in __xdp_return() when
there are pending skbs in ptr_ring.
Please see individual patches for more details. And comments are always
welcome.
Regards,
Tao
Hou Tao (2):
bpf, cpumap: Make sure kthread is running before map update returns
bpf, cpumap: Handle skb as well when clean up ptr_ring
kernel/bpf/cpumap.c | 35 +++++++++++++++++++++--------------
1 file changed, 21 insertions(+), 14 deletions(-)
--
2.29.2
^ permalink raw reply [flat|nested] 7+ messages in thread
* [PATCH bpf 1/2] bpf, cpumap: Make sure kthread is running before map update returns
2023-07-29 9:51 [PATCH bpf 0/2] Two fixes for cpu-map Hou Tao
@ 2023-07-29 9:51 ` Hou Tao
2023-07-29 10:21 ` Pu Lehui
2023-07-31 9:51 ` Jesper Dangaard Brouer
2023-07-29 9:51 ` [PATCH bpf 2/2] bpf, cpumap: Handle skb as well when clean up ptr_ring Hou Tao
2023-07-31 22:57 ` [PATCH bpf 0/2] Two fixes for cpu-map Martin KaFai Lau
2 siblings, 2 replies; 7+ messages in thread
From: Hou Tao @ 2023-07-29 9:51 UTC (permalink / raw)
To: bpf
Cc: netdev, David S . Miller, Jakub Kicinski, Jesper Dangaard Brouer,
John Fastabend, Björn Töpel,
Toke Høiland-Jørgensen, Martin KaFai Lau,
Alexei Starovoitov, Andrii Nakryiko, Song Liu, Hao Luo,
Yonghong Song, Daniel Borkmann, KP Singh, Stanislav Fomichev,
Jiri Olsa, Pu Lehui, houtao1
From: Hou Tao <houtao1@huawei.com>
The following warning was reported when running stress-mode enabled
xdp_redirect_cpu with some RT threads:
------------[ cut here ]------------
WARNING: CPU: 4 PID: 65 at kernel/bpf/cpumap.c:135
CPU: 4 PID: 65 Comm: kworker/4:1 Not tainted 6.5.0-rc2+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
Workqueue: events cpu_map_kthread_stop
RIP: 0010:put_cpu_map_entry+0xda/0x220
......
Call Trace:
<TASK>
? show_regs+0x65/0x70
? __warn+0xa5/0x240
......
? put_cpu_map_entry+0xda/0x220
cpu_map_kthread_stop+0x41/0x60
process_one_work+0x6b0/0xb80
worker_thread+0x96/0x720
kthread+0x1a5/0x1f0
ret_from_fork+0x3a/0x70
ret_from_fork_asm+0x1b/0x30
</TASK>
The root cause is the same as commit 436901649731 ("bpf: cpumap: Fix memory
leak in cpu_map_update_elem"). The kthread is stopped prematurely by
kthread_stop() in cpu_map_kthread_stop(), and kthread() doesn't call
cpu_map_kthread_run() at all but XDP program has already queued some
frames or skbs into ptr_ring. So when __cpu_map_ring_cleanup() checks
the ptr_ring, it will find it was not emptied and report a warning.
An alternative fix is to use __cpu_map_ring_cleanup() to drop these
pending frames or skbs when kthread_stop() returns -EINTR, but it may
confuse the user, because these frames or skbs have been handled
correctly by XDP program. So instead of dropping these frames or skbs,
just make sure the per-cpu kthread is running before
__cpu_map_entry_alloc() returns.
After apply the fix, the error handle for kthread_stop() will be
unnecessary because it will always return 0, so just remove it.
Fixes: 6710e1126934 ("bpf: introduce new bpf cpu map type BPF_MAP_TYPE_CPUMAP")
Signed-off-by: Hou Tao <houtao1@huawei.com>
---
kernel/bpf/cpumap.c | 21 +++++++++++----------
1 file changed, 11 insertions(+), 10 deletions(-)
diff --git a/kernel/bpf/cpumap.c b/kernel/bpf/cpumap.c
index 0a16e30b16ef..08351e0863e5 100644
--- a/kernel/bpf/cpumap.c
+++ b/kernel/bpf/cpumap.c
@@ -28,6 +28,7 @@
#include <linux/sched.h>
#include <linux/workqueue.h>
#include <linux/kthread.h>
+#include <linux/completion.h>
#include <trace/events/xdp.h>
#include <linux/btf_ids.h>
@@ -71,6 +72,7 @@ struct bpf_cpu_map_entry {
struct rcu_head rcu;
struct work_struct kthread_stop_wq;
+ struct completion kthread_running;
};
struct bpf_cpu_map {
@@ -151,7 +153,6 @@ static void put_cpu_map_entry(struct bpf_cpu_map_entry *rcpu)
static void cpu_map_kthread_stop(struct work_struct *work)
{
struct bpf_cpu_map_entry *rcpu;
- int err;
rcpu = container_of(work, struct bpf_cpu_map_entry, kthread_stop_wq);
@@ -161,14 +162,7 @@ static void cpu_map_kthread_stop(struct work_struct *work)
rcu_barrier();
/* kthread_stop will wake_up_process and wait for it to complete */
- err = kthread_stop(rcpu->kthread);
- if (err) {
- /* kthread_stop may be called before cpu_map_kthread_run
- * is executed, so we need to release the memory related
- * to rcpu.
- */
- put_cpu_map_entry(rcpu);
- }
+ kthread_stop(rcpu->kthread);
}
static void cpu_map_bpf_prog_run_skb(struct bpf_cpu_map_entry *rcpu,
@@ -296,11 +290,11 @@ static int cpu_map_bpf_prog_run(struct bpf_cpu_map_entry *rcpu, void **frames,
return nframes;
}
-
static int cpu_map_kthread_run(void *data)
{
struct bpf_cpu_map_entry *rcpu = data;
+ complete(&rcpu->kthread_running);
set_current_state(TASK_INTERRUPTIBLE);
/* When kthread gives stop order, then rcpu have been disconnected
@@ -465,6 +459,7 @@ __cpu_map_entry_alloc(struct bpf_map *map, struct bpf_cpumap_val *value,
goto free_ptr_ring;
/* Setup kthread */
+ init_completion(&rcpu->kthread_running);
rcpu->kthread = kthread_create_on_node(cpu_map_kthread_run, rcpu, numa,
"cpumap/%d/map:%d", cpu,
map->id);
@@ -478,6 +473,12 @@ __cpu_map_entry_alloc(struct bpf_map *map, struct bpf_cpumap_val *value,
kthread_bind(rcpu->kthread, cpu);
wake_up_process(rcpu->kthread);
+ /* Make sure kthread has been running, so kthread_stop() will not
+ * stop the kthread prematurely and all pending frames or skbs
+ * will be handled by the kthread before kthread_stop() returns.
+ */
+ wait_for_completion(&rcpu->kthread_running);
+
return rcpu;
free_prog:
--
2.29.2
^ permalink raw reply related [flat|nested] 7+ messages in thread
* [PATCH bpf 2/2] bpf, cpumap: Handle skb as well when clean up ptr_ring
2023-07-29 9:51 [PATCH bpf 0/2] Two fixes for cpu-map Hou Tao
2023-07-29 9:51 ` [PATCH bpf 1/2] bpf, cpumap: Make sure kthread is running before map update returns Hou Tao
@ 2023-07-29 9:51 ` Hou Tao
2023-07-31 10:09 ` Jesper Dangaard Brouer
2023-07-31 22:57 ` [PATCH bpf 0/2] Two fixes for cpu-map Martin KaFai Lau
2 siblings, 1 reply; 7+ messages in thread
From: Hou Tao @ 2023-07-29 9:51 UTC (permalink / raw)
To: bpf
Cc: netdev, David S . Miller, Jakub Kicinski, Jesper Dangaard Brouer,
John Fastabend, Björn Töpel,
Toke Høiland-Jørgensen, Martin KaFai Lau,
Alexei Starovoitov, Andrii Nakryiko, Song Liu, Hao Luo,
Yonghong Song, Daniel Borkmann, KP Singh, Stanislav Fomichev,
Jiri Olsa, Pu Lehui, houtao1
From: Hou Tao <houtao1@huawei.com>
The following warning was reported when running xdp_redirect_cpu with
both skb-mode and stress-mode enabled:
------------[ cut here ]------------
Incorrect XDP memory type (-2128176192) usage
WARNING: CPU: 7 PID: 1442 at net/core/xdp.c:405
Modules linked in:
CPU: 7 PID: 1442 Comm: kworker/7:0 Tainted: G 6.5.0-rc2+ #1
Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
Workqueue: events __cpu_map_entry_free
RIP: 0010:__xdp_return+0x1e4/0x4a0
......
Call Trace:
<TASK>
? show_regs+0x65/0x70
? __warn+0xa5/0x240
? __xdp_return+0x1e4/0x4a0
......
xdp_return_frame+0x4d/0x150
__cpu_map_entry_free+0xf9/0x230
process_one_work+0x6b0/0xb80
worker_thread+0x96/0x720
kthread+0x1a5/0x1f0
ret_from_fork+0x3a/0x70
ret_from_fork_asm+0x1b/0x30
</TASK>
The reason for the warning is twofold. One is due to the kthread
cpu_map_kthread_run() is stopped prematurely. Another one is
__cpu_map_ring_cleanup() doesn't handle skb mode and treats skbs in
ptr_ring as XDP frames.
Prematurely-stopped kthread will be fixed by the preceding patch and
ptr_ring will be empty when __cpu_map_ring_cleanup() is called. But
as the comments in __cpu_map_ring_cleanup() said, handling and freeing
skbs in ptr_ring as well to "catch any broken behaviour gracefully".
Fixes: 11941f8a8536 ("bpf: cpumap: Implement generic cpumap")
Signed-off-by: Hou Tao <houtao1@huawei.com>
---
kernel/bpf/cpumap.c | 14 ++++++++++----
1 file changed, 10 insertions(+), 4 deletions(-)
diff --git a/kernel/bpf/cpumap.c b/kernel/bpf/cpumap.c
index 08351e0863e5..ef28c64f1eb1 100644
--- a/kernel/bpf/cpumap.c
+++ b/kernel/bpf/cpumap.c
@@ -129,11 +129,17 @@ static void __cpu_map_ring_cleanup(struct ptr_ring *ring)
* invoked cpu_map_kthread_stop(). Catch any broken behaviour
* gracefully and warn once.
*/
- struct xdp_frame *xdpf;
+ void *ptr;
- while ((xdpf = ptr_ring_consume(ring)))
- if (WARN_ON_ONCE(xdpf))
- xdp_return_frame(xdpf);
+ while ((ptr = ptr_ring_consume(ring))) {
+ WARN_ON_ONCE(1);
+ if (unlikely(__ptr_test_bit(0, &ptr))) {
+ __ptr_clear_bit(0, &ptr);
+ kfree_skb(ptr);
+ continue;
+ }
+ xdp_return_frame(ptr);
+ }
}
static void put_cpu_map_entry(struct bpf_cpu_map_entry *rcpu)
--
2.29.2
^ permalink raw reply related [flat|nested] 7+ messages in thread
* Re: [PATCH bpf 1/2] bpf, cpumap: Make sure kthread is running before map update returns
2023-07-29 9:51 ` [PATCH bpf 1/2] bpf, cpumap: Make sure kthread is running before map update returns Hou Tao
@ 2023-07-29 10:21 ` Pu Lehui
2023-07-31 9:51 ` Jesper Dangaard Brouer
1 sibling, 0 replies; 7+ messages in thread
From: Pu Lehui @ 2023-07-29 10:21 UTC (permalink / raw)
To: Hou Tao, bpf
Cc: netdev, David S . Miller, Jakub Kicinski, Jesper Dangaard Brouer,
John Fastabend, Björn Töpel,
Toke Høiland-Jørgensen, Martin KaFai Lau,
Alexei Starovoitov, Andrii Nakryiko, Song Liu, Hao Luo,
Yonghong Song, Daniel Borkmann, KP Singh, Stanislav Fomichev,
Jiri Olsa, houtao1
On 2023/7/29 17:51, Hou Tao wrote:
> From: Hou Tao <houtao1@huawei.com>
>
> The following warning was reported when running stress-mode enabled
> xdp_redirect_cpu with some RT threads:
>
> ------------[ cut here ]------------
> WARNING: CPU: 4 PID: 65 at kernel/bpf/cpumap.c:135
> CPU: 4 PID: 65 Comm: kworker/4:1 Not tainted 6.5.0-rc2+ #1
> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
> Workqueue: events cpu_map_kthread_stop
> RIP: 0010:put_cpu_map_entry+0xda/0x220
> ......
> Call Trace:
> <TASK>
> ? show_regs+0x65/0x70
> ? __warn+0xa5/0x240
> ......
> ? put_cpu_map_entry+0xda/0x220
> cpu_map_kthread_stop+0x41/0x60
> process_one_work+0x6b0/0xb80
> worker_thread+0x96/0x720
> kthread+0x1a5/0x1f0
> ret_from_fork+0x3a/0x70
> ret_from_fork_asm+0x1b/0x30
> </TASK>
>
> The root cause is the same as commit 436901649731 ("bpf: cpumap: Fix memory
> leak in cpu_map_update_elem"). The kthread is stopped prematurely by
> kthread_stop() in cpu_map_kthread_stop(), and kthread() doesn't call
> cpu_map_kthread_run() at all but XDP program has already queued some
> frames or skbs into ptr_ring. So when __cpu_map_ring_cleanup() checks
> the ptr_ring, it will find it was not emptied and report a warning.
>
> An alternative fix is to use __cpu_map_ring_cleanup() to drop these
> pending frames or skbs when kthread_stop() returns -EINTR, but it may
> confuse the user, because these frames or skbs have been handled
> correctly by XDP program. So instead of dropping these frames or skbs,
> just make sure the per-cpu kthread is running before
> __cpu_map_entry_alloc() returns.
>
> After apply the fix, the error handle for kthread_stop() will be
> unnecessary because it will always return 0, so just remove it.
>
> Fixes: 6710e1126934 ("bpf: introduce new bpf cpu map type BPF_MAP_TYPE_CPUMAP")
> Signed-off-by: Hou Tao <houtao1@huawei.com>
> ---
> kernel/bpf/cpumap.c | 21 +++++++++++----------
> 1 file changed, 11 insertions(+), 10 deletions(-)
>
> diff --git a/kernel/bpf/cpumap.c b/kernel/bpf/cpumap.c
> index 0a16e30b16ef..08351e0863e5 100644
> --- a/kernel/bpf/cpumap.c
> +++ b/kernel/bpf/cpumap.c
> @@ -28,6 +28,7 @@
> #include <linux/sched.h>
> #include <linux/workqueue.h>
> #include <linux/kthread.h>
> +#include <linux/completion.h>
> #include <trace/events/xdp.h>
> #include <linux/btf_ids.h>
>
> @@ -71,6 +72,7 @@ struct bpf_cpu_map_entry {
> struct rcu_head rcu;
>
> struct work_struct kthread_stop_wq;
> + struct completion kthread_running;
> };
>
> struct bpf_cpu_map {
> @@ -151,7 +153,6 @@ static void put_cpu_map_entry(struct bpf_cpu_map_entry *rcpu)
> static void cpu_map_kthread_stop(struct work_struct *work)
> {
> struct bpf_cpu_map_entry *rcpu;
> - int err;
>
> rcpu = container_of(work, struct bpf_cpu_map_entry, kthread_stop_wq);
>
> @@ -161,14 +162,7 @@ static void cpu_map_kthread_stop(struct work_struct *work)
> rcu_barrier();
>
> /* kthread_stop will wake_up_process and wait for it to complete */
> - err = kthread_stop(rcpu->kthread);
> - if (err) {
> - /* kthread_stop may be called before cpu_map_kthread_run
> - * is executed, so we need to release the memory related
> - * to rcpu.
> - */
> - put_cpu_map_entry(rcpu);
> - }
> + kthread_stop(rcpu->kthread);
> }
Looks good to me.
Feel free to add:
Reviewed-by: Pu Lehui <pulehui@huawei.com>
>
> static void cpu_map_bpf_prog_run_skb(struct bpf_cpu_map_entry *rcpu,
> @@ -296,11 +290,11 @@ static int cpu_map_bpf_prog_run(struct bpf_cpu_map_entry *rcpu, void **frames,
> return nframes;
> }
>
> -
> static int cpu_map_kthread_run(void *data)
> {
> struct bpf_cpu_map_entry *rcpu = data;
>
> + complete(&rcpu->kthread_running);
> set_current_state(TASK_INTERRUPTIBLE);
>
> /* When kthread gives stop order, then rcpu have been disconnected
> @@ -465,6 +459,7 @@ __cpu_map_entry_alloc(struct bpf_map *map, struct bpf_cpumap_val *value,
> goto free_ptr_ring;
>
> /* Setup kthread */
> + init_completion(&rcpu->kthread_running);
> rcpu->kthread = kthread_create_on_node(cpu_map_kthread_run, rcpu, numa,
> "cpumap/%d/map:%d", cpu,
> map->id);
> @@ -478,6 +473,12 @@ __cpu_map_entry_alloc(struct bpf_map *map, struct bpf_cpumap_val *value,
> kthread_bind(rcpu->kthread, cpu);
> wake_up_process(rcpu->kthread);
>
> + /* Make sure kthread has been running, so kthread_stop() will not
> + * stop the kthread prematurely and all pending frames or skbs
> + * will be handled by the kthread before kthread_stop() returns.
> + */
> + wait_for_completion(&rcpu->kthread_running);
> +
> return rcpu;
>
> free_prog:
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH bpf 1/2] bpf, cpumap: Make sure kthread is running before map update returns
2023-07-29 9:51 ` [PATCH bpf 1/2] bpf, cpumap: Make sure kthread is running before map update returns Hou Tao
2023-07-29 10:21 ` Pu Lehui
@ 2023-07-31 9:51 ` Jesper Dangaard Brouer
1 sibling, 0 replies; 7+ messages in thread
From: Jesper Dangaard Brouer @ 2023-07-31 9:51 UTC (permalink / raw)
To: Hou Tao, bpf
Cc: brouer, netdev, David S . Miller, Jakub Kicinski,
Jesper Dangaard Brouer, John Fastabend, Björn Töpel,
Toke Høiland-Jørgensen, Martin KaFai Lau,
Alexei Starovoitov, Andrii Nakryiko, Song Liu, Hao Luo,
Yonghong Song, Daniel Borkmann, KP Singh, Stanislav Fomichev,
Jiri Olsa, Pu Lehui, houtao1
On 29/07/2023 11.51, Hou Tao wrote:
> From: Hou Tao <houtao1@huawei.com>
>
> The following warning was reported when running stress-mode enabled
> xdp_redirect_cpu with some RT threads:
Cool stress-mode test that leverage RT to provoke this.
>
> ------------[ cut here ]------------
> WARNING: CPU: 4 PID: 65 at kernel/bpf/cpumap.c:135
> CPU: 4 PID: 65 Comm: kworker/4:1 Not tainted 6.5.0-rc2+ #1
As you mention RT, I want to mention that it also possible to change the
sched prio on the kthread PID.
> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
> Workqueue: events cpu_map_kthread_stop
> RIP: 0010:put_cpu_map_entry+0xda/0x220
> ......
> Call Trace:
> <TASK>
> ? show_regs+0x65/0x70
> ? __warn+0xa5/0x240
> ......
> ? put_cpu_map_entry+0xda/0x220
> cpu_map_kthread_stop+0x41/0x60
> process_one_work+0x6b0/0xb80
> worker_thread+0x96/0x720
> kthread+0x1a5/0x1f0
> ret_from_fork+0x3a/0x70
> ret_from_fork_asm+0x1b/0x30
> </TASK>
>
> The root cause is the same as commit 436901649731 ("bpf: cpumap: Fix memory
> leak in cpu_map_update_elem"). The kthread is stopped prematurely by
> kthread_stop() in cpu_map_kthread_stop(), and kthread() doesn't call
> cpu_map_kthread_run() at all but XDP program has already queued some
> frames or skbs into ptr_ring. So when __cpu_map_ring_cleanup() checks
> the ptr_ring, it will find it was not emptied and report a warning.
>
> An alternative fix is to use __cpu_map_ring_cleanup() to drop these
> pending frames or skbs when kthread_stop() returns -EINTR, but it may
> confuse the user, because these frames or skbs have been handled
> correctly by XDP program. So instead of dropping these frames or skbs,
> just make sure the per-cpu kthread is running before
> __cpu_map_entry_alloc() returns.
>
> After apply the fix, the error handle for kthread_stop() will be
> unnecessary because it will always return 0, so just remove it.
>
> Fixes: 6710e1126934 ("bpf: introduce new bpf cpu map type BPF_MAP_TYPE_CPUMAP")
> Signed-off-by: Hou Tao <houtao1@huawei.com>
Acked-by: Jesper Dangaard Brouer <hawk@kernel.org>
Thanks for catching this!
> ---
> kernel/bpf/cpumap.c | 21 +++++++++++----------
> 1 file changed, 11 insertions(+), 10 deletions(-)
>
> diff --git a/kernel/bpf/cpumap.c b/kernel/bpf/cpumap.c
> index 0a16e30b16ef..08351e0863e5 100644
> --- a/kernel/bpf/cpumap.c
> +++ b/kernel/bpf/cpumap.c
> @@ -28,6 +28,7 @@
> #include <linux/sched.h>
> #include <linux/workqueue.h>
> #include <linux/kthread.h>
> +#include <linux/completion.h>
> #include <trace/events/xdp.h>
> #include <linux/btf_ids.h>
>
> @@ -71,6 +72,7 @@ struct bpf_cpu_map_entry {
> struct rcu_head rcu;
>
> struct work_struct kthread_stop_wq;
> + struct completion kthread_running;
> };
>
> struct bpf_cpu_map {
> @@ -151,7 +153,6 @@ static void put_cpu_map_entry(struct bpf_cpu_map_entry *rcpu)
> static void cpu_map_kthread_stop(struct work_struct *work)
> {
> struct bpf_cpu_map_entry *rcpu;
> - int err;
>
> rcpu = container_of(work, struct bpf_cpu_map_entry, kthread_stop_wq);
>
> @@ -161,14 +162,7 @@ static void cpu_map_kthread_stop(struct work_struct *work)
> rcu_barrier();
>
> /* kthread_stop will wake_up_process and wait for it to complete */
> - err = kthread_stop(rcpu->kthread);
> - if (err) {
> - /* kthread_stop may be called before cpu_map_kthread_run
> - * is executed, so we need to release the memory related
> - * to rcpu.
> - */
> - put_cpu_map_entry(rcpu);
> - }
> + kthread_stop(rcpu->kthread);
> }
>
> static void cpu_map_bpf_prog_run_skb(struct bpf_cpu_map_entry *rcpu,
> @@ -296,11 +290,11 @@ static int cpu_map_bpf_prog_run(struct bpf_cpu_map_entry *rcpu, void **frames,
> return nframes;
> }
>
> -
> static int cpu_map_kthread_run(void *data)
> {
> struct bpf_cpu_map_entry *rcpu = data;
>
> + complete(&rcpu->kthread_running);
> set_current_state(TASK_INTERRUPTIBLE);
>
Diff is missing next lines that show this is correct.
I checked this manually and for other reviewers here are the next lines:
set_current_state(TASK_INTERRUPTIBLE);
/* When kthread gives stop order, then rcpu have been disconnected
* from map, thus no new packets can enter. Remaining in-flight
* per CPU stored packets are flushed to this queue. Wait honoring
* kthread_stop signal until queue is empty.
*/
while (!kthread_should_stop() || !__ptr_ring_empty(rcpu->queue)) {
The patch is correct in setting complete(&rcpu->kthread_running) before
the while-loop, as the code also checks if ptr_ring is not empty.
> /* When kthread gives stop order, then rcpu have been disconnected
> @@ -465,6 +459,7 @@ __cpu_map_entry_alloc(struct bpf_map *map, struct bpf_cpumap_val *value,
> goto free_ptr_ring;
>
> /* Setup kthread */
> + init_completion(&rcpu->kthread_running);
> rcpu->kthread = kthread_create_on_node(cpu_map_kthread_run, rcpu, numa,
> "cpumap/%d/map:%d", cpu,
> map->id);
> @@ -478,6 +473,12 @@ __cpu_map_entry_alloc(struct bpf_map *map, struct bpf_cpumap_val *value,
> kthread_bind(rcpu->kthread, cpu);
> wake_up_process(rcpu->kthread);
>
> + /* Make sure kthread has been running, so kthread_stop() will not
> + * stop the kthread prematurely and all pending frames or skbs
> + * will be handled by the kthread before kthread_stop() returns.
> + */
> + wait_for_completion(&rcpu->kthread_running);
> +
> return rcpu;
>
> free_prog:
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH bpf 2/2] bpf, cpumap: Handle skb as well when clean up ptr_ring
2023-07-29 9:51 ` [PATCH bpf 2/2] bpf, cpumap: Handle skb as well when clean up ptr_ring Hou Tao
@ 2023-07-31 10:09 ` Jesper Dangaard Brouer
0 siblings, 0 replies; 7+ messages in thread
From: Jesper Dangaard Brouer @ 2023-07-31 10:09 UTC (permalink / raw)
To: Hou Tao, bpf
Cc: brouer, netdev, David S . Miller, Jakub Kicinski,
Jesper Dangaard Brouer, John Fastabend, Björn Töpel,
Toke Høiland-Jørgensen, Martin KaFai Lau,
Alexei Starovoitov, Andrii Nakryiko, Song Liu, Hao Luo,
Yonghong Song, Daniel Borkmann, KP Singh, Stanislav Fomichev,
Jiri Olsa, Pu Lehui, houtao1
On 29/07/2023 11.51, Hou Tao wrote:
> From: Hou Tao <houtao1@huawei.com>
>
> The following warning was reported when running xdp_redirect_cpu with
> both skb-mode and stress-mode enabled:
>
> ------------[ cut here ]------------
> Incorrect XDP memory type (-2128176192) usage
I'm happy to see that WARN "Incorrect XDP memory type" caught this.
> WARNING: CPU: 7 PID: 1442 at net/core/xdp.c:405
> Modules linked in:
> CPU: 7 PID: 1442 Comm: kworker/7:0 Tainted: G 6.5.0-rc2+ #1
> Hardware name: QEMU Standard PC (i440FX + PIIX, 1996)
> Workqueue: events __cpu_map_entry_free
> RIP: 0010:__xdp_return+0x1e4/0x4a0
> ......
> Call Trace:
> <TASK>
> ? show_regs+0x65/0x70
> ? __warn+0xa5/0x240
> ? __xdp_return+0x1e4/0x4a0
> ......
> xdp_return_frame+0x4d/0x150
> __cpu_map_entry_free+0xf9/0x230
> process_one_work+0x6b0/0xb80
> worker_thread+0x96/0x720
> kthread+0x1a5/0x1f0
> ret_from_fork+0x3a/0x70
> ret_from_fork_asm+0x1b/0x30
> </TASK>
>
> The reason for the warning is twofold. One is due to the kthread
> cpu_map_kthread_run() is stopped prematurely. Another one is
> __cpu_map_ring_cleanup() doesn't handle skb mode and treats skbs in
> ptr_ring as XDP frames.
>
> Prematurely-stopped kthread will be fixed by the preceding patch and
> ptr_ring will be empty when __cpu_map_ring_cleanup() is called. But
> as the comments in __cpu_map_ring_cleanup() said, handling and freeing
> skbs in ptr_ring as well to "catch any broken behaviour gracefully".
>
> Fixes: 11941f8a8536 ("bpf: cpumap: Implement generic cpumap")
> Signed-off-by: Hou Tao <houtao1@huawei.com>
> ---
Acked-by: Jesper Dangaard Brouer <hawk@kernel.org>
I think we should fix this code, even-though patch 1 have made it harder
to trigger.
> kernel/bpf/cpumap.c | 14 ++++++++++----
> 1 file changed, 10 insertions(+), 4 deletions(-)
>
> diff --git a/kernel/bpf/cpumap.c b/kernel/bpf/cpumap.c
> index 08351e0863e5..ef28c64f1eb1 100644
> --- a/kernel/bpf/cpumap.c
> +++ b/kernel/bpf/cpumap.c
> @@ -129,11 +129,17 @@ static void __cpu_map_ring_cleanup(struct ptr_ring *ring)
> * invoked cpu_map_kthread_stop(). Catch any broken behaviour
> * gracefully and warn once.
> */
> - struct xdp_frame *xdpf;
> + void *ptr;
>
> - while ((xdpf = ptr_ring_consume(ring)))
> - if (WARN_ON_ONCE(xdpf))
> - xdp_return_frame(xdpf);
> + while ((ptr = ptr_ring_consume(ring))) {
> + WARN_ON_ONCE(1);
> + if (unlikely(__ptr_test_bit(0, &ptr))) {
> + __ptr_clear_bit(0, &ptr);
> + kfree_skb(ptr);
> + continue;
> + }
> + xdp_return_frame(ptr);
> + }
> }
>
> static void put_cpu_map_entry(struct bpf_cpu_map_entry *rcpu)
^ permalink raw reply [flat|nested] 7+ messages in thread
* Re: [PATCH bpf 0/2] Two fixes for cpu-map
2023-07-29 9:51 [PATCH bpf 0/2] Two fixes for cpu-map Hou Tao
2023-07-29 9:51 ` [PATCH bpf 1/2] bpf, cpumap: Make sure kthread is running before map update returns Hou Tao
2023-07-29 9:51 ` [PATCH bpf 2/2] bpf, cpumap: Handle skb as well when clean up ptr_ring Hou Tao
@ 2023-07-31 22:57 ` Martin KaFai Lau
2 siblings, 0 replies; 7+ messages in thread
From: Martin KaFai Lau @ 2023-07-31 22:57 UTC (permalink / raw)
To: Hou Tao
Cc: bpf, netdev, David S . Miller, Jakub Kicinski,
Jesper Dangaard Brouer, John Fastabend, Björn Töpel,
Toke Høiland-Jørgensen, Alexei Starovoitov,
Andrii Nakryiko, Song Liu, Hao Luo, Yonghong Song,
Daniel Borkmann, KP Singh, Stanislav Fomichev, Jiri Olsa,
Pu Lehui, houtao1
On 7/29/23 2:51 AM, Hou Tao wrote:
> The patchset fixes two reported warning in cpu-map when running
> xdp_redirect_cpu and some RT threads concurrently. Patch #1 fixes
> the warning in __cpu_map_ring_cleanup() when kthread is stopped
> prematurely. Patch #2 fixes the warning in __xdp_return() when
> there are pending skbs in ptr_ring.
Applied to the bpf tree. Thanks.
^ permalink raw reply [flat|nested] 7+ messages in thread
end of thread, other threads:[~2023-07-31 22:57 UTC | newest]
Thread overview: 7+ messages (download: mbox.gz follow: Atom feed
-- links below jump to the message on this page --
2023-07-29 9:51 [PATCH bpf 0/2] Two fixes for cpu-map Hou Tao
2023-07-29 9:51 ` [PATCH bpf 1/2] bpf, cpumap: Make sure kthread is running before map update returns Hou Tao
2023-07-29 10:21 ` Pu Lehui
2023-07-31 9:51 ` Jesper Dangaard Brouer
2023-07-29 9:51 ` [PATCH bpf 2/2] bpf, cpumap: Handle skb as well when clean up ptr_ring Hou Tao
2023-07-31 10:09 ` Jesper Dangaard Brouer
2023-07-31 22:57 ` [PATCH bpf 0/2] Two fixes for cpu-map Martin KaFai Lau
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox