From: Jordan Rife <jrife@google.com>
To: netdev@vger.kernel.org
Cc: Jordan Rife <jrife@google.com>,
bpf@vger.kernel.org,
Willem de Bruijn <willemdebruijn.kernel@gmail.com>,
Eric Dumazet <edumazet@google.com>,
Daniel Borkmann <daniel@iogearbox.net>,
Martin KaFai Lau <martin.lau@linux.dev>,
Stanislav Fomichev <sdf@fomichev.me>,
Andrii Nakryiko <andrii@kernel.org>,
Yusuke Suzuki <yusuke.suzuki@isovalent.com>,
Jakub Kicinski <kuba@kernel.org>
Subject: [PATCH net-next v2 0/2] Preserve UDP socket addresses on abort
Date: Tue, 3 Mar 2026 17:01:01 +0000 [thread overview]
Message-ID: <20260303170106.129698-1-jrife@google.com> (raw)
BPF cgroup/sock_release hooks can be useful for performing cleanup,
map maintenance, or other bookkeeping when sockets are released. Cilium
uses cgroup/sock_release hooks to do just that, cleaning up maps keyed
by socket destination addresses. This works fine for TCP and connected
UDP sockets when they're closed gracefully, but Yusuke reported that
this fails for connected UDP when sockets are aborted prior to closing
the socket. Cilium in particular actively destroys/aborts connected UDP
sockets, so this scenario can happen easily.
From Yusuke's testing results in [1]:
1. socket connects to "127.0.0.1:8000"
2. socket aborted - diag_destroy (tcp_abort/udp_abort)
3. close(sock_fd)
4. BPF_CGROUP_RUN_PROG_INET_SOCK_RELEASE(sk) runs my_sock_release()
__section("cgroup/sock_release")
int my_sock_release(struct bpf_sock *ctx)
{
...
/* For TCP, dst_ip4 == "127.0.0.1" but for connected UDP
* dst_ip4 == 0.
*/
...
}
Case Protocol IP Family Type Result
1 TCP IPv4 Regular close Cleaned up
2 TCP IPv4 Abort Cleaned up
3 TCP IPv6 Regular close Cleaned up
4 TCP IPv6 Abort Cleaned up
5 UDP (Connected) IPv4 Regular close Cleaned up
6 UDP (Connected) IPv4 Abort Not cleaned up
7 UDP (Connected) IPv6 Regular close Cleaned up
8 UDP (Connected) IPv6 Abort Not cleaned up
This patch aims to make the behavior consistent between TCP and
connected UDP by preserving the socket destination address and port
through to the sock_release hook.
Regarding my approach:
Currently, udp_abort() calls __udp_disconnect(), but this seems like
overkill in the case of a socket abort. __udp_disconnect() handles two
special cases:
1. When a socket binds to 0.0.0.0, connects, then disconnects using
AF_UNSPEC it needs to be rehashed as described in commit 303d0403b8c2
("udp: rehash on disconnect").
2. Avoids unhashing the socket in cases where it was bound to a specific
port.
This makes sense in the case of a graceful disconnect (AF_UNSPEC) where
the socket remains intact and may be used in the future, but it seemed
sufficient in the case of a socket abort to simply set sk_err so that
future operations on that socket fail and to unconditionally unhash the
socket if it is currently hashed, thus avoiding any of the field
manipulation that __udp_disconnect() would otherwise do.
[1]: https://github.com/cilium/cilium/issues/42649
CHANGES
=======
v1 -> v2:
* Set connect_fd back to -1 after calling destroy() in the selftest
(Jakub).
Jordan Rife (2):
udp: Preserve UDP socket addresses on abort
selftests/bpf: Ensure dst addr/port are preserved after socket abort
net/ipv4/udp.c | 4 +-
.../bpf/prog_tests/sock_destroy_release.c | 136 ++++++++++++++++++
.../bpf/progs/sock_destroy_release.c | 59 ++++++++
3 files changed, 198 insertions(+), 1 deletion(-)
create mode 100644 tools/testing/selftests/bpf/prog_tests/sock_destroy_release.c
create mode 100644 tools/testing/selftests/bpf/progs/sock_destroy_release.c
--
2.53.0.473.g4a7958ca14-goog
next reply other threads:[~2026-03-03 17:01 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2026-03-03 17:01 Jordan Rife [this message]
2026-03-03 17:01 ` [PATCH net-next v2 1/2] udp: Preserve UDP socket addresses on abort Jordan Rife
2026-03-04 21:21 ` Kuniyuki Iwashima
2026-03-04 23:38 ` Willem de Bruijn
2026-03-04 23:52 ` Jordan Rife
2026-03-05 3:25 ` Kuniyuki Iwashima
2026-03-05 18:03 ` Jordan Rife
2026-03-05 19:31 ` Kuniyuki Iwashima
2026-03-05 23:18 ` Jordan Rife
2026-03-03 17:01 ` [PATCH net-next v2 2/2] selftests/bpf: Ensure dst addr/port are preserved after socket abort Jordan Rife
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20260303170106.129698-1-jrife@google.com \
--to=jrife@google.com \
--cc=andrii@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=edumazet@google.com \
--cc=kuba@kernel.org \
--cc=martin.lau@linux.dev \
--cc=netdev@vger.kernel.org \
--cc=sdf@fomichev.me \
--cc=willemdebruijn.kernel@gmail.com \
--cc=yusuke.suzuki@isovalent.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox