netdev.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
From: "Jiayuan Chen" <jiayuan.chen@linux.dev>
To: "John Fastabend" <john.fastabend@gmail.com>
Cc: bpf@vger.kernel.org, "Jakub Sitnicki" <jakub@cloudflare.com>,
	"David S. Miller" <davem@davemloft.net>,
	"Eric Dumazet" <edumazet@google.com>,
	"Jakub Kicinski" <kuba@kernel.org>,
	"Paolo Abeni" <pabeni@redhat.com>,
	"Simon Horman" <horms@kernel.org>,
	"Alexei Starovoitov" <ast@kernel.org>,
	"Daniel Borkmann" <daniel@iogearbox.net>,
	netdev@vger.kernel.org, linux-kernel@vger.kernel.org
Subject: Re: [PATCH bpf-next v1] bpf, sockmap: Fix psock incorrectly pointing to sk
Date: Thu, 29 May 2025 02:42:14 +0000	[thread overview]
Message-ID: <fefe50c6ec558074ec7de944175cec82bb426f10@linux.dev> (raw)
In-Reply-To: <20250528234650.n5orke2yq55qnoen@gmail.com>

May 29, 2025 at 07:46, "John Fastabend" <john.fastabend@gmail.com> wrote:



> 
> On 2025-05-24 00:22:19, Jiayuan Chen wrote:
> 
> > 
> > We observed an issue from the latest selftest: sockmap_redir where
> > 
> >  sk_psock(psock->sk) != psock in the backlog. The root cause is the special
> > 
> >  behavior in sockmap_redir - it frequently performs map_update() and
> > 
> >  map_delete() on the same socket. During map_update(), we create a new
> > 
> >  psock and during map_delete(), we eventually free the psock via rcu_work
> > 
> >  in sk_psock_drop(). However, pending workqueues might still exist and not
> > 
> >  be processed yet. If users immediately perform another map_update(), a new
> > 
> >  psock will be allocated for the same sk, resulting in two psocks pointing
> > 
> >  to the same sk.
> > 
> >  
> > 
> >  When the pending workqueue is later triggered, it uses the old psock to
> > 
> >  access sk for I/O operations, which is incorrect.
> > 
> >  
> > 
> >  Timing Diagram:
> > 
> >  
> > 
> >  cpu0 cpu1
> > 
> >  
> > 
> >  map_update(sk):
> > 
> >  sk->psock = psock1
> > 
> >  psock1->sk = sk
> > 
> >  map_delete(sk):
> > 
> >  rcu_work_free(psock1)
> > 
> >  
> > 
> >  map_update(sk):
> > 
> >  sk->psock = psock2
> > 
> >  psock2->sk = sk
> > 
> >  workqueue:
> > 
> >  wakeup with psock1, but the sk of psock1
> > 
> >  doesn't belong to psock1
> > 
> >  rcu_handler:
> > 
> >  clean psock1
> > 
> >  free(psock1)
> > 
> >  
> > 
> >  Previously, we used reference counting to address the concurrency issue
> > 
> >  between backlog and sock_map_close(). This logic remains necessary as it
> > 
> >  prevents the sk from being freed while processing the backlog. But this
> > 
> >  patch prevents pending backlogs from using a psock after it has been
> > 
> >  freed.
> > 
> 
> Nit, its not that psock would be freed because we do have the
> 
> cancel_delayed_work_sync() before the kfree(psock). But this
> 
> is not a good state with two psocks referenceing the same sk.
> 
> > 
> > Note: We cannot call cancel_delayed_work_sync() in map_delete() since this
> > 
> >  might be invoked in BPF context by BPF helper, and the function may sleep.
> > 
> >  
> > 
> >  Fixes: 604326b41a6f ("bpf, sockmap: convert to generic sk_msg interface")
> > 
> >  Signed-off-by: Jiayuan Chen <jiayuan.chen@linux.dev>
> > 
> >  
> > 
> >  ---
> > 
> >  Thanks to Michal Luczaj for providing the sockmap_redir test case, which
> > 
> >  indeed covers almost all sockmap forwarding paths.
> > 
> >  ---
> > 
> >  include/linux/skmsg.h | 1 +
> > 
> >  net/core/skmsg.c | 5 ++++-
> > 
> >  2 files changed, 5 insertions(+), 1 deletion(-)
> > 
> >  
> > 
> >  diff --git a/include/linux/skmsg.h b/include/linux/skmsg.h
> > 
> >  index 0b9095a281b8..b17221eef2f4 100644
> > 
> >  --- a/include/linux/skmsg.h
> > 
> >  +++ b/include/linux/skmsg.h
> > 
> >  @@ -67,6 +67,7 @@ struct sk_psock_progs {
> > 
> >  enum sk_psock_state_bits {
> > 
> >  SK_PSOCK_TX_ENABLED,
> > 
> >  SK_PSOCK_RX_STRP_ENABLED,
> > 
> >  + SK_PSOCK_DROPPED,
> > 
> >  };
> > 
> >  
> > 
> >  struct sk_psock_link {
> > 
> >  diff --git a/net/core/skmsg.c b/net/core/skmsg.c
> > 
> >  index 34c51eb1a14f..bd58a693ce9a 100644
> > 
> >  --- a/net/core/skmsg.c
> > 
> >  +++ b/net/core/skmsg.c
> > 
> >  @@ -656,6 +656,9 @@ static void sk_psock_backlog(struct work_struct *work)
> > 
> >  bool ingress;
> > 
> >  int ret;
> > 
> >  
> > 
> >  + if (sk_psock_test_state(psock, SK_PSOCK_DROPPED))
> > 
> >  + return;
> > 
> 
> Could we use the SK_PSOCK_TX_ENABLED bit here? Its already used to
> 
> ensure we wont requeue work after the psock has started being
> 
> removed. Seems like we don't need two flags? wdyt?
> 
> > 
> > +
> > 
> >  /* Increment the psock refcnt to synchronize with close(fd) path in
> > 
> >  * sock_map_close(), ensuring we wait for backlog thread completion
> > 
> >  * before sk_socket freed. If refcnt increment fails, it indicates
> > 
> >  @@ -867,7 +870,7 @@ void sk_psock_drop(struct sock *sk, struct sk_psock *psock)
> > 
> >  write_unlock_bh(&sk->sk_callback_lock);
> > 
> >  
> > 
> >  sk_psock_stop(psock);
> > 
> 
> Can we add this to sk_psock_stop where we have the TX_ENABLED bit
> 
> cleared.



Thanks, I just add SK_PSOCK_TX_ENABLED checking at the start of sk_psock_backlog().
Every works fine, and truly no more flag needed !

diff --git a/net/core/skmsg.c b/net/core/skmsg.c
index 34c51eb1a14f..83c78379932e 100644
--- a/net/core/skmsg.c
+++ b/net/core/skmsg.c
@@ -656,6 +656,13 @@ static void sk_psock_backlog(struct work_struct *work)
        bool ingress;
        int ret;

+       /* If sk is quickly removed from the map and then added back, the old
+        * psock should not be scheduled, because there are now two psocks
+        * pointing to the same sk.
+        */
+       if (!sk_psock_test_state(psock, SK_PSOCK_TX_ENABLED))
+               return;
+
        /* Increment the psock refcnt to synchronize with close(fd) path in
         * sock_map_close(), ensuring we wait for backlog thread completion
         * before sk_socket freed. If refcnt increment fails, it indicates



> > 
> > -
> > 
> >  + sk_psock_set_state(psock, SK_PSOCK_DROPPED);
> > 
> >  INIT_RCU_WORK(&psock->rwork, sk_psock_destroy);
> > 
> >  queue_rcu_work(system_wq, &psock->rwork);
> > 
> >  }
> > 
> >  -- 
> > 
> >  2.47.1
> >
>

  reply	other threads:[~2025-05-29  2:42 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2025-05-23 16:22 [PATCH bpf-next v1] bpf, sockmap: Fix psock incorrectly pointing to sk Jiayuan Chen
2025-05-28 23:46 ` John Fastabend
2025-05-29  2:42   ` Jiayuan Chen [this message]
2025-06-05 14:24     ` John Fastabend
2025-05-29  5:22   ` Jiayuan Chen

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=fefe50c6ec558074ec7de944175cec82bb426f10@linux.dev \
    --to=jiayuan.chen@linux.dev \
    --cc=ast@kernel.org \
    --cc=bpf@vger.kernel.org \
    --cc=daniel@iogearbox.net \
    --cc=davem@davemloft.net \
    --cc=edumazet@google.com \
    --cc=horms@kernel.org \
    --cc=jakub@cloudflare.com \
    --cc=john.fastabend@gmail.com \
    --cc=kuba@kernel.org \
    --cc=linux-kernel@vger.kernel.org \
    --cc=netdev@vger.kernel.org \
    --cc=pabeni@redhat.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).