From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-oa1-x2d.google.com (mail-oa1-x2d.google.com [IPv6:2001:4860:4864:20::2d]) by mail.toke.dk (Postfix) with ESMTPS id 91D229C82E0 for ; Wed, 30 Nov 2022 00:41:47 +0100 (CET) Authentication-Results: mail.toke.dk; dkim=pass (2048-bit key; unprotected) header.d=google.com header.i=@google.com header.a=rsa-sha256 header.s=20210112 header.b=mZr58q/a Received: by mail-oa1-x2d.google.com with SMTP id 586e51a60fabf-13bd19c3b68so19071495fac.7 for ; Tue, 29 Nov 2022 15:41:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=UWfZ91ImgWeO8DwgII+oCDs9mlXWxVZrR+3wVed57KM=; b=mZr58q/aMc2yWL/6kZbHxgPxdDDOBWBbYRmyE648vEE+k7lSU3XpJb40CYcuma1AqV /vFlt7uuXj/Xwoi67Kf/l6EQX6uNGbhGu1EGzm/jPCn5NQSKBAMYYwtlQo+XF4/0hU1g znlSqRl0p/u7xOUP88YFNU2Hkh0QYKeKdFrqgQz33S8hgYDJjvO7WRwfo8A9UZEVAmFe r8ZMaxrfunSHoHL+5oTFOQApIrkENZ7ln8idCJ4W7xIRpspgZtSRdF2rZb/4ZT/fVMBH H22Bun9twBSG2fQrnkf2LL45FbTGSk1A3NDB3+XlzJWpVRDGQZymb90RzP8JdTJOj8te 8EUw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=UWfZ91ImgWeO8DwgII+oCDs9mlXWxVZrR+3wVed57KM=; b=oMhjCwAwkcaOSrl9OTnTFKatvB0AEtqSymD3oy0S7xVgDN0HA1HGUUdl0he5kE7aC6 D2Ni6VBV7pZ592F+xvd2eEvNqS8yklaCc4m+62+8TcqN0pnNPIUXiTTD+X1Ei7GrWJ9X +4fTikez5A+oLkGNDvzmAfdP3H+XSSN3HXxHpz5u4FURWArkpHghFpDkQriVoTAhGfKX d8i87n7MCBTvNR1MEWGqAoXUWba7tUS9Ra1h12FEH1QfqNfYZVHJNHvKHpvizplRAanB N587SPzCwjA52GoaXiDxXin1aYFAee1GeU/X0QZYq+vKPdwggALUKVCplztUb+/QZ9v/ Catg== X-Gm-Message-State: ANoB5pnMVrFIG3oMk4tUuR7v8SE1MSkz+OcyCAYufZJI1QzsS3C3Zmc9 ddpS8xUcjeUimWrujRiUj4MmAcQ+EHkg9j+CNS74zg== X-Google-Smtp-Source: AA0mqf4tY0QqX5s08Ulkn5JAFiHJ8maUKTh5dzZLB/ResofP+IafTNtppviQZG4XH7cBw5GaPzhVwpJphlSZkXXyObM= X-Received: by 2002:a05:6870:c18a:b0:142:870e:bd06 with SMTP id h10-20020a056870c18a00b00142870ebd06mr29858140oad.181.1669765303730; Tue, 29 Nov 2022 15:41:43 -0800 (PST) MIME-Version: 1.0 References: <20221129193452.3448944-1-sdf@google.com> <8735a1zdrt.fsf@toke.dk> In-Reply-To: <8735a1zdrt.fsf@toke.dk> From: Stanislav Fomichev Date: Tue, 29 Nov 2022 15:41:32 -0800 Message-ID: To: =?UTF-8?B?VG9rZSBIw7hpbGFuZC1Kw7hyZ2Vuc2Vu?= Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Message-ID-Hash: PXMXV2BKZ5FEHIE4CBDXGS3KOE3TRTWT X-Message-ID-Hash: PXMXV2BKZ5FEHIE4CBDXGS3KOE3TRTWT X-MailFrom: sdf@google.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: bpf@vger.kernel.org, ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, haoluo@google.com, jolsa@kernel.org, David Ahern , Jakub Kicinski , Willem de Bruijn , Jesper Dangaard Brouer , Anatoly Burakov , Alexander Lobakin , Magnus Karlsson , Maryam Tahhan , xdp-hints@xdp-project.net, netdev@vger.kernel.org X-Mailman-Version: 3.3.7 Precedence: list Subject: [xdp-hints] Re: [PATCH bpf-next v3 00/11] xdp: hints via kfuncs List-Id: XDP hardware hints design discussion Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: On Tue, Nov 29, 2022 at 12:50 PM Toke H=C3=B8iland-J=C3=B8rgensen wrote: > > Stanislav Fomichev writes: > > > Please see the first patch in the series for the overall > > design and use-cases. > > > > Changes since v2: > > > > - Rework bpf_prog_aux->xdp_netdev refcnt (Martin) > > > > Switched to dropping the count early, after loading / verification is > > done. At attach time, the pointer value is used only for comparing > > the actual netdev at attach vs netdev at load. > > So if we're not holding the netdev reference, we'll end up with a BPF > program with hard-coded CALL instructions calling into a module that > could potentially be unloaded while that BPF program is still alive, > right? > > I suppose that since we're checking that the attach iface is the same > that the program should not be able to run after the module is unloaded, > but it still seems a bit iffy. And we should definitely block > BPF_PROG_RUN invocations of programs with a netdev set (but we should do > that anyway). Ugh, good point about BPF_PROG_RUN, seems like it should be blocked regardless of the locking scheme though, right? Since our mlx4/mlx5 changes expect something after the xdp_buff, we can't use those per-netdev programs with our generic bpf_prog_test_run_xdp... > > (potentially can be a problem if the same slub slot is reused > > for another netdev later on?) > > Yeah, this would be bad as well, obviously. I guess this could happen? Not sure, that's why I'm raising it here to see what others think :-) Seems like this has to be actively exploited to happen? (and it's a privileged operation) Alternatively, we can go back to the original version where the prog holds the device. Matin mentioned in the previous version that if we were to hold a netdev refcnt, we'd have to drop it also from unregister_netdevice. It feels like beyond that extra dev_put, we'd need to reset our aux->xdp_netdev and/or add some flag or something else to indicate that this bpf program is "orphaned" and can't be attached anywhere anymore (since the device is gone; netdev_run_todo should free the netdev it seems). That should address this potential issue with reusing the same addr for another netdev, but is a bit more complicated code-wise. Thoughts? > -Toke >