lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 17 Mar 2020 20:14:09 +0100
From:   Björn Töpel <bjorn.topel@...il.com>
To:     Will Deacon <will@...nel.org>
Cc:     Daniel Borkmann <daniel@...earbox.net>,
        John Fastabend <john.fastabend@...il.com>,
        Netdev <netdev@...r.kernel.org>,
        Alexei Starovoitov <ast@...nel.org>,
        Björn Töpel <bjorn.topel@...el.com>,
        bpf <bpf@...r.kernel.org>,
        "Karlsson, Magnus" <magnus.karlsson@...el.com>,
        Jonathan Lemon <jonathan.lemon@...il.com>, mark.rutland@....com
Subject: Re: [PATCH bpf-next] xsk: update rings for load-acquire/store-release semantics

On Mon, 16 Mar 2020 at 19:44, Will Deacon <will@...nel.org> wrote:
>
> On Tue, Jan 21, 2020 at 12:50:23PM +0100, Björn Töpel wrote:
> > On Tue, 21 Jan 2020 at 00:51, Daniel Borkmann <daniel@...earbox.net> wrote:
> > >
> > > On 1/20/20 10:21 AM, Björn Töpel wrote:
> > > > From: Björn Töpel <bjorn.topel@...el.com>
> > > >
> > > > Currently, the AF_XDP rings uses fences for the kernel-side
> > > > produce/consume functions. By updating rings for
> > > > load-acquire/store-release semantics, the full barrier (smp_mb()) on
> > > > the consumer side can be replaced.
> > > >
> > > > Signed-off-by: Björn Töpel <bjorn.topel@...el.com>
> > >
> > > If I'm not missing something from the ring update scheme, don't you also need
> > > to adapt to STORE.rel ->producer with matching barrier in tools/lib/bpf/xsk.h ?
> > >
> >
> > Daniel/John,
> >
> > Hmm, I was under the impression that *wasn't* the case. Quoting
> > memory-barriers.txt:
> >
> > --8<--
> > When dealing with CPU-CPU interactions, certain types of memory
> > barrier should always be paired.  A lack of appropriate pairing is
> > almost certainly an error.
> >
> > General barriers pair with each other, though they also pair with most
> > other types of barriers, albeit without multicopy atomicity.  An
> > acquire barrier pairs with a release barrier, but both may also pair
> > with other barriers, including of course general barriers.  A write
> > barrier pairs with a data dependency barrier, a control dependency, an
> > acquire barrier, a release barrier, a read barrier, or a general
> > barrier.  Similarly a read barrier, control dependency, or a data
> > dependency barrier pairs with a write barrier, an acquire barrier, a
> > release barrier, or a general barrier:
> > -->8--
>
> The key part here is "albeit without multicopy atomicity". I don't think
> you care about that at all for these rings as you're very clearly passing a
> message from the producer side to the consumer side in a point-to-point like
> manner, so I think you're ok to change the kernel independently from
> userspace (but I would still recommend updating both eventually).
>
> The only thing you might run into is if anybody is relying on the smp_mb()
> in the consumer to order other unrelated stuff either side of the consume
> operation (or even another consume operation to a different ring!), but it
> looks like you can't rely on that in the xsk queue implementation anyway
> because you cache the global state and so the barriers are conditional.
>

Thanks for getting back, and for the clarification! I'll do a respin
(as part of a another series) that include the userland changes.

Cheers,
Björn

> Will

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ