[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAEf4BzZ4oEbONjbW5D5rngeiuT-BzREMKBz9H_=gzfdvBbvMOQ@mail.gmail.com>
Date: Mon, 29 Jun 2020 18:08:48 -0700
From: Andrii Nakryiko <andrii.nakryiko@...il.com>
To: Alexei Starovoitov <alexei.starovoitov@...il.com>
Cc: "David S. Miller" <davem@...emloft.net>,
Daniel Borkmann <daniel@...earbox.net>,
"Paul E . McKenney" <paulmck@...nel.org>,
Networking <netdev@...r.kernel.org>, bpf <bpf@...r.kernel.org>,
Kernel Team <kernel-team@...com>
Subject: Re: [PATCH v4 bpf-next 1/5] bpf: Remove redundant synchronize_rcu.
On Mon, Jun 29, 2020 at 5:58 PM Andrii Nakryiko
<andrii.nakryiko@...il.com> wrote:
>
> On Mon, Jun 29, 2020 at 5:35 PM Alexei Starovoitov
> <alexei.starovoitov@...il.com> wrote:
> >
> > From: Alexei Starovoitov <ast@...nel.org>
> >
> > bpf_free_used_maps() or close(map_fd) will trigger map_free callback.
> > bpf_free_used_maps() is called after bpf prog is no longer executing:
> > bpf_prog_put->call_rcu->bpf_prog_free->bpf_free_used_maps.
> > Hence there is no need to call synchronize_rcu() to protect map elements.
> >
> > Signed-off-by: Alexei Starovoitov <ast@...nel.org>
> > ---
>
> Seems correct. And nice that maps don't have to care about this anymore.
>
Actually, what about the map-in-map case?
What if you had an array-of-maps with an inner map element. It is the
last reference to that map. Now you have two BPF prog executions in
parallel. One looked up that inner map and is updating it at the
moment. Another execution at the same time deletes that map. That
deletion will call bpf_map_put(), which without synchronize_rcu() will
free memory. All the while the former BPF program execution is still
working with that map.
Or am I missing something that would prevent that?
> Acked-by: Andrii Nakryiko <andriin@...com>
>
> > kernel/bpf/arraymap.c | 9 ---------
> > kernel/bpf/hashtab.c | 8 +++-----
> > kernel/bpf/lpm_trie.c | 5 -----
> > kernel/bpf/queue_stack_maps.c | 7 -------
> > kernel/bpf/reuseport_array.c | 2 --
> > kernel/bpf/ringbuf.c | 7 -------
> > kernel/bpf/stackmap.c | 3 ---
> > 7 files changed, 3 insertions(+), 38 deletions(-)
> >
Powered by blists - more mailing lists