Re: [PATCHv3 bpf-next 0/5] Add bpf_sk_assign eBPF helper

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 2020-03-27 1:43 p.m., Joe Stringer wrote:
On Fri, Mar 27, 2020 at 7:14 AM Jamal Hadi Salim <jhs@xxxxxxxxxxxx> wrote:


[..]

Trying to understand so if we can port our tc action (and upstream),
we would need to replicate:

   bpf_sk_assign() - invoked everytime we succeed finding the sk
   bpf_sk_release() - invoked everytime we are done processing the sk

The skb->destructor = sock_pfree() is the balanced other half of
bpf_sk_assign(), so you shouldn't need to explicitly call
bpf_sk_release() to handle the refcounting of the assigned socket.


per other thread, I think once you factor out what those two functions
call into the kernel proper we will just call those same
things..

The `bpf_sk_release()` pairs with BPF socket lookup, so if you already
have other socket lookup code handling the core tproxy logic (looking
up established, then looking up listen sockets with different tuple)
then you're presumably already handling that to avoid leaking
references.


Yes, we have all that code already.

I think that looking at the test_sk_assign.c BPF program in patch 4/5
should give you a good sense for what you'd need in the TC action
logic.

Seems like we are on track. Thanks again for working on this.

cheers,
jamal





[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux