Skip to content

Commit

Permalink
selftests: xsk: destroy BPF resources only when ctx refcount drops to 0
Browse files Browse the repository at this point in the history
Currently, xsk_socket__delete frees BPF resources regardless of ctx
refcount. Xdpxceiver has a test to verify whether underlying BPF
resources would not be wiped out after closing XSK socket that was bound
to interface with other active sockets. From library's xsk part
perspective it also means that the internal xsk context is shared and
its refcount is bumped accordingly.

After a switch to loading XDP prog based on previously opened XSK
socket, mentioned xdpxceiver test fails with:
not ok 16 [xdpxceiver.c:swap_xsk_resources:1334]: ERROR: 9/"Bad file descriptor

which means that in swap_xsk_resources(), xsk_socket__delete() released
xskmap which in turn caused a failure of xsk_socket__update_xskmap().

To fix this, when deleting socket, decrement ctx refcount before
releasing BPF resources and do so only when refcount dropped to 0 which
means there are no more active sockets for this ctx so BPF resources can
be freed safely.

Fixes: 2f6324a ("libbpf: Support shared umems between queues and devices")
Signed-off-by: Maciej Fijalkowski <maciej.fijalkowski@intel.com>
  • Loading branch information
mfijalko authored and Kernel Patches Daemon committed Jun 29, 2022
1 parent 411e6c6 commit e096153
Showing 1 changed file with 4 additions and 4 deletions.
8 changes: 4 additions & 4 deletions tools/testing/selftests/bpf/xsk.c
Expand Up @@ -1156,8 +1156,6 @@ int xsk_socket__create_shared(struct xsk_socket **xsk_ptr,
goto out_mmap_tx;
}

ctx->prog_fd = -1;

if (!(xsk->config.libbpf_flags & XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD)) {
err = __xsk_setup_xdp_prog(xsk, NULL);
if (err)
Expand Down Expand Up @@ -1238,7 +1236,10 @@ void xsk_socket__delete(struct xsk_socket *xsk)

ctx = xsk->ctx;
umem = ctx->umem;
if (ctx->prog_fd != -1) {

xsk_put_ctx(ctx, true);

if (!ctx->refcount) {
xsk_delete_bpf_maps(xsk);
close(ctx->prog_fd);
if (ctx->has_bpf_link)
Expand All @@ -1257,7 +1258,6 @@ void xsk_socket__delete(struct xsk_socket *xsk)
}
}

xsk_put_ctx(ctx, true);

umem->refcount--;
/* Do not close an fd that also has an associated umem connected
Expand Down

0 comments on commit e096153

Please sign in to comment.