Message ID | 20250220134503.835224-1-maciej.fijalkowski@intel.com (mailing list archive) |
---|---|
Headers | show |
Series | bpf: introduce skb refcount kfuncs | expand |
On Thu, Feb 20, 2025 at 5:45 AM Maciej Fijalkowski <maciej.fijalkowski@intel.com> wrote: > > Hi! > > This patchset provides what is needed for storing skbs as kptrs in bpf > maps. We start with necessary kernel change as discussed at [0] with > Martin, then next patch adds kfuncs for handling skb refcount and on top > of that a test case is added where one program stores skbs and then next > program is able to retrieve them from map. > > Martin, regarding the kernel change I decided to go with boolean > approach instead of what you initially suggested. Let me know if it > works for you. > > Thanks, > Maciej > > [0]: https://lore.kernel.org/bpf/Z0X%2F9PhIhvQwsgfW@boxer/ Before we go further we need a lot more details on "why" part. In the old thread I was able to find: > On TC egress hook skb is stored in a map ... > During TC ingress hook on the same interface, the skb that was previously stored in map is retrieved ... This is too cryptic. I see several concerns with such use case including netns crossing, L2/L3 mismatch, skb_scrub. I doubt we can make such "skb stash in a map" safe without restricting the usage, so please provide detailed description of the use case.