From patchwork Thu May 27 21:12:12 2021 Content-Type: text/plain; charset="utf-8" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit X-Patchwork-Submitter: Tanner Love X-Patchwork-Id: 449307 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-15.7 required=3.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_CR_TRAILER,INCLUDES_PATCH, MAILING_LIST_MULTI, SPF_HELO_NONE, SPF_PASS, USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 2E157C4707F for ; Thu, 27 May 2021 21:12:27 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 0F301613E3 for ; Thu, 27 May 2021 21:12:27 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S234538AbhE0VN7 (ORCPT ); Thu, 27 May 2021 17:13:59 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:55344 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S233387AbhE0VN6 (ORCPT ); Thu, 27 May 2021 17:13:58 -0400 Received: from mail-qk1-x733.google.com (mail-qk1-x733.google.com [IPv6:2607:f8b0:4864:20::733]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id A6FD2C061574 for ; Thu, 27 May 2021 14:12:23 -0700 (PDT) Received: by mail-qk1-x733.google.com with SMTP id k4so2170069qkd.0 for ; Thu, 27 May 2021 14:12:23 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=edeAWJ9GSWf7SVrTVTNx62RXdUNp9ffMROyNv2EmhVo=; b=NYgmHcAnbIzQbqh2w468Y8d8+A6hEapJ+WuIc9Bre0FZTenLNrlVurfbn47G3vz2Z5 XJo98aJ6jRXJMFKTg1HbZV7AGcdKLwTM1VLI2bxjxYhKg3CDrgoOJXH2G2xg3I9Xa1Nq YMfogJun6M0nEq3oJ9ABv1R7PLFOfZqKvtuQTid11D5QC+5IbWm6C1+CRoJK7A+kjJUd lHT1BbJC4OMD884SN70q6Q0jAD6J0N6Xu8zc429h23k7LVu6/igDKeodzSt3bY3fjOBA UuoW2OFLJA4OzCCSF0WOvtKAdAAkN983hoyvo+Eu88LH9IeFRrdqQy6WmVA1lKtcNZwz 7QmA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id:in-reply-to :references:mime-version:content-transfer-encoding; bh=edeAWJ9GSWf7SVrTVTNx62RXdUNp9ffMROyNv2EmhVo=; b=MSduijRvG1YVh10MGNaioTHE4BsleLZnlSegTIq/5PAfyhUYJ48k0lbiKGh79uDtl7 zrVODvAVGRsCxEq/gNsGAjHX72XelHHCl3Icdvq9ykQYWxdIfV/GB3l9C+JaaldTKCtw RrRytGwneBwftuj9lnPzgDS0lPatMepSn8fVDMw6XzwL0/YdxDlshV1mEiAJyrRRu37f eVc02bT8LYxBdgcbbWQmHN7LtZ/uZTBKa1I4zsVeUnQVbWo+6mF3k0txT1PbUycqwfo2 BR4KzG/xGaQBTMNIBqEffLJORtvjoN/olK5F/cUJZv8z6W4OWVEzSx4lmxc3xYcicVAw C0IA== X-Gm-Message-State: AOAM531uF2+FnK/exkyK3a1q33L/1j7MzNjfoi+1CZMAF4GsnjAgl8A8 J6hXvj4k6Q3r2OSSMPtF925PuXceCW0= X-Google-Smtp-Source: ABdhPJzJRLq44ZefGkREIRjm4G49BGjiKi+iTvwh9nDApHD08rCw3XjM5FugAY3IQKTnWD8N6K9z7g== X-Received: by 2002:a37:b185:: with SMTP id a127mr544788qkf.172.1622149942540; Thu, 27 May 2021 14:12:22 -0700 (PDT) Received: from tannerlove.nyc.corp.google.com ([2620:0:1003:316:2437:9aae:c493:2542]) by smtp.gmail.com with ESMTPSA id f19sm2271362qkg.70.2021.05.27.14.12.22 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Thu, 27 May 2021 14:12:22 -0700 (PDT) From: Tanner Love To: netdev@vger.kernel.org Cc: davem@davemloft.net, Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Tanner Love , Willem de Bruijn , Petar Penkov Subject: [PATCH net-next 1/3] net: flow_dissector: extend bpf flow dissector support with vnet hdr Date: Thu, 27 May 2021 17:12:12 -0400 Message-Id: <20210527211214.1960922-2-tannerlove.kernel@gmail.com> X-Mailer: git-send-email 2.32.0.rc0.204.g9fa02ecfa5-goog In-Reply-To: <20210527211214.1960922-1-tannerlove.kernel@gmail.com> References: <20210527211214.1960922-1-tannerlove.kernel@gmail.com> MIME-Version: 1.0 Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org From: Tanner Love Amend the bpf flow dissector program type to accept virtio_net_hdr members. Do this to enable bpf flow dissector programs to perform virtio-net header validation. The next patch in this series will add a flow dissection hook in virtio_net_hdr_to_skb and make use of this extended functionality. That commit message has more background on the use case. Signed-off-by: Tanner Love Reviewed-by: Willem de Bruijn Reviewed-by: Petar Penkov --- drivers/net/bonding/bond_main.c | 2 +- include/linux/skbuff.h | 26 ++++++++++++---- include/net/flow_dissector.h | 6 ++++ include/uapi/linux/bpf.h | 6 ++++ net/core/filter.c | 55 +++++++++++++++++++++++++++++++++ net/core/flow_dissector.c | 23 ++++++++++++-- tools/include/uapi/linux/bpf.h | 6 ++++ 7 files changed, 115 insertions(+), 9 deletions(-) diff --git a/drivers/net/bonding/bond_main.c b/drivers/net/bonding/bond_main.c index 7e469c203ca5..5d2d7d5c5704 100644 --- a/drivers/net/bonding/bond_main.c +++ b/drivers/net/bonding/bond_main.c @@ -3554,7 +3554,7 @@ static bool bond_flow_dissect(struct bonding *bond, struct sk_buff *skb, case BOND_XMIT_POLICY_ENCAP34: memset(fk, 0, sizeof(*fk)); return __skb_flow_dissect(NULL, skb, &flow_keys_bonding, - fk, NULL, 0, 0, 0, 0); + fk, NULL, 0, 0, 0, 0, NULL); default: break; } diff --git a/include/linux/skbuff.h b/include/linux/skbuff.h index dbf820a50a39..fef8f4b5db6e 100644 --- a/include/linux/skbuff.h +++ b/include/linux/skbuff.h @@ -1312,18 +1312,20 @@ struct bpf_flow_dissector; bool bpf_flow_dissect(struct bpf_prog *prog, struct bpf_flow_dissector *ctx, __be16 proto, int nhoff, int hlen, unsigned int flags); +struct virtio_net_hdr; bool __skb_flow_dissect(const struct net *net, const struct sk_buff *skb, struct flow_dissector *flow_dissector, void *target_container, const void *data, - __be16 proto, int nhoff, int hlen, unsigned int flags); + __be16 proto, int nhoff, int hlen, unsigned int flags, + const struct virtio_net_hdr *vhdr); static inline bool skb_flow_dissect(const struct sk_buff *skb, struct flow_dissector *flow_dissector, void *target_container, unsigned int flags) { return __skb_flow_dissect(NULL, skb, flow_dissector, - target_container, NULL, 0, 0, 0, flags); + target_container, NULL, 0, 0, 0, flags, NULL); } static inline bool skb_flow_dissect_flow_keys(const struct sk_buff *skb, @@ -1332,7 +1334,20 @@ static inline bool skb_flow_dissect_flow_keys(const struct sk_buff *skb, { memset(flow, 0, sizeof(*flow)); return __skb_flow_dissect(NULL, skb, &flow_keys_dissector, - flow, NULL, 0, 0, 0, flags); + flow, NULL, 0, 0, 0, flags, NULL); +} + +static inline bool +__skb_flow_dissect_flow_keys_basic(const struct net *net, + const struct sk_buff *skb, + struct flow_keys_basic *flow, + const void *data, __be16 proto, + int nhoff, int hlen, unsigned int flags, + const struct virtio_net_hdr *vhdr) +{ + memset(flow, 0, sizeof(*flow)); + return __skb_flow_dissect(net, skb, &flow_keys_basic_dissector, flow, + data, proto, nhoff, hlen, flags, vhdr); } static inline bool @@ -1342,9 +1357,8 @@ skb_flow_dissect_flow_keys_basic(const struct net *net, const void *data, __be16 proto, int nhoff, int hlen, unsigned int flags) { - memset(flow, 0, sizeof(*flow)); - return __skb_flow_dissect(net, skb, &flow_keys_basic_dissector, flow, - data, proto, nhoff, hlen, flags); + return __skb_flow_dissect_flow_keys_basic(net, skb, flow, data, proto, + nhoff, hlen, flags, NULL); } void skb_flow_dissect_meta(const struct sk_buff *skb, diff --git a/include/net/flow_dissector.h b/include/net/flow_dissector.h index ffd386ea0dbb..0796ad745e69 100644 --- a/include/net/flow_dissector.h +++ b/include/net/flow_dissector.h @@ -370,6 +370,12 @@ struct bpf_flow_dissector { const struct sk_buff *skb; const void *data; const void *data_end; + __u8 vhdr_flags; + __u8 vhdr_gso_type; + __u16 vhdr_hdr_len; + __u16 vhdr_gso_size; + __u16 vhdr_csum_start; + __u16 vhdr_csum_offset; }; static inline void diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h index 418b9b813d65..de525defd462 100644 --- a/include/uapi/linux/bpf.h +++ b/include/uapi/linux/bpf.h @@ -5155,6 +5155,12 @@ struct __sk_buff { __u32 gso_segs; __bpf_md_ptr(struct bpf_sock *, sk); __u32 gso_size; + __u8 vhdr_flags; + __u8 vhdr_gso_type; + __u16 vhdr_hdr_len; + __u16 vhdr_gso_size; + __u16 vhdr_csum_start; + __u16 vhdr_csum_offset; }; struct bpf_tunnel_key { diff --git a/net/core/filter.c b/net/core/filter.c index 239de1306de9..af45e769ced6 100644 --- a/net/core/filter.c +++ b/net/core/filter.c @@ -8358,6 +8358,16 @@ static bool flow_dissector_is_valid_access(int off, int size, return false; info->reg_type = PTR_TO_FLOW_KEYS; return true; + case bpf_ctx_range(struct __sk_buff, len): + return size == size_default; + case bpf_ctx_range(struct __sk_buff, vhdr_flags): + case bpf_ctx_range(struct __sk_buff, vhdr_gso_type): + return size == sizeof(__u8); + case bpf_ctx_range(struct __sk_buff, vhdr_hdr_len): + case bpf_ctx_range(struct __sk_buff, vhdr_gso_size): + case bpf_ctx_range(struct __sk_buff, vhdr_csum_start): + case bpf_ctx_range(struct __sk_buff, vhdr_csum_offset): + return size == sizeof(__u16); default: return false; } @@ -8390,6 +8400,51 @@ static u32 flow_dissector_convert_ctx_access(enum bpf_access_type type, si->dst_reg, si->src_reg, offsetof(struct bpf_flow_dissector, flow_keys)); break; + + case offsetof(struct __sk_buff, vhdr_flags): + *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(struct bpf_flow_dissector, vhdr_flags), + si->dst_reg, si->src_reg, + offsetof(struct bpf_flow_dissector, vhdr_flags)); + break; + + case offsetof(struct __sk_buff, vhdr_gso_type): + *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(struct bpf_flow_dissector, vhdr_gso_type), + si->dst_reg, si->src_reg, + offsetof(struct bpf_flow_dissector, vhdr_gso_type)); + break; + + case offsetof(struct __sk_buff, vhdr_hdr_len): + *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(struct bpf_flow_dissector, vhdr_hdr_len), + si->dst_reg, si->src_reg, + offsetof(struct bpf_flow_dissector, vhdr_hdr_len)); + break; + + case offsetof(struct __sk_buff, vhdr_gso_size): + *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(struct bpf_flow_dissector, vhdr_gso_size), + si->dst_reg, si->src_reg, + offsetof(struct bpf_flow_dissector, vhdr_gso_size)); + break; + + case offsetof(struct __sk_buff, vhdr_csum_start): + *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(struct bpf_flow_dissector, vhdr_csum_start), + si->dst_reg, si->src_reg, + offsetof(struct bpf_flow_dissector, vhdr_csum_start)); + break; + + case offsetof(struct __sk_buff, vhdr_csum_offset): + *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(struct bpf_flow_dissector, vhdr_csum_offset), + si->dst_reg, si->src_reg, + offsetof(struct bpf_flow_dissector, vhdr_csum_offset)); + break; + + case offsetof(struct __sk_buff, len): + *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(struct bpf_flow_dissector, skb), + si->dst_reg, si->src_reg, + offsetof(struct bpf_flow_dissector, skb)); + *insn++ = BPF_LDX_MEM(BPF_FIELD_SIZEOF(struct sk_buff, len), + si->dst_reg, si->dst_reg, + offsetof(struct sk_buff, len)); + break; } return insn - insn_buf; diff --git a/net/core/flow_dissector.c b/net/core/flow_dissector.c index 3ed7c98a98e1..59639ad8700d 100644 --- a/net/core/flow_dissector.c +++ b/net/core/flow_dissector.c @@ -28,6 +28,7 @@ #include #include #include +#include #if IS_ENABLED(CONFIG_NF_CONNTRACK) #include #include @@ -915,7 +916,8 @@ bool __skb_flow_dissect(const struct net *net, const struct sk_buff *skb, struct flow_dissector *flow_dissector, void *target_container, const void *data, - __be16 proto, int nhoff, int hlen, unsigned int flags) + __be16 proto, int nhoff, int hlen, unsigned int flags, + const struct virtio_net_hdr *vhdr) { struct flow_dissector_key_control *key_control; struct flow_dissector_key_basic *key_basic; @@ -1001,6 +1003,23 @@ bool __skb_flow_dissect(const struct net *net, __be16 n_proto = proto; struct bpf_prog *prog; + if (vhdr) { + ctx.vhdr_flags = vhdr->flags; + ctx.vhdr_gso_type = vhdr->gso_type; + ctx.vhdr_hdr_len = + __virtio16_to_cpu(virtio_legacy_is_little_endian(), + vhdr->hdr_len); + ctx.vhdr_gso_size = + __virtio16_to_cpu(virtio_legacy_is_little_endian(), + vhdr->gso_size); + ctx.vhdr_csum_start = + __virtio16_to_cpu(virtio_legacy_is_little_endian(), + vhdr->csum_start); + ctx.vhdr_csum_offset = + __virtio16_to_cpu(virtio_legacy_is_little_endian(), + vhdr->csum_offset); + } + if (skb) { ctx.skb = skb; /* we can't use 'proto' in the skb case @@ -1610,7 +1629,7 @@ u32 __skb_get_hash_symmetric(const struct sk_buff *skb) memset(&keys, 0, sizeof(keys)); __skb_flow_dissect(NULL, skb, &flow_keys_dissector_symmetric, &keys, NULL, 0, 0, 0, - FLOW_DISSECTOR_F_STOP_AT_FLOW_LABEL); + FLOW_DISSECTOR_F_STOP_AT_FLOW_LABEL, NULL); return __flow_hash_from_keys(&keys, &hashrnd); } diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h index 418b9b813d65..de525defd462 100644 --- a/tools/include/uapi/linux/bpf.h +++ b/tools/include/uapi/linux/bpf.h @@ -5155,6 +5155,12 @@ struct __sk_buff { __u32 gso_segs; __bpf_md_ptr(struct bpf_sock *, sk); __u32 gso_size; + __u8 vhdr_flags; + __u8 vhdr_gso_type; + __u16 vhdr_hdr_len; + __u16 vhdr_gso_size; + __u16 vhdr_csum_start; + __u16 vhdr_csum_offset; }; struct bpf_tunnel_key {