2017-11-01 21:09:13 +07:00
|
|
|
/* SPDX-License-Identifier: GPL-2.0 WITH Linux-syscall-note */
|
2014-09-05 12:17:18 +07:00
|
|
|
/* Copyright (c) 2011-2014 PLUMgrid, http://plumgrid.com
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of version 2 of the GNU General Public
|
|
|
|
* License as published by the Free Software Foundation.
|
|
|
|
*/
|
|
|
|
#ifndef _UAPI__LINUX_BPF_H__
|
|
|
|
#define _UAPI__LINUX_BPF_H__
|
|
|
|
|
|
|
|
#include <linux/types.h>
|
2014-10-14 16:08:54 +07:00
|
|
|
#include <linux/bpf_common.h>
|
2014-09-05 12:17:18 +07:00
|
|
|
|
|
|
|
/* Extended instruction set based on top of classic BPF */
|
|
|
|
|
|
|
|
/* instruction classes */
|
2019-01-27 00:25:59 +07:00
|
|
|
#define BPF_JMP32 0x06 /* jmp mode in word width */
|
2014-09-05 12:17:18 +07:00
|
|
|
#define BPF_ALU64 0x07 /* alu mode in double word width */
|
|
|
|
|
|
|
|
/* ld/ldx fields */
|
2018-01-17 18:05:36 +07:00
|
|
|
#define BPF_DW 0x18 /* double word (64-bit) */
|
2014-09-05 12:17:18 +07:00
|
|
|
#define BPF_XADD 0xc0 /* exclusive add */
|
|
|
|
|
|
|
|
/* alu/jmp fields */
|
|
|
|
#define BPF_MOV 0xb0 /* mov reg to reg */
|
|
|
|
#define BPF_ARSH 0xc0 /* sign extending arithmetic shift right */
|
|
|
|
|
|
|
|
/* change endianness of a register */
|
|
|
|
#define BPF_END 0xd0 /* flags for endianness conversion: */
|
|
|
|
#define BPF_TO_LE 0x00 /* convert to little-endian */
|
|
|
|
#define BPF_TO_BE 0x08 /* convert to big-endian */
|
|
|
|
#define BPF_FROM_LE BPF_TO_LE
|
|
|
|
#define BPF_FROM_BE BPF_TO_BE
|
|
|
|
|
bpf: add BPF_J{LT,LE,SLT,SLE} instructions
Currently, eBPF only understands BPF_JGT (>), BPF_JGE (>=),
BPF_JSGT (s>), BPF_JSGE (s>=) instructions, this means that
particularly *JLT/*JLE counterparts involving immediates need
to be rewritten from e.g. X < [IMM] by swapping arguments into
[IMM] > X, meaning the immediate first is required to be loaded
into a register Y := [IMM], such that then we can compare with
Y > X. Note that the destination operand is always required to
be a register.
This has the downside of having unnecessarily increased register
pressure, meaning complex program would need to spill other
registers temporarily to stack in order to obtain an unused
register for the [IMM]. Loading to registers will thus also
affect state pruning since we need to account for that register
use and potentially those registers that had to be spilled/filled
again. As a consequence slightly more stack space might have
been used due to spilling, and BPF programs are a bit longer
due to extra code involving the register load and potentially
required spill/fills.
Thus, add BPF_JLT (<), BPF_JLE (<=), BPF_JSLT (s<), BPF_JSLE (s<=)
counterparts to the eBPF instruction set. Modifying LLVM to
remove the NegateCC() workaround in a PoC patch at [1] and
allowing it to also emit the new instructions resulted in
cilium's BPF programs that are injected into the fast-path to
have a reduced program length in the range of 2-3% (e.g.
accumulated main and tail call sections from one of the object
file reduced from 4864 to 4729 insns), reduced complexity in
the range of 10-30% (e.g. accumulated sections reduced in one
of the cases from 116432 to 88428 insns), and reduced stack
usage in the range of 1-5% (e.g. accumulated sections from one
of the object files reduced from 824 to 784b).
The modification for LLVM will be incorporated in a backwards
compatible way. Plan is for LLVM to have i) a target specific
option to offer a possibility to explicitly enable the extension
by the user (as we have with -m target specific extensions today
for various CPU insns), and ii) have the kernel checked for
presence of the extensions and enable them transparently when
the user is selecting more aggressive options such as -march=native
in a bpf target context. (Other frontends generating BPF byte
code, e.g. ply can probe the kernel directly for its code
generation.)
[1] https://github.com/borkmann/llvm/tree/bpf-insns
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-08-10 06:39:55 +07:00
|
|
|
/* jmp encodings */
|
2014-09-05 12:17:18 +07:00
|
|
|
#define BPF_JNE 0x50 /* jump != */
|
bpf: add BPF_J{LT,LE,SLT,SLE} instructions
Currently, eBPF only understands BPF_JGT (>), BPF_JGE (>=),
BPF_JSGT (s>), BPF_JSGE (s>=) instructions, this means that
particularly *JLT/*JLE counterparts involving immediates need
to be rewritten from e.g. X < [IMM] by swapping arguments into
[IMM] > X, meaning the immediate first is required to be loaded
into a register Y := [IMM], such that then we can compare with
Y > X. Note that the destination operand is always required to
be a register.
This has the downside of having unnecessarily increased register
pressure, meaning complex program would need to spill other
registers temporarily to stack in order to obtain an unused
register for the [IMM]. Loading to registers will thus also
affect state pruning since we need to account for that register
use and potentially those registers that had to be spilled/filled
again. As a consequence slightly more stack space might have
been used due to spilling, and BPF programs are a bit longer
due to extra code involving the register load and potentially
required spill/fills.
Thus, add BPF_JLT (<), BPF_JLE (<=), BPF_JSLT (s<), BPF_JSLE (s<=)
counterparts to the eBPF instruction set. Modifying LLVM to
remove the NegateCC() workaround in a PoC patch at [1] and
allowing it to also emit the new instructions resulted in
cilium's BPF programs that are injected into the fast-path to
have a reduced program length in the range of 2-3% (e.g.
accumulated main and tail call sections from one of the object
file reduced from 4864 to 4729 insns), reduced complexity in
the range of 10-30% (e.g. accumulated sections reduced in one
of the cases from 116432 to 88428 insns), and reduced stack
usage in the range of 1-5% (e.g. accumulated sections from one
of the object files reduced from 824 to 784b).
The modification for LLVM will be incorporated in a backwards
compatible way. Plan is for LLVM to have i) a target specific
option to offer a possibility to explicitly enable the extension
by the user (as we have with -m target specific extensions today
for various CPU insns), and ii) have the kernel checked for
presence of the extensions and enable them transparently when
the user is selecting more aggressive options such as -march=native
in a bpf target context. (Other frontends generating BPF byte
code, e.g. ply can probe the kernel directly for its code
generation.)
[1] https://github.com/borkmann/llvm/tree/bpf-insns
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-08-10 06:39:55 +07:00
|
|
|
#define BPF_JLT 0xa0 /* LT is unsigned, '<' */
|
|
|
|
#define BPF_JLE 0xb0 /* LE is unsigned, '<=' */
|
2014-09-05 12:17:18 +07:00
|
|
|
#define BPF_JSGT 0x60 /* SGT is signed '>', GT in x86 */
|
|
|
|
#define BPF_JSGE 0x70 /* SGE is signed '>=', GE in x86 */
|
bpf: add BPF_J{LT,LE,SLT,SLE} instructions
Currently, eBPF only understands BPF_JGT (>), BPF_JGE (>=),
BPF_JSGT (s>), BPF_JSGE (s>=) instructions, this means that
particularly *JLT/*JLE counterparts involving immediates need
to be rewritten from e.g. X < [IMM] by swapping arguments into
[IMM] > X, meaning the immediate first is required to be loaded
into a register Y := [IMM], such that then we can compare with
Y > X. Note that the destination operand is always required to
be a register.
This has the downside of having unnecessarily increased register
pressure, meaning complex program would need to spill other
registers temporarily to stack in order to obtain an unused
register for the [IMM]. Loading to registers will thus also
affect state pruning since we need to account for that register
use and potentially those registers that had to be spilled/filled
again. As a consequence slightly more stack space might have
been used due to spilling, and BPF programs are a bit longer
due to extra code involving the register load and potentially
required spill/fills.
Thus, add BPF_JLT (<), BPF_JLE (<=), BPF_JSLT (s<), BPF_JSLE (s<=)
counterparts to the eBPF instruction set. Modifying LLVM to
remove the NegateCC() workaround in a PoC patch at [1] and
allowing it to also emit the new instructions resulted in
cilium's BPF programs that are injected into the fast-path to
have a reduced program length in the range of 2-3% (e.g.
accumulated main and tail call sections from one of the object
file reduced from 4864 to 4729 insns), reduced complexity in
the range of 10-30% (e.g. accumulated sections reduced in one
of the cases from 116432 to 88428 insns), and reduced stack
usage in the range of 1-5% (e.g. accumulated sections from one
of the object files reduced from 824 to 784b).
The modification for LLVM will be incorporated in a backwards
compatible way. Plan is for LLVM to have i) a target specific
option to offer a possibility to explicitly enable the extension
by the user (as we have with -m target specific extensions today
for various CPU insns), and ii) have the kernel checked for
presence of the extensions and enable them transparently when
the user is selecting more aggressive options such as -march=native
in a bpf target context. (Other frontends generating BPF byte
code, e.g. ply can probe the kernel directly for its code
generation.)
[1] https://github.com/borkmann/llvm/tree/bpf-insns
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-08-10 06:39:55 +07:00
|
|
|
#define BPF_JSLT 0xc0 /* SLT is signed, '<' */
|
|
|
|
#define BPF_JSLE 0xd0 /* SLE is signed, '<=' */
|
2014-09-05 12:17:18 +07:00
|
|
|
#define BPF_CALL 0x80 /* function call */
|
|
|
|
#define BPF_EXIT 0x90 /* function return */
|
|
|
|
|
|
|
|
/* Register numbers */
|
|
|
|
enum {
|
|
|
|
BPF_REG_0 = 0,
|
|
|
|
BPF_REG_1,
|
|
|
|
BPF_REG_2,
|
|
|
|
BPF_REG_3,
|
|
|
|
BPF_REG_4,
|
|
|
|
BPF_REG_5,
|
|
|
|
BPF_REG_6,
|
|
|
|
BPF_REG_7,
|
|
|
|
BPF_REG_8,
|
|
|
|
BPF_REG_9,
|
|
|
|
BPF_REG_10,
|
|
|
|
__MAX_BPF_REG,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* BPF has 10 general purpose 64-bit registers and stack frame. */
|
|
|
|
#define MAX_BPF_REG __MAX_BPF_REG
|
|
|
|
|
|
|
|
struct bpf_insn {
|
|
|
|
__u8 code; /* opcode */
|
|
|
|
__u8 dst_reg:4; /* dest register */
|
|
|
|
__u8 src_reg:4; /* source register */
|
|
|
|
__s16 off; /* signed offset */
|
|
|
|
__s32 imm; /* signed immediate constant */
|
|
|
|
};
|
|
|
|
|
2017-01-21 23:26:11 +07:00
|
|
|
/* Key of an a BPF_MAP_TYPE_LPM_TRIE entry */
|
|
|
|
struct bpf_lpm_trie_key {
|
|
|
|
__u32 prefixlen; /* up to 32 for AF_INET, 128 for AF_INET6 */
|
|
|
|
__u8 data[0]; /* Arbitrary size */
|
|
|
|
};
|
|
|
|
|
2018-08-03 04:27:18 +07:00
|
|
|
struct bpf_cgroup_storage_key {
|
|
|
|
__u64 cgroup_inode_id; /* cgroup inode id */
|
|
|
|
__u32 attach_type; /* program attach type */
|
|
|
|
};
|
|
|
|
|
2015-10-29 20:58:09 +07:00
|
|
|
/* BPF syscall commands, see bpf(2) man-page for details. */
|
2014-09-26 14:16:57 +07:00
|
|
|
enum bpf_cmd {
|
|
|
|
BPF_MAP_CREATE,
|
bpf: add lookup/update/delete/iterate methods to BPF maps
'maps' is a generic storage of different types for sharing data between kernel
and userspace.
The maps are accessed from user space via BPF syscall, which has commands:
- create a map with given type and attributes
fd = bpf(BPF_MAP_CREATE, union bpf_attr *attr, u32 size)
returns fd or negative error
- lookup key in a given map referenced by fd
err = bpf(BPF_MAP_LOOKUP_ELEM, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key, attr->value
returns zero and stores found elem into value or negative error
- create or update key/value pair in a given map
err = bpf(BPF_MAP_UPDATE_ELEM, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key, attr->value
returns zero or negative error
- find and delete element by key in a given map
err = bpf(BPF_MAP_DELETE_ELEM, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key
- iterate map elements (based on input key return next_key)
err = bpf(BPF_MAP_GET_NEXT_KEY, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key, attr->next_key
- close(fd) deletes the map
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-26 14:16:59 +07:00
|
|
|
BPF_MAP_LOOKUP_ELEM,
|
|
|
|
BPF_MAP_UPDATE_ELEM,
|
|
|
|
BPF_MAP_DELETE_ELEM,
|
|
|
|
BPF_MAP_GET_NEXT_KEY,
|
2014-09-26 14:17:00 +07:00
|
|
|
BPF_PROG_LOAD,
|
2015-10-29 20:58:09 +07:00
|
|
|
BPF_OBJ_PIN,
|
|
|
|
BPF_OBJ_GET,
|
bpf: add BPF_PROG_ATTACH and BPF_PROG_DETACH commands
Extend the bpf(2) syscall by two new commands, BPF_PROG_ATTACH and
BPF_PROG_DETACH which allow attaching and detaching eBPF programs
to a target.
On the API level, the target could be anything that has an fd in
userspace, hence the name of the field in union bpf_attr is called
'target_fd'.
When called with BPF_ATTACH_TYPE_CGROUP_INET_{E,IN}GRESS, the target is
expected to be a valid file descriptor of a cgroup v2 directory which
has the bpf controller enabled. These are the only use-cases
implemented by this patch at this point, but more can be added.
If a program of the given type already exists in the given cgroup,
the program is swapped automically, so userspace does not have to drop
an existing program first before installing a new one, which would
otherwise leave a gap in which no program is attached.
For more information on the propagation logic to subcgroups, please
refer to the bpf cgroup controller implementation.
The API is guarded by CAP_NET_ADMIN.
Signed-off-by: Daniel Mack <daniel@zonque.org>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-11-23 22:52:27 +07:00
|
|
|
BPF_PROG_ATTACH,
|
|
|
|
BPF_PROG_DETACH,
|
2017-03-31 11:45:38 +07:00
|
|
|
BPF_PROG_TEST_RUN,
|
2017-06-06 02:15:48 +07:00
|
|
|
BPF_PROG_GET_NEXT_ID,
|
|
|
|
BPF_MAP_GET_NEXT_ID,
|
2017-06-06 02:15:49 +07:00
|
|
|
BPF_PROG_GET_FD_BY_ID,
|
2017-06-06 02:15:50 +07:00
|
|
|
BPF_MAP_GET_FD_BY_ID,
|
2017-06-06 02:15:52 +07:00
|
|
|
BPF_OBJ_GET_INFO_BY_FD,
|
2017-10-03 12:50:22 +07:00
|
|
|
BPF_PROG_QUERY,
|
2018-03-29 02:05:37 +07:00
|
|
|
BPF_RAW_TRACEPOINT_OPEN,
|
2018-04-19 05:56:01 +07:00
|
|
|
BPF_BTF_LOAD,
|
2018-05-05 04:49:51 +07:00
|
|
|
BPF_BTF_GET_FD_BY_ID,
|
bpf: introduce bpf subcommand BPF_TASK_FD_QUERY
Currently, suppose a userspace application has loaded a bpf program
and attached it to a tracepoint/kprobe/uprobe, and a bpf
introspection tool, e.g., bpftool, wants to show which bpf program
is attached to which tracepoint/kprobe/uprobe. Such attachment
information will be really useful to understand the overall bpf
deployment in the system.
There is a name field (16 bytes) for each program, which could
be used to encode the attachment point. There are some drawbacks
for this approaches. First, bpftool user (e.g., an admin) may not
really understand the association between the name and the
attachment point. Second, if one program is attached to multiple
places, encoding a proper name which can imply all these
attachments becomes difficult.
This patch introduces a new bpf subcommand BPF_TASK_FD_QUERY.
Given a pid and fd, if the <pid, fd> is associated with a
tracepoint/kprobe/uprobe perf event, BPF_TASK_FD_QUERY will return
. prog_id
. tracepoint name, or
. k[ret]probe funcname + offset or kernel addr, or
. u[ret]probe filename + offset
to the userspace.
The user can use "bpftool prog" to find more information about
bpf program itself with prog_id.
Acked-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Yonghong Song <yhs@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2018-05-25 01:21:09 +07:00
|
|
|
BPF_TASK_FD_QUERY,
|
2018-10-18 20:16:30 +07:00
|
|
|
BPF_MAP_LOOKUP_AND_DELETE_ELEM,
|
bpf: add syscall side map freeze support
This patch adds a new BPF_MAP_FREEZE command which allows to
"freeze" the map globally as read-only / immutable from syscall
side.
Map permission handling has been refactored into map_get_sys_perms()
and drops FMODE_CAN_WRITE in case of locked map. Main use case is
to allow for setting up .rodata sections from the BPF ELF which
are loaded into the kernel, meaning BPF loader first allocates
map, sets up map value by copying .rodata section into it and once
complete, it calls BPF_MAP_FREEZE on the map fd to prevent further
modifications.
Right now BPF_MAP_FREEZE only takes map fd as argument while remaining
bpf_attr members are required to be zero. I didn't add write-only
locking here as counterpart since I don't have a concrete use-case
for it on my side, and I think it makes probably more sense to wait
once there is actually one. In that case bpf_attr can be extended
as usual with a flag field and/or others where flag 0 means that
we lock the map read-only hence this doesn't prevent to add further
extensions to BPF_MAP_FREEZE upon need.
A map creation flag like BPF_F_WRONCE was not considered for couple
of reasons: i) in case of a generic implementation, a map can consist
of more than just one element, thus there could be multiple map
updates needed to set the map into a state where it can then be
made immutable, ii) WRONCE indicates exact one-time write before
it is then set immutable. A generic implementation would set a bit
atomically on map update entry (if unset), indicating that every
subsequent update from then onwards will need to bail out there.
However, map updates can fail, so upon failure that flag would need
to be unset again and the update attempt would need to be repeated
for it to be eventually made immutable. While this can be made
race-free, this approach feels less clean and in combination with
reason i), it's not generic enough. A dedicated BPF_MAP_FREEZE
command directly sets the flag and caller has the guarantee that
map is immutable from syscall side upon successful return for any
future syscall invocations that would alter the map state, which
is also more intuitive from an API point of view. A command name
such as BPF_MAP_LOCK has been avoided as it's too close with BPF
map spin locks (which already has BPF_F_LOCK flag). BPF_MAP_FREEZE
is so far only enabled for privileged users.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-04-10 04:20:06 +07:00
|
|
|
BPF_MAP_FREEZE,
|
2014-09-26 14:16:57 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
enum bpf_map_type {
|
|
|
|
BPF_MAP_TYPE_UNSPEC,
|
2014-11-14 08:36:45 +07:00
|
|
|
BPF_MAP_TYPE_HASH,
|
2014-11-14 08:36:46 +07:00
|
|
|
BPF_MAP_TYPE_ARRAY,
|
bpf: allow bpf programs to tail-call other bpf programs
introduce bpf_tail_call(ctx, &jmp_table, index) helper function
which can be used from BPF programs like:
int bpf_prog(struct pt_regs *ctx)
{
...
bpf_tail_call(ctx, &jmp_table, index);
...
}
that is roughly equivalent to:
int bpf_prog(struct pt_regs *ctx)
{
...
if (jmp_table[index])
return (*jmp_table[index])(ctx);
...
}
The important detail that it's not a normal call, but a tail call.
The kernel stack is precious, so this helper reuses the current
stack frame and jumps into another BPF program without adding
extra call frame.
It's trivially done in interpreter and a bit trickier in JITs.
In case of x64 JIT the bigger part of generated assembler prologue
is common for all programs, so it is simply skipped while jumping.
Other JITs can do similar prologue-skipping optimization or
do stack unwind before jumping into the next program.
bpf_tail_call() arguments:
ctx - context pointer
jmp_table - one of BPF_MAP_TYPE_PROG_ARRAY maps used as the jump table
index - index in the jump table
Since all BPF programs are idenitified by file descriptor, user space
need to populate the jmp_table with FDs of other BPF programs.
If jmp_table[index] is empty the bpf_tail_call() doesn't jump anywhere
and program execution continues as normal.
New BPF_MAP_TYPE_PROG_ARRAY map type is introduced so that user space can
populate this jmp_table array with FDs of other bpf programs.
Programs can share the same jmp_table array or use multiple jmp_tables.
The chain of tail calls can form unpredictable dynamic loops therefore
tail_call_cnt is used to limit the number of calls and currently is set to 32.
Use cases:
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
==========
- simplify complex programs by splitting them into a sequence of small programs
- dispatch routine
For tracing and future seccomp the program may be triggered on all system
calls, but processing of syscall arguments will be different. It's more
efficient to implement them as:
int syscall_entry(struct seccomp_data *ctx)
{
bpf_tail_call(ctx, &syscall_jmp_table, ctx->nr /* syscall number */);
... default: process unknown syscall ...
}
int sys_write_event(struct seccomp_data *ctx) {...}
int sys_read_event(struct seccomp_data *ctx) {...}
syscall_jmp_table[__NR_write] = sys_write_event;
syscall_jmp_table[__NR_read] = sys_read_event;
For networking the program may call into different parsers depending on
packet format, like:
int packet_parser(struct __sk_buff *skb)
{
... parse L2, L3 here ...
__u8 ipproto = load_byte(skb, ... offsetof(struct iphdr, protocol));
bpf_tail_call(skb, &ipproto_jmp_table, ipproto);
... default: process unknown protocol ...
}
int parse_tcp(struct __sk_buff *skb) {...}
int parse_udp(struct __sk_buff *skb) {...}
ipproto_jmp_table[IPPROTO_TCP] = parse_tcp;
ipproto_jmp_table[IPPROTO_UDP] = parse_udp;
- for TC use case, bpf_tail_call() allows to implement reclassify-like logic
- bpf_map_update_elem/delete calls into BPF_MAP_TYPE_PROG_ARRAY jump table
are atomic, so user space can build chains of BPF programs on the fly
Implementation details:
=======================
- high performance of bpf_tail_call() is the goal.
It could have been implemented without JIT changes as a wrapper on top of
BPF_PROG_RUN() macro, but with two downsides:
. all programs would have to pay performance penalty for this feature and
tail call itself would be slower, since mandatory stack unwind, return,
stack allocate would be done for every tailcall.
. tailcall would be limited to programs running preempt_disabled, since
generic 'void *ctx' doesn't have room for 'tail_call_cnt' and it would
need to be either global per_cpu variable accessed by helper and by wrapper
or global variable protected by locks.
In this implementation x64 JIT bypasses stack unwind and jumps into the
callee program after prologue.
- bpf_prog_array_compatible() ensures that prog_type of callee and caller
are the same and JITed/non-JITed flag is the same, since calling JITed
program from non-JITed is invalid, since stack frames are different.
Similarly calling kprobe type program from socket type program is invalid.
- jump table is implemented as BPF_MAP_TYPE_PROG_ARRAY to reuse 'map'
abstraction, its user space API and all of verifier logic.
It's in the existing arraymap.c file, since several functions are
shared with regular array map.
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-05-20 06:59:03 +07:00
|
|
|
BPF_MAP_TYPE_PROG_ARRAY,
|
2015-08-06 14:02:34 +07:00
|
|
|
BPF_MAP_TYPE_PERF_EVENT_ARRAY,
|
2016-02-02 13:39:53 +07:00
|
|
|
BPF_MAP_TYPE_PERCPU_HASH,
|
2016-02-02 13:39:54 +07:00
|
|
|
BPF_MAP_TYPE_PERCPU_ARRAY,
|
2016-02-18 10:58:58 +07:00
|
|
|
BPF_MAP_TYPE_STACK_TRACE,
|
2016-07-01 00:28:43 +07:00
|
|
|
BPF_MAP_TYPE_CGROUP_ARRAY,
|
2016-11-12 01:55:09 +07:00
|
|
|
BPF_MAP_TYPE_LRU_HASH,
|
2016-11-12 01:55:10 +07:00
|
|
|
BPF_MAP_TYPE_LRU_PERCPU_HASH,
|
2017-01-21 23:26:11 +07:00
|
|
|
BPF_MAP_TYPE_LPM_TRIE,
|
2017-03-23 00:00:33 +07:00
|
|
|
BPF_MAP_TYPE_ARRAY_OF_MAPS,
|
2017-03-23 00:00:34 +07:00
|
|
|
BPF_MAP_TYPE_HASH_OF_MAPS,
|
2017-07-17 23:28:56 +07:00
|
|
|
BPF_MAP_TYPE_DEVMAP,
|
2017-08-16 12:32:47 +07:00
|
|
|
BPF_MAP_TYPE_SOCKMAP,
|
2017-10-16 17:19:28 +07:00
|
|
|
BPF_MAP_TYPE_CPUMAP,
|
2018-05-02 18:01:28 +07:00
|
|
|
BPF_MAP_TYPE_XSKMAP,
|
2018-05-15 00:00:17 +07:00
|
|
|
BPF_MAP_TYPE_SOCKHASH,
|
2018-08-03 04:27:18 +07:00
|
|
|
BPF_MAP_TYPE_CGROUP_STORAGE,
|
bpf: Introduce BPF_MAP_TYPE_REUSEPORT_SOCKARRAY
This patch introduces a new map type BPF_MAP_TYPE_REUSEPORT_SOCKARRAY.
To unleash the full potential of a bpf prog, it is essential for the
userspace to be capable of directly setting up a bpf map which can then
be consumed by the bpf prog to make decision. In this case, decide which
SO_REUSEPORT sk to serve the incoming request.
By adding BPF_MAP_TYPE_REUSEPORT_SOCKARRAY, the userspace has total control
and visibility on where a SO_REUSEPORT sk should be located in a bpf map.
The later patch will introduce BPF_PROG_TYPE_SK_REUSEPORT such that
the bpf prog can directly select a sk from the bpf map. That will
raise the programmability of the bpf prog attached to a reuseport
group (a group of sk serving the same IP:PORT).
For example, in UDP, the bpf prog can peek into the payload (e.g.
through the "data" pointer introduced in the later patch) to learn
the application level's connection information and then decide which sk
to pick from a bpf map. The userspace can tightly couple the sk's location
in a bpf map with the application logic in generating the UDP payload's
connection information. This connection info contact/API stays within the
userspace.
Also, when used with map-in-map, the userspace can switch the
old-server-process's inner map to a new-server-process's inner map
in one call "bpf_map_update_elem(outer_map, &index, &new_reuseport_array)".
The bpf prog will then direct incoming requests to the new process instead
of the old process. The old process can finish draining the pending
requests (e.g. by "accept()") before closing the old-fds. [Note that
deleting a fd from a bpf map does not necessary mean the fd is closed]
During map_update_elem(),
Only SO_REUSEPORT sk (i.e. which has already been added
to a reuse->socks[]) can be used. That means a SO_REUSEPORT sk that is
"bind()" for UDP or "bind()+listen()" for TCP. These conditions are
ensured in "reuseport_array_update_check()".
A SO_REUSEPORT sk can only be added once to a map (i.e. the
same sk cannot be added twice even to the same map). SO_REUSEPORT
already allows another sk to be created for the same IP:PORT.
There is no need to re-create a similar usage in the BPF side.
When a SO_REUSEPORT is deleted from the "reuse->socks[]" (e.g. "close()"),
it will notify the bpf map to remove it from the map also. It is
done through "bpf_sk_reuseport_detach()" and it will only be called
if >=1 of the "reuse->sock[]" has ever been added to a bpf map.
The map_update()/map_delete() has to be in-sync with the
"reuse->socks[]". Hence, the same "reuseport_lock" used
by "reuse->socks[]" has to be used here also. Care has
been taken to ensure the lock is only acquired when the
adding sk passes some strict tests. and
freeing the map does not require the reuseport_lock.
The reuseport_array will also support lookup from the syscall
side. It will return a sock_gen_cookie(). The sock_gen_cookie()
is on-demand (i.e. a sk's cookie is not generated until the very
first map_lookup_elem()).
The lookup cookie is 64bits but it goes against the logical userspace
expectation on 32bits sizeof(fd) (and as other fd based bpf maps do also).
It may catch user in surprise if we enforce value_size=8 while
userspace still pass a 32bits fd during update. Supporting different
value_size between lookup and update seems unintuitive also.
We also need to consider what if other existing fd based maps want
to return 64bits value from syscall's lookup in the future.
Hence, reuseport_array supports both value_size 4 and 8, and
assuming user will usually use value_size=4. The syscall's lookup
will return ENOSPC on value_size=4. It will will only
return 64bits value from sock_gen_cookie() when user consciously
choose value_size=8 (as a signal that lookup is desired) which then
requires a 64bits value in both lookup and update.
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-08-08 15:01:24 +07:00
|
|
|
BPF_MAP_TYPE_REUSEPORT_SOCKARRAY,
|
2018-09-28 21:45:43 +07:00
|
|
|
BPF_MAP_TYPE_PERCPU_CGROUP_STORAGE,
|
2018-10-18 20:16:25 +07:00
|
|
|
BPF_MAP_TYPE_QUEUE,
|
|
|
|
BPF_MAP_TYPE_STACK,
|
2014-09-26 14:16:57 +07:00
|
|
|
};
|
|
|
|
|
2018-12-16 06:49:47 +07:00
|
|
|
/* Note that tracing related programs such as
|
|
|
|
* BPF_PROG_TYPE_{KPROBE,TRACEPOINT,PERF_EVENT,RAW_TRACEPOINT}
|
|
|
|
* are not subject to a stable API since kernel internal data
|
|
|
|
* structures can change from release to release and may
|
|
|
|
* therefore break existing tracing BPF programs. Tracing BPF
|
|
|
|
* programs correspond to /a/ specific kernel which is to be
|
|
|
|
* analyzed, and not /a/ specific kernel /and/ all future ones.
|
|
|
|
*/
|
2014-09-26 14:17:00 +07:00
|
|
|
enum bpf_prog_type {
|
|
|
|
BPF_PROG_TYPE_UNSPEC,
|
2014-12-02 06:06:34 +07:00
|
|
|
BPF_PROG_TYPE_SOCKET_FILTER,
|
tracing, perf: Implement BPF programs attached to kprobes
BPF programs, attached to kprobes, provide a safe way to execute
user-defined BPF byte-code programs without being able to crash or
hang the kernel in any way. The BPF engine makes sure that such
programs have a finite execution time and that they cannot break
out of their sandbox.
The user interface is to attach to a kprobe via the perf syscall:
struct perf_event_attr attr = {
.type = PERF_TYPE_TRACEPOINT,
.config = event_id,
...
};
event_fd = perf_event_open(&attr,...);
ioctl(event_fd, PERF_EVENT_IOC_SET_BPF, prog_fd);
'prog_fd' is a file descriptor associated with BPF program
previously loaded.
'event_id' is an ID of the kprobe created.
Closing 'event_fd':
close(event_fd);
... automatically detaches BPF program from it.
BPF programs can call in-kernel helper functions to:
- lookup/update/delete elements in maps
- probe_read - wraper of probe_kernel_read() used to access any
kernel data structures
BPF programs receive 'struct pt_regs *' as an input ('struct pt_regs' is
architecture dependent) and return 0 to ignore the event and 1 to store
kprobe event into the ring buffer.
Note, kprobes are a fundamentally _not_ a stable kernel ABI,
so BPF programs attached to kprobes must be recompiled for
every kernel version and user must supply correct LINUX_VERSION_CODE
in attr.kern_version during bpf_prog_load() call.
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Reviewed-by: Steven Rostedt <rostedt@goodmis.org>
Reviewed-by: Masami Hiramatsu <masami.hiramatsu.pt@hitachi.com>
Cc: Andrew Morton <akpm@linux-foundation.org>
Cc: Arnaldo Carvalho de Melo <acme@infradead.org>
Cc: Arnaldo Carvalho de Melo <acme@redhat.com>
Cc: Daniel Borkmann <daniel@iogearbox.net>
Cc: David S. Miller <davem@davemloft.net>
Cc: Jiri Olsa <jolsa@redhat.com>
Cc: Linus Torvalds <torvalds@linux-foundation.org>
Cc: Namhyung Kim <namhyung@kernel.org>
Cc: Peter Zijlstra <a.p.zijlstra@chello.nl>
Cc: Peter Zijlstra <peterz@infradead.org>
Link: http://lkml.kernel.org/r/1427312966-8434-4-git-send-email-ast@plumgrid.com
Signed-off-by: Ingo Molnar <mingo@kernel.org>
2015-03-26 02:49:20 +07:00
|
|
|
BPF_PROG_TYPE_KPROBE,
|
ebpf: add sched_cls_type and map it to sk_filter's verifier ops
As discussed recently and at netconf/netdev01, we want to prevent making
bpf_verifier_ops registration available for modules, but have them at a
controlled place inside the kernel instead.
The reason for this is, that out-of-tree modules can go crazy and define
and register any verfifier ops they want, doing all sorts of crap, even
bypassing available GPLed eBPF helper functions. We don't want to offer
such a shiny playground, of course, but keep strict control to ourselves
inside the core kernel.
This also encourages us to design eBPF user helpers carefully and
generically, so they can be shared among various subsystems using eBPF.
For the eBPF traffic classifier (cls_bpf), it's a good start to share
the same helper facilities as we currently do in eBPF for socket filters.
That way, we have BPF_PROG_TYPE_SCHED_CLS look like it's own type, thus
one day if there's a good reason to diverge the set of helper functions
from the set available to socket filters, we keep ABI compatibility.
In future, we could place all bpf_prog_type_list at a central place,
perhaps.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-03-01 18:31:46 +07:00
|
|
|
BPF_PROG_TYPE_SCHED_CLS,
|
2015-03-20 21:11:11 +07:00
|
|
|
BPF_PROG_TYPE_SCHED_ACT,
|
2016-04-07 08:43:25 +07:00
|
|
|
BPF_PROG_TYPE_TRACEPOINT,
|
2016-07-20 02:16:47 +07:00
|
|
|
BPF_PROG_TYPE_XDP,
|
2016-09-02 08:37:22 +07:00
|
|
|
BPF_PROG_TYPE_PERF_EVENT,
|
2016-11-23 22:52:25 +07:00
|
|
|
BPF_PROG_TYPE_CGROUP_SKB,
|
2016-12-01 23:48:04 +07:00
|
|
|
BPF_PROG_TYPE_CGROUP_SOCK,
|
2016-11-30 23:10:10 +07:00
|
|
|
BPF_PROG_TYPE_LWT_IN,
|
|
|
|
BPF_PROG_TYPE_LWT_OUT,
|
|
|
|
BPF_PROG_TYPE_LWT_XMIT,
|
bpf: BPF support for sock_ops
Created a new BPF program type, BPF_PROG_TYPE_SOCK_OPS, and a corresponding
struct that allows BPF programs of this type to access some of the
socket's fields (such as IP addresses, ports, etc.). It uses the
existing bpf cgroups infrastructure so the programs can be attached per
cgroup with full inheritance support. The program will be called at
appropriate times to set relevant connections parameters such as buffer
sizes, SYN and SYN-ACK RTOs, etc., based on connection information such
as IP addresses, port numbers, etc.
Alghough there are already 3 mechanisms to set parameters (sysctls,
route metrics and setsockopts), this new mechanism provides some
distinct advantages. Unlike sysctls, it can set parameters per
connection. In contrast to route metrics, it can also use port numbers
and information provided by a user level program. In addition, it could
set parameters probabilistically for evaluation purposes (i.e. do
something different on 10% of the flows and compare results with the
other 90% of the flows). Also, in cases where IPv6 addresses contain
geographic information, the rules to make changes based on the distance
(or RTT) between the hosts are much easier than route metric rules and
can be global. Finally, unlike setsockopt, it oes not require
application changes and it can be updated easily at any time.
Although the bpf cgroup framework already contains a sock related
program type (BPF_PROG_TYPE_CGROUP_SOCK), I created the new type
(BPF_PROG_TYPE_SOCK_OPS) beccause the existing type expects to be called
only once during the connections's lifetime. In contrast, the new
program type will be called multiple times from different places in the
network stack code. For example, before sending SYN and SYN-ACKs to set
an appropriate timeout, when the connection is established to set
congestion control, etc. As a result it has "op" field to specify the
type of operation requested.
The purpose of this new program type is to simplify setting connection
parameters, such as buffer sizes, TCP's SYN RTO, etc. For example, it is
easy to use facebook's internal IPv6 addresses to determine if both hosts
of a connection are in the same datacenter. Therefore, it is easy to
write a BPF program to choose a small SYN RTO value when both hosts are
in the same datacenter.
This patch only contains the framework to support the new BPF program
type, following patches add the functionality to set various connection
parameters.
This patch defines a new BPF program type: BPF_PROG_TYPE_SOCKET_OPS
and a new bpf syscall command to load a new program of this type:
BPF_PROG_LOAD_SOCKET_OPS.
Two new corresponding structs (one for the kernel one for the user/BPF
program):
/* kernel version */
struct bpf_sock_ops_kern {
struct sock *sk;
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
};
/* user version
* Some fields are in network byte order reflecting the sock struct
* Use the bpf_ntohl helper macro in samples/bpf/bpf_endian.h to
* convert them to host byte order.
*/
struct bpf_sock_ops {
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
__u32 family;
__u32 remote_ip4; /* In network byte order */
__u32 local_ip4; /* In network byte order */
__u32 remote_ip6[4]; /* In network byte order */
__u32 local_ip6[4]; /* In network byte order */
__u32 remote_port; /* In network byte order */
__u32 local_port; /* In host byte horder */
};
Currently there are two types of ops. The first type expects the BPF
program to return a value which is then used by the caller (or a
negative value to indicate the operation is not supported). The second
type expects state changes to be done by the BPF program, for example
through a setsockopt BPF helper function, and they ignore the return
value.
The reply fields of the bpf_sockt_ops struct are there in case a bpf
program needs to return a value larger than an integer.
Signed-off-by: Lawrence Brakmo <brakmo@fb.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-07-01 10:02:40 +07:00
|
|
|
BPF_PROG_TYPE_SOCK_OPS,
|
2017-08-16 12:31:58 +07:00
|
|
|
BPF_PROG_TYPE_SK_SKB,
|
2017-11-05 20:15:32 +07:00
|
|
|
BPF_PROG_TYPE_CGROUP_DEVICE,
|
bpf: create tcp_bpf_ulp allowing BPF to monitor socket TX/RX data
This implements a BPF ULP layer to allow policy enforcement and
monitoring at the socket layer. In order to support this a new
program type BPF_PROG_TYPE_SK_MSG is used to run the policy at
the sendmsg/sendpage hook. To attach the policy to sockets a
sockmap is used with a new program attach type BPF_SK_MSG_VERDICT.
Similar to previous sockmap usages when a sock is added to a
sockmap, via a map update, if the map contains a BPF_SK_MSG_VERDICT
program type attached then the BPF ULP layer is created on the
socket and the attached BPF_PROG_TYPE_SK_MSG program is run for
every msg in sendmsg case and page/offset in sendpage case.
BPF_PROG_TYPE_SK_MSG Semantics/API:
BPF_PROG_TYPE_SK_MSG supports only two return codes SK_PASS and
SK_DROP. Returning SK_DROP free's the copied data in the sendmsg
case and in the sendpage case leaves the data untouched. Both cases
return -EACESS to the user. Returning SK_PASS will allow the msg to
be sent.
In the sendmsg case data is copied into kernel space buffers before
running the BPF program. The kernel space buffers are stored in a
scatterlist object where each element is a kernel memory buffer.
Some effort is made to coalesce data from the sendmsg call here.
For example a sendmsg call with many one byte iov entries will
likely be pushed into a single entry. The BPF program is run with
data pointers (start/end) pointing to the first sg element.
In the sendpage case data is not copied. We opt not to copy the
data by default here, because the BPF infrastructure does not
know what bytes will be needed nor when they will be needed. So
copying all bytes may be wasteful. Because of this the initial
start/end data pointers are (0,0). Meaning no data can be read or
written. This avoids reading data that may be modified by the
user. A new helper is added later in this series if reading and
writing the data is needed. The helper call will do a copy by
default so that the page is exclusively owned by the BPF call.
The verdict from the BPF_PROG_TYPE_SK_MSG applies to the entire msg
in the sendmsg() case and the entire page/offset in the sendpage case.
This avoids ambiguity on how to handle mixed return codes in the
sendmsg case. Again a helper is added later in the series if
a verdict needs to apply to multiple system calls and/or only
a subpart of the currently being processed message.
The helper msg_redirect_map() can be used to select the socket to
send the data on. This is used similar to existing redirect use
cases. This allows policy to redirect msgs.
Pseudo code simple example:
The basic logic to attach a program to a socket is as follows,
// load the programs
bpf_prog_load(SOCKMAP_TCP_MSG_PROG, BPF_PROG_TYPE_SK_MSG,
&obj, &msg_prog);
// lookup the sockmap
bpf_map_msg = bpf_object__find_map_by_name(obj, "my_sock_map");
// get fd for sockmap
map_fd_msg = bpf_map__fd(bpf_map_msg);
// attach program to sockmap
bpf_prog_attach(msg_prog, map_fd_msg, BPF_SK_MSG_VERDICT, 0);
Adding sockets to the map is done in the normal way,
// Add a socket 'fd' to sockmap at location 'i'
bpf_map_update_elem(map_fd_msg, &i, fd, BPF_ANY);
After the above any socket attached to "my_sock_map", in this case
'fd', will run the BPF msg verdict program (msg_prog) on every
sendmsg and sendpage system call.
For a complete example see BPF selftests or sockmap samples.
Implementation notes:
It seemed the simplest, to me at least, to use a refcnt to ensure
psock is not lost across the sendmsg copy into the sg, the bpf program
running on the data in sg_data, and the final pass to the TCP stack.
Some performance testing may show a better method to do this and avoid
the refcnt cost, but for now use the simpler method.
Another item that will come after basic support is in place is
supporting MSG_MORE flag. At the moment we call sendpages even if
the MSG_MORE flag is set. An enhancement would be to collect the
pages into a larger scatterlist and pass down the stack. Notice that
bpf_tcp_sendmsg() could support this with some additional state saved
across sendmsg calls. I built the code to support this without having
to do refactoring work. Other features TBD include ZEROCOPY and the
TCP_RECV_QUEUE/TCP_NO_QUEUE support. This will follow initial series
shortly.
Future work could improve size limits on the scatterlist rings used
here. Currently, we use MAX_SKB_FRAGS simply because this was being
used already in the TLS case. Future work could extend the kernel sk
APIs to tune this depending on workload. This is a trade-off
between memory usage and throughput performance.
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Acked-by: David S. Miller <davem@davemloft.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-03-19 02:57:10 +07:00
|
|
|
BPF_PROG_TYPE_SK_MSG,
|
2018-03-29 02:05:37 +07:00
|
|
|
BPF_PROG_TYPE_RAW_TRACEPOINT,
|
2018-03-31 05:08:02 +07:00
|
|
|
BPF_PROG_TYPE_CGROUP_SOCK_ADDR,
|
ipv6: sr: Add seg6local action End.BPF
This patch adds the End.BPF action to the LWT seg6local infrastructure.
This action works like any other seg6local End action, meaning that an IPv6
header with SRH is needed, whose DA has to be equal to the SID of the
action. It will also advance the SRH to the next segment, the BPF program
does not have to take care of this.
Since the BPF program may not be a source of instability in the kernel, it
is important to ensure that the integrity of the packet is maintained
before yielding it back to the IPv6 layer. The hook hence keeps track if
the SRH has been altered through the helpers, and re-validates its
content if needed with seg6_validate_srh. The state kept for validation is
stored in a per-CPU buffer. The BPF program is not allowed to directly
write into the packet, and only some fields of the SRH can be altered
through the helper bpf_lwt_seg6_store_bytes.
Performances profiling has shown that the SRH re-validation does not induce
a significant overhead. If the altered SRH is deemed as invalid, the packet
is dropped.
This validation is also done before executing any action through
bpf_lwt_seg6_action, and will not be performed again if the SRH is not
modified after calling the action.
The BPF program may return 3 types of return codes:
- BPF_OK: the End.BPF action will look up the next destination through
seg6_lookup_nexthop.
- BPF_REDIRECT: if an action has been executed through the
bpf_lwt_seg6_action helper, the BPF program should return this
value, as the skb's destination is already set and the default
lookup should not be performed.
- BPF_DROP : the packet will be dropped.
Signed-off-by: Mathieu Xhonneux <m.xhonneux@gmail.com>
Acked-by: David Lebrun <dlebrun@google.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-20 20:58:16 +07:00
|
|
|
BPF_PROG_TYPE_LWT_SEG6LOCAL,
|
2018-05-27 18:24:09 +07:00
|
|
|
BPF_PROG_TYPE_LIRC_MODE2,
|
bpf: Introduce BPF_PROG_TYPE_SK_REUSEPORT
This patch adds a BPF_PROG_TYPE_SK_REUSEPORT which can select
a SO_REUSEPORT sk from a BPF_MAP_TYPE_REUSEPORT_ARRAY. Like other
non SK_FILTER/CGROUP_SKB program, it requires CAP_SYS_ADMIN.
BPF_PROG_TYPE_SK_REUSEPORT introduces "struct sk_reuseport_kern"
to store the bpf context instead of using the skb->cb[48].
At the SO_REUSEPORT sk lookup time, it is in the middle of transiting
from a lower layer (ipv4/ipv6) to a upper layer (udp/tcp). At this
point, it is not always clear where the bpf context can be appended
in the skb->cb[48] to avoid saving-and-restoring cb[]. Even putting
aside the difference between ipv4-vs-ipv6 and udp-vs-tcp. It is not
clear if the lower layer is only ipv4 and ipv6 in the future and
will it not touch the cb[] again before transiting to the upper
layer.
For example, in udp_gro_receive(), it uses the 48 byte NAPI_GRO_CB
instead of IP[6]CB and it may still modify the cb[] after calling
the udp[46]_lib_lookup_skb(). Because of the above reason, if
sk->cb is used for the bpf ctx, saving-and-restoring is needed
and likely the whole 48 bytes cb[] has to be saved and restored.
Instead of saving, setting and restoring the cb[], this patch opts
to create a new "struct sk_reuseport_kern" and setting the needed
values in there.
The new BPF_PROG_TYPE_SK_REUSEPORT and "struct sk_reuseport_(kern|md)"
will serve all ipv4/ipv6 + udp/tcp combinations. There is no protocol
specific usage at this point and it is also inline with the current
sock_reuseport.c implementation (i.e. no protocol specific requirement).
In "struct sk_reuseport_md", this patch exposes data/data_end/len
with semantic similar to other existing usages. Together
with "bpf_skb_load_bytes()" and "bpf_skb_load_bytes_relative()",
the bpf prog can peek anywhere in the skb. The "bind_inany" tells
the bpf prog that the reuseport group is bind-ed to a local
INANY address which cannot be learned from skb.
The new "bind_inany" is added to "struct sock_reuseport" which will be
used when running the new "BPF_PROG_TYPE_SK_REUSEPORT" bpf prog in order
to avoid repeating the "bind INANY" test on
"sk_v6_rcv_saddr/sk->sk_rcv_saddr" every time a bpf prog is run. It can
only be properly initialized when a "sk->sk_reuseport" enabled sk is
adding to a hashtable (i.e. during "reuseport_alloc()" and
"reuseport_add_sock()").
The new "sk_select_reuseport()" is the main helper that the
bpf prog will use to select a SO_REUSEPORT sk. It is the only function
that can use the new BPF_MAP_TYPE_REUSEPORT_ARRAY. As mentioned in
the earlier patch, the validity of a selected sk is checked in
run time in "sk_select_reuseport()". Doing the check in
verification time is difficult and inflexible (consider the map-in-map
use case). The runtime check is to compare the selected sk's reuseport_id
with the reuseport_id that we want. This helper will return -EXXX if the
selected sk cannot serve the incoming request (e.g. reuseport_id
not match). The bpf prog can decide if it wants to do SK_DROP as its
discretion.
When the bpf prog returns SK_PASS, the kernel will check if a
valid sk has been selected (i.e. "reuse_kern->selected_sk != NULL").
If it does , it will use the selected sk. If not, the kernel
will select one from "reuse->socks[]" (as before this patch).
The SK_DROP and SK_PASS handling logic will be in the next patch.
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-08-08 15:01:25 +07:00
|
|
|
BPF_PROG_TYPE_SK_REUSEPORT,
|
2018-09-14 21:46:18 +07:00
|
|
|
BPF_PROG_TYPE_FLOW_DISSECTOR,
|
2014-09-26 14:17:00 +07:00
|
|
|
};
|
|
|
|
|
2016-11-23 22:52:25 +07:00
|
|
|
enum bpf_attach_type {
|
|
|
|
BPF_CGROUP_INET_INGRESS,
|
|
|
|
BPF_CGROUP_INET_EGRESS,
|
2016-12-01 23:48:04 +07:00
|
|
|
BPF_CGROUP_INET_SOCK_CREATE,
|
bpf: BPF support for sock_ops
Created a new BPF program type, BPF_PROG_TYPE_SOCK_OPS, and a corresponding
struct that allows BPF programs of this type to access some of the
socket's fields (such as IP addresses, ports, etc.). It uses the
existing bpf cgroups infrastructure so the programs can be attached per
cgroup with full inheritance support. The program will be called at
appropriate times to set relevant connections parameters such as buffer
sizes, SYN and SYN-ACK RTOs, etc., based on connection information such
as IP addresses, port numbers, etc.
Alghough there are already 3 mechanisms to set parameters (sysctls,
route metrics and setsockopts), this new mechanism provides some
distinct advantages. Unlike sysctls, it can set parameters per
connection. In contrast to route metrics, it can also use port numbers
and information provided by a user level program. In addition, it could
set parameters probabilistically for evaluation purposes (i.e. do
something different on 10% of the flows and compare results with the
other 90% of the flows). Also, in cases where IPv6 addresses contain
geographic information, the rules to make changes based on the distance
(or RTT) between the hosts are much easier than route metric rules and
can be global. Finally, unlike setsockopt, it oes not require
application changes and it can be updated easily at any time.
Although the bpf cgroup framework already contains a sock related
program type (BPF_PROG_TYPE_CGROUP_SOCK), I created the new type
(BPF_PROG_TYPE_SOCK_OPS) beccause the existing type expects to be called
only once during the connections's lifetime. In contrast, the new
program type will be called multiple times from different places in the
network stack code. For example, before sending SYN and SYN-ACKs to set
an appropriate timeout, when the connection is established to set
congestion control, etc. As a result it has "op" field to specify the
type of operation requested.
The purpose of this new program type is to simplify setting connection
parameters, such as buffer sizes, TCP's SYN RTO, etc. For example, it is
easy to use facebook's internal IPv6 addresses to determine if both hosts
of a connection are in the same datacenter. Therefore, it is easy to
write a BPF program to choose a small SYN RTO value when both hosts are
in the same datacenter.
This patch only contains the framework to support the new BPF program
type, following patches add the functionality to set various connection
parameters.
This patch defines a new BPF program type: BPF_PROG_TYPE_SOCKET_OPS
and a new bpf syscall command to load a new program of this type:
BPF_PROG_LOAD_SOCKET_OPS.
Two new corresponding structs (one for the kernel one for the user/BPF
program):
/* kernel version */
struct bpf_sock_ops_kern {
struct sock *sk;
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
};
/* user version
* Some fields are in network byte order reflecting the sock struct
* Use the bpf_ntohl helper macro in samples/bpf/bpf_endian.h to
* convert them to host byte order.
*/
struct bpf_sock_ops {
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
__u32 family;
__u32 remote_ip4; /* In network byte order */
__u32 local_ip4; /* In network byte order */
__u32 remote_ip6[4]; /* In network byte order */
__u32 local_ip6[4]; /* In network byte order */
__u32 remote_port; /* In network byte order */
__u32 local_port; /* In host byte horder */
};
Currently there are two types of ops. The first type expects the BPF
program to return a value which is then used by the caller (or a
negative value to indicate the operation is not supported). The second
type expects state changes to be done by the BPF program, for example
through a setsockopt BPF helper function, and they ignore the return
value.
The reply fields of the bpf_sockt_ops struct are there in case a bpf
program needs to return a value larger than an integer.
Signed-off-by: Lawrence Brakmo <brakmo@fb.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-07-01 10:02:40 +07:00
|
|
|
BPF_CGROUP_SOCK_OPS,
|
2017-08-28 21:10:04 +07:00
|
|
|
BPF_SK_SKB_STREAM_PARSER,
|
|
|
|
BPF_SK_SKB_STREAM_VERDICT,
|
2017-11-05 20:15:32 +07:00
|
|
|
BPF_CGROUP_DEVICE,
|
bpf: create tcp_bpf_ulp allowing BPF to monitor socket TX/RX data
This implements a BPF ULP layer to allow policy enforcement and
monitoring at the socket layer. In order to support this a new
program type BPF_PROG_TYPE_SK_MSG is used to run the policy at
the sendmsg/sendpage hook. To attach the policy to sockets a
sockmap is used with a new program attach type BPF_SK_MSG_VERDICT.
Similar to previous sockmap usages when a sock is added to a
sockmap, via a map update, if the map contains a BPF_SK_MSG_VERDICT
program type attached then the BPF ULP layer is created on the
socket and the attached BPF_PROG_TYPE_SK_MSG program is run for
every msg in sendmsg case and page/offset in sendpage case.
BPF_PROG_TYPE_SK_MSG Semantics/API:
BPF_PROG_TYPE_SK_MSG supports only two return codes SK_PASS and
SK_DROP. Returning SK_DROP free's the copied data in the sendmsg
case and in the sendpage case leaves the data untouched. Both cases
return -EACESS to the user. Returning SK_PASS will allow the msg to
be sent.
In the sendmsg case data is copied into kernel space buffers before
running the BPF program. The kernel space buffers are stored in a
scatterlist object where each element is a kernel memory buffer.
Some effort is made to coalesce data from the sendmsg call here.
For example a sendmsg call with many one byte iov entries will
likely be pushed into a single entry. The BPF program is run with
data pointers (start/end) pointing to the first sg element.
In the sendpage case data is not copied. We opt not to copy the
data by default here, because the BPF infrastructure does not
know what bytes will be needed nor when they will be needed. So
copying all bytes may be wasteful. Because of this the initial
start/end data pointers are (0,0). Meaning no data can be read or
written. This avoids reading data that may be modified by the
user. A new helper is added later in this series if reading and
writing the data is needed. The helper call will do a copy by
default so that the page is exclusively owned by the BPF call.
The verdict from the BPF_PROG_TYPE_SK_MSG applies to the entire msg
in the sendmsg() case and the entire page/offset in the sendpage case.
This avoids ambiguity on how to handle mixed return codes in the
sendmsg case. Again a helper is added later in the series if
a verdict needs to apply to multiple system calls and/or only
a subpart of the currently being processed message.
The helper msg_redirect_map() can be used to select the socket to
send the data on. This is used similar to existing redirect use
cases. This allows policy to redirect msgs.
Pseudo code simple example:
The basic logic to attach a program to a socket is as follows,
// load the programs
bpf_prog_load(SOCKMAP_TCP_MSG_PROG, BPF_PROG_TYPE_SK_MSG,
&obj, &msg_prog);
// lookup the sockmap
bpf_map_msg = bpf_object__find_map_by_name(obj, "my_sock_map");
// get fd for sockmap
map_fd_msg = bpf_map__fd(bpf_map_msg);
// attach program to sockmap
bpf_prog_attach(msg_prog, map_fd_msg, BPF_SK_MSG_VERDICT, 0);
Adding sockets to the map is done in the normal way,
// Add a socket 'fd' to sockmap at location 'i'
bpf_map_update_elem(map_fd_msg, &i, fd, BPF_ANY);
After the above any socket attached to "my_sock_map", in this case
'fd', will run the BPF msg verdict program (msg_prog) on every
sendmsg and sendpage system call.
For a complete example see BPF selftests or sockmap samples.
Implementation notes:
It seemed the simplest, to me at least, to use a refcnt to ensure
psock is not lost across the sendmsg copy into the sg, the bpf program
running on the data in sg_data, and the final pass to the TCP stack.
Some performance testing may show a better method to do this and avoid
the refcnt cost, but for now use the simpler method.
Another item that will come after basic support is in place is
supporting MSG_MORE flag. At the moment we call sendpages even if
the MSG_MORE flag is set. An enhancement would be to collect the
pages into a larger scatterlist and pass down the stack. Notice that
bpf_tcp_sendmsg() could support this with some additional state saved
across sendmsg calls. I built the code to support this without having
to do refactoring work. Other features TBD include ZEROCOPY and the
TCP_RECV_QUEUE/TCP_NO_QUEUE support. This will follow initial series
shortly.
Future work could improve size limits on the scatterlist rings used
here. Currently, we use MAX_SKB_FRAGS simply because this was being
used already in the TLS case. Future work could extend the kernel sk
APIs to tune this depending on workload. This is a trade-off
between memory usage and throughput performance.
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Acked-by: David S. Miller <davem@davemloft.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-03-19 02:57:10 +07:00
|
|
|
BPF_SK_MSG_VERDICT,
|
2018-03-31 05:08:02 +07:00
|
|
|
BPF_CGROUP_INET4_BIND,
|
|
|
|
BPF_CGROUP_INET6_BIND,
|
2018-03-31 05:08:05 +07:00
|
|
|
BPF_CGROUP_INET4_CONNECT,
|
|
|
|
BPF_CGROUP_INET6_CONNECT,
|
2018-03-31 05:08:07 +07:00
|
|
|
BPF_CGROUP_INET4_POST_BIND,
|
|
|
|
BPF_CGROUP_INET6_POST_BIND,
|
2018-05-25 22:55:23 +07:00
|
|
|
BPF_CGROUP_UDP4_SENDMSG,
|
|
|
|
BPF_CGROUP_UDP6_SENDMSG,
|
2018-05-27 18:24:09 +07:00
|
|
|
BPF_LIRC_MODE2,
|
2018-09-14 21:46:18 +07:00
|
|
|
BPF_FLOW_DISSECTOR,
|
2016-11-23 22:52:25 +07:00
|
|
|
__MAX_BPF_ATTACH_TYPE
|
|
|
|
};
|
|
|
|
|
|
|
|
#define MAX_BPF_ATTACH_TYPE __MAX_BPF_ATTACH_TYPE
|
|
|
|
|
2017-10-03 12:50:21 +07:00
|
|
|
/* cgroup-bpf attach flags used in BPF_PROG_ATTACH command
|
|
|
|
*
|
|
|
|
* NONE(default): No further bpf programs allowed in the subtree.
|
|
|
|
*
|
|
|
|
* BPF_F_ALLOW_OVERRIDE: If a sub-cgroup installs some bpf program,
|
|
|
|
* the program in this cgroup yields to sub-cgroup program.
|
|
|
|
*
|
|
|
|
* BPF_F_ALLOW_MULTI: If a sub-cgroup installs some bpf program,
|
|
|
|
* that cgroup program gets run in addition to the program in this cgroup.
|
|
|
|
*
|
|
|
|
* Only one program is allowed to be attached to a cgroup with
|
|
|
|
* NONE or BPF_F_ALLOW_OVERRIDE flag.
|
|
|
|
* Attaching another program on top of NONE or BPF_F_ALLOW_OVERRIDE will
|
|
|
|
* release old program and attach the new one. Attach flags has to match.
|
|
|
|
*
|
|
|
|
* Multiple programs are allowed to be attached to a cgroup with
|
|
|
|
* BPF_F_ALLOW_MULTI flag. They are executed in FIFO order
|
|
|
|
* (those that were attached first, run first)
|
|
|
|
* The programs of sub-cgroup are executed first, then programs of
|
|
|
|
* this cgroup and then programs of parent cgroup.
|
|
|
|
* When children program makes decision (like picking TCP CA or sock bind)
|
|
|
|
* parent program has a chance to override it.
|
|
|
|
*
|
|
|
|
* A cgroup with MULTI or OVERRIDE flag allows any attach flags in sub-cgroups.
|
|
|
|
* A cgroup with NONE doesn't allow any programs in sub-cgroups.
|
|
|
|
* Ex1:
|
|
|
|
* cgrp1 (MULTI progs A, B) ->
|
|
|
|
* cgrp2 (OVERRIDE prog C) ->
|
|
|
|
* cgrp3 (MULTI prog D) ->
|
|
|
|
* cgrp4 (OVERRIDE prog E) ->
|
|
|
|
* cgrp5 (NONE prog F)
|
|
|
|
* the event in cgrp5 triggers execution of F,D,A,B in that order.
|
|
|
|
* if prog F is detached, the execution is E,D,A,B
|
|
|
|
* if prog F and D are detached, the execution is E,A,B
|
|
|
|
* if prog F, E and D are detached, the execution is C,A,B
|
|
|
|
*
|
|
|
|
* All eligible programs are executed regardless of return code from
|
|
|
|
* earlier programs.
|
2017-02-11 11:28:24 +07:00
|
|
|
*/
|
|
|
|
#define BPF_F_ALLOW_OVERRIDE (1U << 0)
|
2017-10-03 12:50:21 +07:00
|
|
|
#define BPF_F_ALLOW_MULTI (1U << 1)
|
2017-02-11 11:28:24 +07:00
|
|
|
|
2017-05-11 01:38:07 +07:00
|
|
|
/* If BPF_F_STRICT_ALIGNMENT is used in BPF_PROG_LOAD command, the
|
|
|
|
* verifier will perform strict alignment checking as if the kernel
|
|
|
|
* has been built with CONFIG_EFFICIENT_UNALIGNED_ACCESS not set,
|
|
|
|
* and NET_IP_ALIGN defined to 2.
|
|
|
|
*/
|
|
|
|
#define BPF_F_STRICT_ALIGNMENT (1U << 0)
|
|
|
|
|
2018-12-01 12:08:14 +07:00
|
|
|
/* If BPF_F_ANY_ALIGNMENT is used in BPF_PROF_LOAD command, the
|
|
|
|
* verifier will allow any alignment whatsoever. On platforms
|
|
|
|
* with strict alignment requirements for loads ands stores (such
|
|
|
|
* as sparc and mips) the verifier validates that all loads and
|
|
|
|
* stores provably follow this requirement. This flag turns that
|
|
|
|
* checking and enforcement off.
|
|
|
|
*
|
|
|
|
* It is mostly used for testing when we want to validate the
|
|
|
|
* context and memory access aspects of the verifier, but because
|
|
|
|
* of an unaligned access the alignment check would trigger before
|
|
|
|
* the one we are interested in.
|
|
|
|
*/
|
|
|
|
#define BPF_F_ANY_ALIGNMENT (1U << 1)
|
|
|
|
|
bpf: implement lookup-free direct value access for maps
This generic extension to BPF maps allows for directly loading
an address residing inside a BPF map value as a single BPF
ldimm64 instruction!
The idea is similar to what BPF_PSEUDO_MAP_FD does today, which
is a special src_reg flag for ldimm64 instruction that indicates
that inside the first part of the double insns's imm field is a
file descriptor which the verifier then replaces as a full 64bit
address of the map into both imm parts. For the newly added
BPF_PSEUDO_MAP_VALUE src_reg flag, the idea is the following:
the first part of the double insns's imm field is again a file
descriptor corresponding to the map, and the second part of the
imm field is an offset into the value. The verifier will then
replace both imm parts with an address that points into the BPF
map value at the given value offset for maps that support this
operation. Currently supported is array map with single entry.
It is possible to support more than just single map element by
reusing both 16bit off fields of the insns as a map index, so
full array map lookup could be expressed that way. It hasn't
been implemented here due to lack of concrete use case, but
could easily be done so in future in a compatible way, since
both off fields right now have to be 0 and would correctly
denote a map index 0.
The BPF_PSEUDO_MAP_VALUE is a distinct flag as otherwise with
BPF_PSEUDO_MAP_FD we could not differ offset 0 between load of
map pointer versus load of map's value at offset 0, and changing
BPF_PSEUDO_MAP_FD's encoding into off by one to differ between
regular map pointer and map value pointer would add unnecessary
complexity and increases barrier for debugability thus less
suitable. Using the second part of the imm field as an offset
into the value does /not/ come with limitations since maximum
possible value size is in u32 universe anyway.
This optimization allows for efficiently retrieving an address
to a map value memory area without having to issue a helper call
which needs to prepare registers according to calling convention,
etc, without needing the extra NULL test, and without having to
add the offset in an additional instruction to the value base
pointer. The verifier then treats the destination register as
PTR_TO_MAP_VALUE with constant reg->off from the user passed
offset from the second imm field, and guarantees that this is
within bounds of the map value. Any subsequent operations are
normally treated as typical map value handling without anything
extra needed from verification side.
The two map operations for direct value access have been added to
array map for now. In future other types could be supported as
well depending on the use case. The main use case for this commit
is to allow for BPF loader support for global variables that
reside in .data/.rodata/.bss sections such that we can directly
load the address of them with minimal additional infrastructure
required. Loader support has been added in subsequent commits for
libbpf library.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-04-10 04:20:03 +07:00
|
|
|
/* When BPF ldimm64's insn[0].src_reg != 0 then this can have
|
|
|
|
* two extensions:
|
|
|
|
*
|
|
|
|
* insn[0].src_reg: BPF_PSEUDO_MAP_FD BPF_PSEUDO_MAP_VALUE
|
|
|
|
* insn[0].imm: map fd map fd
|
|
|
|
* insn[1].imm: 0 offset into value
|
|
|
|
* insn[0].off: 0 0
|
|
|
|
* insn[1].off: 0 0
|
|
|
|
* ldimm64 rewrite: address of map address of map[0]+offset
|
|
|
|
* verifier type: CONST_PTR_TO_MAP PTR_TO_MAP_VALUE
|
|
|
|
*/
|
2015-03-01 18:31:43 +07:00
|
|
|
#define BPF_PSEUDO_MAP_FD 1
|
bpf: implement lookup-free direct value access for maps
This generic extension to BPF maps allows for directly loading
an address residing inside a BPF map value as a single BPF
ldimm64 instruction!
The idea is similar to what BPF_PSEUDO_MAP_FD does today, which
is a special src_reg flag for ldimm64 instruction that indicates
that inside the first part of the double insns's imm field is a
file descriptor which the verifier then replaces as a full 64bit
address of the map into both imm parts. For the newly added
BPF_PSEUDO_MAP_VALUE src_reg flag, the idea is the following:
the first part of the double insns's imm field is again a file
descriptor corresponding to the map, and the second part of the
imm field is an offset into the value. The verifier will then
replace both imm parts with an address that points into the BPF
map value at the given value offset for maps that support this
operation. Currently supported is array map with single entry.
It is possible to support more than just single map element by
reusing both 16bit off fields of the insns as a map index, so
full array map lookup could be expressed that way. It hasn't
been implemented here due to lack of concrete use case, but
could easily be done so in future in a compatible way, since
both off fields right now have to be 0 and would correctly
denote a map index 0.
The BPF_PSEUDO_MAP_VALUE is a distinct flag as otherwise with
BPF_PSEUDO_MAP_FD we could not differ offset 0 between load of
map pointer versus load of map's value at offset 0, and changing
BPF_PSEUDO_MAP_FD's encoding into off by one to differ between
regular map pointer and map value pointer would add unnecessary
complexity and increases barrier for debugability thus less
suitable. Using the second part of the imm field as an offset
into the value does /not/ come with limitations since maximum
possible value size is in u32 universe anyway.
This optimization allows for efficiently retrieving an address
to a map value memory area without having to issue a helper call
which needs to prepare registers according to calling convention,
etc, without needing the extra NULL test, and without having to
add the offset in an additional instruction to the value base
pointer. The verifier then treats the destination register as
PTR_TO_MAP_VALUE with constant reg->off from the user passed
offset from the second imm field, and guarantees that this is
within bounds of the map value. Any subsequent operations are
normally treated as typical map value handling without anything
extra needed from verification side.
The two map operations for direct value access have been added to
array map for now. In future other types could be supported as
well depending on the use case. The main use case for this commit
is to allow for BPF loader support for global variables that
reside in .data/.rodata/.bss sections such that we can directly
load the address of them with minimal additional infrastructure
required. Loader support has been added in subsequent commits for
libbpf library.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-04-10 04:20:03 +07:00
|
|
|
#define BPF_PSEUDO_MAP_VALUE 2
|
2015-03-01 18:31:43 +07:00
|
|
|
|
2017-12-15 08:55:05 +07:00
|
|
|
/* when bpf_call->src_reg == BPF_PSEUDO_CALL, bpf_call->imm == pc-relative
|
|
|
|
* offset to another bpf function
|
|
|
|
*/
|
|
|
|
#define BPF_PSEUDO_CALL 1
|
|
|
|
|
bpf: add 'flags' attribute to BPF_MAP_UPDATE_ELEM command
the current meaning of BPF_MAP_UPDATE_ELEM syscall command is:
either update existing map element or create a new one.
Initially the plan was to add a new command to handle the case of
'create new element if it didn't exist', but 'flags' style looks
cleaner and overall diff is much smaller (more code reused), so add 'flags'
attribute to BPF_MAP_UPDATE_ELEM command with the following meaning:
#define BPF_ANY 0 /* create new element or update existing */
#define BPF_NOEXIST 1 /* create new element if it didn't exist */
#define BPF_EXIST 2 /* update existing element */
bpf_update_elem(fd, key, value, BPF_NOEXIST) call can fail with EEXIST
if element already exists.
bpf_update_elem(fd, key, value, BPF_EXIST) can fail with ENOENT
if element doesn't exist.
Userspace will call it as:
int bpf_update_elem(int fd, void *key, void *value, __u64 flags)
{
union bpf_attr attr = {
.map_fd = fd,
.key = ptr_to_u64(key),
.value = ptr_to_u64(value),
.flags = flags;
};
return bpf(BPF_MAP_UPDATE_ELEM, &attr, sizeof(attr));
}
First two bits of 'flags' are used to encode style of bpf_update_elem() command.
Bits 2-63 are reserved for future use.
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-11-14 08:36:44 +07:00
|
|
|
/* flags for BPF_MAP_UPDATE_ELEM command */
|
|
|
|
#define BPF_ANY 0 /* create new element or update existing */
|
|
|
|
#define BPF_NOEXIST 1 /* create new element if it didn't exist */
|
|
|
|
#define BPF_EXIST 2 /* update existing element */
|
2019-02-01 06:40:09 +07:00
|
|
|
#define BPF_F_LOCK 4 /* spin_lock-ed map_lookup/map_update */
|
bpf: add 'flags' attribute to BPF_MAP_UPDATE_ELEM command
the current meaning of BPF_MAP_UPDATE_ELEM syscall command is:
either update existing map element or create a new one.
Initially the plan was to add a new command to handle the case of
'create new element if it didn't exist', but 'flags' style looks
cleaner and overall diff is much smaller (more code reused), so add 'flags'
attribute to BPF_MAP_UPDATE_ELEM command with the following meaning:
#define BPF_ANY 0 /* create new element or update existing */
#define BPF_NOEXIST 1 /* create new element if it didn't exist */
#define BPF_EXIST 2 /* update existing element */
bpf_update_elem(fd, key, value, BPF_NOEXIST) call can fail with EEXIST
if element already exists.
bpf_update_elem(fd, key, value, BPF_EXIST) can fail with ENOENT
if element doesn't exist.
Userspace will call it as:
int bpf_update_elem(int fd, void *key, void *value, __u64 flags)
{
union bpf_attr attr = {
.map_fd = fd,
.key = ptr_to_u64(key),
.value = ptr_to_u64(value),
.flags = flags;
};
return bpf(BPF_MAP_UPDATE_ELEM, &attr, sizeof(attr));
}
First two bits of 'flags' are used to encode style of bpf_update_elem() command.
Bits 2-63 are reserved for future use.
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-11-14 08:36:44 +07:00
|
|
|
|
2017-08-19 01:28:00 +07:00
|
|
|
/* flags for BPF_MAP_CREATE command */
|
bpf: pre-allocate hash map elements
If kprobe is placed on spin_unlock then calling kmalloc/kfree from
bpf programs is not safe, since the following dead lock is possible:
kfree->spin_lock(kmem_cache_node->lock)...spin_unlock->kprobe->
bpf_prog->map_update->kmalloc->spin_lock(of the same kmem_cache_node->lock)
and deadlocks.
The following solutions were considered and some implemented, but
eventually discarded
- kmem_cache_create for every map
- add recursion check to slow-path of slub
- use reserved memory in bpf_map_update for in_irq or in preempt_disabled
- kmalloc via irq_work
At the end pre-allocation of all map elements turned out to be the simplest
solution and since the user is charged upfront for all the memory, such
pre-allocation doesn't affect the user space visible behavior.
Since it's impossible to tell whether kprobe is triggered in a safe
location from kmalloc point of view, use pre-allocation by default
and introduce new BPF_F_NO_PREALLOC flag.
While testing of per-cpu hash maps it was discovered
that alloc_percpu(GFP_ATOMIC) has odd corner cases and often
fails to allocate memory even when 90% of it is free.
The pre-allocation of per-cpu hash elements solves this problem as well.
Turned out that bpf_map_update() quickly followed by
bpf_map_lookup()+bpf_map_delete() is very common pattern used
in many of iovisor/bcc/tools, so there is additional benefit of
pre-allocation, since such use cases are must faster.
Since all hash map elements are now pre-allocated we can remove
atomic increment of htab->count and save few more cycles.
Also add bpf_map_precharge_memlock() to check rlimit_memlock early to avoid
large malloc/free done by users who don't have sufficient limits.
Pre-allocation is done with vmalloc and alloc/free is done
via percpu_freelist. Here are performance numbers for different
pre-allocation algorithms that were implemented, but discarded
in favor of percpu_freelist:
1 cpu:
pcpu_ida 2.1M
pcpu_ida nolock 2.3M
bt 2.4M
kmalloc 1.8M
hlist+spinlock 2.3M
pcpu_freelist 2.6M
4 cpu:
pcpu_ida 1.5M
pcpu_ida nolock 1.8M
bt w/smp_align 1.7M
bt no/smp_align 1.1M
kmalloc 0.7M
hlist+spinlock 0.2M
pcpu_freelist 2.0M
8 cpu:
pcpu_ida 0.7M
bt w/smp_align 0.8M
kmalloc 0.4M
pcpu_freelist 1.5M
32 cpu:
kmalloc 0.13M
pcpu_freelist 0.49M
pcpu_ida nolock is a modified percpu_ida algorithm without
percpu_ida_cpu locks and without cross-cpu tag stealing.
It's faster than existing percpu_ida, but not as fast as pcpu_freelist.
bt is a variant of block/blk-mq-tag.c simlified and customized
for bpf use case. bt w/smp_align is using cache line for every 'long'
(similar to blk-mq-tag). bt no/smp_align allocates 'long'
bitmasks continuously to save memory. It's comparable to percpu_ida
and in some cases faster, but slower than percpu_freelist
hlist+spinlock is the simplest free list with single spinlock.
As expeceted it has very bad scaling in SMP.
kmalloc is existing implementation which is still available via
BPF_F_NO_PREALLOC flag. It's significantly slower in single cpu and
in 8 cpu setup it's 3 times slower than pre-allocation with pcpu_freelist,
but saves memory, so in cases where map->max_entries can be large
and number of map update/delete per second is low, it may make
sense to use it.
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-03-08 12:57:15 +07:00
|
|
|
#define BPF_F_NO_PREALLOC (1U << 0)
|
2016-11-12 01:55:09 +07:00
|
|
|
/* Instead of having one common LRU list in the
|
2016-11-12 01:55:10 +07:00
|
|
|
* BPF_MAP_TYPE_LRU_[PERCPU_]HASH map, use a percpu LRU list
|
2016-11-12 01:55:09 +07:00
|
|
|
* which can scale and perform better.
|
|
|
|
* Note, the LRU nodes (including free nodes) cannot be moved
|
|
|
|
* across different LRU lists.
|
|
|
|
*/
|
|
|
|
#define BPF_F_NO_COMMON_LRU (1U << 1)
|
2017-08-19 01:28:00 +07:00
|
|
|
/* Specify numa node during map creation */
|
|
|
|
#define BPF_F_NUMA_NODE (1U << 2)
|
bpf: pre-allocate hash map elements
If kprobe is placed on spin_unlock then calling kmalloc/kfree from
bpf programs is not safe, since the following dead lock is possible:
kfree->spin_lock(kmem_cache_node->lock)...spin_unlock->kprobe->
bpf_prog->map_update->kmalloc->spin_lock(of the same kmem_cache_node->lock)
and deadlocks.
The following solutions were considered and some implemented, but
eventually discarded
- kmem_cache_create for every map
- add recursion check to slow-path of slub
- use reserved memory in bpf_map_update for in_irq or in preempt_disabled
- kmalloc via irq_work
At the end pre-allocation of all map elements turned out to be the simplest
solution and since the user is charged upfront for all the memory, such
pre-allocation doesn't affect the user space visible behavior.
Since it's impossible to tell whether kprobe is triggered in a safe
location from kmalloc point of view, use pre-allocation by default
and introduce new BPF_F_NO_PREALLOC flag.
While testing of per-cpu hash maps it was discovered
that alloc_percpu(GFP_ATOMIC) has odd corner cases and often
fails to allocate memory even when 90% of it is free.
The pre-allocation of per-cpu hash elements solves this problem as well.
Turned out that bpf_map_update() quickly followed by
bpf_map_lookup()+bpf_map_delete() is very common pattern used
in many of iovisor/bcc/tools, so there is additional benefit of
pre-allocation, since such use cases are must faster.
Since all hash map elements are now pre-allocated we can remove
atomic increment of htab->count and save few more cycles.
Also add bpf_map_precharge_memlock() to check rlimit_memlock early to avoid
large malloc/free done by users who don't have sufficient limits.
Pre-allocation is done with vmalloc and alloc/free is done
via percpu_freelist. Here are performance numbers for different
pre-allocation algorithms that were implemented, but discarded
in favor of percpu_freelist:
1 cpu:
pcpu_ida 2.1M
pcpu_ida nolock 2.3M
bt 2.4M
kmalloc 1.8M
hlist+spinlock 2.3M
pcpu_freelist 2.6M
4 cpu:
pcpu_ida 1.5M
pcpu_ida nolock 1.8M
bt w/smp_align 1.7M
bt no/smp_align 1.1M
kmalloc 0.7M
hlist+spinlock 0.2M
pcpu_freelist 2.0M
8 cpu:
pcpu_ida 0.7M
bt w/smp_align 0.8M
kmalloc 0.4M
pcpu_freelist 1.5M
32 cpu:
kmalloc 0.13M
pcpu_freelist 0.49M
pcpu_ida nolock is a modified percpu_ida algorithm without
percpu_ida_cpu locks and without cross-cpu tag stealing.
It's faster than existing percpu_ida, but not as fast as pcpu_freelist.
bt is a variant of block/blk-mq-tag.c simlified and customized
for bpf use case. bt w/smp_align is using cache line for every 'long'
(similar to blk-mq-tag). bt no/smp_align allocates 'long'
bitmasks continuously to save memory. It's comparable to percpu_ida
and in some cases faster, but slower than percpu_freelist
hlist+spinlock is the simplest free list with single spinlock.
As expeceted it has very bad scaling in SMP.
kmalloc is existing implementation which is still available via
BPF_F_NO_PREALLOC flag. It's significantly slower in single cpu and
in 8 cpu setup it's 3 times slower than pre-allocation with pcpu_freelist,
but saves memory, so in cases where map->max_entries can be large
and number of map update/delete per second is low, it may make
sense to use it.
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-03-08 12:57:15 +07:00
|
|
|
|
2017-09-28 04:37:52 +07:00
|
|
|
#define BPF_OBJ_NAME_LEN 16U
|
|
|
|
|
bpf: add program side {rd, wr}only support for maps
This work adds two new map creation flags BPF_F_RDONLY_PROG
and BPF_F_WRONLY_PROG in order to allow for read-only or
write-only BPF maps from a BPF program side.
Today we have BPF_F_RDONLY and BPF_F_WRONLY, but this only
applies to system call side, meaning the BPF program has full
read/write access to the map as usual while bpf(2) calls with
map fd can either only read or write into the map depending
on the flags. BPF_F_RDONLY_PROG and BPF_F_WRONLY_PROG allows
for the exact opposite such that verifier is going to reject
program loads if write into a read-only map or a read into a
write-only map is detected. For read-only map case also some
helpers are forbidden for programs that would alter the map
state such as map deletion, update, etc. As opposed to the two
BPF_F_RDONLY / BPF_F_WRONLY flags, BPF_F_RDONLY_PROG as well
as BPF_F_WRONLY_PROG really do correspond to the map lifetime.
We've enabled this generic map extension to various non-special
maps holding normal user data: array, hash, lru, lpm, local
storage, queue and stack. Further generic map types could be
followed up in future depending on use-case. Main use case
here is to forbid writes into .rodata map values from verifier
side.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-04-10 04:20:05 +07:00
|
|
|
/* Flags for accessing BPF object from syscall side. */
|
2017-10-19 03:00:22 +07:00
|
|
|
#define BPF_F_RDONLY (1U << 3)
|
|
|
|
#define BPF_F_WRONLY (1U << 4)
|
|
|
|
|
bpf: extend stackmap to save binary_build_id+offset instead of address
Currently, bpf stackmap store address for each entry in the call trace.
To map these addresses to user space files, it is necessary to maintain
the mapping from these virtual address to symbols in the binary. Usually,
the user space profiler (such as perf) has to scan /proc/pid/maps at the
beginning of profiling, and monitor mmap2() calls afterwards. Given the
cost of maintaining the address map, this solution is not practical for
system wide profiling that is always on.
This patch tries to solve this problem with a variation of stackmap. This
variation is enabled by flag BPF_F_STACK_BUILD_ID. Instead of storing
addresses, the variation stores ELF file build_id + offset.
Build ID is a 20-byte unique identifier for ELF files. The following
command shows the Build ID of /bin/bash:
[user@]$ readelf -n /bin/bash
...
Build ID: XXXXXXXXXX
...
With BPF_F_STACK_BUILD_ID, bpf_get_stackid() tries to parse Build ID
for each entry in the call trace, and translate it into the following
struct:
struct bpf_stack_build_id_offset {
__s32 status;
unsigned char build_id[BPF_BUILD_ID_SIZE];
union {
__u64 offset;
__u64 ip;
};
};
The search of build_id is limited to the first page of the file, and this
page should be in page cache. Otherwise, we fallback to store ip for this
entry (ip field in struct bpf_stack_build_id_offset). This requires the
build_id to be stored in the first page. A quick survey of binary and
dynamic library files in a few different systems shows that almost all
binary and dynamic library files have build_id in the first page.
Build_id is only meaningful for user stack. If a kernel stack is added to
a stackmap with BPF_F_STACK_BUILD_ID, it will automatically fallback to
only store ip (status == BPF_STACK_BUILD_ID_IP). Similarly, if build_id
lookup failed for some reason, it will also fallback to store ip.
User space can access struct bpf_stack_build_id_offset with bpf
syscall BPF_MAP_LOOKUP_ELEM. It is necessary for user space to
maintain mapping from build id to binary files. This mostly static
mapping is much easier to maintain than per process address maps.
Note: Stackmap with build_id only works in non-nmi context at this time.
This is because we need to take mm->mmap_sem for find_vma(). If this
changes, we would like to allow build_id lookup in nmi context.
Signed-off-by: Song Liu <songliubraving@fb.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-03-15 00:23:21 +07:00
|
|
|
/* Flag for stack_map, store build_id+offset instead of pointer */
|
|
|
|
#define BPF_F_STACK_BUILD_ID (1U << 5)
|
|
|
|
|
2018-11-16 18:41:08 +07:00
|
|
|
/* Zero-initialize hash function seed. This should only be used for testing. */
|
|
|
|
#define BPF_F_ZERO_SEED (1U << 6)
|
|
|
|
|
bpf: add program side {rd, wr}only support for maps
This work adds two new map creation flags BPF_F_RDONLY_PROG
and BPF_F_WRONLY_PROG in order to allow for read-only or
write-only BPF maps from a BPF program side.
Today we have BPF_F_RDONLY and BPF_F_WRONLY, but this only
applies to system call side, meaning the BPF program has full
read/write access to the map as usual while bpf(2) calls with
map fd can either only read or write into the map depending
on the flags. BPF_F_RDONLY_PROG and BPF_F_WRONLY_PROG allows
for the exact opposite such that verifier is going to reject
program loads if write into a read-only map or a read into a
write-only map is detected. For read-only map case also some
helpers are forbidden for programs that would alter the map
state such as map deletion, update, etc. As opposed to the two
BPF_F_RDONLY / BPF_F_WRONLY flags, BPF_F_RDONLY_PROG as well
as BPF_F_WRONLY_PROG really do correspond to the map lifetime.
We've enabled this generic map extension to various non-special
maps holding normal user data: array, hash, lru, lpm, local
storage, queue and stack. Further generic map types could be
followed up in future depending on use-case. Main use case
here is to forbid writes into .rodata map values from verifier
side.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-04-10 04:20:05 +07:00
|
|
|
/* Flags for accessing BPF object from program side. */
|
|
|
|
#define BPF_F_RDONLY_PROG (1U << 7)
|
|
|
|
#define BPF_F_WRONLY_PROG (1U << 8)
|
|
|
|
|
2018-11-16 18:41:09 +07:00
|
|
|
/* flags for BPF_PROG_QUERY */
|
|
|
|
#define BPF_F_QUERY_EFFECTIVE (1U << 0)
|
|
|
|
|
bpf: extend stackmap to save binary_build_id+offset instead of address
Currently, bpf stackmap store address for each entry in the call trace.
To map these addresses to user space files, it is necessary to maintain
the mapping from these virtual address to symbols in the binary. Usually,
the user space profiler (such as perf) has to scan /proc/pid/maps at the
beginning of profiling, and monitor mmap2() calls afterwards. Given the
cost of maintaining the address map, this solution is not practical for
system wide profiling that is always on.
This patch tries to solve this problem with a variation of stackmap. This
variation is enabled by flag BPF_F_STACK_BUILD_ID. Instead of storing
addresses, the variation stores ELF file build_id + offset.
Build ID is a 20-byte unique identifier for ELF files. The following
command shows the Build ID of /bin/bash:
[user@]$ readelf -n /bin/bash
...
Build ID: XXXXXXXXXX
...
With BPF_F_STACK_BUILD_ID, bpf_get_stackid() tries to parse Build ID
for each entry in the call trace, and translate it into the following
struct:
struct bpf_stack_build_id_offset {
__s32 status;
unsigned char build_id[BPF_BUILD_ID_SIZE];
union {
__u64 offset;
__u64 ip;
};
};
The search of build_id is limited to the first page of the file, and this
page should be in page cache. Otherwise, we fallback to store ip for this
entry (ip field in struct bpf_stack_build_id_offset). This requires the
build_id to be stored in the first page. A quick survey of binary and
dynamic library files in a few different systems shows that almost all
binary and dynamic library files have build_id in the first page.
Build_id is only meaningful for user stack. If a kernel stack is added to
a stackmap with BPF_F_STACK_BUILD_ID, it will automatically fallback to
only store ip (status == BPF_STACK_BUILD_ID_IP). Similarly, if build_id
lookup failed for some reason, it will also fallback to store ip.
User space can access struct bpf_stack_build_id_offset with bpf
syscall BPF_MAP_LOOKUP_ELEM. It is necessary for user space to
maintain mapping from build id to binary files. This mostly static
mapping is much easier to maintain than per process address maps.
Note: Stackmap with build_id only works in non-nmi context at this time.
This is because we need to take mm->mmap_sem for find_vma(). If this
changes, we would like to allow build_id lookup in nmi context.
Signed-off-by: Song Liu <songliubraving@fb.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-03-15 00:23:21 +07:00
|
|
|
enum bpf_stack_build_id_status {
|
|
|
|
/* user space need an empty entry to identify end of a trace */
|
|
|
|
BPF_STACK_BUILD_ID_EMPTY = 0,
|
|
|
|
/* with valid build_id and offset */
|
|
|
|
BPF_STACK_BUILD_ID_VALID = 1,
|
|
|
|
/* couldn't get build_id, fallback to ip */
|
|
|
|
BPF_STACK_BUILD_ID_IP = 2,
|
|
|
|
};
|
|
|
|
|
|
|
|
#define BPF_BUILD_ID_SIZE 20
|
|
|
|
struct bpf_stack_build_id {
|
|
|
|
__s32 status;
|
|
|
|
unsigned char build_id[BPF_BUILD_ID_SIZE];
|
|
|
|
union {
|
|
|
|
__u64 offset;
|
|
|
|
__u64 ip;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2014-09-26 14:16:57 +07:00
|
|
|
union bpf_attr {
|
|
|
|
struct { /* anonymous struct used by BPF_MAP_CREATE command */
|
|
|
|
__u32 map_type; /* one of enum bpf_map_type */
|
|
|
|
__u32 key_size; /* size of key in bytes */
|
|
|
|
__u32 value_size; /* size of value in bytes */
|
|
|
|
__u32 max_entries; /* max number of entries in a map */
|
2017-08-19 01:28:00 +07:00
|
|
|
__u32 map_flags; /* BPF_MAP_CREATE related
|
|
|
|
* flags defined above.
|
|
|
|
*/
|
2017-03-23 00:00:33 +07:00
|
|
|
__u32 inner_map_fd; /* fd pointing to the inner map */
|
2017-08-19 01:28:00 +07:00
|
|
|
__u32 numa_node; /* numa node (effective only if
|
|
|
|
* BPF_F_NUMA_NODE is set).
|
|
|
|
*/
|
2017-10-06 11:52:12 +07:00
|
|
|
char map_name[BPF_OBJ_NAME_LEN];
|
2018-01-12 11:29:09 +07:00
|
|
|
__u32 map_ifindex; /* ifindex of netdev to create on */
|
2018-04-19 05:56:03 +07:00
|
|
|
__u32 btf_fd; /* fd pointing to a BTF type data */
|
2018-05-23 04:57:21 +07:00
|
|
|
__u32 btf_key_type_id; /* BTF type_id of the key */
|
|
|
|
__u32 btf_value_type_id; /* BTF type_id of the value */
|
2014-09-26 14:16:57 +07:00
|
|
|
};
|
bpf: add lookup/update/delete/iterate methods to BPF maps
'maps' is a generic storage of different types for sharing data between kernel
and userspace.
The maps are accessed from user space via BPF syscall, which has commands:
- create a map with given type and attributes
fd = bpf(BPF_MAP_CREATE, union bpf_attr *attr, u32 size)
returns fd or negative error
- lookup key in a given map referenced by fd
err = bpf(BPF_MAP_LOOKUP_ELEM, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key, attr->value
returns zero and stores found elem into value or negative error
- create or update key/value pair in a given map
err = bpf(BPF_MAP_UPDATE_ELEM, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key, attr->value
returns zero or negative error
- find and delete element by key in a given map
err = bpf(BPF_MAP_DELETE_ELEM, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key
- iterate map elements (based on input key return next_key)
err = bpf(BPF_MAP_GET_NEXT_KEY, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key, attr->next_key
- close(fd) deletes the map
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-26 14:16:59 +07:00
|
|
|
|
|
|
|
struct { /* anonymous struct used by BPF_MAP_*_ELEM commands */
|
|
|
|
__u32 map_fd;
|
|
|
|
__aligned_u64 key;
|
|
|
|
union {
|
|
|
|
__aligned_u64 value;
|
|
|
|
__aligned_u64 next_key;
|
|
|
|
};
|
bpf: add 'flags' attribute to BPF_MAP_UPDATE_ELEM command
the current meaning of BPF_MAP_UPDATE_ELEM syscall command is:
either update existing map element or create a new one.
Initially the plan was to add a new command to handle the case of
'create new element if it didn't exist', but 'flags' style looks
cleaner and overall diff is much smaller (more code reused), so add 'flags'
attribute to BPF_MAP_UPDATE_ELEM command with the following meaning:
#define BPF_ANY 0 /* create new element or update existing */
#define BPF_NOEXIST 1 /* create new element if it didn't exist */
#define BPF_EXIST 2 /* update existing element */
bpf_update_elem(fd, key, value, BPF_NOEXIST) call can fail with EEXIST
if element already exists.
bpf_update_elem(fd, key, value, BPF_EXIST) can fail with ENOENT
if element doesn't exist.
Userspace will call it as:
int bpf_update_elem(int fd, void *key, void *value, __u64 flags)
{
union bpf_attr attr = {
.map_fd = fd,
.key = ptr_to_u64(key),
.value = ptr_to_u64(value),
.flags = flags;
};
return bpf(BPF_MAP_UPDATE_ELEM, &attr, sizeof(attr));
}
First two bits of 'flags' are used to encode style of bpf_update_elem() command.
Bits 2-63 are reserved for future use.
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-11-14 08:36:44 +07:00
|
|
|
__u64 flags;
|
bpf: add lookup/update/delete/iterate methods to BPF maps
'maps' is a generic storage of different types for sharing data between kernel
and userspace.
The maps are accessed from user space via BPF syscall, which has commands:
- create a map with given type and attributes
fd = bpf(BPF_MAP_CREATE, union bpf_attr *attr, u32 size)
returns fd or negative error
- lookup key in a given map referenced by fd
err = bpf(BPF_MAP_LOOKUP_ELEM, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key, attr->value
returns zero and stores found elem into value or negative error
- create or update key/value pair in a given map
err = bpf(BPF_MAP_UPDATE_ELEM, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key, attr->value
returns zero or negative error
- find and delete element by key in a given map
err = bpf(BPF_MAP_DELETE_ELEM, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key
- iterate map elements (based on input key return next_key)
err = bpf(BPF_MAP_GET_NEXT_KEY, union bpf_attr *attr, u32 size)
using attr->map_fd, attr->key, attr->next_key
- close(fd) deletes the map
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-26 14:16:59 +07:00
|
|
|
};
|
2014-09-26 14:17:00 +07:00
|
|
|
|
|
|
|
struct { /* anonymous struct used by BPF_PROG_LOAD command */
|
|
|
|
__u32 prog_type; /* one of enum bpf_prog_type */
|
|
|
|
__u32 insn_cnt;
|
|
|
|
__aligned_u64 insns;
|
|
|
|
__aligned_u64 license;
|
bpf: verifier (add ability to receive verification log)
add optional attributes for BPF_PROG_LOAD syscall:
union bpf_attr {
struct {
...
__u32 log_level; /* verbosity level of eBPF verifier */
__u32 log_size; /* size of user buffer */
__aligned_u64 log_buf; /* user supplied 'char *buffer' */
};
};
when log_level > 0 the verifier will return its verification log in the user
supplied buffer 'log_buf' which can be used by program author to analyze why
verifier rejected given program.
'Understanding eBPF verifier messages' section of Documentation/networking/filter.txt
provides several examples of these messages, like the program:
BPF_ST_MEM(BPF_DW, BPF_REG_10, -8, 0),
BPF_MOV64_REG(BPF_REG_2, BPF_REG_10),
BPF_ALU64_IMM(BPF_ADD, BPF_REG_2, -8),
BPF_LD_MAP_FD(BPF_REG_1, 0),
BPF_CALL_FUNC(BPF_FUNC_map_lookup_elem),
BPF_JMP_IMM(BPF_JEQ, BPF_REG_0, 0, 1),
BPF_ST_MEM(BPF_DW, BPF_REG_0, 4, 0),
BPF_EXIT_INSN(),
will be rejected with the following multi-line message in log_buf:
0: (7a) *(u64 *)(r10 -8) = 0
1: (bf) r2 = r10
2: (07) r2 += -8
3: (b7) r1 = 0
4: (85) call 1
5: (15) if r0 == 0x0 goto pc+1
R0=map_ptr R10=fp
6: (7a) *(u64 *)(r0 +4) = 0
misaligned access off 4 size 8
The format of the output can change at any time as verifier evolves.
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-26 14:17:03 +07:00
|
|
|
__u32 log_level; /* verbosity level of verifier */
|
|
|
|
__u32 log_size; /* size of user buffer */
|
|
|
|
__aligned_u64 log_buf; /* user supplied buffer */
|
2018-12-16 06:49:47 +07:00
|
|
|
__u32 kern_version; /* not used */
|
2017-05-11 01:38:07 +07:00
|
|
|
__u32 prog_flags;
|
2017-10-06 11:52:12 +07:00
|
|
|
char prog_name[BPF_OBJ_NAME_LEN];
|
2017-11-21 06:21:53 +07:00
|
|
|
__u32 prog_ifindex; /* ifindex of netdev to prep for */
|
2018-03-31 05:08:00 +07:00
|
|
|
/* For some prog types expected attach type must be known at
|
|
|
|
* load time to verify attach type specific parts of prog
|
|
|
|
* (context accesses, allowed helpers, etc).
|
|
|
|
*/
|
|
|
|
__u32 expected_attach_type;
|
bpf: Introduce bpf_func_info
This patch added interface to load a program with the following
additional information:
. prog_btf_fd
. func_info, func_info_rec_size and func_info_cnt
where func_info will provide function range and type_id
corresponding to each function.
The func_info_rec_size is introduced in the UAPI to specify
struct bpf_func_info size passed from user space. This
intends to make bpf_func_info structure growable in the future.
If the kernel gets a different bpf_func_info size from userspace,
it will try to handle user request with part of bpf_func_info
it can understand. In this patch, kernel can understand
struct bpf_func_info {
__u32 insn_offset;
__u32 type_id;
};
If user passed a bpf func_info record size of 16 bytes, the
kernel can still handle part of records with the above definition.
If verifier agrees with function range provided by the user,
the bpf_prog ksym for each function will use the func name
provided in the type_id, which is supposed to provide better
encoding as it is not limited by 16 bytes program name
limitation and this is better for bpf program which contains
multiple subprograms.
The bpf_prog_info interface is also extended to
return btf_id, func_info, func_info_rec_size and func_info_cnt
to userspace, so userspace can print out the function prototype
for each xlated function. The insn_offset in the returned
func_info corresponds to the insn offset for xlated functions.
With other jit related fields in bpf_prog_info, userspace can also
print out function prototypes for each jited function.
Signed-off-by: Yonghong Song <yhs@fb.com>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2018-11-20 06:29:11 +07:00
|
|
|
__u32 prog_btf_fd; /* fd pointing to BTF type data */
|
|
|
|
__u32 func_info_rec_size; /* userspace bpf_func_info size */
|
|
|
|
__aligned_u64 func_info; /* func info */
|
|
|
|
__u32 func_info_cnt; /* number of bpf_func_info records */
|
2018-12-08 07:42:25 +07:00
|
|
|
__u32 line_info_rec_size; /* userspace bpf_line_info size */
|
|
|
|
__aligned_u64 line_info; /* line info */
|
|
|
|
__u32 line_info_cnt; /* number of bpf_line_info records */
|
2014-09-26 14:17:00 +07:00
|
|
|
};
|
2015-10-29 20:58:09 +07:00
|
|
|
|
|
|
|
struct { /* anonymous struct used by BPF_OBJ_* commands */
|
|
|
|
__aligned_u64 pathname;
|
|
|
|
__u32 bpf_fd;
|
2017-10-19 03:00:22 +07:00
|
|
|
__u32 file_flags;
|
2015-10-29 20:58:09 +07:00
|
|
|
};
|
bpf: add BPF_PROG_ATTACH and BPF_PROG_DETACH commands
Extend the bpf(2) syscall by two new commands, BPF_PROG_ATTACH and
BPF_PROG_DETACH which allow attaching and detaching eBPF programs
to a target.
On the API level, the target could be anything that has an fd in
userspace, hence the name of the field in union bpf_attr is called
'target_fd'.
When called with BPF_ATTACH_TYPE_CGROUP_INET_{E,IN}GRESS, the target is
expected to be a valid file descriptor of a cgroup v2 directory which
has the bpf controller enabled. These are the only use-cases
implemented by this patch at this point, but more can be added.
If a program of the given type already exists in the given cgroup,
the program is swapped automically, so userspace does not have to drop
an existing program first before installing a new one, which would
otherwise leave a gap in which no program is attached.
For more information on the propagation logic to subcgroups, please
refer to the bpf cgroup controller implementation.
The API is guarded by CAP_NET_ADMIN.
Signed-off-by: Daniel Mack <daniel@zonque.org>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-11-23 22:52:27 +07:00
|
|
|
|
|
|
|
struct { /* anonymous struct used by BPF_PROG_ATTACH/DETACH commands */
|
|
|
|
__u32 target_fd; /* container object to attach to */
|
|
|
|
__u32 attach_bpf_fd; /* eBPF program to attach */
|
|
|
|
__u32 attach_type;
|
2017-02-11 11:28:24 +07:00
|
|
|
__u32 attach_flags;
|
bpf: add BPF_PROG_ATTACH and BPF_PROG_DETACH commands
Extend the bpf(2) syscall by two new commands, BPF_PROG_ATTACH and
BPF_PROG_DETACH which allow attaching and detaching eBPF programs
to a target.
On the API level, the target could be anything that has an fd in
userspace, hence the name of the field in union bpf_attr is called
'target_fd'.
When called with BPF_ATTACH_TYPE_CGROUP_INET_{E,IN}GRESS, the target is
expected to be a valid file descriptor of a cgroup v2 directory which
has the bpf controller enabled. These are the only use-cases
implemented by this patch at this point, but more can be added.
If a program of the given type already exists in the given cgroup,
the program is swapped automically, so userspace does not have to drop
an existing program first before installing a new one, which would
otherwise leave a gap in which no program is attached.
For more information on the propagation logic to subcgroups, please
refer to the bpf cgroup controller implementation.
The API is guarded by CAP_NET_ADMIN.
Signed-off-by: Daniel Mack <daniel@zonque.org>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-11-23 22:52:27 +07:00
|
|
|
};
|
2017-03-31 11:45:38 +07:00
|
|
|
|
|
|
|
struct { /* anonymous struct used by BPF_PROG_TEST_RUN command */
|
|
|
|
__u32 prog_fd;
|
|
|
|
__u32 retval;
|
2018-12-03 18:31:23 +07:00
|
|
|
__u32 data_size_in; /* input: len of data_in */
|
|
|
|
__u32 data_size_out; /* input/output: len of data_out
|
|
|
|
* returns ENOSPC if data_out
|
|
|
|
* is too small.
|
|
|
|
*/
|
2017-03-31 11:45:38 +07:00
|
|
|
__aligned_u64 data_in;
|
|
|
|
__aligned_u64 data_out;
|
|
|
|
__u32 repeat;
|
|
|
|
__u32 duration;
|
|
|
|
} test;
|
2017-06-06 02:15:48 +07:00
|
|
|
|
2017-06-06 02:15:49 +07:00
|
|
|
struct { /* anonymous struct used by BPF_*_GET_*_ID */
|
|
|
|
union {
|
|
|
|
__u32 start_id;
|
|
|
|
__u32 prog_id;
|
2017-06-06 02:15:50 +07:00
|
|
|
__u32 map_id;
|
2018-05-05 04:49:51 +07:00
|
|
|
__u32 btf_id;
|
2017-06-06 02:15:49 +07:00
|
|
|
};
|
2017-06-06 02:15:48 +07:00
|
|
|
__u32 next_id;
|
2017-10-19 03:00:22 +07:00
|
|
|
__u32 open_flags;
|
2017-06-06 02:15:48 +07:00
|
|
|
};
|
2017-06-06 02:15:52 +07:00
|
|
|
|
|
|
|
struct { /* anonymous struct used by BPF_OBJ_GET_INFO_BY_FD */
|
|
|
|
__u32 bpf_fd;
|
|
|
|
__u32 info_len;
|
|
|
|
__aligned_u64 info;
|
|
|
|
} info;
|
2017-10-03 12:50:22 +07:00
|
|
|
|
|
|
|
struct { /* anonymous struct used by BPF_PROG_QUERY command */
|
|
|
|
__u32 target_fd; /* container object to query */
|
|
|
|
__u32 attach_type;
|
|
|
|
__u32 query_flags;
|
|
|
|
__u32 attach_flags;
|
|
|
|
__aligned_u64 prog_ids;
|
|
|
|
__u32 prog_cnt;
|
|
|
|
} query;
|
2018-03-29 02:05:37 +07:00
|
|
|
|
|
|
|
struct {
|
|
|
|
__u64 name;
|
|
|
|
__u32 prog_fd;
|
|
|
|
} raw_tracepoint;
|
2018-04-19 05:56:01 +07:00
|
|
|
|
|
|
|
struct { /* anonymous struct for BPF_BTF_LOAD */
|
|
|
|
__aligned_u64 btf;
|
|
|
|
__aligned_u64 btf_log_buf;
|
|
|
|
__u32 btf_size;
|
|
|
|
__u32 btf_log_size;
|
|
|
|
__u32 btf_log_level;
|
|
|
|
};
|
bpf: introduce bpf subcommand BPF_TASK_FD_QUERY
Currently, suppose a userspace application has loaded a bpf program
and attached it to a tracepoint/kprobe/uprobe, and a bpf
introspection tool, e.g., bpftool, wants to show which bpf program
is attached to which tracepoint/kprobe/uprobe. Such attachment
information will be really useful to understand the overall bpf
deployment in the system.
There is a name field (16 bytes) for each program, which could
be used to encode the attachment point. There are some drawbacks
for this approaches. First, bpftool user (e.g., an admin) may not
really understand the association between the name and the
attachment point. Second, if one program is attached to multiple
places, encoding a proper name which can imply all these
attachments becomes difficult.
This patch introduces a new bpf subcommand BPF_TASK_FD_QUERY.
Given a pid and fd, if the <pid, fd> is associated with a
tracepoint/kprobe/uprobe perf event, BPF_TASK_FD_QUERY will return
. prog_id
. tracepoint name, or
. k[ret]probe funcname + offset or kernel addr, or
. u[ret]probe filename + offset
to the userspace.
The user can use "bpftool prog" to find more information about
bpf program itself with prog_id.
Acked-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Yonghong Song <yhs@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2018-05-25 01:21:09 +07:00
|
|
|
|
|
|
|
struct {
|
|
|
|
__u32 pid; /* input: pid */
|
|
|
|
__u32 fd; /* input: fd */
|
|
|
|
__u32 flags; /* input: flags */
|
|
|
|
__u32 buf_len; /* input/output: buf len */
|
|
|
|
__aligned_u64 buf; /* input/output:
|
|
|
|
* tp_name for tracepoint
|
|
|
|
* symbol for kprobe
|
|
|
|
* filename for uprobe
|
|
|
|
*/
|
|
|
|
__u32 prog_id; /* output: prod_id */
|
|
|
|
__u32 fd_type; /* output: BPF_FD_TYPE_* */
|
|
|
|
__u64 probe_offset; /* output: probe_offset */
|
|
|
|
__u64 probe_addr; /* output: probe_addr */
|
|
|
|
} task_fd_query;
|
2014-09-26 14:16:57 +07:00
|
|
|
} __attribute__((aligned(8)));
|
|
|
|
|
2018-04-26 00:16:52 +07:00
|
|
|
/* The description below is an attempt at providing documentation to eBPF
|
|
|
|
* developers about the multiple available eBPF helper functions. It can be
|
|
|
|
* parsed and used to produce a manual page. The workflow is the following,
|
|
|
|
* and requires the rst2man utility:
|
|
|
|
*
|
|
|
|
* $ ./scripts/bpf_helpers_doc.py \
|
|
|
|
* --filename include/uapi/linux/bpf.h > /tmp/bpf-helpers.rst
|
|
|
|
* $ rst2man /tmp/bpf-helpers.rst > /tmp/bpf-helpers.7
|
|
|
|
* $ man /tmp/bpf-helpers.7
|
|
|
|
*
|
|
|
|
* Note that in order to produce this external documentation, some RST
|
|
|
|
* formatting is used in the descriptions to get "bold" and "italics" in
|
|
|
|
* manual pages. Also note that the few trailing white spaces are
|
|
|
|
* intentional, removing them would break paragraphs for rst2man.
|
|
|
|
*
|
|
|
|
* Start of BPF helper function descriptions:
|
2018-04-26 00:16:53 +07:00
|
|
|
*
|
|
|
|
* void *bpf_map_lookup_elem(struct bpf_map *map, const void *key)
|
|
|
|
* Description
|
|
|
|
* Perform a lookup in *map* for an entry associated to *key*.
|
|
|
|
* Return
|
|
|
|
* Map value associated to *key*, or **NULL** if no entry was
|
|
|
|
* found.
|
|
|
|
*
|
|
|
|
* int bpf_map_update_elem(struct bpf_map *map, const void *key, const void *value, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Add or update the value of the entry associated to *key* in
|
|
|
|
* *map* with *value*. *flags* is one of:
|
|
|
|
*
|
|
|
|
* **BPF_NOEXIST**
|
|
|
|
* The entry for *key* must not exist in the map.
|
|
|
|
* **BPF_EXIST**
|
|
|
|
* The entry for *key* must already exist in the map.
|
|
|
|
* **BPF_ANY**
|
|
|
|
* No condition on the existence of the entry for *key*.
|
|
|
|
*
|
|
|
|
* Flag value **BPF_NOEXIST** cannot be used for maps of types
|
|
|
|
* **BPF_MAP_TYPE_ARRAY** or **BPF_MAP_TYPE_PERCPU_ARRAY** (all
|
|
|
|
* elements always exist), the helper would return an error.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_map_delete_elem(struct bpf_map *map, const void *key)
|
|
|
|
* Description
|
|
|
|
* Delete entry with *key* from *map*.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_probe_read(void *dst, u32 size, const void *src)
|
|
|
|
* Description
|
|
|
|
* For tracing programs, safely attempt to read *size* bytes from
|
|
|
|
* address *src* and store the data in *dst*.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* u64 bpf_ktime_get_ns(void)
|
|
|
|
* Description
|
|
|
|
* Return the time elapsed since system boot, in nanoseconds.
|
|
|
|
* Return
|
|
|
|
* Current *ktime*.
|
|
|
|
*
|
|
|
|
* int bpf_trace_printk(const char *fmt, u32 fmt_size, ...)
|
|
|
|
* Description
|
|
|
|
* This helper is a "printk()-like" facility for debugging. It
|
|
|
|
* prints a message defined by format *fmt* (of size *fmt_size*)
|
|
|
|
* to file *\/sys/kernel/debug/tracing/trace* from DebugFS, if
|
|
|
|
* available. It can take up to three additional **u64**
|
|
|
|
* arguments (as an eBPF helpers, the total number of arguments is
|
|
|
|
* limited to five).
|
|
|
|
*
|
|
|
|
* Each time the helper is called, it appends a line to the trace.
|
|
|
|
* The format of the trace is customizable, and the exact output
|
|
|
|
* one will get depends on the options set in
|
|
|
|
* *\/sys/kernel/debug/tracing/trace_options* (see also the
|
|
|
|
* *README* file under the same directory). However, it usually
|
|
|
|
* defaults to something like:
|
|
|
|
*
|
|
|
|
* ::
|
|
|
|
*
|
|
|
|
* telnet-470 [001] .N.. 419421.045894: 0x00000001: <formatted msg>
|
|
|
|
*
|
|
|
|
* In the above:
|
|
|
|
*
|
|
|
|
* * ``telnet`` is the name of the current task.
|
|
|
|
* * ``470`` is the PID of the current task.
|
|
|
|
* * ``001`` is the CPU number on which the task is
|
|
|
|
* running.
|
|
|
|
* * In ``.N..``, each character refers to a set of
|
|
|
|
* options (whether irqs are enabled, scheduling
|
|
|
|
* options, whether hard/softirqs are running, level of
|
|
|
|
* preempt_disabled respectively). **N** means that
|
|
|
|
* **TIF_NEED_RESCHED** and **PREEMPT_NEED_RESCHED**
|
|
|
|
* are set.
|
|
|
|
* * ``419421.045894`` is a timestamp.
|
|
|
|
* * ``0x00000001`` is a fake value used by BPF for the
|
|
|
|
* instruction pointer register.
|
|
|
|
* * ``<formatted msg>`` is the message formatted with
|
|
|
|
* *fmt*.
|
|
|
|
*
|
|
|
|
* The conversion specifiers supported by *fmt* are similar, but
|
|
|
|
* more limited than for printk(). They are **%d**, **%i**,
|
|
|
|
* **%u**, **%x**, **%ld**, **%li**, **%lu**, **%lx**, **%lld**,
|
|
|
|
* **%lli**, **%llu**, **%llx**, **%p**, **%s**. No modifier (size
|
|
|
|
* of field, padding with zeroes, etc.) is available, and the
|
|
|
|
* helper will return **-EINVAL** (but print nothing) if it
|
|
|
|
* encounters an unknown specifier.
|
|
|
|
*
|
|
|
|
* Also, note that **bpf_trace_printk**\ () is slow, and should
|
|
|
|
* only be used for debugging purposes. For this reason, a notice
|
|
|
|
* bloc (spanning several lines) is printed to kernel logs and
|
|
|
|
* states that the helper should not be used "for production use"
|
|
|
|
* the first time this helper is used (or more precisely, when
|
|
|
|
* **trace_printk**\ () buffers are allocated). For passing values
|
|
|
|
* to user space, perf events should be preferred.
|
|
|
|
* Return
|
|
|
|
* The number of bytes written to the buffer, or a negative error
|
|
|
|
* in case of failure.
|
|
|
|
*
|
2018-04-26 00:16:55 +07:00
|
|
|
* u32 bpf_get_prandom_u32(void)
|
|
|
|
* Description
|
|
|
|
* Get a pseudo-random number.
|
|
|
|
*
|
|
|
|
* From a security point of view, this helper uses its own
|
|
|
|
* pseudo-random internal state, and cannot be used to infer the
|
|
|
|
* seed of other random functions in the kernel. However, it is
|
|
|
|
* essential to note that the generator used by the helper is not
|
|
|
|
* cryptographically secure.
|
|
|
|
* Return
|
|
|
|
* A random 32-bit unsigned value.
|
|
|
|
*
|
|
|
|
* u32 bpf_get_smp_processor_id(void)
|
|
|
|
* Description
|
|
|
|
* Get the SMP (symmetric multiprocessing) processor id. Note that
|
|
|
|
* all programs run with preemption disabled, which means that the
|
|
|
|
* SMP processor id is stable during all the execution of the
|
|
|
|
* program.
|
|
|
|
* Return
|
|
|
|
* The SMP id of the processor running the program.
|
|
|
|
*
|
2018-04-26 00:16:53 +07:00
|
|
|
* int bpf_skb_store_bytes(struct sk_buff *skb, u32 offset, const void *from, u32 len, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Store *len* bytes from address *from* into the packet
|
|
|
|
* associated to *skb*, at *offset*. *flags* are a combination of
|
|
|
|
* **BPF_F_RECOMPUTE_CSUM** (automatically recompute the
|
|
|
|
* checksum for the packet after storing the bytes) and
|
|
|
|
* **BPF_F_INVALIDATE_HASH** (set *skb*\ **->hash**, *skb*\
|
|
|
|
* **->swhash** and *skb*\ **->l4hash** to 0).
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_l3_csum_replace(struct sk_buff *skb, u32 offset, u64 from, u64 to, u64 size)
|
|
|
|
* Description
|
|
|
|
* Recompute the layer 3 (e.g. IP) checksum for the packet
|
|
|
|
* associated to *skb*. Computation is incremental, so the helper
|
|
|
|
* must know the former value of the header field that was
|
|
|
|
* modified (*from*), the new value of this field (*to*), and the
|
|
|
|
* number of bytes (2 or 4) for this field, stored in *size*.
|
|
|
|
* Alternatively, it is possible to store the difference between
|
|
|
|
* the previous and the new values of the header field in *to*, by
|
|
|
|
* setting *from* and *size* to 0. For both methods, *offset*
|
|
|
|
* indicates the location of the IP checksum within the packet.
|
|
|
|
*
|
|
|
|
* This helper works in combination with **bpf_csum_diff**\ (),
|
|
|
|
* which does not update the checksum in-place, but offers more
|
|
|
|
* flexibility and can handle sizes larger than 2 or 4 for the
|
|
|
|
* checksum to update.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_l4_csum_replace(struct sk_buff *skb, u32 offset, u64 from, u64 to, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Recompute the layer 4 (e.g. TCP, UDP or ICMP) checksum for the
|
|
|
|
* packet associated to *skb*. Computation is incremental, so the
|
|
|
|
* helper must know the former value of the header field that was
|
|
|
|
* modified (*from*), the new value of this field (*to*), and the
|
|
|
|
* number of bytes (2 or 4) for this field, stored on the lowest
|
|
|
|
* four bits of *flags*. Alternatively, it is possible to store
|
|
|
|
* the difference between the previous and the new values of the
|
|
|
|
* header field in *to*, by setting *from* and the four lowest
|
|
|
|
* bits of *flags* to 0. For both methods, *offset* indicates the
|
|
|
|
* location of the IP checksum within the packet. In addition to
|
|
|
|
* the size of the field, *flags* can be added (bitwise OR) actual
|
|
|
|
* flags. With **BPF_F_MARK_MANGLED_0**, a null checksum is left
|
|
|
|
* untouched (unless **BPF_F_MARK_ENFORCE** is added as well), and
|
|
|
|
* for updates resulting in a null checksum the value is set to
|
|
|
|
* **CSUM_MANGLED_0** instead. Flag **BPF_F_PSEUDO_HDR** indicates
|
|
|
|
* the checksum is to be computed against a pseudo-header.
|
|
|
|
*
|
|
|
|
* This helper works in combination with **bpf_csum_diff**\ (),
|
|
|
|
* which does not update the checksum in-place, but offers more
|
|
|
|
* flexibility and can handle sizes larger than 2 or 4 for the
|
|
|
|
* checksum to update.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_tail_call(void *ctx, struct bpf_map *prog_array_map, u32 index)
|
|
|
|
* Description
|
|
|
|
* This special helper is used to trigger a "tail call", or in
|
|
|
|
* other words, to jump into another eBPF program. The same stack
|
|
|
|
* frame is used (but values on stack and in registers for the
|
|
|
|
* caller are not accessible to the callee). This mechanism allows
|
|
|
|
* for program chaining, either for raising the maximum number of
|
|
|
|
* available eBPF instructions, or to execute given programs in
|
|
|
|
* conditional blocks. For security reasons, there is an upper
|
|
|
|
* limit to the number of successive tail calls that can be
|
|
|
|
* performed.
|
|
|
|
*
|
|
|
|
* Upon call of this helper, the program attempts to jump into a
|
|
|
|
* program referenced at index *index* in *prog_array_map*, a
|
|
|
|
* special map of type **BPF_MAP_TYPE_PROG_ARRAY**, and passes
|
|
|
|
* *ctx*, a pointer to the context.
|
|
|
|
*
|
|
|
|
* If the call succeeds, the kernel immediately runs the first
|
|
|
|
* instruction of the new program. This is not a function call,
|
|
|
|
* and it never returns to the previous program. If the call
|
|
|
|
* fails, then the helper has no effect, and the caller continues
|
|
|
|
* to run its subsequent instructions. A call can fail if the
|
|
|
|
* destination program for the jump does not exist (i.e. *index*
|
|
|
|
* is superior to the number of entries in *prog_array_map*), or
|
|
|
|
* if the maximum number of tail calls has been reached for this
|
|
|
|
* chain of programs. This limit is defined in the kernel by the
|
|
|
|
* macro **MAX_TAIL_CALL_CNT** (not accessible to user space),
|
|
|
|
* which is currently set to 32.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_clone_redirect(struct sk_buff *skb, u32 ifindex, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Clone and redirect the packet associated to *skb* to another
|
|
|
|
* net device of index *ifindex*. Both ingress and egress
|
|
|
|
* interfaces can be used for redirection. The **BPF_F_INGRESS**
|
|
|
|
* value in *flags* is used to make the distinction (ingress path
|
|
|
|
* is selected if the flag is present, egress path otherwise).
|
|
|
|
* This is the only flag supported for now.
|
|
|
|
*
|
|
|
|
* In comparison with **bpf_redirect**\ () helper,
|
|
|
|
* **bpf_clone_redirect**\ () has the associated cost of
|
|
|
|
* duplicating the packet buffer, but this can be executed out of
|
|
|
|
* the eBPF program. Conversely, **bpf_redirect**\ () is more
|
|
|
|
* efficient, but it is handled through an action code where the
|
|
|
|
* redirection happens only after the eBPF program has returned.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
2018-04-26 00:16:54 +07:00
|
|
|
*
|
|
|
|
* u64 bpf_get_current_pid_tgid(void)
|
|
|
|
* Return
|
|
|
|
* A 64-bit integer containing the current tgid and pid, and
|
|
|
|
* created as such:
|
|
|
|
* *current_task*\ **->tgid << 32 \|**
|
|
|
|
* *current_task*\ **->pid**.
|
|
|
|
*
|
|
|
|
* u64 bpf_get_current_uid_gid(void)
|
|
|
|
* Return
|
|
|
|
* A 64-bit integer containing the current GID and UID, and
|
|
|
|
* created as such: *current_gid* **<< 32 \|** *current_uid*.
|
|
|
|
*
|
|
|
|
* int bpf_get_current_comm(char *buf, u32 size_of_buf)
|
|
|
|
* Description
|
|
|
|
* Copy the **comm** attribute of the current task into *buf* of
|
|
|
|
* *size_of_buf*. The **comm** attribute contains the name of
|
|
|
|
* the executable (excluding the path) for the current task. The
|
|
|
|
* *size_of_buf* must be strictly positive. On success, the
|
|
|
|
* helper makes sure that the *buf* is NUL-terminated. On failure,
|
|
|
|
* it is filled with zeroes.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-04-26 00:16:55 +07:00
|
|
|
* u32 bpf_get_cgroup_classid(struct sk_buff *skb)
|
|
|
|
* Description
|
|
|
|
* Retrieve the classid for the current task, i.e. for the net_cls
|
|
|
|
* cgroup to which *skb* belongs.
|
|
|
|
*
|
|
|
|
* This helper can be used on TC egress path, but not on ingress.
|
|
|
|
*
|
|
|
|
* The net_cls cgroup provides an interface to tag network packets
|
|
|
|
* based on a user-provided identifier for all traffic coming from
|
|
|
|
* the tasks belonging to the related cgroup. See also the related
|
|
|
|
* kernel documentation, available from the Linux sources in file
|
|
|
|
* *Documentation/cgroup-v1/net_cls.txt*.
|
|
|
|
*
|
|
|
|
* The Linux kernel has two versions for cgroups: there are
|
|
|
|
* cgroups v1 and cgroups v2. Both are available to users, who can
|
|
|
|
* use a mixture of them, but note that the net_cls cgroup is for
|
|
|
|
* cgroup v1 only. This makes it incompatible with BPF programs
|
|
|
|
* run on cgroups, which is a cgroup-v2-only feature (a socket can
|
|
|
|
* only hold data for one version of cgroups at a time).
|
|
|
|
*
|
|
|
|
* This helper is only available is the kernel was compiled with
|
|
|
|
* the **CONFIG_CGROUP_NET_CLASSID** configuration option set to
|
|
|
|
* "**y**" or to "**m**".
|
|
|
|
* Return
|
|
|
|
* The classid, or 0 for the default unconfigured classid.
|
|
|
|
*
|
2018-04-26 00:16:54 +07:00
|
|
|
* int bpf_skb_vlan_push(struct sk_buff *skb, __be16 vlan_proto, u16 vlan_tci)
|
|
|
|
* Description
|
|
|
|
* Push a *vlan_tci* (VLAN tag control information) of protocol
|
|
|
|
* *vlan_proto* to the packet associated to *skb*, then update
|
|
|
|
* the checksum. Note that if *vlan_proto* is different from
|
|
|
|
* **ETH_P_8021Q** and **ETH_P_8021AD**, it is considered to
|
|
|
|
* be **ETH_P_8021Q**.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_skb_vlan_pop(struct sk_buff *skb)
|
|
|
|
* Description
|
|
|
|
* Pop a VLAN header from the packet associated to *skb*.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_skb_get_tunnel_key(struct sk_buff *skb, struct bpf_tunnel_key *key, u32 size, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Get tunnel metadata. This helper takes a pointer *key* to an
|
|
|
|
* empty **struct bpf_tunnel_key** of **size**, that will be
|
|
|
|
* filled with tunnel metadata for the packet associated to *skb*.
|
|
|
|
* The *flags* can be set to **BPF_F_TUNINFO_IPV6**, which
|
|
|
|
* indicates that the tunnel is based on IPv6 protocol instead of
|
|
|
|
* IPv4.
|
|
|
|
*
|
|
|
|
* The **struct bpf_tunnel_key** is an object that generalizes the
|
|
|
|
* principal parameters used by various tunneling protocols into a
|
|
|
|
* single struct. This way, it can be used to easily make a
|
|
|
|
* decision based on the contents of the encapsulation header,
|
|
|
|
* "summarized" in this struct. In particular, it holds the IP
|
|
|
|
* address of the remote end (IPv4 or IPv6, depending on the case)
|
|
|
|
* in *key*\ **->remote_ipv4** or *key*\ **->remote_ipv6**. Also,
|
|
|
|
* this struct exposes the *key*\ **->tunnel_id**, which is
|
|
|
|
* generally mapped to a VNI (Virtual Network Identifier), making
|
|
|
|
* it programmable together with the **bpf_skb_set_tunnel_key**\
|
|
|
|
* () helper.
|
|
|
|
*
|
|
|
|
* Let's imagine that the following code is part of a program
|
|
|
|
* attached to the TC ingress interface, on one end of a GRE
|
|
|
|
* tunnel, and is supposed to filter out all messages coming from
|
|
|
|
* remote ends with IPv4 address other than 10.0.0.1:
|
|
|
|
*
|
|
|
|
* ::
|
|
|
|
*
|
|
|
|
* int ret;
|
|
|
|
* struct bpf_tunnel_key key = {};
|
|
|
|
*
|
|
|
|
* ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
|
|
|
|
* if (ret < 0)
|
|
|
|
* return TC_ACT_SHOT; // drop packet
|
|
|
|
*
|
|
|
|
* if (key.remote_ipv4 != 0x0a000001)
|
|
|
|
* return TC_ACT_SHOT; // drop packet
|
|
|
|
*
|
|
|
|
* return TC_ACT_OK; // accept packet
|
|
|
|
*
|
|
|
|
* This interface can also be used with all encapsulation devices
|
|
|
|
* that can operate in "collect metadata" mode: instead of having
|
|
|
|
* one network device per specific configuration, the "collect
|
|
|
|
* metadata" mode only requires a single device where the
|
|
|
|
* configuration can be extracted from this helper.
|
|
|
|
*
|
|
|
|
* This can be used together with various tunnels such as VXLan,
|
|
|
|
* Geneve, GRE or IP in IP (IPIP).
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_skb_set_tunnel_key(struct sk_buff *skb, struct bpf_tunnel_key *key, u32 size, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Populate tunnel metadata for packet associated to *skb.* The
|
|
|
|
* tunnel metadata is set to the contents of *key*, of *size*. The
|
|
|
|
* *flags* can be set to a combination of the following values:
|
|
|
|
*
|
|
|
|
* **BPF_F_TUNINFO_IPV6**
|
|
|
|
* Indicate that the tunnel is based on IPv6 protocol
|
|
|
|
* instead of IPv4.
|
|
|
|
* **BPF_F_ZERO_CSUM_TX**
|
|
|
|
* For IPv4 packets, add a flag to tunnel metadata
|
|
|
|
* indicating that checksum computation should be skipped
|
|
|
|
* and checksum set to zeroes.
|
|
|
|
* **BPF_F_DONT_FRAGMENT**
|
|
|
|
* Add a flag to tunnel metadata indicating that the
|
|
|
|
* packet should not be fragmented.
|
|
|
|
* **BPF_F_SEQ_NUMBER**
|
|
|
|
* Add a flag to tunnel metadata indicating that a
|
|
|
|
* sequence number should be added to tunnel header before
|
|
|
|
* sending the packet. This flag was added for GRE
|
|
|
|
* encapsulation, but might be used with other protocols
|
|
|
|
* as well in the future.
|
|
|
|
*
|
|
|
|
* Here is a typical usage on the transmit path:
|
|
|
|
*
|
|
|
|
* ::
|
|
|
|
*
|
|
|
|
* struct bpf_tunnel_key key;
|
|
|
|
* populate key ...
|
|
|
|
* bpf_skb_set_tunnel_key(skb, &key, sizeof(key), 0);
|
|
|
|
* bpf_clone_redirect(skb, vxlan_dev_ifindex, 0);
|
|
|
|
*
|
|
|
|
* See also the description of the **bpf_skb_get_tunnel_key**\ ()
|
|
|
|
* helper for additional information.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-04-26 00:16:57 +07:00
|
|
|
* u64 bpf_perf_event_read(struct bpf_map *map, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Read the value of a perf event counter. This helper relies on a
|
|
|
|
* *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. The nature of
|
|
|
|
* the perf event counter is selected when *map* is updated with
|
|
|
|
* perf event file descriptors. The *map* is an array whose size
|
|
|
|
* is the number of available CPUs, and each cell contains a value
|
|
|
|
* relative to one CPU. The value to retrieve is indicated by
|
|
|
|
* *flags*, that contains the index of the CPU to look up, masked
|
|
|
|
* with **BPF_F_INDEX_MASK**. Alternatively, *flags* can be set to
|
|
|
|
* **BPF_F_CURRENT_CPU** to indicate that the value for the
|
|
|
|
* current CPU should be retrieved.
|
|
|
|
*
|
|
|
|
* Note that before Linux 4.13, only hardware perf event can be
|
|
|
|
* retrieved.
|
|
|
|
*
|
|
|
|
* Also, be aware that the newer helper
|
|
|
|
* **bpf_perf_event_read_value**\ () is recommended over
|
2018-04-30 17:39:03 +07:00
|
|
|
* **bpf_perf_event_read**\ () in general. The latter has some ABI
|
2018-04-26 00:16:57 +07:00
|
|
|
* quirks where error and counter value are used as a return code
|
|
|
|
* (which is wrong to do since ranges may overlap). This issue is
|
2018-04-30 17:39:03 +07:00
|
|
|
* fixed with **bpf_perf_event_read_value**\ (), which at the same
|
|
|
|
* time provides more features over the **bpf_perf_event_read**\
|
|
|
|
* () interface. Please refer to the description of
|
2018-04-26 00:16:57 +07:00
|
|
|
* **bpf_perf_event_read_value**\ () for details.
|
|
|
|
* Return
|
|
|
|
* The value of the perf event counter read from the map, or a
|
|
|
|
* negative error code in case of failure.
|
|
|
|
*
|
2018-04-26 00:16:54 +07:00
|
|
|
* int bpf_redirect(u32 ifindex, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Redirect the packet to another net device of index *ifindex*.
|
|
|
|
* This helper is somewhat similar to **bpf_clone_redirect**\
|
|
|
|
* (), except that the packet is not cloned, which provides
|
|
|
|
* increased performance.
|
|
|
|
*
|
|
|
|
* Except for XDP, both ingress and egress interfaces can be used
|
|
|
|
* for redirection. The **BPF_F_INGRESS** value in *flags* is used
|
|
|
|
* to make the distinction (ingress path is selected if the flag
|
|
|
|
* is present, egress path otherwise). Currently, XDP only
|
|
|
|
* supports redirection to the egress interface, and accepts no
|
|
|
|
* flag at all.
|
|
|
|
*
|
|
|
|
* The same effect can be attained with the more generic
|
|
|
|
* **bpf_redirect_map**\ (), which requires specific maps to be
|
|
|
|
* used but offers better performance.
|
|
|
|
* Return
|
|
|
|
* For XDP, the helper returns **XDP_REDIRECT** on success or
|
|
|
|
* **XDP_ABORTED** on error. For other program types, the values
|
|
|
|
* are **TC_ACT_REDIRECT** on success or **TC_ACT_SHOT** on
|
|
|
|
* error.
|
|
|
|
*
|
2018-04-26 00:16:55 +07:00
|
|
|
* u32 bpf_get_route_realm(struct sk_buff *skb)
|
|
|
|
* Description
|
|
|
|
* Retrieve the realm or the route, that is to say the
|
|
|
|
* **tclassid** field of the destination for the *skb*. The
|
|
|
|
* indentifier retrieved is a user-provided tag, similar to the
|
|
|
|
* one used with the net_cls cgroup (see description for
|
|
|
|
* **bpf_get_cgroup_classid**\ () helper), but here this tag is
|
|
|
|
* held by a route (a destination entry), not by a task.
|
|
|
|
*
|
|
|
|
* Retrieving this identifier works with the clsact TC egress hook
|
|
|
|
* (see also **tc-bpf(8)**), or alternatively on conventional
|
|
|
|
* classful egress qdiscs, but not on TC ingress path. In case of
|
|
|
|
* clsact TC egress hook, this has the advantage that, internally,
|
|
|
|
* the destination entry has not been dropped yet in the transmit
|
|
|
|
* path. Therefore, the destination entry does not need to be
|
|
|
|
* artificially held via **netif_keep_dst**\ () for a classful
|
|
|
|
* qdisc until the *skb* is freed.
|
|
|
|
*
|
|
|
|
* This helper is available only if the kernel was compiled with
|
|
|
|
* **CONFIG_IP_ROUTE_CLASSID** configuration option.
|
|
|
|
* Return
|
|
|
|
* The realm of the route for the packet associated to *skb*, or 0
|
|
|
|
* if none was found.
|
|
|
|
*
|
2018-04-26 00:16:54 +07:00
|
|
|
* int bpf_perf_event_output(struct pt_reg *ctx, struct bpf_map *map, u64 flags, void *data, u64 size)
|
|
|
|
* Description
|
|
|
|
* Write raw *data* blob into a special BPF perf event held by
|
|
|
|
* *map* of type **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. This perf
|
|
|
|
* event must have the following attributes: **PERF_SAMPLE_RAW**
|
|
|
|
* as **sample_type**, **PERF_TYPE_SOFTWARE** as **type**, and
|
|
|
|
* **PERF_COUNT_SW_BPF_OUTPUT** as **config**.
|
|
|
|
*
|
|
|
|
* The *flags* are used to indicate the index in *map* for which
|
|
|
|
* the value must be put, masked with **BPF_F_INDEX_MASK**.
|
|
|
|
* Alternatively, *flags* can be set to **BPF_F_CURRENT_CPU**
|
|
|
|
* to indicate that the index of the current CPU core should be
|
|
|
|
* used.
|
|
|
|
*
|
|
|
|
* The value to write, of *size*, is passed through eBPF stack and
|
|
|
|
* pointed by *data*.
|
|
|
|
*
|
|
|
|
* The context of the program *ctx* needs also be passed to the
|
|
|
|
* helper.
|
|
|
|
*
|
|
|
|
* On user space, a program willing to read the values needs to
|
|
|
|
* call **perf_event_open**\ () on the perf event (either for
|
|
|
|
* one or for all CPUs) and to store the file descriptor into the
|
|
|
|
* *map*. This must be done before the eBPF program can send data
|
|
|
|
* into it. An example is available in file
|
|
|
|
* *samples/bpf/trace_output_user.c* in the Linux kernel source
|
|
|
|
* tree (the eBPF program counterpart is in
|
|
|
|
* *samples/bpf/trace_output_kern.c*).
|
|
|
|
*
|
|
|
|
* **bpf_perf_event_output**\ () achieves better performance
|
|
|
|
* than **bpf_trace_printk**\ () for sharing data with user
|
|
|
|
* space, and is much better suitable for streaming data from eBPF
|
|
|
|
* programs.
|
|
|
|
*
|
|
|
|
* Note that this helper is not restricted to tracing use cases
|
|
|
|
* and can be used with programs attached to TC or XDP as well,
|
|
|
|
* where it allows for passing data to user space listeners. Data
|
|
|
|
* can be:
|
|
|
|
*
|
|
|
|
* * Only custom structs,
|
|
|
|
* * Only the packet payload, or
|
|
|
|
* * A combination of both.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-04-26 00:16:55 +07:00
|
|
|
* int bpf_skb_load_bytes(const struct sk_buff *skb, u32 offset, void *to, u32 len)
|
|
|
|
* Description
|
|
|
|
* This helper was provided as an easy way to load data from a
|
|
|
|
* packet. It can be used to load *len* bytes from *offset* from
|
|
|
|
* the packet associated to *skb*, into the buffer pointed by
|
|
|
|
* *to*.
|
|
|
|
*
|
|
|
|
* Since Linux 4.7, usage of this helper has mostly been replaced
|
|
|
|
* by "direct packet access", enabling packet data to be
|
|
|
|
* manipulated with *skb*\ **->data** and *skb*\ **->data_end**
|
|
|
|
* pointing respectively to the first byte of packet data and to
|
|
|
|
* the byte after the last byte of packet data. However, it
|
|
|
|
* remains useful if one wishes to read large quantities of data
|
|
|
|
* at once from a packet into the eBPF stack.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-04-26 00:16:54 +07:00
|
|
|
* int bpf_get_stackid(struct pt_reg *ctx, struct bpf_map *map, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Walk a user or a kernel stack and return its id. To achieve
|
|
|
|
* this, the helper needs *ctx*, which is a pointer to the context
|
|
|
|
* on which the tracing program is executed, and a pointer to a
|
|
|
|
* *map* of type **BPF_MAP_TYPE_STACK_TRACE**.
|
|
|
|
*
|
|
|
|
* The last argument, *flags*, holds the number of stack frames to
|
|
|
|
* skip (from 0 to 255), masked with
|
|
|
|
* **BPF_F_SKIP_FIELD_MASK**. The next bits can be used to set
|
|
|
|
* a combination of the following flags:
|
|
|
|
*
|
|
|
|
* **BPF_F_USER_STACK**
|
|
|
|
* Collect a user space stack instead of a kernel stack.
|
|
|
|
* **BPF_F_FAST_STACK_CMP**
|
|
|
|
* Compare stacks by hash only.
|
|
|
|
* **BPF_F_REUSE_STACKID**
|
|
|
|
* If two different stacks hash into the same *stackid*,
|
|
|
|
* discard the old one.
|
|
|
|
*
|
|
|
|
* The stack id retrieved is a 32 bit long integer handle which
|
|
|
|
* can be further combined with other data (including other stack
|
|
|
|
* ids) and used as a key into maps. This can be useful for
|
|
|
|
* generating a variety of graphs (such as flame graphs or off-cpu
|
|
|
|
* graphs).
|
|
|
|
*
|
|
|
|
* For walking a stack, this helper is an improvement over
|
|
|
|
* **bpf_probe_read**\ (), which can be used with unrolled loops
|
|
|
|
* but is not efficient and consumes a lot of eBPF instructions.
|
|
|
|
* Instead, **bpf_get_stackid**\ () can collect up to
|
|
|
|
* **PERF_MAX_STACK_DEPTH** both kernel and user frames. Note that
|
|
|
|
* this limit can be controlled with the **sysctl** program, and
|
|
|
|
* that it should be manually increased in order to profile long
|
|
|
|
* user stacks (such as stacks for Java programs). To do so, use:
|
|
|
|
*
|
|
|
|
* ::
|
|
|
|
*
|
|
|
|
* # sysctl kernel.perf_event_max_stack=<new value>
|
|
|
|
* Return
|
|
|
|
* The positive or null stack id on success, or a negative error
|
|
|
|
* in case of failure.
|
|
|
|
*
|
2018-04-26 00:16:55 +07:00
|
|
|
* s64 bpf_csum_diff(__be32 *from, u32 from_size, __be32 *to, u32 to_size, __wsum seed)
|
|
|
|
* Description
|
|
|
|
* Compute a checksum difference, from the raw buffer pointed by
|
|
|
|
* *from*, of length *from_size* (that must be a multiple of 4),
|
|
|
|
* towards the raw buffer pointed by *to*, of size *to_size*
|
|
|
|
* (same remark). An optional *seed* can be added to the value
|
|
|
|
* (this can be cascaded, the seed may come from a previous call
|
|
|
|
* to the helper).
|
|
|
|
*
|
|
|
|
* This is flexible enough to be used in several ways:
|
|
|
|
*
|
|
|
|
* * With *from_size* == 0, *to_size* > 0 and *seed* set to
|
|
|
|
* checksum, it can be used when pushing new data.
|
|
|
|
* * With *from_size* > 0, *to_size* == 0 and *seed* set to
|
|
|
|
* checksum, it can be used when removing data from a packet.
|
|
|
|
* * With *from_size* > 0, *to_size* > 0 and *seed* set to 0, it
|
|
|
|
* can be used to compute a diff. Note that *from_size* and
|
|
|
|
* *to_size* do not need to be equal.
|
|
|
|
*
|
|
|
|
* This helper can be used in combination with
|
|
|
|
* **bpf_l3_csum_replace**\ () and **bpf_l4_csum_replace**\ (), to
|
|
|
|
* which one can feed in the difference computed with
|
|
|
|
* **bpf_csum_diff**\ ().
|
|
|
|
* Return
|
|
|
|
* The checksum result, or a negative error code in case of
|
|
|
|
* failure.
|
|
|
|
*
|
|
|
|
* int bpf_skb_get_tunnel_opt(struct sk_buff *skb, u8 *opt, u32 size)
|
|
|
|
* Description
|
|
|
|
* Retrieve tunnel options metadata for the packet associated to
|
|
|
|
* *skb*, and store the raw tunnel option data to the buffer *opt*
|
|
|
|
* of *size*.
|
|
|
|
*
|
|
|
|
* This helper can be used with encapsulation devices that can
|
|
|
|
* operate in "collect metadata" mode (please refer to the related
|
|
|
|
* note in the description of **bpf_skb_get_tunnel_key**\ () for
|
|
|
|
* more details). A particular example where this can be used is
|
|
|
|
* in combination with the Geneve encapsulation protocol, where it
|
|
|
|
* allows for pushing (with **bpf_skb_get_tunnel_opt**\ () helper)
|
|
|
|
* and retrieving arbitrary TLVs (Type-Length-Value headers) from
|
|
|
|
* the eBPF program. This allows for full customization of these
|
|
|
|
* headers.
|
|
|
|
* Return
|
|
|
|
* The size of the option data retrieved.
|
|
|
|
*
|
|
|
|
* int bpf_skb_set_tunnel_opt(struct sk_buff *skb, u8 *opt, u32 size)
|
|
|
|
* Description
|
|
|
|
* Set tunnel options metadata for the packet associated to *skb*
|
|
|
|
* to the option data contained in the raw buffer *opt* of *size*.
|
|
|
|
*
|
|
|
|
* See also the description of the **bpf_skb_get_tunnel_opt**\ ()
|
|
|
|
* helper for additional information.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_skb_change_proto(struct sk_buff *skb, __be16 proto, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Change the protocol of the *skb* to *proto*. Currently
|
|
|
|
* supported are transition from IPv4 to IPv6, and from IPv6 to
|
|
|
|
* IPv4. The helper takes care of the groundwork for the
|
|
|
|
* transition, including resizing the socket buffer. The eBPF
|
|
|
|
* program is expected to fill the new headers, if any, via
|
|
|
|
* **skb_store_bytes**\ () and to recompute the checksums with
|
|
|
|
* **bpf_l3_csum_replace**\ () and **bpf_l4_csum_replace**\
|
|
|
|
* (). The main case for this helper is to perform NAT64
|
|
|
|
* operations out of an eBPF program.
|
|
|
|
*
|
|
|
|
* Internally, the GSO type is marked as dodgy so that headers are
|
|
|
|
* checked and segments are recalculated by the GSO/GRO engine.
|
|
|
|
* The size for GSO target is adapted as well.
|
|
|
|
*
|
|
|
|
* All values for *flags* are reserved for future usage, and must
|
|
|
|
* be left at zero.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_skb_change_type(struct sk_buff *skb, u32 type)
|
|
|
|
* Description
|
|
|
|
* Change the packet type for the packet associated to *skb*. This
|
|
|
|
* comes down to setting *skb*\ **->pkt_type** to *type*, except
|
|
|
|
* the eBPF program does not have a write access to *skb*\
|
|
|
|
* **->pkt_type** beside this helper. Using a helper here allows
|
|
|
|
* for graceful handling of errors.
|
|
|
|
*
|
|
|
|
* The major use case is to change incoming *skb*s to
|
|
|
|
* **PACKET_HOST** in a programmatic way instead of having to
|
|
|
|
* recirculate via **redirect**\ (..., **BPF_F_INGRESS**), for
|
|
|
|
* example.
|
|
|
|
*
|
|
|
|
* Note that *type* only allows certain values. At this time, they
|
|
|
|
* are:
|
|
|
|
*
|
|
|
|
* **PACKET_HOST**
|
|
|
|
* Packet is for us.
|
|
|
|
* **PACKET_BROADCAST**
|
|
|
|
* Send packet to all.
|
|
|
|
* **PACKET_MULTICAST**
|
|
|
|
* Send packet to group.
|
|
|
|
* **PACKET_OTHERHOST**
|
|
|
|
* Send packet to someone else.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-04-26 00:16:57 +07:00
|
|
|
* int bpf_skb_under_cgroup(struct sk_buff *skb, struct bpf_map *map, u32 index)
|
|
|
|
* Description
|
|
|
|
* Check whether *skb* is a descendant of the cgroup2 held by
|
|
|
|
* *map* of type **BPF_MAP_TYPE_CGROUP_ARRAY**, at *index*.
|
|
|
|
* Return
|
|
|
|
* The return value depends on the result of the test, and can be:
|
|
|
|
*
|
|
|
|
* * 0, if the *skb* failed the cgroup2 descendant test.
|
|
|
|
* * 1, if the *skb* succeeded the cgroup2 descendant test.
|
|
|
|
* * A negative error code, if an error occurred.
|
|
|
|
*
|
2018-04-26 00:16:56 +07:00
|
|
|
* u32 bpf_get_hash_recalc(struct sk_buff *skb)
|
|
|
|
* Description
|
|
|
|
* Retrieve the hash of the packet, *skb*\ **->hash**. If it is
|
|
|
|
* not set, in particular if the hash was cleared due to mangling,
|
|
|
|
* recompute this hash. Later accesses to the hash can be done
|
|
|
|
* directly with *skb*\ **->hash**.
|
|
|
|
*
|
|
|
|
* Calling **bpf_set_hash_invalid**\ (), changing a packet
|
|
|
|
* prototype with **bpf_skb_change_proto**\ (), or calling
|
|
|
|
* **bpf_skb_store_bytes**\ () with the
|
|
|
|
* **BPF_F_INVALIDATE_HASH** are actions susceptible to clear
|
|
|
|
* the hash and to trigger a new computation for the next call to
|
|
|
|
* **bpf_get_hash_recalc**\ ().
|
|
|
|
* Return
|
|
|
|
* The 32-bit hash.
|
|
|
|
*
|
2018-04-26 00:16:54 +07:00
|
|
|
* u64 bpf_get_current_task(void)
|
|
|
|
* Return
|
|
|
|
* A pointer to the current task struct.
|
2018-04-26 00:16:56 +07:00
|
|
|
*
|
2018-04-26 00:16:57 +07:00
|
|
|
* int bpf_probe_write_user(void *dst, const void *src, u32 len)
|
|
|
|
* Description
|
|
|
|
* Attempt in a safe way to write *len* bytes from the buffer
|
|
|
|
* *src* to *dst* in memory. It only works for threads that are in
|
|
|
|
* user context, and *dst* must be a valid user space address.
|
|
|
|
*
|
|
|
|
* This helper should not be used to implement any kind of
|
|
|
|
* security mechanism because of TOC-TOU attacks, but rather to
|
|
|
|
* debug, divert, and manipulate execution of semi-cooperative
|
|
|
|
* processes.
|
|
|
|
*
|
|
|
|
* Keep in mind that this feature is meant for experiments, and it
|
|
|
|
* has a risk of crashing the system and running programs.
|
|
|
|
* Therefore, when an eBPF program using this helper is attached,
|
|
|
|
* a warning including PID and process name is printed to kernel
|
|
|
|
* logs.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_current_task_under_cgroup(struct bpf_map *map, u32 index)
|
|
|
|
* Description
|
|
|
|
* Check whether the probe is being run is the context of a given
|
|
|
|
* subset of the cgroup2 hierarchy. The cgroup2 to test is held by
|
|
|
|
* *map* of type **BPF_MAP_TYPE_CGROUP_ARRAY**, at *index*.
|
|
|
|
* Return
|
|
|
|
* The return value depends on the result of the test, and can be:
|
|
|
|
*
|
|
|
|
* * 0, if the *skb* task belongs to the cgroup2.
|
|
|
|
* * 1, if the *skb* task does not belong to the cgroup2.
|
|
|
|
* * A negative error code, if an error occurred.
|
|
|
|
*
|
2018-04-26 00:16:56 +07:00
|
|
|
* int bpf_skb_change_tail(struct sk_buff *skb, u32 len, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Resize (trim or grow) the packet associated to *skb* to the
|
|
|
|
* new *len*. The *flags* are reserved for future usage, and must
|
|
|
|
* be left at zero.
|
|
|
|
*
|
|
|
|
* The basic idea is that the helper performs the needed work to
|
|
|
|
* change the size of the packet, then the eBPF program rewrites
|
|
|
|
* the rest via helpers like **bpf_skb_store_bytes**\ (),
|
|
|
|
* **bpf_l3_csum_replace**\ (), **bpf_l3_csum_replace**\ ()
|
|
|
|
* and others. This helper is a slow path utility intended for
|
|
|
|
* replies with control messages. And because it is targeted for
|
|
|
|
* slow path, the helper itself can afford to be slow: it
|
|
|
|
* implicitly linearizes, unclones and drops offloads from the
|
|
|
|
* *skb*.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_skb_pull_data(struct sk_buff *skb, u32 len)
|
|
|
|
* Description
|
|
|
|
* Pull in non-linear data in case the *skb* is non-linear and not
|
|
|
|
* all of *len* are part of the linear section. Make *len* bytes
|
|
|
|
* from *skb* readable and writable. If a zero value is passed for
|
|
|
|
* *len*, then the whole length of the *skb* is pulled.
|
|
|
|
*
|
|
|
|
* This helper is only needed for reading and writing with direct
|
|
|
|
* packet access.
|
|
|
|
*
|
|
|
|
* For direct packet access, testing that offsets to access
|
|
|
|
* are within packet boundaries (test on *skb*\ **->data_end**) is
|
|
|
|
* susceptible to fail if offsets are invalid, or if the requested
|
|
|
|
* data is in non-linear parts of the *skb*. On failure the
|
|
|
|
* program can just bail out, or in the case of a non-linear
|
|
|
|
* buffer, use a helper to make the data available. The
|
|
|
|
* **bpf_skb_load_bytes**\ () helper is a first solution to access
|
|
|
|
* the data. Another one consists in using **bpf_skb_pull_data**
|
|
|
|
* to pull in once the non-linear parts, then retesting and
|
|
|
|
* eventually access the data.
|
|
|
|
*
|
|
|
|
* At the same time, this also makes sure the *skb* is uncloned,
|
|
|
|
* which is a necessary condition for direct write. As this needs
|
|
|
|
* to be an invariant for the write part only, the verifier
|
|
|
|
* detects writes and adds a prologue that is calling
|
|
|
|
* **bpf_skb_pull_data()** to effectively unclone the *skb* from
|
|
|
|
* the very beginning in case it is indeed cloned.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* s64 bpf_csum_update(struct sk_buff *skb, __wsum csum)
|
|
|
|
* Description
|
|
|
|
* Add the checksum *csum* into *skb*\ **->csum** in case the
|
|
|
|
* driver has supplied a checksum for the entire packet into that
|
|
|
|
* field. Return an error otherwise. This helper is intended to be
|
|
|
|
* used in combination with **bpf_csum_diff**\ (), in particular
|
|
|
|
* when the checksum needs to be updated after data has been
|
|
|
|
* written into the packet through direct packet access.
|
|
|
|
* Return
|
|
|
|
* The checksum on success, or a negative error code in case of
|
|
|
|
* failure.
|
|
|
|
*
|
|
|
|
* void bpf_set_hash_invalid(struct sk_buff *skb)
|
|
|
|
* Description
|
|
|
|
* Invalidate the current *skb*\ **->hash**. It can be used after
|
|
|
|
* mangling on headers through direct packet access, in order to
|
|
|
|
* indicate that the hash is outdated and to trigger a
|
|
|
|
* recalculation the next time the kernel tries to access this
|
|
|
|
* hash or when the **bpf_get_hash_recalc**\ () helper is called.
|
|
|
|
*
|
|
|
|
* int bpf_get_numa_node_id(void)
|
|
|
|
* Description
|
|
|
|
* Return the id of the current NUMA node. The primary use case
|
|
|
|
* for this helper is the selection of sockets for the local NUMA
|
|
|
|
* node, when the program is attached to sockets using the
|
|
|
|
* **SO_ATTACH_REUSEPORT_EBPF** option (see also **socket(7)**),
|
|
|
|
* but the helper is also available to other eBPF program types,
|
|
|
|
* similarly to **bpf_get_smp_processor_id**\ ().
|
|
|
|
* Return
|
|
|
|
* The id of current NUMA node.
|
|
|
|
*
|
2018-04-26 00:16:57 +07:00
|
|
|
* int bpf_skb_change_head(struct sk_buff *skb, u32 len, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Grows headroom of packet associated to *skb* and adjusts the
|
|
|
|
* offset of the MAC header accordingly, adding *len* bytes of
|
|
|
|
* space. It automatically extends and reallocates memory as
|
|
|
|
* required.
|
|
|
|
*
|
|
|
|
* This helper can be used on a layer 3 *skb* to push a MAC header
|
|
|
|
* for redirection into a layer 2 device.
|
|
|
|
*
|
|
|
|
* All values for *flags* are reserved for future usage, and must
|
|
|
|
* be left at zero.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_xdp_adjust_head(struct xdp_buff *xdp_md, int delta)
|
|
|
|
* Description
|
|
|
|
* Adjust (move) *xdp_md*\ **->data** by *delta* bytes. Note that
|
|
|
|
* it is possible to use a negative value for *delta*. This helper
|
|
|
|
* can be used to prepare the packet for pushing or popping
|
|
|
|
* headers.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_probe_read_str(void *dst, int size, const void *unsafe_ptr)
|
|
|
|
* Description
|
|
|
|
* Copy a NUL terminated string from an unsafe address
|
|
|
|
* *unsafe_ptr* to *dst*. The *size* should include the
|
|
|
|
* terminating NUL byte. In case the string length is smaller than
|
|
|
|
* *size*, the target is not padded with further NUL bytes. If the
|
|
|
|
* string length is larger than *size*, just *size*-1 bytes are
|
|
|
|
* copied and the last byte is set to NUL.
|
|
|
|
*
|
|
|
|
* On success, the length of the copied string is returned. This
|
|
|
|
* makes this helper useful in tracing programs for reading
|
|
|
|
* strings, and more importantly to get its length at runtime. See
|
|
|
|
* the following snippet:
|
|
|
|
*
|
|
|
|
* ::
|
|
|
|
*
|
|
|
|
* SEC("kprobe/sys_open")
|
|
|
|
* void bpf_sys_open(struct pt_regs *ctx)
|
|
|
|
* {
|
|
|
|
* char buf[PATHLEN]; // PATHLEN is defined to 256
|
|
|
|
* int res = bpf_probe_read_str(buf, sizeof(buf),
|
|
|
|
* ctx->di);
|
|
|
|
*
|
|
|
|
* // Consume buf, for example push it to
|
|
|
|
* // userspace via bpf_perf_event_output(); we
|
|
|
|
* // can use res (the string length) as event
|
|
|
|
* // size, after checking its boundaries.
|
|
|
|
* }
|
|
|
|
*
|
|
|
|
* In comparison, using **bpf_probe_read()** helper here instead
|
|
|
|
* to read the string would require to estimate the length at
|
|
|
|
* compile time, and would often result in copying more memory
|
|
|
|
* than necessary.
|
|
|
|
*
|
|
|
|
* Another useful use case is when parsing individual process
|
|
|
|
* arguments or individual environment variables navigating
|
|
|
|
* *current*\ **->mm->arg_start** and *current*\
|
|
|
|
* **->mm->env_start**: using this helper and the return value,
|
|
|
|
* one can quickly iterate at the right offset of the memory area.
|
|
|
|
* Return
|
|
|
|
* On success, the strictly positive length of the string,
|
|
|
|
* including the trailing NUL character. On error, a negative
|
|
|
|
* value.
|
|
|
|
*
|
|
|
|
* u64 bpf_get_socket_cookie(struct sk_buff *skb)
|
|
|
|
* Description
|
|
|
|
* If the **struct sk_buff** pointed by *skb* has a known socket,
|
|
|
|
* retrieve the cookie (generated by the kernel) of this socket.
|
|
|
|
* If no cookie has been set yet, generate a new cookie. Once
|
|
|
|
* generated, the socket cookie remains stable for the life of the
|
|
|
|
* socket. This helper can be useful for monitoring per socket
|
|
|
|
* networking traffic statistics as it provides a unique socket
|
|
|
|
* identifier per namespace.
|
|
|
|
* Return
|
|
|
|
* A 8-byte long non-decreasing number on success, or 0 if the
|
|
|
|
* socket field is missing inside *skb*.
|
|
|
|
*
|
2018-07-31 07:42:28 +07:00
|
|
|
* u64 bpf_get_socket_cookie(struct bpf_sock_addr *ctx)
|
|
|
|
* Description
|
|
|
|
* Equivalent to bpf_get_socket_cookie() helper that accepts
|
2019-03-14 19:38:39 +07:00
|
|
|
* *skb*, but gets socket from **struct bpf_sock_addr** context.
|
2018-07-31 07:42:28 +07:00
|
|
|
* Return
|
|
|
|
* A 8-byte long non-decreasing number.
|
|
|
|
*
|
|
|
|
* u64 bpf_get_socket_cookie(struct bpf_sock_ops *ctx)
|
|
|
|
* Description
|
|
|
|
* Equivalent to bpf_get_socket_cookie() helper that accepts
|
2019-03-14 19:38:39 +07:00
|
|
|
* *skb*, but gets socket from **struct bpf_sock_ops** context.
|
2018-07-31 07:42:28 +07:00
|
|
|
* Return
|
|
|
|
* A 8-byte long non-decreasing number.
|
|
|
|
*
|
2018-04-26 00:16:57 +07:00
|
|
|
* u32 bpf_get_socket_uid(struct sk_buff *skb)
|
|
|
|
* Return
|
|
|
|
* The owner UID of the socket associated to *skb*. If the socket
|
|
|
|
* is **NULL**, or if it is not a full socket (i.e. if it is a
|
|
|
|
* time-wait or a request socket instead), **overflowuid** value
|
|
|
|
* is returned (note that **overflowuid** might also be the actual
|
|
|
|
* UID value for the socket).
|
|
|
|
*
|
2018-04-26 00:16:56 +07:00
|
|
|
* u32 bpf_set_hash(struct sk_buff *skb, u32 hash)
|
|
|
|
* Description
|
|
|
|
* Set the full hash for *skb* (set the field *skb*\ **->hash**)
|
|
|
|
* to value *hash*.
|
|
|
|
* Return
|
|
|
|
* 0
|
|
|
|
*
|
2018-04-29 06:06:19 +07:00
|
|
|
* int bpf_setsockopt(struct bpf_sock_ops *bpf_socket, int level, int optname, char *optval, int optlen)
|
2018-04-26 00:16:58 +07:00
|
|
|
* Description
|
|
|
|
* Emulate a call to **setsockopt()** on the socket associated to
|
|
|
|
* *bpf_socket*, which must be a full socket. The *level* at
|
|
|
|
* which the option resides and the name *optname* of the option
|
|
|
|
* must be specified, see **setsockopt(2)** for more information.
|
|
|
|
* The option value of length *optlen* is pointed by *optval*.
|
|
|
|
*
|
|
|
|
* This helper actually implements a subset of **setsockopt()**.
|
|
|
|
* It supports the following *level*\ s:
|
|
|
|
*
|
|
|
|
* * **SOL_SOCKET**, which supports the following *optname*\ s:
|
|
|
|
* **SO_RCVBUF**, **SO_SNDBUF**, **SO_MAX_PACING_RATE**,
|
|
|
|
* **SO_PRIORITY**, **SO_RCVLOWAT**, **SO_MARK**.
|
|
|
|
* * **IPPROTO_TCP**, which supports the following *optname*\ s:
|
|
|
|
* **TCP_CONGESTION**, **TCP_BPF_IW**,
|
|
|
|
* **TCP_BPF_SNDCWND_CLAMP**.
|
|
|
|
* * **IPPROTO_IP**, which supports *optname* **IP_TOS**.
|
|
|
|
* * **IPPROTO_IPV6**, which supports *optname* **IPV6_TCLASS**.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-10-17 21:24:48 +07:00
|
|
|
* int bpf_skb_adjust_room(struct sk_buff *skb, s32 len_diff, u32 mode, u64 flags)
|
2018-04-26 00:16:56 +07:00
|
|
|
* Description
|
|
|
|
* Grow or shrink the room for data in the packet associated to
|
|
|
|
* *skb* by *len_diff*, and according to the selected *mode*.
|
|
|
|
*
|
2019-03-23 01:32:54 +07:00
|
|
|
* There are two supported modes at this time:
|
|
|
|
*
|
|
|
|
* * **BPF_ADJ_ROOM_MAC**: Adjust room at the mac layer
|
|
|
|
* (room space is added or removed below the layer 2 header).
|
2018-04-26 00:16:56 +07:00
|
|
|
*
|
|
|
|
* * **BPF_ADJ_ROOM_NET**: Adjust room at the network layer
|
|
|
|
* (room space is added or removed below the layer 3 header).
|
|
|
|
*
|
2019-03-23 01:32:56 +07:00
|
|
|
* The following flags are supported at this time:
|
2019-03-23 01:32:55 +07:00
|
|
|
*
|
|
|
|
* * **BPF_F_ADJ_ROOM_FIXED_GSO**: Do not adjust gso_size.
|
|
|
|
* Adjusting mss in this way is not allowed for datagrams.
|
2018-04-26 00:16:56 +07:00
|
|
|
*
|
2019-03-23 01:32:56 +07:00
|
|
|
* * **BPF_F_ADJ_ROOM_ENCAP_L3_IPV4 **:
|
|
|
|
* * **BPF_F_ADJ_ROOM_ENCAP_L3_IPV6 **:
|
|
|
|
* Any new space is reserved to hold a tunnel header.
|
|
|
|
* Configure skb offsets and other fields accordingly.
|
|
|
|
*
|
|
|
|
* * **BPF_F_ADJ_ROOM_ENCAP_L4_GRE **:
|
|
|
|
* * **BPF_F_ADJ_ROOM_ENCAP_L4_UDP **:
|
|
|
|
* Use with ENCAP_L3 flags to further specify the tunnel type.
|
|
|
|
*
|
2018-04-26 00:16:56 +07:00
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-04-26 00:16:59 +07:00
|
|
|
* int bpf_redirect_map(struct bpf_map *map, u32 key, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Redirect the packet to the endpoint referenced by *map* at
|
|
|
|
* index *key*. Depending on its type, this *map* can contain
|
|
|
|
* references to net devices (for forwarding packets through other
|
|
|
|
* ports), or to CPUs (for redirecting XDP frames to another CPU;
|
|
|
|
* but this is only implemented for native XDP (with driver
|
|
|
|
* support) as of this writing).
|
|
|
|
*
|
|
|
|
* All values for *flags* are reserved for future usage, and must
|
|
|
|
* be left at zero.
|
|
|
|
*
|
|
|
|
* When used to redirect packets to net devices, this helper
|
|
|
|
* provides a high performance increase over **bpf_redirect**\ ().
|
|
|
|
* This is due to various implementation details of the underlying
|
|
|
|
* mechanisms, one of which is the fact that **bpf_redirect_map**\
|
|
|
|
* () tries to send packet as a "bulk" to the device.
|
|
|
|
* Return
|
|
|
|
* **XDP_REDIRECT** on success, or **XDP_ABORTED** on error.
|
|
|
|
*
|
|
|
|
* int bpf_sk_redirect_map(struct bpf_map *map, u32 key, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Redirect the packet to the socket referenced by *map* (of type
|
|
|
|
* **BPF_MAP_TYPE_SOCKMAP**) at index *key*. Both ingress and
|
|
|
|
* egress interfaces can be used for redirection. The
|
|
|
|
* **BPF_F_INGRESS** value in *flags* is used to make the
|
|
|
|
* distinction (ingress path is selected if the flag is present,
|
|
|
|
* egress path otherwise). This is the only flag supported for now.
|
|
|
|
* Return
|
|
|
|
* **SK_PASS** on success, or **SK_DROP** on error.
|
|
|
|
*
|
2018-04-29 06:06:19 +07:00
|
|
|
* int bpf_sock_map_update(struct bpf_sock_ops *skops, struct bpf_map *map, void *key, u64 flags)
|
2018-04-26 00:16:59 +07:00
|
|
|
* Description
|
|
|
|
* Add an entry to, or update a *map* referencing sockets. The
|
|
|
|
* *skops* is used as a new value for the entry associated to
|
|
|
|
* *key*. *flags* is one of:
|
|
|
|
*
|
|
|
|
* **BPF_NOEXIST**
|
|
|
|
* The entry for *key* must not exist in the map.
|
|
|
|
* **BPF_EXIST**
|
|
|
|
* The entry for *key* must already exist in the map.
|
|
|
|
* **BPF_ANY**
|
|
|
|
* No condition on the existence of the entry for *key*.
|
|
|
|
*
|
|
|
|
* If the *map* has eBPF programs (parser and verdict), those will
|
|
|
|
* be inherited by the socket being added. If the socket is
|
|
|
|
* already attached to eBPF programs, this results in an error.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-04-26 00:16:56 +07:00
|
|
|
* int bpf_xdp_adjust_meta(struct xdp_buff *xdp_md, int delta)
|
|
|
|
* Description
|
|
|
|
* Adjust the address pointed by *xdp_md*\ **->data_meta** by
|
|
|
|
* *delta* (which can be positive or negative). Note that this
|
|
|
|
* operation modifies the address stored in *xdp_md*\ **->data**,
|
|
|
|
* so the latter must be loaded only after the helper has been
|
|
|
|
* called.
|
|
|
|
*
|
|
|
|
* The use of *xdp_md*\ **->data_meta** is optional and programs
|
|
|
|
* are not required to use it. The rationale is that when the
|
|
|
|
* packet is processed with XDP (e.g. as DoS filter), it is
|
|
|
|
* possible to push further meta data along with it before passing
|
|
|
|
* to the stack, and to give the guarantee that an ingress eBPF
|
|
|
|
* program attached as a TC classifier on the same device can pick
|
|
|
|
* this up for further post-processing. Since TC works with socket
|
|
|
|
* buffers, it remains possible to set from XDP the **mark** or
|
|
|
|
* **priority** pointers, or other pointers for the socket buffer.
|
|
|
|
* Having this scratch space generic and programmable allows for
|
|
|
|
* more flexibility as the user is free to store whatever meta
|
|
|
|
* data they need.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
2018-04-26 00:16:58 +07:00
|
|
|
*
|
|
|
|
* int bpf_perf_event_read_value(struct bpf_map *map, u64 flags, struct bpf_perf_event_value *buf, u32 buf_size)
|
|
|
|
* Description
|
|
|
|
* Read the value of a perf event counter, and store it into *buf*
|
|
|
|
* of size *buf_size*. This helper relies on a *map* of type
|
|
|
|
* **BPF_MAP_TYPE_PERF_EVENT_ARRAY**. The nature of the perf event
|
|
|
|
* counter is selected when *map* is updated with perf event file
|
|
|
|
* descriptors. The *map* is an array whose size is the number of
|
|
|
|
* available CPUs, and each cell contains a value relative to one
|
|
|
|
* CPU. The value to retrieve is indicated by *flags*, that
|
|
|
|
* contains the index of the CPU to look up, masked with
|
|
|
|
* **BPF_F_INDEX_MASK**. Alternatively, *flags* can be set to
|
|
|
|
* **BPF_F_CURRENT_CPU** to indicate that the value for the
|
|
|
|
* current CPU should be retrieved.
|
|
|
|
*
|
|
|
|
* This helper behaves in a way close to
|
|
|
|
* **bpf_perf_event_read**\ () helper, save that instead of
|
|
|
|
* just returning the value observed, it fills the *buf*
|
|
|
|
* structure. This allows for additional data to be retrieved: in
|
|
|
|
* particular, the enabled and running times (in *buf*\
|
|
|
|
* **->enabled** and *buf*\ **->running**, respectively) are
|
|
|
|
* copied. In general, **bpf_perf_event_read_value**\ () is
|
|
|
|
* recommended over **bpf_perf_event_read**\ (), which has some
|
|
|
|
* ABI issues and provides fewer functionalities.
|
|
|
|
*
|
|
|
|
* These values are interesting, because hardware PMU (Performance
|
|
|
|
* Monitoring Unit) counters are limited resources. When there are
|
|
|
|
* more PMU based perf events opened than available counters,
|
|
|
|
* kernel will multiplex these events so each event gets certain
|
|
|
|
* percentage (but not all) of the PMU time. In case that
|
|
|
|
* multiplexing happens, the number of samples or counter value
|
|
|
|
* will not reflect the case compared to when no multiplexing
|
|
|
|
* occurs. This makes comparison between different runs difficult.
|
|
|
|
* Typically, the counter value should be normalized before
|
|
|
|
* comparing to other experiments. The usual normalization is done
|
|
|
|
* as follows.
|
|
|
|
*
|
|
|
|
* ::
|
|
|
|
*
|
|
|
|
* normalized_counter = counter * t_enabled / t_running
|
|
|
|
*
|
|
|
|
* Where t_enabled is the time enabled for event and t_running is
|
|
|
|
* the time running for event since last normalization. The
|
|
|
|
* enabled and running times are accumulated since the perf event
|
|
|
|
* open. To achieve scaling factor between two invocations of an
|
|
|
|
* eBPF program, users can can use CPU id as the key (which is
|
|
|
|
* typical for perf array usage model) to remember the previous
|
|
|
|
* value and do the calculation inside the eBPF program.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-04-29 06:06:19 +07:00
|
|
|
* int bpf_perf_prog_read_value(struct bpf_perf_event_data *ctx, struct bpf_perf_event_value *buf, u32 buf_size)
|
2018-04-26 00:16:58 +07:00
|
|
|
* Description
|
|
|
|
* For en eBPF program attached to a perf event, retrieve the
|
|
|
|
* value of the event counter associated to *ctx* and store it in
|
|
|
|
* the structure pointed by *buf* and of size *buf_size*. Enabled
|
|
|
|
* and running times are also stored in the structure (see
|
|
|
|
* description of helper **bpf_perf_event_read_value**\ () for
|
|
|
|
* more details).
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-04-29 06:06:19 +07:00
|
|
|
* int bpf_getsockopt(struct bpf_sock_ops *bpf_socket, int level, int optname, char *optval, int optlen)
|
2018-04-26 00:16:58 +07:00
|
|
|
* Description
|
|
|
|
* Emulate a call to **getsockopt()** on the socket associated to
|
|
|
|
* *bpf_socket*, which must be a full socket. The *level* at
|
|
|
|
* which the option resides and the name *optname* of the option
|
|
|
|
* must be specified, see **getsockopt(2)** for more information.
|
|
|
|
* The retrieved value is stored in the structure pointed by
|
|
|
|
* *opval* and of length *optlen*.
|
|
|
|
*
|
|
|
|
* This helper actually implements a subset of **getsockopt()**.
|
|
|
|
* It supports the following *level*\ s:
|
|
|
|
*
|
|
|
|
* * **IPPROTO_TCP**, which supports *optname*
|
|
|
|
* **TCP_CONGESTION**.
|
|
|
|
* * **IPPROTO_IP**, which supports *optname* **IP_TOS**.
|
|
|
|
* * **IPPROTO_IPV6**, which supports *optname* **IPV6_TCLASS**.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_override_return(struct pt_reg *regs, u64 rc)
|
|
|
|
* Description
|
|
|
|
* Used for error injection, this helper uses kprobes to override
|
|
|
|
* the return value of the probed function, and to set it to *rc*.
|
|
|
|
* The first argument is the context *regs* on which the kprobe
|
|
|
|
* works.
|
|
|
|
*
|
|
|
|
* This helper works by setting setting the PC (program counter)
|
|
|
|
* to an override function which is run in place of the original
|
|
|
|
* probed function. This means the probed function is not run at
|
|
|
|
* all. The replacement function just returns with the required
|
|
|
|
* value.
|
|
|
|
*
|
|
|
|
* This helper has security implications, and thus is subject to
|
|
|
|
* restrictions. It is only available if the kernel was compiled
|
|
|
|
* with the **CONFIG_BPF_KPROBE_OVERRIDE** configuration
|
|
|
|
* option, and in this case it only works on functions tagged with
|
|
|
|
* **ALLOW_ERROR_INJECTION** in the kernel code.
|
|
|
|
*
|
|
|
|
* Also, the helper is only available for the architectures having
|
|
|
|
* the CONFIG_FUNCTION_ERROR_INJECTION option. As of this writing,
|
|
|
|
* x86 architecture is the only one to support this feature.
|
|
|
|
* Return
|
|
|
|
* 0
|
|
|
|
*
|
2018-04-29 06:06:19 +07:00
|
|
|
* int bpf_sock_ops_cb_flags_set(struct bpf_sock_ops *bpf_sock, int argval)
|
2018-04-26 00:16:58 +07:00
|
|
|
* Description
|
|
|
|
* Attempt to set the value of the **bpf_sock_ops_cb_flags** field
|
|
|
|
* for the full TCP socket associated to *bpf_sock_ops* to
|
|
|
|
* *argval*.
|
|
|
|
*
|
|
|
|
* The primary use of this field is to determine if there should
|
|
|
|
* be calls to eBPF programs of type
|
|
|
|
* **BPF_PROG_TYPE_SOCK_OPS** at various points in the TCP
|
|
|
|
* code. A program of the same type can change its value, per
|
|
|
|
* connection and as necessary, when the connection is
|
|
|
|
* established. This field is directly accessible for reading, but
|
|
|
|
* this helper must be used for updates in order to return an
|
|
|
|
* error if an eBPF program tries to set a callback that is not
|
|
|
|
* supported in the current kernel.
|
|
|
|
*
|
|
|
|
* The supported callback values that *argval* can combine are:
|
|
|
|
*
|
|
|
|
* * **BPF_SOCK_OPS_RTO_CB_FLAG** (retransmission time out)
|
|
|
|
* * **BPF_SOCK_OPS_RETRANS_CB_FLAG** (retransmission)
|
|
|
|
* * **BPF_SOCK_OPS_STATE_CB_FLAG** (TCP state change)
|
|
|
|
*
|
|
|
|
* Here are some examples of where one could call such eBPF
|
|
|
|
* program:
|
|
|
|
*
|
|
|
|
* * When RTO fires.
|
|
|
|
* * When a packet is retransmitted.
|
|
|
|
* * When the connection terminates.
|
|
|
|
* * When a packet is sent.
|
|
|
|
* * When a packet is received.
|
|
|
|
* Return
|
|
|
|
* Code **-EINVAL** if the socket is not a full TCP socket;
|
|
|
|
* otherwise, a positive number containing the bits that could not
|
|
|
|
* be set is returned (which comes down to 0 if all bits were set
|
|
|
|
* as required).
|
|
|
|
*
|
2018-04-26 00:16:59 +07:00
|
|
|
* int bpf_msg_redirect_map(struct sk_msg_buff *msg, struct bpf_map *map, u32 key, u64 flags)
|
|
|
|
* Description
|
|
|
|
* This helper is used in programs implementing policies at the
|
|
|
|
* socket level. If the message *msg* is allowed to pass (i.e. if
|
|
|
|
* the verdict eBPF program returns **SK_PASS**), redirect it to
|
|
|
|
* the socket referenced by *map* (of type
|
|
|
|
* **BPF_MAP_TYPE_SOCKMAP**) at index *key*. Both ingress and
|
|
|
|
* egress interfaces can be used for redirection. The
|
|
|
|
* **BPF_F_INGRESS** value in *flags* is used to make the
|
|
|
|
* distinction (ingress path is selected if the flag is present,
|
|
|
|
* egress path otherwise). This is the only flag supported for now.
|
|
|
|
* Return
|
|
|
|
* **SK_PASS** on success, or **SK_DROP** on error.
|
|
|
|
*
|
|
|
|
* int bpf_msg_apply_bytes(struct sk_msg_buff *msg, u32 bytes)
|
|
|
|
* Description
|
|
|
|
* For socket policies, apply the verdict of the eBPF program to
|
|
|
|
* the next *bytes* (number of bytes) of message *msg*.
|
|
|
|
*
|
|
|
|
* For example, this helper can be used in the following cases:
|
|
|
|
*
|
|
|
|
* * A single **sendmsg**\ () or **sendfile**\ () system call
|
|
|
|
* contains multiple logical messages that the eBPF program is
|
|
|
|
* supposed to read and for which it should apply a verdict.
|
|
|
|
* * An eBPF program only cares to read the first *bytes* of a
|
|
|
|
* *msg*. If the message has a large payload, then setting up
|
|
|
|
* and calling the eBPF program repeatedly for all bytes, even
|
|
|
|
* though the verdict is already known, would create unnecessary
|
|
|
|
* overhead.
|
|
|
|
*
|
|
|
|
* When called from within an eBPF program, the helper sets a
|
|
|
|
* counter internal to the BPF infrastructure, that is used to
|
|
|
|
* apply the last verdict to the next *bytes*. If *bytes* is
|
|
|
|
* smaller than the current data being processed from a
|
|
|
|
* **sendmsg**\ () or **sendfile**\ () system call, the first
|
|
|
|
* *bytes* will be sent and the eBPF program will be re-run with
|
|
|
|
* the pointer for start of data pointing to byte number *bytes*
|
|
|
|
* **+ 1**. If *bytes* is larger than the current data being
|
|
|
|
* processed, then the eBPF verdict will be applied to multiple
|
|
|
|
* **sendmsg**\ () or **sendfile**\ () calls until *bytes* are
|
|
|
|
* consumed.
|
|
|
|
*
|
|
|
|
* Note that if a socket closes with the internal counter holding
|
|
|
|
* a non-zero value, this is not a problem because data is not
|
|
|
|
* being buffered for *bytes* and is sent as it is received.
|
|
|
|
* Return
|
|
|
|
* 0
|
|
|
|
*
|
|
|
|
* int bpf_msg_cork_bytes(struct sk_msg_buff *msg, u32 bytes)
|
|
|
|
* Description
|
|
|
|
* For socket policies, prevent the execution of the verdict eBPF
|
|
|
|
* program for message *msg* until *bytes* (byte number) have been
|
|
|
|
* accumulated.
|
|
|
|
*
|
|
|
|
* This can be used when one needs a specific number of bytes
|
|
|
|
* before a verdict can be assigned, even if the data spans
|
|
|
|
* multiple **sendmsg**\ () or **sendfile**\ () calls. The extreme
|
|
|
|
* case would be a user calling **sendmsg**\ () repeatedly with
|
|
|
|
* 1-byte long message segments. Obviously, this is bad for
|
|
|
|
* performance, but it is still valid. If the eBPF program needs
|
|
|
|
* *bytes* bytes to validate a header, this helper can be used to
|
|
|
|
* prevent the eBPF program to be called again until *bytes* have
|
|
|
|
* been accumulated.
|
|
|
|
* Return
|
|
|
|
* 0
|
|
|
|
*
|
|
|
|
* int bpf_msg_pull_data(struct sk_msg_buff *msg, u32 start, u32 end, u64 flags)
|
|
|
|
* Description
|
|
|
|
* For socket policies, pull in non-linear data from user space
|
|
|
|
* for *msg* and set pointers *msg*\ **->data** and *msg*\
|
|
|
|
* **->data_end** to *start* and *end* bytes offsets into *msg*,
|
|
|
|
* respectively.
|
|
|
|
*
|
|
|
|
* If a program of type **BPF_PROG_TYPE_SK_MSG** is run on a
|
|
|
|
* *msg* it can only parse data that the (**data**, **data_end**)
|
|
|
|
* pointers have already consumed. For **sendmsg**\ () hooks this
|
|
|
|
* is likely the first scatterlist element. But for calls relying
|
|
|
|
* on the **sendpage** handler (e.g. **sendfile**\ ()) this will
|
|
|
|
* be the range (**0**, **0**) because the data is shared with
|
|
|
|
* user space and by default the objective is to avoid allowing
|
|
|
|
* user space to modify data while (or after) eBPF verdict is
|
|
|
|
* being decided. This helper can be used to pull in data and to
|
|
|
|
* set the start and end pointer to given values. Data will be
|
|
|
|
* copied if necessary (i.e. if data was not linear and if start
|
|
|
|
* and end pointers do not point to the same chunk).
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
*
|
|
|
|
* All values for *flags* are reserved for future usage, and must
|
|
|
|
* be left at zero.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-04-29 06:06:19 +07:00
|
|
|
* int bpf_bind(struct bpf_sock_addr *ctx, struct sockaddr *addr, int addr_len)
|
2018-04-26 00:16:58 +07:00
|
|
|
* Description
|
|
|
|
* Bind the socket associated to *ctx* to the address pointed by
|
|
|
|
* *addr*, of length *addr_len*. This allows for making outgoing
|
|
|
|
* connection from the desired IP address, which can be useful for
|
|
|
|
* example when all processes inside a cgroup should use one
|
|
|
|
* single IP address on a host that has multiple IP configured.
|
|
|
|
*
|
|
|
|
* This helper works for IPv4 and IPv6, TCP and UDP sockets. The
|
|
|
|
* domain (*addr*\ **->sa_family**) must be **AF_INET** (or
|
|
|
|
* **AF_INET6**). Looking for a free port to bind to can be
|
|
|
|
* expensive, therefore binding to port is not permitted by the
|
|
|
|
* helper: *addr*\ **->sin_port** (or **sin6_port**, respectively)
|
|
|
|
* must be set to zero.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
2018-04-26 00:17:00 +07:00
|
|
|
*
|
|
|
|
* int bpf_xdp_adjust_tail(struct xdp_buff *xdp_md, int delta)
|
|
|
|
* Description
|
|
|
|
* Adjust (move) *xdp_md*\ **->data_end** by *delta* bytes. It is
|
|
|
|
* only possible to shrink the packet as of this writing,
|
|
|
|
* therefore *delta* must be a negative integer.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_skb_get_xfrm_state(struct sk_buff *skb, u32 index, struct bpf_xfrm_state *xfrm_state, u32 size, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Retrieve the XFRM state (IP transform framework, see also
|
|
|
|
* **ip-xfrm(8)**) at *index* in XFRM "security path" for *skb*.
|
|
|
|
*
|
|
|
|
* The retrieved value is stored in the **struct bpf_xfrm_state**
|
|
|
|
* pointed by *xfrm_state* and of length *size*.
|
|
|
|
*
|
|
|
|
* All values for *flags* are reserved for future usage, and must
|
|
|
|
* be left at zero.
|
|
|
|
*
|
|
|
|
* This helper is available only if the kernel was compiled with
|
|
|
|
* **CONFIG_XFRM** configuration option.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
2018-04-29 12:28:08 +07:00
|
|
|
*
|
|
|
|
* int bpf_get_stack(struct pt_regs *regs, void *buf, u32 size, u64 flags)
|
|
|
|
* Description
|
2018-04-30 17:39:04 +07:00
|
|
|
* Return a user or a kernel stack in bpf program provided buffer.
|
|
|
|
* To achieve this, the helper needs *ctx*, which is a pointer
|
|
|
|
* to the context on which the tracing program is executed.
|
|
|
|
* To store the stacktrace, the bpf program provides *buf* with
|
|
|
|
* a nonnegative *size*.
|
|
|
|
*
|
|
|
|
* The last argument, *flags*, holds the number of stack frames to
|
|
|
|
* skip (from 0 to 255), masked with
|
|
|
|
* **BPF_F_SKIP_FIELD_MASK**. The next bits can be used to set
|
|
|
|
* the following flags:
|
|
|
|
*
|
|
|
|
* **BPF_F_USER_STACK**
|
|
|
|
* Collect a user space stack instead of a kernel stack.
|
|
|
|
* **BPF_F_USER_BUILD_ID**
|
|
|
|
* Collect buildid+offset instead of ips for user stack,
|
|
|
|
* only valid if **BPF_F_USER_STACK** is also specified.
|
|
|
|
*
|
|
|
|
* **bpf_get_stack**\ () can collect up to
|
|
|
|
* **PERF_MAX_STACK_DEPTH** both kernel and user frames, subject
|
|
|
|
* to sufficient large buffer size. Note that
|
|
|
|
* this limit can be controlled with the **sysctl** program, and
|
|
|
|
* that it should be manually increased in order to profile long
|
|
|
|
* user stacks (such as stacks for Java programs). To do so, use:
|
|
|
|
*
|
|
|
|
* ::
|
|
|
|
*
|
|
|
|
* # sysctl kernel.perf_event_max_stack=<new value>
|
2018-04-29 12:28:08 +07:00
|
|
|
* Return
|
2018-05-29 18:27:44 +07:00
|
|
|
* A non-negative value equal to or less than *size* on success,
|
|
|
|
* or a negative error in case of failure.
|
2018-05-04 06:08:15 +07:00
|
|
|
*
|
2018-07-12 18:52:22 +07:00
|
|
|
* int bpf_skb_load_bytes_relative(const struct sk_buff *skb, u32 offset, void *to, u32 len, u32 start_header)
|
2018-05-04 06:08:15 +07:00
|
|
|
* Description
|
|
|
|
* This helper is similar to **bpf_skb_load_bytes**\ () in that
|
|
|
|
* it provides an easy way to load *len* bytes from *offset*
|
|
|
|
* from the packet associated to *skb*, into the buffer pointed
|
|
|
|
* by *to*. The difference to **bpf_skb_load_bytes**\ () is that
|
|
|
|
* a fifth argument *start_header* exists in order to select a
|
|
|
|
* base offset to start from. *start_header* can be one of:
|
|
|
|
*
|
|
|
|
* **BPF_HDR_START_MAC**
|
|
|
|
* Base offset to load data from is *skb*'s mac header.
|
|
|
|
* **BPF_HDR_START_NET**
|
|
|
|
* Base offset to load data from is *skb*'s network header.
|
|
|
|
*
|
|
|
|
* In general, "direct packet access" is the preferred method to
|
|
|
|
* access packet data, however, this helper is in particular useful
|
|
|
|
* in socket filters where *skb*\ **->data** does not always point
|
|
|
|
* to the start of the mac header and where "direct packet access"
|
|
|
|
* is not available.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
* int bpf_fib_lookup(void *ctx, struct bpf_fib_lookup *params, int plen, u32 flags)
|
|
|
|
* Description
|
|
|
|
* Do FIB lookup in kernel tables using parameters in *params*.
|
|
|
|
* If lookup is successful and result shows packet is to be
|
|
|
|
* forwarded, the neighbor tables are searched for the nexthop.
|
|
|
|
* If successful (ie., FIB lookup shows forwarding and nexthop
|
2018-05-30 00:58:07 +07:00
|
|
|
* is resolved), the nexthop address is returned in ipv4_dst
|
|
|
|
* or ipv6_dst based on family, smac is set to mac address of
|
|
|
|
* egress device, dmac is set to nexthop mac address, rt_metric
|
2018-06-27 06:21:18 +07:00
|
|
|
* is set to metric from route (IPv4/IPv6 only), and ifindex
|
|
|
|
* is set to the device index of the nexthop from the FIB lookup.
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
*
|
2018-12-03 19:13:35 +07:00
|
|
|
* *plen* argument is the size of the passed in struct.
|
|
|
|
* *flags* argument can be a combination of one or more of the
|
|
|
|
* following values:
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
*
|
2018-05-29 18:27:44 +07:00
|
|
|
* **BPF_FIB_LOOKUP_DIRECT**
|
|
|
|
* Do a direct table lookup vs full lookup using FIB
|
|
|
|
* rules.
|
|
|
|
* **BPF_FIB_LOOKUP_OUTPUT**
|
|
|
|
* Perform lookup from an egress perspective (default is
|
|
|
|
* ingress).
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
*
|
2018-12-03 19:13:35 +07:00
|
|
|
* *ctx* is either **struct xdp_md** for XDP programs or
|
|
|
|
* **struct sk_buff** tc cls_act programs.
|
|
|
|
* Return
|
2018-06-27 06:21:18 +07:00
|
|
|
* * < 0 if any input argument is invalid
|
|
|
|
* * 0 on success (packet is forwarded, nexthop neighbor exists)
|
|
|
|
* * > 0 one of **BPF_FIB_LKUP_RET_** codes explaining why the
|
2018-07-12 18:52:22 +07:00
|
|
|
* packet is not forwarded or needs assist from full stack
|
2018-05-15 00:00:17 +07:00
|
|
|
*
|
|
|
|
* int bpf_sock_hash_update(struct bpf_sock_ops_kern *skops, struct bpf_map *map, void *key, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Add an entry to, or update a sockhash *map* referencing sockets.
|
|
|
|
* The *skops* is used as a new value for the entry associated to
|
|
|
|
* *key*. *flags* is one of:
|
|
|
|
*
|
|
|
|
* **BPF_NOEXIST**
|
|
|
|
* The entry for *key* must not exist in the map.
|
|
|
|
* **BPF_EXIST**
|
|
|
|
* The entry for *key* must already exist in the map.
|
|
|
|
* **BPF_ANY**
|
|
|
|
* No condition on the existence of the entry for *key*.
|
|
|
|
*
|
|
|
|
* If the *map* has eBPF programs (parser and verdict), those will
|
|
|
|
* be inherited by the socket being added. If the socket is
|
|
|
|
* already attached to eBPF programs, this results in an error.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_msg_redirect_hash(struct sk_msg_buff *msg, struct bpf_map *map, void *key, u64 flags)
|
|
|
|
* Description
|
|
|
|
* This helper is used in programs implementing policies at the
|
|
|
|
* socket level. If the message *msg* is allowed to pass (i.e. if
|
|
|
|
* the verdict eBPF program returns **SK_PASS**), redirect it to
|
|
|
|
* the socket referenced by *map* (of type
|
|
|
|
* **BPF_MAP_TYPE_SOCKHASH**) using hash *key*. Both ingress and
|
|
|
|
* egress interfaces can be used for redirection. The
|
|
|
|
* **BPF_F_INGRESS** value in *flags* is used to make the
|
|
|
|
* distinction (ingress path is selected if the flag is present,
|
|
|
|
* egress path otherwise). This is the only flag supported for now.
|
|
|
|
* Return
|
|
|
|
* **SK_PASS** on success, or **SK_DROP** on error.
|
|
|
|
*
|
|
|
|
* int bpf_sk_redirect_hash(struct sk_buff *skb, struct bpf_map *map, void *key, u64 flags)
|
|
|
|
* Description
|
|
|
|
* This helper is used in programs implementing policies at the
|
|
|
|
* skb socket level. If the sk_buff *skb* is allowed to pass (i.e.
|
|
|
|
* if the verdeict eBPF program returns **SK_PASS**), redirect it
|
|
|
|
* to the socket referenced by *map* (of type
|
|
|
|
* **BPF_MAP_TYPE_SOCKHASH**) using hash *key*. Both ingress and
|
|
|
|
* egress interfaces can be used for redirection. The
|
|
|
|
* **BPF_F_INGRESS** value in *flags* is used to make the
|
|
|
|
* distinction (ingress path is selected if the flag is present,
|
|
|
|
* egress otherwise). This is the only flag supported for now.
|
|
|
|
* Return
|
|
|
|
* **SK_PASS** on success, or **SK_DROP** on error.
|
bpf: Add IPv6 Segment Routing helpers
The BPF seg6local hook should be powerful enough to enable users to
implement most of the use-cases one could think of. After some thinking,
we figured out that the following actions should be possible on a SRv6
packet, requiring 3 specific helpers :
- bpf_lwt_seg6_store_bytes: Modify non-sensitive fields of the SRH
- bpf_lwt_seg6_adjust_srh: Allow to grow or shrink a SRH
(to add/delete TLVs)
- bpf_lwt_seg6_action: Apply some SRv6 network programming actions
(specifically End.X, End.T, End.B6 and
End.B6.Encap)
The specifications of these helpers are provided in the patch (see
include/uapi/linux/bpf.h).
The non-sensitive fields of the SRH are the following : flags, tag and
TLVs. The other fields can not be modified, to maintain the SRH
integrity. Flags, tag and TLVs can easily be modified as their validity
can be checked afterwards via seg6_validate_srh. It is not allowed to
modify the segments directly. If one wants to add segments on the path,
he should stack a new SRH using the End.B6 action via
bpf_lwt_seg6_action.
Growing, shrinking or editing TLVs via the helpers will flag the SRH as
invalid, and it will have to be re-validated before re-entering the IPv6
layer. This flag is stored in a per-CPU buffer, along with the current
header length in bytes.
Storing the SRH len in bytes in the control block is mandatory when using
bpf_lwt_seg6_adjust_srh. The Header Ext. Length field contains the SRH
len rounded to 8 bytes (a padding TLV can be inserted to ensure the 8-bytes
boundary). When adding/deleting TLVs within the BPF program, the SRH may
temporary be in an invalid state where its length cannot be rounded to 8
bytes without remainder, hence the need to store the length in bytes
separately. The caller of the BPF program can then ensure that the SRH's
final length is valid using this value. Again, a final SRH modified by a
BPF program which doesn’t respect the 8-bytes boundary will be discarded
as it will be considered as invalid.
Finally, a fourth helper is provided, bpf_lwt_push_encap, which is
available from the LWT BPF IN hook, but not from the seg6local BPF one.
This helper allows to encapsulate a Segment Routing Header (either with
a new outer IPv6 header, or by inlining it directly in the existing IPv6
header) into a non-SRv6 packet. This helper is required if we want to
offer the possibility to dynamically encapsulate a SRH for non-SRv6 packet,
as the BPF seg6local hook only works on traffic already containing a SRH.
This is the BPF equivalent of the seg6 LWT infrastructure, which achieves
the same purpose but with a static SRH per route.
These helpers require CONFIG_IPV6=y (and not =m).
Signed-off-by: Mathieu Xhonneux <m.xhonneux@gmail.com>
Acked-by: David Lebrun <dlebrun@google.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-20 20:58:14 +07:00
|
|
|
*
|
|
|
|
* int bpf_lwt_push_encap(struct sk_buff *skb, u32 type, void *hdr, u32 len)
|
|
|
|
* Description
|
|
|
|
* Encapsulate the packet associated to *skb* within a Layer 3
|
|
|
|
* protocol header. This header is provided in the buffer at
|
|
|
|
* address *hdr*, with *len* its size in bytes. *type* indicates
|
|
|
|
* the protocol of the header and can be one of:
|
|
|
|
*
|
|
|
|
* **BPF_LWT_ENCAP_SEG6**
|
|
|
|
* IPv6 encapsulation with Segment Routing Header
|
|
|
|
* (**struct ipv6_sr_hdr**). *hdr* only contains the SRH,
|
|
|
|
* the IPv6 header is computed by the kernel.
|
|
|
|
* **BPF_LWT_ENCAP_SEG6_INLINE**
|
|
|
|
* Only works if *skb* contains an IPv6 packet. Insert a
|
|
|
|
* Segment Routing Header (**struct ipv6_sr_hdr**) inside
|
|
|
|
* the IPv6 header.
|
2019-02-14 02:53:35 +07:00
|
|
|
* **BPF_LWT_ENCAP_IP**
|
|
|
|
* IP encapsulation (GRE/GUE/IPIP/etc). The outer header
|
|
|
|
* must be IPv4 or IPv6, followed by zero or more
|
|
|
|
* additional headers, up to LWT_BPF_MAX_HEADROOM total
|
|
|
|
* bytes in all prepended headers. Please note that
|
|
|
|
* if skb_is_gso(skb) is true, no more than two headers
|
|
|
|
* can be prepended, and the inner header, if present,
|
|
|
|
* should be either GRE or UDP/GUE.
|
|
|
|
*
|
|
|
|
* BPF_LWT_ENCAP_SEG6*** types can be called by bpf programs of
|
|
|
|
* type BPF_PROG_TYPE_LWT_IN; BPF_LWT_ENCAP_IP type can be called
|
|
|
|
* by bpf programs of types BPF_PROG_TYPE_LWT_IN and
|
|
|
|
* BPF_PROG_TYPE_LWT_XMIT.
|
bpf: Add IPv6 Segment Routing helpers
The BPF seg6local hook should be powerful enough to enable users to
implement most of the use-cases one could think of. After some thinking,
we figured out that the following actions should be possible on a SRv6
packet, requiring 3 specific helpers :
- bpf_lwt_seg6_store_bytes: Modify non-sensitive fields of the SRH
- bpf_lwt_seg6_adjust_srh: Allow to grow or shrink a SRH
(to add/delete TLVs)
- bpf_lwt_seg6_action: Apply some SRv6 network programming actions
(specifically End.X, End.T, End.B6 and
End.B6.Encap)
The specifications of these helpers are provided in the patch (see
include/uapi/linux/bpf.h).
The non-sensitive fields of the SRH are the following : flags, tag and
TLVs. The other fields can not be modified, to maintain the SRH
integrity. Flags, tag and TLVs can easily be modified as their validity
can be checked afterwards via seg6_validate_srh. It is not allowed to
modify the segments directly. If one wants to add segments on the path,
he should stack a new SRH using the End.B6 action via
bpf_lwt_seg6_action.
Growing, shrinking or editing TLVs via the helpers will flag the SRH as
invalid, and it will have to be re-validated before re-entering the IPv6
layer. This flag is stored in a per-CPU buffer, along with the current
header length in bytes.
Storing the SRH len in bytes in the control block is mandatory when using
bpf_lwt_seg6_adjust_srh. The Header Ext. Length field contains the SRH
len rounded to 8 bytes (a padding TLV can be inserted to ensure the 8-bytes
boundary). When adding/deleting TLVs within the BPF program, the SRH may
temporary be in an invalid state where its length cannot be rounded to 8
bytes without remainder, hence the need to store the length in bytes
separately. The caller of the BPF program can then ensure that the SRH's
final length is valid using this value. Again, a final SRH modified by a
BPF program which doesn’t respect the 8-bytes boundary will be discarded
as it will be considered as invalid.
Finally, a fourth helper is provided, bpf_lwt_push_encap, which is
available from the LWT BPF IN hook, but not from the seg6local BPF one.
This helper allows to encapsulate a Segment Routing Header (either with
a new outer IPv6 header, or by inlining it directly in the existing IPv6
header) into a non-SRv6 packet. This helper is required if we want to
offer the possibility to dynamically encapsulate a SRH for non-SRv6 packet,
as the BPF seg6local hook only works on traffic already containing a SRH.
This is the BPF equivalent of the seg6 LWT infrastructure, which achieves
the same purpose but with a static SRH per route.
These helpers require CONFIG_IPV6=y (and not =m).
Signed-off-by: Mathieu Xhonneux <m.xhonneux@gmail.com>
Acked-by: David Lebrun <dlebrun@google.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-20 20:58:14 +07:00
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_lwt_seg6_store_bytes(struct sk_buff *skb, u32 offset, const void *from, u32 len)
|
|
|
|
* Description
|
|
|
|
* Store *len* bytes from address *from* into the packet
|
|
|
|
* associated to *skb*, at *offset*. Only the flags, tag and TLVs
|
|
|
|
* inside the outermost IPv6 Segment Routing Header can be
|
|
|
|
* modified through this helper.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_lwt_seg6_adjust_srh(struct sk_buff *skb, u32 offset, s32 delta)
|
|
|
|
* Description
|
|
|
|
* Adjust the size allocated to TLVs in the outermost IPv6
|
|
|
|
* Segment Routing Header contained in the packet associated to
|
|
|
|
* *skb*, at position *offset* by *delta* bytes. Only offsets
|
|
|
|
* after the segments are accepted. *delta* can be as well
|
|
|
|
* positive (growing) as negative (shrinking).
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_lwt_seg6_action(struct sk_buff *skb, u32 action, void *param, u32 param_len)
|
|
|
|
* Description
|
|
|
|
* Apply an IPv6 Segment Routing action of type *action* to the
|
|
|
|
* packet associated to *skb*. Each action takes a parameter
|
|
|
|
* contained at address *param*, and of length *param_len* bytes.
|
|
|
|
* *action* can be one of:
|
|
|
|
*
|
|
|
|
* **SEG6_LOCAL_ACTION_END_X**
|
|
|
|
* End.X action: Endpoint with Layer-3 cross-connect.
|
|
|
|
* Type of *param*: **struct in6_addr**.
|
|
|
|
* **SEG6_LOCAL_ACTION_END_T**
|
|
|
|
* End.T action: Endpoint with specific IPv6 table lookup.
|
|
|
|
* Type of *param*: **int**.
|
|
|
|
* **SEG6_LOCAL_ACTION_END_B6**
|
|
|
|
* End.B6 action: Endpoint bound to an SRv6 policy.
|
|
|
|
* Type of param: **struct ipv6_sr_hdr**.
|
|
|
|
* **SEG6_LOCAL_ACTION_END_B6_ENCAP**
|
|
|
|
* End.B6.Encap action: Endpoint bound to an SRv6
|
|
|
|
* encapsulation policy.
|
|
|
|
* Type of param: **struct ipv6_sr_hdr**.
|
|
|
|
*
|
|
|
|
* A call to this helper is susceptible to change the underlaying
|
|
|
|
* packet buffer. Therefore, at load time, all checks on pointers
|
|
|
|
* previously done by the verifier are invalidated and must be
|
|
|
|
* performed again, if the helper is used in combination with
|
|
|
|
* direct packet access.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
2018-05-27 18:24:09 +07:00
|
|
|
*
|
2019-03-14 19:38:39 +07:00
|
|
|
* int bpf_rc_repeat(void *ctx)
|
2018-05-27 18:24:09 +07:00
|
|
|
* Description
|
|
|
|
* This helper is used in programs implementing IR decoding, to
|
2019-03-14 19:38:39 +07:00
|
|
|
* report a successfully decoded repeat key message. This delays
|
|
|
|
* the generation of a key up event for previously generated
|
|
|
|
* key down event.
|
2018-05-27 18:24:09 +07:00
|
|
|
*
|
2019-03-14 19:38:39 +07:00
|
|
|
* Some IR protocols like NEC have a special IR message for
|
|
|
|
* repeating last button, for when a button is held down.
|
2018-05-27 18:24:09 +07:00
|
|
|
*
|
|
|
|
* The *ctx* should point to the lirc sample as passed into
|
|
|
|
* the program.
|
|
|
|
*
|
|
|
|
* This helper is only available is the kernel was compiled with
|
|
|
|
* the **CONFIG_BPF_LIRC_MODE2** configuration option set to
|
|
|
|
* "**y**".
|
|
|
|
* Return
|
|
|
|
* 0
|
|
|
|
*
|
2019-03-14 19:38:39 +07:00
|
|
|
* int bpf_rc_keydown(void *ctx, u32 protocol, u64 scancode, u32 toggle)
|
2018-05-27 18:24:09 +07:00
|
|
|
* Description
|
|
|
|
* This helper is used in programs implementing IR decoding, to
|
2019-03-14 19:38:39 +07:00
|
|
|
* report a successfully decoded key press with *scancode*,
|
|
|
|
* *toggle* value in the given *protocol*. The scancode will be
|
|
|
|
* translated to a keycode using the rc keymap, and reported as
|
|
|
|
* an input key down event. After a period a key up event is
|
|
|
|
* generated. This period can be extended by calling either
|
|
|
|
* **bpf_rc_keydown**\ () again with the same values, or calling
|
|
|
|
* **bpf_rc_repeat**\ ().
|
2018-05-27 18:24:09 +07:00
|
|
|
*
|
2019-03-14 19:38:39 +07:00
|
|
|
* Some protocols include a toggle bit, in case the button was
|
|
|
|
* released and pressed again between consecutive scancodes.
|
2018-05-27 18:24:09 +07:00
|
|
|
*
|
|
|
|
* The *ctx* should point to the lirc sample as passed into
|
|
|
|
* the program.
|
|
|
|
*
|
2019-03-14 19:38:39 +07:00
|
|
|
* The *protocol* is the decoded protocol number (see
|
|
|
|
* **enum rc_proto** for some predefined values).
|
|
|
|
*
|
2018-05-27 18:24:09 +07:00
|
|
|
* This helper is only available is the kernel was compiled with
|
|
|
|
* the **CONFIG_BPF_LIRC_MODE2** configuration option set to
|
|
|
|
* "**y**".
|
|
|
|
* Return
|
|
|
|
* 0
|
2018-06-03 04:06:36 +07:00
|
|
|
*
|
2019-03-14 19:38:39 +07:00
|
|
|
* u64 bpf_skb_cgroup_id(struct sk_buff *skb)
|
2018-06-03 04:06:36 +07:00
|
|
|
* Description
|
|
|
|
* Return the cgroup v2 id of the socket associated with the *skb*.
|
|
|
|
* This is roughly similar to the **bpf_get_cgroup_classid**\ ()
|
|
|
|
* helper for cgroup v1 by providing a tag resp. identifier that
|
|
|
|
* can be matched on or used for map lookups e.g. to implement
|
|
|
|
* policy. The cgroup v2 id of a given path in the hierarchy is
|
|
|
|
* exposed in user space through the f_handle API in order to get
|
|
|
|
* to the same 64-bit id.
|
|
|
|
*
|
|
|
|
* This helper can be used on TC egress path, but not on ingress,
|
|
|
|
* and is available only if the kernel was compiled with the
|
|
|
|
* **CONFIG_SOCK_CGROUP_DATA** configuration option.
|
|
|
|
* Return
|
|
|
|
* The id is returned or 0 in case the id could not be retrieved.
|
2018-06-04 05:59:41 +07:00
|
|
|
*
|
|
|
|
* u64 bpf_get_current_cgroup_id(void)
|
|
|
|
* Return
|
|
|
|
* A 64-bit integer containing the current cgroup id based
|
|
|
|
* on the cgroup within which the current task is running.
|
2018-08-03 04:27:24 +07:00
|
|
|
*
|
2019-03-14 19:38:39 +07:00
|
|
|
* void *bpf_get_local_storage(void *map, u64 flags)
|
2018-08-03 04:27:24 +07:00
|
|
|
* Description
|
|
|
|
* Get the pointer to the local storage area.
|
|
|
|
* The type and the size of the local storage is defined
|
|
|
|
* by the *map* argument.
|
|
|
|
* The *flags* meaning is specific for each map type,
|
|
|
|
* and has to be 0 for cgroup local storage.
|
|
|
|
*
|
2018-12-03 19:13:35 +07:00
|
|
|
* Depending on the BPF program type, a local storage area
|
|
|
|
* can be shared between multiple instances of the BPF program,
|
2018-08-03 04:27:24 +07:00
|
|
|
* running simultaneously.
|
|
|
|
*
|
|
|
|
* A user should care about the synchronization by himself.
|
2018-12-03 19:13:35 +07:00
|
|
|
* For example, by using the **BPF_STX_XADD** instruction to alter
|
2018-08-03 04:27:24 +07:00
|
|
|
* the shared data.
|
|
|
|
* Return
|
2018-12-03 19:13:35 +07:00
|
|
|
* A pointer to the local storage area.
|
bpf: Introduce BPF_PROG_TYPE_SK_REUSEPORT
This patch adds a BPF_PROG_TYPE_SK_REUSEPORT which can select
a SO_REUSEPORT sk from a BPF_MAP_TYPE_REUSEPORT_ARRAY. Like other
non SK_FILTER/CGROUP_SKB program, it requires CAP_SYS_ADMIN.
BPF_PROG_TYPE_SK_REUSEPORT introduces "struct sk_reuseport_kern"
to store the bpf context instead of using the skb->cb[48].
At the SO_REUSEPORT sk lookup time, it is in the middle of transiting
from a lower layer (ipv4/ipv6) to a upper layer (udp/tcp). At this
point, it is not always clear where the bpf context can be appended
in the skb->cb[48] to avoid saving-and-restoring cb[]. Even putting
aside the difference between ipv4-vs-ipv6 and udp-vs-tcp. It is not
clear if the lower layer is only ipv4 and ipv6 in the future and
will it not touch the cb[] again before transiting to the upper
layer.
For example, in udp_gro_receive(), it uses the 48 byte NAPI_GRO_CB
instead of IP[6]CB and it may still modify the cb[] after calling
the udp[46]_lib_lookup_skb(). Because of the above reason, if
sk->cb is used for the bpf ctx, saving-and-restoring is needed
and likely the whole 48 bytes cb[] has to be saved and restored.
Instead of saving, setting and restoring the cb[], this patch opts
to create a new "struct sk_reuseport_kern" and setting the needed
values in there.
The new BPF_PROG_TYPE_SK_REUSEPORT and "struct sk_reuseport_(kern|md)"
will serve all ipv4/ipv6 + udp/tcp combinations. There is no protocol
specific usage at this point and it is also inline with the current
sock_reuseport.c implementation (i.e. no protocol specific requirement).
In "struct sk_reuseport_md", this patch exposes data/data_end/len
with semantic similar to other existing usages. Together
with "bpf_skb_load_bytes()" and "bpf_skb_load_bytes_relative()",
the bpf prog can peek anywhere in the skb. The "bind_inany" tells
the bpf prog that the reuseport group is bind-ed to a local
INANY address which cannot be learned from skb.
The new "bind_inany" is added to "struct sock_reuseport" which will be
used when running the new "BPF_PROG_TYPE_SK_REUSEPORT" bpf prog in order
to avoid repeating the "bind INANY" test on
"sk_v6_rcv_saddr/sk->sk_rcv_saddr" every time a bpf prog is run. It can
only be properly initialized when a "sk->sk_reuseport" enabled sk is
adding to a hashtable (i.e. during "reuseport_alloc()" and
"reuseport_add_sock()").
The new "sk_select_reuseport()" is the main helper that the
bpf prog will use to select a SO_REUSEPORT sk. It is the only function
that can use the new BPF_MAP_TYPE_REUSEPORT_ARRAY. As mentioned in
the earlier patch, the validity of a selected sk is checked in
run time in "sk_select_reuseport()". Doing the check in
verification time is difficult and inflexible (consider the map-in-map
use case). The runtime check is to compare the selected sk's reuseport_id
with the reuseport_id that we want. This helper will return -EXXX if the
selected sk cannot serve the incoming request (e.g. reuseport_id
not match). The bpf prog can decide if it wants to do SK_DROP as its
discretion.
When the bpf prog returns SK_PASS, the kernel will check if a
valid sk has been selected (i.e. "reuse_kern->selected_sk != NULL").
If it does , it will use the selected sk. If not, the kernel
will select one from "reuse->socks[]" (as before this patch).
The SK_DROP and SK_PASS handling logic will be in the next patch.
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-08-08 15:01:25 +07:00
|
|
|
*
|
|
|
|
* int bpf_sk_select_reuseport(struct sk_reuseport_md *reuse, struct bpf_map *map, void *key, u64 flags)
|
|
|
|
* Description
|
2018-12-03 19:13:35 +07:00
|
|
|
* Select a **SO_REUSEPORT** socket from a
|
|
|
|
* **BPF_MAP_TYPE_REUSEPORT_ARRAY** *map*.
|
|
|
|
* It checks the selected socket is matching the incoming
|
|
|
|
* request in the socket buffer.
|
bpf: Introduce BPF_PROG_TYPE_SK_REUSEPORT
This patch adds a BPF_PROG_TYPE_SK_REUSEPORT which can select
a SO_REUSEPORT sk from a BPF_MAP_TYPE_REUSEPORT_ARRAY. Like other
non SK_FILTER/CGROUP_SKB program, it requires CAP_SYS_ADMIN.
BPF_PROG_TYPE_SK_REUSEPORT introduces "struct sk_reuseport_kern"
to store the bpf context instead of using the skb->cb[48].
At the SO_REUSEPORT sk lookup time, it is in the middle of transiting
from a lower layer (ipv4/ipv6) to a upper layer (udp/tcp). At this
point, it is not always clear where the bpf context can be appended
in the skb->cb[48] to avoid saving-and-restoring cb[]. Even putting
aside the difference between ipv4-vs-ipv6 and udp-vs-tcp. It is not
clear if the lower layer is only ipv4 and ipv6 in the future and
will it not touch the cb[] again before transiting to the upper
layer.
For example, in udp_gro_receive(), it uses the 48 byte NAPI_GRO_CB
instead of IP[6]CB and it may still modify the cb[] after calling
the udp[46]_lib_lookup_skb(). Because of the above reason, if
sk->cb is used for the bpf ctx, saving-and-restoring is needed
and likely the whole 48 bytes cb[] has to be saved and restored.
Instead of saving, setting and restoring the cb[], this patch opts
to create a new "struct sk_reuseport_kern" and setting the needed
values in there.
The new BPF_PROG_TYPE_SK_REUSEPORT and "struct sk_reuseport_(kern|md)"
will serve all ipv4/ipv6 + udp/tcp combinations. There is no protocol
specific usage at this point and it is also inline with the current
sock_reuseport.c implementation (i.e. no protocol specific requirement).
In "struct sk_reuseport_md", this patch exposes data/data_end/len
with semantic similar to other existing usages. Together
with "bpf_skb_load_bytes()" and "bpf_skb_load_bytes_relative()",
the bpf prog can peek anywhere in the skb. The "bind_inany" tells
the bpf prog that the reuseport group is bind-ed to a local
INANY address which cannot be learned from skb.
The new "bind_inany" is added to "struct sock_reuseport" which will be
used when running the new "BPF_PROG_TYPE_SK_REUSEPORT" bpf prog in order
to avoid repeating the "bind INANY" test on
"sk_v6_rcv_saddr/sk->sk_rcv_saddr" every time a bpf prog is run. It can
only be properly initialized when a "sk->sk_reuseport" enabled sk is
adding to a hashtable (i.e. during "reuseport_alloc()" and
"reuseport_add_sock()").
The new "sk_select_reuseport()" is the main helper that the
bpf prog will use to select a SO_REUSEPORT sk. It is the only function
that can use the new BPF_MAP_TYPE_REUSEPORT_ARRAY. As mentioned in
the earlier patch, the validity of a selected sk is checked in
run time in "sk_select_reuseport()". Doing the check in
verification time is difficult and inflexible (consider the map-in-map
use case). The runtime check is to compare the selected sk's reuseport_id
with the reuseport_id that we want. This helper will return -EXXX if the
selected sk cannot serve the incoming request (e.g. reuseport_id
not match). The bpf prog can decide if it wants to do SK_DROP as its
discretion.
When the bpf prog returns SK_PASS, the kernel will check if a
valid sk has been selected (i.e. "reuse_kern->selected_sk != NULL").
If it does , it will use the selected sk. If not, the kernel
will select one from "reuse->socks[]" (as before this patch).
The SK_DROP and SK_PASS handling logic will be in the next patch.
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-08-08 15:01:25 +07:00
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
*
|
2019-03-14 19:38:39 +07:00
|
|
|
* u64 bpf_skb_ancestor_cgroup_id(struct sk_buff *skb, int ancestor_level)
|
|
|
|
* Description
|
|
|
|
* Return id of cgroup v2 that is ancestor of cgroup associated
|
|
|
|
* with the *skb* at the *ancestor_level*. The root cgroup is at
|
|
|
|
* *ancestor_level* zero and each step down the hierarchy
|
|
|
|
* increments the level. If *ancestor_level* == level of cgroup
|
|
|
|
* associated with *skb*, then return value will be same as that
|
|
|
|
* of **bpf_skb_cgroup_id**\ ().
|
|
|
|
*
|
|
|
|
* The helper is useful to implement policies based on cgroups
|
|
|
|
* that are upper in hierarchy than immediate cgroup associated
|
|
|
|
* with *skb*.
|
|
|
|
*
|
|
|
|
* The format of returned id and helper limitations are same as in
|
|
|
|
* **bpf_skb_cgroup_id**\ ().
|
|
|
|
* Return
|
|
|
|
* The id is returned or 0 in case the id could not be retrieved.
|
|
|
|
*
|
2018-12-01 06:32:20 +07:00
|
|
|
* struct bpf_sock *bpf_sk_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags)
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
* Description
|
|
|
|
* Look for TCP socket matching *tuple*, optionally in a child
|
|
|
|
* network namespace *netns*. The return value must be checked,
|
2018-12-03 19:13:35 +07:00
|
|
|
* and if non-**NULL**, released via **bpf_sk_release**\ ().
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
*
|
|
|
|
* The *ctx* should point to the context of the program, such as
|
|
|
|
* the skb or socket (depending on the hook in use). This is used
|
|
|
|
* to determine the base network namespace for the lookup.
|
|
|
|
*
|
|
|
|
* *tuple_size* must be one of:
|
|
|
|
*
|
|
|
|
* **sizeof**\ (*tuple*\ **->ipv4**)
|
|
|
|
* Look for an IPv4 socket.
|
|
|
|
* **sizeof**\ (*tuple*\ **->ipv6**)
|
|
|
|
* Look for an IPv6 socket.
|
|
|
|
*
|
2018-12-01 06:32:20 +07:00
|
|
|
* If the *netns* is a negative signed 32-bit integer, then the
|
|
|
|
* socket lookup table in the netns associated with the *ctx* will
|
|
|
|
* will be used. For the TC hooks, this is the netns of the device
|
|
|
|
* in the skb. For socket hooks, this is the netns of the socket.
|
|
|
|
* If *netns* is any other signed 32-bit value greater than or
|
|
|
|
* equal to zero then it specifies the ID of the netns relative to
|
|
|
|
* the netns associated with the *ctx*. *netns* values beyond the
|
|
|
|
* range of 32-bit integers are reserved for future use.
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
*
|
|
|
|
* All values for *flags* are reserved for future usage, and must
|
|
|
|
* be left at zero.
|
|
|
|
*
|
|
|
|
* This helper is available only if the kernel was compiled with
|
|
|
|
* **CONFIG_NET** configuration option.
|
|
|
|
* Return
|
2018-12-11 16:26:33 +07:00
|
|
|
* Pointer to **struct bpf_sock**, or **NULL** in case of failure.
|
|
|
|
* For sockets with reuseport option, the **struct bpf_sock**
|
|
|
|
* result is from **reuse->socks**\ [] using the hash of the tuple.
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
*
|
2018-12-01 06:32:20 +07:00
|
|
|
* struct bpf_sock *bpf_sk_lookup_udp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags)
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
* Description
|
|
|
|
* Look for UDP socket matching *tuple*, optionally in a child
|
|
|
|
* network namespace *netns*. The return value must be checked,
|
2018-12-03 19:13:35 +07:00
|
|
|
* and if non-**NULL**, released via **bpf_sk_release**\ ().
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
*
|
|
|
|
* The *ctx* should point to the context of the program, such as
|
|
|
|
* the skb or socket (depending on the hook in use). This is used
|
|
|
|
* to determine the base network namespace for the lookup.
|
|
|
|
*
|
|
|
|
* *tuple_size* must be one of:
|
|
|
|
*
|
|
|
|
* **sizeof**\ (*tuple*\ **->ipv4**)
|
|
|
|
* Look for an IPv4 socket.
|
|
|
|
* **sizeof**\ (*tuple*\ **->ipv6**)
|
|
|
|
* Look for an IPv6 socket.
|
|
|
|
*
|
2018-12-01 06:32:20 +07:00
|
|
|
* If the *netns* is a negative signed 32-bit integer, then the
|
|
|
|
* socket lookup table in the netns associated with the *ctx* will
|
|
|
|
* will be used. For the TC hooks, this is the netns of the device
|
|
|
|
* in the skb. For socket hooks, this is the netns of the socket.
|
|
|
|
* If *netns* is any other signed 32-bit value greater than or
|
|
|
|
* equal to zero then it specifies the ID of the netns relative to
|
|
|
|
* the netns associated with the *ctx*. *netns* values beyond the
|
|
|
|
* range of 32-bit integers are reserved for future use.
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
*
|
|
|
|
* All values for *flags* are reserved for future usage, and must
|
|
|
|
* be left at zero.
|
|
|
|
*
|
|
|
|
* This helper is available only if the kernel was compiled with
|
|
|
|
* **CONFIG_NET** configuration option.
|
|
|
|
* Return
|
2018-12-11 16:26:33 +07:00
|
|
|
* Pointer to **struct bpf_sock**, or **NULL** in case of failure.
|
|
|
|
* For sockets with reuseport option, the **struct bpf_sock**
|
|
|
|
* result is from **reuse->socks**\ [] using the hash of the tuple.
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
*
|
2018-12-03 19:13:35 +07:00
|
|
|
* int bpf_sk_release(struct bpf_sock *sock)
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
* Description
|
2018-12-03 19:13:35 +07:00
|
|
|
* Release the reference held by *sock*. *sock* must be a
|
|
|
|
* non-**NULL** pointer that was returned from
|
|
|
|
* **bpf_sk_lookup_xxx**\ ().
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
bpf: sk_msg program helper bpf_msg_push_data
This allows user to push data into a msg using sk_msg program types.
The format is as follows,
bpf_msg_push_data(msg, offset, len, flags)
this will insert 'len' bytes at offset 'offset'. For example to
prepend 10 bytes at the front of the message the user can,
bpf_msg_push_data(msg, 0, 10, 0);
This will invalidate data bounds so BPF user will have to then recheck
data bounds after calling this. After this the msg size will have been
updated and the user is free to write into the added bytes. We allow
any offset/len as long as it is within the (data, data_end) range.
However, a copy will be required if the ring is full and its possible
for the helper to fail with ENOMEM or EINVAL errors which need to be
handled by the BPF program.
This can be used similar to XDP metadata to pass data between sk_msg
layer and lower layers.
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-20 09:56:49 +07:00
|
|
|
*
|
2019-03-14 19:38:39 +07:00
|
|
|
* int bpf_map_push_elem(struct bpf_map *map, const void *value, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Push an element *value* in *map*. *flags* is one of:
|
|
|
|
*
|
|
|
|
* **BPF_EXIST**
|
|
|
|
* If the queue/stack is full, the oldest element is
|
|
|
|
* removed to make room for this.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
2018-12-03 19:13:35 +07:00
|
|
|
* int bpf_map_pop_elem(struct bpf_map *map, void *value)
|
|
|
|
* Description
|
|
|
|
* Pop an element from *map*.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
|
|
|
* int bpf_map_peek_elem(struct bpf_map *map, void *value)
|
|
|
|
* Description
|
|
|
|
* Get an element from *map* without removing it.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
|
|
|
*
|
bpf: sk_msg program helper bpf_msg_push_data
This allows user to push data into a msg using sk_msg program types.
The format is as follows,
bpf_msg_push_data(msg, offset, len, flags)
this will insert 'len' bytes at offset 'offset'. For example to
prepend 10 bytes at the front of the message the user can,
bpf_msg_push_data(msg, 0, 10, 0);
This will invalidate data bounds so BPF user will have to then recheck
data bounds after calling this. After this the msg size will have been
updated and the user is free to write into the added bytes. We allow
any offset/len as long as it is within the (data, data_end) range.
However, a copy will be required if the ring is full and its possible
for the helper to fail with ENOMEM or EINVAL errors which need to be
handled by the BPF program.
This can be used similar to XDP metadata to pass data between sk_msg
layer and lower layers.
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-20 09:56:49 +07:00
|
|
|
* int bpf_msg_push_data(struct sk_buff *skb, u32 start, u32 len, u64 flags)
|
|
|
|
* Description
|
2018-12-03 19:13:35 +07:00
|
|
|
* For socket policies, insert *len* bytes into *msg* at offset
|
bpf: sk_msg program helper bpf_msg_push_data
This allows user to push data into a msg using sk_msg program types.
The format is as follows,
bpf_msg_push_data(msg, offset, len, flags)
this will insert 'len' bytes at offset 'offset'. For example to
prepend 10 bytes at the front of the message the user can,
bpf_msg_push_data(msg, 0, 10, 0);
This will invalidate data bounds so BPF user will have to then recheck
data bounds after calling this. After this the msg size will have been
updated and the user is free to write into the added bytes. We allow
any offset/len as long as it is within the (data, data_end) range.
However, a copy will be required if the ring is full and its possible
for the helper to fail with ENOMEM or EINVAL errors which need to be
handled by the BPF program.
This can be used similar to XDP metadata to pass data between sk_msg
layer and lower layers.
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-20 09:56:49 +07:00
|
|
|
* *start*.
|
|
|
|
*
|
|
|
|
* If a program of type **BPF_PROG_TYPE_SK_MSG** is run on a
|
2018-12-03 19:13:35 +07:00
|
|
|
* *msg* it may want to insert metadata or options into the *msg*.
|
bpf: sk_msg program helper bpf_msg_push_data
This allows user to push data into a msg using sk_msg program types.
The format is as follows,
bpf_msg_push_data(msg, offset, len, flags)
this will insert 'len' bytes at offset 'offset'. For example to
prepend 10 bytes at the front of the message the user can,
bpf_msg_push_data(msg, 0, 10, 0);
This will invalidate data bounds so BPF user will have to then recheck
data bounds after calling this. After this the msg size will have been
updated and the user is free to write into the added bytes. We allow
any offset/len as long as it is within the (data, data_end) range.
However, a copy will be required if the ring is full and its possible
for the helper to fail with ENOMEM or EINVAL errors which need to be
handled by the BPF program.
This can be used similar to XDP metadata to pass data between sk_msg
layer and lower layers.
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-20 09:56:49 +07:00
|
|
|
* This can later be read and used by any of the lower layer BPF
|
|
|
|
* hooks.
|
|
|
|
*
|
|
|
|
* This helper may fail if under memory pressure (a malloc
|
|
|
|
* fails) in these cases BPF programs will get an appropriate
|
|
|
|
* error and BPF programs will need to handle them.
|
|
|
|
* Return
|
|
|
|
* 0 on success, or a negative error in case of failure.
|
2018-11-27 05:16:17 +07:00
|
|
|
*
|
|
|
|
* int bpf_msg_pop_data(struct sk_msg_buff *msg, u32 start, u32 pop, u64 flags)
|
2018-12-03 19:13:35 +07:00
|
|
|
* Description
|
2018-11-27 05:16:17 +07:00
|
|
|
* Will remove *pop* bytes from a *msg* starting at byte *start*.
|
|
|
|
* This may result in **ENOMEM** errors under certain situations if
|
|
|
|
* an allocation and copy are required due to a full ring buffer.
|
|
|
|
* However, the helper will try to avoid doing the allocation
|
|
|
|
* if possible. Other errors can occur if input parameters are
|
2018-12-03 19:13:35 +07:00
|
|
|
* invalid either due to *start* byte not being valid part of *msg*
|
2018-11-27 05:16:17 +07:00
|
|
|
* payload and/or *pop* value being to large.
|
|
|
|
* Return
|
2018-12-03 19:13:35 +07:00
|
|
|
* 0 on success, or a negative error in case of failure.
|
2018-12-06 20:01:03 +07:00
|
|
|
*
|
|
|
|
* int bpf_rc_pointer_rel(void *ctx, s32 rel_x, s32 rel_y)
|
|
|
|
* Description
|
|
|
|
* This helper is used in programs implementing IR decoding, to
|
|
|
|
* report a successfully decoded pointer movement.
|
2018-11-27 05:16:17 +07:00
|
|
|
*
|
2018-12-06 20:01:03 +07:00
|
|
|
* The *ctx* should point to the lirc sample as passed into
|
|
|
|
* the program.
|
|
|
|
*
|
|
|
|
* This helper is only available is the kernel was compiled with
|
|
|
|
* the **CONFIG_BPF_LIRC_MODE2** configuration option set to
|
|
|
|
* "**y**".
|
2018-11-27 05:16:17 +07:00
|
|
|
* Return
|
2018-12-06 20:01:03 +07:00
|
|
|
* 0
|
bpf: Add a bpf_sock pointer to __sk_buff and a bpf_sk_fullsock helper
In kernel, it is common to check "skb->sk && sk_fullsock(skb->sk)"
before accessing the fields in sock. For example, in __netdev_pick_tx:
static u16 __netdev_pick_tx(struct net_device *dev, struct sk_buff *skb,
struct net_device *sb_dev)
{
/* ... */
struct sock *sk = skb->sk;
if (queue_index != new_index && sk &&
sk_fullsock(sk) &&
rcu_access_pointer(sk->sk_dst_cache))
sk_tx_queue_set(sk, new_index);
/* ... */
return queue_index;
}
This patch adds a "struct bpf_sock *sk" pointer to the "struct __sk_buff"
where a few of the convert_ctx_access() in filter.c has already been
accessing the skb->sk sock_common's fields,
e.g. sock_ops_convert_ctx_access().
"__sk_buff->sk" is a PTR_TO_SOCK_COMMON_OR_NULL in the verifier.
Some of the fileds in "bpf_sock" will not be directly
accessible through the "__sk_buff->sk" pointer. It is limited
by the new "bpf_sock_common_is_valid_access()".
e.g. The existing "type", "protocol", "mark" and "priority" in bpf_sock
are not allowed.
The newly added "struct bpf_sock *bpf_sk_fullsock(struct bpf_sock *sk)"
can be used to get a sk with all accessible fields in "bpf_sock".
This helper is added to both cg_skb and sched_(cls|act).
int cg_skb_foo(struct __sk_buff *skb) {
struct bpf_sock *sk;
sk = skb->sk;
if (!sk)
return 1;
sk = bpf_sk_fullsock(sk);
if (!sk)
return 1;
if (sk->family != AF_INET6 || sk->protocol != IPPROTO_TCP)
return 1;
/* some_traffic_shaping(); */
return 1;
}
(1) The sk is read only
(2) There is no new "struct bpf_sock_common" introduced.
(3) Future kernel sock's members could be added to bpf_sock only
instead of repeatedly adding at multiple places like currently
in bpf_sock_ops_md, bpf_sock_addr_md, sk_reuseport_md...etc.
(4) After "sk = skb->sk", the reg holding sk is in type
PTR_TO_SOCK_COMMON_OR_NULL.
(5) After bpf_sk_fullsock(), the return type will be in type
PTR_TO_SOCKET_OR_NULL which is the same as the return type of
bpf_sk_lookup_xxx().
However, bpf_sk_fullsock() does not take refcnt. The
acquire_reference_state() is only depending on the return type now.
To avoid it, a new is_acquire_function() is checked before calling
acquire_reference_state().
(6) The WARN_ON in "release_reference_state()" is no longer an
internal verifier bug.
When reg->id is not found in state->refs[], it means the
bpf_prog does something wrong like
"bpf_sk_release(bpf_sk_fullsock(skb->sk))" where reference has
never been acquired by calling "bpf_sk_fullsock(skb->sk)".
A -EINVAL and a verbose are done instead of WARN_ON. A test is
added to the test_verifier in a later patch.
Since the WARN_ON in "release_reference_state()" is no longer
needed, "__release_reference_state()" is folded into
"release_reference_state()" also.
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-02-10 14:22:20 +07:00
|
|
|
*
|
2019-03-14 19:38:40 +07:00
|
|
|
* int bpf_spin_lock(struct bpf_spin_lock *lock)
|
|
|
|
* Description
|
|
|
|
* Acquire a spinlock represented by the pointer *lock*, which is
|
|
|
|
* stored as part of a value of a map. Taking the lock allows to
|
|
|
|
* safely update the rest of the fields in that value. The
|
|
|
|
* spinlock can (and must) later be released with a call to
|
|
|
|
* **bpf_spin_unlock**\ (\ *lock*\ ).
|
|
|
|
*
|
|
|
|
* Spinlocks in BPF programs come with a number of restrictions
|
|
|
|
* and constraints:
|
|
|
|
*
|
|
|
|
* * **bpf_spin_lock** objects are only allowed inside maps of
|
|
|
|
* types **BPF_MAP_TYPE_HASH** and **BPF_MAP_TYPE_ARRAY** (this
|
|
|
|
* list could be extended in the future).
|
|
|
|
* * BTF description of the map is mandatory.
|
|
|
|
* * The BPF program can take ONE lock at a time, since taking two
|
|
|
|
* or more could cause dead locks.
|
|
|
|
* * Only one **struct bpf_spin_lock** is allowed per map element.
|
|
|
|
* * When the lock is taken, calls (either BPF to BPF or helpers)
|
|
|
|
* are not allowed.
|
|
|
|
* * The **BPF_LD_ABS** and **BPF_LD_IND** instructions are not
|
|
|
|
* allowed inside a spinlock-ed region.
|
|
|
|
* * The BPF program MUST call **bpf_spin_unlock**\ () to release
|
|
|
|
* the lock, on all execution paths, before it returns.
|
|
|
|
* * The BPF program can access **struct bpf_spin_lock** only via
|
|
|
|
* the **bpf_spin_lock**\ () and **bpf_spin_unlock**\ ()
|
|
|
|
* helpers. Loading or storing data into the **struct
|
|
|
|
* bpf_spin_lock** *lock*\ **;** field of a map is not allowed.
|
|
|
|
* * To use the **bpf_spin_lock**\ () helper, the BTF description
|
|
|
|
* of the map value must be a struct and have **struct
|
|
|
|
* bpf_spin_lock** *anyname*\ **;** field at the top level.
|
|
|
|
* Nested lock inside another struct is not allowed.
|
|
|
|
* * The **struct bpf_spin_lock** *lock* field in a map value must
|
|
|
|
* be aligned on a multiple of 4 bytes in that value.
|
|
|
|
* * Syscall with command **BPF_MAP_LOOKUP_ELEM** does not copy
|
|
|
|
* the **bpf_spin_lock** field to user space.
|
|
|
|
* * Syscall with command **BPF_MAP_UPDATE_ELEM**, or update from
|
|
|
|
* a BPF program, do not update the **bpf_spin_lock** field.
|
|
|
|
* * **bpf_spin_lock** cannot be on the stack or inside a
|
|
|
|
* networking packet (it can only be inside of a map values).
|
|
|
|
* * **bpf_spin_lock** is available to root only.
|
|
|
|
* * Tracing programs and socket filter programs cannot use
|
|
|
|
* **bpf_spin_lock**\ () due to insufficient preemption checks
|
|
|
|
* (but this may change in the future).
|
|
|
|
* * **bpf_spin_lock** is not allowed in inner maps of map-in-map.
|
|
|
|
* Return
|
|
|
|
* 0
|
|
|
|
*
|
|
|
|
* int bpf_spin_unlock(struct bpf_spin_lock *lock)
|
|
|
|
* Description
|
|
|
|
* Release the *lock* previously locked by a call to
|
|
|
|
* **bpf_spin_lock**\ (\ *lock*\ ).
|
|
|
|
* Return
|
|
|
|
* 0
|
|
|
|
*
|
bpf: Add a bpf_sock pointer to __sk_buff and a bpf_sk_fullsock helper
In kernel, it is common to check "skb->sk && sk_fullsock(skb->sk)"
before accessing the fields in sock. For example, in __netdev_pick_tx:
static u16 __netdev_pick_tx(struct net_device *dev, struct sk_buff *skb,
struct net_device *sb_dev)
{
/* ... */
struct sock *sk = skb->sk;
if (queue_index != new_index && sk &&
sk_fullsock(sk) &&
rcu_access_pointer(sk->sk_dst_cache))
sk_tx_queue_set(sk, new_index);
/* ... */
return queue_index;
}
This patch adds a "struct bpf_sock *sk" pointer to the "struct __sk_buff"
where a few of the convert_ctx_access() in filter.c has already been
accessing the skb->sk sock_common's fields,
e.g. sock_ops_convert_ctx_access().
"__sk_buff->sk" is a PTR_TO_SOCK_COMMON_OR_NULL in the verifier.
Some of the fileds in "bpf_sock" will not be directly
accessible through the "__sk_buff->sk" pointer. It is limited
by the new "bpf_sock_common_is_valid_access()".
e.g. The existing "type", "protocol", "mark" and "priority" in bpf_sock
are not allowed.
The newly added "struct bpf_sock *bpf_sk_fullsock(struct bpf_sock *sk)"
can be used to get a sk with all accessible fields in "bpf_sock".
This helper is added to both cg_skb and sched_(cls|act).
int cg_skb_foo(struct __sk_buff *skb) {
struct bpf_sock *sk;
sk = skb->sk;
if (!sk)
return 1;
sk = bpf_sk_fullsock(sk);
if (!sk)
return 1;
if (sk->family != AF_INET6 || sk->protocol != IPPROTO_TCP)
return 1;
/* some_traffic_shaping(); */
return 1;
}
(1) The sk is read only
(2) There is no new "struct bpf_sock_common" introduced.
(3) Future kernel sock's members could be added to bpf_sock only
instead of repeatedly adding at multiple places like currently
in bpf_sock_ops_md, bpf_sock_addr_md, sk_reuseport_md...etc.
(4) After "sk = skb->sk", the reg holding sk is in type
PTR_TO_SOCK_COMMON_OR_NULL.
(5) After bpf_sk_fullsock(), the return type will be in type
PTR_TO_SOCKET_OR_NULL which is the same as the return type of
bpf_sk_lookup_xxx().
However, bpf_sk_fullsock() does not take refcnt. The
acquire_reference_state() is only depending on the return type now.
To avoid it, a new is_acquire_function() is checked before calling
acquire_reference_state().
(6) The WARN_ON in "release_reference_state()" is no longer an
internal verifier bug.
When reg->id is not found in state->refs[], it means the
bpf_prog does something wrong like
"bpf_sk_release(bpf_sk_fullsock(skb->sk))" where reference has
never been acquired by calling "bpf_sk_fullsock(skb->sk)".
A -EINVAL and a verbose are done instead of WARN_ON. A test is
added to the test_verifier in a later patch.
Since the WARN_ON in "release_reference_state()" is no longer
needed, "__release_reference_state()" is folded into
"release_reference_state()" also.
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-02-10 14:22:20 +07:00
|
|
|
* struct bpf_sock *bpf_sk_fullsock(struct bpf_sock *sk)
|
|
|
|
* Description
|
|
|
|
* This helper gets a **struct bpf_sock** pointer such
|
2019-03-14 19:38:39 +07:00
|
|
|
* that all the fields in this **bpf_sock** can be accessed.
|
bpf: Add a bpf_sock pointer to __sk_buff and a bpf_sk_fullsock helper
In kernel, it is common to check "skb->sk && sk_fullsock(skb->sk)"
before accessing the fields in sock. For example, in __netdev_pick_tx:
static u16 __netdev_pick_tx(struct net_device *dev, struct sk_buff *skb,
struct net_device *sb_dev)
{
/* ... */
struct sock *sk = skb->sk;
if (queue_index != new_index && sk &&
sk_fullsock(sk) &&
rcu_access_pointer(sk->sk_dst_cache))
sk_tx_queue_set(sk, new_index);
/* ... */
return queue_index;
}
This patch adds a "struct bpf_sock *sk" pointer to the "struct __sk_buff"
where a few of the convert_ctx_access() in filter.c has already been
accessing the skb->sk sock_common's fields,
e.g. sock_ops_convert_ctx_access().
"__sk_buff->sk" is a PTR_TO_SOCK_COMMON_OR_NULL in the verifier.
Some of the fileds in "bpf_sock" will not be directly
accessible through the "__sk_buff->sk" pointer. It is limited
by the new "bpf_sock_common_is_valid_access()".
e.g. The existing "type", "protocol", "mark" and "priority" in bpf_sock
are not allowed.
The newly added "struct bpf_sock *bpf_sk_fullsock(struct bpf_sock *sk)"
can be used to get a sk with all accessible fields in "bpf_sock".
This helper is added to both cg_skb and sched_(cls|act).
int cg_skb_foo(struct __sk_buff *skb) {
struct bpf_sock *sk;
sk = skb->sk;
if (!sk)
return 1;
sk = bpf_sk_fullsock(sk);
if (!sk)
return 1;
if (sk->family != AF_INET6 || sk->protocol != IPPROTO_TCP)
return 1;
/* some_traffic_shaping(); */
return 1;
}
(1) The sk is read only
(2) There is no new "struct bpf_sock_common" introduced.
(3) Future kernel sock's members could be added to bpf_sock only
instead of repeatedly adding at multiple places like currently
in bpf_sock_ops_md, bpf_sock_addr_md, sk_reuseport_md...etc.
(4) After "sk = skb->sk", the reg holding sk is in type
PTR_TO_SOCK_COMMON_OR_NULL.
(5) After bpf_sk_fullsock(), the return type will be in type
PTR_TO_SOCKET_OR_NULL which is the same as the return type of
bpf_sk_lookup_xxx().
However, bpf_sk_fullsock() does not take refcnt. The
acquire_reference_state() is only depending on the return type now.
To avoid it, a new is_acquire_function() is checked before calling
acquire_reference_state().
(6) The WARN_ON in "release_reference_state()" is no longer an
internal verifier bug.
When reg->id is not found in state->refs[], it means the
bpf_prog does something wrong like
"bpf_sk_release(bpf_sk_fullsock(skb->sk))" where reference has
never been acquired by calling "bpf_sk_fullsock(skb->sk)".
A -EINVAL and a verbose are done instead of WARN_ON. A test is
added to the test_verifier in a later patch.
Since the WARN_ON in "release_reference_state()" is no longer
needed, "__release_reference_state()" is folded into
"release_reference_state()" also.
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-02-10 14:22:20 +07:00
|
|
|
* Return
|
2019-03-14 19:38:39 +07:00
|
|
|
* A **struct bpf_sock** pointer on success, or **NULL** in
|
bpf: Add a bpf_sock pointer to __sk_buff and a bpf_sk_fullsock helper
In kernel, it is common to check "skb->sk && sk_fullsock(skb->sk)"
before accessing the fields in sock. For example, in __netdev_pick_tx:
static u16 __netdev_pick_tx(struct net_device *dev, struct sk_buff *skb,
struct net_device *sb_dev)
{
/* ... */
struct sock *sk = skb->sk;
if (queue_index != new_index && sk &&
sk_fullsock(sk) &&
rcu_access_pointer(sk->sk_dst_cache))
sk_tx_queue_set(sk, new_index);
/* ... */
return queue_index;
}
This patch adds a "struct bpf_sock *sk" pointer to the "struct __sk_buff"
where a few of the convert_ctx_access() in filter.c has already been
accessing the skb->sk sock_common's fields,
e.g. sock_ops_convert_ctx_access().
"__sk_buff->sk" is a PTR_TO_SOCK_COMMON_OR_NULL in the verifier.
Some of the fileds in "bpf_sock" will not be directly
accessible through the "__sk_buff->sk" pointer. It is limited
by the new "bpf_sock_common_is_valid_access()".
e.g. The existing "type", "protocol", "mark" and "priority" in bpf_sock
are not allowed.
The newly added "struct bpf_sock *bpf_sk_fullsock(struct bpf_sock *sk)"
can be used to get a sk with all accessible fields in "bpf_sock".
This helper is added to both cg_skb and sched_(cls|act).
int cg_skb_foo(struct __sk_buff *skb) {
struct bpf_sock *sk;
sk = skb->sk;
if (!sk)
return 1;
sk = bpf_sk_fullsock(sk);
if (!sk)
return 1;
if (sk->family != AF_INET6 || sk->protocol != IPPROTO_TCP)
return 1;
/* some_traffic_shaping(); */
return 1;
}
(1) The sk is read only
(2) There is no new "struct bpf_sock_common" introduced.
(3) Future kernel sock's members could be added to bpf_sock only
instead of repeatedly adding at multiple places like currently
in bpf_sock_ops_md, bpf_sock_addr_md, sk_reuseport_md...etc.
(4) After "sk = skb->sk", the reg holding sk is in type
PTR_TO_SOCK_COMMON_OR_NULL.
(5) After bpf_sk_fullsock(), the return type will be in type
PTR_TO_SOCKET_OR_NULL which is the same as the return type of
bpf_sk_lookup_xxx().
However, bpf_sk_fullsock() does not take refcnt. The
acquire_reference_state() is only depending on the return type now.
To avoid it, a new is_acquire_function() is checked before calling
acquire_reference_state().
(6) The WARN_ON in "release_reference_state()" is no longer an
internal verifier bug.
When reg->id is not found in state->refs[], it means the
bpf_prog does something wrong like
"bpf_sk_release(bpf_sk_fullsock(skb->sk))" where reference has
never been acquired by calling "bpf_sk_fullsock(skb->sk)".
A -EINVAL and a verbose are done instead of WARN_ON. A test is
added to the test_verifier in a later patch.
Since the WARN_ON in "release_reference_state()" is no longer
needed, "__release_reference_state()" is folded into
"release_reference_state()" also.
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-02-10 14:22:20 +07:00
|
|
|
* case of failure.
|
2019-02-10 14:22:24 +07:00
|
|
|
*
|
|
|
|
* struct bpf_tcp_sock *bpf_tcp_sock(struct bpf_sock *sk)
|
|
|
|
* Description
|
|
|
|
* This helper gets a **struct bpf_tcp_sock** pointer from a
|
|
|
|
* **struct bpf_sock** pointer.
|
|
|
|
* Return
|
2019-03-14 19:38:39 +07:00
|
|
|
* A **struct bpf_tcp_sock** pointer on success, or **NULL** in
|
2019-02-10 14:22:24 +07:00
|
|
|
* case of failure.
|
2019-03-02 03:38:46 +07:00
|
|
|
*
|
|
|
|
* int bpf_skb_ecn_set_ce(struct sk_buf *skb)
|
2019-03-14 19:38:39 +07:00
|
|
|
* Description
|
|
|
|
* Set ECN (Explicit Congestion Notification) field of IP header
|
|
|
|
* to **CE** (Congestion Encountered) if current value is **ECT**
|
|
|
|
* (ECN Capable Transport). Otherwise, do nothing. Works with IPv6
|
|
|
|
* and IPv4.
|
|
|
|
* Return
|
|
|
|
* 1 if the **CE** flag is set (either by the current helper call
|
|
|
|
* or because it was already present), 0 if it is not set.
|
2019-03-13 00:23:04 +07:00
|
|
|
*
|
|
|
|
* struct bpf_sock *bpf_get_listener_sock(struct bpf_sock *sk)
|
|
|
|
* Description
|
2019-03-14 19:38:39 +07:00
|
|
|
* Return a **struct bpf_sock** pointer in **TCP_LISTEN** state.
|
|
|
|
* **bpf_sk_release**\ () is unnecessary and not allowed.
|
2019-03-13 00:23:04 +07:00
|
|
|
* Return
|
2019-03-14 19:38:39 +07:00
|
|
|
* A **struct bpf_sock** pointer on success, or **NULL** in
|
2019-03-13 00:23:04 +07:00
|
|
|
* case of failure.
|
2019-03-22 08:54:01 +07:00
|
|
|
*
|
|
|
|
* struct bpf_sock *bpf_skc_lookup_tcp(void *ctx, struct bpf_sock_tuple *tuple, u32 tuple_size, u64 netns, u64 flags)
|
|
|
|
* Description
|
|
|
|
* Look for TCP socket matching *tuple*, optionally in a child
|
|
|
|
* network namespace *netns*. The return value must be checked,
|
|
|
|
* and if non-**NULL**, released via **bpf_sk_release**\ ().
|
|
|
|
*
|
|
|
|
* This function is identical to bpf_sk_lookup_tcp, except that it
|
|
|
|
* also returns timewait or request sockets. Use bpf_sk_fullsock
|
|
|
|
* or bpf_tcp_socket to access the full structure.
|
|
|
|
*
|
|
|
|
* This helper is available only if the kernel was compiled with
|
|
|
|
* **CONFIG_NET** configuration option.
|
|
|
|
* Return
|
|
|
|
* Pointer to **struct bpf_sock**, or **NULL** in case of failure.
|
|
|
|
* For sockets with reuseport option, the **struct bpf_sock**
|
|
|
|
* result is from **reuse->socks**\ [] using the hash of the tuple.
|
2019-03-22 08:54:02 +07:00
|
|
|
*
|
|
|
|
* int bpf_tcp_check_syncookie(struct bpf_sock *sk, void *iph, u32 iph_len, struct tcphdr *th, u32 th_len)
|
|
|
|
* Description
|
|
|
|
* Check whether iph and th contain a valid SYN cookie ACK for
|
|
|
|
* the listening socket in sk.
|
|
|
|
*
|
|
|
|
* iph points to the start of the IPv4 or IPv6 header, while
|
|
|
|
* iph_len contains sizeof(struct iphdr) or sizeof(struct ip6hdr).
|
|
|
|
*
|
|
|
|
* th points to the start of the TCP header, while th_len contains
|
|
|
|
* sizeof(struct tcphdr).
|
|
|
|
*
|
|
|
|
* Return
|
|
|
|
* 0 if iph and th are a valid SYN cookie ACK, or a negative error
|
|
|
|
* otherwise.
|
2016-10-27 16:23:51 +07:00
|
|
|
*/
|
|
|
|
#define __BPF_FUNC_MAPPER(FN) \
|
|
|
|
FN(unspec), \
|
|
|
|
FN(map_lookup_elem), \
|
|
|
|
FN(map_update_elem), \
|
|
|
|
FN(map_delete_elem), \
|
|
|
|
FN(probe_read), \
|
|
|
|
FN(ktime_get_ns), \
|
|
|
|
FN(trace_printk), \
|
|
|
|
FN(get_prandom_u32), \
|
|
|
|
FN(get_smp_processor_id), \
|
|
|
|
FN(skb_store_bytes), \
|
|
|
|
FN(l3_csum_replace), \
|
|
|
|
FN(l4_csum_replace), \
|
|
|
|
FN(tail_call), \
|
|
|
|
FN(clone_redirect), \
|
|
|
|
FN(get_current_pid_tgid), \
|
|
|
|
FN(get_current_uid_gid), \
|
|
|
|
FN(get_current_comm), \
|
|
|
|
FN(get_cgroup_classid), \
|
|
|
|
FN(skb_vlan_push), \
|
|
|
|
FN(skb_vlan_pop), \
|
|
|
|
FN(skb_get_tunnel_key), \
|
|
|
|
FN(skb_set_tunnel_key), \
|
|
|
|
FN(perf_event_read), \
|
|
|
|
FN(redirect), \
|
|
|
|
FN(get_route_realm), \
|
|
|
|
FN(perf_event_output), \
|
|
|
|
FN(skb_load_bytes), \
|
|
|
|
FN(get_stackid), \
|
|
|
|
FN(csum_diff), \
|
|
|
|
FN(skb_get_tunnel_opt), \
|
|
|
|
FN(skb_set_tunnel_opt), \
|
|
|
|
FN(skb_change_proto), \
|
|
|
|
FN(skb_change_type), \
|
|
|
|
FN(skb_under_cgroup), \
|
|
|
|
FN(get_hash_recalc), \
|
|
|
|
FN(get_current_task), \
|
|
|
|
FN(probe_write_user), \
|
|
|
|
FN(current_task_under_cgroup), \
|
|
|
|
FN(skb_change_tail), \
|
|
|
|
FN(skb_pull_data), \
|
|
|
|
FN(csum_update), \
|
|
|
|
FN(set_hash_invalid), \
|
2016-11-30 23:10:10 +07:00
|
|
|
FN(get_numa_node_id), \
|
2016-12-08 06:53:11 +07:00
|
|
|
FN(skb_change_head), \
|
bpf: add bpf_probe_read_str helper
Provide a simple helper with the same semantics of strncpy_from_unsafe():
int bpf_probe_read_str(void *dst, int size, const void *unsafe_addr)
This gives more flexibility to a bpf program. A typical use case is
intercepting a file name during sys_open(). The current approach is:
SEC("kprobe/sys_open")
void bpf_sys_open(struct pt_regs *ctx)
{
char buf[PATHLEN]; // PATHLEN is defined to 256
bpf_probe_read(buf, sizeof(buf), ctx->di);
/* consume buf */
}
This is suboptimal because the size of the string needs to be estimated
at compile time, causing more memory to be copied than often necessary,
and can become more problematic if further processing on buf is done,
for example by pushing it to userspace via bpf_perf_event_output(),
since the real length of the string is unknown and the entire buffer
must be copied (and defining an unrolled strnlen() inside the bpf
program is a very inefficient and unfeasible approach).
With the new helper, the code can easily operate on the actual string
length rather than the buffer size:
SEC("kprobe/sys_open")
void bpf_sys_open(struct pt_regs *ctx)
{
char buf[PATHLEN]; // PATHLEN is defined to 256
int res = bpf_probe_read_str(buf, sizeof(buf), ctx->di);
/* consume buf, for example push it to userspace via
* bpf_perf_event_output(), but this time we can use
* res (the string length) as event size, after checking
* its boundaries.
*/
}
Another useful use case is when parsing individual process arguments or
individual environment variables navigating current->mm->arg_start and
current->mm->env_start: using this helper and the return value, one can
quickly iterate at the right offset of the memory area.
The code changes simply leverage the already existent
strncpy_from_unsafe() kernel function, which is safe to be called from a
bpf program as it is used in bpf_trace_printk().
Signed-off-by: Gianluca Borello <g.borello@gmail.com>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-01-19 00:55:49 +07:00
|
|
|
FN(xdp_adjust_head), \
|
2017-03-23 07:27:34 +07:00
|
|
|
FN(probe_read_str), \
|
2017-03-23 07:27:35 +07:00
|
|
|
FN(get_socket_cookie), \
|
2017-06-11 05:50:47 +07:00
|
|
|
FN(get_socket_uid), \
|
2017-07-01 10:02:46 +07:00
|
|
|
FN(set_hash), \
|
2017-07-02 07:13:26 +07:00
|
|
|
FN(setsockopt), \
|
2017-07-17 23:29:18 +07:00
|
|
|
FN(skb_adjust_room), \
|
2017-08-16 12:32:47 +07:00
|
|
|
FN(redirect_map), \
|
|
|
|
FN(sk_redirect_map), \
|
|
|
|
FN(sock_map_update), \
|
2017-10-05 23:19:20 +07:00
|
|
|
FN(xdp_adjust_meta), \
|
2017-10-05 23:19:22 +07:00
|
|
|
FN(perf_event_read_value), \
|
2017-10-21 01:05:40 +07:00
|
|
|
FN(perf_prog_read_value), \
|
2017-12-11 23:36:48 +07:00
|
|
|
FN(getsockopt), \
|
2018-01-26 07:14:10 +07:00
|
|
|
FN(override_return), \
|
bpf: create tcp_bpf_ulp allowing BPF to monitor socket TX/RX data
This implements a BPF ULP layer to allow policy enforcement and
monitoring at the socket layer. In order to support this a new
program type BPF_PROG_TYPE_SK_MSG is used to run the policy at
the sendmsg/sendpage hook. To attach the policy to sockets a
sockmap is used with a new program attach type BPF_SK_MSG_VERDICT.
Similar to previous sockmap usages when a sock is added to a
sockmap, via a map update, if the map contains a BPF_SK_MSG_VERDICT
program type attached then the BPF ULP layer is created on the
socket and the attached BPF_PROG_TYPE_SK_MSG program is run for
every msg in sendmsg case and page/offset in sendpage case.
BPF_PROG_TYPE_SK_MSG Semantics/API:
BPF_PROG_TYPE_SK_MSG supports only two return codes SK_PASS and
SK_DROP. Returning SK_DROP free's the copied data in the sendmsg
case and in the sendpage case leaves the data untouched. Both cases
return -EACESS to the user. Returning SK_PASS will allow the msg to
be sent.
In the sendmsg case data is copied into kernel space buffers before
running the BPF program. The kernel space buffers are stored in a
scatterlist object where each element is a kernel memory buffer.
Some effort is made to coalesce data from the sendmsg call here.
For example a sendmsg call with many one byte iov entries will
likely be pushed into a single entry. The BPF program is run with
data pointers (start/end) pointing to the first sg element.
In the sendpage case data is not copied. We opt not to copy the
data by default here, because the BPF infrastructure does not
know what bytes will be needed nor when they will be needed. So
copying all bytes may be wasteful. Because of this the initial
start/end data pointers are (0,0). Meaning no data can be read or
written. This avoids reading data that may be modified by the
user. A new helper is added later in this series if reading and
writing the data is needed. The helper call will do a copy by
default so that the page is exclusively owned by the BPF call.
The verdict from the BPF_PROG_TYPE_SK_MSG applies to the entire msg
in the sendmsg() case and the entire page/offset in the sendpage case.
This avoids ambiguity on how to handle mixed return codes in the
sendmsg case. Again a helper is added later in the series if
a verdict needs to apply to multiple system calls and/or only
a subpart of the currently being processed message.
The helper msg_redirect_map() can be used to select the socket to
send the data on. This is used similar to existing redirect use
cases. This allows policy to redirect msgs.
Pseudo code simple example:
The basic logic to attach a program to a socket is as follows,
// load the programs
bpf_prog_load(SOCKMAP_TCP_MSG_PROG, BPF_PROG_TYPE_SK_MSG,
&obj, &msg_prog);
// lookup the sockmap
bpf_map_msg = bpf_object__find_map_by_name(obj, "my_sock_map");
// get fd for sockmap
map_fd_msg = bpf_map__fd(bpf_map_msg);
// attach program to sockmap
bpf_prog_attach(msg_prog, map_fd_msg, BPF_SK_MSG_VERDICT, 0);
Adding sockets to the map is done in the normal way,
// Add a socket 'fd' to sockmap at location 'i'
bpf_map_update_elem(map_fd_msg, &i, fd, BPF_ANY);
After the above any socket attached to "my_sock_map", in this case
'fd', will run the BPF msg verdict program (msg_prog) on every
sendmsg and sendpage system call.
For a complete example see BPF selftests or sockmap samples.
Implementation notes:
It seemed the simplest, to me at least, to use a refcnt to ensure
psock is not lost across the sendmsg copy into the sg, the bpf program
running on the data in sg_data, and the final pass to the TCP stack.
Some performance testing may show a better method to do this and avoid
the refcnt cost, but for now use the simpler method.
Another item that will come after basic support is in place is
supporting MSG_MORE flag. At the moment we call sendpages even if
the MSG_MORE flag is set. An enhancement would be to collect the
pages into a larger scatterlist and pass down the stack. Notice that
bpf_tcp_sendmsg() could support this with some additional state saved
across sendmsg calls. I built the code to support this without having
to do refactoring work. Other features TBD include ZEROCOPY and the
TCP_RECV_QUEUE/TCP_NO_QUEUE support. This will follow initial series
shortly.
Future work could improve size limits on the scatterlist rings used
here. Currently, we use MAX_SKB_FRAGS simply because this was being
used already in the TLS case. Future work could extend the kernel sk
APIs to tune this depending on workload. This is a trade-off
between memory usage and throughput performance.
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Acked-by: David S. Miller <davem@davemloft.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-03-19 02:57:10 +07:00
|
|
|
FN(sock_ops_cb_flags_set), \
|
2018-03-19 02:57:15 +07:00
|
|
|
FN(msg_redirect_map), \
|
2018-03-19 02:57:20 +07:00
|
|
|
FN(msg_apply_bytes), \
|
bpf: sk_msg program helper bpf_sk_msg_pull_data
Currently, if a bpf sk msg program is run the program
can only parse data that the (start,end) pointers already
consumed. For sendmsg hooks this is likely the first
scatterlist element. For sendpage this will be the range
(0,0) because the data is shared with userspace and by
default we want to avoid allowing userspace to modify
data while (or after) BPF verdict is being decided.
To support pulling in additional bytes for parsing use
a new helper bpf_sk_msg_pull(start, end, flags) which
works similar to cls tc logic. This helper will attempt
to point the data start pointer at 'start' bytes offest
into msg and data end pointer at 'end' bytes offset into
message.
After basic sanity checks to ensure 'start' <= 'end' and
'end' <= msg_length there are a few cases we need to
handle.
First the sendmsg hook has already copied the data from
userspace and has exclusive access to it. Therefor, it
is not necessesary to copy the data. However, it may
be required. After finding the scatterlist element with
'start' offset byte in it there are two cases. One the
range (start,end) is entirely contained in the sg element
and is already linear. All that is needed is to update the
data pointers, no allocate/copy is needed. The other case
is (start, end) crosses sg element boundaries. In this
case we allocate a block of size 'end - start' and copy
the data to linearize it.
Next sendpage hook has not copied any data in initial
state so that data pointers are (0,0). In this case we
handle it similar to the above sendmsg case except the
allocation/copy must always happen. Then when sending
the data we have possibly three memory regions that
need to be sent, (0, start - 1), (start, end), and
(end + 1, msg_length). This is required to ensure any
writes by the BPF program are correctly transmitted.
Lastly this operation will invalidate any previous
data checks so BPF programs will have to revalidate
pointers after making this BPF call.
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Acked-by: David S. Miller <davem@davemloft.net>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-03-19 02:57:25 +07:00
|
|
|
FN(msg_cork_bytes), \
|
2018-03-31 05:08:05 +07:00
|
|
|
FN(msg_pull_data), \
|
2018-04-18 11:42:13 +07:00
|
|
|
FN(bind), \
|
2018-04-24 21:50:29 +07:00
|
|
|
FN(xdp_adjust_tail), \
|
2018-04-29 12:28:08 +07:00
|
|
|
FN(skb_get_xfrm_state), \
|
2018-05-04 06:08:15 +07:00
|
|
|
FN(get_stack), \
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
FN(skb_load_bytes_relative), \
|
2018-05-15 00:00:17 +07:00
|
|
|
FN(fib_lookup), \
|
|
|
|
FN(sock_hash_update), \
|
|
|
|
FN(msg_redirect_hash), \
|
bpf: Add IPv6 Segment Routing helpers
The BPF seg6local hook should be powerful enough to enable users to
implement most of the use-cases one could think of. After some thinking,
we figured out that the following actions should be possible on a SRv6
packet, requiring 3 specific helpers :
- bpf_lwt_seg6_store_bytes: Modify non-sensitive fields of the SRH
- bpf_lwt_seg6_adjust_srh: Allow to grow or shrink a SRH
(to add/delete TLVs)
- bpf_lwt_seg6_action: Apply some SRv6 network programming actions
(specifically End.X, End.T, End.B6 and
End.B6.Encap)
The specifications of these helpers are provided in the patch (see
include/uapi/linux/bpf.h).
The non-sensitive fields of the SRH are the following : flags, tag and
TLVs. The other fields can not be modified, to maintain the SRH
integrity. Flags, tag and TLVs can easily be modified as their validity
can be checked afterwards via seg6_validate_srh. It is not allowed to
modify the segments directly. If one wants to add segments on the path,
he should stack a new SRH using the End.B6 action via
bpf_lwt_seg6_action.
Growing, shrinking or editing TLVs via the helpers will flag the SRH as
invalid, and it will have to be re-validated before re-entering the IPv6
layer. This flag is stored in a per-CPU buffer, along with the current
header length in bytes.
Storing the SRH len in bytes in the control block is mandatory when using
bpf_lwt_seg6_adjust_srh. The Header Ext. Length field contains the SRH
len rounded to 8 bytes (a padding TLV can be inserted to ensure the 8-bytes
boundary). When adding/deleting TLVs within the BPF program, the SRH may
temporary be in an invalid state where its length cannot be rounded to 8
bytes without remainder, hence the need to store the length in bytes
separately. The caller of the BPF program can then ensure that the SRH's
final length is valid using this value. Again, a final SRH modified by a
BPF program which doesn’t respect the 8-bytes boundary will be discarded
as it will be considered as invalid.
Finally, a fourth helper is provided, bpf_lwt_push_encap, which is
available from the LWT BPF IN hook, but not from the seg6local BPF one.
This helper allows to encapsulate a Segment Routing Header (either with
a new outer IPv6 header, or by inlining it directly in the existing IPv6
header) into a non-SRv6 packet. This helper is required if we want to
offer the possibility to dynamically encapsulate a SRH for non-SRv6 packet,
as the BPF seg6local hook only works on traffic already containing a SRH.
This is the BPF equivalent of the seg6 LWT infrastructure, which achieves
the same purpose but with a static SRH per route.
These helpers require CONFIG_IPV6=y (and not =m).
Signed-off-by: Mathieu Xhonneux <m.xhonneux@gmail.com>
Acked-by: David Lebrun <dlebrun@google.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-20 20:58:14 +07:00
|
|
|
FN(sk_redirect_hash), \
|
|
|
|
FN(lwt_push_encap), \
|
|
|
|
FN(lwt_seg6_store_bytes), \
|
|
|
|
FN(lwt_seg6_adjust_srh), \
|
2018-05-27 18:24:09 +07:00
|
|
|
FN(lwt_seg6_action), \
|
|
|
|
FN(rc_repeat), \
|
2018-06-03 04:06:36 +07:00
|
|
|
FN(rc_keydown), \
|
2018-06-04 05:59:41 +07:00
|
|
|
FN(skb_cgroup_id), \
|
2018-08-03 04:27:24 +07:00
|
|
|
FN(get_current_cgroup_id), \
|
bpf: Introduce BPF_PROG_TYPE_SK_REUSEPORT
This patch adds a BPF_PROG_TYPE_SK_REUSEPORT which can select
a SO_REUSEPORT sk from a BPF_MAP_TYPE_REUSEPORT_ARRAY. Like other
non SK_FILTER/CGROUP_SKB program, it requires CAP_SYS_ADMIN.
BPF_PROG_TYPE_SK_REUSEPORT introduces "struct sk_reuseport_kern"
to store the bpf context instead of using the skb->cb[48].
At the SO_REUSEPORT sk lookup time, it is in the middle of transiting
from a lower layer (ipv4/ipv6) to a upper layer (udp/tcp). At this
point, it is not always clear where the bpf context can be appended
in the skb->cb[48] to avoid saving-and-restoring cb[]. Even putting
aside the difference between ipv4-vs-ipv6 and udp-vs-tcp. It is not
clear if the lower layer is only ipv4 and ipv6 in the future and
will it not touch the cb[] again before transiting to the upper
layer.
For example, in udp_gro_receive(), it uses the 48 byte NAPI_GRO_CB
instead of IP[6]CB and it may still modify the cb[] after calling
the udp[46]_lib_lookup_skb(). Because of the above reason, if
sk->cb is used for the bpf ctx, saving-and-restoring is needed
and likely the whole 48 bytes cb[] has to be saved and restored.
Instead of saving, setting and restoring the cb[], this patch opts
to create a new "struct sk_reuseport_kern" and setting the needed
values in there.
The new BPF_PROG_TYPE_SK_REUSEPORT and "struct sk_reuseport_(kern|md)"
will serve all ipv4/ipv6 + udp/tcp combinations. There is no protocol
specific usage at this point and it is also inline with the current
sock_reuseport.c implementation (i.e. no protocol specific requirement).
In "struct sk_reuseport_md", this patch exposes data/data_end/len
with semantic similar to other existing usages. Together
with "bpf_skb_load_bytes()" and "bpf_skb_load_bytes_relative()",
the bpf prog can peek anywhere in the skb. The "bind_inany" tells
the bpf prog that the reuseport group is bind-ed to a local
INANY address which cannot be learned from skb.
The new "bind_inany" is added to "struct sock_reuseport" which will be
used when running the new "BPF_PROG_TYPE_SK_REUSEPORT" bpf prog in order
to avoid repeating the "bind INANY" test on
"sk_v6_rcv_saddr/sk->sk_rcv_saddr" every time a bpf prog is run. It can
only be properly initialized when a "sk->sk_reuseport" enabled sk is
adding to a hashtable (i.e. during "reuseport_alloc()" and
"reuseport_add_sock()").
The new "sk_select_reuseport()" is the main helper that the
bpf prog will use to select a SO_REUSEPORT sk. It is the only function
that can use the new BPF_MAP_TYPE_REUSEPORT_ARRAY. As mentioned in
the earlier patch, the validity of a selected sk is checked in
run time in "sk_select_reuseport()". Doing the check in
verification time is difficult and inflexible (consider the map-in-map
use case). The runtime check is to compare the selected sk's reuseport_id
with the reuseport_id that we want. This helper will return -EXXX if the
selected sk cannot serve the incoming request (e.g. reuseport_id
not match). The bpf prog can decide if it wants to do SK_DROP as its
discretion.
When the bpf prog returns SK_PASS, the kernel will check if a
valid sk has been selected (i.e. "reuse_kern->selected_sk != NULL").
If it does , it will use the selected sk. If not, the kernel
will select one from "reuse->socks[]" (as before this patch).
The SK_DROP and SK_PASS handling logic will be in the next patch.
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-08-08 15:01:25 +07:00
|
|
|
FN(get_local_storage), \
|
bpf: Introduce bpf_skb_ancestor_cgroup_id helper
== Problem description ==
It's useful to be able to identify cgroup associated with skb in TC so
that a policy can be applied to this skb, and existing bpf_skb_cgroup_id
helper can help with this.
Though in real life cgroup hierarchy and hierarchy to apply a policy to
don't map 1:1.
It's often the case that there is a container and corresponding cgroup,
but there are many more sub-cgroups inside container, e.g. because it's
delegated to containerized application to control resources for its
subsystems, or to separate application inside container from infra that
belongs to containerization system (e.g. sshd).
At the same time it may be useful to apply a policy to container as a
whole.
If multiple containers like this are run on a host (what is often the
case) and many of them have sub-cgroups, it may not be possible to apply
per-container policy in TC with existing helpers such as
bpf_skb_under_cgroup or bpf_skb_cgroup_id:
* bpf_skb_cgroup_id will return id of immediate cgroup associated with
skb, i.e. if it's a sub-cgroup inside container, it can't be used to
identify container's cgroup;
* bpf_skb_under_cgroup can work only with one cgroup and doesn't scale,
i.e. if there are N containers on a host and a policy has to be
applied to M of them (0 <= M <= N), it'd require M calls to
bpf_skb_under_cgroup, and, if M changes, it'd require to rebuild &
load new BPF program.
== Solution ==
The patch introduces new helper bpf_skb_ancestor_cgroup_id that can be
used to get id of cgroup v2 that is an ancestor of cgroup associated
with skb at specified level of cgroup hierarchy.
That way admin can place all containers on one level of cgroup hierarchy
(what is a good practice in general and already used in many
configurations) and identify specific cgroup on this level no matter
what sub-cgroup skb is associated with.
E.g. if there is a cgroup hierarchy:
root/
root/container1/
root/container1/app11/
root/container1/app11/sub-app-a/
root/container1/app12/
root/container2/
root/container2/app21/
root/container2/app22/
root/container2/app22/sub-app-b/
, then having skb associated with root/container1/app11/sub-app-a/ it's
possible to get ancestor at level 1, what is container1 and apply policy
for this container, or apply another policy if it's container2.
Policies can be kept e.g. in a hash map where key is a container cgroup
id and value is an action.
Levels where container cgroups are created are usually known in advance
whether cgroup hierarchy inside container may be hard to predict
especially in case when its creation is delegated to containerized
application.
== Implementation details ==
The helper gets ancestor by walking parents up to specified level.
Another option would be to get different kind of "id" from
cgroup->ancestor_ids[level] and use it with idr_find() to get struct
cgroup for ancestor. But that would require radix lookup what doesn't
seem to be better (at least it's not obviously better).
Format of return value of the new helper is same as that of
bpf_skb_cgroup_id.
Signed-off-by: Andrey Ignatov <rdna@fb.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-08-13 00:49:27 +07:00
|
|
|
FN(sk_select_reuseport), \
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
FN(skb_ancestor_cgroup_id), \
|
|
|
|
FN(sk_lookup_tcp), \
|
|
|
|
FN(sk_lookup_udp), \
|
2018-10-18 20:16:25 +07:00
|
|
|
FN(sk_release), \
|
|
|
|
FN(map_push_elem), \
|
|
|
|
FN(map_pop_elem), \
|
bpf: sk_msg program helper bpf_msg_push_data
This allows user to push data into a msg using sk_msg program types.
The format is as follows,
bpf_msg_push_data(msg, offset, len, flags)
this will insert 'len' bytes at offset 'offset'. For example to
prepend 10 bytes at the front of the message the user can,
bpf_msg_push_data(msg, 0, 10, 0);
This will invalidate data bounds so BPF user will have to then recheck
data bounds after calling this. After this the msg size will have been
updated and the user is free to write into the added bytes. We allow
any offset/len as long as it is within the (data, data_end) range.
However, a copy will be required if the ring is full and its possible
for the helper to fail with ENOMEM or EINVAL errors which need to be
handled by the BPF program.
This can be used similar to XDP metadata to pass data between sk_msg
layer and lower layers.
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-20 09:56:49 +07:00
|
|
|
FN(map_peek_elem), \
|
2018-11-27 05:16:17 +07:00
|
|
|
FN(msg_push_data), \
|
2018-12-06 20:01:03 +07:00
|
|
|
FN(msg_pop_data), \
|
2019-02-01 06:40:04 +07:00
|
|
|
FN(rc_pointer_rel), \
|
|
|
|
FN(spin_lock), \
|
bpf: Add a bpf_sock pointer to __sk_buff and a bpf_sk_fullsock helper
In kernel, it is common to check "skb->sk && sk_fullsock(skb->sk)"
before accessing the fields in sock. For example, in __netdev_pick_tx:
static u16 __netdev_pick_tx(struct net_device *dev, struct sk_buff *skb,
struct net_device *sb_dev)
{
/* ... */
struct sock *sk = skb->sk;
if (queue_index != new_index && sk &&
sk_fullsock(sk) &&
rcu_access_pointer(sk->sk_dst_cache))
sk_tx_queue_set(sk, new_index);
/* ... */
return queue_index;
}
This patch adds a "struct bpf_sock *sk" pointer to the "struct __sk_buff"
where a few of the convert_ctx_access() in filter.c has already been
accessing the skb->sk sock_common's fields,
e.g. sock_ops_convert_ctx_access().
"__sk_buff->sk" is a PTR_TO_SOCK_COMMON_OR_NULL in the verifier.
Some of the fileds in "bpf_sock" will not be directly
accessible through the "__sk_buff->sk" pointer. It is limited
by the new "bpf_sock_common_is_valid_access()".
e.g. The existing "type", "protocol", "mark" and "priority" in bpf_sock
are not allowed.
The newly added "struct bpf_sock *bpf_sk_fullsock(struct bpf_sock *sk)"
can be used to get a sk with all accessible fields in "bpf_sock".
This helper is added to both cg_skb and sched_(cls|act).
int cg_skb_foo(struct __sk_buff *skb) {
struct bpf_sock *sk;
sk = skb->sk;
if (!sk)
return 1;
sk = bpf_sk_fullsock(sk);
if (!sk)
return 1;
if (sk->family != AF_INET6 || sk->protocol != IPPROTO_TCP)
return 1;
/* some_traffic_shaping(); */
return 1;
}
(1) The sk is read only
(2) There is no new "struct bpf_sock_common" introduced.
(3) Future kernel sock's members could be added to bpf_sock only
instead of repeatedly adding at multiple places like currently
in bpf_sock_ops_md, bpf_sock_addr_md, sk_reuseport_md...etc.
(4) After "sk = skb->sk", the reg holding sk is in type
PTR_TO_SOCK_COMMON_OR_NULL.
(5) After bpf_sk_fullsock(), the return type will be in type
PTR_TO_SOCKET_OR_NULL which is the same as the return type of
bpf_sk_lookup_xxx().
However, bpf_sk_fullsock() does not take refcnt. The
acquire_reference_state() is only depending on the return type now.
To avoid it, a new is_acquire_function() is checked before calling
acquire_reference_state().
(6) The WARN_ON in "release_reference_state()" is no longer an
internal verifier bug.
When reg->id is not found in state->refs[], it means the
bpf_prog does something wrong like
"bpf_sk_release(bpf_sk_fullsock(skb->sk))" where reference has
never been acquired by calling "bpf_sk_fullsock(skb->sk)".
A -EINVAL and a verbose are done instead of WARN_ON. A test is
added to the test_verifier in a later patch.
Since the WARN_ON in "release_reference_state()" is no longer
needed, "__release_reference_state()" is folded into
"release_reference_state()" also.
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-02-10 14:22:20 +07:00
|
|
|
FN(spin_unlock), \
|
2019-02-10 14:22:24 +07:00
|
|
|
FN(sk_fullsock), \
|
2019-03-02 03:38:46 +07:00
|
|
|
FN(tcp_sock), \
|
2019-03-13 00:23:04 +07:00
|
|
|
FN(skb_ecn_set_ce), \
|
2019-03-22 08:54:01 +07:00
|
|
|
FN(get_listener_sock), \
|
2019-03-22 08:54:02 +07:00
|
|
|
FN(skc_lookup_tcp), \
|
|
|
|
FN(tcp_check_syncookie),
|
2016-10-27 16:23:51 +07:00
|
|
|
|
2014-09-26 14:17:00 +07:00
|
|
|
/* integer value in 'imm' field of BPF_CALL instruction selects which helper
|
|
|
|
* function eBPF program intends to call
|
|
|
|
*/
|
2016-10-27 16:23:51 +07:00
|
|
|
#define __BPF_ENUM_FN(x) BPF_FUNC_ ## x
|
2014-09-26 14:17:00 +07:00
|
|
|
enum bpf_func_id {
|
2016-10-27 16:23:51 +07:00
|
|
|
__BPF_FUNC_MAPPER(__BPF_ENUM_FN)
|
2014-09-26 14:17:00 +07:00
|
|
|
__BPF_FUNC_MAX_ID,
|
|
|
|
};
|
2016-10-27 16:23:51 +07:00
|
|
|
#undef __BPF_ENUM_FN
|
2014-09-26 14:17:00 +07:00
|
|
|
|
2016-01-11 07:16:38 +07:00
|
|
|
/* All flags used by eBPF helper functions, placed here. */
|
|
|
|
|
|
|
|
/* BPF_FUNC_skb_store_bytes flags. */
|
|
|
|
#define BPF_F_RECOMPUTE_CSUM (1ULL << 0)
|
2016-03-04 21:15:03 +07:00
|
|
|
#define BPF_F_INVALIDATE_HASH (1ULL << 1)
|
2016-01-11 07:16:38 +07:00
|
|
|
|
|
|
|
/* BPF_FUNC_l3_csum_replace and BPF_FUNC_l4_csum_replace flags.
|
|
|
|
* First 4 bits are for passing the header field size.
|
|
|
|
*/
|
|
|
|
#define BPF_F_HDR_FIELD_MASK 0xfULL
|
|
|
|
|
|
|
|
/* BPF_FUNC_l4_csum_replace flags. */
|
|
|
|
#define BPF_F_PSEUDO_HDR (1ULL << 4)
|
2016-02-20 05:05:26 +07:00
|
|
|
#define BPF_F_MARK_MANGLED_0 (1ULL << 5)
|
2017-01-24 07:06:28 +07:00
|
|
|
#define BPF_F_MARK_ENFORCE (1ULL << 6)
|
2016-01-11 07:16:38 +07:00
|
|
|
|
|
|
|
/* BPF_FUNC_clone_redirect and BPF_FUNC_redirect flags. */
|
|
|
|
#define BPF_F_INGRESS (1ULL << 0)
|
|
|
|
|
2016-01-11 07:16:39 +07:00
|
|
|
/* BPF_FUNC_skb_set_tunnel_key and BPF_FUNC_skb_get_tunnel_key flags. */
|
|
|
|
#define BPF_F_TUNINFO_IPV6 (1ULL << 0)
|
|
|
|
|
2018-04-29 12:28:08 +07:00
|
|
|
/* flags for both BPF_FUNC_get_stackid and BPF_FUNC_get_stack. */
|
2016-02-18 10:58:58 +07:00
|
|
|
#define BPF_F_SKIP_FIELD_MASK 0xffULL
|
|
|
|
#define BPF_F_USER_STACK (1ULL << 8)
|
2018-04-29 12:28:08 +07:00
|
|
|
/* flags used by BPF_FUNC_get_stackid only. */
|
2016-02-18 10:58:58 +07:00
|
|
|
#define BPF_F_FAST_STACK_CMP (1ULL << 9)
|
|
|
|
#define BPF_F_REUSE_STACKID (1ULL << 10)
|
2018-04-29 12:28:08 +07:00
|
|
|
/* flags used by BPF_FUNC_get_stack only. */
|
|
|
|
#define BPF_F_USER_BUILD_ID (1ULL << 11)
|
2016-02-18 10:58:58 +07:00
|
|
|
|
2016-02-23 08:05:26 +07:00
|
|
|
/* BPF_FUNC_skb_set_tunnel_key flags. */
|
|
|
|
#define BPF_F_ZERO_CSUM_TX (1ULL << 1)
|
2016-03-04 21:15:05 +07:00
|
|
|
#define BPF_F_DONT_FRAGMENT (1ULL << 2)
|
2018-03-02 04:49:57 +07:00
|
|
|
#define BPF_F_SEQ_NUMBER (1ULL << 3)
|
2016-02-23 08:05:26 +07:00
|
|
|
|
2017-10-05 23:19:20 +07:00
|
|
|
/* BPF_FUNC_perf_event_output, BPF_FUNC_perf_event_read and
|
|
|
|
* BPF_FUNC_perf_event_read_value flags.
|
|
|
|
*/
|
2016-04-19 02:01:23 +07:00
|
|
|
#define BPF_F_INDEX_MASK 0xffffffffULL
|
|
|
|
#define BPF_F_CURRENT_CPU BPF_F_INDEX_MASK
|
2016-07-14 23:08:05 +07:00
|
|
|
/* BPF_FUNC_perf_event_output for sk_buff input context. */
|
|
|
|
#define BPF_F_CTXLEN_MASK (0xfffffULL << 32)
|
2016-04-19 02:01:23 +07:00
|
|
|
|
2018-12-01 06:32:20 +07:00
|
|
|
/* Current network namespace */
|
|
|
|
#define BPF_F_CURRENT_NETNS (-1L)
|
|
|
|
|
2019-03-23 01:32:55 +07:00
|
|
|
/* BPF_FUNC_skb_adjust_room flags. */
|
|
|
|
#define BPF_F_ADJ_ROOM_FIXED_GSO (1ULL << 0)
|
|
|
|
|
2019-03-23 01:32:56 +07:00
|
|
|
#define BPF_F_ADJ_ROOM_ENCAP_L3_IPV4 (1ULL << 1)
|
|
|
|
#define BPF_F_ADJ_ROOM_ENCAP_L3_IPV6 (1ULL << 2)
|
|
|
|
#define BPF_F_ADJ_ROOM_ENCAP_L4_GRE (1ULL << 3)
|
|
|
|
#define BPF_F_ADJ_ROOM_ENCAP_L4_UDP (1ULL << 4)
|
|
|
|
|
2017-07-02 07:13:26 +07:00
|
|
|
/* Mode for BPF_FUNC_skb_adjust_room helper. */
|
|
|
|
enum bpf_adj_room_mode {
|
|
|
|
BPF_ADJ_ROOM_NET,
|
2019-03-23 01:32:54 +07:00
|
|
|
BPF_ADJ_ROOM_MAC,
|
2017-07-02 07:13:26 +07:00
|
|
|
};
|
|
|
|
|
2018-05-04 06:08:15 +07:00
|
|
|
/* Mode for BPF_FUNC_skb_load_bytes_relative helper. */
|
|
|
|
enum bpf_hdr_start_off {
|
|
|
|
BPF_HDR_START_MAC,
|
|
|
|
BPF_HDR_START_NET,
|
|
|
|
};
|
|
|
|
|
bpf: Add IPv6 Segment Routing helpers
The BPF seg6local hook should be powerful enough to enable users to
implement most of the use-cases one could think of. After some thinking,
we figured out that the following actions should be possible on a SRv6
packet, requiring 3 specific helpers :
- bpf_lwt_seg6_store_bytes: Modify non-sensitive fields of the SRH
- bpf_lwt_seg6_adjust_srh: Allow to grow or shrink a SRH
(to add/delete TLVs)
- bpf_lwt_seg6_action: Apply some SRv6 network programming actions
(specifically End.X, End.T, End.B6 and
End.B6.Encap)
The specifications of these helpers are provided in the patch (see
include/uapi/linux/bpf.h).
The non-sensitive fields of the SRH are the following : flags, tag and
TLVs. The other fields can not be modified, to maintain the SRH
integrity. Flags, tag and TLVs can easily be modified as their validity
can be checked afterwards via seg6_validate_srh. It is not allowed to
modify the segments directly. If one wants to add segments on the path,
he should stack a new SRH using the End.B6 action via
bpf_lwt_seg6_action.
Growing, shrinking or editing TLVs via the helpers will flag the SRH as
invalid, and it will have to be re-validated before re-entering the IPv6
layer. This flag is stored in a per-CPU buffer, along with the current
header length in bytes.
Storing the SRH len in bytes in the control block is mandatory when using
bpf_lwt_seg6_adjust_srh. The Header Ext. Length field contains the SRH
len rounded to 8 bytes (a padding TLV can be inserted to ensure the 8-bytes
boundary). When adding/deleting TLVs within the BPF program, the SRH may
temporary be in an invalid state where its length cannot be rounded to 8
bytes without remainder, hence the need to store the length in bytes
separately. The caller of the BPF program can then ensure that the SRH's
final length is valid using this value. Again, a final SRH modified by a
BPF program which doesn’t respect the 8-bytes boundary will be discarded
as it will be considered as invalid.
Finally, a fourth helper is provided, bpf_lwt_push_encap, which is
available from the LWT BPF IN hook, but not from the seg6local BPF one.
This helper allows to encapsulate a Segment Routing Header (either with
a new outer IPv6 header, or by inlining it directly in the existing IPv6
header) into a non-SRv6 packet. This helper is required if we want to
offer the possibility to dynamically encapsulate a SRH for non-SRv6 packet,
as the BPF seg6local hook only works on traffic already containing a SRH.
This is the BPF equivalent of the seg6 LWT infrastructure, which achieves
the same purpose but with a static SRH per route.
These helpers require CONFIG_IPV6=y (and not =m).
Signed-off-by: Mathieu Xhonneux <m.xhonneux@gmail.com>
Acked-by: David Lebrun <dlebrun@google.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-20 20:58:14 +07:00
|
|
|
/* Encapsulation type for BPF_FUNC_lwt_push_encap helper. */
|
|
|
|
enum bpf_lwt_encap_mode {
|
|
|
|
BPF_LWT_ENCAP_SEG6,
|
2019-02-14 02:53:35 +07:00
|
|
|
BPF_LWT_ENCAP_SEG6_INLINE,
|
|
|
|
BPF_LWT_ENCAP_IP,
|
bpf: Add IPv6 Segment Routing helpers
The BPF seg6local hook should be powerful enough to enable users to
implement most of the use-cases one could think of. After some thinking,
we figured out that the following actions should be possible on a SRv6
packet, requiring 3 specific helpers :
- bpf_lwt_seg6_store_bytes: Modify non-sensitive fields of the SRH
- bpf_lwt_seg6_adjust_srh: Allow to grow or shrink a SRH
(to add/delete TLVs)
- bpf_lwt_seg6_action: Apply some SRv6 network programming actions
(specifically End.X, End.T, End.B6 and
End.B6.Encap)
The specifications of these helpers are provided in the patch (see
include/uapi/linux/bpf.h).
The non-sensitive fields of the SRH are the following : flags, tag and
TLVs. The other fields can not be modified, to maintain the SRH
integrity. Flags, tag and TLVs can easily be modified as their validity
can be checked afterwards via seg6_validate_srh. It is not allowed to
modify the segments directly. If one wants to add segments on the path,
he should stack a new SRH using the End.B6 action via
bpf_lwt_seg6_action.
Growing, shrinking or editing TLVs via the helpers will flag the SRH as
invalid, and it will have to be re-validated before re-entering the IPv6
layer. This flag is stored in a per-CPU buffer, along with the current
header length in bytes.
Storing the SRH len in bytes in the control block is mandatory when using
bpf_lwt_seg6_adjust_srh. The Header Ext. Length field contains the SRH
len rounded to 8 bytes (a padding TLV can be inserted to ensure the 8-bytes
boundary). When adding/deleting TLVs within the BPF program, the SRH may
temporary be in an invalid state where its length cannot be rounded to 8
bytes without remainder, hence the need to store the length in bytes
separately. The caller of the BPF program can then ensure that the SRH's
final length is valid using this value. Again, a final SRH modified by a
BPF program which doesn’t respect the 8-bytes boundary will be discarded
as it will be considered as invalid.
Finally, a fourth helper is provided, bpf_lwt_push_encap, which is
available from the LWT BPF IN hook, but not from the seg6local BPF one.
This helper allows to encapsulate a Segment Routing Header (either with
a new outer IPv6 header, or by inlining it directly in the existing IPv6
header) into a non-SRv6 packet. This helper is required if we want to
offer the possibility to dynamically encapsulate a SRH for non-SRv6 packet,
as the BPF seg6local hook only works on traffic already containing a SRH.
This is the BPF equivalent of the seg6 LWT infrastructure, which achieves
the same purpose but with a static SRH per route.
These helpers require CONFIG_IPV6=y (and not =m).
Signed-off-by: Mathieu Xhonneux <m.xhonneux@gmail.com>
Acked-by: David Lebrun <dlebrun@google.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-20 20:58:14 +07:00
|
|
|
};
|
|
|
|
|
2018-12-01 07:18:53 +07:00
|
|
|
#define __bpf_md_ptr(type, name) \
|
|
|
|
union { \
|
|
|
|
type name; \
|
|
|
|
__u64 :64; \
|
|
|
|
} __attribute__((aligned(8)))
|
|
|
|
|
2015-03-14 01:57:42 +07:00
|
|
|
/* user accessible mirror of in-kernel sk_buff.
|
|
|
|
* new fields can only be added to the end of this structure
|
|
|
|
*/
|
|
|
|
struct __sk_buff {
|
|
|
|
__u32 len;
|
|
|
|
__u32 pkt_type;
|
|
|
|
__u32 mark;
|
|
|
|
__u32 queue_mapping;
|
2015-03-17 08:06:02 +07:00
|
|
|
__u32 protocol;
|
|
|
|
__u32 vlan_present;
|
|
|
|
__u32 vlan_tci;
|
2015-03-24 20:48:41 +07:00
|
|
|
__u32 vlan_proto;
|
2015-04-04 01:52:24 +07:00
|
|
|
__u32 priority;
|
2015-05-28 05:30:39 +07:00
|
|
|
__u32 ingress_ifindex;
|
|
|
|
__u32 ifindex;
|
2015-06-05 00:11:54 +07:00
|
|
|
__u32 tc_index;
|
|
|
|
__u32 cb[5];
|
ebpf: add skb->hash to offset map for usage in {cls, act}_bpf or filters
Add skb->hash to the __sk_buff offset map, so it can be accessed from
an eBPF program. We currently already do this for classic BPF filters,
but not yet on eBPF, it might be useful as a demuxer in combination with
helpers like bpf_clone_redirect(), toy example:
__section("cls-lb") int ingress_main(struct __sk_buff *skb)
{
unsigned int which = 3 + (skb->hash & 7);
/* bpf_skb_store_bytes(skb, ...); */
/* bpf_l{3,4}_csum_replace(skb, ...); */
bpf_clone_redirect(skb, which, 0);
return -1;
}
I was thinking whether to add skb_get_hash(), but then concluded the
raw skb->hash seems fine in this case: we can directly access the hash
w/o extra eBPF helper function call, it's filled out by many NICs on
ingress, and in case the entropy level would not be sufficient, people
can still implement their own specific sw fallback hash mix anyway.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@plumgrid.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-08-01 05:46:29 +07:00
|
|
|
__u32 hash;
|
2015-09-16 13:05:42 +07:00
|
|
|
__u32 tc_classid;
|
2016-05-06 09:49:10 +07:00
|
|
|
__u32 data;
|
|
|
|
__u32 data_end;
|
2017-04-20 04:01:17 +07:00
|
|
|
__u32 napi_id;
|
2017-08-16 12:33:09 +07:00
|
|
|
|
bpf: add meta pointer for direct access
This work enables generic transfer of metadata from XDP into skb. The
basic idea is that we can make use of the fact that the resulting skb
must be linear and already comes with a larger headroom for supporting
bpf_xdp_adjust_head(), which mangles xdp->data. Here, we base our work
on a similar principle and introduce a small helper bpf_xdp_adjust_meta()
for adjusting a new pointer called xdp->data_meta. Thus, the packet has
a flexible and programmable room for meta data, followed by the actual
packet data. struct xdp_buff is therefore laid out that we first point
to data_hard_start, then data_meta directly prepended to data followed
by data_end marking the end of packet. bpf_xdp_adjust_head() takes into
account whether we have meta data already prepended and if so, memmove()s
this along with the given offset provided there's enough room.
xdp->data_meta is optional and programs are not required to use it. The
rationale is that when we process the packet in XDP (e.g. as DoS filter),
we can push further meta data along with it for the XDP_PASS case, and
give the guarantee that a clsact ingress BPF program on the same device
can pick this up for further post-processing. Since we work with skb
there, we can also set skb->mark, skb->priority or other skb meta data
out of BPF, thus having this scratch space generic and programmable
allows for more flexibility than defining a direct 1:1 transfer of
potentially new XDP members into skb (it's also more efficient as we
don't need to initialize/handle each of such new members). The facility
also works together with GRO aggregation. The scratch space at the head
of the packet can be multiple of 4 byte up to 32 byte large. Drivers not
yet supporting xdp->data_meta can simply be set up with xdp->data_meta
as xdp->data + 1 as bpf_xdp_adjust_meta() will detect this and bail out,
such that the subsequent match against xdp->data for later access is
guaranteed to fail.
The verifier treats xdp->data_meta/xdp->data the same way as we treat
xdp->data/xdp->data_end pointer comparisons. The requirement for doing
the compare against xdp->data is that it hasn't been modified from it's
original address we got from ctx access. It may have a range marking
already from prior successful xdp->data/xdp->data_end pointer comparisons
though.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-25 07:25:51 +07:00
|
|
|
/* Accessed by BPF_PROG_TYPE_sk_skb types from here to ... */
|
2017-08-16 12:33:09 +07:00
|
|
|
__u32 family;
|
|
|
|
__u32 remote_ip4; /* Stored in network byte order */
|
|
|
|
__u32 local_ip4; /* Stored in network byte order */
|
|
|
|
__u32 remote_ip6[4]; /* Stored in network byte order */
|
|
|
|
__u32 local_ip6[4]; /* Stored in network byte order */
|
|
|
|
__u32 remote_port; /* Stored in network byte order */
|
|
|
|
__u32 local_port; /* stored in host byte order */
|
bpf: add meta pointer for direct access
This work enables generic transfer of metadata from XDP into skb. The
basic idea is that we can make use of the fact that the resulting skb
must be linear and already comes with a larger headroom for supporting
bpf_xdp_adjust_head(), which mangles xdp->data. Here, we base our work
on a similar principle and introduce a small helper bpf_xdp_adjust_meta()
for adjusting a new pointer called xdp->data_meta. Thus, the packet has
a flexible and programmable room for meta data, followed by the actual
packet data. struct xdp_buff is therefore laid out that we first point
to data_hard_start, then data_meta directly prepended to data followed
by data_end marking the end of packet. bpf_xdp_adjust_head() takes into
account whether we have meta data already prepended and if so, memmove()s
this along with the given offset provided there's enough room.
xdp->data_meta is optional and programs are not required to use it. The
rationale is that when we process the packet in XDP (e.g. as DoS filter),
we can push further meta data along with it for the XDP_PASS case, and
give the guarantee that a clsact ingress BPF program on the same device
can pick this up for further post-processing. Since we work with skb
there, we can also set skb->mark, skb->priority or other skb meta data
out of BPF, thus having this scratch space generic and programmable
allows for more flexibility than defining a direct 1:1 transfer of
potentially new XDP members into skb (it's also more efficient as we
don't need to initialize/handle each of such new members). The facility
also works together with GRO aggregation. The scratch space at the head
of the packet can be multiple of 4 byte up to 32 byte large. Drivers not
yet supporting xdp->data_meta can simply be set up with xdp->data_meta
as xdp->data + 1 as bpf_xdp_adjust_meta() will detect this and bail out,
such that the subsequent match against xdp->data for later access is
guaranteed to fail.
The verifier treats xdp->data_meta/xdp->data the same way as we treat
xdp->data/xdp->data_end pointer comparisons. The requirement for doing
the compare against xdp->data is that it hasn't been modified from it's
original address we got from ctx access. It may have a range marking
already from prior successful xdp->data/xdp->data_end pointer comparisons
though.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-25 07:25:51 +07:00
|
|
|
/* ... here. */
|
|
|
|
|
|
|
|
__u32 data_meta;
|
2018-12-01 07:18:53 +07:00
|
|
|
__bpf_md_ptr(struct bpf_flow_keys *, flow_keys);
|
2018-11-23 02:39:16 +07:00
|
|
|
__u64 tstamp;
|
2018-12-03 08:18:19 +07:00
|
|
|
__u32 wire_len;
|
2019-01-24 00:22:27 +07:00
|
|
|
__u32 gso_segs;
|
bpf: Add a bpf_sock pointer to __sk_buff and a bpf_sk_fullsock helper
In kernel, it is common to check "skb->sk && sk_fullsock(skb->sk)"
before accessing the fields in sock. For example, in __netdev_pick_tx:
static u16 __netdev_pick_tx(struct net_device *dev, struct sk_buff *skb,
struct net_device *sb_dev)
{
/* ... */
struct sock *sk = skb->sk;
if (queue_index != new_index && sk &&
sk_fullsock(sk) &&
rcu_access_pointer(sk->sk_dst_cache))
sk_tx_queue_set(sk, new_index);
/* ... */
return queue_index;
}
This patch adds a "struct bpf_sock *sk" pointer to the "struct __sk_buff"
where a few of the convert_ctx_access() in filter.c has already been
accessing the skb->sk sock_common's fields,
e.g. sock_ops_convert_ctx_access().
"__sk_buff->sk" is a PTR_TO_SOCK_COMMON_OR_NULL in the verifier.
Some of the fileds in "bpf_sock" will not be directly
accessible through the "__sk_buff->sk" pointer. It is limited
by the new "bpf_sock_common_is_valid_access()".
e.g. The existing "type", "protocol", "mark" and "priority" in bpf_sock
are not allowed.
The newly added "struct bpf_sock *bpf_sk_fullsock(struct bpf_sock *sk)"
can be used to get a sk with all accessible fields in "bpf_sock".
This helper is added to both cg_skb and sched_(cls|act).
int cg_skb_foo(struct __sk_buff *skb) {
struct bpf_sock *sk;
sk = skb->sk;
if (!sk)
return 1;
sk = bpf_sk_fullsock(sk);
if (!sk)
return 1;
if (sk->family != AF_INET6 || sk->protocol != IPPROTO_TCP)
return 1;
/* some_traffic_shaping(); */
return 1;
}
(1) The sk is read only
(2) There is no new "struct bpf_sock_common" introduced.
(3) Future kernel sock's members could be added to bpf_sock only
instead of repeatedly adding at multiple places like currently
in bpf_sock_ops_md, bpf_sock_addr_md, sk_reuseport_md...etc.
(4) After "sk = skb->sk", the reg holding sk is in type
PTR_TO_SOCK_COMMON_OR_NULL.
(5) After bpf_sk_fullsock(), the return type will be in type
PTR_TO_SOCKET_OR_NULL which is the same as the return type of
bpf_sk_lookup_xxx().
However, bpf_sk_fullsock() does not take refcnt. The
acquire_reference_state() is only depending on the return type now.
To avoid it, a new is_acquire_function() is checked before calling
acquire_reference_state().
(6) The WARN_ON in "release_reference_state()" is no longer an
internal verifier bug.
When reg->id is not found in state->refs[], it means the
bpf_prog does something wrong like
"bpf_sk_release(bpf_sk_fullsock(skb->sk))" where reference has
never been acquired by calling "bpf_sk_fullsock(skb->sk)".
A -EINVAL and a verbose are done instead of WARN_ON. A test is
added to the test_verifier in a later patch.
Since the WARN_ON in "release_reference_state()" is no longer
needed, "__release_reference_state()" is folded into
"release_reference_state()" also.
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2019-02-10 14:22:20 +07:00
|
|
|
__bpf_md_ptr(struct bpf_sock *, sk);
|
2015-03-14 01:57:42 +07:00
|
|
|
};
|
|
|
|
|
bpf: add helpers to access tunnel metadata
Introduce helpers to let eBPF programs attached to TC manipulate tunnel metadata:
bpf_skb_[gs]et_tunnel_key(skb, key, size, flags)
skb: pointer to skb
key: pointer to 'struct bpf_tunnel_key'
size: size of 'struct bpf_tunnel_key'
flags: room for future extensions
First eBPF program that uses these helpers will allocate per_cpu
metadata_dst structures that will be used on TX.
On RX metadata_dst is allocated by tunnel driver.
Typical usage for TX:
struct bpf_tunnel_key tkey;
... populate tkey ...
bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), 0);
bpf_clone_redirect(skb, vxlan_dev_ifindex, 0);
RX:
struct bpf_tunnel_key tkey = {};
bpf_skb_get_tunnel_key(skb, &tkey, sizeof(tkey), 0);
... lookup or redirect based on tkey ...
'struct bpf_tunnel_key' will be extended in the future by adding
elements to the end and the 'size' argument will indicate which fields
are populated, thereby keeping backwards compatibility.
The 'flags' argument may be used as well when the 'size' is not enough or
to indicate completely different layout of bpf_tunnel_key.
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Acked-by: Thomas Graf <tgraf@suug.ch>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-07-31 05:36:57 +07:00
|
|
|
struct bpf_tunnel_key {
|
|
|
|
__u32 tunnel_id;
|
2016-01-11 07:16:39 +07:00
|
|
|
union {
|
|
|
|
__u32 remote_ipv4;
|
|
|
|
__u32 remote_ipv6[4];
|
|
|
|
};
|
|
|
|
__u8 tunnel_tos;
|
|
|
|
__u8 tunnel_ttl;
|
2018-06-03 04:06:37 +07:00
|
|
|
__u16 tunnel_ext; /* Padding, future use. */
|
2016-03-09 09:00:05 +07:00
|
|
|
__u32 tunnel_label;
|
bpf: add helpers to access tunnel metadata
Introduce helpers to let eBPF programs attached to TC manipulate tunnel metadata:
bpf_skb_[gs]et_tunnel_key(skb, key, size, flags)
skb: pointer to skb
key: pointer to 'struct bpf_tunnel_key'
size: size of 'struct bpf_tunnel_key'
flags: room for future extensions
First eBPF program that uses these helpers will allocate per_cpu
metadata_dst structures that will be used on TX.
On RX metadata_dst is allocated by tunnel driver.
Typical usage for TX:
struct bpf_tunnel_key tkey;
... populate tkey ...
bpf_skb_set_tunnel_key(skb, &tkey, sizeof(tkey), 0);
bpf_clone_redirect(skb, vxlan_dev_ifindex, 0);
RX:
struct bpf_tunnel_key tkey = {};
bpf_skb_get_tunnel_key(skb, &tkey, sizeof(tkey), 0);
... lookup or redirect based on tkey ...
'struct bpf_tunnel_key' will be extended in the future by adding
elements to the end and the 'size' argument will indicate which fields
are populated, thereby keeping backwards compatibility.
The 'flags' argument may be used as well when the 'size' is not enough or
to indicate completely different layout of bpf_tunnel_key.
Signed-off-by: Alexei Starovoitov <ast@plumgrid.com>
Acked-by: Thomas Graf <tgraf@suug.ch>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-07-31 05:36:57 +07:00
|
|
|
};
|
|
|
|
|
2018-04-24 21:50:29 +07:00
|
|
|
/* user accessible mirror of in-kernel xfrm_state.
|
|
|
|
* new fields can only be added to the end of this structure
|
|
|
|
*/
|
|
|
|
struct bpf_xfrm_state {
|
|
|
|
__u32 reqid;
|
|
|
|
__u32 spi; /* Stored in network byte order */
|
|
|
|
__u16 family;
|
2018-06-03 04:06:37 +07:00
|
|
|
__u16 ext; /* Padding, future use. */
|
2018-04-24 21:50:29 +07:00
|
|
|
union {
|
|
|
|
__u32 remote_ipv4; /* Stored in network byte order */
|
|
|
|
__u32 remote_ipv6[4]; /* Stored in network byte order */
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2016-11-30 23:10:10 +07:00
|
|
|
/* Generic BPF return codes which all BPF program types may support.
|
|
|
|
* The values are binary compatible with their TC_ACT_* counter-part to
|
|
|
|
* provide backwards compatibility with existing SCHED_CLS and SCHED_ACT
|
|
|
|
* programs.
|
|
|
|
*
|
|
|
|
* XDP is handled seprately, see XDP_*.
|
|
|
|
*/
|
|
|
|
enum bpf_ret_code {
|
|
|
|
BPF_OK = 0,
|
|
|
|
/* 1 reserved */
|
|
|
|
BPF_DROP = 2,
|
|
|
|
/* 3-6 reserved */
|
|
|
|
BPF_REDIRECT = 7,
|
2019-02-14 02:53:35 +07:00
|
|
|
/* >127 are reserved for prog type specific return codes.
|
|
|
|
*
|
|
|
|
* BPF_LWT_REROUTE: used by BPF_PROG_TYPE_LWT_IN and
|
|
|
|
* BPF_PROG_TYPE_LWT_XMIT to indicate that skb had been
|
|
|
|
* changed and should be routed based on its new L3 header.
|
|
|
|
* (This is an L3 redirect, as opposed to L2 redirect
|
|
|
|
* represented by BPF_REDIRECT above).
|
|
|
|
*/
|
|
|
|
BPF_LWT_REROUTE = 128,
|
2016-11-30 23:10:10 +07:00
|
|
|
};
|
|
|
|
|
2016-12-01 23:48:04 +07:00
|
|
|
struct bpf_sock {
|
|
|
|
__u32 bound_dev_if;
|
2016-12-01 23:48:06 +07:00
|
|
|
__u32 family;
|
|
|
|
__u32 type;
|
|
|
|
__u32 protocol;
|
2017-09-01 05:05:44 +07:00
|
|
|
__u32 mark;
|
|
|
|
__u32 priority;
|
2019-02-10 14:22:21 +07:00
|
|
|
/* IP address also allows 1 and 2 bytes access */
|
|
|
|
__u32 src_ip4;
|
|
|
|
__u32 src_ip6[4];
|
|
|
|
__u32 src_port; /* host byte order */
|
|
|
|
__u32 dst_port; /* network byte order */
|
|
|
|
__u32 dst_ip4;
|
|
|
|
__u32 dst_ip6[4];
|
|
|
|
__u32 state;
|
2016-12-01 23:48:04 +07:00
|
|
|
};
|
|
|
|
|
2019-02-10 14:22:24 +07:00
|
|
|
struct bpf_tcp_sock {
|
|
|
|
__u32 snd_cwnd; /* Sending congestion window */
|
|
|
|
__u32 srtt_us; /* smoothed round trip time << 3 in usecs */
|
|
|
|
__u32 rtt_min;
|
|
|
|
__u32 snd_ssthresh; /* Slow start size threshold */
|
|
|
|
__u32 rcv_nxt; /* What we want to receive next */
|
|
|
|
__u32 snd_nxt; /* Next sequence we send */
|
|
|
|
__u32 snd_una; /* First byte we want an ack for */
|
|
|
|
__u32 mss_cache; /* Cached effective mss, not including SACKS */
|
|
|
|
__u32 ecn_flags; /* ECN status bits. */
|
|
|
|
__u32 rate_delivered; /* saved rate sample: packets delivered */
|
|
|
|
__u32 rate_interval_us; /* saved rate sample: time elapsed */
|
|
|
|
__u32 packets_out; /* Packets which are "in flight" */
|
|
|
|
__u32 retrans_out; /* Retransmitted packets out */
|
|
|
|
__u32 total_retrans; /* Total retransmits for entire connection */
|
|
|
|
__u32 segs_in; /* RFC4898 tcpEStatsPerfSegsIn
|
|
|
|
* total number of segments in.
|
|
|
|
*/
|
|
|
|
__u32 data_segs_in; /* RFC4898 tcpEStatsPerfDataSegsIn
|
|
|
|
* total number of data segments in.
|
|
|
|
*/
|
|
|
|
__u32 segs_out; /* RFC4898 tcpEStatsPerfSegsOut
|
|
|
|
* The total number of segments sent.
|
|
|
|
*/
|
|
|
|
__u32 data_segs_out; /* RFC4898 tcpEStatsPerfDataSegsOut
|
|
|
|
* total number of data segments sent.
|
|
|
|
*/
|
|
|
|
__u32 lost_out; /* Lost packets */
|
|
|
|
__u32 sacked_out; /* SACK'd packets */
|
|
|
|
__u64 bytes_received; /* RFC4898 tcpEStatsAppHCThruOctetsReceived
|
|
|
|
* sum(delta(rcv_nxt)), or how many bytes
|
|
|
|
* were acked.
|
|
|
|
*/
|
|
|
|
__u64 bytes_acked; /* RFC4898 tcpEStatsAppHCThruOctetsAcked
|
|
|
|
* sum(delta(snd_una)), or how many bytes
|
|
|
|
* were acked.
|
|
|
|
*/
|
|
|
|
};
|
|
|
|
|
bpf: Add helper to retrieve socket in BPF
This patch adds new BPF helper functions, bpf_sk_lookup_tcp() and
bpf_sk_lookup_udp() which allows BPF programs to find out if there is a
socket listening on this host, and returns a socket pointer which the
BPF program can then access to determine, for instance, whether to
forward or drop traffic. bpf_sk_lookup_xxx() may take a reference on the
socket, so when a BPF program makes use of this function, it must
subsequently pass the returned pointer into the newly added sk_release()
to return the reference.
By way of example, the following pseudocode would filter inbound
connections at XDP if there is no corresponding service listening for
the traffic:
struct bpf_sock_tuple tuple;
struct bpf_sock_ops *sk;
populate_tuple(ctx, &tuple); // Extract the 5tuple from the packet
sk = bpf_sk_lookup_tcp(ctx, &tuple, sizeof tuple, netns, 0);
if (!sk) {
// Couldn't find a socket listening for this traffic. Drop.
return TC_ACT_SHOT;
}
bpf_sk_release(sk, 0);
return TC_ACT_OK;
Signed-off-by: Joe Stringer <joe@wand.net.nz>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-10-03 03:35:36 +07:00
|
|
|
struct bpf_sock_tuple {
|
|
|
|
union {
|
|
|
|
struct {
|
|
|
|
__be32 saddr;
|
|
|
|
__be32 daddr;
|
|
|
|
__be16 sport;
|
|
|
|
__be16 dport;
|
|
|
|
} ipv4;
|
|
|
|
struct {
|
|
|
|
__be32 saddr[4];
|
|
|
|
__be32 daddr[4];
|
|
|
|
__be16 sport;
|
|
|
|
__be16 dport;
|
|
|
|
} ipv6;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
2016-12-08 06:53:11 +07:00
|
|
|
#define XDP_PACKET_HEADROOM 256
|
|
|
|
|
2016-07-20 02:16:47 +07:00
|
|
|
/* User return codes for XDP prog type.
|
|
|
|
* A valid XDP program must return one of these defined values. All other
|
2017-09-09 06:40:35 +07:00
|
|
|
* return codes are reserved for future use. Unknown return codes will
|
|
|
|
* result in packet drops and a warning via bpf_warn_invalid_xdp_action().
|
2016-07-20 02:16:47 +07:00
|
|
|
*/
|
|
|
|
enum xdp_action {
|
|
|
|
XDP_ABORTED = 0,
|
|
|
|
XDP_DROP,
|
|
|
|
XDP_PASS,
|
2016-07-20 02:16:53 +07:00
|
|
|
XDP_TX,
|
2017-07-17 23:27:07 +07:00
|
|
|
XDP_REDIRECT,
|
2016-07-20 02:16:47 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
/* user accessible metadata for XDP packet hook
|
|
|
|
* new fields must be added to the end of this structure
|
|
|
|
*/
|
|
|
|
struct xdp_md {
|
|
|
|
__u32 data;
|
|
|
|
__u32 data_end;
|
bpf: add meta pointer for direct access
This work enables generic transfer of metadata from XDP into skb. The
basic idea is that we can make use of the fact that the resulting skb
must be linear and already comes with a larger headroom for supporting
bpf_xdp_adjust_head(), which mangles xdp->data. Here, we base our work
on a similar principle and introduce a small helper bpf_xdp_adjust_meta()
for adjusting a new pointer called xdp->data_meta. Thus, the packet has
a flexible and programmable room for meta data, followed by the actual
packet data. struct xdp_buff is therefore laid out that we first point
to data_hard_start, then data_meta directly prepended to data followed
by data_end marking the end of packet. bpf_xdp_adjust_head() takes into
account whether we have meta data already prepended and if so, memmove()s
this along with the given offset provided there's enough room.
xdp->data_meta is optional and programs are not required to use it. The
rationale is that when we process the packet in XDP (e.g. as DoS filter),
we can push further meta data along with it for the XDP_PASS case, and
give the guarantee that a clsact ingress BPF program on the same device
can pick this up for further post-processing. Since we work with skb
there, we can also set skb->mark, skb->priority or other skb meta data
out of BPF, thus having this scratch space generic and programmable
allows for more flexibility than defining a direct 1:1 transfer of
potentially new XDP members into skb (it's also more efficient as we
don't need to initialize/handle each of such new members). The facility
also works together with GRO aggregation. The scratch space at the head
of the packet can be multiple of 4 byte up to 32 byte large. Drivers not
yet supporting xdp->data_meta can simply be set up with xdp->data_meta
as xdp->data + 1 as bpf_xdp_adjust_meta() will detect this and bail out,
such that the subsequent match against xdp->data for later access is
guaranteed to fail.
The verifier treats xdp->data_meta/xdp->data the same way as we treat
xdp->data/xdp->data_end pointer comparisons. The requirement for doing
the compare against xdp->data is that it hasn't been modified from it's
original address we got from ctx access. It may have a range marking
already from prior successful xdp->data/xdp->data_end pointer comparisons
though.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-25 07:25:51 +07:00
|
|
|
__u32 data_meta;
|
2018-01-11 23:39:09 +07:00
|
|
|
/* Below access go through struct xdp_rxq_info */
|
2018-01-03 17:26:14 +07:00
|
|
|
__u32 ingress_ifindex; /* rxq->dev->ifindex */
|
|
|
|
__u32 rx_queue_index; /* rxq->queue_index */
|
2016-07-20 02:16:47 +07:00
|
|
|
};
|
|
|
|
|
2017-08-16 12:32:47 +07:00
|
|
|
enum sk_action {
|
2017-10-27 23:45:53 +07:00
|
|
|
SK_DROP = 0,
|
|
|
|
SK_PASS,
|
2017-08-16 12:32:47 +07:00
|
|
|
};
|
|
|
|
|
bpf: create tcp_bpf_ulp allowing BPF to monitor socket TX/RX data
This implements a BPF ULP layer to allow policy enforcement and
monitoring at the socket layer. In order to support this a new
program type BPF_PROG_TYPE_SK_MSG is used to run the policy at
the sendmsg/sendpage hook. To attach the policy to sockets a
sockmap is used with a new program attach type BPF_SK_MSG_VERDICT.
Similar to previous sockmap usages when a sock is added to a
sockmap, via a map update, if the map contains a BPF_SK_MSG_VERDICT
program type attached then the BPF ULP layer is created on the
socket and the attached BPF_PROG_TYPE_SK_MSG program is run for
every msg in sendmsg case and page/offset in sendpage case.
BPF_PROG_TYPE_SK_MSG Semantics/API:
BPF_PROG_TYPE_SK_MSG supports only two return codes SK_PASS and
SK_DROP. Returning SK_DROP free's the copied data in the sendmsg
case and in the sendpage case leaves the data untouched. Both cases
return -EACESS to the user. Returning SK_PASS will allow the msg to
be sent.
In the sendmsg case data is copied into kernel space buffers before
running the BPF program. The kernel space buffers are stored in a
scatterlist object where each element is a kernel memory buffer.
Some effort is made to coalesce data from the sendmsg call here.
For example a sendmsg call with many one byte iov entries will
likely be pushed into a single entry. The BPF program is run with
data pointers (start/end) pointing to the first sg element.
In the sendpage case data is not copied. We opt not to copy the
data by default here, because the BPF infrastructure does not
know what bytes will be needed nor when they will be needed. So
copying all bytes may be wasteful. Because of this the initial
start/end data pointers are (0,0). Meaning no data can be read or
written. This avoids reading data that may be modified by the
user. A new helper is added later in this series if reading and
writing the data is needed. The helper call will do a copy by
default so that the page is exclusively owned by the BPF call.
The verdict from the BPF_PROG_TYPE_SK_MSG applies to the entire msg
in the sendmsg() case and the entire page/offset in the sendpage case.
This avoids ambiguity on how to handle mixed return codes in the
sendmsg case. Again a helper is added later in the series if
a verdict needs to apply to multiple system calls and/or only
a subpart of the currently being processed message.
The helper msg_redirect_map() can be used to select the socket to
send the data on. This is used similar to existing redirect use
cases. This allows policy to redirect msgs.
Pseudo code simple example:
The basic logic to attach a program to a socket is as follows,
// load the programs
bpf_prog_load(SOCKMAP_TCP_MSG_PROG, BPF_PROG_TYPE_SK_MSG,
&obj, &msg_prog);
// lookup the sockmap
bpf_map_msg = bpf_object__find_map_by_name(obj, "my_sock_map");
// get fd for sockmap
map_fd_msg = bpf_map__fd(bpf_map_msg);
// attach program to sockmap
bpf_prog_attach(msg_prog, map_fd_msg, BPF_SK_MSG_VERDICT, 0);
Adding sockets to the map is done in the normal way,
// Add a socket 'fd' to sockmap at location 'i'
bpf_map_update_elem(map_fd_msg, &i, fd, BPF_ANY);
After the above any socket attached to "my_sock_map", in this case
'fd', will run the BPF msg verdict program (msg_prog) on every
sendmsg and sendpage system call.
For a complete example see BPF selftests or sockmap samples.
Implementation notes:
It seemed the simplest, to me at least, to use a refcnt to ensure
psock is not lost across the sendmsg copy into the sg, the bpf program
running on the data in sg_data, and the final pass to the TCP stack.
Some performance testing may show a better method to do this and avoid
the refcnt cost, but for now use the simpler method.
Another item that will come after basic support is in place is
supporting MSG_MORE flag. At the moment we call sendpages even if
the MSG_MORE flag is set. An enhancement would be to collect the
pages into a larger scatterlist and pass down the stack. Notice that
bpf_tcp_sendmsg() could support this with some additional state saved
across sendmsg calls. I built the code to support this without having
to do refactoring work. Other features TBD include ZEROCOPY and the
TCP_RECV_QUEUE/TCP_NO_QUEUE support. This will follow initial series
shortly.
Future work could improve size limits on the scatterlist rings used
here. Currently, we use MAX_SKB_FRAGS simply because this was being
used already in the TLS case. Future work could extend the kernel sk
APIs to tune this depending on workload. This is a trade-off
between memory usage and throughput performance.
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Acked-by: David S. Miller <davem@davemloft.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-03-19 02:57:10 +07:00
|
|
|
/* user accessible metadata for SK_MSG packet hook, new fields must
|
|
|
|
* be added to the end of this structure
|
|
|
|
*/
|
|
|
|
struct sk_msg_md {
|
2018-12-01 07:18:53 +07:00
|
|
|
__bpf_md_ptr(void *, data);
|
|
|
|
__bpf_md_ptr(void *, data_end);
|
2018-05-18 04:16:58 +07:00
|
|
|
|
|
|
|
__u32 family;
|
|
|
|
__u32 remote_ip4; /* Stored in network byte order */
|
|
|
|
__u32 local_ip4; /* Stored in network byte order */
|
|
|
|
__u32 remote_ip6[4]; /* Stored in network byte order */
|
|
|
|
__u32 local_ip6[4]; /* Stored in network byte order */
|
|
|
|
__u32 remote_port; /* Stored in network byte order */
|
|
|
|
__u32 local_port; /* stored in host byte order */
|
2018-12-17 06:47:04 +07:00
|
|
|
__u32 size; /* Total size of sk_msg */
|
bpf: create tcp_bpf_ulp allowing BPF to monitor socket TX/RX data
This implements a BPF ULP layer to allow policy enforcement and
monitoring at the socket layer. In order to support this a new
program type BPF_PROG_TYPE_SK_MSG is used to run the policy at
the sendmsg/sendpage hook. To attach the policy to sockets a
sockmap is used with a new program attach type BPF_SK_MSG_VERDICT.
Similar to previous sockmap usages when a sock is added to a
sockmap, via a map update, if the map contains a BPF_SK_MSG_VERDICT
program type attached then the BPF ULP layer is created on the
socket and the attached BPF_PROG_TYPE_SK_MSG program is run for
every msg in sendmsg case and page/offset in sendpage case.
BPF_PROG_TYPE_SK_MSG Semantics/API:
BPF_PROG_TYPE_SK_MSG supports only two return codes SK_PASS and
SK_DROP. Returning SK_DROP free's the copied data in the sendmsg
case and in the sendpage case leaves the data untouched. Both cases
return -EACESS to the user. Returning SK_PASS will allow the msg to
be sent.
In the sendmsg case data is copied into kernel space buffers before
running the BPF program. The kernel space buffers are stored in a
scatterlist object where each element is a kernel memory buffer.
Some effort is made to coalesce data from the sendmsg call here.
For example a sendmsg call with many one byte iov entries will
likely be pushed into a single entry. The BPF program is run with
data pointers (start/end) pointing to the first sg element.
In the sendpage case data is not copied. We opt not to copy the
data by default here, because the BPF infrastructure does not
know what bytes will be needed nor when they will be needed. So
copying all bytes may be wasteful. Because of this the initial
start/end data pointers are (0,0). Meaning no data can be read or
written. This avoids reading data that may be modified by the
user. A new helper is added later in this series if reading and
writing the data is needed. The helper call will do a copy by
default so that the page is exclusively owned by the BPF call.
The verdict from the BPF_PROG_TYPE_SK_MSG applies to the entire msg
in the sendmsg() case and the entire page/offset in the sendpage case.
This avoids ambiguity on how to handle mixed return codes in the
sendmsg case. Again a helper is added later in the series if
a verdict needs to apply to multiple system calls and/or only
a subpart of the currently being processed message.
The helper msg_redirect_map() can be used to select the socket to
send the data on. This is used similar to existing redirect use
cases. This allows policy to redirect msgs.
Pseudo code simple example:
The basic logic to attach a program to a socket is as follows,
// load the programs
bpf_prog_load(SOCKMAP_TCP_MSG_PROG, BPF_PROG_TYPE_SK_MSG,
&obj, &msg_prog);
// lookup the sockmap
bpf_map_msg = bpf_object__find_map_by_name(obj, "my_sock_map");
// get fd for sockmap
map_fd_msg = bpf_map__fd(bpf_map_msg);
// attach program to sockmap
bpf_prog_attach(msg_prog, map_fd_msg, BPF_SK_MSG_VERDICT, 0);
Adding sockets to the map is done in the normal way,
// Add a socket 'fd' to sockmap at location 'i'
bpf_map_update_elem(map_fd_msg, &i, fd, BPF_ANY);
After the above any socket attached to "my_sock_map", in this case
'fd', will run the BPF msg verdict program (msg_prog) on every
sendmsg and sendpage system call.
For a complete example see BPF selftests or sockmap samples.
Implementation notes:
It seemed the simplest, to me at least, to use a refcnt to ensure
psock is not lost across the sendmsg copy into the sg, the bpf program
running on the data in sg_data, and the final pass to the TCP stack.
Some performance testing may show a better method to do this and avoid
the refcnt cost, but for now use the simpler method.
Another item that will come after basic support is in place is
supporting MSG_MORE flag. At the moment we call sendpages even if
the MSG_MORE flag is set. An enhancement would be to collect the
pages into a larger scatterlist and pass down the stack. Notice that
bpf_tcp_sendmsg() could support this with some additional state saved
across sendmsg calls. I built the code to support this without having
to do refactoring work. Other features TBD include ZEROCOPY and the
TCP_RECV_QUEUE/TCP_NO_QUEUE support. This will follow initial series
shortly.
Future work could improve size limits on the scatterlist rings used
here. Currently, we use MAX_SKB_FRAGS simply because this was being
used already in the TLS case. Future work could extend the kernel sk
APIs to tune this depending on workload. This is a trade-off
between memory usage and throughput performance.
Signed-off-by: John Fastabend <john.fastabend@gmail.com>
Acked-by: David S. Miller <davem@davemloft.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-03-19 02:57:10 +07:00
|
|
|
};
|
|
|
|
|
bpf: Introduce BPF_PROG_TYPE_SK_REUSEPORT
This patch adds a BPF_PROG_TYPE_SK_REUSEPORT which can select
a SO_REUSEPORT sk from a BPF_MAP_TYPE_REUSEPORT_ARRAY. Like other
non SK_FILTER/CGROUP_SKB program, it requires CAP_SYS_ADMIN.
BPF_PROG_TYPE_SK_REUSEPORT introduces "struct sk_reuseport_kern"
to store the bpf context instead of using the skb->cb[48].
At the SO_REUSEPORT sk lookup time, it is in the middle of transiting
from a lower layer (ipv4/ipv6) to a upper layer (udp/tcp). At this
point, it is not always clear where the bpf context can be appended
in the skb->cb[48] to avoid saving-and-restoring cb[]. Even putting
aside the difference between ipv4-vs-ipv6 and udp-vs-tcp. It is not
clear if the lower layer is only ipv4 and ipv6 in the future and
will it not touch the cb[] again before transiting to the upper
layer.
For example, in udp_gro_receive(), it uses the 48 byte NAPI_GRO_CB
instead of IP[6]CB and it may still modify the cb[] after calling
the udp[46]_lib_lookup_skb(). Because of the above reason, if
sk->cb is used for the bpf ctx, saving-and-restoring is needed
and likely the whole 48 bytes cb[] has to be saved and restored.
Instead of saving, setting and restoring the cb[], this patch opts
to create a new "struct sk_reuseport_kern" and setting the needed
values in there.
The new BPF_PROG_TYPE_SK_REUSEPORT and "struct sk_reuseport_(kern|md)"
will serve all ipv4/ipv6 + udp/tcp combinations. There is no protocol
specific usage at this point and it is also inline with the current
sock_reuseport.c implementation (i.e. no protocol specific requirement).
In "struct sk_reuseport_md", this patch exposes data/data_end/len
with semantic similar to other existing usages. Together
with "bpf_skb_load_bytes()" and "bpf_skb_load_bytes_relative()",
the bpf prog can peek anywhere in the skb. The "bind_inany" tells
the bpf prog that the reuseport group is bind-ed to a local
INANY address which cannot be learned from skb.
The new "bind_inany" is added to "struct sock_reuseport" which will be
used when running the new "BPF_PROG_TYPE_SK_REUSEPORT" bpf prog in order
to avoid repeating the "bind INANY" test on
"sk_v6_rcv_saddr/sk->sk_rcv_saddr" every time a bpf prog is run. It can
only be properly initialized when a "sk->sk_reuseport" enabled sk is
adding to a hashtable (i.e. during "reuseport_alloc()" and
"reuseport_add_sock()").
The new "sk_select_reuseport()" is the main helper that the
bpf prog will use to select a SO_REUSEPORT sk. It is the only function
that can use the new BPF_MAP_TYPE_REUSEPORT_ARRAY. As mentioned in
the earlier patch, the validity of a selected sk is checked in
run time in "sk_select_reuseport()". Doing the check in
verification time is difficult and inflexible (consider the map-in-map
use case). The runtime check is to compare the selected sk's reuseport_id
with the reuseport_id that we want. This helper will return -EXXX if the
selected sk cannot serve the incoming request (e.g. reuseport_id
not match). The bpf prog can decide if it wants to do SK_DROP as its
discretion.
When the bpf prog returns SK_PASS, the kernel will check if a
valid sk has been selected (i.e. "reuse_kern->selected_sk != NULL").
If it does , it will use the selected sk. If not, the kernel
will select one from "reuse->socks[]" (as before this patch).
The SK_DROP and SK_PASS handling logic will be in the next patch.
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-08-08 15:01:25 +07:00
|
|
|
struct sk_reuseport_md {
|
|
|
|
/*
|
|
|
|
* Start of directly accessible data. It begins from
|
|
|
|
* the tcp/udp header.
|
|
|
|
*/
|
2018-12-01 07:18:53 +07:00
|
|
|
__bpf_md_ptr(void *, data);
|
|
|
|
/* End of directly accessible data */
|
|
|
|
__bpf_md_ptr(void *, data_end);
|
bpf: Introduce BPF_PROG_TYPE_SK_REUSEPORT
This patch adds a BPF_PROG_TYPE_SK_REUSEPORT which can select
a SO_REUSEPORT sk from a BPF_MAP_TYPE_REUSEPORT_ARRAY. Like other
non SK_FILTER/CGROUP_SKB program, it requires CAP_SYS_ADMIN.
BPF_PROG_TYPE_SK_REUSEPORT introduces "struct sk_reuseport_kern"
to store the bpf context instead of using the skb->cb[48].
At the SO_REUSEPORT sk lookup time, it is in the middle of transiting
from a lower layer (ipv4/ipv6) to a upper layer (udp/tcp). At this
point, it is not always clear where the bpf context can be appended
in the skb->cb[48] to avoid saving-and-restoring cb[]. Even putting
aside the difference between ipv4-vs-ipv6 and udp-vs-tcp. It is not
clear if the lower layer is only ipv4 and ipv6 in the future and
will it not touch the cb[] again before transiting to the upper
layer.
For example, in udp_gro_receive(), it uses the 48 byte NAPI_GRO_CB
instead of IP[6]CB and it may still modify the cb[] after calling
the udp[46]_lib_lookup_skb(). Because of the above reason, if
sk->cb is used for the bpf ctx, saving-and-restoring is needed
and likely the whole 48 bytes cb[] has to be saved and restored.
Instead of saving, setting and restoring the cb[], this patch opts
to create a new "struct sk_reuseport_kern" and setting the needed
values in there.
The new BPF_PROG_TYPE_SK_REUSEPORT and "struct sk_reuseport_(kern|md)"
will serve all ipv4/ipv6 + udp/tcp combinations. There is no protocol
specific usage at this point and it is also inline with the current
sock_reuseport.c implementation (i.e. no protocol specific requirement).
In "struct sk_reuseport_md", this patch exposes data/data_end/len
with semantic similar to other existing usages. Together
with "bpf_skb_load_bytes()" and "bpf_skb_load_bytes_relative()",
the bpf prog can peek anywhere in the skb. The "bind_inany" tells
the bpf prog that the reuseport group is bind-ed to a local
INANY address which cannot be learned from skb.
The new "bind_inany" is added to "struct sock_reuseport" which will be
used when running the new "BPF_PROG_TYPE_SK_REUSEPORT" bpf prog in order
to avoid repeating the "bind INANY" test on
"sk_v6_rcv_saddr/sk->sk_rcv_saddr" every time a bpf prog is run. It can
only be properly initialized when a "sk->sk_reuseport" enabled sk is
adding to a hashtable (i.e. during "reuseport_alloc()" and
"reuseport_add_sock()").
The new "sk_select_reuseport()" is the main helper that the
bpf prog will use to select a SO_REUSEPORT sk. It is the only function
that can use the new BPF_MAP_TYPE_REUSEPORT_ARRAY. As mentioned in
the earlier patch, the validity of a selected sk is checked in
run time in "sk_select_reuseport()". Doing the check in
verification time is difficult and inflexible (consider the map-in-map
use case). The runtime check is to compare the selected sk's reuseport_id
with the reuseport_id that we want. This helper will return -EXXX if the
selected sk cannot serve the incoming request (e.g. reuseport_id
not match). The bpf prog can decide if it wants to do SK_DROP as its
discretion.
When the bpf prog returns SK_PASS, the kernel will check if a
valid sk has been selected (i.e. "reuse_kern->selected_sk != NULL").
If it does , it will use the selected sk. If not, the kernel
will select one from "reuse->socks[]" (as before this patch).
The SK_DROP and SK_PASS handling logic will be in the next patch.
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-08-08 15:01:25 +07:00
|
|
|
/*
|
|
|
|
* Total length of packet (starting from the tcp/udp header).
|
|
|
|
* Note that the directly accessible bytes (data_end - data)
|
|
|
|
* could be less than this "len". Those bytes could be
|
|
|
|
* indirectly read by a helper "bpf_skb_load_bytes()".
|
|
|
|
*/
|
|
|
|
__u32 len;
|
|
|
|
/*
|
|
|
|
* Eth protocol in the mac header (network byte order). e.g.
|
|
|
|
* ETH_P_IP(0x0800) and ETH_P_IPV6(0x86DD)
|
|
|
|
*/
|
|
|
|
__u32 eth_protocol;
|
|
|
|
__u32 ip_protocol; /* IP protocol. e.g. IPPROTO_TCP, IPPROTO_UDP */
|
|
|
|
__u32 bind_inany; /* Is sock bound to an INANY address? */
|
|
|
|
__u32 hash; /* A hash of the packet 4 tuples */
|
|
|
|
};
|
|
|
|
|
2017-06-06 02:15:52 +07:00
|
|
|
#define BPF_TAG_SIZE 8
|
|
|
|
|
|
|
|
struct bpf_prog_info {
|
|
|
|
__u32 type;
|
|
|
|
__u32 id;
|
|
|
|
__u8 tag[BPF_TAG_SIZE];
|
|
|
|
__u32 jited_prog_len;
|
|
|
|
__u32 xlated_prog_len;
|
|
|
|
__aligned_u64 jited_prog_insns;
|
|
|
|
__aligned_u64 xlated_prog_insns;
|
2017-09-28 04:37:52 +07:00
|
|
|
__u64 load_time; /* ns since boottime */
|
|
|
|
__u32 created_by_uid;
|
|
|
|
__u32 nr_map_ids;
|
|
|
|
__aligned_u64 map_ids;
|
2017-10-06 11:52:12 +07:00
|
|
|
char name[BPF_OBJ_NAME_LEN];
|
2017-12-28 09:39:09 +07:00
|
|
|
__u32 ifindex;
|
2018-04-26 00:41:06 +07:00
|
|
|
__u32 gpl_compatible:1;
|
2017-12-28 09:39:09 +07:00
|
|
|
__u64 netns_dev;
|
|
|
|
__u64 netns_ino;
|
2018-05-24 13:56:48 +07:00
|
|
|
__u32 nr_jited_ksyms;
|
2018-05-24 13:56:52 +07:00
|
|
|
__u32 nr_jited_func_lens;
|
2018-05-24 13:56:48 +07:00
|
|
|
__aligned_u64 jited_ksyms;
|
2018-05-24 13:56:52 +07:00
|
|
|
__aligned_u64 jited_func_lens;
|
bpf: Introduce bpf_func_info
This patch added interface to load a program with the following
additional information:
. prog_btf_fd
. func_info, func_info_rec_size and func_info_cnt
where func_info will provide function range and type_id
corresponding to each function.
The func_info_rec_size is introduced in the UAPI to specify
struct bpf_func_info size passed from user space. This
intends to make bpf_func_info structure growable in the future.
If the kernel gets a different bpf_func_info size from userspace,
it will try to handle user request with part of bpf_func_info
it can understand. In this patch, kernel can understand
struct bpf_func_info {
__u32 insn_offset;
__u32 type_id;
};
If user passed a bpf func_info record size of 16 bytes, the
kernel can still handle part of records with the above definition.
If verifier agrees with function range provided by the user,
the bpf_prog ksym for each function will use the func name
provided in the type_id, which is supposed to provide better
encoding as it is not limited by 16 bytes program name
limitation and this is better for bpf program which contains
multiple subprograms.
The bpf_prog_info interface is also extended to
return btf_id, func_info, func_info_rec_size and func_info_cnt
to userspace, so userspace can print out the function prototype
for each xlated function. The insn_offset in the returned
func_info corresponds to the insn offset for xlated functions.
With other jit related fields in bpf_prog_info, userspace can also
print out function prototypes for each jited function.
Signed-off-by: Yonghong Song <yhs@fb.com>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2018-11-20 06:29:11 +07:00
|
|
|
__u32 btf_id;
|
|
|
|
__u32 func_info_rec_size;
|
|
|
|
__aligned_u64 func_info;
|
2018-12-11 05:14:08 +07:00
|
|
|
__u32 nr_func_info;
|
|
|
|
__u32 nr_line_info;
|
2018-12-08 07:42:25 +07:00
|
|
|
__aligned_u64 line_info;
|
|
|
|
__aligned_u64 jited_line_info;
|
2018-12-11 05:14:08 +07:00
|
|
|
__u32 nr_jited_line_info;
|
2018-12-08 07:42:25 +07:00
|
|
|
__u32 line_info_rec_size;
|
|
|
|
__u32 jited_line_info_rec_size;
|
2018-12-13 00:37:46 +07:00
|
|
|
__u32 nr_prog_tags;
|
|
|
|
__aligned_u64 prog_tags;
|
2019-02-26 05:28:40 +07:00
|
|
|
__u64 run_time_ns;
|
|
|
|
__u64 run_cnt;
|
2017-06-06 02:15:52 +07:00
|
|
|
} __attribute__((aligned(8)));
|
|
|
|
|
|
|
|
struct bpf_map_info {
|
|
|
|
__u32 type;
|
|
|
|
__u32 id;
|
|
|
|
__u32 key_size;
|
|
|
|
__u32 value_size;
|
|
|
|
__u32 max_entries;
|
|
|
|
__u32 map_flags;
|
2017-10-06 11:52:12 +07:00
|
|
|
char name[BPF_OBJ_NAME_LEN];
|
2018-01-18 10:13:28 +07:00
|
|
|
__u32 ifindex;
|
bpf: fix uapi hole for 32 bit compat applications
In 64 bit, we have a 4 byte hole between ifindex and netns_dev in the
case of struct bpf_map_info but also struct bpf_prog_info. In net-next
commit b85fab0e67b ("bpf: Add gpl_compatible flag to struct bpf_prog_info")
added a bitfield into it to expose some flags related to programs. Thus,
add an unnamed __u32 bitfield for both so that alignment keeps the same
in both 32 and 64 bit cases, and can be naturally extended from there
as in b85fab0e67b.
Before:
# file test.o
test.o: ELF 32-bit LSB relocatable, Intel 80386, version 1 (SYSV), not stripped
# pahole test.o
struct bpf_map_info {
__u32 type; /* 0 4 */
__u32 id; /* 4 4 */
__u32 key_size; /* 8 4 */
__u32 value_size; /* 12 4 */
__u32 max_entries; /* 16 4 */
__u32 map_flags; /* 20 4 */
char name[16]; /* 24 16 */
__u32 ifindex; /* 40 4 */
__u64 netns_dev; /* 44 8 */
__u64 netns_ino; /* 52 8 */
/* size: 64, cachelines: 1, members: 10 */
/* padding: 4 */
};
After (same as on 64 bit):
# file test.o
test.o: ELF 32-bit LSB relocatable, Intel 80386, version 1 (SYSV), not stripped
# pahole test.o
struct bpf_map_info {
__u32 type; /* 0 4 */
__u32 id; /* 4 4 */
__u32 key_size; /* 8 4 */
__u32 value_size; /* 12 4 */
__u32 max_entries; /* 16 4 */
__u32 map_flags; /* 20 4 */
char name[16]; /* 24 16 */
__u32 ifindex; /* 40 4 */
/* XXX 4 bytes hole, try to pack */
__u64 netns_dev; /* 48 8 */
__u64 netns_ino; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
/* size: 64, cachelines: 1, members: 10 */
/* sum members: 60, holes: 1, sum holes: 4 */
};
Reported-by: Dmitry V. Levin <ldv@altlinux.org>
Reported-by: Eugene Syromiatnikov <esyr@redhat.com>
Fixes: 52775b33bb507 ("bpf: offload: report device information about offloaded maps")
Fixes: 675fc275a3a2d ("bpf: offload: report device information for offloaded programs")
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2018-06-02 10:21:59 +07:00
|
|
|
__u32 :32;
|
2018-01-18 10:13:28 +07:00
|
|
|
__u64 netns_dev;
|
|
|
|
__u64 netns_ino;
|
2018-05-05 04:49:51 +07:00
|
|
|
__u32 btf_id;
|
2018-05-23 04:57:21 +07:00
|
|
|
__u32 btf_key_type_id;
|
|
|
|
__u32 btf_value_type_id;
|
2017-06-06 02:15:52 +07:00
|
|
|
} __attribute__((aligned(8)));
|
|
|
|
|
2018-05-05 04:49:52 +07:00
|
|
|
struct bpf_btf_info {
|
|
|
|
__aligned_u64 btf;
|
|
|
|
__u32 btf_size;
|
|
|
|
__u32 id;
|
|
|
|
} __attribute__((aligned(8)));
|
|
|
|
|
2018-03-31 05:08:02 +07:00
|
|
|
/* User bpf_sock_addr struct to access socket fields and sockaddr struct passed
|
|
|
|
* by user and intended to be used by socket (e.g. to bind to, depends on
|
|
|
|
* attach attach type).
|
|
|
|
*/
|
|
|
|
struct bpf_sock_addr {
|
|
|
|
__u32 user_family; /* Allows 4-byte read, but no write. */
|
|
|
|
__u32 user_ip4; /* Allows 1,2,4-byte read and 4-byte write.
|
|
|
|
* Stored in network byte order.
|
|
|
|
*/
|
|
|
|
__u32 user_ip6[4]; /* Allows 1,2,4-byte read an 4-byte write.
|
|
|
|
* Stored in network byte order.
|
|
|
|
*/
|
|
|
|
__u32 user_port; /* Allows 4-byte read and write.
|
|
|
|
* Stored in network byte order
|
|
|
|
*/
|
|
|
|
__u32 family; /* Allows 4-byte read, but no write */
|
|
|
|
__u32 type; /* Allows 4-byte read, but no write */
|
|
|
|
__u32 protocol; /* Allows 4-byte read, but no write */
|
2018-05-25 22:55:23 +07:00
|
|
|
__u32 msg_src_ip4; /* Allows 1,2,4-byte read an 4-byte write.
|
|
|
|
* Stored in network byte order.
|
|
|
|
*/
|
|
|
|
__u32 msg_src_ip6[4]; /* Allows 1,2,4-byte read an 4-byte write.
|
|
|
|
* Stored in network byte order.
|
|
|
|
*/
|
2018-03-31 05:08:02 +07:00
|
|
|
};
|
|
|
|
|
bpf: BPF support for sock_ops
Created a new BPF program type, BPF_PROG_TYPE_SOCK_OPS, and a corresponding
struct that allows BPF programs of this type to access some of the
socket's fields (such as IP addresses, ports, etc.). It uses the
existing bpf cgroups infrastructure so the programs can be attached per
cgroup with full inheritance support. The program will be called at
appropriate times to set relevant connections parameters such as buffer
sizes, SYN and SYN-ACK RTOs, etc., based on connection information such
as IP addresses, port numbers, etc.
Alghough there are already 3 mechanisms to set parameters (sysctls,
route metrics and setsockopts), this new mechanism provides some
distinct advantages. Unlike sysctls, it can set parameters per
connection. In contrast to route metrics, it can also use port numbers
and information provided by a user level program. In addition, it could
set parameters probabilistically for evaluation purposes (i.e. do
something different on 10% of the flows and compare results with the
other 90% of the flows). Also, in cases where IPv6 addresses contain
geographic information, the rules to make changes based on the distance
(or RTT) between the hosts are much easier than route metric rules and
can be global. Finally, unlike setsockopt, it oes not require
application changes and it can be updated easily at any time.
Although the bpf cgroup framework already contains a sock related
program type (BPF_PROG_TYPE_CGROUP_SOCK), I created the new type
(BPF_PROG_TYPE_SOCK_OPS) beccause the existing type expects to be called
only once during the connections's lifetime. In contrast, the new
program type will be called multiple times from different places in the
network stack code. For example, before sending SYN and SYN-ACKs to set
an appropriate timeout, when the connection is established to set
congestion control, etc. As a result it has "op" field to specify the
type of operation requested.
The purpose of this new program type is to simplify setting connection
parameters, such as buffer sizes, TCP's SYN RTO, etc. For example, it is
easy to use facebook's internal IPv6 addresses to determine if both hosts
of a connection are in the same datacenter. Therefore, it is easy to
write a BPF program to choose a small SYN RTO value when both hosts are
in the same datacenter.
This patch only contains the framework to support the new BPF program
type, following patches add the functionality to set various connection
parameters.
This patch defines a new BPF program type: BPF_PROG_TYPE_SOCKET_OPS
and a new bpf syscall command to load a new program of this type:
BPF_PROG_LOAD_SOCKET_OPS.
Two new corresponding structs (one for the kernel one for the user/BPF
program):
/* kernel version */
struct bpf_sock_ops_kern {
struct sock *sk;
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
};
/* user version
* Some fields are in network byte order reflecting the sock struct
* Use the bpf_ntohl helper macro in samples/bpf/bpf_endian.h to
* convert them to host byte order.
*/
struct bpf_sock_ops {
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
__u32 family;
__u32 remote_ip4; /* In network byte order */
__u32 local_ip4; /* In network byte order */
__u32 remote_ip6[4]; /* In network byte order */
__u32 local_ip6[4]; /* In network byte order */
__u32 remote_port; /* In network byte order */
__u32 local_port; /* In host byte horder */
};
Currently there are two types of ops. The first type expects the BPF
program to return a value which is then used by the caller (or a
negative value to indicate the operation is not supported). The second
type expects state changes to be done by the BPF program, for example
through a setsockopt BPF helper function, and they ignore the return
value.
The reply fields of the bpf_sockt_ops struct are there in case a bpf
program needs to return a value larger than an integer.
Signed-off-by: Lawrence Brakmo <brakmo@fb.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-07-01 10:02:40 +07:00
|
|
|
/* User bpf_sock_ops struct to access socket values and specify request ops
|
|
|
|
* and their replies.
|
|
|
|
* Some of this fields are in network (bigendian) byte order and may need
|
|
|
|
* to be converted before use (bpf_ntohl() defined in samples/bpf/bpf_endian.h).
|
|
|
|
* New fields can only be added at the end of this structure
|
|
|
|
*/
|
|
|
|
struct bpf_sock_ops {
|
|
|
|
__u32 op;
|
|
|
|
union {
|
2018-01-26 07:14:09 +07:00
|
|
|
__u32 args[4]; /* Optionally passed to bpf program */
|
|
|
|
__u32 reply; /* Returned by bpf program */
|
|
|
|
__u32 replylong[4]; /* Optionally returned by bpf prog */
|
bpf: BPF support for sock_ops
Created a new BPF program type, BPF_PROG_TYPE_SOCK_OPS, and a corresponding
struct that allows BPF programs of this type to access some of the
socket's fields (such as IP addresses, ports, etc.). It uses the
existing bpf cgroups infrastructure so the programs can be attached per
cgroup with full inheritance support. The program will be called at
appropriate times to set relevant connections parameters such as buffer
sizes, SYN and SYN-ACK RTOs, etc., based on connection information such
as IP addresses, port numbers, etc.
Alghough there are already 3 mechanisms to set parameters (sysctls,
route metrics and setsockopts), this new mechanism provides some
distinct advantages. Unlike sysctls, it can set parameters per
connection. In contrast to route metrics, it can also use port numbers
and information provided by a user level program. In addition, it could
set parameters probabilistically for evaluation purposes (i.e. do
something different on 10% of the flows and compare results with the
other 90% of the flows). Also, in cases where IPv6 addresses contain
geographic information, the rules to make changes based on the distance
(or RTT) between the hosts are much easier than route metric rules and
can be global. Finally, unlike setsockopt, it oes not require
application changes and it can be updated easily at any time.
Although the bpf cgroup framework already contains a sock related
program type (BPF_PROG_TYPE_CGROUP_SOCK), I created the new type
(BPF_PROG_TYPE_SOCK_OPS) beccause the existing type expects to be called
only once during the connections's lifetime. In contrast, the new
program type will be called multiple times from different places in the
network stack code. For example, before sending SYN and SYN-ACKs to set
an appropriate timeout, when the connection is established to set
congestion control, etc. As a result it has "op" field to specify the
type of operation requested.
The purpose of this new program type is to simplify setting connection
parameters, such as buffer sizes, TCP's SYN RTO, etc. For example, it is
easy to use facebook's internal IPv6 addresses to determine if both hosts
of a connection are in the same datacenter. Therefore, it is easy to
write a BPF program to choose a small SYN RTO value when both hosts are
in the same datacenter.
This patch only contains the framework to support the new BPF program
type, following patches add the functionality to set various connection
parameters.
This patch defines a new BPF program type: BPF_PROG_TYPE_SOCKET_OPS
and a new bpf syscall command to load a new program of this type:
BPF_PROG_LOAD_SOCKET_OPS.
Two new corresponding structs (one for the kernel one for the user/BPF
program):
/* kernel version */
struct bpf_sock_ops_kern {
struct sock *sk;
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
};
/* user version
* Some fields are in network byte order reflecting the sock struct
* Use the bpf_ntohl helper macro in samples/bpf/bpf_endian.h to
* convert them to host byte order.
*/
struct bpf_sock_ops {
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
__u32 family;
__u32 remote_ip4; /* In network byte order */
__u32 local_ip4; /* In network byte order */
__u32 remote_ip6[4]; /* In network byte order */
__u32 local_ip6[4]; /* In network byte order */
__u32 remote_port; /* In network byte order */
__u32 local_port; /* In host byte horder */
};
Currently there are two types of ops. The first type expects the BPF
program to return a value which is then used by the caller (or a
negative value to indicate the operation is not supported). The second
type expects state changes to be done by the BPF program, for example
through a setsockopt BPF helper function, and they ignore the return
value.
The reply fields of the bpf_sockt_ops struct are there in case a bpf
program needs to return a value larger than an integer.
Signed-off-by: Lawrence Brakmo <brakmo@fb.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-07-01 10:02:40 +07:00
|
|
|
};
|
|
|
|
__u32 family;
|
|
|
|
__u32 remote_ip4; /* Stored in network byte order */
|
|
|
|
__u32 local_ip4; /* Stored in network byte order */
|
|
|
|
__u32 remote_ip6[4]; /* Stored in network byte order */
|
|
|
|
__u32 local_ip6[4]; /* Stored in network byte order */
|
|
|
|
__u32 remote_port; /* Stored in network byte order */
|
|
|
|
__u32 local_port; /* stored in host byte order */
|
2017-12-02 01:15:04 +07:00
|
|
|
__u32 is_fullsock; /* Some TCP fields are only valid if
|
|
|
|
* there is a full socket. If not, the
|
|
|
|
* fields read as zero.
|
|
|
|
*/
|
|
|
|
__u32 snd_cwnd;
|
|
|
|
__u32 srtt_us; /* Averaged RTT << 3 in usecs */
|
2018-01-26 07:14:10 +07:00
|
|
|
__u32 bpf_sock_ops_cb_flags; /* flags defined in uapi/linux/tcp.h */
|
2018-01-26 07:14:12 +07:00
|
|
|
__u32 state;
|
|
|
|
__u32 rtt_min;
|
|
|
|
__u32 snd_ssthresh;
|
|
|
|
__u32 rcv_nxt;
|
|
|
|
__u32 snd_nxt;
|
|
|
|
__u32 snd_una;
|
|
|
|
__u32 mss_cache;
|
|
|
|
__u32 ecn_flags;
|
|
|
|
__u32 rate_delivered;
|
|
|
|
__u32 rate_interval_us;
|
|
|
|
__u32 packets_out;
|
|
|
|
__u32 retrans_out;
|
|
|
|
__u32 total_retrans;
|
|
|
|
__u32 segs_in;
|
|
|
|
__u32 data_segs_in;
|
|
|
|
__u32 segs_out;
|
|
|
|
__u32 data_segs_out;
|
|
|
|
__u32 lost_out;
|
|
|
|
__u32 sacked_out;
|
|
|
|
__u32 sk_txhash;
|
|
|
|
__u64 bytes_received;
|
|
|
|
__u64 bytes_acked;
|
bpf: BPF support for sock_ops
Created a new BPF program type, BPF_PROG_TYPE_SOCK_OPS, and a corresponding
struct that allows BPF programs of this type to access some of the
socket's fields (such as IP addresses, ports, etc.). It uses the
existing bpf cgroups infrastructure so the programs can be attached per
cgroup with full inheritance support. The program will be called at
appropriate times to set relevant connections parameters such as buffer
sizes, SYN and SYN-ACK RTOs, etc., based on connection information such
as IP addresses, port numbers, etc.
Alghough there are already 3 mechanisms to set parameters (sysctls,
route metrics and setsockopts), this new mechanism provides some
distinct advantages. Unlike sysctls, it can set parameters per
connection. In contrast to route metrics, it can also use port numbers
and information provided by a user level program. In addition, it could
set parameters probabilistically for evaluation purposes (i.e. do
something different on 10% of the flows and compare results with the
other 90% of the flows). Also, in cases where IPv6 addresses contain
geographic information, the rules to make changes based on the distance
(or RTT) between the hosts are much easier than route metric rules and
can be global. Finally, unlike setsockopt, it oes not require
application changes and it can be updated easily at any time.
Although the bpf cgroup framework already contains a sock related
program type (BPF_PROG_TYPE_CGROUP_SOCK), I created the new type
(BPF_PROG_TYPE_SOCK_OPS) beccause the existing type expects to be called
only once during the connections's lifetime. In contrast, the new
program type will be called multiple times from different places in the
network stack code. For example, before sending SYN and SYN-ACKs to set
an appropriate timeout, when the connection is established to set
congestion control, etc. As a result it has "op" field to specify the
type of operation requested.
The purpose of this new program type is to simplify setting connection
parameters, such as buffer sizes, TCP's SYN RTO, etc. For example, it is
easy to use facebook's internal IPv6 addresses to determine if both hosts
of a connection are in the same datacenter. Therefore, it is easy to
write a BPF program to choose a small SYN RTO value when both hosts are
in the same datacenter.
This patch only contains the framework to support the new BPF program
type, following patches add the functionality to set various connection
parameters.
This patch defines a new BPF program type: BPF_PROG_TYPE_SOCKET_OPS
and a new bpf syscall command to load a new program of this type:
BPF_PROG_LOAD_SOCKET_OPS.
Two new corresponding structs (one for the kernel one for the user/BPF
program):
/* kernel version */
struct bpf_sock_ops_kern {
struct sock *sk;
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
};
/* user version
* Some fields are in network byte order reflecting the sock struct
* Use the bpf_ntohl helper macro in samples/bpf/bpf_endian.h to
* convert them to host byte order.
*/
struct bpf_sock_ops {
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
__u32 family;
__u32 remote_ip4; /* In network byte order */
__u32 local_ip4; /* In network byte order */
__u32 remote_ip6[4]; /* In network byte order */
__u32 local_ip6[4]; /* In network byte order */
__u32 remote_port; /* In network byte order */
__u32 local_port; /* In host byte horder */
};
Currently there are two types of ops. The first type expects the BPF
program to return a value which is then used by the caller (or a
negative value to indicate the operation is not supported). The second
type expects state changes to be done by the BPF program, for example
through a setsockopt BPF helper function, and they ignore the return
value.
The reply fields of the bpf_sockt_ops struct are there in case a bpf
program needs to return a value larger than an integer.
Signed-off-by: Lawrence Brakmo <brakmo@fb.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-07-01 10:02:40 +07:00
|
|
|
};
|
|
|
|
|
2018-01-26 07:14:10 +07:00
|
|
|
/* Definitions for bpf_sock_ops_cb_flags */
|
2018-01-26 07:14:11 +07:00
|
|
|
#define BPF_SOCK_OPS_RTO_CB_FLAG (1<<0)
|
2018-01-26 07:14:14 +07:00
|
|
|
#define BPF_SOCK_OPS_RETRANS_CB_FLAG (1<<1)
|
2018-01-26 07:14:15 +07:00
|
|
|
#define BPF_SOCK_OPS_STATE_CB_FLAG (1<<2)
|
|
|
|
#define BPF_SOCK_OPS_ALL_CB_FLAGS 0x7 /* Mask of all currently
|
2018-01-26 07:14:10 +07:00
|
|
|
* supported cb flags
|
|
|
|
*/
|
|
|
|
|
bpf: BPF support for sock_ops
Created a new BPF program type, BPF_PROG_TYPE_SOCK_OPS, and a corresponding
struct that allows BPF programs of this type to access some of the
socket's fields (such as IP addresses, ports, etc.). It uses the
existing bpf cgroups infrastructure so the programs can be attached per
cgroup with full inheritance support. The program will be called at
appropriate times to set relevant connections parameters such as buffer
sizes, SYN and SYN-ACK RTOs, etc., based on connection information such
as IP addresses, port numbers, etc.
Alghough there are already 3 mechanisms to set parameters (sysctls,
route metrics and setsockopts), this new mechanism provides some
distinct advantages. Unlike sysctls, it can set parameters per
connection. In contrast to route metrics, it can also use port numbers
and information provided by a user level program. In addition, it could
set parameters probabilistically for evaluation purposes (i.e. do
something different on 10% of the flows and compare results with the
other 90% of the flows). Also, in cases where IPv6 addresses contain
geographic information, the rules to make changes based on the distance
(or RTT) between the hosts are much easier than route metric rules and
can be global. Finally, unlike setsockopt, it oes not require
application changes and it can be updated easily at any time.
Although the bpf cgroup framework already contains a sock related
program type (BPF_PROG_TYPE_CGROUP_SOCK), I created the new type
(BPF_PROG_TYPE_SOCK_OPS) beccause the existing type expects to be called
only once during the connections's lifetime. In contrast, the new
program type will be called multiple times from different places in the
network stack code. For example, before sending SYN and SYN-ACKs to set
an appropriate timeout, when the connection is established to set
congestion control, etc. As a result it has "op" field to specify the
type of operation requested.
The purpose of this new program type is to simplify setting connection
parameters, such as buffer sizes, TCP's SYN RTO, etc. For example, it is
easy to use facebook's internal IPv6 addresses to determine if both hosts
of a connection are in the same datacenter. Therefore, it is easy to
write a BPF program to choose a small SYN RTO value when both hosts are
in the same datacenter.
This patch only contains the framework to support the new BPF program
type, following patches add the functionality to set various connection
parameters.
This patch defines a new BPF program type: BPF_PROG_TYPE_SOCKET_OPS
and a new bpf syscall command to load a new program of this type:
BPF_PROG_LOAD_SOCKET_OPS.
Two new corresponding structs (one for the kernel one for the user/BPF
program):
/* kernel version */
struct bpf_sock_ops_kern {
struct sock *sk;
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
};
/* user version
* Some fields are in network byte order reflecting the sock struct
* Use the bpf_ntohl helper macro in samples/bpf/bpf_endian.h to
* convert them to host byte order.
*/
struct bpf_sock_ops {
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
__u32 family;
__u32 remote_ip4; /* In network byte order */
__u32 local_ip4; /* In network byte order */
__u32 remote_ip6[4]; /* In network byte order */
__u32 local_ip6[4]; /* In network byte order */
__u32 remote_port; /* In network byte order */
__u32 local_port; /* In host byte horder */
};
Currently there are two types of ops. The first type expects the BPF
program to return a value which is then used by the caller (or a
negative value to indicate the operation is not supported). The second
type expects state changes to be done by the BPF program, for example
through a setsockopt BPF helper function, and they ignore the return
value.
The reply fields of the bpf_sockt_ops struct are there in case a bpf
program needs to return a value larger than an integer.
Signed-off-by: Lawrence Brakmo <brakmo@fb.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-07-01 10:02:40 +07:00
|
|
|
/* List of known BPF sock_ops operators.
|
|
|
|
* New entries can only be added at the end
|
|
|
|
*/
|
|
|
|
enum {
|
|
|
|
BPF_SOCK_OPS_VOID,
|
2017-07-01 10:02:42 +07:00
|
|
|
BPF_SOCK_OPS_TIMEOUT_INIT, /* Should return SYN-RTO value to use or
|
|
|
|
* -1 if default value should be used
|
|
|
|
*/
|
2017-07-01 10:02:44 +07:00
|
|
|
BPF_SOCK_OPS_RWND_INIT, /* Should return initial advertized
|
|
|
|
* window (in packets) or -1 if default
|
|
|
|
* value should be used
|
|
|
|
*/
|
2017-07-01 10:02:47 +07:00
|
|
|
BPF_SOCK_OPS_TCP_CONNECT_CB, /* Calls BPF program right before an
|
|
|
|
* active connection is initialized
|
|
|
|
*/
|
|
|
|
BPF_SOCK_OPS_ACTIVE_ESTABLISHED_CB, /* Calls BPF program when an
|
|
|
|
* active connection is
|
|
|
|
* established
|
|
|
|
*/
|
|
|
|
BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB, /* Calls BPF program when a
|
|
|
|
* passive connection is
|
|
|
|
* established
|
|
|
|
*/
|
2017-07-01 10:02:49 +07:00
|
|
|
BPF_SOCK_OPS_NEEDS_ECN, /* If connection's congestion control
|
|
|
|
* needs ECN
|
|
|
|
*/
|
bpf: add support for BPF_SOCK_OPS_BASE_RTT
A congestion control algorithm can make a call to the BPF socket_ops
program to request the base RTT. The base RTT can be congestion control
dependent and is meant to represent a congestion threshold such that
RTTs above it indicate congestion. This is especially useful for flows
within a DC where the base RTT is easy to obtain.
Being provided a base RTT solves a basic problem in RTT based congestion
avoidance algorithms (such as Vegas, NV and BBR). Although it is easy
to get the base RTT when the network is not congested, it is very
diffcult to do when it is very congested. Newer connections get an
inflated value of the base RTT leading to unfariness (newer flows with a
larger base RTT get more bandwidth). As a result, RTT based congestion
avoidance algorithms tend to update their base RTTs to improve fairness.
In very congested networks this can lead to base RTT inflation, reducing
the ability of these RTT based congestion control algorithms to prevent
congestion.
Note that in my experiments with TCP-NV, the base RTT provided can be
much larger than the actual hardware RTT. For example, experimenting
with hosts within a rack where the hardware RTT is 16-20us, I've used
base RTTs up to 150us. The effect of using a larger base RTT is that the
congestion avoidance algorithm will allow more queueing. When there are
only a few flows the main effect is larger measured RTTs and RPC
latencies due to the increased queueing. When there are a lot of flows,
a larger base RTT can lead to more congestion and more packet drops.
For this case, where the hardware RTT is 20us, a base RTT of 80us
produces good results.
This patch only introduces BPF_SOCK_OPS_BASE_RTT, a later patch in this
set adds support for using it in TCP-NV. Further study and testing is
needed before support can be added to other delay based congestion
avoidance algorithms.
Signed-off-by: Lawrence Brakmo <brakmo@fb.com>
Acked-by: Alexei Starovoitov <ast@fb.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-10-21 01:05:39 +07:00
|
|
|
BPF_SOCK_OPS_BASE_RTT, /* Get base RTT. The correct value is
|
|
|
|
* based on the path and may be
|
|
|
|
* dependent on the congestion control
|
|
|
|
* algorithm. In general it indicates
|
|
|
|
* a congestion threshold. RTTs above
|
|
|
|
* this indicate congestion
|
|
|
|
*/
|
2018-01-26 07:14:11 +07:00
|
|
|
BPF_SOCK_OPS_RTO_CB, /* Called when an RTO has triggered.
|
|
|
|
* Arg1: value of icsk_retransmits
|
|
|
|
* Arg2: value of icsk_rto
|
|
|
|
* Arg3: whether RTO has expired
|
|
|
|
*/
|
2018-01-26 07:14:14 +07:00
|
|
|
BPF_SOCK_OPS_RETRANS_CB, /* Called when skb is retransmitted.
|
|
|
|
* Arg1: sequence number of 1st byte
|
|
|
|
* Arg2: # segments
|
|
|
|
* Arg3: return value of
|
|
|
|
* tcp_transmit_skb (0 => success)
|
|
|
|
*/
|
2018-01-26 07:14:15 +07:00
|
|
|
BPF_SOCK_OPS_STATE_CB, /* Called when TCP changes state.
|
|
|
|
* Arg1: old_state
|
|
|
|
* Arg2: new_state
|
|
|
|
*/
|
2018-07-12 07:33:32 +07:00
|
|
|
BPF_SOCK_OPS_TCP_LISTEN_CB, /* Called on listen(2), right after
|
|
|
|
* socket transition to LISTEN state.
|
|
|
|
*/
|
2018-01-26 07:14:15 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
/* List of TCP states. There is a build check in net/ipv4/tcp.c to detect
|
|
|
|
* changes between the TCP and BPF versions. Ideally this should never happen.
|
|
|
|
* If it does, we need to add code to convert them before calling
|
|
|
|
* the BPF sock_ops function.
|
|
|
|
*/
|
|
|
|
enum {
|
|
|
|
BPF_TCP_ESTABLISHED = 1,
|
|
|
|
BPF_TCP_SYN_SENT,
|
|
|
|
BPF_TCP_SYN_RECV,
|
|
|
|
BPF_TCP_FIN_WAIT1,
|
|
|
|
BPF_TCP_FIN_WAIT2,
|
|
|
|
BPF_TCP_TIME_WAIT,
|
|
|
|
BPF_TCP_CLOSE,
|
|
|
|
BPF_TCP_CLOSE_WAIT,
|
|
|
|
BPF_TCP_LAST_ACK,
|
|
|
|
BPF_TCP_LISTEN,
|
|
|
|
BPF_TCP_CLOSING, /* Now a valid state */
|
|
|
|
BPF_TCP_NEW_SYN_RECV,
|
|
|
|
|
|
|
|
BPF_TCP_MAX_STATES /* Leave at the end! */
|
bpf: BPF support for sock_ops
Created a new BPF program type, BPF_PROG_TYPE_SOCK_OPS, and a corresponding
struct that allows BPF programs of this type to access some of the
socket's fields (such as IP addresses, ports, etc.). It uses the
existing bpf cgroups infrastructure so the programs can be attached per
cgroup with full inheritance support. The program will be called at
appropriate times to set relevant connections parameters such as buffer
sizes, SYN and SYN-ACK RTOs, etc., based on connection information such
as IP addresses, port numbers, etc.
Alghough there are already 3 mechanisms to set parameters (sysctls,
route metrics and setsockopts), this new mechanism provides some
distinct advantages. Unlike sysctls, it can set parameters per
connection. In contrast to route metrics, it can also use port numbers
and information provided by a user level program. In addition, it could
set parameters probabilistically for evaluation purposes (i.e. do
something different on 10% of the flows and compare results with the
other 90% of the flows). Also, in cases where IPv6 addresses contain
geographic information, the rules to make changes based on the distance
(or RTT) between the hosts are much easier than route metric rules and
can be global. Finally, unlike setsockopt, it oes not require
application changes and it can be updated easily at any time.
Although the bpf cgroup framework already contains a sock related
program type (BPF_PROG_TYPE_CGROUP_SOCK), I created the new type
(BPF_PROG_TYPE_SOCK_OPS) beccause the existing type expects to be called
only once during the connections's lifetime. In contrast, the new
program type will be called multiple times from different places in the
network stack code. For example, before sending SYN and SYN-ACKs to set
an appropriate timeout, when the connection is established to set
congestion control, etc. As a result it has "op" field to specify the
type of operation requested.
The purpose of this new program type is to simplify setting connection
parameters, such as buffer sizes, TCP's SYN RTO, etc. For example, it is
easy to use facebook's internal IPv6 addresses to determine if both hosts
of a connection are in the same datacenter. Therefore, it is easy to
write a BPF program to choose a small SYN RTO value when both hosts are
in the same datacenter.
This patch only contains the framework to support the new BPF program
type, following patches add the functionality to set various connection
parameters.
This patch defines a new BPF program type: BPF_PROG_TYPE_SOCKET_OPS
and a new bpf syscall command to load a new program of this type:
BPF_PROG_LOAD_SOCKET_OPS.
Two new corresponding structs (one for the kernel one for the user/BPF
program):
/* kernel version */
struct bpf_sock_ops_kern {
struct sock *sk;
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
};
/* user version
* Some fields are in network byte order reflecting the sock struct
* Use the bpf_ntohl helper macro in samples/bpf/bpf_endian.h to
* convert them to host byte order.
*/
struct bpf_sock_ops {
__u32 op;
union {
__u32 reply;
__u32 replylong[4];
};
__u32 family;
__u32 remote_ip4; /* In network byte order */
__u32 local_ip4; /* In network byte order */
__u32 remote_ip6[4]; /* In network byte order */
__u32 local_ip6[4]; /* In network byte order */
__u32 remote_port; /* In network byte order */
__u32 local_port; /* In host byte horder */
};
Currently there are two types of ops. The first type expects the BPF
program to return a value which is then used by the caller (or a
negative value to indicate the operation is not supported). The second
type expects state changes to be done by the BPF program, for example
through a setsockopt BPF helper function, and they ignore the return
value.
The reply fields of the bpf_sockt_ops struct are there in case a bpf
program needs to return a value larger than an integer.
Signed-off-by: Lawrence Brakmo <brakmo@fb.com>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-07-01 10:02:40 +07:00
|
|
|
};
|
|
|
|
|
2017-07-01 10:02:51 +07:00
|
|
|
#define TCP_BPF_IW 1001 /* Set TCP initial congestion window */
|
2017-07-01 10:02:53 +07:00
|
|
|
#define TCP_BPF_SNDCWND_CLAMP 1002 /* Set sndcwnd_clamp */
|
2017-07-01 10:02:51 +07:00
|
|
|
|
2017-10-05 23:19:20 +07:00
|
|
|
struct bpf_perf_event_value {
|
|
|
|
__u64 counter;
|
|
|
|
__u64 enabled;
|
|
|
|
__u64 running;
|
|
|
|
};
|
|
|
|
|
2017-11-05 20:15:32 +07:00
|
|
|
#define BPF_DEVCG_ACC_MKNOD (1ULL << 0)
|
|
|
|
#define BPF_DEVCG_ACC_READ (1ULL << 1)
|
|
|
|
#define BPF_DEVCG_ACC_WRITE (1ULL << 2)
|
|
|
|
|
|
|
|
#define BPF_DEVCG_DEV_BLOCK (1ULL << 0)
|
|
|
|
#define BPF_DEVCG_DEV_CHAR (1ULL << 1)
|
|
|
|
|
|
|
|
struct bpf_cgroup_dev_ctx {
|
2017-12-19 01:13:44 +07:00
|
|
|
/* access_type encoded as (BPF_DEVCG_ACC_* << 16) | BPF_DEVCG_DEV_* */
|
|
|
|
__u32 access_type;
|
2017-11-05 20:15:32 +07:00
|
|
|
__u32 major;
|
|
|
|
__u32 minor;
|
|
|
|
};
|
|
|
|
|
2018-03-29 02:05:37 +07:00
|
|
|
struct bpf_raw_tracepoint_args {
|
|
|
|
__u64 args[0];
|
|
|
|
};
|
|
|
|
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
/* DIRECT: Skip the FIB rules and go to FIB table associated with device
|
|
|
|
* OUTPUT: Do lookup from egress perspective; default is ingress
|
|
|
|
*/
|
|
|
|
#define BPF_FIB_LOOKUP_DIRECT BIT(0)
|
|
|
|
#define BPF_FIB_LOOKUP_OUTPUT BIT(1)
|
|
|
|
|
2018-06-27 06:21:18 +07:00
|
|
|
enum {
|
|
|
|
BPF_FIB_LKUP_RET_SUCCESS, /* lookup successful */
|
|
|
|
BPF_FIB_LKUP_RET_BLACKHOLE, /* dest is blackholed; can be dropped */
|
|
|
|
BPF_FIB_LKUP_RET_UNREACHABLE, /* dest is unreachable; can be dropped */
|
|
|
|
BPF_FIB_LKUP_RET_PROHIBIT, /* dest not allowed; can be dropped */
|
|
|
|
BPF_FIB_LKUP_RET_NOT_FWDED, /* packet is not forwarded */
|
|
|
|
BPF_FIB_LKUP_RET_FWD_DISABLED, /* fwding is not enabled on ingress */
|
|
|
|
BPF_FIB_LKUP_RET_UNSUPP_LWT, /* fwd requires encapsulation */
|
|
|
|
BPF_FIB_LKUP_RET_NO_NEIGH, /* no neighbor entry for nh */
|
|
|
|
BPF_FIB_LKUP_RET_FRAG_NEEDED, /* fragmentation required to fwd */
|
|
|
|
};
|
|
|
|
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
struct bpf_fib_lookup {
|
2018-05-30 00:58:07 +07:00
|
|
|
/* input: network family for lookup (AF_INET, AF_INET6)
|
|
|
|
* output: network family of egress nexthop
|
|
|
|
*/
|
|
|
|
__u8 family;
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
|
|
|
|
/* set if lookup is to consider L4 data - e.g., FIB rules */
|
|
|
|
__u8 l4_protocol;
|
|
|
|
__be16 sport;
|
|
|
|
__be16 dport;
|
|
|
|
|
|
|
|
/* total length of packet from network header - used for MTU check */
|
|
|
|
__u16 tot_len;
|
2018-06-27 06:21:18 +07:00
|
|
|
|
|
|
|
/* input: L3 device index for lookup
|
|
|
|
* output: device index from FIB lookup
|
|
|
|
*/
|
|
|
|
__u32 ifindex;
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
|
|
|
|
union {
|
|
|
|
/* inputs to lookup */
|
|
|
|
__u8 tos; /* AF_INET */
|
2018-06-03 22:15:19 +07:00
|
|
|
__be32 flowinfo; /* AF_INET6, flow_label + priority */
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
|
2018-05-30 00:58:07 +07:00
|
|
|
/* output: metric of fib result (IPv4/IPv6 only) */
|
|
|
|
__u32 rt_metric;
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
};
|
|
|
|
|
|
|
|
union {
|
|
|
|
__be32 ipv4_src;
|
|
|
|
__u32 ipv6_src[4]; /* in6_addr; network order */
|
|
|
|
};
|
|
|
|
|
2018-05-30 00:58:07 +07:00
|
|
|
/* input to bpf_fib_lookup, ipv{4,6}_dst is destination address in
|
|
|
|
* network header. output: bpf_fib_lookup sets to gateway address
|
|
|
|
* if FIB lookup returns gateway route
|
bpf: Provide helper to do forwarding lookups in kernel FIB table
Provide a helper for doing a FIB and neighbor lookup in the kernel
tables from an XDP program. The helper provides a fastpath for forwarding
packets. If the packet is a local delivery or for any reason is not a
simple lookup and forward, the packet continues up the stack.
If it is to be forwarded, the forwarding can be done directly if the
neighbor is already known. If the neighbor does not exist, the first
few packets go up the stack for neighbor resolution. Once resolved, the
xdp program provides the fast path.
On successful lookup the nexthop dmac, current device smac and egress
device index are returned.
The API supports IPv4, IPv6 and MPLS protocols, but only IPv4 and IPv6
are implemented in this patch. The API includes layer 4 parameters if
the XDP program chooses to do deep packet inspection to allow compare
against ACLs implemented as FIB rules.
Header rewrite is left to the XDP program.
The lookup takes 2 flags:
- BPF_FIB_LOOKUP_DIRECT to do a lookup that bypasses FIB rules and goes
straight to the table associated with the device (expert setting for
those looking to maximize throughput)
- BPF_FIB_LOOKUP_OUTPUT to do a lookup from the egress perspective.
Default is an ingress lookup.
Initial performance numbers collected by Jesper, forwarded packets/sec:
Full stack XDP FIB lookup XDP Direct lookup
IPv4 1,947,969 7,074,156 7,415,333
IPv6 1,728,000 6,165,504 7,262,720
These number are single CPU core forwarding on a Broadwell
E5-1650 v4 @ 3.60GHz.
Signed-off-by: David Ahern <dsahern@gmail.com>
Acked-by: Jesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
2018-05-10 10:34:26 +07:00
|
|
|
*/
|
|
|
|
union {
|
|
|
|
__be32 ipv4_dst;
|
|
|
|
__u32 ipv6_dst[4]; /* in6_addr; network order */
|
|
|
|
};
|
|
|
|
|
|
|
|
/* output */
|
|
|
|
__be16 h_vlan_proto;
|
|
|
|
__be16 h_vlan_TCI;
|
|
|
|
__u8 smac[6]; /* ETH_ALEN */
|
|
|
|
__u8 dmac[6]; /* ETH_ALEN */
|
|
|
|
};
|
|
|
|
|
bpf: introduce bpf subcommand BPF_TASK_FD_QUERY
Currently, suppose a userspace application has loaded a bpf program
and attached it to a tracepoint/kprobe/uprobe, and a bpf
introspection tool, e.g., bpftool, wants to show which bpf program
is attached to which tracepoint/kprobe/uprobe. Such attachment
information will be really useful to understand the overall bpf
deployment in the system.
There is a name field (16 bytes) for each program, which could
be used to encode the attachment point. There are some drawbacks
for this approaches. First, bpftool user (e.g., an admin) may not
really understand the association between the name and the
attachment point. Second, if one program is attached to multiple
places, encoding a proper name which can imply all these
attachments becomes difficult.
This patch introduces a new bpf subcommand BPF_TASK_FD_QUERY.
Given a pid and fd, if the <pid, fd> is associated with a
tracepoint/kprobe/uprobe perf event, BPF_TASK_FD_QUERY will return
. prog_id
. tracepoint name, or
. k[ret]probe funcname + offset or kernel addr, or
. u[ret]probe filename + offset
to the userspace.
The user can use "bpftool prog" to find more information about
bpf program itself with prog_id.
Acked-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Yonghong Song <yhs@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2018-05-25 01:21:09 +07:00
|
|
|
enum bpf_task_fd_type {
|
|
|
|
BPF_FD_TYPE_RAW_TRACEPOINT, /* tp name */
|
|
|
|
BPF_FD_TYPE_TRACEPOINT, /* tp name */
|
|
|
|
BPF_FD_TYPE_KPROBE, /* (symbol + offset) or addr */
|
|
|
|
BPF_FD_TYPE_KRETPROBE, /* (symbol + offset) or addr */
|
|
|
|
BPF_FD_TYPE_UPROBE, /* filename + offset */
|
|
|
|
BPF_FD_TYPE_URETPROBE, /* filename + offset */
|
|
|
|
};
|
|
|
|
|
2018-09-14 21:46:18 +07:00
|
|
|
struct bpf_flow_keys {
|
|
|
|
__u16 nhoff;
|
|
|
|
__u16 thoff;
|
|
|
|
__u16 addr_proto; /* ETH_P_* of valid addrs */
|
|
|
|
__u8 is_frag;
|
|
|
|
__u8 is_first_frag;
|
|
|
|
__u8 is_encap;
|
|
|
|
__u8 ip_proto;
|
|
|
|
__be16 n_proto;
|
|
|
|
__be16 sport;
|
|
|
|
__be16 dport;
|
|
|
|
union {
|
|
|
|
struct {
|
|
|
|
__be32 ipv4_src;
|
|
|
|
__be32 ipv4_dst;
|
|
|
|
};
|
|
|
|
struct {
|
|
|
|
__u32 ipv6_src[4]; /* in6_addr; network order */
|
|
|
|
__u32 ipv6_dst[4]; /* in6_addr; network order */
|
|
|
|
};
|
|
|
|
};
|
|
|
|
};
|
|
|
|
|
bpf: Introduce bpf_func_info
This patch added interface to load a program with the following
additional information:
. prog_btf_fd
. func_info, func_info_rec_size and func_info_cnt
where func_info will provide function range and type_id
corresponding to each function.
The func_info_rec_size is introduced in the UAPI to specify
struct bpf_func_info size passed from user space. This
intends to make bpf_func_info structure growable in the future.
If the kernel gets a different bpf_func_info size from userspace,
it will try to handle user request with part of bpf_func_info
it can understand. In this patch, kernel can understand
struct bpf_func_info {
__u32 insn_offset;
__u32 type_id;
};
If user passed a bpf func_info record size of 16 bytes, the
kernel can still handle part of records with the above definition.
If verifier agrees with function range provided by the user,
the bpf_prog ksym for each function will use the func name
provided in the type_id, which is supposed to provide better
encoding as it is not limited by 16 bytes program name
limitation and this is better for bpf program which contains
multiple subprograms.
The bpf_prog_info interface is also extended to
return btf_id, func_info, func_info_rec_size and func_info_cnt
to userspace, so userspace can print out the function prototype
for each xlated function. The insn_offset in the returned
func_info corresponds to the insn offset for xlated functions.
With other jit related fields in bpf_prog_info, userspace can also
print out function prototypes for each jited function.
Signed-off-by: Yonghong Song <yhs@fb.com>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2018-11-20 06:29:11 +07:00
|
|
|
struct bpf_func_info {
|
2018-12-06 08:35:44 +07:00
|
|
|
__u32 insn_off;
|
bpf: Introduce bpf_func_info
This patch added interface to load a program with the following
additional information:
. prog_btf_fd
. func_info, func_info_rec_size and func_info_cnt
where func_info will provide function range and type_id
corresponding to each function.
The func_info_rec_size is introduced in the UAPI to specify
struct bpf_func_info size passed from user space. This
intends to make bpf_func_info structure growable in the future.
If the kernel gets a different bpf_func_info size from userspace,
it will try to handle user request with part of bpf_func_info
it can understand. In this patch, kernel can understand
struct bpf_func_info {
__u32 insn_offset;
__u32 type_id;
};
If user passed a bpf func_info record size of 16 bytes, the
kernel can still handle part of records with the above definition.
If verifier agrees with function range provided by the user,
the bpf_prog ksym for each function will use the func name
provided in the type_id, which is supposed to provide better
encoding as it is not limited by 16 bytes program name
limitation and this is better for bpf program which contains
multiple subprograms.
The bpf_prog_info interface is also extended to
return btf_id, func_info, func_info_rec_size and func_info_cnt
to userspace, so userspace can print out the function prototype
for each xlated function. The insn_offset in the returned
func_info corresponds to the insn offset for xlated functions.
With other jit related fields in bpf_prog_info, userspace can also
print out function prototypes for each jited function.
Signed-off-by: Yonghong Song <yhs@fb.com>
Signed-off-by: Martin KaFai Lau <kafai@fb.com>
Signed-off-by: Alexei Starovoitov <ast@kernel.org>
2018-11-20 06:29:11 +07:00
|
|
|
__u32 type_id;
|
|
|
|
};
|
|
|
|
|
2018-12-08 07:42:25 +07:00
|
|
|
#define BPF_LINE_INFO_LINE_NUM(line_col) ((line_col) >> 10)
|
|
|
|
#define BPF_LINE_INFO_LINE_COL(line_col) ((line_col) & 0x3ff)
|
|
|
|
|
|
|
|
struct bpf_line_info {
|
|
|
|
__u32 insn_off;
|
|
|
|
__u32 file_name_off;
|
|
|
|
__u32 line_off;
|
|
|
|
__u32 line_col;
|
|
|
|
};
|
|
|
|
|
2019-02-01 06:40:04 +07:00
|
|
|
struct bpf_spin_lock {
|
|
|
|
__u32 val;
|
|
|
|
};
|
2014-09-05 12:17:18 +07:00
|
|
|
#endif /* _UAPI__LINUX_BPF_H__ */
|