Received: by 2002:a25:4158:0:0:0:0:0 with SMTP id o85csp750817yba; Thu, 18 Apr 2019 08:58:59 -0700 (PDT) X-Google-Smtp-Source: APXvYqw32j/nbavAFkHGXMRzwVdJsoUjkOCMcqeIr4GS9fUmvY95JMfMJjvDnmR4DHRZOvTO3JPv X-Received: by 2002:a17:902:8c89:: with SMTP id t9mr97316088plo.265.1555603139571; Thu, 18 Apr 2019 08:58:59 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1555603139; cv=none; d=google.com; s=arc-20160816; b=aLf8NTtEHqTaDiSVuUUPK2QKk+UKmcK9tGSJ2sd8zPpChsiQPybBlLlyXPe1doqJL8 JK+ILYuBK174ZJMp7ytMq4VXI+zEeKCxxtsJwZANBLzuU4mlzkO9FbDtXimw7099xM1j IBCAYOOcmo/IF1bwYUtVIhsatexT10HQF1S5SBSG10tUxG1gU0MyglEBIwnJQIPQmKee tP9lCerZO2TUTqAZPnru6CyNv2+VpeeBssPohi13sfJfefwZNAfLith+a0qq22lA4shU gy3PBnJzru72KG43i5VdviNQL+h1QwGajEIsoJ43E6Q0HA4PLz6eND0e9deHGDPxUUmv s8hw== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :references:in-reply-to:message-id:date:subject:cc:to:from :dkim-signature; bh=IWlf2jOCi78n1ZlTfvCNvL1fAOtMa6gp1Ms71/Rm22E=; b=oEbtu8Lyku4gpX6TUoh1rEHtOfPQxeOqcf2MgDF89guHwwF/+XaQFhn0epBNQzXUN6 d6sSnxbSNmr1nVWnqMMsI0cUJmK7yv9KEDpOGJ55zvrQpYHhYjALRsPylfzvWx72VKzL pVxiUW+jsW8/5D5iosr3D6p0dKxbbsF/kGEehiwOoHXjbjHqafNt//2vIJLQLnJJAwdU E+TZ0/Ub2tsP3+qQUNPe+PEgsn1SQFNSeUFhkLn/nbVJhem1O1lSGF+Tucnxvyrq01ZL C0RGwdbiiDEN+IPq9T735+3sOSB6JoQ/aSF0jhXsLyJUiSgLsYE0MKuc4rEVB3S/DAZd GGdg== ARC-Authentication-Results: i=1; mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=ujUF89a1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id y2si2156501pgl.527.2019.04.18.08.58.44; Thu, 18 Apr 2019 08:58:59 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=fail header.i=@gmail.com header.s=20161025 header.b=ujUF89a1; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=fail (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S2389617AbfDRP5f (ORCPT + 99 others); Thu, 18 Apr 2019 11:57:35 -0400 Received: from mail-ed1-f67.google.com ([209.85.208.67]:33700 "EHLO mail-ed1-f67.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1731317AbfDRP5e (ORCPT ); Thu, 18 Apr 2019 11:57:34 -0400 Received: by mail-ed1-f67.google.com with SMTP id d55so2246492ede.0; Thu, 18 Apr 2019 08:57:33 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=sender:from:to:cc:subject:date:message-id:in-reply-to:references :mime-version:content-transfer-encoding; bh=IWlf2jOCi78n1ZlTfvCNvL1fAOtMa6gp1Ms71/Rm22E=; b=ujUF89a1ePTsZ8Opt/cSrVgjOg9JkCj0Ye0S1Tvo8V0IoiLvcY1RF9S5eCUTnMQlYH jH8kvTb3zcQmcx2Shu6VmbatM6bC+QuBNmhs0g4iIYfISvoUs69IW/lyPDiC5H6CUp83 DWD/Pu0vO+6ZVwCsHP30MEG4NuE8LyyNfAbHVzMaRyMuuFmL4VdNCqJl+l2n5FaEyv5V AfkUoIzNbyG+rGx3uTjyil5dnpdgyZCqz4GziapN4UrS6n4J5k7RPbV5cO2wDZlriYhp 2OaL73q/89foIWGx0SjoehchR8Z067Zb4esVZzgGR9t4SaPw2PxQgRnoEtwxltLSYGlE YDRw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:sender:from:to:cc:subject:date:message-id :in-reply-to:references:mime-version:content-transfer-encoding; bh=IWlf2jOCi78n1ZlTfvCNvL1fAOtMa6gp1Ms71/Rm22E=; b=bqsa6Qy23q4UdWWiEMtjNAxLGRRoiSzI/RLpPpQxpOVg95T0CtrtR8Etzn5V8KPpbn M/IzHTJEPlirn352arYuJrguPe5OM0eBja1QsdvMkLcMFKAFs+FUo+cK3fj4/3xJnJeP lAoJ1E0GCZtC0X/DI/GX2t0vo8MONBRehieh/3Y+eAPG/GxQN5OluN2EzFhaMehdfef/ VfjBmuFuHP717fAeYFnfA7zwAE+hptPA7X1ppUm8FhcWzErSwrfQV5lj3Bk7e2KF0RVl bOnSh1rbNMwsFkZ35ph5b2mG7OqTYT1tvXBvN/P9hvy7kA/C7s/yjHpKibnQmnDEQcB0 KlDA== X-Gm-Message-State: APjAAAWrRzqA09mqtRv9z+FKLzP7Z+Ii1amtUGDoU3ca7JjNuRFIaWtw 9//xcPXD39MkLnGl5YiQVK0= X-Received: by 2002:a17:906:1347:: with SMTP id x7mr51905811ejb.64.1555603052337; Thu, 18 Apr 2019 08:57:32 -0700 (PDT) Received: from neptune.fritz.box ([178.19.216.175]) by smtp.gmail.com with ESMTPSA id 31sm591274edf.18.2019.04.18.08.57.31 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Thu, 18 Apr 2019 08:57:31 -0700 (PDT) From: Alban Crequy X-Google-Original-From: Alban Crequy To: john.fastabend@gmail.com, ast@kernel.org, daniel@iogearbox.net Cc: bpf@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, alban@kinvolk.io, iago@kinvolk.io Subject: [PATCH bpf-next v2 2/3] selftests: bpf: read netns from struct bpf_sock_ops Date: Thu, 18 Apr 2019 17:56:51 +0200 Message-Id: <20190418155652.22181-2-alban@kinvolk.io> X-Mailer: git-send-email 2.20.1 In-Reply-To: <20190418155652.22181-1-alban@kinvolk.io> References: <20190418155652.22181-1-alban@kinvolk.io> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alban Crequy This shows how a sockops program could be restricted to a specific network namespace. The sockops program looks at the current netns via (struct bpf_sock_ops)->netns and checks if the value matches the configuration in the new BPF map "sock_netns". The test program ./test_sockmap accepts a new parameter "--netns"; the default value is the current netns found by stat() on /proc/self/ns/net, so the previous tests still pass: sudo ./test_sockmap ... Summary: 412 PASSED 0 FAILED ... Summary: 824 PASSED 0 FAILED I run my additional test in the following way: NETNS=$(readlink /proc/self/ns/net | sed 's/^net:\[\(.*\)\]$/\1/') CGR=/sys/fs/cgroup/unified/user.slice/user-1000.slice/session-5.scope/ sudo ./test_sockmap --cgroup $CGR --netns $NETNS & cat /sys/kernel/debug/tracing/trace_pipe echo foo | nc -l 127.0.0.1 8080 & echo bar | nc 127.0.0.1 8080 => the connection goes through the sockmap When testing with a wrong $NETNS, I get the trace_pipe log: > not binding connection on netns 4026531992 Signed-off-by: Alban Crequy --- Changes since v1: - tools/include/uapi/linux/bpf.h: update with netns_dev - tools/testing/selftests/bpf/test_sockmap_kern.h: print debugs with both netns_dev and netns_ino --- tools/include/uapi/linux/bpf.h | 2 + tools/testing/selftests/bpf/test_sockmap.c | 38 +++++++++++++++++-- .../testing/selftests/bpf/test_sockmap_kern.h | 22 +++++++++++ 3 files changed, 59 insertions(+), 3 deletions(-) diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h index 704bb69514a2..eb56620a9d7a 100644 --- a/tools/include/uapi/linux/bpf.h +++ b/tools/include/uapi/linux/bpf.h @@ -3206,6 +3206,8 @@ struct bpf_sock_ops { __u32 sk_txhash; __u64 bytes_received; __u64 bytes_acked; + __u64 netns_dev; + __u64 netns_ino; }; /* Definitions for bpf_sock_ops_cb_flags */ diff --git a/tools/testing/selftests/bpf/test_sockmap.c b/tools/testing/selftests/bpf/test_sockmap.c index 3845144e2c91..5a1b9c96fca1 100644 --- a/tools/testing/selftests/bpf/test_sockmap.c +++ b/tools/testing/selftests/bpf/test_sockmap.c @@ -2,6 +2,7 @@ // Copyright (c) 2017-2018 Covalent IO, Inc. http://covalent.io #include #include +#include #include #include #include @@ -21,6 +22,7 @@ #include #include #include +#include #include #include @@ -63,8 +65,8 @@ int s1, s2, c1, c2, p1, p2; int test_cnt; int passed; int failed; -int map_fd[8]; -struct bpf_map *maps[8]; +int map_fd[9]; +struct bpf_map *maps[9]; int prog_fd[11]; int txmsg_pass; @@ -84,6 +86,7 @@ int txmsg_ingress; int txmsg_skb; int ktls; int peek_flag; +uint64_t netns_opt; static const struct option long_options[] = { {"help", no_argument, NULL, 'h' }, @@ -111,6 +114,7 @@ static const struct option long_options[] = { {"txmsg_skb", no_argument, &txmsg_skb, 1 }, {"ktls", no_argument, &ktls, 1 }, {"peek", no_argument, &peek_flag, 1 }, + {"netns", required_argument, NULL, 'n'}, {0, 0, NULL, 0 } }; @@ -1585,6 +1589,7 @@ char *map_names[] = { "sock_bytes", "sock_redir_flags", "sock_skb_opts", + "sock_netns", }; int prog_attach_type[] = { @@ -1619,6 +1624,8 @@ static int populate_progs(char *bpf_file) struct bpf_object *obj; int i = 0; long err; + struct stat netns_sb; + uint64_t netns_ino; obj = bpf_object__open(bpf_file); err = libbpf_get_error(obj); @@ -1655,6 +1662,28 @@ static int populate_progs(char *bpf_file) } } + if (netns_opt == 0) { + err = stat("/proc/self/ns/net", &netns_sb); + if (err) { + fprintf(stderr, + "ERROR: cannot stat network namespace: %ld (%s)\n", + err, strerror(errno)); + return -1; + } + netns_ino = netns_sb.st_ino; + } else { + netns_ino = netns_opt; + } + i = 1; + err = bpf_map_update_elem(map_fd[8], &netns_ino, &i, BPF_ANY); + if (err) { + fprintf(stderr, + "ERROR: bpf_map_update_elem (netns): %ld (%s)\n", + err, strerror(errno)); + return -1; + } + + return 0; } @@ -1738,7 +1767,7 @@ int main(int argc, char **argv) if (argc < 2) return test_suite(-1); - while ((opt = getopt_long(argc, argv, ":dhvc:r:i:l:t:p:q:", + while ((opt = getopt_long(argc, argv, ":dhvc:r:i:l:t:p:q:n:", long_options, &longindex)) != -1) { switch (opt) { case 's': @@ -1805,6 +1834,9 @@ int main(int argc, char **argv) return -1; } break; + case 'n': + netns_opt = strtoull(optarg, NULL, 10); + break; case 0: break; case 'h': diff --git a/tools/testing/selftests/bpf/test_sockmap_kern.h b/tools/testing/selftests/bpf/test_sockmap_kern.h index e7639f66a941..317406dad6cf 100644 --- a/tools/testing/selftests/bpf/test_sockmap_kern.h +++ b/tools/testing/selftests/bpf/test_sockmap_kern.h @@ -91,6 +91,13 @@ struct bpf_map_def SEC("maps") sock_skb_opts = { .max_entries = 1 }; +struct bpf_map_def SEC("maps") sock_netns = { + .type = BPF_MAP_TYPE_HASH, + .key_size = sizeof(__u64), + .value_size = sizeof(int), + .max_entries = 16 +}; + SEC("sk_skb1") int bpf_prog1(struct __sk_buff *skb) { @@ -132,9 +139,24 @@ int bpf_sockmap(struct bpf_sock_ops *skops) { __u32 lport, rport; int op, err = 0, index, key, ret; + int i = 0; + __u64 netns_dev, netns_ino; + int *allowed; op = (int) skops->op; + netns_dev = skops->netns_dev; + netns_ino = skops->netns_ino; + bpf_printk("bpf_sockmap: netns_dev = %lu netns_ino = %lu\n", + netns_dev, netns_ino); + + // Only allow sockmap connection on the configured network namespace + allowed = bpf_map_lookup_elem(&sock_netns, &netns_ino); + if (allowed == NULL || *allowed == 0) { + bpf_printk("not binding connection on netns_ino %lu\n", + netns_ino); + return 0; + } switch (op) { case BPF_SOCK_OPS_PASSIVE_ESTABLISHED_CB: -- 2.20.1