Received: by 2002:a05:6358:1087:b0:cb:c9d3:cd90 with SMTP id j7csp930962rwi; Fri, 14 Oct 2022 10:22:49 -0700 (PDT) X-Google-Smtp-Source: AMsMyM5NggbJLU46OVt48VJUKWwRymDSgESved4moaOa5PdlysU2nWUShnDz9FP5cbmsyorbRTI7 X-Received: by 2002:a17:902:ebc7:b0:17e:7378:1da8 with SMTP id p7-20020a170902ebc700b0017e73781da8mr6178704plg.152.1665768168756; Fri, 14 Oct 2022 10:22:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1665768168; cv=none; d=google.com; s=arc-20160816; b=U1MsKZkJoGPty02JjIdazC2W1MxzXiITOTlT2m4Fa2P6RAbvo6i50dKjW0VIwDMCfa qcgVPBkGKnzxyB+8nDzh6YfFBMoEOExsyXYCqoPBWdzGtwSd/eIVw5yxUz1qUaL6JdYH wDJS7et/sR7t0bAMOIOU1yZkneRM2om5AnUMBrfOac9Qfm19ZQMfZ4W/Lpa56EC/KJ8e WQ9fWPPnM0TAq6MTe9LxaGsmzKkliTJzFhwTB0quVZ4pYbof/vVrQOa9RJIou9IHkmdu /oyQ64H7uyqfsQu2Ps/LgaFTyrJ7E+cZRs/GU8If6HJnt7nuh8uQbl26jH/23/6/RJRA vuSg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:message-id:references :mime-version:in-reply-to:date:dkim-signature; bh=lwQ6+sA3W7MWd0vYC/9HRNB0kdytHGubSeaFZENr5nY=; b=OpO8nqlcZ7fYDF6wBBCobNY9CjicgX2XM5KxBSb9IiqIBjZIExgFnSw+GXcbwE6pZk rt0OIJME4f8ugjaWty8xrAjRnjURgPGfWj8QiBngTJ3EEBIjnDA/jykgvYMT5uFN7+0G GssP5j5gYEgNiBFbeNpCcsNSemMtDe/i2v8tJSUV59sM7beOiJHeh2vWUCWWAzJq/1Bv /e823JwFCrqDpCnEwdNVYN0bB0et0FNgmIfBX6LopLnrbLx7uUgmj1FYMUWugioZWXfE g/Js9kBxPryGbwwGF8xPR01G1Zk7W2e1bLWZKwcMWQz56SRDDEMoXapCMNfS9xDtXljz rYtw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=GVIG8x8O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id r19-20020a63ce53000000b0043c1cb75c22si3376980pgi.333.2022.10.14.10.22.33; Fri, 14 Oct 2022 10:22:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=GVIG8x8O; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S231126AbiJNQzq (ORCPT + 99 others); Fri, 14 Oct 2022 12:55:46 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:60270 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230368AbiJNQzn (ORCPT ); Fri, 14 Oct 2022 12:55:43 -0400 Received: from mail-pf1-x449.google.com (mail-pf1-x449.google.com [IPv6:2607:f8b0:4864:20::449]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 5712761106 for ; Fri, 14 Oct 2022 09:55:42 -0700 (PDT) Received: by mail-pf1-x449.google.com with SMTP id j20-20020a056a00235400b00565af23c8c2so3160839pfj.7 for ; Fri, 14 Oct 2022 09:55:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:from:to:cc:subject:date:message-id:reply-to; bh=lwQ6+sA3W7MWd0vYC/9HRNB0kdytHGubSeaFZENr5nY=; b=GVIG8x8OIpWYulN7VSMqXxVDEKoHPUOUkR+1sTLzVXThxcghyxLdwMVke3uKtdLYbl ZWwN6u60+DEMLfyE081V/ryY7alg8/yQ7heFroiJeCU8Ry4EYZL34K2PiA3jQ4+B/Z/b lttRUGdvS2KgrwID001oZQuIYNAcD9RPud0MtUIRwPCgA0U+jsRnzPpAH3HM/xBXQbvv iz2gucrGsBF9UAVNQOQ6Jrf0vqGL+gW+At4aN47DnXGv8HTBvujw2+C4sMEyapiYzN0T 6hbpFJS1BY8Z0dM3zHjXsKkngnOnc2TK2kRWP4FJOIljEaeJFRq09jv3JSZimTmLyTnu jmng== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:message-id:references:mime-version:in-reply-to :date:x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=lwQ6+sA3W7MWd0vYC/9HRNB0kdytHGubSeaFZENr5nY=; b=L6DaJIo7ek+5GDJtJYIfHkaVUnWyQ9tAXJ80f5TpS0vV1jvjVxoXtmUdF2tbGfejkj VY10aepinbBt9wzK85HYGlgyJ50XkRgTJlcBv1nX7h6TlaTEggzLngKnzVA39dgaUQVl Y+FqhtHy0xJ0J1vSpCUmP9hGNVG5zGhs9h2xjKSZ8Gm8uQQcu3MmTNoXRvZG0ESWgi5g mjHaubm4oRrXL6v6wZcQyGLU1cZmsKzgnbX67FKHE9670vxTG/5XKJEOPfkvRLIZgyvG Y9KsdbL/RAYDUqq9y1a/HXWDib4PZAUkLD2sG4vx9dnucjIiC6/pcduEdFWs0Mztmu36 LNEg== X-Gm-Message-State: ACrzQf3rt3ns9ug8EwMdMDhFmExYdLyGqVuciE5sRZ/mSSyiCGRPZOTC bD1epUm98TqirzIQCXubfcStbJk= X-Received: from sdf.c.googlers.com ([fda3:e722:ac3:cc00:7f:e700:c0a8:5935]) (user=sdf job=sendgmr) by 2002:aa7:8607:0:b0:53b:13b5:2b6a with SMTP id p7-20020aa78607000000b0053b13b52b6amr6299861pfn.52.1665766541868; Fri, 14 Oct 2022 09:55:41 -0700 (PDT) Date: Fri, 14 Oct 2022 09:55:40 -0700 In-Reply-To: <04d2eb4a-7365-495a-ab74-704febac2789@app.fastmail.com> Mime-Version: 1.0 References: <20220715115559.139691-1-shaozhengchao@huawei.com> <20220914111936.19881-1-oss@lmb.io> <5a3c5ea9-d557-6070-d778-1092f3c51257@huawei.com> <04d2eb4a-7365-495a-ab74-704febac2789@app.fastmail.com> Message-ID: Subject: Re: [PATCH v4,bpf-next] bpf: Don't redirect packets with invalid pkt_len From: sdf@google.com To: Lorenz Bauer Cc: shaozhengchao , Alexei Starovoitov , Daniel Borkmann , bpf@vger.kernel.org, linux-kernel@vger.kernel.org, yuehaibing@huawei.com Content-Type: text/plain; charset="UTF-8"; format=flowed; delsp=yes X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,USER_IN_DEF_DKIM_WL autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On 10/14, Lorenz Bauer wrote: > On Thu, 13 Oct 2022, at 11:44, shaozhengchao wrote: > > Sorry, I haven't fully understood your intentions yet. > > Can you explain it more detail? > I'll try! Roughly, we do the following: > 1. Create a BPF_PROG_TYPE_SOCKET_FILTER program that just returns 0 > 2. Load the program into the kernel > 3. Call BPF_PROG_RUN with data_size_in == 14 > After your bugfix, it seems like step 3 is rejected due to data_size_in > == 14. We had to increase data_size_in to 15 to > avoid this, see [0]. > This breaks user space, so it would be great if you could fix this in a > way that doesn't refuse BPF_PROG_RUN with [..] > data_size_in == 14. Since I don't understand the original problem very > well I can't tell you what the best fix is however. The problem was that we were able to generate skb with len=0 via BPF_PROG_RUN. Prohibiting those cases breaks backwards compatibility, so we either have to: a) (preferred?) accept inputs with <14, but maybe internally pad to 14 bytes to make the core stack happy b) revert the patch and instead have length checks at runtime; doesn't seem to be worth the penalty in the forwarding path because of some corner cases like these ? > 0: > https://github.com/cilium/ebpf/commit/a38fb6b5a46ab3b5639ea4d421232a10013596c0 > Thanks > Lorenz