RE: [PATCH bpf-next v3] Add skb_store_bytes() for BPF_PROG_TYPE_CGROUP_SKB

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 




> -----Original Message-----
> From: Daniel Borkmann <daniel@xxxxxxxxxxxxx>
> Sent: Thursday, January 6, 2022 3:35 PM
> To: Tyler Wear (QUIC) <quic_twear@xxxxxxxxxxx>; netdev@xxxxxxxxxxxxxxx; bpf@xxxxxxxxxxxxxxx
> Cc: maze@xxxxxxxxxx; yhs@xxxxxx; kafai@xxxxxx; toke@xxxxxxxxxx; Tyler Wear <quic_twear@xxxxxxxxxxx>
> Subject: Re: [PATCH bpf-next v3] Add skb_store_bytes() for BPF_PROG_TYPE_CGROUP_SKB
> 
> WARNING: This email originated from outside of Qualcomm. Please be wary of any links or attachments, and do not enable macros.
> 
> On 1/6/22 1:43 AM, Tyler Wear wrote:
> > From: Tyler Wear <quic_twear@xxxxxxxxxxx>
> >
> > Need to modify the ds field to support upcoming Wifi QoS Alliance spec.
> > Instead of adding generic function for just modifying the ds field,
> > add skb_store_bytes for BPF_PROG_TYPE_CGROUP_SKB.
> > This allows other fields in the network and transport header to be
> > modified in the future.
> >
> > Checksum API's also need to be added for completeness.
> >
> > It is not possible to use CGROUP_(SET|GET)SOCKOPT since the policy may
> > change during runtime and would result in a large number of entries
> > with wildcards.
> >
> > Signed-off-by: Tyler Wear <quic_twear@xxxxxxxxxxx>
> > ---
> >   net/core/filter.c                             | 10 ++
> >   .../bpf/prog_tests/cgroup_store_bytes.c       | 97 +++++++++++++++++++
> >   .../selftests/bpf/progs/cgroup_store_bytes.c  | 64 ++++++++++++
> >   3 files changed, 171 insertions(+)
> >   create mode 100644 tools/testing/selftests/bpf/prog_tests/cgroup_store_bytes.c
> >   create mode 100644
> > tools/testing/selftests/bpf/progs/cgroup_store_bytes.c
> >
> > diff --git a/net/core/filter.c b/net/core/filter.c index
> > 6102f093d59a..ce01a8036361 100644
> > --- a/net/core/filter.c
> > +++ b/net/core/filter.c
> > @@ -7299,6 +7299,16 @@ cg_skb_func_proto(enum bpf_func_id func_id, const struct bpf_prog *prog)
> >               return &bpf_sk_storage_delete_proto;
> >       case BPF_FUNC_perf_event_output:
> >               return &bpf_skb_event_output_proto;
> > +     case BPF_FUNC_skb_store_bytes:
> > +             return &bpf_skb_store_bytes_proto;
> > +     case BPF_FUNC_csum_update:
> > +             return &bpf_csum_update_proto;
> > +     case BPF_FUNC_csum_level:
> > +             return &bpf_csum_level_proto;
> > +     case BPF_FUNC_l3_csum_replace:
> > +             return &bpf_l3_csum_replace_proto;
> > +     case BPF_FUNC_l4_csum_replace:
> > +             return &bpf_l4_csum_replace_proto;
> >   #ifdef CONFIG_SOCK_CGROUP_DATA
> >       case BPF_FUNC_skb_cgroup_id:
> >               return &bpf_skb_cgroup_id_proto;
> 
> Do we need skb_share_check in the write helpers at these hook points when this goes beyond just reading?
> 
> Thanks,
> Daniel

Is there a difference here between the cg_skb and other function proto's that would require skb_share_check? Since these function proto's already exist for other attach types it should be fine right?




[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux