Re: [PATCH net 04/10] bpf: offload: move offload device validation out to the drivers

2017-11-19 Thread Jiri Pirko
Mon, Nov 20, 2017 at 05:55:16AM CET, jakub.kicin...@netronome.com wrote:
>With TC shared block changes we can't depend on correct netdev
>pointer being available in cls_bpf.  Move the device validation
>to the driver.  Core will only make sure that offloaded programs
>are always attached in the driver (or in HW by the driver).  We
>trust that drivers which implement offload callbacks will perform
>necessary checks.
>
>Moving the checks to the driver is generally a useful thing,
>in practice the check should be against a switchdev instance,
>not a netdev, given that most ASICs will probably allow using
>the same program on many ports.
>
>Signed-off-by: Jakub Kicinski 
>Reviewed-by: Quentin Monnet 
>Acked-by: Alexei Starovoitov 
>Acked-by: Daniel Borkmann 

Acked-by: Jiri Pirko 


[PATCH net 04/10] bpf: offload: move offload device validation out to the drivers

2017-11-19 Thread Jakub Kicinski
With TC shared block changes we can't depend on correct netdev
pointer being available in cls_bpf.  Move the device validation
to the driver.  Core will only make sure that offloaded programs
are always attached in the driver (or in HW by the driver).  We
trust that drivers which implement offload callbacks will perform
necessary checks.

Moving the checks to the driver is generally a useful thing,
in practice the check should be against a switchdev instance,
not a netdev, given that most ASICs will probably allow using
the same program on many ports.

Signed-off-by: Jakub Kicinski 
Reviewed-by: Quentin Monnet 
Acked-by: Alexei Starovoitov 
Acked-by: Daniel Borkmann 
---
 drivers/net/ethernet/netronome/nfp/bpf/offload.c | 10 --
 include/linux/bpf.h  |  4 ++--
 kernel/bpf/syscall.c | 23 ---
 net/core/dev.c   |  7 ++-
 net/sched/cls_bpf.c  |  8 +++-
 5 files changed, 27 insertions(+), 25 deletions(-)

diff --git a/drivers/net/ethernet/netronome/nfp/bpf/offload.c 
b/drivers/net/ethernet/netronome/nfp/bpf/offload.c
index b6cee71f49d3..bc879aeb62d4 100644
--- a/drivers/net/ethernet/netronome/nfp/bpf/offload.c
+++ b/drivers/net/ethernet/netronome/nfp/bpf/offload.c
@@ -214,8 +214,14 @@ int nfp_net_bpf_offload(struct nfp_net *nn, struct 
bpf_prog *prog,
 {
int err;
 
-   if (prog && !prog->aux->offload)
-   return -EINVAL;
+   if (prog) {
+   struct bpf_dev_offload *offload = prog->aux->offload;
+
+   if (!offload)
+   return -EINVAL;
+   if (offload->netdev != nn->dp.netdev)
+   return -EINVAL;
+   }
 
if (prog && old_prog) {
u8 cap;
diff --git a/include/linux/bpf.h b/include/linux/bpf.h
index c397934f91dd..f82be640731e 100644
--- a/include/linux/bpf.h
+++ b/include/linux/bpf.h
@@ -336,7 +336,7 @@ extern const struct bpf_verifier_ops xdp_analyzer_ops;
 struct bpf_prog *bpf_prog_get(u32 ufd);
 struct bpf_prog *bpf_prog_get_type(u32 ufd, enum bpf_prog_type type);
 struct bpf_prog *bpf_prog_get_type_dev(u32 ufd, enum bpf_prog_type type,
-  struct net_device *netdev);
+  bool attach_drv);
 struct bpf_prog * __must_check bpf_prog_add(struct bpf_prog *prog, int i);
 void bpf_prog_sub(struct bpf_prog *prog, int i);
 struct bpf_prog * __must_check bpf_prog_inc(struct bpf_prog *prog);
@@ -433,7 +433,7 @@ static inline struct bpf_prog *bpf_prog_get_type(u32 ufd,
 
 static inline struct bpf_prog *bpf_prog_get_type_dev(u32 ufd,
 enum bpf_prog_type type,
-struct net_device *netdev)
+bool attach_drv)
 {
return ERR_PTR(-EOPNOTSUPP);
 }
diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c
index 8e9d065bb7cd..38da55905ab0 100644
--- a/kernel/bpf/syscall.c
+++ b/kernel/bpf/syscall.c
@@ -1057,22 +1057,23 @@ struct bpf_prog *bpf_prog_inc_not_zero(struct bpf_prog 
*prog)
 }
 EXPORT_SYMBOL_GPL(bpf_prog_inc_not_zero);
 
-static bool bpf_prog_can_attach(struct bpf_prog *prog,
-   enum bpf_prog_type *attach_type,
-   struct net_device *netdev)
+static bool bpf_prog_get_ok(struct bpf_prog *prog,
+   enum bpf_prog_type *attach_type, bool attach_drv)
 {
-   struct bpf_dev_offload *offload = prog->aux->offload;
+   /* not an attachment, just a refcount inc, always allow */
+   if (!attach_type)
+   return true;
 
if (prog->type != *attach_type)
return false;
-   if (offload && offload->netdev != netdev)
+   if (bpf_prog_is_dev_bound(prog->aux) && !attach_drv)
return false;
 
return true;
 }
 
 static struct bpf_prog *__bpf_prog_get(u32 ufd, enum bpf_prog_type 
*attach_type,
-  struct net_device *netdev)
+  bool attach_drv)
 {
struct fd f = fdget(ufd);
struct bpf_prog *prog;
@@ -1080,7 +1081,7 @@ static struct bpf_prog *__bpf_prog_get(u32 ufd, enum 
bpf_prog_type *attach_type,
prog = bpf_prog_get(f);
if (IS_ERR(prog))
return prog;
-   if (attach_type && !bpf_prog_can_attach(prog, attach_type, netdev)) {
+   if (!bpf_prog_get_ok(prog, attach_type, attach_drv)) {
prog = ERR_PTR(-EINVAL);
goto out;
}
@@ -1093,12 +1094,12 @@ static struct bpf_prog *__bpf_prog_get(u32 ufd, enum 
bpf_prog_type *attach_type,
 
 struct bpf_prog *bpf_prog_get(u32 ufd)
 {
-   return __bpf_prog_get(ufd, NULL, NULL);
+   return __bpf_prog_get(ufd, NULL, false);
 }
 
 struct bpf_prog *bpf_prog_get_type(u32 ufd, enum bpf_prog