Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-10 Thread David Ahern

On 7/9/15 10:56 PM, Eric W. Biederman wrote:

I have given specific areas of concern, and explained myself and you are
blowing me off.


You have not had answered my question with any additional details or 
code references -- ie., a specific example. Asking you for clarification 
and details is not blowing you off.


To recap:

Eric: With respect to sockets there is also the issue that ip addresses 
are not per vrf.


David: IP addresses are per interface and interfaces are uniquely 
assigned to a VRF so why do you think IP addresses are not per VRF?


Eric: I have read large swaths of the linux networking code over the 
years. Further I was thinking more about non-local addresses ip 
addresses, but I would not be surprised if there are also issues with 
local addresses.


David: Well, if someone has a specific example I'll take a look.

So, let me try this again: All of the IPv4 and IPv6 addresses I am aware 
of are held in structs linked to a specific netdevice. Can you give me a 
specific example of what you mean here? I can't respond to your feedback 
based on the little information you have given me.




Besides the fragment reassembly and xfrm there are things like the
ineetpeer cache.


noted.




   Which means things like packet fragmentation reassembly
can easily do the wrong thing.  Similarly things like the xfrm for ipsec
tunnels are not hooked into this mix.

So I really do not see how this VRF/MRF thing as designed can support
general purpose sockets.  I am not certain it can correctly support any
kind of socket except perhaps SOCK_RAW.


Sockets bound to the VRF device work properly. Why do you think they won't?


Because there are many locations in the network stack (like fragment
reassembly) that make the assumption that ip addresses are unique and
do not bother looking at network device or anything else.  If fragments
manage to come into play I don't expect it would be hard to poision a
connections with fragments from another routing domain with overlapping
ip addresses.


If that is true it is a problem with the networking stack today and is
completely independent of this VRF proposal.


Not at all.  It is required functionality for reassembly of ip fragments
when the packets come in via different paths.  This is required to
support multi-path ip reception.

This only becomes a bug in the scenario you have proposed.


Can you please point to a specific line in one of these patches that 
impacts fragmentation?


This patch -- patch 3 -- adds a VRF driver. It has not mucked with 
packets at all.


Patch 4 (again I have a better split in a forthcoming revision) tweaks a 
few places in the IPv4 stack with respect to socket lookups (dif 
modified) and FIB table lookups (specifying a table to use or tweaking 
oif/iif).


Since the VRF device has not touched the packet and does not introduce a 
tunnel how has its use/existence impacted fragmentation?


I do plan tests to include ipsec for example and fragmentation; it's a 
matter of time. If you have suggestions on a setup/test case I should 
include please let me know.


David
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-09 Thread David Ahern

Hi Sowmini:

On 7/8/15 12:34 PM, Sowmini Varadhan wrote:

Perhaps I misunderstand the design proposal here, but a switch's VRF
is essentially just a separate routing table, whose input and output interfaces
are exclusively bound to the VRF.


yes, and this model follows that.



Can an application in the model above get visibiltiy into the (enslaved?)
interfaces in the vrf?


yes. e.g., 'ip link show' prints the vrf device it is enslaved to:

6: swp3: BROADCAST,MULTICAST,SLAVE mtu 1500 qdisc noop master vrf10 
state DOWN mode DEFAULT group default qlen 1000

link/ether 52:54:00:12:35:03 brd ff:ff:ff:ff:ff:ff
7: swp4: BROADCAST,MULTICAST,SLAVE mtu 1500 qdisc noop master vrf10 
state DOWN mode DEFAULT group default qlen 1000

link/ether 52:54:00:12:35:04 brd ff:ff:ff:ff:ff:ff
8: swp5: BROADCAST,MULTICAST,SLAVE mtu 1500 qdisc noop master vrf10 
state DOWN mode DEFAULT group default qlen 1000

link/ether 52:54:00:12:35:05 brd ff:ff:ff:ff:ff:ff
9: swp6: BROADCAST,MULTICAST,SLAVE mtu 1500 qdisc noop master vrf10 
state DOWN mode DEFAULT group default qlen 1000




Can an application use IP_PKTINFO to send a packet out of
a specific interface on a selected VRF? What about receiving
IP_PKTINFO about input interface?


On the to-do list to use cmsg to specify a VRF for outbound packets 
using non-connected sockets. I do not believe it is going to work, but 
need to look into it.



What about setting ipsec policy for interfaces in the vrf?



similarly, need to look at ipsec use cases with this vrf model.

David
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-09 Thread Sowmini Varadhan
On Thu, Jul 9, 2015 at 7:19 PM, David Ahern d...@cumulusnetworks.com wrote:

 On the to-do list to use cmsg to specify a VRF for outbound packets using
 non-connected sockets. I do not believe it is going to work, but need to
 look into it.

 What about setting ipsec policy for interfaces in the vrf?

From a purely parochial standpoint, how would rds sockets work in this model?
Would the tcp encaps happen before or after the the vrf driver output?
Same problem for NFS.

From a non-parochial standpoint. There are a *lot* of routing apps that 
actually
need more visibility into many details about the slave interface: e.g., OSPF,
ARP snoop, IPSLA.. the list is pretty long.

I think it's a bad idea to use a driver to represent a table lookup. Too many
hacks will become necessary.

--Sowmini
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-09 Thread Eric W. Biederman
David Ahern d...@cumulusnetworks.com writes:

 On 7/9/15 9:55 PM, Eric W. Biederman wrote:
 IP addresses are per interface and interfaces are uniquely assigned to
 a VRF so why do you think IP addresses are not per VRF?

 I have read large swaths of the linux networking code over the years.

 Further I was thinking more about non-local addresses ip addresses, but
 I would not be surprised if there are also issues with local addresses.

 Well, if someone has a specific example I'll take a look.

I have given specific areas of concern, and explained myself and you are
blowing me off.

Besides the fragment reassembly and xfrm there are things like the
ineetpeer cache.

   Which means things like packet fragmentation reassembly
 can easily do the wrong thing.  Similarly things like the xfrm for ipsec
 tunnels are not hooked into this mix.

 So I really do not see how this VRF/MRF thing as designed can support
 general purpose sockets.  I am not certain it can correctly support any
 kind of socket except perhaps SOCK_RAW.

 Sockets bound to the VRF device work properly. Why do you think they won't?

 Because there are many locations in the network stack (like fragment
 reassembly) that make the assumption that ip addresses are unique and
 do not bother looking at network device or anything else.  If fragments
 manage to come into play I don't expect it would be hard to poision a
 connections with fragments from another routing domain with overlapping
 ip addresses.

 If that is true it is a problem with the networking stack today and is
 completely independent of this VRF proposal.

Not at all.  It is required functionality for reassembly of ip fragments
when the packets come in via different paths.  This is required to
support multi-path ip reception.

This only becomes a bug in the scenario you have proposed.

Eric
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-09 Thread David Ahern

On 7/9/15 7:36 PM, Eric W. Biederman wrote:

Sowmini Varadhan sowmin...@gmail.com writes:


On Thu, Jul 9, 2015 at 7:19 PM, David Ahern d...@cumulusnetworks.com wrote:


On the to-do list to use cmsg to specify a VRF for outbound packets using
non-connected sockets. I do not believe it is going to work, but need to
look into it.


What about setting ipsec policy for interfaces in the vrf?


 From a purely parochial standpoint, how would rds sockets work in this model?
Would the tcp encaps happen before or after the the vrf driver output?
Same problem for NFS.

 From a non-parochial standpoint. There are a *lot* of routing apps that 
actually
need more visibility into many details about the slave interface: e.g., OSPF,
ARP snoop, IPSLA.. the list is pretty long.

I think it's a bad idea to use a driver to represent a table lookup. Too many
hacks will become necessary.


With respect to sockets there is also the issue that ip addresses are
not per vrf.


IP addresses are per interface and interfaces are uniquely assigned to a 
VRF so why do you think IP addresses are not per VRF?



 Which means things like packet fragmentation reassembly
can easily do the wrong thing.  Similarly things like the xfrm for ipsec
tunnels are not hooked into this mix.

So I really do not see how this VRF/MRF thing as designed can support
general purpose sockets.  I am not certain it can correctly support any
kind of socket except perhaps SOCK_RAW.


Sockets bound to the VRF device work properly. Why do you think they won't?



Which strongly suggests to me you can leave off the magic network device
and simply add the fib_lookup logic that finds the base fib table by
looking at the in coming network device.  That seems a whole lot simpler
and a whole lot less surprising.  The better routing will work and
people playing with sockets will clearly see the dangers.


I believe Hannes is looking at that approach. Hopefully patches will be 
available soon to have more meaningful conversations (e.g., LPC). As we 
move along with working patch sets we can compare and contrast the 2 
models -- what features do each enable and at what cost.


David
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-09 Thread Sowmini Varadhan
On Fri, Jul 10, 2015 at 4:39 AM, David Ahern d...@cumulusnetworks.com wrote:

 If I set the VRF context (ie., set the SO_BINDTODEVICE for all sockets) of
 any RDS, NFS or any other socket app it runs in that VRF context and works
 just fine

What if the application wants to do SO_BINDTODEVICE?
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-09 Thread David Ahern

On 7/9/15 9:28 PM, Sowmini Varadhan wrote:

On Fri, Jul 10, 2015 at 4:39 AM, David Ahern d...@cumulusnetworks.com wrote:


If I set the VRF context (ie., set the SO_BINDTODEVICE for all sockets) of
any RDS, NFS or any other socket app it runs in that VRF context and works
just fine


What if the application wants to do SO_BINDTODEVICE?



We have knowledge of both -- vrf master and vrf slave. Do the checks 
from local up ... is there a socket bound to slave device? If yes, 
match. If no, check for socket bound to master (VRF device). If yes, 
match. If no, check global (only works for connected sockets).


David
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-09 Thread David Ahern

On 7/9/15 9:55 PM, Eric W. Biederman wrote:

IP addresses are per interface and interfaces are uniquely assigned to
a VRF so why do you think IP addresses are not per VRF?


I have read large swaths of the linux networking code over the years.

Further I was thinking more about non-local addresses ip addresses, but
I would not be surprised if there are also issues with local addresses.


Well, if someone has a specific example I'll take a look.




  Which means things like packet fragmentation reassembly
can easily do the wrong thing.  Similarly things like the xfrm for ipsec
tunnels are not hooked into this mix.

So I really do not see how this VRF/MRF thing as designed can support
general purpose sockets.  I am not certain it can correctly support any
kind of socket except perhaps SOCK_RAW.


Sockets bound to the VRF device work properly. Why do you think they won't?


Because there are many locations in the network stack (like fragment
reassembly) that make the assumption that ip addresses are unique and
do not bother looking at network device or anything else.  If fragments
manage to come into play I don't expect it would be hard to poision a
connections with fragments from another routing domain with overlapping
ip addresses.


If that is true it is a problem with the networking stack today and is 
completely independent of this VRF proposal.




I guess if we are talking about SO_BINDTODEVICE which requires
CAP_NET_RAW we aren't really talking ordinary applications so there is
already a big helping of buyer beware.

Still a blanket statement that sockets just work and there is nothing
to be concerned about is just wrong.


If you have examples of something that does not work I will be happy to 
look into it. As it stands I have a growing suite of test cases where my 
comment is true.


David

--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-09 Thread Eric W. Biederman
Sowmini Varadhan sowmin...@gmail.com writes:

 On Thu, Jul 9, 2015 at 7:19 PM, David Ahern d...@cumulusnetworks.com wrote:

 On the to-do list to use cmsg to specify a VRF for outbound packets using
 non-connected sockets. I do not believe it is going to work, but need to
 look into it.

 What about setting ipsec policy for interfaces in the vrf?

 From a purely parochial standpoint, how would rds sockets work in this model?
 Would the tcp encaps happen before or after the the vrf driver output?
 Same problem for NFS.

 From a non-parochial standpoint. There are a *lot* of routing apps that 
 actually
 need more visibility into many details about the slave interface: e.g., 
 OSPF,
 ARP snoop, IPSLA.. the list is pretty long.

 I think it's a bad idea to use a driver to represent a table lookup. Too 
 many
 hacks will become necessary.

With respect to sockets there is also the issue that ip addresses are
not per vrf.  Which means things like packet fragmentation reassembly
can easily do the wrong thing.  Similarly things like the xfrm for ipsec
tunnels are not hooked into this mix.

So I really do not see how this VRF/MRF thing as designed can support
general purpose sockets.  I am not certain it can correctly support any
kind of socket except perhaps SOCK_RAW.

Which strongly suggests to me you can leave off the magic network device
and simply add the fib_lookup logic that finds the base fib table by
looking at the in coming network device.  That seems a whole lot simpler
and a whole lot less surprising.  The better routing will work and
people playing with sockets will clearly see the dangers.

Eric
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-09 Thread David Ahern

On 7/9/15 11:28 AM, Sowmini Varadhan wrote:

On Thu, Jul 9, 2015 at 7:19 PM, David Ahern d...@cumulusnetworks.com wrote:


On the to-do list to use cmsg to specify a VRF for outbound packets using
non-connected sockets. I do not believe it is going to work, but need to
look into it.


What about setting ipsec policy for interfaces in the vrf?


 From a purely parochial standpoint, how would rds sockets work in this model?
Would the tcp encaps happen before or after the the vrf driver output?
Same problem for NFS.


If I set the VRF context (ie., set the SO_BINDTODEVICE for all sockets) 
of any RDS, NFS or any other socket app it runs in that VRF context and 
works just fine.




 From a non-parochial standpoint. There are a *lot* of routing apps that 
actually
need more visibility into many details about the slave interface: e.g., OSPF,
ARP snoop, IPSLA.. the list is pretty long.

I think it's a bad idea to use a driver to represent a table lookup. Too many
hacks will become necessary.


Most of the changes needed to the networking stack are to address which 
table is used for FIB lookups. The stack has a strong preference to the 
local and main tables. I have a new patch set which better explains 
patch 4 in this version. I'll send it out in the next few days, but you 
can get a preview here:


  https://github.com/dsahern/linux.git, vrf-dev-4.1-v2 branch

David

--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-09 Thread Eric W. Biederman
David Ahern d...@cumulusnetworks.com writes:

 On 7/9/15 7:36 PM, Eric W. Biederman wrote:
 Sowmini Varadhan sowmin...@gmail.com writes:

 On Thu, Jul 9, 2015 at 7:19 PM, David Ahern d...@cumulusnetworks.com 
 wrote:

 On the to-do list to use cmsg to specify a VRF for outbound packets using
 non-connected sockets. I do not believe it is going to work, but need to
 look into it.

 What about setting ipsec policy for interfaces in the vrf?

  From a purely parochial standpoint, how would rds sockets work in this 
 model?
 Would the tcp encaps happen before or after the the vrf driver output?
 Same problem for NFS.

  From a non-parochial standpoint. There are a *lot* of routing apps that 
 actually
 need more visibility into many details about the slave interface: e.g., 
 OSPF,
 ARP snoop, IPSLA.. the list is pretty long.

 I think it's a bad idea to use a driver to represent a table lookup. Too 
 many
 hacks will become necessary.

 With respect to sockets there is also the issue that ip addresses are
 not per vrf.

 IP addresses are per interface and interfaces are uniquely assigned to
 a VRF so why do you think IP addresses are not per VRF?

I have read large swaths of the linux networking code over the years.

Further I was thinking more about non-local addresses ip addresses, but
I would not be surprised if there are also issues with local addresses.

  Which means things like packet fragmentation reassembly
 can easily do the wrong thing.  Similarly things like the xfrm for ipsec
 tunnels are not hooked into this mix.

 So I really do not see how this VRF/MRF thing as designed can support
 general purpose sockets.  I am not certain it can correctly support any
 kind of socket except perhaps SOCK_RAW.

 Sockets bound to the VRF device work properly. Why do you think they won't?

Because there are many locations in the network stack (like fragment
reassembly) that make the assumption that ip addresses are unique and
do not bother looking at network device or anything else.  If fragments
manage to come into play I don't expect it would be hard to poision a
connections with fragments from another routing domain with overlapping
ip addresses.

I guess if we are talking about SO_BINDTODEVICE which requires
CAP_NET_RAW we aren't really talking ordinary applications so there is
already a big helping of buyer beware.

Still a blanket statement that sockets just work and there is nothing
to be concerned about is just wrong.

Eric
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-08 Thread Nicolas Dichtel

Le 06/07/2015 17:03, David Ahern a écrit :

This driver borrows heavily from IPvlan and teaming drivers.

Routing domains (VRF-lite) are created by instantiating a device
and enslaving all routed interfaces that participate in the domain.
As part of the enslavement, all local routes pointing to enslaved
devices are re-pointed to the vrf device, thus forcing outgoing
sockets to bind to the vrf to function.

Standard FIB rules can then bind the VRF device to tables and regular
fib rule processing is followed.

Routed traffic through the box, is fwded by using the VRF device as
the IIF and following the IIF rule to a table which is mated with
the VRF.

Locally originated traffic is directed at the VRF device using
SO_BINDTODEVICE or cmsg headers. This in turn drops the packet into
the xmit function of the vrf driver, which then completes the ip lookup
and output.

This solution is completely orthogonal to namespaces and allow the L3
equivalent of vlans to exist allowing the routing space to be
partitioned.

Example:

Create vrf 1:
  ip link add vrf1 type vrf table 5
  ip rule add iif vrf1 table 5
  ip rule add oif vrf1 table 5
  ip route add table 5 prohibit default
  ip link set vrf1 up

Add interface to vrf 1:
  ip link set eth1 master vrf1

Signed-off-by: Shrijeet Mukherjee s...@cumulusnetworks.com
Signed-off-by: David Ahern d...@cumulusnetworks.com

v2:
- addressed comments from first RFC
- significant changes to improve simplicity of implementation
---
  drivers/net/Kconfig  |   7 +
  drivers/net/Makefile |   1 +
  drivers/net/vrf.c| 486 +++
  include/net/vrf.h|  71 
  4 files changed, 565 insertions(+)
  create mode 100644 drivers/net/vrf.c
  create mode 100644 include/net/vrf.h

diff --git a/drivers/net/Kconfig b/drivers/net/Kconfig
index 019fceffc9e5..b040aa233408 100644
--- a/drivers/net/Kconfig
+++ b/drivers/net/Kconfig
@@ -283,6 +283,13 @@ config NLMON
  diagnostics, etc. This is mostly intended for developers or support
  to debug netlink issues. If unsure, say N.

+config NET_VRF
+   tristate Virtual Routing and Forwarding (Lite)
+   depends on IP_MULTIPLE_TABLES  IPV6_MULTIPLE_TABLES
+   ---help---
+  This option enables the support for mapping interfaces into VRF's. 
The
+  support enables VRF devices

   
nit: use tab instead space for the last two lines.


+
  endif # NET_CORE

  config SUNGEM_PHY
diff --git a/drivers/net/Makefile b/drivers/net/Makefile
index c12cb22478a7..ca16dd689b36 100644
--- a/drivers/net/Makefile
+++ b/drivers/net/Makefile
@@ -25,6 +25,7 @@ obj-$(CONFIG_VIRTIO_NET) += virtio_net.o
  obj-$(CONFIG_VXLAN) += vxlan.o
  obj-$(CONFIG_GENEVE) += geneve.o
  obj-$(CONFIG_NLMON) += nlmon.o
+obj-$(CONFIG_NET_VRF) += vrf.o

  #
  # Networking Drivers
diff --git a/drivers/net/vrf.c b/drivers/net/vrf.c
new file mode 100644
index ..b9f9ae68388d
--- /dev/null
+++ b/drivers/net/vrf.c
@@ -0,0 +1,487 @@
+/*
+ * vrf.c: device driver to encapsulate a VRF space
+ *
+ * Copyright (c) 2015 Cumulus Networks
+ *
+ * Based on dummy, team and ipvlan drivers
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ */
+
+#include linux/module.h
+#include linux/kernel.h
+#include linux/netdevice.h
+#include linux/etherdevice.h
+#include linux/ip.h
+#include linux/init.h
+#include linux/moduleparam.h
+#include linux/rtnetlink.h
+#include net/rtnetlink.h
+#include net/arp.h
+#include linux/u64_stats_sync.h
+#include linux/hashtable.h
+
+#include linux/inetdevice.h
+#include net/ip.h
+#include net/ip_fib.h
+#include net/ip6_route.h
+#include net/rtnetlink.h
+#include net/route.h
+#include net/addrconf.h
+#include net/vrf.h
+
+#define DRV_NAME   vrf
+#define DRV_VERSION1.0
+
+#define vrf_is_slave(dev)   ((dev)-flags  IFF_SLAVE)
+#define vrf_is_master(dev)  ((dev)-flags  IFF_MASTER)
+
+#define vrf_master_get_rcu(dev) \
+   ((struct net_device *)rcu_dereference(dev-rx_handler_data))
+
+struct pcpu_dstats {
+   u64 tx_pkts;
+   u64 tx_bytes;
+   u64 tx_drps;
+   u64 rx_pkts;
+   u64 rx_bytes;
+   struct u64_stats_sync   syncp;
+};

Why not using 'struct pcpu_sw_netstats' (dev-tstats), like most virtual
interfaces? Not sure that it's really needed to have tx_drps per cpu (and
I don't see anyone using it into this patch).


+
+struct slave {
+   struct list_headlist;
+   struct net_device   *dev;
+   longpriority;
+};
+
+struct slave_queue {
+   spinlock_t  lock; /* lock for slave insert/delete */
+   struct list_headall_slaves;
+   int  

Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-08 Thread Sowmini Varadhan
On Mon, Jul 6, 2015 at 5:03 PM, David Ahern d...@cumulusnetworks.com wrote:
 This driver borrows heavily from IPvlan and teaming drivers.

 Routing domains (VRF-lite) are created by instantiating a device
 and enslaving all routed interfaces that participate in the domain.
 As part of the enslavement, all local routes pointing to enslaved
 devices are re-pointed to the vrf device, thus forcing outgoing
 sockets to bind to the vrf to function.

 Standard FIB rules can then bind the VRF device to tables and regular
 fib rule processing is followed.

Perhaps I misunderstand the design proposal here, but a switch's VRF
is essentially just a separate routing table, whose input and output interfaces
are exclusively bound to the VRF.

Can an application in the model above get visibiltiy into the (enslaved?)
interfaces in the vrf? Can an application use IP_PKTINFO to send a packet out of
a specific interface on a selected VRF? What about receiving
IP_PKTINFO about input interface?
What about setting ipsec policy for interfaces in the vrf?

 Routed traffic through the box, is fwded by using the VRF device as
 the IIF and following the IIF rule to a table which is mated with
 the VRF.

 Locally originated traffic is directed at the VRF device using
 SO_BINDTODEVICE or cmsg headers. This in turn drops the packet into
 the xmit function of the vrf driver, which then completes the ip lookup
 and output.

 This solution is completely orthogonal to namespaces and allow the L3
 equivalent of vlans to exist allowing the routing space to be
 partitioned.
--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-08 Thread David Ahern

On 7/8/15 3:27 AM, Nicolas Dichtel wrote:

+
+struct pcpu_dstats {
+u64tx_pkts;
+u64tx_bytes;
+u64tx_drps;
+u64rx_pkts;
+u64rx_bytes;
+struct u64_stats_syncsyncp;
+};

Why not using 'struct pcpu_sw_netstats' (dev-tstats), like most virtual
interfaces? Not sure that it's really needed to have tx_drps per cpu (and
I don't see anyone using it into this patch).


Alex asked the same question on the first RFC. Shrijeet had opinions on 
why this version versus netdev's. Shrijeet?


-8-


+/* queue-lock must be held */
+static void __vrf_insert_slave(struct slave_queue *queue, struct
slave *slave,
+   struct net_device *master)
+{
+struct slave *duplicate_slave = NULL;
+
+duplicate_slave = __vrf_find_slave_dev(queue, slave-dev);
+if (duplicate_slave)
+__vrf_kill_slave(queue, duplicate_slave);

I miss the point here. Why removing the slave if it is already there?


not sure. I'll investigate.




+
+dev_hold(slave-dev);
+list_add(slave-list, queue-all_slaves);
+queue-num_slaves++;
+}
+
+/* netlink lock is assumed here */

ASSERT_RTNL()?


done.




+static int vrf_add_slave(struct net_device *dev,
+ struct net_device *port_dev)
+{
+if (!dev || !port_dev || dev_net(dev) != dev_net(port_dev))
+return -ENODEV;
+
+if (!vrf_is_master(port_dev)  !vrf_is_slave(port_dev)) {
+struct slave *s = kzalloc(sizeof(*s), GFP_KERNEL);
+struct net_vrf *vrf = netdev_priv(dev);
+struct slave_queue *queue = vrf-queue;
+bool is_running = netif_running(port_dev);
+unsigned int flags = port_dev-flags;
+int ret;
+
+if (!s)
+return -ENOMEM;
+
+s-dev = port_dev;
+
+spin_lock_bh(queue-lock);
+__vrf_insert_slave(queue, s, dev);
+spin_unlock_bh(queue-lock);
+
+port_dev-vrf_ptr = kmalloc(sizeof(*port_dev-vrf_ptr),
+GFP_KERNEL);
+if (!port_dev-vrf_ptr)
+return -ENOMEM;
+
+port_dev-vrf_ptr-ifindex = dev-ifindex;
+port_dev-vrf_ptr-tb_id = vrf-tb_id;
+
+/* register the packet handler for slave ports */
+ret = netdev_rx_handler_register(port_dev, vrf_handle_frame,
+ (void *)dev);

So, it won't be possible to add a slave which already has a
macvlan or ipvlan (or team?) interface registered.



Shrijeet, thoughts?

-8-


+
+static struct rtnl_link_ops vrf_link_ops __read_mostly = {
+.kind= DRV_NAME,
+.priv_size  = sizeof(struct net_vrf),

nit: tabs ^^

+
+.get_size   = vrf_nl_getsize,

nit: tabs^^^

+.policy = vrf_nl_policy,

nit: tabs  ^

+.validate= vrf_validate,
+.fill_info  = vrf_fillinfo,

nit: tabs ^^

+
+.newlink= vrf_newlink,

nit: tabs   

+.dellink= vrf_dellink,

nit: tabs   

+.setup= vrf_setup,
+.maxtype= IFLA_VRF_MAX,

nit: tabs   

+};


ACK on all tab comments; fixed. Ditto for bool on is_tx_frame.

-8-


+#if IS_ENABLED(CONFIG_NET_VRF)
+static inline int vrf_master_dev_idx(const struct net_device *dev)
+{
+int idx = 0;
+
+if (dev  dev-vrf_ptr)
+idx = dev-vrf_ptr-ifindex;
+
+return idx;
+}
+
+static inline int vrf_get_master_dev_idx(struct net *net, int idx)

ifindex instead idx for the whole file?


done.

Thanks for the review.

David

PS. comments addressed while consuming a croque-monsieur (my daughter 
just returned from a European trip; loves the sandwich)

--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-06 Thread Nicolas Dichtel

Le 06/07/2015 17:03, David Ahern a écrit :

This driver borrows heavily from IPvlan and teaming drivers.

Routing domains (VRF-lite) are created by instantiating a device
and enslaving all routed interfaces that participate in the domain.
As part of the enslavement, all local routes pointing to enslaved
devices are re-pointed to the vrf device, thus forcing outgoing
sockets to bind to the vrf to function.

Standard FIB rules can then bind the VRF device to tables and regular
fib rule processing is followed.

Routed traffic through the box, is fwded by using the VRF device as
the IIF and following the IIF rule to a table which is mated with
the VRF.

Locally originated traffic is directed at the VRF device using
SO_BINDTODEVICE or cmsg headers. This in turn drops the packet into
the xmit function of the vrf driver, which then completes the ip lookup
and output.

This solution is completely orthogonal to namespaces and allow the L3
equivalent of vlans to exist allowing the routing space to be
partitioned.

Example:

Create vrf 1:
  ip link add vrf1 type vrf table 5
  ip rule add iif vrf1 table 5
  ip rule add oif vrf1 table 5
  ip route add table 5 prohibit default
  ip link set vrf1 up

Add interface to vrf 1:
  ip link set eth1 master vrf1

Signed-off-by: Shrijeet Mukherjee s...@cumulusnetworks.com
Signed-off-by: David Ahern d...@cumulusnetworks.com

v2:
- addressed comments from first RFC
- significant changes to improve simplicity of implementation

History should be put after the '---'.


---

ie here.


  drivers/net/Kconfig  |   7 +
  drivers/net/Makefile |   1 +
  drivers/net/vrf.c| 486 +++
  include/net/vrf.h|  71 
  4 files changed, 565 insertions(+)
  create mode 100644 drivers/net/vrf.c
  create mode 100644 include/net/vrf.h

--
To unsubscribe from this list: send the line unsubscribe netdev in
the body of a message to majord...@vger.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html


Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-06 Thread David Ahern

On 7/6/15 10:37 AM, Nikolay Aleksandrov wrote:

+static int vrf_add_slave(struct net_device *dev,
+struct net_device *port_dev)
+{
+   if (!dev || !port_dev || dev_net(dev) != dev_net(port_dev))
+   return -ENODEV;
+
+   if (!vrf_is_master(port_dev)  !vrf_is_slave(port_dev)) {
+   struct slave *s = kzalloc(sizeof(*s), GFP_KERNEL);
+   struct net_vrf *vrf = netdev_priv(dev);
+   struct slave_queue *queue = vrf-queue;
+   bool is_running = netif_running(port_dev);
+   unsigned int flags = port_dev-flags;
+   int ret;
+
+   if (!s)
+   return -ENOMEM;
+
+   s-dev = port_dev;
+
+   spin_lock_bh(queue-lock);
+   __vrf_insert_slave(queue, s, dev);
+   spin_unlock_bh(queue-lock);
+
+   port_dev-vrf_ptr = kmalloc(sizeof(*port_dev-vrf_ptr),
+   GFP_KERNEL);
+   if (!port_dev-vrf_ptr)
+   return -ENOMEM;

 ^
I believe you'll have a slave in the list with inconsistent state which could
even lead to null ptr derefernce if vrf_ptr is used, also __vrf_insert_slave
does dev_hold so the dev refcnt will be incorrect as well.


Right. Good catch, will fix.




+
+   port_dev-vrf_ptr-ifindex = dev-ifindex;
+   port_dev-vrf_ptr-tb_id = vrf-tb_id;
+
+   /* register the packet handler for slave ports */
+   ret = netdev_rx_handler_register(port_dev, vrf_handle_frame,
+(void *)dev);
+   if (ret) {
+   netdev_err(port_dev,
+  Device %s failed to register rx_handler\n,
+  port_dev-name);
+   kfree(port_dev-vrf_ptr);
+   kfree(s);
+   return ret;

 ^^
The slave is being freed while on the list here, device's refcnt will be wrong 
etc.


ack. Will fix.




+   }
+
+   if (is_running) {
+   ret = dev_change_flags(port_dev, flags  ~IFF_UP);
+   if (ret  0)
+   goto out_fail;
+   }
+
+   ret = netdev_master_upper_dev_link(port_dev, dev);
+   if (ret  0)
+   goto out_fail;
+
+   if (is_running) {
+   ret = dev_change_flags(port_dev, flags);
+   if (ret  0)
+   goto out_fail;
+   }
+
+   port_dev-flags |= IFF_SLAVE;
+
+   return 0;
+
+out_fail:
+   spin_lock_bh(queue-lock);
+   __vrf_kill_slave(queue, s);
+   spin_unlock_bh(queue-lock);


__vrf_kill_slave() doesn't do upper device unlink and the device can be linked
if we fail in the dev_change_flags above.


will fix.




+
+   return ret;
+   }
+
+   return -EINVAL;
+}


In my opinion the structure of the above function should change to something 
more
straightforward with proper exit labels and cleanup upon failure, also a level 
of
indentation can be avoided.


Sure. The indentation comes after the pointer checks so locals can be 
intialized when declared. Will work on the clean up/simplification for 
next rev.





+
+static int vrf_del_slave(struct net_device *dev,
+struct net_device *port_dev)
+{
+   struct net_vrf *vrf = netdev_priv(dev);
+   struct slave_queue *queue = vrf-queue;
+   struct slave *slave = __vrf_find_slave_dev(queue, port_dev);
+   bool is_running = netif_running(port_dev);
+   unsigned int flags = port_dev-flags;
+   int ret = 0;


ret seems unused/unchecked in this function


It is used but not checked. I struggled with what to do on the error 
path. Do we want netdev_err() on a failure?





+
+   if (!slave)
+   return -EINVAL;
+
+   if (is_running)
+   ret = dev_change_flags(port_dev, flags  ~IFF_UP);
+
+   spin_lock_bh(queue-lock);
+   __vrf_kill_slave(queue, slave);
+   spin_unlock_bh(queue-lock);
+
+   netdev_upper_dev_unlink(port_dev, dev);
+
+   if (is_running)
+   ret = dev_change_flags(port_dev, flags);
+
+   return 0;
+}
+
+static int vrf_dev_init(struct net_device *dev)
+{
+   struct net_vrf *vrf = netdev_priv(dev);
+
+   spin_lock_init(vrf-queue.lock);
+   INIT_LIST_HEAD(vrf-queue.all_slaves);
+   vrf-queue.master_dev = dev;
+
+   dev-dstats = netdev_alloc_pcpu_stats(struct pcpu_dstats);
+   dev-flags  =  IFF_MASTER | IFF_NOARP;
+   if (!dev-dstats)
+   return -ENOMEM;

 ^
nit: I'd suggest moving the check after the allocation


agreed.

David
--
To unsubscribe from this list: 

Re: [RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-06 Thread Nikolay Aleksandrov
On 07/06/2015 05:03 PM, David Ahern wrote:
 This driver borrows heavily from IPvlan and teaming drivers.
 
 Routing domains (VRF-lite) are created by instantiating a device
 and enslaving all routed interfaces that participate in the domain.
 As part of the enslavement, all local routes pointing to enslaved
 devices are re-pointed to the vrf device, thus forcing outgoing
 sockets to bind to the vrf to function.
 
 Standard FIB rules can then bind the VRF device to tables and regular
 fib rule processing is followed.
 
 Routed traffic through the box, is fwded by using the VRF device as
 the IIF and following the IIF rule to a table which is mated with
 the VRF.
 
 Locally originated traffic is directed at the VRF device using
 SO_BINDTODEVICE or cmsg headers. This in turn drops the packet into
 the xmit function of the vrf driver, which then completes the ip lookup
 and output.
 
 This solution is completely orthogonal to namespaces and allow the L3
 equivalent of vlans to exist allowing the routing space to be
 partitioned.
 
 Example:
 
Create vrf 1:
  ip link add vrf1 type vrf table 5
  ip rule add iif vrf1 table 5
  ip rule add oif vrf1 table 5
  ip route add table 5 prohibit default
  ip link set vrf1 up
 
Add interface to vrf 1:
  ip link set eth1 master vrf1
 
 Signed-off-by: Shrijeet Mukherjee s...@cumulusnetworks.com
 Signed-off-by: David Ahern d...@cumulusnetworks.com
 
 v2:
 - addressed comments from first RFC
 - significant changes to improve simplicity of implementation
 ---
  drivers/net/Kconfig  |   7 +
  drivers/net/Makefile |   1 +
  drivers/net/vrf.c| 486 
 +++
  include/net/vrf.h|  71 
  4 files changed, 565 insertions(+)
  create mode 100644 drivers/net/vrf.c
  create mode 100644 include/net/vrf.h
 
 diff --git a/drivers/net/Kconfig b/drivers/net/Kconfig
 index 019fceffc9e5..b040aa233408 100644
 --- a/drivers/net/Kconfig
 +++ b/drivers/net/Kconfig
 @@ -283,6 +283,13 @@ config NLMON
 diagnostics, etc. This is mostly intended for developers or support
 to debug netlink issues. If unsure, say N.
  
 +config NET_VRF
 + tristate Virtual Routing and Forwarding (Lite)
 + depends on IP_MULTIPLE_TABLES  IPV6_MULTIPLE_TABLES
 + ---help---
 +  This option enables the support for mapping interfaces into VRF's. 
 The
 +  support enables VRF devices
 +
  endif # NET_CORE
  
  config SUNGEM_PHY
 diff --git a/drivers/net/Makefile b/drivers/net/Makefile
 index c12cb22478a7..ca16dd689b36 100644
 --- a/drivers/net/Makefile
 +++ b/drivers/net/Makefile
 @@ -25,6 +25,7 @@ obj-$(CONFIG_VIRTIO_NET) += virtio_net.o
  obj-$(CONFIG_VXLAN) += vxlan.o
  obj-$(CONFIG_GENEVE) += geneve.o
  obj-$(CONFIG_NLMON) += nlmon.o
 +obj-$(CONFIG_NET_VRF) += vrf.o
  
  #
  # Networking Drivers
 diff --git a/drivers/net/vrf.c b/drivers/net/vrf.c
 new file mode 100644
 index ..b9f9ae68388d
 --- /dev/null
 +++ b/drivers/net/vrf.c
 @@ -0,0 +1,487 @@
 +/*
 + * vrf.c: device driver to encapsulate a VRF space
 + *
 + * Copyright (c) 2015 Cumulus Networks
 + *
 + * Based on dummy, team and ipvlan drivers
 + *
 + * This program is free software; you can redistribute it and/or modify
 + * it under the terms of the GNU General Public License as published by
 + * the Free Software Foundation; either version 2 of the License, or
 + * (at your option) any later version.
 + */
 +
 +#include linux/module.h
 +#include linux/kernel.h
 +#include linux/netdevice.h
 +#include linux/etherdevice.h
 +#include linux/ip.h
 +#include linux/init.h
 +#include linux/moduleparam.h
 +#include linux/rtnetlink.h
 +#include net/rtnetlink.h
 +#include net/arp.h
 +#include linux/u64_stats_sync.h
 +#include linux/hashtable.h
 +
 +#include linux/inetdevice.h
 +#include net/ip.h
 +#include net/ip_fib.h
 +#include net/ip6_route.h
 +#include net/rtnetlink.h
 +#include net/route.h
 +#include net/addrconf.h
 +#include net/vrf.h
 +
 +#define DRV_NAME vrf
 +#define DRV_VERSION  1.0
 +
 +#define vrf_is_slave(dev)   ((dev)-flags  IFF_SLAVE)
 +#define vrf_is_master(dev)  ((dev)-flags  IFF_MASTER)
 +
 +#define vrf_master_get_rcu(dev) \
 + ((struct net_device *)rcu_dereference(dev-rx_handler_data))
 +
 +struct pcpu_dstats {
 + u64 tx_pkts;
 + u64 tx_bytes;
 + u64 tx_drps;
 + u64 rx_pkts;
 + u64 rx_bytes;
 + struct u64_stats_sync   syncp;
 +};
 +
 +struct slave {
 + struct list_headlist;
 + struct net_device   *dev;
 + longpriority;
 +};
 +
 +struct slave_queue {
 + spinlock_t  lock; /* lock for slave insert/delete */
 + struct list_headall_slaves;
 + int num_slaves;
 + struct net_device   *master_dev;
 +};
 +
 +struct net_vrf {
 + struct slave_queue  queue;
 + struct fib_table

[RFC net-next 3/6] net: Introduce VRF device driver - v2

2015-07-06 Thread David Ahern
This driver borrows heavily from IPvlan and teaming drivers.

Routing domains (VRF-lite) are created by instantiating a device
and enslaving all routed interfaces that participate in the domain.
As part of the enslavement, all local routes pointing to enslaved
devices are re-pointed to the vrf device, thus forcing outgoing
sockets to bind to the vrf to function.

Standard FIB rules can then bind the VRF device to tables and regular
fib rule processing is followed.

Routed traffic through the box, is fwded by using the VRF device as
the IIF and following the IIF rule to a table which is mated with
the VRF.

Locally originated traffic is directed at the VRF device using
SO_BINDTODEVICE or cmsg headers. This in turn drops the packet into
the xmit function of the vrf driver, which then completes the ip lookup
and output.

This solution is completely orthogonal to namespaces and allow the L3
equivalent of vlans to exist allowing the routing space to be
partitioned.

Example:

   Create vrf 1:
 ip link add vrf1 type vrf table 5
 ip rule add iif vrf1 table 5
 ip rule add oif vrf1 table 5
 ip route add table 5 prohibit default
 ip link set vrf1 up

   Add interface to vrf 1:
 ip link set eth1 master vrf1

Signed-off-by: Shrijeet Mukherjee s...@cumulusnetworks.com
Signed-off-by: David Ahern d...@cumulusnetworks.com

v2:
- addressed comments from first RFC
- significant changes to improve simplicity of implementation
---
 drivers/net/Kconfig  |   7 +
 drivers/net/Makefile |   1 +
 drivers/net/vrf.c| 486 +++
 include/net/vrf.h|  71 
 4 files changed, 565 insertions(+)
 create mode 100644 drivers/net/vrf.c
 create mode 100644 include/net/vrf.h

diff --git a/drivers/net/Kconfig b/drivers/net/Kconfig
index 019fceffc9e5..b040aa233408 100644
--- a/drivers/net/Kconfig
+++ b/drivers/net/Kconfig
@@ -283,6 +283,13 @@ config NLMON
  diagnostics, etc. This is mostly intended for developers or support
  to debug netlink issues. If unsure, say N.
 
+config NET_VRF
+   tristate Virtual Routing and Forwarding (Lite)
+   depends on IP_MULTIPLE_TABLES  IPV6_MULTIPLE_TABLES
+   ---help---
+  This option enables the support for mapping interfaces into VRF's. 
The
+  support enables VRF devices
+
 endif # NET_CORE
 
 config SUNGEM_PHY
diff --git a/drivers/net/Makefile b/drivers/net/Makefile
index c12cb22478a7..ca16dd689b36 100644
--- a/drivers/net/Makefile
+++ b/drivers/net/Makefile
@@ -25,6 +25,7 @@ obj-$(CONFIG_VIRTIO_NET) += virtio_net.o
 obj-$(CONFIG_VXLAN) += vxlan.o
 obj-$(CONFIG_GENEVE) += geneve.o
 obj-$(CONFIG_NLMON) += nlmon.o
+obj-$(CONFIG_NET_VRF) += vrf.o
 
 #
 # Networking Drivers
diff --git a/drivers/net/vrf.c b/drivers/net/vrf.c
new file mode 100644
index ..b9f9ae68388d
--- /dev/null
+++ b/drivers/net/vrf.c
@@ -0,0 +1,487 @@
+/*
+ * vrf.c: device driver to encapsulate a VRF space
+ *
+ * Copyright (c) 2015 Cumulus Networks
+ *
+ * Based on dummy, team and ipvlan drivers
+ *
+ * This program is free software; you can redistribute it and/or modify
+ * it under the terms of the GNU General Public License as published by
+ * the Free Software Foundation; either version 2 of the License, or
+ * (at your option) any later version.
+ */
+
+#include linux/module.h
+#include linux/kernel.h
+#include linux/netdevice.h
+#include linux/etherdevice.h
+#include linux/ip.h
+#include linux/init.h
+#include linux/moduleparam.h
+#include linux/rtnetlink.h
+#include net/rtnetlink.h
+#include net/arp.h
+#include linux/u64_stats_sync.h
+#include linux/hashtable.h
+
+#include linux/inetdevice.h
+#include net/ip.h
+#include net/ip_fib.h
+#include net/ip6_route.h
+#include net/rtnetlink.h
+#include net/route.h
+#include net/addrconf.h
+#include net/vrf.h
+
+#define DRV_NAME   vrf
+#define DRV_VERSION1.0
+
+#define vrf_is_slave(dev)   ((dev)-flags  IFF_SLAVE)
+#define vrf_is_master(dev)  ((dev)-flags  IFF_MASTER)
+
+#define vrf_master_get_rcu(dev) \
+   ((struct net_device *)rcu_dereference(dev-rx_handler_data))
+
+struct pcpu_dstats {
+   u64 tx_pkts;
+   u64 tx_bytes;
+   u64 tx_drps;
+   u64 rx_pkts;
+   u64 rx_bytes;
+   struct u64_stats_sync   syncp;
+};
+
+struct slave {
+   struct list_headlist;
+   struct net_device   *dev;
+   longpriority;
+};
+
+struct slave_queue {
+   spinlock_t  lock; /* lock for slave insert/delete */
+   struct list_headall_slaves;
+   int num_slaves;
+   struct net_device   *master_dev;
+};
+
+struct net_vrf {
+   struct slave_queue  queue;
+   struct fib_table*tb;
+   u32 tb_id;
+};
+
+static int is_ip_rx_frame(struct sk_buff *skb)
+{
+   switch (skb-protocol) {
+   case