[dpdk-dev] [PATCH v1] net/tap: fix eBPF handling of non-RSS flows
Ophir Munk
ophirmu at mellanox.com
Sun Feb 4 00:34:13 CET 2018
eBPF classifier (section "cls_q" in tap_bpf_program.c) is looking for
marked packets whose skb->cb[1] contains an RSS queue number and redirects
those packets to the matched queue.
It is expected that skb->cb[1] has been previously set with a valid RSS
queue number during an eBPF action (section "l3_l4" in tap_bpf_program.c),
however for non-RSS flows skb->cb[1] may contain a random unset value which
can falsely be interpreted as a valid RSS queue.
To avoid this potential error, tap_bpf_program.c has been updated as
follows:
1. After calculating the RSS queue number it is added a unique offset
in order to uniquely identify it as a valid RSS queue number.
2. After matching an RSS queue to a packet - skb->cb[1] is set to 0
Fixes: cdc07e83bb24 ("net/tap: add eBPF program file")
Fixes: aabe70df73a3 ("net/tap: add eBPF bytes code")
Signed-off-by: Ophir Munk <ophirmu at mellanox.com>
---
drivers/net/tap/tap_bpf_insns.h | 23 +++++++++++++----------
drivers/net/tap/tap_bpf_program.c | 5 ++++-
2 files changed, 17 insertions(+), 11 deletions(-)
diff --git a/drivers/net/tap/tap_bpf_insns.h b/drivers/net/tap/tap_bpf_insns.h
index c406f78..89873b6 100644
--- a/drivers/net/tap/tap_bpf_insns.h
+++ b/drivers/net/tap/tap_bpf_insns.h
@@ -6,17 +6,20 @@
/* bpf_insn array matching cls_q section. See tap_bpf_program.c file */
struct bpf_insn cls_q_insns[] = {
- {0x61, 1, 1, 52, 0x00000000},
- {0x18, 2, 0, 0, 0xdeadbeef},
+ {0x61, 2, 1, 52, 0x00000000},
+ {0x18, 3, 0, 0, 0xdeadbeef},
{0x00, 0, 0, 0, 0x00000000},
- {0x63, 10, 2, -4, 0x00000000},
- {0x61, 2, 10, -4, 0x00000000},
- {0x07, 2, 0, 0, 0x00000001},
- {0x67, 2, 0, 0, 0x00000020},
- {0x77, 2, 0, 0, 0x00000020},
- {0xb7, 0, 0, 0, 0xffffffff},
- {0x1d, 1, 2, 1, 0x00000000},
+ {0x63, 10, 3, -4, 0x00000000},
{0xb7, 0, 0, 0, 0x00000000},
+ {0x61, 3, 10, -4, 0x00000000},
+ {0x07, 3, 0, 0, 0x7cafe800},
+ {0x67, 3, 0, 0, 0x00000020},
+ {0x77, 3, 0, 0, 0x00000020},
+ {0x5d, 2, 3, 4, 0x00000000},
+ {0xb7, 2, 0, 0, 0x00000000},
+ {0x63, 1, 2, 52, 0x00000000},
+ {0x18, 0, 0, 0, 0xffffffff},
+ {0x00, 0, 0, 0, 0x00000000},
{0x95, 0, 0, 0, 0x00000000},
};
@@ -1685,7 +1688,7 @@ struct bpf_insn l3_l4_hash_insns[] = {
{0x4f, 3, 2, 0, 0x00000000},
{0x67, 3, 0, 0, 0x00000010},
{0x4f, 3, 1, 0, 0x00000000},
- {0x07, 3, 0, 0, 0x00000001},
+ {0x07, 3, 0, 0, 0x7cafe800},
{0x63, 5, 3, 52, 0x00000000},
{0xb7, 7, 0, 0, 0x00000001},
{0xbf, 0, 7, 0, 0x00000000},
diff --git a/drivers/net/tap/tap_bpf_program.c b/drivers/net/tap/tap_bpf_program.c
index 848c50b..64dcdb8 100644
--- a/drivers/net/tap/tap_bpf_program.c
+++ b/drivers/net/tap/tap_bpf_program.c
@@ -31,7 +31,7 @@
* The queue number is offset by 1, to distinguish packets that have
* gone through this rule (skb->cb[1] != 0) from others.
*/
-#define QUEUE_OFFSET 1
+#define QUEUE_OFFSET 0x7cafe800
#define PIN_GLOBAL_NS 2
#define KEY_IDX 0
@@ -63,6 +63,9 @@ match_q(struct __sk_buff *skb)
if (queue != match_queue)
return TC_ACT_OK;
+
+ /* queue match */
+ skb->cb[1] = 0;
return TC_ACT_UNSPEC;
}
--
2.7.4
More information about the dev
mailing list