From: Andrew Melnichenko <andrew@daynix.com>
To: Jason Wang <jasowang@redhat.com>
Cc: "Daniel P. Berrangé" <berrange@redhat.com>,
"Michael S . Tsirkin" <mst@redhat.com>,
qemu-devel@nongnu.org, "Markus Armbruster" <armbru@redhat.com>,
"Yuri Benditovich" <yuri.benditovich@daynix.com>,
"Yan Vugenfirer" <yan@daynix.com>,
"Eric Blake" <eblake@redhat.com>
Subject: Re: [RFC PATCH 0/5] ebpf: Added ebpf helper for libvirtd.
Date: Fri, 18 Jun 2021 23:03:02 +0300 [thread overview]
Message-ID: <CABcq3pEXZGoRPGQPB1b1Tb_rDEg5aMFCB+CELAyOjDCyTS1FTQ@mail.gmail.com> (raw)
In-Reply-To: <CABcq3pEec6f+ohA6SCn7iFAbromrvWgyS8Tjz6+iHZ-fa2OQxw@mail.gmail.com>
[-- Attachment #1: Type: text/plain, Size: 6574 bytes --]
Hi Jason,
I've checked "kernel.unprivileged_bpf_disabled=0" on Fedora, Ubuntu, and
Debian - no need permissions to update BPF maps.
On Wed, Jun 16, 2021 at 1:18 AM Andrew Melnichenko <andrew@daynix.com>
wrote:
> Hi,
>
>> I may miss something.
>>
>> But RSS requires to update the map. This won't work if you don't grant
>> any permission to qemu.
>>
>> Thanks
>>
>
> Partly - with "kernel.unprivileged_bpf_disabled=0" capabilities is not
> required to update maps.
> With "kernel.unprivileged_bpf_disabled=1" - setting maps will fail(without
> CAP_BPF) and "in-qemu" RSS will be used.
>
> On Tue, Jun 15, 2021 at 12:13 PM Jason Wang <jasowang@redhat.com> wrote:
>
>>
>> 在 2021/6/12 上午12:49, Andrew Melnichenko 写道:
>> > Hi,
>> >
>> > So I think the series is for unprivileged_bpf disabled. If I'm not
>> > wrong, I guess the policy is to grant CAP_BPF but do fine grain
>> > checks
>> > via LSM.
>> >
>> >
>> > The main idea is to run eBPF RSS with qemu without any permission.
>> > Libvirt should handle everything and pass proper eBPF file descriptors.
>> > For current eBPF RSS, CAP_SYS_ADMIN(bypass some limitations)
>> > also required, and in the future may be other permissions.
>>
>>
>> I may miss something.
>>
>> But RSS requires to update the map. This won't work if you don't grant
>> any permission to qemu.
>>
>> Thanks
>>
>>
>> >
>> > I'm not sure this is the best. We have several examples that let
>> > libvirt
>> > to involve. Examples:
>> >
>> > 1) create TAP device (and the TUN_SETIFF)
>> >
>> > 2) open vhost devices
>> >
>> >
>> > Technically TAP/vhost not related to a particular qemu emulator. So
>> common
>> > TAP creation should fit any modern qemu. eBPF fds(program and maps)
>> should
>> > suit the interface for current qemu, g.e. some qemu builds may have
>> > different map
>> > structures or their count. It's necessary that the qemu got fds
>> > prepared by the helper
>> > that was built with the qemu.
>> >
>> > I think we need an example on the detail steps for how libvirt is
>> > expected to use this.
>> >
>> >
>> > The simplified workflow looks like this:
>> >
>> > 1. Libvirt got "emulator" from domain document.
>> > 2. Libvirt queries for qemu capabilities.
>> > 3. One of the capabilities is "qemu-ebpf-rss-helper" path(if present).
>> > 4. On NIC preparation Libvirt checks for virtio-net + rss
>> configurations.
>> > 5. If required, the "qemu-ebpf-rss-helper" called and fds are
>> > received through unix fd.
>> > 6. Those fds are for eBPF RSS, which passed to child process - qemu.
>> > 7. Qemu launched with virtio-net-pci property "rss" and "ebpf_rss_fds".
>> >
>> >
>> > On Fri, Jun 11, 2021 at 8:36 AM Jason Wang <jasowang@redhat.com
>> > <mailto:jasowang@redhat.com>> wrote:
>> >
>> >
>> > 在 2021/6/10 下午2:55, Yuri Benditovich 写道:
>> > > On Thu, Jun 10, 2021 at 9:41 AM Jason Wang<jasowang@redhat.com
>> > <mailto:jasowang@redhat.com>> wrote:
>> > >> 在 2021/6/9 下午6:04, Andrew Melnychenko 写道:
>> > >>> Libvirt usually launches qemu with strict permissions.
>> > >>> To enable eBPF RSS steering, qemu-ebpf-rss-helper was added.
>> > >> A silly question:
>> > >>
>> > >> Kernel had the following permission checks in bpf syscall:
>> > >>
>> > >> if (sysctl_unprivileged_bpf_disabled && !bpf_capable())
>> > >> return -EPERM;
>> > >> ...
>> > >>
>> > >> err = security_bpf(cmd, &attr, size);
>> > >> if (err < 0)
>> > >> return err;
>> > >>
>> > >> So if I understand the code correctly, bpf syscall can only be
>> > done if:
>> > >>
>> > >> 1) unprivileged_bpf is enabled or
>> > >> 2) has the capability and pass the LSM checks
>> > >>
>> > >> So I think the series is for unprivileged_bpf disabled. If I'm
>> not
>> > >> wrong, I guess the policy is to grant CAP_BPF but do fine grain
>> > checks
>> > >> via LSM.
>> > >>
>> > >> If this is correct, need to describe it in the commit log.
>> > >>
>> > >>
>> > >>> Added property "ebpf_rss_fds" for "virtio-net" that allows to
>> > >>> initialize eBPF RSS context with passed program & maps fds.
>> > >>>
>> > >>> Added qemu-ebpf-rss-helper - simple helper that loads eBPF
>> > >>> context and passes fds through unix socket.
>> > >>> Libvirt should call the helper and pass fds to qemu through
>> > >>> "ebpf_rss_fds" property.
>> > >>>
>> > >>> Added explicit target OS check for libbpf dependency in meson.
>> > >>> eBPF RSS works only with Linux TAP, so there is no reason to
>> > >>> build eBPF loader/helper for non-Linux.
>> > >>>
>> > >>> Overall, libvirt process should not be aware of the "interface"
>> > >>> of eBPF RSS, it will not be aware of eBPF maps/program "type"
>> and
>> > >>> their quantity.
>> > >> I'm not sure this is the best. We have several examples that
>> > let libvirt
>> > >> to involve. Examples:
>> > >>
>> > >> 1) create TAP device (and the TUN_SETIFF)
>> > >>
>> > >> 2) open vhost devices
>> > >>
>> > >>
>> > >>> That's why qemu and the helper should be from
>> > >>> the same build and be "synchronized". Technically each qemu may
>> > >>> have its own helper. That's why "query-helper-paths" qmp command
>> > >>> was added. Qemu should return the path to the helper that suits
>> > >>> and libvirt should use "that" helper for "that" emulator.
>> > >>>
>> > >>> qmp sample:
>> > >>> C: { "execute": "query-helper-paths" }
>> > >>> S: { "return": [
>> > >>> {
>> > >>> "name": "qemu-ebpf-rss-helper",
>> > >>> "path": "/usr/local/libexec/qemu-ebpf-rss-helper"
>> > >>> }
>> > >>> ]
>> > >>> }
>> > >> I think we need an example on the detail steps for how libvirt is
>> > >> expected to use this.
>> > > The preliminary patches for libvirt are at
>> > > https://github.com/daynix/libvirt/tree/RSSv1
>> > <https://github.com/daynix/libvirt/tree/RSSv1>
>> >
>> >
>> > Will have a look but it would be better if the assumption of the
>> > management is detailed here to ease the reviewers.
>> >
>> > Thanks
>> >
>> >
>> > >
>> >
>>
>>
[-- Attachment #2: Type: text/html, Size: 9518 bytes --]
next prev parent reply other threads:[~2021-06-18 20:04 UTC|newest]
Thread overview: 31+ messages / expand[flat|nested] mbox.gz Atom feed top
2021-06-09 10:04 [RFC PATCH 0/5] ebpf: Added ebpf helper for libvirtd Andrew Melnychenko
2021-06-09 10:04 ` [RFC PATCH 1/5] ebpf: Added eBPF initialization by fds Andrew Melnychenko
2021-06-09 10:04 ` [RFC PATCH 2/5] virtio-net: Added property to load eBPF RSS with fds Andrew Melnychenko
2021-06-09 10:04 ` [RFC PATCH 3/5] ebpf_rss_helper: Added helper for eBPF RSS Andrew Melnychenko
2021-06-09 10:04 ` [RFC PATCH 4/5] qmp: Added qemu-ebpf-rss-path command Andrew Melnychenko
2021-06-11 14:15 ` Eric Blake
2021-06-11 17:21 ` Daniel P. Berrangé
2021-06-12 5:28 ` Markus Armbruster
2021-06-15 23:16 ` Andrew Melnichenko
2021-07-05 13:50 ` Andrew Melnichenko
2021-06-09 10:04 ` [RFC PATCH 5/5] meson: libbpf dependency now exclusively for Linux Andrew Melnychenko
2021-06-10 6:41 ` [RFC PATCH 0/5] ebpf: Added ebpf helper for libvirtd Jason Wang
2021-06-10 6:55 ` Yuri Benditovich
2021-06-11 5:36 ` Jason Wang
2021-06-11 16:49 ` Andrew Melnichenko
2021-06-11 17:24 ` Daniel P. Berrangé
2021-06-15 9:13 ` Jason Wang
2021-06-15 22:18 ` Andrew Melnichenko
2021-06-18 20:03 ` Andrew Melnichenko [this message]
2021-06-21 9:20 ` Jason Wang
2021-06-22 3:29 ` Yuri Benditovich
2021-06-22 4:58 ` Jason Wang
2021-06-22 8:25 ` Toke Høiland-Jørgensen
2021-06-22 8:27 ` Daniel P. Berrangé
2021-06-22 9:09 ` Toke Høiland-Jørgensen
2021-06-22 13:01 ` Andrew Melnichenko
2021-06-22 13:17 ` Toke Høiland-Jørgensen
2021-06-23 0:47 ` Jason Wang
2021-06-28 11:18 ` Yuri Benditovich
2021-06-29 3:39 ` Jason Wang
2021-06-30 16:40 ` Andrew Melnichenko
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=CABcq3pEXZGoRPGQPB1b1Tb_rDEg5aMFCB+CELAyOjDCyTS1FTQ@mail.gmail.com \
--to=andrew@daynix.com \
--cc=armbru@redhat.com \
--cc=berrange@redhat.com \
--cc=eblake@redhat.com \
--cc=jasowang@redhat.com \
--cc=mst@redhat.com \
--cc=qemu-devel@nongnu.org \
--cc=yan@daynix.com \
--cc=yuri.benditovich@daynix.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).