[RFC PATCH 0/4] block/bpf: add eBPF based block layer IO filtering
Thread information
[Search the bpf archive]
Leah Rumancik [this message] ` [RFC PATCH 1/4] bpf: add new prog_type BPF_PROG_TYPE_IO_FILTER Leah Rumancik ` Martin KaFai Lau ` Leah Rumancik ` Bob Liu ` Alexei Starovoitov ` Leah Rumancik ` Alexei Starovoitov ` Leah Rumancik ` Leah Rumancik ` Bob Liu ` Jakub Sitnicki ` Leah Rumancik ` [RFC PATCH 2/4] bpf: add protect_gpt sample program Leah Rumancik ` Martin KaFai Lau ` Leah Rumancik ` [RFC PATCH 3/4] bpf: add eBPF IO filter documentation Leah Rumancik ` Bart Van Assche ` Jonathan Corbet ` Leah Rumancik ` [RFC PATCH 4/4] bpf: add BPF_PROG_TYPE_LSM to bpftool name array Leah Rumancik ` Bart Van Assche ` Tobias Klauser ` Leah Rumancik ` [RFC PATCH 0/4] block/bpf: add eBPF based block layer IO filtering Christoph Hellwig ` Ming Lei
| From: | Leah Rumancik <leah.rumancik-AT-gmail.com> | |
| To: | bpf-AT-vger.kernel.org, linux-block-AT-vger.kernel.org | |
| Subject: | [RFC PATCH 0/4] block/bpf: add eBPF based block layer IO filtering | |
| Date: | Wed, 12 Aug 2020 16:33:01 +0000 | |
| Message-ID: | <20200812163305.545447-1-leah.rumancik@gmail.com> | |
| Cc: | leah.rumancik-AT-gmail.com, orbekk-AT-google.com, harshads-AT-google.com, jasiu-AT-google.com, saranyamohan-AT-google.com, tytso-AT-google.com, bvanassche-AT-google.com |
This patch series adds support for a new security mechanism to filter IO
in the block layer. With this patch series, the policy for IO filtering
can be programmed into an eBPF program which gets attached to the struct
gendisk. The filter can either drop or allow IO requests. It cannot modify
requests. We do not support splitting of IOs, and we do not support
filtering of IOs that bypass submit_bio (such as SG_IO, NVMe passthrough).
At Google, we use IO filtering to prevent accidental modification of data.
To facilitate this functionality, a new eBPF program type,
BPF_PROG_TYPE_IO_FILTER, and an associated attach type, BPF_BIO_SUBMIT,
have been added. The IO filter programs are invoked in submit_bio’s
make_generic_requests_check() which checks the program’s return value to
determine if the IO should be dropped or allowed. The program type can
also be used to monitor IO if the return value is always set to allow IO.
An example of an eBPF program to filter IO is provided below:
SEC("io_filter")
int run_filter(struct bpf_io_request *io_req)
{
if ( <condition to block io> )
return IO_BLOCK;
else
return IO_ALLOW;
}
This patchset was created as part of a summer internship project.
Leah Rumancik (4):
bpf: add new prog_type BPF_PROG_TYPE_IO_FILTER
bpf: add protect_gpt sample program
bpf: add eBPF IO filter documentation
bpf: add BPF_PROG_TYPE_LSM to bpftool name array
Documentation/block/bpf_io_filter.rst | 28 +++
Documentation/block/index.rst | 1 +
block/Makefile | 1 +
block/blk-bpf-io-filter.c | 209 ++++++++++++++++++
block/blk-bpf-io-filter.h | 16 ++
block/blk-core.c | 6 +
block/genhd.c | 3 +
include/linux/bpf_io_filter.h | 23 ++
include/linux/bpf_types.h | 4 +
include/linux/genhd.h | 4 +
include/uapi/linux/bpf.h | 11 +
init/Kconfig | 8 +
kernel/bpf/syscall.c | 9 +
kernel/bpf/verifier.c | 1 +
samples/bpf/Makefile | 3 +
samples/bpf/protect_gpt_kern.c | 21 ++
samples/bpf/protect_gpt_user.c | 133 +++++++++++
tools/bpf/bpftool/feature.c | 2 +
tools/bpf/bpftool/main.h | 3 +
tools/include/uapi/linux/bpf.h | 11 +
tools/lib/bpf/libbpf.c | 2 +
tools/lib/bpf/libbpf_probes.c | 1 +
.../selftests/bpf/prog_tests/section_names.c | 5 +
23 files changed, 505 insertions(+)
create mode 100644 Documentation/block/bpf_io_filter.rst
create mode 100644 block/blk-bpf-io-filter.c
create mode 100644 block/blk-bpf-io-filter.h
create mode 100644 include/linux/bpf_io_filter.h
create mode 100644 samples/bpf/protect_gpt_kern.c
create mode 100644 samples/bpf/protect_gpt_user.c
--
2.28.0.236.gb10cc79966-goog
