[Devel] [PATCH RH9 00/20] part 20 modules autoload

2021-10-08 Thread Kirill Tkhai
--- Andrey Ryabinin (2): ve/kmod/whitelist: Allow ip6tables_raw modules autoload upon request from CT ve/kmod/whitelist: Allow nf_tables module autoloading on request from CT Cyrill Gorcunov (1): ve/kmod/whitelist: Add modules to whitelist for c/r sake Kirill Tkhai (2):

[Devel] [PATCH RH9 01/20] ve/sysctl/kmod: Introduce tweak to allow indirect modules load from CT

2021-10-08 Thread Kirill Tkhai
From: Konstantin Khorenko Introduce "kernel.ve_allow_module_load" sysctl to allow (1) / deny (0) indorect kernel modules load upon requests from inside Containers. Indirect modules "autoload" set enabled by default. https://jira.sw.ru/browse/PSBM-127787 Signed-off-by: Konstantin Khorenko ---

[Devel] [PATCH RH9 03/20] ve/kmod: Honor modprobe blacklist on indirect modules autoload from CT

2021-10-08 Thread Kirill Tkhai
From: Konstantin Khorenko If a kernel modules is requested indirectly from inside a Container, check is this modules is blacklisted on the Node first. https://jira.sw.ru/browse/PSBM-127787 Signed-off-by: Konstantin Khorenko Signed-off-by: Kirill Tkhai --- kernel/kmod.c | 25 +++

[Devel] [PATCH RH9 04/20] commit 04248b3ff00d

2021-10-08 Thread Kirill Tkhai
From: Konstantin Khorenko ve/kmod/whitelist: Allow iptables/netfilter modules for autoload from CT For now following modules are allowed by default to be autoloaded upon indirect request from inside a Container: * iptables/ip6tables core modules * netfilters core modules (including nf_tables_in

[Devel] [PATCH RH9 02/20] ve/kmod/whitelist: Infrustructure for list of modules to autoload from CT

2021-10-08 Thread Kirill Tkhai
From: Konstantin Khorenko https://jira.sw.ru/browse/PSBM-127787 It's a port of following vz7 commits: * 3a4142e ("ve/kmod: Port autoloading from CT") (partially) * 8af13e7c ("ve/kmod: list of allowed to autoload in CT modules") (partially) Signed-off-by: Konstantin Kho

[Devel] [PATCH RH9 05/20] commit da8c1e2262f8

2021-10-08 Thread Kirill Tkhai
From: Konstantin Khorenko ve/kmod/whitelist: List of allowed to autoload in CT modules (non-netfilters) Following non-netfilter modules are allowed to be autoloaded from inside a CT: * binfmt_misc * fs-overlay It's port of vz7 commits: * 8af13e7c ("ve/kmod: list o

[Devel] [PATCH RH9 08/20] ve/kmod/whitelist: Enable vxlan module autoload from inside a Container

2021-10-08 Thread Kirill Tkhai
From: Pavel Tikhomirov vxlan is safe in CT as: 1) Udp multicast socket to connect to outer word sits in creation net- namespace, and these socket can get packets only forwarded/routed in creation ns. 2) Vxlan device is owned by second netns(could be same as first) as any other network device, s

[Devel] [PATCH RH9 07/20] ve/kmod/whitelist: Allow dummy module autoloading

2021-10-08 Thread Kirill Tkhai
From: Pavel Tikhomirov After allowing dummy devices in container in bug PSBM-43329 by commit 6061ed860950 ("ve/net/dummy: enable support in a container") docker-ui testcase TestDaemonIP was unXFAIed but it still fails to create dummy because module is not automaticly loaded in rtnl_newlink: ip l

[Devel] [PATCH RH9 06/20] ve/kmod/whitelist: Add modules to whitelist for c/r sake

2021-10-08 Thread Kirill Tkhai
From: Cyrill Gorcunov When doing checpoint/restore during migration we use netlink sockets with diag functionality to fetch various information we need. In particular when restoring on the machine where say netfilter modules are not loaded we fail with | [root@s175 ~]# less /vz/dump/rst-iVS9OC-

[Devel] [PATCH RH9 14/20] ve/kmod/whitelist: Allow conntrack nft-helper-* modules autoloading

2021-10-08 Thread Kirill Tkhai
Otherwise, in case of destination node does not have modules loaded, CT migration fails. https://jira.sw.ru/browse/PSBM-90319 Signed-off-by: Kirill Tkhai (cherry picked from vz7 commit c92758e6ea45 ("net: Allow autoloading conntrack nft-helper-* modules")) Signed-off-by: Konstantin Khorenko

[Devel] [PATCH RH9 11/20] ve/kmod/whitelist: Allow ip6tables_raw modules autoload upon request from CT

2021-10-08 Thread Kirill Tkhai
From: Andrey Ryabinin Currently autoloading of the ip6table_raw module is forbidden from container, leading to: ip6tables-restore v1.4.21: ip6tables-restore: unable to initialize table 'raw' If use of ip6tables is allowed in container, autoloading of the ip6tables_raw has to be permitted a

[Devel] [PATCH RH9 12/20] ve/kmod/whitelist: Allow NFS modules autoload in Containers

2021-10-08 Thread Kirill Tkhai
From: Stanislav Kinsburskiy Otherwise Container online migration can fail. https://jira.sw.ru/browse/PSBM-58178 Signed-off-by: Stanislav Kinsburskiy Reviewed-by: Dmitry Safonov (cherry picked from vz7 commit d6e47c05b868 ("ve/modules: allow NFS modules autoload in Containers")) Signed-off-

[Devel] [PATCH RH9 09/20] ve/kmod/whitelist: Allow IPVS modules autoload in CT

2021-10-08 Thread Kirill Tkhai
From: Pavel Tikhomirov we still need to add ip_vs module in /etc/modules-load.d/vz.conf to be able to use ipvs in CT, all other modules are request_module'ed from ip_vs. https://jira.sw.ru/browse/PSBM-63883 Signed-off-by: Pavel Tikhomirov Reviewed-by: Andrew Vagin (cherry picked from vz7 comm

[Devel] [PATCH RH9 10/20] ve/kmod/whitelist: Allow netfilter/ipset modules autoload from inside a CT

2021-10-08 Thread Kirill Tkhai
From: Pavel Tikhomirov I forgot to allow in CT autoload of needed modules, so do: ip_set_list_set ip_set_hash_netiface ip_set_hash_ipportnet ip_set_hash_netport ip_set_hash_net ip_set_hash_ipportip ip_set_hash_ipport ip_set_hash_ip ip_set_bitmap_port ip_set_bitmap_ipmac ip_set_bitmap_ip ip_set h

[Devel] [PATCH RH9 16/20] ve/kmod/whitelist: Allow nf_tables module autoloading on request from CT

2021-10-08 Thread Kirill Tkhai
From: Andrey Ryabinin Allow nf_tables.ko module autloading from CT. Needed for iptables in centos 8. https://jira.sw.ru/browse/PSBM-98211 Signed-off-by: Andrey Ryabinin (cherry picked from vz7 commit 18c67099330a ("ve/kmod, nf_tables: allow nf_tables.ko autoloading on request from ve.")) Sign

[Devel] [PATCH RH9 20/20] ve/kmod/whitelist: Make fib modules autoloadable from CT

2021-10-08 Thread Kirill Tkhai
From: Pavel Tikhomirov Need it for docker Docker nat rules c/r in nft based environment. https://jira.sw.ru/browse/PSBM-125002 Signed-off-by: Pavel Tikhomirov ve/kmod: fix misprint in fib modules autoload allow rules When testing criu to suspend resume "fib" rules I found out that we ha

[Devel] [PATCH RH9 18/20] ve/kmod/whitelist: Enable autoload for iptables security tables from inside CT

2021-10-08 Thread Kirill Tkhai
From: Vasily Averin Patch enables autoload of iptable_security and ip6table_security from inside containers. It decreases number of errors generated during firewalld start. https://jira.sw.ru/browse/PSBM-98212 Signed-by: Vasily Averin (cherry picked from vz7 commit 77a471044478 ("ve/kmod: en

[Devel] [PATCH RH9 15/20] ve/kmod/whitelist: Allow ts_kmp module autoloading

2021-10-08 Thread Kirill Tkhai
Otherwise rules like below can't applied from inside CT, when the module is not loaded. $iptables -I FORWARD -m string --string "xx" --algo kmp --to 65535 -j DROP https://jira.sw.ru/browse/PSBM-97729 Signed-off-by: Kirill Tkhai (cherry picked from vz7 commit 2e3b2c332d41 ("ve/modules: Add

[Devel] [PATCH RH9 17/20] ve/kmod/whitelist: Allow "nft_compat" module autoload from inside a Container

2021-10-08 Thread Kirill Tkhai
From: Konstantin Khorenko A Container with CentOS 8 inside uses nft by default and iptables work in a legacy mode, for that "nft_compat" is required, so allow its autoload. [CT]# iptables -A INPUT -m tos --tos Minimize-Cost -j REJECT iptables v1.8.2 (nf_tables): Couldn't load match `t

[Devel] [PATCH RH9 13/20] ve/kmod/whitelist: Allow nfnetlink_queue module autoload from CT

2021-10-08 Thread Kirill Tkhai
From: Konstantin Khorenko + "nfnetlink-subsys-3", /* NFNL_SUBSYS_QUEUE */ https://jira.sw.ru/browse/PSBM-92694 Signed-off-by: Konstantin Khorenko (cherry picked from vz7 commit 588834a3e83f ("ve/netfilter/ipset: allow nfnetlink_queue module autoload")) Signed-off-by: Konstan

[Devel] [PATCH RH9 19/20] ve/kmod/whitelist: make nfnetlink_log autoloadable upon request from a CT

2021-10-08 Thread Kirill Tkhai
From: Pavel Tikhomirov We see that k8s_weave-npc container fails with: Thu Oct 29 09:19:53 2020 <5> ulogd.c:981 building new pluginstance stack: 'log1:NFLOG,base1:BASE,pcap1:PCAP' Thu Oct 29 09:19:53 2020 <7> ulogd_inppkt_NFLOG.c:552 unable to bind to log group 86 Thu Oct 29 09:19:53 2020 <7>

Re: [Devel] [PATCH RH9 0/8] part 29 vtty: vz console

2021-10-08 Thread Kirill Tkhai
On 07.10.2021 18:18, Cyrill Gorcunov wrote: > Hi! Here is a ported vtty series, build and boot tested only obviously. > I think we might revisit this code and rework more deeply once we manage > to run containers inside so I would be able to manipulate vtty console > from userspace level. > > http

Re: [Devel] [PATCH RH9 00/20] part 20 modules autoload

2021-10-08 Thread Kirill Tkhai
commited On 08.10.2021 12:50, Kirill Tkhai wrote: > --- > > Andrey Ryabinin (2): > ve/kmod/whitelist: Allow ip6tables_raw modules autoload upon request > from CT > ve/kmod/whitelist: Allow nf_tables module autoloading on request from CT > > Cyrill Gorcunov (1): > ve/kmod/white