lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <20250103153143.GF26854@ziepe.ca>
Date: Fri, 3 Jan 2025 11:31:43 -0400
From: Jason Gunthorpe <jgg@...pe.ca>
To: Zelong Yue <yuezelong@...edance.com>
Cc: leon@...nel.org, linux-rdma@...r.kernel.org,
	linux-kernel@...r.kernel.org
Subject: Re: [RFC] RDMA/core: Fix IPv6 loopback dst MAC address lookup logic

On Thu, Nov 28, 2024 at 05:21:42PM +0800, Zelong Yue wrote:

> 1. IPv6 addresses must be in the same subnet
> 2. The 'local' routing table must have lower priority than our custom policy
> routes
> 3. When IPv6 addresses are in different subnets, enabling RDMA loopback
> breaks TCP loopback
>    functionality unless packet forwarding is enabled (which isn't feasible
> in our DC
>    environment). We're still investigating a more elegant solution that
> wouldn't require
>    packet forwarding or impact TCP loopback functionality.

What do you mean by packet forwarding?

For multi-NIC RDMA loopback to work the network must forward packets
externally from one NIC to another. Internal-to-the-node loopback is
not possible. If that forwarding works for RDMA I would expect it to
work for TCP too.

For single-NIC, I believe you can use lo to trigger an internal NIC
RDMA loopback as well.

In all cases TCP and RDMA traffic should be aligned, otherwise it
becomes impossible to use normal IP tools to debug the RDMA traffic.

> Given that RDMA loopback has different requirements from TCP/UDP
> loopback, maybe they should follow distinct routing logic.

It cannot, things must be consisent.

Jason

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ