lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening PHC | |
Open Source and information security mailing list archives
| ||
|
Date: Sat, 10 May 2014 10:12:20 -0700 From: Alexander Duyck <alexander.duyck@...il.com> To: David Miller <davem@...emloft.net>, amirv@...lanox.com CC: netdev@...r.kernel.org, idos@...lanox.com, jeffrey.t.kirsher@...el.com, jesse.brandeburg@...el.com, bruce.w.allan@...el.com, carolyn.wyborny@...el.com, donald.c.skidmore@...el.com, gregory.v.rose@...el.com, alexander.h.duyck@...el.com, john.ronciak@...el.com, mitch.a.williams@...el.com, yevgenyp@...lanox.com, ogerlitz@...lanox.com Subject: Re: [PATCH net-next 1/2] net: Expose header length compution function On 05/09/2014 01:24 PM, David Miller wrote: > From: Amir Vadai <amirv@...lanox.com> > Date: Thu, 8 May 2014 15:50:33 +0300 > >> From: Ido Shamay <idos@...lanox.com> >> >> This commit exposes an header length compution generic function, >> introduced in some of Intel's Etherent drivers (igb and ixgbe), >> to net public namespace under the name __net_get_headlen, >> where it can be used by other vendors and removes code duplication. >> >> Signed-off-by: Ido Shamay <idos@...lanox.com> >> Signed-off-by: Amir Vadai <amirv@...lanox.com> > > First of all, this appears (at least to me) to duplicate a lot of > what the existing flow dissector can do. > > For example, you can probably call skb_flow_dissect() and the > filled in flow_keys has much of what you need. If it doesn't > have everything you need consider extending it. > > Even if that won't work out, you must add a detailed comment, with > kernel doc, above the declaration for this new interface in the > header file. > > I honestly still have no idea exactly what this function does and > exactly what it's trying to achieve. Actually the flow keys with the exception of maybe thoff and ip_proto are pretty much useless to us for our purpose. As is we are left to then go off and compute the header length of the transport before we get to the information we need. The two functions are very similar though. It might be worth while to actually park the two next to each other so that it is obvious that when one gets updated to support a new protocol the other should as well. So for example the headlen function could pick up some of the tunnel stuff. The main difference between __net_get_headlen() and skb_flow_dissect() is that skb_flow_dissect is meant to work on a packet headed in either direction, as such there are multiple calls to skb_copy_bits and all the copies out of the paged area that go with it. __net_get_headlen() is meant to be called by the base netdev on a linear buffer to parse through everything from the start of the Ethernet header to the start of the data section and determine the length of that region. So one obvious difference is that we care about the length of non-l4 headers, whereas skb_flow_dissect does not. Thanks, Alex -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists