[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20150521174336.GA6771@obsidianresearch.com>
Date: Thu, 21 May 2015 11:43:36 -0600
From: Jason Gunthorpe <jgunthorpe@...idianresearch.com>
To: Haggai Eran <haggaie@...lanox.com>
Cc: Doug Ledford <dledford@...hat.com>, linux-rdma@...r.kernel.org,
netdev@...r.kernel.org, Liran Liss <liranl@...lanox.com>,
Guy Shapiro <guysh@...lanox.com>,
Shachar Raindel <raindel@...lanox.com>,
Yotam Kenneth <yotamke@...lanox.com>,
"Hefty, Sean" <sean.hefty@...el.com>
Subject: Re: [PATCH v4 for-next 04/12] IB/ipoib: Return IPoIB devices
matching connection parameters
On Thu, May 21, 2015 at 08:33:53AM +0300, Haggai Eran wrote:
> To create a new child interface on the default P_Key, its possible to
> use iproute:
> # ip link add link ib0 name ib0.1 type ipoib
Uh..
A key invariant of the IP stack is that is it possible to uniquely
identify the ingress device.
So the above scheme is fine for IPoIB, because it uses the interface
unique QPN to uniquely ID the netdevice: (Device,Port,Pkey,QPN)
is the unique ID tuple. The world is happy.
But RDMA CM doesn't provide the QPN. So when RDMA CM searches the
netdevs for an address it cannot *uniquely* map to a IPoIB interface.
This is bad, and *completely wrong*, but today, nobody is going to
really notice or care. The cases where it does something you don't
want are not very significant.
But with containers.. Think this through for a minute: 'In some cases
the RDMA CM selecs the wrong child' - that goes from being a minor
annoyance to a violation of containment! Worse the criteria for
'selects the wrong child' can be triggered by the contained users. Eg
the contained user adds a IP to their child that duplicates another
container. Now we've lost control.
The very idea of ib_get_net_dev_by_port_pkey_ip is broken.
So, I don't know what to say here.. Ideas?
1) Forbid creating more than one pkey per ipoib interface?
2) Somehow extend the RDMA CM to send the IPoIB qpn too?
3) ??
Right now the only case that comes to mind is duplicating IPs, that is
already going to cause an ARP collision, so maybe having the RDMA CM
randomly select an IP is not the end of the world... But with
containers and security, who knows? I'm not confident I've
exhaustively thought of all possibilities here.
----------
Anyhow.. looking again through this series and the existing code, the
flow is wrong, and really needs to be changed before this starts to
make sense to anyone, and is no doubt part of how we got here..
When a REQ arrives RDMA CM needs to run down these steps (this is identical
to what ip_input.c does)
1) Locate the netdev associated with the ingress of the packet,
in a sane world this is done by only checking the
unique (Device,Port,Pkey,QPN) tuple.
If we keep our brokeness, we'd do this based on
(Device,Port,Pkey,IP) - if there are IP collisions then randomly
select a netdev (similar to how ARP collision is handled).
2) Then we do the ip_route_input_noref step, this will set skb_dst to
the netdev that will handle the packet, or tell us to drop it.
This is not always the same as the netdev that accepts the
packet!!!
NOTE: This route step is missing today, it does critical things
like check that the node is actually listening on the dest IP!
3) Now we can use skb_dst to iterate over the set of all RDMA CM listens:
1) Bound to the skb_dst netdev
2) Unbound in the same namespace as skb_dst netdev
The first to match the dst IP + port is the listen that will accept the
connection, now we go into the cma_new_conn_id path, and we don't
need rdma_translate_ip because we already have the handling netdev.
The backwards operation of the current code is part of why this is all
so strange looking, and I think is strongly connected to the private
data compare issues Sean is talking about. It is very much the wrong
flow to look for the RDMA CM listen first, and then try to work
backwards to the netdev.
The above 3 steps hard require that the ib_cm and rdma_cm
maintain different listening lists, because we need the 2nd search in
#3. So this gets the ib_cm completely out of looking at the private
data. [And now we can think carefully about the best way to refcount
the listens in RDMA CM]
Once the above is cleaned up dropping in namespaces should just
happen naturally.
So.. I'm going to suggest you make a cleanup series to fix this:
- Introduce the ib_get_net_dev_by_port_pkey_ip and document the
breakage it represents
- Rework rdma_cm to do steps 1,2,3 above, using
ib_get_net_dev_by_port_pkey_ip to drive #1, your patch set is
already doing about 50% of this change.
- Fix the collateral damage
As I said to Matan, clean up series like this should not introduce
major functional changes, so stack the few remaining net namespace
things in another series after it.
** The same comments apply to RoCE too, but for RoCE step #1 works
properly based on the (Device,Port,VLAN) unique tuple
Ditto for iWarp **
I think this also moves to address Sean's concern about generality, at
least for listen. All three protocols will run down the same common
code to locate the netdev and find the correct RDMA CM listen. The
only difference is the 'ib_get_net_dev_by_port_pkey_ip' call varies.
.. I also wouldn't mind seeing the giant cma.c split, if it makes
sense to have a cma_listen.c, for instance, wouldn't that be nice?
Sorry Haggi, this is a big change to your patchset :(
Jason
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists