lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Tue, 14 Jan 2020 17:39:36 +0100
From:   Jiri Pirko <jiri@...nulli.us>
To:     Ido Schimmel <idosch@...sch.org>
Cc:     netdev@...r.kernel.org, davem@...emloft.net, kuba@...nel.org,
        jiri@...lanox.com, dsahern@...il.com, roopa@...ulusnetworks.com,
        mlxsw@...lanox.com, Ido Schimmel <idosch@...lanox.com>
Subject: Re: [PATCH net-next v2 03/10] ipv4: Add "offload" and "trap"
 indications to routes

Tue, Jan 14, 2020 at 12:23:11PM CET, idosch@...sch.org wrote:
>From: Ido Schimmel <idosch@...lanox.com>
>
>When performing L3 offload, routes and nexthops are usually programmed
>into two different tables in the underlying device. Therefore, the fact
>that a nexthop resides in hardware does not necessarily mean that all
>the associated routes also reside in hardware and vice-versa.
>
>While the kernel can signal to user space the presence of a nexthop in
>hardware (via 'RTNH_F_OFFLOAD'), it does not have a corresponding flag
>for routes. In addition, the fact that a route resides in hardware does
>not necessarily mean that the traffic is offloaded. For example,
>unreachable routes (i.e., 'RTN_UNREACHABLE') are programmed to trap
>packets to the CPU so that the kernel will be able to generate the
>appropriate ICMP error packet.
>
>This patch adds an "offload" and "trap" indications to IPv4 routes, so
>that users will have better visibility into the offload process.
>
>'struct fib_alias' is extended with two new fields that indicate if the
>route resides in hardware or not and if it is offloading traffic from
>the kernel or trapping packets to it. Note that the new fields are added
>in the 6 bytes hole and therefore the struct still fits in a single
>cache line [1].
>
>Capable drivers are expected to invoke fib_alias_hw_flags_set() with the
>route's key in order to set the flags.
>
>The indications are dumped to user space via a new flags (i.e.,
>'RTM_F_OFFLOAD' and 'RTM_F_TRAP') in the 'rtm_flags' field in the
>ancillary header.
>
>v2:
>* Make use of 'struct fib_rt_info' in fib_alias_hw_flags_set()
>
>[1]
>struct fib_alias {
>        struct hlist_node  fa_list;                      /*     0    16 */
>        struct fib_info *          fa_info;              /*    16     8 */
>        u8                         fa_tos;               /*    24     1 */
>        u8                         fa_type;              /*    25     1 */
>        u8                         fa_state;             /*    26     1 */
>        u8                         fa_slen;              /*    27     1 */
>        u32                        tb_id;                /*    28     4 */
>        s16                        fa_default;           /*    32     2 */
>        u8                         offload:1;            /*    34: 0  1 */
>        u8                         trap:1;               /*    34: 1  1 */
>        u8                         unused:6;             /*    34: 2  1 */
>
>        /* XXX 5 bytes hole, try to pack */
>
>        struct callback_head rcu __attribute__((__aligned__(8))); /*    40    16 */
>
>        /* size: 56, cachelines: 1, members: 12 */
>        /* sum members: 50, holes: 1, sum holes: 5 */
>        /* sum bitfield members: 8 bits (1 bytes) */
>        /* forced alignments: 1, forced holes: 1, sum forced holes: 5 */
>        /* last cacheline: 56 bytes */
>} __attribute__((__aligned__(8)));
>
>Signed-off-by: Ido Schimmel <idosch@...lanox.com>

Reviewed-by: Jiri Pirko <jiri@...lanox.com>

Powered by blists - more mailing lists