On 04/11/2017 05:55 PM, Edward Cree wrote:
On 10/04/17 19:26, Tom Herbert wrote:
Not having checksum offload in XDP is going to get more painful once
we start seeing a lot programs doing packet modifications. One nice
thing we do for ILA router is pre-compute the checksum delta necessary
to maintain checksum neutral property in the packet. So that after
doing ILA routing in XDP the checksum complete value is still valid as
is the transport layer checksum.
It's conceivable we could generalize this by having a u16 checksum
delta returned from XDP program. If the checksum diff can be
pre-computed in a structure for doing the translation, then there
should be little cost other than making API a little more complex. On
return the checksum_complete value is updated jusy by adding in the
diff value.
Tom
AIUI you're suggesting to have the user's BPF program do this calculation and
(somehow) feed the diff back to the caller. As well as adding work
for the XDP program writer, it also means trusting they got it right.
My suggestion was that the eBPF verifier could insert instructions around
every write that update the diff value automagically, and not allow the
user's program to touch it directly.
There would be some cleverness required, for instance to determine which
byte of the checksum to add to (and thus sometimes shift the byte diff
by 8 before adding it in) - which might require a runtime check when the
load is indexed. Or might not, if the verifier sees something like
packet[ETH_HLEN + (ihl << 2)] and can deduce the low bit of the offset.
For the simple case, we would translate "write byte to packet+1" into:
diff -= packet[1];
write byte to packet+1;
diff += packet[1];
Alexei, does this sound reasonable?
The counter-argument, of course, is that if the XDP program edits fields
that are protected by an Internet checksum (which in practice usually
means anything but the Ethernet header) and then fixes up the checksums
itself, we will edit our diff value twice just to conclude that diff==0.
And maybe we are willing to trust root with the ability to lie to the
kernel about incoming packets' checksum_complete values.
For cls_bpf programs, we effectively trust the user and I think it makes
sense to do a similar model in XDP as well. If the verifier would perform
such rewrites we basically assume csum complete everywhere, since at
verification time, it's unclear where the resulting fd for XDP will be
attached to wrt netdevice. Also, I think it's probably not so straight
forward to do this efficiently through insn rewrites.
cls_bpf has a couple of helpers like bpf_l3_csum_replace(),
bpf_l4_csum_replace()
bpf_csum_diff(), bpf_csum_update(), where we (cilium at least) use checksum
diffs extensively. You can then also leave the option to the user to feed
pre-computed diffs from a map, etc, or, to just not care at all when not
necessary. Pushing this via return code seems a bit odd, perhaps a xdp->csum
member could be populated before calling into the program and the resulting
xdp->csum processed further upon exit.