Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp992415pxb; Tue, 9 Feb 2021 19:13:30 -0800 (PST) X-Google-Smtp-Source: ABdhPJzvIRoTgjQcxoLG6kUNZkHRe7e1AbhLI4PORNTCBqz+Zf+1oqtkCTqGPSYabLeL5v+WaT2D X-Received: by 2002:a17:906:86cf:: with SMTP id j15mr855087ejy.194.1612926810191; Tue, 09 Feb 2021 19:13:30 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1612926810; cv=none; d=google.com; s=arc-20160816; b=OjcRo7OXSdYRDnx6agX28d+o/N+f/KM7ZvdMPTUNbcxNrOrAz/kBwBykq1Iq1qu+Sn 8xZBWZ5YEzPGmJ2H6VtFtZlWh6d4ze8XGM0xtY4WQtqBzMJPGSVe7zCdUjhngEK8aoRi adRdrkmJOmuyBb5vOi9WhQn2DUGg0BwEVKurXBzlV4LMYqdUwgyZegxridfO0UV2vQNz T36jmyMhFoS4zEAus2+93vMPgkeLwdjieuPy1bwFCD1IJXYLLyd8EIercucIkdjAaTmn XfZBBG/eHewkGxlbe/fmDFPP3bQIuccALe8GiuA8exYGQcLKwpIorFO1d9TKw2zzFhff 5+XQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:to:references:message-id :content-transfer-encoding:cc:date:in-reply-to:from:subject :mime-version:dkim-signature; bh=JvfA/LJIleSb9j0rSYyHAJ/5yGWi0FFleE6u6qbY8iw=; b=Ig93BM3Il5w+QGDRvOA3qd0SsTunkmlz9VYqx1vii3LW2yxfJ8mXno8AmzAfKLHJlD PQDbooqrlYWlDb3IeScPH//26hif9FMVJh5uBpLuLW+565KAawvpyuXaV86BwrUI3Bxs y/0RbfQlabLIMrNu9ipXX602Hdq4p4NyTa3qBdpGRpUEZ5Fd6w612tZ/e7h7EV4ycsUV Be3cZ596t1RROcXWDEanzFBiSIa25F0XUKzBbNtDxwxiwjs/pnwCYXyeqg8sye8Wkxio xBQk0hWjgPM52ao6asgyqrYCXFuKqf1ZKHz00elTWuiH5hyAARVAMGb3ltBlGRVMHYwO bJlw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=u0Yzpsaf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id w16si488159edd.250.2021.02.09.19.13.06; Tue, 09 Feb 2021 19:13:30 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=u0Yzpsaf; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S232078AbhBIKvL (ORCPT + 99 others); Tue, 9 Feb 2021 05:51:11 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:48980 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S231971AbhBIKnZ (ORCPT ); Tue, 9 Feb 2021 05:43:25 -0500 Received: from mail-pg1-x532.google.com (mail-pg1-x532.google.com [IPv6:2607:f8b0:4864:20::532]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 1555FC06178A; Tue, 9 Feb 2021 02:41:47 -0800 (PST) Received: by mail-pg1-x532.google.com with SMTP id t25so12208435pga.2; Tue, 09 Feb 2021 02:41:47 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=JvfA/LJIleSb9j0rSYyHAJ/5yGWi0FFleE6u6qbY8iw=; b=u0Yzpsaf7WWHwMAG0+z4czxMu7iL/3xkEr150rmGUrIQWJOYdBPS7h75VXXcso60Kl DPu3VEMZG3kL+WZzup7v3/b5nRMJfmgkoWfV7Y8eI+vyq0GUzN2PqxfR5l9617pL9c5v VMuDSOJ85rFPrdNXDcnLctv9hi/dsO/uoImQg5pjj+DcYF+T9IGATUoKeU5QHMc4SUyx K3Tnw65ZkG7qSJQ6d2VXLWyybotmI6I34lktOQfvWNCM9ECyiSLnhh2/i0BXpsiRziAW uWvCF47P/FbzKUZ7jmRgXkyyudPeUNymBUmKPDlGZWqf+H+LzAhVfE/INJzioyPHeSxK i86w== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:subject:from:in-reply-to:date:cc :content-transfer-encoding:message-id:references:to; bh=JvfA/LJIleSb9j0rSYyHAJ/5yGWi0FFleE6u6qbY8iw=; b=DBeVS61gj3gYciQ0cFdz34QmwLop9v7brGOy82HTI5tqBgyAOshDw7NQLqJNG7jkGp 8b6ntNihbvYMTzqyd//rPEhUYwovZoxC+AgqqajGxeAXvRXZzE062pRxct1PdbmQX83U 7e+tkJwNuzlYi61IU6Rha/g3vCv3SYvBPSJ+TJSvJVDOd38dEr7323Kuvb12DjJySerb tWEGwvj9FaRmrtDVwWwGdByYLbeSJICLNr3GTrC+9hoZGtR7R4x4LOMiSvPeGi1VU1iF GqGhsd28avjBk36ecQIeF6LUQyq6NApjUwJsdYbCNNVBXR9DREVehduAEvu+pqf3Io7R fbRg== X-Gm-Message-State: AOAM5318YW4h+jo1h3i53LNzsCRL1UE8Lqshv11PKKzdjLMU3WUPIwXx YaRN5GR/bxoI440nMRwi2sbOiEDE7FNRgg== X-Received: by 2002:a62:8c05:0:b029:1d8:7f36:bcd8 with SMTP id m5-20020a628c050000b02901d87f36bcd8mr19154743pfd.43.1612867306644; Tue, 09 Feb 2021 02:41:46 -0800 (PST) Received: from [172.17.32.195] ([122.10.101.134]) by smtp.gmail.com with ESMTPSA id c24sm5543375pfo.209.2021.02.09.02.41.43 (version=TLS1_2 cipher=ECDHE-ECDSA-AES128-GCM-SHA256 bits=128/128); Tue, 09 Feb 2021 02:41:45 -0800 (PST) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 13.4 \(3608.120.23.2.1\)) Subject: Re: [PATCH] bpf: in bpf_skb_adjust_room correct inner protocol for vxlan From: =?utf-8?B?6buE5a2m5qOu?= In-Reply-To: Date: Tue, 9 Feb 2021 18:41:41 +0800 Cc: David Miller , bpf , Daniel Borkmann , Network Development , linux-kernel , chengzhiyong , wangli Content-Transfer-Encoding: quoted-printable Message-Id: <8552C5F8-8410-4E81-8AF4-7018878AFCDC@gmail.com> References: <20210208113810.11118-1-hxseverything@gmail.com> To: Willem de Bruijn X-Mailer: Apple Mail (2.3608.120.23.2.1) Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Appreciate for your reply Willem! The original intention of this commit is that when we use = bpf_skb_adjust_room to encapsulate=20 Vxlan packets, we find some powerful device features disabled.=20 Setting the inner_protocol directly as skb->protocol is the root cause. I understand that it=E2=80=99s not easy to handle all tunnel protocol in = one bpf helper function. But for my immature idea, when pushing Ethernet header, setting the inner_protocol = as ETH_P_TEB may be better. Now the flag BPF_F_ADJ_ROOM_ENCAP_L4_UDP includes many udp tunnel types( = e.g.=20 udp+mpls, geneve, vxlan). Adding an independent flag to represents Vxlan = looks a little=20 reduplicative. What=E2=80=99s your suggestion? Thanks again for your reply! > 2021=E5=B9=B42=E6=9C=888=E6=97=A5 =E4=B8=8B=E5=8D=889:06=EF=BC=8CWillem = de Bruijn =E5=86=99=E9=81=93=EF=BC=9A >=20 > On Mon, Feb 8, 2021 at 7:16 AM huangxuesen = wrote: >>=20 >> From: huangxuesen >>=20 >> When pushing vxlan tunnel header, set inner protocol as ETH_P_TEB in = skb >> to avoid HW device disabling udp tunnel segmentation offload, just = like >> vxlan_build_skb does. >>=20 >> Drivers for NIC may invoke vxlan_features_check to check the >> inner_protocol in skb for vxlan packets to decide whether to disable >> NETIF_F_GSO_MASK. Currently it sets inner_protocol as the original >> skb->protocol, that will make mlx5_core disable TSO and lead to huge >> performance degradation. >>=20 >> Signed-off-by: huangxuesen >> Signed-off-by: chengzhiyong >> Signed-off-by: wangli >> --- >> net/core/filter.c | 7 ++++++- >> 1 file changed, 6 insertions(+), 1 deletion(-) >>=20 >> diff --git a/net/core/filter.c b/net/core/filter.c >> index 255aeee72402..f8d3ba3fe10f 100644 >> --- a/net/core/filter.c >> +++ b/net/core/filter.c >> @@ -3466,7 +3466,12 @@ static int bpf_skb_net_grow(struct sk_buff = *skb, u32 off, u32 len_diff, >> skb->inner_mac_header =3D inner_net - inner_mac_len; >> skb->inner_network_header =3D inner_net; >> skb->inner_transport_header =3D inner_trans; >> - skb_set_inner_protocol(skb, skb->protocol); >> + >> + if (flags & BPF_F_ADJ_ROOM_ENCAP_L4_UDP && >> + inner_mac_len =3D=3D ETH_HLEN) >> + skb_set_inner_protocol(skb, = htons(ETH_P_TEB)); >=20 > This may be used by vxlan, but it does not imply it. >=20 > Adding ETH_HLEN bytes likely means pushing an Ethernet header, but = same point. >=20 > Conversely, pushing an Ethernet header is not limited to UDP encap. >=20 > This probably needs a new explicit BPF_F_ADJ_ROOM_.. flag, rather than > trying to infer from imprecise heuristics.