public inbox for passt-dev@passt.top
 help / color / mirror / code / Atom feed
From: Stefano Brivio <sbrivio@redhat.com>
To: David Gibson <david@gibson.dropbear.id.au>
Cc: Laurent Vivier <lvivier@redhat.com>, passt-dev@passt.top
Subject: Re: [PATCH v3 7/9] checksum: introduce functions to compute the header part checksum for TCP/UDP
Date: Mon, 4 Mar 2024 23:47:17 +0100	[thread overview]
Message-ID: <20240304234717.5f697efd@elisabeth> (raw)
In-Reply-To: <20240304120040.1cebc230@elisabeth>

On Mon, 4 Mar 2024 12:00:40 +0100
Stefano Brivio <sbrivio@redhat.com> wrote:

> On Mon, 4 Mar 2024 12:54:12 +1100
> David Gibson <david@gibson.dropbear.id.au> wrote:
> 
> > On Fri, Mar 01, 2024 at 07:56:51AM +0100, Stefano Brivio wrote:  
> > > On Fri, 1 Mar 2024 10:09:39 +1100
> > > David Gibson <david@gibson.dropbear.id.au> wrote:
> > >     
> > > > On Thu, Feb 29, 2024 at 03:15:53PM +0100, Stefano Brivio wrote:    
> > > > > On Thu, 29 Feb 2024 09:56:25 +0100
> > > > > Stefano Brivio <sbrivio@redhat.com> wrote:
> > > > >       
> > > > > > On Thu, 29 Feb 2024 19:49:09 +1100
> > > > > > David Gibson <david@gibson.dropbear.id.au> wrote:
> > > > > >       
> > > > > > > On Thu, Feb 29, 2024 at 08:05:09AM +0100, Stefano Brivio wrote:        
> > > > > > > > On Thu, 29 Feb 2024 11:38:53 +1100
> > > > > > > > David Gibson <david@gibson.dropbear.id.au> wrote:
> > > > > > > >           
> > > > > > > > > On Wed, Feb 28, 2024 at 02:26:18PM +0100, Laurent Vivier wrote:          
> > > > > > > > > > On 2/19/24 04:08, David Gibson wrote:            
> > > > > > > > > > > On Sat, Feb 17, 2024 at 04:07:23PM +0100, Laurent Vivier wrote:  
> > > > > > > > > > >
> > > > > > > > > > > [...]
> > > > > > > > > > >          
> > > > > > > > > > > > +/**
> > > > > > > > > > > > + * proto_ipv6_header_psum() - Calculates the partial checksum of an
> > > > > > > > > > > > + * 			      IPv6 header for UDP or TCP
> > > > > > > > > > > > + * @payload_len:	Payload length
> > > > > > > > > > > > + * @proto:		Protocol number
> > > > > > > > > > > > + * @saddr:		Source address
> > > > > > > > > > > > + * @daddr:		Destination address
> > > > > > > > > > > > + * Returns:	Partial checksum of the IPv6 header
> > > > > > > > > > > > + */
> > > > > > > > > > > > +uint32_t proto_ipv6_header_psum(uint16_t payload_len, uint8_t protocol,
> > > > > > > > > > > > +				struct in6_addr saddr, struct in6_addr daddr)            
> > > > > > > > > > > 
> > > > > > > > > > > Hrm, this is passing 2 16-byte IPv6 addresses by value, which might
> > > > > > > > > > > not be what we want.            
> > > > > > > > > > 
> > > > > > > > > > The idea here is to avoid the pointer alignment problem (&ip6h->saddr and
> > > > > > > > > > &ip6h->daddr can be misaligned).            
> > > > > > > > > 
> > > > > > > > > Ah, right.  That's a neat idea, but I'm not sure it really helps: I
> > > > > > > > > think it will just move the misaligned access from inside the function
> > > > > > > > > to the call site, where we try to marshal the parameter from something
> > > > > > > > > unaligned.          
> > > > > > > > 
> > > > > > > > I haven't tested this yet, but note that this is generally okay: the
> > > > > > > > problem is *dereferencing* an unaligned pointer. But if you load memory
> > > > > > > > from an aligned pointer, and extract a value from this memory, it's all
> > > > > > > > fine.          
> > > > > > > 
> > > > > > > Right, that's kind of what I'm getting at.  Assuming this value starts
> > > > > > > in an unaligned buffer, then in order to pass this by value the caller
> > > > > > > will need to load from that unaligned pointer.  AFAIK, the compiler
> > > > > > > will base the type of loads only on the pointed to type, which isn't
> > > > > > > changed whether we dereference in the caller or the callee.
> > > > > > >         
> > > > > > > > 
> > > > > > > > Speaking MIPS, this is not safe on all CPU models:
> > > > > > > > 
> > > > > > > > 	la	$1, 1002   # s1 now contains the value 1002
> > > > > > > > 	lw	$2, 0($1)  # load word from memory at 1002 + 0 into s2
> > > > > > > > 
> > > > > > > > but this is:
> > > > > > > > 
> > > > > > > > 	la	$1, 1000   # s1 now contains the value 1000
> > > > > > > > 	la	$2, 1004   # s3 now contains the value 1004
> > > > > > > > 	lw	$3, 0($1)  # load word from memory at 1000 + 0 into s3
> > > > > > > > 	lw	$4, 0($3)  # load word from memory at 1004 + 0 into s4
> > > > > > > > 	sll	$5, $3, 16 # 16-bit shift left s3 into s5
> > > > > > > > 	srl	$6, $4, 16 # 16-bit shift right s4 into s6
> > > > > > > > 	or	$2, $5, $6 # OR s5 and s6 into s2          
> > > > > > > 
> > > > > > > Right, but I don't think merely moving the dereference to the caller
> > > > > > > will necessarily induce the compiler to generate this rather than the
> > > > > > > former.        
> > > > > > 
> > > > > > Oh, oops, I didn't realise this was the case (I haven't reviewed the
> > > > > > patch yet).      
> > > > > 
> > > > > ...no, that's not the case. Dereferencing 'iph' from
> > > > > struct tcp[46]_l2_buf_t is fine:
> > > > > 
> > > > > struct tcp4_l2_buf_t {
> > > > >         uint8_t                    pad[2];               /*     0     2 */
> > > > >         struct tap_hdr             taph;                 /*     2    18 */
> > > > >         struct iphdr               iph;                  /*    20    20 */
> > > > > 	[...]
> > > > > } __attribute__((__packed__));
> > > > > 
> > > > > struct tcp6_l2_buf_t {
> > > > >         uint8_t                    pad[2];               /*     0     2 */
> > > > >         struct tap_hdr             taph;                 /*     2    18 */
> > > > >         struct ipv6hdr             ip6h;                 /*    20    40 */
> > > > > 	[...]
> > > > > } __attribute__((__packed__));
> > > > > 
> > > > > The problematic structures are the UDP buffers:
> > > > > 
> > > > > struct udp4_l2_buf_t {
> > > > >         struct sockaddr_in         s_in;                 /*     0    16 */
> > > > >         struct tap_hdr             taph;                 /*    16    18 */
> > > > >         struct iphdr               iph;                  /*    34    20 */
> > > > > 	[...]
> > > > > } __attribute__((__aligned__(4)));
> > > > > 
> > > > > and for UDP, this patch is dereferencing buffer pointers only, not
> > > > > pointers to headers.      
> > > > 
> > > > Ok... but my point remains, I'm not seeing that passing the address by
> > > > value actually helps - it just seems to change whether we need to
> > > > handle the unaligned load in the caller or the callee.    
> > > 
> > > For UDP and IPv4 (from 6/9):
> > > 
> > > +       b->iph.check = csum_ip4_header(b->iph.tot_len, IPPROTO_UDP,
> > > +                                      b->iph.saddr, b->iph.daddr);
> > > 
> > > and for IPv6 (this patch):
> > > 
> > > +       b->uh.check = csum(&b->uh, ntohs(b->ip6h.payload_len),
> > > +                          proto_ipv6_header_psum(b->ip6h.payload_len,
> > > +                                                 IPPROTO_UDP,
> > > +                                                 b->ip6h.saddr,
> > > +                                                 b->ip6h.daddr));
> > > 
> > > these cause loads starting from 'b', which is aligned, instead of
> > > passing 'iph' or 'ip6h', unaligned, and loading from there.    
> > 
> > No... the loads are still from b->ip6h.saddr, b->ip6h.daddr and
> > b->ip6h.payload_len.  
> 
> It depends how we define "loading from" -- the problem, in general, is
> not the memory location per se, the problem is dereferencing memory
> pointers.
> 
> I plan to try an example on MIPS in a bit [...]

Actually, armhf first (for clarity):

$ cat align.c
#include <stdio.h>
#include <stdint.h>

struct disarray {
    uint8_t oops;
    uint32_t v1;
    uint32_t v2;
} __attribute__((packed, aligned(__alignof__(unsigned int))));

void f1(uint32_t *v1) {
    *v1 += 42;
}

uint32_t f2(uint32_t v2) {
    return v2++;
}

int main()
{
    struct disarray d = { 0x55, 0xaa, 0xaa };

    f1(&d.v1);
    f2(d.v2);

    fprintf(stdout, "%08x %08x", d.v1, d.v2);
}

$ arm-linux-gnueabihf-gcc-12 -g -O0 -fno-stack-protector -fomit-frame-pointer -mno-unaligned-access -o align align.c
align.c: In function ‘main’:
align.c:22:8: warning: taking address of packed member of ‘struct disarray’ may result in an unaligned pointer value [-Waddress-of-packed-member]
   22 |     f1(&d.v1);
      |        ^~~~~

$ arm-linux-gnueabihf-objdump -S --disassemble=main align
[...]
    f1(&d.v1);
 562:	ab01      	add	r3, sp, #4
 564:	3301      	adds	r3, #1
 566:	4618      	mov	r0, r3
 568:	f7ff ffde 	bl	528 <f1>
[...]

before the call to f1(), the address in r3 is not aligned (we just
added #1), despite -mno-unaligned-access. I guess gcc can only warn
about that, but not fix it.

This:
  https://gcc.gnu.org/onlinedocs/gcc/ARM-Options.html

says:
  -munaligned-access
  -mno-unaligned-access

    Enables (or disables) reading and writing of 16- and 32- bit values from addresses that are not 16- or 32- bit aligned. By default unaligned access is disabled for all pre-ARMv6, all ARMv6-M and for ARMv8-M Baseline architectures, and enabled for all other architectures. If unaligned access is not enabled then words in packed data structures are accessed a byte at a time. 

Implying, I guess, that on those architectures unaligned accesses
shouldn't be done. I think Thumb mode also has issues with this, by
the way. 

And in f1() we just have a ldr from that address (passed on r0):
void f1(uint32_t *v1) {
 528:	b082      	sub	sp, #8
 52a:	9001      	str	r0, [sp, #4]
    *v1 += 42;
 52c:	9b01      	ldr	r3, [sp, #4]
 52e:	681b      	ldr	r3, [r3, #0]
 530:	f103 022a 	add.w	r2, r3, #42	@ 0x2a

$ arm-linux-gnueabihf-objdump -S --disassemble=f1 align
[...]
    *v1 += 42;
 52c:	9b01      	ldr	r3, [sp, #4]
 52e:	681b      	ldr	r3, [r3, #0]
 530:	f103 022a 	add.w	r2, r3, #42	@ 0x2a

...but the call to f2() is fine: we load with offset 8 from the stack
pointer, shift word right, load from offset 12, shift word left, OR:

$ arm-linux-gnueabihf-objdump -S --disassemble=main align
[...]
    f2(d.v2);
 56c:	9b02      	ldr	r3, [sp, #8]
 56e:	0a1b      	lsrs	r3, r3, #8
 570:	f89d 200c 	ldrb.w	r2, [sp, #12]
 574:	0612      	lsls	r2, r2, #24
 576:	4313      	orrs	r3, r2
 578:	4618      	mov	r0, r3
 57a:	f7ff ffe0 	bl	53e <f2>
[...]

Now on to MIPS (MIPS32):

$ mips-linux-gnu-gcc-12 -g -O0 -fno-stack-protector -fomit-frame-pointer -mno-unaligned-access -o align align.c
align.c: In function ‘main’:
align.c:22:8: warning: taking address of packed member of ‘struct disarray’ may result in an unaligned pointer value [-Waddress-of-packed-member]
   22 |     f1(&d.v1);
      |        ^~~~~

$ mips-linux-gnu-objdump -S --disassemble=main align
[...]
    f1(&d.v1);
 7bc:	27a20019 	addiu	v0,sp,25
 7c0:	00402025 	move	a0,v0
 7c4:	8f82802c 	lw	v0,-32724(gp)
 7c8:	0040c825 	move	t9,v0
 7cc:	0411ffe0 	bal	750 <f1>
 7d0:	00000000 	nop
 7d4:	8fbc0010 	lw	gp,16(sp)
[...]

'&d.v1' is passed in a0, again unaligned (stack pointer plus 25). And f1()
uses it just like that:

$ mips-linux-gnu-objdump -S --disassemble=f1 align
[...]
void f1(uint32_t *v1) {
 750:	afa40000 	sw	a0,0(sp)
    *v1 += 42;
 754:	8fa20000 	lw	v0,0(sp)
 758:	8c420000 	lw	v0,0(v0)
 75c:	2443002a 	addiu	v1,v0,42
[...]

while the call to f2() is, again, fine:

$ mips-linux-gnu-objdump -S --disassemble=main align
    f2(d.v2);
 7e0:	8ba2001d 	lwl	v0,29(sp)
 7e4:	9ba20020 	lwr	v0,32(sp)
 7e8:	00402025 	move	a0,v0
 7ec:	8f828030 	lw	v0,-32720(gp)
 7f0:	0040c825 	move	t9,v0
 7f4:	0411ffdf 	bal	774 <f2>
 7f8:	00000000 	nop
 7fc:	8fbc0010 	lw	gp,16(sp)

two loads, from stack pointer + 29 and stack pointer + 32. MIPS32 has lwl
and lwr (the infamous US4814976A patent, now expired) to avoid load plus
shift plus OR.

Now, you might argue that what I'm describing here might simply be gcc's
behaviour, and if gcc avoids unaligned loads as long as we don't pass
unaligned pointers around, that's not any better for us -- other compilers
might do things differently.

And... yes, packed structures are actually a GNU extension: C standards
don't say anything about loads like my f1(d.v2) call above, so all I'm
showing here is that a particular compiler is fine with these accesses,
but not unaligned pointers.

On the other hand, this seems to be a well established behaviour, and I
don't think we could realistically drop every load of unaligned *values*.
Unaligned pointers, we currently don't dereference any, because gcc warns
otherwise.

So, practically speaking, I guess as long as we avoid dereferencing
unaligned pointers, we should be fine?

-- 
Stefano


  reply	other threads:[~2024-03-04 22:47 UTC|newest]

Thread overview: 38+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2024-02-17 15:07 [PATCH v3 0/9] Add vhost-user support to passt (part 1) Laurent Vivier
2024-02-17 15:07 ` [PATCH v3 1/9] iov: add some functions to manage iovec Laurent Vivier
2024-02-19  2:45   ` David Gibson
2024-02-17 15:07 ` [PATCH v3 2/9] pcap: add pcap_iov() Laurent Vivier
2024-02-19  2:50   ` David Gibson
2024-02-17 15:07 ` [PATCH v3 3/9] checksum: align buffers Laurent Vivier
2024-02-17 15:07 ` [PATCH v3 4/9] checksum: add csum_iov() Laurent Vivier
2024-02-19  2:52   ` David Gibson
2024-02-17 15:07 ` [PATCH v3 5/9] util: move IP stuff from util.[ch] to ip.[ch] Laurent Vivier
2024-02-19  2:59   ` David Gibson
2024-02-17 15:07 ` [PATCH v3 6/9] checksum: use csum_ip4_header() in udp.c and tcp.c Laurent Vivier
2024-02-19  3:01   ` David Gibson
2024-02-29 16:24   ` Stefano Brivio
2024-02-29 23:10     ` David Gibson
2024-03-01  7:58       ` Stefano Brivio
2024-03-01 12:23         ` David Gibson
2024-03-04 17:04           ` Stefano Brivio
2024-02-17 15:07 ` [PATCH v3 7/9] checksum: introduce functions to compute the header part checksum for TCP/UDP Laurent Vivier
2024-02-19  3:08   ` David Gibson
2024-02-28 13:26     ` Laurent Vivier
2024-02-29  0:38       ` David Gibson
2024-02-29  7:05         ` Stefano Brivio
2024-02-29  8:49           ` David Gibson
2024-02-29  8:56             ` Stefano Brivio
2024-02-29 14:15               ` Stefano Brivio
2024-02-29 23:09                 ` David Gibson
2024-03-01  6:56                   ` Stefano Brivio
2024-03-04  1:54                     ` David Gibson
2024-03-04 11:00                       ` Stefano Brivio
2024-03-04 22:47                         ` Stefano Brivio [this message]
2024-03-06  5:09                           ` David Gibson
2024-03-08  0:08                             ` Stefano Brivio
2024-03-08  1:20                               ` David Gibson
2024-02-17 15:07 ` [PATCH v3 8/9] tap: make tap_update_mac() generic Laurent Vivier
2024-02-17 15:07 ` [PATCH v3 9/9] tcp: Introduce ipv4_fill_headers()/ipv6_fill_headers() Laurent Vivier
2024-02-19  3:14   ` David Gibson
2024-02-29 16:29   ` Stefano Brivio
2024-02-29 16:31 ` [PATCH v3 0/9] Add vhost-user support to passt (part 1) Stefano Brivio

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20240304234717.5f697efd@elisabeth \
    --to=sbrivio@redhat.com \
    --cc=david@gibson.dropbear.id.au \
    --cc=lvivier@redhat.com \
    --cc=passt-dev@passt.top \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
Code repositories for project(s) associated with this public inbox

	https://passt.top/passt

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).