From: David Gibson <david@gibson.dropbear.id.au>
To: Stefano Brivio <sbrivio@redhat.com>
Cc: Laurent Vivier <lvivier@redhat.com>, passt-dev@passt.top
Subject: Re: [PATCH v3 7/9] checksum: introduce functions to compute the header part checksum for TCP/UDP
Date: Fri, 8 Mar 2024 12:20:30 +1100 [thread overview]
Message-ID: <Zepn3irTeKFJ5DC9@zatzit> (raw)
In-Reply-To: <20240308010845.4a15b5a5@elisabeth>
[-- Attachment #1: Type: text/plain, Size: 12921 bytes --]
On Fri, Mar 08, 2024 at 01:08:45AM +0100, Stefano Brivio wrote:
> On Wed, 6 Mar 2024 16:09:23 +1100
> David Gibson <david@gibson.dropbear.id.au> wrote:
>
> > On Mon, Mar 04, 2024 at 11:47:17PM +0100, Stefano Brivio wrote:
> > > On Mon, 4 Mar 2024 12:00:40 +0100
> > > Stefano Brivio <sbrivio@redhat.com> wrote:
> > >
> > > > On Mon, 4 Mar 2024 12:54:12 +1100
> > > > David Gibson <david@gibson.dropbear.id.au> wrote:
> > > >
> > > > > On Fri, Mar 01, 2024 at 07:56:51AM +0100, Stefano Brivio wrote:
> > > > > > On Fri, 1 Mar 2024 10:09:39 +1100
> > > > > > David Gibson <david@gibson.dropbear.id.au> wrote:
> > > > > >
> > > > > > > On Thu, Feb 29, 2024 at 03:15:53PM +0100, Stefano Brivio wrote:
> > > > > > > > On Thu, 29 Feb 2024 09:56:25 +0100
> > > > > > > > Stefano Brivio <sbrivio@redhat.com> wrote:
> > > > > > > >
> > > > > > > > > On Thu, 29 Feb 2024 19:49:09 +1100
> > > > > > > > > David Gibson <david@gibson.dropbear.id.au> wrote:
> > > > > > > > >
> > > > > > > > > > On Thu, Feb 29, 2024 at 08:05:09AM +0100, Stefano Brivio wrote:
> > > > > > > > > > > On Thu, 29 Feb 2024 11:38:53 +1100
> > > > > > > > > > > David Gibson <david@gibson.dropbear.id.au> wrote:
> > > > > > > > > > >
> > > > > > > > > > > > On Wed, Feb 28, 2024 at 02:26:18PM +0100, Laurent Vivier wrote:
> > > > > > > > > > > > > On 2/19/24 04:08, David Gibson wrote:
> > > > > > > > > > > > > > On Sat, Feb 17, 2024 at 04:07:23PM +0100, Laurent Vivier wrote:
> > > > > > > > > > > > > >
> > > > > > > > > > > > > > [...]
> > > > > > > > > > > > > >
> > > > > > > > > > > > > > > +/**
> > > > > > > > > > > > > > > + * proto_ipv6_header_psum() - Calculates the partial checksum of an
> > > > > > > > > > > > > > > + * IPv6 header for UDP or TCP
> > > > > > > > > > > > > > > + * @payload_len: Payload length
> > > > > > > > > > > > > > > + * @proto: Protocol number
> > > > > > > > > > > > > > > + * @saddr: Source address
> > > > > > > > > > > > > > > + * @daddr: Destination address
> > > > > > > > > > > > > > > + * Returns: Partial checksum of the IPv6 header
> > > > > > > > > > > > > > > + */
> > > > > > > > > > > > > > > +uint32_t proto_ipv6_header_psum(uint16_t payload_len, uint8_t protocol,
> > > > > > > > > > > > > > > + struct in6_addr saddr, struct in6_addr daddr)
> > > > > > > > > > > > > >
> > > > > > > > > > > > > > Hrm, this is passing 2 16-byte IPv6 addresses by value, which might
> > > > > > > > > > > > > > not be what we want.
> > > > > > > > > > > > >
> > > > > > > > > > > > > The idea here is to avoid the pointer alignment problem (&ip6h->saddr and
> > > > > > > > > > > > > &ip6h->daddr can be misaligned).
> > > > > > > > > > > >
> > > > > > > > > > > > Ah, right. That's a neat idea, but I'm not sure it really helps: I
> > > > > > > > > > > > think it will just move the misaligned access from inside the function
> > > > > > > > > > > > to the call site, where we try to marshal the parameter from something
> > > > > > > > > > > > unaligned.
> > > > > > > > > > >
> > > > > > > > > > > I haven't tested this yet, but note that this is generally okay: the
> > > > > > > > > > > problem is *dereferencing* an unaligned pointer. But if you load memory
> > > > > > > > > > > from an aligned pointer, and extract a value from this memory, it's all
> > > > > > > > > > > fine.
> > > > > > > > > >
> > > > > > > > > > Right, that's kind of what I'm getting at. Assuming this value starts
> > > > > > > > > > in an unaligned buffer, then in order to pass this by value the caller
> > > > > > > > > > will need to load from that unaligned pointer. AFAIK, the compiler
> > > > > > > > > > will base the type of loads only on the pointed to type, which isn't
> > > > > > > > > > changed whether we dereference in the caller or the callee.
> > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > > Speaking MIPS, this is not safe on all CPU models:
> > > > > > > > > > >
> > > > > > > > > > > la $1, 1002 # s1 now contains the value 1002
> > > > > > > > > > > lw $2, 0($1) # load word from memory at 1002 + 0 into s2
> > > > > > > > > > >
> > > > > > > > > > > but this is:
> > > > > > > > > > >
> > > > > > > > > > > la $1, 1000 # s1 now contains the value 1000
> > > > > > > > > > > la $2, 1004 # s3 now contains the value 1004
> > > > > > > > > > > lw $3, 0($1) # load word from memory at 1000 + 0 into s3
> > > > > > > > > > > lw $4, 0($3) # load word from memory at 1004 + 0 into s4
> > > > > > > > > > > sll $5, $3, 16 # 16-bit shift left s3 into s5
> > > > > > > > > > > srl $6, $4, 16 # 16-bit shift right s4 into s6
> > > > > > > > > > > or $2, $5, $6 # OR s5 and s6 into s2
> > > > > > > > > >
> > > > > > > > > > Right, but I don't think merely moving the dereference to the caller
> > > > > > > > > > will necessarily induce the compiler to generate this rather than the
> > > > > > > > > > former.
> > > > > > > > >
> > > > > > > > > Oh, oops, I didn't realise this was the case (I haven't reviewed the
> > > > > > > > > patch yet).
> > > > > > > >
> > > > > > > > ...no, that's not the case. Dereferencing 'iph' from
> > > > > > > > struct tcp[46]_l2_buf_t is fine:
> > > > > > > >
> > > > > > > > struct tcp4_l2_buf_t {
> > > > > > > > uint8_t pad[2]; /* 0 2 */
> > > > > > > > struct tap_hdr taph; /* 2 18 */
> > > > > > > > struct iphdr iph; /* 20 20 */
> > > > > > > > [...]
> > > > > > > > } __attribute__((__packed__));
> > > > > > > >
> > > > > > > > struct tcp6_l2_buf_t {
> > > > > > > > uint8_t pad[2]; /* 0 2 */
> > > > > > > > struct tap_hdr taph; /* 2 18 */
> > > > > > > > struct ipv6hdr ip6h; /* 20 40 */
> > > > > > > > [...]
> > > > > > > > } __attribute__((__packed__));
> > > > > > > >
> > > > > > > > The problematic structures are the UDP buffers:
> > > > > > > >
> > > > > > > > struct udp4_l2_buf_t {
> > > > > > > > struct sockaddr_in s_in; /* 0 16 */
> > > > > > > > struct tap_hdr taph; /* 16 18 */
> > > > > > > > struct iphdr iph; /* 34 20 */
> > > > > > > > [...]
> > > > > > > > } __attribute__((__aligned__(4)));
> > > > > > > >
> > > > > > > > and for UDP, this patch is dereferencing buffer pointers only, not
> > > > > > > > pointers to headers.
> > > > > > >
> > > > > > > Ok... but my point remains, I'm not seeing that passing the address by
> > > > > > > value actually helps - it just seems to change whether we need to
> > > > > > > handle the unaligned load in the caller or the callee.
> > > > > >
> > > > > > For UDP and IPv4 (from 6/9):
> > > > > >
> > > > > > + b->iph.check = csum_ip4_header(b->iph.tot_len, IPPROTO_UDP,
> > > > > > + b->iph.saddr, b->iph.daddr);
> > > > > >
> > > > > > and for IPv6 (this patch):
> > > > > >
> > > > > > + b->uh.check = csum(&b->uh, ntohs(b->ip6h.payload_len),
> > > > > > + proto_ipv6_header_psum(b->ip6h.payload_len,
> > > > > > + IPPROTO_UDP,
> > > > > > + b->ip6h.saddr,
> > > > > > + b->ip6h.daddr));
> > > > > >
> > > > > > these cause loads starting from 'b', which is aligned, instead of
> > > > > > passing 'iph' or 'ip6h', unaligned, and loading from there.
> > > > >
> > > > > No... the loads are still from b->ip6h.saddr, b->ip6h.daddr and
> > > > > b->ip6h.payload_len.
> > > >
> > > > It depends how we define "loading from" -- the problem, in general, is
> > > > not the memory location per se, the problem is dereferencing memory
> > > > pointers.
> > > >
> > > > I plan to try an example on MIPS in a bit [...]
> > >
> > > Actually, armhf first (for clarity):
> > >
> > > $ cat align.c
> > > #include <stdio.h>
> > > #include <stdint.h>
> > >
> > > struct disarray {
> > > uint8_t oops;
> > > uint32_t v1;
> > > uint32_t v2;
> > > } __attribute__((packed, aligned(__alignof__(unsigned int))));
> > >
> > > void f1(uint32_t *v1) {
> > > *v1 += 42;
> > > }
> > >
> > > uint32_t f2(uint32_t v2) {
> > > return v2++;
> > > }
> > >
> > > int main()
> > > {
> > > struct disarray d = { 0x55, 0xaa, 0xaa };
> > >
> > > f1(&d.v1);
> > > f2(d.v2);
> > >
> > > fprintf(stdout, "%08x %08x", d.v1, d.v2);
> > > }
> > >
> > > $ arm-linux-gnueabihf-gcc-12 -g -O0 -fno-stack-protector -fomit-frame-pointer -mno-unaligned-access -o align align.c
> > > align.c: In function ‘main’:
> > > align.c:22:8: warning: taking address of packed member of ‘struct disarray’ may result in an unaligned pointer value [-Waddress-of-packed-member]
> > > 22 | f1(&d.v1);
> > > | ^~~~~
> > >
> > > $ arm-linux-gnueabihf-objdump -S --disassemble=main align
> > > [...]
> > > f1(&d.v1);
> > > 562: ab01 add r3, sp, #4
> > > 564: 3301 adds r3, #1
> > > 566: 4618 mov r0, r3
> > > 568: f7ff ffde bl 528 <f1>
> > > [...]
> > >
> > > before the call to f1(), the address in r3 is not aligned (we just
> > > added #1), despite -mno-unaligned-access. I guess gcc can only warn
> > > about that, but not fix it.
> > >
> > > This:
> > > https://gcc.gnu.org/onlinedocs/gcc/ARM-Options.html
> > >
> > > says:
> > > -munaligned-access
> > > -mno-unaligned-access
> > >
> > > Enables (or disables) reading and writing of 16- and 32- bit values from addresses that are not 16- or 32- bit aligned. By default unaligned access is disabled for all pre-ARMv6, all ARMv6-M and for ARMv8-M Baseline architectures, and enabled for all other architectures. If unaligned access is not enabled then words in packed data structures are accessed a byte at a time.
> > >
> > > Implying, I guess, that on those architectures unaligned accesses
> > > shouldn't be done. I think Thumb mode also has issues with this, by
> > > the way.
> > >
> > > And in f1() we just have a ldr from that address (passed on r0):
> > > void f1(uint32_t *v1) {
> > > 528: b082 sub sp, #8
> > > 52a: 9001 str r0, [sp, #4]
> > > *v1 += 42;
> > > 52c: 9b01 ldr r3, [sp, #4]
> > > 52e: 681b ldr r3, [r3, #0]
> > > 530: f103 022a add.w r2, r3, #42 @ 0x2a
> > >
> > > $ arm-linux-gnueabihf-objdump -S --disassemble=f1 align
> > > [...]
> > > *v1 += 42;
> > > 52c: 9b01 ldr r3, [sp, #4]
> > > 52e: 681b ldr r3, [r3, #0]
> > > 530: f103 022a add.w r2, r3, #42 @ 0x2a
> > >
> > > ...but the call to f2() is fine: we load with offset 8 from the stack
> > > pointer, shift word right, load from offset 12, shift word left, OR:
> > >
> > > $ arm-linux-gnueabihf-objdump -S --disassemble=main align
> > > [...]
> > > f2(d.v2);
> > > 56c: 9b02 ldr r3, [sp, #8]
> > > 56e: 0a1b lsrs r3, r3, #8
> > > 570: f89d 200c ldrb.w r2, [sp, #12]
> > > 574: 0612 lsls r2, r2, #24
> > > 576: 4313 orrs r3, r2
> > > 578: 4618 mov r0, r3
> > > 57a: f7ff ffe0 bl 53e <f2>
> > > [...]
> >
> > Huh. Ok, so I guess the compiler realises it's doing a load from a
> > packed structure and generates the necessary fixup code. I thought it
> > would only consider the type of the actually loaded value.
>
> Well, it can't just do that, because otherwise we couldn't use packed
> structures on any architecture that doesn't support unaligned accesses,
> right?
Hm.. yeah, I guess not, I hadn't thought it through that way. I find
it difficult to reason about what will happen with packed structures,
since they explicitly break rules which are otherwise pretty much
universal.
> Once you pass a pointer to an unaligned value, though, the fixup
> information is lost, and the compiler models a function as simply taking
> a given pointer with a given type: the model doesn't include information
> as to where the value is stored.
Right. Everything you've said about this now makes sense to me with
this realisation.
--
David Gibson | I'll have my music baroque, and my code
david AT gibson.dropbear.id.au | minimalist, thank you. NOT _the_ _other_
| _way_ _around_!
http://www.ozlabs.org/~dgibson
[-- Attachment #2: signature.asc --]
[-- Type: application/pgp-signature, Size: 833 bytes --]
next prev parent reply other threads:[~2024-03-08 1:20 UTC|newest]
Thread overview: 38+ messages / expand[flat|nested] mbox.gz Atom feed top
2024-02-17 15:07 [PATCH v3 0/9] Add vhost-user support to passt (part 1) Laurent Vivier
2024-02-17 15:07 ` [PATCH v3 1/9] iov: add some functions to manage iovec Laurent Vivier
2024-02-19 2:45 ` David Gibson
2024-02-17 15:07 ` [PATCH v3 2/9] pcap: add pcap_iov() Laurent Vivier
2024-02-19 2:50 ` David Gibson
2024-02-17 15:07 ` [PATCH v3 3/9] checksum: align buffers Laurent Vivier
2024-02-17 15:07 ` [PATCH v3 4/9] checksum: add csum_iov() Laurent Vivier
2024-02-19 2:52 ` David Gibson
2024-02-17 15:07 ` [PATCH v3 5/9] util: move IP stuff from util.[ch] to ip.[ch] Laurent Vivier
2024-02-19 2:59 ` David Gibson
2024-02-17 15:07 ` [PATCH v3 6/9] checksum: use csum_ip4_header() in udp.c and tcp.c Laurent Vivier
2024-02-19 3:01 ` David Gibson
2024-02-29 16:24 ` Stefano Brivio
2024-02-29 23:10 ` David Gibson
2024-03-01 7:58 ` Stefano Brivio
2024-03-01 12:23 ` David Gibson
2024-03-04 17:04 ` Stefano Brivio
2024-02-17 15:07 ` [PATCH v3 7/9] checksum: introduce functions to compute the header part checksum for TCP/UDP Laurent Vivier
2024-02-19 3:08 ` David Gibson
2024-02-28 13:26 ` Laurent Vivier
2024-02-29 0:38 ` David Gibson
2024-02-29 7:05 ` Stefano Brivio
2024-02-29 8:49 ` David Gibson
2024-02-29 8:56 ` Stefano Brivio
2024-02-29 14:15 ` Stefano Brivio
2024-02-29 23:09 ` David Gibson
2024-03-01 6:56 ` Stefano Brivio
2024-03-04 1:54 ` David Gibson
2024-03-04 11:00 ` Stefano Brivio
2024-03-04 22:47 ` Stefano Brivio
2024-03-06 5:09 ` David Gibson
2024-03-08 0:08 ` Stefano Brivio
2024-03-08 1:20 ` David Gibson [this message]
2024-02-17 15:07 ` [PATCH v3 8/9] tap: make tap_update_mac() generic Laurent Vivier
2024-02-17 15:07 ` [PATCH v3 9/9] tcp: Introduce ipv4_fill_headers()/ipv6_fill_headers() Laurent Vivier
2024-02-19 3:14 ` David Gibson
2024-02-29 16:29 ` Stefano Brivio
2024-02-29 16:31 ` [PATCH v3 0/9] Add vhost-user support to passt (part 1) Stefano Brivio
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=Zepn3irTeKFJ5DC9@zatzit \
--to=david@gibson.dropbear.id.au \
--cc=lvivier@redhat.com \
--cc=passt-dev@passt.top \
--cc=sbrivio@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
Code repositories for project(s) associated with this public inbox
https://passt.top/passt
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for IMAP folder(s).