On 08/30/2016 12:52 PM, Jakub Kicinski wrote:
On Mon, 29 Aug 2016 23:09:35 +0200, Daniel Borkmann wrote:
+ * 0,1 ok NOT SUPPORTED[1]
+ * 2 drop 0x22 -> drop, count as stat1
+ * 4,5 nuke 0x02 -> drop
+ * 7 redir 0x44 -> redir, count as stat2
+ * * unspec 0x11 -> pass, count as stat0
+ *
+ * [1] We can't support OK and RECLASSIFY because we can't tell TC
+ * the exact decision made. We are forced to support UNSPEC
+ * to handle aborts so that's the only one we handle for passing
+ * packets up the stack.
In da mode, RECLASSIFY is not supported, so this one could be scratched.
For the OK and UNSPEC part, couldn't both be treated the same (as in: OK /
pass to stack roughly equivalent as in sch_handle_ingress())? Or is the
issue that you cannot populate skb->tc_index when passing to stack (maybe
just fine to leave it at 0 for now)?
The comment is a bit confus(ed|ing). The problem is:
tc filter add <filter1> skip_sw
tc filter add <filter2> skip_hw
If packet appears in the stack - was it because of OK or UNSPEC (or
RECLASSIFY) in filter1? Do we need to run filter2 or not? Passing
tc_index can be implemented the same way I do mark today.
Okay, I see, thanks for explaining. So, if passing tc_index (or any other
meta data) can be implemented the same way as we do with mark already,
could we store such verdict, say, in some unused skb->tc_verd bits (the
skb->tc_index could be filled by the program already) and pass that up the
stack to differentiate between them? There should be no prior user before
ingress, so that patch 4 could become something like:
if (tc_skip_sw(prog->gen_flags)) {
filter_res = tc_map_hw_verd_to_act(skb);
} else if (at_ingress) {
...
} ...
And I assume it wouldn't make any sense anyway to have a skip_sw filter
being chained /after/ some skip_hw and the like, right?
Just curious, does TC_ACT_REDIRECT work in this scenario?
I do the redirects in the card, all the problems stem from the
Ok, cool.
difficulty of passing full ret code in the skb from the driver
to tc_classify()/cls_bpf_classify().