From: Luuk Paulussen <Luuk.Paulussen@alliedtelesis.co.nz>
To: Daniel Borkmann <daniel@iogearbox.net>, Florian Westphal <fw@strlen.de>
Cc: "netfilter-devel@vger.kernel.org" <netfilter-devel@vger.kernel.org>
Subject: Re: [PATCH] Add tcindex to conntrack and add netfilter target/matches
Date: Sun, 13 Dec 2015 23:00:15 +0000 [thread overview]
Message-ID: <566DF87E.40608@alliedtelesis.co.nz> (raw)
In-Reply-To: <5667EF49.8060707@iogearbox.net>
On 12/09/2015 10:07 PM, Daniel Borkmann wrote:
> On 12/07/2015 03:19 AM, Luuk Paulussen wrote:
>> On 12/07/2015 11:45 AM, Florian Westphal wrote:
>>> Luuk Paulussen <Luuk.Paulussen@alliedtelesis.co.nz> wrote:
>>>> Hi All,
>>>>
>>>> I'm still hoping for some feedback on this. I have some userspace
>>>> patches around this as well, (to set/show the tc_index in the
>>>> connection, and to add the marking/matching rules in iptables), but
>>>> I am
>>>> holding off on sending them until I know what people think of this
>>>> idea/implementation first.
>>> I can't say for sure since I don't know enough about tc.
>>>
>>> However, AFAICS tc_index seems to be something that should be internal
>>> to tc and not exposed/changeable via iptables.
>> tc_index is a mark that can be set by certain configurable ingress
>> schedulers (dsmark, GRED, ingress) for later classification via the
>> tcindex classifer. This just adds an alternative mechanism for setting
>> this mark if those schedulers aren't being used.
>
> Fwiw, tc_index can be read/written by cls_bpf (and you can also apply
> masks
> on that field if needed).
I've just been looking into this and it does seem like it might cover a
small part of what we are trying to do, although misses the key part,
which is to use connection tracking information to limit full processing
to the first packet of a flow in each direction. I'm guessing that there
isn't any bpf support for connection information?
One thing that isn't quite clear to me. Is it possible to use xt_bfp.c
to set the tc_index field from netfilter? If this is the case, then it
does set a precedent
for being able to set this value outside of tc code (but sill misses the
save/restore possibility).
Given that tc_index is simple metadata I'm guessing that filter
performance over the tcindex classifier wouldn't be significantly better?
>> * dsmark sets the tc_index value based on the incoming DSCP value
>> * ingress sets the tc_index value based on other rules (e.g. mark set
>> via iptables)
>> * New code sets tc_index directly based on iptables classification or
>> restoring saved value.
I'm still looking for an overall idea around whether this patch has a
chance of being accepted for the kernel. It feels like none of the
comments or proposed ideas have addressed the issues that the patch is
addressing:
1. Save/restore functionality of mark/connmark can significantly
increase performance for larger rule sets, so is desirable for
performance reasons.
2. Insufficient space in skb nf mark and connection mark for all
applications that might want to use it.
3. tc being one of the users of nf mark (via fw filter) has a logical
alternative in the 16 bit tc_index field, which could be used without
increasing SKB size. This doesn't currently have a match/tag target in
netfilter or an analogue in the connection for save/restore. It does
however have a pre-existing classifier in tc code.
So this patch adds tc_index field to the connection and
match/tag/save/restore targets to netfilter, allowing marking packets
for tc into this field and save/restore from the connection.
next prev parent reply other threads:[~2015-12-13 23:00 UTC|newest]
Thread overview: 10+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-12-03 21:59 Support marking/matching tc_index in netfilter Luuk Paulussen
2015-12-03 21:59 ` [PATCH] Add tcindex to conntrack and add netfilter target/matches Luuk Paulussen
2015-12-06 22:28 ` Luuk Paulussen
2015-12-06 22:45 ` Florian Westphal
2015-12-07 2:19 ` Luuk Paulussen
2015-12-07 3:05 ` Florian Westphal
2015-12-07 4:24 ` Luuk Paulussen
2015-12-09 9:07 ` Daniel Borkmann
2015-12-13 23:00 ` Luuk Paulussen [this message]
2015-12-14 9:50 ` Daniel Borkmann
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=566DF87E.40608@alliedtelesis.co.nz \
--to=luuk.paulussen@alliedtelesis.co.nz \
--cc=daniel@iogearbox.net \
--cc=fw@strlen.de \
--cc=netfilter-devel@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).