From: John Fastabend <john.fastabend@gmail.com>
To: Stanislav Fomichev <sdf@google.com>, bpf@vger.kernel.org
Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org,
martin.lau@linux.dev, song@kernel.org, yhs@fb.com,
john.fastabend@gmail.com, kpsingh@kernel.org, sdf@google.com,
haoluo@google.com, jolsa@kernel.org,
Jakub Kicinski <kuba@kernel.org>,
Willem de Bruijn <willemb@google.com>,
Jesper Dangaard Brouer <brouer@redhat.com>,
Anatoly Burakov <anatoly.burakov@intel.com>,
Alexander Lobakin <alexandr.lobakin@intel.com>,
Magnus Karlsson <magnus.karlsson@gmail.com>,
Maryam Tahhan <mtahhan@redhat.com>,
xdp-hints@xdp-project.net, netdev@vger.kernel.org
Subject: [xdp-hints] Re: [RFC bpf-next 0/5] xdp: hints via kfuncs
Date: Fri, 28 Oct 2022 08:58:18 -0700 [thread overview]
Message-ID: <635bfc1a7c351_256e2082f@john.notmuch> (raw)
In-Reply-To: <20221027200019.4106375-1-sdf@google.com>
Stanislav Fomichev wrote:
> This is an RFC for the alternative approach suggested by Martin and
> Jakub. I've tried to CC most of the people from the original discussion,
> feel free to add more if you think I've missed somebody.
>
> Summary:
> - add new BPF_F_XDP_HAS_METADATA program flag and abuse
> attr->prog_ifindex to pass target device ifindex at load time
> - at load time, find appropriate ndo_unroll_kfunc and call
> it to unroll/inline kfuncs; kfuncs have the default "safe"
> implementation if unrolling is not supported by a particular
> device
> - rewrite xskxceiver test to use C bpf program and extend
> it to export rx_timestamp (plus add rx timestamp to veth driver)
>
> I've intentionally kept it small and hacky to see whether the approach is
> workable or not.
Hi,
I need RX timestamps now as well so was going to work on some code
next week as well.
My plan was to simply put a kptr to the rx descriptor in the xdp
buffer. If I can read the rx descriptor I can read the timestamp,
the rxhash and any other metadata the NIC has completed. All the
drivers I've looked at stash the data here.
I'll inline pro/cons compared to this below as I see it.
>
> Pros:
> - we avoid BTF complexity; the BPF programs themselves are now responsible
> for agreeing on the metadata layout with the AF_XDP consumer
Same no BTF is needed in kernel side. Userspace and BPF progs get
to sort it out.
> - the metadata is free if not used
Same.
> - the metadata should, in theory, be cheap if used; kfuncs should be
> unrolled to the same code as if the metadata was pre-populated and
> passed with a BTF id
Same its just a kptr at this point. Also one more advantage would
be ability to read the data without copying it.
> - it's not all or nothing; users can use small subset of metadata which
> is more efficient than the BTF id approach where all metadata has to be
> exposed for every frame (and selectively consumed by the users)
Same.
>
> Cons:
> - forwarding has to be handled explicitly; the BPF programs have to
> agree on the metadata layout (IOW, the forwarding program
> has to be aware of the final AF_XDP consumer metadata layout)
Same although IMO this is a PRO. You only get the bytes you need
and care about and can also augment it with extra good stuff so
calculation only happen once.
> - TX picture is not clear; but it's not clear with BTF ids as well;
> I think we've agreed that just reusing whatever we have at RX
> won't fly at TX; seems like TX XDP program might be the answer
> here? (with a set of another tx kfuncs to "expose" bpf/af_xdp metatata
> back into the kernel)
Agree TX is not addressed.
A bit of extra commentary. By exposing the raw kptr to the rx
descriptor we don't need driver writers to do anything. And
can easily support all the drivers out the gate with simple
one or two line changes. This pushes the interesting parts
into userspace and then BPF writers get to do the work without
bother driver folks and also if its not done today it doesn't
matter because user space can come along and make it work
later. So no scattered kernel dependencies which I really
would like to avoid here. Its actually very painful to have
to support clusters with N kernels and M devices if they
have different features. Doable but annoying and much nicer
if we just say 6.2 has support for kptr rx descriptor reading
and all XDP drivers support it. So timestamp, rxhash work
across the board.
To find the offset of fields (rxhash, timestamp) you can use
standard BTF relocations we have all this machinery built up
already for all the other structs we read, net_devices, task
structs, inodes, ... so its not a big hurdle at all IMO. We
can add userspace libs if folks really care, but its just
a read so I'm not even sure that is helpful.
I think its nicer than having kfuncs that need to be written
everywhere. My $.02 although I'll poke around with below
some as well. Feel free to just hang tight until I have some
code at the moment I have intel, mellanox drivers that I
would want to support.
>
> Cc: Martin KaFai Lau <martin.lau@linux.dev>
> Cc: Jakub Kicinski <kuba@kernel.org>
> Cc: Willem de Bruijn <willemb@google.com>
> Cc: Jesper Dangaard Brouer <brouer@redhat.com>
> Cc: Anatoly Burakov <anatoly.burakov@intel.com>
> Cc: Alexander Lobakin <alexandr.lobakin@intel.com>
> Cc: Magnus Karlsson <magnus.karlsson@gmail.com>
> Cc: Maryam Tahhan <mtahhan@redhat.com>
> Cc: xdp-hints@xdp-project.net
> Cc: netdev@vger.kernel.org
>
> Stanislav Fomichev (5):
> bpf: Support inlined/unrolled kfuncs for xdp metadata
> veth: Support rx timestamp metadata for xdp
> libbpf: Pass prog_ifindex via bpf_object_open_opts
> selftests/bpf: Convert xskxceiver to use custom program
> selftests/bpf: Test rx_timestamp metadata in xskxceiver
>
> drivers/net/veth.c | 31 +++++
> include/linux/bpf.h | 1 +
> include/linux/btf.h | 1 +
> include/linux/btf_ids.h | 4 +
> include/linux/netdevice.h | 3 +
> include/net/xdp.h | 22 ++++
> include/uapi/linux/bpf.h | 5 +
> kernel/bpf/syscall.c | 28 ++++-
> kernel/bpf/verifier.c | 60 +++++++++
> net/core/dev.c | 7 ++
> net/core/xdp.c | 28 +++++
> tools/include/uapi/linux/bpf.h | 5 +
> tools/lib/bpf/libbpf.c | 1 +
> tools/lib/bpf/libbpf.h | 6 +-
> tools/testing/selftests/bpf/Makefile | 1 +
> .../testing/selftests/bpf/progs/xskxceiver.c | 43 +++++++
> tools/testing/selftests/bpf/xskxceiver.c | 119 +++++++++++++++---
> tools/testing/selftests/bpf/xskxceiver.h | 5 +-
> 18 files changed, 348 insertions(+), 22 deletions(-)
> create mode 100644 tools/testing/selftests/bpf/progs/xskxceiver.c
>
> --
> 2.38.1.273.g43a17bfeac-goog
>
next prev parent reply other threads:[~2022-10-28 15:58 UTC|newest]
Thread overview: 50+ messages / expand[flat|nested] mbox.gz Atom feed top
2022-10-27 20:00 [xdp-hints] " Stanislav Fomichev
2022-10-27 20:00 ` [xdp-hints] [RFC bpf-next 1/5] bpf: Support inlined/unrolled kfuncs for xdp metadata Stanislav Fomichev
2022-10-27 20:00 ` [xdp-hints] [RFC bpf-next 2/5] veth: Support rx timestamp metadata for xdp Stanislav Fomichev
2022-10-28 8:40 ` [xdp-hints] " Jesper Dangaard Brouer
2022-10-28 18:46 ` Stanislav Fomichev
2022-10-27 20:00 ` [xdp-hints] [RFC bpf-next 3/5] libbpf: Pass prog_ifindex via bpf_object_open_opts Stanislav Fomichev
2022-10-27 20:05 ` [xdp-hints] " Andrii Nakryiko
2022-10-27 20:10 ` Stanislav Fomichev
2022-10-27 20:00 ` [xdp-hints] [RFC bpf-next 4/5] selftests/bpf: Convert xskxceiver to use custom program Stanislav Fomichev
2022-10-27 20:00 ` [xdp-hints] [RFC bpf-next 5/5] selftests/bpf: Test rx_timestamp metadata in xskxceiver Stanislav Fomichev
2022-10-28 6:22 ` [xdp-hints] " Martin KaFai Lau
2022-10-28 10:37 ` Jesper Dangaard Brouer
2022-10-28 18:46 ` Stanislav Fomichev
2022-10-31 14:20 ` Alexander Lobakin
2022-10-31 14:29 ` Alexander Lobakin
2022-10-31 17:00 ` Stanislav Fomichev
2022-11-01 13:18 ` Jesper Dangaard Brouer
2022-11-01 20:12 ` Stanislav Fomichev
2022-11-01 22:23 ` Toke Høiland-Jørgensen
2022-10-28 15:58 ` John Fastabend [this message]
2022-10-28 18:04 ` [xdp-hints] Re: [RFC bpf-next 0/5] xdp: hints via kfuncs Jakub Kicinski
2022-10-28 18:46 ` Stanislav Fomichev
2022-10-28 23:16 ` John Fastabend
2022-10-29 1:14 ` Jakub Kicinski
2022-10-31 14:10 ` Bezdeka, Florian
2022-10-31 15:28 ` Toke Høiland-Jørgensen
2022-10-31 17:00 ` Stanislav Fomichev
2022-10-31 22:57 ` Martin KaFai Lau
2022-11-01 1:59 ` Stanislav Fomichev
2022-11-01 12:52 ` Toke Høiland-Jørgensen
2022-11-01 13:43 ` David Ahern
2022-11-01 14:20 ` Toke Høiland-Jørgensen
2022-11-01 17:05 ` Martin KaFai Lau
2022-11-01 20:12 ` Stanislav Fomichev
2022-11-02 14:06 ` Jesper Dangaard Brouer
2022-11-02 22:01 ` Toke Høiland-Jørgensen
2022-11-02 23:10 ` Stanislav Fomichev
2022-11-03 0:09 ` Toke Høiland-Jørgensen
2022-11-03 12:01 ` Jesper Dangaard Brouer
2022-11-03 12:48 ` Toke Høiland-Jørgensen
2022-11-03 15:25 ` Jesper Dangaard Brouer
2022-10-31 19:36 ` Yonghong Song
2022-10-31 22:09 ` Stanislav Fomichev
2022-10-31 22:38 ` Yonghong Song
2022-10-31 22:55 ` Stanislav Fomichev
2022-11-01 14:23 ` Jesper Dangaard Brouer
2022-11-01 17:31 ` Martin KaFai Lau
2022-11-01 20:12 ` Stanislav Fomichev
2022-11-01 21:17 ` Martin KaFai Lau
2022-10-31 17:01 ` John Fastabend
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
List information: https://lists.xdp-project.net/postorius/lists/xdp-hints.xdp-project.net/
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=635bfc1a7c351_256e2082f@john.notmuch \
--to=john.fastabend@gmail.com \
--cc=alexandr.lobakin@intel.com \
--cc=anatoly.burakov@intel.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=brouer@redhat.com \
--cc=daniel@iogearbox.net \
--cc=haoluo@google.com \
--cc=jolsa@kernel.org \
--cc=kpsingh@kernel.org \
--cc=kuba@kernel.org \
--cc=magnus.karlsson@gmail.com \
--cc=martin.lau@linux.dev \
--cc=mtahhan@redhat.com \
--cc=netdev@vger.kernel.org \
--cc=sdf@google.com \
--cc=song@kernel.org \
--cc=willemb@google.com \
--cc=xdp-hints@xdp-project.net \
--cc=yhs@fb.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox