From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from us-smtp-delivery-124.mimecast.com (us-smtp-delivery-124.mimecast.com [170.10.129.124]) by mail.toke.dk (Postfix) with ESMTPS id 60AF29A7D85 for ; Wed, 5 Oct 2022 12:06:20 +0200 (CEST) Authentication-Results: mail.toke.dk; dkim=pass (1024-bit key; unprotected) header.d=redhat.com header.i=@redhat.com header.a=rsa-sha256 header.s=mimecast20190719 header.b=NIwWG69z DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=redhat.com; s=mimecast20190719; t=1664964379; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:cc:mime-version:mime-version:content-type:content-type: in-reply-to:in-reply-to:references:references; bh=gQShYH5psmd1zd5q0ecnoXE5H0Hdi6MU/XmKyeWxamE=; b=NIwWG69zAEETtawuxsHrE4TrtugnyZ5MMaLVqDL8By50PNC5kFEvC1tM50S6dGkitXcqJR ryFWwyb4xEwUISSTNLFPhoz45/do7nr5nwt9REEiel0lfWI1bTo7l2YGXIyComNyS8TNVL rFJEhKjYhhXA/f7rPwsPApvtZB7kojU= Received: from mail-ej1-f71.google.com (mail-ej1-f71.google.com [209.85.218.71]) by relay.mimecast.com with ESMTP with STARTTLS (version=TLSv1.3, cipher=TLS_AES_128_GCM_SHA256) id us-mta-47-E5AP7LKKOOKJjzO4BxUjZg-1; Wed, 05 Oct 2022 06:06:18 -0400 X-MC-Unique: E5AP7LKKOOKJjzO4BxUjZg-1 Received: by mail-ej1-f71.google.com with SMTP id hs8-20020a1709073e8800b0078d35742ea2so391070ejc.13 for ; Wed, 05 Oct 2022 03:06:18 -0700 (PDT) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=mime-version:message-id:date:references:in-reply-to:subject:cc:to :from:x-gm-message-state:from:to:cc:subject:date; bh=gQShYH5psmd1zd5q0ecnoXE5H0Hdi6MU/XmKyeWxamE=; b=dDstjzIsazm1VpB+NrvLCHkz8Zs0npOSnM02uq37WasVD1kpOgzXlaJNVQyWeAOet5 GSoHv3YJhf90wbyAs0VboB5Xb6XxPv7IagifZYSk/fBJt8ILsfUY8QrhaTozqZoKQax/ ipBaraElklhj9mx001lInDBegEqRQJaKEeUhDZspYnw0+FmlFmPbAhle3uvG/J8d+vw7 2VSvlHj3GEnsC6v8eDg6giduYm/xRF5Tib+yRut0wF8RwVu4DHVlxFzZ2g+XTM89V2c1 45iG6dwlIytePcwnqcAb4b0aCcrUvf6BVjCaXxkkA8sjg4OTv3Iwhte5ZMLeQyKVWAxu WxPQ== X-Gm-Message-State: ACrzQf2seYfVaStVcPbH/AFj7+/39rut5PkSGLoXqM00KTwVSdSMLAr4 mAO3LETBbSCml9GVDs9zg5peGqHNR2InLxBZeHI6a1qguG0d/IXXeqbYKKWbYrAC2PdB+cCSf6F loCi8Kist6scFzZlvDYaU X-Received: by 2002:a17:907:7e8b:b0:78c:c4a8:a91a with SMTP id qb11-20020a1709077e8b00b0078cc4a8a91amr8767432ejc.714.1664964376980; Wed, 05 Oct 2022 03:06:16 -0700 (PDT) X-Google-Smtp-Source: AMsMyM7Cb0A2SFrWuei+/Wg8WHMe1yb33J5QbevOnP70Nt/j0/2ImCeBNToi3agCGynSgHe2cXwlIA== X-Received: by 2002:a17:907:7e8b:b0:78c:c4a8:a91a with SMTP id qb11-20020a1709077e8b00b0078cc4a8a91amr8767398ejc.714.1664964376540; Wed, 05 Oct 2022 03:06:16 -0700 (PDT) Received: from alrua-x1.borgediget.toke.dk ([45.145.92.2]) by smtp.gmail.com with ESMTPSA id ku16-20020a170907789000b0078d38cda2b1sm143493ejc.202.2022.10.05.03.06.15 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 05 Oct 2022 03:06:15 -0700 (PDT) Received: by alrua-x1.borgediget.toke.dk (Postfix, from userid 1000) id 0C89264EB73; Wed, 5 Oct 2022 12:06:15 +0200 (CEST) From: Toke =?utf-8?Q?H=C3=B8iland-J=C3=B8rgensen?= To: Stanislav Fomichev , Jakub Kicinski In-Reply-To: References: <166256538687.1434226.15760041133601409770.stgit@firesoul> <35fcfb25-583a-e923-6eee-e8bbcc19db17@redhat.com> <5ccff6fa-0d50-c436-b891-ab797fe7e3c4@linux.dev> <20221004175952.6e4aade7@kernel.org> X-Clacks-Overhead: GNU Terry Pratchett Date: Wed, 05 Oct 2022 12:06:15 +0200 Message-ID: <87h70iinzc.fsf@toke.dk> MIME-Version: 1.0 X-Mimecast-Spam-Score: 0 X-Mimecast-Originator: redhat.com Content-Type: text/plain Message-ID-Hash: QFWGOHMYGPTSMIGR3R65JIOUWYQP56OQ X-Message-ID-Hash: QFWGOHMYGPTSMIGR3R65JIOUWYQP56OQ X-MailFrom: toke@redhat.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: Martin KaFai Lau , Jesper Dangaard Brouer , brouer@redhat.com, bpf@vger.kernel.org, netdev@vger.kernel.org, xdp-hints@xdp-project.net, larysa.zaremba@intel.com, memxor@gmail.com, Lorenzo Bianconi , mtahhan@redhat.com, Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , dave@dtucker.co.uk, Magnus Karlsson , bjorn@kernel.org X-Mailman-Version: 3.3.5 Precedence: list Subject: [xdp-hints] Re: [PATCH RFCv2 bpf-next 00/18] XDP-hints: XDP gaining access to HW offload hints via BTF List-Id: XDP hardware hints design discussion Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: Stanislav Fomichev writes: > On Tue, Oct 4, 2022 at 5:59 PM Jakub Kicinski wrote: >> >> On Tue, 4 Oct 2022 17:25:51 -0700 Martin KaFai Lau wrote: >> > A intentionally wild question, what does it take for the driver to return the >> > hints. Is the rx_desc and rx_queue enough? When the xdp prog is calling a >> > kfunc/bpf-helper, like 'hwtstamp = bpf_xdp_get_hwtstamp()', can the driver >> > replace it with some inline bpf code (like how the inline code is generated for >> > the map_lookup helper). The xdp prog can then store the hwstamp in the meta >> > area in any layout it wants. >> >> Since you mentioned it... FWIW that was always my preference rather than >> the BTF magic :) The jited image would have to be per-driver like we >> do for BPF offload but that's easy to do from the technical >> perspective (I doubt many deployments bind the same prog to multiple >> HW devices).. > > +1, sounds like a good alternative (got your reply while typing) > I'm not too versed in the rx_desc/rx_queue area, but seems like worst > case that bpf_xdp_get_hwtstamp can probably receive a xdp_md ctx and > parse it out from the pre-populated metadata? > > Btw, do we also need to think about the redirect case? What happens > when I redirect one frame from a device A with one metadata format to > a device B with another? Yes, we absolutely do! In fact, to me this (redirects) is the main reason why we need the ID in the packet in the first place: when running on (say) a veth, an XDP program needs to be able to deal with packets from multiple physical NICs. As far as API is concerned, my hope was that we could solve this with a CO-RE like approach where the program author just writes something like: hw_tstamp = bpf_get_xdp_hint("hw_tstamp", u64); and bpf_get_xdp_hint() is really a macro (or a special kind of relocation?) and libbpf would do the following on load: - query the kernel BTF for all possible xdp_hint structs - figure out which of them have an 'u64 hw_tstamp' member - generate the necessary conditionals / jump table to disambiguate on the BTF_ID in the packet Now, if this is better done by a kfunc I'm not terribly opposed to that either, but I'm not sure it's actually better/easier to do in the kernel than in libbpf at load time? -Toke