From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-pl1-x631.google.com (mail-pl1-x631.google.com [IPv6:2607:f8b0:4864:20::631]) by mail.toke.dk (Postfix) with ESMTPS id 4CB69A213AB for ; Mon, 14 Aug 2023 20:05:25 +0200 (CEST) Authentication-Results: mail.toke.dk; dkim=pass (2048-bit key; unprotected) header.d=google.com header.i=@google.com header.a=rsa-sha256 header.s=20221208 header.b=S1Ui5Xf8 Received: by mail-pl1-x631.google.com with SMTP id d9443c01a7336-1bc73a2b0easo29383335ad.0 for ; Mon, 14 Aug 2023 11:05:25 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20221208; t=1692036323; x=1692641123; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=ba6VGZmEmlmvXkETt3mRsz534ZRHvg+Aa46jt8J9mH8=; b=S1Ui5Xf87I3RcTAZJp0H7HdFZXLmmqXmQjfVvlcVBeVgHo3ON7lp/iHE/zgVPjt3MR Zr5iR+YdtMXFjl2k7oMBC4XJzSzXgNH8OsRCGLQLAi8Jvu/I7fdRqs0eKA8PYMvP971g kZ9+svFopffgogmOvyMY+xeKRQt5OBckhuJ0nkXhpxhtKczPjEApO0Vm/gImlV+14rcS zZFWIqNi+EIGMYNVrDM0zi3BqRDOwGO7vwtTSotanx8ArAIsVOk91YXahLIWsSX4DrWh ZwyaiaUoyNuANFFSvsjDQIzc9cbNVKcvRk9zG1HuioJVF+yEQnu6BWrEX2PH3ta36k/c 17ow== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1692036323; x=1692641123; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=ba6VGZmEmlmvXkETt3mRsz534ZRHvg+Aa46jt8J9mH8=; b=WQ9ZnXBISejZ8OuLE24GMQ1Mg3YRGRO/9cyvpIMThwZ5DCxiUtDrtA1ylPjeSzQy99 SS7n2svVayFRTHvMlGtlix4zsNEcG7lYnxDsQsyfgw4d5mhp80ORIfjrlql4Ka7GxlKw sxmCdz0yleHmaq1F0W7WHNH9hp27qVgk+vAHEBWyXt67zwE8Vgh5jkbo//vjWTd2uBaT NOx6FafGLHYy6UcsVsrCumCB0F+ocXOX4q04JxR/O4Jr8GnFvuek1RS3T6nBg7WVNf/F wD9p9qHuSkNloYY5MIrDxIGb2yZt2vCxI9RtX9PVsBflRyq5tFo3T4irFVqekcjcWVB1 gJ5Q== X-Gm-Message-State: AOJu0YxX/vqg1p+3w9KW7ZWzAUpAuLk2Uk0C8UajNVZeSqeDtJVXIUmo j4WxgI1AWE+3aTyEbCdsYBRqxgQULl1FLRPSWepEHA== X-Google-Smtp-Source: AGHT+IEDefsWujVEm9udiS7IeoQT06VGYdn9PXTU8bGxByYRYDzbxo5HDED+DJV3mOyiExxfRC3jBhgHzQR1wiuLkvA= X-Received: by 2002:a17:902:6b4b:b0:1b9:c03b:39d9 with SMTP id g11-20020a1709026b4b00b001b9c03b39d9mr8795531plt.53.1692036323061; Mon, 14 Aug 2023 11:05:23 -0700 (PDT) MIME-Version: 1.0 References: <20230809165418.2831456-1-sdf@google.com> <20230809165418.2831456-2-sdf@google.com> In-Reply-To: From: Stanislav Fomichev Date: Mon, 14 Aug 2023 11:05:11 -0700 Message-ID: To: Maciej Fijalkowski Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Message-ID-Hash: KZA44RFVQCNH2V4NWC33NZXFK2SYAGEC X-Message-ID-Hash: KZA44RFVQCNH2V4NWC33NZXFK2SYAGEC X-MailFrom: sdf@google.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: bpf@vger.kernel.org, ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, haoluo@google.com, jolsa@kernel.org, kuba@kernel.org, toke@kernel.org, willemb@google.com, dsahern@kernel.org, magnus.karlsson@intel.com, bjorn@kernel.org, hawk@kernel.org, netdev@vger.kernel.org, xdp-hints@xdp-project.net X-Mailman-Version: 3.3.8 Precedence: list Subject: [xdp-hints] Re: [PATCH bpf-next 1/9] xsk: Support XDP_TX_METADATA_LEN List-Id: XDP hardware hints design discussion Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: On Mon, Aug 14, 2023 at 3:57=E2=80=AFAM Maciej Fijalkowski wrote: > > On Wed, Aug 09, 2023 at 09:54:10AM -0700, Stanislav Fomichev wrote: > > For zerocopy mode, tx_desc->addr can point to the arbitrary offset > > and carry some TX metadata in the headroom. For copy mode, there > > is no way currently to populate skb metadata. > > > > Introduce new XDP_TX_METADATA_LEN that indicates how many bytes > > to treat as metadata. Metadata bytes come prior to tx_desc address > > (same as in RX case). > > > > The size of the metadata has the same constraints as XDP: > > - less than 256 bytes > > - 4-byte aligned > > - non-zero > > > > This data is not interpreted in any way right now. > > > > Signed-off-by: Stanislav Fomichev > > --- > > include/net/xdp_sock.h | 1 + > > include/net/xsk_buff_pool.h | 1 + > > include/uapi/linux/if_xdp.h | 1 + > > net/xdp/xsk.c | 20 ++++++++++++++++++++ > > net/xdp/xsk_buff_pool.c | 1 + > > net/xdp/xsk_queue.h | 17 ++++++++++------- > > 6 files changed, 34 insertions(+), 7 deletions(-) > > > > diff --git a/include/net/xdp_sock.h b/include/net/xdp_sock.h > > index 1617af380162..467b9fb56827 100644 > > --- a/include/net/xdp_sock.h > > +++ b/include/net/xdp_sock.h > > @@ -51,6 +51,7 @@ struct xdp_sock { > > struct list_head flush_node; > > struct xsk_buff_pool *pool; > > u16 queue_id; > > + u8 tx_metadata_len; > > bool zc; > > bool sg; > > enum { > > diff --git a/include/net/xsk_buff_pool.h b/include/net/xsk_buff_pool.h > > index b0bdff26fc88..9c31e8d1e198 100644 > > --- a/include/net/xsk_buff_pool.h > > +++ b/include/net/xsk_buff_pool.h > > @@ -77,6 +77,7 @@ struct xsk_buff_pool { > > u32 chunk_size; > > u32 chunk_shift; > > u32 frame_len; > > + u8 tx_metadata_len; /* inherited from xsk_sock */ > > u8 cached_need_wakeup; > > bool uses_need_wakeup; > > bool dma_need_sync; > > diff --git a/include/uapi/linux/if_xdp.h b/include/uapi/linux/if_xdp.h > > index 8d48863472b9..b37b50102e1c 100644 > > --- a/include/uapi/linux/if_xdp.h > > +++ b/include/uapi/linux/if_xdp.h > > @@ -69,6 +69,7 @@ struct xdp_mmap_offsets { > > #define XDP_UMEM_COMPLETION_RING 6 > > #define XDP_STATISTICS 7 > > #define XDP_OPTIONS 8 > > +#define XDP_TX_METADATA_LEN 9 > > > > struct xdp_umem_reg { > > __u64 addr; /* Start of packet data area */ > > diff --git a/net/xdp/xsk.c b/net/xdp/xsk.c > > index 47796a5a79b3..28df3280501d 100644 > > --- a/net/xdp/xsk.c > > +++ b/net/xdp/xsk.c > > @@ -1338,6 +1338,26 @@ static int xsk_setsockopt(struct socket *sock, i= nt level, int optname, > > mutex_unlock(&xs->mutex); > > return err; > > } > > + case XDP_TX_METADATA_LEN: > > + { > > + int val; > > + > > + if (optlen < sizeof(val)) > > + return -EINVAL; > > + if (copy_from_sockptr(&val, optval, sizeof(val))) > > + return -EFAULT; > > + if (!val || val > 256 || val % 4) > > + return -EINVAL; > > + > > + mutex_lock(&xs->mutex); > > + if (xs->state !=3D XSK_READY) { > > + mutex_unlock(&xs->mutex); > > + return -EBUSY; > > + } > > + xs->tx_metadata_len =3D val; > > + mutex_unlock(&xs->mutex); > > + return 0; > > + } > > default: > > break; > > } > > diff --git a/net/xdp/xsk_buff_pool.c b/net/xdp/xsk_buff_pool.c > > index b3f7b310811e..b351732f1032 100644 > > --- a/net/xdp/xsk_buff_pool.c > > +++ b/net/xdp/xsk_buff_pool.c > > @@ -85,6 +85,7 @@ struct xsk_buff_pool *xp_create_and_assign_umem(struc= t xdp_sock *xs, > > XDP_PACKET_HEADROOM; > > pool->umem =3D umem; > > pool->addrs =3D umem->addrs; > > + pool->tx_metadata_len =3D xs->tx_metadata_len; > > Hey Stan, > > what would happen in case when one socket sets pool->tx_metadata_len say > to 16 and the other one that is sharing the pool to 24? If sockets should > and can have different padding, then this will not work unless the > metadata_len is on a per socket level. Hmm, good point. I didn't think about umem sharing :-/ Maybe they all have to agree on the size? And once the size has been size by one socket, the same size should be set on the others? (or at least be implied that the other sockets will use the same metadata layout)