From mboxrd@z Thu Jan 1 00:00:00 1970 Received: from mail-qt1-f170.google.com (mail-qt1-f170.google.com [209.85.160.170]) by mail.toke.dk (Postfix) with ESMTPS id EF8CD9D6269 for ; Wed, 28 Dec 2022 18:25:10 +0100 (CET) Received: by mail-qt1-f170.google.com with SMTP id z12so13163024qtv.5 for ; Wed, 28 Dec 2022 09:25:10 -0800 (PST) X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=user-agent:in-reply-to:content-disposition:mime-version:references :message-id:subject:cc:to:from:date:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=s5p6x50s9kzMnAPrBvfrTDgU6VJWbaZNT6iWAges8e8=; b=e4rPEG+NGKlpNxPqIERkXIYTwUIOWLiYKPT7w9BBzcYUEBpvcjS4uey4LxCZmlC8K3 WoOhU3rCmyMpk4mgouwGn9mtR/ZbsjuIvLhy+EXKN1duq91P+DzR2yHWUCzfeMTY6IzM 5xqSRGHr5vVgaAaMWKNukJjURqGT1Dpyn4Jls2eWIiW+ch23AckCA/CqkfhJ9OK653Yd bZTYEy9vA8gKqq8KwXQ0Rr/LQX8TVsCTwQLJIbo8CS+WmCsc/JIg02o2MLPmfdV+o1k/ BK8WmAOczgm65qnRH8RqUytWX4II7I6Th+BXNohTzzA+EwQs8WgDUIsio3HTv1MC6Jia nTxw== X-Gm-Message-State: AFqh2koj/Q6Z1+akAKKllGiZduFSQ9y3UcO0UkRKVUS0FshuOi5kii5h s3/RWWn1aYEalpoWsNi+UEk= X-Google-Smtp-Source: AMrXdXucgn6Wn/UbpSAyLkPTXQ9JYhc8qGLLMYkiUEohdg5lWfCTI4Mqoq4fBTyPMnI8CXY+jfYNuA== X-Received: by 2002:ac8:7504:0:b0:3a8:305f:2fb0 with SMTP id u4-20020ac87504000000b003a8305f2fb0mr30750143qtq.18.1672248308763; Wed, 28 Dec 2022 09:25:08 -0800 (PST) Received: from maniforge.lan ([2620:10d:c091:480::1:8b37]) by smtp.gmail.com with ESMTPSA id s10-20020ac8528a000000b003a7e2aea23esm10128016qtn.86.2022.12.28.09.25.07 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Wed, 28 Dec 2022 09:25:08 -0800 (PST) Date: Wed, 28 Dec 2022 11:25:12 -0600 From: David Vernet To: Stanislav Fomichev Message-ID: References: <20221220222043.3348718-1-sdf@google.com> <20221220222043.3348718-2-sdf@google.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20221220222043.3348718-2-sdf@google.com> User-Agent: Mutt/2.2.9 (2022-11-12) Message-ID-Hash: RYQNG7MSSAJACH6CGXGHW3FMBRGZDXJW X-Message-ID-Hash: RYQNG7MSSAJACH6CGXGHW3FMBRGZDXJW X-MailFrom: dcvernet@gmail.com X-Mailman-Rule-Misses: dmarc-mitigation; no-senders; approved; emergency; loop; banned-address; member-moderation; nonmember-moderation; administrivia; implicit-dest; max-recipients; max-size; news-moderation; no-subject; digests; suspicious-header CC: bpf@vger.kernel.org, ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, martin.lau@linux.dev, song@kernel.org, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, haoluo@google.com, jolsa@kernel.org, David Ahern , Jakub Kicinski , Willem de Bruijn , Jesper Dangaard Brouer , Anatoly Burakov , Alexander Lobakin , Magnus Karlsson , Maryam Tahhan , xdp-hints@xdp-project.net, netdev@vger.kernel.org X-Mailman-Version: 3.3.7 Precedence: list Subject: [xdp-hints] Re: [PATCH bpf-next v5 01/17] bpf: Document XDP RX metadata List-Id: XDP hardware hints design discussion Archived-At: List-Archive: List-Help: List-Owner: List-Post: List-Subscribe: List-Unsubscribe: On Tue, Dec 20, 2022 at 02:20:27PM -0800, Stanislav Fomichev wrote: > Document all current use-cases and assumptions. > > Cc: John Fastabend > Cc: David Ahern > Cc: Martin KaFai Lau > Cc: Jakub Kicinski > Cc: Willem de Bruijn > Cc: Jesper Dangaard Brouer > Cc: Anatoly Burakov > Cc: Alexander Lobakin > Cc: Magnus Karlsson > Cc: Maryam Tahhan > Cc: xdp-hints@xdp-project.net > Cc: netdev@vger.kernel.org > Signed-off-by: Stanislav Fomichev > --- > Documentation/networking/index.rst | 1 + > Documentation/networking/xdp-rx-metadata.rst | 107 +++++++++++++++++++ > 2 files changed, 108 insertions(+) > create mode 100644 Documentation/networking/xdp-rx-metadata.rst > > diff --git a/Documentation/networking/index.rst b/Documentation/networking/index.rst > index 4f2d1f682a18..4ddcae33c336 100644 > --- a/Documentation/networking/index.rst > +++ b/Documentation/networking/index.rst > @@ -120,6 +120,7 @@ Refer to :ref:`netdev-FAQ` for a guide on netdev development process specifics. > xfrm_proc > xfrm_sync > xfrm_sysctl > + xdp-rx-metadata > > .. only:: subproject and html > > diff --git a/Documentation/networking/xdp-rx-metadata.rst b/Documentation/networking/xdp-rx-metadata.rst > new file mode 100644 > index 000000000000..37e8192d9b60 > --- /dev/null > +++ b/Documentation/networking/xdp-rx-metadata.rst Hey Stanislav, This is looking excellent. Left a few more minor comments and suggestions. > @@ -0,0 +1,107 @@ > +=============== > +XDP RX Metadata > +=============== > + > +This document describes how an XDP program can access hardware metadata In similar fashion to LWN articles, can we spell out what XDP means the first time it's used, e.g.: ...describes how an eXpress Data Path (XDP) program... In general this applies to other acronyms unless they're super obvious, like "CPU" (thanks for already having done it for XSK). > +related to a packet using a set of helper functions, and how it can pass > +that metadata on to other consumers. > + > +General Design > +============== > + > +XDP has access to a set of kfuncs to manipulate the metadata in an XDP frame. > +Every device driver that wishes to expose additional packet metadata can > +implement these kfuncs. The set of kfuncs is declared in ``include/net/xdp.h`` > +via ``XDP_METADATA_KFUNC_xxx``. > + > +Currently, the following kfuncs are supported. In the future, as more > +metadata is supported, this set will grow: > + > +- ``bpf_xdp_metadata_rx_timestamp`` returns a packet's RX timestamp > +- ``bpf_xdp_metadata_rx_hash`` returns a packet's RX hash So, I leave this up to you as to whether or not you want to do this, but there is a built-in mechanism in sphinx that converts doxygen comments to rendered documentation for a function, struct, etc, and also automatically links other places in documentation where the function is referenced. See [0] for an example of this in code, and [1] for an example of how it's rendered. [0]: https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git/tree/Documentation/bpf/kfuncs.rst#n239 [1]: https://docs.kernel.org/bpf/kfuncs.html#c.bpf_task_acquire So you would do something like add function headers to the kfuncs, and then do: .. kernel-doc:: net/core/xdp.c :identifiers: bpf_xdp_metadata_rx_timestamp bpf_xdp_metadata_rx_hash At some point we will need a consistent story for how we document kfuncs. That's not set in stone yet, which is why I'm saying it's up to you whether or not you want to do this or just leave it as teletype with a written description next to it. Later on when we settle on a documentation story for kfuncs, we can update all of them to be documented in the same way. > +The XDP program can use these kfuncs to read the metadata into stack s/The/An > +variables for its own consumption. Or, to pass the metadata on to other > +consumers, an XDP program can store it into the metadata area carried > +ahead of the packet. > + > +Not all kfuncs have to be implemented by the device driver; when not > +implemented, the default ones that return ``-EOPNOTSUPP`` will be used. > + > +Within the XDP frame, the metadata layout is as follows:: s/the/an > + > + +----------+-----------------+------+ > + | headroom | custom metadata | data | > + +----------+-----------------+------+ > + ^ ^ > + | | > + xdp_buff->data_meta xdp_buff->data > + > +The XDP program can store individual metadata items into this data_meta Can we teletype ``data_meta``? Also, s/The XDP program/An XDP program > +area in whichever format it chooses. Later consumers of the metadata > +will have to agree on the format by some out of band contract (like for > +the AF_XDP use case, see below). > + > +AF_XDP > +====== > + > +``AF_XDP`` use-case implies that there is a contract between the BPF program > +that redirects XDP frames into the ``AF_XDP`` socket (``XSK``) and the final > +consumer. Thus the BPF program manually allocates a fixed number of Can we have ``AF_XDP`` link to the ``AF_XDP`` docs page for any reader that's not familiar with it? I think you can just do the following and it should just work: s/``AF_XDP``/:doc:`af_xdp` > +bytes out of metadata via ``bpf_xdp_adjust_meta`` and calls a subset > +of kfuncs to populate it. The userspace ``XSK`` consumer computes > +``xsk_umem__get_data() - METADATA_SIZE`` to locate its metadata. s/to locate its metadata/to locate that metadata to make it clear that the consumer is consuming the metadata that was populated by bpf_xdp_adjust_meta()? It's pretty clear from context but I think "its metadata" may confuse some people as the metadata is not really owned by the consumer. Also, should we mention that xsk_umem__get_data() is defined in libxdp? One other probably dumb question: is METADATA_SIZE static? If so, should we provide a libxdp wrapper to access it? > + > +Here is the ``AF_XDP`` consumer layout (note missing ``data_meta`` pointer):: > + > + +----------+-----------------+------+ > + | headroom | custom metadata | data | > + +----------+-----------------+------+ > + ^ > + | > + rx_desc->address > + > +XDP_PASS > +======== > + > +This is the path where the packets processed by the XDP program are passed > +into the kernel. The kernel creates the ``skb`` out of the ``xdp_buff`` > +contents. Currently, every driver has custom kernel code to parse > +the descriptors and populate ``skb`` metadata when doing this ``xdp_buff->skb`` > +conversion, and the XDP metadata is not used by the kernel when building > +skbs. However, TC-BPF programs can access the XDP metadata area using > +the data_meta pointer. ``data_meta`` > + > +In the future, we'd like to support a case where an XDP program > +can override some of the metadata used for building skbs. > + > +bpf_redirect_map > +================ > + > +``bpf_redirect_map`` can redirect the frame to a different device. > +Some devices (like virtual ethernet links) support running a second XDP > +program after the redirect. However, the final consumer doesn't have > +access to the original hardware descriptor and can't access any of > +the original metadata. The same applies to XDP programs installed > +into devmaps and cpumaps. > + > +This means that for redirected packets only custom metadata is > +currently supported, which has to be prepared by the initial XDP program > +before redirect. If the frame is eventually passed to the kernel, the > +skb created from such a frame won't have any hardware metadata populated > +in its skb. And if such a packet is later redirected into an ``XSK``, s/And if/If Also, can you add teletype ``skb`` in this paragraph? > +that will also only have access to the custom metadata. > + > + > +bpf_tail_call > +============= > + > +Adding programs that access metadata kfuncs to the ``BPF_MAP_TYPE_PROG_ARRAY`` > +is currently not supported. > + > +Example > +======= > + > +See ``tools/testing/selftests/bpf/progs/xdp_metadata.c`` and > +``tools/testing/selftests/bpf/prog_tests/xdp_metadata.c`` for an example of > +BPF program that handles XDP metadata. > -- > 2.39.0.314.g84b9a713c41-goog Looks great otherwise, thanks.