Received: by 2002:a25:824b:0:0:0:0:0 with SMTP id d11csp44742ybn; Tue, 24 Sep 2019 17:57:11 -0700 (PDT) X-Google-Smtp-Source: APXvYqyPyViDjnkuRXu4KVS1yNTiAinCPa9/LRUUWMKJMBuDCP2+8y7C3ovihzqwPs9ib9PICwow X-Received: by 2002:adf:e591:: with SMTP id l17mr6097569wrm.199.1569373030878; Tue, 24 Sep 2019 17:57:10 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1569373030; cv=none; d=google.com; s=arc-20160816; b=S06ZVSdy3t2We/+KKF3mA+AFQNFnVCQyd+zYKhNptzvqfWEcc6sKpAw0RD49jWWl7X S2WpmaDbaINcp0igbQLMTFTLrv4XZwLYLzs0075bAUsCcwfh98rZt7Az7d+aYyg4+6oT iXRuHgIM+HzTIZ01upN/vuxLo/Ri25Ufxr2AfCWIM33PZWxRbs+IwaQFZWlwFhzlArO5 /tdaTFsHU3iDqy7o5U3H6dqHpUlgOyvvh1xasyAcNeQe+Jgvdi3BQfepMYjVvc4Ykt/W kUWlHSH0WOeO4FDreGfbgzIhjne291wREbVUWp3FthdAke1Mg1TeEJPfWpX6bgkl3bAn tmTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:dkim-signature; bh=GEvOfGA8f9CvBKQHIGcv1svReVin0bIV7g885ijSJlg=; b=AhbnryMm0TkFW0949KlbQtrb16SFtDrjsiO6zd2OISfgVsdk/87887N9RDDpzZjMdO vjjzX28mAmKh9K+QeKG+8lb40/FevLVueGU4OF4FagR5IFiXHmzO8jIGTlPfZNx92L80 BgFmm9xISTQ4kK6zwQTEJ2IfFxmtpRmqeOnfYIKmuKhZZMhzT+4xWUWVrn2voOAndDLK soqkVhAqCn2vmndTungt/zN8/9yVQGOuCsAMjN+bslaKZivzragViw8sFqj6hvMNjNxV Ul1euACm6ulNudh2IEwBfnkU7lICpaZMAsc2KN8r25WrBEDzESoBwxssFW0zKhVaB3YP z4Ng== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZdqUYKQu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id ck24si1785092ejb.400.2019.09.24.17.56.47; Tue, 24 Sep 2019 17:57:10 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=ZdqUYKQu; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1730208AbfIVWao (ORCPT + 99 others); Sun, 22 Sep 2019 18:30:44 -0400 Received: from mail-vs1-f65.google.com ([209.85.217.65]:35377 "EHLO mail-vs1-f65.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727135AbfIVWao (ORCPT ); Sun, 22 Sep 2019 18:30:44 -0400 Received: by mail-vs1-f65.google.com with SMTP id s7so8230751vsl.2; Sun, 22 Sep 2019 15:30:42 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc; bh=GEvOfGA8f9CvBKQHIGcv1svReVin0bIV7g885ijSJlg=; b=ZdqUYKQuuFTeEF9N2YAZXmP3xJ06lBg5MabIav78ArG8i20hvkyeS9fUPLtvSy7CBu Cu4L5ViEyC85V5tLS3CLdt3v6WXwyNkVjezSVh357+inIhHAqn5R4pdQFWDM4qjl8Tq6 YtHWsqcFnynQV53mjStKr1Mu9uDdbPxxLOJHs61WCMZaS7SOCMbssjuoVgIor79Ji58y PmOdhOmvTMGP1MF+dv2XIutBDlymZLD3s061S15g/pHSmhCHw5iFjeKechmfrgbf+aZn 8aMsLKrZp8kcQrhxfL2JSN5X3X6cm1p+/kzD/hvWRKh9/Qs0B8CkEgwqUF7ykDCeQUR/ YzCA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc; bh=GEvOfGA8f9CvBKQHIGcv1svReVin0bIV7g885ijSJlg=; b=K9e7Fv4nQNVB9l7VM9qbdxnvZs+bv0FNElNjYDAlZyMFRAH4PZyEOdLGPHEN96k4oe URTHDDX/7FC+vpxbyi3jyeCFLLxNfkGzdJN97+V5VQSY5OHbPDOmPuhwIgqESNDxr8hz yOIf9BOQ7YUZFvYAZnoNlAepD73YGUyLWa4r2H3FUk1zMuY0dFw+Ug0JKYUFmMsldioi n26mtLBcFZ/nL7sWwE/kxnfPB1jjLov3rMZMakJUI7lVO8Y5wsRsWgAkr2z4QgmLjaCY 5XHLK1vb7XLkyJwOGLPl+0FmLg9NwNV0zkNzfhe2lfBzz4RtOADYuTLcOqx2Z793fWZk KMKg== X-Gm-Message-State: APjAAAX98G9vXv9JfiI2Y8DCYaRLUtqJhrlxs2NJcDt+J78XiwnPZSDP DsFB640aTMLqdDTeTFMWbsW7T49RM3mwZkccttw= X-Received: by 2002:a67:c181:: with SMTP id h1mr6143186vsj.195.1569191441370; Sun, 22 Sep 2019 15:30:41 -0700 (PDT) MIME-Version: 1.0 References: <20190920185843.4096-1-matthew.cover@stackpath.com> <20190922080326-mutt-send-email-mst@kernel.org> <20190922162546-mutt-send-email-mst@kernel.org> In-Reply-To: <20190922162546-mutt-send-email-mst@kernel.org> From: Matt Cover Date: Sun, 22 Sep 2019 15:30:29 -0700 Message-ID: Subject: Re: [PATCH net-next] tuntap: Fallback to automq on TUNSETSTEERINGEBPF prog negative return To: "Michael S. Tsirkin" Cc: davem@davemloft.net, ast@kernel.org, daniel@iogearbox.net, kafai@fb.com, songliubraving@fb.com, yhs@fb.com, Jason Wang , Eric Dumazet , Stanislav Fomichev , Matthew Cover , mail@timurcelik.de, pabeni@redhat.com, Nicolas Dichtel , wangli39@baidu.com, lifei.shirley@bytedance.com, tglx@linutronix.de, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Sun, Sep 22, 2019 at 1:36 PM Michael S. Tsirkin wrote: > > On Sun, Sep 22, 2019 at 10:43:19AM -0700, Matt Cover wrote: > > On Sun, Sep 22, 2019 at 5:37 AM Michael S. Tsirkin wrote: > > > > > > On Fri, Sep 20, 2019 at 11:58:43AM -0700, Matthew Cover wrote: > > > > Treat a negative return from a TUNSETSTEERINGEBPF bpf prog as a signal > > > > to fallback to tun_automq_select_queue() for tx queue selection. > > > > > > > > Compilation of this exact patch was tested. > > > > > > > > For functional testing 3 additional printk()s were added. > > > > > > > > Functional testing results (on 2 txq tap device): > > > > > > > > [Fri Sep 20 18:33:27 2019] ========== tun no prog ========== > > > > [Fri Sep 20 18:33:27 2019] tuntap: tun_ebpf_select_queue() returned '-1' > > > > [Fri Sep 20 18:33:27 2019] tuntap: tun_automq_select_queue() ran > > > > [Fri Sep 20 18:33:27 2019] ========== tun prog -1 ========== > > > > [Fri Sep 20 18:33:27 2019] tuntap: bpf_prog_run_clear_cb() returned '-1' > > > > [Fri Sep 20 18:33:27 2019] tuntap: tun_ebpf_select_queue() returned '-1' > > > > [Fri Sep 20 18:33:27 2019] tuntap: tun_automq_select_queue() ran > > > > [Fri Sep 20 18:33:27 2019] ========== tun prog 0 ========== > > > > [Fri Sep 20 18:33:27 2019] tuntap: bpf_prog_run_clear_cb() returned '0' > > > > [Fri Sep 20 18:33:27 2019] tuntap: tun_ebpf_select_queue() returned '0' > > > > [Fri Sep 20 18:33:27 2019] ========== tun prog 1 ========== > > > > [Fri Sep 20 18:33:27 2019] tuntap: bpf_prog_run_clear_cb() returned '1' > > > > [Fri Sep 20 18:33:27 2019] tuntap: tun_ebpf_select_queue() returned '1' > > > > [Fri Sep 20 18:33:27 2019] ========== tun prog 2 ========== > > > > [Fri Sep 20 18:33:27 2019] tuntap: bpf_prog_run_clear_cb() returned '2' > > > > [Fri Sep 20 18:33:27 2019] tuntap: tun_ebpf_select_queue() returned '0' > > > > > > > > Signed-off-by: Matthew Cover > > > > > > > > > Could you add a bit more motivation data here? > > > > Thank you for these questions Michael. > > > > I'll plan on adding the below information to the > > commit message and submitting a v2 of this patch > > when net-next reopens. In the meantime, it would > > be very helpful to know if these answers address > > some of your concerns. > > > > > 1. why is this a good idea > > > > This change allows TUNSETSTEERINGEBPF progs to > > do any of the following. > > 1. implement queue selection for a subset of > > traffic (e.g. special queue selection logic > > for ipv4, but return negative and use the > > default automq logic for ipv6) > > 2. determine there isn't sufficient information > > to do proper queue selection; return > > negative and use the default automq logic > > for the unknown > > 3. implement a noop prog (e.g. do > > bpf_trace_printk() then return negative and > > use the default automq logic for everything) > > > > > 2. how do we know existing userspace does not rely on existing behaviour > > > > Prior to this change a negative return from a > > TUNSETSTEERINGEBPF prog would have been cast > > into a u16 and traversed netdev_cap_txqueue(). > > > > In most cases netdev_cap_txqueue() would have > > found this value to exceed real_num_tx_queues > > and queue_index would be updated to 0. > > > > It is possible that a TUNSETSTEERINGEBPF prog > > return a negative value which when cast into a > > u16 results in a positive queue_index less than > > real_num_tx_queues. For example, on x86_64, a > > return value of -65535 results in a queue_index > > of 1; which is a valid queue for any multiqueue > > device. > > > > It seems unlikely, however as stated above is > > unfortunately possible, that existing > > TUNSETSTEERINGEBPF programs would choose to > > return a negative value rather than return the > > positive value which holds the same meaning. > > > > It seems more likely that future > > TUNSETSTEERINGEBPF programs would leverage a > > negative return and potentially be loaded into > > a kernel with the old behavior. > > OK if we are returning a special > value, shouldn't we limit it? How about a special > value with this meaning? > If we are changing an ABI let's at least make it > extensible. > A special value with this meaning sounds good to me. I'll plan on adding a define set to -1 to cause the fallback to automq. The way I was initially viewing the old behavior was that returning negative was undefined; it happened to have the outcomes I walked through, but not necessarily by design. In order to keep the new behavior extensible, how should we state that a negative return other than -1 is undefined and therefore subject to change. Is something like this sufficient? Documentation/networking/tc-actions-env-rules.txt Additionally, what should the new behavior implement when a negative other than -1 is returned? I would like to have it do the same thing as -1 for now, but with the understanding that this behavior is undefined. Does this sound reasonable? > > > 3. why doesn't userspace need a way to figure out whether it runs on a kernel with and > > > without this patch > > > > There may be some value in exposing this fact > > to the ebpf prog loader. What is the standard > > practice here, a define? > > > We'll need something at runtime - people move binaries between kernels > without rebuilding then. An ioctl is one option. > A sysfs attribute is another, an ethtool flag yet another. > A combination of these is possible. > > And if we are doing this anyway, maybe let userspace select > the new behaviour? This way we can stay compatible with old > userspace... > Understood. I'll look into adding an ioctl to activate the new behavior. And perhaps a method of checking which is behavior is currently active (in case we ever want to change the default, say after some suitably long transition period). > > > > > > > > > thanks, > > > MST > > > > > > > --- > > > > drivers/net/tun.c | 20 +++++++++++--------- > > > > 1 file changed, 11 insertions(+), 9 deletions(-) > > > > > > > > diff --git a/drivers/net/tun.c b/drivers/net/tun.c > > > > index aab0be4..173d159 100644 > > > > --- a/drivers/net/tun.c > > > > +++ b/drivers/net/tun.c > > > > @@ -583,35 +583,37 @@ static u16 tun_automq_select_queue(struct tun_struct *tun, struct sk_buff *skb) > > > > return txq; > > > > } > > > > > > > > -static u16 tun_ebpf_select_queue(struct tun_struct *tun, struct sk_buff *skb) > > > > +static int tun_ebpf_select_queue(struct tun_struct *tun, struct sk_buff *skb) > > > > { > > > > struct tun_prog *prog; > > > > u32 numqueues; > > > > - u16 ret = 0; > > > > + int ret = -1; > > > > > > > > numqueues = READ_ONCE(tun->numqueues); > > > > if (!numqueues) > > > > return 0; > > > > > > > > + rcu_read_lock(); > > > > prog = rcu_dereference(tun->steering_prog); > > > > if (prog) > > > > ret = bpf_prog_run_clear_cb(prog->prog, skb); > > > > + rcu_read_unlock(); > > > > > > > > - return ret % numqueues; > > > > + if (ret >= 0) > > > > + ret %= numqueues; > > > > + > > > > + return ret; > > > > } > > > > > > > > static u16 tun_select_queue(struct net_device *dev, struct sk_buff *skb, > > > > struct net_device *sb_dev) > > > > { > > > > struct tun_struct *tun = netdev_priv(dev); > > > > - u16 ret; > > > > + int ret; > > > > > > > > - rcu_read_lock(); > > > > - if (rcu_dereference(tun->steering_prog)) > > > > - ret = tun_ebpf_select_queue(tun, skb); > > > > - else > > > > + ret = tun_ebpf_select_queue(tun, skb); > > > > + if (ret < 0) > > > > ret = tun_automq_select_queue(tun, skb); > > > > - rcu_read_unlock(); > > > > > > > > return ret; > > > > } > > > > -- > > > > 1.8.3.1