Received: by 2002:a05:6a10:8c0a:0:0:0:0 with SMTP id go10csp5870413pxb; Tue, 16 Feb 2021 09:29:48 -0800 (PST) X-Google-Smtp-Source: ABdhPJz8wsd0v3zp8jxyk4NhMCGfKyV6b+9rOVNxnrCvG5iQ6DvyRDAfT7EmB4wqMmfUdp8NwH8M X-Received: by 2002:a17:906:d84:: with SMTP id m4mr21567693eji.437.1613496586993; Tue, 16 Feb 2021 09:29:46 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1613496586; cv=none; d=google.com; s=arc-20160816; b=yxCs8G8z8i0Gc4WX2LZ16jQ48bMdMwUsVfJlANbNaVTsj+qUg9qy55XWkHSSKePmwK T0nyxzkbm6h8jiK+Uspz0w9o6/LGw67lOXrZK5z74p5MeGNw8M34SvHjKm01UDG+j02P YlVCE2v641tjnsU0MH9++2V3Uh1rbBpApMPKQRMq0gjHOAqHG86WA+Nx+1LQqUtaD9fE r6LAKSXoN/mDJU8zBx7bjU2oEo5RFrASBKpL6OrK8380+4+RWwoNZwEdbGY7F3hii/ac y5aAngIqvdFKkz1/ynFC6rFqsWGH1QRPJyi/LQLxRo7US5h9ZN8byRMUiG2T72Y2MhUb 0PtQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:subject:reply-to:cc:from:to:dkim-signature:date; bh=EmtrE/13S0ZNl/aehFct6P3907DT3ANAYh1M7Px8fAs=; b=FBzwOuNV04smmdwXe/hmujLwvyReAg9IWm7bo7pI0Nec+vzQiqLehljOGcw90+sJnc 8/n5WrkNS8uSVtA2GfXScI7LiSXn90ZshJiR2f8HGvA2fo8lXIYTeO7zhzWCkQQAl7lq t1J0kf5jx8EKUkirfH7Kqfs0/CSzY76n3skEocg84PacaFsTrmITq0rJiLVkIGFsN6CC e/as9FRwwX2NziQdCA+rLoUDdGs/MWsjnXZG9A2v0uzsr0tdV86p4p5zjrk3BkcXSxjc rH/pjcpaDs3EMsq+lKXFO0+4rlit3OblVoHIX7Snw9xCpm7lHevMJvS8YlOyUFR98YGj KChw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@pm.me header.s=protonmail header.b=g2qyyfMw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=pm.me Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id t1si14558818ejb.703.2021.02.16.09.29.21; Tue, 16 Feb 2021 09:29:46 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@pm.me header.s=protonmail header.b=g2qyyfMw; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=QUARANTINE sp=QUARANTINE dis=NONE) header.from=pm.me Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S230073AbhBPR1p (ORCPT + 99 others); Tue, 16 Feb 2021 12:27:45 -0500 Received: from mail-40136.protonmail.ch ([185.70.40.136]:28440 "EHLO mail-40136.protonmail.ch" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229628AbhBPR1n (ORCPT ); Tue, 16 Feb 2021 12:27:43 -0500 Date: Tue, 16 Feb 2021 17:26:52 +0000 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=pm.me; s=protonmail; t=1613496418; bh=EmtrE/13S0ZNl/aehFct6P3907DT3ANAYh1M7Px8fAs=; h=Date:To:From:Cc:Reply-To:Subject:From; b=g2qyyfMwqQq/gdse4lzeJsouZdrPdcdh4LMu39homCw0J5zDT1Ce4qOJTyH7uvrJR 7skDYzg4t2i2gkIKXUaARkzWS8x1qV+5XYnIsTpmeOaHyDOHvl33iarnt1iQxzXYdt rOamIMEJRkgvESPRJrZAXBkrL029L3ntOFIi6YjZA+LIokHuuydnuxNuJ7uI3wktfQ WXwazkZRGnuMI6ULoMWwevbnolON1Dkc1pAs+5zhTHSEltrcgs/ZCY6PJD1YwBsZyp MX4/qm6QNyPo9GIWDvIjCca/zASDxHaQw3zuzU2KQjpyTVyy1J6U4VIbOHvFcz8tAf 95S/J8cS5kVGQ== To: Magnus Karlsson , =?utf-8?Q?Bj=C3=B6rn_T=C3=B6pel?= From: Alexander Lobakin Cc: "Michael S. Tsirkin" , Jason Wang , "David S. Miller" , Jakub Kicinski , Jonathan Lemon , Alexei Starovoitov , Daniel Borkmann , Jesper Dangaard Brouer , John Fastabend , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , KP Singh , Paolo Abeni , Eric Dumazet , Xuan Zhuo , Dust Li , Alexander Lobakin , virtualization@lists.linux-foundation.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org, bpf@vger.kernel.org Reply-To: Alexander Lobakin Subject: [PATCH v6 bpf-next 0/6] xsk: build skb by page (aka generic zerocopy xmit) Message-ID: <20210216172640.374487-1-alobakin@pm.me> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-1.2 required=10.0 tests=ALL_TRUSTED,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF shortcircuit=no autolearn=disabled version=3.4.4 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on mailout.protonmail.ch Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This series introduces XSK generic zerocopy xmit by adding XSK umem pages as skb frags instead of copying data to linear space. The only requirement for this for drivers is to be able to xmit skbs with skb_headlen(skb) =3D=3D 0, i.e. all data including hard headers starts from frag 0. To indicate whether a particular driver supports this, a new netdev priv flag, IFF_TX_SKB_NO_LINEAR, is added (and declared in virtio_net as it's already capable of doing it). So consider implementing this in your drivers to greatly speed-up generic XSK xmit. The first two bits refactor netdev_priv_flags a bit to harden them in terms of bitfield overflow, as IFF_TX_SKB_NO_LINEAR is the last one that fits into unsigned int. The fifth patch adds headroom and tailroom reservations for the allocated skbs on XSK generic xmit path. This ensures there won't be any unwanted skb reallocations on fast-path due to headroom and/or tailroom driver/device requirements (own headers/descriptors etc.). The other three add a new private flag, declare it in virtio_net driver and introduce generic XSK zerocopy xmit itself. The main body of work is created and done by Xuan Zhuo. His original cover letter: v3: Optimized code v2: 1. add priv_flags IFF_TX_SKB_NO_LINEAR instead of netdev_feature 2. split the patch to three: a. add priv_flags IFF_TX_SKB_NO_LINEAR b. virtio net add priv_flags IFF_TX_SKB_NO_LINEAR c. When there is support this flag, construct skb without linear space 3. use ERR_PTR() and PTR_ERR() to handle the err v1 message log: --------------- This patch is used to construct skb based on page to save memory copy overhead. This has one problem: We construct the skb by fill the data page as a frag into the skb. In this way, the linear space is empty, and the header information is also in the frag, not in the linear space, which is not allowed for some network cards. For example, Mellanox Technologies MT27710 Family [ConnectX-4 Lx] will get the following error message: mlx5_core 0000:3b:00.1 eth1: Error cqe on cqn 0x817, ci 0x8, qn 0x1dbb, opcode 0xd, syndrome 0x1, vendor syndrome 0x68 00000000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00000020: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00000030: 00 00 00 00 60 10 68 01 0a 00 1d bb 00 0f 9f d2 WQE DUMP: WQ size 1024 WQ cur size 0, WQE index 0xf, len: 64 00000000: 00 00 0f 0a 00 1d bb 03 00 00 00 08 00 00 00 00 00000010: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00000020: 00 00 00 2b 00 08 00 00 00 00 00 05 9e e3 08 00 00000030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 mlx5_core 0000:3b:00.1 eth1: ERR CQE on SQ: 0x1dbb I also tried to use build_skb to construct skb, but because of the existence of skb_shinfo, it must be behind the linear space, so this method is not working. We can't put skb_shinfo on desc->addr, it will be exposed to users, this is not safe. Finally, I added a feature NETIF_F_SKB_NO_LINEAR to identify whether the network card supports the header information of the packet in the frag and not in the linear space. ---------------- Performance Testing ------------ The test environment is Aliyun ECS server. Test cmd: ``` xdpsock -i eth0 -t -S -s ``` Test result data: size 64 512 1024 1500 copy 1916747 1775988 1600203 1440054 page 1974058 1953655 1945463 1904478 percent 3.0% 10.0% 21.58% 32.3% From v5 [2]: - fix a refcount leak in 0006 introduced in v4. From v4 [1]: - fix 0002 build error due to inverted static_assert() condition (0day bot); - collect two Acked-bys (Magnus). From v3 [0]: - refactor netdev_priv_flags to make it easier to add new ones and prevent bitwidth overflow; - add headroom (both standard and zerocopy) and tailroom (standard) reservation in skb for drivers to avoid potential reallocations; - fix skb->truesize accounting; - misc comment rewords. [0] https://lore.kernel.org/netdev/cover.1611236588.git.xuanzhuo@linux.alib= aba.com [1] https://lore.kernel.org/netdev/20210216113740.62041-1-alobakin@pm.me [2] https://lore.kernel.org/netdev/20210216143333.5861-1-alobakin@pm.me Alexander Lobakin (3): netdev_priv_flags: add missing IFF_PHONY_HEADROOM self-definition netdevice: check for net_device::priv_flags bitfield overflow xsk: respect device's headroom and tailroom on generic xmit path Xuan Zhuo (3): net: add priv_flags for allow tx skb without linear virtio-net: support IFF_TX_SKB_NO_LINEAR xsk: build skb by page (aka generic zerocopy xmit) drivers/net/virtio_net.c | 3 +- include/linux/netdevice.h | 138 +++++++++++++++++++++----------------- net/xdp/xsk.c | 114 ++++++++++++++++++++++++++----- 3 files changed, 174 insertions(+), 81 deletions(-) --=20 2.30.1