Received: by 2002:a05:6a10:9848:0:0:0:0 with SMTP id x8csp914031pxf; Wed, 7 Apr 2021 14:56:54 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzFS1qF2z2x9MEVpHWJsZX1kAThpWLRe6jHhPRTDm0mnwfwPGv/UJzNGkPbPlCsRqOvDrr+ X-Received: by 2002:a62:7d14:0:b029:1f6:18a1:6b98 with SMTP id y20-20020a627d140000b02901f618a16b98mr4674383pfc.15.1617832614710; Wed, 07 Apr 2021 14:56:54 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1617832614; cv=none; d=google.com; s=arc-20160816; b=BjEvrmNxO4zGM998A1R8lHsgn1M5SQUXDf7xPfZSBGePy+TvBM6KglhULuo705whea EA4q/jiK1ZJdZo+D0kuziTmUp7BgF+m35+3GJnbNc4GOZcDPRBiIJU6JACRGIPt5eyIc zjqAq+eZCDleLsJ4CtTJtSZ9l9RR/z2eAXjguzNwQFRUGo10m3vut6LHmQX8ACNtrfAU 9376y4/7KDB/m01PQyq9K54Z5N2S4lJI6msn0DOBEjVdNuF0mxU2kLvoW5nde3K5iOJN 3ygqhCSGYec6M0pOB0kCB+en0DxQ9O1mvP6qpEYDvSB6eB2HnIda6f40FS1VoKc79gLV 305A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=mZV5oPtIqis6sHUZCb+ofyTYBJYlys/yTPjbRl90xlc=; b=tkJqTO+2uBUhxyWnBnnYmFsMyNXDWbAxDwDlOzfGu47SCXKs7sA2juERSxblnY/JM5 f8ydo9eUdFPW1vDbIIQMEJFVOWMVmXA3EG2+uimEQPqZa9xhgZndOR4+OGarUzMSFS4E N4HTaMiongW0nrs8E/GxPv/cURKji1hOjZH6rdSoISxg03Yu2gCpJdPoIJqrg+tGEKq4 c9kvdylSQc+100c0T10UD4HsEnTxtzMNg2jc5KedOUvB6BlGjnl2KJoX1m9kBCbyE8xC xv+JGNP9pIH2TR3tophuhNYAr6p97po8/kGBLjrDse+ggau/f/7SrqZMpK87UR6mqTzt Un6Q== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=IOKTDh4+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id o10si24240142pfu.160.2021.04.07.14.56.42; Wed, 07 Apr 2021 14:56:54 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b=IOKTDh4+; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345612AbhDGTbA (ORCPT + 99 others); Wed, 7 Apr 2021 15:31:00 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:58068 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S236379AbhDGTa6 (ORCPT ); Wed, 7 Apr 2021 15:30:58 -0400 Received: from mail-il1-x12b.google.com (mail-il1-x12b.google.com [IPv6:2607:f8b0:4864:20::12b]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 4B44BC06175F; Wed, 7 Apr 2021 12:30:47 -0700 (PDT) Received: by mail-il1-x12b.google.com with SMTP id o15so13097067ilf.11; Wed, 07 Apr 2021 12:30:47 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=mime-version:references:in-reply-to:from:date:message-id:subject:to :cc:content-transfer-encoding; bh=mZV5oPtIqis6sHUZCb+ofyTYBJYlys/yTPjbRl90xlc=; b=IOKTDh4+NPI4TT/SR4JDEAKOt6hcHk2hyY8PdGqaJoQcbPUHQvN7BJQ81OEKkeruXT 3y1/z7pyTF50/aWSHJC74G1vwGZ1NJm7mHgEg/kzse4jMWXCUmsjtK7KwUB2IsIG1cP6 2mWtcYIsK+VU9KvRYEBNILmvAImEh9MKgNVoufRoSJa/nsSm2L+eXdSCDQqhzRTe08yL 8UNH5AiJzeQ7GqZpbmZw7ixUx/1Ma9cltSzuvak8BHU5GYPN+XXOJC+TXkXUZFOn3QGT hzHz7qEEHofZLdVur7eslE6sMevgptUam6jH83ThBEYOn/YaIPnrBy4TsUEqynrpS17T ivLg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:mime-version:references:in-reply-to:from:date :message-id:subject:to:cc:content-transfer-encoding; bh=mZV5oPtIqis6sHUZCb+ofyTYBJYlys/yTPjbRl90xlc=; b=KGIR8sYZISZxmi3e0wNcwddP2YCeXs2kst1OTNmEkuIrgdFb3fRljvis+Poxg/YyOu 5DXKCncgDsl6ZQHvCCo/NgdbO4hVdJaMXtU5OykBOY1yVCHBC3cQqphFaO3WZxT2gmh2 R8VWhHO+E7KGkE7KXH5N+Zh8Mo+yjDZn8fk1ay9qWcXxH0pgyaKja//TCAzJM+28vLf1 LKiF8GnovXNwM4TR4YX+y5WnEAHNelKRhuD7BVfHHsAcxkTocrQArZpuKv7kqusuBYiz P/4re+YFKNuByXr7U7w6t1b/m6AUatxbYDkgg95DZXsohkEKpI/aRoiiiAc3o7p4ZaTN s+1w== X-Gm-Message-State: AOAM530yyLAaZ0rqwqtkZU9rBzGtxZFzMGgDMmBEkA0PRiHT00vj1XiZ khBzoVik93Qwrw2gbH52wzokY13wid35TDf2ln6QPpjYO0A= X-Received: by 2002:a05:6e02:1a24:: with SMTP id g4mr3765765ile.56.1617823846602; Wed, 07 Apr 2021 12:30:46 -0700 (PDT) MIME-Version: 1.0 References: <20210406185400.377293-1-pctammela@mojatatu.com> <20210406185400.377293-3-pctammela@mojatatu.com> In-Reply-To: From: Pedro Tammela Date: Wed, 7 Apr 2021 16:30:35 -0300 Message-ID: Subject: Re: [PATCH bpf-next v2 2/3] libbpf: selftests: refactor 'BPF_PERCPU_TYPE()' and 'bpf_percpu()' macros To: Andrii Nakryiko Cc: Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Song Liu , Yonghong Song , John Fastabend , KP Singh , Shuah Khan , Pedro Tammela , Matthieu Baerts , David Verbeiren , "open list:BPF (Safe dynamic programs and tools)" , "open list:BPF (Safe dynamic programs and tools)" , open list , "open list:KERNEL SELFTEST FRAMEWORK" Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Em qua., 7 de abr. de 2021 =C3=A0s 15:31, Andrii Nakryiko escreveu: > > On Tue, Apr 6, 2021 at 11:55 AM Pedro Tammela wrote= : > > > > This macro was refactored out of the bpf selftests. > > > > Since percpu values are rounded up to '8' in the kernel, a careless > > user in userspace might encounter unexpected values when parsing the > > output of the batched operations. > > I wonder if a user has to be more careful, though? This > BPF_PERCPU_TYPE, __bpf_percpu_align and bpf_percpu macros seem to > create just another opaque layer. It actually seems detrimental to me. > > I'd rather emphasize in the documentation (e.g., in > bpf_map_lookup_elem) that all per-cpu maps are aligning values at 8 > bytes, so user has to make sure that array of values provided to > bpf_map_lookup_elem() has each element size rounded up to 8. From my own experience, the documentation has been a very unreliable source, to the point that I usually jump to the code first rather than to the documentation nowadays[1]. Tests, samples and projects have always been my source of truth and we are already lacking a bit on those as well. For instance, the samples directory contains programs that are very outdated (I didn't check if they are still functional). I think macros like these will be present in most of the project dealing with batched operations and as a daily user of libbpf I don't see how this could not be offered by libbpf as a standardized way to declare percpu types. [1] So batched operations were introduced a little bit over a 1 year ago and yet the only reference I had for it was the selftests. The documentation is on my TODO list, but that's just because I have to deal with it daily. > > In practice, I'd recommend users to always use __u64/__s64 when having > primitive integers in a map (they are not saving anything by using > int, it just creates an illusion of savings). Well, maybe on 32-bit > arches they would save a bit of CPU, but not on typical 64-bit > architectures. As for using structs as values, always mark them as > __attribute__((aligned(8))). > > Basically, instead of obscuring the real use some more, let's clarify > and maybe even provide some examples in documentation? Why not do both? Provide a standardized way to declare a percpu value with examples and a good documentation with examples. Let the user decide what is best for his use case. > > > > > Now that both array and hash maps have support for batched ops in the > > percpu variant, let's provide a convenient macro to declare percpu map > > value types. > > > > Updates the tests to a "reference" usage of the new macro. > > > > Signed-off-by: Pedro Tammela > > --- > > tools/lib/bpf/bpf.h | 10 ++++ > > tools/testing/selftests/bpf/bpf_util.h | 7 --- > > .../bpf/map_tests/htab_map_batch_ops.c | 48 ++++++++++--------- > > .../selftests/bpf/prog_tests/map_init.c | 5 +- > > tools/testing/selftests/bpf/test_maps.c | 16 ++++--- > > 5 files changed, 46 insertions(+), 40 deletions(-) > > > > [...] > > > @@ -400,11 +402,11 @@ static void test_arraymap(unsigned int task, void= *data) > > static void test_arraymap_percpu(unsigned int task, void *data) > > { > > unsigned int nr_cpus =3D bpf_num_possible_cpus(); > > - BPF_DECLARE_PERCPU(long, values); > > + pcpu_map_value_t values[nr_cpus]; > > int key, next_key, fd, i; > > > > fd =3D bpf_create_map(BPF_MAP_TYPE_PERCPU_ARRAY, sizeof(key), > > - sizeof(bpf_percpu(values, 0)), 2, 0); > > + sizeof(long), 2, 0); > > if (fd < 0) { > > printf("Failed to create arraymap '%s'!\n", strerror(er= rno)); > > exit(1); > > @@ -459,7 +461,7 @@ static void test_arraymap_percpu(unsigned int task,= void *data) > > static void test_arraymap_percpu_many_keys(void) > > { > > unsigned int nr_cpus =3D bpf_num_possible_cpus(); > > This just sets a bad example for anyone using selftests as an > aspiration for their own code. bpf_num_possible_cpus() does exit(1) > internally if libbpf_num_possible_cpus() returns error. No one should > write real production code like that. So maybe let's provide a better > example instead with error handling and malloc (or perhaps alloca)? OK. Makes sense. > > > - BPF_DECLARE_PERCPU(long, values); > > + pcpu_map_value_t values[nr_cpus]; > > /* nr_keys is not too large otherwise the test stresses percpu > > * allocator more than anything else > > */ > > @@ -467,7 +469,7 @@ static void test_arraymap_percpu_many_keys(void) > > int key, fd, i; > > > > fd =3D bpf_create_map(BPF_MAP_TYPE_PERCPU_ARRAY, sizeof(key), > > - sizeof(bpf_percpu(values, 0)), nr_keys, 0); > > + sizeof(long), nr_keys, 0); > > if (fd < 0) { > > printf("Failed to create per-cpu arraymap '%s'!\n", > > strerror(errno)); > > -- > > 2.25.1 > >