Received: by 2002:a05:6a11:4021:0:0:0:0 with SMTP id ky33csp4723166pxb; Tue, 28 Sep 2021 02:35:41 -0700 (PDT) X-Google-Smtp-Source: ABdhPJyfyAMEFMl3uuPO6Orgc3KWKFqkYFii/LTXm/qPWlf983i9xCoGxYqJk/PHCkKBHSGu9mtY X-Received: by 2002:a17:906:7250:: with SMTP id n16mr5456744ejk.147.1632821740888; Tue, 28 Sep 2021 02:35:40 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1632821740; cv=none; d=google.com; s=arc-20160816; b=uZgh0a3iMQsNKt97uVhnzgUVA0aLX3/ydZDhbxYULDoWRs3X+dnNBv9V69FoA+Tc9A dof0ea9FNbPOIUn6WBsqB+1TvuqdgSkj6TfdaK8sRay3pdg8Oz6gBYdExxWOzOT/4XWC vQ3DGhn/1w1RmuyWBX4n+nr3Vmd3NkELXEi6peqk5W8Kizj9O5X0YVZvEgvB5a2Hg4uM bUuzX5YYAWXxH/xpGRuoInmMDy7Nu96ZTd3mfJectih1cqQ6262dLOFoiWKwqNsRsMWX hZ7jHQC+ympvH3IIJL6QbENO2KethtPOknweWvDtKBtcJpZRIagzRtMyYQCB3d9kruAq GXoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :message-id:date:subject:cc:to:from:dkim-signature; bh=qOQcHnRA4OzmDMrO4dM1TAmtC+v9d8Z05czXaJ/Qyps=; b=qXyYkc/FIvC1Oz81Y23uAD3klqlobAEya4WgfKpbgmKv2ozeQI19UldqfpoB6yygN0 5dZUKHQ642D5ru859Mi6fkCgq+g8cxfGggFswwtJWmVxdO1tOz9phFCj3oKaXCQppGf7 ENTNp8NPXlfRM7CWx0Ahu1iW2TvBtAEdyaGoQ681Gfh2WgMA9WTBaTmYesaR+f42sMgU 0aqhXZys4SLz/IwCNMq5QLhgb1A6JwQV5fIT0HkBatQfeTkrF7dqV/BRaYLR2JbqLTRA H2y7gvozDzQK4g2KjAumgMtd25uFzMHGcqXgdWM+hP6/7iXQiC8GLqaWTXFDF48/2oVx rfAA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@cloudflare.com header.s=google header.b=j5i1ZfzT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=cloudflare.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id b5si12217882edz.206.2021.09.28.02.35.15; Tue, 28 Sep 2021 02:35:40 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@cloudflare.com header.s=google header.b=j5i1ZfzT; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=cloudflare.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S239755AbhI1JdB (ORCPT + 99 others); Tue, 28 Sep 2021 05:33:01 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:37868 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240041AbhI1Jcy (ORCPT ); Tue, 28 Sep 2021 05:32:54 -0400 Received: from mail-wr1-x434.google.com (mail-wr1-x434.google.com [IPv6:2a00:1450:4864:20::434]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EDD9AC061774 for ; Tue, 28 Sep 2021 02:31:14 -0700 (PDT) Received: by mail-wr1-x434.google.com with SMTP id s21so16816739wra.7 for ; Tue, 28 Sep 2021 02:31:14 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=cloudflare.com; s=google; h=from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=qOQcHnRA4OzmDMrO4dM1TAmtC+v9d8Z05czXaJ/Qyps=; b=j5i1ZfzTSkWC0KpfTPAm/d98mJ95ltf3LgMoqfjaiA9utXdmH1QA0a8v416ZV5yVsj jmrW70W41xqy93PI0cMh95LsGCbEf1Ve2mqgcAEnOKlxhSvZv5Tok7fiyIbRjj1G5b/y mR2T6ue+VFHxt9gk5aloFDAeBtrrCwW/KDazY= X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=x-gm-message-state:from:to:cc:subject:date:message-id:mime-version :content-transfer-encoding; bh=qOQcHnRA4OzmDMrO4dM1TAmtC+v9d8Z05czXaJ/Qyps=; b=D6UENclaBZGWqZh4xnGNSywMclv5Of0PRYVLrxTK0e4w45HASiSz1OCaoG84pl7H4m HAxe4QWVidbtnuwJvoakkRIHa2D7UaQhaF3OaqfjhciZ63zW1AsjHh1F2llF+3ZaEwFY rKDTqJ8WqqczpnSpu8asMBaPoBK7pxCPPtgWS6Wsrd/c7dG1k5M2llN8KGMUPNXuRnP7 rmOeYFqeHWruXAQyo4t7PVFCgotJNETb1DWEv1b2HCOh0Pt0o2u2L9jLa+jRzo3hhn+N AcSQrbyDEj9hIWAz09QZbmVWFqJ14LIVhgOXBSIKZzzqN2I92Fp/I67rsdwxMD7zwjv6 JcZA== X-Gm-Message-State: AOAM532rZ84xf2AZN/zzqX0Ltc4121+MAPmilaesJ0NOz5ry1bnPoRSB LSYpuuU1FCZYNi40JKqWnHf5dg== X-Received: by 2002:a5d:4eca:: with SMTP id s10mr5240117wrv.255.1632821473526; Tue, 28 Sep 2021 02:31:13 -0700 (PDT) Received: from antares.. (7.2.8.5.7.4.1.5.9.1.3.d.e.b.3.5.f.f.6.2.a.5.a.7.0.b.8.0.1.0.0.2.ip6.arpa. [2001:8b0:7a5a:26ff:53be:d319:5147:5827]) by smtp.gmail.com with ESMTPSA id h15sm18716206wrc.19.2021.09.28.02.31.12 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 28 Sep 2021 02:31:13 -0700 (PDT) From: Lorenz Bauer To: bjorn@kernel.org, "David S. Miller" , Jakub Kicinski , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Jesper Dangaard Brouer , John Fastabend Cc: kernel-team@cloudflare.com, Lorenz Bauer , netdev@vger.kernel.org, bpf@vger.kernel.org, linux-kernel@vger.kernel.org Subject: [PATCH bpf-next] bpf: do not invoke the XDP dispatcher for PROG_RUN with single repeat Date: Tue, 28 Sep 2021 10:30:59 +0100 Message-Id: <20210928093100.27124-1-lmb@cloudflare.com> X-Mailer: git-send-email 2.30.2 MIME-Version: 1.0 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org We have a unit test that invokes an XDP program with 1m different inputs, aka 1m BPF_PROG_RUN syscalls. We run this test concurrently with slight variations in how we generated the input. Since commit f23c4b3924d2 ("bpf: Start using the BPF dispatcher in BPF_TEST_RUN") the unit test has slowed down significantly. Digging deeper reveals that the concurrent tests are serialised in the kernel on the XDP dispatcher. This is a global resource that is protected by a mutex, on which we contend. Fix this by not calling into the XDP dispatcher if we only want to perform a single run of the BPF program. See: https://lore.kernel.org/bpf/CACAyw9_y4QumOW35qpgTbLsJ532uGq-kVW-VESJzGyiZkypnvw@mail.gmail.com/ Signed-off-by: Lorenz Bauer --- net/bpf/test_run.c | 6 ++++-- 1 file changed, 4 insertions(+), 2 deletions(-) diff --git a/net/bpf/test_run.c b/net/bpf/test_run.c index fcb2f493f710..6593a71dba5f 100644 --- a/net/bpf/test_run.c +++ b/net/bpf/test_run.c @@ -803,7 +803,8 @@ int bpf_prog_test_run_xdp(struct bpf_prog *prog, const union bpf_attr *kattr, if (ret) goto free_data; - bpf_prog_change_xdp(NULL, prog); + if (repeat > 1) + bpf_prog_change_xdp(NULL, prog); ret = bpf_test_run(prog, &xdp, repeat, &retval, &duration, true); /* We convert the xdp_buff back to an xdp_md before checking the return * code so the reference count of any held netdevice will be decremented @@ -824,7 +825,8 @@ int bpf_prog_test_run_xdp(struct bpf_prog *prog, const union bpf_attr *kattr, sizeof(struct xdp_md)); out: - bpf_prog_change_xdp(prog, NULL); + if (repeat > 1) + bpf_prog_change_xdp(prog, NULL); free_data: kfree(data); free_ctx: -- 2.30.2