Received: by 2002:a05:7412:da14:b0:e2:908c:2ebd with SMTP id fe20csp1793131rdb; Mon, 9 Oct 2023 03:13:31 -0700 (PDT) X-Google-Smtp-Source: AGHT+IHj6Q9U+UInx2JRFQphhxTE6Ky9GAbrwLv041SqDggcmZIA8XSsABr5McE1qCAeez5zn9J2 X-Received: by 2002:a05:6a00:14d2:b0:693:3bed:e60b with SMTP id w18-20020a056a0014d200b006933bede60bmr14010241pfu.12.1696846411460; Mon, 09 Oct 2023 03:13:31 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696846411; cv=none; d=google.com; s=arc-20160816; b=Qoi182osAzpQUeyBZRvjopG5REc1py3vnNoL9gwEeK7SY5yHPTVb2H2+FTrODAYHeq O5kSMDM7eD6Bnz6tDAyGqSSNLSCQ1F8MpqL+0Hwd0iRdvHKboPcrSWWEalEPrDVfvspr gMNzoqRVuH9LXZC5TO+iITTa3juSWDVF8onphpOSMaNuQGcODS8kvJNO5bkGi8Q41vwI 8+xUq091Vp52x6aR371OQgFWBjt9M47qmmtbMGsayZB/A7t0xb2DsYLAzIIY9mIgVQKA pc0xzEyGjVNbUH1juj5/fpkF+6I3xKlACF4ive2pqpD0tMF7qCSiqZgYihYL1DBWzqCQ ahQQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :references:cc:to:content-language:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=GwCpwJnMSEtCEpgQdG0sPnzXZa7be28Mw64N+dOOjHk=; fh=0kZfx+klSLWD9hoj74HEotUQ86LI1NMUCd1qU8078u0=; b=GUJSxCyNPNYayxKZxNV+eYiCF7P0b3ROqzIyWOBqP1RGR0iDJGDbZg1JZjRqrglaD/ VP3iUBBKvTToahVCA0bX6cvWJ3fE/OsncCF6CqomJ3ty9Z0qZGM+MBqz4SB2u/IFPZZY DvyAWt7/f3pgJFdqkLlgwqgMEzgHQ2q7poJQVa4MmTmtAprAgmmeYVtnhK/jJia1hMIY cnCBDaTYigSQ1NMgXh+T5TLh/EFq0ro1lIck3F5Fh97Hyr+cfn/xUwQgeFs4mbT2JcJP PYv+Luz9x+9MKBXD12evVP0gCd74e2T2Z0xzcOuSEbLCbTzhsnj6UyDYWMOcsPStomg2 dYVQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@daynix-com.20230601.gappssmtp.com header.s=20230601 header.b="OH0KDQ/Q"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from howler.vger.email (howler.vger.email. [2620:137:e000::3:4]) by mx.google.com with ESMTPS id c9-20020a056a00248900b0068e405d9217si7525515pfv.302.2023.10.09.03.13.31 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Mon, 09 Oct 2023 03:13:31 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) client-ip=2620:137:e000::3:4; Authentication-Results: mx.google.com; dkim=pass header.i=@daynix-com.20230601.gappssmtp.com header.s=20230601 header.b="OH0KDQ/Q"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:4 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by howler.vger.email (Postfix) with ESMTP id 2F01A803F604; Mon, 9 Oct 2023 03:13:28 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at howler.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1346112AbjJIKNF (ORCPT + 99 others); Mon, 9 Oct 2023 06:13:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:40900 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1346111AbjJIKND (ORCPT ); Mon, 9 Oct 2023 06:13:03 -0400 Received: from mail-pf1-x42f.google.com (mail-pf1-x42f.google.com [IPv6:2607:f8b0:4864:20::42f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 99F68BA for ; Mon, 9 Oct 2023 03:12:58 -0700 (PDT) Received: by mail-pf1-x42f.google.com with SMTP id d2e1a72fcca58-692ada71d79so3247976b3a.1 for ; Mon, 09 Oct 2023 03:12:58 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=daynix-com.20230601.gappssmtp.com; s=20230601; t=1696846378; x=1697451178; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=GwCpwJnMSEtCEpgQdG0sPnzXZa7be28Mw64N+dOOjHk=; b=OH0KDQ/QiGUvRxwvwRuqv5MOpwCzSGI1zFqDXauUm4f5TyypNgiOfhN6fZqAgi8DL5 qYR9bR8B+M7ZaWEdhst1RPWhigrnfrMcuPbbVBT28Vn2cefmBlD42wPedN1PCEpFT4PB 9kL4JKY1gnKuSaYmnhQ4qB3unMpw5SzetDmYiLilAFRsXr+gqVCrdDdw8WiDSAFcQdEL qdRpuloZzfFQ0ixe7jRz5CjAMA3fZC8RF+7vff4y+G167dvSF30gOiR3p3EchfTX92Oy hL8vDvXhmqu5wzEVS1CpNcY3lKX6MKUsVQeyDV3/nDErff01kcJiDT+qDcHxO9o9Zqe7 DJeQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696846378; x=1697451178; h=content-transfer-encoding:in-reply-to:from:references:cc:to :content-language:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=GwCpwJnMSEtCEpgQdG0sPnzXZa7be28Mw64N+dOOjHk=; b=YDJqJVXOY+LYTLX+OGB5J2v9sG9/h3B7PPHBHB72I+GiCwXTQs1NrJF92qRsDorImb 5g98GXgRcSgzSvC2vMjrV7d2ZaJIHd1iF5KUUgoUFl+zycoORRi+KyZkixg9vlPnPToL ylHndJF8PaD9rEn4gZXD8dCJexvBElMgkm+k/qv5zXqk/iK9Lol4doXiu3lSYHBzNtAX aixHY0ADq35t7lAOpO4XMz5NjQlgjQs+c5MqTtlFIssD/tyi7BXMjS5uquHvpcu8yQ2s eAxkhR8IucybmO4CSQnkLRnZwK+FO7Ox/ebwW4cAnvoE1lt2K3Rud+mXIQOckf8kxXTU 8kcQ== X-Gm-Message-State: AOJu0YypayL4G2dnh3AgDx7Kqd7QM742fSU5177G08lqEa3D1E0xPdCq G8J2eB8v7NOgFUSgFpMwrl7BWA== X-Received: by 2002:a05:6a21:191:b0:155:5c28:ea67 with SMTP id le17-20020a056a21019100b001555c28ea67mr17770242pzb.38.1696846377658; Mon, 09 Oct 2023 03:12:57 -0700 (PDT) Received: from ?IPV6:2400:4050:a840:1e00:78d2:b862:10a7:d486? ([2400:4050:a840:1e00:78d2:b862:10a7:d486]) by smtp.gmail.com with ESMTPSA id fb3-20020a056a002d8300b0069ee4242f89sm4287361pfb.13.2023.10.09.03.12.51 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Mon, 09 Oct 2023 03:12:57 -0700 (PDT) Message-ID: <5baab0cf-7adf-475d-8968-d46ddd179f9a@daynix.com> Date: Mon, 9 Oct 2023 19:12:51 +0900 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [RFC PATCH 5/7] tun: Introduce virtio-net hashing feature Content-Language: en-US To: Willem de Bruijn Cc: Jason Wang , "Michael S. Tsirkin" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-kselftest@vger.kernel.org, bpf@vger.kernel.org, davem@davemloft.net, kuba@kernel.org, ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, kafai@fb.com, songliubraving@fb.com, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, rdunlap@infradead.org, willemb@google.com, gustavoars@kernel.org, herbert@gondor.apana.org.au, steffen.klassert@secunet.com, nogikh@google.com, pablo@netfilter.org, decui@microsoft.com, jakub@cloudflare.com, elver@google.com, pabeni@redhat.com, Yuri Benditovich References: <20231008052101.144422-1-akihiko.odaki@daynix.com> <20231008052101.144422-6-akihiko.odaki@daynix.com> <8f4ad5bc-b849-4ef4-ac1f-8d5a796205e9@daynix.com> <286508a3-3067-456d-8bbf-176b00dcc0c6@daynix.com> <8711b549-094d-4be2-b7af-bd93b7516c05@daynix.com> <695a0611-2b19-49f9-8d32-cfea3b7df0b2@daynix.com> From: Akihiko Odaki In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=2.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RCVD_IN_SBL_CSS, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on howler.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (howler.vger.email [0.0.0.0]); Mon, 09 Oct 2023 03:13:28 -0700 (PDT) X-Spam-Level: ** On 2023/10/09 19:06, Willem de Bruijn wrote: > On Mon, Oct 9, 2023 at 3:02 AM Akihiko Odaki wrote: >> >> On 2023/10/09 18:57, Willem de Bruijn wrote: >>> On Mon, Oct 9, 2023 at 3:57 AM Akihiko Odaki wrote: >>>> >>>> On 2023/10/09 17:04, Willem de Bruijn wrote: >>>>> On Sun, Oct 8, 2023 at 3:46 PM Akihiko Odaki wrote: >>>>>> >>>>>> On 2023/10/09 5:08, Willem de Bruijn wrote: >>>>>>> On Sun, Oct 8, 2023 at 10:04 PM Akihiko Odaki wrote: >>>>>>>> >>>>>>>> On 2023/10/09 4:07, Willem de Bruijn wrote: >>>>>>>>> On Sun, Oct 8, 2023 at 7:22 AM Akihiko Odaki wrote: >>>>>>>>>> >>>>>>>>>> virtio-net have two usage of hashes: one is RSS and another is hash >>>>>>>>>> reporting. Conventionally the hash calculation was done by the VMM. >>>>>>>>>> However, computing the hash after the queue was chosen defeats the >>>>>>>>>> purpose of RSS. >>>>>>>>>> >>>>>>>>>> Another approach is to use eBPF steering program. This approach has >>>>>>>>>> another downside: it cannot report the calculated hash due to the >>>>>>>>>> restrictive nature of eBPF. >>>>>>>>>> >>>>>>>>>> Introduce the code to compute hashes to the kernel in order to overcome >>>>>>>>>> thse challenges. An alternative solution is to extend the eBPF steering >>>>>>>>>> program so that it will be able to report to the userspace, but it makes >>>>>>>>>> little sense to allow to implement different hashing algorithms with >>>>>>>>>> eBPF since the hash value reported by virtio-net is strictly defined by >>>>>>>>>> the specification. >>>>>>>>>> >>>>>>>>>> The hash value already stored in sk_buff is not used and computed >>>>>>>>>> independently since it may have been computed in a way not conformant >>>>>>>>>> with the specification. >>>>>>>>>> >>>>>>>>>> Signed-off-by: Akihiko Odaki >>>>>>>>>> --- >>>>>>>>> >>>>>>>>>> +static const struct tun_vnet_hash_cap tun_vnet_hash_cap = { >>>>>>>>>> + .max_indirection_table_length = >>>>>>>>>> + TUN_VNET_HASH_MAX_INDIRECTION_TABLE_LENGTH, >>>>>>>>>> + >>>>>>>>>> + .types = VIRTIO_NET_SUPPORTED_HASH_TYPES >>>>>>>>>> +}; >>>>>>>>> >>>>>>>>> No need to have explicit capabilities exchange like this? Tun either >>>>>>>>> supports all or none. >>>>>>>> >>>>>>>> tun does not support VIRTIO_NET_RSS_HASH_TYPE_IP_EX, >>>>>>>> VIRTIO_NET_RSS_HASH_TYPE_TCP_EX, and VIRTIO_NET_RSS_HASH_TYPE_UDP_EX. >>>>>>>> >>>>>>>> It is because the flow dissector does not support IPv6 extensions. The >>>>>>>> specification is also vague, and does not tell how many TLVs should be >>>>>>>> consumed at most when interpreting destination option header so I chose >>>>>>>> to avoid adding code for these hash types to the flow dissector. I doubt >>>>>>>> anyone will complain about it since nobody complains for Linux. >>>>>>>> >>>>>>>> I'm also adding this so that we can extend it later. >>>>>>>> max_indirection_table_length may grow for systems with 128+ CPUs, or >>>>>>>> types may have other bits for new protocols in the future. >>>>>>>> >>>>>>>>> >>>>>>>>>> case TUNSETSTEERINGEBPF: >>>>>>>>>> - ret = tun_set_ebpf(tun, &tun->steering_prog, argp); >>>>>>>>>> + bpf_ret = tun_set_ebpf(tun, &tun->steering_prog, argp); >>>>>>>>>> + if (IS_ERR(bpf_ret)) >>>>>>>>>> + ret = PTR_ERR(bpf_ret); >>>>>>>>>> + else if (bpf_ret) >>>>>>>>>> + tun->vnet_hash.flags &= ~TUN_VNET_HASH_RSS; >>>>>>>>> >>>>>>>>> Don't make one feature disable another. >>>>>>>>> >>>>>>>>> TUNSETSTEERINGEBPF and TUNSETVNETHASH are mutually exclusive >>>>>>>>> functions. If one is enabled the other call should fail, with EBUSY >>>>>>>>> for instance. >>>>>>>>> >>>>>>>>>> + case TUNSETVNETHASH: >>>>>>>>>> + len = sizeof(vnet_hash); >>>>>>>>>> + if (copy_from_user(&vnet_hash, argp, len)) { >>>>>>>>>> + ret = -EFAULT; >>>>>>>>>> + break; >>>>>>>>>> + } >>>>>>>>>> + >>>>>>>>>> + if (((vnet_hash.flags & TUN_VNET_HASH_REPORT) && >>>>>>>>>> + (tun->vnet_hdr_sz < sizeof(struct virtio_net_hdr_v1_hash) || >>>>>>>>>> + !tun_is_little_endian(tun))) || >>>>>>>>>> + vnet_hash.indirection_table_mask >= >>>>>>>>>> + TUN_VNET_HASH_MAX_INDIRECTION_TABLE_LENGTH) { >>>>>>>>>> + ret = -EINVAL; >>>>>>>>>> + break; >>>>>>>>>> + } >>>>>>>>>> + >>>>>>>>>> + argp = (u8 __user *)argp + len; >>>>>>>>>> + len = (vnet_hash.indirection_table_mask + 1) * 2; >>>>>>>>>> + if (copy_from_user(vnet_hash_indirection_table, argp, len)) { >>>>>>>>>> + ret = -EFAULT; >>>>>>>>>> + break; >>>>>>>>>> + } >>>>>>>>>> + >>>>>>>>>> + argp = (u8 __user *)argp + len; >>>>>>>>>> + len = virtio_net_hash_key_length(vnet_hash.types); >>>>>>>>>> + >>>>>>>>>> + if (copy_from_user(vnet_hash_key, argp, len)) { >>>>>>>>>> + ret = -EFAULT; >>>>>>>>>> + break; >>>>>>>>>> + } >>>>>>>>> >>>>>>>>> Probably easier and less error-prone to define a fixed size control >>>>>>>>> struct with the max indirection table size. >>>>>>>> >>>>>>>> I made its size variable because the indirection table and key may grow >>>>>>>> in the future as I wrote above. >>>>>>>> >>>>>>>>> >>>>>>>>> Btw: please trim the CC: list considerably on future patches. >>>>>>>> >>>>>>>> I'll do so in the next version with the TUNSETSTEERINGEBPF change you >>>>>>>> proposed. >>>>>>> >>>>>>> To be clear: please don't just resubmit with that one change. >>>>>>> >>>>>>> The skb and cb issues are quite fundamental issues that need to be resolved. >>>>>>> >>>>>>> I'd like to understand why adjusting the existing BPF feature for this >>>>>>> exact purpose cannot be amended to return the key it produced. >>>>>> >>>>>> eBPF steering program is not designed for this particular problem in my >>>>>> understanding. It was introduced to derive hash values with an >>>>>> understanding of application-specific semantics of packets instead of >>>>>> generic IP/TCP/UDP semantics. >>>>>> >>>>>> This problem is rather different in terms that the hash derivation is >>>>>> strictly defined by virtio-net. I don't think it makes sense to >>>>>> introduce the complexity of BPF when you always run the same code. >>>>>> >>>>>> It can utilize the existing flow dissector and also make it easier to >>>>>> use for the userspace by implementing this in the kernel. >>>>> >>>>> Ok. There does appear to be overlap in functionality. But it might be >>>>> easier to deploy to just have standard Toeplitz available without >>>>> having to compile and load an eBPF program. >>>>> >>>>> As for the sk_buff and cb[] changes. The first is really not needed. >>>>> sk_buff simply would not scale if every edge case needs a few bits. >>>> >>>> An alternative is to move the bit to cb[] and clear it for every code >>>> paths that lead to ndo_start_xmit(), but I'm worried that it is error-prone. >>>> >>>> I think we can put the bit in sk_buff for now. We can implement the >>>> alternative when we are short of bits. >>> >>> I disagree. sk_buff fields add a cost to every code path. They cannot >>> be added for every edge case. >> >> It only takes an unused bit and does not grow the sk_buff size so I >> think it has practically no cost for now. > > The problem is that that thinking leads to death by a thousand cuts. > > "for now" forces the cost of having to think hard how to avoid growing > sk_buff onto the next person. Let's do it right from the start. I see. I described an alternative to move the bit to cb[] and clear it in all code paths that leads to ndo_start_xmit() earlier. Does that sound good to you?