Received: by 2002:a05:7412:d8a:b0:e2:908c:2ebd with SMTP id b10csp563578rdg; Tue, 10 Oct 2023 20:58:41 -0700 (PDT) X-Google-Smtp-Source: AGHT+IGQqvyU4elRaW8pKEcw9xmyRLA2ehIR9lfBbz1OElsx102ofAq7oB5a89nDYS7dmdN1vt2i X-Received: by 2002:a05:6102:3169:b0:44d:48bf:591c with SMTP id l9-20020a056102316900b0044d48bf591cmr17699180vsm.30.1696996721213; Tue, 10 Oct 2023 20:58:41 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1696996721; cv=none; d=google.com; s=arc-20160816; b=yOrPYpcEPuKTw/M5sEJtRFmaLt5muwP+Rt+53//qGP2derVh1QDlNNIJxNYJl20iHM gYkLRxkZ+QqOGsNeTMPYwvB6xT+RaniPlOX8lrHXxEv+qIHJ8ZeVuvWW1exTWJ27XbTQ tp2w3ixW+GNVvsr25JkHZswowa7j7t7TAz0aRHo5CE4rcKT7AzypTvRMOBBN1UexKKVl e3bFI5caA6tuPxghoZ8QafNwLVMBJV5V/2SQZ5JwMTTm9qQQ4Ri9tIxLsODG7bv6hqJI irNmD90n9dnih3tkyIF03+fOIlhFC6kyDa8fm0ENpCnqJNgWviRnjJlawOjTpaGXeRxb e78g== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=9wjwkis9ujZEPm18RKN6K8BGWd/aO605Ja2yPn0BMHw=; fh=sbR93VPJg41X3A9Te8UB6W53423SLD+fZd9/GCb4FbA=; b=D+7LLqZk+jGEJN4p3/SRX7XPMsNdfaNpxdHMm2CTr+Bd3p2fWv19VQlmjFba50Oq0Y ZVTudLYhsuKcIrhtgudTIq5mwo/QmNKZG5JbNCK4YCJS5F+8RYysHxkefarCT+cILPTN 6NUC3wRjb/cv/I/AQTroBvkzKKnx7vS0ODKa9Ht4QT2DZDdAWsamE2FcvLD4yJyM676S 9eoyN1rVW2bP5P9/shePbkIrf99/6SFxiHv+iNOiXtUwebvHgeb4YdjTPMSOjyQyZhIK ewqBPJz6Ikwqm+g8bW5WXNLtASalIMAAgT9s6ZHCrIVqgxhFAX7PUstWtv0H0imeNvaY 8pMg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@daynix-com.20230601.gappssmtp.com header.s=20230601 header.b=XnnNPNFF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from pete.vger.email (pete.vger.email. [23.128.96.36]) by mx.google.com with ESMTPS id 7-20020a630f47000000b00585a61651ecsi3381109pgp.318.2023.10.10.20.58.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Oct 2023 20:58:41 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) client-ip=23.128.96.36; Authentication-Results: mx.google.com; dkim=pass header.i=@daynix-com.20230601.gappssmtp.com header.s=20230601 header.b=XnnNPNFF; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.36 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by pete.vger.email (Postfix) with ESMTP id D88F980238BB; Tue, 10 Oct 2023 20:58:37 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at pete.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1345096AbjJKD6H (ORCPT + 99 others); Tue, 10 Oct 2023 23:58:07 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51602 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1344935AbjJKD6F (ORCPT ); Tue, 10 Oct 2023 23:58:05 -0400 Received: from mail-pl1-x62e.google.com (mail-pl1-x62e.google.com [IPv6:2607:f8b0:4864:20::62e]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 57CA598 for ; Tue, 10 Oct 2023 20:58:03 -0700 (PDT) Received: by mail-pl1-x62e.google.com with SMTP id d9443c01a7336-1c871a095ceso48143035ad.2 for ; Tue, 10 Oct 2023 20:58:03 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=daynix-com.20230601.gappssmtp.com; s=20230601; t=1696996683; x=1697601483; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:from:content-language :references:cc:to:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=9wjwkis9ujZEPm18RKN6K8BGWd/aO605Ja2yPn0BMHw=; b=XnnNPNFF3Sw7Kl2cPBos+l2oZO0pJd1wcuTsmPydK9z2FMMdQYcXQ6IoY59RZ4xbBF BUanGwrilsrDF1cG8gJZuwT/0bIdW0TiNvPaqEMWn7RzQ84hM//Js++F6TQCGvClg+9K vrlZq8svVn0wLFJqZmVlhwmnjQJnLb3QEnH1BkSUGqMaPTb7aRdhMw3VQnQuP5Zw1spU 8uFICtmfAE60V/qdNizeyjy0HEQl5I5D6/jtG7BrjMVoPy4tqIHmRy/WZ9PhuFIcUltP 6+JPpc0A526kRr3cmnptt9TWCKiHEdCbyMpCSpFfCvPCNjxcoVR3Ne6LRLag2v5AOHBo XQUw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1696996683; x=1697601483; h=content-transfer-encoding:in-reply-to:from:content-language :references:cc:to:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=9wjwkis9ujZEPm18RKN6K8BGWd/aO605Ja2yPn0BMHw=; b=lt5i9wGRSBSA7gUFbsBrke/UQDP7H3FwzPZYgoGfJUbkDCsrwmZbJk+OHYcvafEu3v 9YycS4ujjJtBG17V+VJPgrlYiPzCuH4nt0bL/LyW7WbW/YsxK9kjY8A90tixuk7Nld3u hd3gIuCJseEUuvrdpxfNaFL6w77yWp9n2PKIZD5b9Wh+zLPnwt6PSsckEwRUwhmsnLjn U7sGtdbEwWjOLImcNj+7/urJeu01zGhWj8c+nyGRp8W29JnBHcXpzyLjOn9IzB5zWlXC 0h1C3l753+3kYAQBF4Dci9asGz6nf6/m6BpmeE2EgU7hBW6twzAsw409W2IUzogEN9aS RB1g== X-Gm-Message-State: AOJu0YyAbI2Ep97jHAHYn7ORouUE3XfA+oB1NocVQdbkfDckXSXK3LpB 0OJqDslMiHOruCJkZAMa+XxCsg== X-Received: by 2002:a17:903:249:b0:1c5:befa:d81d with SMTP id j9-20020a170903024900b001c5befad81dmr22526261plh.10.1696996682526; Tue, 10 Oct 2023 20:58:02 -0700 (PDT) Received: from ?IPV6:2400:4050:a840:1e00:78d2:b862:10a7:d486? ([2400:4050:a840:1e00:78d2:b862:10a7:d486]) by smtp.gmail.com with ESMTPSA id ji9-20020a170903324900b001c5900c9e8fsm12726706plb.81.2023.10.10.20.57.56 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 10 Oct 2023 20:58:02 -0700 (PDT) Message-ID: <32eb181f-f9fc-4a15-8715-984c09b13387@daynix.com> Date: Wed, 11 Oct 2023 12:57:55 +0900 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [RFC PATCH 5/7] tun: Introduce virtio-net hashing feature To: Jason Wang Cc: Willem de Bruijn , "Michael S. Tsirkin" , netdev@vger.kernel.org, linux-kernel@vger.kernel.org, kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, linux-kselftest@vger.kernel.org, bpf@vger.kernel.org, davem@davemloft.net, kuba@kernel.org, ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org, kafai@fb.com, songliubraving@fb.com, yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org, rdunlap@infradead.org, willemb@google.com, gustavoars@kernel.org, herbert@gondor.apana.org.au, steffen.klassert@secunet.com, nogikh@google.com, pablo@netfilter.org, decui@microsoft.com, jakub@cloudflare.com, elver@google.com, pabeni@redhat.com, Yuri Benditovich References: <20231008052101.144422-1-akihiko.odaki@daynix.com> <286508a3-3067-456d-8bbf-176b00dcc0c6@daynix.com> <8711b549-094d-4be2-b7af-bd93b7516c05@daynix.com> <695a0611-2b19-49f9-8d32-cfea3b7df0b2@daynix.com> <5baab0cf-7adf-475d-8968-d46ddd179f9a@daynix.com> <8f3ed081-134c-45a0-9208-c1cab29cdf37@daynix.com> <8a44e14c-03c4-44e2-8c72-9d751c63dffe@daynix.com> <0d491319-8ce9-4922-89c9-a48c4c5c03bc@daynix.com> Content-Language: en-US From: Akihiko Odaki In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=2.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,RCVD_IN_SBL_CSS, SPF_HELO_NONE,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on pete.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (pete.vger.email [0.0.0.0]); Tue, 10 Oct 2023 20:58:38 -0700 (PDT) X-Spam-Level: ** On 2023/10/11 12:18, Jason Wang wrote: > On Tue, Oct 10, 2023 at 2:19 PM Akihiko Odaki wrote: >> >> On 2023/10/10 15:00, Jason Wang wrote: >>> On Tue, Oct 10, 2023 at 1:51 PM Akihiko Odaki wrote: >>>> >>>> On 2023/10/10 14:45, Jason Wang wrote: >>>>> On Tue, Oct 10, 2023 at 9:52 AM Akihiko Odaki wrote: >>>>>> >>>>>> On 2023/10/09 19:44, Willem de Bruijn wrote: >>>>>>> On Mon, Oct 9, 2023 at 3:12 AM Akihiko Odaki wrote: >>>>>>>> >>>>>>>> On 2023/10/09 19:06, Willem de Bruijn wrote: >>>>>>>>> On Mon, Oct 9, 2023 at 3:02 AM Akihiko Odaki wrote: >>>>>>>>>> >>>>>>>>>> On 2023/10/09 18:57, Willem de Bruijn wrote: >>>>>>>>>>> On Mon, Oct 9, 2023 at 3:57 AM Akihiko Odaki wrote: >>>>>>>>>>>> >>>>>>>>>>>> On 2023/10/09 17:04, Willem de Bruijn wrote: >>>>>>>>>>>>> On Sun, Oct 8, 2023 at 3:46 PM Akihiko Odaki wrote: >>>>>>>>>>>>>> >>>>>>>>>>>>>> On 2023/10/09 5:08, Willem de Bruijn wrote: >>>>>>>>>>>>>>> On Sun, Oct 8, 2023 at 10:04 PM Akihiko Odaki wrote: >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> On 2023/10/09 4:07, Willem de Bruijn wrote: >>>>>>>>>>>>>>>>> On Sun, Oct 8, 2023 at 7:22 AM Akihiko Odaki wrote: >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> virtio-net have two usage of hashes: one is RSS and another is hash >>>>>>>>>>>>>>>>>> reporting. Conventionally the hash calculation was done by the VMM. >>>>>>>>>>>>>>>>>> However, computing the hash after the queue was chosen defeats the >>>>>>>>>>>>>>>>>> purpose of RSS. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Another approach is to use eBPF steering program. This approach has >>>>>>>>>>>>>>>>>> another downside: it cannot report the calculated hash due to the >>>>>>>>>>>>>>>>>> restrictive nature of eBPF. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Introduce the code to compute hashes to the kernel in order to overcome >>>>>>>>>>>>>>>>>> thse challenges. An alternative solution is to extend the eBPF steering >>>>>>>>>>>>>>>>>> program so that it will be able to report to the userspace, but it makes >>>>>>>>>>>>>>>>>> little sense to allow to implement different hashing algorithms with >>>>>>>>>>>>>>>>>> eBPF since the hash value reported by virtio-net is strictly defined by >>>>>>>>>>>>>>>>>> the specification. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> The hash value already stored in sk_buff is not used and computed >>>>>>>>>>>>>>>>>> independently since it may have been computed in a way not conformant >>>>>>>>>>>>>>>>>> with the specification. >>>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> Signed-off-by: Akihiko Odaki >>>>>>>>>>>>>>>>>> --- >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> +static const struct tun_vnet_hash_cap tun_vnet_hash_cap = { >>>>>>>>>>>>>>>>>> + .max_indirection_table_length = >>>>>>>>>>>>>>>>>> + TUN_VNET_HASH_MAX_INDIRECTION_TABLE_LENGTH, >>>>>>>>>>>>>>>>>> + >>>>>>>>>>>>>>>>>> + .types = VIRTIO_NET_SUPPORTED_HASH_TYPES >>>>>>>>>>>>>>>>>> +}; >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> No need to have explicit capabilities exchange like this? Tun either >>>>>>>>>>>>>>>>> supports all or none. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> tun does not support VIRTIO_NET_RSS_HASH_TYPE_IP_EX, >>>>>>>>>>>>>>>> VIRTIO_NET_RSS_HASH_TYPE_TCP_EX, and VIRTIO_NET_RSS_HASH_TYPE_UDP_EX. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> It is because the flow dissector does not support IPv6 extensions. The >>>>>>>>>>>>>>>> specification is also vague, and does not tell how many TLVs should be >>>>>>>>>>>>>>>> consumed at most when interpreting destination option header so I chose >>>>>>>>>>>>>>>> to avoid adding code for these hash types to the flow dissector. I doubt >>>>>>>>>>>>>>>> anyone will complain about it since nobody complains for Linux. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> I'm also adding this so that we can extend it later. >>>>>>>>>>>>>>>> max_indirection_table_length may grow for systems with 128+ CPUs, or >>>>>>>>>>>>>>>> types may have other bits for new protocols in the future. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> case TUNSETSTEERINGEBPF: >>>>>>>>>>>>>>>>>> - ret = tun_set_ebpf(tun, &tun->steering_prog, argp); >>>>>>>>>>>>>>>>>> + bpf_ret = tun_set_ebpf(tun, &tun->steering_prog, argp); >>>>>>>>>>>>>>>>>> + if (IS_ERR(bpf_ret)) >>>>>>>>>>>>>>>>>> + ret = PTR_ERR(bpf_ret); >>>>>>>>>>>>>>>>>> + else if (bpf_ret) >>>>>>>>>>>>>>>>>> + tun->vnet_hash.flags &= ~TUN_VNET_HASH_RSS; >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Don't make one feature disable another. >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> TUNSETSTEERINGEBPF and TUNSETVNETHASH are mutually exclusive >>>>>>>>>>>>>>>>> functions. If one is enabled the other call should fail, with EBUSY >>>>>>>>>>>>>>>>> for instance. >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>>> + case TUNSETVNETHASH: >>>>>>>>>>>>>>>>>> + len = sizeof(vnet_hash); >>>>>>>>>>>>>>>>>> + if (copy_from_user(&vnet_hash, argp, len)) { >>>>>>>>>>>>>>>>>> + ret = -EFAULT; >>>>>>>>>>>>>>>>>> + break; >>>>>>>>>>>>>>>>>> + } >>>>>>>>>>>>>>>>>> + >>>>>>>>>>>>>>>>>> + if (((vnet_hash.flags & TUN_VNET_HASH_REPORT) && >>>>>>>>>>>>>>>>>> + (tun->vnet_hdr_sz < sizeof(struct virtio_net_hdr_v1_hash) || >>>>>>>>>>>>>>>>>> + !tun_is_little_endian(tun))) || >>>>>>>>>>>>>>>>>> + vnet_hash.indirection_table_mask >= >>>>>>>>>>>>>>>>>> + TUN_VNET_HASH_MAX_INDIRECTION_TABLE_LENGTH) { >>>>>>>>>>>>>>>>>> + ret = -EINVAL; >>>>>>>>>>>>>>>>>> + break; >>>>>>>>>>>>>>>>>> + } >>>>>>>>>>>>>>>>>> + >>>>>>>>>>>>>>>>>> + argp = (u8 __user *)argp + len; >>>>>>>>>>>>>>>>>> + len = (vnet_hash.indirection_table_mask + 1) * 2; >>>>>>>>>>>>>>>>>> + if (copy_from_user(vnet_hash_indirection_table, argp, len)) { >>>>>>>>>>>>>>>>>> + ret = -EFAULT; >>>>>>>>>>>>>>>>>> + break; >>>>>>>>>>>>>>>>>> + } >>>>>>>>>>>>>>>>>> + >>>>>>>>>>>>>>>>>> + argp = (u8 __user *)argp + len; >>>>>>>>>>>>>>>>>> + len = virtio_net_hash_key_length(vnet_hash.types); >>>>>>>>>>>>>>>>>> + >>>>>>>>>>>>>>>>>> + if (copy_from_user(vnet_hash_key, argp, len)) { >>>>>>>>>>>>>>>>>> + ret = -EFAULT; >>>>>>>>>>>>>>>>>> + break; >>>>>>>>>>>>>>>>>> + } >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Probably easier and less error-prone to define a fixed size control >>>>>>>>>>>>>>>>> struct with the max indirection table size. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> I made its size variable because the indirection table and key may grow >>>>>>>>>>>>>>>> in the future as I wrote above. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>>> Btw: please trim the CC: list considerably on future patches. >>>>>>>>>>>>>>>> >>>>>>>>>>>>>>>> I'll do so in the next version with the TUNSETSTEERINGEBPF change you >>>>>>>>>>>>>>>> proposed. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> To be clear: please don't just resubmit with that one change. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> The skb and cb issues are quite fundamental issues that need to be resolved. >>>>>>>>>>>>>>> >>>>>>>>>>>>>>> I'd like to understand why adjusting the existing BPF feature for this >>>>>>>>>>>>>>> exact purpose cannot be amended to return the key it produced. >>>>>>>>>>>>>> >>>>>>>>>>>>>> eBPF steering program is not designed for this particular problem in my >>>>>>>>>>>>>> understanding. It was introduced to derive hash values with an >>>>>>>>>>>>>> understanding of application-specific semantics of packets instead of >>>>>>>>>>>>>> generic IP/TCP/UDP semantics. >>>>>>>>>>>>>> >>>>>>>>>>>>>> This problem is rather different in terms that the hash derivation is >>>>>>>>>>>>>> strictly defined by virtio-net. I don't think it makes sense to >>>>>>>>>>>>>> introduce the complexity of BPF when you always run the same code. >>>>>>>>>>>>>> >>>>>>>>>>>>>> It can utilize the existing flow dissector and also make it easier to >>>>>>>>>>>>>> use for the userspace by implementing this in the kernel. >>>>>>>>>>>>> >>>>>>>>>>>>> Ok. There does appear to be overlap in functionality. But it might be >>>>>>>>>>>>> easier to deploy to just have standard Toeplitz available without >>>>>>>>>>>>> having to compile and load an eBPF program. >>>>>>>>>>>>> >>>>>>>>>>>>> As for the sk_buff and cb[] changes. The first is really not needed. >>>>>>>>>>>>> sk_buff simply would not scale if every edge case needs a few bits. >>>>>>>>>>>> >>>>>>>>>>>> An alternative is to move the bit to cb[] and clear it for every code >>>>>>>>>>>> paths that lead to ndo_start_xmit(), but I'm worried that it is error-prone. >>>>>>>>>>>> >>>>>>>>>>>> I think we can put the bit in sk_buff for now. We can implement the >>>>>>>>>>>> alternative when we are short of bits. >>>>>>>>>>> >>>>>>>>>>> I disagree. sk_buff fields add a cost to every code path. They cannot >>>>>>>>>>> be added for every edge case. >>>>>>>>>> >>>>>>>>>> It only takes an unused bit and does not grow the sk_buff size so I >>>>>>>>>> think it has practically no cost for now. >>>>>>>>> >>>>>>>>> The problem is that that thinking leads to death by a thousand cuts. >>>>>>>>> >>>>>>>>> "for now" forces the cost of having to think hard how to avoid growing >>>>>>>>> sk_buff onto the next person. Let's do it right from the start. >>>>>>>> >>>>>>>> I see. I described an alternative to move the bit to cb[] and clear it >>>>>>>> in all code paths that leads to ndo_start_xmit() earlier. Does that >>>>>>>> sound good to you? >>>>>>> >>>>>>> If you use the control block to pass information between >>>>>>> __dev_queue_xmit on the tun device and tun_net_xmit, using gso_skb_cb, >>>>>>> the field can be left undefined in all non-tun paths. tun_select_queue >>>>>>> can initialize. >>>>>> >>>>>> The problem is that tun_select_queue() is not always called. >>>>>> netdev_core_pick_tx() ensures dev->real_num_tx_queues != 1 before >>>>>> calling it, but this variable may change later and result in a race >>>>>> condition. Another case is that XDP with predefined queue. >>>>>> >>>>>>> >>>>>>> I would still use skb->hash to encode the hash. That hash type of that >>>>>>> field is not strictly defined. It can be siphash from ___skb_get_hash >>>>>>> or a device hash, which most likely also uses Toeplitz. Then you also >>>>>>> don't run into the problem of growing the struct size. >>>>>> >>>>>> I'm concerned exactly because it's not strictly defined. Someone may >>>>>> decide to overwrite it later if we are not cautious enough. qdisc_skb_cb >>>>>> also has sufficient space to contain both of the hash value and type. >>>>> >>>>> How about using skb extensions? >>>> >>>> I think it will work. I'll try it in the next version. >>> >>> Btw, I still think using eBPF for hash might be better. >>> >>> Though the hashing rule is defined in the spec, it may be extended in >>> the future. For example, several extensions has been proposed: >>> >>> 1) RSS context >>> 2) encapsulated packet hashing >> >> Looking at the proposals, I'm now more inclined to extend the BPF >> steering program. > > Just to make sure we are at the same page. > > If the eBPF program needs to access skb extensions, it would not be a > steering program anymore (not a filter). > > Or do you mean it is a dedicated eBPF program that calculates the hash? I think the BPF program should be a steering program but extended for hash reporting. Since we need a hash reporting feature that is not present in a socket filter, the BPF program should have a dedicated bpf_prog_type (not BPF_PROG_TYPE_SOCKET_FILTER). However, as its functionality is the superset of the conventional steering program, I'm planning to use the existing TUNSETSTEERINGEBPF ioctl to set it.