Received: by 2002:a05:7412:a9a2:b0:e2:908c:2ebd with SMTP id o34csp2029689rdh; Sat, 28 Oct 2023 19:14:49 -0700 (PDT) X-Google-Smtp-Source: AGHT+IEMlaRqLFTLDxLD/sUmKYL9DSvvfmgHTqfRSWqzrN7/EZT+99H610TaYuCm1vL957hYUnUH X-Received: by 2002:a05:6358:5292:b0:168:e469:7530 with SMTP id g18-20020a056358529200b00168e4697530mr8160920rwa.32.1698545688784; Sat, 28 Oct 2023 19:14:48 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1698545688; cv=none; d=google.com; s=arc-20160816; b=nKUNz0nkwlGTdPN88IMUeXE6pF3Xk4pb4xJ0FAc0u00k9vTfXdXl0vzKXM/l5PgMdp dvibgEfQ6u6J/9GilQKTBvsgyxP3P0uO3xA/mDjzH4wWVN6FmXYzNfzq6JXPnDS1W/ls MvmY2fQCPoY9xjW9sz9+8ufI9UfqrYwbxb9ZYYOzcC/aOxEosTZlFQjrDMkoB/MgfDk+ xm7O+apb1jDrFc5VIAbD0lAkGFQisYJbIkRy3VCYSgYD8X2ljRD9Tyxr2eaRoClbQVcH +MhfS5ydrCCRYTsiNOCdXO+FFnKtwMj460qzHPexF2nTOoKjoXlGGwr7A0K6fPF73qmc toBg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:organization:in-reply-to:content-disposition :mime-version:references:reply-to:message-id:subject:cc:to:from:date; bh=PbqxgDFZEbs11yvNM42OBIYTkWQGpdVuvzafHQhVYzk=; fh=84yuJpg9rYy0nLnjX85jn1LqYNEBL2YJvd7/slluixA=; b=TUEbWiBMQZvH0/rmv7fz8CA0N5mlQS9q8PWMG6sYymLjNd/AGdAt2JOxzNSPc0/gvJ oxeH9d6pKkn2lI1XT+QzmthXtkwYLCgmJksq7e/unngnht2eEI0NE7sXTbwFQVdOauGe QNnEqiHCamXinGlwNYKaXljMkTO6ayA4qqltXtfrNpulWgo1KmddJykG6q4Q6kNizYbw sfx0YP6krqHwWorlXEhlwBP+wcBNufL3FOSS73DosdzquMnYfVoz+3nKspvwv6Hz/DK1 IZPrfOBRW9fenH31AtFIWjVsdgvcxs6vTNMrMFXdtRxrOMmSW1DJUFdJpICQA7P9K6a5 62ag== ARC-Authentication-Results: i=1; mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from agentk.vger.email (agentk.vger.email. [2620:137:e000::3:2]) by mx.google.com with ESMTPS id bn7-20020a056a02030700b0055b640a6b3csi3232962pgb.884.2023.10.28.19.14.48 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 28 Oct 2023 19:14:48 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) client-ip=2620:137:e000::3:2; Authentication-Results: mx.google.com; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:2 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by agentk.vger.email (Postfix) with ESMTP id 392E48053C40; Sat, 28 Oct 2023 19:14:46 -0700 (PDT) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.10 at agentk.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229805AbjJ2CNz (ORCPT + 99 others); Sat, 28 Oct 2023 22:13:55 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:51478 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229446AbjJ2CNy (ORCPT ); Sat, 28 Oct 2023 22:13:54 -0400 Received: from a.mx.secunet.com (a.mx.secunet.com [62.96.220.36]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 57D3DB8; Sat, 28 Oct 2023 19:13:51 -0700 (PDT) Received: from localhost (localhost [127.0.0.1]) by a.mx.secunet.com (Postfix) with ESMTP id 5BA05207AC; Sun, 29 Oct 2023 03:13:49 +0100 (CET) X-Virus-Scanned: by secunet Received: from a.mx.secunet.com ([127.0.0.1]) by localhost (a.mx.secunet.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id LPJ8PIOGi8-4; Sun, 29 Oct 2023 03:13:45 +0100 (CET) Received: from mailout2.secunet.com (mailout2.secunet.com [62.96.220.49]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by a.mx.secunet.com (Postfix) with ESMTPS id C859E20612; Sun, 29 Oct 2023 03:13:45 +0100 (CET) Received: from cas-essen-01.secunet.de (unknown [10.53.40.201]) by mailout2.secunet.com (Postfix) with ESMTP id B9D0380004A; Sun, 29 Oct 2023 03:13:45 +0100 (CET) Received: from mbx-essen-02.secunet.de (10.53.40.198) by cas-essen-01.secunet.de (10.53.40.201) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Sun, 29 Oct 2023 03:13:45 +0100 Received: from moon.secunet.de (172.18.149.1) by mbx-essen-02.secunet.de (10.53.40.198) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2507.32; Sun, 29 Oct 2023 03:13:44 +0100 Date: Sun, 29 Oct 2023 03:13:35 +0100 From: Antony Antony To: Daniel Xu CC: , , , , , , Subject: Re: [RFC bpf-next 0/6] Add bpf_xdp_get_xfrm_state() kfunc Message-ID: Reply-To: References: MIME-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Disposition: inline In-Reply-To: Organization: secunet X-ClientProxiedBy: cas-essen-02.secunet.de (10.53.40.202) To mbx-essen-02.secunet.de (10.53.40.198) X-EXCLAIMER-MD-CONFIG: 2c86f778-e09b-4440-8b15-867914633a10 X-Spam-Status: No, score=-0.8 required=5.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on agentk.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (agentk.vger.email [0.0.0.0]); Sat, 28 Oct 2023 19:14:46 -0700 (PDT) On Fri, Oct 27, 2023 at 12:46:16 -0600, Daniel Xu wrote: > This patchset adds a kfunc helper, bpf_xdp_get_xfrm_state(), that wraps > xfrm_state_lookup(). The intent is to support software RSS (via XDP) for > the ongoing/upcoming ipsec pcpu work [0]. Recent experiments performed > on (hopefully) reproducible AWS testbeds indicate that single tunnel > pcpu ipsec can reach line rate on 100G ENA nics. > > More details about that will be presented at netdev next week [1]. > > Antony did the initial stable bpf helper - I later ported it to unstable > kfuncs. So for the series, please apply a Co-developed-by for Antony, > provided he acks and signs off on this. Thanks Daniel for working on this and bringing it upstreadm. Co-developed-by: Antony Antony Signed-off-by: Antony Antony > > [0]: https://datatracker.ietf.org/doc/html/draft-ietf-ipsecme-multi-sa-performance-02 > [1]: https://netdevconf.info/0x17/sessions/workshop/security-workshop.html > > Daniel Xu (6): > bpf: xfrm: Add bpf_xdp_get_xfrm_state() kfunc > bpf: selftests: test_tunnel: Use ping -6 over ping6 > bpf: selftests: test_tunnel: Mount bpffs if necessary > bpf: selftests: test_tunnel: Use vmlinux.h declarations > bpf: selftests: test_tunnel: Disable CO-RE relocations > bpf: xfrm: Add selftest for bpf_xdp_get_xfrm_state() > > include/net/xfrm.h | 9 ++ > net/xfrm/Makefile | 1 + > net/xfrm/xfrm_policy.c | 2 + > net/xfrm/xfrm_state_bpf.c | 105 ++++++++++++++++++ > .../selftests/bpf/progs/bpf_tracing_net.h | 1 + > .../selftests/bpf/progs/test_tunnel_kern.c | 95 +++++++++------- > tools/testing/selftests/bpf/test_tunnel.sh | 43 ++++--- > 7 files changed, 202 insertions(+), 54 deletions(-) > create mode 100644 net/xfrm/xfrm_state_bpf.c > > -- > 2.42.0 >