Received: by 2002:a05:7412:40d:b0:e2:908c:2ebd with SMTP id 13csp872418rdf; Tue, 21 Nov 2023 21:37:20 -0800 (PST) X-Google-Smtp-Source: AGHT+IGkzk6Nj3skDCJmXrl8Eb1/XGXKW2SvAXVBgRuxnoGf9H9SCLJBpH3lcMoF33IchQ4PC5xc X-Received: by 2002:a05:6a00:23c4:b0:6cb:bc92:c73f with SMTP id g4-20020a056a0023c400b006cbbc92c73fmr1295059pfc.2.1700631439702; Tue, 21 Nov 2023 21:37:19 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1700631439; cv=none; d=google.com; s=arc-20160816; b=Yvds9YvN1e8kaGr1r11pgyjxUgoX+OICeK7SFnjjLqCrP37i2ytOS3O4Mi3zM8T567 FDiqB+CVMAFbGZRRqlbNSfRIOhb/54ZcHCokDwtlWdPpT1kcFVenuS/pFpNFNPZ7Zw26 sqet8Oy/JCd+ILFgYKeK1sS2zvT+KLZ92Wul33zw1kmwBC84XfTr6v/1wouiJmpOHmot kZfuJ7DmvhcBXvIbEuM329HLbSzIm7NOwV/dm1OaocpN7aoUM4kvwZCe+YZrYKg9StRK nJJpXGYUV+fzDJEGvRS1ZdAX2se1APQrk2bVLbxHBLSdvOQbQVeV7FirAMCOLeuNI13r g6nA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:in-reply-to:from :content-language:references:cc:to:subject:user-agent:mime-version :date:message-id:dkim-signature; bh=OPmH0R/ZGatN6+UwwJY3MEok1l+rZDRi+gW+Psbpgp4=; fh=6JYbqZNmWeK6hBmM1DtV2cJfkSydirELGIkVrao/NK0=; b=etQWE3vTP2rQRUCdam3BvoZcf05utgmHsfEPC9M7Q6LtX4UX5u4MLOpuMqeHbgL9EK SAuj1C5GIWizerQXuGGqxU2/PaOkhgZplITY68gcymYTqYPVHd1V/XkJSvU5AeBcC2aD 4gHOnrQheZjBZLth8DPoTlFyAfxcG9P3oLBD1G/dCffuxQqm6eYwCXZ97DONDoX8Ip7K vTqWk91OzyOVV1tF64MolVzLQ5xzrDkCr/s75Fnrsaxc1reKxHgLkUzQCpptGAFW1XCT 8ycWN5PnNMBn/0tahLqmRGSVGj3Pmv4Zs6gBez5fqJdy/ljZB9nAkXT32KWfU5KZiuQF syQA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@daynix-com.20230601.gappssmtp.com header.s=20230601 header.b=em2DzhAj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from lipwig.vger.email (lipwig.vger.email. [2620:137:e000::3:3]) by mx.google.com with ESMTPS id by8-20020a056a02058800b005c1b59f008bsi12559765pgb.617.2023.11.21.21.37.19 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 21 Nov 2023 21:37:19 -0800 (PST) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) client-ip=2620:137:e000::3:3; Authentication-Results: mx.google.com; dkim=pass header.i=@daynix-com.20230601.gappssmtp.com header.s=20230601 header.b=em2DzhAj; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::3:3 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: from out1.vger.email (depot.vger.email [IPv6:2620:137:e000::3:0]) by lipwig.vger.email (Postfix) with ESMTP id EF4CF8046BD5; Tue, 21 Nov 2023 21:36:58 -0800 (PST) X-Virus-Status: Clean X-Virus-Scanned: clamav-milter 0.103.11 at lipwig.vger.email Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229821AbjKVFgq (ORCPT + 99 others); Wed, 22 Nov 2023 00:36:46 -0500 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38562 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229576AbjKVFgo (ORCPT ); Wed, 22 Nov 2023 00:36:44 -0500 Received: from mail-pg1-x52f.google.com (mail-pg1-x52f.google.com [IPv6:2607:f8b0:4864:20::52f]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id EF14D12A for ; Tue, 21 Nov 2023 21:36:39 -0800 (PST) Received: by mail-pg1-x52f.google.com with SMTP id 41be03b00d2f7-517ab9a4a13so4885352a12.1 for ; Tue, 21 Nov 2023 21:36:39 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=daynix-com.20230601.gappssmtp.com; s=20230601; t=1700631399; x=1701236199; darn=vger.kernel.org; h=content-transfer-encoding:in-reply-to:from:content-language :references:cc:to:subject:user-agent:mime-version:date:message-id :from:to:cc:subject:date:message-id:reply-to; bh=OPmH0R/ZGatN6+UwwJY3MEok1l+rZDRi+gW+Psbpgp4=; b=em2DzhAjzA6+M6CAZujzfRwbEZCqdGSRYk74aXSfvrwfC9i0A5Oyz+J+5tXb6LB8dK pb1g2PGElnuo2VdvsfPqhH/zL4esxIz8rbH83DzmAT67TQcpdWYKKVZUIut7hb1C1Dbk SSU7+oZWwp6PD3mXy/vhPNk2gTDZAD15xboH/Ew9BYswQvTRf1/GEiDSNQyn9VaGj5b4 uApyRPYUw0IJVUcMc8WuX08ZPTfmQ8+6n3cXr8qZCA5fJ6k/UaM5+Ibswq/4Y3EzKHvu R9g/W7fzIJjmilMuHgWda6NsgQYaM4/F5jzzQu3bTAx4UkOXhFHVQUVBoyK2tkqx17Ww LxCg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1700631399; x=1701236199; h=content-transfer-encoding:in-reply-to:from:content-language :references:cc:to:subject:user-agent:mime-version:date:message-id :x-gm-message-state:from:to:cc:subject:date:message-id:reply-to; bh=OPmH0R/ZGatN6+UwwJY3MEok1l+rZDRi+gW+Psbpgp4=; b=ChS7SK93vUZE03VaEx/Ao6iYWWpSH8SQQHFtqmedhgPMpXQTcOg84+q/M34f2Fc0C0 0DN3LeKm2O+E7CnSNf3KoCdaweSeQ+ZS73w0zliHwCdCfYXS7BGvSiuOP2DirU22HnDQ eOEgeyy4Y30bcVQmkTjdqwRUNPGVMo3xRjY9akNbiU42WSGkX4wibomHlk1+LL6IGNVP cm900Ft4Qu/XtaqMiiUFA2tJ5H0USNXdF6h9VlIgCybPiOUqotUlyKlQz1L0cThui+Wh 8SfAKcsDtimeJLRMCnLgYH7g/9yvQ3MLKm/w4hb8qkAXAPpglaCRbZ7WggynCYgZMyTh wt+Q== X-Gm-Message-State: AOJu0Yw0fRqk3NgXbSWdINomEOsQGvUh9lDuPOltVXmDkxsXDNfzImM2 BE6igz+OzVBb8ePAnDhNKQB3nw== X-Received: by 2002:a05:6a20:8f1d:b0:17a:e941:b0a3 with SMTP id b29-20020a056a208f1d00b0017ae941b0a3mr1395905pzk.39.1700631399364; Tue, 21 Nov 2023 21:36:39 -0800 (PST) Received: from [157.82.205.15] ([157.82.205.15]) by smtp.gmail.com with ESMTPSA id gj13-20020a17090b108d00b002839a4f65c5sm454781pjb.30.2023.11.21.21.36.33 (version=TLS1_3 cipher=TLS_AES_128_GCM_SHA256 bits=128/128); Tue, 21 Nov 2023 21:36:39 -0800 (PST) Message-ID: <664003d3-aadb-4938-80f6-67fab1c9dcdd@daynix.com> Date: Wed, 22 Nov 2023 14:36:32 +0900 MIME-Version: 1.0 User-Agent: Mozilla Thunderbird Subject: Re: [RFC PATCH v2 1/7] bpf: Introduce BPF_PROG_TYPE_VNET_HASH To: Song Liu Cc: Alexei Starovoitov , Jason Wang , Alexei Starovoitov , Daniel Borkmann , Andrii Nakryiko , Martin KaFai Lau , Yonghong Song , John Fastabend , KP Singh , Stanislav Fomichev , Hao Luo , Jiri Olsa , Jonathan Corbet , Willem de Bruijn , "David S. Miller" , Eric Dumazet , Jakub Kicinski , Paolo Abeni , "Michael S. Tsirkin" , Xuan Zhuo , Mykola Lysenko , Shuah Khan , bpf , "open list:DOCUMENTATION" , LKML , Network Development , kvm@vger.kernel.org, virtualization@lists.linux-foundation.org, "open list:KERNEL SELFTEST FRAMEWORK" , Yuri Benditovich , Andrew Melnychenko References: <20231015141644.260646-1-akihiko.odaki@daynix.com> <20231015141644.260646-2-akihiko.odaki@daynix.com> <2594bb24-74dc-4785-b46d-e1bffcc3e7ed@daynix.com> <9a4853ad-5ef4-4b15-a49e-9edb5ae4468e@daynix.com> <6253fb6b-9a53-484a-9be5-8facd46c051e@daynix.com> Content-Language: en-US From: Akihiko Odaki In-Reply-To: Content-Type: text/plain; charset=UTF-8; format=flowed Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-0.8 required=5.0 tests=DKIM_SIGNED,DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,T_SCC_BODY_TEXT_LINE autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lipwig.vger.email Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org X-Greylist: Sender passed SPF test, not delayed by milter-greylist-4.6.4 (lipwig.vger.email [0.0.0.0]); Tue, 21 Nov 2023 21:36:59 -0800 (PST) On 2023/11/22 14:25, Song Liu wrote: > On Mon, Nov 20, 2023 at 12:05 AM Akihiko Odaki wrote: >> >> On 2023/11/20 6:02, Song Liu wrote: > [...] >>>> In contrast, our intended use case is more like a normal application. >>>> So, for example, a user may download a container and run QEMU (including >>>> the BPF program) installed in the container. As such, it is nice if the >>>> ABI is stable across kernel releases, but it is not guaranteed for >>>> kfuncs. Such a use case is already covered with the eBPF steering >>>> program so I want to maintain it if possible. >>> >>> TBH, I don't think stability should be a concern for kfuncs used by QEMU. >>> Many core BPF APIs are now implemented as kfuncs: bpf_dynptr_*, >>> bpf_rcu_*, etc. As long as there are valid use cases,these kfuncs will >>> be supported. >> >> Documentation/bpf/kfuncs.rst still says: >> > kfuncs provide a kernel <-> kernel API, and thus are not bound by any >> > of the strict stability restrictions associated with kernel <-> user >> > UAPIs. >> >> Is it possible to change the statement like as follows: >> "Most kfuncs provide a kernel <-> kernel API, and thus are not bound by >> any of the strict stability restrictions associated with kernel <-> user >> UAPIs. kfuncs that have same stability restrictions associated with >> UAPIs are exceptional, and must be carefully reviewed by subsystem (and >> BPF?) maintainers as any other UAPIs are." > > I am afraid this is against the intention to not guarantee UAPI-level stability > for kfuncs. Is it possible to ensure that a QEMU binary with the eBPF program included works on different kernel versions without UAPI-level stability then? Otherwise, I think we need to think of the minimal UAPI addition that exposes the feature I propose, and the two options I presented first are the candidates of such: the stable BPF change or tuntap interface change. Regards, Akihiko Odaki