Commit 92164774 authored by Lorenzo Bianconi's avatar Lorenzo Bianconi Committed by Daniel Borkmann

bpf: cpumap: Add the possibility to attach an eBPF program to cpumap

Introduce the capability to attach an eBPF program to cpumap entries.
The idea behind this feature is to add the possibility to define on
which CPU run the eBPF program if the underlying hw does not support
RSS. Current supported verdicts are XDP_DROP and XDP_PASS.

This patch has been tested on Marvell ESPRESSObin using xdp_redirect_cpu
sample available in the kernel tree to identify possible performance
regressions. Results show there are no observable differences in
packet-per-second:

$./xdp_redirect_cpu --progname xdp_cpu_map0 --dev eth0 --cpu 1
rx: 354.8 Kpps
rx: 356.0 Kpps
rx: 356.8 Kpps
rx: 356.3 Kpps
rx: 356.6 Kpps
rx: 356.6 Kpps
rx: 356.7 Kpps
rx: 355.8 Kpps
rx: 356.8 Kpps
rx: 356.8 Kpps
Co-developed-by: default avatarJesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: default avatarJesper Dangaard Brouer <brouer@redhat.com>
Signed-off-by: default avatarLorenzo Bianconi <lorenzo@kernel.org>
Signed-off-by: default avatarDaniel Borkmann <daniel@iogearbox.net>
Acked-by: default avatarJesper Dangaard Brouer <brouer@redhat.com>
Link: https://lore.kernel.org/bpf/5c9febdf903d810b3415732e5cd98491d7d9067a.1594734381.git.lorenzo@kernel.org
parent 644bfe51
...@@ -1272,6 +1272,7 @@ struct bpf_cpu_map_entry *__cpu_map_lookup_elem(struct bpf_map *map, u32 key); ...@@ -1272,6 +1272,7 @@ struct bpf_cpu_map_entry *__cpu_map_lookup_elem(struct bpf_map *map, u32 key);
void __cpu_map_flush(void); void __cpu_map_flush(void);
int cpu_map_enqueue(struct bpf_cpu_map_entry *rcpu, struct xdp_buff *xdp, int cpu_map_enqueue(struct bpf_cpu_map_entry *rcpu, struct xdp_buff *xdp,
struct net_device *dev_rx); struct net_device *dev_rx);
bool cpu_map_prog_allowed(struct bpf_map *map);
/* Return map's numa specified by userspace */ /* Return map's numa specified by userspace */
static inline int bpf_map_attr_numa_node(const union bpf_attr *attr) static inline int bpf_map_attr_numa_node(const union bpf_attr *attr)
...@@ -1432,6 +1433,11 @@ static inline int cpu_map_enqueue(struct bpf_cpu_map_entry *rcpu, ...@@ -1432,6 +1433,11 @@ static inline int cpu_map_enqueue(struct bpf_cpu_map_entry *rcpu,
return 0; return 0;
} }
static inline bool cpu_map_prog_allowed(struct bpf_map *map)
{
return false;
}
static inline struct bpf_prog *bpf_prog_get_type_path(const char *name, static inline struct bpf_prog *bpf_prog_get_type_path(const char *name,
enum bpf_prog_type type) enum bpf_prog_type type)
{ {
......
...@@ -98,6 +98,11 @@ struct xdp_frame { ...@@ -98,6 +98,11 @@ struct xdp_frame {
struct net_device *dev_rx; /* used by cpumap */ struct net_device *dev_rx; /* used by cpumap */
}; };
struct xdp_cpumap_stats {
unsigned int pass;
unsigned int drop;
};
/* Clear kernel pointers in xdp_frame */ /* Clear kernel pointers in xdp_frame */
static inline void xdp_scrub_frame(struct xdp_frame *frame) static inline void xdp_scrub_frame(struct xdp_frame *frame)
{ {
......
...@@ -177,9 +177,9 @@ DEFINE_EVENT(xdp_redirect_template, xdp_redirect_map_err, ...@@ -177,9 +177,9 @@ DEFINE_EVENT(xdp_redirect_template, xdp_redirect_map_err,
TRACE_EVENT(xdp_cpumap_kthread, TRACE_EVENT(xdp_cpumap_kthread,
TP_PROTO(int map_id, unsigned int processed, unsigned int drops, TP_PROTO(int map_id, unsigned int processed, unsigned int drops,
int sched), int sched, struct xdp_cpumap_stats *xdp_stats),
TP_ARGS(map_id, processed, drops, sched), TP_ARGS(map_id, processed, drops, sched, xdp_stats),
TP_STRUCT__entry( TP_STRUCT__entry(
__field(int, map_id) __field(int, map_id)
...@@ -188,6 +188,8 @@ TRACE_EVENT(xdp_cpumap_kthread, ...@@ -188,6 +188,8 @@ TRACE_EVENT(xdp_cpumap_kthread,
__field(unsigned int, drops) __field(unsigned int, drops)
__field(unsigned int, processed) __field(unsigned int, processed)
__field(int, sched) __field(int, sched)
__field(unsigned int, xdp_pass)
__field(unsigned int, xdp_drop)
), ),
TP_fast_assign( TP_fast_assign(
...@@ -197,16 +199,20 @@ TRACE_EVENT(xdp_cpumap_kthread, ...@@ -197,16 +199,20 @@ TRACE_EVENT(xdp_cpumap_kthread,
__entry->drops = drops; __entry->drops = drops;
__entry->processed = processed; __entry->processed = processed;
__entry->sched = sched; __entry->sched = sched;
__entry->xdp_pass = xdp_stats->pass;
__entry->xdp_drop = xdp_stats->drop;
), ),
TP_printk("kthread" TP_printk("kthread"
" cpu=%d map_id=%d action=%s" " cpu=%d map_id=%d action=%s"
" processed=%u drops=%u" " processed=%u drops=%u"
" sched=%d", " sched=%d"
" xdp_pass=%u xdp_drop=%u",
__entry->cpu, __entry->map_id, __entry->cpu, __entry->map_id,
__print_symbolic(__entry->act, __XDP_ACT_SYM_TAB), __print_symbolic(__entry->act, __XDP_ACT_SYM_TAB),
__entry->processed, __entry->drops, __entry->processed, __entry->drops,
__entry->sched) __entry->sched,
__entry->xdp_pass, __entry->xdp_drop)
); );
TRACE_EVENT(xdp_cpumap_enqueue, TRACE_EVENT(xdp_cpumap_enqueue,
......
...@@ -227,6 +227,7 @@ enum bpf_attach_type { ...@@ -227,6 +227,7 @@ enum bpf_attach_type {
BPF_CGROUP_INET6_GETSOCKNAME, BPF_CGROUP_INET6_GETSOCKNAME,
BPF_XDP_DEVMAP, BPF_XDP_DEVMAP,
BPF_CGROUP_INET_SOCK_RELEASE, BPF_CGROUP_INET_SOCK_RELEASE,
BPF_XDP_CPUMAP,
__MAX_BPF_ATTACH_TYPE __MAX_BPF_ATTACH_TYPE
}; };
...@@ -3856,6 +3857,10 @@ struct bpf_devmap_val { ...@@ -3856,6 +3857,10 @@ struct bpf_devmap_val {
*/ */
struct bpf_cpumap_val { struct bpf_cpumap_val {
__u32 qsize; /* queue size to remote target CPU */ __u32 qsize; /* queue size to remote target CPU */
union {
int fd; /* prog fd on map write */
__u32 id; /* prog id on map read */
} bpf_prog;
}; };
enum sk_action { enum sk_action {
......
...@@ -63,6 +63,7 @@ struct bpf_cpu_map_entry { ...@@ -63,6 +63,7 @@ struct bpf_cpu_map_entry {
struct task_struct *kthread; struct task_struct *kthread;
struct bpf_cpumap_val value; struct bpf_cpumap_val value;
struct bpf_prog *prog;
atomic_t refcnt; /* Control when this struct can be free'ed */ atomic_t refcnt; /* Control when this struct can be free'ed */
struct rcu_head rcu; struct rcu_head rcu;
...@@ -82,6 +83,7 @@ static int bq_flush_to_queue(struct xdp_bulk_queue *bq); ...@@ -82,6 +83,7 @@ static int bq_flush_to_queue(struct xdp_bulk_queue *bq);
static struct bpf_map *cpu_map_alloc(union bpf_attr *attr) static struct bpf_map *cpu_map_alloc(union bpf_attr *attr)
{ {
u32 value_size = attr->value_size;
struct bpf_cpu_map *cmap; struct bpf_cpu_map *cmap;
int err = -ENOMEM; int err = -ENOMEM;
u64 cost; u64 cost;
...@@ -92,7 +94,9 @@ static struct bpf_map *cpu_map_alloc(union bpf_attr *attr) ...@@ -92,7 +94,9 @@ static struct bpf_map *cpu_map_alloc(union bpf_attr *attr)
/* check sanity of attributes */ /* check sanity of attributes */
if (attr->max_entries == 0 || attr->key_size != 4 || if (attr->max_entries == 0 || attr->key_size != 4 ||
attr->value_size != 4 || attr->map_flags & ~BPF_F_NUMA_NODE) (value_size != offsetofend(struct bpf_cpumap_val, qsize) &&
value_size != offsetofend(struct bpf_cpumap_val, bpf_prog.fd)) ||
attr->map_flags & ~BPF_F_NUMA_NODE)
return ERR_PTR(-EINVAL); return ERR_PTR(-EINVAL);
cmap = kzalloc(sizeof(*cmap), GFP_USER); cmap = kzalloc(sizeof(*cmap), GFP_USER);
...@@ -214,6 +218,8 @@ static void __cpu_map_ring_cleanup(struct ptr_ring *ring) ...@@ -214,6 +218,8 @@ static void __cpu_map_ring_cleanup(struct ptr_ring *ring)
static void put_cpu_map_entry(struct bpf_cpu_map_entry *rcpu) static void put_cpu_map_entry(struct bpf_cpu_map_entry *rcpu)
{ {
if (atomic_dec_and_test(&rcpu->refcnt)) { if (atomic_dec_and_test(&rcpu->refcnt)) {
if (rcpu->prog)
bpf_prog_put(rcpu->prog);
/* The queue should be empty at this point */ /* The queue should be empty at this point */
__cpu_map_ring_cleanup(rcpu->queue); __cpu_map_ring_cleanup(rcpu->queue);
ptr_ring_cleanup(rcpu->queue, NULL); ptr_ring_cleanup(rcpu->queue, NULL);
...@@ -222,6 +228,62 @@ static void put_cpu_map_entry(struct bpf_cpu_map_entry *rcpu) ...@@ -222,6 +228,62 @@ static void put_cpu_map_entry(struct bpf_cpu_map_entry *rcpu)
} }
} }
static int cpu_map_bpf_prog_run_xdp(struct bpf_cpu_map_entry *rcpu,
void **frames, int n,
struct xdp_cpumap_stats *stats)
{
struct xdp_rxq_info rxq;
struct xdp_buff xdp;
int i, nframes = 0;
if (!rcpu->prog)
return n;
rcu_read_lock();
xdp_set_return_frame_no_direct();
xdp.rxq = &rxq;
for (i = 0; i < n; i++) {
struct xdp_frame *xdpf = frames[i];
u32 act;
int err;
rxq.dev = xdpf->dev_rx;
rxq.mem = xdpf->mem;
/* TODO: report queue_index to xdp_rxq_info */
xdp_convert_frame_to_buff(xdpf, &xdp);
act = bpf_prog_run_xdp(rcpu->prog, &xdp);
switch (act) {
case XDP_PASS:
err = xdp_update_frame_from_buff(&xdp, xdpf);
if (err < 0) {
xdp_return_frame(xdpf);
stats->drop++;
} else {
frames[nframes++] = xdpf;
stats->pass++;
}
break;
default:
bpf_warn_invalid_xdp_action(act);
/* fallthrough */
case XDP_DROP:
xdp_return_frame(xdpf);
stats->drop++;
break;
}
}
xdp_clear_return_frame_no_direct();
rcu_read_unlock();
return nframes;
}
#define CPUMAP_BATCH 8 #define CPUMAP_BATCH 8
static int cpu_map_kthread_run(void *data) static int cpu_map_kthread_run(void *data)
...@@ -236,11 +298,12 @@ static int cpu_map_kthread_run(void *data) ...@@ -236,11 +298,12 @@ static int cpu_map_kthread_run(void *data)
* kthread_stop signal until queue is empty. * kthread_stop signal until queue is empty.
*/ */
while (!kthread_should_stop() || !__ptr_ring_empty(rcpu->queue)) { while (!kthread_should_stop() || !__ptr_ring_empty(rcpu->queue)) {
struct xdp_cpumap_stats stats = {}; /* zero stats */
gfp_t gfp = __GFP_ZERO | GFP_ATOMIC;
unsigned int drops = 0, sched = 0; unsigned int drops = 0, sched = 0;
void *frames[CPUMAP_BATCH]; void *frames[CPUMAP_BATCH];
void *skbs[CPUMAP_BATCH]; void *skbs[CPUMAP_BATCH];
gfp_t gfp = __GFP_ZERO | GFP_ATOMIC; int i, n, m, nframes;
int i, n, m;
/* Release CPU reschedule checks */ /* Release CPU reschedule checks */
if (__ptr_ring_empty(rcpu->queue)) { if (__ptr_ring_empty(rcpu->queue)) {
...@@ -261,8 +324,8 @@ static int cpu_map_kthread_run(void *data) ...@@ -261,8 +324,8 @@ static int cpu_map_kthread_run(void *data)
* kthread CPU pinned. Lockless access to ptr_ring * kthread CPU pinned. Lockless access to ptr_ring
* consume side valid as no-resize allowed of queue. * consume side valid as no-resize allowed of queue.
*/ */
n = __ptr_ring_consume_batched(rcpu->queue, frames, CPUMAP_BATCH); n = __ptr_ring_consume_batched(rcpu->queue, frames,
CPUMAP_BATCH);
for (i = 0; i < n; i++) { for (i = 0; i < n; i++) {
void *f = frames[i]; void *f = frames[i];
struct page *page = virt_to_page(f); struct page *page = virt_to_page(f);
...@@ -274,15 +337,19 @@ static int cpu_map_kthread_run(void *data) ...@@ -274,15 +337,19 @@ static int cpu_map_kthread_run(void *data)
prefetchw(page); prefetchw(page);
} }
m = kmem_cache_alloc_bulk(skbuff_head_cache, gfp, n, skbs); /* Support running another XDP prog on this CPU */
if (unlikely(m == 0)) { nframes = cpu_map_bpf_prog_run_xdp(rcpu, frames, n, &stats);
for (i = 0; i < n; i++) if (nframes) {
skbs[i] = NULL; /* effect: xdp_return_frame */ m = kmem_cache_alloc_bulk(skbuff_head_cache, gfp, nframes, skbs);
drops = n; if (unlikely(m == 0)) {
for (i = 0; i < nframes; i++)
skbs[i] = NULL; /* effect: xdp_return_frame */
drops += nframes;
}
} }
local_bh_disable(); local_bh_disable();
for (i = 0; i < n; i++) { for (i = 0; i < nframes; i++) {
struct xdp_frame *xdpf = frames[i]; struct xdp_frame *xdpf = frames[i];
struct sk_buff *skb = skbs[i]; struct sk_buff *skb = skbs[i];
int ret; int ret;
...@@ -299,7 +366,7 @@ static int cpu_map_kthread_run(void *data) ...@@ -299,7 +366,7 @@ static int cpu_map_kthread_run(void *data)
drops++; drops++;
} }
/* Feedback loop via tracepoint */ /* Feedback loop via tracepoint */
trace_xdp_cpumap_kthread(rcpu->map_id, n, drops, sched); trace_xdp_cpumap_kthread(rcpu->map_id, n, drops, sched, &stats);
local_bh_enable(); /* resched point, may call do_softirq() */ local_bh_enable(); /* resched point, may call do_softirq() */
} }
...@@ -309,13 +376,38 @@ static int cpu_map_kthread_run(void *data) ...@@ -309,13 +376,38 @@ static int cpu_map_kthread_run(void *data)
return 0; return 0;
} }
bool cpu_map_prog_allowed(struct bpf_map *map)
{
return map->map_type == BPF_MAP_TYPE_CPUMAP &&
map->value_size != offsetofend(struct bpf_cpumap_val, qsize);
}
static int __cpu_map_load_bpf_program(struct bpf_cpu_map_entry *rcpu, int fd)
{
struct bpf_prog *prog;
prog = bpf_prog_get_type(fd, BPF_PROG_TYPE_XDP);
if (IS_ERR(prog))
return PTR_ERR(prog);
if (prog->expected_attach_type != BPF_XDP_CPUMAP) {
bpf_prog_put(prog);
return -EINVAL;
}
rcpu->value.bpf_prog.id = prog->aux->id;
rcpu->prog = prog;
return 0;
}
static struct bpf_cpu_map_entry * static struct bpf_cpu_map_entry *
__cpu_map_entry_alloc(struct bpf_cpumap_val *value, u32 cpu, int map_id) __cpu_map_entry_alloc(struct bpf_cpumap_val *value, u32 cpu, int map_id)
{ {
int numa, err, i, fd = value->bpf_prog.fd;
gfp_t gfp = GFP_KERNEL | __GFP_NOWARN; gfp_t gfp = GFP_KERNEL | __GFP_NOWARN;
struct bpf_cpu_map_entry *rcpu; struct bpf_cpu_map_entry *rcpu;
struct xdp_bulk_queue *bq; struct xdp_bulk_queue *bq;
int numa, err, i;
/* Have map->numa_node, but choose node of redirect target CPU */ /* Have map->numa_node, but choose node of redirect target CPU */
numa = cpu_to_node(cpu); numa = cpu_to_node(cpu);
...@@ -357,6 +449,9 @@ __cpu_map_entry_alloc(struct bpf_cpumap_val *value, u32 cpu, int map_id) ...@@ -357,6 +449,9 @@ __cpu_map_entry_alloc(struct bpf_cpumap_val *value, u32 cpu, int map_id)
get_cpu_map_entry(rcpu); /* 1-refcnt for being in cmap->cpu_map[] */ get_cpu_map_entry(rcpu); /* 1-refcnt for being in cmap->cpu_map[] */
get_cpu_map_entry(rcpu); /* 1-refcnt for kthread */ get_cpu_map_entry(rcpu); /* 1-refcnt for kthread */
if (fd > 0 && __cpu_map_load_bpf_program(rcpu, fd))
goto free_ptr_ring;
/* Make sure kthread runs on a single CPU */ /* Make sure kthread runs on a single CPU */
kthread_bind(rcpu->kthread, cpu); kthread_bind(rcpu->kthread, cpu);
wake_up_process(rcpu->kthread); wake_up_process(rcpu->kthread);
......
...@@ -5448,6 +5448,8 @@ static int generic_xdp_install(struct net_device *dev, struct netdev_bpf *xdp) ...@@ -5448,6 +5448,8 @@ static int generic_xdp_install(struct net_device *dev, struct netdev_bpf *xdp)
for (i = 0; i < new->aux->used_map_cnt; i++) { for (i = 0; i < new->aux->used_map_cnt; i++) {
if (dev_map_can_have_prog(new->aux->used_maps[i])) if (dev_map_can_have_prog(new->aux->used_maps[i]))
return -EINVAL; return -EINVAL;
if (cpu_map_prog_allowed(new->aux->used_maps[i]))
return -EINVAL;
} }
} }
...@@ -8875,6 +8877,13 @@ int dev_change_xdp_fd(struct net_device *dev, struct netlink_ext_ack *extack, ...@@ -8875,6 +8877,13 @@ int dev_change_xdp_fd(struct net_device *dev, struct netlink_ext_ack *extack,
return -EINVAL; return -EINVAL;
} }
if (prog->expected_attach_type == BPF_XDP_CPUMAP) {
NL_SET_ERR_MSG(extack,
"BPF_XDP_CPUMAP programs can not be attached to a device");
bpf_prog_put(prog);
return -EINVAL;
}
/* prog->aux->id may be 0 for orphaned device-bound progs */ /* prog->aux->id may be 0 for orphaned device-bound progs */
if (prog->aux->id && prog->aux->id == prog_id) { if (prog->aux->id && prog->aux->id == prog_id) {
bpf_prog_put(prog); bpf_prog_put(prog);
......
...@@ -227,6 +227,7 @@ enum bpf_attach_type { ...@@ -227,6 +227,7 @@ enum bpf_attach_type {
BPF_CGROUP_INET6_GETSOCKNAME, BPF_CGROUP_INET6_GETSOCKNAME,
BPF_XDP_DEVMAP, BPF_XDP_DEVMAP,
BPF_CGROUP_INET_SOCK_RELEASE, BPF_CGROUP_INET_SOCK_RELEASE,
BPF_XDP_CPUMAP,
__MAX_BPF_ATTACH_TYPE __MAX_BPF_ATTACH_TYPE
}; };
...@@ -3856,6 +3857,10 @@ struct bpf_devmap_val { ...@@ -3856,6 +3857,10 @@ struct bpf_devmap_val {
*/ */
struct bpf_cpumap_val { struct bpf_cpumap_val {
__u32 qsize; /* queue size to remote target CPU */ __u32 qsize; /* queue size to remote target CPU */
union {
int fd; /* prog fd on map write */
__u32 id; /* prog id on map read */
} bpf_prog;
}; };
enum sk_action { enum sk_action {
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment