On Mon, Jun 24, 2019 at 12:38 PM Toke Høiland-Jørgensen <t...@redhat.com> wrote: > > Andrii Nakryiko <andrii.nakry...@gmail.com> writes: > > > On Sat, Jun 22, 2019 at 7:19 PM Toke Høiland-Jørgensen <t...@redhat.com> > > wrote: > >> > >> When using the bpf_redirect_map() helper to redirect packets from XDP, the > >> eBPF > >> program cannot currently know whether the redirect will succeed, which > >> makes it > >> impossible to gracefully handle errors. To properly fix this will probably > >> require deeper changes to the way TX resources are allocated, but one > >> thing that > >> is fairly straight forward to fix is to allow lookups into devmaps, so > >> programs > >> can at least know when a redirect is *guaranteed* to fail because there is > >> no > >> entry in the map. Currently, programs work around this by keeping a shadow > >> map > >> of another type which indicates whether a map index is valid. > >> > >> This series contains two changes that are complementary ways to fix this > >> issue: > >> > >> - Moving the map lookup into the bpf_redirect_map() helper (and caching the > >> result), so the helper can return an error if no value is found in the > >> map. > >> This includes a refactoring of the devmap and cpumap code to not care > >> about > >> the index on enqueue. > >> > >> - Allowing regular lookups into devmaps from eBPF programs, using the > >> read-only > >> flag to make sure they don't change the values. > >> > >> The performance impact of the series is negligible, in the sense that I > >> cannot > >> measure it because the variance between test runs is higher than the > >> difference > >> pre/post series. > >> > >> Changelog: > >> > >> v5: > >> - Rebase on latest bpf-next. > >> - Update documentation for bpf_redirect_map() with the new meaning of > >> flags. > >> > >> v4: > >> - Fix a few nits from Andrii > >> - Lose the #defines in bpf.h and just compare the flags argument > >> directly to > >> XDP_TX in bpf_xdp_redirect_map(). > >> > >> v3: > >> - Adopt Jonathan's idea of using the lower two bits of the flag value as > >> the > >> return code. > >> - Always do the lookup, and cache the result for use in > >> xdp_do_redirect(); to > >> achieve this, refactor the devmap and cpumap code to get rid the > >> bitmap for > >> selecting which devices to flush. > >> > >> v2: > >> - For patch 1, make it clear that the change works for any map type. > >> - For patch 2, just use the new BPF_F_RDONLY_PROG flag to make the return > >> value read-only. > >> > >> --- > >> > >> Toke Høiland-Jørgensen (3): > >> devmap/cpumap: Use flush list instead of bitmap > >> bpf_xdp_redirect_map: Perform map lookup in eBPF helper > >> devmap: Allow map lookups from eBPF > >> > >> > >> include/linux/filter.h | 1 > >> include/uapi/linux/bpf.h | 7 ++- > >> kernel/bpf/cpumap.c | 106 > >> ++++++++++++++++++++----------------------- > >> kernel/bpf/devmap.c | 113 > >> ++++++++++++++++++++++------------------------ > >> kernel/bpf/verifier.c | 7 +-- > >> net/core/filter.c | 29 +++++------- > >> 6 files changed, 123 insertions(+), 140 deletions(-) > >> > > > > > > Looks like you forgot to add my Acked-by's for your patches? > > Ah yes, did not carry those forward for the individual patches, my > apologies. Could you perhaps be persuaded to send a new one (I believe a > response to the cover letter acking the whole series would suffice)? > I'll make sure to add the carrying forward of acks into my workflow in > the future :)
I don't think patchworks captures ack's from cover letter, but let's give it a go: Acked-by: Andrii Nakryiko <andr...@fb.com> > > -Toke