DPDK patches and discussions
 help / color / mirror / Atom feed
From: Ferruh Yigit <ferruh.yigit@intel.com>
To: Tudor Cornea <tudor.cornea@gmail.com>
Cc: <linville@tuxdriver.com>, <thomas@monjalon.net>, <dev@dpdk.org>,
	"Stephen Hemminger" <stephen@networkplumber.org>,
	Andrew Rybchenko <andrew.rybchenko@oktetlabs.ru>,
	Thomas Monjalon <thomas@monjalon.net>,
	"jerinj@marvell.com" <jerinj@marvell.com>
Subject: Re: [dpdk-dev] [PATCH] net/af_packet: try to reinsert the stripped vlan tag
Date: Thu, 2 Sep 2021 11:49:31 +0100	[thread overview]
Message-ID: <182a292a-c004-d49b-fc3d-c48dba79206f@intel.com> (raw)
In-Reply-To: <20210901143420.5977fd9d@hermes.local>

On 9/1/2021 10:34 PM, Stephen Hemminger wrote:
> On Wed, 1 Sep 2021 22:07:22 +0300
> Tudor Cornea <tudor.cornea@gmail.com> wrote:
> 
>> Indeed, the vlan insertion could be a costly operation. We should probably
>> do it only if the user specifically asks to have the vlan tag in the packet.
>> Otherwise, af_packet PMD users might pay a price in terms of performance
>> for something they didn't ask for.
>>
>> I was thinking of avoiding having to change the application in order to
>> re-insert the vlan tag.
>> Doing this operation inside the PMD driver seemed like a good fit.
>>
>> Looking at the netvsc driver (drivers/net/netvsc), the vlan insertion is
>> guarded by a check to hv->vlan_strip
>>
>>   if (!hv->vlan_strip && rte_vlan_insert(&m)) {
>>
>> hv->vlan_strip seems to be initialized in hn_dev_configure() in the
>> following way
>>
>>  hv->vlan_strip = !!(rxmode->offloads & DEV_RX_OFFLOAD_VLAN_STRIP);
>>
>> while 'hv' seems to be stored in rte_eth_dev->data->dev_private
>>
>> I am thinking of doing something similar for the af_packet PMD.
>> The 'pmd_internals' structure could potentially hold a field, say
>> vlan_strip', which could be initialized if the application enables the
>> DEV_RX_OFFLOAD_VLAN_STRIP in rxmode->offloads
>>
>> This way, I'm thinking that the application could potentially control the
>> effect of vlan stripping for the af_packet PMD, in an uniform way, similar
>> to other PMDs.
>> Would this be considered an acceptable solution ?
>>
>>
>>
>>
>> On Tue, 31 Aug 2021 at 18:31, Ferruh Yigit <ferruh.yigit@intel.com> wrote:
>>
>>> On 8/20/2021 1:46 PM, Tudor Cornea wrote:  
>>>> The af_packet pmd driver binds to a raw socket and allows
>>>> sending and receiving of packets through the kernel.
>>>>
>>>> Since commit bcc6d47903 [1], the kernel strips the vlan tags early in
>>>> __netif_receive_skb_core(), so we receive untagged packets while
>>>> running with the af_packet pmd.
>>>>
>>>> Luckily for us, the skb vlan-related fields are still populated from the
>>>> stripped vlan tags, so we end up having all the information
>>>> that we need in the mbuf.
>>>>
>>>> We would like to have the the vlan tag inside the mbuf.
>>>> Let's take a shot at it by trying to reinsert the stripped vlan tag.
>>>>  
>>>
>>> PMD already sets 'mbuf->vlan_tci' and 'PKT_RX_VLAN | PKT_RX_VLAN_STRIPPED'
>>> flags, so application can be aware of the vlan tag and can consume it.
>>>
>>> Inserting the vlan tag back to packet is costly, what is the motivation to
>>> do so?
>>>  
>>>> As a side note, something similar was done for the netvsc pmd.
>>>>
>>>> [1]  
>>> https://github.com/torvalds/linux/commit/bcc6d47903612c3861201cc3a866fb604f26b8b2  
>>>>
>>>> Signed-off-by: Tudor Cornea <tudor.cornea@gmail.com>
> 
> The netvsc PMD has to handle some subtle cases where VLAN stripping
> is done by the VF but the slow path over vmbus does not.
> Since most traffic goes over the VF path, it makes sense for the
> netvsc PMD to advertise and handle VLAN stripping even if it has
> to do it in software.
> 
> Ferruh is right the mbuf generated by current AF_PACKET PMD is
> valid with VLAN stripped correctly. I think you are also correct
> that the stripping needs to be controllable by the application.
> And yes the kernel always strips the VLAN; there is no option
> to tell socket(AF_PACKET) not to do that.
> 

When application doesn't set VLAN_STRIP offload, expectation is VLAN tag to be
in the packet and no additional work is done.

But that is not the case for af_packet.
If your change is applied, not requesting any offload, default confing, may
cause unintended work for af_packet, since it will insert the already stripped
vlan tag back.

And we don't have a way to say any specific offload can't be disabled by the
PMD/device, although we hit this case a few times previously.
Proper fix can be adding this support to offloads, but it is more invasive
change. + Andrew, Thomas, Jerin for this discussion.


For short term at least 'DEV_RX_OFFLOAD_VLAN_STRIP' offload should be added to
the af_packet capability.
It is also possible to set this offload in the config by PMD itself even
application doesn't request it, to be correct in the config. Not sure how much
it helps to applications (there is a new API proposed this release to get config
to application, perhaps after configuration step app can request the config and
recognize that VLAN_STRIP offload is set by PMD, but this is some overhead).

  reply	other threads:[~2021-09-02 10:49 UTC|newest]

Thread overview: 18+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2021-08-20 12:46 Tudor Cornea
2021-08-31 15:31 ` Ferruh Yigit
2021-09-01 19:07   ` Tudor Cornea
2021-09-01 21:34     ` Stephen Hemminger
2021-09-02 10:49       ` Ferruh Yigit [this message]
2021-09-03  9:45         ` Tudor Cornea
2021-09-08  8:59 ` [dpdk-dev] [PATCH v2] net/af_packet: " Tudor Cornea
2021-09-20 15:40   ` Ferruh Yigit
2021-09-21 20:59     ` Tudor Cornea
2021-09-24 11:44   ` [dpdk-dev] [PATCH v3] " Tudor Cornea
2021-09-24 15:10     ` Stephen Hemminger
2021-09-29 14:13       ` Tudor Cornea
2021-09-29 14:08     ` [dpdk-dev] [PATCH v4] " Tudor Cornea
2021-09-30  8:14       ` Ferruh Yigit
2021-10-01  8:49         ` Tudor Cornea
2021-10-01  8:35       ` [dpdk-dev] [PATCH v5] " Tudor Cornea
2021-10-01 15:02         ` Stephen Hemminger
2021-10-06  9:42           ` Ferruh Yigit

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=182a292a-c004-d49b-fc3d-c48dba79206f@intel.com \
    --to=ferruh.yigit@intel.com \
    --cc=andrew.rybchenko@oktetlabs.ru \
    --cc=dev@dpdk.org \
    --cc=jerinj@marvell.com \
    --cc=linville@tuxdriver.com \
    --cc=stephen@networkplumber.org \
    --cc=thomas@monjalon.net \
    --cc=tudor.cornea@gmail.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).