From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 0331343849; Sat, 6 Jan 2024 11:29:05 +0100 (CET) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 8604A402CC; Sat, 6 Jan 2024 11:29:05 +0100 (CET) Received: from mx0a-00069f02.pphosted.com (mx0a-00069f02.pphosted.com [205.220.165.32]) by mails.dpdk.org (Postfix) with ESMTP id EA7144027C for ; Sat, 6 Jan 2024 11:29:03 +0100 (CET) Received: from pps.filterd (m0246629.ppops.net [127.0.0.1]) by mx0b-00069f02.pphosted.com (8.17.1.19/8.17.1.19) with ESMTP id 406ALOY0031177; Sat, 6 Jan 2024 10:29:01 GMT DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.com; h=from : to : cc : subject : date : message-id : references : in-reply-to : content-type : content-transfer-encoding : mime-version; s=corp-2023-11-20; bh=C4Jwi7XHqMQUumA2W+Asf0G3k+jXaomYpAxAtELu6Vs=; b=lgVLqPnWlMnfTBjhNVU/DHaSv0yw3jPkqZHGa50aTMSXOQVuLB+cHseEMurnQM3g9B2r RkLqZeUhyWN+5/CEsdcNXHHojrjZIR2QoMPBFZHpZ3+Mxff8gbU1CpWmqSphE1o5YilY Q9c8vQPY4l2sYfYPvfliC1n2QpaZ/6CvgO9k6FWPpNqsmlYiGUINLkQn4BCFFCWm7Kgf lbedMy6LYeo9XmH8RN3o6xLdXLUUcESr1z9datwIv9Af4i7jvQOrezb3cYTeqyFJgesJ lLzqyKxA5hHaxu9tRjuAJOS+68erJIXJsELHuMUXkh8ldfmHw+Emqp9VkjsqnnnVNJd0 mg== Received: from iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (iadpaimrmta03.appoci.oracle.com [130.35.103.27]) by mx0b-00069f02.pphosted.com (PPS) with ESMTPS id 3vf50v809e-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sat, 06 Jan 2024 10:29:01 +0000 Received: from pps.filterd (iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com [127.0.0.1]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (8.17.1.19/8.17.1.19) with ESMTP id 4069wkuU013888; Sat, 6 Jan 2024 10:23:59 GMT Received: from nam12-dm6-obe.outbound.protection.outlook.com (mail-dm6nam12lp2168.outbound.protection.outlook.com [104.47.59.168]) by iadpaimrmta03.imrmtpd1.prodappiadaev1.oraclevcn.com (PPS) with ESMTPS id 3vewa3d28b-1 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-GCM-SHA384 bits=256 verify=OK); Sat, 06 Jan 2024 10:23:59 +0000 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=ORikc7iSHibBnSp/7mmsEz1hq7ef2reXZm19hRsB0P0Htn0nmqFTkZ6WvOGORE34cHqhvULgZprXFvSiJ+cjEuF3Ii8b8q1C8Dxp/7aNvVIpPVi1mrNoZFGIU24ihhajvm7AryL54uAzCieoK1YPVdWhH90PAnIDRNfqG72ZBl/wwyAx1+IT1nbltxSQXeDtSUnIGe7PIK2Jf9+boJwwOfrD7GIS0lARpUeZJG4nsvyLtGNtUg+yssqUYLv9nSXvZ1KmJ7058yQHLByqMlP3tu5gq6WTvL1f1gYlGulJFwy4IyL67lLgqVtkNwjkVNkdIAGBvJOyTPLXNTJ2a7sH9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-AntiSpam-MessageData-ChunkCount:X-MS-Exchange-AntiSpam-MessageData-0:X-MS-Exchange-AntiSpam-MessageData-1; bh=C4Jwi7XHqMQUumA2W+Asf0G3k+jXaomYpAxAtELu6Vs=; b=gG65oOIT3O0iUiPqV1YSvkh82W/9OYf7zCNaCIM5mP9Gty39szQPL2QWfIg0wl5zVNQPMxe+bYG/Rx/xAfcqlLH0X0Jjf1+sCWCNZRoVpibBbC1ZVTDAIFimITxe1MTZUqW2HYr1bssVy7QJdq3X4qWsFZvO5Lf/OjfcjreDBtsv//RKN93KAPNLCfASi8K91tzBr4RCLL+i/bVZFxv47pcFLioP10DKwl6tf2T6VuAqg2j4is+sKK0SibJYjIy1xLyLlU+AuhG9oDpXpaFRrWmjpLatoIx6/9TZtZ8AmGh6NWkqRnFBLb4Z9EKRGh0atHUZqY6bX7p9WbQE3727FA== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=oracle.com; dmarc=pass action=none header.from=oracle.com; dkim=pass header.d=oracle.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=oracle.onmicrosoft.com; s=selector2-oracle-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=C4Jwi7XHqMQUumA2W+Asf0G3k+jXaomYpAxAtELu6Vs=; b=WyxU3OO4w9uYDCLOIAldcGy0iK88SqBKNo8tYL8zhFjX+gBtZgLFqBe9DESmPR/1bgMECMFWY8jQjcYbP/xvYP2Y8MQ4JaWPI4yqVKaOWUcAEn2i93fSW97zv72N1erzM6Q08ZB9uIPmMznN3lYX8YvzAeWq+K+9azS+lOjLois= Received: from SJ0PR10MB4798.namprd10.prod.outlook.com (2603:10b6:a03:2df::8) by DM4PR10MB5989.namprd10.prod.outlook.com (2603:10b6:8:b3::8) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.7159.18; Sat, 6 Jan 2024 10:23:57 +0000 Received: from SJ0PR10MB4798.namprd10.prod.outlook.com ([fe80::bfe7:9456:17cb:cb09]) by SJ0PR10MB4798.namprd10.prod.outlook.com ([fe80::bfe7:9456:17cb:cb09%7]) with mapi id 15.20.7159.018; Sat, 6 Jan 2024 10:23:57 +0000 From: Madhuker Mythri To: Stephen Hemminger CC: "ferruh.yigit@amd.com" , "dev@dpdk.org" Subject: RE: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per the new Kernel-version upgrade requirements. Thread-Topic: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per the new Kernel-version upgrade requirements. Thread-Index: AQHaPzO4tzDzcCULFEKTKYP0ti3cpbDLnP+AgACn7iCAAEzRAA== Date: Sat, 6 Jan 2024 10:23:57 +0000 Message-ID: References: <20240104172756.2213-1-madhuker.mythri@oracle.com> <20240105113055.54190838@hermes.local> In-Reply-To: Accept-Language: en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: x-ms-publictraffictype: Email x-ms-traffictypediagnostic: SJ0PR10MB4798:EE_|DM4PR10MB5989:EE_ x-ms-office365-filtering-correlation-id: b09af74c-9496-4b62-e83e-08dc0ea1974e x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:SJ0PR10MB4798.namprd10.prod.outlook.com; PTR:; CAT:NONE; SFS:(13230031)(136003)(396003)(346002)(376002)(39860400002)(366004)(230273577357003)(230173577357003)(230922051799003)(451199024)(64100799003)(1800799012)(186009)(8676002)(38100700002)(8936002)(54906003)(316002)(83380400001)(5660300002)(4326008)(44832011)(6916009)(966005)(478600001)(52536014)(55236004)(2940100002)(9686003)(53546011)(6506007)(7696005)(71200400001)(26005)(38070700009)(66946007)(66556008)(66476007)(66446008)(64756008)(76116006)(122000001)(41300700001)(2906002)(86362001)(55016003)(33656002); DIR:OUT; SFP:1101; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?g/i7XQkJOxgyOzikNknBrxowM8BjcbOFwwzDoP9sqwZhbyBy2YNyDLmRBBy3?= =?us-ascii?Q?pRs/2nt3v5lDMni7Ze9SyVsGBp7moZzeYO4AcMkOB10HwWOuP57aOp/GR2Jb?= =?us-ascii?Q?8KpzSAvP/ZDDY63WvM9il8C4jC+8l6lPMpIe1VeYIya6re2P/JFEQ1RhRCln?= =?us-ascii?Q?SMrt68X+z74t4lRfLEoedImCoYpEQ09TjxjN4M7QffPgCxstZoFw5EiwrsAW?= =?us-ascii?Q?WPem0tOX37WLiS/TL3NJWocVySdlG3VOFPmOGexjoX6to4i7D1MJV3NeU/Yd?= =?us-ascii?Q?kAbouNti7pP+f2+D8bFljXM/TAgtGkPXETgzWSZbacOV068VylLJ1DC7IGCg?= =?us-ascii?Q?EghMrNI7kYNrUsFyNMJLeSarN93pw39YKdiO6TzDwsMs2659lFYmczHN3D1I?= =?us-ascii?Q?J2yTBos3YYROhxPj64UjVoZBtMBnEk+QS72Rc75KxX/brtopPQqWQsHcZfSA?= =?us-ascii?Q?gWGBFdx2AsozQ5LiKOW1YeDP7xjvazxHMPXFdRy/1N8sfC0Vz0m5rbtVXPXK?= =?us-ascii?Q?EbhS5XD4TX6eU3zwI7/CITTkWKlFSJurmfJw4ROEUjr88csci+8FPUY6lo53?= =?us-ascii?Q?mbmupDRMT9LADAzQ8pHkdLJgESR3emrgfhHcX+E4cZ4Kf8+8JA8i90tdwDlc?= =?us-ascii?Q?xqz3lnC4rUx8knG3X8STrT4YpykbzBZvVz1hT3IyGasYC3aBTv1uRyR7dCAg?= =?us-ascii?Q?FK/Mr+FjNshT1qVwgGJl55YULYtdATV4C6AYER0CbYfonOYgFwSkOw2pv4aR?= =?us-ascii?Q?rkEvxlCorf4v+8u8vgL4iVI8L3JYQbPYHJ/BjzEfgUQAkvkBde46oYW2orxM?= =?us-ascii?Q?GeCHsQXcpmyHpgH2XdgDnTZnNJJ9kJMT5GNTqauMl0/QyKPvUV7l/DY+sW/U?= =?us-ascii?Q?0IvC006/KfCLv1yEcampo020E3E6P91By6LM+oKJhxtFtHkia8h2OnIox94s?= =?us-ascii?Q?OsuVViGPNcmKCyWBVeIy/S2YiSEsafIJC6Hf5PF2dKYzF+vxSpShXQ6yzRs5?= =?us-ascii?Q?ra/W2DEO7mfbt/TY8V06ZxXzfn685Y1amEWBbmCT72F8bjK8O3VTs77Wxcin?= =?us-ascii?Q?ZEj+1NKnOxqBWFF3wcIO5g7XdcK/rkjgQJ0NZK2pQVUNTQX9EyYBpHprVma2?= =?us-ascii?Q?GGODGrSkax5Ym3ALA7avRGUV+m8NbrSl5qKr6YzWjyIuvUo4VC7tJ/fePk3l?= =?us-ascii?Q?MNiyGMA6r5Rk65FtsdaueDE3zlRftmKD+5HzjGDvWuLNYMTwytlj9KXEqZay?= =?us-ascii?Q?U6d0XZ5Y1VDdvUO4xdDaqQUanqaY9l3U81huiHZyrVQ49pHmWqs3iXf80r98?= =?us-ascii?Q?UoLkb7Z6hGOPutEaHIVCMLru+RAokIizFHatqUn7sqSPMUmaELo+mJuwbaSC?= =?us-ascii?Q?jzicd6PZi9UYibxio8hJj2S2rC/ZVmW9bEQd1hP2PxJ1zcsVHKIIFqP1PWqc?= =?us-ascii?Q?vjCmPN4DKpKAqwKPf+iXdsLInq0A8mF73WKU+GICk4vp5cQa9reObQ+xLQRq?= =?us-ascii?Q?QFRkCJZKRusiKY7IEzbUC9cclLapaIUTW3W3DQt66jTvmld47IgCaWWdx2ny?= =?us-ascii?Q?oKJLC4mzC1p2ts4Atlpa9jm/JXLEh8daAerRJOwSSz3MYSAuqugA1r/u3rJV?= =?us-ascii?Q?BA=3D=3D?= Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-ChunkCount: 1 X-MS-Exchange-AntiSpam-ExternalHop-MessageData-0: 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 X-OriginatorOrg: oracle.com X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: SJ0PR10MB4798.namprd10.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: b09af74c-9496-4b62-e83e-08dc0ea1974e X-MS-Exchange-CrossTenant-originalarrivaltime: 06 Jan 2024 10:23:57.0662 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 4e2c6054-71cb-48f1-bd6c-3a9705aca71b X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: GA4hwgTz9Gsumpt1t2HEwv+mAlD7WIyNY25kGFneC+P7vBt9BRIN6fYfAryZxk/Jbsg+92bV7JdAZ6uE5CFOVFO2Bdlm8wtLYqiC5i72ICo= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM4PR10MB5989 X-Proofpoint-Virus-Version: vendor=baseguard engine=ICAP:2.0.272,Aquarius:18.0.997,Hydra:6.0.619,FMLib:17.11.176.26 definitions=2024-01-05_08,2024-01-05_01,2023-05-22_02 X-Proofpoint-Spam-Details: rule=notspam policy=default score=0 malwarescore=0 spamscore=0 mlxlogscore=999 suspectscore=0 mlxscore=0 adultscore=0 phishscore=0 bulkscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2311290000 definitions=main-2401060073 X-Proofpoint-ORIG-GUID: rCQAlaLTa_4E1tYnQn9nCjtD0DpA_vsi X-Proofpoint-GUID: rCQAlaLTa_4E1tYnQn9nCjtD0DpA_vsi X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Hi Stephen, The new Kernel expects the BPF maps in BTF format: https://www.kernel.org/d= oc/html/v5.4/bpf/btf.html. So, we need to compile with "-g" option as follows: =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D clang -O2 -target bpf -c tap_bpf_program.c -g -o tap_bpf_program.o =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D I had cross check this functionality with DPDK-22.11 and as the BPF C-progr= am is same had modified just the C-program and submitted for review. I will update the Makefile changes also and will publish for code-review on= ce again w.r.t DPDK-23.11. Thanks, Madhuker. -----Original Message----- From: Madhuker Mythri=20 Sent: 06 January 2024 11:06 To: Stephen Hemminger Cc: ferruh.yigit@amd.com; dev@dpdk.org Subject: RE: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as = per the new Kernel-version upgrade requirements. The flow creation worked well for us on the Azure/Hyper-V platform using fa= ilsafe/tap PMD, using Kernel-5.15.0 and 5.4 versions. So, does the original/existing code works well on Kernel-6.5 version ? Thanks, Madhuker. -----Original Message----- From: Stephen Hemminger Sent: 06 January 2024 01:01 To: Madhuker Mythri Cc: ferruh.yigit@amd.com; dev@dpdk.org Subject: [External] : Re: [PATCH] net/tap: Modified TAP BPF program as per = the new Kernel-version upgrade requirements. On Thu, 4 Jan 2024 22:57:56 +0530 madhuker.mythri@oracle.com wrote: > adhuker Mythri >=20 > When multiple queues configured, internally RSS will be enabled and thus = TAP BPF RSS byte-code will be loaded on to the Kernel using BPF system call= s. >=20 > Here, the problem is loading the existing BPF byte-code to the Kernel-5.1= 5 and above versions throws errors, i.e: Kernel BPF verifier not accepted t= his existing BPF byte-code and system calls return error code "-7" as follo= ws: > ------------------------ > rss_add_actions(): Failed to load BPF section l3_l4 (7): Argument list=20 > too long > ------------------------ >=20 > RCA: These errors started coming after from the Kernel-5.15 version, in = which lots of new BPF verification restrictions were added for safe executi= on of byte-code on to the Kernel, due to which existing BPF program verific= ation does not pass. > Here are the major BPF verifier restrictions observed: > 1) Need to use new BPF maps structure. > 2) Kernel SKB data pointer access not allowed. > 3) Undefined loops were not allowed(which are bounded by a variable value= ). > 4) unreachable instructions(like: undefined array access). >=20 > After addressing all these Kernel BPF verifier restrictions able to load = the BPF byte-code onto the Kernel successfully. >=20 > Note: This new BPF changes supports from Kernel:4.10 version. >=20 > Bugzilla Id: 1329 >=20 > Signed-off-by: Madhuker Mythri I tried this version on Debian testing which has: kernel 6.5.0-5-amd64 clang 16.0.6 If build and run with the pre-compiled BPF then it will load the example fl= ow (see https://urldefense.com/v3/__https://doc.dpdk.org/guides/nics/tap.h= tml__;!!ACWV5N9M2RV99hQ!I6LFEsrAnlW2WMQlCy7Sxw-9MxJ_Qtchg-aZdal53Np6QtmC1wW= sMdG_uT3zc57Yu7kvJANA-dQIirEUr-BWfaVXhGtd$ ) But if I recompile the bpf program by using make in the tap/bpf directory, = then the resulting bpf instructions will not make it past verifier. With modified tap_bpf_api can get the log message as: testpmd> flow create 0 priority 4 ingress pattern eth dst is=20 testpmd> 0a:0b:0c:0d:0e:0f / ipv4 / tcp / end actions rss queues 0 1 2 testpmd> 3 end / end rss_add_actions(): Failed to load BPF section l3_l4 (13): func#0 @0 0: R1=3Dctx(off=3D0,imm=3D0) R10=3Dfp0 0: (bf) r6 =3D r1 ; R1=3Dctx(off=3D0,imm=3D0) R6_w=3D= ctx(off=3D0,imm=3D0) 1: (18) r1 =3D 0x300 ; R1_w=3D768 3: (63) *(u32 *)(r10 -84) =3D r1 ; R1_w=3D768 R10=3Dfp0 fp-88=3Dmmmm= ???? 4: (bf) r2 =3D r10 ; R2_w=3Dfp0 R10=3Dfp0 5: (07) r2 +=3D -84 ; R2_w=3Dfp-84 6: (18) r1 =3D 0xfd ; R1_w=3D253 8: (85) call bpf_map_lookup_elem#1 R1 type=3Dscalar expected=3Dmap_ptr processed 7 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak= _states 0 mark_read 0 port_flow_complain(): Caught PMD error type 16 (specific action): cause: 0x= 7ffcef37e678, action not supported: Operation not supported