From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga01.intel.com (mga01.intel.com [192.55.52.88]) by dpdk.org (Postfix) with ESMTP id 95ABE4C71 for ; Thu, 8 Mar 2018 02:31:45 +0100 (CET) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga002.fm.intel.com ([10.253.24.26]) by fmsmga101.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 07 Mar 2018 17:31:42 -0800 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.47,438,1515484800"; d="scan'208";a="26147458" Received: from sivswdev02.ir.intel.com (HELO localhost.localdomain) ([10.237.217.46]) by fmsmga002.fm.intel.com with ESMTP; 07 Mar 2018 17:31:41 -0800 From: Konstantin Ananyev To: dev@dpdk.org Cc: Konstantin Ananyev Date: Thu, 8 Mar 2018 01:29:57 +0000 Message-Id: <1520472602-1483-1-git-send-email-konstantin.ananyev@intel.com> X-Mailer: git-send-email 1.7.0.7 Subject: [dpdk-dev] [RFC PATCH 0/5] add framework to load and execute BPF code X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Mar 2018 01:31:47 -0000 BPF is used quite intensively inside Linux (and BSD) kernels for various different purposes and proved to be extremely useful. In theory, BPF inside DPDK might also be used in a lot of places for a lot of similar things. As an example to: - packet filtering/tracing (aka tcpdump) - packet classification - statistics collection - HW/PMD live-system debugging/prototyping - trace HW descriptors, internal PMD SW state, etc. ... All of that in a dynamic, user-defined and extensible manner. So these series introduce new library - librte_bpf. librte_bpf provides API to load and execute BPF bytecode within user-space dpdk app. It supported basic set of features from eBPF spec. Also it introduces basic framework to load/unload BPF-based filters on eth devices (right now via SW RX/TX callbacks). How to try it: =============== 1) run testpmd as usual and start your favorite forwarding case. 2) build bpf program you'd like to load (you'll need clang v3.7 or above): $ cd test/bpf $ clang -O2 -target bpf -c t1.c 3) load bpf program(s): testpmd> bpf-load rx|tx : [-][J][M] J - use JIT generated native code, otherwise BPF interpreter will be used. M - assume input parameter is a pointer to rte_mbuf, otherwise assume it is a pointer to first segment's data. Few examples: # to load (not JITed) dummy.o at TX queue 0, port 0: testpmd> bpf-load tx 0 0 - ./dpdk.org/test/bpf/dummy.o #to load (and JIT compile) t1.o at RX queue 0, port 1: testpmd> bpf-load rx 1 0 J ./dpdk.org/test/bpf/t1.o #to load and JIT t2.o (note that it expects mbuf as an input): testpmd> bpf-load rx 2 0 JM ./dpdk.org/test/bpf/t2.o 4) observe changed traffic behavior Let say with the examples above - dummy.o does literally nothing, so no changes should be here, except some possible slowdown - t1.o - should force to drop all packets that doesn.t' match: 'dst 1.2.3.4 && udp && dst port 5000' filter. 5) unload some or all bpf programs: testpmd> bpf-unload tx 0 0 6) continue with step 3) or exit TODO list: ========= - meson build - UT for it - implement proper validate() - allow JIT to generate bulk version Not currently supported features: ================================= - cBPF - tail-pointer call - eBPF MAP - skb Konstantin Ananyev (5): bpf: add BPF loading and execution framework bpf: add JIT compilation for x86_64 ISA. bpf: introduce basic RX/TX BPF filters testpmd: new commands to load/unload BPF filters test: add few eBPF samples app/test-pmd/cmdline.c | 144 +++++ config/common_base | 5 + config/common_linuxapp | 1 + lib/Makefile | 2 + lib/librte_bpf/Makefile | 35 ++ lib/librte_bpf/bpf.c | 52 ++ lib/librte_bpf/bpf_exec.c | 453 ++++++++++++++ lib/librte_bpf/bpf_impl.h | 37 ++ lib/librte_bpf/bpf_jit_x86.c | 1155 ++++++++++++++++++++++++++++++++++++ lib/librte_bpf/bpf_load.c | 344 +++++++++++ lib/librte_bpf/bpf_pkt.c | 524 ++++++++++++++++ lib/librte_bpf/bpf_validate.c | 55 ++ lib/librte_bpf/rte_bpf.h | 154 +++++ lib/librte_bpf/rte_bpf_ethdev.h | 50 ++ lib/librte_bpf/rte_bpf_version.map | 16 + mk/rte.app.mk | 2 + test/bpf/dummy.c | 20 + test/bpf/mbuf.h | 556 +++++++++++++++++ test/bpf/t1.c | 54 ++ test/bpf/t2.c | 31 + 20 files changed, 3690 insertions(+) create mode 100644 lib/librte_bpf/Makefile create mode 100644 lib/librte_bpf/bpf.c create mode 100644 lib/librte_bpf/bpf_exec.c create mode 100644 lib/librte_bpf/bpf_impl.h create mode 100644 lib/librte_bpf/bpf_jit_x86.c create mode 100644 lib/librte_bpf/bpf_load.c create mode 100644 lib/librte_bpf/bpf_pkt.c create mode 100644 lib/librte_bpf/bpf_validate.c create mode 100644 lib/librte_bpf/rte_bpf.h create mode 100644 lib/librte_bpf/rte_bpf_ethdev.h create mode 100644 lib/librte_bpf/rte_bpf_version.map create mode 100644 test/bpf/dummy.c create mode 100644 test/bpf/mbuf.h create mode 100644 test/bpf/t1.c create mode 100644 test/bpf/t2.c -- 2.13.6