From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mga18.intel.com (mga18.intel.com [134.134.136.126]) by dpdk.org (Postfix) with ESMTP id 9090CDED for ; Fri, 4 May 2018 14:46:06 +0200 (CEST) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga008.fm.intel.com ([10.253.24.58]) by orsmga106.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 04 May 2018 05:46:05 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.49,362,1520924400"; d="scan'208";a="37428650" Received: from sivswdev02.ir.intel.com (HELO localhost.localdomain) ([10.237.217.46]) by fmsmga008.fm.intel.com with ESMTP; 04 May 2018 05:46:04 -0700 From: Konstantin Ananyev To: dev@dpdk.org Cc: Konstantin Ananyev Date: Fri, 4 May 2018 13:45:37 +0100 Message-Id: <1525437945-8207-1-git-send-email-konstantin.ananyev@intel.com> X-Mailer: git-send-email 1.7.0.7 In-Reply-To: <1523630598-24606-2-git-send-email-konstantin.ananyev@intel.com> References: <1523630598-24606-2-git-send-email-konstantin.ananyev@intel.com> Subject: [dpdk-dev] [PATCH v5 0/8] add framework to load and execute BPF code X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.15 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 04 May 2018 12:46:07 -0000 BPF is used quite intensively inside Linux (and BSD) kernels for various different purposes and proved to be extremely useful. BPF inside DPDK might also be used in a lot of places for a lot of similar things. As an example to: - packet filtering/tracing (aka tcpdump) - packet classification - statistics collection - HW/PMD live-system debugging/prototyping - trace HW descriptors, internal PMD SW state, etc. - Comeup with your own idea All of that in a dynamic, user-defined and extensible manner. So these series introduce new library - librte_bpf. librte_bpf provides API to load and execute BPF bytecode within user-space dpdk app. It supports basic set of features from eBPF spec. Also it introduces basic framework to load/unload BPF-based filters on eth devices (right now via SW RX/TX callbacks). How to try it: =============== 1) run testpmd as usual and start your favorite forwarding case. 2) build bpf program you'd like to load (you'll need clang v3.7 or above): $ cd test/bpf $ clang -O2 -target bpf -c t1.c 3) load bpf program(s): testpmd> bpf-load rx|tx : [-][J][M] J - use JIT generated native code, otherwise BPF interpreter will be used. M - assume input parameter is a pointer to rte_mbuf, otherwise assume it is a pointer to first segment's data. Few examples: # to load (not JITed) dummy.o at TX queue 0, port 0: testpmd> bpf-load tx 0 0 - ./dpdk.org/test/bpf/dummy.o #to load (and JIT compile) t1.o at RX queue 0, port 1: testpmd> bpf-load rx 1 0 J ./dpdk.org/test/bpf/t1.o #to load and JIT t3.o (note that it expects mbuf as an input): testpmd> bpf-load rx 2 0 JM ./dpdk.org/test/bpf/t3.o 4) observe changed traffic behavior Let say with the examples above: - dummy.o does literally nothing, so no changes should be here, except some possible slowdown. - t1.o - should force to drop all packets that doesn't match: 'dst 1.2.3.4 && udp && dst port 5000' filter. - t3.o - should dump to stdout ARP packets. 5) unload some or all bpf programs: testpmd> bpf-unload tx 0 0 6) continue with step 3) or exit Not currently supported features: ================================= - cBPF - tail-pointer call - eBPF MAP - JIT for non X86_64 targets - skb - function calls for 32-bit apps - mbuf pointer as input parameter for 32-bit apps v2: - add meson build - add freebsd build - use new logging API - using rte_malloc() for cbi allocation - add extra logic into bpf_validate() v3: - add new test-case for it - update docs - update MAINTAINERS v4: - add more tests to cover BPF ISA - fix few issues v5: - revert changes in tap_bpf.h - rename eBPF related defines - apply Thomas and Marco and Marco comments Konstantin Ananyev (8): bpf: add BPF loading and execution framework bpf: add more logic into bpf_validate() bpf: add JIT compilation for x86_64 ISA bpf: introduce basic RX/TX BPF filters testpmd: new commands to load/unload BPF filters test: add few eBPF samples test: introduce functional test for librte_bpf doc: add bpf library related info MAINTAINERS | 4 + app/test-pmd/bpf_sup.h | 25 + app/test-pmd/cmdline.c | 149 +++ app/test-pmd/meson.build | 2 +- config/common_base | 5 + doc/api/doxy-api-index.md | 3 +- doc/api/doxy-api.conf | 1 + doc/guides/prog_guide/bpf_lib.rst | 38 + doc/guides/prog_guide/index.rst | 1 + doc/guides/rel_notes/release_18_05.rst | 7 + doc/guides/testpmd_app_ug/testpmd_funcs.rst | 56 + lib/Makefile | 2 + lib/librte_bpf/Makefile | 36 + lib/librte_bpf/bpf.c | 64 + lib/librte_bpf/bpf_def.h | 138 +++ lib/librte_bpf/bpf_exec.c | 453 +++++++ lib/librte_bpf/bpf_impl.h | 41 + lib/librte_bpf/bpf_jit_x86.c | 1369 +++++++++++++++++++++ lib/librte_bpf/bpf_load.c | 386 ++++++ lib/librte_bpf/bpf_pkt.c | 607 +++++++++ lib/librte_bpf/bpf_validate.c | 1184 ++++++++++++++++++ lib/librte_bpf/meson.build | 25 + lib/librte_bpf/rte_bpf.h | 184 +++ lib/librte_bpf/rte_bpf_ethdev.h | 102 ++ lib/librte_bpf/rte_bpf_version.map | 16 + lib/meson.build | 2 +- mk/rte.app.mk | 2 + test/bpf/dummy.c | 20 + test/bpf/mbuf.h | 578 +++++++++ test/bpf/t1.c | 52 + test/bpf/t2.c | 31 + test/bpf/t3.c | 36 + test/test/Makefile | 2 + test/test/meson.build | 2 + test/test/test_bpf.c | 1759 +++++++++++++++++++++++++++ 35 files changed, 7379 insertions(+), 3 deletions(-) create mode 100644 app/test-pmd/bpf_sup.h create mode 100644 doc/guides/prog_guide/bpf_lib.rst create mode 100644 lib/librte_bpf/Makefile create mode 100644 lib/librte_bpf/bpf.c create mode 100644 lib/librte_bpf/bpf_def.h create mode 100644 lib/librte_bpf/bpf_exec.c create mode 100644 lib/librte_bpf/bpf_impl.h create mode 100644 lib/librte_bpf/bpf_jit_x86.c create mode 100644 lib/librte_bpf/bpf_load.c create mode 100644 lib/librte_bpf/bpf_pkt.c create mode 100644 lib/librte_bpf/bpf_validate.c create mode 100644 lib/librte_bpf/meson.build create mode 100644 lib/librte_bpf/rte_bpf.h create mode 100644 lib/librte_bpf/rte_bpf_ethdev.h create mode 100644 lib/librte_bpf/rte_bpf_version.map create mode 100644 test/bpf/dummy.c create mode 100644 test/bpf/mbuf.h create mode 100644 test/bpf/t1.c create mode 100644 test/bpf/t2.c create mode 100644 test/bpf/t3.c create mode 100644 test/test/test_bpf.c -- 2.13.6