114 строки
4.5 KiB
ReStructuredText
114 строки
4.5 KiB
ReStructuredText
===============
|
|
XDP RX Metadata
|
|
===============
|
|
|
|
This document describes how an eXpress Data Path (XDP) program can access
|
|
hardware metadata related to a packet using a set of helper functions,
|
|
and how it can pass that metadata on to other consumers.
|
|
|
|
General Design
|
|
==============
|
|
|
|
XDP has access to a set of kfuncs to manipulate the metadata in an XDP frame.
|
|
Every device driver that wishes to expose additional packet metadata can
|
|
implement these kfuncs. The set of kfuncs is declared in ``include/net/xdp.h``
|
|
via ``XDP_METADATA_KFUNC_xxx``.
|
|
|
|
Currently, the following kfuncs are supported. In the future, as more
|
|
metadata is supported, this set will grow:
|
|
|
|
.. kernel-doc:: net/core/xdp.c
|
|
:identifiers: bpf_xdp_metadata_rx_timestamp bpf_xdp_metadata_rx_hash
|
|
|
|
An XDP program can use these kfuncs to read the metadata into stack
|
|
variables for its own consumption. Or, to pass the metadata on to other
|
|
consumers, an XDP program can store it into the metadata area carried
|
|
ahead of the packet. Not all packets will necessary have the requested
|
|
metadata available in which case the driver returns ``-ENODATA``.
|
|
|
|
Not all kfuncs have to be implemented by the device driver; when not
|
|
implemented, the default ones that return ``-EOPNOTSUPP`` will be used
|
|
to indicate the device driver have not implemented this kfunc.
|
|
|
|
|
|
Within an XDP frame, the metadata layout (accessed via ``xdp_buff``) is
|
|
as follows::
|
|
|
|
+----------+-----------------+------+
|
|
| headroom | custom metadata | data |
|
|
+----------+-----------------+------+
|
|
^ ^
|
|
| |
|
|
xdp_buff->data_meta xdp_buff->data
|
|
|
|
An XDP program can store individual metadata items into this ``data_meta``
|
|
area in whichever format it chooses. Later consumers of the metadata
|
|
will have to agree on the format by some out of band contract (like for
|
|
the AF_XDP use case, see below).
|
|
|
|
AF_XDP
|
|
======
|
|
|
|
:doc:`af_xdp` use-case implies that there is a contract between the BPF
|
|
program that redirects XDP frames into the ``AF_XDP`` socket (``XSK``) and
|
|
the final consumer. Thus the BPF program manually allocates a fixed number of
|
|
bytes out of metadata via ``bpf_xdp_adjust_meta`` and calls a subset
|
|
of kfuncs to populate it. The userspace ``XSK`` consumer computes
|
|
``xsk_umem__get_data() - METADATA_SIZE`` to locate that metadata.
|
|
Note, ``xsk_umem__get_data`` is defined in ``libxdp`` and
|
|
``METADATA_SIZE`` is an application-specific constant (``AF_XDP`` receive
|
|
descriptor does _not_ explicitly carry the size of the metadata).
|
|
|
|
Here is the ``AF_XDP`` consumer layout (note missing ``data_meta`` pointer)::
|
|
|
|
+----------+-----------------+------+
|
|
| headroom | custom metadata | data |
|
|
+----------+-----------------+------+
|
|
^
|
|
|
|
|
rx_desc->address
|
|
|
|
XDP_PASS
|
|
========
|
|
|
|
This is the path where the packets processed by the XDP program are passed
|
|
into the kernel. The kernel creates the ``skb`` out of the ``xdp_buff``
|
|
contents. Currently, every driver has custom kernel code to parse
|
|
the descriptors and populate ``skb`` metadata when doing this ``xdp_buff->skb``
|
|
conversion, and the XDP metadata is not used by the kernel when building
|
|
``skbs``. However, TC-BPF programs can access the XDP metadata area using
|
|
the ``data_meta`` pointer.
|
|
|
|
In the future, we'd like to support a case where an XDP program
|
|
can override some of the metadata used for building ``skbs``.
|
|
|
|
bpf_redirect_map
|
|
================
|
|
|
|
``bpf_redirect_map`` can redirect the frame to a different device.
|
|
Some devices (like virtual ethernet links) support running a second XDP
|
|
program after the redirect. However, the final consumer doesn't have
|
|
access to the original hardware descriptor and can't access any of
|
|
the original metadata. The same applies to XDP programs installed
|
|
into devmaps and cpumaps.
|
|
|
|
This means that for redirected packets only custom metadata is
|
|
currently supported, which has to be prepared by the initial XDP program
|
|
before redirect. If the frame is eventually passed to the kernel, the
|
|
``skb`` created from such a frame won't have any hardware metadata populated
|
|
in its ``skb``. If such a packet is later redirected into an ``XSK``,
|
|
that will also only have access to the custom metadata.
|
|
|
|
bpf_tail_call
|
|
=============
|
|
|
|
Adding programs that access metadata kfuncs to the ``BPF_MAP_TYPE_PROG_ARRAY``
|
|
is currently not supported.
|
|
|
|
Example
|
|
=======
|
|
|
|
See ``tools/testing/selftests/bpf/progs/xdp_metadata.c`` and
|
|
``tools/testing/selftests/bpf/prog_tests/xdp_metadata.c`` for an example of
|
|
BPF program that handles XDP metadata.
|