From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.8 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 673B0C433FF for ; Thu, 15 Aug 2019 03:46:24 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 37BFE20656 for ; Thu, 15 Aug 2019 03:46:24 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728283AbfHODqX (ORCPT ); Wed, 14 Aug 2019 23:46:23 -0400 Received: from mga04.intel.com ([192.55.52.120]:56741 "EHLO mga04.intel.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727217AbfHODqX (ORCPT ); Wed, 14 Aug 2019 23:46:23 -0400 X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from orsmga005.jf.intel.com ([10.7.209.41]) by fmsmga104.fm.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 14 Aug 2019 20:46:23 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.64,387,1559545200"; d="scan'208";a="352124050" Received: from arch-p28.jf.intel.com ([10.166.187.31]) by orsmga005.jf.intel.com with ESMTP; 14 Aug 2019 20:46:23 -0700 From: Sridhar Samudrala To: magnus.karlsson@intel.com, bjorn.topel@intel.com, netdev@vger.kernel.org, bpf@vger.kernel.org, sridhar.samudrala@intel.com, intel-wired-lan@lists.osuosl.org, maciej.fijalkowski@intel.com, tom.herbert@intel.com Subject: [PATCH bpf-next 0/5] Add support for SKIP_BPF flag for AF_XDP sockets Date: Wed, 14 Aug 2019 20:46:18 -0700 Message-Id: <1565840783-8269-1-git-send-email-sridhar.samudrala@intel.com> X-Mailer: git-send-email 1.8.3.1 Sender: bpf-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org This patch series introduces XDP_SKIP_BPF flag that can be specified during the bind() call of an AF_XDP socket to skip calling the BPF program in the receive path and pass the buffer directly to the socket. When a single AF_XDP socket is associated with a queue and a HW filter is used to redirect the packets and the app is interested in receiving all the packets on that queue, we don't need an additional BPF program to do further filtering or lookup/redirect to a socket. Here are some performance numbers collected on - 2 socket 28 core Intel(R) Xeon(R) Platinum 8180 CPU @ 2.50GHz - Intel 40Gb Ethernet NIC (i40e) All tests use 2 cores and the results are in Mpps. turbo on (default) --------------------------------------------- no-skip-bpf skip-bpf --------------------------------------------- rxdrop zerocopy 21.9 38.5 l2fwd zerocopy 17.0 20.5 rxdrop copy 11.1 13.3 l2fwd copy 1.9 2.0 no turbo : echo 1 > /sys/devices/system/cpu/intel_pstate/no_turbo --------------------------------------------- no-skip-bpf skip-bpf --------------------------------------------- rxdrop zerocopy 15.4 29.0 l2fwd zerocopy 11.8 18.2 rxdrop copy 8.2 10.5 l2fwd copy 1.7 1.7 --------------------------------------------- Sridhar Samudrala (5): xsk: Convert bool 'zc' field in struct xdp_umem to a u32 bitmap xsk: Introduce XDP_SKIP_BPF bind option i40e: Enable XDP_SKIP_BPF option for AF_XDP sockets ixgbe: Enable XDP_SKIP_BPF option for AF_XDP sockets xdpsock_user: Add skip_bpf option drivers/net/ethernet/intel/i40e/i40e_txrx.c | 22 +++++++++- drivers/net/ethernet/intel/i40e/i40e_xsk.c | 6 +++ drivers/net/ethernet/intel/ixgbe/ixgbe_main.c | 20 ++++++++- drivers/net/ethernet/intel/ixgbe/ixgbe_xsk.c | 16 ++++++- include/net/xdp_sock.h | 21 ++++++++- include/uapi/linux/if_xdp.h | 1 + include/uapi/linux/xdp_diag.h | 1 + net/xdp/xdp_umem.c | 9 ++-- net/xdp/xsk.c | 43 ++++++++++++++++--- net/xdp/xsk_diag.c | 5 ++- samples/bpf/xdpsock_user.c | 8 ++++ 11 files changed, 135 insertions(+), 17 deletions(-) -- 2.20.1