>>>>> So, this approach first stores hints on some other memory location, and >>>>> then need to copy over information into data_meta area. That isn't good >>>>> from a performance perspective. >>>>> >>>>> My idea is to store it in the final data_meta destination immediately. >>>> >>>> This approach doesn't have to store the hints in the other memory >>>> location. xdp_buff->priv can point to the real hw descriptor and the >>>> kfunc can have a bytecode that extracts the data from the hw >>>> descriptors. For this particular RFC, we can think that 'skb' is that >>>> hw descriptor for veth driver. > > Once you point xdp_buff->priv to the real hw descriptor, then we also > need to have some additional data/pointers to NIC hardware info + HW > setup state. You will hit some of the same challenges as John, like > hardware/firmware revisions and chip models, that Jakub pointed out. > Because your approach stays with the driver code, I guess it will be a > bit easier code wise. Maybe we can store data/pointer needed for this in > xdp_rxq_info (xdp->rxq). > > I would need to see some code that juggling this HW NCI state from the > kfunc expansion to be convinced this is the right approach. +1 on needing to see this working for the actual metadata we want to support, but I think the kfunc approach otherwise shows promise; see below. [...] > Sure it is super cool if we can create this BPF layer that programmable > selects individual fields from the descriptor, and maybe we ALSO need that. > Could this layer could still be added after my patchset(?), as one could > disable the XDP-hints (via ethtool) and then use kfuncs/kptr to extract > only fields need by the specific XDP-prog use-case. > Could they also co-exist(?), kfuncs/kptr could extend the > xdp_hints_rx_common struct (in data_meta area) with more advanced > offload-hints and then update the BTF-ID (yes, BPF can already resolve > its own BTF-IDs from BPF-prog code). I actually think the two approaches are more similar than they appear from a user-facing API perspective. Or at least they should be. What I mean is, that with the BTF-ID approach, we still expect people to write code like (from Stanislav's example in the other xdp_hints thread[0]): If (ctx_hints_btf_id == xdp_hints_ixgbe_timestamp_btf_id /* supposedly populated at runtime by libbpf? */) { // do something with rx_timestamp // also, handle xdp_hints_ixgbe and then xdp_hints_common ? } else if (ctx_hints_btf_id == xdp_hints_ixgbe) { // do something else // plus explicitly handle xdp_hints_common here? } else { // handle xdp_hints_common } whereas with kfuncs (from this thread) this becomes: if (xdp_metadata_rx_timestamp_exists(ctx)) timestamp = xdp_metadata_rx_timestamp(ctx); We can hide the former behind CO-RE macros to make it look like the latter. But because we're just exposing the BTF IDs, people can in fact just write code like the example above (directly checking the BTF IDs), and that will work fine, but has a risk of leading to a proliferation of device-specific XDP programs. Whereas with kfuncs we keep all this stuff internal to the kernel (inside the kfuncs), making it much easier to change it later. Quoting yourself from the other thread[1]: > In this patchset I'm trying to balance the different users. And via BTF > I'm trying hard not to create more UAPI (e.g. more fixed fields avail in > xdp_md that we cannot get rid of). And trying to add driver flexibility > on-top of the common struct. This flexibility seems to be stalling the > patchset as we haven't found the perfect way to express this (yet) given > BTF layout is per driver. With kfuncs we kinda sidestep this issue because the kernel can handle the per-driver specialisation by the unrolling trick. The drawback being that programs will be tied to a particular device if they are using metadata, but I think that's an acceptable trade-off. -Toke [0] https://lore.kernel.org/r/CAKH8qBuYVk7QwVOSYrhMNnaKFKGd7M9bopDyNp6-SnN6hSeTDQ@xxxxxxxxxxxxxx [1] https://lore.kernel.org/r/ad360933-953a-7a99-5057-4d452a9a6005@xxxxxxxxxx