lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-Id: <B6ABE829-3F3F-4612-943E-4899D91CEB1D@javigon.com>
Date:   Thu, 7 Feb 2019 22:12:17 +0100
From:   Javier González <javier@...igon.com>
To:     Stephen Bates <sbates@...thlin.com>
Cc:     Jens Axboe <axboe@...nel.dk>,
        linux-fsdevel <linux-fsdevel@...r.kernel.org>,
        linux-mm <linux-mm@...ck.org>,
        "linux-block@...r.kernel.org" <linux-block@...r.kernel.org>,
        IDE/ATA development list <linux-ide@...r.kernel.org>,
        linux-scsi <linux-scsi@...r.kernel.org>,
        "linux-nvme@...ts.infradead.org" <linux-nvme@...ts.infradead.org>,
        Logan Gunthorpe <logang@...tatee.com>,
        "linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
        "lsf-pc@...ts.linux-foundation.org" 
        <lsf-pc@...ts.linux-foundation.org>,
        "bpf@...r.kernel.org" <bpf@...r.kernel.org>,
        "ast@...nel.org" <ast@...nel.org>
Subject: Re: [LSF/MM TOPIC] BPF for Block Devices

+ Mailing lists

> On 7 Feb 2019, at 18.48, Javier González <javier@...igon.com> wrote:
> 
> 
> 
>> On 7 Feb 2019, at 18.12, Stephen Bates <sbates@...thlin.com> wrote:
>> 
>> Hi All
>> 
>>> A BPF track will join the annual LSF/MM Summit this year! Please read the updated description and CFP information below.
>> 
>> Well if we are adding BPF to LSF/MM I have to submit a request to discuss BPF for block devices please!
>> 
>> There has been quite a bit of activity around the concept of Computational Storage in the past 12 months. SNIA recently formed a Technical Working Group (TWG) and it is expected that this TWG will be making proposals to standards like NVM Express to add APIs for computation elements that reside on or near block devices.
>> 
>> While some of these Computational Storage accelerators will provide fixed functions (e.g. a RAID, encryption or compression), others will be more flexible. Some of these flexible accelerators will be capable of running BPF code on them (something that certain Linux drivers for SmartNICs support today [1]). I would like to discuss what such a framework could look like for the storage layer and the file-system layer. I'd like to discuss how devices could advertise this capability (a special type of NVMe namespace or SCSI LUN perhaps?) and how the BPF engine could be programmed and then used against block IO. Ideally I'd like to discuss doing this in a vendor-neutral way and develop ideas I can take back to NVMe and the SNIA TWG to help shape how these standard evolve.
>> 
>> To provide an example use-case one could consider a BPF capable accelerator being used to perform a filtering function and then using p2pdma to scan data on a number of adjacent NVMe SSDs, filtering said data and then only providing filter-matched LBAs to the host. Many other potential applications apply. 
>> 
>> Also, I am interested in the "The end of the DAX Experiment" topic proposed by Dan and the " Zoned Block Devices" from Matias and Damien.
>> 
>> Cheers
>> 
>> Stephen
>> 
>> [1] https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/tree/drivers/net/ethernet/netronome/nfp/bpf/offload.c?h=v5.0-rc5
> 
> Definitely interested on this too - and pleasantly surprised to see a BPF track!
> 
> I would like to extend Stephen’s discussion to eBPF running in the block layer directly - both on the kernel VM and offloaded to the accelerator of choice. This would be like XDP on the storage stack, possibly with different entry points. I have been doing some experiments building a dedup engine for pblk in the last couple of weeks and a number of interesting questions have arisen.
> 
> Also, if there is a discussion on offloading the eBPF to an accelerator, I would like to discuss how we can efficiently support data modifications without having double transfers over either the PCIe bus (or worse, over the network): one for the data computation + modification and another for the actual data transfer. Something like p2pmem comes to mind here, but for this to integrate nicely, we would need to overcome the current limitations on PCIe and talk about p2pmem over fabrics.
> 
> Javier

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ