[<prev] [next>] [day] [month] [year] [list]
Message-ID: <CAADnVQ+KY2kWtpwYJn1049YNfy9ZVsdVZRDLyQfZwhvD2P3DJQ@mail.gmail.com>
Date: Thu, 5 Feb 2015 12:30:34 -0800
From: Alexei Starovoitov <alexei.starovoitov@...il.com>
To: Andy Zhou <azhou@...ira.com>
Cc: Thomas Graf <tgraf@...ronetworks.com>,
"dev@...nvswitch.com" <dev@...nvswitch.com>,
"netdev@...r.kernel.org" <netdev@...r.kernel.org>
Subject: Re: [ovs-dev] [RFC: add openvswitch actions using BPF 1/2] BPF: add a
new BPF program type BPF_PROG_TYPE_OPENVSWITCH
On Thu, Feb 5, 2015 at 11:47 AM, Andy Zhou <azhou@...ira.com> wrote:
> On Thu, Feb 5, 2015 at 6:48 AM, Thomas Graf <tgraf@...ronetworks.com> wrote:
>> On 02/04/15 at 02:48pm, Andy Zhou wrote:
>>> struct bpf_verifier_ops {
>>> /* return eBPF function prototype for verification */
>>> - const struct bpf_func_proto *(*get_func_proto)(enum bpf_func_id func_id);
>>> + const struct bpf_func_proto *(*get_func_proto)(int func_id);
>>
>> This change should maybe go in a separate commit.
> Agreed. Ideally, each program type should have its own func_id space. Current
> registration does not allow this. Should this be added?
>
> In the interest of reusing common helper functions, should we also consider
> partition the func_id space into common ones and program type specific ones?
> For example, the prink like function can be specified the common func_id space.
I don't like per-program_type func_ids, since overlapping ids is
a debugging headache and it encourages hiding ids instead of
clearly adding them to uapi's enum bpf_func_id.
per-program type ids also make it impossible to share common helper ids
which is already the case between socket and tracing prog types.
Having one place and one enum for all ids helps to keep
exposed user helpers under control.
>>> +static const struct bpf_func_proto *ovs_func_proto(int func_id)
>>> +{
>>> + switch (func_id) {
>>> + case OVS_BPF_FUNC_output:
>>> + return &bpf_helper_output_proto;
>>> + default:
>>> + return NULL;
>>> + }
>>> +}
>>
>> You'd still want to use the map helpers so it seems like we should
>> change the bpf verified to verify against both a global and type
>> specific list unless we want to add all the map helpers to
>> ovs_func_proto as well.
>
> It is not clear what OVS can benefit from the map helpers. Map provides
> a fixed sized array. OVS data structure, such as flow, are more
> dynamic and non-contiguous in memory.
that's a misunderstanding.
maps can be different types including rhashtable type.
Actually I was waiting for rhashtable to stabilize
before adding it as new map type ;)
There is 'max_entries' limit that must be there for safety reasons,
but it doesn't mean that all entries are always allocated at
init time and never change.
contiguous vs non-contiguous is also internal detail of map
implementation.
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists