From: Alexei Starovoitov <ast@plumgrid.com>
To: Daniel Borkmann <daniel@iogearbox.net>, davem@davemloft.net
Cc: jiri@resnulli.us, netdev@vger.kernel.org,
Jamal Hadi Salim <jhs@mojatatu.com>
Subject: Re: [PATCH net-next 2/2] act_bpf: add initial eBPF support for actions
Date: Fri, 20 Mar 2015 14:21:51 -0700 [thread overview]
Message-ID: <550C8F6F.9050403@plumgrid.com> (raw)
In-Reply-To: <6fcca3889ace4f7f090470e50a001aca721bd0d9.1426859241.git.daniel@iogearbox.net>
On 3/20/15 7:11 AM, Daniel Borkmann wrote:
> This work extends the "classic" BPF programmable tc action by extending
> its scope also to native eBPF code!
>
> Together with commit e2e9b6541dd4 ("cls_bpf: add initial eBPF support
> for programmable classifiers") this adds the facility to implement fully
> flexible classifier and actions for tc that can be implemented in a C
> subset in user space, "safely" loaded into the kernel, and being run in
> native speed when JITed.
>
> Also, since eBPF maps can be shared between eBPF programs, it offers the
> possibility that cls_bpf and act_bpf can share data 1) between themselves
> and 2) between user space applications. That means that, f.e. customized
> runtime statistics can be collected in user space, but also more importantly
> classifier and action behaviour could be altered based on map input from
> the user space application.
>
> For the remaining details on the workflow and integration, see the cls_bpf
> commit e2e9b6541dd4. Preliminary iproute2 part can be found under [1].
>
> [1] http://git.breakpoint.cc/cgit/dborkman/iproute2.git/log/?h=ebpf-act
>
> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
> Cc: Jamal Hadi Salim <jhs@mojatatu.com>
> Cc: Jiri Pirko <jiri@resnulli.us>
Acked-by: Alexei Starovoitov <ast@plumgrid.com>
next prev parent reply other threads:[~2015-03-20 21:21 UTC|newest]
Thread overview: 12+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-03-20 14:11 [PATCH net-next 0/2] act_bpf update Daniel Borkmann
2015-03-20 14:11 ` [PATCH net-next 1/2] ebpf: add sched_act_type and map it to sk_filter's verifier ops Daniel Borkmann
2015-03-20 14:21 ` Jiri Pirko
2015-03-20 21:11 ` Alexei Starovoitov
2015-03-20 14:11 ` [PATCH net-next 2/2] act_bpf: add initial eBPF support for actions Daniel Borkmann
2015-03-20 14:30 ` Jiri Pirko
2015-03-20 21:21 ` Alexei Starovoitov [this message]
2015-03-20 20:22 ` [PATCH net-next 0/2] act_bpf update David Miller
2015-03-20 21:10 ` Daniel Borkmann
2015-03-20 21:26 ` Alexei Starovoitov
2015-03-20 22:21 ` David Miller
2015-03-20 22:45 ` Daniel Borkmann
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=550C8F6F.9050403@plumgrid.com \
--to=ast@plumgrid.com \
--cc=daniel@iogearbox.net \
--cc=davem@davemloft.net \
--cc=jhs@mojatatu.com \
--cc=jiri@resnulli.us \
--cc=netdev@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.