BPF List
 help / color / mirror / Atom feed
From: Christoph Hellwig <hch@lst.de>
To: ast@kernel.org, daniel@iogearbox.net
Cc: bpf@vger.kernel.org, "Harris, James R" <james.r.harris@intel.com>
Subject: Re: LSF/MM session: eBPF standardization
Date: Tue, 10 May 2022 10:16:57 +0200	[thread overview]
Message-ID: <20220510081657.GA12910@lst.de> (raw)
In-Reply-To: <20220503140449.GA22470@lst.de>

Thanks everyone who participated.

Here is my rough memory an action items from the meeting.  As I
was on stage and did not take notes these might be a bit off and
may need correction.

The separate instruction set document wasn't known by everyone but
seens as a good idea.

The content needs a little more work:

 - document the version levels, based on the clang cpu levels
   (I plan to do this ASAP)
 - we need to decide to do about the legacy BPF packet access
   instrutions.  Alexei mentioned that the modern JIT doesn't
   even use those internally any more.
 - we need to document behavior for underflows / overflows and
   other behavior not mentioned.  The example in the session
   was divive by zero behavior.  Are there any notes on what
   the consensus for a lot of this behavior is, or do we need
   to reverse engineer it from the implementation?  I'd happily
   write the documentation, but I'd be really grateful for any
   input into what needs to go into it

Discussion on where to host a definitive version of the document:

 - I think the rough consensus is to just host regular (hopefully
   low cadence) documents and maybe the latest gratest at a eBPF
   foundation website.  Whom do we need to work with at the fundation
   to make this happen?
 - On a technical side we need to figure out a way how to build a
   standalone document from the kerneldoc tree of documents.  I
   volunteers to look into that as well.

The verifier is not very well documented, and mixes up generic behavior
with that of specific implementations and program types.

 - as idea it was brought up to write a doument with the minimal
   verification requirements required for any eBPF implementation
   independent of the program type.  Again I can volunteer to
   draft a documentation, but I need input on what such a consensus
   would be.  In this case input from the non-Linux verifier
   implementors (I only know the Microsoft research one) would
   be very helpful as well.


  reply	other threads:[~2022-05-10  8:17 UTC|newest]

Thread overview: 5+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2022-05-03 14:04 LSF/MM session: eBPF standardization Christoph Hellwig
2022-05-10  8:16 ` Christoph Hellwig [this message]
2022-05-12  2:39   ` Alexei Starovoitov
2022-05-17  9:10     ` Christoph Hellwig
2022-05-17 22:29       ` Harris, James R

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20220510081657.GA12910@lst.de \
    --to=hch@lst.de \
    --cc=ast@kernel.org \
    --cc=bpf@vger.kernel.org \
    --cc=daniel@iogearbox.net \
    --cc=james.r.harris@intel.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox