From: Jason Wang <jasowang@redhat.com>
To: Tom Herbert <tom@herbertland.com>, David Miller <davem@davemloft.net>
Cc: Linux Kernel Network Developers <netdev@vger.kernel.org>,
Kernel Team <kernel-team@fb.com>
Subject: Re: [PATCH RFC v2 1/8] xdp: Infrastructure to generalize XDP
Date: Fri, 10 Feb 2017 13:42:36 +0800 [thread overview]
Message-ID: <811f498d-8503-78b2-1ddb-ddafdec5a385@redhat.com> (raw)
In-Reply-To: <CALx6S37vWi_qbBzq2Anxy6Yb5mgcQjgt7TDWYJgNJJJ13qPi2g@mail.gmail.com>
On 2017年02月10日 10:30, Tom Herbert wrote:
> On Thu, Feb 9, 2017 at 5:48 PM, David Miller <davem@davemloft.net> wrote:
>> From: Tom Herbert <tom@herbertland.com>
>> Date: Thu, 9 Feb 2017 15:08:22 -0800
>>
>>> Okay, how about this... I'll add a configuration option like
>>> XDP_ALLOW_OTHER_HOOKS. The default will be to disallow setting any
>>> hook other than a BPF. If it is set, then we'll accept other hooks
>>> to be run. This way mostly restrict the interface by default, but
>>> still allow experimentation with other hook types like I need with
>>> TXDP or maybe the netfilter guys might want to fastpath netfilter
>>> etc. When we we bring a working robust implementation to netdev that
>>> show clear benefits then we can add those to BPF as the "allowed"
>>> hooks at that time. So this strictly controls the interfaces, but
>>> still also allows room for innovation.
>> Anyone is allowed to "innovate" in their own private kernel tree.
>>
>> But I'm not unleashing that upstream.
>>
>> The only reason I accepted XDP is entirely because it is limited
>> in scope to eBPF. All eBPF programs execute in finite time,
>> cannot loop, cannot deadlock, cannot access arbitrary pieces
>> of kernel memory and datastructures.
>>
>> It is a well defined, constrained, and incredibly tightly controlled
>> execution environment for implementing policy, monitoring and control.
> And it's also incredibly invasive in the core data path of drivers.
> TBH it is not clear to me that the narrow use cases for XDP justifies
> adding this complexity being added to every driver.
XDP is valuable for fast userspace forwarding (e.g macvtap passthrough
mode). I hope we can leave a window for this. Or we may need introduce
other similar hooks.
Thanks
>
> In any case, I withdraw the patch set.
>
> Tom
next prev parent reply other threads:[~2017-02-10 6:37 UTC|newest]
Thread overview: 31+ messages / expand[flat|nested] mbox.gz Atom feed top
2017-02-08 23:41 [PATCH RFC v2 0/8] xdp: Generalize XDP Tom Herbert
2017-02-08 23:41 ` [PATCH RFC v2 1/8] xdp: Infrastructure to generalize XDP Tom Herbert
2017-02-09 7:49 ` Jiri Pirko
2017-02-09 14:22 ` Mintz, Yuval
2017-02-09 22:17 ` David Miller
2017-02-09 22:26 ` Tom Herbert
2017-02-09 22:34 ` David Miller
2017-02-09 22:45 ` Tom Herbert
2017-02-10 1:42 ` David Miller
2017-02-10 2:29 ` Tom Herbert
2017-02-10 3:33 ` David Miller
2017-02-10 4:55 ` Tom Herbert
2017-02-10 15:12 ` David Miller
2017-02-09 23:08 ` Tom Herbert
2017-02-10 1:48 ` David Miller
2017-02-10 2:30 ` Tom Herbert
2017-02-10 5:42 ` Jason Wang [this message]
2017-02-13 2:41 ` [lkp-robot] [xdp] 543d41bf78: INFO:suspicious_RCU_usage kernel test robot
2017-02-14 20:31 ` [PATCH RFC v2 1/8] xdp: Infrastructure to generalize XDP Jesper Dangaard Brouer
2017-02-14 20:47 ` Tom Herbert
2017-02-14 21:07 ` Tom Herbert
2017-02-14 22:08 ` Edward Cree
2017-02-14 22:28 ` Tom Herbert
2017-02-14 22:29 ` Jesper Dangaard Brouer
2017-02-08 23:41 ` [PATCH RFC v2 2/8] mlx4: Changes to use generic XDP infrastructure Tom Herbert
2017-02-08 23:41 ` [PATCH RFC v2 3/8] nfp: " Tom Herbert
2017-02-08 23:41 ` [PATCH RFC v2 4/8] qede: " Tom Herbert
2017-02-08 23:41 ` [PATCH RFC v2 5/8] virt_net: " Tom Herbert
2017-02-08 23:41 ` [PATCH RFC v2 6/8] mlx5: " Tom Herbert
2017-02-08 23:41 ` [PATCH RFC v2 7/8] bnxt: " Tom Herbert
2017-02-08 23:41 ` [PATCH RFC v2 8/8] xdp: Cleanup after API changes Tom Herbert
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=811f498d-8503-78b2-1ddb-ddafdec5a385@redhat.com \
--to=jasowang@redhat.com \
--cc=davem@davemloft.net \
--cc=kernel-team@fb.com \
--cc=netdev@vger.kernel.org \
--cc=tom@herbertland.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).