-
Notifications
You must be signed in to change notification settings - Fork 80
Fix XDP documentation to a unified location for ICSSG and CPSW #642
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
base: master
Are you sure you want to change the base?
Changes from all commits
File filter
Filter by extension
Conversations
Jump to
Diff view
Diff view
There are no files selected for viewing
| Original file line number | Diff line number | Diff line change | ||||
|---|---|---|---|---|---|---|
| @@ -0,0 +1,238 @@ | ||||||
| .. _kernel_xdp: | ||||||
|
Check warning on line 1 in source/linux/Foundational_Components/Kernel/Kernel_Drivers/Network/XDP.rst
|
||||||
|
|
||||||
| === | ||||||
| XDP | ||||||
|
Check warning on line 4 in source/linux/Foundational_Components/Kernel/Kernel_Drivers/Network/XDP.rst
|
||||||
| === | ||||||
|
|
||||||
| .. contents:: :local: | ||||||
| :depth: 3 | ||||||
|
|
||||||
| Introduction | ||||||
| ============ | ||||||
|
|
||||||
| XDP (eXpress Data Path) provides a framework for BPF that enables high-performance programmable packet processing in the Linux kernel. It runs the BPF program at the earliest possible point in software, namely at the moment the network driver receives the packet. | ||||||
|
Check warning on line 13 in source/linux/Foundational_Components/Kernel/Kernel_Drivers/Network/XDP.rst
|
||||||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Acronym definitions are supposed to come before the acronym.
Suggested change
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. It's part of the BPF subsystem in the kernel, but it's technically built on eBFP. The kernel seems to switch back and forth about whether they acknowledge it's a part of eBPF vs just standard BPF. I dunno what we should call it. |
||||||
|
|
||||||
| XDP allows running a BPF program just before the skbs are allocated in the driver, the BPF program can look at the packet and return the following things. | ||||||
|
Check warning on line 15 in source/linux/Foundational_Components/Kernel/Kernel_Drivers/Network/XDP.rst
|
||||||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. You should probably explain what a skb is in this context. |
||||||
|
|
||||||
| - XDP_DROP :- The packet is dropped right away, without wasting any resources. Useful for firewall etc. | ||||||
| - XDP_ABORTED :- Similar to drop, an exception is generated. | ||||||
| - XDP_PASS :- Pass the packet to kernel stack, i.e. the skbs are allocated and it works normally. | ||||||
| - XDP_TX :- Send the packet back to same NIC with modification(if done by the program). | ||||||
| - XDP_REDIRECT :- Send the packet to another NIC or to the user space through AF_XDP Socket(discussed below). | ||||||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. Underscores are a reserved character in RST. The parser can normally figure out what you mean, but you should wrap words that contain them with inline code sections to prevent unintended parsing: ``XDP_DROP`` |
||||||
|
|
||||||
| .. Image:: /images/XDP-packet-processing.png | ||||||
|
|
||||||
| As explained before, the XDP_REDIRECT sends packets directly to the user space. | ||||||
| This works by using the AF_XDP socket type which was introduced specifically for this usecase. | ||||||
|
|
||||||
| In this process, the packet is directly sent to the user space without going through the kernel network stack. | ||||||
|
|
||||||
| .. Image:: /images/xdp-packet.png | ||||||
|
|
||||||
| Use cases for XDP | ||||||
| ----------------- | ||||||
|
|
||||||
| XDP is particularly useful for these common networking scenarios: | ||||||
|
|
||||||
| 1. **DDoS Mitigation**: High-speed packet filtering and dropping malicious traffic | ||||||
| 2. **Load Balancing**: Efficient traffic distribution across multiple servers | ||||||
| 3. **Packet Capture**: High-performance network monitoring without performance penalties | ||||||
| 4. **Firewalls**: Wire-speed packet filtering based on flexible rule sets | ||||||
| 5. **Network Analytics**: Real-time traffic analysis and monitoring | ||||||
| 6. **Custom Network Functions**: Specialized packet handling for unique requirements | ||||||
|
|
||||||
| How to run XDP on EVM | ||||||
| --------------------- | ||||||
|
|
||||||
| The kernel configuration requires the following changes to use XDP: | ||||||
|
|
||||||
| .. code-block:: console | ||||||
|
|
||||||
| CONFIG_DEBUG_INFO_BTF=y | ||||||
| CONFIG_BPF_PRELOAD=y | ||||||
| CONFIG_BPF_PRELOAD_UMD=y | ||||||
| CONFIG_BPF_EVENTS=y | ||||||
| CONFIG_BPF_LSM=y | ||||||
| CONFIG_DEBUG_INFO_REDUCED=n | ||||||
| CONFIG_FTRACE=y | ||||||
| CONFIG_XDP_SOCKETS=y | ||||||
|
|
||||||
| Tools for debugging XDP Applications | ||||||
| ------------------------------------- | ||||||
|
|
||||||
| Debugging tools for XDP development: | ||||||
|
|
||||||
| - bpftool - For loading and managing BPF programs | ||||||
| - xdpdump - For capturing XDP packet data | ||||||
| - perf - For performance monitoring and analysis | ||||||
| - bpftrace - For tracing BPF program execution | ||||||
|
|
||||||
| AF_XDP Sockets | ||||||
| ============== | ||||||
|
|
||||||
| AF_XDP is a socket address family specifically designed to work with the XDP framework. | ||||||
| These sockets provide a high-performance interface for user space applications to receive | ||||||
| and transmit network packets directly from the XDP layer, bypassing the traditional kernel networking stack. | ||||||
|
|
||||||
| Key characteristics of AF_XDP sockets include: | ||||||
|
|
||||||
| - Direct path from network driver to user space applications | ||||||
| - Shared memory rings for efficient packet transfer | ||||||
| - Minimal overhead compared to traditional socket interfaces | ||||||
| - Optimized for high-throughput, low-latency applications | ||||||
|
|
||||||
| How AF_XDP Works | ||||||
| ---------------- | ||||||
|
|
||||||
| AF_XDP sockets operate through a shared memory mechanism: | ||||||
|
|
||||||
| 1. XDP program intercepts packets at driver level | ||||||
| 2. XDP_REDIRECT action sends packets to the socket | ||||||
| 3. Shared memory rings (RX/TX/FILL/COMPLETION) manage packet data | ||||||
| 4. Userspace application directly accesses the packet data | ||||||
| 5. Zero or minimal copying depending on the mode used | ||||||
|
|
||||||
| The AF_XDP architecture uses several ring buffers: | ||||||
|
|
||||||
| - **RX Ring**: Received packets ready for consumption | ||||||
| - **TX Ring**: Packets to be transmitted | ||||||
| - **FILL Ring**: Pre-allocated buffers for incoming packets | ||||||
| - **COMPLETION Ring**: Tracks completed TX operations | ||||||
|
|
||||||
| For more details on AF_XDP please refer to the official documentation: `AF_XDP <https://www.kernel.org/doc/html/latest/networking/af_xdp.html>`_. | ||||||
|
|
||||||
| XDP Zero-Copy | ||||||
| ============= | ||||||
|
|
||||||
| Introduction to Zero-Copy Mode | ||||||
| ------------------------------- | ||||||
|
|
||||||
| Zero-copy mode is an optimization in AF_XDP that eliminates packet data copying between the kernel and user space. This results in significantly improved performance for high-throughput network applications. | ||||||
|
|
||||||
| How Zero-Copy Works | ||||||
| ------------------- | ||||||
|
|
||||||
| In standard XDP operation (copy mode), packet data is copied from kernel memory to user space memory when processed. Zero-copy mode eliminates this copy operation by: | ||||||
|
|
||||||
| 1. Using memory-mapped regions shared between the kernel and user space | ||||||
| 2. Allowing direct DMA from network hardware into memory accessible by user space applications | ||||||
| 3. Managing memory ownership through descriptor rings rather than data movement | ||||||
|
|
||||||
| This approach provides several benefits: | ||||||
|
|
||||||
| - Reduced CPU utilization | ||||||
| - Lower memory bandwidth consumption | ||||||
| - Decreased latency for packet processing | ||||||
| - Improved overall throughput | ||||||
|
|
||||||
| Performance Considerations | ||||||
| -------------------------- | ||||||
|
|
||||||
| When implementing XDP applications, consider these performance factors: | ||||||
|
|
||||||
| 1. **Memory Alignment**: Buffers should be aligned to page boundaries for optimal performance | ||||||
| 2. **Batch Processing**: Process multiple packets in batches when possible | ||||||
| 3. **Poll Mode**: Use poll() or similar mechanisms to avoid blocking on socket operations | ||||||
| 4. **Core Affinity**: Bind application threads to specific CPU cores to reduce cache contention | ||||||
| 5. **NUMA Awareness**: Consider NUMA topology when allocating memory for packet buffers | ||||||
|
|
||||||
| Testing XDP on EVM | ||||||
| ================== | ||||||
|
|
||||||
| The `xdp-tools <https://github.com/xdp-project/xdp-tools>`__ package provides | ||||||
| utility tools for testing XDP and AF_XDP such as `xdp-bench`, `xdp-trafficgen` etc. | ||||||
|
|
||||||
| TI SDK packages the latest version of ``xdp-tools`` utilities and provides it as part of the SDK. | ||||||
| This allows users to easily test XDP functionality on EVM using these tools. | ||||||
|
|
||||||
| Both CPSW and ICSSG Ethernet drivers supports Native XDP, Generic XDP, and Zero-copy mode. | ||||||
|
|
||||||
| .. note:: | ||||||
|
|
||||||
| In case of testing with CPSW please note that when running XDP in Zero-copy mode, non-XDP traffic will be dropped. | ||||||
|
|
||||||
| **XDP Transmit test** — generate traffic using XDP (copy mode): | ||||||
|
|
||||||
| .. code-block:: console | ||||||
|
|
||||||
| xdp-trafficgen udp -m ff:ff:ff:ff:ff:ff <interface> | ||||||
|
Member
There was a problem hiding this comment. Choose a reason for hiding this commentThe reason will be displayed to describe this comment to others. Learn more. |
||||||
|
|
||||||
| **XDP Drop test** — receive and drop packets using XDP (copy mode): | ||||||
|
|
||||||
| .. code-block:: console | ||||||
|
|
||||||
| xdp-bench xdp-bench drop <interface> | ||||||
|
|
||||||
| **XDP Pass test** — receive and pass packets through XDP allowing normal network stack processing (copy mode): | ||||||
|
|
||||||
| .. code-block:: console | ||||||
|
|
||||||
| xdp-bench xdp-bench pass <interface> | ||||||
|
|
||||||
| **XDP TX test** — Hairpins (bounces back) received packets on the same interface (copy mode): | ||||||
|
|
||||||
| .. code-block:: console | ||||||
|
|
||||||
| xdp-bench xdp-bench tx <interface> | ||||||
|
|
||||||
| **XDP Redirect test** — Redirects received packets on the from one interface to another (copy mode): | ||||||
|
|
||||||
| .. code-block:: console | ||||||
|
|
||||||
| xdp-bench xdp-bench redirect <interface1> <interface2> | ||||||
|
|
||||||
| **XSK Drop test** — receive and drop packets using AF_XDP socket in zero-copy mode: | ||||||
|
|
||||||
| .. code-block:: console | ||||||
|
|
||||||
| xdp-bench xsk-drop -q 0 -C zero-copy <interface> | ||||||
|
|
||||||
| **XSK Transmit test** — generate traffic using AF_XDP socket in zero-copy mode: | ||||||
|
|
||||||
| .. code-block:: console | ||||||
|
|
||||||
| xdp-trafficgen xsk-udp -m ff:ff:ff:ff:ff:ff -q 0 -C zero-copy <interface>` | ||||||
|
|
||||||
| While xdpsock is not packaged into the SDK, the same functionality can be done with xsk-trafficgen and xsk-bench from the xdp-tools package. | ||||||
| For more details on xdpsock and how it performs XDP zero copy testing refer to `xdpsock <https://github.com/xdp-project/bpf-examples/tree/main/AF_XDP-example>`_ | ||||||
|
|
||||||
| Performance Comparison | ||||||
| ---------------------- | ||||||
|
|
||||||
| Performance testing shows that zero-copy mode can provide substantial throughput improvements compared to copy mode: | ||||||
|
|
||||||
| AF_XDP performance while using 64 byte packets for ICSSG (in Kpps): | ||||||
|
|
||||||
| .. list-table:: | ||||||
| :header-rows: 1 | ||||||
|
|
||||||
| * - Benchmark | ||||||
| - XDP-SKB | ||||||
| - XDP-Native | ||||||
| - XDP-Native(ZeroCopy) | ||||||
| * - rxdrop | ||||||
| - 253 | ||||||
| - 473 | ||||||
| - 656 | ||||||
| * - txonly | ||||||
| - 350 | ||||||
| - 354 | ||||||
| - 855 | ||||||
|
|
||||||
| AF_XDP performance while using 64 byte packets for CPSW (in Kpps): | ||||||
|
|
||||||
| .. list-table:: | ||||||
| :header-rows: 1 | ||||||
|
|
||||||
| * - Benchmark | ||||||
| - XDP-SKB | ||||||
| - XDP-Native | ||||||
| - XDP-Native(ZeroCopy) | ||||||
| * - rxdrop | ||||||
| - 322 | ||||||
| - 491 | ||||||
| - 845 | ||||||
| * - txonly | ||||||
| - 390 | ||||||
| - 394 | ||||||
| - 723 | ||||||
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
https://github.com/TexasInstruments/processor-sdk-doc/blob/master/CONTRIBUTING.md#headings--sections