xsk: add new netlink attribute dedicated for ZC max frags
[linux-block.git] / net / xdp / xsk.c
CommitLineData
c0c77d8f
BT
1// SPDX-License-Identifier: GPL-2.0
2/* XDP sockets
3 *
4 * AF_XDP sockets allows a channel between XDP programs and userspace
5 * applications.
6 * Copyright(c) 2018 Intel Corporation.
7 *
c0c77d8f
BT
8 * Author(s): Björn Töpel <bjorn.topel@intel.com>
9 * Magnus Karlsson <magnus.karlsson@intel.com>
10 */
11
12#define pr_fmt(fmt) "AF_XDP: %s: " fmt, __func__
13
14#include <linux/if_xdp.h>
15#include <linux/init.h>
16#include <linux/sched/mm.h>
17#include <linux/sched/signal.h>
18#include <linux/sched/task.h>
19#include <linux/socket.h>
20#include <linux/file.h>
21#include <linux/uaccess.h>
22#include <linux/net.h>
23#include <linux/netdevice.h>
ac98d8aa 24#include <linux/rculist.h>
951bce29 25#include <linux/vmalloc.h>
a71506a4 26#include <net/xdp_sock_drv.h>
a0731952 27#include <net/busy_poll.h>
b9b6b68e 28#include <net/xdp.h>
c0c77d8f 29
423f3832 30#include "xsk_queue.h"
c0c77d8f 31#include "xdp_umem.h"
a36b38aa 32#include "xsk.h"
c0c77d8f 33
e7a1c130 34#define TX_BATCH_SIZE 32
35fcde7f 35
e312b9e7
BT
36static DEFINE_PER_CPU(struct list_head, xskmap_flush_list);
37
c4655761 38void xsk_set_rx_need_wakeup(struct xsk_buff_pool *pool)
77cd0d7b 39{
c2d3d6a4 40 if (pool->cached_need_wakeup & XDP_WAKEUP_RX)
77cd0d7b
MK
41 return;
42
7361f9c3 43 pool->fq->ring->flags |= XDP_RING_NEED_WAKEUP;
c2d3d6a4 44 pool->cached_need_wakeup |= XDP_WAKEUP_RX;
77cd0d7b
MK
45}
46EXPORT_SYMBOL(xsk_set_rx_need_wakeup);
47
c4655761 48void xsk_set_tx_need_wakeup(struct xsk_buff_pool *pool)
77cd0d7b
MK
49{
50 struct xdp_sock *xs;
51
c2d3d6a4 52 if (pool->cached_need_wakeup & XDP_WAKEUP_TX)
77cd0d7b
MK
53 return;
54
55 rcu_read_lock();
a5aa8e52 56 list_for_each_entry_rcu(xs, &pool->xsk_tx_list, tx_list) {
77cd0d7b
MK
57 xs->tx->ring->flags |= XDP_RING_NEED_WAKEUP;
58 }
59 rcu_read_unlock();
60
c2d3d6a4 61 pool->cached_need_wakeup |= XDP_WAKEUP_TX;
77cd0d7b
MK
62}
63EXPORT_SYMBOL(xsk_set_tx_need_wakeup);
64
c4655761 65void xsk_clear_rx_need_wakeup(struct xsk_buff_pool *pool)
77cd0d7b 66{
c2d3d6a4 67 if (!(pool->cached_need_wakeup & XDP_WAKEUP_RX))
77cd0d7b
MK
68 return;
69
7361f9c3 70 pool->fq->ring->flags &= ~XDP_RING_NEED_WAKEUP;
c2d3d6a4 71 pool->cached_need_wakeup &= ~XDP_WAKEUP_RX;
77cd0d7b
MK
72}
73EXPORT_SYMBOL(xsk_clear_rx_need_wakeup);
74
c4655761 75void xsk_clear_tx_need_wakeup(struct xsk_buff_pool *pool)
77cd0d7b
MK
76{
77 struct xdp_sock *xs;
78
c2d3d6a4 79 if (!(pool->cached_need_wakeup & XDP_WAKEUP_TX))
77cd0d7b
MK
80 return;
81
82 rcu_read_lock();
a5aa8e52 83 list_for_each_entry_rcu(xs, &pool->xsk_tx_list, tx_list) {
77cd0d7b
MK
84 xs->tx->ring->flags &= ~XDP_RING_NEED_WAKEUP;
85 }
86 rcu_read_unlock();
87
c2d3d6a4 88 pool->cached_need_wakeup &= ~XDP_WAKEUP_TX;
77cd0d7b
MK
89}
90EXPORT_SYMBOL(xsk_clear_tx_need_wakeup);
91
c4655761 92bool xsk_uses_need_wakeup(struct xsk_buff_pool *pool)
77cd0d7b 93{
c2d3d6a4 94 return pool->uses_need_wakeup;
77cd0d7b 95}
c4655761 96EXPORT_SYMBOL(xsk_uses_need_wakeup);
77cd0d7b 97
1c1efc2a
MK
98struct xsk_buff_pool *xsk_get_pool_from_qid(struct net_device *dev,
99 u16 queue_id)
100{
101 if (queue_id < dev->real_num_rx_queues)
102 return dev->_rx[queue_id].pool;
103 if (queue_id < dev->real_num_tx_queues)
104 return dev->_tx[queue_id].pool;
105
106 return NULL;
107}
108EXPORT_SYMBOL(xsk_get_pool_from_qid);
109
110void xsk_clear_pool_at_qid(struct net_device *dev, u16 queue_id)
111{
b425e24a 112 if (queue_id < dev->num_rx_queues)
1c1efc2a 113 dev->_rx[queue_id].pool = NULL;
b425e24a 114 if (queue_id < dev->num_tx_queues)
1c1efc2a
MK
115 dev->_tx[queue_id].pool = NULL;
116}
117
118/* The buffer pool is stored both in the _rx struct and the _tx struct as we do
119 * not know if the device has more tx queues than rx, or the opposite.
120 * This might also change during run time.
121 */
122int xsk_reg_pool_at_qid(struct net_device *dev, struct xsk_buff_pool *pool,
123 u16 queue_id)
124{
125 if (queue_id >= max_t(unsigned int,
126 dev->real_num_rx_queues,
127 dev->real_num_tx_queues))
128 return -EINVAL;
129
130 if (queue_id < dev->real_num_rx_queues)
131 dev->_rx[queue_id].pool = pool;
132 if (queue_id < dev->real_num_tx_queues)
133 dev->_tx[queue_id].pool = pool;
134
135 return 0;
136}
137
556444c4
MF
138static int __xsk_rcv_zc(struct xdp_sock *xs, struct xdp_buff_xsk *xskb, u32 len,
139 u32 flags)
c05cd364 140{
2b43470a
BT
141 u64 addr;
142 int err;
c05cd364 143
2b43470a 144 addr = xp_get_handle(xskb);
63a64a56 145 err = xskq_prod_reserve_desc(xs->rx, addr, len, flags);
2b43470a 146 if (err) {
8aa5a335 147 xs->rx_queue_full++;
2b43470a 148 return err;
c05cd364
KL
149 }
150
2b43470a
BT
151 xp_release(xskb);
152 return 0;
c05cd364
KL
153}
154
556444c4
MF
155static int xsk_rcv_zc(struct xdp_sock *xs, struct xdp_buff *xdp, u32 len)
156{
157 struct xdp_buff_xsk *xskb = container_of(xdp, struct xdp_buff_xsk, xdp);
158
159 return __xsk_rcv_zc(xs, xskb, len, 0);
160}
161
80462775
TS
162static void *xsk_copy_xdp_start(struct xdp_buff *from)
163{
164 if (unlikely(xdp_data_meta_unsupported(from)))
165 return from->data;
166 else
167 return from->data_meta;
168}
18baed26 169
80462775
TS
170static u32 xsk_copy_xdp(void *to, void **from, u32 to_len,
171 u32 *from_len, skb_frag_t **frag, u32 rem)
172{
173 u32 copied = 0;
174
175 while (1) {
176 u32 copy_len = min_t(u32, *from_len, to_len);
177
178 memcpy(to, *from, copy_len);
179 copied += copy_len;
180 if (rem == copied)
181 return copied;
182
183 if (*from_len == copy_len) {
184 *from = skb_frag_address(*frag);
185 *from_len = skb_frag_size((*frag)++);
186 } else {
187 *from += copy_len;
188 *from_len -= copy_len;
189 }
190 if (to_len == copy_len)
191 return copied;
192
193 to_len -= copy_len;
194 to += copy_len;
195 }
c497176c
BT
196}
197
faa91b83 198static int __xsk_rcv(struct xdp_sock *xs, struct xdp_buff *xdp, u32 len)
c497176c 199{
80462775
TS
200 u32 frame_size = xsk_pool_get_rx_frame_size(xs->pool);
201 void *copy_from = xsk_copy_xdp_start(xdp), *copy_to;
202 u32 from_len, meta_len, rem, num_desc;
556444c4 203 struct xdp_buff_xsk *xskb;
2b43470a 204 struct xdp_buff *xsk_xdp;
80462775
TS
205 skb_frag_t *frag;
206
207 from_len = xdp->data_end - copy_from;
208 meta_len = xdp->data - copy_from;
209 rem = len + meta_len;
210
211 if (len <= frame_size && !xdp_buff_has_frags(xdp)) {
212 int err;
213
214 xsk_xdp = xsk_buff_alloc(xs->pool);
215 if (!xsk_xdp) {
216 xs->rx_dropped++;
217 return -ENOMEM;
218 }
219 memcpy(xsk_xdp->data - meta_len, copy_from, rem);
220 xskb = container_of(xsk_xdp, struct xdp_buff_xsk, xdp);
221 err = __xsk_rcv_zc(xs, xskb, len, 0);
222 if (err) {
223 xsk_buff_free(xsk_xdp);
224 return err;
225 }
226
227 return 0;
228 }
2b43470a 229
80462775
TS
230 num_desc = (len - 1) / frame_size + 1;
231
232 if (!xsk_buff_can_alloc(xs->pool, num_desc)) {
173d3adb 233 xs->rx_dropped++;
c6c1f11b 234 return -ENOMEM;
2b43470a 235 }
80462775
TS
236 if (xskq_prod_nb_free(xs->rx, num_desc) < num_desc) {
237 xs->rx_queue_full++;
238 return -ENOBUFS;
239 }
c497176c 240
80462775
TS
241 if (xdp_buff_has_frags(xdp)) {
242 struct skb_shared_info *sinfo;
243
244 sinfo = xdp_get_shared_info_from_buff(xdp);
245 frag = &sinfo->frags[0];
2b43470a 246 }
80462775
TS
247
248 do {
249 u32 to_len = frame_size + meta_len;
250 u32 copied;
251
252 xsk_xdp = xsk_buff_alloc(xs->pool);
253 copy_to = xsk_xdp->data - meta_len;
254
255 copied = xsk_copy_xdp(copy_to, &copy_from, to_len, &from_len, &frag, rem);
256 rem -= copied;
257
258 xskb = container_of(xsk_xdp, struct xdp_buff_xsk, xdp);
259 __xsk_rcv_zc(xs, xskb, copied - meta_len, rem ? XDP_PKT_CONTD : 0);
260 meta_len = 0;
261 } while (rem);
262
2b43470a 263 return 0;
c497176c
BT
264}
265
3413f041
XZ
266static bool xsk_tx_writeable(struct xdp_sock *xs)
267{
268 if (xskq_cons_present_entries(xs->tx) > xs->tx->nentries / 2)
269 return false;
270
271 return true;
272}
273
42fddcc7
BT
274static bool xsk_is_bound(struct xdp_sock *xs)
275{
276 if (READ_ONCE(xs->state) == XSK_BOUND) {
277 /* Matches smp_wmb() in bind(). */
278 smp_rmb();
279 return true;
280 }
281 return false;
282}
283
faa91b83 284static int xsk_rcv_check(struct xdp_sock *xs, struct xdp_buff *xdp, u32 len)
173d3adb 285{
42fddcc7 286 if (!xsk_is_bound(xs))
2be4a677 287 return -ENXIO;
42fddcc7 288
173d3adb
BT
289 if (xs->dev != xdp->rxq->dev || xs->queue_id != xdp->rxq->queue_index)
290 return -EINVAL;
291
80462775 292 if (len > xsk_pool_get_rx_frame_size(xs->pool) && !xs->sg) {
faa91b83
TS
293 xs->rx_dropped++;
294 return -ENOSPC;
295 }
296
b02e5a0e 297 sk_mark_napi_id_once_xdp(&xs->sk, xdp);
458f7272 298 return 0;
173d3adb
BT
299}
300
d817991c 301static void xsk_flush(struct xdp_sock *xs)
c497176c 302{
59e35e55 303 xskq_prod_submit(xs->rx);
7361f9c3 304 __xskq_cons_release(xs->pool->fq);
43a825af 305 sock_def_readable(&xs->sk);
c497176c
BT
306}
307
308int xsk_generic_rcv(struct xdp_sock *xs, struct xdp_buff *xdp)
309{
faa91b83 310 u32 len = xdp_get_buff_len(xdp);
c497176c
BT
311 int err;
312
bf0bdd13 313 spin_lock_bh(&xs->rx_lock);
faa91b83 314 err = xsk_rcv_check(xs, xdp, len);
458f7272 315 if (!err) {
faa91b83 316 err = __xsk_rcv(xs, xdp, len);
458f7272
BT
317 xsk_flush(xs);
318 }
bf0bdd13 319 spin_unlock_bh(&xs->rx_lock);
c497176c
BT
320 return err;
321}
322
458f7272
BT
323static int xsk_rcv(struct xdp_sock *xs, struct xdp_buff *xdp)
324{
faa91b83 325 u32 len = xdp_get_buff_len(xdp);
458f7272 326 int err;
458f7272 327
faa91b83 328 err = xsk_rcv_check(xs, xdp, len);
458f7272
BT
329 if (err)
330 return err;
331
332 if (xdp->rxq->mem.type == MEM_TYPE_XSK_BUFF_POOL) {
333 len = xdp->data_end - xdp->data;
556444c4 334 return xsk_rcv_zc(xs, xdp, len);
458f7272
BT
335 }
336
faa91b83 337 err = __xsk_rcv(xs, xdp, len);
458f7272
BT
338 if (!err)
339 xdp_return_buff(xdp);
340 return err;
341}
342
e312b9e7 343int __xsk_map_redirect(struct xdp_sock *xs, struct xdp_buff *xdp)
d817991c 344{
e312b9e7 345 struct list_head *flush_list = this_cpu_ptr(&xskmap_flush_list);
d817991c
BT
346 int err;
347
458f7272 348 err = xsk_rcv(xs, xdp);
d817991c
BT
349 if (err)
350 return err;
351
352 if (!xs->flush_node.prev)
353 list_add(&xs->flush_node, flush_list);
354
355 return 0;
356}
357
e312b9e7 358void __xsk_map_flush(void)
d817991c 359{
e312b9e7 360 struct list_head *flush_list = this_cpu_ptr(&xskmap_flush_list);
d817991c
BT
361 struct xdp_sock *xs, *tmp;
362
363 list_for_each_entry_safe(xs, tmp, flush_list, flush_node) {
364 xsk_flush(xs);
365 __list_del_clearprev(&xs->flush_node);
366 }
367}
368
c4655761 369void xsk_tx_completed(struct xsk_buff_pool *pool, u32 nb_entries)
ac98d8aa 370{
7361f9c3 371 xskq_prod_submit_n(pool->cq, nb_entries);
ac98d8aa 372}
c4655761 373EXPORT_SYMBOL(xsk_tx_completed);
ac98d8aa 374
c4655761 375void xsk_tx_release(struct xsk_buff_pool *pool)
ac98d8aa
MK
376{
377 struct xdp_sock *xs;
378
379 rcu_read_lock();
a5aa8e52 380 list_for_each_entry_rcu(xs, &pool->xsk_tx_list, tx_list) {
30744a68 381 __xskq_cons_release(xs->tx);
3413f041
XZ
382 if (xsk_tx_writeable(xs))
383 xs->sk.sk_write_space(&xs->sk);
ac98d8aa
MK
384 }
385 rcu_read_unlock();
386}
c4655761 387EXPORT_SYMBOL(xsk_tx_release);
ac98d8aa 388
c4655761 389bool xsk_tx_peek_desc(struct xsk_buff_pool *pool, struct xdp_desc *desc)
ac98d8aa 390{
ac98d8aa
MK
391 struct xdp_sock *xs;
392
393 rcu_read_lock();
a5aa8e52 394 list_for_each_entry_rcu(xs, &pool->xsk_tx_list, tx_list) {
1c1efc2a 395 if (!xskq_cons_peek_desc(xs->tx, desc, pool)) {
cf24f5a5
TS
396 if (xskq_has_descs(xs->tx))
397 xskq_cons_release(xs->tx);
ac98d8aa 398 continue;
8aa5a335 399 }
ac98d8aa 400
0a05861f 401 /* This is the backpressure mechanism for the Tx path.
15d8c916
MK
402 * Reserve space in the completion queue and only proceed
403 * if there is space in it. This avoids having to implement
404 * any buffering in the Tx path.
405 */
7361f9c3 406 if (xskq_prod_reserve_addr(pool->cq, desc->addr))
ac98d8aa
MK
407 goto out;
408
c5ed924b 409 xskq_cons_release(xs->tx);
ac98d8aa
MK
410 rcu_read_unlock();
411 return true;
412 }
413
414out:
415 rcu_read_unlock();
416 return false;
417}
c4655761 418EXPORT_SYMBOL(xsk_tx_peek_desc);
ac98d8aa 419
d1bc532e 420static u32 xsk_tx_peek_release_fallback(struct xsk_buff_pool *pool, u32 max_entries)
9349eb3a 421{
d1bc532e 422 struct xdp_desc *descs = pool->tx_descs;
9349eb3a
MK
423 u32 nb_pkts = 0;
424
425 while (nb_pkts < max_entries && xsk_tx_peek_desc(pool, &descs[nb_pkts]))
426 nb_pkts++;
427
428 xsk_tx_release(pool);
429 return nb_pkts;
430}
431
c00c4461 432u32 xsk_tx_peek_release_desc_batch(struct xsk_buff_pool *pool, u32 nb_pkts)
9349eb3a
MK
433{
434 struct xdp_sock *xs;
9349eb3a
MK
435
436 rcu_read_lock();
437 if (!list_is_singular(&pool->xsk_tx_list)) {
438 /* Fallback to the non-batched version */
439 rcu_read_unlock();
c00c4461 440 return xsk_tx_peek_release_fallback(pool, nb_pkts);
9349eb3a
MK
441 }
442
443 xs = list_first_or_null_rcu(&pool->xsk_tx_list, struct xdp_sock, tx_list);
444 if (!xs) {
445 nb_pkts = 0;
446 goto out;
447 }
448
c00c4461 449 nb_pkts = xskq_cons_nb_entries(xs->tx, nb_pkts);
9349eb3a
MK
450
451 /* This is the backpressure mechanism for the Tx path. Try to
452 * reserve space in the completion queue for all packets, but
453 * if there are fewer slots available, just process that many
454 * packets. This avoids having to implement any buffering in
455 * the Tx path.
456 */
c00c4461 457 nb_pkts = xskq_prod_nb_free(pool->cq, nb_pkts);
9349eb3a
MK
458 if (!nb_pkts)
459 goto out;
460
c00c4461
MF
461 nb_pkts = xskq_cons_read_desc_batch(xs->tx, pool, nb_pkts);
462 if (!nb_pkts) {
463 xs->tx->queue_empty_descs++;
464 goto out;
465 }
466
9349eb3a 467 __xskq_cons_release(xs->tx);
c00c4461 468 xskq_prod_write_addr_batch(pool->cq, pool->tx_descs, nb_pkts);
9349eb3a
MK
469 xs->sk.sk_write_space(&xs->sk);
470
471out:
472 rcu_read_unlock();
473 return nb_pkts;
474}
475EXPORT_SYMBOL(xsk_tx_peek_release_desc_batch);
476
06870682 477static int xsk_wakeup(struct xdp_sock *xs, u8 flags)
ac98d8aa 478{
ac98d8aa 479 struct net_device *dev = xs->dev;
06870682 480
18b1ab7a 481 return dev->netdev_ops->ndo_xsk_wakeup(dev, xs->queue_id, flags);
ac98d8aa
MK
482}
483
b7f72a30
TS
484static int xsk_cq_reserve_addr_locked(struct xdp_sock *xs, u64 addr)
485{
486 unsigned long flags;
487 int ret;
488
489 spin_lock_irqsave(&xs->pool->cq_lock, flags);
490 ret = xskq_prod_reserve_addr(xs->pool->cq, addr);
491 spin_unlock_irqrestore(&xs->pool->cq_lock, flags);
492
493 return ret;
494}
495
496static void xsk_cq_submit_locked(struct xdp_sock *xs, u32 n)
497{
498 unsigned long flags;
499
500 spin_lock_irqsave(&xs->pool->cq_lock, flags);
501 xskq_prod_submit_n(xs->pool->cq, n);
502 spin_unlock_irqrestore(&xs->pool->cq_lock, flags);
503}
504
505static void xsk_cq_cancel_locked(struct xdp_sock *xs, u32 n)
35fcde7f 506{
a9744f7c 507 unsigned long flags;
35fcde7f 508
f09ced40 509 spin_lock_irqsave(&xs->pool->cq_lock, flags);
b7f72a30 510 xskq_prod_cancel_n(xs->pool->cq, n);
f09ced40 511 spin_unlock_irqrestore(&xs->pool->cq_lock, flags);
b7f72a30 512}
35fcde7f 513
b7f72a30
TS
514static u32 xsk_get_num_desc(struct sk_buff *skb)
515{
516 return skb ? (long)skb_shinfo(skb)->destructor_arg : 0;
517}
518
519static void xsk_destruct_skb(struct sk_buff *skb)
520{
521 xsk_cq_submit_locked(xdp_sk(skb->sk), xsk_get_num_desc(skb));
35fcde7f
MK
522 sock_wfree(skb);
523}
524
b7f72a30
TS
525static void xsk_set_destructor_arg(struct sk_buff *skb)
526{
527 long num = xsk_get_num_desc(xdp_sk(skb->sk)->skb) + 1;
528
529 skb_shinfo(skb)->destructor_arg = (void *)num;
530}
531
532static void xsk_consume_skb(struct sk_buff *skb)
533{
534 struct xdp_sock *xs = xdp_sk(skb->sk);
535
536 skb->destructor = sock_wfree;
537 xsk_cq_cancel_locked(xs, xsk_get_num_desc(skb));
538 /* Free skb without triggering the perf drop trace */
539 consume_skb(skb);
540 xs->skb = NULL;
541}
542
cf24f5a5
TS
543static void xsk_drop_skb(struct sk_buff *skb)
544{
545 xdp_sk(skb->sk)->tx->invalid_descs += xsk_get_num_desc(skb);
546 xsk_consume_skb(skb);
547}
548
9c8f21e6
XZ
549static struct sk_buff *xsk_build_skb_zerocopy(struct xdp_sock *xs,
550 struct xdp_desc *desc)
551{
552 struct xsk_buff_pool *pool = xs->pool;
553 u32 hr, len, ts, offset, copy, copied;
cf24f5a5 554 struct sk_buff *skb = xs->skb;
9c8f21e6
XZ
555 struct page *page;
556 void *buffer;
557 int err, i;
558 u64 addr;
559
cf24f5a5
TS
560 if (!skb) {
561 hr = max(NET_SKB_PAD, L1_CACHE_ALIGN(xs->dev->needed_headroom));
9c8f21e6 562
cf24f5a5
TS
563 skb = sock_alloc_send_skb(&xs->sk, hr, 1, &err);
564 if (unlikely(!skb))
565 return ERR_PTR(err);
9c8f21e6 566
cf24f5a5
TS
567 skb_reserve(skb, hr);
568 }
9c8f21e6
XZ
569
570 addr = desc->addr;
571 len = desc->len;
572 ts = pool->unaligned ? len : pool->chunk_size;
573
574 buffer = xsk_buff_raw_get_data(pool, addr);
575 offset = offset_in_page(buffer);
576 addr = buffer - pool->addrs;
577
cf24f5a5
TS
578 for (copied = 0, i = skb_shinfo(skb)->nr_frags; copied < len; i++) {
579 if (unlikely(i >= MAX_SKB_FRAGS))
580 return ERR_PTR(-EFAULT);
581
9c8f21e6
XZ
582 page = pool->umem->pgs[addr >> PAGE_SHIFT];
583 get_page(page);
584
585 copy = min_t(u32, PAGE_SIZE - offset, len - copied);
586 skb_fill_page_desc(skb, i, page, offset, copy);
587
588 copied += copy;
589 addr += copy;
590 offset = 0;
591 }
592
593 skb->len += len;
594 skb->data_len += len;
595 skb->truesize += ts;
596
597 refcount_add(ts, &xs->sk.sk_wmem_alloc);
598
599 return skb;
600}
601
602static struct sk_buff *xsk_build_skb(struct xdp_sock *xs,
603 struct xdp_desc *desc)
604{
605 struct net_device *dev = xs->dev;
cf24f5a5
TS
606 struct sk_buff *skb = xs->skb;
607 int err;
9c8f21e6
XZ
608
609 if (dev->priv_flags & IFF_TX_SKB_NO_LINEAR) {
610 skb = xsk_build_skb_zerocopy(xs, desc);
cf24f5a5
TS
611 if (IS_ERR(skb)) {
612 err = PTR_ERR(skb);
613 goto free_err;
614 }
9c8f21e6
XZ
615 } else {
616 u32 hr, tr, len;
617 void *buffer;
9c8f21e6 618
cf24f5a5 619 buffer = xsk_buff_raw_get_data(xs->pool, desc->addr);
9c8f21e6
XZ
620 len = desc->len;
621
cf24f5a5
TS
622 if (!skb) {
623 hr = max(NET_SKB_PAD, L1_CACHE_ALIGN(dev->needed_headroom));
624 tr = dev->needed_tailroom;
625 skb = sock_alloc_send_skb(&xs->sk, hr + len + tr, 1, &err);
626 if (unlikely(!skb))
627 goto free_err;
9c8f21e6 628
cf24f5a5
TS
629 skb_reserve(skb, hr);
630 skb_put(skb, len);
9c8f21e6 631
cf24f5a5
TS
632 err = skb_store_bits(skb, 0, buffer, len);
633 if (unlikely(err))
634 goto free_err;
635 } else {
636 int nr_frags = skb_shinfo(skb)->nr_frags;
637 struct page *page;
638 u8 *vaddr;
639
640 if (unlikely(nr_frags == (MAX_SKB_FRAGS - 1) && xp_mb_desc(desc))) {
641 err = -EFAULT;
642 goto free_err;
643 }
644
645 page = alloc_page(xs->sk.sk_allocation);
646 if (unlikely(!page)) {
647 err = -EAGAIN;
648 goto free_err;
649 }
650
651 vaddr = kmap_local_page(page);
652 memcpy(vaddr, buffer, len);
653 kunmap_local(vaddr);
654
655 skb_add_rx_frag(skb, nr_frags, page, 0, len, 0);
9c8f21e6
XZ
656 }
657 }
658
659 skb->dev = dev;
660 skb->priority = xs->sk.sk_priority;
661 skb->mark = xs->sk.sk_mark;
9c8f21e6 662 skb->destructor = xsk_destruct_skb;
b7f72a30 663 xsk_set_destructor_arg(skb);
9c8f21e6
XZ
664
665 return skb;
cf24f5a5
TS
666
667free_err:
668 if (err == -EAGAIN) {
669 xsk_cq_cancel_locked(xs, 1);
670 } else {
671 xsk_set_destructor_arg(skb);
672 xsk_drop_skb(skb);
673 xskq_cons_release(xs->tx);
674 }
675
676 return ERR_PTR(err);
9c8f21e6
XZ
677}
678
1596dae2 679static int __xsk_generic_xmit(struct sock *sk)
35fcde7f 680{
35fcde7f 681 struct xdp_sock *xs = xdp_sk(sk);
df551058 682 u32 max_batch = TX_BATCH_SIZE;
35fcde7f
MK
683 bool sent_frame = false;
684 struct xdp_desc desc;
685 struct sk_buff *skb;
686 int err = 0;
687
35fcde7f
MK
688 mutex_lock(&xs->mutex);
689
18b1ab7a
MK
690 /* Since we dropped the RCU read lock, the socket state might have changed. */
691 if (unlikely(!xsk_is_bound(xs))) {
692 err = -ENXIO;
693 goto out;
694 }
695
67571640
IM
696 if (xs->queue_id >= xs->dev->real_num_tx_queues)
697 goto out;
698
1c1efc2a 699 while (xskq_cons_peek_desc(xs->tx, &desc, xs->pool)) {
35fcde7f
MK
700 if (max_batch-- == 0) {
701 err = -EAGAIN;
702 goto out;
703 }
704
0a05861f 705 /* This is the backpressure mechanism for the Tx path.
15d8c916
MK
706 * Reserve space in the completion queue and only proceed
707 * if there is space in it. This avoids having to implement
708 * any buffering in the Tx path.
709 */
b7f72a30 710 if (xsk_cq_reserve_addr_locked(xs, desc.addr))
35fcde7f 711 goto out;
35fcde7f 712
a6e944f2
CL
713 skb = xsk_build_skb(xs, &desc);
714 if (IS_ERR(skb)) {
715 err = PTR_ERR(skb);
cf24f5a5
TS
716 if (err == -EAGAIN)
717 goto out;
718 err = 0;
719 continue;
720 }
721
722 xskq_cons_release(xs->tx);
723
724 if (xp_mb_desc(&desc)) {
725 xs->skb = skb;
726 continue;
a6e944f2
CL
727 }
728
36ccdf85 729 err = __dev_direct_xmit(skb, xs->queue_id);
642e450b
MK
730 if (err == NETDEV_TX_BUSY) {
731 /* Tell user-space to retry the send */
cf24f5a5 732 xskq_cons_cancel_n(xs->tx, xsk_get_num_desc(skb));
b7f72a30 733 xsk_consume_skb(skb);
642e450b
MK
734 err = -EAGAIN;
735 goto out;
736 }
737
35fcde7f 738 /* Ignore NET_XMIT_CN as packet might have been sent */
642e450b 739 if (err == NET_XMIT_DROP) {
fe588685
MK
740 /* SKB completed but not sent */
741 err = -EBUSY;
cf24f5a5 742 xs->skb = NULL;
35fcde7f
MK
743 goto out;
744 }
745
746 sent_frame = true;
cf24f5a5 747 xs->skb = NULL;
35fcde7f
MK
748 }
749
cf24f5a5
TS
750 if (xskq_has_descs(xs->tx)) {
751 if (xs->skb)
752 xsk_drop_skb(xs->skb);
753 xskq_cons_release(xs->tx);
754 }
8aa5a335 755
35fcde7f
MK
756out:
757 if (sent_frame)
3413f041
XZ
758 if (xsk_tx_writeable(xs))
759 sk->sk_write_space(sk);
35fcde7f
MK
760
761 mutex_unlock(&xs->mutex);
762 return err;
763}
764
1596dae2 765static int xsk_generic_xmit(struct sock *sk)
df551058 766{
18b1ab7a 767 int ret;
df551058 768
18b1ab7a
MK
769 /* Drop the RCU lock since the SKB path might sleep. */
770 rcu_read_unlock();
1596dae2 771 ret = __xsk_generic_xmit(sk);
18b1ab7a
MK
772 /* Reaquire RCU lock before going into common code. */
773 rcu_read_lock();
774
775 return ret;
df551058
MK
776}
777
a0731952
BT
778static bool xsk_no_wakeup(struct sock *sk)
779{
780#ifdef CONFIG_NET_RX_BUSY_POLL
781 /* Prefer busy-polling, skip the wakeup. */
782 return READ_ONCE(sk->sk_prefer_busy_poll) && READ_ONCE(sk->sk_ll_usec) &&
783 READ_ONCE(sk->sk_napi_id) >= MIN_NAPI_ID;
784#else
785 return false;
786#endif
787}
788
1596dae2
MF
789static int xsk_check_common(struct xdp_sock *xs)
790{
791 if (unlikely(!xsk_is_bound(xs)))
792 return -ENXIO;
793 if (unlikely(!(xs->dev->flags & IFF_UP)))
794 return -ENETDOWN;
795
796 return 0;
797}
798
18b1ab7a 799static int __xsk_sendmsg(struct socket *sock, struct msghdr *m, size_t total_len)
35fcde7f 800{
ac98d8aa 801 bool need_wait = !(m->msg_flags & MSG_DONTWAIT);
35fcde7f
MK
802 struct sock *sk = sock->sk;
803 struct xdp_sock *xs = xdp_sk(sk);
e3920818 804 struct xsk_buff_pool *pool;
1596dae2 805 int err;
35fcde7f 806
1596dae2
MF
807 err = xsk_check_common(xs);
808 if (err)
809 return err;
df551058 810 if (unlikely(need_wait))
ac98d8aa 811 return -EOPNOTSUPP;
1596dae2
MF
812 if (unlikely(!xs->tx))
813 return -ENOBUFS;
35fcde7f 814
ca2e1a62
MF
815 if (sk_can_busy_loop(sk)) {
816 if (xs->zc)
817 __sk_mark_napi_id_once(sk, xsk_pool_get_napi_id(xs->pool));
a0731952 818 sk_busy_loop(sk, 1); /* only support non-blocking sockets */
ca2e1a62 819 }
a0731952 820
8de8b71b 821 if (xs->zc && xsk_no_wakeup(sk))
a0731952
BT
822 return 0;
823
e3920818 824 pool = xs->pool;
1596dae2
MF
825 if (pool->cached_need_wakeup & XDP_WAKEUP_TX) {
826 if (xs->zc)
827 return xsk_wakeup(xs, XDP_WAKEUP_TX);
828 return xsk_generic_xmit(sk);
829 }
e3920818 830 return 0;
35fcde7f
MK
831}
832
18b1ab7a
MK
833static int xsk_sendmsg(struct socket *sock, struct msghdr *m, size_t total_len)
834{
835 int ret;
836
837 rcu_read_lock();
838 ret = __xsk_sendmsg(sock, m, total_len);
839 rcu_read_unlock();
840
841 return ret;
842}
843
844static int __xsk_recvmsg(struct socket *sock, struct msghdr *m, size_t len, int flags)
45a86681
BT
845{
846 bool need_wait = !(flags & MSG_DONTWAIT);
847 struct sock *sk = sock->sk;
848 struct xdp_sock *xs = xdp_sk(sk);
1596dae2 849 int err;
45a86681 850
1596dae2
MF
851 err = xsk_check_common(xs);
852 if (err)
853 return err;
45a86681
BT
854 if (unlikely(!xs->rx))
855 return -ENOBUFS;
45a86681
BT
856 if (unlikely(need_wait))
857 return -EOPNOTSUPP;
858
a0731952
BT
859 if (sk_can_busy_loop(sk))
860 sk_busy_loop(sk, 1); /* only support non-blocking sockets */
861
862 if (xsk_no_wakeup(sk))
863 return 0;
864
45a86681
BT
865 if (xs->pool->cached_need_wakeup & XDP_WAKEUP_RX && xs->zc)
866 return xsk_wakeup(xs, XDP_WAKEUP_RX);
867 return 0;
35fcde7f
MK
868}
869
18b1ab7a
MK
870static int xsk_recvmsg(struct socket *sock, struct msghdr *m, size_t len, int flags)
871{
872 int ret;
873
874 rcu_read_lock();
875 ret = __xsk_recvmsg(sock, m, len, flags);
876 rcu_read_unlock();
877
878 return ret;
879}
880
5d946c5a 881static __poll_t xsk_poll(struct file *file, struct socket *sock,
a11e1d43 882 struct poll_table_struct *wait)
c497176c 883{
f5da5418 884 __poll_t mask = 0;
df551058
MK
885 struct sock *sk = sock->sk;
886 struct xdp_sock *xs = xdp_sk(sk);
c2d3d6a4 887 struct xsk_buff_pool *pool;
42fddcc7 888
0706a78f
MK
889 sock_poll_wait(file, sock, wait);
890
18b1ab7a 891 rcu_read_lock();
1596dae2
MF
892 if (xsk_check_common(xs))
893 goto skip_tx;
42fddcc7 894
c2d3d6a4 895 pool = xs->pool;
77cd0d7b 896
c2d3d6a4 897 if (pool->cached_need_wakeup) {
06870682 898 if (xs->zc)
c2d3d6a4 899 xsk_wakeup(xs, pool->cached_need_wakeup);
1596dae2 900 else if (xs->tx)
df551058 901 /* Poll needs to drive Tx also in copy mode */
1596dae2 902 xsk_generic_xmit(sk);
df551058 903 }
c497176c 904
1596dae2 905skip_tx:
59e35e55 906 if (xs->rx && !xskq_prod_is_empty(xs->rx))
5d946c5a 907 mask |= EPOLLIN | EPOLLRDNORM;
3413f041 908 if (xs->tx && xsk_tx_writeable(xs))
5d946c5a 909 mask |= EPOLLOUT | EPOLLWRNORM;
c497176c 910
18b1ab7a 911 rcu_read_unlock();
c497176c
BT
912 return mask;
913}
914
b9b6b68e
BT
915static int xsk_init_queue(u32 entries, struct xsk_queue **queue,
916 bool umem_queue)
423f3832
MK
917{
918 struct xsk_queue *q;
919
920 if (entries == 0 || *queue || !is_power_of_2(entries))
921 return -EINVAL;
922
b9b6b68e 923 q = xskq_create(entries, umem_queue);
423f3832
MK
924 if (!q)
925 return -ENOMEM;
926
37b07693
BT
927 /* Make sure queue is ready before it can be seen by others */
928 smp_wmb();
94a99763 929 WRITE_ONCE(*queue, q);
423f3832
MK
930 return 0;
931}
932
455302d1
IM
933static void xsk_unbind_dev(struct xdp_sock *xs)
934{
935 struct net_device *dev = xs->dev;
936
42fddcc7 937 if (xs->state != XSK_BOUND)
455302d1 938 return;
42fddcc7 939 WRITE_ONCE(xs->state, XSK_UNBOUND);
455302d1
IM
940
941 /* Wait for driver to stop using the xdp socket. */
a5aa8e52 942 xp_del_xsk(xs->pool, xs);
455302d1
IM
943 synchronize_net();
944 dev_put(dev);
945}
946
0402acd6 947static struct xsk_map *xsk_get_map_list_entry(struct xdp_sock *xs,
782347b6 948 struct xdp_sock __rcu ***map_entry)
0402acd6
BT
949{
950 struct xsk_map *map = NULL;
951 struct xsk_map_node *node;
952
953 *map_entry = NULL;
954
955 spin_lock_bh(&xs->map_list_lock);
956 node = list_first_entry_or_null(&xs->map_list, struct xsk_map_node,
957 node);
958 if (node) {
bb1b25ca 959 bpf_map_inc(&node->map->map);
0402acd6
BT
960 map = node->map;
961 *map_entry = node->map_entry;
962 }
963 spin_unlock_bh(&xs->map_list_lock);
964 return map;
965}
966
967static void xsk_delete_from_maps(struct xdp_sock *xs)
968{
969 /* This function removes the current XDP socket from all the
970 * maps it resides in. We need to take extra care here, due to
971 * the two locks involved. Each map has a lock synchronizing
972 * updates to the entries, and each socket has a lock that
973 * synchronizes access to the list of maps (map_list). For
974 * deadlock avoidance the locks need to be taken in the order
975 * "map lock"->"socket map list lock". We start off by
976 * accessing the socket map list, and take a reference to the
977 * map to guarantee existence between the
978 * xsk_get_map_list_entry() and xsk_map_try_sock_delete()
979 * calls. Then we ask the map to remove the socket, which
980 * tries to remove the socket from the map. Note that there
981 * might be updates to the map between
982 * xsk_get_map_list_entry() and xsk_map_try_sock_delete().
983 */
782347b6 984 struct xdp_sock __rcu **map_entry = NULL;
0402acd6
BT
985 struct xsk_map *map;
986
987 while ((map = xsk_get_map_list_entry(xs, &map_entry))) {
988 xsk_map_try_sock_delete(map, xs, map_entry);
bb1b25ca 989 bpf_map_put(&map->map);
0402acd6
BT
990 }
991}
992
c0c77d8f
BT
993static int xsk_release(struct socket *sock)
994{
995 struct sock *sk = sock->sk;
965a9909 996 struct xdp_sock *xs = xdp_sk(sk);
c0c77d8f
BT
997 struct net *net;
998
999 if (!sk)
1000 return 0;
1001
1002 net = sock_net(sk);
1003
cf24f5a5
TS
1004 if (xs->skb)
1005 xsk_drop_skb(xs->skb);
1006
1d0dc069
BT
1007 mutex_lock(&net->xdp.lock);
1008 sk_del_node_init_rcu(sk);
1009 mutex_unlock(&net->xdp.lock);
1010
c0c77d8f 1011 sock_prot_inuse_add(net, sk->sk_prot, -1);
c0c77d8f 1012
0402acd6 1013 xsk_delete_from_maps(xs);
42fddcc7 1014 mutex_lock(&xs->mutex);
455302d1 1015 xsk_unbind_dev(xs);
42fddcc7 1016 mutex_unlock(&xs->mutex);
965a9909 1017
541d7fdd
BT
1018 xskq_destroy(xs->rx);
1019 xskq_destroy(xs->tx);
7361f9c3
MK
1020 xskq_destroy(xs->fq_tmp);
1021 xskq_destroy(xs->cq_tmp);
541d7fdd 1022
c0c77d8f
BT
1023 sock_orphan(sk);
1024 sock->sk = NULL;
1025
c0c77d8f
BT
1026 sock_put(sk);
1027
1028 return 0;
1029}
1030
965a9909
MK
1031static struct socket *xsk_lookup_xsk_from_fd(int fd)
1032{
1033 struct socket *sock;
1034 int err;
1035
1036 sock = sockfd_lookup(fd, &err);
1037 if (!sock)
1038 return ERR_PTR(-ENOTSOCK);
1039
1040 if (sock->sk->sk_family != PF_XDP) {
1041 sockfd_put(sock);
1042 return ERR_PTR(-ENOPROTOOPT);
1043 }
1044
1045 return sock;
1046}
1047
7361f9c3
MK
1048static bool xsk_validate_queues(struct xdp_sock *xs)
1049{
1050 return xs->fq_tmp && xs->cq_tmp;
1051}
1052
965a9909
MK
1053static int xsk_bind(struct socket *sock, struct sockaddr *addr, int addr_len)
1054{
1055 struct sockaddr_xdp *sxdp = (struct sockaddr_xdp *)addr;
1056 struct sock *sk = sock->sk;
965a9909 1057 struct xdp_sock *xs = xdp_sk(sk);
959b71db 1058 struct net_device *dev;
f7306ace 1059 int bound_dev_if;
173d3adb 1060 u32 flags, qid;
965a9909
MK
1061 int err = 0;
1062
1063 if (addr_len < sizeof(struct sockaddr_xdp))
1064 return -EINVAL;
1065 if (sxdp->sxdp_family != AF_XDP)
1066 return -EINVAL;
1067
f54ba391 1068 flags = sxdp->sxdp_flags;
77cd0d7b 1069 if (flags & ~(XDP_SHARED_UMEM | XDP_COPY | XDP_ZEROCOPY |
81470b5c 1070 XDP_USE_NEED_WAKEUP | XDP_USE_SG))
f54ba391
BT
1071 return -EINVAL;
1072
f7306ace
IM
1073 bound_dev_if = READ_ONCE(sk->sk_bound_dev_if);
1074 if (bound_dev_if && bound_dev_if != sxdp->sxdp_ifindex)
1075 return -EINVAL;
1076
5464c3a0 1077 rtnl_lock();
965a9909 1078 mutex_lock(&xs->mutex);
455302d1 1079 if (xs->state != XSK_READY) {
959b71db
BT
1080 err = -EBUSY;
1081 goto out_release;
1082 }
1083
965a9909
MK
1084 dev = dev_get_by_index(sock_net(sk), sxdp->sxdp_ifindex);
1085 if (!dev) {
1086 err = -ENODEV;
1087 goto out_release;
1088 }
1089
f6145903 1090 if (!xs->rx && !xs->tx) {
965a9909
MK
1091 err = -EINVAL;
1092 goto out_unlock;
1093 }
1094
173d3adb 1095 qid = sxdp->sxdp_queue_id;
173d3adb
BT
1096
1097 if (flags & XDP_SHARED_UMEM) {
965a9909
MK
1098 struct xdp_sock *umem_xs;
1099 struct socket *sock;
1100
77cd0d7b 1101 if ((flags & XDP_COPY) || (flags & XDP_ZEROCOPY) ||
81470b5c 1102 (flags & XDP_USE_NEED_WAKEUP) || (flags & XDP_USE_SG)) {
173d3adb
BT
1103 /* Cannot specify flags for shared sockets. */
1104 err = -EINVAL;
1105 goto out_unlock;
1106 }
1107
965a9909
MK
1108 if (xs->umem) {
1109 /* We have already our own. */
1110 err = -EINVAL;
1111 goto out_unlock;
1112 }
1113
1114 sock = xsk_lookup_xsk_from_fd(sxdp->sxdp_shared_umem_fd);
1115 if (IS_ERR(sock)) {
1116 err = PTR_ERR(sock);
1117 goto out_unlock;
1118 }
1119
1120 umem_xs = xdp_sk(sock->sk);
42fddcc7 1121 if (!xsk_is_bound(umem_xs)) {
965a9909
MK
1122 err = -EBADF;
1123 sockfd_put(sock);
1124 goto out_unlock;
42fddcc7 1125 }
965a9909 1126
a1132430
MK
1127 if (umem_xs->queue_id != qid || umem_xs->dev != dev) {
1128 /* Share the umem with another socket on another qid
1129 * and/or device.
1130 */
b5aea28d
MK
1131 xs->pool = xp_create_and_assign_umem(xs,
1132 umem_xs->umem);
1133 if (!xs->pool) {
1fd17c8c 1134 err = -ENOMEM;
b5aea28d
MK
1135 sockfd_put(sock);
1136 goto out_unlock;
1137 }
1138
60240bc2
JM
1139 err = xp_assign_dev_shared(xs->pool, umem_xs, dev,
1140 qid);
b5aea28d
MK
1141 if (err) {
1142 xp_destroy(xs->pool);
83cf5c68 1143 xs->pool = NULL;
b5aea28d
MK
1144 sockfd_put(sock);
1145 goto out_unlock;
1146 }
1147 } else {
1148 /* Share the buffer pool with the other socket. */
1149 if (xs->fq_tmp || xs->cq_tmp) {
1150 /* Do not allow setting your own fq or cq. */
1151 err = -EINVAL;
1152 sockfd_put(sock);
1153 goto out_unlock;
1154 }
1155
1156 xp_get_pool(umem_xs->pool);
1157 xs->pool = umem_xs->pool;
ba3beec2
MF
1158
1159 /* If underlying shared umem was created without Tx
1160 * ring, allocate Tx descs array that Tx batching API
1161 * utilizes
1162 */
1163 if (xs->tx && !xs->pool->tx_descs) {
1164 err = xp_alloc_tx_descs(xs->pool, xs);
1165 if (err) {
1166 xp_put_pool(xs->pool);
1167 sockfd_put(sock);
1168 goto out_unlock;
1169 }
1170 }
b5aea28d
MK
1171 }
1172
965a9909 1173 xdp_get_umem(umem_xs->umem);
9764f4b3 1174 WRITE_ONCE(xs->umem, umem_xs->umem);
965a9909 1175 sockfd_put(sock);
7361f9c3 1176 } else if (!xs->umem || !xsk_validate_queues(xs)) {
965a9909
MK
1177 err = -EINVAL;
1178 goto out_unlock;
c497176c
BT
1179 } else {
1180 /* This xsk has its own umem. */
1c1efc2a
MK
1181 xs->pool = xp_create_and_assign_umem(xs, xs->umem);
1182 if (!xs->pool) {
1183 err = -ENOMEM;
173d3adb 1184 goto out_unlock;
1c1efc2a
MK
1185 }
1186
1187 err = xp_assign_dev(xs->pool, dev, qid, flags);
1188 if (err) {
1189 xp_destroy(xs->pool);
1190 xs->pool = NULL;
1c1efc2a
MK
1191 goto out_unlock;
1192 }
965a9909
MK
1193 }
1194
8bee6833
MK
1195 /* FQ and CQ are now owned by the buffer pool and cleaned up with it. */
1196 xs->fq_tmp = NULL;
1197 xs->cq_tmp = NULL;
1198
965a9909 1199 xs->dev = dev;
ac98d8aa 1200 xs->zc = xs->umem->zc;
81470b5c 1201 xs->sg = !!(flags & XDP_USE_SG);
ac98d8aa 1202 xs->queue_id = qid;
a5aa8e52 1203 xp_add_xsk(xs->pool, xs);
965a9909
MK
1204
1205out_unlock:
42fddcc7 1206 if (err) {
965a9909 1207 dev_put(dev);
42fddcc7
BT
1208 } else {
1209 /* Matches smp_rmb() in bind() for shared umem
1210 * sockets, and xsk_is_bound().
1211 */
1212 smp_wmb();
1213 WRITE_ONCE(xs->state, XSK_BOUND);
1214 }
965a9909
MK
1215out_release:
1216 mutex_unlock(&xs->mutex);
5464c3a0 1217 rtnl_unlock();
965a9909
MK
1218 return err;
1219}
1220
c05cd364
KL
1221struct xdp_umem_reg_v1 {
1222 __u64 addr; /* Start of packet data area */
1223 __u64 len; /* Length of packet data area */
1224 __u32 chunk_size;
1225 __u32 headroom;
1226};
1227
c0c77d8f 1228static int xsk_setsockopt(struct socket *sock, int level, int optname,
a7b75c5a 1229 sockptr_t optval, unsigned int optlen)
c0c77d8f
BT
1230{
1231 struct sock *sk = sock->sk;
1232 struct xdp_sock *xs = xdp_sk(sk);
1233 int err;
1234
1235 if (level != SOL_XDP)
1236 return -ENOPROTOOPT;
1237
1238 switch (optname) {
b9b6b68e 1239 case XDP_RX_RING:
f6145903 1240 case XDP_TX_RING:
b9b6b68e
BT
1241 {
1242 struct xsk_queue **q;
1243 int entries;
1244
1245 if (optlen < sizeof(entries))
1246 return -EINVAL;
a7b75c5a 1247 if (copy_from_sockptr(&entries, optval, sizeof(entries)))
b9b6b68e
BT
1248 return -EFAULT;
1249
1250 mutex_lock(&xs->mutex);
455302d1
IM
1251 if (xs->state != XSK_READY) {
1252 mutex_unlock(&xs->mutex);
1253 return -EBUSY;
1254 }
f6145903 1255 q = (optname == XDP_TX_RING) ? &xs->tx : &xs->rx;
b9b6b68e 1256 err = xsk_init_queue(entries, q, false);
77cd0d7b
MK
1257 if (!err && optname == XDP_TX_RING)
1258 /* Tx needs to be explicitly woken up the first time */
1259 xs->tx->ring->flags |= XDP_RING_NEED_WAKEUP;
b9b6b68e
BT
1260 mutex_unlock(&xs->mutex);
1261 return err;
1262 }
c0c77d8f
BT
1263 case XDP_UMEM_REG:
1264 {
c05cd364
KL
1265 size_t mr_size = sizeof(struct xdp_umem_reg);
1266 struct xdp_umem_reg mr = {};
c0c77d8f
BT
1267 struct xdp_umem *umem;
1268
c05cd364
KL
1269 if (optlen < sizeof(struct xdp_umem_reg_v1))
1270 return -EINVAL;
1271 else if (optlen < sizeof(mr))
1272 mr_size = sizeof(struct xdp_umem_reg_v1);
1273
a7b75c5a 1274 if (copy_from_sockptr(&mr, optval, mr_size))
c0c77d8f
BT
1275 return -EFAULT;
1276
1277 mutex_lock(&xs->mutex);
455302d1 1278 if (xs->state != XSK_READY || xs->umem) {
a49049ea
BT
1279 mutex_unlock(&xs->mutex);
1280 return -EBUSY;
1281 }
c0c77d8f 1282
a49049ea
BT
1283 umem = xdp_umem_create(&mr);
1284 if (IS_ERR(umem)) {
c0c77d8f 1285 mutex_unlock(&xs->mutex);
a49049ea 1286 return PTR_ERR(umem);
c0c77d8f
BT
1287 }
1288
1289 /* Make sure umem is ready before it can be seen by others */
1290 smp_wmb();
9764f4b3 1291 WRITE_ONCE(xs->umem, umem);
c0c77d8f
BT
1292 mutex_unlock(&xs->mutex);
1293 return 0;
1294 }
423f3832 1295 case XDP_UMEM_FILL_RING:
fe230832 1296 case XDP_UMEM_COMPLETION_RING:
423f3832
MK
1297 {
1298 struct xsk_queue **q;
1299 int entries;
1300
a7b75c5a 1301 if (copy_from_sockptr(&entries, optval, sizeof(entries)))
423f3832
MK
1302 return -EFAULT;
1303
1304 mutex_lock(&xs->mutex);
455302d1
IM
1305 if (xs->state != XSK_READY) {
1306 mutex_unlock(&xs->mutex);
1307 return -EBUSY;
1308 }
a49049ea 1309
7361f9c3
MK
1310 q = (optname == XDP_UMEM_FILL_RING) ? &xs->fq_tmp :
1311 &xs->cq_tmp;
b9b6b68e 1312 err = xsk_init_queue(entries, q, true);
423f3832
MK
1313 mutex_unlock(&xs->mutex);
1314 return err;
1315 }
c0c77d8f
BT
1316 default:
1317 break;
1318 }
1319
1320 return -ENOPROTOOPT;
1321}
1322
77cd0d7b
MK
1323static void xsk_enter_rxtx_offsets(struct xdp_ring_offset_v1 *ring)
1324{
1325 ring->producer = offsetof(struct xdp_rxtx_ring, ptrs.producer);
1326 ring->consumer = offsetof(struct xdp_rxtx_ring, ptrs.consumer);
1327 ring->desc = offsetof(struct xdp_rxtx_ring, desc);
1328}
1329
1330static void xsk_enter_umem_offsets(struct xdp_ring_offset_v1 *ring)
1331{
1332 ring->producer = offsetof(struct xdp_umem_ring, ptrs.producer);
1333 ring->consumer = offsetof(struct xdp_umem_ring, ptrs.consumer);
1334 ring->desc = offsetof(struct xdp_umem_ring, desc);
1335}
1336
8aa5a335
CL
1337struct xdp_statistics_v1 {
1338 __u64 rx_dropped;
1339 __u64 rx_invalid_descs;
1340 __u64 tx_invalid_descs;
1341};
1342
af75d9e0
MK
1343static int xsk_getsockopt(struct socket *sock, int level, int optname,
1344 char __user *optval, int __user *optlen)
1345{
1346 struct sock *sk = sock->sk;
1347 struct xdp_sock *xs = xdp_sk(sk);
1348 int len;
1349
1350 if (level != SOL_XDP)
1351 return -ENOPROTOOPT;
1352
1353 if (get_user(len, optlen))
1354 return -EFAULT;
1355 if (len < 0)
1356 return -EINVAL;
1357
1358 switch (optname) {
1359 case XDP_STATISTICS:
1360 {
3c4f850e 1361 struct xdp_statistics stats = {};
8aa5a335
CL
1362 bool extra_stats = true;
1363 size_t stats_size;
af75d9e0 1364
8aa5a335 1365 if (len < sizeof(struct xdp_statistics_v1)) {
af75d9e0 1366 return -EINVAL;
8aa5a335
CL
1367 } else if (len < sizeof(stats)) {
1368 extra_stats = false;
1369 stats_size = sizeof(struct xdp_statistics_v1);
1370 } else {
1371 stats_size = sizeof(stats);
1372 }
af75d9e0
MK
1373
1374 mutex_lock(&xs->mutex);
1375 stats.rx_dropped = xs->rx_dropped;
8aa5a335
CL
1376 if (extra_stats) {
1377 stats.rx_ring_full = xs->rx_queue_full;
1378 stats.rx_fill_ring_empty_descs =
7361f9c3 1379 xs->pool ? xskq_nb_queue_empty_descs(xs->pool->fq) : 0;
8aa5a335
CL
1380 stats.tx_ring_empty_descs = xskq_nb_queue_empty_descs(xs->tx);
1381 } else {
1382 stats.rx_dropped += xs->rx_queue_full;
1383 }
af75d9e0
MK
1384 stats.rx_invalid_descs = xskq_nb_invalid_descs(xs->rx);
1385 stats.tx_invalid_descs = xskq_nb_invalid_descs(xs->tx);
1386 mutex_unlock(&xs->mutex);
1387
8aa5a335 1388 if (copy_to_user(optval, &stats, stats_size))
af75d9e0 1389 return -EFAULT;
8aa5a335 1390 if (put_user(stats_size, optlen))
af75d9e0
MK
1391 return -EFAULT;
1392
1393 return 0;
1394 }
b3a9e0be
BT
1395 case XDP_MMAP_OFFSETS:
1396 {
1397 struct xdp_mmap_offsets off;
77cd0d7b
MK
1398 struct xdp_mmap_offsets_v1 off_v1;
1399 bool flags_supported = true;
1400 void *to_copy;
b3a9e0be 1401
77cd0d7b 1402 if (len < sizeof(off_v1))
b3a9e0be 1403 return -EINVAL;
77cd0d7b
MK
1404 else if (len < sizeof(off))
1405 flags_supported = false;
1406
1407 if (flags_supported) {
1408 /* xdp_ring_offset is identical to xdp_ring_offset_v1
1409 * except for the flags field added to the end.
1410 */
1411 xsk_enter_rxtx_offsets((struct xdp_ring_offset_v1 *)
1412 &off.rx);
1413 xsk_enter_rxtx_offsets((struct xdp_ring_offset_v1 *)
1414 &off.tx);
1415 xsk_enter_umem_offsets((struct xdp_ring_offset_v1 *)
1416 &off.fr);
1417 xsk_enter_umem_offsets((struct xdp_ring_offset_v1 *)
1418 &off.cr);
1419 off.rx.flags = offsetof(struct xdp_rxtx_ring,
1420 ptrs.flags);
1421 off.tx.flags = offsetof(struct xdp_rxtx_ring,
1422 ptrs.flags);
1423 off.fr.flags = offsetof(struct xdp_umem_ring,
1424 ptrs.flags);
1425 off.cr.flags = offsetof(struct xdp_umem_ring,
1426 ptrs.flags);
1427
1428 len = sizeof(off);
1429 to_copy = &off;
1430 } else {
1431 xsk_enter_rxtx_offsets(&off_v1.rx);
1432 xsk_enter_rxtx_offsets(&off_v1.tx);
1433 xsk_enter_umem_offsets(&off_v1.fr);
1434 xsk_enter_umem_offsets(&off_v1.cr);
1435
1436 len = sizeof(off_v1);
1437 to_copy = &off_v1;
1438 }
b3a9e0be 1439
77cd0d7b 1440 if (copy_to_user(optval, to_copy, len))
b3a9e0be
BT
1441 return -EFAULT;
1442 if (put_user(len, optlen))
1443 return -EFAULT;
1444
1445 return 0;
1446 }
2640d3c8
MM
1447 case XDP_OPTIONS:
1448 {
1449 struct xdp_options opts = {};
1450
1451 if (len < sizeof(opts))
1452 return -EINVAL;
1453
1454 mutex_lock(&xs->mutex);
1455 if (xs->zc)
1456 opts.flags |= XDP_OPTIONS_ZEROCOPY;
1457 mutex_unlock(&xs->mutex);
1458
1459 len = sizeof(opts);
1460 if (copy_to_user(optval, &opts, len))
1461 return -EFAULT;
1462 if (put_user(len, optlen))
1463 return -EFAULT;
1464
1465 return 0;
1466 }
af75d9e0
MK
1467 default:
1468 break;
1469 }
1470
1471 return -EOPNOTSUPP;
1472}
1473
423f3832
MK
1474static int xsk_mmap(struct file *file, struct socket *sock,
1475 struct vm_area_struct *vma)
1476{
a5a16e43 1477 loff_t offset = (loff_t)vma->vm_pgoff << PAGE_SHIFT;
423f3832
MK
1478 unsigned long size = vma->vm_end - vma->vm_start;
1479 struct xdp_sock *xs = xdp_sk(sock->sk);
5f5a7d8d 1480 int state = READ_ONCE(xs->state);
423f3832 1481 struct xsk_queue *q = NULL;
423f3832 1482
5f5a7d8d 1483 if (state != XSK_READY && state != XSK_BOUND)
455302d1
IM
1484 return -EBUSY;
1485
b9b6b68e 1486 if (offset == XDP_PGOFF_RX_RING) {
37b07693 1487 q = READ_ONCE(xs->rx);
f6145903 1488 } else if (offset == XDP_PGOFF_TX_RING) {
37b07693 1489 q = READ_ONCE(xs->tx);
b9b6b68e 1490 } else {
e6762c8b
MK
1491 /* Matches the smp_wmb() in XDP_UMEM_REG */
1492 smp_rmb();
b9b6b68e 1493 if (offset == XDP_UMEM_PGOFF_FILL_RING)
5f5a7d8d
NG
1494 q = state == XSK_READY ? READ_ONCE(xs->fq_tmp) :
1495 READ_ONCE(xs->pool->fq);
fe230832 1496 else if (offset == XDP_UMEM_PGOFF_COMPLETION_RING)
5f5a7d8d
NG
1497 q = state == XSK_READY ? READ_ONCE(xs->cq_tmp) :
1498 READ_ONCE(xs->pool->cq);
b9b6b68e 1499 }
423f3832
MK
1500
1501 if (!q)
1502 return -EINVAL;
1503
e6762c8b
MK
1504 /* Matches the smp_wmb() in xsk_init_queue */
1505 smp_rmb();
9f78bf33 1506 if (size > q->ring_vmalloc_size)
423f3832
MK
1507 return -EINVAL;
1508
9f78bf33 1509 return remap_vmalloc_range(vma, q->ring, 0);
423f3832
MK
1510}
1511
455302d1
IM
1512static int xsk_notifier(struct notifier_block *this,
1513 unsigned long msg, void *ptr)
1514{
1515 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
1516 struct net *net = dev_net(dev);
1517 struct sock *sk;
1518
1519 switch (msg) {
1520 case NETDEV_UNREGISTER:
1521 mutex_lock(&net->xdp.lock);
1522 sk_for_each(sk, &net->xdp.list) {
1523 struct xdp_sock *xs = xdp_sk(sk);
1524
1525 mutex_lock(&xs->mutex);
1526 if (xs->dev == dev) {
1527 sk->sk_err = ENETDOWN;
1528 if (!sock_flag(sk, SOCK_DEAD))
e3ae2365 1529 sk_error_report(sk);
455302d1
IM
1530
1531 xsk_unbind_dev(xs);
1532
1c1efc2a
MK
1533 /* Clear device references. */
1534 xp_clear_dev(xs->pool);
455302d1
IM
1535 }
1536 mutex_unlock(&xs->mutex);
1537 }
1538 mutex_unlock(&net->xdp.lock);
1539 break;
1540 }
1541 return NOTIFY_DONE;
1542}
1543
c0c77d8f
BT
1544static struct proto xsk_proto = {
1545 .name = "XDP",
1546 .owner = THIS_MODULE,
1547 .obj_size = sizeof(struct xdp_sock),
1548};
1549
1550static const struct proto_ops xsk_proto_ops = {
c2f4374b
BT
1551 .family = PF_XDP,
1552 .owner = THIS_MODULE,
1553 .release = xsk_release,
1554 .bind = xsk_bind,
1555 .connect = sock_no_connect,
1556 .socketpair = sock_no_socketpair,
1557 .accept = sock_no_accept,
1558 .getname = sock_no_getname,
a11e1d43 1559 .poll = xsk_poll,
c2f4374b
BT
1560 .ioctl = sock_no_ioctl,
1561 .listen = sock_no_listen,
1562 .shutdown = sock_no_shutdown,
1563 .setsockopt = xsk_setsockopt,
1564 .getsockopt = xsk_getsockopt,
1565 .sendmsg = xsk_sendmsg,
45a86681 1566 .recvmsg = xsk_recvmsg,
c2f4374b 1567 .mmap = xsk_mmap,
c0c77d8f
BT
1568};
1569
11fe9262
BT
1570static void xsk_destruct(struct sock *sk)
1571{
1572 struct xdp_sock *xs = xdp_sk(sk);
1573
1574 if (!sock_flag(sk, SOCK_DEAD))
1575 return;
1576
e5e1a4bc 1577 if (!xp_put_pool(xs->pool))
537cf4e3 1578 xdp_put_umem(xs->umem, !xs->pool);
11fe9262
BT
1579}
1580
c0c77d8f
BT
1581static int xsk_create(struct net *net, struct socket *sock, int protocol,
1582 int kern)
1583{
c0c77d8f 1584 struct xdp_sock *xs;
1c1efc2a 1585 struct sock *sk;
c0c77d8f
BT
1586
1587 if (!ns_capable(net->user_ns, CAP_NET_RAW))
1588 return -EPERM;
1589 if (sock->type != SOCK_RAW)
1590 return -ESOCKTNOSUPPORT;
1591
1592 if (protocol)
1593 return -EPROTONOSUPPORT;
1594
1595 sock->state = SS_UNCONNECTED;
1596
1597 sk = sk_alloc(net, PF_XDP, GFP_KERNEL, &xsk_proto, kern);
1598 if (!sk)
1599 return -ENOBUFS;
1600
1601 sock->ops = &xsk_proto_ops;
1602
1603 sock_init_data(sock, sk);
1604
1605 sk->sk_family = PF_XDP;
1606
11fe9262 1607 sk->sk_destruct = xsk_destruct;
11fe9262 1608
cee27167
BT
1609 sock_set_flag(sk, SOCK_RCU_FREE);
1610
c0c77d8f 1611 xs = xdp_sk(sk);
455302d1 1612 xs->state = XSK_READY;
c0c77d8f 1613 mutex_init(&xs->mutex);
bf0bdd13 1614 spin_lock_init(&xs->rx_lock);
c0c77d8f 1615
0402acd6
BT
1616 INIT_LIST_HEAD(&xs->map_list);
1617 spin_lock_init(&xs->map_list_lock);
1618
1d0dc069
BT
1619 mutex_lock(&net->xdp.lock);
1620 sk_add_node_rcu(sk, &net->xdp.list);
1621 mutex_unlock(&net->xdp.lock);
1622
c0c77d8f 1623 sock_prot_inuse_add(net, &xsk_proto, 1);
c0c77d8f
BT
1624
1625 return 0;
1626}
1627
1628static const struct net_proto_family xsk_family_ops = {
1629 .family = PF_XDP,
1630 .create = xsk_create,
1631 .owner = THIS_MODULE,
1632};
1633
455302d1
IM
1634static struct notifier_block xsk_netdev_notifier = {
1635 .notifier_call = xsk_notifier,
1636};
1637
1d0dc069
BT
1638static int __net_init xsk_net_init(struct net *net)
1639{
1640 mutex_init(&net->xdp.lock);
1641 INIT_HLIST_HEAD(&net->xdp.list);
1642 return 0;
1643}
1644
1645static void __net_exit xsk_net_exit(struct net *net)
1646{
1647 WARN_ON_ONCE(!hlist_empty(&net->xdp.list));
1648}
1649
1650static struct pernet_operations xsk_net_ops = {
1651 .init = xsk_net_init,
1652 .exit = xsk_net_exit,
1653};
1654
c0c77d8f
BT
1655static int __init xsk_init(void)
1656{
e312b9e7 1657 int err, cpu;
c0c77d8f
BT
1658
1659 err = proto_register(&xsk_proto, 0 /* no slab */);
1660 if (err)
1661 goto out;
1662
1663 err = sock_register(&xsk_family_ops);
1664 if (err)
1665 goto out_proto;
1666
1d0dc069
BT
1667 err = register_pernet_subsys(&xsk_net_ops);
1668 if (err)
1669 goto out_sk;
455302d1
IM
1670
1671 err = register_netdevice_notifier(&xsk_netdev_notifier);
1672 if (err)
1673 goto out_pernet;
1674
e312b9e7
BT
1675 for_each_possible_cpu(cpu)
1676 INIT_LIST_HEAD(&per_cpu(xskmap_flush_list, cpu));
c0c77d8f
BT
1677 return 0;
1678
455302d1
IM
1679out_pernet:
1680 unregister_pernet_subsys(&xsk_net_ops);
1d0dc069
BT
1681out_sk:
1682 sock_unregister(PF_XDP);
c0c77d8f
BT
1683out_proto:
1684 proto_unregister(&xsk_proto);
1685out:
1686 return err;
1687}
1688
1689fs_initcall(xsk_init);