blob: 989e52386c358a34a566660933002827ba165068 [file] [log] [blame]
Björn Töpelc0c77d82018-05-02 13:01:23 +02001// SPDX-License-Identifier: GPL-2.0
2/* XDP user-space packet buffer
3 * Copyright(c) 2018 Intel Corporation.
Björn Töpelc0c77d82018-05-02 13:01:23 +02004 */
5
6#include <linux/init.h>
7#include <linux/sched/mm.h>
8#include <linux/sched/signal.h>
9#include <linux/sched/task.h>
10#include <linux/uaccess.h>
11#include <linux/slab.h>
12#include <linux/bpf.h>
13#include <linux/mm.h>
Jakub Kicinski84c6b862018-07-30 20:43:53 -070014#include <linux/netdevice.h>
15#include <linux/rtnetlink.h>
Björn Töpel50e74c02019-01-24 19:59:38 +010016#include <linux/idr.h>
Björn Töpelc0c77d82018-05-02 13:01:23 +020017
18#include "xdp_umem.h"
Björn Töpele61e62b92018-06-04 14:05:51 +020019#include "xsk_queue.h"
Björn Töpelc0c77d82018-05-02 13:01:23 +020020
Björn Töpelbbff2f32018-06-04 13:57:13 +020021#define XDP_UMEM_MIN_CHUNK_SIZE 2048
Björn Töpelc0c77d82018-05-02 13:01:23 +020022
Björn Töpel50e74c02019-01-24 19:59:38 +010023static DEFINE_IDA(umem_ida);
24
Magnus Karlssonac98d8a2018-06-04 14:05:57 +020025void xdp_add_sk_umem(struct xdp_umem *umem, struct xdp_sock *xs)
26{
27 unsigned long flags;
28
29 spin_lock_irqsave(&umem->xsk_list_lock, flags);
30 list_add_rcu(&xs->list, &umem->xsk_list);
31 spin_unlock_irqrestore(&umem->xsk_list_lock, flags);
32}
33
34void xdp_del_sk_umem(struct xdp_umem *umem, struct xdp_sock *xs)
35{
36 unsigned long flags;
37
Björn Töpel541d7fd2018-10-05 13:25:15 +020038 spin_lock_irqsave(&umem->xsk_list_lock, flags);
39 list_del_rcu(&xs->list);
40 spin_unlock_irqrestore(&umem->xsk_list_lock, flags);
Magnus Karlssonac98d8a2018-06-04 14:05:57 +020041}
42
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020043/* The umem is stored both in the _rx struct and the _tx struct as we do
44 * not know if the device has more tx queues than rx, or the opposite.
45 * This might also change during run time.
46 */
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +010047static int xdp_reg_umem_at_qid(struct net_device *dev, struct xdp_umem *umem,
48 u16 queue_id)
Jakub Kicinski84c6b862018-07-30 20:43:53 -070049{
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +010050 if (queue_id >= max_t(unsigned int,
51 dev->real_num_rx_queues,
52 dev->real_num_tx_queues))
53 return -EINVAL;
54
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020055 if (queue_id < dev->real_num_rx_queues)
56 dev->_rx[queue_id].umem = umem;
57 if (queue_id < dev->real_num_tx_queues)
58 dev->_tx[queue_id].umem = umem;
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +010059
60 return 0;
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020061}
Jakub Kicinski84c6b862018-07-30 20:43:53 -070062
Jakub Kicinski1661d342018-10-01 14:51:36 +020063struct xdp_umem *xdp_get_umem_from_qid(struct net_device *dev,
64 u16 queue_id)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020065{
66 if (queue_id < dev->real_num_rx_queues)
67 return dev->_rx[queue_id].umem;
68 if (queue_id < dev->real_num_tx_queues)
69 return dev->_tx[queue_id].umem;
Jakub Kicinski84c6b862018-07-30 20:43:53 -070070
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020071 return NULL;
72}
Jan Sokolowski5f4f3b22018-12-18 13:45:13 +000073EXPORT_SYMBOL(xdp_get_umem_from_qid);
Jakub Kicinski84c6b862018-07-30 20:43:53 -070074
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020075static void xdp_clear_umem_at_qid(struct net_device *dev, u16 queue_id)
76{
Magnus Karlssona41b4f32018-10-01 14:51:37 +020077 if (queue_id < dev->real_num_rx_queues)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020078 dev->_rx[queue_id].umem = NULL;
Magnus Karlssona41b4f32018-10-01 14:51:37 +020079 if (queue_id < dev->real_num_tx_queues)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020080 dev->_tx[queue_id].umem = NULL;
Jakub Kicinski84c6b862018-07-30 20:43:53 -070081}
82
Björn Töpel173d3ad2018-06-04 14:05:55 +020083int xdp_umem_assign_dev(struct xdp_umem *umem, struct net_device *dev,
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020084 u16 queue_id, u16 flags)
Björn Töpel173d3ad2018-06-04 14:05:55 +020085{
86 bool force_zc, force_copy;
87 struct netdev_bpf bpf;
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020088 int err = 0;
Björn Töpel173d3ad2018-06-04 14:05:55 +020089
90 force_zc = flags & XDP_ZEROCOPY;
91 force_copy = flags & XDP_COPY;
92
93 if (force_zc && force_copy)
94 return -EINVAL;
95
Jakub Kicinskif7346072018-07-30 20:43:52 -070096 rtnl_lock();
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020097 if (xdp_get_umem_from_qid(dev, queue_id)) {
98 err = -EBUSY;
99 goto out_rtnl_unlock;
100 }
101
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +0100102 err = xdp_reg_umem_at_qid(dev, umem, queue_id);
103 if (err)
104 goto out_rtnl_unlock;
105
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200106 umem->dev = dev;
107 umem->queue_id = queue_id;
108 if (force_copy)
109 /* For copy-mode, we are done. */
110 goto out_rtnl_unlock;
111
112 if (!dev->netdev_ops->ndo_bpf ||
113 !dev->netdev_ops->ndo_xsk_async_xmit) {
114 err = -EOPNOTSUPP;
115 goto err_unreg_umem;
Jakub Kicinski84c6b862018-07-30 20:43:53 -0700116 }
Jakub Kicinskif7346072018-07-30 20:43:52 -0700117
118 bpf.command = XDP_SETUP_XSK_UMEM;
119 bpf.xsk.umem = umem;
120 bpf.xsk.queue_id = queue_id;
121
Jakub Kicinskif7346072018-07-30 20:43:52 -0700122 err = dev->netdev_ops->ndo_bpf(dev, &bpf);
Jakub Kicinskif7346072018-07-30 20:43:52 -0700123 if (err)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200124 goto err_unreg_umem;
Jakub Kicinski84c6b862018-07-30 20:43:53 -0700125 rtnl_unlock();
Jakub Kicinskif7346072018-07-30 20:43:52 -0700126
Björn Töpel173d3ad2018-06-04 14:05:55 +0200127 dev_hold(dev);
Jakub Kicinskif7346072018-07-30 20:43:52 -0700128 umem->zc = true;
129 return 0;
Jakub Kicinski84c6b862018-07-30 20:43:53 -0700130
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200131err_unreg_umem:
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200132 if (!force_zc)
133 err = 0; /* fallback to copy mode */
Björn Töpel1e405c12019-02-12 08:51:14 +0100134 if (err)
135 xdp_clear_umem_at_qid(dev, queue_id);
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200136out_rtnl_unlock:
Jakub Kicinski84c6b862018-07-30 20:43:53 -0700137 rtnl_unlock();
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200138 return err;
Björn Töpel173d3ad2018-06-04 14:05:55 +0200139}
140
Magnus Karlssonac98d8a2018-06-04 14:05:57 +0200141static void xdp_umem_clear_dev(struct xdp_umem *umem)
Björn Töpel173d3ad2018-06-04 14:05:55 +0200142{
143 struct netdev_bpf bpf;
144 int err;
145
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200146 if (umem->zc) {
Björn Töpel173d3ad2018-06-04 14:05:55 +0200147 bpf.command = XDP_SETUP_XSK_UMEM;
148 bpf.xsk.umem = NULL;
149 bpf.xsk.queue_id = umem->queue_id;
150
151 rtnl_lock();
152 err = umem->dev->netdev_ops->ndo_bpf(umem->dev, &bpf);
153 rtnl_unlock();
154
155 if (err)
156 WARN(1, "failed to disable umem!\n");
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200157 }
Björn Töpel173d3ad2018-06-04 14:05:55 +0200158
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200159 if (umem->dev) {
160 rtnl_lock();
161 xdp_clear_umem_at_qid(umem->dev, umem->queue_id);
162 rtnl_unlock();
163 }
164
165 if (umem->zc) {
Björn Töpel173d3ad2018-06-04 14:05:55 +0200166 dev_put(umem->dev);
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200167 umem->zc = false;
Björn Töpel173d3ad2018-06-04 14:05:55 +0200168 }
169}
170
Björn Töpelc0c77d82018-05-02 13:01:23 +0200171static void xdp_umem_unpin_pages(struct xdp_umem *umem)
172{
173 unsigned int i;
174
Björn Töpela49049e2018-05-22 09:35:02 +0200175 for (i = 0; i < umem->npgs; i++) {
176 struct page *page = umem->pgs[i];
Björn Töpelc0c77d82018-05-02 13:01:23 +0200177
Björn Töpela49049e2018-05-22 09:35:02 +0200178 set_page_dirty_lock(page);
179 put_page(page);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200180 }
Björn Töpela49049e2018-05-22 09:35:02 +0200181
182 kfree(umem->pgs);
183 umem->pgs = NULL;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200184}
185
186static void xdp_umem_unaccount_pages(struct xdp_umem *umem)
187{
Daniel Borkmannc09290c2018-06-08 00:06:01 +0200188 if (umem->user) {
189 atomic_long_sub(umem->npgs, &umem->user->locked_vm);
190 free_uid(umem->user);
191 }
Björn Töpelc0c77d82018-05-02 13:01:23 +0200192}
193
194static void xdp_umem_release(struct xdp_umem *umem)
195{
Björn Töpel173d3ad2018-06-04 14:05:55 +0200196 xdp_umem_clear_dev(umem);
197
Björn Töpel50e74c02019-01-24 19:59:38 +0100198 ida_simple_remove(&umem_ida, umem->id);
199
Magnus Karlsson423f3832018-05-02 13:01:24 +0200200 if (umem->fq) {
201 xskq_destroy(umem->fq);
202 umem->fq = NULL;
203 }
204
Magnus Karlssonfe230832018-05-02 13:01:31 +0200205 if (umem->cq) {
206 xskq_destroy(umem->cq);
207 umem->cq = NULL;
208 }
209
Jakub Kicinskif5bd9132018-09-07 10:18:46 +0200210 xsk_reuseq_destroy(umem);
211
Björn Töpela49049e2018-05-22 09:35:02 +0200212 xdp_umem_unpin_pages(umem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200213
Björn Töpel8aef7342018-06-04 14:05:52 +0200214 kfree(umem->pages);
215 umem->pages = NULL;
216
Björn Töpelc0c77d82018-05-02 13:01:23 +0200217 xdp_umem_unaccount_pages(umem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200218 kfree(umem);
219}
220
221static void xdp_umem_release_deferred(struct work_struct *work)
222{
223 struct xdp_umem *umem = container_of(work, struct xdp_umem, work);
224
225 xdp_umem_release(umem);
226}
227
228void xdp_get_umem(struct xdp_umem *umem)
229{
Björn Töpeld3b42f12018-05-22 09:35:03 +0200230 refcount_inc(&umem->users);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200231}
232
233void xdp_put_umem(struct xdp_umem *umem)
234{
235 if (!umem)
236 return;
237
Björn Töpeld3b42f12018-05-22 09:35:03 +0200238 if (refcount_dec_and_test(&umem->users)) {
Björn Töpelc0c77d82018-05-02 13:01:23 +0200239 INIT_WORK(&umem->work, xdp_umem_release_deferred);
240 schedule_work(&umem->work);
241 }
242}
243
244static int xdp_umem_pin_pages(struct xdp_umem *umem)
245{
246 unsigned int gup_flags = FOLL_WRITE;
247 long npgs;
248 int err;
249
Björn Töpela3439932018-06-11 13:57:12 +0200250 umem->pgs = kcalloc(umem->npgs, sizeof(*umem->pgs),
251 GFP_KERNEL | __GFP_NOWARN);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200252 if (!umem->pgs)
253 return -ENOMEM;
254
Davidlohr Buesoe451eb52019-02-11 08:15:29 -0800255 down_read(&current->mm->mmap_sem);
256 npgs = get_user_pages_longterm(umem->address, umem->npgs,
257 gup_flags, &umem->pgs[0], NULL);
258 up_read(&current->mm->mmap_sem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200259
260 if (npgs != umem->npgs) {
261 if (npgs >= 0) {
262 umem->npgs = npgs;
263 err = -ENOMEM;
264 goto out_pin;
265 }
266 err = npgs;
267 goto out_pgs;
268 }
269 return 0;
270
271out_pin:
272 xdp_umem_unpin_pages(umem);
273out_pgs:
274 kfree(umem->pgs);
275 umem->pgs = NULL;
276 return err;
277}
278
279static int xdp_umem_account_pages(struct xdp_umem *umem)
280{
281 unsigned long lock_limit, new_npgs, old_npgs;
282
283 if (capable(CAP_IPC_LOCK))
284 return 0;
285
286 lock_limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT;
287 umem->user = get_uid(current_user());
288
289 do {
290 old_npgs = atomic_long_read(&umem->user->locked_vm);
291 new_npgs = old_npgs + umem->npgs;
292 if (new_npgs > lock_limit) {
293 free_uid(umem->user);
294 umem->user = NULL;
295 return -ENOBUFS;
296 }
297 } while (atomic_long_cmpxchg(&umem->user->locked_vm, old_npgs,
298 new_npgs) != old_npgs);
299 return 0;
300}
301
Björn Töpela49049e2018-05-22 09:35:02 +0200302static int xdp_umem_reg(struct xdp_umem *umem, struct xdp_umem_reg *mr)
Björn Töpelc0c77d82018-05-02 13:01:23 +0200303{
Björn Töpelbbff2f32018-06-04 13:57:13 +0200304 u32 chunk_size = mr->chunk_size, headroom = mr->headroom;
305 unsigned int chunks, chunks_per_page;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200306 u64 addr = mr->addr, size = mr->len;
Björn Töpel8aef7342018-06-04 14:05:52 +0200307 int size_chk, err, i;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200308
Björn Töpelbbff2f32018-06-04 13:57:13 +0200309 if (chunk_size < XDP_UMEM_MIN_CHUNK_SIZE || chunk_size > PAGE_SIZE) {
Björn Töpelc0c77d82018-05-02 13:01:23 +0200310 /* Strictly speaking we could support this, if:
311 * - huge pages, or*
312 * - using an IOMMU, or
313 * - making sure the memory area is consecutive
314 * but for now, we simply say "computer says no".
315 */
316 return -EINVAL;
317 }
318
Björn Töpelbbff2f32018-06-04 13:57:13 +0200319 if (!is_power_of_2(chunk_size))
Björn Töpelc0c77d82018-05-02 13:01:23 +0200320 return -EINVAL;
321
322 if (!PAGE_ALIGNED(addr)) {
323 /* Memory area has to be page size aligned. For
324 * simplicity, this might change.
325 */
326 return -EINVAL;
327 }
328
329 if ((addr + size) < addr)
330 return -EINVAL;
331
Björn Töpelbbff2f32018-06-04 13:57:13 +0200332 chunks = (unsigned int)div_u64(size, chunk_size);
333 if (chunks == 0)
Björn Töpelc0c77d82018-05-02 13:01:23 +0200334 return -EINVAL;
335
Björn Töpelbbff2f32018-06-04 13:57:13 +0200336 chunks_per_page = PAGE_SIZE / chunk_size;
337 if (chunks < chunks_per_page || chunks % chunks_per_page)
Björn Töpelc0c77d82018-05-02 13:01:23 +0200338 return -EINVAL;
339
Björn Töpelbbff2f32018-06-04 13:57:13 +0200340 headroom = ALIGN(headroom, 64);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200341
Björn Töpelbbff2f32018-06-04 13:57:13 +0200342 size_chk = chunk_size - headroom - XDP_PACKET_HEADROOM;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200343 if (size_chk < 0)
344 return -EINVAL;
345
Björn Töpelc0c77d82018-05-02 13:01:23 +0200346 umem->address = (unsigned long)addr;
Magnus Karlsson93ee30f2018-08-31 13:40:02 +0200347 umem->chunk_mask = ~((u64)chunk_size - 1);
348 umem->size = size;
Björn Töpelbbff2f32018-06-04 13:57:13 +0200349 umem->headroom = headroom;
350 umem->chunk_size_nohr = chunk_size - headroom;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200351 umem->npgs = size / PAGE_SIZE;
352 umem->pgs = NULL;
353 umem->user = NULL;
Magnus Karlssonac98d8a2018-06-04 14:05:57 +0200354 INIT_LIST_HEAD(&umem->xsk_list);
355 spin_lock_init(&umem->xsk_list_lock);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200356
Björn Töpeld3b42f12018-05-22 09:35:03 +0200357 refcount_set(&umem->users, 1);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200358
359 err = xdp_umem_account_pages(umem);
360 if (err)
Björn Töpel044175a2019-03-13 15:15:49 +0100361 return err;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200362
363 err = xdp_umem_pin_pages(umem);
364 if (err)
365 goto out_account;
Björn Töpel8aef7342018-06-04 14:05:52 +0200366
367 umem->pages = kcalloc(umem->npgs, sizeof(*umem->pages), GFP_KERNEL);
368 if (!umem->pages) {
369 err = -ENOMEM;
370 goto out_account;
371 }
372
373 for (i = 0; i < umem->npgs; i++)
374 umem->pages[i].addr = page_address(umem->pgs[i]);
375
Björn Töpelc0c77d82018-05-02 13:01:23 +0200376 return 0;
377
378out_account:
379 xdp_umem_unaccount_pages(umem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200380 return err;
381}
Magnus Karlsson965a9902018-05-02 13:01:26 +0200382
Björn Töpela49049e2018-05-22 09:35:02 +0200383struct xdp_umem *xdp_umem_create(struct xdp_umem_reg *mr)
384{
385 struct xdp_umem *umem;
386 int err;
387
388 umem = kzalloc(sizeof(*umem), GFP_KERNEL);
389 if (!umem)
390 return ERR_PTR(-ENOMEM);
391
Björn Töpel50e74c02019-01-24 19:59:38 +0100392 err = ida_simple_get(&umem_ida, 0, 0, GFP_KERNEL);
393 if (err < 0) {
394 kfree(umem);
395 return ERR_PTR(err);
396 }
397 umem->id = err;
398
Björn Töpela49049e2018-05-22 09:35:02 +0200399 err = xdp_umem_reg(umem, mr);
400 if (err) {
Björn Töpel50e74c02019-01-24 19:59:38 +0100401 ida_simple_remove(&umem_ida, umem->id);
Björn Töpela49049e2018-05-22 09:35:02 +0200402 kfree(umem);
403 return ERR_PTR(err);
404 }
405
406 return umem;
407}
408
Magnus Karlsson965a9902018-05-02 13:01:26 +0200409bool xdp_umem_validate_queues(struct xdp_umem *umem)
410{
Björn Töpelda60cf02018-05-18 14:00:23 +0200411 return umem->fq && umem->cq;
Magnus Karlsson965a9902018-05-02 13:01:26 +0200412}