Thomas Gleixner | ddc64d0 | 2019-05-31 01:09:24 -0700 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0-only */ |
Jesper Dangaard Brouer | aecd67b | 2018-01-03 11:25:13 +0100 | [diff] [blame] | 2 | /* include/net/xdp.h |
| 3 | * |
| 4 | * Copyright (c) 2017 Jesper Dangaard Brouer, Red Hat Inc. |
Jesper Dangaard Brouer | aecd67b | 2018-01-03 11:25:13 +0100 | [diff] [blame] | 5 | */ |
| 6 | #ifndef __LINUX_NET_XDP_H__ |
| 7 | #define __LINUX_NET_XDP_H__ |
| 8 | |
Jesper Dangaard Brouer | f95f0f9 | 2020-05-14 12:49:02 +0200 | [diff] [blame] | 9 | #include <linux/skbuff.h> /* skb_shared_info */ |
| 10 | |
Jesper Dangaard Brouer | aecd67b | 2018-01-03 11:25:13 +0100 | [diff] [blame] | 11 | /** |
| 12 | * DOC: XDP RX-queue information |
| 13 | * |
| 14 | * The XDP RX-queue info (xdp_rxq_info) is associated with the driver |
| 15 | * level RX-ring queues. It is information that is specific to how |
| 16 | * the driver have configured a given RX-ring queue. |
| 17 | * |
| 18 | * Each xdp_buff frame received in the driver carry a (pointer) |
| 19 | * reference to this xdp_rxq_info structure. This provides the XDP |
| 20 | * data-path read-access to RX-info for both kernel and bpf-side |
| 21 | * (limited subset). |
| 22 | * |
| 23 | * For now, direct access is only safe while running in NAPI/softirq |
| 24 | * context. Contents is read-mostly and must not be updated during |
| 25 | * driver NAPI/softirq poll. |
| 26 | * |
| 27 | * The driver usage API is a register and unregister API. |
| 28 | * |
| 29 | * The struct is not directly tied to the XDP prog. A new XDP prog |
| 30 | * can be attached as long as it doesn't change the underlying |
| 31 | * RX-ring. If the RX-ring does change significantly, the NIC driver |
| 32 | * naturally need to stop the RX-ring before purging and reallocating |
| 33 | * memory. In that process the driver MUST call unregistor (which |
| 34 | * also apply for driver shutdown and unload). The register API is |
| 35 | * also mandatory during RX-ring setup. |
| 36 | */ |
| 37 | |
Jesper Dangaard Brouer | 5ab073f | 2018-04-17 16:45:26 +0200 | [diff] [blame] | 38 | enum xdp_mem_type { |
| 39 | MEM_TYPE_PAGE_SHARED = 0, /* Split-page refcnt based model */ |
| 40 | MEM_TYPE_PAGE_ORDER0, /* Orig XDP full page model */ |
Jesper Dangaard Brouer | 57d0a1c | 2018-04-17 16:46:22 +0200 | [diff] [blame] | 41 | MEM_TYPE_PAGE_POOL, |
Björn Töpel | 2b43470 | 2020-05-20 21:20:53 +0200 | [diff] [blame] | 42 | MEM_TYPE_XSK_BUFF_POOL, |
Jesper Dangaard Brouer | 5ab073f | 2018-04-17 16:45:26 +0200 | [diff] [blame] | 43 | MEM_TYPE_MAX, |
| 44 | }; |
| 45 | |
Jesper Dangaard Brouer | 42b3346 | 2018-05-31 10:59:47 +0200 | [diff] [blame] | 46 | /* XDP flags for ndo_xdp_xmit */ |
Jesper Dangaard Brouer | 42b3346 | 2018-05-31 10:59:47 +0200 | [diff] [blame] | 47 | #define XDP_XMIT_FLUSH (1U << 0) /* doorbell signal consumer */ |
| 48 | #define XDP_XMIT_FLAGS_MASK XDP_XMIT_FLUSH |
| 49 | |
Jesper Dangaard Brouer | 5ab073f | 2018-04-17 16:45:26 +0200 | [diff] [blame] | 50 | struct xdp_mem_info { |
| 51 | u32 type; /* enum xdp_mem_type, but known size type */ |
Jesper Dangaard Brouer | 8d5d885 | 2018-04-17 16:46:12 +0200 | [diff] [blame] | 52 | u32 id; |
Jesper Dangaard Brouer | 5ab073f | 2018-04-17 16:45:26 +0200 | [diff] [blame] | 53 | }; |
| 54 | |
Jesper Dangaard Brouer | 57d0a1c | 2018-04-17 16:46:22 +0200 | [diff] [blame] | 55 | struct page_pool; |
| 56 | |
Jesper Dangaard Brouer | aecd67b | 2018-01-03 11:25:13 +0100 | [diff] [blame] | 57 | struct xdp_rxq_info { |
| 58 | struct net_device *dev; |
| 59 | u32 queue_index; |
| 60 | u32 reg_state; |
Jesper Dangaard Brouer | 5ab073f | 2018-04-17 16:45:26 +0200 | [diff] [blame] | 61 | struct xdp_mem_info mem; |
Jesper Dangaard Brouer | aecd67b | 2018-01-03 11:25:13 +0100 | [diff] [blame] | 62 | } ____cacheline_aligned; /* perf critical, avoid false-sharing */ |
| 63 | |
David Ahern | 64b5902 | 2020-05-29 16:07:14 -0600 | [diff] [blame] | 64 | struct xdp_txq_info { |
| 65 | struct net_device *dev; |
| 66 | }; |
| 67 | |
Jesper Dangaard Brouer | 106ca27 | 2018-04-17 16:45:37 +0200 | [diff] [blame] | 68 | struct xdp_buff { |
| 69 | void *data; |
| 70 | void *data_end; |
| 71 | void *data_meta; |
| 72 | void *data_hard_start; |
| 73 | struct xdp_rxq_info *rxq; |
David Ahern | 64b5902 | 2020-05-29 16:07:14 -0600 | [diff] [blame] | 74 | struct xdp_txq_info *txq; |
Jesper Dangaard Brouer | f95f0f9 | 2020-05-14 12:49:02 +0200 | [diff] [blame] | 75 | u32 frame_sz; /* frame size to deduce data_hard_end/reserved tailroom*/ |
Jesper Dangaard Brouer | 106ca27 | 2018-04-17 16:45:37 +0200 | [diff] [blame] | 76 | }; |
Jesper Dangaard Brouer | 5ab073f | 2018-04-17 16:45:26 +0200 | [diff] [blame] | 77 | |
Jesper Dangaard Brouer | f95f0f9 | 2020-05-14 12:49:02 +0200 | [diff] [blame] | 78 | /* Reserve memory area at end-of data area. |
| 79 | * |
| 80 | * This macro reserves tailroom in the XDP buffer by limiting the |
| 81 | * XDP/BPF data access to data_hard_end. Notice same area (and size) |
| 82 | * is used for XDP_PASS, when constructing the SKB via build_skb(). |
| 83 | */ |
| 84 | #define xdp_data_hard_end(xdp) \ |
| 85 | ((xdp)->data_hard_start + (xdp)->frame_sz - \ |
| 86 | SKB_DATA_ALIGN(sizeof(struct skb_shared_info))) |
| 87 | |
Lorenzo Bianconi | 2f0bc54 | 2020-07-17 00:16:29 +0200 | [diff] [blame] | 88 | static inline struct skb_shared_info * |
| 89 | xdp_get_shared_info_from_buff(struct xdp_buff *xdp) |
| 90 | { |
| 91 | return (struct skb_shared_info *)xdp_data_hard_end(xdp); |
| 92 | } |
| 93 | |
Jesper Dangaard Brouer | c0048cf | 2018-04-17 16:45:42 +0200 | [diff] [blame] | 94 | struct xdp_frame { |
| 95 | void *data; |
| 96 | u16 len; |
| 97 | u16 headroom; |
Jesper Dangaard Brouer | 34cc0b3 | 2020-05-14 12:49:33 +0200 | [diff] [blame] | 98 | u32 metasize:8; |
| 99 | u32 frame_sz:24; |
Jesper Dangaard Brouer | c0048cf | 2018-04-17 16:45:42 +0200 | [diff] [blame] | 100 | /* Lifetime of xdp_rxq_info is limited to NAPI/enqueue time, |
| 101 | * while mem info is valid on remote CPU. |
| 102 | */ |
| 103 | struct xdp_mem_info mem; |
Jesper Dangaard Brouer | 70280ed | 2018-04-17 16:45:57 +0200 | [diff] [blame] | 104 | struct net_device *dev_rx; /* used by cpumap */ |
Jesper Dangaard Brouer | c0048cf | 2018-04-17 16:45:42 +0200 | [diff] [blame] | 105 | }; |
| 106 | |
David S. Miller | dee72f8 | 2020-07-22 12:34:55 -0700 | [diff] [blame] | 107 | |
Lorenzo Bianconi | 2f0bc54 | 2020-07-17 00:16:29 +0200 | [diff] [blame] | 108 | static inline struct skb_shared_info * |
| 109 | xdp_get_shared_info_from_frame(struct xdp_frame *frame) |
| 110 | { |
| 111 | void *data_hard_start = frame->data - frame->headroom - sizeof(*frame); |
| 112 | |
| 113 | return (struct skb_shared_info *)(data_hard_start + frame->frame_sz - |
| 114 | SKB_DATA_ALIGN(sizeof(struct skb_shared_info))); |
| 115 | } |
| 116 | |
Lorenzo Bianconi | 9216477 | 2020-07-14 15:56:38 +0200 | [diff] [blame] | 117 | struct xdp_cpumap_stats { |
Lorenzo Bianconi | 28b1520 | 2020-07-14 15:56:39 +0200 | [diff] [blame] | 118 | unsigned int redirect; |
Lorenzo Bianconi | 9216477 | 2020-07-14 15:56:38 +0200 | [diff] [blame] | 119 | unsigned int pass; |
| 120 | unsigned int drop; |
| 121 | }; |
| 122 | |
Toshiaki Makita | a8d5b4a | 2018-08-03 16:58:12 +0900 | [diff] [blame] | 123 | /* Clear kernel pointers in xdp_frame */ |
| 124 | static inline void xdp_scrub_frame(struct xdp_frame *frame) |
| 125 | { |
| 126 | frame->data = NULL; |
| 127 | frame->dev_rx = NULL; |
| 128 | } |
| 129 | |
Jesper Dangaard Brouer | 34cc0b3 | 2020-05-14 12:49:33 +0200 | [diff] [blame] | 130 | /* Avoids inlining WARN macro in fast-path */ |
| 131 | void xdp_warn(const char *msg, const char *func, const int line); |
| 132 | #define XDP_WARN(msg) xdp_warn(msg, __func__, __LINE__) |
| 133 | |
Björn Töpel | b0d1bee | 2018-08-28 14:44:25 +0200 | [diff] [blame] | 134 | struct xdp_frame *xdp_convert_zc_to_xdp_frame(struct xdp_buff *xdp); |
| 135 | |
Lorenzo Bianconi | fc37987 | 2020-05-28 22:47:28 +0200 | [diff] [blame] | 136 | static inline |
| 137 | void xdp_convert_frame_to_buff(struct xdp_frame *frame, struct xdp_buff *xdp) |
| 138 | { |
| 139 | xdp->data_hard_start = frame->data - frame->headroom - sizeof(*frame); |
| 140 | xdp->data = frame->data; |
| 141 | xdp->data_end = frame->data + frame->len; |
| 142 | xdp->data_meta = frame->data - frame->metasize; |
| 143 | xdp->frame_sz = frame->frame_sz; |
| 144 | } |
| 145 | |
Jesper Dangaard Brouer | c0048cf | 2018-04-17 16:45:42 +0200 | [diff] [blame] | 146 | static inline |
David Ahern | daa5cdc | 2020-07-14 15:56:35 +0200 | [diff] [blame] | 147 | int xdp_update_frame_from_buff(struct xdp_buff *xdp, |
| 148 | struct xdp_frame *xdp_frame) |
Jesper Dangaard Brouer | c0048cf | 2018-04-17 16:45:42 +0200 | [diff] [blame] | 149 | { |
David Ahern | daa5cdc | 2020-07-14 15:56:35 +0200 | [diff] [blame] | 150 | int metasize, headroom; |
Björn Töpel | 02b55e5 | 2018-06-04 14:05:54 +0200 | [diff] [blame] | 151 | |
Jesper Dangaard Brouer | c0048cf | 2018-04-17 16:45:42 +0200 | [diff] [blame] | 152 | /* Assure headroom is available for storing info */ |
| 153 | headroom = xdp->data - xdp->data_hard_start; |
| 154 | metasize = xdp->data - xdp->data_meta; |
| 155 | metasize = metasize > 0 ? metasize : 0; |
| 156 | if (unlikely((headroom - metasize) < sizeof(*xdp_frame))) |
David Ahern | daa5cdc | 2020-07-14 15:56:35 +0200 | [diff] [blame] | 157 | return -ENOSPC; |
Jesper Dangaard Brouer | c0048cf | 2018-04-17 16:45:42 +0200 | [diff] [blame] | 158 | |
Jesper Dangaard Brouer | 34cc0b3 | 2020-05-14 12:49:33 +0200 | [diff] [blame] | 159 | /* Catch if driver didn't reserve tailroom for skb_shared_info */ |
| 160 | if (unlikely(xdp->data_end > xdp_data_hard_end(xdp))) { |
| 161 | XDP_WARN("Driver BUG: missing reserved tailroom"); |
David Ahern | daa5cdc | 2020-07-14 15:56:35 +0200 | [diff] [blame] | 162 | return -ENOSPC; |
Jesper Dangaard Brouer | 34cc0b3 | 2020-05-14 12:49:33 +0200 | [diff] [blame] | 163 | } |
| 164 | |
Jesper Dangaard Brouer | c0048cf | 2018-04-17 16:45:42 +0200 | [diff] [blame] | 165 | xdp_frame->data = xdp->data; |
| 166 | xdp_frame->len = xdp->data_end - xdp->data; |
| 167 | xdp_frame->headroom = headroom - sizeof(*xdp_frame); |
| 168 | xdp_frame->metasize = metasize; |
Jesper Dangaard Brouer | 34cc0b3 | 2020-05-14 12:49:33 +0200 | [diff] [blame] | 169 | xdp_frame->frame_sz = xdp->frame_sz; |
Jesper Dangaard Brouer | c0048cf | 2018-04-17 16:45:42 +0200 | [diff] [blame] | 170 | |
David Ahern | daa5cdc | 2020-07-14 15:56:35 +0200 | [diff] [blame] | 171 | return 0; |
| 172 | } |
| 173 | |
| 174 | /* Convert xdp_buff to xdp_frame */ |
| 175 | static inline |
| 176 | struct xdp_frame *xdp_convert_buff_to_frame(struct xdp_buff *xdp) |
| 177 | { |
| 178 | struct xdp_frame *xdp_frame; |
| 179 | |
| 180 | if (xdp->rxq->mem.type == MEM_TYPE_XSK_BUFF_POOL) |
| 181 | return xdp_convert_zc_to_xdp_frame(xdp); |
| 182 | |
| 183 | /* Store info in top of packet */ |
| 184 | xdp_frame = xdp->data_hard_start; |
| 185 | if (unlikely(xdp_update_frame_from_buff(xdp, xdp_frame) < 0)) |
| 186 | return NULL; |
| 187 | |
Jesper Dangaard Brouer | c0048cf | 2018-04-17 16:45:42 +0200 | [diff] [blame] | 188 | /* rxq only valid until napi_schedule ends, convert to xdp_mem_info */ |
| 189 | xdp_frame->mem = xdp->rxq->mem; |
| 190 | |
| 191 | return xdp_frame; |
| 192 | } |
| 193 | |
Jesper Dangaard Brouer | 0399309 | 2018-04-17 16:46:32 +0200 | [diff] [blame] | 194 | void xdp_return_frame(struct xdp_frame *xdpf); |
Jesper Dangaard Brouer | 389ab7f | 2018-05-24 16:46:07 +0200 | [diff] [blame] | 195 | void xdp_return_frame_rx_napi(struct xdp_frame *xdpf); |
Björn Töpel | c497176 | 2018-05-02 13:01:27 +0200 | [diff] [blame] | 196 | void xdp_return_buff(struct xdp_buff *xdp); |
Jesper Dangaard Brouer | 5ab073f | 2018-04-17 16:45:26 +0200 | [diff] [blame] | 197 | |
Jesper Dangaard Brouer | 6bf071b | 2019-06-18 15:05:27 +0200 | [diff] [blame] | 198 | /* When sending xdp_frame into the network stack, then there is no |
| 199 | * return point callback, which is needed to release e.g. DMA-mapping |
| 200 | * resources with page_pool. Thus, have explicit function to release |
| 201 | * frame resources. |
| 202 | */ |
| 203 | void __xdp_release_frame(void *data, struct xdp_mem_info *mem); |
| 204 | static inline void xdp_release_frame(struct xdp_frame *xdpf) |
| 205 | { |
| 206 | struct xdp_mem_info *mem = &xdpf->mem; |
| 207 | |
| 208 | /* Curr only page_pool needs this */ |
| 209 | if (mem->type == MEM_TYPE_PAGE_POOL) |
| 210 | __xdp_release_frame(xdpf->data, mem); |
| 211 | } |
| 212 | |
Jesper Dangaard Brouer | aecd67b | 2018-01-03 11:25:13 +0100 | [diff] [blame] | 213 | int xdp_rxq_info_reg(struct xdp_rxq_info *xdp_rxq, |
| 214 | struct net_device *dev, u32 queue_index); |
| 215 | void xdp_rxq_info_unreg(struct xdp_rxq_info *xdp_rxq); |
| 216 | void xdp_rxq_info_unused(struct xdp_rxq_info *xdp_rxq); |
Jesper Dangaard Brouer | c0124f3 | 2018-01-03 11:25:34 +0100 | [diff] [blame] | 217 | bool xdp_rxq_info_is_reg(struct xdp_rxq_info *xdp_rxq); |
Jesper Dangaard Brouer | 5ab073f | 2018-04-17 16:45:26 +0200 | [diff] [blame] | 218 | int xdp_rxq_info_reg_mem_model(struct xdp_rxq_info *xdp_rxq, |
| 219 | enum xdp_mem_type type, void *allocator); |
Björn Töpel | dce5bd6 | 2018-08-28 14:44:26 +0200 | [diff] [blame] | 220 | void xdp_rxq_info_unreg_mem_model(struct xdp_rxq_info *xdp_rxq); |
Jesper Dangaard Brouer | aecd67b | 2018-01-03 11:25:13 +0100 | [diff] [blame] | 221 | |
Jesper Dangaard Brouer | 106ca27 | 2018-04-17 16:45:37 +0200 | [diff] [blame] | 222 | /* Drivers not supporting XDP metadata can use this helper, which |
| 223 | * rejects any room expansion for metadata as a result. |
| 224 | */ |
| 225 | static __always_inline void |
| 226 | xdp_set_data_meta_invalid(struct xdp_buff *xdp) |
| 227 | { |
| 228 | xdp->data_meta = xdp->data + 1; |
| 229 | } |
| 230 | |
| 231 | static __always_inline bool |
| 232 | xdp_data_meta_unsupported(const struct xdp_buff *xdp) |
| 233 | { |
| 234 | return unlikely(xdp->data_meta > xdp->data); |
| 235 | } |
| 236 | |
Jakub Kicinski | 0529662 | 2018-07-11 20:36:40 -0700 | [diff] [blame] | 237 | struct xdp_attachment_info { |
| 238 | struct bpf_prog *prog; |
| 239 | u32 flags; |
| 240 | }; |
| 241 | |
| 242 | struct netdev_bpf; |
Jakub Kicinski | 0529662 | 2018-07-11 20:36:40 -0700 | [diff] [blame] | 243 | void xdp_attachment_setup(struct xdp_attachment_info *info, |
| 244 | struct netdev_bpf *bpf); |
| 245 | |
Ioana Ciornei | 788f87a | 2020-04-22 15:05:09 +0300 | [diff] [blame] | 246 | #define DEV_MAP_BULK_SIZE 16 |
| 247 | |
Jesper Dangaard Brouer | aecd67b | 2018-01-03 11:25:13 +0100 | [diff] [blame] | 248 | #endif /* __LINUX_NET_XDP_H__ */ |