blob: 3049af269fbf6b3fc3fc0f8d40651ba39d187ed8 [file] [log] [blame]
Björn Töpelc0c77d82018-05-02 13:01:23 +02001// SPDX-License-Identifier: GPL-2.0
2/* XDP user-space packet buffer
3 * Copyright(c) 2018 Intel Corporation.
Björn Töpelc0c77d82018-05-02 13:01:23 +02004 */
5
6#include <linux/init.h>
7#include <linux/sched/mm.h>
8#include <linux/sched/signal.h>
9#include <linux/sched/task.h>
10#include <linux/uaccess.h>
11#include <linux/slab.h>
12#include <linux/bpf.h>
13#include <linux/mm.h>
Jakub Kicinski84c6b862018-07-30 20:43:53 -070014#include <linux/netdevice.h>
15#include <linux/rtnetlink.h>
Björn Töpel50e74c02019-01-24 19:59:38 +010016#include <linux/idr.h>
Ivan Khoronzhuk624676e2019-08-15 15:13:55 +030017#include <linux/vmalloc.h>
Björn Töpelc0c77d82018-05-02 13:01:23 +020018
19#include "xdp_umem.h"
Björn Töpele61e62b92018-06-04 14:05:51 +020020#include "xsk_queue.h"
Björn Töpelc0c77d82018-05-02 13:01:23 +020021
Björn Töpelbbff2f32018-06-04 13:57:13 +020022#define XDP_UMEM_MIN_CHUNK_SIZE 2048
Björn Töpelc0c77d82018-05-02 13:01:23 +020023
Björn Töpel50e74c02019-01-24 19:59:38 +010024static DEFINE_IDA(umem_ida);
25
Magnus Karlssonac98d8a2018-06-04 14:05:57 +020026void xdp_add_sk_umem(struct xdp_umem *umem, struct xdp_sock *xs)
27{
28 unsigned long flags;
29
Magnus Karlsson2afd23f2019-10-21 10:16:58 +020030 if (!xs->tx)
31 return;
32
Magnus Karlssonac98d8a2018-06-04 14:05:57 +020033 spin_lock_irqsave(&umem->xsk_list_lock, flags);
34 list_add_rcu(&xs->list, &umem->xsk_list);
35 spin_unlock_irqrestore(&umem->xsk_list_lock, flags);
36}
37
38void xdp_del_sk_umem(struct xdp_umem *umem, struct xdp_sock *xs)
39{
40 unsigned long flags;
41
Magnus Karlsson2afd23f2019-10-21 10:16:58 +020042 if (!xs->tx)
43 return;
44
Björn Töpel541d7fd2018-10-05 13:25:15 +020045 spin_lock_irqsave(&umem->xsk_list_lock, flags);
46 list_del_rcu(&xs->list);
47 spin_unlock_irqrestore(&umem->xsk_list_lock, flags);
Magnus Karlssonac98d8a2018-06-04 14:05:57 +020048}
49
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020050/* The umem is stored both in the _rx struct and the _tx struct as we do
51 * not know if the device has more tx queues than rx, or the opposite.
52 * This might also change during run time.
53 */
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +010054static int xdp_reg_umem_at_qid(struct net_device *dev, struct xdp_umem *umem,
55 u16 queue_id)
Jakub Kicinski84c6b862018-07-30 20:43:53 -070056{
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +010057 if (queue_id >= max_t(unsigned int,
58 dev->real_num_rx_queues,
59 dev->real_num_tx_queues))
60 return -EINVAL;
61
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020062 if (queue_id < dev->real_num_rx_queues)
63 dev->_rx[queue_id].umem = umem;
64 if (queue_id < dev->real_num_tx_queues)
65 dev->_tx[queue_id].umem = umem;
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +010066
67 return 0;
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020068}
Jakub Kicinski84c6b862018-07-30 20:43:53 -070069
Jakub Kicinski1661d342018-10-01 14:51:36 +020070struct xdp_umem *xdp_get_umem_from_qid(struct net_device *dev,
71 u16 queue_id)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020072{
73 if (queue_id < dev->real_num_rx_queues)
74 return dev->_rx[queue_id].umem;
75 if (queue_id < dev->real_num_tx_queues)
76 return dev->_tx[queue_id].umem;
Jakub Kicinski84c6b862018-07-30 20:43:53 -070077
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020078 return NULL;
79}
Jan Sokolowski5f4f3b22018-12-18 13:45:13 +000080EXPORT_SYMBOL(xdp_get_umem_from_qid);
Jakub Kicinski84c6b862018-07-30 20:43:53 -070081
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020082static void xdp_clear_umem_at_qid(struct net_device *dev, u16 queue_id)
83{
Magnus Karlssona41b4f32018-10-01 14:51:37 +020084 if (queue_id < dev->real_num_rx_queues)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020085 dev->_rx[queue_id].umem = NULL;
Magnus Karlssona41b4f32018-10-01 14:51:37 +020086 if (queue_id < dev->real_num_tx_queues)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020087 dev->_tx[queue_id].umem = NULL;
Jakub Kicinski84c6b862018-07-30 20:43:53 -070088}
89
Björn Töpel173d3ad2018-06-04 14:05:55 +020090int xdp_umem_assign_dev(struct xdp_umem *umem, struct net_device *dev,
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020091 u16 queue_id, u16 flags)
Björn Töpel173d3ad2018-06-04 14:05:55 +020092{
93 bool force_zc, force_copy;
94 struct netdev_bpf bpf;
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020095 int err = 0;
Björn Töpel173d3ad2018-06-04 14:05:55 +020096
Ilya Maximets5464c3a2019-07-08 14:03:44 +030097 ASSERT_RTNL();
98
Björn Töpel173d3ad2018-06-04 14:05:55 +020099 force_zc = flags & XDP_ZEROCOPY;
100 force_copy = flags & XDP_COPY;
101
102 if (force_zc && force_copy)
103 return -EINVAL;
104
Ilya Maximets5464c3a2019-07-08 14:03:44 +0300105 if (xdp_get_umem_from_qid(dev, queue_id))
106 return -EBUSY;
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200107
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +0100108 err = xdp_reg_umem_at_qid(dev, umem, queue_id);
109 if (err)
Ilya Maximets5464c3a2019-07-08 14:03:44 +0300110 return err;
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +0100111
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200112 umem->dev = dev;
113 umem->queue_id = queue_id;
Ilya Maximets162c8202019-06-28 11:04:06 +0300114
Magnus Karlsson77cd0d72019-08-14 09:27:17 +0200115 if (flags & XDP_USE_NEED_WAKEUP) {
116 umem->flags |= XDP_UMEM_USES_NEED_WAKEUP;
117 /* Tx needs to be explicitly woken up the first time.
118 * Also for supporting drivers that do not implement this
119 * feature. They will always have to call sendto().
120 */
121 xsk_set_tx_need_wakeup(umem);
122 }
123
Ilya Maximets162c8202019-06-28 11:04:06 +0300124 dev_hold(dev);
125
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200126 if (force_copy)
127 /* For copy-mode, we are done. */
Ilya Maximets5464c3a2019-07-08 14:03:44 +0300128 return 0;
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200129
Magnus Karlsson9116e5e2019-08-14 09:27:16 +0200130 if (!dev->netdev_ops->ndo_bpf || !dev->netdev_ops->ndo_xsk_wakeup) {
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200131 err = -EOPNOTSUPP;
132 goto err_unreg_umem;
Jakub Kicinski84c6b862018-07-30 20:43:53 -0700133 }
Jakub Kicinskif7346072018-07-30 20:43:52 -0700134
135 bpf.command = XDP_SETUP_XSK_UMEM;
136 bpf.xsk.umem = umem;
137 bpf.xsk.queue_id = queue_id;
138
Jakub Kicinskif7346072018-07-30 20:43:52 -0700139 err = dev->netdev_ops->ndo_bpf(dev, &bpf);
Jakub Kicinskif7346072018-07-30 20:43:52 -0700140 if (err)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200141 goto err_unreg_umem;
Jakub Kicinskif7346072018-07-30 20:43:52 -0700142
Jakub Kicinskif7346072018-07-30 20:43:52 -0700143 umem->zc = true;
144 return 0;
Jakub Kicinski84c6b862018-07-30 20:43:53 -0700145
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200146err_unreg_umem:
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200147 if (!force_zc)
148 err = 0; /* fallback to copy mode */
Björn Töpel1e405c12019-02-12 08:51:14 +0100149 if (err)
150 xdp_clear_umem_at_qid(dev, queue_id);
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200151 return err;
Björn Töpel173d3ad2018-06-04 14:05:55 +0200152}
153
Ilya Maximets455302d2019-06-28 11:04:07 +0300154void xdp_umem_clear_dev(struct xdp_umem *umem)
Björn Töpel173d3ad2018-06-04 14:05:55 +0200155{
156 struct netdev_bpf bpf;
157 int err;
158
Ilya Maximets455302d2019-06-28 11:04:07 +0300159 ASSERT_RTNL();
160
Ilya Maximets01d76b52019-06-07 20:27:32 +0300161 if (!umem->dev)
162 return;
163
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200164 if (umem->zc) {
Björn Töpel173d3ad2018-06-04 14:05:55 +0200165 bpf.command = XDP_SETUP_XSK_UMEM;
166 bpf.xsk.umem = NULL;
167 bpf.xsk.queue_id = umem->queue_id;
168
Björn Töpel173d3ad2018-06-04 14:05:55 +0200169 err = umem->dev->netdev_ops->ndo_bpf(umem->dev, &bpf);
Björn Töpel173d3ad2018-06-04 14:05:55 +0200170
171 if (err)
172 WARN(1, "failed to disable umem!\n");
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200173 }
Björn Töpel173d3ad2018-06-04 14:05:55 +0200174
Ilya Maximets01d76b52019-06-07 20:27:32 +0300175 xdp_clear_umem_at_qid(umem->dev, umem->queue_id);
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200176
Ilya Maximets162c8202019-06-28 11:04:06 +0300177 dev_put(umem->dev);
178 umem->dev = NULL;
179 umem->zc = false;
Björn Töpel173d3ad2018-06-04 14:05:55 +0200180}
181
Ivan Khoronzhukd9973cec2019-08-08 12:38:03 +0300182static void xdp_umem_unmap_pages(struct xdp_umem *umem)
183{
184 unsigned int i;
185
186 for (i = 0; i < umem->npgs; i++)
Ivan Khoronzhuk624676e2019-08-15 15:13:55 +0300187 if (PageHighMem(umem->pgs[i]))
188 vunmap(umem->pages[i].addr);
189}
190
191static int xdp_umem_map_pages(struct xdp_umem *umem)
192{
193 unsigned int i;
194 void *addr;
195
196 for (i = 0; i < umem->npgs; i++) {
197 if (PageHighMem(umem->pgs[i]))
198 addr = vmap(&umem->pgs[i], 1, VM_MAP, PAGE_KERNEL);
199 else
200 addr = page_address(umem->pgs[i]);
201
202 if (!addr) {
203 xdp_umem_unmap_pages(umem);
204 return -ENOMEM;
205 }
206
207 umem->pages[i].addr = addr;
208 }
209
210 return 0;
Ivan Khoronzhukd9973cec2019-08-08 12:38:03 +0300211}
212
Björn Töpelc0c77d82018-05-02 13:01:23 +0200213static void xdp_umem_unpin_pages(struct xdp_umem *umem)
214{
John Hubbard1edc9762019-09-23 15:35:10 -0700215 put_user_pages_dirty_lock(umem->pgs, umem->npgs, true);
Björn Töpela49049e2018-05-22 09:35:02 +0200216
217 kfree(umem->pgs);
218 umem->pgs = NULL;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200219}
220
221static void xdp_umem_unaccount_pages(struct xdp_umem *umem)
222{
Daniel Borkmannc09290c2018-06-08 00:06:01 +0200223 if (umem->user) {
224 atomic_long_sub(umem->npgs, &umem->user->locked_vm);
225 free_uid(umem->user);
226 }
Björn Töpelc0c77d82018-05-02 13:01:23 +0200227}
228
229static void xdp_umem_release(struct xdp_umem *umem)
230{
Ilya Maximets455302d2019-06-28 11:04:07 +0300231 rtnl_lock();
Björn Töpel173d3ad2018-06-04 14:05:55 +0200232 xdp_umem_clear_dev(umem);
Ilya Maximets455302d2019-06-28 11:04:07 +0300233 rtnl_unlock();
Björn Töpel173d3ad2018-06-04 14:05:55 +0200234
Björn Töpel50e74c02019-01-24 19:59:38 +0100235 ida_simple_remove(&umem_ida, umem->id);
236
Magnus Karlsson423f3832018-05-02 13:01:24 +0200237 if (umem->fq) {
238 xskq_destroy(umem->fq);
239 umem->fq = NULL;
240 }
241
Magnus Karlssonfe230832018-05-02 13:01:31 +0200242 if (umem->cq) {
243 xskq_destroy(umem->cq);
244 umem->cq = NULL;
245 }
246
Jakub Kicinskif5bd9132018-09-07 10:18:46 +0200247 xsk_reuseq_destroy(umem);
248
Ivan Khoronzhukd9973cec2019-08-08 12:38:03 +0300249 xdp_umem_unmap_pages(umem);
Björn Töpela49049e2018-05-22 09:35:02 +0200250 xdp_umem_unpin_pages(umem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200251
Björn Töpel8aef7342018-06-04 14:05:52 +0200252 kfree(umem->pages);
253 umem->pages = NULL;
254
Björn Töpelc0c77d82018-05-02 13:01:23 +0200255 xdp_umem_unaccount_pages(umem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200256 kfree(umem);
257}
258
259static void xdp_umem_release_deferred(struct work_struct *work)
260{
261 struct xdp_umem *umem = container_of(work, struct xdp_umem, work);
262
263 xdp_umem_release(umem);
264}
265
266void xdp_get_umem(struct xdp_umem *umem)
267{
Björn Töpeld3b42f12018-05-22 09:35:03 +0200268 refcount_inc(&umem->users);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200269}
270
271void xdp_put_umem(struct xdp_umem *umem)
272{
273 if (!umem)
274 return;
275
Björn Töpeld3b42f12018-05-22 09:35:03 +0200276 if (refcount_dec_and_test(&umem->users)) {
Björn Töpelc0c77d82018-05-02 13:01:23 +0200277 INIT_WORK(&umem->work, xdp_umem_release_deferred);
278 schedule_work(&umem->work);
279 }
280}
281
282static int xdp_umem_pin_pages(struct xdp_umem *umem)
283{
284 unsigned int gup_flags = FOLL_WRITE;
285 long npgs;
286 int err;
287
Björn Töpela3439932018-06-11 13:57:12 +0200288 umem->pgs = kcalloc(umem->npgs, sizeof(*umem->pgs),
289 GFP_KERNEL | __GFP_NOWARN);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200290 if (!umem->pgs)
291 return -ENOMEM;
292
Davidlohr Buesoe451eb52019-02-11 08:15:29 -0800293 down_read(&current->mm->mmap_sem);
Ira Weiny932f4a62019-05-13 17:17:03 -0700294 npgs = get_user_pages(umem->address, umem->npgs,
295 gup_flags | FOLL_LONGTERM, &umem->pgs[0], NULL);
Davidlohr Buesoe451eb52019-02-11 08:15:29 -0800296 up_read(&current->mm->mmap_sem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200297
298 if (npgs != umem->npgs) {
299 if (npgs >= 0) {
300 umem->npgs = npgs;
301 err = -ENOMEM;
302 goto out_pin;
303 }
304 err = npgs;
305 goto out_pgs;
306 }
307 return 0;
308
309out_pin:
310 xdp_umem_unpin_pages(umem);
311out_pgs:
312 kfree(umem->pgs);
313 umem->pgs = NULL;
314 return err;
315}
316
317static int xdp_umem_account_pages(struct xdp_umem *umem)
318{
319 unsigned long lock_limit, new_npgs, old_npgs;
320
321 if (capable(CAP_IPC_LOCK))
322 return 0;
323
324 lock_limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT;
325 umem->user = get_uid(current_user());
326
327 do {
328 old_npgs = atomic_long_read(&umem->user->locked_vm);
329 new_npgs = old_npgs + umem->npgs;
330 if (new_npgs > lock_limit) {
331 free_uid(umem->user);
332 umem->user = NULL;
333 return -ENOBUFS;
334 }
335 } while (atomic_long_cmpxchg(&umem->user->locked_vm, old_npgs,
336 new_npgs) != old_npgs);
337 return 0;
338}
339
Björn Töpela49049e2018-05-22 09:35:02 +0200340static int xdp_umem_reg(struct xdp_umem *umem, struct xdp_umem_reg *mr)
Björn Töpelc0c77d82018-05-02 13:01:23 +0200341{
Kevin Laatzc05cd362019-08-27 02:25:22 +0000342 bool unaligned_chunks = mr->flags & XDP_UMEM_UNALIGNED_CHUNK_FLAG;
Björn Töpelbbff2f32018-06-04 13:57:13 +0200343 u32 chunk_size = mr->chunk_size, headroom = mr->headroom;
344 unsigned int chunks, chunks_per_page;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200345 u64 addr = mr->addr, size = mr->len;
Ivan Khoronzhuk624676e2019-08-15 15:13:55 +0300346 int size_chk, err;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200347
Björn Töpelbbff2f32018-06-04 13:57:13 +0200348 if (chunk_size < XDP_UMEM_MIN_CHUNK_SIZE || chunk_size > PAGE_SIZE) {
Björn Töpelc0c77d82018-05-02 13:01:23 +0200349 /* Strictly speaking we could support this, if:
350 * - huge pages, or*
351 * - using an IOMMU, or
352 * - making sure the memory area is consecutive
353 * but for now, we simply say "computer says no".
354 */
355 return -EINVAL;
356 }
357
Kevin Laatzc05cd362019-08-27 02:25:22 +0000358 if (mr->flags & ~(XDP_UMEM_UNALIGNED_CHUNK_FLAG |
359 XDP_UMEM_USES_NEED_WAKEUP))
360 return -EINVAL;
361
362 if (!unaligned_chunks && !is_power_of_2(chunk_size))
Björn Töpelc0c77d82018-05-02 13:01:23 +0200363 return -EINVAL;
364
365 if (!PAGE_ALIGNED(addr)) {
366 /* Memory area has to be page size aligned. For
367 * simplicity, this might change.
368 */
369 return -EINVAL;
370 }
371
372 if ((addr + size) < addr)
373 return -EINVAL;
374
Björn Töpelbbff2f32018-06-04 13:57:13 +0200375 chunks = (unsigned int)div_u64(size, chunk_size);
376 if (chunks == 0)
Björn Töpelc0c77d82018-05-02 13:01:23 +0200377 return -EINVAL;
378
Kevin Laatzc05cd362019-08-27 02:25:22 +0000379 if (!unaligned_chunks) {
380 chunks_per_page = PAGE_SIZE / chunk_size;
381 if (chunks < chunks_per_page || chunks % chunks_per_page)
382 return -EINVAL;
383 }
Björn Töpelc0c77d82018-05-02 13:01:23 +0200384
Björn Töpelbbff2f32018-06-04 13:57:13 +0200385 size_chk = chunk_size - headroom - XDP_PACKET_HEADROOM;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200386 if (size_chk < 0)
387 return -EINVAL;
388
Björn Töpelc0c77d82018-05-02 13:01:23 +0200389 umem->address = (unsigned long)addr;
Kevin Laatzc05cd362019-08-27 02:25:22 +0000390 umem->chunk_mask = unaligned_chunks ? XSK_UNALIGNED_BUF_ADDR_MASK
391 : ~((u64)chunk_size - 1);
Magnus Karlsson93ee30f2018-08-31 13:40:02 +0200392 umem->size = size;
Björn Töpelbbff2f32018-06-04 13:57:13 +0200393 umem->headroom = headroom;
394 umem->chunk_size_nohr = chunk_size - headroom;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200395 umem->npgs = size / PAGE_SIZE;
396 umem->pgs = NULL;
397 umem->user = NULL;
Kevin Laatzc05cd362019-08-27 02:25:22 +0000398 umem->flags = mr->flags;
Magnus Karlssonac98d8a2018-06-04 14:05:57 +0200399 INIT_LIST_HEAD(&umem->xsk_list);
400 spin_lock_init(&umem->xsk_list_lock);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200401
Björn Töpeld3b42f12018-05-22 09:35:03 +0200402 refcount_set(&umem->users, 1);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200403
404 err = xdp_umem_account_pages(umem);
405 if (err)
Björn Töpel044175a2019-03-13 15:15:49 +0100406 return err;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200407
408 err = xdp_umem_pin_pages(umem);
409 if (err)
410 goto out_account;
Björn Töpel8aef7342018-06-04 14:05:52 +0200411
412 umem->pages = kcalloc(umem->npgs, sizeof(*umem->pages), GFP_KERNEL);
413 if (!umem->pages) {
414 err = -ENOMEM;
Ivan Khoronzhukfb89c392019-08-15 23:56:35 +0300415 goto out_pin;
Björn Töpel8aef7342018-06-04 14:05:52 +0200416 }
417
Ivan Khoronzhuk624676e2019-08-15 15:13:55 +0300418 err = xdp_umem_map_pages(umem);
419 if (!err)
420 return 0;
Björn Töpel8aef7342018-06-04 14:05:52 +0200421
Ivan Khoronzhuk624676e2019-08-15 15:13:55 +0300422 kfree(umem->pages);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200423
Ivan Khoronzhukfb89c392019-08-15 23:56:35 +0300424out_pin:
425 xdp_umem_unpin_pages(umem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200426out_account:
427 xdp_umem_unaccount_pages(umem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200428 return err;
429}
Magnus Karlsson965a9902018-05-02 13:01:26 +0200430
Björn Töpela49049e2018-05-22 09:35:02 +0200431struct xdp_umem *xdp_umem_create(struct xdp_umem_reg *mr)
432{
433 struct xdp_umem *umem;
434 int err;
435
436 umem = kzalloc(sizeof(*umem), GFP_KERNEL);
437 if (!umem)
438 return ERR_PTR(-ENOMEM);
439
Björn Töpel50e74c02019-01-24 19:59:38 +0100440 err = ida_simple_get(&umem_ida, 0, 0, GFP_KERNEL);
441 if (err < 0) {
442 kfree(umem);
443 return ERR_PTR(err);
444 }
445 umem->id = err;
446
Björn Töpela49049e2018-05-22 09:35:02 +0200447 err = xdp_umem_reg(umem, mr);
448 if (err) {
Björn Töpel50e74c02019-01-24 19:59:38 +0100449 ida_simple_remove(&umem_ida, umem->id);
Björn Töpela49049e2018-05-22 09:35:02 +0200450 kfree(umem);
451 return ERR_PTR(err);
452 }
453
454 return umem;
455}
456
Magnus Karlsson965a9902018-05-02 13:01:26 +0200457bool xdp_umem_validate_queues(struct xdp_umem *umem)
458{
Björn Töpelda60cf02018-05-18 14:00:23 +0200459 return umem->fq && umem->cq;
Magnus Karlsson965a9902018-05-02 13:01:26 +0200460}