blob: e997b263a0dd42180abf72a17be0de2ffeaad2aa [file] [log] [blame]
Björn Töpelc0c77d82018-05-02 13:01:23 +02001// SPDX-License-Identifier: GPL-2.0
2/* XDP user-space packet buffer
3 * Copyright(c) 2018 Intel Corporation.
Björn Töpelc0c77d82018-05-02 13:01:23 +02004 */
5
6#include <linux/init.h>
7#include <linux/sched/mm.h>
8#include <linux/sched/signal.h>
9#include <linux/sched/task.h>
10#include <linux/uaccess.h>
11#include <linux/slab.h>
12#include <linux/bpf.h>
13#include <linux/mm.h>
Jakub Kicinski84c6b862018-07-30 20:43:53 -070014#include <linux/netdevice.h>
15#include <linux/rtnetlink.h>
Björn Töpel50e74c02019-01-24 19:59:38 +010016#include <linux/idr.h>
Ivan Khoronzhuk624676e2019-08-15 15:13:55 +030017#include <linux/vmalloc.h>
Björn Töpelc0c77d82018-05-02 13:01:23 +020018
19#include "xdp_umem.h"
Björn Töpele61e62b92018-06-04 14:05:51 +020020#include "xsk_queue.h"
Björn Töpelc0c77d82018-05-02 13:01:23 +020021
Björn Töpelbbff2f32018-06-04 13:57:13 +020022#define XDP_UMEM_MIN_CHUNK_SIZE 2048
Björn Töpelc0c77d82018-05-02 13:01:23 +020023
Björn Töpel50e74c02019-01-24 19:59:38 +010024static DEFINE_IDA(umem_ida);
25
Magnus Karlssonac98d8a2018-06-04 14:05:57 +020026void xdp_add_sk_umem(struct xdp_umem *umem, struct xdp_sock *xs)
27{
28 unsigned long flags;
29
30 spin_lock_irqsave(&umem->xsk_list_lock, flags);
31 list_add_rcu(&xs->list, &umem->xsk_list);
32 spin_unlock_irqrestore(&umem->xsk_list_lock, flags);
33}
34
35void xdp_del_sk_umem(struct xdp_umem *umem, struct xdp_sock *xs)
36{
37 unsigned long flags;
38
Björn Töpel541d7fd2018-10-05 13:25:15 +020039 spin_lock_irqsave(&umem->xsk_list_lock, flags);
40 list_del_rcu(&xs->list);
41 spin_unlock_irqrestore(&umem->xsk_list_lock, flags);
Magnus Karlssonac98d8a2018-06-04 14:05:57 +020042}
43
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020044/* The umem is stored both in the _rx struct and the _tx struct as we do
45 * not know if the device has more tx queues than rx, or the opposite.
46 * This might also change during run time.
47 */
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +010048static int xdp_reg_umem_at_qid(struct net_device *dev, struct xdp_umem *umem,
49 u16 queue_id)
Jakub Kicinski84c6b862018-07-30 20:43:53 -070050{
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +010051 if (queue_id >= max_t(unsigned int,
52 dev->real_num_rx_queues,
53 dev->real_num_tx_queues))
54 return -EINVAL;
55
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020056 if (queue_id < dev->real_num_rx_queues)
57 dev->_rx[queue_id].umem = umem;
58 if (queue_id < dev->real_num_tx_queues)
59 dev->_tx[queue_id].umem = umem;
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +010060
61 return 0;
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020062}
Jakub Kicinski84c6b862018-07-30 20:43:53 -070063
Jakub Kicinski1661d342018-10-01 14:51:36 +020064struct xdp_umem *xdp_get_umem_from_qid(struct net_device *dev,
65 u16 queue_id)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020066{
67 if (queue_id < dev->real_num_rx_queues)
68 return dev->_rx[queue_id].umem;
69 if (queue_id < dev->real_num_tx_queues)
70 return dev->_tx[queue_id].umem;
Jakub Kicinski84c6b862018-07-30 20:43:53 -070071
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020072 return NULL;
73}
Jan Sokolowski5f4f3b22018-12-18 13:45:13 +000074EXPORT_SYMBOL(xdp_get_umem_from_qid);
Jakub Kicinski84c6b862018-07-30 20:43:53 -070075
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020076static void xdp_clear_umem_at_qid(struct net_device *dev, u16 queue_id)
77{
Magnus Karlssona41b4f32018-10-01 14:51:37 +020078 if (queue_id < dev->real_num_rx_queues)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020079 dev->_rx[queue_id].umem = NULL;
Magnus Karlssona41b4f32018-10-01 14:51:37 +020080 if (queue_id < dev->real_num_tx_queues)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020081 dev->_tx[queue_id].umem = NULL;
Jakub Kicinski84c6b862018-07-30 20:43:53 -070082}
83
Björn Töpel173d3ad2018-06-04 14:05:55 +020084int xdp_umem_assign_dev(struct xdp_umem *umem, struct net_device *dev,
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020085 u16 queue_id, u16 flags)
Björn Töpel173d3ad2018-06-04 14:05:55 +020086{
87 bool force_zc, force_copy;
88 struct netdev_bpf bpf;
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +020089 int err = 0;
Björn Töpel173d3ad2018-06-04 14:05:55 +020090
Ilya Maximets5464c3a2019-07-08 14:03:44 +030091 ASSERT_RTNL();
92
Björn Töpel173d3ad2018-06-04 14:05:55 +020093 force_zc = flags & XDP_ZEROCOPY;
94 force_copy = flags & XDP_COPY;
95
96 if (force_zc && force_copy)
97 return -EINVAL;
98
Ilya Maximets5464c3a2019-07-08 14:03:44 +030099 if (xdp_get_umem_from_qid(dev, queue_id))
100 return -EBUSY;
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200101
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +0100102 err = xdp_reg_umem_at_qid(dev, umem, queue_id);
103 if (err)
Ilya Maximets5464c3a2019-07-08 14:03:44 +0300104 return err;
Krzysztof Kazimierczakcc5b5d352019-01-10 20:29:02 +0100105
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200106 umem->dev = dev;
107 umem->queue_id = queue_id;
Ilya Maximets162c8202019-06-28 11:04:06 +0300108
Magnus Karlsson77cd0d72019-08-14 09:27:17 +0200109 if (flags & XDP_USE_NEED_WAKEUP) {
110 umem->flags |= XDP_UMEM_USES_NEED_WAKEUP;
111 /* Tx needs to be explicitly woken up the first time.
112 * Also for supporting drivers that do not implement this
113 * feature. They will always have to call sendto().
114 */
115 xsk_set_tx_need_wakeup(umem);
116 }
117
Ilya Maximets162c8202019-06-28 11:04:06 +0300118 dev_hold(dev);
119
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200120 if (force_copy)
121 /* For copy-mode, we are done. */
Ilya Maximets5464c3a2019-07-08 14:03:44 +0300122 return 0;
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200123
Magnus Karlsson9116e5e2019-08-14 09:27:16 +0200124 if (!dev->netdev_ops->ndo_bpf || !dev->netdev_ops->ndo_xsk_wakeup) {
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200125 err = -EOPNOTSUPP;
126 goto err_unreg_umem;
Jakub Kicinski84c6b862018-07-30 20:43:53 -0700127 }
Jakub Kicinskif7346072018-07-30 20:43:52 -0700128
129 bpf.command = XDP_SETUP_XSK_UMEM;
130 bpf.xsk.umem = umem;
131 bpf.xsk.queue_id = queue_id;
132
Jakub Kicinskif7346072018-07-30 20:43:52 -0700133 err = dev->netdev_ops->ndo_bpf(dev, &bpf);
Jakub Kicinskif7346072018-07-30 20:43:52 -0700134 if (err)
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200135 goto err_unreg_umem;
Jakub Kicinskif7346072018-07-30 20:43:52 -0700136
Jakub Kicinskif7346072018-07-30 20:43:52 -0700137 umem->zc = true;
138 return 0;
Jakub Kicinski84c6b862018-07-30 20:43:53 -0700139
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200140err_unreg_umem:
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200141 if (!force_zc)
142 err = 0; /* fallback to copy mode */
Björn Töpel1e405c12019-02-12 08:51:14 +0100143 if (err)
144 xdp_clear_umem_at_qid(dev, queue_id);
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200145 return err;
Björn Töpel173d3ad2018-06-04 14:05:55 +0200146}
147
Ilya Maximets455302d2019-06-28 11:04:07 +0300148void xdp_umem_clear_dev(struct xdp_umem *umem)
Björn Töpel173d3ad2018-06-04 14:05:55 +0200149{
150 struct netdev_bpf bpf;
151 int err;
152
Ilya Maximets455302d2019-06-28 11:04:07 +0300153 ASSERT_RTNL();
154
Ilya Maximets01d76b52019-06-07 20:27:32 +0300155 if (!umem->dev)
156 return;
157
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200158 if (umem->zc) {
Björn Töpel173d3ad2018-06-04 14:05:55 +0200159 bpf.command = XDP_SETUP_XSK_UMEM;
160 bpf.xsk.umem = NULL;
161 bpf.xsk.queue_id = umem->queue_id;
162
Björn Töpel173d3ad2018-06-04 14:05:55 +0200163 err = umem->dev->netdev_ops->ndo_bpf(umem->dev, &bpf);
Björn Töpel173d3ad2018-06-04 14:05:55 +0200164
165 if (err)
166 WARN(1, "failed to disable umem!\n");
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200167 }
Björn Töpel173d3ad2018-06-04 14:05:55 +0200168
Ilya Maximets01d76b52019-06-07 20:27:32 +0300169 xdp_clear_umem_at_qid(umem->dev, umem->queue_id);
Magnus Karlssonc9b47cc2018-10-01 14:51:34 +0200170
Ilya Maximets162c8202019-06-28 11:04:06 +0300171 dev_put(umem->dev);
172 umem->dev = NULL;
173 umem->zc = false;
Björn Töpel173d3ad2018-06-04 14:05:55 +0200174}
175
Ivan Khoronzhukd9973cec2019-08-08 12:38:03 +0300176static void xdp_umem_unmap_pages(struct xdp_umem *umem)
177{
178 unsigned int i;
179
180 for (i = 0; i < umem->npgs; i++)
Ivan Khoronzhuk624676e2019-08-15 15:13:55 +0300181 if (PageHighMem(umem->pgs[i]))
182 vunmap(umem->pages[i].addr);
183}
184
185static int xdp_umem_map_pages(struct xdp_umem *umem)
186{
187 unsigned int i;
188 void *addr;
189
190 for (i = 0; i < umem->npgs; i++) {
191 if (PageHighMem(umem->pgs[i]))
192 addr = vmap(&umem->pgs[i], 1, VM_MAP, PAGE_KERNEL);
193 else
194 addr = page_address(umem->pgs[i]);
195
196 if (!addr) {
197 xdp_umem_unmap_pages(umem);
198 return -ENOMEM;
199 }
200
201 umem->pages[i].addr = addr;
202 }
203
204 return 0;
Ivan Khoronzhukd9973cec2019-08-08 12:38:03 +0300205}
206
Björn Töpelc0c77d82018-05-02 13:01:23 +0200207static void xdp_umem_unpin_pages(struct xdp_umem *umem)
208{
209 unsigned int i;
210
Björn Töpela49049e2018-05-22 09:35:02 +0200211 for (i = 0; i < umem->npgs; i++) {
212 struct page *page = umem->pgs[i];
Björn Töpelc0c77d82018-05-02 13:01:23 +0200213
Björn Töpela49049e2018-05-22 09:35:02 +0200214 set_page_dirty_lock(page);
215 put_page(page);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200216 }
Björn Töpela49049e2018-05-22 09:35:02 +0200217
218 kfree(umem->pgs);
219 umem->pgs = NULL;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200220}
221
222static void xdp_umem_unaccount_pages(struct xdp_umem *umem)
223{
Daniel Borkmannc09290c2018-06-08 00:06:01 +0200224 if (umem->user) {
225 atomic_long_sub(umem->npgs, &umem->user->locked_vm);
226 free_uid(umem->user);
227 }
Björn Töpelc0c77d82018-05-02 13:01:23 +0200228}
229
230static void xdp_umem_release(struct xdp_umem *umem)
231{
Ilya Maximets455302d2019-06-28 11:04:07 +0300232 rtnl_lock();
Björn Töpel173d3ad2018-06-04 14:05:55 +0200233 xdp_umem_clear_dev(umem);
Ilya Maximets455302d2019-06-28 11:04:07 +0300234 rtnl_unlock();
Björn Töpel173d3ad2018-06-04 14:05:55 +0200235
Björn Töpel50e74c02019-01-24 19:59:38 +0100236 ida_simple_remove(&umem_ida, umem->id);
237
Magnus Karlsson423f3832018-05-02 13:01:24 +0200238 if (umem->fq) {
239 xskq_destroy(umem->fq);
240 umem->fq = NULL;
241 }
242
Magnus Karlssonfe230832018-05-02 13:01:31 +0200243 if (umem->cq) {
244 xskq_destroy(umem->cq);
245 umem->cq = NULL;
246 }
247
Jakub Kicinskif5bd9132018-09-07 10:18:46 +0200248 xsk_reuseq_destroy(umem);
249
Ivan Khoronzhukd9973cec2019-08-08 12:38:03 +0300250 xdp_umem_unmap_pages(umem);
Björn Töpela49049e2018-05-22 09:35:02 +0200251 xdp_umem_unpin_pages(umem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200252
Björn Töpel8aef7342018-06-04 14:05:52 +0200253 kfree(umem->pages);
254 umem->pages = NULL;
255
Björn Töpelc0c77d82018-05-02 13:01:23 +0200256 xdp_umem_unaccount_pages(umem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200257 kfree(umem);
258}
259
260static void xdp_umem_release_deferred(struct work_struct *work)
261{
262 struct xdp_umem *umem = container_of(work, struct xdp_umem, work);
263
264 xdp_umem_release(umem);
265}
266
267void xdp_get_umem(struct xdp_umem *umem)
268{
Björn Töpeld3b42f12018-05-22 09:35:03 +0200269 refcount_inc(&umem->users);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200270}
271
272void xdp_put_umem(struct xdp_umem *umem)
273{
274 if (!umem)
275 return;
276
Björn Töpeld3b42f12018-05-22 09:35:03 +0200277 if (refcount_dec_and_test(&umem->users)) {
Björn Töpelc0c77d82018-05-02 13:01:23 +0200278 INIT_WORK(&umem->work, xdp_umem_release_deferred);
279 schedule_work(&umem->work);
280 }
281}
282
283static int xdp_umem_pin_pages(struct xdp_umem *umem)
284{
285 unsigned int gup_flags = FOLL_WRITE;
286 long npgs;
287 int err;
288
Björn Töpela3439932018-06-11 13:57:12 +0200289 umem->pgs = kcalloc(umem->npgs, sizeof(*umem->pgs),
290 GFP_KERNEL | __GFP_NOWARN);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200291 if (!umem->pgs)
292 return -ENOMEM;
293
Davidlohr Buesoe451eb52019-02-11 08:15:29 -0800294 down_read(&current->mm->mmap_sem);
Ira Weiny932f4a62019-05-13 17:17:03 -0700295 npgs = get_user_pages(umem->address, umem->npgs,
296 gup_flags | FOLL_LONGTERM, &umem->pgs[0], NULL);
Davidlohr Buesoe451eb52019-02-11 08:15:29 -0800297 up_read(&current->mm->mmap_sem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200298
299 if (npgs != umem->npgs) {
300 if (npgs >= 0) {
301 umem->npgs = npgs;
302 err = -ENOMEM;
303 goto out_pin;
304 }
305 err = npgs;
306 goto out_pgs;
307 }
308 return 0;
309
310out_pin:
311 xdp_umem_unpin_pages(umem);
312out_pgs:
313 kfree(umem->pgs);
314 umem->pgs = NULL;
315 return err;
316}
317
318static int xdp_umem_account_pages(struct xdp_umem *umem)
319{
320 unsigned long lock_limit, new_npgs, old_npgs;
321
322 if (capable(CAP_IPC_LOCK))
323 return 0;
324
325 lock_limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT;
326 umem->user = get_uid(current_user());
327
328 do {
329 old_npgs = atomic_long_read(&umem->user->locked_vm);
330 new_npgs = old_npgs + umem->npgs;
331 if (new_npgs > lock_limit) {
332 free_uid(umem->user);
333 umem->user = NULL;
334 return -ENOBUFS;
335 }
336 } while (atomic_long_cmpxchg(&umem->user->locked_vm, old_npgs,
337 new_npgs) != old_npgs);
338 return 0;
339}
340
Björn Töpela49049e2018-05-22 09:35:02 +0200341static int xdp_umem_reg(struct xdp_umem *umem, struct xdp_umem_reg *mr)
Björn Töpelc0c77d82018-05-02 13:01:23 +0200342{
Kevin Laatzc05cd362019-08-27 02:25:22 +0000343 bool unaligned_chunks = mr->flags & XDP_UMEM_UNALIGNED_CHUNK_FLAG;
Björn Töpelbbff2f32018-06-04 13:57:13 +0200344 u32 chunk_size = mr->chunk_size, headroom = mr->headroom;
345 unsigned int chunks, chunks_per_page;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200346 u64 addr = mr->addr, size = mr->len;
Ivan Khoronzhuk624676e2019-08-15 15:13:55 +0300347 int size_chk, err;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200348
Björn Töpelbbff2f32018-06-04 13:57:13 +0200349 if (chunk_size < XDP_UMEM_MIN_CHUNK_SIZE || chunk_size > PAGE_SIZE) {
Björn Töpelc0c77d82018-05-02 13:01:23 +0200350 /* Strictly speaking we could support this, if:
351 * - huge pages, or*
352 * - using an IOMMU, or
353 * - making sure the memory area is consecutive
354 * but for now, we simply say "computer says no".
355 */
356 return -EINVAL;
357 }
358
Kevin Laatzc05cd362019-08-27 02:25:22 +0000359 if (mr->flags & ~(XDP_UMEM_UNALIGNED_CHUNK_FLAG |
360 XDP_UMEM_USES_NEED_WAKEUP))
361 return -EINVAL;
362
363 if (!unaligned_chunks && !is_power_of_2(chunk_size))
Björn Töpelc0c77d82018-05-02 13:01:23 +0200364 return -EINVAL;
365
366 if (!PAGE_ALIGNED(addr)) {
367 /* Memory area has to be page size aligned. For
368 * simplicity, this might change.
369 */
370 return -EINVAL;
371 }
372
373 if ((addr + size) < addr)
374 return -EINVAL;
375
Björn Töpelbbff2f32018-06-04 13:57:13 +0200376 chunks = (unsigned int)div_u64(size, chunk_size);
377 if (chunks == 0)
Björn Töpelc0c77d82018-05-02 13:01:23 +0200378 return -EINVAL;
379
Kevin Laatzc05cd362019-08-27 02:25:22 +0000380 if (!unaligned_chunks) {
381 chunks_per_page = PAGE_SIZE / chunk_size;
382 if (chunks < chunks_per_page || chunks % chunks_per_page)
383 return -EINVAL;
384 }
Björn Töpelc0c77d82018-05-02 13:01:23 +0200385
Björn Töpelbbff2f32018-06-04 13:57:13 +0200386 headroom = ALIGN(headroom, 64);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200387
Björn Töpelbbff2f32018-06-04 13:57:13 +0200388 size_chk = chunk_size - headroom - XDP_PACKET_HEADROOM;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200389 if (size_chk < 0)
390 return -EINVAL;
391
Björn Töpelc0c77d82018-05-02 13:01:23 +0200392 umem->address = (unsigned long)addr;
Kevin Laatzc05cd362019-08-27 02:25:22 +0000393 umem->chunk_mask = unaligned_chunks ? XSK_UNALIGNED_BUF_ADDR_MASK
394 : ~((u64)chunk_size - 1);
Magnus Karlsson93ee30f2018-08-31 13:40:02 +0200395 umem->size = size;
Björn Töpelbbff2f32018-06-04 13:57:13 +0200396 umem->headroom = headroom;
397 umem->chunk_size_nohr = chunk_size - headroom;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200398 umem->npgs = size / PAGE_SIZE;
399 umem->pgs = NULL;
400 umem->user = NULL;
Kevin Laatzc05cd362019-08-27 02:25:22 +0000401 umem->flags = mr->flags;
Magnus Karlssonac98d8a2018-06-04 14:05:57 +0200402 INIT_LIST_HEAD(&umem->xsk_list);
403 spin_lock_init(&umem->xsk_list_lock);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200404
Björn Töpeld3b42f12018-05-22 09:35:03 +0200405 refcount_set(&umem->users, 1);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200406
407 err = xdp_umem_account_pages(umem);
408 if (err)
Björn Töpel044175a2019-03-13 15:15:49 +0100409 return err;
Björn Töpelc0c77d82018-05-02 13:01:23 +0200410
411 err = xdp_umem_pin_pages(umem);
412 if (err)
413 goto out_account;
Björn Töpel8aef7342018-06-04 14:05:52 +0200414
415 umem->pages = kcalloc(umem->npgs, sizeof(*umem->pages), GFP_KERNEL);
416 if (!umem->pages) {
417 err = -ENOMEM;
418 goto out_account;
419 }
420
Ivan Khoronzhuk624676e2019-08-15 15:13:55 +0300421 err = xdp_umem_map_pages(umem);
422 if (!err)
423 return 0;
Björn Töpel8aef7342018-06-04 14:05:52 +0200424
Ivan Khoronzhuk624676e2019-08-15 15:13:55 +0300425 kfree(umem->pages);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200426
427out_account:
428 xdp_umem_unaccount_pages(umem);
Björn Töpelc0c77d82018-05-02 13:01:23 +0200429 return err;
430}
Magnus Karlsson965a9902018-05-02 13:01:26 +0200431
Björn Töpela49049e2018-05-22 09:35:02 +0200432struct xdp_umem *xdp_umem_create(struct xdp_umem_reg *mr)
433{
434 struct xdp_umem *umem;
435 int err;
436
437 umem = kzalloc(sizeof(*umem), GFP_KERNEL);
438 if (!umem)
439 return ERR_PTR(-ENOMEM);
440
Björn Töpel50e74c02019-01-24 19:59:38 +0100441 err = ida_simple_get(&umem_ida, 0, 0, GFP_KERNEL);
442 if (err < 0) {
443 kfree(umem);
444 return ERR_PTR(err);
445 }
446 umem->id = err;
447
Björn Töpela49049e2018-05-22 09:35:02 +0200448 err = xdp_umem_reg(umem, mr);
449 if (err) {
Björn Töpel50e74c02019-01-24 19:59:38 +0100450 ida_simple_remove(&umem_ida, umem->id);
Björn Töpela49049e2018-05-22 09:35:02 +0200451 kfree(umem);
452 return ERR_PTR(err);
453 }
454
455 return umem;
456}
457
Magnus Karlsson965a9902018-05-02 13:01:26 +0200458bool xdp_umem_validate_queues(struct xdp_umem *umem)
459{
Björn Töpelda60cf02018-05-18 14:00:23 +0200460 return umem->fq && umem->cq;
Magnus Karlsson965a9902018-05-02 13:01:26 +0200461}