]> git.ipfire.org Git - thirdparty/linux.git/blame - net/xdp/xdp_umem.c
Merge tag 'drm/tegra/for-5.7-fixes' of git://anongit.freedesktop.org/tegra/linux...
[thirdparty/linux.git] / net / xdp / xdp_umem.c
CommitLineData
c0c77d8f
BT
1// SPDX-License-Identifier: GPL-2.0
2/* XDP user-space packet buffer
3 * Copyright(c) 2018 Intel Corporation.
c0c77d8f
BT
4 */
5
6#include <linux/init.h>
7#include <linux/sched/mm.h>
8#include <linux/sched/signal.h>
9#include <linux/sched/task.h>
10#include <linux/uaccess.h>
11#include <linux/slab.h>
12#include <linux/bpf.h>
13#include <linux/mm.h>
84c6b868
JK
14#include <linux/netdevice.h>
15#include <linux/rtnetlink.h>
50e74c01 16#include <linux/idr.h>
624676e7 17#include <linux/vmalloc.h>
c0c77d8f
BT
18
19#include "xdp_umem.h"
e61e62b9 20#include "xsk_queue.h"
c0c77d8f 21
bbff2f32 22#define XDP_UMEM_MIN_CHUNK_SIZE 2048
c0c77d8f 23
50e74c01
BT
24static DEFINE_IDA(umem_ida);
25
ac98d8aa
MK
26void xdp_add_sk_umem(struct xdp_umem *umem, struct xdp_sock *xs)
27{
28 unsigned long flags;
29
2afd23f7
MK
30 if (!xs->tx)
31 return;
32
ac98d8aa
MK
33 spin_lock_irqsave(&umem->xsk_list_lock, flags);
34 list_add_rcu(&xs->list, &umem->xsk_list);
35 spin_unlock_irqrestore(&umem->xsk_list_lock, flags);
36}
37
38void xdp_del_sk_umem(struct xdp_umem *umem, struct xdp_sock *xs)
39{
40 unsigned long flags;
41
2afd23f7
MK
42 if (!xs->tx)
43 return;
44
541d7fdd
BT
45 spin_lock_irqsave(&umem->xsk_list_lock, flags);
46 list_del_rcu(&xs->list);
47 spin_unlock_irqrestore(&umem->xsk_list_lock, flags);
ac98d8aa
MK
48}
49
c9b47cc1
MK
50/* The umem is stored both in the _rx struct and the _tx struct as we do
51 * not know if the device has more tx queues than rx, or the opposite.
52 * This might also change during run time.
53 */
cc5b5d35
KK
54static int xdp_reg_umem_at_qid(struct net_device *dev, struct xdp_umem *umem,
55 u16 queue_id)
84c6b868 56{
cc5b5d35
KK
57 if (queue_id >= max_t(unsigned int,
58 dev->real_num_rx_queues,
59 dev->real_num_tx_queues))
60 return -EINVAL;
61
c9b47cc1
MK
62 if (queue_id < dev->real_num_rx_queues)
63 dev->_rx[queue_id].umem = umem;
64 if (queue_id < dev->real_num_tx_queues)
65 dev->_tx[queue_id].umem = umem;
cc5b5d35
KK
66
67 return 0;
c9b47cc1 68}
84c6b868 69
1661d346
JK
70struct xdp_umem *xdp_get_umem_from_qid(struct net_device *dev,
71 u16 queue_id)
c9b47cc1
MK
72{
73 if (queue_id < dev->real_num_rx_queues)
74 return dev->_rx[queue_id].umem;
75 if (queue_id < dev->real_num_tx_queues)
76 return dev->_tx[queue_id].umem;
84c6b868 77
c9b47cc1
MK
78 return NULL;
79}
5f4f3b2d 80EXPORT_SYMBOL(xdp_get_umem_from_qid);
84c6b868 81
c9b47cc1
MK
82static void xdp_clear_umem_at_qid(struct net_device *dev, u16 queue_id)
83{
a41b4f3c 84 if (queue_id < dev->real_num_rx_queues)
c9b47cc1 85 dev->_rx[queue_id].umem = NULL;
a41b4f3c 86 if (queue_id < dev->real_num_tx_queues)
c9b47cc1 87 dev->_tx[queue_id].umem = NULL;
84c6b868
JK
88}
89
173d3adb 90int xdp_umem_assign_dev(struct xdp_umem *umem, struct net_device *dev,
c9b47cc1 91 u16 queue_id, u16 flags)
173d3adb
BT
92{
93 bool force_zc, force_copy;
94 struct netdev_bpf bpf;
c9b47cc1 95 int err = 0;
173d3adb 96
5464c3a0
IM
97 ASSERT_RTNL();
98
173d3adb
BT
99 force_zc = flags & XDP_ZEROCOPY;
100 force_copy = flags & XDP_COPY;
101
102 if (force_zc && force_copy)
103 return -EINVAL;
104
5464c3a0
IM
105 if (xdp_get_umem_from_qid(dev, queue_id))
106 return -EBUSY;
173d3adb 107
cc5b5d35
KK
108 err = xdp_reg_umem_at_qid(dev, umem, queue_id);
109 if (err)
5464c3a0 110 return err;
cc5b5d35 111
c9b47cc1
MK
112 umem->dev = dev;
113 umem->queue_id = queue_id;
162c820e 114
77cd0d7b
MK
115 if (flags & XDP_USE_NEED_WAKEUP) {
116 umem->flags |= XDP_UMEM_USES_NEED_WAKEUP;
117 /* Tx needs to be explicitly woken up the first time.
118 * Also for supporting drivers that do not implement this
119 * feature. They will always have to call sendto().
120 */
121 xsk_set_tx_need_wakeup(umem);
122 }
123
162c820e
IM
124 dev_hold(dev);
125
c9b47cc1
MK
126 if (force_copy)
127 /* For copy-mode, we are done. */
5464c3a0 128 return 0;
173d3adb 129
9116e5e2 130 if (!dev->netdev_ops->ndo_bpf || !dev->netdev_ops->ndo_xsk_wakeup) {
c9b47cc1
MK
131 err = -EOPNOTSUPP;
132 goto err_unreg_umem;
84c6b868 133 }
173d3adb 134
f734607e
JK
135 bpf.command = XDP_SETUP_XSK_UMEM;
136 bpf.xsk.umem = umem;
137 bpf.xsk.queue_id = queue_id;
173d3adb 138
f734607e 139 err = dev->netdev_ops->ndo_bpf(dev, &bpf);
f734607e 140 if (err)
c9b47cc1 141 goto err_unreg_umem;
173d3adb 142
f734607e
JK
143 umem->zc = true;
144 return 0;
84c6b868 145
c9b47cc1 146err_unreg_umem:
c9b47cc1
MK
147 if (!force_zc)
148 err = 0; /* fallback to copy mode */
1e405c1a
BT
149 if (err)
150 xdp_clear_umem_at_qid(dev, queue_id);
c9b47cc1 151 return err;
173d3adb
BT
152}
153
455302d1 154void xdp_umem_clear_dev(struct xdp_umem *umem)
173d3adb
BT
155{
156 struct netdev_bpf bpf;
157 int err;
158
455302d1
IM
159 ASSERT_RTNL();
160
01d76b53
IM
161 if (!umem->dev)
162 return;
163
c9b47cc1 164 if (umem->zc) {
173d3adb
BT
165 bpf.command = XDP_SETUP_XSK_UMEM;
166 bpf.xsk.umem = NULL;
167 bpf.xsk.queue_id = umem->queue_id;
168
173d3adb 169 err = umem->dev->netdev_ops->ndo_bpf(umem->dev, &bpf);
173d3adb
BT
170
171 if (err)
172 WARN(1, "failed to disable umem!\n");
c9b47cc1
MK
173 }
174
01d76b53 175 xdp_clear_umem_at_qid(umem->dev, umem->queue_id);
173d3adb 176
162c820e
IM
177 dev_put(umem->dev);
178 umem->dev = NULL;
179 umem->zc = false;
173d3adb
BT
180}
181
d9973cec
IK
182static void xdp_umem_unmap_pages(struct xdp_umem *umem)
183{
184 unsigned int i;
185
186 for (i = 0; i < umem->npgs; i++)
624676e7
IK
187 if (PageHighMem(umem->pgs[i]))
188 vunmap(umem->pages[i].addr);
189}
190
191static int xdp_umem_map_pages(struct xdp_umem *umem)
192{
193 unsigned int i;
194 void *addr;
195
196 for (i = 0; i < umem->npgs; i++) {
197 if (PageHighMem(umem->pgs[i]))
198 addr = vmap(&umem->pgs[i], 1, VM_MAP, PAGE_KERNEL);
199 else
200 addr = page_address(umem->pgs[i]);
201
202 if (!addr) {
203 xdp_umem_unmap_pages(umem);
204 return -ENOMEM;
205 }
206
207 umem->pages[i].addr = addr;
208 }
209
210 return 0;
d9973cec
IK
211}
212
c0c77d8f
BT
213static void xdp_umem_unpin_pages(struct xdp_umem *umem)
214{
f1f6a7dd 215 unpin_user_pages_dirty_lock(umem->pgs, umem->npgs, true);
a49049ea
BT
216
217 kfree(umem->pgs);
218 umem->pgs = NULL;
c0c77d8f
BT
219}
220
221static void xdp_umem_unaccount_pages(struct xdp_umem *umem)
222{
c09290c5
DB
223 if (umem->user) {
224 atomic_long_sub(umem->npgs, &umem->user->locked_vm);
225 free_uid(umem->user);
226 }
c0c77d8f
BT
227}
228
229static void xdp_umem_release(struct xdp_umem *umem)
230{
455302d1 231 rtnl_lock();
173d3adb 232 xdp_umem_clear_dev(umem);
455302d1 233 rtnl_unlock();
173d3adb 234
50e74c01
BT
235 ida_simple_remove(&umem_ida, umem->id);
236
423f3832
MK
237 if (umem->fq) {
238 xskq_destroy(umem->fq);
239 umem->fq = NULL;
240 }
241
fe230832
MK
242 if (umem->cq) {
243 xskq_destroy(umem->cq);
244 umem->cq = NULL;
245 }
246
f5bd9138
JK
247 xsk_reuseq_destroy(umem);
248
d9973cec 249 xdp_umem_unmap_pages(umem);
a49049ea 250 xdp_umem_unpin_pages(umem);
c0c77d8f 251
d3a56931 252 kvfree(umem->pages);
8aef7340
BT
253 umem->pages = NULL;
254
c0c77d8f 255 xdp_umem_unaccount_pages(umem);
c0c77d8f
BT
256 kfree(umem);
257}
258
259static void xdp_umem_release_deferred(struct work_struct *work)
260{
261 struct xdp_umem *umem = container_of(work, struct xdp_umem, work);
262
263 xdp_umem_release(umem);
264}
265
266void xdp_get_umem(struct xdp_umem *umem)
267{
d3b42f14 268 refcount_inc(&umem->users);
c0c77d8f
BT
269}
270
271void xdp_put_umem(struct xdp_umem *umem)
272{
273 if (!umem)
274 return;
275
d3b42f14 276 if (refcount_dec_and_test(&umem->users)) {
c0c77d8f
BT
277 INIT_WORK(&umem->work, xdp_umem_release_deferred);
278 schedule_work(&umem->work);
279 }
280}
281
282static int xdp_umem_pin_pages(struct xdp_umem *umem)
283{
284 unsigned int gup_flags = FOLL_WRITE;
285 long npgs;
286 int err;
287
a343993c
BT
288 umem->pgs = kcalloc(umem->npgs, sizeof(*umem->pgs),
289 GFP_KERNEL | __GFP_NOWARN);
c0c77d8f
BT
290 if (!umem->pgs)
291 return -ENOMEM;
292
e451eb51 293 down_read(&current->mm->mmap_sem);
fb48b474 294 npgs = pin_user_pages(umem->address, umem->npgs,
932f4a63 295 gup_flags | FOLL_LONGTERM, &umem->pgs[0], NULL);
e451eb51 296 up_read(&current->mm->mmap_sem);
c0c77d8f
BT
297
298 if (npgs != umem->npgs) {
299 if (npgs >= 0) {
300 umem->npgs = npgs;
301 err = -ENOMEM;
302 goto out_pin;
303 }
304 err = npgs;
305 goto out_pgs;
306 }
307 return 0;
308
309out_pin:
310 xdp_umem_unpin_pages(umem);
311out_pgs:
312 kfree(umem->pgs);
313 umem->pgs = NULL;
314 return err;
315}
316
317static int xdp_umem_account_pages(struct xdp_umem *umem)
318{
319 unsigned long lock_limit, new_npgs, old_npgs;
320
321 if (capable(CAP_IPC_LOCK))
322 return 0;
323
324 lock_limit = rlimit(RLIMIT_MEMLOCK) >> PAGE_SHIFT;
325 umem->user = get_uid(current_user());
326
327 do {
328 old_npgs = atomic_long_read(&umem->user->locked_vm);
329 new_npgs = old_npgs + umem->npgs;
330 if (new_npgs > lock_limit) {
331 free_uid(umem->user);
332 umem->user = NULL;
333 return -ENOBUFS;
334 }
335 } while (atomic_long_cmpxchg(&umem->user->locked_vm, old_npgs,
336 new_npgs) != old_npgs);
337 return 0;
338}
339
a49049ea 340static int xdp_umem_reg(struct xdp_umem *umem, struct xdp_umem_reg *mr)
c0c77d8f 341{
c05cd364 342 bool unaligned_chunks = mr->flags & XDP_UMEM_UNALIGNED_CHUNK_FLAG;
bbff2f32
BT
343 u32 chunk_size = mr->chunk_size, headroom = mr->headroom;
344 unsigned int chunks, chunks_per_page;
c0c77d8f 345 u64 addr = mr->addr, size = mr->len;
99e3a236 346 int err;
c0c77d8f 347
bbff2f32 348 if (chunk_size < XDP_UMEM_MIN_CHUNK_SIZE || chunk_size > PAGE_SIZE) {
c0c77d8f
BT
349 /* Strictly speaking we could support this, if:
350 * - huge pages, or*
351 * - using an IOMMU, or
352 * - making sure the memory area is consecutive
353 * but for now, we simply say "computer says no".
354 */
355 return -EINVAL;
356 }
357
c05cd364
KL
358 if (mr->flags & ~(XDP_UMEM_UNALIGNED_CHUNK_FLAG |
359 XDP_UMEM_USES_NEED_WAKEUP))
360 return -EINVAL;
361
362 if (!unaligned_chunks && !is_power_of_2(chunk_size))
c0c77d8f
BT
363 return -EINVAL;
364
365 if (!PAGE_ALIGNED(addr)) {
366 /* Memory area has to be page size aligned. For
367 * simplicity, this might change.
368 */
369 return -EINVAL;
370 }
371
372 if ((addr + size) < addr)
373 return -EINVAL;
374
bbff2f32
BT
375 chunks = (unsigned int)div_u64(size, chunk_size);
376 if (chunks == 0)
c0c77d8f
BT
377 return -EINVAL;
378
c05cd364
KL
379 if (!unaligned_chunks) {
380 chunks_per_page = PAGE_SIZE / chunk_size;
381 if (chunks < chunks_per_page || chunks % chunks_per_page)
382 return -EINVAL;
383 }
c0c77d8f 384
99e3a236 385 if (headroom >= chunk_size - XDP_PACKET_HEADROOM)
c0c77d8f
BT
386 return -EINVAL;
387
c0c77d8f 388 umem->address = (unsigned long)addr;
c05cd364
KL
389 umem->chunk_mask = unaligned_chunks ? XSK_UNALIGNED_BUF_ADDR_MASK
390 : ~((u64)chunk_size - 1);
93ee30f3 391 umem->size = size;
bbff2f32
BT
392 umem->headroom = headroom;
393 umem->chunk_size_nohr = chunk_size - headroom;
c0c77d8f
BT
394 umem->npgs = size / PAGE_SIZE;
395 umem->pgs = NULL;
396 umem->user = NULL;
c05cd364 397 umem->flags = mr->flags;
ac98d8aa
MK
398 INIT_LIST_HEAD(&umem->xsk_list);
399 spin_lock_init(&umem->xsk_list_lock);
c0c77d8f 400
d3b42f14 401 refcount_set(&umem->users, 1);
c0c77d8f
BT
402
403 err = xdp_umem_account_pages(umem);
404 if (err)
044175a0 405 return err;
c0c77d8f
BT
406
407 err = xdp_umem_pin_pages(umem);
408 if (err)
409 goto out_account;
8aef7340 410
d3a56931
MK
411 umem->pages = kvcalloc(umem->npgs, sizeof(*umem->pages),
412 GFP_KERNEL_ACCOUNT);
8aef7340
BT
413 if (!umem->pages) {
414 err = -ENOMEM;
fb89c394 415 goto out_pin;
8aef7340
BT
416 }
417
624676e7
IK
418 err = xdp_umem_map_pages(umem);
419 if (!err)
420 return 0;
8aef7340 421
d3a56931 422 kvfree(umem->pages);
c0c77d8f 423
fb89c394
IK
424out_pin:
425 xdp_umem_unpin_pages(umem);
c0c77d8f
BT
426out_account:
427 xdp_umem_unaccount_pages(umem);
c0c77d8f
BT
428 return err;
429}
965a9909 430
a49049ea
BT
431struct xdp_umem *xdp_umem_create(struct xdp_umem_reg *mr)
432{
433 struct xdp_umem *umem;
434 int err;
435
436 umem = kzalloc(sizeof(*umem), GFP_KERNEL);
437 if (!umem)
438 return ERR_PTR(-ENOMEM);
439
50e74c01
BT
440 err = ida_simple_get(&umem_ida, 0, 0, GFP_KERNEL);
441 if (err < 0) {
442 kfree(umem);
443 return ERR_PTR(err);
444 }
445 umem->id = err;
446
a49049ea
BT
447 err = xdp_umem_reg(umem, mr);
448 if (err) {
50e74c01 449 ida_simple_remove(&umem_ida, umem->id);
a49049ea
BT
450 kfree(umem);
451 return ERR_PTR(err);
452 }
453
454 return umem;
455}
456
965a9909
MK
457bool xdp_umem_validate_queues(struct xdp_umem *umem)
458{
da60cf00 459 return umem->fq && umem->cq;
965a9909 460}