af_xdp.rst (26106B)
1.. SPDX-License-Identifier: GPL-2.0 2 3====== 4AF_XDP 5====== 6 7Overview 8======== 9 10AF_XDP is an address family that is optimized for high performance 11packet processing. 12 13This document assumes that the reader is familiar with BPF and XDP. If 14not, the Cilium project has an excellent reference guide at 15http://cilium.readthedocs.io/en/latest/bpf/. 16 17Using the XDP_REDIRECT action from an XDP program, the program can 18redirect ingress frames to other XDP enabled netdevs, using the 19bpf_redirect_map() function. AF_XDP sockets enable the possibility for 20XDP programs to redirect frames to a memory buffer in a user-space 21application. 22 23An AF_XDP socket (XSK) is created with the normal socket() 24syscall. Associated with each XSK are two rings: the RX ring and the 25TX ring. A socket can receive packets on the RX ring and it can send 26packets on the TX ring. These rings are registered and sized with the 27setsockopts XDP_RX_RING and XDP_TX_RING, respectively. It is mandatory 28to have at least one of these rings for each socket. An RX or TX 29descriptor ring points to a data buffer in a memory area called a 30UMEM. RX and TX can share the same UMEM so that a packet does not have 31to be copied between RX and TX. Moreover, if a packet needs to be kept 32for a while due to a possible retransmit, the descriptor that points 33to that packet can be changed to point to another and reused right 34away. This again avoids copying data. 35 36The UMEM consists of a number of equally sized chunks. A descriptor in 37one of the rings references a frame by referencing its addr. The addr 38is simply an offset within the entire UMEM region. The user space 39allocates memory for this UMEM using whatever means it feels is most 40appropriate (malloc, mmap, huge pages, etc). This memory area is then 41registered with the kernel using the new setsockopt XDP_UMEM_REG. The 42UMEM also has two rings: the FILL ring and the COMPLETION ring. The 43FILL ring is used by the application to send down addr for the kernel 44to fill in with RX packet data. References to these frames will then 45appear in the RX ring once each packet has been received. The 46COMPLETION ring, on the other hand, contains frame addr that the 47kernel has transmitted completely and can now be used again by user 48space, for either TX or RX. Thus, the frame addrs appearing in the 49COMPLETION ring are addrs that were previously transmitted using the 50TX ring. In summary, the RX and FILL rings are used for the RX path 51and the TX and COMPLETION rings are used for the TX path. 52 53The socket is then finally bound with a bind() call to a device and a 54specific queue id on that device, and it is not until bind is 55completed that traffic starts to flow. 56 57The UMEM can be shared between processes, if desired. If a process 58wants to do this, it simply skips the registration of the UMEM and its 59corresponding two rings, sets the XDP_SHARED_UMEM flag in the bind 60call and submits the XSK of the process it would like to share UMEM 61with as well as its own newly created XSK socket. The new process will 62then receive frame addr references in its own RX ring that point to 63this shared UMEM. Note that since the ring structures are 64single-consumer / single-producer (for performance reasons), the new 65process has to create its own socket with associated RX and TX rings, 66since it cannot share this with the other process. This is also the 67reason that there is only one set of FILL and COMPLETION rings per 68UMEM. It is the responsibility of a single process to handle the UMEM. 69 70How is then packets distributed from an XDP program to the XSKs? There 71is a BPF map called XSKMAP (or BPF_MAP_TYPE_XSKMAP in full). The 72user-space application can place an XSK at an arbitrary place in this 73map. The XDP program can then redirect a packet to a specific index in 74this map and at this point XDP validates that the XSK in that map was 75indeed bound to that device and ring number. If not, the packet is 76dropped. If the map is empty at that index, the packet is also 77dropped. This also means that it is currently mandatory to have an XDP 78program loaded (and one XSK in the XSKMAP) to be able to get any 79traffic to user space through the XSK. 80 81AF_XDP can operate in two different modes: XDP_SKB and XDP_DRV. If the 82driver does not have support for XDP, or XDP_SKB is explicitly chosen 83when loading the XDP program, XDP_SKB mode is employed that uses SKBs 84together with the generic XDP support and copies out the data to user 85space. A fallback mode that works for any network device. On the other 86hand, if the driver has support for XDP, it will be used by the AF_XDP 87code to provide better performance, but there is still a copy of the 88data into user space. 89 90Concepts 91======== 92 93In order to use an AF_XDP socket, a number of associated objects need 94to be setup. These objects and their options are explained in the 95following sections. 96 97For an overview on how AF_XDP works, you can also take a look at the 98Linux Plumbers paper from 2018 on the subject: 99http://vger.kernel.org/lpc_net2018_talks/lpc18_paper_af_xdp_perf-v2.pdf. Do 100NOT consult the paper from 2017 on "AF_PACKET v4", the first attempt 101at AF_XDP. Nearly everything changed since then. Jonathan Corbet has 102also written an excellent article on LWN, "Accelerating networking 103with AF_XDP". It can be found at https://lwn.net/Articles/750845/. 104 105UMEM 106---- 107 108UMEM is a region of virtual contiguous memory, divided into 109equal-sized frames. An UMEM is associated to a netdev and a specific 110queue id of that netdev. It is created and configured (chunk size, 111headroom, start address and size) by using the XDP_UMEM_REG setsockopt 112system call. A UMEM is bound to a netdev and queue id, via the bind() 113system call. 114 115An AF_XDP is socket linked to a single UMEM, but one UMEM can have 116multiple AF_XDP sockets. To share an UMEM created via one socket A, 117the next socket B can do this by setting the XDP_SHARED_UMEM flag in 118struct sockaddr_xdp member sxdp_flags, and passing the file descriptor 119of A to struct sockaddr_xdp member sxdp_shared_umem_fd. 120 121The UMEM has two single-producer/single-consumer rings that are used 122to transfer ownership of UMEM frames between the kernel and the 123user-space application. 124 125Rings 126----- 127 128There are a four different kind of rings: FILL, COMPLETION, RX and 129TX. All rings are single-producer/single-consumer, so the user-space 130application need explicit synchronization of multiple 131processes/threads are reading/writing to them. 132 133The UMEM uses two rings: FILL and COMPLETION. Each socket associated 134with the UMEM must have an RX queue, TX queue or both. Say, that there 135is a setup with four sockets (all doing TX and RX). Then there will be 136one FILL ring, one COMPLETION ring, four TX rings and four RX rings. 137 138The rings are head(producer)/tail(consumer) based rings. A producer 139writes the data ring at the index pointed out by struct xdp_ring 140producer member, and increasing the producer index. A consumer reads 141the data ring at the index pointed out by struct xdp_ring consumer 142member, and increasing the consumer index. 143 144The rings are configured and created via the _RING setsockopt system 145calls and mmapped to user-space using the appropriate offset to mmap() 146(XDP_PGOFF_RX_RING, XDP_PGOFF_TX_RING, XDP_UMEM_PGOFF_FILL_RING and 147XDP_UMEM_PGOFF_COMPLETION_RING). 148 149The size of the rings need to be of size power of two. 150 151UMEM Fill Ring 152~~~~~~~~~~~~~~ 153 154The FILL ring is used to transfer ownership of UMEM frames from 155user-space to kernel-space. The UMEM addrs are passed in the ring. As 156an example, if the UMEM is 64k and each chunk is 4k, then the UMEM has 15716 chunks and can pass addrs between 0 and 64k. 158 159Frames passed to the kernel are used for the ingress path (RX rings). 160 161The user application produces UMEM addrs to this ring. Note that, if 162running the application with aligned chunk mode, the kernel will mask 163the incoming addr. E.g. for a chunk size of 2k, the log2(2048) LSB of 164the addr will be masked off, meaning that 2048, 2050 and 3000 refers 165to the same chunk. If the user application is run in the unaligned 166chunks mode, then the incoming addr will be left untouched. 167 168 169UMEM Completion Ring 170~~~~~~~~~~~~~~~~~~~~ 171 172The COMPLETION Ring is used transfer ownership of UMEM frames from 173kernel-space to user-space. Just like the FILL ring, UMEM indices are 174used. 175 176Frames passed from the kernel to user-space are frames that has been 177sent (TX ring) and can be used by user-space again. 178 179The user application consumes UMEM addrs from this ring. 180 181 182RX Ring 183~~~~~~~ 184 185The RX ring is the receiving side of a socket. Each entry in the ring 186is a struct xdp_desc descriptor. The descriptor contains UMEM offset 187(addr) and the length of the data (len). 188 189If no frames have been passed to kernel via the FILL ring, no 190descriptors will (or can) appear on the RX ring. 191 192The user application consumes struct xdp_desc descriptors from this 193ring. 194 195TX Ring 196~~~~~~~ 197 198The TX ring is used to send frames. The struct xdp_desc descriptor is 199filled (index, length and offset) and passed into the ring. 200 201To start the transfer a sendmsg() system call is required. This might 202be relaxed in the future. 203 204The user application produces struct xdp_desc descriptors to this 205ring. 206 207Libbpf 208====== 209 210Libbpf is a helper library for eBPF and XDP that makes using these 211technologies a lot simpler. It also contains specific helper functions 212in tools/lib/bpf/xsk.h for facilitating the use of AF_XDP. It 213contains two types of functions: those that can be used to make the 214setup of AF_XDP socket easier and ones that can be used in the data 215plane to access the rings safely and quickly. To see an example on how 216to use this API, please take a look at the sample application in 217samples/bpf/xdpsock_usr.c which uses libbpf for both setup and data 218plane operations. 219 220We recommend that you use this library unless you have become a power 221user. It will make your program a lot simpler. 222 223XSKMAP / BPF_MAP_TYPE_XSKMAP 224============================ 225 226On XDP side there is a BPF map type BPF_MAP_TYPE_XSKMAP (XSKMAP) that 227is used in conjunction with bpf_redirect_map() to pass the ingress 228frame to a socket. 229 230The user application inserts the socket into the map, via the bpf() 231system call. 232 233Note that if an XDP program tries to redirect to a socket that does 234not match the queue configuration and netdev, the frame will be 235dropped. E.g. an AF_XDP socket is bound to netdev eth0 and 236queue 17. Only the XDP program executing for eth0 and queue 17 will 237successfully pass data to the socket. Please refer to the sample 238application (samples/bpf/) in for an example. 239 240Configuration Flags and Socket Options 241====================================== 242 243These are the various configuration flags that can be used to control 244and monitor the behavior of AF_XDP sockets. 245 246XDP_COPY and XDP_ZEROCOPY bind flags 247------------------------------------ 248 249When you bind to a socket, the kernel will first try to use zero-copy 250copy. If zero-copy is not supported, it will fall back on using copy 251mode, i.e. copying all packets out to user space. But if you would 252like to force a certain mode, you can use the following flags. If you 253pass the XDP_COPY flag to the bind call, the kernel will force the 254socket into copy mode. If it cannot use copy mode, the bind call will 255fail with an error. Conversely, the XDP_ZEROCOPY flag will force the 256socket into zero-copy mode or fail. 257 258XDP_SHARED_UMEM bind flag 259------------------------- 260 261This flag enables you to bind multiple sockets to the same UMEM. It 262works on the same queue id, between queue ids and between 263netdevs/devices. In this mode, each socket has their own RX and TX 264rings as usual, but you are going to have one or more FILL and 265COMPLETION ring pairs. You have to create one of these pairs per 266unique netdev and queue id tuple that you bind to. 267 268Starting with the case were we would like to share a UMEM between 269sockets bound to the same netdev and queue id. The UMEM (tied to the 270fist socket created) will only have a single FILL ring and a single 271COMPLETION ring as there is only on unique netdev,queue_id tuple that 272we have bound to. To use this mode, create the first socket and bind 273it in the normal way. Create a second socket and create an RX and a TX 274ring, or at least one of them, but no FILL or COMPLETION rings as the 275ones from the first socket will be used. In the bind call, set he 276XDP_SHARED_UMEM option and provide the initial socket's fd in the 277sxdp_shared_umem_fd field. You can attach an arbitrary number of extra 278sockets this way. 279 280What socket will then a packet arrive on? This is decided by the XDP 281program. Put all the sockets in the XSK_MAP and just indicate which 282index in the array you would like to send each packet to. A simple 283round-robin example of distributing packets is shown below: 284 285.. code-block:: c 286 287 #include <linux/bpf.h> 288 #include "bpf_helpers.h" 289 290 #define MAX_SOCKS 16 291 292 struct { 293 __uint(type, BPF_MAP_TYPE_XSKMAP); 294 __uint(max_entries, MAX_SOCKS); 295 __uint(key_size, sizeof(int)); 296 __uint(value_size, sizeof(int)); 297 } xsks_map SEC(".maps"); 298 299 static unsigned int rr; 300 301 SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx) 302 { 303 rr = (rr + 1) & (MAX_SOCKS - 1); 304 305 return bpf_redirect_map(&xsks_map, rr, XDP_DROP); 306 } 307 308Note, that since there is only a single set of FILL and COMPLETION 309rings, and they are single producer, single consumer rings, you need 310to make sure that multiple processes or threads do not use these rings 311concurrently. There are no synchronization primitives in the 312libbpf code that protects multiple users at this point in time. 313 314Libbpf uses this mode if you create more than one socket tied to the 315same UMEM. However, note that you need to supply the 316XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD libbpf_flag with the 317xsk_socket__create calls and load your own XDP program as there is no 318built in one in libbpf that will route the traffic for you. 319 320The second case is when you share a UMEM between sockets that are 321bound to different queue ids and/or netdevs. In this case you have to 322create one FILL ring and one COMPLETION ring for each unique 323netdev,queue_id pair. Let us say you want to create two sockets bound 324to two different queue ids on the same netdev. Create the first socket 325and bind it in the normal way. Create a second socket and create an RX 326and a TX ring, or at least one of them, and then one FILL and 327COMPLETION ring for this socket. Then in the bind call, set he 328XDP_SHARED_UMEM option and provide the initial socket's fd in the 329sxdp_shared_umem_fd field as you registered the UMEM on that 330socket. These two sockets will now share one and the same UMEM. 331 332There is no need to supply an XDP program like the one in the previous 333case where sockets were bound to the same queue id and 334device. Instead, use the NIC's packet steering capabilities to steer 335the packets to the right queue. In the previous example, there is only 336one queue shared among sockets, so the NIC cannot do this steering. It 337can only steer between queues. 338 339In libbpf, you need to use the xsk_socket__create_shared() API as it 340takes a reference to a FILL ring and a COMPLETION ring that will be 341created for you and bound to the shared UMEM. You can use this 342function for all the sockets you create, or you can use it for the 343second and following ones and use xsk_socket__create() for the first 344one. Both methods yield the same result. 345 346Note that a UMEM can be shared between sockets on the same queue id 347and device, as well as between queues on the same device and between 348devices at the same time. 349 350XDP_USE_NEED_WAKEUP bind flag 351----------------------------- 352 353This option adds support for a new flag called need_wakeup that is 354present in the FILL ring and the TX ring, the rings for which user 355space is a producer. When this option is set in the bind call, the 356need_wakeup flag will be set if the kernel needs to be explicitly 357woken up by a syscall to continue processing packets. If the flag is 358zero, no syscall is needed. 359 360If the flag is set on the FILL ring, the application needs to call 361poll() to be able to continue to receive packets on the RX ring. This 362can happen, for example, when the kernel has detected that there are no 363more buffers on the FILL ring and no buffers left on the RX HW ring of 364the NIC. In this case, interrupts are turned off as the NIC cannot 365receive any packets (as there are no buffers to put them in), and the 366need_wakeup flag is set so that user space can put buffers on the 367FILL ring and then call poll() so that the kernel driver can put these 368buffers on the HW ring and start to receive packets. 369 370If the flag is set for the TX ring, it means that the application 371needs to explicitly notify the kernel to send any packets put on the 372TX ring. This can be accomplished either by a poll() call, as in the 373RX path, or by calling sendto(). 374 375An example of how to use this flag can be found in 376samples/bpf/xdpsock_user.c. An example with the use of libbpf helpers 377would look like this for the TX path: 378 379.. code-block:: c 380 381 if (xsk_ring_prod__needs_wakeup(&my_tx_ring)) 382 sendto(xsk_socket__fd(xsk_handle), NULL, 0, MSG_DONTWAIT, NULL, 0); 383 384I.e., only use the syscall if the flag is set. 385 386We recommend that you always enable this mode as it usually leads to 387better performance especially if you run the application and the 388driver on the same core, but also if you use different cores for the 389application and the kernel driver, as it reduces the number of 390syscalls needed for the TX path. 391 392XDP_{RX|TX|UMEM_FILL|UMEM_COMPLETION}_RING setsockopts 393------------------------------------------------------ 394 395These setsockopts sets the number of descriptors that the RX, TX, 396FILL, and COMPLETION rings respectively should have. It is mandatory 397to set the size of at least one of the RX and TX rings. If you set 398both, you will be able to both receive and send traffic from your 399application, but if you only want to do one of them, you can save 400resources by only setting up one of them. Both the FILL ring and the 401COMPLETION ring are mandatory as you need to have a UMEM tied to your 402socket. But if the XDP_SHARED_UMEM flag is used, any socket after the 403first one does not have a UMEM and should in that case not have any 404FILL or COMPLETION rings created as the ones from the shared UMEM will 405be used. Note, that the rings are single-producer single-consumer, so 406do not try to access them from multiple processes at the same 407time. See the XDP_SHARED_UMEM section. 408 409In libbpf, you can create Rx-only and Tx-only sockets by supplying 410NULL to the rx and tx arguments, respectively, to the 411xsk_socket__create function. 412 413If you create a Tx-only socket, we recommend that you do not put any 414packets on the fill ring. If you do this, drivers might think you are 415going to receive something when you in fact will not, and this can 416negatively impact performance. 417 418XDP_UMEM_REG setsockopt 419----------------------- 420 421This setsockopt registers a UMEM to a socket. This is the area that 422contain all the buffers that packet can recide in. The call takes a 423pointer to the beginning of this area and the size of it. Moreover, it 424also has parameter called chunk_size that is the size that the UMEM is 425divided into. It can only be 2K or 4K at the moment. If you have an 426UMEM area that is 128K and a chunk size of 2K, this means that you 427will be able to hold a maximum of 128K / 2K = 64 packets in your UMEM 428area and that your largest packet size can be 2K. 429 430There is also an option to set the headroom of each single buffer in 431the UMEM. If you set this to N bytes, it means that the packet will 432start N bytes into the buffer leaving the first N bytes for the 433application to use. The final option is the flags field, but it will 434be dealt with in separate sections for each UMEM flag. 435 436XDP_STATISTICS getsockopt 437------------------------- 438 439Gets drop statistics of a socket that can be useful for debug 440purposes. The supported statistics are shown below: 441 442.. code-block:: c 443 444 struct xdp_statistics { 445 __u64 rx_dropped; /* Dropped for reasons other than invalid desc */ 446 __u64 rx_invalid_descs; /* Dropped due to invalid descriptor */ 447 __u64 tx_invalid_descs; /* Dropped due to invalid descriptor */ 448 }; 449 450XDP_OPTIONS getsockopt 451---------------------- 452 453Gets options from an XDP socket. The only one supported so far is 454XDP_OPTIONS_ZEROCOPY which tells you if zero-copy is on or not. 455 456Usage 457===== 458 459In order to use AF_XDP sockets two parts are needed. The 460user-space application and the XDP program. For a complete setup and 461usage example, please refer to the sample application. The user-space 462side is xdpsock_user.c and the XDP side is part of libbpf. 463 464The XDP code sample included in tools/lib/bpf/xsk.c is the following: 465 466.. code-block:: c 467 468 SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx) 469 { 470 int index = ctx->rx_queue_index; 471 472 // A set entry here means that the corresponding queue_id 473 // has an active AF_XDP socket bound to it. 474 if (bpf_map_lookup_elem(&xsks_map, &index)) 475 return bpf_redirect_map(&xsks_map, index, 0); 476 477 return XDP_PASS; 478 } 479 480A simple but not so performance ring dequeue and enqueue could look 481like this: 482 483.. code-block:: c 484 485 // struct xdp_rxtx_ring { 486 // __u32 *producer; 487 // __u32 *consumer; 488 // struct xdp_desc *desc; 489 // }; 490 491 // struct xdp_umem_ring { 492 // __u32 *producer; 493 // __u32 *consumer; 494 // __u64 *desc; 495 // }; 496 497 // typedef struct xdp_rxtx_ring RING; 498 // typedef struct xdp_umem_ring RING; 499 500 // typedef struct xdp_desc RING_TYPE; 501 // typedef __u64 RING_TYPE; 502 503 int dequeue_one(RING *ring, RING_TYPE *item) 504 { 505 __u32 entries = *ring->producer - *ring->consumer; 506 507 if (entries == 0) 508 return -1; 509 510 // read-barrier! 511 512 *item = ring->desc[*ring->consumer & (RING_SIZE - 1)]; 513 (*ring->consumer)++; 514 return 0; 515 } 516 517 int enqueue_one(RING *ring, const RING_TYPE *item) 518 { 519 u32 free_entries = RING_SIZE - (*ring->producer - *ring->consumer); 520 521 if (free_entries == 0) 522 return -1; 523 524 ring->desc[*ring->producer & (RING_SIZE - 1)] = *item; 525 526 // write-barrier! 527 528 (*ring->producer)++; 529 return 0; 530 } 531 532But please use the libbpf functions as they are optimized and ready to 533use. Will make your life easier. 534 535Sample application 536================== 537 538There is a xdpsock benchmarking/test application included that 539demonstrates how to use AF_XDP sockets with private UMEMs. Say that 540you would like your UDP traffic from port 4242 to end up in queue 16, 541that we will enable AF_XDP on. Here, we use ethtool for this:: 542 543 ethtool -N p3p2 rx-flow-hash udp4 fn 544 ethtool -N p3p2 flow-type udp4 src-port 4242 dst-port 4242 \ 545 action 16 546 547Running the rxdrop benchmark in XDP_DRV mode can then be done 548using:: 549 550 samples/bpf/xdpsock -i p3p2 -q 16 -r -N 551 552For XDP_SKB mode, use the switch "-S" instead of "-N" and all options 553can be displayed with "-h", as usual. 554 555This sample application uses libbpf to make the setup and usage of 556AF_XDP simpler. If you want to know how the raw uapi of AF_XDP is 557really used to make something more advanced, take a look at the libbpf 558code in tools/lib/bpf/xsk.[ch]. 559 560FAQ 561======= 562 563Q: I am not seeing any traffic on the socket. What am I doing wrong? 564 565A: When a netdev of a physical NIC is initialized, Linux usually 566 allocates one RX and TX queue pair per core. So on a 8 core system, 567 queue ids 0 to 7 will be allocated, one per core. In the AF_XDP 568 bind call or the xsk_socket__create libbpf function call, you 569 specify a specific queue id to bind to and it is only the traffic 570 towards that queue you are going to get on you socket. So in the 571 example above, if you bind to queue 0, you are NOT going to get any 572 traffic that is distributed to queues 1 through 7. If you are 573 lucky, you will see the traffic, but usually it will end up on one 574 of the queues you have not bound to. 575 576 There are a number of ways to solve the problem of getting the 577 traffic you want to the queue id you bound to. If you want to see 578 all the traffic, you can force the netdev to only have 1 queue, queue 579 id 0, and then bind to queue 0. You can use ethtool to do this:: 580 581 sudo ethtool -L <interface> combined 1 582 583 If you want to only see part of the traffic, you can program the 584 NIC through ethtool to filter out your traffic to a single queue id 585 that you can bind your XDP socket to. Here is one example in which 586 UDP traffic to and from port 4242 are sent to queue 2:: 587 588 sudo ethtool -N <interface> rx-flow-hash udp4 fn 589 sudo ethtool -N <interface> flow-type udp4 src-port 4242 dst-port \ 590 4242 action 2 591 592 A number of other ways are possible all up to the capabilities of 593 the NIC you have. 594 595Q: Can I use the XSKMAP to implement a switch betwen different umems 596 in copy mode? 597 598A: The short answer is no, that is not supported at the moment. The 599 XSKMAP can only be used to switch traffic coming in on queue id X 600 to sockets bound to the same queue id X. The XSKMAP can contain 601 sockets bound to different queue ids, for example X and Y, but only 602 traffic goming in from queue id Y can be directed to sockets bound 603 to the same queue id Y. In zero-copy mode, you should use the 604 switch, or other distribution mechanism, in your NIC to direct 605 traffic to the correct queue id and socket. 606 607Q: My packets are sometimes corrupted. What is wrong? 608 609A: Care has to be taken not to feed the same buffer in the UMEM into 610 more than one ring at the same time. If you for example feed the 611 same buffer into the FILL ring and the TX ring at the same time, the 612 NIC might receive data into the buffer at the same time it is 613 sending it. This will cause some packets to become corrupted. Same 614 thing goes for feeding the same buffer into the FILL rings 615 belonging to different queue ids or netdevs bound with the 616 XDP_SHARED_UMEM flag. 617 618Credits 619======= 620 621- Björn Töpel (AF_XDP core) 622- Magnus Karlsson (AF_XDP core) 623- Alexander Duyck 624- Alexei Starovoitov 625- Daniel Borkmann 626- Jesper Dangaard Brouer 627- John Fastabend 628- Jonathan Corbet (LWN coverage) 629- Michael S. Tsirkin 630- Qi Z Zhang 631- Willem de Bruijn