cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

af_xdp.rst (26106B)


      1.. SPDX-License-Identifier: GPL-2.0
      2
      3======
      4AF_XDP
      5======
      6
      7Overview
      8========
      9
     10AF_XDP is an address family that is optimized for high performance
     11packet processing.
     12
     13This document assumes that the reader is familiar with BPF and XDP. If
     14not, the Cilium project has an excellent reference guide at
     15http://cilium.readthedocs.io/en/latest/bpf/.
     16
     17Using the XDP_REDIRECT action from an XDP program, the program can
     18redirect ingress frames to other XDP enabled netdevs, using the
     19bpf_redirect_map() function. AF_XDP sockets enable the possibility for
     20XDP programs to redirect frames to a memory buffer in a user-space
     21application.
     22
     23An AF_XDP socket (XSK) is created with the normal socket()
     24syscall. Associated with each XSK are two rings: the RX ring and the
     25TX ring. A socket can receive packets on the RX ring and it can send
     26packets on the TX ring. These rings are registered and sized with the
     27setsockopts XDP_RX_RING and XDP_TX_RING, respectively. It is mandatory
     28to have at least one of these rings for each socket. An RX or TX
     29descriptor ring points to a data buffer in a memory area called a
     30UMEM. RX and TX can share the same UMEM so that a packet does not have
     31to be copied between RX and TX. Moreover, if a packet needs to be kept
     32for a while due to a possible retransmit, the descriptor that points
     33to that packet can be changed to point to another and reused right
     34away. This again avoids copying data.
     35
     36The UMEM consists of a number of equally sized chunks. A descriptor in
     37one of the rings references a frame by referencing its addr. The addr
     38is simply an offset within the entire UMEM region. The user space
     39allocates memory for this UMEM using whatever means it feels is most
     40appropriate (malloc, mmap, huge pages, etc). This memory area is then
     41registered with the kernel using the new setsockopt XDP_UMEM_REG. The
     42UMEM also has two rings: the FILL ring and the COMPLETION ring. The
     43FILL ring is used by the application to send down addr for the kernel
     44to fill in with RX packet data. References to these frames will then
     45appear in the RX ring once each packet has been received. The
     46COMPLETION ring, on the other hand, contains frame addr that the
     47kernel has transmitted completely and can now be used again by user
     48space, for either TX or RX. Thus, the frame addrs appearing in the
     49COMPLETION ring are addrs that were previously transmitted using the
     50TX ring. In summary, the RX and FILL rings are used for the RX path
     51and the TX and COMPLETION rings are used for the TX path.
     52
     53The socket is then finally bound with a bind() call to a device and a
     54specific queue id on that device, and it is not until bind is
     55completed that traffic starts to flow.
     56
     57The UMEM can be shared between processes, if desired. If a process
     58wants to do this, it simply skips the registration of the UMEM and its
     59corresponding two rings, sets the XDP_SHARED_UMEM flag in the bind
     60call and submits the XSK of the process it would like to share UMEM
     61with as well as its own newly created XSK socket. The new process will
     62then receive frame addr references in its own RX ring that point to
     63this shared UMEM. Note that since the ring structures are
     64single-consumer / single-producer (for performance reasons), the new
     65process has to create its own socket with associated RX and TX rings,
     66since it cannot share this with the other process. This is also the
     67reason that there is only one set of FILL and COMPLETION rings per
     68UMEM. It is the responsibility of a single process to handle the UMEM.
     69
     70How is then packets distributed from an XDP program to the XSKs? There
     71is a BPF map called XSKMAP (or BPF_MAP_TYPE_XSKMAP in full). The
     72user-space application can place an XSK at an arbitrary place in this
     73map. The XDP program can then redirect a packet to a specific index in
     74this map and at this point XDP validates that the XSK in that map was
     75indeed bound to that device and ring number. If not, the packet is
     76dropped. If the map is empty at that index, the packet is also
     77dropped. This also means that it is currently mandatory to have an XDP
     78program loaded (and one XSK in the XSKMAP) to be able to get any
     79traffic to user space through the XSK.
     80
     81AF_XDP can operate in two different modes: XDP_SKB and XDP_DRV. If the
     82driver does not have support for XDP, or XDP_SKB is explicitly chosen
     83when loading the XDP program, XDP_SKB mode is employed that uses SKBs
     84together with the generic XDP support and copies out the data to user
     85space. A fallback mode that works for any network device. On the other
     86hand, if the driver has support for XDP, it will be used by the AF_XDP
     87code to provide better performance, but there is still a copy of the
     88data into user space.
     89
     90Concepts
     91========
     92
     93In order to use an AF_XDP socket, a number of associated objects need
     94to be setup. These objects and their options are explained in the
     95following sections.
     96
     97For an overview on how AF_XDP works, you can also take a look at the
     98Linux Plumbers paper from 2018 on the subject:
     99http://vger.kernel.org/lpc_net2018_talks/lpc18_paper_af_xdp_perf-v2.pdf. Do
    100NOT consult the paper from 2017 on "AF_PACKET v4", the first attempt
    101at AF_XDP. Nearly everything changed since then. Jonathan Corbet has
    102also written an excellent article on LWN, "Accelerating networking
    103with AF_XDP". It can be found at https://lwn.net/Articles/750845/.
    104
    105UMEM
    106----
    107
    108UMEM is a region of virtual contiguous memory, divided into
    109equal-sized frames. An UMEM is associated to a netdev and a specific
    110queue id of that netdev. It is created and configured (chunk size,
    111headroom, start address and size) by using the XDP_UMEM_REG setsockopt
    112system call. A UMEM is bound to a netdev and queue id, via the bind()
    113system call.
    114
    115An AF_XDP is socket linked to a single UMEM, but one UMEM can have
    116multiple AF_XDP sockets. To share an UMEM created via one socket A,
    117the next socket B can do this by setting the XDP_SHARED_UMEM flag in
    118struct sockaddr_xdp member sxdp_flags, and passing the file descriptor
    119of A to struct sockaddr_xdp member sxdp_shared_umem_fd.
    120
    121The UMEM has two single-producer/single-consumer rings that are used
    122to transfer ownership of UMEM frames between the kernel and the
    123user-space application.
    124
    125Rings
    126-----
    127
    128There are a four different kind of rings: FILL, COMPLETION, RX and
    129TX. All rings are single-producer/single-consumer, so the user-space
    130application need explicit synchronization of multiple
    131processes/threads are reading/writing to them.
    132
    133The UMEM uses two rings: FILL and COMPLETION. Each socket associated
    134with the UMEM must have an RX queue, TX queue or both. Say, that there
    135is a setup with four sockets (all doing TX and RX). Then there will be
    136one FILL ring, one COMPLETION ring, four TX rings and four RX rings.
    137
    138The rings are head(producer)/tail(consumer) based rings. A producer
    139writes the data ring at the index pointed out by struct xdp_ring
    140producer member, and increasing the producer index. A consumer reads
    141the data ring at the index pointed out by struct xdp_ring consumer
    142member, and increasing the consumer index.
    143
    144The rings are configured and created via the _RING setsockopt system
    145calls and mmapped to user-space using the appropriate offset to mmap()
    146(XDP_PGOFF_RX_RING, XDP_PGOFF_TX_RING, XDP_UMEM_PGOFF_FILL_RING and
    147XDP_UMEM_PGOFF_COMPLETION_RING).
    148
    149The size of the rings need to be of size power of two.
    150
    151UMEM Fill Ring
    152~~~~~~~~~~~~~~
    153
    154The FILL ring is used to transfer ownership of UMEM frames from
    155user-space to kernel-space. The UMEM addrs are passed in the ring. As
    156an example, if the UMEM is 64k and each chunk is 4k, then the UMEM has
    15716 chunks and can pass addrs between 0 and 64k.
    158
    159Frames passed to the kernel are used for the ingress path (RX rings).
    160
    161The user application produces UMEM addrs to this ring. Note that, if
    162running the application with aligned chunk mode, the kernel will mask
    163the incoming addr.  E.g. for a chunk size of 2k, the log2(2048) LSB of
    164the addr will be masked off, meaning that 2048, 2050 and 3000 refers
    165to the same chunk. If the user application is run in the unaligned
    166chunks mode, then the incoming addr will be left untouched.
    167
    168
    169UMEM Completion Ring
    170~~~~~~~~~~~~~~~~~~~~
    171
    172The COMPLETION Ring is used transfer ownership of UMEM frames from
    173kernel-space to user-space. Just like the FILL ring, UMEM indices are
    174used.
    175
    176Frames passed from the kernel to user-space are frames that has been
    177sent (TX ring) and can be used by user-space again.
    178
    179The user application consumes UMEM addrs from this ring.
    180
    181
    182RX Ring
    183~~~~~~~
    184
    185The RX ring is the receiving side of a socket. Each entry in the ring
    186is a struct xdp_desc descriptor. The descriptor contains UMEM offset
    187(addr) and the length of the data (len).
    188
    189If no frames have been passed to kernel via the FILL ring, no
    190descriptors will (or can) appear on the RX ring.
    191
    192The user application consumes struct xdp_desc descriptors from this
    193ring.
    194
    195TX Ring
    196~~~~~~~
    197
    198The TX ring is used to send frames. The struct xdp_desc descriptor is
    199filled (index, length and offset) and passed into the ring.
    200
    201To start the transfer a sendmsg() system call is required. This might
    202be relaxed in the future.
    203
    204The user application produces struct xdp_desc descriptors to this
    205ring.
    206
    207Libbpf
    208======
    209
    210Libbpf is a helper library for eBPF and XDP that makes using these
    211technologies a lot simpler. It also contains specific helper functions
    212in tools/lib/bpf/xsk.h for facilitating the use of AF_XDP. It
    213contains two types of functions: those that can be used to make the
    214setup of AF_XDP socket easier and ones that can be used in the data
    215plane to access the rings safely and quickly. To see an example on how
    216to use this API, please take a look at the sample application in
    217samples/bpf/xdpsock_usr.c which uses libbpf for both setup and data
    218plane operations.
    219
    220We recommend that you use this library unless you have become a power
    221user. It will make your program a lot simpler.
    222
    223XSKMAP / BPF_MAP_TYPE_XSKMAP
    224============================
    225
    226On XDP side there is a BPF map type BPF_MAP_TYPE_XSKMAP (XSKMAP) that
    227is used in conjunction with bpf_redirect_map() to pass the ingress
    228frame to a socket.
    229
    230The user application inserts the socket into the map, via the bpf()
    231system call.
    232
    233Note that if an XDP program tries to redirect to a socket that does
    234not match the queue configuration and netdev, the frame will be
    235dropped. E.g. an AF_XDP socket is bound to netdev eth0 and
    236queue 17. Only the XDP program executing for eth0 and queue 17 will
    237successfully pass data to the socket. Please refer to the sample
    238application (samples/bpf/) in for an example.
    239
    240Configuration Flags and Socket Options
    241======================================
    242
    243These are the various configuration flags that can be used to control
    244and monitor the behavior of AF_XDP sockets.
    245
    246XDP_COPY and XDP_ZEROCOPY bind flags
    247------------------------------------
    248
    249When you bind to a socket, the kernel will first try to use zero-copy
    250copy. If zero-copy is not supported, it will fall back on using copy
    251mode, i.e. copying all packets out to user space. But if you would
    252like to force a certain mode, you can use the following flags. If you
    253pass the XDP_COPY flag to the bind call, the kernel will force the
    254socket into copy mode. If it cannot use copy mode, the bind call will
    255fail with an error. Conversely, the XDP_ZEROCOPY flag will force the
    256socket into zero-copy mode or fail.
    257
    258XDP_SHARED_UMEM bind flag
    259-------------------------
    260
    261This flag enables you to bind multiple sockets to the same UMEM. It
    262works on the same queue id, between queue ids and between
    263netdevs/devices. In this mode, each socket has their own RX and TX
    264rings as usual, but you are going to have one or more FILL and
    265COMPLETION ring pairs. You have to create one of these pairs per
    266unique netdev and queue id tuple that you bind to.
    267
    268Starting with the case were we would like to share a UMEM between
    269sockets bound to the same netdev and queue id. The UMEM (tied to the
    270fist socket created) will only have a single FILL ring and a single
    271COMPLETION ring as there is only on unique netdev,queue_id tuple that
    272we have bound to. To use this mode, create the first socket and bind
    273it in the normal way. Create a second socket and create an RX and a TX
    274ring, or at least one of them, but no FILL or COMPLETION rings as the
    275ones from the first socket will be used. In the bind call, set he
    276XDP_SHARED_UMEM option and provide the initial socket's fd in the
    277sxdp_shared_umem_fd field. You can attach an arbitrary number of extra
    278sockets this way.
    279
    280What socket will then a packet arrive on? This is decided by the XDP
    281program. Put all the sockets in the XSK_MAP and just indicate which
    282index in the array you would like to send each packet to. A simple
    283round-robin example of distributing packets is shown below:
    284
    285.. code-block:: c
    286
    287   #include <linux/bpf.h>
    288   #include "bpf_helpers.h"
    289
    290   #define MAX_SOCKS 16
    291
    292   struct {
    293       __uint(type, BPF_MAP_TYPE_XSKMAP);
    294       __uint(max_entries, MAX_SOCKS);
    295       __uint(key_size, sizeof(int));
    296       __uint(value_size, sizeof(int));
    297   } xsks_map SEC(".maps");
    298
    299   static unsigned int rr;
    300
    301   SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx)
    302   {
    303       rr = (rr + 1) & (MAX_SOCKS - 1);
    304
    305       return bpf_redirect_map(&xsks_map, rr, XDP_DROP);
    306   }
    307
    308Note, that since there is only a single set of FILL and COMPLETION
    309rings, and they are single producer, single consumer rings, you need
    310to make sure that multiple processes or threads do not use these rings
    311concurrently. There are no synchronization primitives in the
    312libbpf code that protects multiple users at this point in time.
    313
    314Libbpf uses this mode if you create more than one socket tied to the
    315same UMEM. However, note that you need to supply the
    316XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD libbpf_flag with the
    317xsk_socket__create calls and load your own XDP program as there is no
    318built in one in libbpf that will route the traffic for you.
    319
    320The second case is when you share a UMEM between sockets that are
    321bound to different queue ids and/or netdevs. In this case you have to
    322create one FILL ring and one COMPLETION ring for each unique
    323netdev,queue_id pair. Let us say you want to create two sockets bound
    324to two different queue ids on the same netdev. Create the first socket
    325and bind it in the normal way. Create a second socket and create an RX
    326and a TX ring, or at least one of them, and then one FILL and
    327COMPLETION ring for this socket. Then in the bind call, set he
    328XDP_SHARED_UMEM option and provide the initial socket's fd in the
    329sxdp_shared_umem_fd field as you registered the UMEM on that
    330socket. These two sockets will now share one and the same UMEM.
    331
    332There is no need to supply an XDP program like the one in the previous
    333case where sockets were bound to the same queue id and
    334device. Instead, use the NIC's packet steering capabilities to steer
    335the packets to the right queue. In the previous example, there is only
    336one queue shared among sockets, so the NIC cannot do this steering. It
    337can only steer between queues.
    338
    339In libbpf, you need to use the xsk_socket__create_shared() API as it
    340takes a reference to a FILL ring and a COMPLETION ring that will be
    341created for you and bound to the shared UMEM. You can use this
    342function for all the sockets you create, or you can use it for the
    343second and following ones and use xsk_socket__create() for the first
    344one. Both methods yield the same result.
    345
    346Note that a UMEM can be shared between sockets on the same queue id
    347and device, as well as between queues on the same device and between
    348devices at the same time.
    349
    350XDP_USE_NEED_WAKEUP bind flag
    351-----------------------------
    352
    353This option adds support for a new flag called need_wakeup that is
    354present in the FILL ring and the TX ring, the rings for which user
    355space is a producer. When this option is set in the bind call, the
    356need_wakeup flag will be set if the kernel needs to be explicitly
    357woken up by a syscall to continue processing packets. If the flag is
    358zero, no syscall is needed.
    359
    360If the flag is set on the FILL ring, the application needs to call
    361poll() to be able to continue to receive packets on the RX ring. This
    362can happen, for example, when the kernel has detected that there are no
    363more buffers on the FILL ring and no buffers left on the RX HW ring of
    364the NIC. In this case, interrupts are turned off as the NIC cannot
    365receive any packets (as there are no buffers to put them in), and the
    366need_wakeup flag is set so that user space can put buffers on the
    367FILL ring and then call poll() so that the kernel driver can put these
    368buffers on the HW ring and start to receive packets.
    369
    370If the flag is set for the TX ring, it means that the application
    371needs to explicitly notify the kernel to send any packets put on the
    372TX ring. This can be accomplished either by a poll() call, as in the
    373RX path, or by calling sendto().
    374
    375An example of how to use this flag can be found in
    376samples/bpf/xdpsock_user.c. An example with the use of libbpf helpers
    377would look like this for the TX path:
    378
    379.. code-block:: c
    380
    381   if (xsk_ring_prod__needs_wakeup(&my_tx_ring))
    382       sendto(xsk_socket__fd(xsk_handle), NULL, 0, MSG_DONTWAIT, NULL, 0);
    383
    384I.e., only use the syscall if the flag is set.
    385
    386We recommend that you always enable this mode as it usually leads to
    387better performance especially if you run the application and the
    388driver on the same core, but also if you use different cores for the
    389application and the kernel driver, as it reduces the number of
    390syscalls needed for the TX path.
    391
    392XDP_{RX|TX|UMEM_FILL|UMEM_COMPLETION}_RING setsockopts
    393------------------------------------------------------
    394
    395These setsockopts sets the number of descriptors that the RX, TX,
    396FILL, and COMPLETION rings respectively should have. It is mandatory
    397to set the size of at least one of the RX and TX rings. If you set
    398both, you will be able to both receive and send traffic from your
    399application, but if you only want to do one of them, you can save
    400resources by only setting up one of them. Both the FILL ring and the
    401COMPLETION ring are mandatory as you need to have a UMEM tied to your
    402socket. But if the XDP_SHARED_UMEM flag is used, any socket after the
    403first one does not have a UMEM and should in that case not have any
    404FILL or COMPLETION rings created as the ones from the shared UMEM will
    405be used. Note, that the rings are single-producer single-consumer, so
    406do not try to access them from multiple processes at the same
    407time. See the XDP_SHARED_UMEM section.
    408
    409In libbpf, you can create Rx-only and Tx-only sockets by supplying
    410NULL to the rx and tx arguments, respectively, to the
    411xsk_socket__create function.
    412
    413If you create a Tx-only socket, we recommend that you do not put any
    414packets on the fill ring. If you do this, drivers might think you are
    415going to receive something when you in fact will not, and this can
    416negatively impact performance.
    417
    418XDP_UMEM_REG setsockopt
    419-----------------------
    420
    421This setsockopt registers a UMEM to a socket. This is the area that
    422contain all the buffers that packet can recide in. The call takes a
    423pointer to the beginning of this area and the size of it. Moreover, it
    424also has parameter called chunk_size that is the size that the UMEM is
    425divided into. It can only be 2K or 4K at the moment. If you have an
    426UMEM area that is 128K and a chunk size of 2K, this means that you
    427will be able to hold a maximum of 128K / 2K = 64 packets in your UMEM
    428area and that your largest packet size can be 2K.
    429
    430There is also an option to set the headroom of each single buffer in
    431the UMEM. If you set this to N bytes, it means that the packet will
    432start N bytes into the buffer leaving the first N bytes for the
    433application to use. The final option is the flags field, but it will
    434be dealt with in separate sections for each UMEM flag.
    435
    436XDP_STATISTICS getsockopt
    437-------------------------
    438
    439Gets drop statistics of a socket that can be useful for debug
    440purposes. The supported statistics are shown below:
    441
    442.. code-block:: c
    443
    444   struct xdp_statistics {
    445       __u64 rx_dropped; /* Dropped for reasons other than invalid desc */
    446       __u64 rx_invalid_descs; /* Dropped due to invalid descriptor */
    447       __u64 tx_invalid_descs; /* Dropped due to invalid descriptor */
    448   };
    449
    450XDP_OPTIONS getsockopt
    451----------------------
    452
    453Gets options from an XDP socket. The only one supported so far is
    454XDP_OPTIONS_ZEROCOPY which tells you if zero-copy is on or not.
    455
    456Usage
    457=====
    458
    459In order to use AF_XDP sockets two parts are needed. The
    460user-space application and the XDP program. For a complete setup and
    461usage example, please refer to the sample application. The user-space
    462side is xdpsock_user.c and the XDP side is part of libbpf.
    463
    464The XDP code sample included in tools/lib/bpf/xsk.c is the following:
    465
    466.. code-block:: c
    467
    468   SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx)
    469   {
    470       int index = ctx->rx_queue_index;
    471
    472       // A set entry here means that the corresponding queue_id
    473       // has an active AF_XDP socket bound to it.
    474       if (bpf_map_lookup_elem(&xsks_map, &index))
    475           return bpf_redirect_map(&xsks_map, index, 0);
    476
    477       return XDP_PASS;
    478   }
    479
    480A simple but not so performance ring dequeue and enqueue could look
    481like this:
    482
    483.. code-block:: c
    484
    485    // struct xdp_rxtx_ring {
    486    //     __u32 *producer;
    487    //     __u32 *consumer;
    488    //     struct xdp_desc *desc;
    489    // };
    490
    491    // struct xdp_umem_ring {
    492    //     __u32 *producer;
    493    //     __u32 *consumer;
    494    //     __u64 *desc;
    495    // };
    496
    497    // typedef struct xdp_rxtx_ring RING;
    498    // typedef struct xdp_umem_ring RING;
    499
    500    // typedef struct xdp_desc RING_TYPE;
    501    // typedef __u64 RING_TYPE;
    502
    503    int dequeue_one(RING *ring, RING_TYPE *item)
    504    {
    505        __u32 entries = *ring->producer - *ring->consumer;
    506
    507        if (entries == 0)
    508            return -1;
    509
    510        // read-barrier!
    511
    512        *item = ring->desc[*ring->consumer & (RING_SIZE - 1)];
    513        (*ring->consumer)++;
    514        return 0;
    515    }
    516
    517    int enqueue_one(RING *ring, const RING_TYPE *item)
    518    {
    519        u32 free_entries = RING_SIZE - (*ring->producer - *ring->consumer);
    520
    521        if (free_entries == 0)
    522            return -1;
    523
    524        ring->desc[*ring->producer & (RING_SIZE - 1)] = *item;
    525
    526        // write-barrier!
    527
    528        (*ring->producer)++;
    529        return 0;
    530    }
    531
    532But please use the libbpf functions as they are optimized and ready to
    533use. Will make your life easier.
    534
    535Sample application
    536==================
    537
    538There is a xdpsock benchmarking/test application included that
    539demonstrates how to use AF_XDP sockets with private UMEMs. Say that
    540you would like your UDP traffic from port 4242 to end up in queue 16,
    541that we will enable AF_XDP on. Here, we use ethtool for this::
    542
    543      ethtool -N p3p2 rx-flow-hash udp4 fn
    544      ethtool -N p3p2 flow-type udp4 src-port 4242 dst-port 4242 \
    545          action 16
    546
    547Running the rxdrop benchmark in XDP_DRV mode can then be done
    548using::
    549
    550      samples/bpf/xdpsock -i p3p2 -q 16 -r -N
    551
    552For XDP_SKB mode, use the switch "-S" instead of "-N" and all options
    553can be displayed with "-h", as usual.
    554
    555This sample application uses libbpf to make the setup and usage of
    556AF_XDP simpler. If you want to know how the raw uapi of AF_XDP is
    557really used to make something more advanced, take a look at the libbpf
    558code in tools/lib/bpf/xsk.[ch].
    559
    560FAQ
    561=======
    562
    563Q: I am not seeing any traffic on the socket. What am I doing wrong?
    564
    565A: When a netdev of a physical NIC is initialized, Linux usually
    566   allocates one RX and TX queue pair per core. So on a 8 core system,
    567   queue ids 0 to 7 will be allocated, one per core. In the AF_XDP
    568   bind call or the xsk_socket__create libbpf function call, you
    569   specify a specific queue id to bind to and it is only the traffic
    570   towards that queue you are going to get on you socket. So in the
    571   example above, if you bind to queue 0, you are NOT going to get any
    572   traffic that is distributed to queues 1 through 7. If you are
    573   lucky, you will see the traffic, but usually it will end up on one
    574   of the queues you have not bound to.
    575
    576   There are a number of ways to solve the problem of getting the
    577   traffic you want to the queue id you bound to. If you want to see
    578   all the traffic, you can force the netdev to only have 1 queue, queue
    579   id 0, and then bind to queue 0. You can use ethtool to do this::
    580
    581     sudo ethtool -L <interface> combined 1
    582
    583   If you want to only see part of the traffic, you can program the
    584   NIC through ethtool to filter out your traffic to a single queue id
    585   that you can bind your XDP socket to. Here is one example in which
    586   UDP traffic to and from port 4242 are sent to queue 2::
    587
    588     sudo ethtool -N <interface> rx-flow-hash udp4 fn
    589     sudo ethtool -N <interface> flow-type udp4 src-port 4242 dst-port \
    590     4242 action 2
    591
    592   A number of other ways are possible all up to the capabilities of
    593   the NIC you have.
    594
    595Q: Can I use the XSKMAP to implement a switch betwen different umems
    596   in copy mode?
    597
    598A: The short answer is no, that is not supported at the moment. The
    599   XSKMAP can only be used to switch traffic coming in on queue id X
    600   to sockets bound to the same queue id X. The XSKMAP can contain
    601   sockets bound to different queue ids, for example X and Y, but only
    602   traffic goming in from queue id Y can be directed to sockets bound
    603   to the same queue id Y. In zero-copy mode, you should use the
    604   switch, or other distribution mechanism, in your NIC to direct
    605   traffic to the correct queue id and socket.
    606
    607Q: My packets are sometimes corrupted. What is wrong?
    608
    609A: Care has to be taken not to feed the same buffer in the UMEM into
    610   more than one ring at the same time. If you for example feed the
    611   same buffer into the FILL ring and the TX ring at the same time, the
    612   NIC might receive data into the buffer at the same time it is
    613   sending it. This will cause some packets to become corrupted. Same
    614   thing goes for feeding the same buffer into the FILL rings
    615   belonging to different queue ids or netdevs bound with the
    616   XDP_SHARED_UMEM flag.
    617
    618Credits
    619=======
    620
    621- Björn Töpel (AF_XDP core)
    622- Magnus Karlsson (AF_XDP core)
    623- Alexander Duyck
    624- Alexei Starovoitov
    625- Daniel Borkmann
    626- Jesper Dangaard Brouer
    627- John Fastabend
    628- Jonathan Corbet (LWN coverage)
    629- Michael S. Tsirkin
    630- Qi Z Zhang
    631- Willem de Bruijn