Received: by 2002:a05:6a10:2726:0:0:0:0 with SMTP id ib38csp750236pxb; Tue, 5 Apr 2022 21:41:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJxadng4BRDGrzdFIPmgjz9ikFlUsYAdpTPKie6/BfhO9d4Mdau/RK8IalRME26bx6aUk5Q+ X-Received: by 2002:aa7:82d9:0:b0:4fa:2c7f:41e with SMTP id f25-20020aa782d9000000b004fa2c7f041emr7098504pfn.1.1649220103432; Tue, 05 Apr 2022 21:41:43 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1649220103; cv=none; d=google.com; s=arc-20160816; b=DJhwceqYbiz4go3Gkhz4Luuva5au524p59khvIjOfQ9Yo0CXhR19CSYphjiPDEQvp9 aIa3E/B0aKkCsceD8JBPCOpkGa9/8xobN67qXg8LHz6zUqSBpVqFcKae8JbIPMSvQUdC c00m/t2DWmE9S3QPLplX3FVA0bhah2K83iu/OPsK0mJ0hDO14zXFJZ4bOsbINYNrs+S0 RwTI+/dt4q8nsIQaotxe3b+dxxlqZ9E7UIM73SFjDPJdAjcQwNf9QxDPOdkNRNSalCRT C0VRn3HCaqmqvZPrx5ylLxsrqb0v+qnNxox8q4t+UgXodnkRXNYiUzGE8jZVP+Uc1AoO cqTA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=XUmGTB1llBuObwWNGGzmUcDaPivbpzrD0UH+C7iTgTg=; b=MCtepk24ZeUcLqezanZv+NT/cpXtcSLrYAD/cbpVBjP/oh9AmJY3d6ehvBPmC4XHwq /k3S8Us6Vj6+dmW8KS9eu5Jt4pQtQZ2WVZZ0rD4WwwhiGyirYyrcBhkS/wP+zqoNC05n ZaLiH0hXgWX1rgWcY8dwQFvnh2j++qKr9WVLac2Hzue3tmLZ3VdzWsHMJRI/51W9II2U UGueQOL2BLy66i3bVAx3X9qx0ipcFZlf6pSDO/94HaWuEHpkDdPCbszyKcWg1kYTQ/IT Jb+VVGbpM69FoaEw4Frbc2G+1LpM4JNmAdPVzHngUpHhZJkQIC7xUgOdsPh1MhfyMxPT 6T/w== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=XhtfI8x3; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from lindbergh.monkeyblade.net (lindbergh.monkeyblade.net. [23.128.96.19]) by mx.google.com with ESMTPS id y4-20020a634944000000b003816043f10csi14376024pgk.769.2022.04.05.21.41.42 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 05 Apr 2022 21:41:43 -0700 (PDT) Received-SPF: softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) client-ip=23.128.96.19; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=XhtfI8x3; spf=softfail (google.com: domain of transitioning linux-kernel-owner@vger.kernel.org does not designate 23.128.96.19 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by lindbergh.monkeyblade.net (Postfix) with ESMTP id 21037EEA7D; Tue, 5 Apr 2022 20:01:45 -0700 (PDT) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1381915AbiDEMAF (ORCPT + 99 others); Tue, 5 Apr 2022 08:00:05 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:52326 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S245091AbiDEIxM (ORCPT ); Tue, 5 Apr 2022 04:53:12 -0400 Received: from dfw.source.kernel.org (dfw.source.kernel.org [139.178.84.217]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 309BC188; Tue, 5 Apr 2022 01:51:14 -0700 (PDT) Received: from smtp.kernel.org (relay.kernel.org [52.25.139.140]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by dfw.source.kernel.org (Postfix) with ESMTPS id AE7A6614FD; Tue, 5 Apr 2022 08:51:13 +0000 (UTC) Received: by smtp.kernel.org (Postfix) with ESMTPSA id B877BC385A1; Tue, 5 Apr 2022 08:51:12 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1649148673; bh=HxPvGO4i6YQI4tsd97xYSdxadOmMIE2y4ja5TyeJoRo=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=XhtfI8x39WFEd7LQfuJAMeQl6Yiy8iAnZRC3MOG8twJ+M7E0fXYGGq0lfuS7HtZhC Psx17R0mZ6jSFuh9H7Vyk+DR797UuNhI10+fCSDFVFTWvHCCons8YpCHX1Xk0rdBT8 7POfFJdw1JnYjKjOu0xl2W9Kzko4J/zv0pzT0B3w= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, Jesper Dangaard Brouer , Maciej Fijalkowski , Alexander Lobakin , Michal Swiatkowski , Kiran Bhandare , Tony Nguyen , Sasha Levin Subject: [PATCH 5.16 0441/1017] ice: respect metadata on XSK Rx to skb Date: Tue, 5 Apr 2022 09:22:34 +0200 Message-Id: <20220405070407.385524288@linuxfoundation.org> X-Mailer: git-send-email 2.35.1 In-Reply-To: <20220405070354.155796697@linuxfoundation.org> References: <20220405070354.155796697@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit X-Spam-Status: No, score=-2.0 required=5.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,RDNS_NONE,SPF_HELO_NONE,T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Alexander Lobakin [ Upstream commit 45a34ca68070e34e09d5bf4309f7f1f286a27fc7 ] For now, if the XDP prog returns XDP_PASS on XSK, the metadata will be lost as it doesn't get copied to the skb. Copy it along with the frame headers. Account its size on skb allocation, and when copying just treat it as a part of the frame and do a pull after to "move" it to the "reserved" zone. net_prefetch() xdp->data_meta and align the copy size to speed-up memcpy() a little and better match ice_construct_skb(). Fixes: 2d4238f55697 ("ice: Add support for AF_XDP") Suggested-by: Jesper Dangaard Brouer Suggested-by: Maciej Fijalkowski Signed-off-by: Alexander Lobakin Reviewed-by: Michal Swiatkowski Tested-by: Kiran Bhandare Signed-off-by: Tony Nguyen Signed-off-by: Sasha Levin --- drivers/net/ethernet/intel/ice/ice_xsk.c | 14 ++++++++++---- 1 file changed, 10 insertions(+), 4 deletions(-) diff --git a/drivers/net/ethernet/intel/ice/ice_xsk.c b/drivers/net/ethernet/intel/ice/ice_xsk.c index a2c79431afd8..ac97cf3c5804 100644 --- a/drivers/net/ethernet/intel/ice/ice_xsk.c +++ b/drivers/net/ethernet/intel/ice/ice_xsk.c @@ -428,18 +428,24 @@ static void ice_bump_ntc(struct ice_rx_ring *rx_ring) static struct sk_buff * ice_construct_skb_zc(struct ice_rx_ring *rx_ring, struct xdp_buff *xdp) { + unsigned int totalsize = xdp->data_end - xdp->data_meta; unsigned int metasize = xdp->data - xdp->data_meta; - unsigned int datasize = xdp->data_end - xdp->data; struct sk_buff *skb; - skb = __napi_alloc_skb(&rx_ring->q_vector->napi, datasize, + net_prefetch(xdp->data_meta); + + skb = __napi_alloc_skb(&rx_ring->q_vector->napi, totalsize, GFP_ATOMIC | __GFP_NOWARN); if (unlikely(!skb)) return NULL; - memcpy(__skb_put(skb, datasize), xdp->data, datasize); - if (metasize) + memcpy(__skb_put(skb, totalsize), xdp->data_meta, + ALIGN(totalsize, sizeof(long))); + + if (metasize) { skb_metadata_set(skb, metasize); + __skb_pull(skb, metasize); + } xsk_buff_free(xdp); return skb; -- 2.34.1