xref: /netbsd-src/sys/net/pktqueue.c (revision d7488b2d05d49999025343bd63251372ecd6fe72)
1*d7488b2dSandvar /*	$NetBSD: pktqueue.c,v 1.22 2023/05/28 08:09:34 andvar Exp $	*/
260d350cfSrmind 
360d350cfSrmind /*-
460d350cfSrmind  * Copyright (c) 2014 The NetBSD Foundation, Inc.
560d350cfSrmind  * All rights reserved.
660d350cfSrmind  *
760d350cfSrmind  * This code is derived from software contributed to The NetBSD Foundation
860d350cfSrmind  * by Mindaugas Rasiukevicius.
960d350cfSrmind  *
1060d350cfSrmind  * Redistribution and use in source and binary forms, with or without
1160d350cfSrmind  * modification, are permitted provided that the following conditions
1260d350cfSrmind  * are met:
1360d350cfSrmind  * 1. Redistributions of source code must retain the above copyright
1460d350cfSrmind  *    notice, this list of conditions and the following disclaimer.
1560d350cfSrmind  * 2. Redistributions in binary form must reproduce the above copyright
1660d350cfSrmind  *    notice, this list of conditions and the following disclaimer in the
1760d350cfSrmind  *    documentation and/or other materials provided with the distribution.
1860d350cfSrmind  *
1960d350cfSrmind  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
2060d350cfSrmind  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
2160d350cfSrmind  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
2260d350cfSrmind  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
2360d350cfSrmind  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
2460d350cfSrmind  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
2560d350cfSrmind  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
2660d350cfSrmind  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
2760d350cfSrmind  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
2860d350cfSrmind  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
2960d350cfSrmind  * POSSIBILITY OF SUCH DAMAGE.
3060d350cfSrmind  */
3160d350cfSrmind 
324fab4afaSrmind /*
334fab4afaSrmind  * The packet queue (pktqueue) interface is a lockless IP input queue
344fab4afaSrmind  * which also abstracts and handles network ISR scheduling.  It provides
354fab4afaSrmind  * a mechanism to enable receiver-side packet steering (RPS).
364fab4afaSrmind  */
374fab4afaSrmind 
3860d350cfSrmind #include <sys/cdefs.h>
39*d7488b2dSandvar __KERNEL_RCSID(0, "$NetBSD: pktqueue.c,v 1.22 2023/05/28 08:09:34 andvar Exp $");
407128a14dSknakahara 
417128a14dSknakahara #ifdef _KERNEL_OPT
427128a14dSknakahara #include "opt_net_mpsafe.h"
437128a14dSknakahara #endif
4460d350cfSrmind 
4560d350cfSrmind #include <sys/param.h>
4660d350cfSrmind #include <sys/types.h>
4760d350cfSrmind 
4860d350cfSrmind #include <sys/atomic.h>
4960d350cfSrmind #include <sys/cpu.h>
5060d350cfSrmind #include <sys/pcq.h>
5160d350cfSrmind #include <sys/intr.h>
5260d350cfSrmind #include <sys/mbuf.h>
5360d350cfSrmind #include <sys/proc.h>
5460d350cfSrmind #include <sys/percpu.h>
55b578a8edSthorpej #include <sys/xcall.h>
5645288633Sthorpej #include <sys/once.h>
5745288633Sthorpej #include <sys/queue.h>
5845288633Sthorpej #include <sys/rwlock.h>
5960d350cfSrmind 
6060d350cfSrmind #include <net/pktqueue.h>
617128a14dSknakahara #include <net/rss_config.h>
627128a14dSknakahara 
637128a14dSknakahara #include <netinet/in.h>
647128a14dSknakahara #include <netinet/ip.h>
657128a14dSknakahara #include <netinet/ip6.h>
6660d350cfSrmind 
6760d350cfSrmind struct pktqueue {
6860d350cfSrmind 	/*
6960d350cfSrmind 	 * The lock used for a barrier mechanism.  The barrier counter,
7060d350cfSrmind 	 * as well as the drop counter, are managed atomically though.
7160d350cfSrmind 	 * Ensure this group is in a separate cache line.
7260d350cfSrmind 	 */
73f9f9515bSskrll 	union {
74f9f9515bSskrll 		struct {
7560d350cfSrmind 			kmutex_t	pq_lock;
7660d350cfSrmind 			volatile u_int	pq_barrier;
77f9f9515bSskrll 		};
78f9f9515bSskrll 		uint8_t	 _pad[COHERENCY_UNIT];
79f9f9515bSskrll 	};
8060d350cfSrmind 
8160d350cfSrmind 	/* The size of the queue, counters and the interrupt handler. */
8260d350cfSrmind 	u_int		pq_maxlen;
8360d350cfSrmind 	percpu_t *	pq_counters;
8460d350cfSrmind 	void *		pq_sih;
8560d350cfSrmind 
8645288633Sthorpej 	/* The per-CPU queues. */
873612cafeSriastradh 	struct percpu *	pq_pcq;	/* struct pcq * */
8845288633Sthorpej 
8945288633Sthorpej 	/* The linkage on the list of all pktqueues. */
9045288633Sthorpej 	LIST_ENTRY(pktqueue) pq_list;
9160d350cfSrmind };
9260d350cfSrmind 
9360d350cfSrmind /* The counters of the packet queue. */
9460d350cfSrmind #define	PQCNT_ENQUEUE	0
9560d350cfSrmind #define	PQCNT_DEQUEUE	1
9660d350cfSrmind #define	PQCNT_DROP	2
9760d350cfSrmind #define	PQCNT_NCOUNTERS	3
9860d350cfSrmind 
9960d350cfSrmind typedef struct {
10060d350cfSrmind 	uint64_t	count[PQCNT_NCOUNTERS];
10160d350cfSrmind } pktq_counters_t;
10260d350cfSrmind 
10360d350cfSrmind /* Special marker value used by pktq_barrier() mechanism. */
10460d350cfSrmind #define	PKTQ_MARKER	((void *)(~0ULL))
10560d350cfSrmind 
10645288633Sthorpej /*
10745288633Sthorpej  * This is a list of all pktqueues.  This list is used by
10845288633Sthorpej  * pktq_ifdetach() to issue a barrier on every pktqueue.
10945288633Sthorpej  *
11045288633Sthorpej  * The r/w lock is acquired for writing in pktq_create() and
11145288633Sthorpej  * pktq_destroy(), and for reading in pktq_ifdetach().
11245288633Sthorpej  *
11345288633Sthorpej  * This list is not performance critical, and will seldom be
11445288633Sthorpej  * accessed.
11545288633Sthorpej  */
11645288633Sthorpej static LIST_HEAD(, pktqueue) pktqueue_list	__read_mostly;
11745288633Sthorpej static krwlock_t pktqueue_list_lock		__read_mostly;
11845288633Sthorpej static once_t pktqueue_list_init_once		__read_mostly;
11945288633Sthorpej 
12045288633Sthorpej static int
pktqueue_list_init(void)12145288633Sthorpej pktqueue_list_init(void)
12245288633Sthorpej {
12345288633Sthorpej 	LIST_INIT(&pktqueue_list);
12445288633Sthorpej 	rw_init(&pktqueue_list_lock);
12545288633Sthorpej 	return 0;
12645288633Sthorpej }
12745288633Sthorpej 
1283612cafeSriastradh static void
pktq_init_cpu(void * vqp,void * vpq,struct cpu_info * ci)1293612cafeSriastradh pktq_init_cpu(void *vqp, void *vpq, struct cpu_info *ci)
1303612cafeSriastradh {
1313612cafeSriastradh 	struct pcq **qp = vqp;
1323612cafeSriastradh 	struct pktqueue *pq = vpq;
1333612cafeSriastradh 
1343612cafeSriastradh 	*qp = pcq_create(pq->pq_maxlen, KM_SLEEP);
1353612cafeSriastradh }
1363612cafeSriastradh 
1373612cafeSriastradh static void
pktq_fini_cpu(void * vqp,void * vpq,struct cpu_info * ci)1383612cafeSriastradh pktq_fini_cpu(void *vqp, void *vpq, struct cpu_info *ci)
1393612cafeSriastradh {
1403612cafeSriastradh 	struct pcq **qp = vqp, *q = *qp;
1413612cafeSriastradh 
1423612cafeSriastradh 	KASSERT(pcq_peek(q) == NULL);
1433612cafeSriastradh 	pcq_destroy(q);
1443612cafeSriastradh 	*qp = NULL;		/* paranoia */
1453612cafeSriastradh }
1463612cafeSriastradh 
1473612cafeSriastradh static struct pcq *
pktq_pcq(struct pktqueue * pq,struct cpu_info * ci)1483612cafeSriastradh pktq_pcq(struct pktqueue *pq, struct cpu_info *ci)
1493612cafeSriastradh {
1503612cafeSriastradh 	struct pcq **qp, *q;
1513612cafeSriastradh 
15260d350cfSrmind 	/*
1533612cafeSriastradh 	 * As long as preemption is disabled, the xcall to swap percpu
1543612cafeSriastradh 	 * buffers can't complete, so it is safe to read the pointer.
15560d350cfSrmind 	 */
1563612cafeSriastradh 	KASSERT(kpreempt_disabled());
1573612cafeSriastradh 
1583612cafeSriastradh 	qp = percpu_getptr_remote(pq->pq_pcq, ci);
1593612cafeSriastradh 	q = *qp;
1603612cafeSriastradh 
1613612cafeSriastradh 	return q;
1623612cafeSriastradh }
16360d350cfSrmind 
16460d350cfSrmind pktqueue_t *
pktq_create(size_t maxlen,void (* intrh)(void *),void * sc)165e05f4011Sozaki-r pktq_create(size_t maxlen, void (*intrh)(void *), void *sc)
16660d350cfSrmind {
16760d350cfSrmind 	const u_int sflags = SOFTINT_NET | SOFTINT_MPSAFE | SOFTINT_RCPU;
16860d350cfSrmind 	pktqueue_t *pq;
16960d350cfSrmind 	percpu_t *pc;
17060d350cfSrmind 	void *sih;
17160d350cfSrmind 
17245288633Sthorpej 	RUN_ONCE(&pktqueue_list_init_once, pktqueue_list_init);
17345288633Sthorpej 
174fd34ea77Schs 	pc = percpu_alloc(sizeof(pktq_counters_t));
175e05f4011Sozaki-r 	if ((sih = softint_establish(sflags, intrh, sc)) == NULL) {
17660d350cfSrmind 		percpu_free(pc, sizeof(pktq_counters_t));
17760d350cfSrmind 		return NULL;
17860d350cfSrmind 	}
17960d350cfSrmind 
1803612cafeSriastradh 	pq = kmem_zalloc(sizeof(*pq), KM_SLEEP);
18160d350cfSrmind 	mutex_init(&pq->pq_lock, MUTEX_DEFAULT, IPL_NONE);
18260d350cfSrmind 	pq->pq_maxlen = maxlen;
18360d350cfSrmind 	pq->pq_counters = pc;
18460d350cfSrmind 	pq->pq_sih = sih;
1853612cafeSriastradh 	pq->pq_pcq = percpu_create(sizeof(struct pcq *),
1863612cafeSriastradh 	    pktq_init_cpu, pktq_fini_cpu, pq);
18760d350cfSrmind 
18845288633Sthorpej 	rw_enter(&pktqueue_list_lock, RW_WRITER);
18945288633Sthorpej 	LIST_INSERT_HEAD(&pktqueue_list, pq, pq_list);
19045288633Sthorpej 	rw_exit(&pktqueue_list_lock);
19145288633Sthorpej 
19260d350cfSrmind 	return pq;
19360d350cfSrmind }
19460d350cfSrmind 
19560d350cfSrmind void
pktq_destroy(pktqueue_t * pq)19660d350cfSrmind pktq_destroy(pktqueue_t *pq)
19760d350cfSrmind {
19860d350cfSrmind 
19945288633Sthorpej 	KASSERT(pktqueue_list_init_once.o_status == ONCE_DONE);
20045288633Sthorpej 
20145288633Sthorpej 	rw_enter(&pktqueue_list_lock, RW_WRITER);
20245288633Sthorpej 	LIST_REMOVE(pq, pq_list);
20345288633Sthorpej 	rw_exit(&pktqueue_list_lock);
20445288633Sthorpej 
2053612cafeSriastradh 	percpu_free(pq->pq_pcq, sizeof(struct pcq *));
20660d350cfSrmind 	percpu_free(pq->pq_counters, sizeof(pktq_counters_t));
20760d350cfSrmind 	softint_disestablish(pq->pq_sih);
20860d350cfSrmind 	mutex_destroy(&pq->pq_lock);
2093612cafeSriastradh 	kmem_free(pq, sizeof(*pq));
21060d350cfSrmind }
21160d350cfSrmind 
21260d350cfSrmind /*
21360d350cfSrmind  * - pktq_inc_counter: increment the counter given an ID.
21460d350cfSrmind  * - pktq_collect_counts: handler to sum up the counts from each CPU.
21560d350cfSrmind  * - pktq_getcount: return the effective count given an ID.
21660d350cfSrmind  */
21760d350cfSrmind 
21860d350cfSrmind static inline void
pktq_inc_count(pktqueue_t * pq,u_int i)21960d350cfSrmind pktq_inc_count(pktqueue_t *pq, u_int i)
22060d350cfSrmind {
22160d350cfSrmind 	percpu_t *pc = pq->pq_counters;
22260d350cfSrmind 	pktq_counters_t *c;
22360d350cfSrmind 
22460d350cfSrmind 	c = percpu_getref(pc);
22560d350cfSrmind 	c->count[i]++;
22660d350cfSrmind 	percpu_putref(pc);
22760d350cfSrmind }
22860d350cfSrmind 
22960d350cfSrmind static void
pktq_collect_counts(void * mem,void * arg,struct cpu_info * ci)23060d350cfSrmind pktq_collect_counts(void *mem, void *arg, struct cpu_info *ci)
23160d350cfSrmind {
23260d350cfSrmind 	const pktq_counters_t *c = mem;
23360d350cfSrmind 	pktq_counters_t *sum = arg;
23460d350cfSrmind 
235b578a8edSthorpej 	int s = splnet();
236b578a8edSthorpej 
23760d350cfSrmind 	for (u_int i = 0; i < PQCNT_NCOUNTERS; i++) {
23860d350cfSrmind 		sum->count[i] += c->count[i];
23960d350cfSrmind 	}
240b578a8edSthorpej 
241b578a8edSthorpej 	splx(s);
24260d350cfSrmind }
24360d350cfSrmind 
2440c0a3f29Sthorpej static uint64_t
pktq_get_count(pktqueue_t * pq,pktq_count_t c)24560d350cfSrmind pktq_get_count(pktqueue_t *pq, pktq_count_t c)
24660d350cfSrmind {
24760d350cfSrmind 	pktq_counters_t sum;
24860d350cfSrmind 
24960d350cfSrmind 	if (c != PKTQ_MAXLEN) {
25060d350cfSrmind 		memset(&sum, 0, sizeof(sum));
251b578a8edSthorpej 		percpu_foreach_xcall(pq->pq_counters,
252b578a8edSthorpej 		    XC_HIGHPRI_IPL(IPL_SOFTNET), pktq_collect_counts, &sum);
25360d350cfSrmind 	}
25460d350cfSrmind 	switch (c) {
25560d350cfSrmind 	case PKTQ_NITEMS:
25660d350cfSrmind 		return sum.count[PQCNT_ENQUEUE] - sum.count[PQCNT_DEQUEUE];
25760d350cfSrmind 	case PKTQ_DROPS:
25860d350cfSrmind 		return sum.count[PQCNT_DROP];
25960d350cfSrmind 	case PKTQ_MAXLEN:
26060d350cfSrmind 		return pq->pq_maxlen;
26160d350cfSrmind 	}
26260d350cfSrmind 	return 0;
26360d350cfSrmind }
26460d350cfSrmind 
26560d350cfSrmind uint32_t
pktq_rps_hash(const pktq_rps_hash_func_t * funcp,const struct mbuf * m)266a3c9a952Sthorpej pktq_rps_hash(const pktq_rps_hash_func_t *funcp, const struct mbuf *m)
26760d350cfSrmind {
2687128a14dSknakahara 	pktq_rps_hash_func_t func = atomic_load_relaxed(funcp);
2697128a14dSknakahara 
2707128a14dSknakahara 	KASSERT(func != NULL);
2717128a14dSknakahara 
2727128a14dSknakahara 	return (*func)(m);
2737128a14dSknakahara }
2747128a14dSknakahara 
2757128a14dSknakahara static uint32_t
pktq_rps_hash_zero(const struct mbuf * m __unused)2767128a14dSknakahara pktq_rps_hash_zero(const struct mbuf *m __unused)
2777128a14dSknakahara {
2787128a14dSknakahara 
27960d350cfSrmind 	return 0;
28060d350cfSrmind }
28160d350cfSrmind 
2827128a14dSknakahara static uint32_t
pktq_rps_hash_curcpu(const struct mbuf * m __unused)2837128a14dSknakahara pktq_rps_hash_curcpu(const struct mbuf *m __unused)
2847128a14dSknakahara {
2857128a14dSknakahara 
2867128a14dSknakahara 	return cpu_index(curcpu());
2877128a14dSknakahara }
2887128a14dSknakahara 
2897128a14dSknakahara static uint32_t
pktq_rps_hash_toeplitz(const struct mbuf * m)2907128a14dSknakahara pktq_rps_hash_toeplitz(const struct mbuf *m)
2917128a14dSknakahara {
2927128a14dSknakahara 	struct ip *ip;
2937128a14dSknakahara 	/*
2947128a14dSknakahara 	 * Disable UDP port - IP fragments aren't currently being handled
2957128a14dSknakahara 	 * and so we end up with a mix of 2-tuple and 4-tuple
2967128a14dSknakahara 	 * traffic.
2977128a14dSknakahara 	 */
2987128a14dSknakahara 	const u_int flag = RSS_TOEPLITZ_USE_TCP_PORT;
2997128a14dSknakahara 
3007128a14dSknakahara 	/* glance IP version */
3017128a14dSknakahara 	if ((m->m_flags & M_PKTHDR) == 0)
3027128a14dSknakahara 		return 0;
3037128a14dSknakahara 
3047128a14dSknakahara 	ip = mtod(m, struct ip *);
3057128a14dSknakahara 	if (ip->ip_v == IPVERSION) {
3067128a14dSknakahara 		if (__predict_false(m->m_len < sizeof(struct ip)))
3077128a14dSknakahara 			return 0;
3087128a14dSknakahara 		return rss_toeplitz_hash_from_mbuf_ipv4(m, flag);
3097128a14dSknakahara 	} else if (ip->ip_v == 6) {
3107128a14dSknakahara 		if (__predict_false(m->m_len < sizeof(struct ip6_hdr)))
3117128a14dSknakahara 			return 0;
3127128a14dSknakahara 		return rss_toeplitz_hash_from_mbuf_ipv6(m, flag);
3137128a14dSknakahara 	}
3147128a14dSknakahara 
3157128a14dSknakahara 	return 0;
3167128a14dSknakahara }
3177128a14dSknakahara 
3187128a14dSknakahara /*
3195d6723ecSknakahara  * toeplitz without curcpu.
3205d6723ecSknakahara  * Generally, this has better performance than toeplitz.
3217128a14dSknakahara  */
3227128a14dSknakahara static uint32_t
pktq_rps_hash_toeplitz_othercpus(const struct mbuf * m)3237128a14dSknakahara pktq_rps_hash_toeplitz_othercpus(const struct mbuf *m)
3247128a14dSknakahara {
3257128a14dSknakahara 	uint32_t hash;
3267128a14dSknakahara 
327790a9110Sknakahara 	if (ncpu == 1)
328790a9110Sknakahara 		return 0;
329790a9110Sknakahara 
3307128a14dSknakahara 	hash = pktq_rps_hash_toeplitz(m);
3317128a14dSknakahara 	hash %= ncpu - 1;
3327128a14dSknakahara 	if (hash >= cpu_index(curcpu()))
3337128a14dSknakahara 		return hash + 1;
3347128a14dSknakahara 	else
3357128a14dSknakahara 		return hash;
3367128a14dSknakahara }
3377128a14dSknakahara 
3387128a14dSknakahara static struct pktq_rps_hash_table {
3397128a14dSknakahara 	const char* prh_type;
3407128a14dSknakahara 	pktq_rps_hash_func_t prh_func;
3417128a14dSknakahara } const pktq_rps_hash_tab[] = {
3427128a14dSknakahara 	{ "zero", pktq_rps_hash_zero },
3437128a14dSknakahara 	{ "curcpu", pktq_rps_hash_curcpu },
3447128a14dSknakahara 	{ "toeplitz", pktq_rps_hash_toeplitz },
3457128a14dSknakahara 	{ "toeplitz-othercpus", pktq_rps_hash_toeplitz_othercpus },
3467128a14dSknakahara };
3477128a14dSknakahara const pktq_rps_hash_func_t pktq_rps_hash_default =
3487128a14dSknakahara #ifdef NET_MPSAFE
3497128a14dSknakahara 	pktq_rps_hash_curcpu;
3507128a14dSknakahara #else
3517128a14dSknakahara 	pktq_rps_hash_zero;
3527128a14dSknakahara #endif
3537128a14dSknakahara 
3547128a14dSknakahara static const char *
pktq_get_rps_hash_type(pktq_rps_hash_func_t func)3557128a14dSknakahara pktq_get_rps_hash_type(pktq_rps_hash_func_t func)
3567128a14dSknakahara {
3577128a14dSknakahara 
3587128a14dSknakahara 	for (int i = 0; i < __arraycount(pktq_rps_hash_tab); i++) {
3597128a14dSknakahara 		if (func == pktq_rps_hash_tab[i].prh_func) {
3607128a14dSknakahara 			return pktq_rps_hash_tab[i].prh_type;
3617128a14dSknakahara 		}
3627128a14dSknakahara 	}
3637128a14dSknakahara 
3647128a14dSknakahara 	return NULL;
3657128a14dSknakahara }
3667128a14dSknakahara 
3677128a14dSknakahara static int
pktq_set_rps_hash_type(pktq_rps_hash_func_t * func,const char * type)3687128a14dSknakahara pktq_set_rps_hash_type(pktq_rps_hash_func_t *func, const char *type)
3697128a14dSknakahara {
3707128a14dSknakahara 
3717128a14dSknakahara 	if (strcmp(type, pktq_get_rps_hash_type(*func)) == 0)
3727128a14dSknakahara 		return 0;
3737128a14dSknakahara 
3747128a14dSknakahara 	for (int i = 0; i < __arraycount(pktq_rps_hash_tab); i++) {
3757128a14dSknakahara 		if (strcmp(type, pktq_rps_hash_tab[i].prh_type) == 0) {
3767128a14dSknakahara 			atomic_store_relaxed(func, pktq_rps_hash_tab[i].prh_func);
3777128a14dSknakahara 			return 0;
3787128a14dSknakahara 		}
3797128a14dSknakahara 	}
3807128a14dSknakahara 
3817128a14dSknakahara 	return ENOENT;
3827128a14dSknakahara }
3837128a14dSknakahara 
3847128a14dSknakahara int
sysctl_pktq_rps_hash_handler(SYSCTLFN_ARGS)3857128a14dSknakahara sysctl_pktq_rps_hash_handler(SYSCTLFN_ARGS)
3867128a14dSknakahara {
3877128a14dSknakahara 	struct sysctlnode node;
3887128a14dSknakahara 	pktq_rps_hash_func_t *func;
3897128a14dSknakahara 	int error;
3907128a14dSknakahara 	char type[PKTQ_RPS_HASH_NAME_LEN];
3917128a14dSknakahara 
3927128a14dSknakahara 	node = *rnode;
3937128a14dSknakahara 	func = node.sysctl_data;
3947128a14dSknakahara 
3957128a14dSknakahara 	strlcpy(type, pktq_get_rps_hash_type(*func), PKTQ_RPS_HASH_NAME_LEN);
3967128a14dSknakahara 
3977128a14dSknakahara 	node.sysctl_data = &type;
3987128a14dSknakahara 	node.sysctl_size = sizeof(type);
3997128a14dSknakahara 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
4007128a14dSknakahara 	if (error || newp == NULL)
4017128a14dSknakahara 		return error;
4027128a14dSknakahara 
4037128a14dSknakahara 	error = pktq_set_rps_hash_type(func, type);
4047128a14dSknakahara 
4057128a14dSknakahara 	return error;
4067128a14dSknakahara  }
4077128a14dSknakahara 
40860d350cfSrmind /*
40960d350cfSrmind  * pktq_enqueue: inject the packet into the end of the queue.
41060d350cfSrmind  *
41160d350cfSrmind  * => Must be called from the interrupt or with the preemption disabled.
41260d350cfSrmind  * => Consumes the packet and returns true on success.
41360d350cfSrmind  * => Returns false on failure; caller is responsible to free the packet.
41460d350cfSrmind  */
41560d350cfSrmind bool
pktq_enqueue(pktqueue_t * pq,struct mbuf * m,const u_int hash __unused)416264c0a15Srmind pktq_enqueue(pktqueue_t *pq, struct mbuf *m, const u_int hash __unused)
41760d350cfSrmind {
418bcc1163eSozaki-r #if defined(_RUMPKERNEL) || defined(_RUMP_NATIVE_ABI)
4193612cafeSriastradh 	struct cpu_info *ci = curcpu();
420ec381ed2Sozaki-r #else
4213612cafeSriastradh 	struct cpu_info *ci = cpu_lookup(hash % ncpu);
422ec381ed2Sozaki-r #endif
42360d350cfSrmind 
42460d350cfSrmind 	KASSERT(kpreempt_disabled());
42560d350cfSrmind 
4263612cafeSriastradh 	if (__predict_false(!pcq_put(pktq_pcq(pq, ci), m))) {
42760d350cfSrmind 		pktq_inc_count(pq, PQCNT_DROP);
42860d350cfSrmind 		return false;
42960d350cfSrmind 	}
4303612cafeSriastradh 	softint_schedule_cpu(pq->pq_sih, ci);
43160d350cfSrmind 	pktq_inc_count(pq, PQCNT_ENQUEUE);
43260d350cfSrmind 	return true;
43360d350cfSrmind }
43460d350cfSrmind 
43560d350cfSrmind /*
43660d350cfSrmind  * pktq_dequeue: take a packet from the queue.
43760d350cfSrmind  *
43860d350cfSrmind  * => Must be called with preemption disabled.
43960d350cfSrmind  * => Must ensure there are not concurrent dequeue calls.
44060d350cfSrmind  */
44160d350cfSrmind struct mbuf *
pktq_dequeue(pktqueue_t * pq)44260d350cfSrmind pktq_dequeue(pktqueue_t *pq)
44360d350cfSrmind {
4443612cafeSriastradh 	struct cpu_info *ci = curcpu();
44560d350cfSrmind 	struct mbuf *m;
44660d350cfSrmind 
4473612cafeSriastradh 	KASSERT(kpreempt_disabled());
4483612cafeSriastradh 
4493612cafeSriastradh 	m = pcq_get(pktq_pcq(pq, ci));
45060d350cfSrmind 	if (__predict_false(m == PKTQ_MARKER)) {
45160d350cfSrmind 		/* Note the marker entry. */
45260d350cfSrmind 		atomic_inc_uint(&pq->pq_barrier);
4530077b7b3Sthorpej 
4540077b7b3Sthorpej 		/* Get the next queue entry. */
4550077b7b3Sthorpej 		m = pcq_get(pktq_pcq(pq, ci));
4560077b7b3Sthorpej 
4570077b7b3Sthorpej 		/*
4580077b7b3Sthorpej 		 * There can only be one barrier operation pending
4590077b7b3Sthorpej 		 * on a pktqueue at any given time, so we can assert
4600077b7b3Sthorpej 		 * that the next item is not a marker.
4610077b7b3Sthorpej 		 */
4620077b7b3Sthorpej 		KASSERT(m != PKTQ_MARKER);
46360d350cfSrmind 	}
46460d350cfSrmind 	if (__predict_true(m != NULL)) {
46560d350cfSrmind 		pktq_inc_count(pq, PQCNT_DEQUEUE);
46660d350cfSrmind 	}
46760d350cfSrmind 	return m;
46860d350cfSrmind }
46960d350cfSrmind 
47060d350cfSrmind /*
47160d350cfSrmind  * pktq_barrier: waits for a grace period when all packets enqueued at
47260d350cfSrmind  * the moment of calling this routine will be processed.  This is used
47360d350cfSrmind  * to ensure that e.g. packets referencing some interface were drained.
47460d350cfSrmind  */
47560d350cfSrmind void
pktq_barrier(pktqueue_t * pq)47660d350cfSrmind pktq_barrier(pktqueue_t *pq)
47760d350cfSrmind {
4783612cafeSriastradh 	CPU_INFO_ITERATOR cii;
4793612cafeSriastradh 	struct cpu_info *ci;
48060d350cfSrmind 	u_int pending = 0;
48160d350cfSrmind 
48260d350cfSrmind 	mutex_enter(&pq->pq_lock);
48360d350cfSrmind 	KASSERT(pq->pq_barrier == 0);
48460d350cfSrmind 
4853612cafeSriastradh 	for (CPU_INFO_FOREACH(cii, ci)) {
4863612cafeSriastradh 		struct pcq *q;
4873612cafeSriastradh 
4883612cafeSriastradh 		kpreempt_disable();
4893612cafeSriastradh 		q = pktq_pcq(pq, ci);
4903612cafeSriastradh 		kpreempt_enable();
49160d350cfSrmind 
49260d350cfSrmind 		/* If the queue is empty - nothing to do. */
49360d350cfSrmind 		if (pcq_peek(q) == NULL) {
49460d350cfSrmind 			continue;
49560d350cfSrmind 		}
49660d350cfSrmind 		/* Otherwise, put the marker and entry. */
49760d350cfSrmind 		while (!pcq_put(q, PKTQ_MARKER)) {
49860d350cfSrmind 			kpause("pktqsync", false, 1, NULL);
49960d350cfSrmind 		}
50060d350cfSrmind 		kpreempt_disable();
5013612cafeSriastradh 		softint_schedule_cpu(pq->pq_sih, ci);
50260d350cfSrmind 		kpreempt_enable();
50360d350cfSrmind 		pending++;
50460d350cfSrmind 	}
50560d350cfSrmind 
50660d350cfSrmind 	/* Wait for each queue to process the markers. */
50760d350cfSrmind 	while (pq->pq_barrier != pending) {
50860d350cfSrmind 		kpause("pktqsync", false, 1, NULL);
50960d350cfSrmind 	}
51060d350cfSrmind 	pq->pq_barrier = 0;
51160d350cfSrmind 	mutex_exit(&pq->pq_lock);
51260d350cfSrmind }
51360d350cfSrmind 
51460d350cfSrmind /*
51545288633Sthorpej  * pktq_ifdetach: issue a barrier on all pktqueues when a network
51645288633Sthorpej  * interface is detached.
51745288633Sthorpej  */
51845288633Sthorpej void
pktq_ifdetach(void)51945288633Sthorpej pktq_ifdetach(void)
52045288633Sthorpej {
52145288633Sthorpej 	pktqueue_t *pq;
52245288633Sthorpej 
52345288633Sthorpej 	/* Just in case no pktqueues have been created yet... */
52445288633Sthorpej 	RUN_ONCE(&pktqueue_list_init_once, pktqueue_list_init);
52545288633Sthorpej 
52645288633Sthorpej 	rw_enter(&pktqueue_list_lock, RW_READER);
52745288633Sthorpej 	LIST_FOREACH(pq, &pktqueue_list, pq_list) {
52845288633Sthorpej 		pktq_barrier(pq);
52945288633Sthorpej 	}
53045288633Sthorpej 	rw_exit(&pktqueue_list_lock);
53145288633Sthorpej }
53245288633Sthorpej 
53345288633Sthorpej /*
53460d350cfSrmind  * pktq_flush: free mbufs in all queues.
53560d350cfSrmind  *
5364fab4afaSrmind  * => The caller must ensure there are no concurrent writers or flush calls.
53760d350cfSrmind  */
53860d350cfSrmind void
pktq_flush(pktqueue_t * pq)53960d350cfSrmind pktq_flush(pktqueue_t *pq)
54060d350cfSrmind {
5413612cafeSriastradh 	CPU_INFO_ITERATOR cii;
5423612cafeSriastradh 	struct cpu_info *ci;
54306a0da98Sthorpej 	struct mbuf *m, *m0 = NULL;
54406a0da98Sthorpej 
54506a0da98Sthorpej 	ASSERT_SLEEPABLE();
54606a0da98Sthorpej 
54706a0da98Sthorpej 	/*
54806a0da98Sthorpej 	 * Run a dummy softint at IPL_SOFTNET on all CPUs to ensure that any
54906a0da98Sthorpej 	 * already running handler for this pktqueue is no longer running.
55006a0da98Sthorpej 	 */
55106a0da98Sthorpej 	xc_barrier(XC_HIGHPRI_IPL(IPL_SOFTNET));
55206a0da98Sthorpej 
55306a0da98Sthorpej 	/*
55406a0da98Sthorpej 	 * Acquire the barrier lock.  While the caller ensures that
555*d7488b2dSandvar 	 * no explicit pktq_barrier() calls will be issued, this holds
55606a0da98Sthorpej 	 * off any implicit pktq_barrier() calls that would happen
55706a0da98Sthorpej 	 * as the result of pktq_ifdetach().
55806a0da98Sthorpej 	 */
55906a0da98Sthorpej 	mutex_enter(&pq->pq_lock);
56060d350cfSrmind 
5613612cafeSriastradh 	for (CPU_INFO_FOREACH(cii, ci)) {
5623612cafeSriastradh 		struct pcq *q;
5633612cafeSriastradh 
5643612cafeSriastradh 		kpreempt_disable();
5653612cafeSriastradh 		q = pktq_pcq(pq, ci);
5663612cafeSriastradh 		kpreempt_enable();
5673612cafeSriastradh 
5683612cafeSriastradh 		/*
56906a0da98Sthorpej 		 * Pull the packets off the pcq and chain them into
57006a0da98Sthorpej 		 * a list to be freed later.
5713612cafeSriastradh 		 */
5723612cafeSriastradh 		while ((m = pcq_get(q)) != NULL) {
57360d350cfSrmind 			pktq_inc_count(pq, PQCNT_DEQUEUE);
57406a0da98Sthorpej 			m->m_nextpkt = m0;
57506a0da98Sthorpej 			m0 = m;
57660d350cfSrmind 		}
57760d350cfSrmind 	}
57806a0da98Sthorpej 
57906a0da98Sthorpej 	mutex_exit(&pq->pq_lock);
58006a0da98Sthorpej 
58106a0da98Sthorpej 	/* Free the packets now that the critical section is over. */
58206a0da98Sthorpej 	while ((m = m0) != NULL) {
58306a0da98Sthorpej 		m0 = m->m_nextpkt;
58406a0da98Sthorpej 		m_freem(m);
58506a0da98Sthorpej 	}
58660d350cfSrmind }
587ce450355Srmind 
5883612cafeSriastradh static void
pktq_set_maxlen_cpu(void * vpq,void * vqs)5893612cafeSriastradh pktq_set_maxlen_cpu(void *vpq, void *vqs)
5903612cafeSriastradh {
5913612cafeSriastradh 	struct pktqueue *pq = vpq;
5923612cafeSriastradh 	struct pcq **qp, *q, **qs = vqs;
5933612cafeSriastradh 	unsigned i = cpu_index(curcpu());
5943612cafeSriastradh 	int s;
5953612cafeSriastradh 
5963612cafeSriastradh 	s = splnet();
5973612cafeSriastradh 	qp = percpu_getref(pq->pq_pcq);
5983612cafeSriastradh 	q = *qp;
5993612cafeSriastradh 	*qp = qs[i];
6003612cafeSriastradh 	qs[i] = q;
6013612cafeSriastradh 	percpu_putref(pq->pq_pcq);
6023612cafeSriastradh 	splx(s);
6033612cafeSriastradh }
6043612cafeSriastradh 
605ce450355Srmind /*
606ce450355Srmind  * pktq_set_maxlen: create per-CPU queues using a new size and replace
607ce450355Srmind  * the existing queues without losing any packets.
6083612cafeSriastradh  *
6093612cafeSriastradh  * XXX ncpu must remain stable throughout.
610ce450355Srmind  */
611ce450355Srmind int
pktq_set_maxlen(pktqueue_t * pq,size_t maxlen)612ce450355Srmind pktq_set_maxlen(pktqueue_t *pq, size_t maxlen)
613ce450355Srmind {
614ce450355Srmind 	const u_int slotbytes = ncpu * sizeof(pcq_t *);
615ce450355Srmind 	pcq_t **qs;
616ce450355Srmind 
617ce450355Srmind 	if (!maxlen || maxlen > PCQ_MAXLEN)
618ce450355Srmind 		return EINVAL;
619ce450355Srmind 	if (pq->pq_maxlen == maxlen)
620ce450355Srmind 		return 0;
621ce450355Srmind 
6223612cafeSriastradh 	/* First, allocate the new queues. */
623ce450355Srmind 	qs = kmem_zalloc(slotbytes, KM_SLEEP);
624ce450355Srmind 	for (u_int i = 0; i < ncpu; i++) {
625ce450355Srmind 		qs[i] = pcq_create(maxlen, KM_SLEEP);
626ce450355Srmind 	}
6273612cafeSriastradh 
6283612cafeSriastradh 	/*
6293612cafeSriastradh 	 * Issue an xcall to replace the queue pointers on each CPU.
6303612cafeSriastradh 	 * This implies all the necessary memory barriers.
6313612cafeSriastradh 	 */
632ce450355Srmind 	mutex_enter(&pq->pq_lock);
6333612cafeSriastradh 	xc_wait(xc_broadcast(XC_HIGHPRI, pktq_set_maxlen_cpu, pq, qs));
634ce450355Srmind 	pq->pq_maxlen = maxlen;
635ce450355Srmind 	mutex_exit(&pq->pq_lock);
636ce450355Srmind 
637ce450355Srmind 	/*
638ce450355Srmind 	 * At this point, the new packets are flowing into the new
6394fab4afaSrmind 	 * queues.  However, the old queues may have some packets
6404fab4afaSrmind 	 * present which are no longer being processed.  We are going
641ce450355Srmind 	 * to re-enqueue them.  This may change the order of packet
642ce450355Srmind 	 * arrival, but it is not considered an issue.
643ce450355Srmind 	 *
6444fab4afaSrmind 	 * There may be in-flight interrupts calling pktq_dequeue()
645ce450355Srmind 	 * which reference the old queues.  Issue a barrier to ensure
646ce450355Srmind 	 * that we are going to be the only pcq_get() callers on the
647ce450355Srmind 	 * old queues.
648ce450355Srmind 	 */
649ce450355Srmind 	pktq_barrier(pq);
650ce450355Srmind 
651ce450355Srmind 	for (u_int i = 0; i < ncpu; i++) {
6523612cafeSriastradh 		struct pcq *q;
653ce450355Srmind 		struct mbuf *m;
654ce450355Srmind 
6553612cafeSriastradh 		kpreempt_disable();
6563612cafeSriastradh 		q = pktq_pcq(pq, cpu_lookup(i));
6573612cafeSriastradh 		kpreempt_enable();
6583612cafeSriastradh 
659ce450355Srmind 		while ((m = pcq_get(qs[i])) != NULL) {
6603612cafeSriastradh 			while (!pcq_put(q, m)) {
661ce450355Srmind 				kpause("pktqrenq", false, 1, NULL);
662ce450355Srmind 			}
663ce450355Srmind 		}
664ce450355Srmind 		pcq_destroy(qs[i]);
665ce450355Srmind 	}
666ce450355Srmind 
667ce450355Srmind 	/* Well, that was fun. */
668ce450355Srmind 	kmem_free(qs, slotbytes);
669ce450355Srmind 	return 0;
670ce450355Srmind }
671baef3a3bSozaki-r 
6720c0a3f29Sthorpej static int
sysctl_pktq_maxlen(SYSCTLFN_ARGS)6730c0a3f29Sthorpej sysctl_pktq_maxlen(SYSCTLFN_ARGS)
674baef3a3bSozaki-r {
675baef3a3bSozaki-r 	struct sysctlnode node = *rnode;
6760c0a3f29Sthorpej 	pktqueue_t * const pq = node.sysctl_data;
6770c0a3f29Sthorpej 	u_int nmaxlen = pktq_get_count(pq, PKTQ_MAXLEN);
678baef3a3bSozaki-r 	int error;
679baef3a3bSozaki-r 
680baef3a3bSozaki-r 	node.sysctl_data = &nmaxlen;
681baef3a3bSozaki-r 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
682baef3a3bSozaki-r 	if (error || newp == NULL)
683baef3a3bSozaki-r 		return error;
684baef3a3bSozaki-r 	return pktq_set_maxlen(pq, nmaxlen);
685baef3a3bSozaki-r }
686baef3a3bSozaki-r 
6870c0a3f29Sthorpej static int
sysctl_pktq_count(SYSCTLFN_ARGS,u_int count_id)6880c0a3f29Sthorpej sysctl_pktq_count(SYSCTLFN_ARGS, u_int count_id)
689baef3a3bSozaki-r {
690baef3a3bSozaki-r 	struct sysctlnode node = *rnode;
6910c0a3f29Sthorpej 	pktqueue_t * const pq = node.sysctl_data;
6920c0a3f29Sthorpej 	uint64_t count = pktq_get_count(pq, count_id);
69380bf5cccSmsaitoh 
694baef3a3bSozaki-r 	node.sysctl_data = &count;
695baef3a3bSozaki-r 	return sysctl_lookup(SYSCTLFN_CALL(&node));
696baef3a3bSozaki-r }
6970c0a3f29Sthorpej 
6980c0a3f29Sthorpej static int
sysctl_pktq_nitems(SYSCTLFN_ARGS)6990c0a3f29Sthorpej sysctl_pktq_nitems(SYSCTLFN_ARGS)
7000c0a3f29Sthorpej {
7010c0a3f29Sthorpej 	return sysctl_pktq_count(SYSCTLFN_CALL(rnode), PKTQ_NITEMS);
7020c0a3f29Sthorpej }
7030c0a3f29Sthorpej 
7040c0a3f29Sthorpej static int
sysctl_pktq_drops(SYSCTLFN_ARGS)7050c0a3f29Sthorpej sysctl_pktq_drops(SYSCTLFN_ARGS)
7060c0a3f29Sthorpej {
7070c0a3f29Sthorpej 	return sysctl_pktq_count(SYSCTLFN_CALL(rnode), PKTQ_DROPS);
7080c0a3f29Sthorpej }
7090c0a3f29Sthorpej 
7100c0a3f29Sthorpej /*
7110c0a3f29Sthorpej  * pktqueue_sysctl_setup: set up the sysctl nodes for a pktqueue
7120c0a3f29Sthorpej  * using standardized names at the specified parent node and
7130c0a3f29Sthorpej  * node ID (or CTL_CREATE).
7140c0a3f29Sthorpej  */
7150c0a3f29Sthorpej void
pktq_sysctl_setup(pktqueue_t * const pq,struct sysctllog ** const clog,const struct sysctlnode * const parent_node,const int qid)7160c0a3f29Sthorpej pktq_sysctl_setup(pktqueue_t * const pq, struct sysctllog ** const clog,
7170c0a3f29Sthorpej 		  const struct sysctlnode * const parent_node, const int qid)
7180c0a3f29Sthorpej {
7190c0a3f29Sthorpej 	const struct sysctlnode *rnode = parent_node, *cnode;
7200c0a3f29Sthorpej 
7210c0a3f29Sthorpej 	KASSERT(pq != NULL);
7220c0a3f29Sthorpej 	KASSERT(parent_node != NULL);
7230c0a3f29Sthorpej 	KASSERT(qid == CTL_CREATE || qid >= 0);
7240c0a3f29Sthorpej 
7250c0a3f29Sthorpej 	/* Create the "ifq" node below the parent node. */
7260c0a3f29Sthorpej 	sysctl_createv(clog, 0, &rnode, &cnode,
7270c0a3f29Sthorpej 		       CTLFLAG_PERMANENT,
7280c0a3f29Sthorpej 		       CTLTYPE_NODE, "ifq",
7290c0a3f29Sthorpej 		       SYSCTL_DESCR("Protocol input queue controls"),
7300c0a3f29Sthorpej 		       NULL, 0, NULL, 0,
7310c0a3f29Sthorpej 		       qid, CTL_EOL);
7320c0a3f29Sthorpej 
7330c0a3f29Sthorpej 	/* Now create the standard child nodes below "ifq". */
7340c0a3f29Sthorpej 	rnode = cnode;
7350c0a3f29Sthorpej 
7360c0a3f29Sthorpej 	sysctl_createv(clog, 0, &rnode, &cnode,
7370c0a3f29Sthorpej 		       CTLFLAG_PERMANENT,
7380c0a3f29Sthorpej 		       CTLTYPE_QUAD, "len",
7390c0a3f29Sthorpej 		       SYSCTL_DESCR("Current input queue length"),
7400c0a3f29Sthorpej 		       sysctl_pktq_nitems, 0, (void *)pq, 0,
7410c0a3f29Sthorpej 		       IFQCTL_LEN, CTL_EOL);
7420c0a3f29Sthorpej 	sysctl_createv(clog, 0, &rnode, &cnode,
7430c0a3f29Sthorpej 		       CTLFLAG_PERMANENT | CTLFLAG_READWRITE,
7440c0a3f29Sthorpej 		       CTLTYPE_INT, "maxlen",
7450c0a3f29Sthorpej 		       SYSCTL_DESCR("Maximum allowed input queue length"),
7460c0a3f29Sthorpej 		       sysctl_pktq_maxlen, 0, (void *)pq, 0,
7470c0a3f29Sthorpej 		       IFQCTL_MAXLEN, CTL_EOL);
7480c0a3f29Sthorpej 	sysctl_createv(clog, 0, &rnode, &cnode,
7490c0a3f29Sthorpej 		       CTLFLAG_PERMANENT,
7500c0a3f29Sthorpej 		       CTLTYPE_QUAD, "drops",
7510c0a3f29Sthorpej 		       SYSCTL_DESCR("Packets dropped due to full input queue"),
7520c0a3f29Sthorpej 		       sysctl_pktq_drops, 0, (void *)pq, 0,
7530c0a3f29Sthorpej 		       IFQCTL_DROPS, CTL_EOL);
7540c0a3f29Sthorpej }
755