xref: /linux/Documentation/networking/af_xdp.rst (revision ec8a42e7343234802b9054874fe01810880289ce)
1.. SPDX-License-Identifier: GPL-2.0
2
3======
4AF_XDP
5======
6
7Overview
8========
9
10AF_XDP is an address family that is optimized for high performance
11packet processing.
12
13This document assumes that the reader is familiar with BPF and XDP. If
14not, the Cilium project has an excellent reference guide at
15http://cilium.readthedocs.io/en/latest/bpf/.
16
17Using the XDP_REDIRECT action from an XDP program, the program can
18redirect ingress frames to other XDP enabled netdevs, using the
19bpf_redirect_map() function. AF_XDP sockets enable the possibility for
20XDP programs to redirect frames to a memory buffer in a user-space
21application.
22
23An AF_XDP socket (XSK) is created with the normal socket()
24syscall. Associated with each XSK are two rings: the RX ring and the
25TX ring. A socket can receive packets on the RX ring and it can send
26packets on the TX ring. These rings are registered and sized with the
27setsockopts XDP_RX_RING and XDP_TX_RING, respectively. It is mandatory
28to have at least one of these rings for each socket. An RX or TX
29descriptor ring points to a data buffer in a memory area called a
30UMEM. RX and TX can share the same UMEM so that a packet does not have
31to be copied between RX and TX. Moreover, if a packet needs to be kept
32for a while due to a possible retransmit, the descriptor that points
33to that packet can be changed to point to another and reused right
34away. This again avoids copying data.
35
36The UMEM consists of a number of equally sized chunks. A descriptor in
37one of the rings references a frame by referencing its addr. The addr
38is simply an offset within the entire UMEM region. The user space
39allocates memory for this UMEM using whatever means it feels is most
40appropriate (malloc, mmap, huge pages, etc). This memory area is then
41registered with the kernel using the new setsockopt XDP_UMEM_REG. The
42UMEM also has two rings: the FILL ring and the COMPLETION ring. The
43FILL ring is used by the application to send down addr for the kernel
44to fill in with RX packet data. References to these frames will then
45appear in the RX ring once each packet has been received. The
46COMPLETION ring, on the other hand, contains frame addr that the
47kernel has transmitted completely and can now be used again by user
48space, for either TX or RX. Thus, the frame addrs appearing in the
49COMPLETION ring are addrs that were previously transmitted using the
50TX ring. In summary, the RX and FILL rings are used for the RX path
51and the TX and COMPLETION rings are used for the TX path.
52
53The socket is then finally bound with a bind() call to a device and a
54specific queue id on that device, and it is not until bind is
55completed that traffic starts to flow.
56
57The UMEM can be shared between processes, if desired. If a process
58wants to do this, it simply skips the registration of the UMEM and its
59corresponding two rings, sets the XDP_SHARED_UMEM flag in the bind
60call and submits the XSK of the process it would like to share UMEM
61with as well as its own newly created XSK socket. The new process will
62then receive frame addr references in its own RX ring that point to
63this shared UMEM. Note that since the ring structures are
64single-consumer / single-producer (for performance reasons), the new
65process has to create its own socket with associated RX and TX rings,
66since it cannot share this with the other process. This is also the
67reason that there is only one set of FILL and COMPLETION rings per
68UMEM. It is the responsibility of a single process to handle the UMEM.
69
70How is then packets distributed from an XDP program to the XSKs? There
71is a BPF map called XSKMAP (or BPF_MAP_TYPE_XSKMAP in full). The
72user-space application can place an XSK at an arbitrary place in this
73map. The XDP program can then redirect a packet to a specific index in
74this map and at this point XDP validates that the XSK in that map was
75indeed bound to that device and ring number. If not, the packet is
76dropped. If the map is empty at that index, the packet is also
77dropped. This also means that it is currently mandatory to have an XDP
78program loaded (and one XSK in the XSKMAP) to be able to get any
79traffic to user space through the XSK.
80
81AF_XDP can operate in two different modes: XDP_SKB and XDP_DRV. If the
82driver does not have support for XDP, or XDP_SKB is explicitly chosen
83when loading the XDP program, XDP_SKB mode is employed that uses SKBs
84together with the generic XDP support and copies out the data to user
85space. A fallback mode that works for any network device. On the other
86hand, if the driver has support for XDP, it will be used by the AF_XDP
87code to provide better performance, but there is still a copy of the
88data into user space.
89
90Concepts
91========
92
93In order to use an AF_XDP socket, a number of associated objects need
94to be setup. These objects and their options are explained in the
95following sections.
96
97For an overview on how AF_XDP works, you can also take a look at the
98Linux Plumbers paper from 2018 on the subject:
99http://vger.kernel.org/lpc_net2018_talks/lpc18_paper_af_xdp_perf-v2.pdf. Do
100NOT consult the paper from 2017 on "AF_PACKET v4", the first attempt
101at AF_XDP. Nearly everything changed since then. Jonathan Corbet has
102also written an excellent article on LWN, "Accelerating networking
103with AF_XDP". It can be found at https://lwn.net/Articles/750845/.
104
105UMEM
106----
107
108UMEM is a region of virtual contiguous memory, divided into
109equal-sized frames. An UMEM is associated to a netdev and a specific
110queue id of that netdev. It is created and configured (chunk size,
111headroom, start address and size) by using the XDP_UMEM_REG setsockopt
112system call. A UMEM is bound to a netdev and queue id, via the bind()
113system call.
114
115An AF_XDP is socket linked to a single UMEM, but one UMEM can have
116multiple AF_XDP sockets. To share an UMEM created via one socket A,
117the next socket B can do this by setting the XDP_SHARED_UMEM flag in
118struct sockaddr_xdp member sxdp_flags, and passing the file descriptor
119of A to struct sockaddr_xdp member sxdp_shared_umem_fd.
120
121The UMEM has two single-producer/single-consumer rings that are used
122to transfer ownership of UMEM frames between the kernel and the
123user-space application.
124
125Rings
126-----
127
128There are a four different kind of rings: FILL, COMPLETION, RX and
129TX. All rings are single-producer/single-consumer, so the user-space
130application need explicit synchronization of multiple
131processes/threads are reading/writing to them.
132
133The UMEM uses two rings: FILL and COMPLETION. Each socket associated
134with the UMEM must have an RX queue, TX queue or both. Say, that there
135is a setup with four sockets (all doing TX and RX). Then there will be
136one FILL ring, one COMPLETION ring, four TX rings and four RX rings.
137
138The rings are head(producer)/tail(consumer) based rings. A producer
139writes the data ring at the index pointed out by struct xdp_ring
140producer member, and increasing the producer index. A consumer reads
141the data ring at the index pointed out by struct xdp_ring consumer
142member, and increasing the consumer index.
143
144The rings are configured and created via the _RING setsockopt system
145calls and mmapped to user-space using the appropriate offset to mmap()
146(XDP_PGOFF_RX_RING, XDP_PGOFF_TX_RING, XDP_UMEM_PGOFF_FILL_RING and
147XDP_UMEM_PGOFF_COMPLETION_RING).
148
149The size of the rings need to be of size power of two.
150
151UMEM Fill Ring
152~~~~~~~~~~~~~~
153
154The FILL ring is used to transfer ownership of UMEM frames from
155user-space to kernel-space. The UMEM addrs are passed in the ring. As
156an example, if the UMEM is 64k and each chunk is 4k, then the UMEM has
15716 chunks and can pass addrs between 0 and 64k.
158
159Frames passed to the kernel are used for the ingress path (RX rings).
160
161The user application produces UMEM addrs to this ring. Note that, if
162running the application with aligned chunk mode, the kernel will mask
163the incoming addr.  E.g. for a chunk size of 2k, the log2(2048) LSB of
164the addr will be masked off, meaning that 2048, 2050 and 3000 refers
165to the same chunk. If the user application is run in the unaligned
166chunks mode, then the incoming addr will be left untouched.
167
168
169UMEM Completion Ring
170~~~~~~~~~~~~~~~~~~~~
171
172The COMPLETION Ring is used transfer ownership of UMEM frames from
173kernel-space to user-space. Just like the FILL ring, UMEM indices are
174used.
175
176Frames passed from the kernel to user-space are frames that has been
177sent (TX ring) and can be used by user-space again.
178
179The user application consumes UMEM addrs from this ring.
180
181
182RX Ring
183~~~~~~~
184
185The RX ring is the receiving side of a socket. Each entry in the ring
186is a struct xdp_desc descriptor. The descriptor contains UMEM offset
187(addr) and the length of the data (len).
188
189If no frames have been passed to kernel via the FILL ring, no
190descriptors will (or can) appear on the RX ring.
191
192The user application consumes struct xdp_desc descriptors from this
193ring.
194
195TX Ring
196~~~~~~~
197
198The TX ring is used to send frames. The struct xdp_desc descriptor is
199filled (index, length and offset) and passed into the ring.
200
201To start the transfer a sendmsg() system call is required. This might
202be relaxed in the future.
203
204The user application produces struct xdp_desc descriptors to this
205ring.
206
207Libbpf
208======
209
210Libbpf is a helper library for eBPF and XDP that makes using these
211technologies a lot simpler. It also contains specific helper functions
212in tools/lib/bpf/xsk.h for facilitating the use of AF_XDP. It
213contains two types of functions: those that can be used to make the
214setup of AF_XDP socket easier and ones that can be used in the data
215plane to access the rings safely and quickly. To see an example on how
216to use this API, please take a look at the sample application in
217samples/bpf/xdpsock_usr.c which uses libbpf for both setup and data
218plane operations.
219
220We recommend that you use this library unless you have become a power
221user. It will make your program a lot simpler.
222
223XSKMAP / BPF_MAP_TYPE_XSKMAP
224============================
225
226On XDP side there is a BPF map type BPF_MAP_TYPE_XSKMAP (XSKMAP) that
227is used in conjunction with bpf_redirect_map() to pass the ingress
228frame to a socket.
229
230The user application inserts the socket into the map, via the bpf()
231system call.
232
233Note that if an XDP program tries to redirect to a socket that does
234not match the queue configuration and netdev, the frame will be
235dropped. E.g. an AF_XDP socket is bound to netdev eth0 and
236queue 17. Only the XDP program executing for eth0 and queue 17 will
237successfully pass data to the socket. Please refer to the sample
238application (samples/bpf/) in for an example.
239
240Configuration Flags and Socket Options
241======================================
242
243These are the various configuration flags that can be used to control
244and monitor the behavior of AF_XDP sockets.
245
246XDP_COPY and XDP_ZERO_COPY bind flags
247-------------------------------------
248
249When you bind to a socket, the kernel will first try to use zero-copy
250copy. If zero-copy is not supported, it will fall back on using copy
251mode, i.e. copying all packets out to user space. But if you would
252like to force a certain mode, you can use the following flags. If you
253pass the XDP_COPY flag to the bind call, the kernel will force the
254socket into copy mode. If it cannot use copy mode, the bind call will
255fail with an error. Conversely, the XDP_ZERO_COPY flag will force the
256socket into zero-copy mode or fail.
257
258XDP_SHARED_UMEM bind flag
259-------------------------
260
261This flag enables you to bind multiple sockets to the same UMEM. It
262works on the same queue id, between queue ids and between
263netdevs/devices. In this mode, each socket has their own RX and TX
264rings as usual, but you are going to have one or more FILL and
265COMPLETION ring pairs. You have to create one of these pairs per
266unique netdev and queue id tuple that you bind to.
267
268Starting with the case were we would like to share a UMEM between
269sockets bound to the same netdev and queue id. The UMEM (tied to the
270fist socket created) will only have a single FILL ring and a single
271COMPLETION ring as there is only on unique netdev,queue_id tuple that
272we have bound to. To use this mode, create the first socket and bind
273it in the normal way. Create a second socket and create an RX and a TX
274ring, or at least one of them, but no FILL or COMPLETION rings as the
275ones from the first socket will be used. In the bind call, set he
276XDP_SHARED_UMEM option and provide the initial socket's fd in the
277sxdp_shared_umem_fd field. You can attach an arbitrary number of extra
278sockets this way.
279
280What socket will then a packet arrive on? This is decided by the XDP
281program. Put all the sockets in the XSK_MAP and just indicate which
282index in the array you would like to send each packet to. A simple
283round-robin example of distributing packets is shown below:
284
285.. code-block:: c
286
287   #include <linux/bpf.h>
288   #include "bpf_helpers.h"
289
290   #define MAX_SOCKS 16
291
292   struct {
293        __uint(type, BPF_MAP_TYPE_XSKMAP);
294        __uint(max_entries, MAX_SOCKS);
295        __uint(key_size, sizeof(int));
296        __uint(value_size, sizeof(int));
297   } xsks_map SEC(".maps");
298
299   static unsigned int rr;
300
301   SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx)
302   {
303	rr = (rr + 1) & (MAX_SOCKS - 1);
304
305	return bpf_redirect_map(&xsks_map, rr, XDP_DROP);
306   }
307
308Note, that since there is only a single set of FILL and COMPLETION
309rings, and they are single producer, single consumer rings, you need
310to make sure that multiple processes or threads do not use these rings
311concurrently. There are no synchronization primitives in the
312libbpf code that protects multiple users at this point in time.
313
314Libbpf uses this mode if you create more than one socket tied to the
315same UMEM. However, note that you need to supply the
316XSK_LIBBPF_FLAGS__INHIBIT_PROG_LOAD libbpf_flag with the
317xsk_socket__create calls and load your own XDP program as there is no
318built in one in libbpf that will route the traffic for you.
319
320The second case is when you share a UMEM between sockets that are
321bound to different queue ids and/or netdevs. In this case you have to
322create one FILL ring and one COMPLETION ring for each unique
323netdev,queue_id pair. Let us say you want to create two sockets bound
324to two different queue ids on the same netdev. Create the first socket
325and bind it in the normal way. Create a second socket and create an RX
326and a TX ring, or at least one of them, and then one FILL and
327COMPLETION ring for this socket. Then in the bind call, set he
328XDP_SHARED_UMEM option and provide the initial socket's fd in the
329sxdp_shared_umem_fd field as you registered the UMEM on that
330socket. These two sockets will now share one and the same UMEM.
331
332There is no need to supply an XDP program like the one in the previous
333case where sockets were bound to the same queue id and
334device. Instead, use the NIC's packet steering capabilities to steer
335the packets to the right queue. In the previous example, there is only
336one queue shared among sockets, so the NIC cannot do this steering. It
337can only steer between queues.
338
339In libbpf, you need to use the xsk_socket__create_shared() API as it
340takes a reference to a FILL ring and a COMPLETION ring that will be
341created for you and bound to the shared UMEM. You can use this
342function for all the sockets you create, or you can use it for the
343second and following ones and use xsk_socket__create() for the first
344one. Both methods yield the same result.
345
346Note that a UMEM can be shared between sockets on the same queue id
347and device, as well as between queues on the same device and between
348devices at the same time.
349
350XDP_USE_NEED_WAKEUP bind flag
351-----------------------------
352
353This option adds support for a new flag called need_wakeup that is
354present in the FILL ring and the TX ring, the rings for which user
355space is a producer. When this option is set in the bind call, the
356need_wakeup flag will be set if the kernel needs to be explicitly
357woken up by a syscall to continue processing packets. If the flag is
358zero, no syscall is needed.
359
360If the flag is set on the FILL ring, the application needs to call
361poll() to be able to continue to receive packets on the RX ring. This
362can happen, for example, when the kernel has detected that there are no
363more buffers on the FILL ring and no buffers left on the RX HW ring of
364the NIC. In this case, interrupts are turned off as the NIC cannot
365receive any packets (as there are no buffers to put them in), and the
366need_wakeup flag is set so that user space can put buffers on the
367FILL ring and then call poll() so that the kernel driver can put these
368buffers on the HW ring and start to receive packets.
369
370If the flag is set for the TX ring, it means that the application
371needs to explicitly notify the kernel to send any packets put on the
372TX ring. This can be accomplished either by a poll() call, as in the
373RX path, or by calling sendto().
374
375An example of how to use this flag can be found in
376samples/bpf/xdpsock_user.c. An example with the use of libbpf helpers
377would look like this for the TX path:
378
379.. code-block:: c
380
381   if (xsk_ring_prod__needs_wakeup(&my_tx_ring))
382      sendto(xsk_socket__fd(xsk_handle), NULL, 0, MSG_DONTWAIT, NULL, 0);
383
384I.e., only use the syscall if the flag is set.
385
386We recommend that you always enable this mode as it usually leads to
387better performance especially if you run the application and the
388driver on the same core, but also if you use different cores for the
389application and the kernel driver, as it reduces the number of
390syscalls needed for the TX path.
391
392XDP_{RX|TX|UMEM_FILL|UMEM_COMPLETION}_RING setsockopts
393------------------------------------------------------
394
395These setsockopts sets the number of descriptors that the RX, TX,
396FILL, and COMPLETION rings respectively should have. It is mandatory
397to set the size of at least one of the RX and TX rings. If you set
398both, you will be able to both receive and send traffic from your
399application, but if you only want to do one of them, you can save
400resources by only setting up one of them. Both the FILL ring and the
401COMPLETION ring are mandatory as you need to have a UMEM tied to your
402socket. But if the XDP_SHARED_UMEM flag is used, any socket after the
403first one does not have a UMEM and should in that case not have any
404FILL or COMPLETION rings created as the ones from the shared UMEM will
405be used. Note, that the rings are single-producer single-consumer, so
406do not try to access them from multiple processes at the same
407time. See the XDP_SHARED_UMEM section.
408
409In libbpf, you can create Rx-only and Tx-only sockets by supplying
410NULL to the rx and tx arguments, respectively, to the
411xsk_socket__create function.
412
413If you create a Tx-only socket, we recommend that you do not put any
414packets on the fill ring. If you do this, drivers might think you are
415going to receive something when you in fact will not, and this can
416negatively impact performance.
417
418XDP_UMEM_REG setsockopt
419-----------------------
420
421This setsockopt registers a UMEM to a socket. This is the area that
422contain all the buffers that packet can recide in. The call takes a
423pointer to the beginning of this area and the size of it. Moreover, it
424also has parameter called chunk_size that is the size that the UMEM is
425divided into. It can only be 2K or 4K at the moment. If you have an
426UMEM area that is 128K and a chunk size of 2K, this means that you
427will be able to hold a maximum of 128K / 2K = 64 packets in your UMEM
428area and that your largest packet size can be 2K.
429
430There is also an option to set the headroom of each single buffer in
431the UMEM. If you set this to N bytes, it means that the packet will
432start N bytes into the buffer leaving the first N bytes for the
433application to use. The final option is the flags field, but it will
434be dealt with in separate sections for each UMEM flag.
435
436XDP_STATISTICS getsockopt
437-------------------------
438
439Gets drop statistics of a socket that can be useful for debug
440purposes. The supported statistics are shown below:
441
442.. code-block:: c
443
444   struct xdp_statistics {
445	  __u64 rx_dropped; /* Dropped for reasons other than invalid desc */
446	  __u64 rx_invalid_descs; /* Dropped due to invalid descriptor */
447	  __u64 tx_invalid_descs; /* Dropped due to invalid descriptor */
448   };
449
450XDP_OPTIONS getsockopt
451----------------------
452
453Gets options from an XDP socket. The only one supported so far is
454XDP_OPTIONS_ZEROCOPY which tells you if zero-copy is on or not.
455
456Usage
457=====
458
459In order to use AF_XDP sockets two parts are needed. The
460user-space application and the XDP program. For a complete setup and
461usage example, please refer to the sample application. The user-space
462side is xdpsock_user.c and the XDP side is part of libbpf.
463
464The XDP code sample included in tools/lib/bpf/xsk.c is the following:
465
466.. code-block:: c
467
468   SEC("xdp_sock") int xdp_sock_prog(struct xdp_md *ctx)
469   {
470       int index = ctx->rx_queue_index;
471
472       // A set entry here means that the corresponding queue_id
473       // has an active AF_XDP socket bound to it.
474       if (bpf_map_lookup_elem(&xsks_map, &index))
475           return bpf_redirect_map(&xsks_map, index, 0);
476
477       return XDP_PASS;
478   }
479
480A simple but not so performance ring dequeue and enqueue could look
481like this:
482
483.. code-block:: c
484
485    // struct xdp_rxtx_ring {
486    // 	__u32 *producer;
487    // 	__u32 *consumer;
488    // 	struct xdp_desc *desc;
489    // };
490
491    // struct xdp_umem_ring {
492    // 	__u32 *producer;
493    // 	__u32 *consumer;
494    // 	__u64 *desc;
495    // };
496
497    // typedef struct xdp_rxtx_ring RING;
498    // typedef struct xdp_umem_ring RING;
499
500    // typedef struct xdp_desc RING_TYPE;
501    // typedef __u64 RING_TYPE;
502
503    int dequeue_one(RING *ring, RING_TYPE *item)
504    {
505        __u32 entries = *ring->producer - *ring->consumer;
506
507        if (entries == 0)
508            return -1;
509
510        // read-barrier!
511
512        *item = ring->desc[*ring->consumer & (RING_SIZE - 1)];
513        (*ring->consumer)++;
514        return 0;
515    }
516
517    int enqueue_one(RING *ring, const RING_TYPE *item)
518    {
519        u32 free_entries = RING_SIZE - (*ring->producer - *ring->consumer);
520
521        if (free_entries == 0)
522            return -1;
523
524        ring->desc[*ring->producer & (RING_SIZE - 1)] = *item;
525
526        // write-barrier!
527
528        (*ring->producer)++;
529        return 0;
530    }
531
532But please use the libbpf functions as they are optimized and ready to
533use. Will make your life easier.
534
535Sample application
536==================
537
538There is a xdpsock benchmarking/test application included that
539demonstrates how to use AF_XDP sockets with private UMEMs. Say that
540you would like your UDP traffic from port 4242 to end up in queue 16,
541that we will enable AF_XDP on. Here, we use ethtool for this::
542
543      ethtool -N p3p2 rx-flow-hash udp4 fn
544      ethtool -N p3p2 flow-type udp4 src-port 4242 dst-port 4242 \
545          action 16
546
547Running the rxdrop benchmark in XDP_DRV mode can then be done
548using::
549
550      samples/bpf/xdpsock -i p3p2 -q 16 -r -N
551
552For XDP_SKB mode, use the switch "-S" instead of "-N" and all options
553can be displayed with "-h", as usual.
554
555This sample application uses libbpf to make the setup and usage of
556AF_XDP simpler. If you want to know how the raw uapi of AF_XDP is
557really used to make something more advanced, take a look at the libbpf
558code in tools/lib/bpf/xsk.[ch].
559
560FAQ
561=======
562
563Q: I am not seeing any traffic on the socket. What am I doing wrong?
564
565A: When a netdev of a physical NIC is initialized, Linux usually
566   allocates one RX and TX queue pair per core. So on a 8 core system,
567   queue ids 0 to 7 will be allocated, one per core. In the AF_XDP
568   bind call or the xsk_socket__create libbpf function call, you
569   specify a specific queue id to bind to and it is only the traffic
570   towards that queue you are going to get on you socket. So in the
571   example above, if you bind to queue 0, you are NOT going to get any
572   traffic that is distributed to queues 1 through 7. If you are
573   lucky, you will see the traffic, but usually it will end up on one
574   of the queues you have not bound to.
575
576   There are a number of ways to solve the problem of getting the
577   traffic you want to the queue id you bound to. If you want to see
578   all the traffic, you can force the netdev to only have 1 queue, queue
579   id 0, and then bind to queue 0. You can use ethtool to do this::
580
581     sudo ethtool -L <interface> combined 1
582
583   If you want to only see part of the traffic, you can program the
584   NIC through ethtool to filter out your traffic to a single queue id
585   that you can bind your XDP socket to. Here is one example in which
586   UDP traffic to and from port 4242 are sent to queue 2::
587
588     sudo ethtool -N <interface> rx-flow-hash udp4 fn
589     sudo ethtool -N <interface> flow-type udp4 src-port 4242 dst-port \
590     4242 action 2
591
592   A number of other ways are possible all up to the capabilities of
593   the NIC you have.
594
595Q: Can I use the XSKMAP to implement a switch betwen different umems
596   in copy mode?
597
598A: The short answer is no, that is not supported at the moment. The
599   XSKMAP can only be used to switch traffic coming in on queue id X
600   to sockets bound to the same queue id X. The XSKMAP can contain
601   sockets bound to different queue ids, for example X and Y, but only
602   traffic goming in from queue id Y can be directed to sockets bound
603   to the same queue id Y. In zero-copy mode, you should use the
604   switch, or other distribution mechanism, in your NIC to direct
605   traffic to the correct queue id and socket.
606
607Q: My packets are sometimes corrupted. What is wrong?
608
609A: Care has to be taken not to feed the same buffer in the UMEM into
610   more than one ring at the same time. If you for example feed the
611   same buffer into the FILL ring and the TX ring at the same time, the
612   NIC might receive data into the buffer at the same time it is
613   sending it. This will cause some packets to become corrupted. Same
614   thing goes for feeding the same buffer into the FILL rings
615   belonging to different queue ids or netdevs bound with the
616   XDP_SHARED_UMEM flag.
617
618Credits
619=======
620
621- Björn Töpel (AF_XDP core)
622- Magnus Karlsson (AF_XDP core)
623- Alexander Duyck
624- Alexei Starovoitov
625- Daniel Borkmann
626- Jesper Dangaard Brouer
627- John Fastabend
628- Jonathan Corbet (LWN coverage)
629- Michael S. Tsirkin
630- Qi Z Zhang
631- Willem de Bruijn
632