blob: 2abbad1abaf2edf6824e8149c3e3cb250b22c0e2 [file] [log] [blame]
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001/*
2 * drivers/net/veth.c
3 *
4 * Copyright (C) 2007 OpenVZ http://openvz.org, SWsoft Inc
5 *
6 * Author: Pavel Emelianov <xemul@openvz.org>
7 * Ethtool interface from: Eric W. Biederman <ebiederm@xmission.com>
8 *
9 */
10
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070011#include <linux/netdevice.h>
Tejun Heo5a0e3ad2010-03-24 17:04:11 +090012#include <linux/slab.h>
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070013#include <linux/ethtool.h>
14#include <linux/etherdevice.h>
Eric Dumazetcf05c702011-06-19 22:48:34 -070015#include <linux/u64_stats_sync.h>
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070016
Jiri Pirkof7b12602014-02-18 20:53:18 +010017#include <net/rtnetlink.h>
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070018#include <net/dst.h>
19#include <net/xfrm.h>
Toshiaki Makitaaf87a3a2018-08-03 16:58:14 +090020#include <net/xdp.h>
Stephen Hemmingerecef9692007-12-25 17:23:59 -080021#include <linux/veth.h>
Paul Gortmaker9d9779e2011-07-03 15:21:01 -040022#include <linux/module.h>
Toshiaki Makita948d4f22018-08-03 16:58:10 +090023#include <linux/bpf.h>
24#include <linux/filter.h>
25#include <linux/ptr_ring.h>
Toshiaki Makita948d4f22018-08-03 16:58:10 +090026#include <linux/bpf_trace.h>
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070027
28#define DRV_NAME "veth"
29#define DRV_VERSION "1.0"
30
Toshiaki Makita9fc8d512018-08-03 16:58:13 +090031#define VETH_XDP_FLAG BIT(0)
Toshiaki Makita948d4f22018-08-03 16:58:10 +090032#define VETH_RING_SIZE 256
33#define VETH_XDP_HEADROOM (XDP_PACKET_HEADROOM + NET_IP_ALIGN)
34
Toshiaki Makitad1396002018-08-03 16:58:17 +090035/* Separating two types of XDP xmit */
36#define VETH_XDP_TX BIT(0)
37#define VETH_XDP_REDIR BIT(1)
38
Eric Dumazet26811282012-12-29 16:02:43 +000039struct pcpu_vstats {
40 u64 packets;
41 u64 bytes;
Eric Dumazetcf05c702011-06-19 22:48:34 -070042 struct u64_stats_sync syncp;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070043};
44
Toshiaki Makita638264d2018-08-03 16:58:18 +090045struct veth_rq {
Toshiaki Makita948d4f22018-08-03 16:58:10 +090046 struct napi_struct xdp_napi;
47 struct net_device *dev;
48 struct bpf_prog __rcu *xdp_prog;
Toshiaki Makitad1396002018-08-03 16:58:17 +090049 struct xdp_mem_info xdp_mem;
Toshiaki Makita948d4f22018-08-03 16:58:10 +090050 bool rx_notify_masked;
51 struct ptr_ring xdp_ring;
52 struct xdp_rxq_info xdp_rxq;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070053};
54
Toshiaki Makita638264d2018-08-03 16:58:18 +090055struct veth_priv {
56 struct net_device __rcu *peer;
57 atomic64_t dropped;
58 struct bpf_prog *_xdp_prog;
59 struct veth_rq *rq;
60 unsigned int requested_headroom;
61};
62
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070063/*
64 * ethtool interface
65 */
66
67static struct {
68 const char string[ETH_GSTRING_LEN];
69} ethtool_stats_keys[] = {
70 { "peer_ifindex" },
71};
72
Philippe Reynes56607b92017-03-29 08:24:21 +020073static int veth_get_link_ksettings(struct net_device *dev,
74 struct ethtool_link_ksettings *cmd)
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070075{
Philippe Reynes56607b92017-03-29 08:24:21 +020076 cmd->base.speed = SPEED_10000;
77 cmd->base.duplex = DUPLEX_FULL;
78 cmd->base.port = PORT_TP;
79 cmd->base.autoneg = AUTONEG_DISABLE;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070080 return 0;
81}
82
83static void veth_get_drvinfo(struct net_device *dev, struct ethtool_drvinfo *info)
84{
Rick Jones33a5ba12011-11-15 14:59:53 +000085 strlcpy(info->driver, DRV_NAME, sizeof(info->driver));
86 strlcpy(info->version, DRV_VERSION, sizeof(info->version));
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070087}
88
89static void veth_get_strings(struct net_device *dev, u32 stringset, u8 *buf)
90{
91 switch(stringset) {
92 case ETH_SS_STATS:
93 memcpy(buf, &ethtool_stats_keys, sizeof(ethtool_stats_keys));
94 break;
95 }
96}
97
Jeff Garzikb9f2c042007-10-03 18:07:32 -070098static int veth_get_sset_count(struct net_device *dev, int sset)
Pavel Emelyanove314dbd2007-09-25 16:14:46 -070099{
Jeff Garzikb9f2c042007-10-03 18:07:32 -0700100 switch (sset) {
101 case ETH_SS_STATS:
102 return ARRAY_SIZE(ethtool_stats_keys);
103 default:
104 return -EOPNOTSUPP;
105 }
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700106}
107
108static void veth_get_ethtool_stats(struct net_device *dev,
109 struct ethtool_stats *stats, u64 *data)
110{
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000111 struct veth_priv *priv = netdev_priv(dev);
112 struct net_device *peer = rtnl_dereference(priv->peer);
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700113
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000114 data[0] = peer ? peer->ifindex : 0;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700115}
116
Stephen Hemminger0fc0b732009-09-02 01:03:33 -0700117static const struct ethtool_ops veth_ethtool_ops = {
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700118 .get_drvinfo = veth_get_drvinfo,
119 .get_link = ethtool_op_get_link,
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700120 .get_strings = veth_get_strings,
Jeff Garzikb9f2c042007-10-03 18:07:32 -0700121 .get_sset_count = veth_get_sset_count,
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700122 .get_ethtool_stats = veth_get_ethtool_stats,
Philippe Reynes56607b92017-03-29 08:24:21 +0200123 .get_link_ksettings = veth_get_link_ksettings,
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700124};
125
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900126/* general routines */
127
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900128static bool veth_is_xdp_frame(void *ptr)
129{
130 return (unsigned long)ptr & VETH_XDP_FLAG;
131}
132
133static void *veth_ptr_to_xdp(void *ptr)
134{
135 return (void *)((unsigned long)ptr & ~VETH_XDP_FLAG);
136}
137
Toshiaki Makitaaf87a3a2018-08-03 16:58:14 +0900138static void *veth_xdp_to_ptr(void *ptr)
139{
140 return (void *)((unsigned long)ptr | VETH_XDP_FLAG);
141}
142
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900143static void veth_ptr_free(void *ptr)
144{
145 if (veth_is_xdp_frame(ptr))
146 xdp_return_frame(veth_ptr_to_xdp(ptr));
147 else
148 kfree_skb(ptr);
149}
150
Toshiaki Makita638264d2018-08-03 16:58:18 +0900151static void __veth_xdp_flush(struct veth_rq *rq)
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900152{
153 /* Write ptr_ring before reading rx_notify_masked */
154 smp_mb();
Toshiaki Makita638264d2018-08-03 16:58:18 +0900155 if (!rq->rx_notify_masked) {
156 rq->rx_notify_masked = true;
157 napi_schedule(&rq->xdp_napi);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900158 }
159}
160
Toshiaki Makita638264d2018-08-03 16:58:18 +0900161static int veth_xdp_rx(struct veth_rq *rq, struct sk_buff *skb)
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900162{
Toshiaki Makita638264d2018-08-03 16:58:18 +0900163 if (unlikely(ptr_ring_produce(&rq->xdp_ring, skb))) {
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900164 dev_kfree_skb_any(skb);
165 return NET_RX_DROP;
166 }
167
168 return NET_RX_SUCCESS;
169}
170
Toshiaki Makita638264d2018-08-03 16:58:18 +0900171static int veth_forward_skb(struct net_device *dev, struct sk_buff *skb,
172 struct veth_rq *rq, bool xdp)
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700173{
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900174 return __dev_forward_skb(dev, skb) ?: xdp ?
Toshiaki Makita638264d2018-08-03 16:58:18 +0900175 veth_xdp_rx(rq, skb) :
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900176 netif_rx(skb);
177}
178
179static netdev_tx_t veth_xmit(struct sk_buff *skb, struct net_device *dev)
180{
181 struct veth_priv *rcv_priv, *priv = netdev_priv(dev);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900182 struct veth_rq *rq = NULL;
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000183 struct net_device *rcv;
Eric Dumazet26811282012-12-29 16:02:43 +0000184 int length = skb->len;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900185 bool rcv_xdp = false;
Toshiaki Makita638264d2018-08-03 16:58:18 +0900186 int rxq;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700187
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000188 rcu_read_lock();
189 rcv = rcu_dereference(priv->peer);
190 if (unlikely(!rcv)) {
191 kfree_skb(skb);
192 goto drop;
193 }
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700194
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900195 rcv_priv = netdev_priv(rcv);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900196 rxq = skb_get_queue_mapping(skb);
197 if (rxq < rcv->real_num_rx_queues) {
198 rq = &rcv_priv->rq[rxq];
199 rcv_xdp = rcu_access_pointer(rq->xdp_prog);
200 if (rcv_xdp)
201 skb_record_rx_queue(skb, rxq);
202 }
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900203
Toshiaki Makita638264d2018-08-03 16:58:18 +0900204 if (likely(veth_forward_skb(rcv, skb, rq, rcv_xdp) == NET_RX_SUCCESS)) {
Eric Dumazet26811282012-12-29 16:02:43 +0000205 struct pcpu_vstats *stats = this_cpu_ptr(dev->vstats);
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700206
Eric Dumazet26811282012-12-29 16:02:43 +0000207 u64_stats_update_begin(&stats->syncp);
208 stats->bytes += length;
209 stats->packets++;
210 u64_stats_update_end(&stats->syncp);
211 } else {
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000212drop:
Eric Dumazet26811282012-12-29 16:02:43 +0000213 atomic64_inc(&priv->dropped);
214 }
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900215
216 if (rcv_xdp)
Toshiaki Makita638264d2018-08-03 16:58:18 +0900217 __veth_xdp_flush(rq);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900218
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000219 rcu_read_unlock();
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900220
Patrick McHardy6ed10652009-06-23 06:03:08 +0000221 return NETDEV_TX_OK;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700222}
223
Eric Dumazet26811282012-12-29 16:02:43 +0000224static u64 veth_stats_one(struct pcpu_vstats *result, struct net_device *dev)
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700225{
Eric Dumazetcf05c702011-06-19 22:48:34 -0700226 struct veth_priv *priv = netdev_priv(dev);
David S. Miller11687a12009-06-25 02:45:42 -0700227 int cpu;
David S. Miller11687a12009-06-25 02:45:42 -0700228
Eric Dumazet26811282012-12-29 16:02:43 +0000229 result->packets = 0;
230 result->bytes = 0;
Eric Dumazet2b1c8b02009-11-18 07:09:39 +0000231 for_each_possible_cpu(cpu) {
Eric Dumazet26811282012-12-29 16:02:43 +0000232 struct pcpu_vstats *stats = per_cpu_ptr(dev->vstats, cpu);
233 u64 packets, bytes;
Eric Dumazetcf05c702011-06-19 22:48:34 -0700234 unsigned int start;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700235
Eric Dumazetcf05c702011-06-19 22:48:34 -0700236 do {
Eric W. Biederman57a77442014-03-13 21:26:42 -0700237 start = u64_stats_fetch_begin_irq(&stats->syncp);
Eric Dumazet26811282012-12-29 16:02:43 +0000238 packets = stats->packets;
239 bytes = stats->bytes;
Eric W. Biederman57a77442014-03-13 21:26:42 -0700240 } while (u64_stats_fetch_retry_irq(&stats->syncp, start));
Eric Dumazet26811282012-12-29 16:02:43 +0000241 result->packets += packets;
242 result->bytes += bytes;
David S. Miller11687a12009-06-25 02:45:42 -0700243 }
Eric Dumazet26811282012-12-29 16:02:43 +0000244 return atomic64_read(&priv->dropped);
245}
246
stephen hemmingerbc1f4472017-01-06 19:12:52 -0800247static void veth_get_stats64(struct net_device *dev,
248 struct rtnl_link_stats64 *tot)
Eric Dumazet26811282012-12-29 16:02:43 +0000249{
250 struct veth_priv *priv = netdev_priv(dev);
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000251 struct net_device *peer;
Eric Dumazet26811282012-12-29 16:02:43 +0000252 struct pcpu_vstats one;
253
254 tot->tx_dropped = veth_stats_one(&one, dev);
255 tot->tx_bytes = one.bytes;
256 tot->tx_packets = one.packets;
257
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000258 rcu_read_lock();
259 peer = rcu_dereference(priv->peer);
260 if (peer) {
261 tot->rx_dropped = veth_stats_one(&one, peer);
262 tot->rx_bytes = one.bytes;
263 tot->rx_packets = one.packets;
264 }
265 rcu_read_unlock();
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700266}
267
Gao feng5c70ef82013-10-04 16:52:24 +0800268/* fake multicast ability */
269static void veth_set_multicast_list(struct net_device *dev)
270{
271}
272
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900273static struct sk_buff *veth_build_skb(void *head, int headroom, int len,
274 int buflen)
275{
276 struct sk_buff *skb;
277
278 if (!buflen) {
279 buflen = SKB_DATA_ALIGN(headroom + len) +
280 SKB_DATA_ALIGN(sizeof(struct skb_shared_info));
281 }
282 skb = build_skb(head, buflen);
283 if (!skb)
284 return NULL;
285
286 skb_reserve(skb, headroom);
287 skb_put(skb, len);
288
289 return skb;
290}
291
Toshiaki Makita638264d2018-08-03 16:58:18 +0900292static int veth_select_rxq(struct net_device *dev)
293{
294 return smp_processor_id() % dev->real_num_rx_queues;
295}
296
Toshiaki Makitaaf87a3a2018-08-03 16:58:14 +0900297static int veth_xdp_xmit(struct net_device *dev, int n,
298 struct xdp_frame **frames, u32 flags)
299{
300 struct veth_priv *rcv_priv, *priv = netdev_priv(dev);
301 struct net_device *rcv;
302 unsigned int max_len;
Toshiaki Makita638264d2018-08-03 16:58:18 +0900303 struct veth_rq *rq;
Toshiaki Makitaaf87a3a2018-08-03 16:58:14 +0900304 int i, drops = 0;
305
306 if (unlikely(flags & ~XDP_XMIT_FLAGS_MASK))
307 return -EINVAL;
308
309 rcv = rcu_dereference(priv->peer);
310 if (unlikely(!rcv))
311 return -ENXIO;
312
313 rcv_priv = netdev_priv(rcv);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900314 rq = &rcv_priv->rq[veth_select_rxq(rcv)];
Toshiaki Makitaaf87a3a2018-08-03 16:58:14 +0900315 /* Non-NULL xdp_prog ensures that xdp_ring is initialized on receive
316 * side. This means an XDP program is loaded on the peer and the peer
317 * device is up.
318 */
Toshiaki Makita638264d2018-08-03 16:58:18 +0900319 if (!rcu_access_pointer(rq->xdp_prog))
Toshiaki Makitaaf87a3a2018-08-03 16:58:14 +0900320 return -ENXIO;
321
322 max_len = rcv->mtu + rcv->hard_header_len + VLAN_HLEN;
323
Toshiaki Makita638264d2018-08-03 16:58:18 +0900324 spin_lock(&rq->xdp_ring.producer_lock);
Toshiaki Makitaaf87a3a2018-08-03 16:58:14 +0900325 for (i = 0; i < n; i++) {
326 struct xdp_frame *frame = frames[i];
327 void *ptr = veth_xdp_to_ptr(frame);
328
329 if (unlikely(frame->len > max_len ||
Toshiaki Makita638264d2018-08-03 16:58:18 +0900330 __ptr_ring_produce(&rq->xdp_ring, ptr))) {
Toshiaki Makitaaf87a3a2018-08-03 16:58:14 +0900331 xdp_return_frame_rx_napi(frame);
332 drops++;
333 }
334 }
Toshiaki Makita638264d2018-08-03 16:58:18 +0900335 spin_unlock(&rq->xdp_ring.producer_lock);
Toshiaki Makitaaf87a3a2018-08-03 16:58:14 +0900336
337 if (flags & XDP_XMIT_FLUSH)
Toshiaki Makita638264d2018-08-03 16:58:18 +0900338 __veth_xdp_flush(rq);
Toshiaki Makitaaf87a3a2018-08-03 16:58:14 +0900339
340 return n - drops;
341}
342
Toshiaki Makitad1396002018-08-03 16:58:17 +0900343static void veth_xdp_flush(struct net_device *dev)
344{
345 struct veth_priv *rcv_priv, *priv = netdev_priv(dev);
346 struct net_device *rcv;
Toshiaki Makita638264d2018-08-03 16:58:18 +0900347 struct veth_rq *rq;
Toshiaki Makitad1396002018-08-03 16:58:17 +0900348
349 rcu_read_lock();
350 rcv = rcu_dereference(priv->peer);
351 if (unlikely(!rcv))
352 goto out;
353
354 rcv_priv = netdev_priv(rcv);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900355 rq = &rcv_priv->rq[veth_select_rxq(rcv)];
Toshiaki Makitad1396002018-08-03 16:58:17 +0900356 /* xdp_ring is initialized on receive side? */
Toshiaki Makita638264d2018-08-03 16:58:18 +0900357 if (unlikely(!rcu_access_pointer(rq->xdp_prog)))
Toshiaki Makitad1396002018-08-03 16:58:17 +0900358 goto out;
359
Toshiaki Makita638264d2018-08-03 16:58:18 +0900360 __veth_xdp_flush(rq);
Toshiaki Makitad1396002018-08-03 16:58:17 +0900361out:
362 rcu_read_unlock();
363}
364
365static int veth_xdp_tx(struct net_device *dev, struct xdp_buff *xdp)
366{
367 struct xdp_frame *frame = convert_to_xdp_frame(xdp);
368
369 if (unlikely(!frame))
370 return -EOVERFLOW;
371
372 return veth_xdp_xmit(dev, 1, &frame, 0);
373}
374
Toshiaki Makita638264d2018-08-03 16:58:18 +0900375static struct sk_buff *veth_xdp_rcv_one(struct veth_rq *rq,
Toshiaki Makitad1396002018-08-03 16:58:17 +0900376 struct xdp_frame *frame,
377 unsigned int *xdp_xmit)
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900378{
379 void *hard_start = frame->data - frame->headroom;
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900380 int len = frame->len, delta = 0;
Toshiaki Makitad1396002018-08-03 16:58:17 +0900381 struct xdp_frame orig_frame;
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900382 struct bpf_prog *xdp_prog;
383 unsigned int headroom;
384 struct sk_buff *skb;
385
Jesper Dangaard Brouerb6c90a72020-05-14 12:49:43 +0200386 /* bpf_xdp_adjust_head() assures BPF cannot access xdp_frame area */
387 hard_start -= sizeof(struct xdp_frame);
388
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900389 rcu_read_lock();
Toshiaki Makita638264d2018-08-03 16:58:18 +0900390 xdp_prog = rcu_dereference(rq->xdp_prog);
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900391 if (likely(xdp_prog)) {
392 struct xdp_buff xdp;
393 u32 act;
394
395 xdp.data_hard_start = hard_start;
396 xdp.data = frame->data;
397 xdp.data_end = frame->data + frame->len;
398 xdp.data_meta = frame->data - frame->metasize;
Toshiaki Makita638264d2018-08-03 16:58:18 +0900399 xdp.rxq = &rq->xdp_rxq;
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900400
401 act = bpf_prog_run_xdp(xdp_prog, &xdp);
402
403 switch (act) {
404 case XDP_PASS:
405 delta = frame->data - xdp.data;
406 len = xdp.data_end - xdp.data;
407 break;
Toshiaki Makitad1396002018-08-03 16:58:17 +0900408 case XDP_TX:
409 orig_frame = *frame;
Toshiaki Makitad1396002018-08-03 16:58:17 +0900410 xdp.rxq->mem = frame->mem;
Toshiaki Makita638264d2018-08-03 16:58:18 +0900411 if (unlikely(veth_xdp_tx(rq->dev, &xdp) < 0)) {
412 trace_xdp_exception(rq->dev, xdp_prog, act);
Toshiaki Makitad1396002018-08-03 16:58:17 +0900413 frame = &orig_frame;
414 goto err_xdp;
415 }
416 *xdp_xmit |= VETH_XDP_TX;
417 rcu_read_unlock();
418 goto xdp_xmit;
419 case XDP_REDIRECT:
420 orig_frame = *frame;
Toshiaki Makitad1396002018-08-03 16:58:17 +0900421 xdp.rxq->mem = frame->mem;
Toshiaki Makita638264d2018-08-03 16:58:18 +0900422 if (xdp_do_redirect(rq->dev, &xdp, xdp_prog)) {
Toshiaki Makitad1396002018-08-03 16:58:17 +0900423 frame = &orig_frame;
424 goto err_xdp;
425 }
426 *xdp_xmit |= VETH_XDP_REDIR;
427 rcu_read_unlock();
428 goto xdp_xmit;
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900429 default:
430 bpf_warn_invalid_xdp_action(act);
431 case XDP_ABORTED:
Toshiaki Makita638264d2018-08-03 16:58:18 +0900432 trace_xdp_exception(rq->dev, xdp_prog, act);
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900433 case XDP_DROP:
434 goto err_xdp;
435 }
436 }
437 rcu_read_unlock();
438
439 headroom = sizeof(struct xdp_frame) + frame->headroom - delta;
Jesper Dangaard Brouerb6c90a72020-05-14 12:49:43 +0200440 skb = veth_build_skb(hard_start, headroom, len, 0);
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900441 if (!skb) {
442 xdp_return_frame(frame);
443 goto err;
444 }
445
446 xdp_scrub_frame(frame);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900447 skb->protocol = eth_type_trans(skb, rq->dev);
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900448err:
449 return skb;
450err_xdp:
451 rcu_read_unlock();
452 xdp_return_frame(frame);
Toshiaki Makitad1396002018-08-03 16:58:17 +0900453xdp_xmit:
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900454 return NULL;
455}
456
Toshiaki Makita638264d2018-08-03 16:58:18 +0900457static struct sk_buff *veth_xdp_rcv_skb(struct veth_rq *rq, struct sk_buff *skb,
Toshiaki Makitad1396002018-08-03 16:58:17 +0900458 unsigned int *xdp_xmit)
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900459{
460 u32 pktlen, headroom, act, metalen;
461 void *orig_data, *orig_data_end;
462 struct bpf_prog *xdp_prog;
463 int mac_len, delta, off;
464 struct xdp_buff xdp;
465
Toshiaki Makita4bf9ffa2018-09-14 13:33:44 +0900466 skb_orphan(skb);
467
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900468 rcu_read_lock();
Toshiaki Makita638264d2018-08-03 16:58:18 +0900469 xdp_prog = rcu_dereference(rq->xdp_prog);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900470 if (unlikely(!xdp_prog)) {
471 rcu_read_unlock();
472 goto out;
473 }
474
475 mac_len = skb->data - skb_mac_header(skb);
476 pktlen = skb->len + mac_len;
477 headroom = skb_headroom(skb) - mac_len;
478
479 if (skb_shared(skb) || skb_head_is_locked(skb) ||
480 skb_is_nonlinear(skb) || headroom < XDP_PACKET_HEADROOM) {
481 struct sk_buff *nskb;
482 int size, head_off;
483 void *head, *start;
484 struct page *page;
485
486 size = SKB_DATA_ALIGN(VETH_XDP_HEADROOM + pktlen) +
487 SKB_DATA_ALIGN(sizeof(struct skb_shared_info));
488 if (size > PAGE_SIZE)
489 goto drop;
490
491 page = alloc_page(GFP_ATOMIC | __GFP_NOWARN);
492 if (!page)
493 goto drop;
494
495 head = page_address(page);
496 start = head + VETH_XDP_HEADROOM;
497 if (skb_copy_bits(skb, -mac_len, start, pktlen)) {
498 page_frag_free(head);
499 goto drop;
500 }
501
502 nskb = veth_build_skb(head,
503 VETH_XDP_HEADROOM + mac_len, skb->len,
504 PAGE_SIZE);
505 if (!nskb) {
506 page_frag_free(head);
507 goto drop;
508 }
509
510 skb_copy_header(nskb, skb);
511 head_off = skb_headroom(nskb) - skb_headroom(skb);
512 skb_headers_offset_update(nskb, head_off);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900513 consume_skb(skb);
514 skb = nskb;
515 }
516
517 xdp.data_hard_start = skb->head;
518 xdp.data = skb_mac_header(skb);
519 xdp.data_end = xdp.data + pktlen;
520 xdp.data_meta = xdp.data;
Toshiaki Makita638264d2018-08-03 16:58:18 +0900521 xdp.rxq = &rq->xdp_rxq;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900522 orig_data = xdp.data;
523 orig_data_end = xdp.data_end;
524
525 act = bpf_prog_run_xdp(xdp_prog, &xdp);
526
527 switch (act) {
528 case XDP_PASS:
529 break;
Toshiaki Makitad1396002018-08-03 16:58:17 +0900530 case XDP_TX:
531 get_page(virt_to_page(xdp.data));
532 consume_skb(skb);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900533 xdp.rxq->mem = rq->xdp_mem;
534 if (unlikely(veth_xdp_tx(rq->dev, &xdp) < 0)) {
535 trace_xdp_exception(rq->dev, xdp_prog, act);
Toshiaki Makitad1396002018-08-03 16:58:17 +0900536 goto err_xdp;
537 }
538 *xdp_xmit |= VETH_XDP_TX;
539 rcu_read_unlock();
540 goto xdp_xmit;
541 case XDP_REDIRECT:
542 get_page(virt_to_page(xdp.data));
543 consume_skb(skb);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900544 xdp.rxq->mem = rq->xdp_mem;
545 if (xdp_do_redirect(rq->dev, &xdp, xdp_prog))
Toshiaki Makitad1396002018-08-03 16:58:17 +0900546 goto err_xdp;
547 *xdp_xmit |= VETH_XDP_REDIR;
548 rcu_read_unlock();
549 goto xdp_xmit;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900550 default:
551 bpf_warn_invalid_xdp_action(act);
552 case XDP_ABORTED:
Toshiaki Makita638264d2018-08-03 16:58:18 +0900553 trace_xdp_exception(rq->dev, xdp_prog, act);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900554 case XDP_DROP:
555 goto drop;
556 }
557 rcu_read_unlock();
558
559 delta = orig_data - xdp.data;
560 off = mac_len + delta;
561 if (off > 0)
562 __skb_push(skb, off);
563 else if (off < 0)
564 __skb_pull(skb, -off);
565 skb->mac_header -= delta;
566 off = xdp.data_end - orig_data_end;
567 if (off != 0)
568 __skb_put(skb, off);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900569 skb->protocol = eth_type_trans(skb, rq->dev);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900570
571 metalen = xdp.data - xdp.data_meta;
572 if (metalen)
573 skb_metadata_set(skb, metalen);
574out:
575 return skb;
576drop:
577 rcu_read_unlock();
578 kfree_skb(skb);
579 return NULL;
Toshiaki Makitad1396002018-08-03 16:58:17 +0900580err_xdp:
581 rcu_read_unlock();
582 page_frag_free(xdp.data);
583xdp_xmit:
584 return NULL;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900585}
586
Toshiaki Makita638264d2018-08-03 16:58:18 +0900587static int veth_xdp_rcv(struct veth_rq *rq, int budget, unsigned int *xdp_xmit)
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900588{
589 int i, done = 0;
590
591 for (i = 0; i < budget; i++) {
Toshiaki Makita638264d2018-08-03 16:58:18 +0900592 void *ptr = __ptr_ring_consume(&rq->xdp_ring);
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900593 struct sk_buff *skb;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900594
Toshiaki Makita9fc8d512018-08-03 16:58:13 +0900595 if (!ptr)
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900596 break;
597
Toshiaki Makitad1396002018-08-03 16:58:17 +0900598 if (veth_is_xdp_frame(ptr)) {
Toshiaki Makita638264d2018-08-03 16:58:18 +0900599 skb = veth_xdp_rcv_one(rq, veth_ptr_to_xdp(ptr),
Toshiaki Makitad1396002018-08-03 16:58:17 +0900600 xdp_xmit);
601 } else {
Toshiaki Makita638264d2018-08-03 16:58:18 +0900602 skb = veth_xdp_rcv_skb(rq, ptr, xdp_xmit);
Toshiaki Makitad1396002018-08-03 16:58:17 +0900603 }
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900604
605 if (skb)
Toshiaki Makita638264d2018-08-03 16:58:18 +0900606 napi_gro_receive(&rq->xdp_napi, skb);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900607
608 done++;
609 }
610
611 return done;
612}
613
614static int veth_poll(struct napi_struct *napi, int budget)
615{
Toshiaki Makita638264d2018-08-03 16:58:18 +0900616 struct veth_rq *rq =
617 container_of(napi, struct veth_rq, xdp_napi);
Toshiaki Makitad1396002018-08-03 16:58:17 +0900618 unsigned int xdp_xmit = 0;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900619 int done;
620
Toshiaki Makitad1396002018-08-03 16:58:17 +0900621 xdp_set_return_frame_no_direct();
Toshiaki Makita638264d2018-08-03 16:58:18 +0900622 done = veth_xdp_rcv(rq, budget, &xdp_xmit);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900623
624 if (done < budget && napi_complete_done(napi, done)) {
625 /* Write rx_notify_masked before reading ptr_ring */
Toshiaki Makita638264d2018-08-03 16:58:18 +0900626 smp_store_mb(rq->rx_notify_masked, false);
627 if (unlikely(!__ptr_ring_empty(&rq->xdp_ring))) {
628 rq->rx_notify_masked = true;
629 napi_schedule(&rq->xdp_napi);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900630 }
631 }
632
Toshiaki Makitad1396002018-08-03 16:58:17 +0900633 if (xdp_xmit & VETH_XDP_TX)
Toshiaki Makita638264d2018-08-03 16:58:18 +0900634 veth_xdp_flush(rq->dev);
Toshiaki Makitad1396002018-08-03 16:58:17 +0900635 if (xdp_xmit & VETH_XDP_REDIR)
636 xdp_do_flush_map();
637 xdp_clear_return_frame_no_direct();
638
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900639 return done;
640}
641
642static int veth_napi_add(struct net_device *dev)
643{
644 struct veth_priv *priv = netdev_priv(dev);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900645 int err, i;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900646
Toshiaki Makita638264d2018-08-03 16:58:18 +0900647 for (i = 0; i < dev->real_num_rx_queues; i++) {
648 struct veth_rq *rq = &priv->rq[i];
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900649
Toshiaki Makita638264d2018-08-03 16:58:18 +0900650 err = ptr_ring_init(&rq->xdp_ring, VETH_RING_SIZE, GFP_KERNEL);
651 if (err)
652 goto err_xdp_ring;
653 }
654
655 for (i = 0; i < dev->real_num_rx_queues; i++) {
656 struct veth_rq *rq = &priv->rq[i];
657
658 netif_napi_add(dev, &rq->xdp_napi, veth_poll, NAPI_POLL_WEIGHT);
659 napi_enable(&rq->xdp_napi);
660 }
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900661
662 return 0;
Toshiaki Makita638264d2018-08-03 16:58:18 +0900663err_xdp_ring:
664 for (i--; i >= 0; i--)
665 ptr_ring_cleanup(&priv->rq[i].xdp_ring, veth_ptr_free);
666
667 return err;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900668}
669
670static void veth_napi_del(struct net_device *dev)
671{
672 struct veth_priv *priv = netdev_priv(dev);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900673 int i;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900674
Toshiaki Makita638264d2018-08-03 16:58:18 +0900675 for (i = 0; i < dev->real_num_rx_queues; i++) {
676 struct veth_rq *rq = &priv->rq[i];
677
678 napi_disable(&rq->xdp_napi);
679 napi_hash_del(&rq->xdp_napi);
680 }
681 synchronize_net();
682
683 for (i = 0; i < dev->real_num_rx_queues; i++) {
684 struct veth_rq *rq = &priv->rq[i];
685
686 netif_napi_del(&rq->xdp_napi);
687 rq->rx_notify_masked = false;
688 ptr_ring_cleanup(&rq->xdp_ring, veth_ptr_free);
689 }
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900690}
691
692static int veth_enable_xdp(struct net_device *dev)
693{
694 struct veth_priv *priv = netdev_priv(dev);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900695 int err, i;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900696
Toshiaki Makita638264d2018-08-03 16:58:18 +0900697 if (!xdp_rxq_info_is_reg(&priv->rq[0].xdp_rxq)) {
698 for (i = 0; i < dev->real_num_rx_queues; i++) {
699 struct veth_rq *rq = &priv->rq[i];
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900700
Toshiaki Makita638264d2018-08-03 16:58:18 +0900701 err = xdp_rxq_info_reg(&rq->xdp_rxq, dev, i);
702 if (err < 0)
703 goto err_rxq_reg;
704
705 err = xdp_rxq_info_reg_mem_model(&rq->xdp_rxq,
706 MEM_TYPE_PAGE_SHARED,
707 NULL);
708 if (err < 0)
709 goto err_reg_mem;
710
711 /* Save original mem info as it can be overwritten */
712 rq->xdp_mem = rq->xdp_rxq.mem;
713 }
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900714
715 err = veth_napi_add(dev);
716 if (err)
Toshiaki Makita638264d2018-08-03 16:58:18 +0900717 goto err_rxq_reg;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900718 }
719
Toshiaki Makita638264d2018-08-03 16:58:18 +0900720 for (i = 0; i < dev->real_num_rx_queues; i++)
721 rcu_assign_pointer(priv->rq[i].xdp_prog, priv->_xdp_prog);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900722
723 return 0;
Toshiaki Makita638264d2018-08-03 16:58:18 +0900724err_reg_mem:
725 xdp_rxq_info_unreg(&priv->rq[i].xdp_rxq);
726err_rxq_reg:
727 for (i--; i >= 0; i--)
728 xdp_rxq_info_unreg(&priv->rq[i].xdp_rxq);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900729
730 return err;
731}
732
733static void veth_disable_xdp(struct net_device *dev)
734{
735 struct veth_priv *priv = netdev_priv(dev);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900736 int i;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900737
Toshiaki Makita638264d2018-08-03 16:58:18 +0900738 for (i = 0; i < dev->real_num_rx_queues; i++)
739 rcu_assign_pointer(priv->rq[i].xdp_prog, NULL);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900740 veth_napi_del(dev);
Toshiaki Makita638264d2018-08-03 16:58:18 +0900741 for (i = 0; i < dev->real_num_rx_queues; i++) {
742 struct veth_rq *rq = &priv->rq[i];
743
744 rq->xdp_rxq.mem = rq->xdp_mem;
745 xdp_rxq_info_unreg(&rq->xdp_rxq);
746 }
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900747}
748
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700749static int veth_open(struct net_device *dev)
750{
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000751 struct veth_priv *priv = netdev_priv(dev);
752 struct net_device *peer = rtnl_dereference(priv->peer);
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900753 int err;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700754
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000755 if (!peer)
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700756 return -ENOTCONN;
757
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900758 if (priv->_xdp_prog) {
759 err = veth_enable_xdp(dev);
760 if (err)
761 return err;
762 }
763
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000764 if (peer->flags & IFF_UP) {
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700765 netif_carrier_on(dev);
Eric Dumazetd0e2c552013-01-04 15:42:40 +0000766 netif_carrier_on(peer);
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700767 }
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900768
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700769 return 0;
770}
771
Eric W. Biederman2cf48a12009-02-25 19:47:29 +0000772static int veth_close(struct net_device *dev)
773{
774 struct veth_priv *priv = netdev_priv(dev);
Eric Dumazet2efd32e2013-01-10 08:32:45 +0000775 struct net_device *peer = rtnl_dereference(priv->peer);
Eric W. Biederman2cf48a12009-02-25 19:47:29 +0000776
777 netif_carrier_off(dev);
Eric Dumazet2efd32e2013-01-10 08:32:45 +0000778 if (peer)
779 netif_carrier_off(peer);
Eric W. Biederman2cf48a12009-02-25 19:47:29 +0000780
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900781 if (priv->_xdp_prog)
782 veth_disable_xdp(dev);
783
Eric W. Biederman2cf48a12009-02-25 19:47:29 +0000784 return 0;
785}
786
Jarod Wilson91572082016-10-20 13:55:20 -0400787static int is_valid_veth_mtu(int mtu)
Eric Biederman38d40812009-03-03 23:36:04 -0800788{
Jarod Wilson91572082016-10-20 13:55:20 -0400789 return mtu >= ETH_MIN_MTU && mtu <= ETH_MAX_MTU;
Eric Biederman38d40812009-03-03 23:36:04 -0800790}
791
Toshiaki Makita7797b932018-08-15 17:07:29 +0900792static int veth_alloc_queues(struct net_device *dev)
793{
794 struct veth_priv *priv = netdev_priv(dev);
795 int i;
796
797 priv->rq = kcalloc(dev->num_rx_queues, sizeof(*priv->rq), GFP_KERNEL);
798 if (!priv->rq)
799 return -ENOMEM;
800
801 for (i = 0; i < dev->num_rx_queues; i++)
802 priv->rq[i].dev = dev;
803
804 return 0;
805}
806
807static void veth_free_queues(struct net_device *dev)
808{
809 struct veth_priv *priv = netdev_priv(dev);
810
811 kfree(priv->rq);
812}
813
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700814static int veth_dev_init(struct net_device *dev)
815{
Toshiaki Makita7797b932018-08-15 17:07:29 +0900816 int err;
817
WANG Cong1c213bd2014-02-13 11:46:28 -0800818 dev->vstats = netdev_alloc_pcpu_stats(struct pcpu_vstats);
Eric Dumazet26811282012-12-29 16:02:43 +0000819 if (!dev->vstats)
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700820 return -ENOMEM;
Toshiaki Makita7797b932018-08-15 17:07:29 +0900821
822 err = veth_alloc_queues(dev);
823 if (err) {
824 free_percpu(dev->vstats);
825 return err;
826 }
827
Pavel Emelyanove314dbd2007-09-25 16:14:46 -0700828 return 0;
829}
830
David S. Miller11687a12009-06-25 02:45:42 -0700831static void veth_dev_free(struct net_device *dev)
832{
Toshiaki Makita7797b932018-08-15 17:07:29 +0900833 veth_free_queues(dev);
Eric Dumazet26811282012-12-29 16:02:43 +0000834 free_percpu(dev->vstats);
David S. Miller11687a12009-06-25 02:45:42 -0700835}
836
WANG Congbb446c12014-06-23 15:36:02 -0700837#ifdef CONFIG_NET_POLL_CONTROLLER
838static void veth_poll_controller(struct net_device *dev)
839{
840 /* veth only receives frames when its peer sends one
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900841 * Since it has nothing to do with disabling irqs, we are guaranteed
WANG Congbb446c12014-06-23 15:36:02 -0700842 * never to have pending data when we poll for it so
843 * there is nothing to do here.
844 *
845 * We need this though so netpoll recognizes us as an interface that
846 * supports polling, which enables bridge devices in virt setups to
847 * still use netconsole
848 */
849}
850#endif /* CONFIG_NET_POLL_CONTROLLER */
851
Nicolas Dichtela45253b2015-04-02 17:07:11 +0200852static int veth_get_iflink(const struct net_device *dev)
853{
854 struct veth_priv *priv = netdev_priv(dev);
855 struct net_device *peer;
856 int iflink;
857
858 rcu_read_lock();
859 peer = rcu_dereference(priv->peer);
860 iflink = peer ? peer->ifindex : 0;
861 rcu_read_unlock();
862
863 return iflink;
864}
865
Toshiaki Makitadc224822018-08-03 16:58:11 +0900866static netdev_features_t veth_fix_features(struct net_device *dev,
867 netdev_features_t features)
868{
869 struct veth_priv *priv = netdev_priv(dev);
870 struct net_device *peer;
871
872 peer = rtnl_dereference(priv->peer);
873 if (peer) {
874 struct veth_priv *peer_priv = netdev_priv(peer);
875
876 if (peer_priv->_xdp_prog)
877 features &= ~NETIF_F_GSO_SOFTWARE;
878 }
879
880 return features;
881}
882
Paolo Abeni163e5292016-02-26 10:45:41 +0100883static void veth_set_rx_headroom(struct net_device *dev, int new_hr)
884{
885 struct veth_priv *peer_priv, *priv = netdev_priv(dev);
886 struct net_device *peer;
887
888 if (new_hr < 0)
889 new_hr = 0;
890
891 rcu_read_lock();
892 peer = rcu_dereference(priv->peer);
893 if (unlikely(!peer))
894 goto out;
895
896 peer_priv = netdev_priv(peer);
897 priv->requested_headroom = new_hr;
898 new_hr = max(priv->requested_headroom, peer_priv->requested_headroom);
899 dev->needed_headroom = new_hr;
900 peer->needed_headroom = new_hr;
901
902out:
903 rcu_read_unlock();
904}
905
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900906static int veth_xdp_set(struct net_device *dev, struct bpf_prog *prog,
907 struct netlink_ext_ack *extack)
908{
909 struct veth_priv *priv = netdev_priv(dev);
910 struct bpf_prog *old_prog;
911 struct net_device *peer;
Toshiaki Makitadc224822018-08-03 16:58:11 +0900912 unsigned int max_mtu;
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900913 int err;
914
915 old_prog = priv->_xdp_prog;
916 priv->_xdp_prog = prog;
917 peer = rtnl_dereference(priv->peer);
918
919 if (prog) {
920 if (!peer) {
921 NL_SET_ERR_MSG_MOD(extack, "Cannot set XDP when peer is detached");
922 err = -ENOTCONN;
923 goto err;
924 }
925
Toshiaki Makitadc224822018-08-03 16:58:11 +0900926 max_mtu = PAGE_SIZE - VETH_XDP_HEADROOM -
927 peer->hard_header_len -
928 SKB_DATA_ALIGN(sizeof(struct skb_shared_info));
929 if (peer->mtu > max_mtu) {
930 NL_SET_ERR_MSG_MOD(extack, "Peer MTU is too large to set XDP");
931 err = -ERANGE;
932 goto err;
933 }
934
Toshiaki Makita638264d2018-08-03 16:58:18 +0900935 if (dev->real_num_rx_queues < peer->real_num_tx_queues) {
936 NL_SET_ERR_MSG_MOD(extack, "XDP expects number of rx queues not less than peer tx queues");
937 err = -ENOSPC;
938 goto err;
939 }
940
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900941 if (dev->flags & IFF_UP) {
942 err = veth_enable_xdp(dev);
943 if (err) {
944 NL_SET_ERR_MSG_MOD(extack, "Setup for XDP failed");
945 goto err;
946 }
947 }
Toshiaki Makitadc224822018-08-03 16:58:11 +0900948
949 if (!old_prog) {
950 peer->hw_features &= ~NETIF_F_GSO_SOFTWARE;
951 peer->max_mtu = max_mtu;
952 }
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900953 }
954
955 if (old_prog) {
Toshiaki Makitadc224822018-08-03 16:58:11 +0900956 if (!prog) {
957 if (dev->flags & IFF_UP)
958 veth_disable_xdp(dev);
959
960 if (peer) {
961 peer->hw_features |= NETIF_F_GSO_SOFTWARE;
962 peer->max_mtu = ETH_MAX_MTU;
963 }
964 }
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900965 bpf_prog_put(old_prog);
966 }
967
Toshiaki Makitadc224822018-08-03 16:58:11 +0900968 if ((!!old_prog ^ !!prog) && peer)
969 netdev_update_features(peer);
970
Toshiaki Makita948d4f22018-08-03 16:58:10 +0900971 return 0;
972err:
973 priv->_xdp_prog = old_prog;
974
975 return err;
976}
977
978static u32 veth_xdp_query(struct net_device *dev)
979{
980 struct veth_priv *priv = netdev_priv(dev);
981 const struct bpf_prog *xdp_prog;
982
983 xdp_prog = priv->_xdp_prog;
984 if (xdp_prog)
985 return xdp_prog->aux->id;
986
987 return 0;
988}
989
990static int veth_xdp(struct net_device *dev, struct netdev_bpf *xdp)
991{
992 switch (xdp->command) {
993 case XDP_SETUP_PROG:
994 return veth_xdp_set(dev, xdp->prog, xdp->extack);
995 case XDP_QUERY_PROG:
996 xdp->prog_id = veth_xdp_query(dev);
997 return 0;
998 default:
999 return -EINVAL;
1000 }
1001}
1002
Stephen Hemminger4456e7b2008-11-19 21:50:10 -08001003static const struct net_device_ops veth_netdev_ops = {
Daniel Lezcanoee923622009-02-22 00:04:45 -08001004 .ndo_init = veth_dev_init,
1005 .ndo_open = veth_open,
Eric W. Biederman2cf48a12009-02-25 19:47:29 +00001006 .ndo_stop = veth_close,
Daniel Lezcanoee923622009-02-22 00:04:45 -08001007 .ndo_start_xmit = veth_xmit,
stephen hemminger6311cc42011-06-08 14:53:59 +00001008 .ndo_get_stats64 = veth_get_stats64,
Gao feng5c70ef82013-10-04 16:52:24 +08001009 .ndo_set_rx_mode = veth_set_multicast_list,
Daniel Lezcanoee923622009-02-22 00:04:45 -08001010 .ndo_set_mac_address = eth_mac_addr,
WANG Congbb446c12014-06-23 15:36:02 -07001011#ifdef CONFIG_NET_POLL_CONTROLLER
1012 .ndo_poll_controller = veth_poll_controller,
1013#endif
Nicolas Dichtela45253b2015-04-02 17:07:11 +02001014 .ndo_get_iflink = veth_get_iflink,
Toshiaki Makitadc224822018-08-03 16:58:11 +09001015 .ndo_fix_features = veth_fix_features,
Toshiaki Makita1a04a822015-07-31 15:03:25 +09001016 .ndo_features_check = passthru_features_check,
Paolo Abeni163e5292016-02-26 10:45:41 +01001017 .ndo_set_rx_headroom = veth_set_rx_headroom,
Toshiaki Makita948d4f22018-08-03 16:58:10 +09001018 .ndo_bpf = veth_xdp,
Toshiaki Makitaaf87a3a2018-08-03 16:58:14 +09001019 .ndo_xdp_xmit = veth_xdp_xmit,
Stephen Hemminger4456e7b2008-11-19 21:50:10 -08001020};
1021
Alexander Duyck732912d72016-04-19 14:02:26 -04001022#define VETH_FEATURES (NETIF_F_SG | NETIF_F_FRAGLIST | NETIF_F_HW_CSUM | \
Xin Longc80fafb2016-08-25 13:21:49 +08001023 NETIF_F_RXCSUM | NETIF_F_SCTP_CRC | NETIF_F_HIGHDMA | \
Alexander Duyck732912d72016-04-19 14:02:26 -04001024 NETIF_F_GSO_SOFTWARE | NETIF_F_GSO_ENCAP_ALL | \
Patrick McHardy28d2b132013-04-19 02:04:32 +00001025 NETIF_F_HW_VLAN_CTAG_TX | NETIF_F_HW_VLAN_CTAG_RX | \
1026 NETIF_F_HW_VLAN_STAG_TX | NETIF_F_HW_VLAN_STAG_RX )
Eric Dumazet80933152012-12-29 16:26:10 +00001027
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001028static void veth_setup(struct net_device *dev)
1029{
1030 ether_setup(dev);
1031
Neil Horman550fd082011-07-26 06:05:38 +00001032 dev->priv_flags &= ~IFF_TX_SKB_SHARING;
Hannes Frederic Sowa23ea5a92012-10-30 16:22:01 +00001033 dev->priv_flags |= IFF_LIVE_ADDR_CHANGE;
Phil Sutter02f01ec2015-08-18 10:30:29 +02001034 dev->priv_flags |= IFF_NO_QUEUE;
Paolo Abeni163e5292016-02-26 10:45:41 +01001035 dev->priv_flags |= IFF_PHONY_HEADROOM;
Neil Horman550fd082011-07-26 06:05:38 +00001036
Stephen Hemminger4456e7b2008-11-19 21:50:10 -08001037 dev->netdev_ops = &veth_netdev_ops;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001038 dev->ethtool_ops = &veth_ethtool_ops;
1039 dev->features |= NETIF_F_LLTX;
Eric Dumazet80933152012-12-29 16:26:10 +00001040 dev->features |= VETH_FEATURES;
Toshiaki Makita8d0d21f2014-02-18 21:20:08 +09001041 dev->vlan_features = dev->features &
Vlad Yasevich3f8c7072014-03-27 22:14:48 -04001042 ~(NETIF_F_HW_VLAN_CTAG_TX |
1043 NETIF_F_HW_VLAN_STAG_TX |
1044 NETIF_F_HW_VLAN_CTAG_RX |
1045 NETIF_F_HW_VLAN_STAG_RX);
David S. Millercf124db2017-05-08 12:52:56 -04001046 dev->needs_free_netdev = true;
1047 dev->priv_destructor = veth_dev_free;
Jarod Wilson91572082016-10-20 13:55:20 -04001048 dev->max_mtu = ETH_MAX_MTU;
Michał Mirosława2c725f2011-03-31 01:01:35 +00001049
Eric Dumazet80933152012-12-29 16:26:10 +00001050 dev->hw_features = VETH_FEATURES;
Eric Dumazet82d81892013-10-25 18:25:03 -07001051 dev->hw_enc_features = VETH_FEATURES;
David Ahern607fca92016-08-24 20:10:45 -07001052 dev->mpls_features = NETIF_F_HW_CSUM | NETIF_F_GSO_SOFTWARE;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001053}
1054
1055/*
1056 * netlink interface
1057 */
1058
Matthias Schiffera8b8a8892017-06-25 23:56:01 +02001059static int veth_validate(struct nlattr *tb[], struct nlattr *data[],
1060 struct netlink_ext_ack *extack)
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001061{
1062 if (tb[IFLA_ADDRESS]) {
1063 if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN)
1064 return -EINVAL;
1065 if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS])))
1066 return -EADDRNOTAVAIL;
1067 }
Eric Biederman38d40812009-03-03 23:36:04 -08001068 if (tb[IFLA_MTU]) {
1069 if (!is_valid_veth_mtu(nla_get_u32(tb[IFLA_MTU])))
1070 return -EINVAL;
1071 }
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001072 return 0;
1073}
1074
1075static struct rtnl_link_ops veth_link_ops;
1076
Eric W. Biederman81adee42009-11-08 00:53:51 -08001077static int veth_newlink(struct net *src_net, struct net_device *dev,
Matthias Schiffer7a3f4a12017-06-25 23:55:59 +02001078 struct nlattr *tb[], struct nlattr *data[],
1079 struct netlink_ext_ack *extack)
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001080{
Toshiaki Makita7797b932018-08-15 17:07:29 +09001081 int err;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001082 struct net_device *peer;
1083 struct veth_priv *priv;
1084 char ifname[IFNAMSIZ];
1085 struct nlattr *peer_tb[IFLA_MAX + 1], **tbp;
Tom Gundersen55177502014-07-14 16:37:25 +02001086 unsigned char name_assign_type;
Patrick McHardy3729d502010-02-26 06:34:54 +00001087 struct ifinfomsg *ifmp;
Eric W. Biederman81adee42009-11-08 00:53:51 -08001088 struct net *net;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001089
1090 /*
1091 * create and register peer first
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001092 */
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001093 if (data != NULL && data[VETH_INFO_PEER] != NULL) {
1094 struct nlattr *nla_peer;
1095
1096 nla_peer = data[VETH_INFO_PEER];
Patrick McHardy3729d502010-02-26 06:34:54 +00001097 ifmp = nla_data(nla_peer);
Jiri Pirkof7b12602014-02-18 20:53:18 +01001098 err = rtnl_nla_parse_ifla(peer_tb,
1099 nla_data(nla_peer) + sizeof(struct ifinfomsg),
Johannes Bergfceb6432017-04-12 14:34:07 +02001100 nla_len(nla_peer) - sizeof(struct ifinfomsg),
1101 NULL);
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001102 if (err < 0)
1103 return err;
1104
Matthias Schiffera8b8a8892017-06-25 23:56:01 +02001105 err = veth_validate(peer_tb, NULL, extack);
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001106 if (err < 0)
1107 return err;
1108
1109 tbp = peer_tb;
Patrick McHardy3729d502010-02-26 06:34:54 +00001110 } else {
1111 ifmp = NULL;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001112 tbp = tb;
Patrick McHardy3729d502010-02-26 06:34:54 +00001113 }
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001114
Serhey Popovych191cdb32017-06-21 12:12:24 +03001115 if (ifmp && tbp[IFLA_IFNAME]) {
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001116 nla_strlcpy(ifname, tbp[IFLA_IFNAME], IFNAMSIZ);
Tom Gundersen55177502014-07-14 16:37:25 +02001117 name_assign_type = NET_NAME_USER;
1118 } else {
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001119 snprintf(ifname, IFNAMSIZ, DRV_NAME "%%d");
Tom Gundersen55177502014-07-14 16:37:25 +02001120 name_assign_type = NET_NAME_ENUM;
1121 }
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001122
Eric W. Biederman81adee42009-11-08 00:53:51 -08001123 net = rtnl_link_get_net(src_net, tbp);
1124 if (IS_ERR(net))
1125 return PTR_ERR(net);
1126
Tom Gundersen55177502014-07-14 16:37:25 +02001127 peer = rtnl_create_link(net, ifname, name_assign_type,
1128 &veth_link_ops, tbp);
Eric W. Biederman81adee42009-11-08 00:53:51 -08001129 if (IS_ERR(peer)) {
1130 put_net(net);
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001131 return PTR_ERR(peer);
Eric W. Biederman81adee42009-11-08 00:53:51 -08001132 }
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001133
Serhey Popovych191cdb32017-06-21 12:12:24 +03001134 if (!ifmp || !tbp[IFLA_ADDRESS])
Danny Kukawkaf2cedb62012-02-15 06:45:39 +00001135 eth_hw_addr_random(peer);
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001136
Pavel Emelyanove6f8f1a2012-08-08 21:53:03 +00001137 if (ifmp && (dev->ifindex != 0))
1138 peer->ifindex = ifmp->ifi_index;
1139
Stephen Hemminger72d249552017-12-07 15:40:20 -08001140 peer->gso_max_size = dev->gso_max_size;
1141 peer->gso_max_segs = dev->gso_max_segs;
1142
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001143 err = register_netdevice(peer);
Eric W. Biederman81adee42009-11-08 00:53:51 -08001144 put_net(net);
1145 net = NULL;
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001146 if (err < 0)
1147 goto err_register_peer;
1148
1149 netif_carrier_off(peer);
1150
Patrick McHardy3729d502010-02-26 06:34:54 +00001151 err = rtnl_configure_link(peer, ifmp);
1152 if (err < 0)
1153 goto err_configure_peer;
1154
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001155 /*
1156 * register dev last
1157 *
1158 * note, that since we've registered new device the dev's name
1159 * should be re-allocated
1160 */
1161
1162 if (tb[IFLA_ADDRESS] == NULL)
Danny Kukawkaf2cedb62012-02-15 06:45:39 +00001163 eth_hw_addr_random(dev);
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001164
Jiri Pirko6c8c4442011-04-30 01:28:17 +00001165 if (tb[IFLA_IFNAME])
1166 nla_strlcpy(dev->name, tb[IFLA_IFNAME], IFNAMSIZ);
1167 else
1168 snprintf(dev->name, IFNAMSIZ, DRV_NAME "%%d");
1169
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001170 err = register_netdevice(dev);
1171 if (err < 0)
1172 goto err_register_dev;
1173
1174 netif_carrier_off(dev);
1175
1176 /*
1177 * tie the deviced together
1178 */
1179
1180 priv = netdev_priv(dev);
Eric Dumazetd0e2c552013-01-04 15:42:40 +00001181 rcu_assign_pointer(priv->peer, peer);
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001182
1183 priv = netdev_priv(peer);
Eric Dumazetd0e2c552013-01-04 15:42:40 +00001184 rcu_assign_pointer(priv->peer, dev);
Toshiaki Makita948d4f22018-08-03 16:58:10 +09001185
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001186 return 0;
1187
1188err_register_dev:
1189 /* nothing to do */
Patrick McHardy3729d502010-02-26 06:34:54 +00001190err_configure_peer:
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001191 unregister_netdevice(peer);
1192 return err;
1193
1194err_register_peer:
1195 free_netdev(peer);
1196 return err;
1197}
1198
Eric Dumazet23289a32009-10-27 07:06:36 +00001199static void veth_dellink(struct net_device *dev, struct list_head *head)
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001200{
1201 struct veth_priv *priv;
1202 struct net_device *peer;
1203
1204 priv = netdev_priv(dev);
Eric Dumazetd0e2c552013-01-04 15:42:40 +00001205 peer = rtnl_dereference(priv->peer);
1206
1207 /* Note : dellink() is called from default_device_exit_batch(),
1208 * before a rcu_synchronize() point. The devices are guaranteed
1209 * not being freed before one RCU grace period.
1210 */
1211 RCU_INIT_POINTER(priv->peer, NULL);
Eric Dumazet24540532009-10-30 01:00:27 -07001212 unregister_netdevice_queue(dev, head);
Eric Dumazetf45a5c22013-02-08 20:10:49 +00001213
1214 if (peer) {
1215 priv = netdev_priv(peer);
1216 RCU_INIT_POINTER(priv->peer, NULL);
1217 unregister_netdevice_queue(peer, head);
1218 }
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001219}
1220
Thomas Graf23711432012-02-15 04:09:46 +00001221static const struct nla_policy veth_policy[VETH_INFO_MAX + 1] = {
1222 [VETH_INFO_PEER] = { .len = sizeof(struct ifinfomsg) },
1223};
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001224
Nicolas Dichtele5f4e7b2015-01-20 15:15:46 +01001225static struct net *veth_get_link_net(const struct net_device *dev)
1226{
1227 struct veth_priv *priv = netdev_priv(dev);
1228 struct net_device *peer = rtnl_dereference(priv->peer);
1229
1230 return peer ? dev_net(peer) : dev_net(dev);
1231}
1232
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001233static struct rtnl_link_ops veth_link_ops = {
1234 .kind = DRV_NAME,
1235 .priv_size = sizeof(struct veth_priv),
1236 .setup = veth_setup,
1237 .validate = veth_validate,
1238 .newlink = veth_newlink,
1239 .dellink = veth_dellink,
1240 .policy = veth_policy,
1241 .maxtype = VETH_INFO_MAX,
Nicolas Dichtele5f4e7b2015-01-20 15:15:46 +01001242 .get_link_net = veth_get_link_net,
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001243};
1244
1245/*
1246 * init/fini
1247 */
1248
1249static __init int veth_init(void)
1250{
1251 return rtnl_link_register(&veth_link_ops);
1252}
1253
1254static __exit void veth_exit(void)
1255{
Patrick McHardy68365452008-01-20 17:25:14 -08001256 rtnl_link_unregister(&veth_link_ops);
Pavel Emelyanove314dbd2007-09-25 16:14:46 -07001257}
1258
1259module_init(veth_init);
1260module_exit(veth_exit);
1261
1262MODULE_DESCRIPTION("Virtual Ethernet Tunnel");
1263MODULE_LICENSE("GPL v2");
1264MODULE_ALIAS_RTNL_LINK(DRV_NAME);