vport.c 13.6 KB
Newer Older
1
/*
2
 * Copyright (c) 2007-2014 Nicira, Inc.
3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21
 *
 * This program is free software; you can redistribute it and/or
 * modify it under the terms of version 2 of the GNU General Public
 * License as published by the Free Software Foundation.
 *
 * This program is distributed in the hope that it will be useful, but
 * WITHOUT ANY WARRANTY; without even the implied warranty of
 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
 * General Public License for more details.
 *
 * You should have received a copy of the GNU General Public License
 * along with this program; if not, write to the Free Software
 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
 * 02110-1301, USA
 */

#include <linux/etherdevice.h>
#include <linux/if.h>
#include <linux/if_vlan.h>
22
#include <linux/jhash.h>
23 24 25 26 27 28 29
#include <linux/kernel.h>
#include <linux/list.h>
#include <linux/mutex.h>
#include <linux/percpu.h>
#include <linux/rcupdate.h>
#include <linux/rtnetlink.h>
#include <linux/compat.h>
30
#include <net/net_namespace.h>
31
#include <linux/module.h>
32

33
#include "datapath.h"
34 35 36
#include "vport.h"
#include "vport-internal_dev.h"

37
static LIST_HEAD(vport_ops_list);
38

39
/* Protected by RCU read lock for reading, ovs_mutex for writing. */
40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67
static struct hlist_head *dev_table;
#define VPORT_HASH_BUCKETS 1024

/**
 *	ovs_vport_init - initialize vport subsystem
 *
 * Called at module load time to initialize the vport subsystem.
 */
int ovs_vport_init(void)
{
	dev_table = kzalloc(VPORT_HASH_BUCKETS * sizeof(struct hlist_head),
			    GFP_KERNEL);
	if (!dev_table)
		return -ENOMEM;

	return 0;
}

/**
 *	ovs_vport_exit - shutdown vport subsystem
 *
 * Called at module exit time to shutdown the vport subsystem.
 */
void ovs_vport_exit(void)
{
	kfree(dev_table);
}

68
static struct hlist_head *hash_bucket(const struct net *net, const char *name)
69
{
70
	unsigned int hash = jhash(name, strlen(name), (unsigned long) net);
71 72 73
	return &dev_table[hash & (VPORT_HASH_BUCKETS - 1)];
}

74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89
int ovs_vport_ops_register(struct vport_ops *ops)
{
	int err = -EEXIST;
	struct vport_ops *o;

	ovs_lock();
	list_for_each_entry(o, &vport_ops_list, list)
		if (ops->type == o->type)
			goto errout;

	list_add_tail(&ops->list, &vport_ops_list);
	err = 0;
errout:
	ovs_unlock();
	return err;
}
90
EXPORT_SYMBOL_GPL(ovs_vport_ops_register);
91 92 93 94 95 96 97

void ovs_vport_ops_unregister(struct vport_ops *ops)
{
	ovs_lock();
	list_del(&ops->list);
	ovs_unlock();
}
98
EXPORT_SYMBOL_GPL(ovs_vport_ops_unregister);
99

100 101 102 103 104
/**
 *	ovs_vport_locate - find a port that has already been created
 *
 * @name: name of port to find
 *
105
 * Must be called with ovs or RCU read lock.
106
 */
107
struct vport *ovs_vport_locate(const struct net *net, const char *name)
108
{
109
	struct hlist_head *bucket = hash_bucket(net, name);
110 111
	struct vport *vport;

112
	hlist_for_each_entry_rcu(vport, bucket, hash_node)
113
		if (!strcmp(name, ovs_vport_name(vport)) &&
114
		    net_eq(ovs_dp_get_net(vport->dp), net))
115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149
			return vport;

	return NULL;
}

/**
 *	ovs_vport_alloc - allocate and initialize new vport
 *
 * @priv_size: Size of private data area to allocate.
 * @ops: vport device ops
 *
 * Allocate and initialize a new vport defined by @ops.  The vport will contain
 * a private data area of size @priv_size that can be accessed using
 * vport_priv().  vports that are no longer needed should be released with
 * vport_free().
 */
struct vport *ovs_vport_alloc(int priv_size, const struct vport_ops *ops,
			  const struct vport_parms *parms)
{
	struct vport *vport;
	size_t alloc_size;

	alloc_size = sizeof(struct vport);
	if (priv_size) {
		alloc_size = ALIGN(alloc_size, VPORT_ALIGN);
		alloc_size += priv_size;
	}

	vport = kzalloc(alloc_size, GFP_KERNEL);
	if (!vport)
		return ERR_PTR(-ENOMEM);

	vport->dp = parms->dp;
	vport->port_no = parms->port_no;
	vport->ops = ops;
150
	INIT_HLIST_NODE(&vport->dp_hash_node);
151

152 153
	if (ovs_vport_set_upcall_portids(vport, parms->upcall_portids)) {
		kfree(vport);
154
		return ERR_PTR(-EINVAL);
155
	}
156

157 158
	return vport;
}
159
EXPORT_SYMBOL_GPL(ovs_vport_alloc);
160 161 162 163 164 165 166 167 168 169 170 171 172

/**
 *	ovs_vport_free - uninitialize and free vport
 *
 * @vport: vport to free
 *
 * Frees a vport allocated with vport_alloc() when it is no longer needed.
 *
 * The caller must ensure that an RCU grace period has passed since the last
 * time @vport was in a datapath.
 */
void ovs_vport_free(struct vport *vport)
{
173 174 175 176
	/* vport is freed from RCU callback or error path, Therefore
	 * it is safe to use raw dereference.
	 */
	kfree(rcu_dereference_raw(vport->upcall_portids));
177 178
	kfree(vport);
}
179
EXPORT_SYMBOL_GPL(ovs_vport_free);
180 181 182 183 184 185 186 187 188 189 190

static struct vport_ops *ovs_vport_lookup(const struct vport_parms *parms)
{
	struct vport_ops *ops;

	list_for_each_entry(ops, &vport_ops_list, list)
		if (ops->type == parms->type)
			return ops;

	return NULL;
}
191 192 193 194 195 196 197

/**
 *	ovs_vport_add - add vport device (for kernel callers)
 *
 * @parms: Information about new vport.
 *
 * Creates a new vport with the specified configuration (which is dependent on
198
 * device type).  ovs_mutex must be held.
199 200 201
 */
struct vport *ovs_vport_add(const struct vport_parms *parms)
{
202
	struct vport_ops *ops;
203 204
	struct vport *vport;

205 206 207
	ops = ovs_vport_lookup(parms);
	if (ops) {
		struct hlist_head *bucket;
208

209 210
		if (!try_module_get(ops->owner))
			return ERR_PTR(-EAFNOSUPPORT);
211

212 213 214
		vport = ops->create(parms);
		if (IS_ERR(vport)) {
			module_put(ops->owner);
215 216
			return vport;
		}
217 218

		bucket = hash_bucket(ovs_dp_get_net(vport->dp),
219
				     ovs_vport_name(vport));
220 221
		hlist_add_head_rcu(&vport->hash_node, bucket);
		return vport;
222 223
	}

224 225 226 227 228 229 230
	/* Unlock to attempt module load and return -EAGAIN if load
	 * was successful as we need to restart the port addition
	 * workflow.
	 */
	ovs_unlock();
	request_module("vport-type-%d", parms->type);
	ovs_lock();
231

232 233 234 235
	if (!ovs_vport_lookup(parms))
		return ERR_PTR(-EAFNOSUPPORT);
	else
		return ERR_PTR(-EAGAIN);
236 237 238 239 240 241
}

/**
 *	ovs_vport_set_options - modify existing vport device (for kernel callers)
 *
 * @vport: vport to modify.
242
 * @options: New configuration.
243 244
 *
 * Modifies an existing device with the specified configuration (which is
245
 * dependent on device type).  ovs_mutex must be held.
246 247 248 249 250 251 252 253 254 255 256 257 258 259
 */
int ovs_vport_set_options(struct vport *vport, struct nlattr *options)
{
	if (!vport->ops->set_options)
		return -EOPNOTSUPP;
	return vport->ops->set_options(vport, options);
}

/**
 *	ovs_vport_del - delete existing vport device
 *
 * @vport: vport to delete.
 *
 * Detaches @vport from its datapath and destroys it.  It is possible to fail
260
 * for reasons such as lack of memory.  ovs_mutex must be held.
261 262 263
 */
void ovs_vport_del(struct vport *vport)
{
264
	ASSERT_OVSL();
265 266

	hlist_del_rcu(&vport->hash_node);
267
	module_put(vport->ops->owner);
268
	vport->ops->destroy(vport);
269 270 271 272 273 274 275 276 277 278
}

/**
 *	ovs_vport_get_stats - retrieve device stats
 *
 * @vport: vport from which to retrieve the stats
 * @stats: location to store stats
 *
 * Retrieves transmit, receive, and error stats for the given device.
 *
279
 * Must be called with ovs_mutex or rcu_read_lock.
280 281 282
 */
void ovs_vport_get_stats(struct vport *vport, struct ovs_vport_stats *stats)
{
283 284 285 286 287 288 289 290 291 292 293 294 295
	const struct rtnl_link_stats64 *dev_stats;
	struct rtnl_link_stats64 temp;

	dev_stats = dev_get_stats(vport->dev, &temp);
	stats->rx_errors  = dev_stats->rx_errors;
	stats->tx_errors  = dev_stats->tx_errors;
	stats->tx_dropped = dev_stats->tx_dropped;
	stats->rx_dropped = dev_stats->rx_dropped;

	stats->rx_bytes	  = dev_stats->rx_bytes;
	stats->rx_packets = dev_stats->rx_packets;
	stats->tx_bytes	  = dev_stats->tx_bytes;
	stats->tx_packets = dev_stats->tx_packets;
296 297 298 299 300 301 302 303 304 305 306 307 308 309 310 311
}

/**
 *	ovs_vport_get_options - retrieve device options
 *
 * @vport: vport from which to retrieve the options.
 * @skb: sk_buff where options should be appended.
 *
 * Retrieves the configuration of the given device, appending an
 * %OVS_VPORT_ATTR_OPTIONS attribute that in turn contains nested
 * vport-specific attributes to @skb.
 *
 * Returns 0 if successful, -EMSGSIZE if @skb has insufficient room, or another
 * negative error code if a real error occurred.  If an error occurs, @skb is
 * left unmodified.
 *
312
 * Must be called with ovs_mutex or rcu_read_lock.
313 314 315 316
 */
int ovs_vport_get_options(const struct vport *vport, struct sk_buff *skb)
{
	struct nlattr *nla;
317 318 319 320
	int err;

	if (!vport->ops->get_options)
		return 0;
321 322 323 324 325

	nla = nla_nest_start(skb, OVS_VPORT_ATTR_OPTIONS);
	if (!nla)
		return -EMSGSIZE;

326 327 328 329
	err = vport->ops->get_options(vport, skb);
	if (err) {
		nla_nest_cancel(skb, nla);
		return err;
330 331 332 333 334 335
	}

	nla_nest_end(skb, nla);
	return 0;
}

336 337 338 339 340 341 342 343 344 345 346 347 348
/**
 *	ovs_vport_set_upcall_portids - set upcall portids of @vport.
 *
 * @vport: vport to modify.
 * @ids: new configuration, an array of port ids.
 *
 * Sets the vport's upcall_portids to @ids.
 *
 * Returns 0 if successful, -EINVAL if @ids is zero length or cannot be parsed
 * as an array of U32.
 *
 * Must be called with ovs_mutex.
 */
349
int ovs_vport_set_upcall_portids(struct vport *vport, const struct nlattr *ids)
350 351 352 353 354 355 356 357 358 359 360 361 362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377 378 379 380 381 382 383 384 385 386 387 388 389 390 391 392 393 394 395 396 397 398 399 400 401 402 403 404 405 406 407 408 409 410 411 412
{
	struct vport_portids *old, *vport_portids;

	if (!nla_len(ids) || nla_len(ids) % sizeof(u32))
		return -EINVAL;

	old = ovsl_dereference(vport->upcall_portids);

	vport_portids = kmalloc(sizeof(*vport_portids) + nla_len(ids),
				GFP_KERNEL);
	if (!vport_portids)
		return -ENOMEM;

	vport_portids->n_ids = nla_len(ids) / sizeof(u32);
	vport_portids->rn_ids = reciprocal_value(vport_portids->n_ids);
	nla_memcpy(vport_portids->ids, ids, nla_len(ids));

	rcu_assign_pointer(vport->upcall_portids, vport_portids);

	if (old)
		kfree_rcu(old, rcu);
	return 0;
}

/**
 *	ovs_vport_get_upcall_portids - get the upcall_portids of @vport.
 *
 * @vport: vport from which to retrieve the portids.
 * @skb: sk_buff where portids should be appended.
 *
 * Retrieves the configuration of the given vport, appending the
 * %OVS_VPORT_ATTR_UPCALL_PID attribute which is the array of upcall
 * portids to @skb.
 *
 * Returns 0 if successful, -EMSGSIZE if @skb has insufficient room.
 * If an error occurs, @skb is left unmodified.  Must be called with
 * ovs_mutex or rcu_read_lock.
 */
int ovs_vport_get_upcall_portids(const struct vport *vport,
				 struct sk_buff *skb)
{
	struct vport_portids *ids;

	ids = rcu_dereference_ovsl(vport->upcall_portids);

	if (vport->dp->user_features & OVS_DP_F_VPORT_PIDS)
		return nla_put(skb, OVS_VPORT_ATTR_UPCALL_PID,
			       ids->n_ids * sizeof(u32), (void *)ids->ids);
	else
		return nla_put_u32(skb, OVS_VPORT_ATTR_UPCALL_PID, ids->ids[0]);
}

/**
 *	ovs_vport_find_upcall_portid - find the upcall portid to send upcall.
 *
 * @vport: vport from which the missed packet is received.
 * @skb: skb that the missed packet was received.
 *
 * Uses the skb_get_hash() to select the upcall portid to send the
 * upcall.
 *
 * Returns the portid of the target socket.  Must be called with rcu_read_lock.
 */
413
u32 ovs_vport_find_upcall_portid(const struct vport *vport, struct sk_buff *skb)
414 415 416 417 418
{
	struct vport_portids *ids;
	u32 ids_index;
	u32 hash;

419
	ids = rcu_dereference(vport->upcall_portids);
420 421 422 423 424 425 426 427 428

	if (ids->n_ids == 1 && ids->ids[0] == 0)
		return 0;

	hash = skb_get_hash(skb);
	ids_index = hash - ids->n_ids * reciprocal_divide(hash, ids->rn_ids);
	return ids->ids[ids_index];
}

429 430 431 432 433
/**
 *	ovs_vport_receive - pass up received packet to the datapath for processing
 *
 * @vport: vport that received the packet
 * @skb: skb that was received
434
 * @tun_key: tunnel (if any) that carried packet
435 436
 *
 * Must be called with rcu_read_lock.  The packet cannot be shared and
437
 * skb->data should point to the Ethernet header.
438
 */
439 440
int ovs_vport_receive(struct vport *vport, struct sk_buff *skb,
		      const struct ip_tunnel_info *tun_info)
441
{
442 443
	struct sw_flow_key key;
	int error;
444

445
	OVS_CB(skb)->input_vport = vport;
J
Joe Stringer 已提交
446
	OVS_CB(skb)->mru = 0;
447 448 449 450 451 452 453 454 455
	if (unlikely(dev_net(skb->dev) != ovs_dp_get_net(vport->dp))) {
		u32 mark;

		mark = skb->mark;
		skb_scrub_packet(skb, true);
		skb->mark = mark;
		tun_info = NULL;
	}

456
	/* Extract flow from 'skb' into 'key'. */
457
	error = ovs_flow_key_extract(tun_info, skb, &key);
458 459
	if (unlikely(error)) {
		kfree_skb(skb);
460
		return error;
461 462
	}
	ovs_dp_process_packet(skb, &key);
463
	return 0;
464
}
465
EXPORT_SYMBOL_GPL(ovs_vport_receive);
466

467 468 469 470 471 472 473 474 475 476 477 478 479 480
static void free_vport_rcu(struct rcu_head *rcu)
{
	struct vport *vport = container_of(rcu, struct vport, rcu);

	ovs_vport_free(vport);
}

void ovs_vport_deferred_free(struct vport *vport)
{
	if (!vport)
		return;

	call_rcu(&vport->rcu, free_vport_rcu);
}
481
EXPORT_SYMBOL_GPL(ovs_vport_deferred_free);
482

483
int ovs_tunnel_get_egress_info(struct dp_upcall_info *upcall,
484
			       struct net *net,
485
			       struct sk_buff *skb,
486 487 488 489
			       u8 ipproto,
			       __be16 tp_src,
			       __be16 tp_dst)
{
490
	struct ip_tunnel_info *egress_tun_info = upcall->egress_tun_info;
491
	const struct ip_tunnel_info *tun_info = skb_tunnel_info(skb);
492
	const struct ip_tunnel_key *tun_key;
493
	u32 skb_mark = skb->mark;
494 495 496 497 498
	struct rtable *rt;
	struct flowi4 fl;

	if (unlikely(!tun_info))
		return -EINVAL;
499 500
	if (ip_tunnel_info_af(tun_info) != AF_INET)
		return -EINVAL;
501

502
	tun_key = &tun_info->key;
503 504 505 506 507

	/* Route lookup to get srouce IP address.
	 * The process may need to be changed if the corresponding process
	 * in vports ops changed.
	 */
508
	rt = ovs_tunnel_route_lookup(net, tun_key, skb_mark, &fl, ipproto);
509 510 511 512 513 514 515 516
	if (IS_ERR(rt))
		return PTR_ERR(rt);

	ip_rt_put(rt);

	/* Generate egress_tun_info based on tun_info,
	 * saddr, tp_src and tp_dst
	 */
517 518 519 520 521 522 523 524 525 526
	ip_tunnel_key_init(&egress_tun_info->key,
			   fl.saddr, tun_key->u.ipv4.dst,
			   tun_key->tos,
			   tun_key->ttl,
			   tp_src, tp_dst,
			   tun_key->tun_id,
			   tun_key->tun_flags);
	egress_tun_info->options_len = tun_info->options_len;
	egress_tun_info->mode = tun_info->mode;
	upcall->egress_tun_opts = ip_tunnel_info_opts(egress_tun_info);
527 528 529 530 531
	return 0;
}
EXPORT_SYMBOL_GPL(ovs_tunnel_get_egress_info);

int ovs_vport_get_egress_tun_info(struct vport *vport, struct sk_buff *skb,
532
				  struct dp_upcall_info *upcall)
533 534 535 536 537
{
	/* get_egress_tun_info() is only implemented on tunnel ports. */
	if (unlikely(!vport->ops->get_egress_tun_info))
		return -EINVAL;

538
	return vport->ops->get_egress_tun_info(vport, skb, upcall);
539
}