xref: /openbmc/linux/drivers/net/veth.c (revision 39b6f3aa)
1 /*
2  *  drivers/net/veth.c
3  *
4  *  Copyright (C) 2007 OpenVZ http://openvz.org, SWsoft Inc
5  *
6  * Author: Pavel Emelianov <xemul@openvz.org>
7  * Ethtool interface from: Eric W. Biederman <ebiederm@xmission.com>
8  *
9  */
10 
11 #include <linux/netdevice.h>
12 #include <linux/slab.h>
13 #include <linux/ethtool.h>
14 #include <linux/etherdevice.h>
15 #include <linux/u64_stats_sync.h>
16 
17 #include <net/dst.h>
18 #include <net/xfrm.h>
19 #include <linux/veth.h>
20 #include <linux/module.h>
21 
22 #define DRV_NAME	"veth"
23 #define DRV_VERSION	"1.0"
24 
25 #define MIN_MTU 68		/* Min L3 MTU */
26 #define MAX_MTU 65535		/* Max L3 MTU (arbitrary) */
27 
28 struct pcpu_vstats {
29 	u64			packets;
30 	u64			bytes;
31 	struct u64_stats_sync	syncp;
32 };
33 
34 struct veth_priv {
35 	struct net_device __rcu	*peer;
36 	atomic64_t		dropped;
37 };
38 
39 /*
40  * ethtool interface
41  */
42 
43 static struct {
44 	const char string[ETH_GSTRING_LEN];
45 } ethtool_stats_keys[] = {
46 	{ "peer_ifindex" },
47 };
48 
49 static int veth_get_settings(struct net_device *dev, struct ethtool_cmd *cmd)
50 {
51 	cmd->supported		= 0;
52 	cmd->advertising	= 0;
53 	ethtool_cmd_speed_set(cmd, SPEED_10000);
54 	cmd->duplex		= DUPLEX_FULL;
55 	cmd->port		= PORT_TP;
56 	cmd->phy_address	= 0;
57 	cmd->transceiver	= XCVR_INTERNAL;
58 	cmd->autoneg		= AUTONEG_DISABLE;
59 	cmd->maxtxpkt		= 0;
60 	cmd->maxrxpkt		= 0;
61 	return 0;
62 }
63 
64 static void veth_get_drvinfo(struct net_device *dev, struct ethtool_drvinfo *info)
65 {
66 	strlcpy(info->driver, DRV_NAME, sizeof(info->driver));
67 	strlcpy(info->version, DRV_VERSION, sizeof(info->version));
68 }
69 
70 static void veth_get_strings(struct net_device *dev, u32 stringset, u8 *buf)
71 {
72 	switch(stringset) {
73 	case ETH_SS_STATS:
74 		memcpy(buf, &ethtool_stats_keys, sizeof(ethtool_stats_keys));
75 		break;
76 	}
77 }
78 
79 static int veth_get_sset_count(struct net_device *dev, int sset)
80 {
81 	switch (sset) {
82 	case ETH_SS_STATS:
83 		return ARRAY_SIZE(ethtool_stats_keys);
84 	default:
85 		return -EOPNOTSUPP;
86 	}
87 }
88 
89 static void veth_get_ethtool_stats(struct net_device *dev,
90 		struct ethtool_stats *stats, u64 *data)
91 {
92 	struct veth_priv *priv = netdev_priv(dev);
93 	struct net_device *peer = rtnl_dereference(priv->peer);
94 
95 	data[0] = peer ? peer->ifindex : 0;
96 }
97 
98 static const struct ethtool_ops veth_ethtool_ops = {
99 	.get_settings		= veth_get_settings,
100 	.get_drvinfo		= veth_get_drvinfo,
101 	.get_link		= ethtool_op_get_link,
102 	.get_strings		= veth_get_strings,
103 	.get_sset_count		= veth_get_sset_count,
104 	.get_ethtool_stats	= veth_get_ethtool_stats,
105 };
106 
107 static netdev_tx_t veth_xmit(struct sk_buff *skb, struct net_device *dev)
108 {
109 	struct veth_priv *priv = netdev_priv(dev);
110 	struct net_device *rcv;
111 	int length = skb->len;
112 
113 	rcu_read_lock();
114 	rcv = rcu_dereference(priv->peer);
115 	if (unlikely(!rcv)) {
116 		kfree_skb(skb);
117 		goto drop;
118 	}
119 	/* don't change ip_summed == CHECKSUM_PARTIAL, as that
120 	 * will cause bad checksum on forwarded packets
121 	 */
122 	if (skb->ip_summed == CHECKSUM_NONE &&
123 	    rcv->features & NETIF_F_RXCSUM)
124 		skb->ip_summed = CHECKSUM_UNNECESSARY;
125 
126 	if (likely(dev_forward_skb(rcv, skb) == NET_RX_SUCCESS)) {
127 		struct pcpu_vstats *stats = this_cpu_ptr(dev->vstats);
128 
129 		u64_stats_update_begin(&stats->syncp);
130 		stats->bytes += length;
131 		stats->packets++;
132 		u64_stats_update_end(&stats->syncp);
133 	} else {
134 drop:
135 		atomic64_inc(&priv->dropped);
136 	}
137 	rcu_read_unlock();
138 	return NETDEV_TX_OK;
139 }
140 
141 /*
142  * general routines
143  */
144 
145 static u64 veth_stats_one(struct pcpu_vstats *result, struct net_device *dev)
146 {
147 	struct veth_priv *priv = netdev_priv(dev);
148 	int cpu;
149 
150 	result->packets = 0;
151 	result->bytes = 0;
152 	for_each_possible_cpu(cpu) {
153 		struct pcpu_vstats *stats = per_cpu_ptr(dev->vstats, cpu);
154 		u64 packets, bytes;
155 		unsigned int start;
156 
157 		do {
158 			start = u64_stats_fetch_begin_bh(&stats->syncp);
159 			packets = stats->packets;
160 			bytes = stats->bytes;
161 		} while (u64_stats_fetch_retry_bh(&stats->syncp, start));
162 		result->packets += packets;
163 		result->bytes += bytes;
164 	}
165 	return atomic64_read(&priv->dropped);
166 }
167 
168 static struct rtnl_link_stats64 *veth_get_stats64(struct net_device *dev,
169 						  struct rtnl_link_stats64 *tot)
170 {
171 	struct veth_priv *priv = netdev_priv(dev);
172 	struct net_device *peer;
173 	struct pcpu_vstats one;
174 
175 	tot->tx_dropped = veth_stats_one(&one, dev);
176 	tot->tx_bytes = one.bytes;
177 	tot->tx_packets = one.packets;
178 
179 	rcu_read_lock();
180 	peer = rcu_dereference(priv->peer);
181 	if (peer) {
182 		tot->rx_dropped = veth_stats_one(&one, peer);
183 		tot->rx_bytes = one.bytes;
184 		tot->rx_packets = one.packets;
185 	}
186 	rcu_read_unlock();
187 
188 	return tot;
189 }
190 
191 static int veth_open(struct net_device *dev)
192 {
193 	struct veth_priv *priv = netdev_priv(dev);
194 	struct net_device *peer = rtnl_dereference(priv->peer);
195 
196 	if (!peer)
197 		return -ENOTCONN;
198 
199 	if (peer->flags & IFF_UP) {
200 		netif_carrier_on(dev);
201 		netif_carrier_on(peer);
202 	}
203 	return 0;
204 }
205 
206 static int veth_close(struct net_device *dev)
207 {
208 	struct veth_priv *priv = netdev_priv(dev);
209 	struct net_device *peer = rtnl_dereference(priv->peer);
210 
211 	netif_carrier_off(dev);
212 	if (peer)
213 		netif_carrier_off(peer);
214 
215 	return 0;
216 }
217 
218 static int is_valid_veth_mtu(int new_mtu)
219 {
220 	return new_mtu >= MIN_MTU && new_mtu <= MAX_MTU;
221 }
222 
223 static int veth_change_mtu(struct net_device *dev, int new_mtu)
224 {
225 	if (!is_valid_veth_mtu(new_mtu))
226 		return -EINVAL;
227 	dev->mtu = new_mtu;
228 	return 0;
229 }
230 
231 static int veth_dev_init(struct net_device *dev)
232 {
233 	dev->vstats = alloc_percpu(struct pcpu_vstats);
234 	if (!dev->vstats)
235 		return -ENOMEM;
236 
237 	return 0;
238 }
239 
240 static void veth_dev_free(struct net_device *dev)
241 {
242 	free_percpu(dev->vstats);
243 	free_netdev(dev);
244 }
245 
246 static const struct net_device_ops veth_netdev_ops = {
247 	.ndo_init            = veth_dev_init,
248 	.ndo_open            = veth_open,
249 	.ndo_stop            = veth_close,
250 	.ndo_start_xmit      = veth_xmit,
251 	.ndo_change_mtu      = veth_change_mtu,
252 	.ndo_get_stats64     = veth_get_stats64,
253 	.ndo_set_mac_address = eth_mac_addr,
254 };
255 
256 #define VETH_FEATURES (NETIF_F_SG | NETIF_F_FRAGLIST | NETIF_F_ALL_TSO |    \
257 		       NETIF_F_HW_CSUM | NETIF_F_RXCSUM | NETIF_F_HIGHDMA | \
258 		       NETIF_F_HW_VLAN_CTAG_TX | NETIF_F_HW_VLAN_CTAG_RX | \
259 		       NETIF_F_HW_VLAN_STAG_TX | NETIF_F_HW_VLAN_STAG_RX )
260 
261 static void veth_setup(struct net_device *dev)
262 {
263 	ether_setup(dev);
264 
265 	dev->priv_flags &= ~IFF_TX_SKB_SHARING;
266 	dev->priv_flags |= IFF_LIVE_ADDR_CHANGE;
267 
268 	dev->netdev_ops = &veth_netdev_ops;
269 	dev->ethtool_ops = &veth_ethtool_ops;
270 	dev->features |= NETIF_F_LLTX;
271 	dev->features |= VETH_FEATURES;
272 	dev->destructor = veth_dev_free;
273 
274 	dev->hw_features = VETH_FEATURES;
275 }
276 
277 /*
278  * netlink interface
279  */
280 
281 static int veth_validate(struct nlattr *tb[], struct nlattr *data[])
282 {
283 	if (tb[IFLA_ADDRESS]) {
284 		if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN)
285 			return -EINVAL;
286 		if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS])))
287 			return -EADDRNOTAVAIL;
288 	}
289 	if (tb[IFLA_MTU]) {
290 		if (!is_valid_veth_mtu(nla_get_u32(tb[IFLA_MTU])))
291 			return -EINVAL;
292 	}
293 	return 0;
294 }
295 
296 static struct rtnl_link_ops veth_link_ops;
297 
298 static int veth_newlink(struct net *src_net, struct net_device *dev,
299 			 struct nlattr *tb[], struct nlattr *data[])
300 {
301 	int err;
302 	struct net_device *peer;
303 	struct veth_priv *priv;
304 	char ifname[IFNAMSIZ];
305 	struct nlattr *peer_tb[IFLA_MAX + 1], **tbp;
306 	struct ifinfomsg *ifmp;
307 	struct net *net;
308 
309 	/*
310 	 * create and register peer first
311 	 */
312 	if (data != NULL && data[VETH_INFO_PEER] != NULL) {
313 		struct nlattr *nla_peer;
314 
315 		nla_peer = data[VETH_INFO_PEER];
316 		ifmp = nla_data(nla_peer);
317 		err = nla_parse(peer_tb, IFLA_MAX,
318 				nla_data(nla_peer) + sizeof(struct ifinfomsg),
319 				nla_len(nla_peer) - sizeof(struct ifinfomsg),
320 				ifla_policy);
321 		if (err < 0)
322 			return err;
323 
324 		err = veth_validate(peer_tb, NULL);
325 		if (err < 0)
326 			return err;
327 
328 		tbp = peer_tb;
329 	} else {
330 		ifmp = NULL;
331 		tbp = tb;
332 	}
333 
334 	if (tbp[IFLA_IFNAME])
335 		nla_strlcpy(ifname, tbp[IFLA_IFNAME], IFNAMSIZ);
336 	else
337 		snprintf(ifname, IFNAMSIZ, DRV_NAME "%%d");
338 
339 	net = rtnl_link_get_net(src_net, tbp);
340 	if (IS_ERR(net))
341 		return PTR_ERR(net);
342 
343 	peer = rtnl_create_link(net, ifname, &veth_link_ops, tbp);
344 	if (IS_ERR(peer)) {
345 		put_net(net);
346 		return PTR_ERR(peer);
347 	}
348 
349 	if (tbp[IFLA_ADDRESS] == NULL)
350 		eth_hw_addr_random(peer);
351 
352 	if (ifmp && (dev->ifindex != 0))
353 		peer->ifindex = ifmp->ifi_index;
354 
355 	err = register_netdevice(peer);
356 	put_net(net);
357 	net = NULL;
358 	if (err < 0)
359 		goto err_register_peer;
360 
361 	netif_carrier_off(peer);
362 
363 	err = rtnl_configure_link(peer, ifmp);
364 	if (err < 0)
365 		goto err_configure_peer;
366 
367 	/*
368 	 * register dev last
369 	 *
370 	 * note, that since we've registered new device the dev's name
371 	 * should be re-allocated
372 	 */
373 
374 	if (tb[IFLA_ADDRESS] == NULL)
375 		eth_hw_addr_random(dev);
376 
377 	if (tb[IFLA_IFNAME])
378 		nla_strlcpy(dev->name, tb[IFLA_IFNAME], IFNAMSIZ);
379 	else
380 		snprintf(dev->name, IFNAMSIZ, DRV_NAME "%%d");
381 
382 	if (strchr(dev->name, '%')) {
383 		err = dev_alloc_name(dev, dev->name);
384 		if (err < 0)
385 			goto err_alloc_name;
386 	}
387 
388 	err = register_netdevice(dev);
389 	if (err < 0)
390 		goto err_register_dev;
391 
392 	netif_carrier_off(dev);
393 
394 	/*
395 	 * tie the deviced together
396 	 */
397 
398 	priv = netdev_priv(dev);
399 	rcu_assign_pointer(priv->peer, peer);
400 
401 	priv = netdev_priv(peer);
402 	rcu_assign_pointer(priv->peer, dev);
403 	return 0;
404 
405 err_register_dev:
406 	/* nothing to do */
407 err_alloc_name:
408 err_configure_peer:
409 	unregister_netdevice(peer);
410 	return err;
411 
412 err_register_peer:
413 	free_netdev(peer);
414 	return err;
415 }
416 
417 static void veth_dellink(struct net_device *dev, struct list_head *head)
418 {
419 	struct veth_priv *priv;
420 	struct net_device *peer;
421 
422 	priv = netdev_priv(dev);
423 	peer = rtnl_dereference(priv->peer);
424 
425 	/* Note : dellink() is called from default_device_exit_batch(),
426 	 * before a rcu_synchronize() point. The devices are guaranteed
427 	 * not being freed before one RCU grace period.
428 	 */
429 	RCU_INIT_POINTER(priv->peer, NULL);
430 	unregister_netdevice_queue(dev, head);
431 
432 	if (peer) {
433 		priv = netdev_priv(peer);
434 		RCU_INIT_POINTER(priv->peer, NULL);
435 		unregister_netdevice_queue(peer, head);
436 	}
437 }
438 
439 static const struct nla_policy veth_policy[VETH_INFO_MAX + 1] = {
440 	[VETH_INFO_PEER]	= { .len = sizeof(struct ifinfomsg) },
441 };
442 
443 static struct rtnl_link_ops veth_link_ops = {
444 	.kind		= DRV_NAME,
445 	.priv_size	= sizeof(struct veth_priv),
446 	.setup		= veth_setup,
447 	.validate	= veth_validate,
448 	.newlink	= veth_newlink,
449 	.dellink	= veth_dellink,
450 	.policy		= veth_policy,
451 	.maxtype	= VETH_INFO_MAX,
452 };
453 
454 /*
455  * init/fini
456  */
457 
458 static __init int veth_init(void)
459 {
460 	return rtnl_link_register(&veth_link_ops);
461 }
462 
463 static __exit void veth_exit(void)
464 {
465 	rtnl_link_unregister(&veth_link_ops);
466 }
467 
468 module_init(veth_init);
469 module_exit(veth_exit);
470 
471 MODULE_DESCRIPTION("Virtual Ethernet Tunnel");
472 MODULE_LICENSE("GPL v2");
473 MODULE_ALIAS_RTNL_LINK(DRV_NAME);
474