1ee2dcc224
Pull networking fixes from David Miller: "Mostly these are fixes for fallout due to merge window changes, as well as cures for problems that have been with us for a much longer period of time" 1) Johannes Berg noticed two major deficiencies in our genetlink registration. Some genetlink protocols we passing in constant counts for their ops array rather than something like ARRAY_SIZE(ops) or similar. Also, some genetlink protocols were using fixed IDs for their multicast groups. We have to retain these fixed IDs to keep existing userland tools working, but reserve them so that other multicast groups used by other protocols can not possibly conflict. In dealing with these two problems, we actually now use less state management for genetlink operations and multicast groups. 2) When configuring interface hardware timestamping, fix several drivers that simply do not validate that the hwtstamp_config value is one the driver actually supports. From Ben Hutchings. 3) Invalid memory references in mwifiex driver, from Amitkumar Karwar. 4) In dev_forward_skb(), set the skb->protocol in the right order relative to skb_scrub_packet(). From Alexei Starovoitov. 5) Bridge erroneously fails to use the proper wrapper functions to make calls to netdev_ops->ndo_vlan_rx_{add,kill}_vid. Fix from Toshiaki Makita. 6) When detaching a bridge port, make sure to flush all VLAN IDs to prevent them from leaking, also from Toshiaki Makita. 7) Put in a compromise for TCP Small Queues so that deep queued devices that delay TX reclaim non-trivially don't have such a performance decrease. One particularly problematic area is 802.11 AMPDU in wireless. From Eric Dumazet. 8) Fix crashes in tcp_fastopen_cache_get(), we can see NULL socket dsts here. Fix from Eric Dumzaet, reported by Dave Jones. 9) Fix use after free in ipv6 SIT driver, from Willem de Bruijn. 10) When computing mergeable buffer sizes, virtio-net fails to take the virtio-net header into account. From Michael Dalton. 11) Fix seqlock deadlock in ip4_datagram_connect() wrt. statistic bumping, this one has been with us for a while. From Eric Dumazet. 12) Fix NULL deref in the new TIPC fragmentation handling, from Erik Hugne. 13) 6lowpan bit used for traffic classification was wrong, from Jukka Rissanen. 14) macvlan has the same issue as normal vlans did wrt. propagating LRO disabling down to the real device, fix it the same way. From Michal Kubecek. 15) CPSW driver needs to soft reset all slaves during suspend, from Daniel Mack. 16) Fix small frame pacing in FQ packet scheduler, from Eric Dumazet. 17) The xen-netfront RX buffer refill timer isn't properly scheduled on partial RX allocation success, from Ma JieYue. 18) When ipv6 ping protocol support was added, the AF_INET6 protocol initialization cleanup path on failure was borked a little. Fix from Vlad Yasevich. 19) If a socket disconnects during a read/recvmsg/recvfrom/etc that blocks we can do the wrong thing with the msg_name we write back to userspace. From Hannes Frederic Sowa. There is another fix in the works from Hannes which will prevent future problems of this nature. 20) Fix route leak in VTI tunnel transmit, from Fan Du. * git://git.kernel.org/pub/scm/linux/kernel/git/davem/net: (106 commits) genetlink: make multicast groups const, prevent abuse genetlink: pass family to functions using groups genetlink: add and use genl_set_err() genetlink: remove family pointer from genl_multicast_group genetlink: remove genl_unregister_mc_group() hsr: don't call genl_unregister_mc_group() quota/genetlink: use proper genetlink multicast APIs drop_monitor/genetlink: use proper genetlink multicast APIs genetlink: only pass array to genl_register_family_with_ops() tcp: don't update snd_nxt, when a socket is switched from repair mode atm: idt77252: fix dev refcnt leak xfrm: Release dst if this dst is improper for vti tunnel netlink: fix documentation typo in netlink_set_err() be2net: Delete secondary unicast MAC addresses during be_close be2net: Fix unconditional enabling of Rx interface options net, virtio_net: replace the magic value ping: prevent NULL pointer dereference on write to msg_name bnx2x: Prevent "timeout waiting for state X" bnx2x: prevent CFC attention bnx2x: Prevent panic during DMAE timeout ...
1929 lines
46 KiB
C
1929 lines
46 KiB
C
/*
|
|
* Copyright (c) 2007-2013 Nicira, Inc.
|
|
*
|
|
* This program is free software; you can redistribute it and/or
|
|
* modify it under the terms of version 2 of the GNU General Public
|
|
* License as published by the Free Software Foundation.
|
|
*
|
|
* This program is distributed in the hope that it will be useful, but
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
* General Public License for more details.
|
|
*
|
|
* You should have received a copy of the GNU General Public License
|
|
* along with this program; if not, write to the Free Software
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
|
* 02110-1301, USA
|
|
*/
|
|
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
|
|
#include <linux/init.h>
|
|
#include <linux/module.h>
|
|
#include <linux/if_arp.h>
|
|
#include <linux/if_vlan.h>
|
|
#include <linux/in.h>
|
|
#include <linux/ip.h>
|
|
#include <linux/jhash.h>
|
|
#include <linux/delay.h>
|
|
#include <linux/time.h>
|
|
#include <linux/etherdevice.h>
|
|
#include <linux/genetlink.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/kthread.h>
|
|
#include <linux/mutex.h>
|
|
#include <linux/percpu.h>
|
|
#include <linux/rcupdate.h>
|
|
#include <linux/tcp.h>
|
|
#include <linux/udp.h>
|
|
#include <linux/ethtool.h>
|
|
#include <linux/wait.h>
|
|
#include <asm/div64.h>
|
|
#include <linux/highmem.h>
|
|
#include <linux/netfilter_bridge.h>
|
|
#include <linux/netfilter_ipv4.h>
|
|
#include <linux/inetdevice.h>
|
|
#include <linux/list.h>
|
|
#include <linux/lockdep.h>
|
|
#include <linux/openvswitch.h>
|
|
#include <linux/rculist.h>
|
|
#include <linux/dmi.h>
|
|
#include <linux/workqueue.h>
|
|
#include <net/genetlink.h>
|
|
#include <net/net_namespace.h>
|
|
#include <net/netns/generic.h>
|
|
|
|
#include "datapath.h"
|
|
#include "flow.h"
|
|
#include "flow_netlink.h"
|
|
#include "vport-internal_dev.h"
|
|
#include "vport-netdev.h"
|
|
|
|
int ovs_net_id __read_mostly;
|
|
|
|
static void ovs_notify(struct genl_family *family,
|
|
struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
genl_notify(family, skb, genl_info_net(info), info->snd_portid,
|
|
0, info->nlhdr, GFP_KERNEL);
|
|
}
|
|
|
|
/**
|
|
* DOC: Locking:
|
|
*
|
|
* All writes e.g. Writes to device state (add/remove datapath, port, set
|
|
* operations on vports, etc.), Writes to other state (flow table
|
|
* modifications, set miscellaneous datapath parameters, etc.) are protected
|
|
* by ovs_lock.
|
|
*
|
|
* Reads are protected by RCU.
|
|
*
|
|
* There are a few special cases (mostly stats) that have their own
|
|
* synchronization but they nest under all of above and don't interact with
|
|
* each other.
|
|
*
|
|
* The RTNL lock nests inside ovs_mutex.
|
|
*/
|
|
|
|
static DEFINE_MUTEX(ovs_mutex);
|
|
|
|
void ovs_lock(void)
|
|
{
|
|
mutex_lock(&ovs_mutex);
|
|
}
|
|
|
|
void ovs_unlock(void)
|
|
{
|
|
mutex_unlock(&ovs_mutex);
|
|
}
|
|
|
|
#ifdef CONFIG_LOCKDEP
|
|
int lockdep_ovsl_is_held(void)
|
|
{
|
|
if (debug_locks)
|
|
return lockdep_is_held(&ovs_mutex);
|
|
else
|
|
return 1;
|
|
}
|
|
#endif
|
|
|
|
static struct vport *new_vport(const struct vport_parms *);
|
|
static int queue_gso_packets(struct net *, int dp_ifindex, struct sk_buff *,
|
|
const struct dp_upcall_info *);
|
|
static int queue_userspace_packet(struct net *, int dp_ifindex,
|
|
struct sk_buff *,
|
|
const struct dp_upcall_info *);
|
|
|
|
/* Must be called with rcu_read_lock or ovs_mutex. */
|
|
static struct datapath *get_dp(struct net *net, int dp_ifindex)
|
|
{
|
|
struct datapath *dp = NULL;
|
|
struct net_device *dev;
|
|
|
|
rcu_read_lock();
|
|
dev = dev_get_by_index_rcu(net, dp_ifindex);
|
|
if (dev) {
|
|
struct vport *vport = ovs_internal_dev_get_vport(dev);
|
|
if (vport)
|
|
dp = vport->dp;
|
|
}
|
|
rcu_read_unlock();
|
|
|
|
return dp;
|
|
}
|
|
|
|
/* Must be called with rcu_read_lock or ovs_mutex. */
|
|
const char *ovs_dp_name(const struct datapath *dp)
|
|
{
|
|
struct vport *vport = ovs_vport_ovsl_rcu(dp, OVSP_LOCAL);
|
|
return vport->ops->get_name(vport);
|
|
}
|
|
|
|
static int get_dpifindex(struct datapath *dp)
|
|
{
|
|
struct vport *local;
|
|
int ifindex;
|
|
|
|
rcu_read_lock();
|
|
|
|
local = ovs_vport_rcu(dp, OVSP_LOCAL);
|
|
if (local)
|
|
ifindex = netdev_vport_priv(local)->dev->ifindex;
|
|
else
|
|
ifindex = 0;
|
|
|
|
rcu_read_unlock();
|
|
|
|
return ifindex;
|
|
}
|
|
|
|
static void destroy_dp_rcu(struct rcu_head *rcu)
|
|
{
|
|
struct datapath *dp = container_of(rcu, struct datapath, rcu);
|
|
|
|
ovs_flow_tbl_destroy(&dp->table);
|
|
free_percpu(dp->stats_percpu);
|
|
release_net(ovs_dp_get_net(dp));
|
|
kfree(dp->ports);
|
|
kfree(dp);
|
|
}
|
|
|
|
static struct hlist_head *vport_hash_bucket(const struct datapath *dp,
|
|
u16 port_no)
|
|
{
|
|
return &dp->ports[port_no & (DP_VPORT_HASH_BUCKETS - 1)];
|
|
}
|
|
|
|
struct vport *ovs_lookup_vport(const struct datapath *dp, u16 port_no)
|
|
{
|
|
struct vport *vport;
|
|
struct hlist_head *head;
|
|
|
|
head = vport_hash_bucket(dp, port_no);
|
|
hlist_for_each_entry_rcu(vport, head, dp_hash_node) {
|
|
if (vport->port_no == port_no)
|
|
return vport;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
/* Called with ovs_mutex. */
|
|
static struct vport *new_vport(const struct vport_parms *parms)
|
|
{
|
|
struct vport *vport;
|
|
|
|
vport = ovs_vport_add(parms);
|
|
if (!IS_ERR(vport)) {
|
|
struct datapath *dp = parms->dp;
|
|
struct hlist_head *head = vport_hash_bucket(dp, vport->port_no);
|
|
|
|
hlist_add_head_rcu(&vport->dp_hash_node, head);
|
|
}
|
|
return vport;
|
|
}
|
|
|
|
void ovs_dp_detach_port(struct vport *p)
|
|
{
|
|
ASSERT_OVSL();
|
|
|
|
/* First drop references to device. */
|
|
hlist_del_rcu(&p->dp_hash_node);
|
|
|
|
/* Then destroy it. */
|
|
ovs_vport_del(p);
|
|
}
|
|
|
|
/* Must be called with rcu_read_lock. */
|
|
void ovs_dp_process_received_packet(struct vport *p, struct sk_buff *skb)
|
|
{
|
|
struct datapath *dp = p->dp;
|
|
struct sw_flow *flow;
|
|
struct dp_stats_percpu *stats;
|
|
struct sw_flow_key key;
|
|
u64 *stats_counter;
|
|
u32 n_mask_hit;
|
|
int error;
|
|
|
|
stats = this_cpu_ptr(dp->stats_percpu);
|
|
|
|
/* Extract flow from 'skb' into 'key'. */
|
|
error = ovs_flow_extract(skb, p->port_no, &key);
|
|
if (unlikely(error)) {
|
|
kfree_skb(skb);
|
|
return;
|
|
}
|
|
|
|
/* Look up flow. */
|
|
flow = ovs_flow_tbl_lookup(&dp->table, &key, &n_mask_hit);
|
|
if (unlikely(!flow)) {
|
|
struct dp_upcall_info upcall;
|
|
|
|
upcall.cmd = OVS_PACKET_CMD_MISS;
|
|
upcall.key = &key;
|
|
upcall.userdata = NULL;
|
|
upcall.portid = p->upcall_portid;
|
|
ovs_dp_upcall(dp, skb, &upcall);
|
|
consume_skb(skb);
|
|
stats_counter = &stats->n_missed;
|
|
goto out;
|
|
}
|
|
|
|
OVS_CB(skb)->flow = flow;
|
|
OVS_CB(skb)->pkt_key = &key;
|
|
|
|
stats_counter = &stats->n_hit;
|
|
ovs_flow_used(OVS_CB(skb)->flow, skb);
|
|
ovs_execute_actions(dp, skb);
|
|
|
|
out:
|
|
/* Update datapath statistics. */
|
|
u64_stats_update_begin(&stats->sync);
|
|
(*stats_counter)++;
|
|
stats->n_mask_hit += n_mask_hit;
|
|
u64_stats_update_end(&stats->sync);
|
|
}
|
|
|
|
static struct genl_family dp_packet_genl_family = {
|
|
.id = GENL_ID_GENERATE,
|
|
.hdrsize = sizeof(struct ovs_header),
|
|
.name = OVS_PACKET_FAMILY,
|
|
.version = OVS_PACKET_VERSION,
|
|
.maxattr = OVS_PACKET_ATTR_MAX,
|
|
.netnsok = true,
|
|
.parallel_ops = true,
|
|
};
|
|
|
|
int ovs_dp_upcall(struct datapath *dp, struct sk_buff *skb,
|
|
const struct dp_upcall_info *upcall_info)
|
|
{
|
|
struct dp_stats_percpu *stats;
|
|
int dp_ifindex;
|
|
int err;
|
|
|
|
if (upcall_info->portid == 0) {
|
|
err = -ENOTCONN;
|
|
goto err;
|
|
}
|
|
|
|
dp_ifindex = get_dpifindex(dp);
|
|
if (!dp_ifindex) {
|
|
err = -ENODEV;
|
|
goto err;
|
|
}
|
|
|
|
if (!skb_is_gso(skb))
|
|
err = queue_userspace_packet(ovs_dp_get_net(dp), dp_ifindex, skb, upcall_info);
|
|
else
|
|
err = queue_gso_packets(ovs_dp_get_net(dp), dp_ifindex, skb, upcall_info);
|
|
if (err)
|
|
goto err;
|
|
|
|
return 0;
|
|
|
|
err:
|
|
stats = this_cpu_ptr(dp->stats_percpu);
|
|
|
|
u64_stats_update_begin(&stats->sync);
|
|
stats->n_lost++;
|
|
u64_stats_update_end(&stats->sync);
|
|
|
|
return err;
|
|
}
|
|
|
|
static int queue_gso_packets(struct net *net, int dp_ifindex,
|
|
struct sk_buff *skb,
|
|
const struct dp_upcall_info *upcall_info)
|
|
{
|
|
unsigned short gso_type = skb_shinfo(skb)->gso_type;
|
|
struct dp_upcall_info later_info;
|
|
struct sw_flow_key later_key;
|
|
struct sk_buff *segs, *nskb;
|
|
int err;
|
|
|
|
segs = __skb_gso_segment(skb, NETIF_F_SG | NETIF_F_HW_CSUM, false);
|
|
if (IS_ERR(segs))
|
|
return PTR_ERR(segs);
|
|
|
|
/* Queue all of the segments. */
|
|
skb = segs;
|
|
do {
|
|
err = queue_userspace_packet(net, dp_ifindex, skb, upcall_info);
|
|
if (err)
|
|
break;
|
|
|
|
if (skb == segs && gso_type & SKB_GSO_UDP) {
|
|
/* The initial flow key extracted by ovs_flow_extract()
|
|
* in this case is for a first fragment, so we need to
|
|
* properly mark later fragments.
|
|
*/
|
|
later_key = *upcall_info->key;
|
|
later_key.ip.frag = OVS_FRAG_TYPE_LATER;
|
|
|
|
later_info = *upcall_info;
|
|
later_info.key = &later_key;
|
|
upcall_info = &later_info;
|
|
}
|
|
} while ((skb = skb->next));
|
|
|
|
/* Free all of the segments. */
|
|
skb = segs;
|
|
do {
|
|
nskb = skb->next;
|
|
if (err)
|
|
kfree_skb(skb);
|
|
else
|
|
consume_skb(skb);
|
|
} while ((skb = nskb));
|
|
return err;
|
|
}
|
|
|
|
static size_t key_attr_size(void)
|
|
{
|
|
return nla_total_size(4) /* OVS_KEY_ATTR_PRIORITY */
|
|
+ nla_total_size(0) /* OVS_KEY_ATTR_TUNNEL */
|
|
+ nla_total_size(8) /* OVS_TUNNEL_KEY_ATTR_ID */
|
|
+ nla_total_size(4) /* OVS_TUNNEL_KEY_ATTR_IPV4_SRC */
|
|
+ nla_total_size(4) /* OVS_TUNNEL_KEY_ATTR_IPV4_DST */
|
|
+ nla_total_size(1) /* OVS_TUNNEL_KEY_ATTR_TOS */
|
|
+ nla_total_size(1) /* OVS_TUNNEL_KEY_ATTR_TTL */
|
|
+ nla_total_size(0) /* OVS_TUNNEL_KEY_ATTR_DONT_FRAGMENT */
|
|
+ nla_total_size(0) /* OVS_TUNNEL_KEY_ATTR_CSUM */
|
|
+ nla_total_size(4) /* OVS_KEY_ATTR_IN_PORT */
|
|
+ nla_total_size(4) /* OVS_KEY_ATTR_SKB_MARK */
|
|
+ nla_total_size(12) /* OVS_KEY_ATTR_ETHERNET */
|
|
+ nla_total_size(2) /* OVS_KEY_ATTR_ETHERTYPE */
|
|
+ nla_total_size(4) /* OVS_KEY_ATTR_8021Q */
|
|
+ nla_total_size(0) /* OVS_KEY_ATTR_ENCAP */
|
|
+ nla_total_size(2) /* OVS_KEY_ATTR_ETHERTYPE */
|
|
+ nla_total_size(40) /* OVS_KEY_ATTR_IPV6 */
|
|
+ nla_total_size(2) /* OVS_KEY_ATTR_ICMPV6 */
|
|
+ nla_total_size(28); /* OVS_KEY_ATTR_ND */
|
|
}
|
|
|
|
static size_t upcall_msg_size(const struct sk_buff *skb,
|
|
const struct nlattr *userdata)
|
|
{
|
|
size_t size = NLMSG_ALIGN(sizeof(struct ovs_header))
|
|
+ nla_total_size(skb->len) /* OVS_PACKET_ATTR_PACKET */
|
|
+ nla_total_size(key_attr_size()); /* OVS_PACKET_ATTR_KEY */
|
|
|
|
/* OVS_PACKET_ATTR_USERDATA */
|
|
if (userdata)
|
|
size += NLA_ALIGN(userdata->nla_len);
|
|
|
|
return size;
|
|
}
|
|
|
|
static int queue_userspace_packet(struct net *net, int dp_ifindex,
|
|
struct sk_buff *skb,
|
|
const struct dp_upcall_info *upcall_info)
|
|
{
|
|
struct ovs_header *upcall;
|
|
struct sk_buff *nskb = NULL;
|
|
struct sk_buff *user_skb; /* to be queued to userspace */
|
|
struct nlattr *nla;
|
|
int err;
|
|
|
|
if (vlan_tx_tag_present(skb)) {
|
|
nskb = skb_clone(skb, GFP_ATOMIC);
|
|
if (!nskb)
|
|
return -ENOMEM;
|
|
|
|
nskb = __vlan_put_tag(nskb, nskb->vlan_proto, vlan_tx_tag_get(nskb));
|
|
if (!nskb)
|
|
return -ENOMEM;
|
|
|
|
nskb->vlan_tci = 0;
|
|
skb = nskb;
|
|
}
|
|
|
|
if (nla_attr_size(skb->len) > USHRT_MAX) {
|
|
err = -EFBIG;
|
|
goto out;
|
|
}
|
|
|
|
user_skb = genlmsg_new(upcall_msg_size(skb, upcall_info->userdata), GFP_ATOMIC);
|
|
if (!user_skb) {
|
|
err = -ENOMEM;
|
|
goto out;
|
|
}
|
|
|
|
upcall = genlmsg_put(user_skb, 0, 0, &dp_packet_genl_family,
|
|
0, upcall_info->cmd);
|
|
upcall->dp_ifindex = dp_ifindex;
|
|
|
|
nla = nla_nest_start(user_skb, OVS_PACKET_ATTR_KEY);
|
|
ovs_nla_put_flow(upcall_info->key, upcall_info->key, user_skb);
|
|
nla_nest_end(user_skb, nla);
|
|
|
|
if (upcall_info->userdata)
|
|
__nla_put(user_skb, OVS_PACKET_ATTR_USERDATA,
|
|
nla_len(upcall_info->userdata),
|
|
nla_data(upcall_info->userdata));
|
|
|
|
nla = __nla_reserve(user_skb, OVS_PACKET_ATTR_PACKET, skb->len);
|
|
|
|
skb_copy_and_csum_dev(skb, nla_data(nla));
|
|
|
|
genlmsg_end(user_skb, upcall);
|
|
err = genlmsg_unicast(net, user_skb, upcall_info->portid);
|
|
|
|
out:
|
|
kfree_skb(nskb);
|
|
return err;
|
|
}
|
|
|
|
static void clear_stats(struct sw_flow *flow)
|
|
{
|
|
flow->used = 0;
|
|
flow->tcp_flags = 0;
|
|
flow->packet_count = 0;
|
|
flow->byte_count = 0;
|
|
}
|
|
|
|
static int ovs_packet_cmd_execute(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct ovs_header *ovs_header = info->userhdr;
|
|
struct nlattr **a = info->attrs;
|
|
struct sw_flow_actions *acts;
|
|
struct sk_buff *packet;
|
|
struct sw_flow *flow;
|
|
struct datapath *dp;
|
|
struct ethhdr *eth;
|
|
int len;
|
|
int err;
|
|
|
|
err = -EINVAL;
|
|
if (!a[OVS_PACKET_ATTR_PACKET] || !a[OVS_PACKET_ATTR_KEY] ||
|
|
!a[OVS_PACKET_ATTR_ACTIONS])
|
|
goto err;
|
|
|
|
len = nla_len(a[OVS_PACKET_ATTR_PACKET]);
|
|
packet = __dev_alloc_skb(NET_IP_ALIGN + len, GFP_KERNEL);
|
|
err = -ENOMEM;
|
|
if (!packet)
|
|
goto err;
|
|
skb_reserve(packet, NET_IP_ALIGN);
|
|
|
|
nla_memcpy(__skb_put(packet, len), a[OVS_PACKET_ATTR_PACKET], len);
|
|
|
|
skb_reset_mac_header(packet);
|
|
eth = eth_hdr(packet);
|
|
|
|
/* Normally, setting the skb 'protocol' field would be handled by a
|
|
* call to eth_type_trans(), but it assumes there's a sending
|
|
* device, which we may not have. */
|
|
if (ntohs(eth->h_proto) >= ETH_P_802_3_MIN)
|
|
packet->protocol = eth->h_proto;
|
|
else
|
|
packet->protocol = htons(ETH_P_802_2);
|
|
|
|
/* Build an sw_flow for sending this packet. */
|
|
flow = ovs_flow_alloc();
|
|
err = PTR_ERR(flow);
|
|
if (IS_ERR(flow))
|
|
goto err_kfree_skb;
|
|
|
|
err = ovs_flow_extract(packet, -1, &flow->key);
|
|
if (err)
|
|
goto err_flow_free;
|
|
|
|
err = ovs_nla_get_flow_metadata(flow, a[OVS_PACKET_ATTR_KEY]);
|
|
if (err)
|
|
goto err_flow_free;
|
|
acts = ovs_nla_alloc_flow_actions(nla_len(a[OVS_PACKET_ATTR_ACTIONS]));
|
|
err = PTR_ERR(acts);
|
|
if (IS_ERR(acts))
|
|
goto err_flow_free;
|
|
|
|
err = ovs_nla_copy_actions(a[OVS_PACKET_ATTR_ACTIONS],
|
|
&flow->key, 0, &acts);
|
|
rcu_assign_pointer(flow->sf_acts, acts);
|
|
if (err)
|
|
goto err_flow_free;
|
|
|
|
OVS_CB(packet)->flow = flow;
|
|
OVS_CB(packet)->pkt_key = &flow->key;
|
|
packet->priority = flow->key.phy.priority;
|
|
packet->mark = flow->key.phy.skb_mark;
|
|
|
|
rcu_read_lock();
|
|
dp = get_dp(sock_net(skb->sk), ovs_header->dp_ifindex);
|
|
err = -ENODEV;
|
|
if (!dp)
|
|
goto err_unlock;
|
|
|
|
local_bh_disable();
|
|
err = ovs_execute_actions(dp, packet);
|
|
local_bh_enable();
|
|
rcu_read_unlock();
|
|
|
|
ovs_flow_free(flow, false);
|
|
return err;
|
|
|
|
err_unlock:
|
|
rcu_read_unlock();
|
|
err_flow_free:
|
|
ovs_flow_free(flow, false);
|
|
err_kfree_skb:
|
|
kfree_skb(packet);
|
|
err:
|
|
return err;
|
|
}
|
|
|
|
static const struct nla_policy packet_policy[OVS_PACKET_ATTR_MAX + 1] = {
|
|
[OVS_PACKET_ATTR_PACKET] = { .len = ETH_HLEN },
|
|
[OVS_PACKET_ATTR_KEY] = { .type = NLA_NESTED },
|
|
[OVS_PACKET_ATTR_ACTIONS] = { .type = NLA_NESTED },
|
|
};
|
|
|
|
static const struct genl_ops dp_packet_genl_ops[] = {
|
|
{ .cmd = OVS_PACKET_CMD_EXECUTE,
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
.policy = packet_policy,
|
|
.doit = ovs_packet_cmd_execute
|
|
}
|
|
};
|
|
|
|
static void get_dp_stats(struct datapath *dp, struct ovs_dp_stats *stats,
|
|
struct ovs_dp_megaflow_stats *mega_stats)
|
|
{
|
|
int i;
|
|
|
|
memset(mega_stats, 0, sizeof(*mega_stats));
|
|
|
|
stats->n_flows = ovs_flow_tbl_count(&dp->table);
|
|
mega_stats->n_masks = ovs_flow_tbl_num_masks(&dp->table);
|
|
|
|
stats->n_hit = stats->n_missed = stats->n_lost = 0;
|
|
|
|
for_each_possible_cpu(i) {
|
|
const struct dp_stats_percpu *percpu_stats;
|
|
struct dp_stats_percpu local_stats;
|
|
unsigned int start;
|
|
|
|
percpu_stats = per_cpu_ptr(dp->stats_percpu, i);
|
|
|
|
do {
|
|
start = u64_stats_fetch_begin_bh(&percpu_stats->sync);
|
|
local_stats = *percpu_stats;
|
|
} while (u64_stats_fetch_retry_bh(&percpu_stats->sync, start));
|
|
|
|
stats->n_hit += local_stats.n_hit;
|
|
stats->n_missed += local_stats.n_missed;
|
|
stats->n_lost += local_stats.n_lost;
|
|
mega_stats->n_mask_hit += local_stats.n_mask_hit;
|
|
}
|
|
}
|
|
|
|
static const struct nla_policy flow_policy[OVS_FLOW_ATTR_MAX + 1] = {
|
|
[OVS_FLOW_ATTR_KEY] = { .type = NLA_NESTED },
|
|
[OVS_FLOW_ATTR_ACTIONS] = { .type = NLA_NESTED },
|
|
[OVS_FLOW_ATTR_CLEAR] = { .type = NLA_FLAG },
|
|
};
|
|
|
|
static struct genl_family dp_flow_genl_family = {
|
|
.id = GENL_ID_GENERATE,
|
|
.hdrsize = sizeof(struct ovs_header),
|
|
.name = OVS_FLOW_FAMILY,
|
|
.version = OVS_FLOW_VERSION,
|
|
.maxattr = OVS_FLOW_ATTR_MAX,
|
|
.netnsok = true,
|
|
.parallel_ops = true,
|
|
};
|
|
|
|
static struct genl_multicast_group ovs_dp_flow_multicast_group = {
|
|
.name = OVS_FLOW_MCGROUP
|
|
};
|
|
|
|
static size_t ovs_flow_cmd_msg_size(const struct sw_flow_actions *acts)
|
|
{
|
|
return NLMSG_ALIGN(sizeof(struct ovs_header))
|
|
+ nla_total_size(key_attr_size()) /* OVS_FLOW_ATTR_KEY */
|
|
+ nla_total_size(key_attr_size()) /* OVS_FLOW_ATTR_MASK */
|
|
+ nla_total_size(sizeof(struct ovs_flow_stats)) /* OVS_FLOW_ATTR_STATS */
|
|
+ nla_total_size(1) /* OVS_FLOW_ATTR_TCP_FLAGS */
|
|
+ nla_total_size(8) /* OVS_FLOW_ATTR_USED */
|
|
+ nla_total_size(acts->actions_len); /* OVS_FLOW_ATTR_ACTIONS */
|
|
}
|
|
|
|
/* Called with ovs_mutex. */
|
|
static int ovs_flow_cmd_fill_info(struct sw_flow *flow, struct datapath *dp,
|
|
struct sk_buff *skb, u32 portid,
|
|
u32 seq, u32 flags, u8 cmd)
|
|
{
|
|
const int skb_orig_len = skb->len;
|
|
struct nlattr *start;
|
|
struct ovs_flow_stats stats;
|
|
struct ovs_header *ovs_header;
|
|
struct nlattr *nla;
|
|
unsigned long used;
|
|
u8 tcp_flags;
|
|
int err;
|
|
|
|
ovs_header = genlmsg_put(skb, portid, seq, &dp_flow_genl_family, flags, cmd);
|
|
if (!ovs_header)
|
|
return -EMSGSIZE;
|
|
|
|
ovs_header->dp_ifindex = get_dpifindex(dp);
|
|
|
|
/* Fill flow key. */
|
|
nla = nla_nest_start(skb, OVS_FLOW_ATTR_KEY);
|
|
if (!nla)
|
|
goto nla_put_failure;
|
|
|
|
err = ovs_nla_put_flow(&flow->unmasked_key, &flow->unmasked_key, skb);
|
|
if (err)
|
|
goto error;
|
|
nla_nest_end(skb, nla);
|
|
|
|
nla = nla_nest_start(skb, OVS_FLOW_ATTR_MASK);
|
|
if (!nla)
|
|
goto nla_put_failure;
|
|
|
|
err = ovs_nla_put_flow(&flow->key, &flow->mask->key, skb);
|
|
if (err)
|
|
goto error;
|
|
|
|
nla_nest_end(skb, nla);
|
|
|
|
spin_lock_bh(&flow->lock);
|
|
used = flow->used;
|
|
stats.n_packets = flow->packet_count;
|
|
stats.n_bytes = flow->byte_count;
|
|
tcp_flags = (u8)ntohs(flow->tcp_flags);
|
|
spin_unlock_bh(&flow->lock);
|
|
|
|
if (used &&
|
|
nla_put_u64(skb, OVS_FLOW_ATTR_USED, ovs_flow_used_time(used)))
|
|
goto nla_put_failure;
|
|
|
|
if (stats.n_packets &&
|
|
nla_put(skb, OVS_FLOW_ATTR_STATS,
|
|
sizeof(struct ovs_flow_stats), &stats))
|
|
goto nla_put_failure;
|
|
|
|
if (tcp_flags &&
|
|
nla_put_u8(skb, OVS_FLOW_ATTR_TCP_FLAGS, tcp_flags))
|
|
goto nla_put_failure;
|
|
|
|
/* If OVS_FLOW_ATTR_ACTIONS doesn't fit, skip dumping the actions if
|
|
* this is the first flow to be dumped into 'skb'. This is unusual for
|
|
* Netlink but individual action lists can be longer than
|
|
* NLMSG_GOODSIZE and thus entirely undumpable if we didn't do this.
|
|
* The userspace caller can always fetch the actions separately if it
|
|
* really wants them. (Most userspace callers in fact don't care.)
|
|
*
|
|
* This can only fail for dump operations because the skb is always
|
|
* properly sized for single flows.
|
|
*/
|
|
start = nla_nest_start(skb, OVS_FLOW_ATTR_ACTIONS);
|
|
if (start) {
|
|
const struct sw_flow_actions *sf_acts;
|
|
|
|
sf_acts = rcu_dereference_check(flow->sf_acts,
|
|
lockdep_ovsl_is_held());
|
|
|
|
err = ovs_nla_put_actions(sf_acts->actions,
|
|
sf_acts->actions_len, skb);
|
|
if (!err)
|
|
nla_nest_end(skb, start);
|
|
else {
|
|
if (skb_orig_len)
|
|
goto error;
|
|
|
|
nla_nest_cancel(skb, start);
|
|
}
|
|
} else if (skb_orig_len)
|
|
goto nla_put_failure;
|
|
|
|
return genlmsg_end(skb, ovs_header);
|
|
|
|
nla_put_failure:
|
|
err = -EMSGSIZE;
|
|
error:
|
|
genlmsg_cancel(skb, ovs_header);
|
|
return err;
|
|
}
|
|
|
|
static struct sk_buff *ovs_flow_cmd_alloc_info(struct sw_flow *flow)
|
|
{
|
|
const struct sw_flow_actions *sf_acts;
|
|
|
|
sf_acts = ovsl_dereference(flow->sf_acts);
|
|
|
|
return genlmsg_new(ovs_flow_cmd_msg_size(sf_acts), GFP_KERNEL);
|
|
}
|
|
|
|
static struct sk_buff *ovs_flow_cmd_build_info(struct sw_flow *flow,
|
|
struct datapath *dp,
|
|
u32 portid, u32 seq, u8 cmd)
|
|
{
|
|
struct sk_buff *skb;
|
|
int retval;
|
|
|
|
skb = ovs_flow_cmd_alloc_info(flow);
|
|
if (!skb)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
retval = ovs_flow_cmd_fill_info(flow, dp, skb, portid, seq, 0, cmd);
|
|
BUG_ON(retval < 0);
|
|
return skb;
|
|
}
|
|
|
|
static struct sw_flow *__ovs_flow_tbl_lookup(struct flow_table *tbl,
|
|
const struct sw_flow_key *key)
|
|
{
|
|
u32 __always_unused n_mask_hit;
|
|
|
|
return ovs_flow_tbl_lookup(tbl, key, &n_mask_hit);
|
|
}
|
|
|
|
static int ovs_flow_cmd_new_or_set(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct nlattr **a = info->attrs;
|
|
struct ovs_header *ovs_header = info->userhdr;
|
|
struct sw_flow_key key, masked_key;
|
|
struct sw_flow *flow = NULL;
|
|
struct sw_flow_mask mask;
|
|
struct sk_buff *reply;
|
|
struct datapath *dp;
|
|
struct sw_flow_actions *acts = NULL;
|
|
struct sw_flow_match match;
|
|
int error;
|
|
|
|
/* Extract key. */
|
|
error = -EINVAL;
|
|
if (!a[OVS_FLOW_ATTR_KEY])
|
|
goto error;
|
|
|
|
ovs_match_init(&match, &key, &mask);
|
|
error = ovs_nla_get_match(&match,
|
|
a[OVS_FLOW_ATTR_KEY], a[OVS_FLOW_ATTR_MASK]);
|
|
if (error)
|
|
goto error;
|
|
|
|
/* Validate actions. */
|
|
if (a[OVS_FLOW_ATTR_ACTIONS]) {
|
|
acts = ovs_nla_alloc_flow_actions(nla_len(a[OVS_FLOW_ATTR_ACTIONS]));
|
|
error = PTR_ERR(acts);
|
|
if (IS_ERR(acts))
|
|
goto error;
|
|
|
|
ovs_flow_mask_key(&masked_key, &key, &mask);
|
|
error = ovs_nla_copy_actions(a[OVS_FLOW_ATTR_ACTIONS],
|
|
&masked_key, 0, &acts);
|
|
if (error) {
|
|
OVS_NLERR("Flow actions may not be safe on all matching packets.\n");
|
|
goto err_kfree;
|
|
}
|
|
} else if (info->genlhdr->cmd == OVS_FLOW_CMD_NEW) {
|
|
error = -EINVAL;
|
|
goto error;
|
|
}
|
|
|
|
ovs_lock();
|
|
dp = get_dp(sock_net(skb->sk), ovs_header->dp_ifindex);
|
|
error = -ENODEV;
|
|
if (!dp)
|
|
goto err_unlock_ovs;
|
|
|
|
/* Check if this is a duplicate flow */
|
|
flow = __ovs_flow_tbl_lookup(&dp->table, &key);
|
|
if (!flow) {
|
|
/* Bail out if we're not allowed to create a new flow. */
|
|
error = -ENOENT;
|
|
if (info->genlhdr->cmd == OVS_FLOW_CMD_SET)
|
|
goto err_unlock_ovs;
|
|
|
|
/* Allocate flow. */
|
|
flow = ovs_flow_alloc();
|
|
if (IS_ERR(flow)) {
|
|
error = PTR_ERR(flow);
|
|
goto err_unlock_ovs;
|
|
}
|
|
clear_stats(flow);
|
|
|
|
flow->key = masked_key;
|
|
flow->unmasked_key = key;
|
|
rcu_assign_pointer(flow->sf_acts, acts);
|
|
|
|
/* Put flow in bucket. */
|
|
error = ovs_flow_tbl_insert(&dp->table, flow, &mask);
|
|
if (error) {
|
|
acts = NULL;
|
|
goto err_flow_free;
|
|
}
|
|
|
|
reply = ovs_flow_cmd_build_info(flow, dp, info->snd_portid,
|
|
info->snd_seq, OVS_FLOW_CMD_NEW);
|
|
} else {
|
|
/* We found a matching flow. */
|
|
struct sw_flow_actions *old_acts;
|
|
|
|
/* Bail out if we're not allowed to modify an existing flow.
|
|
* We accept NLM_F_CREATE in place of the intended NLM_F_EXCL
|
|
* because Generic Netlink treats the latter as a dump
|
|
* request. We also accept NLM_F_EXCL in case that bug ever
|
|
* gets fixed.
|
|
*/
|
|
error = -EEXIST;
|
|
if (info->genlhdr->cmd == OVS_FLOW_CMD_NEW &&
|
|
info->nlhdr->nlmsg_flags & (NLM_F_CREATE | NLM_F_EXCL))
|
|
goto err_unlock_ovs;
|
|
|
|
/* The unmasked key has to be the same for flow updates. */
|
|
error = -EINVAL;
|
|
if (!ovs_flow_cmp_unmasked_key(flow, &match)) {
|
|
OVS_NLERR("Flow modification message rejected, unmasked key does not match.\n");
|
|
goto err_unlock_ovs;
|
|
}
|
|
|
|
/* Update actions. */
|
|
old_acts = ovsl_dereference(flow->sf_acts);
|
|
rcu_assign_pointer(flow->sf_acts, acts);
|
|
ovs_nla_free_flow_actions(old_acts);
|
|
|
|
reply = ovs_flow_cmd_build_info(flow, dp, info->snd_portid,
|
|
info->snd_seq, OVS_FLOW_CMD_NEW);
|
|
|
|
/* Clear stats. */
|
|
if (a[OVS_FLOW_ATTR_CLEAR]) {
|
|
spin_lock_bh(&flow->lock);
|
|
clear_stats(flow);
|
|
spin_unlock_bh(&flow->lock);
|
|
}
|
|
}
|
|
ovs_unlock();
|
|
|
|
if (!IS_ERR(reply))
|
|
ovs_notify(&dp_flow_genl_family, reply, info);
|
|
else
|
|
genl_set_err(&dp_flow_genl_family, sock_net(skb->sk), 0,
|
|
0, PTR_ERR(reply));
|
|
return 0;
|
|
|
|
err_flow_free:
|
|
ovs_flow_free(flow, false);
|
|
err_unlock_ovs:
|
|
ovs_unlock();
|
|
err_kfree:
|
|
kfree(acts);
|
|
error:
|
|
return error;
|
|
}
|
|
|
|
static int ovs_flow_cmd_get(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct nlattr **a = info->attrs;
|
|
struct ovs_header *ovs_header = info->userhdr;
|
|
struct sw_flow_key key;
|
|
struct sk_buff *reply;
|
|
struct sw_flow *flow;
|
|
struct datapath *dp;
|
|
struct sw_flow_match match;
|
|
int err;
|
|
|
|
if (!a[OVS_FLOW_ATTR_KEY]) {
|
|
OVS_NLERR("Flow get message rejected, Key attribute missing.\n");
|
|
return -EINVAL;
|
|
}
|
|
|
|
ovs_match_init(&match, &key, NULL);
|
|
err = ovs_nla_get_match(&match, a[OVS_FLOW_ATTR_KEY], NULL);
|
|
if (err)
|
|
return err;
|
|
|
|
ovs_lock();
|
|
dp = get_dp(sock_net(skb->sk), ovs_header->dp_ifindex);
|
|
if (!dp) {
|
|
err = -ENODEV;
|
|
goto unlock;
|
|
}
|
|
|
|
flow = __ovs_flow_tbl_lookup(&dp->table, &key);
|
|
if (!flow || !ovs_flow_cmp_unmasked_key(flow, &match)) {
|
|
err = -ENOENT;
|
|
goto unlock;
|
|
}
|
|
|
|
reply = ovs_flow_cmd_build_info(flow, dp, info->snd_portid,
|
|
info->snd_seq, OVS_FLOW_CMD_NEW);
|
|
if (IS_ERR(reply)) {
|
|
err = PTR_ERR(reply);
|
|
goto unlock;
|
|
}
|
|
|
|
ovs_unlock();
|
|
return genlmsg_reply(reply, info);
|
|
unlock:
|
|
ovs_unlock();
|
|
return err;
|
|
}
|
|
|
|
static int ovs_flow_cmd_del(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct nlattr **a = info->attrs;
|
|
struct ovs_header *ovs_header = info->userhdr;
|
|
struct sw_flow_key key;
|
|
struct sk_buff *reply;
|
|
struct sw_flow *flow;
|
|
struct datapath *dp;
|
|
struct sw_flow_match match;
|
|
int err;
|
|
|
|
ovs_lock();
|
|
dp = get_dp(sock_net(skb->sk), ovs_header->dp_ifindex);
|
|
if (!dp) {
|
|
err = -ENODEV;
|
|
goto unlock;
|
|
}
|
|
|
|
if (!a[OVS_FLOW_ATTR_KEY]) {
|
|
err = ovs_flow_tbl_flush(&dp->table);
|
|
goto unlock;
|
|
}
|
|
|
|
ovs_match_init(&match, &key, NULL);
|
|
err = ovs_nla_get_match(&match, a[OVS_FLOW_ATTR_KEY], NULL);
|
|
if (err)
|
|
goto unlock;
|
|
|
|
flow = __ovs_flow_tbl_lookup(&dp->table, &key);
|
|
if (!flow || !ovs_flow_cmp_unmasked_key(flow, &match)) {
|
|
err = -ENOENT;
|
|
goto unlock;
|
|
}
|
|
|
|
reply = ovs_flow_cmd_alloc_info(flow);
|
|
if (!reply) {
|
|
err = -ENOMEM;
|
|
goto unlock;
|
|
}
|
|
|
|
ovs_flow_tbl_remove(&dp->table, flow);
|
|
|
|
err = ovs_flow_cmd_fill_info(flow, dp, reply, info->snd_portid,
|
|
info->snd_seq, 0, OVS_FLOW_CMD_DEL);
|
|
BUG_ON(err < 0);
|
|
|
|
ovs_flow_free(flow, true);
|
|
ovs_unlock();
|
|
|
|
ovs_notify(&dp_flow_genl_family, reply, info);
|
|
return 0;
|
|
unlock:
|
|
ovs_unlock();
|
|
return err;
|
|
}
|
|
|
|
static int ovs_flow_cmd_dump(struct sk_buff *skb, struct netlink_callback *cb)
|
|
{
|
|
struct ovs_header *ovs_header = genlmsg_data(nlmsg_data(cb->nlh));
|
|
struct table_instance *ti;
|
|
struct datapath *dp;
|
|
|
|
rcu_read_lock();
|
|
dp = get_dp(sock_net(skb->sk), ovs_header->dp_ifindex);
|
|
if (!dp) {
|
|
rcu_read_unlock();
|
|
return -ENODEV;
|
|
}
|
|
|
|
ti = rcu_dereference(dp->table.ti);
|
|
for (;;) {
|
|
struct sw_flow *flow;
|
|
u32 bucket, obj;
|
|
|
|
bucket = cb->args[0];
|
|
obj = cb->args[1];
|
|
flow = ovs_flow_tbl_dump_next(ti, &bucket, &obj);
|
|
if (!flow)
|
|
break;
|
|
|
|
if (ovs_flow_cmd_fill_info(flow, dp, skb,
|
|
NETLINK_CB(cb->skb).portid,
|
|
cb->nlh->nlmsg_seq, NLM_F_MULTI,
|
|
OVS_FLOW_CMD_NEW) < 0)
|
|
break;
|
|
|
|
cb->args[0] = bucket;
|
|
cb->args[1] = obj;
|
|
}
|
|
rcu_read_unlock();
|
|
return skb->len;
|
|
}
|
|
|
|
static const struct genl_ops dp_flow_genl_ops[] = {
|
|
{ .cmd = OVS_FLOW_CMD_NEW,
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
.policy = flow_policy,
|
|
.doit = ovs_flow_cmd_new_or_set
|
|
},
|
|
{ .cmd = OVS_FLOW_CMD_DEL,
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
.policy = flow_policy,
|
|
.doit = ovs_flow_cmd_del
|
|
},
|
|
{ .cmd = OVS_FLOW_CMD_GET,
|
|
.flags = 0, /* OK for unprivileged users. */
|
|
.policy = flow_policy,
|
|
.doit = ovs_flow_cmd_get,
|
|
.dumpit = ovs_flow_cmd_dump
|
|
},
|
|
{ .cmd = OVS_FLOW_CMD_SET,
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
.policy = flow_policy,
|
|
.doit = ovs_flow_cmd_new_or_set,
|
|
},
|
|
};
|
|
|
|
static const struct nla_policy datapath_policy[OVS_DP_ATTR_MAX + 1] = {
|
|
[OVS_DP_ATTR_NAME] = { .type = NLA_NUL_STRING, .len = IFNAMSIZ - 1 },
|
|
[OVS_DP_ATTR_UPCALL_PID] = { .type = NLA_U32 },
|
|
};
|
|
|
|
static struct genl_family dp_datapath_genl_family = {
|
|
.id = GENL_ID_GENERATE,
|
|
.hdrsize = sizeof(struct ovs_header),
|
|
.name = OVS_DATAPATH_FAMILY,
|
|
.version = OVS_DATAPATH_VERSION,
|
|
.maxattr = OVS_DP_ATTR_MAX,
|
|
.netnsok = true,
|
|
.parallel_ops = true,
|
|
};
|
|
|
|
static struct genl_multicast_group ovs_dp_datapath_multicast_group = {
|
|
.name = OVS_DATAPATH_MCGROUP
|
|
};
|
|
|
|
static size_t ovs_dp_cmd_msg_size(void)
|
|
{
|
|
size_t msgsize = NLMSG_ALIGN(sizeof(struct ovs_header));
|
|
|
|
msgsize += nla_total_size(IFNAMSIZ);
|
|
msgsize += nla_total_size(sizeof(struct ovs_dp_stats));
|
|
msgsize += nla_total_size(sizeof(struct ovs_dp_megaflow_stats));
|
|
|
|
return msgsize;
|
|
}
|
|
|
|
static int ovs_dp_cmd_fill_info(struct datapath *dp, struct sk_buff *skb,
|
|
u32 portid, u32 seq, u32 flags, u8 cmd)
|
|
{
|
|
struct ovs_header *ovs_header;
|
|
struct ovs_dp_stats dp_stats;
|
|
struct ovs_dp_megaflow_stats dp_megaflow_stats;
|
|
int err;
|
|
|
|
ovs_header = genlmsg_put(skb, portid, seq, &dp_datapath_genl_family,
|
|
flags, cmd);
|
|
if (!ovs_header)
|
|
goto error;
|
|
|
|
ovs_header->dp_ifindex = get_dpifindex(dp);
|
|
|
|
rcu_read_lock();
|
|
err = nla_put_string(skb, OVS_DP_ATTR_NAME, ovs_dp_name(dp));
|
|
rcu_read_unlock();
|
|
if (err)
|
|
goto nla_put_failure;
|
|
|
|
get_dp_stats(dp, &dp_stats, &dp_megaflow_stats);
|
|
if (nla_put(skb, OVS_DP_ATTR_STATS, sizeof(struct ovs_dp_stats),
|
|
&dp_stats))
|
|
goto nla_put_failure;
|
|
|
|
if (nla_put(skb, OVS_DP_ATTR_MEGAFLOW_STATS,
|
|
sizeof(struct ovs_dp_megaflow_stats),
|
|
&dp_megaflow_stats))
|
|
goto nla_put_failure;
|
|
|
|
return genlmsg_end(skb, ovs_header);
|
|
|
|
nla_put_failure:
|
|
genlmsg_cancel(skb, ovs_header);
|
|
error:
|
|
return -EMSGSIZE;
|
|
}
|
|
|
|
static struct sk_buff *ovs_dp_cmd_build_info(struct datapath *dp, u32 portid,
|
|
u32 seq, u8 cmd)
|
|
{
|
|
struct sk_buff *skb;
|
|
int retval;
|
|
|
|
skb = genlmsg_new(ovs_dp_cmd_msg_size(), GFP_KERNEL);
|
|
if (!skb)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
retval = ovs_dp_cmd_fill_info(dp, skb, portid, seq, 0, cmd);
|
|
if (retval < 0) {
|
|
kfree_skb(skb);
|
|
return ERR_PTR(retval);
|
|
}
|
|
return skb;
|
|
}
|
|
|
|
/* Called with ovs_mutex. */
|
|
static struct datapath *lookup_datapath(struct net *net,
|
|
struct ovs_header *ovs_header,
|
|
struct nlattr *a[OVS_DP_ATTR_MAX + 1])
|
|
{
|
|
struct datapath *dp;
|
|
|
|
if (!a[OVS_DP_ATTR_NAME])
|
|
dp = get_dp(net, ovs_header->dp_ifindex);
|
|
else {
|
|
struct vport *vport;
|
|
|
|
rcu_read_lock();
|
|
vport = ovs_vport_locate(net, nla_data(a[OVS_DP_ATTR_NAME]));
|
|
dp = vport && vport->port_no == OVSP_LOCAL ? vport->dp : NULL;
|
|
rcu_read_unlock();
|
|
}
|
|
return dp ? dp : ERR_PTR(-ENODEV);
|
|
}
|
|
|
|
static int ovs_dp_cmd_new(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct nlattr **a = info->attrs;
|
|
struct vport_parms parms;
|
|
struct sk_buff *reply;
|
|
struct datapath *dp;
|
|
struct vport *vport;
|
|
struct ovs_net *ovs_net;
|
|
int err, i;
|
|
|
|
err = -EINVAL;
|
|
if (!a[OVS_DP_ATTR_NAME] || !a[OVS_DP_ATTR_UPCALL_PID])
|
|
goto err;
|
|
|
|
ovs_lock();
|
|
|
|
err = -ENOMEM;
|
|
dp = kzalloc(sizeof(*dp), GFP_KERNEL);
|
|
if (dp == NULL)
|
|
goto err_unlock_ovs;
|
|
|
|
ovs_dp_set_net(dp, hold_net(sock_net(skb->sk)));
|
|
|
|
/* Allocate table. */
|
|
err = ovs_flow_tbl_init(&dp->table);
|
|
if (err)
|
|
goto err_free_dp;
|
|
|
|
dp->stats_percpu = alloc_percpu(struct dp_stats_percpu);
|
|
if (!dp->stats_percpu) {
|
|
err = -ENOMEM;
|
|
goto err_destroy_table;
|
|
}
|
|
|
|
for_each_possible_cpu(i) {
|
|
struct dp_stats_percpu *dpath_stats;
|
|
dpath_stats = per_cpu_ptr(dp->stats_percpu, i);
|
|
u64_stats_init(&dpath_stats->sync);
|
|
}
|
|
|
|
dp->ports = kmalloc(DP_VPORT_HASH_BUCKETS * sizeof(struct hlist_head),
|
|
GFP_KERNEL);
|
|
if (!dp->ports) {
|
|
err = -ENOMEM;
|
|
goto err_destroy_percpu;
|
|
}
|
|
|
|
for (i = 0; i < DP_VPORT_HASH_BUCKETS; i++)
|
|
INIT_HLIST_HEAD(&dp->ports[i]);
|
|
|
|
/* Set up our datapath device. */
|
|
parms.name = nla_data(a[OVS_DP_ATTR_NAME]);
|
|
parms.type = OVS_VPORT_TYPE_INTERNAL;
|
|
parms.options = NULL;
|
|
parms.dp = dp;
|
|
parms.port_no = OVSP_LOCAL;
|
|
parms.upcall_portid = nla_get_u32(a[OVS_DP_ATTR_UPCALL_PID]);
|
|
|
|
vport = new_vport(&parms);
|
|
if (IS_ERR(vport)) {
|
|
err = PTR_ERR(vport);
|
|
if (err == -EBUSY)
|
|
err = -EEXIST;
|
|
|
|
goto err_destroy_ports_array;
|
|
}
|
|
|
|
reply = ovs_dp_cmd_build_info(dp, info->snd_portid,
|
|
info->snd_seq, OVS_DP_CMD_NEW);
|
|
err = PTR_ERR(reply);
|
|
if (IS_ERR(reply))
|
|
goto err_destroy_local_port;
|
|
|
|
ovs_net = net_generic(ovs_dp_get_net(dp), ovs_net_id);
|
|
list_add_tail_rcu(&dp->list_node, &ovs_net->dps);
|
|
|
|
ovs_unlock();
|
|
|
|
ovs_notify(&dp_datapath_genl_family, reply, info);
|
|
return 0;
|
|
|
|
err_destroy_local_port:
|
|
ovs_dp_detach_port(ovs_vport_ovsl(dp, OVSP_LOCAL));
|
|
err_destroy_ports_array:
|
|
kfree(dp->ports);
|
|
err_destroy_percpu:
|
|
free_percpu(dp->stats_percpu);
|
|
err_destroy_table:
|
|
ovs_flow_tbl_destroy(&dp->table);
|
|
err_free_dp:
|
|
release_net(ovs_dp_get_net(dp));
|
|
kfree(dp);
|
|
err_unlock_ovs:
|
|
ovs_unlock();
|
|
err:
|
|
return err;
|
|
}
|
|
|
|
/* Called with ovs_mutex. */
|
|
static void __dp_destroy(struct datapath *dp)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < DP_VPORT_HASH_BUCKETS; i++) {
|
|
struct vport *vport;
|
|
struct hlist_node *n;
|
|
|
|
hlist_for_each_entry_safe(vport, n, &dp->ports[i], dp_hash_node)
|
|
if (vport->port_no != OVSP_LOCAL)
|
|
ovs_dp_detach_port(vport);
|
|
}
|
|
|
|
list_del_rcu(&dp->list_node);
|
|
|
|
/* OVSP_LOCAL is datapath internal port. We need to make sure that
|
|
* all port in datapath are destroyed first before freeing datapath.
|
|
*/
|
|
ovs_dp_detach_port(ovs_vport_ovsl(dp, OVSP_LOCAL));
|
|
|
|
call_rcu(&dp->rcu, destroy_dp_rcu);
|
|
}
|
|
|
|
static int ovs_dp_cmd_del(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct sk_buff *reply;
|
|
struct datapath *dp;
|
|
int err;
|
|
|
|
ovs_lock();
|
|
dp = lookup_datapath(sock_net(skb->sk), info->userhdr, info->attrs);
|
|
err = PTR_ERR(dp);
|
|
if (IS_ERR(dp))
|
|
goto unlock;
|
|
|
|
reply = ovs_dp_cmd_build_info(dp, info->snd_portid,
|
|
info->snd_seq, OVS_DP_CMD_DEL);
|
|
err = PTR_ERR(reply);
|
|
if (IS_ERR(reply))
|
|
goto unlock;
|
|
|
|
__dp_destroy(dp);
|
|
ovs_unlock();
|
|
|
|
ovs_notify(&dp_datapath_genl_family, reply, info);
|
|
|
|
return 0;
|
|
unlock:
|
|
ovs_unlock();
|
|
return err;
|
|
}
|
|
|
|
static int ovs_dp_cmd_set(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct sk_buff *reply;
|
|
struct datapath *dp;
|
|
int err;
|
|
|
|
ovs_lock();
|
|
dp = lookup_datapath(sock_net(skb->sk), info->userhdr, info->attrs);
|
|
err = PTR_ERR(dp);
|
|
if (IS_ERR(dp))
|
|
goto unlock;
|
|
|
|
reply = ovs_dp_cmd_build_info(dp, info->snd_portid,
|
|
info->snd_seq, OVS_DP_CMD_NEW);
|
|
if (IS_ERR(reply)) {
|
|
err = PTR_ERR(reply);
|
|
genl_set_err(&dp_datapath_genl_family, sock_net(skb->sk), 0,
|
|
0, err);
|
|
err = 0;
|
|
goto unlock;
|
|
}
|
|
|
|
ovs_unlock();
|
|
ovs_notify(&dp_datapath_genl_family, reply, info);
|
|
|
|
return 0;
|
|
unlock:
|
|
ovs_unlock();
|
|
return err;
|
|
}
|
|
|
|
static int ovs_dp_cmd_get(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct sk_buff *reply;
|
|
struct datapath *dp;
|
|
int err;
|
|
|
|
ovs_lock();
|
|
dp = lookup_datapath(sock_net(skb->sk), info->userhdr, info->attrs);
|
|
if (IS_ERR(dp)) {
|
|
err = PTR_ERR(dp);
|
|
goto unlock;
|
|
}
|
|
|
|
reply = ovs_dp_cmd_build_info(dp, info->snd_portid,
|
|
info->snd_seq, OVS_DP_CMD_NEW);
|
|
if (IS_ERR(reply)) {
|
|
err = PTR_ERR(reply);
|
|
goto unlock;
|
|
}
|
|
|
|
ovs_unlock();
|
|
return genlmsg_reply(reply, info);
|
|
|
|
unlock:
|
|
ovs_unlock();
|
|
return err;
|
|
}
|
|
|
|
static int ovs_dp_cmd_dump(struct sk_buff *skb, struct netlink_callback *cb)
|
|
{
|
|
struct ovs_net *ovs_net = net_generic(sock_net(skb->sk), ovs_net_id);
|
|
struct datapath *dp;
|
|
int skip = cb->args[0];
|
|
int i = 0;
|
|
|
|
rcu_read_lock();
|
|
list_for_each_entry_rcu(dp, &ovs_net->dps, list_node) {
|
|
if (i >= skip &&
|
|
ovs_dp_cmd_fill_info(dp, skb, NETLINK_CB(cb->skb).portid,
|
|
cb->nlh->nlmsg_seq, NLM_F_MULTI,
|
|
OVS_DP_CMD_NEW) < 0)
|
|
break;
|
|
i++;
|
|
}
|
|
rcu_read_unlock();
|
|
|
|
cb->args[0] = i;
|
|
|
|
return skb->len;
|
|
}
|
|
|
|
static const struct genl_ops dp_datapath_genl_ops[] = {
|
|
{ .cmd = OVS_DP_CMD_NEW,
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
.policy = datapath_policy,
|
|
.doit = ovs_dp_cmd_new
|
|
},
|
|
{ .cmd = OVS_DP_CMD_DEL,
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
.policy = datapath_policy,
|
|
.doit = ovs_dp_cmd_del
|
|
},
|
|
{ .cmd = OVS_DP_CMD_GET,
|
|
.flags = 0, /* OK for unprivileged users. */
|
|
.policy = datapath_policy,
|
|
.doit = ovs_dp_cmd_get,
|
|
.dumpit = ovs_dp_cmd_dump
|
|
},
|
|
{ .cmd = OVS_DP_CMD_SET,
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
.policy = datapath_policy,
|
|
.doit = ovs_dp_cmd_set,
|
|
},
|
|
};
|
|
|
|
static const struct nla_policy vport_policy[OVS_VPORT_ATTR_MAX + 1] = {
|
|
[OVS_VPORT_ATTR_NAME] = { .type = NLA_NUL_STRING, .len = IFNAMSIZ - 1 },
|
|
[OVS_VPORT_ATTR_STATS] = { .len = sizeof(struct ovs_vport_stats) },
|
|
[OVS_VPORT_ATTR_PORT_NO] = { .type = NLA_U32 },
|
|
[OVS_VPORT_ATTR_TYPE] = { .type = NLA_U32 },
|
|
[OVS_VPORT_ATTR_UPCALL_PID] = { .type = NLA_U32 },
|
|
[OVS_VPORT_ATTR_OPTIONS] = { .type = NLA_NESTED },
|
|
};
|
|
|
|
struct genl_family dp_vport_genl_family = {
|
|
.id = GENL_ID_GENERATE,
|
|
.hdrsize = sizeof(struct ovs_header),
|
|
.name = OVS_VPORT_FAMILY,
|
|
.version = OVS_VPORT_VERSION,
|
|
.maxattr = OVS_VPORT_ATTR_MAX,
|
|
.netnsok = true,
|
|
.parallel_ops = true,
|
|
};
|
|
|
|
struct genl_multicast_group ovs_dp_vport_multicast_group = {
|
|
.name = OVS_VPORT_MCGROUP
|
|
};
|
|
|
|
/* Called with ovs_mutex or RCU read lock. */
|
|
static int ovs_vport_cmd_fill_info(struct vport *vport, struct sk_buff *skb,
|
|
u32 portid, u32 seq, u32 flags, u8 cmd)
|
|
{
|
|
struct ovs_header *ovs_header;
|
|
struct ovs_vport_stats vport_stats;
|
|
int err;
|
|
|
|
ovs_header = genlmsg_put(skb, portid, seq, &dp_vport_genl_family,
|
|
flags, cmd);
|
|
if (!ovs_header)
|
|
return -EMSGSIZE;
|
|
|
|
ovs_header->dp_ifindex = get_dpifindex(vport->dp);
|
|
|
|
if (nla_put_u32(skb, OVS_VPORT_ATTR_PORT_NO, vport->port_no) ||
|
|
nla_put_u32(skb, OVS_VPORT_ATTR_TYPE, vport->ops->type) ||
|
|
nla_put_string(skb, OVS_VPORT_ATTR_NAME, vport->ops->get_name(vport)) ||
|
|
nla_put_u32(skb, OVS_VPORT_ATTR_UPCALL_PID, vport->upcall_portid))
|
|
goto nla_put_failure;
|
|
|
|
ovs_vport_get_stats(vport, &vport_stats);
|
|
if (nla_put(skb, OVS_VPORT_ATTR_STATS, sizeof(struct ovs_vport_stats),
|
|
&vport_stats))
|
|
goto nla_put_failure;
|
|
|
|
err = ovs_vport_get_options(vport, skb);
|
|
if (err == -EMSGSIZE)
|
|
goto error;
|
|
|
|
return genlmsg_end(skb, ovs_header);
|
|
|
|
nla_put_failure:
|
|
err = -EMSGSIZE;
|
|
error:
|
|
genlmsg_cancel(skb, ovs_header);
|
|
return err;
|
|
}
|
|
|
|
/* Called with ovs_mutex or RCU read lock. */
|
|
struct sk_buff *ovs_vport_cmd_build_info(struct vport *vport, u32 portid,
|
|
u32 seq, u8 cmd)
|
|
{
|
|
struct sk_buff *skb;
|
|
int retval;
|
|
|
|
skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
|
|
if (!skb)
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
retval = ovs_vport_cmd_fill_info(vport, skb, portid, seq, 0, cmd);
|
|
BUG_ON(retval < 0);
|
|
|
|
return skb;
|
|
}
|
|
|
|
/* Called with ovs_mutex or RCU read lock. */
|
|
static struct vport *lookup_vport(struct net *net,
|
|
struct ovs_header *ovs_header,
|
|
struct nlattr *a[OVS_VPORT_ATTR_MAX + 1])
|
|
{
|
|
struct datapath *dp;
|
|
struct vport *vport;
|
|
|
|
if (a[OVS_VPORT_ATTR_NAME]) {
|
|
vport = ovs_vport_locate(net, nla_data(a[OVS_VPORT_ATTR_NAME]));
|
|
if (!vport)
|
|
return ERR_PTR(-ENODEV);
|
|
if (ovs_header->dp_ifindex &&
|
|
ovs_header->dp_ifindex != get_dpifindex(vport->dp))
|
|
return ERR_PTR(-ENODEV);
|
|
return vport;
|
|
} else if (a[OVS_VPORT_ATTR_PORT_NO]) {
|
|
u32 port_no = nla_get_u32(a[OVS_VPORT_ATTR_PORT_NO]);
|
|
|
|
if (port_no >= DP_MAX_PORTS)
|
|
return ERR_PTR(-EFBIG);
|
|
|
|
dp = get_dp(net, ovs_header->dp_ifindex);
|
|
if (!dp)
|
|
return ERR_PTR(-ENODEV);
|
|
|
|
vport = ovs_vport_ovsl_rcu(dp, port_no);
|
|
if (!vport)
|
|
return ERR_PTR(-ENODEV);
|
|
return vport;
|
|
} else
|
|
return ERR_PTR(-EINVAL);
|
|
}
|
|
|
|
static int ovs_vport_cmd_new(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct nlattr **a = info->attrs;
|
|
struct ovs_header *ovs_header = info->userhdr;
|
|
struct vport_parms parms;
|
|
struct sk_buff *reply;
|
|
struct vport *vport;
|
|
struct datapath *dp;
|
|
u32 port_no;
|
|
int err;
|
|
|
|
err = -EINVAL;
|
|
if (!a[OVS_VPORT_ATTR_NAME] || !a[OVS_VPORT_ATTR_TYPE] ||
|
|
!a[OVS_VPORT_ATTR_UPCALL_PID])
|
|
goto exit;
|
|
|
|
ovs_lock();
|
|
dp = get_dp(sock_net(skb->sk), ovs_header->dp_ifindex);
|
|
err = -ENODEV;
|
|
if (!dp)
|
|
goto exit_unlock;
|
|
|
|
if (a[OVS_VPORT_ATTR_PORT_NO]) {
|
|
port_no = nla_get_u32(a[OVS_VPORT_ATTR_PORT_NO]);
|
|
|
|
err = -EFBIG;
|
|
if (port_no >= DP_MAX_PORTS)
|
|
goto exit_unlock;
|
|
|
|
vport = ovs_vport_ovsl(dp, port_no);
|
|
err = -EBUSY;
|
|
if (vport)
|
|
goto exit_unlock;
|
|
} else {
|
|
for (port_no = 1; ; port_no++) {
|
|
if (port_no >= DP_MAX_PORTS) {
|
|
err = -EFBIG;
|
|
goto exit_unlock;
|
|
}
|
|
vport = ovs_vport_ovsl(dp, port_no);
|
|
if (!vport)
|
|
break;
|
|
}
|
|
}
|
|
|
|
parms.name = nla_data(a[OVS_VPORT_ATTR_NAME]);
|
|
parms.type = nla_get_u32(a[OVS_VPORT_ATTR_TYPE]);
|
|
parms.options = a[OVS_VPORT_ATTR_OPTIONS];
|
|
parms.dp = dp;
|
|
parms.port_no = port_no;
|
|
parms.upcall_portid = nla_get_u32(a[OVS_VPORT_ATTR_UPCALL_PID]);
|
|
|
|
vport = new_vport(&parms);
|
|
err = PTR_ERR(vport);
|
|
if (IS_ERR(vport))
|
|
goto exit_unlock;
|
|
|
|
err = 0;
|
|
reply = ovs_vport_cmd_build_info(vport, info->snd_portid, info->snd_seq,
|
|
OVS_VPORT_CMD_NEW);
|
|
if (IS_ERR(reply)) {
|
|
err = PTR_ERR(reply);
|
|
ovs_dp_detach_port(vport);
|
|
goto exit_unlock;
|
|
}
|
|
|
|
ovs_notify(&dp_vport_genl_family, reply, info);
|
|
|
|
exit_unlock:
|
|
ovs_unlock();
|
|
exit:
|
|
return err;
|
|
}
|
|
|
|
static int ovs_vport_cmd_set(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct nlattr **a = info->attrs;
|
|
struct sk_buff *reply;
|
|
struct vport *vport;
|
|
int err;
|
|
|
|
ovs_lock();
|
|
vport = lookup_vport(sock_net(skb->sk), info->userhdr, a);
|
|
err = PTR_ERR(vport);
|
|
if (IS_ERR(vport))
|
|
goto exit_unlock;
|
|
|
|
if (a[OVS_VPORT_ATTR_TYPE] &&
|
|
nla_get_u32(a[OVS_VPORT_ATTR_TYPE]) != vport->ops->type) {
|
|
err = -EINVAL;
|
|
goto exit_unlock;
|
|
}
|
|
|
|
reply = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
|
|
if (!reply) {
|
|
err = -ENOMEM;
|
|
goto exit_unlock;
|
|
}
|
|
|
|
if (a[OVS_VPORT_ATTR_OPTIONS]) {
|
|
err = ovs_vport_set_options(vport, a[OVS_VPORT_ATTR_OPTIONS]);
|
|
if (err)
|
|
goto exit_free;
|
|
}
|
|
|
|
if (a[OVS_VPORT_ATTR_UPCALL_PID])
|
|
vport->upcall_portid = nla_get_u32(a[OVS_VPORT_ATTR_UPCALL_PID]);
|
|
|
|
err = ovs_vport_cmd_fill_info(vport, reply, info->snd_portid,
|
|
info->snd_seq, 0, OVS_VPORT_CMD_NEW);
|
|
BUG_ON(err < 0);
|
|
|
|
ovs_unlock();
|
|
ovs_notify(&dp_vport_genl_family, reply, info);
|
|
return 0;
|
|
|
|
exit_free:
|
|
kfree_skb(reply);
|
|
exit_unlock:
|
|
ovs_unlock();
|
|
return err;
|
|
}
|
|
|
|
static int ovs_vport_cmd_del(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct nlattr **a = info->attrs;
|
|
struct sk_buff *reply;
|
|
struct vport *vport;
|
|
int err;
|
|
|
|
ovs_lock();
|
|
vport = lookup_vport(sock_net(skb->sk), info->userhdr, a);
|
|
err = PTR_ERR(vport);
|
|
if (IS_ERR(vport))
|
|
goto exit_unlock;
|
|
|
|
if (vport->port_no == OVSP_LOCAL) {
|
|
err = -EINVAL;
|
|
goto exit_unlock;
|
|
}
|
|
|
|
reply = ovs_vport_cmd_build_info(vport, info->snd_portid,
|
|
info->snd_seq, OVS_VPORT_CMD_DEL);
|
|
err = PTR_ERR(reply);
|
|
if (IS_ERR(reply))
|
|
goto exit_unlock;
|
|
|
|
err = 0;
|
|
ovs_dp_detach_port(vport);
|
|
|
|
ovs_notify(&dp_vport_genl_family, reply, info);
|
|
|
|
exit_unlock:
|
|
ovs_unlock();
|
|
return err;
|
|
}
|
|
|
|
static int ovs_vport_cmd_get(struct sk_buff *skb, struct genl_info *info)
|
|
{
|
|
struct nlattr **a = info->attrs;
|
|
struct ovs_header *ovs_header = info->userhdr;
|
|
struct sk_buff *reply;
|
|
struct vport *vport;
|
|
int err;
|
|
|
|
rcu_read_lock();
|
|
vport = lookup_vport(sock_net(skb->sk), ovs_header, a);
|
|
err = PTR_ERR(vport);
|
|
if (IS_ERR(vport))
|
|
goto exit_unlock;
|
|
|
|
reply = ovs_vport_cmd_build_info(vport, info->snd_portid,
|
|
info->snd_seq, OVS_VPORT_CMD_NEW);
|
|
err = PTR_ERR(reply);
|
|
if (IS_ERR(reply))
|
|
goto exit_unlock;
|
|
|
|
rcu_read_unlock();
|
|
|
|
return genlmsg_reply(reply, info);
|
|
|
|
exit_unlock:
|
|
rcu_read_unlock();
|
|
return err;
|
|
}
|
|
|
|
static int ovs_vport_cmd_dump(struct sk_buff *skb, struct netlink_callback *cb)
|
|
{
|
|
struct ovs_header *ovs_header = genlmsg_data(nlmsg_data(cb->nlh));
|
|
struct datapath *dp;
|
|
int bucket = cb->args[0], skip = cb->args[1];
|
|
int i, j = 0;
|
|
|
|
dp = get_dp(sock_net(skb->sk), ovs_header->dp_ifindex);
|
|
if (!dp)
|
|
return -ENODEV;
|
|
|
|
rcu_read_lock();
|
|
for (i = bucket; i < DP_VPORT_HASH_BUCKETS; i++) {
|
|
struct vport *vport;
|
|
|
|
j = 0;
|
|
hlist_for_each_entry_rcu(vport, &dp->ports[i], dp_hash_node) {
|
|
if (j >= skip &&
|
|
ovs_vport_cmd_fill_info(vport, skb,
|
|
NETLINK_CB(cb->skb).portid,
|
|
cb->nlh->nlmsg_seq,
|
|
NLM_F_MULTI,
|
|
OVS_VPORT_CMD_NEW) < 0)
|
|
goto out;
|
|
|
|
j++;
|
|
}
|
|
skip = 0;
|
|
}
|
|
out:
|
|
rcu_read_unlock();
|
|
|
|
cb->args[0] = i;
|
|
cb->args[1] = j;
|
|
|
|
return skb->len;
|
|
}
|
|
|
|
static const struct genl_ops dp_vport_genl_ops[] = {
|
|
{ .cmd = OVS_VPORT_CMD_NEW,
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
.policy = vport_policy,
|
|
.doit = ovs_vport_cmd_new
|
|
},
|
|
{ .cmd = OVS_VPORT_CMD_DEL,
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
.policy = vport_policy,
|
|
.doit = ovs_vport_cmd_del
|
|
},
|
|
{ .cmd = OVS_VPORT_CMD_GET,
|
|
.flags = 0, /* OK for unprivileged users. */
|
|
.policy = vport_policy,
|
|
.doit = ovs_vport_cmd_get,
|
|
.dumpit = ovs_vport_cmd_dump
|
|
},
|
|
{ .cmd = OVS_VPORT_CMD_SET,
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
.policy = vport_policy,
|
|
.doit = ovs_vport_cmd_set,
|
|
},
|
|
};
|
|
|
|
struct genl_family_and_ops {
|
|
struct genl_family *family;
|
|
const struct genl_ops *ops;
|
|
int n_ops;
|
|
const struct genl_multicast_group *group;
|
|
};
|
|
|
|
static const struct genl_family_and_ops dp_genl_families[] = {
|
|
{ &dp_datapath_genl_family,
|
|
dp_datapath_genl_ops, ARRAY_SIZE(dp_datapath_genl_ops),
|
|
&ovs_dp_datapath_multicast_group },
|
|
{ &dp_vport_genl_family,
|
|
dp_vport_genl_ops, ARRAY_SIZE(dp_vport_genl_ops),
|
|
&ovs_dp_vport_multicast_group },
|
|
{ &dp_flow_genl_family,
|
|
dp_flow_genl_ops, ARRAY_SIZE(dp_flow_genl_ops),
|
|
&ovs_dp_flow_multicast_group },
|
|
{ &dp_packet_genl_family,
|
|
dp_packet_genl_ops, ARRAY_SIZE(dp_packet_genl_ops),
|
|
NULL },
|
|
};
|
|
|
|
static void dp_unregister_genl(int n_families)
|
|
{
|
|
int i;
|
|
|
|
for (i = 0; i < n_families; i++)
|
|
genl_unregister_family(dp_genl_families[i].family);
|
|
}
|
|
|
|
static int dp_register_genl(void)
|
|
{
|
|
int n_registered;
|
|
int err;
|
|
int i;
|
|
|
|
n_registered = 0;
|
|
for (i = 0; i < ARRAY_SIZE(dp_genl_families); i++) {
|
|
const struct genl_family_and_ops *f = &dp_genl_families[i];
|
|
|
|
f->family->ops = f->ops;
|
|
f->family->n_ops = f->n_ops;
|
|
f->family->mcgrps = f->group;
|
|
f->family->n_mcgrps = f->group ? 1 : 0;
|
|
err = genl_register_family(f->family);
|
|
if (err)
|
|
goto error;
|
|
n_registered++;
|
|
}
|
|
|
|
return 0;
|
|
|
|
error:
|
|
dp_unregister_genl(n_registered);
|
|
return err;
|
|
}
|
|
|
|
static int __net_init ovs_init_net(struct net *net)
|
|
{
|
|
struct ovs_net *ovs_net = net_generic(net, ovs_net_id);
|
|
|
|
INIT_LIST_HEAD(&ovs_net->dps);
|
|
INIT_WORK(&ovs_net->dp_notify_work, ovs_dp_notify_wq);
|
|
return 0;
|
|
}
|
|
|
|
static void __net_exit ovs_exit_net(struct net *net)
|
|
{
|
|
struct datapath *dp, *dp_next;
|
|
struct ovs_net *ovs_net = net_generic(net, ovs_net_id);
|
|
|
|
ovs_lock();
|
|
list_for_each_entry_safe(dp, dp_next, &ovs_net->dps, list_node)
|
|
__dp_destroy(dp);
|
|
ovs_unlock();
|
|
|
|
cancel_work_sync(&ovs_net->dp_notify_work);
|
|
}
|
|
|
|
static struct pernet_operations ovs_net_ops = {
|
|
.init = ovs_init_net,
|
|
.exit = ovs_exit_net,
|
|
.id = &ovs_net_id,
|
|
.size = sizeof(struct ovs_net),
|
|
};
|
|
|
|
static int __init dp_init(void)
|
|
{
|
|
int err;
|
|
|
|
BUILD_BUG_ON(sizeof(struct ovs_skb_cb) > FIELD_SIZEOF(struct sk_buff, cb));
|
|
|
|
pr_info("Open vSwitch switching datapath\n");
|
|
|
|
err = ovs_flow_init();
|
|
if (err)
|
|
goto error;
|
|
|
|
err = ovs_vport_init();
|
|
if (err)
|
|
goto error_flow_exit;
|
|
|
|
err = register_pernet_device(&ovs_net_ops);
|
|
if (err)
|
|
goto error_vport_exit;
|
|
|
|
err = register_netdevice_notifier(&ovs_dp_device_notifier);
|
|
if (err)
|
|
goto error_netns_exit;
|
|
|
|
err = dp_register_genl();
|
|
if (err < 0)
|
|
goto error_unreg_notifier;
|
|
|
|
return 0;
|
|
|
|
error_unreg_notifier:
|
|
unregister_netdevice_notifier(&ovs_dp_device_notifier);
|
|
error_netns_exit:
|
|
unregister_pernet_device(&ovs_net_ops);
|
|
error_vport_exit:
|
|
ovs_vport_exit();
|
|
error_flow_exit:
|
|
ovs_flow_exit();
|
|
error:
|
|
return err;
|
|
}
|
|
|
|
static void dp_cleanup(void)
|
|
{
|
|
dp_unregister_genl(ARRAY_SIZE(dp_genl_families));
|
|
unregister_netdevice_notifier(&ovs_dp_device_notifier);
|
|
unregister_pernet_device(&ovs_net_ops);
|
|
rcu_barrier();
|
|
ovs_vport_exit();
|
|
ovs_flow_exit();
|
|
}
|
|
|
|
module_init(dp_init);
|
|
module_exit(dp_cleanup);
|
|
|
|
MODULE_DESCRIPTION("Open vSwitch switching datapath");
|
|
MODULE_LICENSE("GPL");
|