]>
Commit | Line | Data |
---|---|---|
f2459fe7 | 1 | /* |
e0edde6f | 2 | * Copyright (c) 2007-2012 Nicira, Inc. |
f2459fe7 | 3 | * |
a9a29d22 JG |
4 | * This program is free software; you can redistribute it and/or |
5 | * modify it under the terms of version 2 of the GNU General Public | |
6 | * License as published by the Free Software Foundation. | |
7 | * | |
8 | * This program is distributed in the hope that it will be useful, but | |
9 | * WITHOUT ANY WARRANTY; without even the implied warranty of | |
10 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU | |
11 | * General Public License for more details. | |
12 | * | |
13 | * You should have received a copy of the GNU General Public License | |
14 | * along with this program; if not, write to the Free Software | |
15 | * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA | |
16 | * 02110-1301, USA | |
f2459fe7 JG |
17 | */ |
18 | ||
24b019f8 JP |
19 | #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt |
20 | ||
f2459fe7 JG |
21 | #include <linux/if_arp.h> |
22 | #include <linux/if_bridge.h> | |
23 | #include <linux/if_vlan.h> | |
24 | #include <linux/kernel.h> | |
25 | #include <linux/llc.h> | |
26 | #include <linux/rtnetlink.h> | |
27 | #include <linux/skbuff.h> | |
2b51596f | 28 | #include <linux/openvswitch.h> |
f6a0c895 | 29 | #include <linux/netdevice.h> |
f2459fe7 JG |
30 | |
31 | #include <net/llc.h> | |
32 | ||
33 | #include "datapath.h" | |
6e0ce48e | 34 | #include "vlan.h" |
f2459fe7 JG |
35 | #include "vport-internal_dev.h" |
36 | #include "vport-netdev.h" | |
37 | ||
43158509 | 38 | static void netdev_port_receive(struct vport *vport, struct sk_buff *skb); |
f2459fe7 | 39 | |
898ba403 AE |
40 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,39) |
41 | /* Called with rcu_read_lock and bottom-halves disabled. */ | |
42 | static rx_handler_result_t netdev_frame_hook(struct sk_buff **pskb) | |
43 | { | |
44 | struct sk_buff *skb = *pskb; | |
45 | struct vport *vport; | |
46 | ||
47 | if (unlikely(skb->pkt_type == PACKET_LOOPBACK)) | |
48 | return RX_HANDLER_PASS; | |
49 | ||
850b6b3b | 50 | vport = ovs_netdev_get_vport(skb->dev); |
898ba403 AE |
51 | |
52 | netdev_port_receive(vport, skb); | |
53 | ||
54 | return RX_HANDLER_CONSUMED; | |
55 | } | |
f285d3e7 TG |
56 | #elif LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,36) || \ |
57 | defined HAVE_RHEL_OVS_HOOK | |
43158509 SH |
58 | /* Called with rcu_read_lock and bottom-halves disabled. */ |
59 | static struct sk_buff *netdev_frame_hook(struct sk_buff *skb) | |
60 | { | |
61 | struct vport *vport; | |
62 | ||
63 | if (unlikely(skb->pkt_type == PACKET_LOOPBACK)) | |
64 | return skb; | |
65 | ||
0145d7ed | 66 | vport = ovs_netdev_get_vport(skb->dev); |
43158509 SH |
67 | |
68 | netdev_port_receive(vport, skb); | |
69 | ||
70 | return NULL; | |
71 | } | |
d4a0d80a | 72 | #elif LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,32) |
f2459fe7 JG |
73 | /* |
74 | * Used as br_handle_frame_hook. (Cannot run bridge at the same time, even on | |
75 | * different set of devices!) | |
76 | */ | |
f2459fe7 | 77 | /* Called with rcu_read_lock and bottom-halves disabled. */ |
fceb2a5b JG |
78 | static struct sk_buff *netdev_frame_hook(struct net_bridge_port *p, |
79 | struct sk_buff *skb) | |
f2459fe7 | 80 | { |
43158509 | 81 | netdev_port_receive((struct vport *)p, skb); |
f2459fe7 JG |
82 | return NULL; |
83 | } | |
f2459fe7 JG |
84 | #else |
85 | #error | |
86 | #endif | |
87 | ||
f1f60b85 | 88 | static struct net_device *get_dpdev(const struct datapath *dp) |
2b51596f JP |
89 | { |
90 | struct vport *local; | |
91 | ||
92 | local = ovs_vport_ovsl(dp, OVSP_LOCAL); | |
93 | BUG_ON(!local); | |
94 | return netdev_vport_priv(local)->dev; | |
95 | } | |
96 | ||
94903c98 | 97 | static struct vport *netdev_create(const struct vport_parms *parms) |
f2459fe7 JG |
98 | { |
99 | struct vport *vport; | |
100 | struct netdev_vport *netdev_vport; | |
101 | int err; | |
102 | ||
850b6b3b JG |
103 | vport = ovs_vport_alloc(sizeof(struct netdev_vport), |
104 | &ovs_netdev_vport_ops, parms); | |
f2459fe7 JG |
105 | if (IS_ERR(vport)) { |
106 | err = PTR_ERR(vport); | |
107 | goto error; | |
108 | } | |
109 | ||
110 | netdev_vport = netdev_vport_priv(vport); | |
111 | ||
2a4999f3 | 112 | netdev_vport->dev = dev_get_by_name(ovs_dp_get_net(vport->dp), parms->name); |
f2459fe7 JG |
113 | if (!netdev_vport->dev) { |
114 | err = -ENODEV; | |
115 | goto error_free_vport; | |
116 | } | |
117 | ||
118 | if (netdev_vport->dev->flags & IFF_LOOPBACK || | |
119 | netdev_vport->dev->type != ARPHRD_ETHER || | |
850b6b3b | 120 | ovs_is_internal_dev(netdev_vport->dev)) { |
f2459fe7 JG |
121 | err = -EINVAL; |
122 | goto error_put; | |
123 | } | |
124 | ||
cd2a59e9 | 125 | rtnl_lock(); |
2b51596f JP |
126 | err = netdev_master_upper_dev_link(netdev_vport->dev, |
127 | get_dpdev(vport->dp)); | |
128 | if (err) | |
129 | goto error_unlock; | |
130 | ||
7237e4f4 BP |
131 | err = netdev_rx_handler_register(netdev_vport->dev, netdev_frame_hook, |
132 | vport); | |
133 | if (err) | |
2b51596f | 134 | goto error_master_upper_dev_unlink; |
7237e4f4 BP |
135 | |
136 | dev_set_promiscuity(netdev_vport->dev, 1); | |
7237e4f4 | 137 | netdev_vport->dev->priv_flags |= IFF_OVS_DATAPATH; |
cd2a59e9 | 138 | rtnl_unlock(); |
7237e4f4 | 139 | |
f2459fe7 JG |
140 | return vport; |
141 | ||
2b51596f JP |
142 | error_master_upper_dev_unlink: |
143 | netdev_upper_dev_unlink(netdev_vport->dev, get_dpdev(vport->dp)); | |
cd2a59e9 PS |
144 | error_unlock: |
145 | rtnl_unlock(); | |
f2459fe7 JG |
146 | error_put: |
147 | dev_put(netdev_vport->dev); | |
148 | error_free_vport: | |
850b6b3b | 149 | ovs_vport_free(vport); |
f2459fe7 JG |
150 | error: |
151 | return ERR_PTR(err); | |
152 | } | |
153 | ||
e65361d6 JG |
154 | static void free_port_rcu(struct rcu_head *rcu) |
155 | { | |
156 | struct netdev_vport *netdev_vport = container_of(rcu, | |
157 | struct netdev_vport, rcu); | |
158 | ||
159 | dev_put(netdev_vport->dev); | |
160 | ovs_vport_free(vport_from_priv(netdev_vport)); | |
161 | } | |
162 | ||
8e04c6e1 | 163 | void ovs_netdev_detach_dev(struct vport *vport) |
f2459fe7 JG |
164 | { |
165 | struct netdev_vport *netdev_vport = netdev_vport_priv(vport); | |
166 | ||
8e04c6e1 | 167 | ASSERT_RTNL(); |
37f055c7 | 168 | netdev_vport->dev->priv_flags &= ~IFF_OVS_DATAPATH; |
43158509 | 169 | netdev_rx_handler_unregister(netdev_vport->dev); |
8e04c6e1 AS |
170 | netdev_upper_dev_unlink(netdev_vport->dev, |
171 | netdev_master_upper_dev_get(netdev_vport->dev)); | |
f2459fe7 | 172 | dev_set_promiscuity(netdev_vport->dev, -1); |
8e04c6e1 AS |
173 | } |
174 | ||
175 | static void netdev_destroy(struct vport *vport) | |
176 | { | |
177 | struct netdev_vport *netdev_vport = netdev_vport_priv(vport); | |
178 | ||
8e04c6e1 AS |
179 | rtnl_lock(); |
180 | if (ovs_netdev_get_vport(netdev_vport->dev)) | |
181 | ovs_netdev_detach_dev(vport); | |
cd2a59e9 | 182 | rtnl_unlock(); |
f2459fe7 | 183 | |
e65361d6 | 184 | call_rcu(&netdev_vport->rcu, free_port_rcu); |
f2459fe7 JG |
185 | } |
186 | ||
850b6b3b | 187 | const char *ovs_netdev_get_name(const struct vport *vport) |
f2459fe7 JG |
188 | { |
189 | const struct netdev_vport *netdev_vport = netdev_vport_priv(vport); | |
190 | return netdev_vport->dev->name; | |
191 | } | |
192 | ||
f2459fe7 | 193 | /* Must be called with rcu_read_lock. */ |
43158509 | 194 | static void netdev_port_receive(struct vport *vport, struct sk_buff *skb) |
f2459fe7 | 195 | { |
33e031e9 JG |
196 | if (unlikely(!vport)) |
197 | goto error; | |
198 | ||
199 | if (unlikely(skb_warn_if_lro(skb))) | |
200 | goto error; | |
d825e2a5 | 201 | |
f2459fe7 JG |
202 | /* Make our own copy of the packet. Otherwise we will mangle the |
203 | * packet for anyone who came before us (e.g. tcpdump via AF_PACKET). | |
204 | * (No one comes after us, since we tell handle_bridge() that we took | |
af465b67 PS |
205 | * the packet.) |
206 | */ | |
f2459fe7 | 207 | skb = skb_share_check(skb, GFP_ATOMIC); |
67c74f75 | 208 | if (unlikely(!skb)) |
f2459fe7 JG |
209 | return; |
210 | ||
3cfede14 PS |
211 | skb_push(skb, ETH_HLEN); |
212 | ovs_skb_postpush_rcsum(skb, skb->data, ETH_HLEN); | |
213 | ||
db0c3134 | 214 | ovs_vport_receive(vport, skb, NULL); |
33e031e9 JG |
215 | return; |
216 | ||
217 | error: | |
218 | kfree_skb(skb); | |
f2459fe7 JG |
219 | } |
220 | ||
f1b8a922 | 221 | static unsigned int packet_length(const struct sk_buff *skb) |
24b019f8 | 222 | { |
f1b8a922 | 223 | unsigned int length = skb->len - ETH_HLEN; |
24b019f8 JP |
224 | |
225 | if (skb->protocol == htons(ETH_P_8021Q)) | |
226 | length -= VLAN_HLEN; | |
227 | ||
228 | return length; | |
229 | } | |
230 | ||
fceb2a5b | 231 | static int netdev_send(struct vport *vport, struct sk_buff *skb) |
f2459fe7 JG |
232 | { |
233 | struct netdev_vport *netdev_vport = netdev_vport_priv(vport); | |
24b019f8 | 234 | int mtu = netdev_vport->dev->mtu; |
6ce39213 | 235 | int len; |
f2459fe7 | 236 | |
24b019f8 | 237 | if (unlikely(packet_length(skb) > mtu && !skb_is_gso(skb))) { |
51885213 | 238 | net_warn_ratelimited("%s: dropped over-mtu packet: %d > %d\n", |
40a5a25d | 239 | netdev_vport->dev->name, |
51885213 | 240 | packet_length(skb), mtu); |
be7cd27e | 241 | goto drop; |
24b019f8 JP |
242 | } |
243 | ||
f2459fe7 | 244 | skb->dev = netdev_vport->dev; |
6ce39213 | 245 | len = skb->len; |
f2459fe7 JG |
246 | dev_queue_xmit(skb); |
247 | ||
248 | return len; | |
24b019f8 | 249 | |
be7cd27e | 250 | drop: |
24b019f8 | 251 | kfree_skb(skb); |
24b019f8 | 252 | return 0; |
f2459fe7 JG |
253 | } |
254 | ||
255 | /* Returns null if this device is not attached to a datapath. */ | |
850b6b3b | 256 | struct vport *ovs_netdev_get_vport(struct net_device *dev) |
f2459fe7 | 257 | { |
f285d3e7 TG |
258 | #if LINUX_VERSION_CODE >= KERNEL_VERSION(2,6,36) || \ |
259 | defined HAVE_RHEL_OVS_HOOK | |
f6a0c895 | 260 | #ifdef HAVE_OVS_DATAPATH |
055dae4f JG |
261 | if (likely(dev->priv_flags & IFF_OVS_DATAPATH)) |
262 | #else | |
6455100f | 263 | if (likely(rcu_access_pointer(dev->rx_handler) == netdev_frame_hook)) |
055dae4f | 264 | #endif |
f285d3e7 TG |
265 | #ifdef HAVE_RHEL_OVS_HOOK |
266 | return (struct vport *)rcu_dereference_rtnl(dev->ax25_ptr); | |
267 | #else | |
e33adfd0 | 268 | return (struct vport *)rcu_dereference_rtnl(dev->rx_handler_data); |
f285d3e7 | 269 | #endif |
055dae4f | 270 | else |
37f055c7 | 271 | return NULL; |
37f055c7 | 272 | #else |
e33adfd0 | 273 | return (struct vport *)rcu_dereference_rtnl(dev->br_port); |
37f055c7 | 274 | #endif |
f2459fe7 JG |
275 | } |
276 | ||
850b6b3b | 277 | const struct vport_ops ovs_netdev_vport_ops = { |
df2c07f4 | 278 | .type = OVS_VPORT_TYPE_NETDEV, |
f2459fe7 JG |
279 | .create = netdev_create, |
280 | .destroy = netdev_destroy, | |
850b6b3b | 281 | .get_name = ovs_netdev_get_name, |
f2459fe7 JG |
282 | .send = netdev_send, |
283 | }; | |
106eab5d | 284 | |
f285d3e7 TG |
285 | #if LINUX_VERSION_CODE < KERNEL_VERSION(2,6,36) && \ |
286 | !defined HAVE_RHEL_OVS_HOOK | |
106eab5d | 287 | /* |
5ca1ba48 PS |
288 | * Enforces, mutual exclusion with the Linux bridge module, by declaring and |
289 | * exporting br_should_route_hook. Because the bridge module also exports the | |
290 | * same symbol, the module loader will refuse to load both modules at the same | |
291 | * time (e.g. "bridge: exports duplicate symbol br_should_route_hook (owned by | |
292 | * openvswitch)"). | |
293 | * | |
294 | * Before Linux 2.6.36, Open vSwitch cannot safely coexist with the Linux | |
295 | * bridge module, so openvswitch uses this macro in those versions. In | |
296 | * Linux 2.6.36 and later, Open vSwitch can coexist with the bridge module. | |
297 | * | |
298 | * The use of "typeof" here avoids the need to track changes in the type of | |
299 | * br_should_route_hook over various kernel versions. | |
106eab5d | 300 | */ |
5ca1ba48 PS |
301 | typeof(br_should_route_hook) br_should_route_hook; |
302 | EXPORT_SYMBOL(br_should_route_hook); | |
37f055c7 | 303 | #endif |