]> git.proxmox.com Git - mirror_ubuntu-artful-kernel.git/blame - net/core/netpoll.c
ipv6: move csum_ipv6_magic() and udp6_csum_init() into static library
[mirror_ubuntu-artful-kernel.git] / net / core / netpoll.c
CommitLineData
1da177e4
LT
1/*
2 * Common framework for low-level network console, dump, and debugger code
3 *
4 * Sep 8 2003 Matt Mackall <mpm@selenic.com>
5 *
6 * based on the netconsole code from:
7 *
8 * Copyright (C) 2001 Ingo Molnar <mingo@redhat.com>
9 * Copyright (C) 2002 Red Hat, Inc.
10 */
11
e6ec2693
JP
12#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
13
bff38771 14#include <linux/moduleparam.h>
1da177e4
LT
15#include <linux/netdevice.h>
16#include <linux/etherdevice.h>
17#include <linux/string.h>
14c85021 18#include <linux/if_arp.h>
1da177e4
LT
19#include <linux/inetdevice.h>
20#include <linux/inet.h>
21#include <linux/interrupt.h>
22#include <linux/netpoll.h>
23#include <linux/sched.h>
24#include <linux/delay.h>
25#include <linux/rcupdate.h>
26#include <linux/workqueue.h>
5a0e3ad6 27#include <linux/slab.h>
bc3b2d7f 28#include <linux/export.h>
689971b4 29#include <linux/if_vlan.h>
1da177e4
LT
30#include <net/tcp.h>
31#include <net/udp.h>
32#include <asm/unaligned.h>
9cbc1cb8 33#include <trace/events/napi.h>
1da177e4
LT
34
35/*
36 * We maintain a small pool of fully-sized skbs, to make sure the
37 * message gets out even in extreme OOM situations.
38 */
39
40#define MAX_UDP_CHUNK 1460
41#define MAX_SKBS 32
1da177e4 42
a1bcfacd 43static struct sk_buff_head skb_pool;
1da177e4
LT
44
45static atomic_t trapped;
46
2bdfe0ba 47#define USEC_PER_POLL 50
d9452e9f
DM
48#define NETPOLL_RX_ENABLED 1
49#define NETPOLL_RX_DROP 2
1da177e4 50
6f706245
JP
51#define MAX_SKB_SIZE \
52 (sizeof(struct ethhdr) + \
53 sizeof(struct iphdr) + \
54 sizeof(struct udphdr) + \
55 MAX_UDP_CHUNK)
1da177e4 56
3578b0c8 57static void zap_completion_queue(void);
b7394d24 58static void netpoll_neigh_reply(struct sk_buff *skb, struct netpoll_info *npinfo);
1da177e4 59
bff38771
AV
60static unsigned int carrier_timeout = 4;
61module_param(carrier_timeout, uint, 0644);
62
e6ec2693
JP
63#define np_info(np, fmt, ...) \
64 pr_info("%s: " fmt, np->name, ##__VA_ARGS__)
65#define np_err(np, fmt, ...) \
66 pr_err("%s: " fmt, np->name, ##__VA_ARGS__)
67#define np_notice(np, fmt, ...) \
68 pr_notice("%s: " fmt, np->name, ##__VA_ARGS__)
69
c4028958 70static void queue_process(struct work_struct *work)
1da177e4 71{
4c1ac1b4
DH
72 struct netpoll_info *npinfo =
73 container_of(work, struct netpoll_info, tx_work.work);
1da177e4 74 struct sk_buff *skb;
3640543d 75 unsigned long flags;
1da177e4 76
6c43ff18
SH
77 while ((skb = skb_dequeue(&npinfo->txq))) {
78 struct net_device *dev = skb->dev;
00829823 79 const struct net_device_ops *ops = dev->netdev_ops;
fd2ea0a7 80 struct netdev_queue *txq;
1da177e4 81
6c43ff18
SH
82 if (!netif_device_present(dev) || !netif_running(dev)) {
83 __kfree_skb(skb);
84 continue;
85 }
1da177e4 86
fd2ea0a7
DM
87 txq = netdev_get_tx_queue(dev, skb_get_queue_mapping(skb));
88
3640543d 89 local_irq_save(flags);
fd2ea0a7 90 __netif_tx_lock(txq, smp_processor_id());
73466498 91 if (netif_xmit_frozen_or_stopped(txq) ||
00829823 92 ops->ndo_start_xmit(skb, dev) != NETDEV_TX_OK) {
6c43ff18 93 skb_queue_head(&npinfo->txq, skb);
fd2ea0a7 94 __netif_tx_unlock(txq);
3640543d 95 local_irq_restore(flags);
1da177e4 96
25442caf 97 schedule_delayed_work(&npinfo->tx_work, HZ/10);
6c43ff18
SH
98 return;
99 }
fd2ea0a7 100 __netif_tx_unlock(txq);
3640543d 101 local_irq_restore(flags);
1da177e4 102 }
1da177e4
LT
103}
104
b51655b9
AV
105static __sum16 checksum_udp(struct sk_buff *skb, struct udphdr *uh,
106 unsigned short ulen, __be32 saddr, __be32 daddr)
1da177e4 107{
d6f5493c 108 __wsum psum;
fb286bb2 109
60476372 110 if (uh->check == 0 || skb_csum_unnecessary(skb))
1da177e4
LT
111 return 0;
112
fb286bb2
HX
113 psum = csum_tcpudp_nofold(saddr, daddr, ulen, IPPROTO_UDP, 0);
114
84fa7933 115 if (skb->ip_summed == CHECKSUM_COMPLETE &&
d3bc23e7 116 !csum_fold(csum_add(psum, skb->csum)))
fb286bb2 117 return 0;
1da177e4 118
fb286bb2 119 skb->csum = psum;
1da177e4 120
fb286bb2 121 return __skb_checksum_complete(skb);
1da177e4
LT
122}
123
124/*
125 * Check whether delayed processing was scheduled for our NIC. If so,
126 * we attempt to grab the poll lock and use ->poll() to pump the card.
127 * If this fails, either we've recursed in ->poll() or it's already
128 * running on another CPU.
129 *
130 * Note: we don't mask interrupts with this lock because we're using
131 * trylock here and interrupts are already disabled in the softirq
132 * case. Further, we test the poll_owner to avoid recursion on UP
133 * systems where the lock doesn't exist.
134 *
135 * In cases where there is bi-directional communications, reading only
136 * one message at a time can lead to packets being dropped by the
137 * network adapter, forcing superfluous retries and possibly timeouts.
138 * Thus, we set our budget to greater than 1.
139 */
0a7606c1
DM
140static int poll_one_napi(struct netpoll_info *npinfo,
141 struct napi_struct *napi, int budget)
142{
143 int work;
144
145 /* net_rx_action's ->poll() invocations and our's are
146 * synchronized by this test which is only made while
147 * holding the napi->poll_lock.
148 */
149 if (!test_bit(NAPI_STATE_SCHED, &napi->state))
150 return budget;
151
d9452e9f 152 npinfo->rx_flags |= NETPOLL_RX_DROP;
0a7606c1 153 atomic_inc(&trapped);
7b363e44 154 set_bit(NAPI_STATE_NPSVC, &napi->state);
0a7606c1
DM
155
156 work = napi->poll(napi, budget);
7d18f114 157 trace_napi_poll(napi);
0a7606c1 158
7b363e44 159 clear_bit(NAPI_STATE_NPSVC, &napi->state);
0a7606c1 160 atomic_dec(&trapped);
d9452e9f 161 npinfo->rx_flags &= ~NETPOLL_RX_DROP;
0a7606c1
DM
162
163 return budget - work;
164}
165
5106930b 166static void poll_napi(struct net_device *dev)
1da177e4 167{
bea3348e 168 struct napi_struct *napi;
1da177e4
LT
169 int budget = 16;
170
f13d493d 171 list_for_each_entry(napi, &dev->napi_list, dev_list) {
0a7606c1 172 if (napi->poll_owner != smp_processor_id() &&
bea3348e 173 spin_trylock(&napi->poll_lock)) {
2899656b
AW
174 budget = poll_one_napi(rcu_dereference_bh(dev->npinfo),
175 napi, budget);
bea3348e 176 spin_unlock(&napi->poll_lock);
0a7606c1 177
072a9c48 178 if (!budget)
0a7606c1 179 break;
bea3348e 180 }
1da177e4
LT
181 }
182}
183
b7394d24 184static void service_neigh_queue(struct netpoll_info *npi)
068c6e98 185{
5106930b
SH
186 if (npi) {
187 struct sk_buff *skb;
068c6e98 188
b7394d24
CW
189 while ((skb = skb_dequeue(&npi->neigh_tx)))
190 netpoll_neigh_reply(skb, npi);
068c6e98 191 }
068c6e98
NH
192}
193
234b921d 194static void netpoll_poll_dev(struct net_device *dev)
1da177e4 195{
5e392739 196 const struct net_device_ops *ops;
2899656b 197 struct netpoll_info *ni = rcu_dereference_bh(dev->npinfo);
5106930b 198
5e392739
PE
199 if (!dev || !netif_running(dev))
200 return;
201
202 ops = dev->netdev_ops;
203 if (!ops->ndo_poll_controller)
1da177e4
LT
204 return;
205
206 /* Process pending work on NIC */
d314774c 207 ops->ndo_poll_controller(dev);
5106930b
SH
208
209 poll_napi(dev);
1da177e4 210
58e05f35 211 if (dev->flags & IFF_SLAVE) {
2899656b 212 if (ni) {
49bd8fb0 213 struct net_device *bond_dev;
5a698af5 214 struct sk_buff *skb;
49bd8fb0
JP
215 struct netpoll_info *bond_ni;
216
217 bond_dev = netdev_master_upper_dev_get_rcu(dev);
218 bond_ni = rcu_dereference_bh(bond_dev->npinfo);
b7394d24 219 while ((skb = skb_dequeue(&ni->neigh_tx))) {
5a698af5 220 skb->dev = bond_dev;
b7394d24 221 skb_queue_tail(&bond_ni->neigh_tx, skb);
5a698af5
AW
222 }
223 }
224 }
225
b7394d24 226 service_neigh_queue(ni);
068c6e98 227
3578b0c8 228 zap_completion_queue();
1da177e4
LT
229}
230
231static void refill_skbs(void)
232{
233 struct sk_buff *skb;
234 unsigned long flags;
235
a1bcfacd
SH
236 spin_lock_irqsave(&skb_pool.lock, flags);
237 while (skb_pool.qlen < MAX_SKBS) {
1da177e4
LT
238 skb = alloc_skb(MAX_SKB_SIZE, GFP_ATOMIC);
239 if (!skb)
240 break;
241
a1bcfacd 242 __skb_queue_tail(&skb_pool, skb);
1da177e4 243 }
a1bcfacd 244 spin_unlock_irqrestore(&skb_pool.lock, flags);
1da177e4
LT
245}
246
3578b0c8
DM
247static void zap_completion_queue(void)
248{
249 unsigned long flags;
250 struct softnet_data *sd = &get_cpu_var(softnet_data);
251
252 if (sd->completion_queue) {
253 struct sk_buff *clist;
254
255 local_irq_save(flags);
256 clist = sd->completion_queue;
257 sd->completion_queue = NULL;
258 local_irq_restore(flags);
259
260 while (clist != NULL) {
261 struct sk_buff *skb = clist;
262 clist = clist->next;
263 if (skb->destructor) {
264 atomic_inc(&skb->users);
265 dev_kfree_skb_any(skb); /* put this one back */
266 } else {
267 __kfree_skb(skb);
268 }
269 }
270 }
271
272 put_cpu_var(softnet_data);
273}
274
a1bcfacd 275static struct sk_buff *find_skb(struct netpoll *np, int len, int reserve)
1da177e4 276{
a1bcfacd
SH
277 int count = 0;
278 struct sk_buff *skb;
1da177e4 279
3578b0c8 280 zap_completion_queue();
a1bcfacd 281 refill_skbs();
1da177e4 282repeat:
1da177e4
LT
283
284 skb = alloc_skb(len, GFP_ATOMIC);
a1bcfacd
SH
285 if (!skb)
286 skb = skb_dequeue(&skb_pool);
1da177e4
LT
287
288 if (!skb) {
a1bcfacd 289 if (++count < 10) {
2a49e001 290 netpoll_poll_dev(np->dev);
a1bcfacd 291 goto repeat;
1da177e4 292 }
a1bcfacd 293 return NULL;
1da177e4
LT
294 }
295
296 atomic_set(&skb->users, 1);
297 skb_reserve(skb, reserve);
298 return skb;
299}
300
bea3348e
SH
301static int netpoll_owner_active(struct net_device *dev)
302{
303 struct napi_struct *napi;
304
305 list_for_each_entry(napi, &dev->napi_list, dev_list) {
306 if (napi->poll_owner == smp_processor_id())
307 return 1;
308 }
309 return 0;
310}
311
2899656b 312/* call with IRQ disabled */
c2355e1a
NH
313void netpoll_send_skb_on_dev(struct netpoll *np, struct sk_buff *skb,
314 struct net_device *dev)
1da177e4 315{
2bdfe0ba
SH
316 int status = NETDEV_TX_BUSY;
317 unsigned long tries;
00829823 318 const struct net_device_ops *ops = dev->netdev_ops;
de85d99e 319 /* It is up to the caller to keep npinfo alive. */
2899656b 320 struct netpoll_info *npinfo;
2bdfe0ba 321
2899656b
AW
322 WARN_ON_ONCE(!irqs_disabled());
323
324 npinfo = rcu_dereference_bh(np->dev->npinfo);
4ec93edb
YH
325 if (!npinfo || !netif_running(dev) || !netif_device_present(dev)) {
326 __kfree_skb(skb);
327 return;
328 }
2bdfe0ba
SH
329
330 /* don't get messages out of order, and no recursion */
bea3348e 331 if (skb_queue_len(&npinfo->txq) == 0 && !netpoll_owner_active(dev)) {
fd2ea0a7 332 struct netdev_queue *txq;
a49f99ff 333
8c4c49df 334 txq = netdev_pick_tx(dev, skb);
fd2ea0a7 335
0db3dc73
SH
336 /* try until next clock tick */
337 for (tries = jiffies_to_usecs(1)/USEC_PER_POLL;
338 tries > 0; --tries) {
fd2ea0a7 339 if (__netif_tx_trylock(txq)) {
73466498 340 if (!netif_xmit_stopped(txq)) {
689971b4
AW
341 if (vlan_tx_tag_present(skb) &&
342 !(netif_skb_features(skb) & NETIF_F_HW_VLAN_TX)) {
343 skb = __vlan_put_tag(skb, vlan_tx_tag_get(skb));
344 if (unlikely(!skb))
345 break;
346 skb->vlan_tci = 0;
347 }
348
00829823 349 status = ops->ndo_start_xmit(skb, dev);
08baf561
ED
350 if (status == NETDEV_TX_OK)
351 txq_trans_update(txq);
352 }
fd2ea0a7 353 __netif_tx_unlock(txq);
e37b8d93
AM
354
355 if (status == NETDEV_TX_OK)
356 break;
357
e37b8d93 358 }
0db3dc73
SH
359
360 /* tickle device maybe there is some cleanup */
2a49e001 361 netpoll_poll_dev(np->dev);
0db3dc73
SH
362
363 udelay(USEC_PER_POLL);
0db1d6fc 364 }
79b1bee8
DD
365
366 WARN_ONCE(!irqs_disabled(),
2899656b 367 "netpoll_send_skb_on_dev(): %s enabled interrupts in poll (%pF)\n",
79b1bee8
DD
368 dev->name, ops->ndo_start_xmit);
369
1da177e4 370 }
1da177e4 371
2bdfe0ba 372 if (status != NETDEV_TX_OK) {
5de4a473 373 skb_queue_tail(&npinfo->txq, skb);
4c1ac1b4 374 schedule_delayed_work(&npinfo->tx_work,0);
1da177e4 375 }
1da177e4 376}
c2355e1a 377EXPORT_SYMBOL(netpoll_send_skb_on_dev);
1da177e4
LT
378
379void netpoll_send_udp(struct netpoll *np, const char *msg, int len)
380{
954fba02 381 int total_len, ip_len, udp_len;
1da177e4
LT
382 struct sk_buff *skb;
383 struct udphdr *udph;
384 struct iphdr *iph;
385 struct ethhdr *eth;
ee130409 386 static atomic_t ip_ident;
1da177e4
LT
387
388 udp_len = len + sizeof(*udph);
b7394d24
CW
389 if (!np->ipv6)
390 ip_len = udp_len + sizeof(*iph);
391
954fba02 392 total_len = ip_len + LL_RESERVED_SPACE(np->dev);
1da177e4 393
954fba02
ED
394 skb = find_skb(np, total_len + np->dev->needed_tailroom,
395 total_len - len);
1da177e4
LT
396 if (!skb)
397 return;
398
27d7ff46 399 skb_copy_to_linear_data(skb, msg, len);
954fba02 400 skb_put(skb, len);
1da177e4 401
4bedb452
ACM
402 skb_push(skb, sizeof(*udph));
403 skb_reset_transport_header(skb);
404 udph = udp_hdr(skb);
1da177e4
LT
405 udph->source = htons(np->local_port);
406 udph->dest = htons(np->remote_port);
407 udph->len = htons(udp_len);
b7394d24
CW
408
409 if (!np->ipv6) {
410 udph->check = 0;
411 udph->check = csum_tcpudp_magic(np->local_ip.ip,
412 np->remote_ip.ip,
413 udp_len, IPPROTO_UDP,
414 csum_partial(udph, udp_len, 0));
415 if (udph->check == 0)
416 udph->check = CSUM_MANGLED_0;
417
418 skb_push(skb, sizeof(*iph));
419 skb_reset_network_header(skb);
420 iph = ip_hdr(skb);
421
422 /* iph->version = 4; iph->ihl = 5; */
423 put_unaligned(0x45, (unsigned char *)iph);
424 iph->tos = 0;
425 put_unaligned(htons(ip_len), &(iph->tot_len));
426 iph->id = htons(atomic_inc_return(&ip_ident));
427 iph->frag_off = 0;
428 iph->ttl = 64;
429 iph->protocol = IPPROTO_UDP;
430 iph->check = 0;
431 put_unaligned(np->local_ip.ip, &(iph->saddr));
432 put_unaligned(np->remote_ip.ip, &(iph->daddr));
433 iph->check = ip_fast_csum((unsigned char *)iph, iph->ihl);
434
435 eth = (struct ethhdr *) skb_push(skb, ETH_HLEN);
436 skb_reset_mac_header(skb);
437 skb->protocol = eth->h_proto = htons(ETH_P_IP);
438 }
439
09538641
SH
440 memcpy(eth->h_source, np->dev->dev_addr, ETH_ALEN);
441 memcpy(eth->h_dest, np->remote_mac, ETH_ALEN);
1da177e4
LT
442
443 skb->dev = np->dev;
444
445 netpoll_send_skb(np, skb);
446}
9e34a5b5 447EXPORT_SYMBOL(netpoll_send_udp);
1da177e4 448
b7394d24 449static void netpoll_neigh_reply(struct sk_buff *skb, struct netpoll_info *npinfo)
1da177e4
LT
450{
451 struct arphdr *arp;
452 unsigned char *arp_ptr;
453 int size, type = ARPOP_REPLY, ptype = ETH_P_ARP;
252e3346 454 __be32 sip, tip;
47bbec02 455 unsigned char *sha;
1da177e4 456 struct sk_buff *send_skb;
508e14b4
DB
457 struct netpoll *np, *tmp;
458 unsigned long flags;
ae641949 459 int hlen, tlen;
b7394d24 460 int hits = 0, proto;
508e14b4
DB
461
462 if (list_empty(&npinfo->rx_np))
463 return;
464
465 /* Before checking the packet, we do some early
466 inspection whether this is interesting at all */
467 spin_lock_irqsave(&npinfo->rx_lock, flags);
468 list_for_each_entry_safe(np, tmp, &npinfo->rx_np, rx) {
469 if (np->dev == skb->dev)
470 hits++;
471 }
472 spin_unlock_irqrestore(&npinfo->rx_lock, flags);
1da177e4 473
508e14b4
DB
474 /* No netpoll struct is using this dev */
475 if (!hits)
115c1d6e 476 return;
1da177e4 477
b7394d24
CW
478 proto = ntohs(eth_hdr(skb)->h_proto);
479 if (proto == ETH_P_IP) {
480 /* No arp on this interface */
481 if (skb->dev->flags & IFF_NOARP)
482 return;
1da177e4 483
b7394d24
CW
484 if (!pskb_may_pull(skb, arp_hdr_len(skb->dev)))
485 return;
1da177e4 486
b7394d24
CW
487 skb_reset_network_header(skb);
488 skb_reset_transport_header(skb);
489 arp = arp_hdr(skb);
1da177e4 490
b7394d24
CW
491 if ((arp->ar_hrd != htons(ARPHRD_ETHER) &&
492 arp->ar_hrd != htons(ARPHRD_IEEE802)) ||
493 arp->ar_pro != htons(ETH_P_IP) ||
494 arp->ar_op != htons(ARPOP_REQUEST))
495 return;
1da177e4 496
b7394d24
CW
497 arp_ptr = (unsigned char *)(arp+1);
498 /* save the location of the src hw addr */
499 sha = arp_ptr;
500 arp_ptr += skb->dev->addr_len;
501 memcpy(&sip, arp_ptr, 4);
502 arp_ptr += 4;
503 /* If we actually cared about dst hw addr,
504 it would get copied here */
505 arp_ptr += skb->dev->addr_len;
506 memcpy(&tip, arp_ptr, 4);
1da177e4 507
b7394d24
CW
508 /* Should we ignore arp? */
509 if (ipv4_is_loopback(tip) || ipv4_is_multicast(tip))
510 return;
1da177e4 511
b7394d24 512 size = arp_hdr_len(skb->dev);
1da177e4 513
b7394d24
CW
514 spin_lock_irqsave(&npinfo->rx_lock, flags);
515 list_for_each_entry_safe(np, tmp, &npinfo->rx_np, rx) {
516 if (tip != np->local_ip.ip)
517 continue;
518
519 hlen = LL_RESERVED_SPACE(np->dev);
520 tlen = np->dev->needed_tailroom;
521 send_skb = find_skb(np, size + hlen + tlen, hlen);
522 if (!send_skb)
523 continue;
524
525 skb_reset_network_header(send_skb);
526 arp = (struct arphdr *) skb_put(send_skb, size);
527 send_skb->dev = skb->dev;
528 send_skb->protocol = htons(ETH_P_ARP);
529
530 /* Fill the device header for the ARP frame */
531 if (dev_hard_header(send_skb, skb->dev, ptype,
532 sha, np->dev->dev_addr,
533 send_skb->len) < 0) {
534 kfree_skb(send_skb);
535 continue;
536 }
1da177e4 537
b7394d24
CW
538 /*
539 * Fill out the arp protocol part.
540 *
541 * we only support ethernet device type,
542 * which (according to RFC 1390) should
543 * always equal 1 (Ethernet).
544 */
545
546 arp->ar_hrd = htons(np->dev->type);
547 arp->ar_pro = htons(ETH_P_IP);
548 arp->ar_hln = np->dev->addr_len;
549 arp->ar_pln = 4;
550 arp->ar_op = htons(type);
551
552 arp_ptr = (unsigned char *)(arp + 1);
553 memcpy(arp_ptr, np->dev->dev_addr, np->dev->addr_len);
554 arp_ptr += np->dev->addr_len;
555 memcpy(arp_ptr, &tip, 4);
556 arp_ptr += 4;
557 memcpy(arp_ptr, sha, np->dev->addr_len);
558 arp_ptr += np->dev->addr_len;
559 memcpy(arp_ptr, &sip, 4);
560
561 netpoll_send_skb(np, send_skb);
562
563 /* If there are several rx_hooks for the same address,
564 we're fine by sending a single reply */
565 break;
508e14b4 566 }
b7394d24 567 spin_unlock_irqrestore(&npinfo->rx_lock, flags);
508e14b4 568 }
1da177e4
LT
569}
570
57c5d461 571int __netpoll_rx(struct sk_buff *skb, struct netpoll_info *npinfo)
1da177e4
LT
572{
573 int proto, len, ulen;
508e14b4 574 int hits = 0;
b71d1d42 575 const struct iphdr *iph;
1da177e4 576 struct udphdr *uh;
508e14b4 577 struct netpoll *np, *tmp;
068c6e98 578
508e14b4 579 if (list_empty(&npinfo->rx_np))
1da177e4 580 goto out;
508e14b4 581
1da177e4
LT
582 if (skb->dev->type != ARPHRD_ETHER)
583 goto out;
584
d9452e9f 585 /* check if netpoll clients need ARP */
724800d6 586 if (skb->protocol == htons(ETH_P_ARP) &&
1da177e4 587 atomic_read(&trapped)) {
b7394d24 588 skb_queue_tail(&npinfo->neigh_tx, skb);
1da177e4
LT
589 return 1;
590 }
591
689971b4
AW
592 if (skb->protocol == cpu_to_be16(ETH_P_8021Q)) {
593 skb = vlan_untag(skb);
594 if (unlikely(!skb))
595 goto out;
596 }
597
1da177e4 598 proto = ntohs(eth_hdr(skb)->h_proto);
b7394d24 599 if (proto != ETH_P_IP && proto != ETH_P_IPV6)
1da177e4
LT
600 goto out;
601 if (skb->pkt_type == PACKET_OTHERHOST)
602 goto out;
603 if (skb_shared(skb))
604 goto out;
605
b7394d24
CW
606 if (proto == ETH_P_IP) {
607 if (!pskb_may_pull(skb, sizeof(struct iphdr)))
608 goto out;
609 iph = (struct iphdr *)skb->data;
610 if (iph->ihl < 5 || iph->version != 4)
611 goto out;
612 if (!pskb_may_pull(skb, iph->ihl*4))
613 goto out;
614 iph = (struct iphdr *)skb->data;
615 if (ip_fast_csum((u8 *)iph, iph->ihl) != 0)
616 goto out;
5e7d7fa5 617
b7394d24
CW
618 len = ntohs(iph->tot_len);
619 if (skb->len < len || len < iph->ihl*4)
620 goto out;
1da177e4 621
b7394d24
CW
622 /*
623 * Our transport medium may have padded the buffer out.
624 * Now We trim to the true length of the frame.
625 */
626 if (pskb_trim_rcsum(skb, len))
627 goto out;
1da177e4 628
b7394d24
CW
629 iph = (struct iphdr *)skb->data;
630 if (iph->protocol != IPPROTO_UDP)
631 goto out;
1da177e4 632
b7394d24
CW
633 len -= iph->ihl*4;
634 uh = (struct udphdr *)(((char *)iph) + iph->ihl*4);
635 ulen = ntohs(uh->len);
508e14b4 636
b7394d24
CW
637 if (ulen != len)
638 goto out;
639 if (checksum_udp(skb, uh, ulen, iph->saddr, iph->daddr))
640 goto out;
641 list_for_each_entry_safe(np, tmp, &npinfo->rx_np, rx) {
642 if (np->local_ip.ip && np->local_ip.ip != iph->daddr)
643 continue;
644 if (np->remote_ip.ip && np->remote_ip.ip != iph->saddr)
645 continue;
646 if (np->local_port && np->local_port != ntohs(uh->dest))
647 continue;
648
649 np->rx_hook(np, ntohs(uh->source),
650 (char *)(uh+1),
651 ulen - sizeof(struct udphdr));
652 hits++;
653 }
508e14b4
DB
654 }
655
656 if (!hits)
657 goto out;
1da177e4
LT
658
659 kfree_skb(skb);
660 return 1;
661
662out:
663 if (atomic_read(&trapped)) {
664 kfree_skb(skb);
665 return 1;
666 }
667
668 return 0;
669}
670
0bcc1816
SS
671void netpoll_print_options(struct netpoll *np)
672{
e6ec2693 673 np_info(np, "local port %d\n", np->local_port);
b7394d24
CW
674 if (!np->ipv6)
675 np_info(np, "local IPv4 address %pI4\n", &np->local_ip.ip);
e6ec2693
JP
676 np_info(np, "interface '%s'\n", np->dev_name);
677 np_info(np, "remote port %d\n", np->remote_port);
b7394d24
CW
678 if (!np->ipv6)
679 np_info(np, "remote IPv4 address %pI4\n", &np->remote_ip.ip);
e6ec2693 680 np_info(np, "remote ethernet address %pM\n", np->remote_mac);
0bcc1816 681}
9e34a5b5 682EXPORT_SYMBOL(netpoll_print_options);
0bcc1816 683
b7394d24
CW
684static int netpoll_parse_ip_addr(const char *str, union inet_addr *addr)
685{
686 const char *end;
687
688 if (!strchr(str, ':') &&
689 in4_pton(str, -1, (void *)addr, -1, &end) > 0) {
690 if (!*end)
691 return 0;
692 }
693 if (in6_pton(str, -1, addr->in6.s6_addr, -1, &end) > 0) {
694#if IS_ENABLED(CONFIG_IPV6)
695 if (!*end)
696 return 1;
697#else
698 return -1;
699#endif
700 }
701 return -1;
702}
703
1da177e4
LT
704int netpoll_parse_options(struct netpoll *np, char *opt)
705{
706 char *cur=opt, *delim;
b7394d24 707 int ipv6;
1da177e4 708
c68b9070 709 if (*cur != '@') {
1da177e4
LT
710 if ((delim = strchr(cur, '@')) == NULL)
711 goto parse_failed;
c68b9070 712 *delim = 0;
4b5511eb
AP
713 if (kstrtou16(cur, 10, &np->local_port))
714 goto parse_failed;
c68b9070 715 cur = delim;
1da177e4
LT
716 }
717 cur++;
1da177e4 718
c68b9070 719 if (*cur != '/') {
1da177e4
LT
720 if ((delim = strchr(cur, '/')) == NULL)
721 goto parse_failed;
c68b9070 722 *delim = 0;
b7394d24
CW
723 ipv6 = netpoll_parse_ip_addr(cur, &np->local_ip);
724 if (ipv6 < 0)
725 goto parse_failed;
726 else
727 np->ipv6 = (bool)ipv6;
c68b9070 728 cur = delim;
1da177e4
LT
729 }
730 cur++;
731
c68b9070 732 if (*cur != ',') {
1da177e4
LT
733 /* parse out dev name */
734 if ((delim = strchr(cur, ',')) == NULL)
735 goto parse_failed;
c68b9070 736 *delim = 0;
1da177e4 737 strlcpy(np->dev_name, cur, sizeof(np->dev_name));
c68b9070 738 cur = delim;
1da177e4
LT
739 }
740 cur++;
741
c68b9070 742 if (*cur != '@') {
1da177e4
LT
743 /* dst port */
744 if ((delim = strchr(cur, '@')) == NULL)
745 goto parse_failed;
c68b9070 746 *delim = 0;
5fc05f87 747 if (*cur == ' ' || *cur == '\t')
e6ec2693 748 np_info(np, "warning: whitespace is not allowed\n");
4b5511eb
AP
749 if (kstrtou16(cur, 10, &np->remote_port))
750 goto parse_failed;
c68b9070 751 cur = delim;
1da177e4
LT
752 }
753 cur++;
1da177e4
LT
754
755 /* dst ip */
756 if ((delim = strchr(cur, '/')) == NULL)
757 goto parse_failed;
c68b9070 758 *delim = 0;
b7394d24
CW
759 ipv6 = netpoll_parse_ip_addr(cur, &np->remote_ip);
760 if (ipv6 < 0)
761 goto parse_failed;
762 else if (np->ipv6 != (bool)ipv6)
763 goto parse_failed;
764 else
765 np->ipv6 = (bool)ipv6;
c68b9070 766 cur = delim + 1;
1da177e4 767
c68b9070 768 if (*cur != 0) {
1da177e4 769 /* MAC address */
4940fc88 770 if (!mac_pton(cur, np->remote_mac))
1da177e4 771 goto parse_failed;
1da177e4
LT
772 }
773
0bcc1816 774 netpoll_print_options(np);
1da177e4
LT
775
776 return 0;
777
778 parse_failed:
e6ec2693 779 np_info(np, "couldn't parse config at '%s'!\n", cur);
1da177e4
LT
780 return -1;
781}
9e34a5b5 782EXPORT_SYMBOL(netpoll_parse_options);
1da177e4 783
47be03a2 784int __netpoll_setup(struct netpoll *np, struct net_device *ndev, gfp_t gfp)
1da177e4 785{
115c1d6e 786 struct netpoll_info *npinfo;
4247e161 787 const struct net_device_ops *ops;
fbeec2e1 788 unsigned long flags;
b41848b6 789 int err;
1da177e4 790
30fdd8a0
JP
791 np->dev = ndev;
792 strlcpy(np->dev_name, ndev->name, IFNAMSIZ);
793
8fdd95ec
HX
794 if ((ndev->priv_flags & IFF_DISABLE_NETPOLL) ||
795 !ndev->netdev_ops->ndo_poll_controller) {
e6ec2693
JP
796 np_err(np, "%s doesn't support polling, aborting\n",
797 np->dev_name);
8fdd95ec
HX
798 err = -ENOTSUPP;
799 goto out;
800 }
801
802 if (!ndev->npinfo) {
47be03a2 803 npinfo = kmalloc(sizeof(*npinfo), gfp);
8fdd95ec
HX
804 if (!npinfo) {
805 err = -ENOMEM;
806 goto out;
807 }
808
809 npinfo->rx_flags = 0;
810 INIT_LIST_HEAD(&npinfo->rx_np);
811
812 spin_lock_init(&npinfo->rx_lock);
b7394d24 813 skb_queue_head_init(&npinfo->neigh_tx);
8fdd95ec
HX
814 skb_queue_head_init(&npinfo->txq);
815 INIT_DELAYED_WORK(&npinfo->tx_work, queue_process);
816
817 atomic_set(&npinfo->refcnt, 1);
818
819 ops = np->dev->netdev_ops;
820 if (ops->ndo_netpoll_setup) {
47be03a2 821 err = ops->ndo_netpoll_setup(ndev, npinfo, gfp);
8fdd95ec
HX
822 if (err)
823 goto free_npinfo;
824 }
825 } else {
826 npinfo = ndev->npinfo;
827 atomic_inc(&npinfo->refcnt);
828 }
829
830 npinfo->netpoll = np;
831
832 if (np->rx_hook) {
833 spin_lock_irqsave(&npinfo->rx_lock, flags);
834 npinfo->rx_flags |= NETPOLL_RX_ENABLED;
835 list_add_tail(&np->rx, &npinfo->rx_np);
836 spin_unlock_irqrestore(&npinfo->rx_lock, flags);
837 }
838
839 /* last thing to do is link it to the net device structure */
cf778b00 840 rcu_assign_pointer(ndev->npinfo, npinfo);
8fdd95ec
HX
841
842 return 0;
843
844free_npinfo:
845 kfree(npinfo);
846out:
847 return err;
848}
849EXPORT_SYMBOL_GPL(__netpoll_setup);
850
851int netpoll_setup(struct netpoll *np)
852{
853 struct net_device *ndev = NULL;
854 struct in_device *in_dev;
855 int err;
856
1da177e4 857 if (np->dev_name)
881d966b 858 ndev = dev_get_by_name(&init_net, np->dev_name);
1da177e4 859 if (!ndev) {
e6ec2693 860 np_err(np, "%s doesn't exist, aborting\n", np->dev_name);
b41848b6 861 return -ENODEV;
1da177e4
LT
862 }
863
49bd8fb0 864 if (netdev_master_upper_dev_get(ndev)) {
e6ec2693 865 np_err(np, "%s is a slave device, aborting\n", np->dev_name);
83fe32de
DC
866 err = -EBUSY;
867 goto put;
0c1ad04a
WC
868 }
869
1da177e4
LT
870 if (!netif_running(ndev)) {
871 unsigned long atmost, atleast;
872
e6ec2693 873 np_info(np, "device %s not up yet, forcing it\n", np->dev_name);
1da177e4 874
6756ae4b 875 rtnl_lock();
b41848b6
SH
876 err = dev_open(ndev);
877 rtnl_unlock();
878
879 if (err) {
e6ec2693 880 np_err(np, "failed to open %s\n", ndev->name);
dbaa1541 881 goto put;
1da177e4 882 }
1da177e4
LT
883
884 atleast = jiffies + HZ/10;
bff38771 885 atmost = jiffies + carrier_timeout * HZ;
1da177e4
LT
886 while (!netif_carrier_ok(ndev)) {
887 if (time_after(jiffies, atmost)) {
e6ec2693 888 np_notice(np, "timeout waiting for carrier\n");
1da177e4
LT
889 break;
890 }
1b614fb9 891 msleep(1);
1da177e4
LT
892 }
893
894 /* If carrier appears to come up instantly, we don't
895 * trust it and pause so that we don't pump all our
896 * queued console messages into the bitbucket.
897 */
898
899 if (time_before(jiffies, atleast)) {
e6ec2693 900 np_notice(np, "carrier detect appears untrustworthy, waiting 4 seconds\n");
1da177e4
LT
901 msleep(4000);
902 }
903 }
904
b7394d24
CW
905 if (!np->local_ip.ip) {
906 if (!np->ipv6) {
907 rcu_read_lock();
908 in_dev = __in_dev_get_rcu(ndev);
1da177e4 909
b7394d24
CW
910
911 if (!in_dev || !in_dev->ifa_list) {
912 rcu_read_unlock();
913 np_err(np, "no IP address for %s, aborting\n",
914 np->dev_name);
915 err = -EDESTADDRREQ;
916 goto put;
917 }
918
919 np->local_ip.ip = in_dev->ifa_list->ifa_local;
1da177e4 920 rcu_read_unlock();
b7394d24 921 np_info(np, "local IP %pI4\n", &np->local_ip.ip);
1da177e4 922 }
1da177e4
LT
923 }
924
dbaa1541
HX
925 /* fill up the skb queue */
926 refill_skbs();
927
928 rtnl_lock();
47be03a2 929 err = __netpoll_setup(np, ndev, GFP_KERNEL);
dbaa1541 930 rtnl_unlock();
53fb95d3 931
8fdd95ec
HX
932 if (err)
933 goto put;
934
1da177e4
LT
935 return 0;
936
21edbb22 937put:
1da177e4 938 dev_put(ndev);
b41848b6 939 return err;
1da177e4 940}
9e34a5b5 941EXPORT_SYMBOL(netpoll_setup);
1da177e4 942
c68b9070
DM
943static int __init netpoll_init(void)
944{
a1bcfacd
SH
945 skb_queue_head_init(&skb_pool);
946 return 0;
947}
948core_initcall(netpoll_init);
949
38e6bc18
AW
950static void rcu_cleanup_netpoll_info(struct rcu_head *rcu_head)
951{
952 struct netpoll_info *npinfo =
953 container_of(rcu_head, struct netpoll_info, rcu);
954
b7394d24 955 skb_queue_purge(&npinfo->neigh_tx);
38e6bc18
AW
956 skb_queue_purge(&npinfo->txq);
957
958 /* we can't call cancel_delayed_work_sync here, as we are in softirq */
959 cancel_delayed_work(&npinfo->tx_work);
960
961 /* clean after last, unfinished work */
962 __skb_queue_purge(&npinfo->txq);
963 /* now cancel it again */
964 cancel_delayed_work(&npinfo->tx_work);
965 kfree(npinfo);
966}
967
8fdd95ec 968void __netpoll_cleanup(struct netpoll *np)
1da177e4 969{
fbeec2e1
JM
970 struct netpoll_info *npinfo;
971 unsigned long flags;
972
8fdd95ec
HX
973 npinfo = np->dev->npinfo;
974 if (!npinfo)
dbaa1541 975 return;
93ec2c72 976
8fdd95ec
HX
977 if (!list_empty(&npinfo->rx_np)) {
978 spin_lock_irqsave(&npinfo->rx_lock, flags);
979 list_del(&np->rx);
980 if (list_empty(&npinfo->rx_np))
981 npinfo->rx_flags &= ~NETPOLL_RX_ENABLED;
982 spin_unlock_irqrestore(&npinfo->rx_lock, flags);
983 }
de85d99e 984
8fdd95ec
HX
985 if (atomic_dec_and_test(&npinfo->refcnt)) {
986 const struct net_device_ops *ops;
de85d99e 987
8fdd95ec
HX
988 ops = np->dev->netdev_ops;
989 if (ops->ndo_netpoll_cleanup)
990 ops->ndo_netpoll_cleanup(np->dev);
de85d99e 991
a9b3cd7f 992 RCU_INIT_POINTER(np->dev->npinfo, NULL);
38e6bc18
AW
993 call_rcu_bh(&npinfo->rcu, rcu_cleanup_netpoll_info);
994 }
995}
996EXPORT_SYMBOL_GPL(__netpoll_cleanup);
de85d99e 997
38e6bc18
AW
998static void rcu_cleanup_netpoll(struct rcu_head *rcu_head)
999{
1000 struct netpoll *np = container_of(rcu_head, struct netpoll, rcu);
93ec2c72 1001
38e6bc18
AW
1002 __netpoll_cleanup(np);
1003 kfree(np);
1004}
93ec2c72 1005
38e6bc18
AW
1006void __netpoll_free_rcu(struct netpoll *np)
1007{
1008 call_rcu_bh(&np->rcu, rcu_cleanup_netpoll);
8fdd95ec 1009}
38e6bc18 1010EXPORT_SYMBOL_GPL(__netpoll_free_rcu);
fbeec2e1 1011
8fdd95ec
HX
1012void netpoll_cleanup(struct netpoll *np)
1013{
1014 if (!np->dev)
1015 return;
dbaa1541 1016
8fdd95ec
HX
1017 rtnl_lock();
1018 __netpoll_cleanup(np);
1019 rtnl_unlock();
1020
1021 dev_put(np->dev);
1da177e4
LT
1022 np->dev = NULL;
1023}
9e34a5b5 1024EXPORT_SYMBOL(netpoll_cleanup);
1da177e4
LT
1025
1026int netpoll_trap(void)
1027{
1028 return atomic_read(&trapped);
1029}
9e34a5b5 1030EXPORT_SYMBOL(netpoll_trap);
1da177e4
LT
1031
1032void netpoll_set_trap(int trap)
1033{
1034 if (trap)
1035 atomic_inc(&trapped);
1036 else
1037 atomic_dec(&trapped);
1038}
1da177e4 1039EXPORT_SYMBOL(netpoll_set_trap);