2011-10-26 10:26:31 +08:00
|
|
|
/*
|
2014-05-07 07:48:38 +08:00
|
|
|
* Copyright (c) 2007-2014 Nicira, Inc.
|
2011-10-26 10:26:31 +08:00
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of version 2 of the GNU General Public
|
|
|
|
* License as published by the Free Software Foundation.
|
|
|
|
*
|
|
|
|
* This program is distributed in the hope that it will be useful, but
|
|
|
|
* WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU General Public License
|
|
|
|
* along with this program; if not, write to the Free Software
|
|
|
|
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA
|
|
|
|
* 02110-1301, USA
|
|
|
|
*/
|
|
|
|
|
|
|
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
|
|
|
|
|
|
|
#include <linux/init.h>
|
|
|
|
#include <linux/module.h>
|
|
|
|
#include <linux/if_arp.h>
|
|
|
|
#include <linux/if_vlan.h>
|
|
|
|
#include <linux/in.h>
|
|
|
|
#include <linux/ip.h>
|
|
|
|
#include <linux/jhash.h>
|
|
|
|
#include <linux/delay.h>
|
|
|
|
#include <linux/time.h>
|
|
|
|
#include <linux/etherdevice.h>
|
|
|
|
#include <linux/genetlink.h>
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/kthread.h>
|
|
|
|
#include <linux/mutex.h>
|
|
|
|
#include <linux/percpu.h>
|
|
|
|
#include <linux/rcupdate.h>
|
|
|
|
#include <linux/tcp.h>
|
|
|
|
#include <linux/udp.h>
|
|
|
|
#include <linux/ethtool.h>
|
|
|
|
#include <linux/wait.h>
|
|
|
|
#include <asm/div64.h>
|
|
|
|
#include <linux/highmem.h>
|
|
|
|
#include <linux/netfilter_bridge.h>
|
|
|
|
#include <linux/netfilter_ipv4.h>
|
|
|
|
#include <linux/inetdevice.h>
|
|
|
|
#include <linux/list.h>
|
|
|
|
#include <linux/openvswitch.h>
|
|
|
|
#include <linux/rculist.h>
|
|
|
|
#include <linux/dmi.h>
|
|
|
|
#include <net/genetlink.h>
|
2012-02-23 11:58:59 +08:00
|
|
|
#include <net/net_namespace.h>
|
|
|
|
#include <net/netns/generic.h>
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
#include "datapath.h"
|
|
|
|
#include "flow.h"
|
2014-01-22 01:31:04 +08:00
|
|
|
#include "flow_table.h"
|
2013-10-04 09:16:47 +08:00
|
|
|
#include "flow_netlink.h"
|
2011-10-26 10:26:31 +08:00
|
|
|
#include "vport-internal_dev.h"
|
2013-04-29 21:06:41 +08:00
|
|
|
#include "vport-netdev.h"
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
int ovs_net_id __read_mostly;
|
2014-11-06 22:44:27 +08:00
|
|
|
EXPORT_SYMBOL_GPL(ovs_net_id);
|
2013-04-16 04:23:03 +08:00
|
|
|
|
2014-05-07 07:44:50 +08:00
|
|
|
static struct genl_family dp_packet_genl_family;
|
|
|
|
static struct genl_family dp_flow_genl_family;
|
|
|
|
static struct genl_family dp_datapath_genl_family;
|
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
static const struct nla_policy flow_policy[];
|
|
|
|
|
2014-07-17 02:25:52 +08:00
|
|
|
static const struct genl_multicast_group ovs_dp_flow_multicast_group = {
|
|
|
|
.name = OVS_FLOW_MCGROUP,
|
2014-05-07 07:44:50 +08:00
|
|
|
};
|
|
|
|
|
2014-07-17 02:25:52 +08:00
|
|
|
static const struct genl_multicast_group ovs_dp_datapath_multicast_group = {
|
|
|
|
.name = OVS_DATAPATH_MCGROUP,
|
2014-05-07 07:44:50 +08:00
|
|
|
};
|
|
|
|
|
2014-07-17 02:25:52 +08:00
|
|
|
static const struct genl_multicast_group ovs_dp_vport_multicast_group = {
|
|
|
|
.name = OVS_VPORT_MCGROUP,
|
2014-05-07 07:44:50 +08:00
|
|
|
};
|
|
|
|
|
2014-05-06 04:13:14 +08:00
|
|
|
/* Check if need to build a reply message.
|
|
|
|
* OVS userspace sets the NLM_F_ECHO flag if it needs the reply. */
|
2014-09-18 16:31:04 +08:00
|
|
|
static bool ovs_must_notify(struct genl_family *family, struct genl_info *info,
|
|
|
|
unsigned int group)
|
2014-05-06 04:13:14 +08:00
|
|
|
{
|
|
|
|
return info->nlhdr->nlmsg_flags & NLM_F_ECHO ||
|
2014-12-23 01:56:36 +08:00
|
|
|
genl_has_listeners(family, genl_info_net(info), group);
|
2014-05-06 04:13:14 +08:00
|
|
|
}
|
|
|
|
|
2013-11-19 22:19:38 +08:00
|
|
|
static void ovs_notify(struct genl_family *family,
|
2013-11-19 22:19:39 +08:00
|
|
|
struct sk_buff *skb, struct genl_info *info)
|
2013-03-29 21:46:50 +08:00
|
|
|
{
|
2013-11-19 22:19:38 +08:00
|
|
|
genl_notify(family, skb, genl_info_net(info), info->snd_portid,
|
2013-11-19 22:19:39 +08:00
|
|
|
0, info->nlhdr, GFP_KERNEL);
|
2013-03-29 21:46:50 +08:00
|
|
|
}
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
/**
|
|
|
|
* DOC: Locking:
|
|
|
|
*
|
2013-04-16 04:23:03 +08:00
|
|
|
* All writes e.g. Writes to device state (add/remove datapath, port, set
|
|
|
|
* operations on vports, etc.), Writes to other state (flow table
|
|
|
|
* modifications, set miscellaneous datapath parameters, etc.) are protected
|
|
|
|
* by ovs_lock.
|
2011-10-26 10:26:31 +08:00
|
|
|
*
|
|
|
|
* Reads are protected by RCU.
|
|
|
|
*
|
|
|
|
* There are a few special cases (mostly stats) that have their own
|
|
|
|
* synchronization but they nest under all of above and don't interact with
|
|
|
|
* each other.
|
2013-04-16 04:23:03 +08:00
|
|
|
*
|
|
|
|
* The RTNL lock nests inside ovs_mutex.
|
2011-10-26 10:26:31 +08:00
|
|
|
*/
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
static DEFINE_MUTEX(ovs_mutex);
|
|
|
|
|
|
|
|
void ovs_lock(void)
|
|
|
|
{
|
|
|
|
mutex_lock(&ovs_mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
void ovs_unlock(void)
|
|
|
|
{
|
|
|
|
mutex_unlock(&ovs_mutex);
|
|
|
|
}
|
|
|
|
|
|
|
|
#ifdef CONFIG_LOCKDEP
|
|
|
|
int lockdep_ovsl_is_held(void)
|
|
|
|
{
|
|
|
|
if (debug_locks)
|
|
|
|
return lockdep_is_held(&ovs_mutex);
|
|
|
|
else
|
|
|
|
return 1;
|
|
|
|
}
|
2014-11-06 22:44:27 +08:00
|
|
|
EXPORT_SYMBOL_GPL(lockdep_ovsl_is_held);
|
2013-04-16 04:23:03 +08:00
|
|
|
#endif
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
static struct vport *new_vport(const struct vport_parms *);
|
2013-12-13 22:22:20 +08:00
|
|
|
static int queue_gso_packets(struct datapath *dp, struct sk_buff *,
|
2014-11-06 22:57:27 +08:00
|
|
|
const struct sw_flow_key *,
|
2011-10-26 10:26:31 +08:00
|
|
|
const struct dp_upcall_info *);
|
2013-12-13 22:22:20 +08:00
|
|
|
static int queue_userspace_packet(struct datapath *dp, struct sk_buff *,
|
2014-11-06 22:57:27 +08:00
|
|
|
const struct sw_flow_key *,
|
2011-10-26 10:26:31 +08:00
|
|
|
const struct dp_upcall_info *);
|
|
|
|
|
2014-09-09 04:14:22 +08:00
|
|
|
/* Must be called with rcu_read_lock. */
|
|
|
|
static struct datapath *get_dp_rcu(struct net *net, int dp_ifindex)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
2014-09-09 04:14:22 +08:00
|
|
|
struct net_device *dev = dev_get_by_index_rcu(net, dp_ifindex);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
if (dev) {
|
|
|
|
struct vport *vport = ovs_internal_dev_get_vport(dev);
|
|
|
|
if (vport)
|
2014-09-09 04:14:22 +08:00
|
|
|
return vport->dp;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
2014-09-09 04:14:22 +08:00
|
|
|
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* The caller must hold either ovs_mutex or rcu_read_lock to keep the
|
|
|
|
* returned dp pointer valid.
|
|
|
|
*/
|
|
|
|
static inline struct datapath *get_dp(struct net *net, int dp_ifindex)
|
|
|
|
{
|
|
|
|
struct datapath *dp;
|
|
|
|
|
|
|
|
WARN_ON_ONCE(!rcu_read_lock_held() && !lockdep_ovsl_is_held());
|
|
|
|
rcu_read_lock();
|
|
|
|
dp = get_dp_rcu(net, dp_ifindex);
|
2011-10-26 10:26:31 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
|
|
return dp;
|
|
|
|
}
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
/* Must be called with rcu_read_lock or ovs_mutex. */
|
2014-09-16 10:37:25 +08:00
|
|
|
const char *ovs_dp_name(const struct datapath *dp)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
2013-04-16 04:23:03 +08:00
|
|
|
struct vport *vport = ovs_vport_ovsl_rcu(dp, OVSP_LOCAL);
|
2015-07-21 16:44:05 +08:00
|
|
|
return ovs_vport_name(vport);
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
2014-11-06 22:58:52 +08:00
|
|
|
static int get_dpifindex(const struct datapath *dp)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
|
|
|
struct vport *local;
|
|
|
|
int ifindex;
|
|
|
|
|
|
|
|
rcu_read_lock();
|
|
|
|
|
2012-08-24 03:40:54 +08:00
|
|
|
local = ovs_vport_rcu(dp, OVSP_LOCAL);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (local)
|
2015-07-21 16:44:04 +08:00
|
|
|
ifindex = local->dev->ifindex;
|
2011-10-26 10:26:31 +08:00
|
|
|
else
|
|
|
|
ifindex = 0;
|
|
|
|
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
|
|
return ifindex;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void destroy_dp_rcu(struct rcu_head *rcu)
|
|
|
|
{
|
|
|
|
struct datapath *dp = container_of(rcu, struct datapath, rcu);
|
|
|
|
|
2014-05-07 09:41:20 +08:00
|
|
|
ovs_flow_tbl_destroy(&dp->table);
|
2011-10-26 10:26:31 +08:00
|
|
|
free_percpu(dp->stats_percpu);
|
2012-08-24 03:40:54 +08:00
|
|
|
kfree(dp->ports);
|
2011-10-26 10:26:31 +08:00
|
|
|
kfree(dp);
|
|
|
|
}
|
|
|
|
|
2012-08-24 03:40:54 +08:00
|
|
|
static struct hlist_head *vport_hash_bucket(const struct datapath *dp,
|
|
|
|
u16 port_no)
|
|
|
|
{
|
|
|
|
return &dp->ports[port_no & (DP_VPORT_HASH_BUCKETS - 1)];
|
|
|
|
}
|
|
|
|
|
2014-05-06 02:32:17 +08:00
|
|
|
/* Called with ovs_mutex or RCU read lock. */
|
2012-08-24 03:40:54 +08:00
|
|
|
struct vport *ovs_lookup_vport(const struct datapath *dp, u16 port_no)
|
|
|
|
{
|
|
|
|
struct vport *vport;
|
|
|
|
struct hlist_head *head;
|
|
|
|
|
|
|
|
head = vport_hash_bucket(dp, port_no);
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(vport, head, dp_hash_node) {
|
2012-08-24 03:40:54 +08:00
|
|
|
if (vport->port_no == port_no)
|
|
|
|
return vport;
|
|
|
|
}
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
/* Called with ovs_mutex. */
|
2011-10-26 10:26:31 +08:00
|
|
|
static struct vport *new_vport(const struct vport_parms *parms)
|
|
|
|
{
|
|
|
|
struct vport *vport;
|
|
|
|
|
|
|
|
vport = ovs_vport_add(parms);
|
|
|
|
if (!IS_ERR(vport)) {
|
|
|
|
struct datapath *dp = parms->dp;
|
2012-08-24 03:40:54 +08:00
|
|
|
struct hlist_head *head = vport_hash_bucket(dp, vport->port_no);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2012-08-24 03:40:54 +08:00
|
|
|
hlist_add_head_rcu(&vport->dp_hash_node, head);
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
return vport;
|
|
|
|
}
|
|
|
|
|
|
|
|
void ovs_dp_detach_port(struct vport *p)
|
|
|
|
{
|
2013-04-16 04:23:03 +08:00
|
|
|
ASSERT_OVSL();
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
/* First drop references to device. */
|
2012-08-24 03:40:54 +08:00
|
|
|
hlist_del_rcu(&p->dp_hash_node);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
/* Then destroy it. */
|
|
|
|
ovs_vport_del(p);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Must be called with rcu_read_lock. */
|
2014-09-16 10:28:44 +08:00
|
|
|
void ovs_dp_process_packet(struct sk_buff *skb, struct sw_flow_key *key)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
2014-09-16 10:20:31 +08:00
|
|
|
const struct vport *p = OVS_CB(skb)->input_vport;
|
2011-10-26 10:26:31 +08:00
|
|
|
struct datapath *dp = p->dp;
|
|
|
|
struct sw_flow *flow;
|
2014-10-06 20:45:32 +08:00
|
|
|
struct sw_flow_actions *sf_acts;
|
2011-10-26 10:26:31 +08:00
|
|
|
struct dp_stats_percpu *stats;
|
|
|
|
u64 *stats_counter;
|
2013-10-23 01:42:46 +08:00
|
|
|
u32 n_mask_hit;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2012-11-13 09:52:25 +08:00
|
|
|
stats = this_cpu_ptr(dp->stats_percpu);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
/* Look up flow. */
|
2014-09-16 10:28:44 +08:00
|
|
|
flow = ovs_flow_tbl_lookup_stats(&dp->table, key, &n_mask_hit);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (unlikely(!flow)) {
|
|
|
|
struct dp_upcall_info upcall;
|
2014-09-16 10:28:44 +08:00
|
|
|
int error;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2015-05-27 11:59:43 +08:00
|
|
|
memset(&upcall, 0, sizeof(upcall));
|
2011-10-26 10:26:31 +08:00
|
|
|
upcall.cmd = OVS_PACKET_CMD_MISS;
|
2014-07-18 06:14:13 +08:00
|
|
|
upcall.portid = ovs_vport_find_upcall_portid(p, skb);
|
2015-08-27 02:31:48 +08:00
|
|
|
upcall.mru = OVS_CB(skb)->mru;
|
2014-11-06 22:57:27 +08:00
|
|
|
error = ovs_dp_upcall(dp, skb, key, &upcall);
|
2014-09-03 17:43:45 +08:00
|
|
|
if (unlikely(error))
|
|
|
|
kfree_skb(skb);
|
|
|
|
else
|
|
|
|
consume_skb(skb);
|
2011-10-26 10:26:31 +08:00
|
|
|
stats_counter = &stats->n_missed;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2014-10-06 20:45:32 +08:00
|
|
|
ovs_flow_stats_update(flow, key->tp.flags, skb);
|
|
|
|
sf_acts = rcu_dereference(flow->sf_acts);
|
|
|
|
ovs_execute_actions(dp, skb, sf_acts, key);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-10-30 08:22:21 +08:00
|
|
|
stats_counter = &stats->n_hit;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
out:
|
|
|
|
/* Update datapath statistics. */
|
2014-02-15 07:10:46 +08:00
|
|
|
u64_stats_update_begin(&stats->syncp);
|
2011-10-26 10:26:31 +08:00
|
|
|
(*stats_counter)++;
|
2013-10-23 01:42:46 +08:00
|
|
|
stats->n_mask_hit += n_mask_hit;
|
2014-02-15 07:10:46 +08:00
|
|
|
u64_stats_update_end(&stats->syncp);
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
int ovs_dp_upcall(struct datapath *dp, struct sk_buff *skb,
|
2014-11-06 22:57:27 +08:00
|
|
|
const struct sw_flow_key *key,
|
2012-02-23 11:58:59 +08:00
|
|
|
const struct dp_upcall_info *upcall_info)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
|
|
|
struct dp_stats_percpu *stats;
|
|
|
|
int err;
|
|
|
|
|
2012-09-08 04:12:54 +08:00
|
|
|
if (upcall_info->portid == 0) {
|
2011-10-26 10:26:31 +08:00
|
|
|
err = -ENOTCONN;
|
|
|
|
goto err;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!skb_is_gso(skb))
|
2014-11-06 22:57:27 +08:00
|
|
|
err = queue_userspace_packet(dp, skb, key, upcall_info);
|
2011-10-26 10:26:31 +08:00
|
|
|
else
|
2014-11-06 22:57:27 +08:00
|
|
|
err = queue_gso_packets(dp, skb, key, upcall_info);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (err)
|
|
|
|
goto err;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
err:
|
2012-11-13 09:52:25 +08:00
|
|
|
stats = this_cpu_ptr(dp->stats_percpu);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-02-15 07:10:46 +08:00
|
|
|
u64_stats_update_begin(&stats->syncp);
|
2011-10-26 10:26:31 +08:00
|
|
|
stats->n_lost++;
|
2014-02-15 07:10:46 +08:00
|
|
|
u64_stats_update_end(&stats->syncp);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2013-12-13 22:22:20 +08:00
|
|
|
static int queue_gso_packets(struct datapath *dp, struct sk_buff *skb,
|
2014-11-06 22:57:27 +08:00
|
|
|
const struct sw_flow_key *key,
|
2011-10-26 10:26:31 +08:00
|
|
|
const struct dp_upcall_info *upcall_info)
|
|
|
|
{
|
2012-07-21 05:47:54 +08:00
|
|
|
unsigned short gso_type = skb_shinfo(skb)->gso_type;
|
2011-10-26 10:26:31 +08:00
|
|
|
struct sw_flow_key later_key;
|
|
|
|
struct sk_buff *segs, *nskb;
|
2014-11-06 22:57:27 +08:00
|
|
|
struct ovs_skb_cb ovs_cb;
|
2011-10-26 10:26:31 +08:00
|
|
|
int err;
|
|
|
|
|
2014-11-06 22:57:27 +08:00
|
|
|
ovs_cb = *OVS_CB(skb);
|
2013-12-13 22:22:22 +08:00
|
|
|
segs = __skb_gso_segment(skb, NETIF_F_SG, false);
|
2014-11-06 22:57:27 +08:00
|
|
|
*OVS_CB(skb) = ovs_cb;
|
2012-07-21 05:46:29 +08:00
|
|
|
if (IS_ERR(segs))
|
|
|
|
return PTR_ERR(segs);
|
2014-10-20 19:49:17 +08:00
|
|
|
if (segs == NULL)
|
|
|
|
return -EINVAL;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-11-06 22:57:27 +08:00
|
|
|
if (gso_type & SKB_GSO_UDP) {
|
|
|
|
/* The initial flow key extracted by ovs_flow_key_extract()
|
|
|
|
* in this case is for a first fragment, so we need to
|
|
|
|
* properly mark later fragments.
|
|
|
|
*/
|
|
|
|
later_key = *key;
|
|
|
|
later_key.ip.frag = OVS_FRAG_TYPE_LATER;
|
|
|
|
}
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
/* Queue all of the segments. */
|
|
|
|
skb = segs;
|
|
|
|
do {
|
2014-11-06 22:57:27 +08:00
|
|
|
*OVS_CB(skb) = ovs_cb;
|
|
|
|
if (gso_type & SKB_GSO_UDP && skb != segs)
|
|
|
|
key = &later_key;
|
|
|
|
|
|
|
|
err = queue_userspace_packet(dp, skb, key, upcall_info);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (err)
|
|
|
|
break;
|
|
|
|
|
|
|
|
} while ((skb = skb->next));
|
|
|
|
|
|
|
|
/* Free all of the segments. */
|
|
|
|
skb = segs;
|
|
|
|
do {
|
|
|
|
nskb = skb->next;
|
|
|
|
if (err)
|
|
|
|
kfree_skb(skb);
|
|
|
|
else
|
|
|
|
consume_skb(skb);
|
|
|
|
} while ((skb = nskb));
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2014-11-06 22:51:24 +08:00
|
|
|
static size_t upcall_msg_size(const struct dp_upcall_info *upcall_info,
|
2013-12-13 22:22:21 +08:00
|
|
|
unsigned int hdrlen)
|
2013-03-29 21:46:49 +08:00
|
|
|
{
|
|
|
|
size_t size = NLMSG_ALIGN(sizeof(struct ovs_header))
|
2013-12-13 22:22:21 +08:00
|
|
|
+ nla_total_size(hdrlen) /* OVS_PACKET_ATTR_PACKET */
|
2014-10-19 07:14:14 +08:00
|
|
|
+ nla_total_size(ovs_key_attr_size()); /* OVS_PACKET_ATTR_KEY */
|
2013-03-29 21:46:49 +08:00
|
|
|
|
|
|
|
/* OVS_PACKET_ATTR_USERDATA */
|
2014-11-06 22:51:24 +08:00
|
|
|
if (upcall_info->userdata)
|
|
|
|
size += NLA_ALIGN(upcall_info->userdata->nla_len);
|
|
|
|
|
|
|
|
/* OVS_PACKET_ATTR_EGRESS_TUN_KEY */
|
|
|
|
if (upcall_info->egress_tun_info)
|
|
|
|
size += nla_total_size(ovs_tun_key_attr_size());
|
2013-03-29 21:46:49 +08:00
|
|
|
|
2015-05-27 11:59:43 +08:00
|
|
|
/* OVS_PACKET_ATTR_ACTIONS */
|
|
|
|
if (upcall_info->actions_len)
|
|
|
|
size += nla_total_size(upcall_info->actions_len);
|
|
|
|
|
2015-08-27 02:31:48 +08:00
|
|
|
/* OVS_PACKET_ATTR_MRU */
|
|
|
|
if (upcall_info->mru)
|
|
|
|
size += nla_total_size(sizeof(upcall_info->mru));
|
|
|
|
|
2013-03-29 21:46:49 +08:00
|
|
|
return size;
|
|
|
|
}
|
|
|
|
|
2015-08-27 02:31:48 +08:00
|
|
|
static void pad_packet(struct datapath *dp, struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
if (!(dp->user_features & OVS_DP_F_UNALIGNED)) {
|
|
|
|
size_t plen = NLA_ALIGN(skb->len) - skb->len;
|
|
|
|
|
|
|
|
if (plen > 0)
|
|
|
|
memset(skb_put(skb, plen), 0, plen);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-12-13 22:22:20 +08:00
|
|
|
static int queue_userspace_packet(struct datapath *dp, struct sk_buff *skb,
|
2014-11-06 22:57:27 +08:00
|
|
|
const struct sw_flow_key *key,
|
2011-10-26 10:26:31 +08:00
|
|
|
const struct dp_upcall_info *upcall_info)
|
|
|
|
{
|
|
|
|
struct ovs_header *upcall;
|
|
|
|
struct sk_buff *nskb = NULL;
|
2014-09-02 20:52:28 +08:00
|
|
|
struct sk_buff *user_skb = NULL; /* to be queued to userspace */
|
2011-10-26 10:26:31 +08:00
|
|
|
struct nlattr *nla;
|
2013-11-30 20:21:32 +08:00
|
|
|
struct genl_info info = {
|
2013-12-13 22:22:20 +08:00
|
|
|
.dst_sk = ovs_dp_get_net(dp)->genl_sock,
|
2013-11-30 20:21:32 +08:00
|
|
|
.snd_portid = upcall_info->portid,
|
|
|
|
};
|
|
|
|
size_t len;
|
2013-12-13 22:22:21 +08:00
|
|
|
unsigned int hlen;
|
2013-12-13 22:22:20 +08:00
|
|
|
int err, dp_ifindex;
|
|
|
|
|
|
|
|
dp_ifindex = get_dpifindex(dp);
|
|
|
|
if (!dp_ifindex)
|
|
|
|
return -ENODEV;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2015-01-14 00:13:44 +08:00
|
|
|
if (skb_vlan_tag_present(skb)) {
|
2011-10-26 10:26:31 +08:00
|
|
|
nskb = skb_clone(skb, GFP_ATOMIC);
|
|
|
|
if (!nskb)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2014-11-19 21:04:59 +08:00
|
|
|
nskb = __vlan_hwaccel_push_inside(nskb);
|
2012-05-13 16:44:18 +08:00
|
|
|
if (!nskb)
|
2011-10-26 10:26:31 +08:00
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
skb = nskb;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (nla_attr_size(skb->len) > USHRT_MAX) {
|
|
|
|
err = -EFBIG;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
2013-12-13 22:22:21 +08:00
|
|
|
/* Complete checksum if needed */
|
|
|
|
if (skb->ip_summed == CHECKSUM_PARTIAL &&
|
|
|
|
(err = skb_checksum_help(skb)))
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
/* Older versions of OVS user space enforce alignment of the last
|
|
|
|
* Netlink attribute to NLA_ALIGNTO which would require extensive
|
|
|
|
* padding logic. Only perform zerocopy if padding is not required.
|
|
|
|
*/
|
|
|
|
if (dp->user_features & OVS_DP_F_UNALIGNED)
|
|
|
|
hlen = skb_zerocopy_headlen(skb);
|
|
|
|
else
|
|
|
|
hlen = skb->len;
|
|
|
|
|
2014-11-06 22:51:24 +08:00
|
|
|
len = upcall_msg_size(upcall_info, hlen);
|
2013-11-30 20:21:32 +08:00
|
|
|
user_skb = genlmsg_new_unicast(len, &info, GFP_ATOMIC);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (!user_skb) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
|
|
|
|
upcall = genlmsg_put(user_skb, 0, 0, &dp_packet_genl_family,
|
|
|
|
0, upcall_info->cmd);
|
|
|
|
upcall->dp_ifindex = dp_ifindex;
|
|
|
|
|
2015-01-22 08:42:48 +08:00
|
|
|
err = ovs_nla_put_key(key, key, OVS_PACKET_ATTR_KEY, false, user_skb);
|
2014-07-18 06:17:44 +08:00
|
|
|
BUG_ON(err);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
if (upcall_info->userdata)
|
2013-02-16 09:29:22 +08:00
|
|
|
__nla_put(user_skb, OVS_PACKET_ATTR_USERDATA,
|
|
|
|
nla_len(upcall_info->userdata),
|
|
|
|
nla_data(upcall_info->userdata));
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-11-06 22:51:24 +08:00
|
|
|
if (upcall_info->egress_tun_info) {
|
|
|
|
nla = nla_nest_start(user_skb, OVS_PACKET_ATTR_EGRESS_TUN_KEY);
|
|
|
|
err = ovs_nla_put_egress_tunnel_key(user_skb,
|
2015-08-31 09:09:38 +08:00
|
|
|
upcall_info->egress_tun_info,
|
|
|
|
upcall_info->egress_tun_opts);
|
2014-11-06 22:51:24 +08:00
|
|
|
BUG_ON(err);
|
|
|
|
nla_nest_end(user_skb, nla);
|
|
|
|
}
|
|
|
|
|
2015-05-27 11:59:43 +08:00
|
|
|
if (upcall_info->actions_len) {
|
|
|
|
nla = nla_nest_start(user_skb, OVS_PACKET_ATTR_ACTIONS);
|
|
|
|
err = ovs_nla_put_actions(upcall_info->actions,
|
|
|
|
upcall_info->actions_len,
|
|
|
|
user_skb);
|
|
|
|
if (!err)
|
|
|
|
nla_nest_end(user_skb, nla);
|
|
|
|
else
|
|
|
|
nla_nest_cancel(user_skb, nla);
|
|
|
|
}
|
|
|
|
|
2015-08-27 02:31:48 +08:00
|
|
|
/* Add OVS_PACKET_ATTR_MRU */
|
|
|
|
if (upcall_info->mru) {
|
|
|
|
if (nla_put_u16(user_skb, OVS_PACKET_ATTR_MRU,
|
|
|
|
upcall_info->mru)) {
|
|
|
|
err = -ENOBUFS;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
pad_packet(dp, user_skb);
|
|
|
|
}
|
|
|
|
|
2013-12-13 22:22:21 +08:00
|
|
|
/* Only reserve room for attribute header, packet data is added
|
|
|
|
* in skb_zerocopy() */
|
|
|
|
if (!(nla = nla_reserve(user_skb, OVS_PACKET_ATTR_PACKET, 0))) {
|
|
|
|
err = -ENOBUFS;
|
|
|
|
goto out;
|
|
|
|
}
|
|
|
|
nla->nla_len = nla_attr_size(skb->len);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-03-27 06:37:45 +08:00
|
|
|
err = skb_zerocopy(user_skb, skb, skb->len, hlen);
|
|
|
|
if (err)
|
|
|
|
goto out;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-01-15 00:27:49 +08:00
|
|
|
/* Pad OVS_PACKET_ATTR_PACKET if linear copy was performed */
|
2015-08-27 02:31:48 +08:00
|
|
|
pad_packet(dp, user_skb);
|
2014-01-15 00:27:49 +08:00
|
|
|
|
2013-12-13 22:22:21 +08:00
|
|
|
((struct nlmsghdr *) user_skb->data)->nlmsg_len = user_skb->len;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-12-13 22:22:21 +08:00
|
|
|
err = genlmsg_unicast(ovs_dp_get_net(dp), user_skb, upcall_info->portid);
|
2014-09-02 20:52:28 +08:00
|
|
|
user_skb = NULL;
|
2011-10-26 10:26:31 +08:00
|
|
|
out:
|
2014-03-27 06:37:45 +08:00
|
|
|
if (err)
|
|
|
|
skb_tx_error(skb);
|
2014-09-02 20:52:28 +08:00
|
|
|
kfree_skb(user_skb);
|
2011-10-26 10:26:31 +08:00
|
|
|
kfree_skb(nskb);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_packet_cmd_execute(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct ovs_header *ovs_header = info->userhdr;
|
2015-08-27 02:31:48 +08:00
|
|
|
struct net *net = sock_net(skb->sk);
|
2011-10-26 10:26:31 +08:00
|
|
|
struct nlattr **a = info->attrs;
|
|
|
|
struct sw_flow_actions *acts;
|
|
|
|
struct sk_buff *packet;
|
|
|
|
struct sw_flow *flow;
|
2014-10-06 20:45:32 +08:00
|
|
|
struct sw_flow_actions *sf_acts;
|
2011-10-26 10:26:31 +08:00
|
|
|
struct datapath *dp;
|
|
|
|
struct ethhdr *eth;
|
2014-09-16 10:20:31 +08:00
|
|
|
struct vport *input_vport;
|
2015-08-27 02:31:48 +08:00
|
|
|
u16 mru = 0;
|
2011-10-26 10:26:31 +08:00
|
|
|
int len;
|
|
|
|
int err;
|
2015-01-14 21:56:19 +08:00
|
|
|
bool log = !a[OVS_PACKET_ATTR_PROBE];
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
err = -EINVAL;
|
|
|
|
if (!a[OVS_PACKET_ATTR_PACKET] || !a[OVS_PACKET_ATTR_KEY] ||
|
2013-03-29 21:46:47 +08:00
|
|
|
!a[OVS_PACKET_ATTR_ACTIONS])
|
2011-10-26 10:26:31 +08:00
|
|
|
goto err;
|
|
|
|
|
|
|
|
len = nla_len(a[OVS_PACKET_ATTR_PACKET]);
|
|
|
|
packet = __dev_alloc_skb(NET_IP_ALIGN + len, GFP_KERNEL);
|
|
|
|
err = -ENOMEM;
|
|
|
|
if (!packet)
|
|
|
|
goto err;
|
|
|
|
skb_reserve(packet, NET_IP_ALIGN);
|
|
|
|
|
2013-03-29 21:46:48 +08:00
|
|
|
nla_memcpy(__skb_put(packet, len), a[OVS_PACKET_ATTR_PACKET], len);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
skb_reset_mac_header(packet);
|
|
|
|
eth = eth_hdr(packet);
|
|
|
|
|
|
|
|
/* Normally, setting the skb 'protocol' field would be handled by a
|
|
|
|
* call to eth_type_trans(), but it assumes there's a sending
|
|
|
|
* device, which we may not have. */
|
2015-05-05 05:34:05 +08:00
|
|
|
if (eth_proto_is_802_3(eth->h_proto))
|
2011-10-26 10:26:31 +08:00
|
|
|
packet->protocol = eth->h_proto;
|
|
|
|
else
|
|
|
|
packet->protocol = htons(ETH_P_802_2);
|
|
|
|
|
2015-08-27 02:31:48 +08:00
|
|
|
/* Set packet's mru */
|
|
|
|
if (a[OVS_PACKET_ATTR_MRU]) {
|
|
|
|
mru = nla_get_u16(a[OVS_PACKET_ATTR_MRU]);
|
|
|
|
packet->ignore_df = 1;
|
|
|
|
}
|
|
|
|
OVS_CB(packet)->mru = mru;
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
/* Build an sw_flow for sending this packet. */
|
2014-03-28 03:35:23 +08:00
|
|
|
flow = ovs_flow_alloc();
|
2011-10-26 10:26:31 +08:00
|
|
|
err = PTR_ERR(flow);
|
|
|
|
if (IS_ERR(flow))
|
|
|
|
goto err_kfree_skb;
|
|
|
|
|
2015-08-27 02:31:52 +08:00
|
|
|
err = ovs_flow_key_extract_userspace(net, a[OVS_PACKET_ATTR_KEY],
|
|
|
|
packet, &flow->key, log);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (err)
|
|
|
|
goto err_flow_free;
|
|
|
|
|
2015-08-27 02:31:48 +08:00
|
|
|
err = ovs_nla_copy_actions(net, a[OVS_PACKET_ATTR_ACTIONS],
|
2014-11-06 23:03:05 +08:00
|
|
|
&flow->key, &acts, log);
|
2013-06-18 08:50:12 +08:00
|
|
|
if (err)
|
|
|
|
goto err_flow_free;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-10-04 06:35:33 +08:00
|
|
|
rcu_assign_pointer(flow->sf_acts, acts);
|
2011-10-26 10:26:31 +08:00
|
|
|
packet->priority = flow->key.phy.priority;
|
2012-11-27 03:24:11 +08:00
|
|
|
packet->mark = flow->key.phy.skb_mark;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
rcu_read_lock();
|
2015-08-27 02:31:48 +08:00
|
|
|
dp = get_dp_rcu(net, ovs_header->dp_ifindex);
|
2011-10-26 10:26:31 +08:00
|
|
|
err = -ENODEV;
|
|
|
|
if (!dp)
|
|
|
|
goto err_unlock;
|
|
|
|
|
2014-09-16 10:20:31 +08:00
|
|
|
input_vport = ovs_vport_rcu(dp, flow->key.phy.in_port);
|
|
|
|
if (!input_vport)
|
|
|
|
input_vport = ovs_vport_rcu(dp, OVSP_LOCAL);
|
|
|
|
|
|
|
|
if (!input_vport)
|
|
|
|
goto err_unlock;
|
|
|
|
|
2015-08-27 02:31:48 +08:00
|
|
|
packet->dev = input_vport->dev;
|
2014-09-16 10:20:31 +08:00
|
|
|
OVS_CB(packet)->input_vport = input_vport;
|
2014-10-06 20:45:32 +08:00
|
|
|
sf_acts = rcu_dereference(flow->sf_acts);
|
2014-09-16 10:20:31 +08:00
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
local_bh_disable();
|
2014-10-06 20:45:32 +08:00
|
|
|
err = ovs_execute_actions(dp, packet, sf_acts, &flow->key);
|
2011-10-26 10:26:31 +08:00
|
|
|
local_bh_enable();
|
|
|
|
rcu_read_unlock();
|
|
|
|
|
2013-08-08 11:01:00 +08:00
|
|
|
ovs_flow_free(flow, false);
|
2011-10-26 10:26:31 +08:00
|
|
|
return err;
|
|
|
|
|
|
|
|
err_unlock:
|
|
|
|
rcu_read_unlock();
|
|
|
|
err_flow_free:
|
2013-08-08 11:01:00 +08:00
|
|
|
ovs_flow_free(flow, false);
|
2011-10-26 10:26:31 +08:00
|
|
|
err_kfree_skb:
|
|
|
|
kfree_skb(packet);
|
|
|
|
err:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct nla_policy packet_policy[OVS_PACKET_ATTR_MAX + 1] = {
|
2013-03-29 21:46:47 +08:00
|
|
|
[OVS_PACKET_ATTR_PACKET] = { .len = ETH_HLEN },
|
2011-10-26 10:26:31 +08:00
|
|
|
[OVS_PACKET_ATTR_KEY] = { .type = NLA_NESTED },
|
|
|
|
[OVS_PACKET_ATTR_ACTIONS] = { .type = NLA_NESTED },
|
2015-01-14 21:56:19 +08:00
|
|
|
[OVS_PACKET_ATTR_PROBE] = { .type = NLA_FLAG },
|
2015-08-27 02:31:48 +08:00
|
|
|
[OVS_PACKET_ATTR_MRU] = { .type = NLA_U16 },
|
2011-10-26 10:26:31 +08:00
|
|
|
};
|
|
|
|
|
2013-11-15 00:14:46 +08:00
|
|
|
static const struct genl_ops dp_packet_genl_ops[] = {
|
2011-10-26 10:26:31 +08:00
|
|
|
{ .cmd = OVS_PACKET_CMD_EXECUTE,
|
|
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
|
|
.policy = packet_policy,
|
|
|
|
.doit = ovs_packet_cmd_execute
|
|
|
|
}
|
|
|
|
};
|
|
|
|
|
2014-05-07 07:44:50 +08:00
|
|
|
static struct genl_family dp_packet_genl_family = {
|
|
|
|
.id = GENL_ID_GENERATE,
|
|
|
|
.hdrsize = sizeof(struct ovs_header),
|
|
|
|
.name = OVS_PACKET_FAMILY,
|
|
|
|
.version = OVS_PACKET_VERSION,
|
|
|
|
.maxattr = OVS_PACKET_ATTR_MAX,
|
|
|
|
.netnsok = true,
|
|
|
|
.parallel_ops = true,
|
|
|
|
.ops = dp_packet_genl_ops,
|
|
|
|
.n_ops = ARRAY_SIZE(dp_packet_genl_ops),
|
|
|
|
};
|
|
|
|
|
2014-11-06 22:58:52 +08:00
|
|
|
static void get_dp_stats(const struct datapath *dp, struct ovs_dp_stats *stats,
|
2013-10-23 01:42:46 +08:00
|
|
|
struct ovs_dp_megaflow_stats *mega_stats)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
2013-10-23 01:42:46 +08:00
|
|
|
memset(mega_stats, 0, sizeof(*mega_stats));
|
|
|
|
|
2013-10-04 15:14:23 +08:00
|
|
|
stats->n_flows = ovs_flow_tbl_count(&dp->table);
|
2013-10-23 01:42:46 +08:00
|
|
|
mega_stats->n_masks = ovs_flow_tbl_num_masks(&dp->table);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
stats->n_hit = stats->n_missed = stats->n_lost = 0;
|
2013-10-23 01:42:46 +08:00
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
for_each_possible_cpu(i) {
|
|
|
|
const struct dp_stats_percpu *percpu_stats;
|
|
|
|
struct dp_stats_percpu local_stats;
|
|
|
|
unsigned int start;
|
|
|
|
|
|
|
|
percpu_stats = per_cpu_ptr(dp->stats_percpu, i);
|
|
|
|
|
|
|
|
do {
|
2014-03-14 12:26:42 +08:00
|
|
|
start = u64_stats_fetch_begin_irq(&percpu_stats->syncp);
|
2011-10-26 10:26:31 +08:00
|
|
|
local_stats = *percpu_stats;
|
2014-03-14 12:26:42 +08:00
|
|
|
} while (u64_stats_fetch_retry_irq(&percpu_stats->syncp, start));
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
stats->n_hit += local_stats.n_hit;
|
|
|
|
stats->n_missed += local_stats.n_missed;
|
|
|
|
stats->n_lost += local_stats.n_lost;
|
2013-10-23 01:42:46 +08:00
|
|
|
mega_stats->n_mask_hit += local_stats.n_mask_hit;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
static bool should_fill_key(const struct sw_flow_id *sfid, uint32_t ufid_flags)
|
|
|
|
{
|
|
|
|
return ovs_identifier_is_ufid(sfid) &&
|
|
|
|
!(ufid_flags & OVS_UFID_F_OMIT_KEY);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool should_fill_mask(uint32_t ufid_flags)
|
|
|
|
{
|
|
|
|
return !(ufid_flags & OVS_UFID_F_OMIT_MASK);
|
|
|
|
}
|
|
|
|
|
|
|
|
static bool should_fill_actions(uint32_t ufid_flags)
|
2013-03-29 21:46:49 +08:00
|
|
|
{
|
2015-01-22 08:42:52 +08:00
|
|
|
return !(ufid_flags & OVS_UFID_F_OMIT_ACTIONS);
|
|
|
|
}
|
|
|
|
|
|
|
|
static size_t ovs_flow_cmd_msg_size(const struct sw_flow_actions *acts,
|
|
|
|
const struct sw_flow_id *sfid,
|
|
|
|
uint32_t ufid_flags)
|
|
|
|
{
|
|
|
|
size_t len = NLMSG_ALIGN(sizeof(struct ovs_header));
|
|
|
|
|
|
|
|
/* OVS_FLOW_ATTR_UFID */
|
|
|
|
if (sfid && ovs_identifier_is_ufid(sfid))
|
|
|
|
len += nla_total_size(sfid->ufid_len);
|
|
|
|
|
|
|
|
/* OVS_FLOW_ATTR_KEY */
|
|
|
|
if (!sfid || should_fill_key(sfid, ufid_flags))
|
|
|
|
len += nla_total_size(ovs_key_attr_size());
|
|
|
|
|
|
|
|
/* OVS_FLOW_ATTR_MASK */
|
|
|
|
if (should_fill_mask(ufid_flags))
|
|
|
|
len += nla_total_size(ovs_key_attr_size());
|
|
|
|
|
|
|
|
/* OVS_FLOW_ATTR_ACTIONS */
|
|
|
|
if (should_fill_actions(ufid_flags))
|
2015-08-27 02:31:44 +08:00
|
|
|
len += nla_total_size(acts->orig_len);
|
2015-01-22 08:42:52 +08:00
|
|
|
|
|
|
|
return len
|
2013-03-29 21:46:49 +08:00
|
|
|
+ nla_total_size(sizeof(struct ovs_flow_stats)) /* OVS_FLOW_ATTR_STATS */
|
|
|
|
+ nla_total_size(1) /* OVS_FLOW_ATTR_TCP_FLAGS */
|
2015-01-22 08:42:52 +08:00
|
|
|
+ nla_total_size(8); /* OVS_FLOW_ATTR_USED */
|
2013-03-29 21:46:49 +08:00
|
|
|
}
|
|
|
|
|
2014-09-09 04:09:37 +08:00
|
|
|
/* Called with ovs_mutex or RCU read lock. */
|
|
|
|
static int ovs_flow_cmd_fill_stats(const struct sw_flow *flow,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct ovs_flow_stats stats;
|
|
|
|
__be16 tcp_flags;
|
|
|
|
unsigned long used;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-10-30 08:22:21 +08:00
|
|
|
ovs_flow_stats_get(flow, &stats, &used, &tcp_flags);
|
2014-05-06 05:28:07 +08:00
|
|
|
|
2012-03-30 11:20:48 +08:00
|
|
|
if (used &&
|
|
|
|
nla_put_u64(skb, OVS_FLOW_ATTR_USED, ovs_flow_used_time(used)))
|
2014-09-09 04:09:37 +08:00
|
|
|
return -EMSGSIZE;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2012-03-30 11:20:48 +08:00
|
|
|
if (stats.n_packets &&
|
2013-10-30 08:22:21 +08:00
|
|
|
nla_put(skb, OVS_FLOW_ATTR_STATS, sizeof(struct ovs_flow_stats), &stats))
|
2014-09-09 04:09:37 +08:00
|
|
|
return -EMSGSIZE;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-10-30 08:22:21 +08:00
|
|
|
if ((u8)ntohs(tcp_flags) &&
|
|
|
|
nla_put_u8(skb, OVS_FLOW_ATTR_TCP_FLAGS, (u8)ntohs(tcp_flags)))
|
2014-09-09 04:09:37 +08:00
|
|
|
return -EMSGSIZE;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Called with ovs_mutex or RCU read lock. */
|
|
|
|
static int ovs_flow_cmd_fill_actions(const struct sw_flow *flow,
|
|
|
|
struct sk_buff *skb, int skb_orig_len)
|
|
|
|
{
|
|
|
|
struct nlattr *start;
|
|
|
|
int err;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
/* If OVS_FLOW_ATTR_ACTIONS doesn't fit, skip dumping the actions if
|
|
|
|
* this is the first flow to be dumped into 'skb'. This is unusual for
|
|
|
|
* Netlink but individual action lists can be longer than
|
|
|
|
* NLMSG_GOODSIZE and thus entirely undumpable if we didn't do this.
|
|
|
|
* The userspace caller can always fetch the actions separately if it
|
|
|
|
* really wants them. (Most userspace callers in fact don't care.)
|
|
|
|
*
|
|
|
|
* This can only fail for dump operations because the skb is always
|
|
|
|
* properly sized for single flows.
|
|
|
|
*/
|
2013-06-18 08:50:12 +08:00
|
|
|
start = nla_nest_start(skb, OVS_FLOW_ATTR_ACTIONS);
|
|
|
|
if (start) {
|
2013-07-31 06:39:39 +08:00
|
|
|
const struct sw_flow_actions *sf_acts;
|
|
|
|
|
2013-12-04 02:58:53 +08:00
|
|
|
sf_acts = rcu_dereference_ovsl(flow->sf_acts);
|
2013-10-04 09:16:47 +08:00
|
|
|
err = ovs_nla_put_actions(sf_acts->actions,
|
|
|
|
sf_acts->actions_len, skb);
|
2014-05-06 05:28:07 +08:00
|
|
|
|
2013-06-18 08:50:12 +08:00
|
|
|
if (!err)
|
|
|
|
nla_nest_end(skb, start);
|
|
|
|
else {
|
|
|
|
if (skb_orig_len)
|
2014-09-09 04:09:37 +08:00
|
|
|
return err;
|
2013-06-18 08:50:12 +08:00
|
|
|
|
|
|
|
nla_nest_cancel(skb, start);
|
|
|
|
}
|
2014-09-09 04:09:37 +08:00
|
|
|
} else if (skb_orig_len) {
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Called with ovs_mutex or RCU read lock. */
|
|
|
|
static int ovs_flow_cmd_fill_info(const struct sw_flow *flow, int dp_ifindex,
|
|
|
|
struct sk_buff *skb, u32 portid,
|
2015-01-22 08:42:52 +08:00
|
|
|
u32 seq, u32 flags, u8 cmd, u32 ufid_flags)
|
2014-09-09 04:09:37 +08:00
|
|
|
{
|
|
|
|
const int skb_orig_len = skb->len;
|
|
|
|
struct ovs_header *ovs_header;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
ovs_header = genlmsg_put(skb, portid, seq, &dp_flow_genl_family,
|
|
|
|
flags, cmd);
|
|
|
|
if (!ovs_header)
|
|
|
|
return -EMSGSIZE;
|
|
|
|
|
|
|
|
ovs_header->dp_ifindex = dp_ifindex;
|
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
err = ovs_nla_put_identifier(flow, skb);
|
2015-01-22 08:42:48 +08:00
|
|
|
if (err)
|
|
|
|
goto error;
|
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
if (should_fill_key(&flow->id, ufid_flags)) {
|
|
|
|
err = ovs_nla_put_masked_key(flow, skb);
|
|
|
|
if (err)
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (should_fill_mask(ufid_flags)) {
|
|
|
|
err = ovs_nla_put_mask(flow, skb);
|
|
|
|
if (err)
|
|
|
|
goto error;
|
|
|
|
}
|
2014-09-09 04:09:37 +08:00
|
|
|
|
|
|
|
err = ovs_flow_cmd_fill_stats(flow, skb);
|
|
|
|
if (err)
|
|
|
|
goto error;
|
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
if (should_fill_actions(ufid_flags)) {
|
|
|
|
err = ovs_flow_cmd_fill_actions(flow, skb, skb_orig_len);
|
|
|
|
if (err)
|
|
|
|
goto error;
|
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2015-01-17 05:09:00 +08:00
|
|
|
genlmsg_end(skb, ovs_header);
|
|
|
|
return 0;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
error:
|
|
|
|
genlmsg_cancel(skb, ovs_header);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2014-05-06 05:28:07 +08:00
|
|
|
/* May not be called with RCU read lock. */
|
|
|
|
static struct sk_buff *ovs_flow_cmd_alloc_info(const struct sw_flow_actions *acts,
|
2015-01-22 08:42:52 +08:00
|
|
|
const struct sw_flow_id *sfid,
|
2014-05-06 04:13:14 +08:00
|
|
|
struct genl_info *info,
|
2015-01-22 08:42:52 +08:00
|
|
|
bool always,
|
|
|
|
uint32_t ufid_flags)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
2014-05-06 04:13:14 +08:00
|
|
|
struct sk_buff *skb;
|
2015-01-22 08:42:52 +08:00
|
|
|
size_t len;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-09-18 16:31:04 +08:00
|
|
|
if (!always && !ovs_must_notify(&dp_flow_genl_family, info, 0))
|
2014-05-06 04:13:14 +08:00
|
|
|
return NULL;
|
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
len = ovs_flow_cmd_msg_size(acts, sfid, ufid_flags);
|
|
|
|
skb = genlmsg_new_unicast(len, info, GFP_KERNEL);
|
2014-05-06 04:13:14 +08:00
|
|
|
if (!skb)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
|
|
|
return skb;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
2014-05-06 05:28:07 +08:00
|
|
|
/* Called with ovs_mutex. */
|
|
|
|
static struct sk_buff *ovs_flow_cmd_build_info(const struct sw_flow *flow,
|
|
|
|
int dp_ifindex,
|
|
|
|
struct genl_info *info, u8 cmd,
|
2015-01-22 08:42:52 +08:00
|
|
|
bool always, u32 ufid_flags)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
int retval;
|
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
skb = ovs_flow_cmd_alloc_info(ovsl_dereference(flow->sf_acts),
|
|
|
|
&flow->id, info, always, ufid_flags);
|
2014-07-27 15:07:46 +08:00
|
|
|
if (IS_ERR_OR_NULL(skb))
|
2014-05-06 04:13:14 +08:00
|
|
|
return skb;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 05:28:07 +08:00
|
|
|
retval = ovs_flow_cmd_fill_info(flow, dp_ifindex, skb,
|
|
|
|
info->snd_portid, info->snd_seq, 0,
|
2015-01-22 08:42:52 +08:00
|
|
|
cmd, ufid_flags);
|
2011-10-26 10:26:31 +08:00
|
|
|
BUG_ON(retval < 0);
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
2014-05-06 05:53:51 +08:00
|
|
|
static int ovs_flow_cmd_new(struct sk_buff *skb, struct genl_info *info)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
2015-08-27 02:31:48 +08:00
|
|
|
struct net *net = sock_net(skb->sk);
|
2011-10-26 10:26:31 +08:00
|
|
|
struct nlattr **a = info->attrs;
|
|
|
|
struct ovs_header *ovs_header = info->userhdr;
|
2015-01-22 08:42:52 +08:00
|
|
|
struct sw_flow *flow = NULL, *new_flow;
|
2013-08-08 11:01:00 +08:00
|
|
|
struct sw_flow_mask mask;
|
2011-10-26 10:26:31 +08:00
|
|
|
struct sk_buff *reply;
|
|
|
|
struct datapath *dp;
|
2015-01-22 08:42:52 +08:00
|
|
|
struct sw_flow_key key;
|
2014-05-06 05:53:51 +08:00
|
|
|
struct sw_flow_actions *acts;
|
2013-08-08 11:01:00 +08:00
|
|
|
struct sw_flow_match match;
|
2015-01-22 08:42:52 +08:00
|
|
|
u32 ufid_flags = ovs_nla_get_ufid_flags(a[OVS_FLOW_ATTR_UFID_FLAGS]);
|
2011-10-26 10:26:31 +08:00
|
|
|
int error;
|
2014-11-06 23:03:05 +08:00
|
|
|
bool log = !a[OVS_FLOW_ATTR_PROBE];
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 06:22:25 +08:00
|
|
|
/* Must have key and actions. */
|
2011-10-26 10:26:31 +08:00
|
|
|
error = -EINVAL;
|
2014-10-06 20:08:38 +08:00
|
|
|
if (!a[OVS_FLOW_ATTR_KEY]) {
|
2014-11-06 23:03:05 +08:00
|
|
|
OVS_NLERR(log, "Flow key attr not present in new flow.");
|
2011-10-26 10:26:31 +08:00
|
|
|
goto error;
|
2014-10-06 20:08:38 +08:00
|
|
|
}
|
|
|
|
if (!a[OVS_FLOW_ATTR_ACTIONS]) {
|
2014-11-06 23:03:05 +08:00
|
|
|
OVS_NLERR(log, "Flow actions attr not present in new flow.");
|
2014-05-06 06:22:25 +08:00
|
|
|
goto error;
|
2014-10-06 20:08:38 +08:00
|
|
|
}
|
2013-08-08 11:01:00 +08:00
|
|
|
|
2014-05-06 06:22:25 +08:00
|
|
|
/* Most of the time we need to allocate a new flow, do it before
|
|
|
|
* locking.
|
|
|
|
*/
|
|
|
|
new_flow = ovs_flow_alloc();
|
|
|
|
if (IS_ERR(new_flow)) {
|
|
|
|
error = PTR_ERR(new_flow);
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Extract key. */
|
2015-01-22 08:42:52 +08:00
|
|
|
ovs_match_init(&match, &key, &mask);
|
2015-08-27 02:31:52 +08:00
|
|
|
error = ovs_nla_get_match(net, &match, a[OVS_FLOW_ATTR_KEY],
|
2014-11-06 23:03:05 +08:00
|
|
|
a[OVS_FLOW_ATTR_MASK], log);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (error)
|
2014-05-06 06:22:25 +08:00
|
|
|
goto err_kfree_flow;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
ovs_flow_mask_key(&new_flow->key, &key, &mask);
|
|
|
|
|
|
|
|
/* Extract flow identifier. */
|
|
|
|
error = ovs_nla_get_identifier(&new_flow->id, a[OVS_FLOW_ATTR_UFID],
|
|
|
|
&key, log);
|
|
|
|
if (error)
|
|
|
|
goto err_kfree_flow;
|
2013-06-18 08:50:12 +08:00
|
|
|
|
2014-05-06 06:22:25 +08:00
|
|
|
/* Validate actions. */
|
2015-08-27 02:31:48 +08:00
|
|
|
error = ovs_nla_copy_actions(net, a[OVS_FLOW_ATTR_ACTIONS],
|
|
|
|
&new_flow->key, &acts, log);
|
2014-05-06 05:53:51 +08:00
|
|
|
if (error) {
|
2014-11-06 23:03:05 +08:00
|
|
|
OVS_NLERR(log, "Flow actions may not be safe on all matching packets.");
|
2014-10-20 02:19:51 +08:00
|
|
|
goto err_kfree_flow;
|
2014-05-06 06:22:25 +08:00
|
|
|
}
|
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
reply = ovs_flow_cmd_alloc_info(acts, &new_flow->id, info, false,
|
|
|
|
ufid_flags);
|
2014-05-06 06:22:25 +08:00
|
|
|
if (IS_ERR(reply)) {
|
|
|
|
error = PTR_ERR(reply);
|
|
|
|
goto err_kfree_acts;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_lock();
|
2015-08-27 02:31:48 +08:00
|
|
|
dp = get_dp(net, ovs_header->dp_ifindex);
|
2014-05-06 06:22:25 +08:00
|
|
|
if (unlikely(!dp)) {
|
|
|
|
error = -ENODEV;
|
2013-04-16 04:23:03 +08:00
|
|
|
goto err_unlock_ovs;
|
2014-05-06 06:22:25 +08:00
|
|
|
}
|
2015-01-22 08:42:52 +08:00
|
|
|
|
2013-08-08 11:01:00 +08:00
|
|
|
/* Check if this is a duplicate flow */
|
2015-01-22 08:42:52 +08:00
|
|
|
if (ovs_identifier_is_ufid(&new_flow->id))
|
|
|
|
flow = ovs_flow_tbl_lookup_ufid(&dp->table, &new_flow->id);
|
|
|
|
if (!flow)
|
|
|
|
flow = ovs_flow_tbl_lookup(&dp->table, &key);
|
2014-05-06 06:22:25 +08:00
|
|
|
if (likely(!flow)) {
|
|
|
|
rcu_assign_pointer(new_flow->sf_acts, acts);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
/* Put flow in bucket. */
|
2014-05-06 06:22:25 +08:00
|
|
|
error = ovs_flow_tbl_insert(&dp->table, new_flow, &mask);
|
|
|
|
if (unlikely(error)) {
|
2013-10-04 15:17:42 +08:00
|
|
|
acts = NULL;
|
2014-05-06 06:22:25 +08:00
|
|
|
goto err_unlock_ovs;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (unlikely(reply)) {
|
|
|
|
error = ovs_flow_cmd_fill_info(new_flow,
|
|
|
|
ovs_header->dp_ifindex,
|
|
|
|
reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0,
|
2015-01-22 08:42:52 +08:00
|
|
|
OVS_FLOW_CMD_NEW,
|
|
|
|
ufid_flags);
|
2014-05-06 06:22:25 +08:00
|
|
|
BUG_ON(error < 0);
|
2013-10-04 15:17:42 +08:00
|
|
|
}
|
2014-05-06 06:22:25 +08:00
|
|
|
ovs_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
} else {
|
2014-05-06 05:53:51 +08:00
|
|
|
struct sw_flow_actions *old_acts;
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
/* Bail out if we're not allowed to modify an existing flow.
|
|
|
|
* We accept NLM_F_CREATE in place of the intended NLM_F_EXCL
|
|
|
|
* because Generic Netlink treats the latter as a dump
|
|
|
|
* request. We also accept NLM_F_EXCL in case that bug ever
|
|
|
|
* gets fixed.
|
|
|
|
*/
|
2014-05-06 06:22:25 +08:00
|
|
|
if (unlikely(info->nlhdr->nlmsg_flags & (NLM_F_CREATE
|
|
|
|
| NLM_F_EXCL))) {
|
|
|
|
error = -EEXIST;
|
2013-04-16 04:23:03 +08:00
|
|
|
goto err_unlock_ovs;
|
2014-05-06 06:22:25 +08:00
|
|
|
}
|
2015-01-22 08:42:52 +08:00
|
|
|
/* The flow identifier has to be the same for flow updates.
|
|
|
|
* Look for any overlapping flow.
|
|
|
|
*/
|
|
|
|
if (unlikely(!ovs_flow_cmp(flow, &match))) {
|
|
|
|
if (ovs_identifier_is_key(&flow->id))
|
|
|
|
flow = ovs_flow_tbl_lookup_exact(&dp->table,
|
|
|
|
&match);
|
|
|
|
else /* UFID matches but key is different */
|
|
|
|
flow = NULL;
|
2014-07-01 11:30:29 +08:00
|
|
|
if (!flow) {
|
|
|
|
error = -ENOENT;
|
|
|
|
goto err_unlock_ovs;
|
|
|
|
}
|
2014-05-06 06:22:25 +08:00
|
|
|
}
|
2014-05-06 05:53:51 +08:00
|
|
|
/* Update actions. */
|
|
|
|
old_acts = ovsl_dereference(flow->sf_acts);
|
|
|
|
rcu_assign_pointer(flow->sf_acts, acts);
|
|
|
|
|
2014-05-06 06:22:25 +08:00
|
|
|
if (unlikely(reply)) {
|
|
|
|
error = ovs_flow_cmd_fill_info(flow,
|
|
|
|
ovs_header->dp_ifindex,
|
|
|
|
reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0,
|
2015-01-22 08:42:52 +08:00
|
|
|
OVS_FLOW_CMD_NEW,
|
|
|
|
ufid_flags);
|
2014-05-06 06:22:25 +08:00
|
|
|
BUG_ON(error < 0);
|
|
|
|
}
|
|
|
|
ovs_unlock();
|
2014-05-06 05:53:51 +08:00
|
|
|
|
2015-07-21 16:44:03 +08:00
|
|
|
ovs_nla_free_flow_actions_rcu(old_acts);
|
2014-05-06 06:22:25 +08:00
|
|
|
ovs_flow_free(new_flow, false);
|
2014-05-06 05:53:51 +08:00
|
|
|
}
|
2014-05-06 06:22:25 +08:00
|
|
|
|
|
|
|
if (reply)
|
|
|
|
ovs_notify(&dp_flow_genl_family, reply, info);
|
2014-05-06 05:53:51 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
err_unlock_ovs:
|
|
|
|
ovs_unlock();
|
2014-05-06 06:22:25 +08:00
|
|
|
kfree_skb(reply);
|
|
|
|
err_kfree_acts:
|
2015-07-21 16:44:03 +08:00
|
|
|
ovs_nla_free_flow_actions(acts);
|
2014-05-06 06:22:25 +08:00
|
|
|
err_kfree_flow:
|
|
|
|
ovs_flow_free(new_flow, false);
|
2014-05-06 05:53:51 +08:00
|
|
|
error:
|
|
|
|
return error;
|
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-10-20 02:19:51 +08:00
|
|
|
/* Factor out action copy to avoid "Wframe-larger-than=1024" warning. */
|
2015-08-27 02:31:48 +08:00
|
|
|
static struct sw_flow_actions *get_flow_actions(struct net *net,
|
|
|
|
const struct nlattr *a,
|
2014-10-04 06:35:32 +08:00
|
|
|
const struct sw_flow_key *key,
|
2014-11-06 23:03:05 +08:00
|
|
|
const struct sw_flow_mask *mask,
|
|
|
|
bool log)
|
2014-10-04 06:35:32 +08:00
|
|
|
{
|
|
|
|
struct sw_flow_actions *acts;
|
|
|
|
struct sw_flow_key masked_key;
|
|
|
|
int error;
|
|
|
|
|
|
|
|
ovs_flow_mask_key(&masked_key, key, mask);
|
2015-08-27 02:31:48 +08:00
|
|
|
error = ovs_nla_copy_actions(net, a, &masked_key, &acts, log);
|
2014-10-04 06:35:32 +08:00
|
|
|
if (error) {
|
2014-11-06 23:03:05 +08:00
|
|
|
OVS_NLERR(log,
|
|
|
|
"Actions may not be safe on all matching packets");
|
2014-10-04 06:35:32 +08:00
|
|
|
return ERR_PTR(error);
|
|
|
|
}
|
|
|
|
|
|
|
|
return acts;
|
|
|
|
}
|
|
|
|
|
2014-05-06 05:53:51 +08:00
|
|
|
static int ovs_flow_cmd_set(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
2015-08-27 02:31:48 +08:00
|
|
|
struct net *net = sock_net(skb->sk);
|
2014-05-06 05:53:51 +08:00
|
|
|
struct nlattr **a = info->attrs;
|
|
|
|
struct ovs_header *ovs_header = info->userhdr;
|
2014-10-04 06:35:32 +08:00
|
|
|
struct sw_flow_key key;
|
2014-05-06 05:53:51 +08:00
|
|
|
struct sw_flow *flow;
|
|
|
|
struct sw_flow_mask mask;
|
|
|
|
struct sk_buff *reply = NULL;
|
|
|
|
struct datapath *dp;
|
2014-05-06 06:22:25 +08:00
|
|
|
struct sw_flow_actions *old_acts = NULL, *acts = NULL;
|
2014-05-06 05:53:51 +08:00
|
|
|
struct sw_flow_match match;
|
2015-01-22 08:42:52 +08:00
|
|
|
struct sw_flow_id sfid;
|
|
|
|
u32 ufid_flags = ovs_nla_get_ufid_flags(a[OVS_FLOW_ATTR_UFID_FLAGS]);
|
2014-05-06 05:53:51 +08:00
|
|
|
int error;
|
2014-11-06 23:03:05 +08:00
|
|
|
bool log = !a[OVS_FLOW_ATTR_PROBE];
|
2015-01-22 08:42:52 +08:00
|
|
|
bool ufid_present;
|
2014-05-06 05:53:51 +08:00
|
|
|
|
|
|
|
/* Extract key. */
|
|
|
|
error = -EINVAL;
|
2014-10-06 20:08:38 +08:00
|
|
|
if (!a[OVS_FLOW_ATTR_KEY]) {
|
2014-11-06 23:03:05 +08:00
|
|
|
OVS_NLERR(log, "Flow key attribute not present in set flow.");
|
2014-05-06 05:53:51 +08:00
|
|
|
goto error;
|
2014-10-06 20:08:38 +08:00
|
|
|
}
|
2014-05-06 05:53:51 +08:00
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
ufid_present = ovs_nla_get_ufid(&sfid, a[OVS_FLOW_ATTR_UFID], log);
|
2014-05-06 05:53:51 +08:00
|
|
|
ovs_match_init(&match, &key, &mask);
|
2015-08-27 02:31:52 +08:00
|
|
|
error = ovs_nla_get_match(net, &match, a[OVS_FLOW_ATTR_KEY],
|
2014-11-06 23:03:05 +08:00
|
|
|
a[OVS_FLOW_ATTR_MASK], log);
|
2014-05-06 05:53:51 +08:00
|
|
|
if (error)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
/* Validate actions. */
|
|
|
|
if (a[OVS_FLOW_ATTR_ACTIONS]) {
|
2015-08-27 02:31:48 +08:00
|
|
|
acts = get_flow_actions(net, a[OVS_FLOW_ATTR_ACTIONS], &key,
|
|
|
|
&mask, log);
|
2014-10-04 06:35:32 +08:00
|
|
|
if (IS_ERR(acts)) {
|
|
|
|
error = PTR_ERR(acts);
|
2014-05-06 05:53:51 +08:00
|
|
|
goto error;
|
2014-05-06 06:22:25 +08:00
|
|
|
}
|
|
|
|
|
2014-10-20 02:19:51 +08:00
|
|
|
/* Can allocate before locking if have acts. */
|
2015-01-22 08:42:52 +08:00
|
|
|
reply = ovs_flow_cmd_alloc_info(acts, &sfid, info, false,
|
|
|
|
ufid_flags);
|
2014-05-06 06:22:25 +08:00
|
|
|
if (IS_ERR(reply)) {
|
|
|
|
error = PTR_ERR(reply);
|
|
|
|
goto err_kfree_acts;
|
2014-05-06 00:59:40 +08:00
|
|
|
}
|
2014-05-06 05:53:51 +08:00
|
|
|
}
|
2014-05-06 05:28:07 +08:00
|
|
|
|
2014-05-06 05:53:51 +08:00
|
|
|
ovs_lock();
|
2015-08-27 02:31:48 +08:00
|
|
|
dp = get_dp(net, ovs_header->dp_ifindex);
|
2014-05-06 06:22:25 +08:00
|
|
|
if (unlikely(!dp)) {
|
|
|
|
error = -ENODEV;
|
2014-05-06 05:53:51 +08:00
|
|
|
goto err_unlock_ovs;
|
2014-05-06 06:22:25 +08:00
|
|
|
}
|
2014-05-06 05:53:51 +08:00
|
|
|
/* Check that the flow exists. */
|
2015-01-22 08:42:52 +08:00
|
|
|
if (ufid_present)
|
|
|
|
flow = ovs_flow_tbl_lookup_ufid(&dp->table, &sfid);
|
|
|
|
else
|
|
|
|
flow = ovs_flow_tbl_lookup_exact(&dp->table, &match);
|
2014-05-06 06:22:25 +08:00
|
|
|
if (unlikely(!flow)) {
|
|
|
|
error = -ENOENT;
|
2014-05-06 05:53:51 +08:00
|
|
|
goto err_unlock_ovs;
|
2014-05-06 06:22:25 +08:00
|
|
|
}
|
2014-07-01 11:30:29 +08:00
|
|
|
|
2014-05-06 05:53:51 +08:00
|
|
|
/* Update actions, if present. */
|
2014-05-06 06:22:25 +08:00
|
|
|
if (likely(acts)) {
|
2014-05-06 05:53:51 +08:00
|
|
|
old_acts = ovsl_dereference(flow->sf_acts);
|
|
|
|
rcu_assign_pointer(flow->sf_acts, acts);
|
2014-05-06 06:22:25 +08:00
|
|
|
|
|
|
|
if (unlikely(reply)) {
|
|
|
|
error = ovs_flow_cmd_fill_info(flow,
|
|
|
|
ovs_header->dp_ifindex,
|
|
|
|
reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0,
|
2015-01-22 08:42:52 +08:00
|
|
|
OVS_FLOW_CMD_NEW,
|
|
|
|
ufid_flags);
|
2014-05-06 06:22:25 +08:00
|
|
|
BUG_ON(error < 0);
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
/* Could not alloc without acts before locking. */
|
|
|
|
reply = ovs_flow_cmd_build_info(flow, ovs_header->dp_ifindex,
|
2015-01-22 08:42:52 +08:00
|
|
|
info, OVS_FLOW_CMD_NEW, false,
|
|
|
|
ufid_flags);
|
|
|
|
|
2014-05-06 06:22:25 +08:00
|
|
|
if (unlikely(IS_ERR(reply))) {
|
|
|
|
error = PTR_ERR(reply);
|
|
|
|
goto err_unlock_ovs;
|
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
2014-05-06 05:53:51 +08:00
|
|
|
|
|
|
|
/* Clear stats. */
|
|
|
|
if (a[OVS_FLOW_ATTR_CLEAR])
|
|
|
|
ovs_flow_stats_clear(flow);
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 06:22:25 +08:00
|
|
|
if (reply)
|
|
|
|
ovs_notify(&dp_flow_genl_family, reply, info);
|
|
|
|
if (old_acts)
|
2015-07-21 16:44:03 +08:00
|
|
|
ovs_nla_free_flow_actions_rcu(old_acts);
|
2014-05-06 04:13:14 +08:00
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
return 0;
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
err_unlock_ovs:
|
|
|
|
ovs_unlock();
|
2014-05-06 06:22:25 +08:00
|
|
|
kfree_skb(reply);
|
|
|
|
err_kfree_acts:
|
2015-07-21 16:44:03 +08:00
|
|
|
ovs_nla_free_flow_actions(acts);
|
2011-10-26 10:26:31 +08:00
|
|
|
error:
|
|
|
|
return error;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_flow_cmd_get(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct nlattr **a = info->attrs;
|
|
|
|
struct ovs_header *ovs_header = info->userhdr;
|
2015-08-27 02:31:52 +08:00
|
|
|
struct net *net = sock_net(skb->sk);
|
2011-10-26 10:26:31 +08:00
|
|
|
struct sw_flow_key key;
|
|
|
|
struct sk_buff *reply;
|
|
|
|
struct sw_flow *flow;
|
|
|
|
struct datapath *dp;
|
2013-08-08 11:01:00 +08:00
|
|
|
struct sw_flow_match match;
|
2015-01-22 08:42:52 +08:00
|
|
|
struct sw_flow_id ufid;
|
|
|
|
u32 ufid_flags = ovs_nla_get_ufid_flags(a[OVS_FLOW_ATTR_UFID_FLAGS]);
|
|
|
|
int err = 0;
|
2014-11-06 23:03:05 +08:00
|
|
|
bool log = !a[OVS_FLOW_ATTR_PROBE];
|
2015-01-22 08:42:52 +08:00
|
|
|
bool ufid_present;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
ufid_present = ovs_nla_get_ufid(&ufid, a[OVS_FLOW_ATTR_UFID], log);
|
|
|
|
if (a[OVS_FLOW_ATTR_KEY]) {
|
|
|
|
ovs_match_init(&match, &key, NULL);
|
2015-08-27 02:31:52 +08:00
|
|
|
err = ovs_nla_get_match(net, &match, a[OVS_FLOW_ATTR_KEY], NULL,
|
2015-01-22 08:42:52 +08:00
|
|
|
log);
|
|
|
|
} else if (!ufid_present) {
|
2014-11-06 23:03:05 +08:00
|
|
|
OVS_NLERR(log,
|
|
|
|
"Flow get message rejected, Key attribute missing.");
|
2015-01-22 08:42:52 +08:00
|
|
|
err = -EINVAL;
|
2013-08-08 11:01:00 +08:00
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_lock();
|
2012-02-23 11:58:59 +08:00
|
|
|
dp = get_dp(sock_net(skb->sk), ovs_header->dp_ifindex);
|
2013-04-16 04:23:03 +08:00
|
|
|
if (!dp) {
|
|
|
|
err = -ENODEV;
|
|
|
|
goto unlock;
|
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
if (ufid_present)
|
|
|
|
flow = ovs_flow_tbl_lookup_ufid(&dp->table, &ufid);
|
|
|
|
else
|
|
|
|
flow = ovs_flow_tbl_lookup_exact(&dp->table, &match);
|
2014-07-01 11:30:29 +08:00
|
|
|
if (!flow) {
|
2013-04-16 04:23:03 +08:00
|
|
|
err = -ENOENT;
|
|
|
|
goto unlock;
|
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 05:28:07 +08:00
|
|
|
reply = ovs_flow_cmd_build_info(flow, ovs_header->dp_ifindex, info,
|
2015-01-22 08:42:52 +08:00
|
|
|
OVS_FLOW_CMD_NEW, true, ufid_flags);
|
2013-04-16 04:23:03 +08:00
|
|
|
if (IS_ERR(reply)) {
|
|
|
|
err = PTR_ERR(reply);
|
|
|
|
goto unlock;
|
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
return genlmsg_reply(reply, info);
|
2013-04-16 04:23:03 +08:00
|
|
|
unlock:
|
|
|
|
ovs_unlock();
|
|
|
|
return err;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_flow_cmd_del(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct nlattr **a = info->attrs;
|
|
|
|
struct ovs_header *ovs_header = info->userhdr;
|
2015-08-27 02:31:52 +08:00
|
|
|
struct net *net = sock_net(skb->sk);
|
2011-10-26 10:26:31 +08:00
|
|
|
struct sw_flow_key key;
|
|
|
|
struct sk_buff *reply;
|
2015-01-22 08:42:52 +08:00
|
|
|
struct sw_flow *flow = NULL;
|
2011-10-26 10:26:31 +08:00
|
|
|
struct datapath *dp;
|
2013-08-08 11:01:00 +08:00
|
|
|
struct sw_flow_match match;
|
2015-01-22 08:42:52 +08:00
|
|
|
struct sw_flow_id ufid;
|
|
|
|
u32 ufid_flags = ovs_nla_get_ufid_flags(a[OVS_FLOW_ATTR_UFID_FLAGS]);
|
2011-10-26 10:26:31 +08:00
|
|
|
int err;
|
2014-11-06 23:03:05 +08:00
|
|
|
bool log = !a[OVS_FLOW_ATTR_PROBE];
|
2015-01-22 08:42:52 +08:00
|
|
|
bool ufid_present;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
ufid_present = ovs_nla_get_ufid(&ufid, a[OVS_FLOW_ATTR_UFID], log);
|
|
|
|
if (a[OVS_FLOW_ATTR_KEY]) {
|
2014-05-06 05:40:13 +08:00
|
|
|
ovs_match_init(&match, &key, NULL);
|
2015-08-27 02:31:52 +08:00
|
|
|
err = ovs_nla_get_match(net, &match, a[OVS_FLOW_ATTR_KEY],
|
|
|
|
NULL, log);
|
2014-05-06 05:40:13 +08:00
|
|
|
if (unlikely(err))
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_lock();
|
2012-02-23 11:58:59 +08:00
|
|
|
dp = get_dp(sock_net(skb->sk), ovs_header->dp_ifindex);
|
2014-05-06 05:40:13 +08:00
|
|
|
if (unlikely(!dp)) {
|
2013-04-16 04:23:03 +08:00
|
|
|
err = -ENODEV;
|
|
|
|
goto unlock;
|
|
|
|
}
|
2012-02-23 11:58:59 +08:00
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
if (unlikely(!a[OVS_FLOW_ATTR_KEY] && !ufid_present)) {
|
2013-10-04 15:14:23 +08:00
|
|
|
err = ovs_flow_tbl_flush(&dp->table);
|
2013-04-16 04:23:03 +08:00
|
|
|
goto unlock;
|
|
|
|
}
|
2013-08-08 11:01:00 +08:00
|
|
|
|
2015-01-22 08:42:52 +08:00
|
|
|
if (ufid_present)
|
|
|
|
flow = ovs_flow_tbl_lookup_ufid(&dp->table, &ufid);
|
|
|
|
else
|
|
|
|
flow = ovs_flow_tbl_lookup_exact(&dp->table, &match);
|
2014-07-01 11:30:29 +08:00
|
|
|
if (unlikely(!flow)) {
|
2013-04-16 04:23:03 +08:00
|
|
|
err = -ENOENT;
|
|
|
|
goto unlock;
|
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-10-04 15:14:23 +08:00
|
|
|
ovs_flow_tbl_remove(&dp->table, flow);
|
2014-05-06 05:40:13 +08:00
|
|
|
ovs_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 05:40:13 +08:00
|
|
|
reply = ovs_flow_cmd_alloc_info((const struct sw_flow_actions __force *) flow->sf_acts,
|
2015-01-22 08:42:52 +08:00
|
|
|
&flow->id, info, false, ufid_flags);
|
2014-05-06 05:40:13 +08:00
|
|
|
if (likely(reply)) {
|
|
|
|
if (likely(!IS_ERR(reply))) {
|
|
|
|
rcu_read_lock(); /*To keep RCU checker happy. */
|
|
|
|
err = ovs_flow_cmd_fill_info(flow, ovs_header->dp_ifindex,
|
|
|
|
reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0,
|
2015-01-22 08:42:52 +08:00
|
|
|
OVS_FLOW_CMD_DEL,
|
|
|
|
ufid_flags);
|
2014-05-06 05:40:13 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
BUG_ON(err < 0);
|
|
|
|
|
|
|
|
ovs_notify(&dp_flow_genl_family, reply, info);
|
|
|
|
} else {
|
|
|
|
netlink_set_err(sock_net(skb->sk)->genl_sock, 0, 0, PTR_ERR(reply));
|
|
|
|
}
|
2014-05-06 04:13:14 +08:00
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 05:40:13 +08:00
|
|
|
ovs_flow_free(flow, true);
|
2011-10-26 10:26:31 +08:00
|
|
|
return 0;
|
2013-04-16 04:23:03 +08:00
|
|
|
unlock:
|
|
|
|
ovs_unlock();
|
|
|
|
return err;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_flow_cmd_dump(struct sk_buff *skb, struct netlink_callback *cb)
|
|
|
|
{
|
2015-01-22 08:42:52 +08:00
|
|
|
struct nlattr *a[__OVS_FLOW_ATTR_MAX];
|
2011-10-26 10:26:31 +08:00
|
|
|
struct ovs_header *ovs_header = genlmsg_data(nlmsg_data(cb->nlh));
|
2013-10-04 15:14:23 +08:00
|
|
|
struct table_instance *ti;
|
2011-10-26 10:26:31 +08:00
|
|
|
struct datapath *dp;
|
2015-01-22 08:42:52 +08:00
|
|
|
u32 ufid_flags;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
err = genlmsg_parse(cb->nlh, &dp_flow_genl_family, a,
|
|
|
|
OVS_FLOW_ATTR_MAX, flow_policy);
|
|
|
|
if (err)
|
|
|
|
return err;
|
|
|
|
ufid_flags = ovs_nla_get_ufid_flags(a[OVS_FLOW_ATTR_UFID_FLAGS]);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-07-31 06:39:39 +08:00
|
|
|
rcu_read_lock();
|
2014-09-09 04:14:22 +08:00
|
|
|
dp = get_dp_rcu(sock_net(skb->sk), ovs_header->dp_ifindex);
|
2013-04-16 04:23:03 +08:00
|
|
|
if (!dp) {
|
2013-07-31 06:39:39 +08:00
|
|
|
rcu_read_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
return -ENODEV;
|
2013-04-16 04:23:03 +08:00
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-10-04 15:14:23 +08:00
|
|
|
ti = rcu_dereference(dp->table.ti);
|
2011-10-26 10:26:31 +08:00
|
|
|
for (;;) {
|
|
|
|
struct sw_flow *flow;
|
|
|
|
u32 bucket, obj;
|
|
|
|
|
|
|
|
bucket = cb->args[0];
|
|
|
|
obj = cb->args[1];
|
2013-10-04 15:14:23 +08:00
|
|
|
flow = ovs_flow_tbl_dump_next(ti, &bucket, &obj);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (!flow)
|
|
|
|
break;
|
|
|
|
|
2014-05-06 05:28:07 +08:00
|
|
|
if (ovs_flow_cmd_fill_info(flow, ovs_header->dp_ifindex, skb,
|
2012-09-08 04:12:54 +08:00
|
|
|
NETLINK_CB(cb->skb).portid,
|
2011-10-26 10:26:31 +08:00
|
|
|
cb->nlh->nlmsg_seq, NLM_F_MULTI,
|
2015-01-22 08:42:52 +08:00
|
|
|
OVS_FLOW_CMD_NEW, ufid_flags) < 0)
|
2011-10-26 10:26:31 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
cb->args[0] = bucket;
|
|
|
|
cb->args[1] = obj;
|
|
|
|
}
|
2013-07-31 06:39:39 +08:00
|
|
|
rcu_read_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
return skb->len;
|
|
|
|
}
|
|
|
|
|
2014-05-07 07:44:50 +08:00
|
|
|
static const struct nla_policy flow_policy[OVS_FLOW_ATTR_MAX + 1] = {
|
|
|
|
[OVS_FLOW_ATTR_KEY] = { .type = NLA_NESTED },
|
2014-11-06 23:03:05 +08:00
|
|
|
[OVS_FLOW_ATTR_MASK] = { .type = NLA_NESTED },
|
2014-05-07 07:44:50 +08:00
|
|
|
[OVS_FLOW_ATTR_ACTIONS] = { .type = NLA_NESTED },
|
|
|
|
[OVS_FLOW_ATTR_CLEAR] = { .type = NLA_FLAG },
|
2014-11-06 23:03:05 +08:00
|
|
|
[OVS_FLOW_ATTR_PROBE] = { .type = NLA_FLAG },
|
2015-01-22 08:42:52 +08:00
|
|
|
[OVS_FLOW_ATTR_UFID] = { .type = NLA_UNSPEC, .len = 1 },
|
|
|
|
[OVS_FLOW_ATTR_UFID_FLAGS] = { .type = NLA_U32 },
|
2014-05-07 07:44:50 +08:00
|
|
|
};
|
|
|
|
|
2014-07-17 02:25:52 +08:00
|
|
|
static const struct genl_ops dp_flow_genl_ops[] = {
|
2011-10-26 10:26:31 +08:00
|
|
|
{ .cmd = OVS_FLOW_CMD_NEW,
|
|
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
|
|
.policy = flow_policy,
|
2014-05-06 05:53:51 +08:00
|
|
|
.doit = ovs_flow_cmd_new
|
2011-10-26 10:26:31 +08:00
|
|
|
},
|
|
|
|
{ .cmd = OVS_FLOW_CMD_DEL,
|
|
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
|
|
.policy = flow_policy,
|
|
|
|
.doit = ovs_flow_cmd_del
|
|
|
|
},
|
|
|
|
{ .cmd = OVS_FLOW_CMD_GET,
|
|
|
|
.flags = 0, /* OK for unprivileged users. */
|
|
|
|
.policy = flow_policy,
|
|
|
|
.doit = ovs_flow_cmd_get,
|
|
|
|
.dumpit = ovs_flow_cmd_dump
|
|
|
|
},
|
|
|
|
{ .cmd = OVS_FLOW_CMD_SET,
|
|
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
|
|
.policy = flow_policy,
|
2014-05-06 05:53:51 +08:00
|
|
|
.doit = ovs_flow_cmd_set,
|
2011-10-26 10:26:31 +08:00
|
|
|
},
|
|
|
|
};
|
|
|
|
|
2014-05-07 07:44:50 +08:00
|
|
|
static struct genl_family dp_flow_genl_family = {
|
2011-10-26 10:26:31 +08:00
|
|
|
.id = GENL_ID_GENERATE,
|
|
|
|
.hdrsize = sizeof(struct ovs_header),
|
2014-05-07 07:44:50 +08:00
|
|
|
.name = OVS_FLOW_FAMILY,
|
|
|
|
.version = OVS_FLOW_VERSION,
|
|
|
|
.maxattr = OVS_FLOW_ATTR_MAX,
|
2013-04-23 15:48:48 +08:00
|
|
|
.netnsok = true,
|
|
|
|
.parallel_ops = true,
|
2014-05-07 07:44:50 +08:00
|
|
|
.ops = dp_flow_genl_ops,
|
|
|
|
.n_ops = ARRAY_SIZE(dp_flow_genl_ops),
|
|
|
|
.mcgrps = &ovs_dp_flow_multicast_group,
|
|
|
|
.n_mcgrps = 1,
|
2011-10-26 10:26:31 +08:00
|
|
|
};
|
|
|
|
|
2013-03-29 21:46:49 +08:00
|
|
|
static size_t ovs_dp_cmd_msg_size(void)
|
|
|
|
{
|
|
|
|
size_t msgsize = NLMSG_ALIGN(sizeof(struct ovs_header));
|
|
|
|
|
|
|
|
msgsize += nla_total_size(IFNAMSIZ);
|
|
|
|
msgsize += nla_total_size(sizeof(struct ovs_dp_stats));
|
2013-10-23 01:42:46 +08:00
|
|
|
msgsize += nla_total_size(sizeof(struct ovs_dp_megaflow_stats));
|
2014-01-24 02:47:35 +08:00
|
|
|
msgsize += nla_total_size(sizeof(u32)); /* OVS_DP_ATTR_USER_FEATURES */
|
2013-03-29 21:46:49 +08:00
|
|
|
|
|
|
|
return msgsize;
|
|
|
|
}
|
|
|
|
|
2014-11-12 07:55:16 +08:00
|
|
|
/* Called with ovs_mutex. */
|
2011-10-26 10:26:31 +08:00
|
|
|
static int ovs_dp_cmd_fill_info(struct datapath *dp, struct sk_buff *skb,
|
2012-09-08 04:12:54 +08:00
|
|
|
u32 portid, u32 seq, u32 flags, u8 cmd)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
|
|
|
struct ovs_header *ovs_header;
|
|
|
|
struct ovs_dp_stats dp_stats;
|
2013-10-23 01:42:46 +08:00
|
|
|
struct ovs_dp_megaflow_stats dp_megaflow_stats;
|
2011-10-26 10:26:31 +08:00
|
|
|
int err;
|
|
|
|
|
2012-09-08 04:12:54 +08:00
|
|
|
ovs_header = genlmsg_put(skb, portid, seq, &dp_datapath_genl_family,
|
2011-10-26 10:26:31 +08:00
|
|
|
flags, cmd);
|
|
|
|
if (!ovs_header)
|
|
|
|
goto error;
|
|
|
|
|
|
|
|
ovs_header->dp_ifindex = get_dpifindex(dp);
|
|
|
|
|
|
|
|
err = nla_put_string(skb, OVS_DP_ATTR_NAME, ovs_dp_name(dp));
|
|
|
|
if (err)
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2013-10-23 01:42:46 +08:00
|
|
|
get_dp_stats(dp, &dp_stats, &dp_megaflow_stats);
|
|
|
|
if (nla_put(skb, OVS_DP_ATTR_STATS, sizeof(struct ovs_dp_stats),
|
|
|
|
&dp_stats))
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
|
|
|
if (nla_put(skb, OVS_DP_ATTR_MEGAFLOW_STATS,
|
|
|
|
sizeof(struct ovs_dp_megaflow_stats),
|
|
|
|
&dp_megaflow_stats))
|
2012-03-30 11:20:48 +08:00
|
|
|
goto nla_put_failure;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-12-13 22:22:18 +08:00
|
|
|
if (nla_put_u32(skb, OVS_DP_ATTR_USER_FEATURES, dp->user_features))
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2015-01-17 05:09:00 +08:00
|
|
|
genlmsg_end(skb, ovs_header);
|
|
|
|
return 0;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
genlmsg_cancel(skb, ovs_header);
|
|
|
|
error:
|
|
|
|
return -EMSGSIZE;
|
|
|
|
}
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
static struct sk_buff *ovs_dp_cmd_alloc_info(struct genl_info *info)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
2014-05-06 05:13:32 +08:00
|
|
|
return genlmsg_new_unicast(ovs_dp_cmd_msg_size(), info, GFP_KERNEL);
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
2014-05-06 02:32:17 +08:00
|
|
|
/* Called with rcu_read_lock or ovs_mutex. */
|
2012-02-23 11:58:59 +08:00
|
|
|
static struct datapath *lookup_datapath(struct net *net,
|
2014-11-06 22:58:52 +08:00
|
|
|
const struct ovs_header *ovs_header,
|
2011-10-26 10:26:31 +08:00
|
|
|
struct nlattr *a[OVS_DP_ATTR_MAX + 1])
|
|
|
|
{
|
|
|
|
struct datapath *dp;
|
|
|
|
|
|
|
|
if (!a[OVS_DP_ATTR_NAME])
|
2012-02-23 11:58:59 +08:00
|
|
|
dp = get_dp(net, ovs_header->dp_ifindex);
|
2011-10-26 10:26:31 +08:00
|
|
|
else {
|
|
|
|
struct vport *vport;
|
|
|
|
|
2012-02-23 11:58:59 +08:00
|
|
|
vport = ovs_vport_locate(net, nla_data(a[OVS_DP_ATTR_NAME]));
|
2011-10-26 10:26:31 +08:00
|
|
|
dp = vport && vport->port_no == OVSP_LOCAL ? vport->dp : NULL;
|
|
|
|
}
|
|
|
|
return dp ? dp : ERR_PTR(-ENODEV);
|
|
|
|
}
|
|
|
|
|
2013-12-13 22:22:19 +08:00
|
|
|
static void ovs_dp_reset_user_features(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct datapath *dp;
|
|
|
|
|
|
|
|
dp = lookup_datapath(sock_net(skb->sk), info->userhdr, info->attrs);
|
2014-02-14 18:42:36 +08:00
|
|
|
if (IS_ERR(dp))
|
2013-12-13 22:22:19 +08:00
|
|
|
return;
|
|
|
|
|
|
|
|
WARN(dp->user_features, "Dropping previously announced user features\n");
|
|
|
|
dp->user_features = 0;
|
|
|
|
}
|
|
|
|
|
2014-11-06 22:58:52 +08:00
|
|
|
static void ovs_dp_change(struct datapath *dp, struct nlattr *a[])
|
2013-12-13 22:22:18 +08:00
|
|
|
{
|
|
|
|
if (a[OVS_DP_ATTR_USER_FEATURES])
|
|
|
|
dp->user_features = nla_get_u32(a[OVS_DP_ATTR_USER_FEATURES]);
|
|
|
|
}
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
static int ovs_dp_cmd_new(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct nlattr **a = info->attrs;
|
|
|
|
struct vport_parms parms;
|
|
|
|
struct sk_buff *reply;
|
|
|
|
struct datapath *dp;
|
|
|
|
struct vport *vport;
|
2012-02-23 11:58:59 +08:00
|
|
|
struct ovs_net *ovs_net;
|
2012-08-24 03:40:54 +08:00
|
|
|
int err, i;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
err = -EINVAL;
|
|
|
|
if (!a[OVS_DP_ATTR_NAME] || !a[OVS_DP_ATTR_UPCALL_PID])
|
|
|
|
goto err;
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
reply = ovs_dp_cmd_alloc_info(info);
|
|
|
|
if (!reply)
|
|
|
|
return -ENOMEM;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
err = -ENOMEM;
|
|
|
|
dp = kzalloc(sizeof(*dp), GFP_KERNEL);
|
|
|
|
if (dp == NULL)
|
2014-05-06 05:13:32 +08:00
|
|
|
goto err_free_reply;
|
2012-02-23 11:58:59 +08:00
|
|
|
|
2015-03-12 12:04:08 +08:00
|
|
|
ovs_dp_set_net(dp, sock_net(skb->sk));
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
/* Allocate table. */
|
2013-10-04 15:14:23 +08:00
|
|
|
err = ovs_flow_tbl_init(&dp->table);
|
|
|
|
if (err)
|
2011-10-26 10:26:31 +08:00
|
|
|
goto err_free_dp;
|
|
|
|
|
2014-02-14 03:46:28 +08:00
|
|
|
dp->stats_percpu = netdev_alloc_pcpu_stats(struct dp_stats_percpu);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (!dp->stats_percpu) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto err_destroy_table;
|
|
|
|
}
|
|
|
|
|
2012-08-24 03:40:54 +08:00
|
|
|
dp->ports = kmalloc(DP_VPORT_HASH_BUCKETS * sizeof(struct hlist_head),
|
2013-10-04 09:16:47 +08:00
|
|
|
GFP_KERNEL);
|
2012-08-24 03:40:54 +08:00
|
|
|
if (!dp->ports) {
|
|
|
|
err = -ENOMEM;
|
|
|
|
goto err_destroy_percpu;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (i = 0; i < DP_VPORT_HASH_BUCKETS; i++)
|
|
|
|
INIT_HLIST_HEAD(&dp->ports[i]);
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
/* Set up our datapath device. */
|
|
|
|
parms.name = nla_data(a[OVS_DP_ATTR_NAME]);
|
|
|
|
parms.type = OVS_VPORT_TYPE_INTERNAL;
|
|
|
|
parms.options = NULL;
|
|
|
|
parms.dp = dp;
|
|
|
|
parms.port_no = OVSP_LOCAL;
|
2014-07-18 06:14:13 +08:00
|
|
|
parms.upcall_portids = a[OVS_DP_ATTR_UPCALL_PID];
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-12-13 22:22:18 +08:00
|
|
|
ovs_dp_change(dp, a);
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
/* So far only local changes have been made, now need the lock. */
|
|
|
|
ovs_lock();
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
vport = new_vport(&parms);
|
|
|
|
if (IS_ERR(vport)) {
|
|
|
|
err = PTR_ERR(vport);
|
|
|
|
if (err == -EBUSY)
|
|
|
|
err = -EEXIST;
|
|
|
|
|
2013-12-13 22:22:19 +08:00
|
|
|
if (err == -EEXIST) {
|
|
|
|
/* An outdated user space instance that does not understand
|
|
|
|
* the concept of user_features has attempted to create a new
|
|
|
|
* datapath and is likely to reuse it. Drop all user features.
|
|
|
|
*/
|
|
|
|
if (info->genlhdr->version < OVS_DP_VER_FEATURES)
|
|
|
|
ovs_dp_reset_user_features(skb, info);
|
|
|
|
}
|
|
|
|
|
2012-08-24 03:40:54 +08:00
|
|
|
goto err_destroy_ports_array;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
err = ovs_dp_cmd_fill_info(dp, reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0, OVS_DP_CMD_NEW);
|
|
|
|
BUG_ON(err < 0);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2012-02-23 11:58:59 +08:00
|
|
|
ovs_net = net_generic(ovs_dp_get_net(dp), ovs_net_id);
|
2013-07-31 06:42:19 +08:00
|
|
|
list_add_tail_rcu(&dp->list_node, &ovs_net->dps);
|
2013-04-16 04:23:03 +08:00
|
|
|
|
|
|
|
ovs_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-11-19 22:19:39 +08:00
|
|
|
ovs_notify(&dp_datapath_genl_family, reply, info);
|
2011-10-26 10:26:31 +08:00
|
|
|
return 0;
|
|
|
|
|
2012-08-24 03:40:54 +08:00
|
|
|
err_destroy_ports_array:
|
2014-05-06 05:13:32 +08:00
|
|
|
ovs_unlock();
|
2012-08-24 03:40:54 +08:00
|
|
|
kfree(dp->ports);
|
2011-10-26 10:26:31 +08:00
|
|
|
err_destroy_percpu:
|
|
|
|
free_percpu(dp->stats_percpu);
|
|
|
|
err_destroy_table:
|
2014-05-07 09:41:20 +08:00
|
|
|
ovs_flow_tbl_destroy(&dp->table);
|
2011-10-26 10:26:31 +08:00
|
|
|
err_free_dp:
|
|
|
|
kfree(dp);
|
2014-05-06 05:13:32 +08:00
|
|
|
err_free_reply:
|
|
|
|
kfree_skb(reply);
|
2011-10-26 10:26:31 +08:00
|
|
|
err:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
/* Called with ovs_mutex. */
|
2012-02-23 11:58:59 +08:00
|
|
|
static void __dp_destroy(struct datapath *dp)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
2012-08-24 03:40:54 +08:00
|
|
|
int i;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2012-08-24 03:40:54 +08:00
|
|
|
for (i = 0; i < DP_VPORT_HASH_BUCKETS; i++) {
|
|
|
|
struct vport *vport;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
struct hlist_node *n;
|
2012-08-24 03:40:54 +08:00
|
|
|
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_safe(vport, n, &dp->ports[i], dp_hash_node)
|
2012-08-24 03:40:54 +08:00
|
|
|
if (vport->port_no != OVSP_LOCAL)
|
|
|
|
ovs_dp_detach_port(vport);
|
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-07-31 06:42:19 +08:00
|
|
|
list_del_rcu(&dp->list_node);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
/* OVSP_LOCAL is datapath internal port. We need to make sure that
|
2014-01-22 01:31:04 +08:00
|
|
|
* all ports in datapath are destroyed first before freeing datapath.
|
2011-10-26 10:26:31 +08:00
|
|
|
*/
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_dp_detach_port(ovs_vport_ovsl(dp, OVSP_LOCAL));
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-01-22 01:31:04 +08:00
|
|
|
/* RCU destroy the flow table */
|
2011-10-26 10:26:31 +08:00
|
|
|
call_rcu(&dp->rcu, destroy_dp_rcu);
|
2012-02-23 11:58:59 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_dp_cmd_del(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct sk_buff *reply;
|
|
|
|
struct datapath *dp;
|
|
|
|
int err;
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
reply = ovs_dp_cmd_alloc_info(info);
|
|
|
|
if (!reply)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_lock();
|
2012-02-23 11:58:59 +08:00
|
|
|
dp = lookup_datapath(sock_net(skb->sk), info->userhdr, info->attrs);
|
|
|
|
err = PTR_ERR(dp);
|
|
|
|
if (IS_ERR(dp))
|
2014-05-06 05:13:32 +08:00
|
|
|
goto err_unlock_free;
|
2012-02-23 11:58:59 +08:00
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
err = ovs_dp_cmd_fill_info(dp, reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0, OVS_DP_CMD_DEL);
|
|
|
|
BUG_ON(err < 0);
|
2012-02-23 11:58:59 +08:00
|
|
|
|
|
|
|
__dp_destroy(dp);
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-11-19 22:19:39 +08:00
|
|
|
ovs_notify(&dp_datapath_genl_family, reply, info);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
return 0;
|
2014-05-06 05:13:32 +08:00
|
|
|
|
|
|
|
err_unlock_free:
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_unlock();
|
2014-05-06 05:13:32 +08:00
|
|
|
kfree_skb(reply);
|
2013-04-16 04:23:03 +08:00
|
|
|
return err;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_dp_cmd_set(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct sk_buff *reply;
|
|
|
|
struct datapath *dp;
|
|
|
|
int err;
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
reply = ovs_dp_cmd_alloc_info(info);
|
|
|
|
if (!reply)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_lock();
|
2012-02-23 11:58:59 +08:00
|
|
|
dp = lookup_datapath(sock_net(skb->sk), info->userhdr, info->attrs);
|
2013-04-16 04:23:03 +08:00
|
|
|
err = PTR_ERR(dp);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (IS_ERR(dp))
|
2014-05-06 05:13:32 +08:00
|
|
|
goto err_unlock_free;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-12-13 22:22:18 +08:00
|
|
|
ovs_dp_change(dp, info->attrs);
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
err = ovs_dp_cmd_fill_info(dp, reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0, OVS_DP_CMD_NEW);
|
|
|
|
BUG_ON(err < 0);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_unlock();
|
2013-11-19 22:19:39 +08:00
|
|
|
ovs_notify(&dp_datapath_genl_family, reply, info);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
return 0;
|
2014-05-06 05:13:32 +08:00
|
|
|
|
|
|
|
err_unlock_free:
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_unlock();
|
2014-05-06 05:13:32 +08:00
|
|
|
kfree_skb(reply);
|
2013-04-16 04:23:03 +08:00
|
|
|
return err;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_dp_cmd_get(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct sk_buff *reply;
|
|
|
|
struct datapath *dp;
|
2013-04-16 04:23:03 +08:00
|
|
|
int err;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
reply = ovs_dp_cmd_alloc_info(info);
|
|
|
|
if (!reply)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2014-11-12 07:55:16 +08:00
|
|
|
ovs_lock();
|
2012-02-23 11:58:59 +08:00
|
|
|
dp = lookup_datapath(sock_net(skb->sk), info->userhdr, info->attrs);
|
2013-04-16 04:23:03 +08:00
|
|
|
if (IS_ERR(dp)) {
|
|
|
|
err = PTR_ERR(dp);
|
2014-05-06 05:13:32 +08:00
|
|
|
goto err_unlock_free;
|
2013-04-16 04:23:03 +08:00
|
|
|
}
|
2014-05-06 05:13:32 +08:00
|
|
|
err = ovs_dp_cmd_fill_info(dp, reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0, OVS_DP_CMD_NEW);
|
|
|
|
BUG_ON(err < 0);
|
2014-11-12 07:55:16 +08:00
|
|
|
ovs_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
return genlmsg_reply(reply, info);
|
2013-04-16 04:23:03 +08:00
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
err_unlock_free:
|
2014-11-12 07:55:16 +08:00
|
|
|
ovs_unlock();
|
2014-05-06 05:13:32 +08:00
|
|
|
kfree_skb(reply);
|
2013-04-16 04:23:03 +08:00
|
|
|
return err;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_dp_cmd_dump(struct sk_buff *skb, struct netlink_callback *cb)
|
|
|
|
{
|
2012-02-23 11:58:59 +08:00
|
|
|
struct ovs_net *ovs_net = net_generic(sock_net(skb->sk), ovs_net_id);
|
2011-10-26 10:26:31 +08:00
|
|
|
struct datapath *dp;
|
|
|
|
int skip = cb->args[0];
|
|
|
|
int i = 0;
|
|
|
|
|
2014-11-12 07:55:16 +08:00
|
|
|
ovs_lock();
|
|
|
|
list_for_each_entry(dp, &ovs_net->dps, list_node) {
|
2012-01-17 21:33:39 +08:00
|
|
|
if (i >= skip &&
|
2012-09-08 04:12:54 +08:00
|
|
|
ovs_dp_cmd_fill_info(dp, skb, NETLINK_CB(cb->skb).portid,
|
2011-10-26 10:26:31 +08:00
|
|
|
cb->nlh->nlmsg_seq, NLM_F_MULTI,
|
|
|
|
OVS_DP_CMD_NEW) < 0)
|
|
|
|
break;
|
|
|
|
i++;
|
|
|
|
}
|
2014-11-12 07:55:16 +08:00
|
|
|
ovs_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
cb->args[0] = i;
|
|
|
|
|
|
|
|
return skb->len;
|
|
|
|
}
|
|
|
|
|
2014-05-07 07:44:50 +08:00
|
|
|
static const struct nla_policy datapath_policy[OVS_DP_ATTR_MAX + 1] = {
|
|
|
|
[OVS_DP_ATTR_NAME] = { .type = NLA_NUL_STRING, .len = IFNAMSIZ - 1 },
|
|
|
|
[OVS_DP_ATTR_UPCALL_PID] = { .type = NLA_U32 },
|
|
|
|
[OVS_DP_ATTR_USER_FEATURES] = { .type = NLA_U32 },
|
|
|
|
};
|
|
|
|
|
2014-07-17 02:25:52 +08:00
|
|
|
static const struct genl_ops dp_datapath_genl_ops[] = {
|
2011-10-26 10:26:31 +08:00
|
|
|
{ .cmd = OVS_DP_CMD_NEW,
|
|
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
|
|
.policy = datapath_policy,
|
|
|
|
.doit = ovs_dp_cmd_new
|
|
|
|
},
|
|
|
|
{ .cmd = OVS_DP_CMD_DEL,
|
|
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
|
|
.policy = datapath_policy,
|
|
|
|
.doit = ovs_dp_cmd_del
|
|
|
|
},
|
|
|
|
{ .cmd = OVS_DP_CMD_GET,
|
|
|
|
.flags = 0, /* OK for unprivileged users. */
|
|
|
|
.policy = datapath_policy,
|
|
|
|
.doit = ovs_dp_cmd_get,
|
|
|
|
.dumpit = ovs_dp_cmd_dump
|
|
|
|
},
|
|
|
|
{ .cmd = OVS_DP_CMD_SET,
|
|
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
|
|
.policy = datapath_policy,
|
|
|
|
.doit = ovs_dp_cmd_set,
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
2014-05-07 07:44:50 +08:00
|
|
|
static struct genl_family dp_datapath_genl_family = {
|
2011-10-26 10:26:31 +08:00
|
|
|
.id = GENL_ID_GENERATE,
|
|
|
|
.hdrsize = sizeof(struct ovs_header),
|
2014-05-07 07:44:50 +08:00
|
|
|
.name = OVS_DATAPATH_FAMILY,
|
|
|
|
.version = OVS_DATAPATH_VERSION,
|
|
|
|
.maxattr = OVS_DP_ATTR_MAX,
|
2013-04-23 15:48:48 +08:00
|
|
|
.netnsok = true,
|
|
|
|
.parallel_ops = true,
|
2014-05-07 07:44:50 +08:00
|
|
|
.ops = dp_datapath_genl_ops,
|
|
|
|
.n_ops = ARRAY_SIZE(dp_datapath_genl_ops),
|
|
|
|
.mcgrps = &ovs_dp_datapath_multicast_group,
|
|
|
|
.n_mcgrps = 1,
|
2011-10-26 10:26:31 +08:00
|
|
|
};
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
/* Called with ovs_mutex or RCU read lock. */
|
2011-10-26 10:26:31 +08:00
|
|
|
static int ovs_vport_cmd_fill_info(struct vport *vport, struct sk_buff *skb,
|
2012-09-08 04:12:54 +08:00
|
|
|
u32 portid, u32 seq, u32 flags, u8 cmd)
|
2011-10-26 10:26:31 +08:00
|
|
|
{
|
|
|
|
struct ovs_header *ovs_header;
|
|
|
|
struct ovs_vport_stats vport_stats;
|
|
|
|
int err;
|
|
|
|
|
2012-09-08 04:12:54 +08:00
|
|
|
ovs_header = genlmsg_put(skb, portid, seq, &dp_vport_genl_family,
|
2011-10-26 10:26:31 +08:00
|
|
|
flags, cmd);
|
|
|
|
if (!ovs_header)
|
|
|
|
return -EMSGSIZE;
|
|
|
|
|
|
|
|
ovs_header->dp_ifindex = get_dpifindex(vport->dp);
|
|
|
|
|
2012-03-30 11:20:48 +08:00
|
|
|
if (nla_put_u32(skb, OVS_VPORT_ATTR_PORT_NO, vport->port_no) ||
|
|
|
|
nla_put_u32(skb, OVS_VPORT_ATTR_TYPE, vport->ops->type) ||
|
2014-07-18 06:14:13 +08:00
|
|
|
nla_put_string(skb, OVS_VPORT_ATTR_NAME,
|
2015-07-21 16:44:05 +08:00
|
|
|
ovs_vport_name(vport)))
|
2012-03-30 11:20:48 +08:00
|
|
|
goto nla_put_failure;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
ovs_vport_get_stats(vport, &vport_stats);
|
2012-03-30 11:20:48 +08:00
|
|
|
if (nla_put(skb, OVS_VPORT_ATTR_STATS, sizeof(struct ovs_vport_stats),
|
|
|
|
&vport_stats))
|
|
|
|
goto nla_put_failure;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-07-18 06:14:13 +08:00
|
|
|
if (ovs_vport_get_upcall_portids(vport, skb))
|
|
|
|
goto nla_put_failure;
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
err = ovs_vport_get_options(vport, skb);
|
|
|
|
if (err == -EMSGSIZE)
|
|
|
|
goto error;
|
|
|
|
|
2015-01-17 05:09:00 +08:00
|
|
|
genlmsg_end(skb, ovs_header);
|
|
|
|
return 0;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
nla_put_failure:
|
|
|
|
err = -EMSGSIZE;
|
|
|
|
error:
|
|
|
|
genlmsg_cancel(skb, ovs_header);
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
static struct sk_buff *ovs_vport_cmd_alloc_info(void)
|
|
|
|
{
|
|
|
|
return nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_KERNEL);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Called with ovs_mutex, only via ovs_dp_notify_wq(). */
|
2012-09-08 04:12:54 +08:00
|
|
|
struct sk_buff *ovs_vport_cmd_build_info(struct vport *vport, u32 portid,
|
2011-10-26 10:26:31 +08:00
|
|
|
u32 seq, u8 cmd)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
int retval;
|
|
|
|
|
|
|
|
skb = nlmsg_new(NLMSG_DEFAULT_SIZE, GFP_ATOMIC);
|
|
|
|
if (!skb)
|
|
|
|
return ERR_PTR(-ENOMEM);
|
|
|
|
|
2012-09-08 04:12:54 +08:00
|
|
|
retval = ovs_vport_cmd_fill_info(vport, skb, portid, seq, 0, cmd);
|
2013-03-27 06:48:38 +08:00
|
|
|
BUG_ON(retval < 0);
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
/* Called with ovs_mutex or RCU read lock. */
|
2012-02-23 11:58:59 +08:00
|
|
|
static struct vport *lookup_vport(struct net *net,
|
2014-11-06 22:58:52 +08:00
|
|
|
const struct ovs_header *ovs_header,
|
2011-10-26 10:26:31 +08:00
|
|
|
struct nlattr *a[OVS_VPORT_ATTR_MAX + 1])
|
|
|
|
{
|
|
|
|
struct datapath *dp;
|
|
|
|
struct vport *vport;
|
|
|
|
|
|
|
|
if (a[OVS_VPORT_ATTR_NAME]) {
|
2012-02-23 11:58:59 +08:00
|
|
|
vport = ovs_vport_locate(net, nla_data(a[OVS_VPORT_ATTR_NAME]));
|
2011-10-26 10:26:31 +08:00
|
|
|
if (!vport)
|
|
|
|
return ERR_PTR(-ENODEV);
|
2012-03-07 07:04:04 +08:00
|
|
|
if (ovs_header->dp_ifindex &&
|
|
|
|
ovs_header->dp_ifindex != get_dpifindex(vport->dp))
|
|
|
|
return ERR_PTR(-ENODEV);
|
2011-10-26 10:26:31 +08:00
|
|
|
return vport;
|
|
|
|
} else if (a[OVS_VPORT_ATTR_PORT_NO]) {
|
|
|
|
u32 port_no = nla_get_u32(a[OVS_VPORT_ATTR_PORT_NO]);
|
|
|
|
|
|
|
|
if (port_no >= DP_MAX_PORTS)
|
|
|
|
return ERR_PTR(-EFBIG);
|
|
|
|
|
2012-02-23 11:58:59 +08:00
|
|
|
dp = get_dp(net, ovs_header->dp_ifindex);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (!dp)
|
|
|
|
return ERR_PTR(-ENODEV);
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
vport = ovs_vport_ovsl_rcu(dp, port_no);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (!vport)
|
2013-01-10 06:27:35 +08:00
|
|
|
return ERR_PTR(-ENODEV);
|
2011-10-26 10:26:31 +08:00
|
|
|
return vport;
|
|
|
|
} else
|
|
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_vport_cmd_new(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct nlattr **a = info->attrs;
|
|
|
|
struct ovs_header *ovs_header = info->userhdr;
|
|
|
|
struct vport_parms parms;
|
|
|
|
struct sk_buff *reply;
|
|
|
|
struct vport *vport;
|
|
|
|
struct datapath *dp;
|
|
|
|
u32 port_no;
|
|
|
|
int err;
|
|
|
|
|
|
|
|
if (!a[OVS_VPORT_ATTR_NAME] || !a[OVS_VPORT_ATTR_TYPE] ||
|
|
|
|
!a[OVS_VPORT_ATTR_UPCALL_PID])
|
2014-05-06 05:13:32 +08:00
|
|
|
return -EINVAL;
|
|
|
|
|
|
|
|
port_no = a[OVS_VPORT_ATTR_PORT_NO]
|
|
|
|
? nla_get_u32(a[OVS_VPORT_ATTR_PORT_NO]) : 0;
|
|
|
|
if (port_no >= DP_MAX_PORTS)
|
|
|
|
return -EFBIG;
|
|
|
|
|
|
|
|
reply = ovs_vport_cmd_alloc_info();
|
|
|
|
if (!reply)
|
|
|
|
return -ENOMEM;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_lock();
|
2014-10-22 23:29:06 +08:00
|
|
|
restart:
|
2012-02-23 11:58:59 +08:00
|
|
|
dp = get_dp(sock_net(skb->sk), ovs_header->dp_ifindex);
|
2011-10-26 10:26:31 +08:00
|
|
|
err = -ENODEV;
|
|
|
|
if (!dp)
|
2014-05-06 05:13:32 +08:00
|
|
|
goto exit_unlock_free;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
if (port_no) {
|
2013-04-16 04:23:03 +08:00
|
|
|
vport = ovs_vport_ovsl(dp, port_no);
|
2011-10-26 10:26:31 +08:00
|
|
|
err = -EBUSY;
|
|
|
|
if (vport)
|
2014-05-06 05:13:32 +08:00
|
|
|
goto exit_unlock_free;
|
2011-10-26 10:26:31 +08:00
|
|
|
} else {
|
|
|
|
for (port_no = 1; ; port_no++) {
|
|
|
|
if (port_no >= DP_MAX_PORTS) {
|
|
|
|
err = -EFBIG;
|
2014-05-06 05:13:32 +08:00
|
|
|
goto exit_unlock_free;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
2013-04-16 04:23:03 +08:00
|
|
|
vport = ovs_vport_ovsl(dp, port_no);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (!vport)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
parms.name = nla_data(a[OVS_VPORT_ATTR_NAME]);
|
|
|
|
parms.type = nla_get_u32(a[OVS_VPORT_ATTR_TYPE]);
|
|
|
|
parms.options = a[OVS_VPORT_ATTR_OPTIONS];
|
|
|
|
parms.dp = dp;
|
|
|
|
parms.port_no = port_no;
|
2014-07-18 06:14:13 +08:00
|
|
|
parms.upcall_portids = a[OVS_VPORT_ATTR_UPCALL_PID];
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
vport = new_vport(&parms);
|
|
|
|
err = PTR_ERR(vport);
|
2014-10-22 23:29:06 +08:00
|
|
|
if (IS_ERR(vport)) {
|
|
|
|
if (err == -EAGAIN)
|
|
|
|
goto restart;
|
2014-05-06 05:13:32 +08:00
|
|
|
goto exit_unlock_free;
|
2014-10-22 23:29:06 +08:00
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
err = ovs_vport_cmd_fill_info(vport, reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0, OVS_VPORT_CMD_NEW);
|
|
|
|
BUG_ON(err < 0);
|
|
|
|
ovs_unlock();
|
2013-03-29 21:46:50 +08:00
|
|
|
|
2013-11-19 22:19:39 +08:00
|
|
|
ovs_notify(&dp_vport_genl_family, reply, info);
|
2014-05-06 05:13:32 +08:00
|
|
|
return 0;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
exit_unlock_free:
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_unlock();
|
2014-05-06 05:13:32 +08:00
|
|
|
kfree_skb(reply);
|
2011-10-26 10:26:31 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_vport_cmd_set(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct nlattr **a = info->attrs;
|
|
|
|
struct sk_buff *reply;
|
|
|
|
struct vport *vport;
|
|
|
|
int err;
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
reply = ovs_vport_cmd_alloc_info();
|
|
|
|
if (!reply)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_lock();
|
2012-02-23 11:58:59 +08:00
|
|
|
vport = lookup_vport(sock_net(skb->sk), info->userhdr, a);
|
2011-10-26 10:26:31 +08:00
|
|
|
err = PTR_ERR(vport);
|
|
|
|
if (IS_ERR(vport))
|
2014-05-06 05:13:32 +08:00
|
|
|
goto exit_unlock_free;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
if (a[OVS_VPORT_ATTR_TYPE] &&
|
2013-05-13 23:15:26 +08:00
|
|
|
nla_get_u32(a[OVS_VPORT_ATTR_TYPE]) != vport->ops->type) {
|
2011-10-26 10:26:31 +08:00
|
|
|
err = -EINVAL;
|
2014-05-06 05:13:32 +08:00
|
|
|
goto exit_unlock_free;
|
2013-03-27 06:48:38 +08:00
|
|
|
}
|
|
|
|
|
2013-05-13 23:15:26 +08:00
|
|
|
if (a[OVS_VPORT_ATTR_OPTIONS]) {
|
2011-10-26 10:26:31 +08:00
|
|
|
err = ovs_vport_set_options(vport, a[OVS_VPORT_ATTR_OPTIONS]);
|
2013-05-13 23:15:26 +08:00
|
|
|
if (err)
|
2014-05-06 05:13:32 +08:00
|
|
|
goto exit_unlock_free;
|
2013-05-13 23:15:26 +08:00
|
|
|
}
|
2013-03-27 06:48:38 +08:00
|
|
|
|
2014-07-18 06:14:13 +08:00
|
|
|
|
|
|
|
if (a[OVS_VPORT_ATTR_UPCALL_PID]) {
|
|
|
|
struct nlattr *ids = a[OVS_VPORT_ATTR_UPCALL_PID];
|
|
|
|
|
|
|
|
err = ovs_vport_set_upcall_portids(vport, ids);
|
|
|
|
if (err)
|
|
|
|
goto exit_unlock_free;
|
|
|
|
}
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-03-27 06:48:38 +08:00
|
|
|
err = ovs_vport_cmd_fill_info(vport, reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0, OVS_VPORT_CMD_NEW);
|
|
|
|
BUG_ON(err < 0);
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_unlock();
|
2013-11-19 22:19:39 +08:00
|
|
|
ovs_notify(&dp_vport_genl_family, reply, info);
|
2013-04-16 04:23:03 +08:00
|
|
|
return 0;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
exit_unlock_free:
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_unlock();
|
2014-05-06 05:13:32 +08:00
|
|
|
kfree_skb(reply);
|
2011-10-26 10:26:31 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_vport_cmd_del(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct nlattr **a = info->attrs;
|
|
|
|
struct sk_buff *reply;
|
|
|
|
struct vport *vport;
|
|
|
|
int err;
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
reply = ovs_vport_cmd_alloc_info();
|
|
|
|
if (!reply)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_lock();
|
2012-02-23 11:58:59 +08:00
|
|
|
vport = lookup_vport(sock_net(skb->sk), info->userhdr, a);
|
2011-10-26 10:26:31 +08:00
|
|
|
err = PTR_ERR(vport);
|
|
|
|
if (IS_ERR(vport))
|
2014-05-06 05:13:32 +08:00
|
|
|
goto exit_unlock_free;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
if (vport->port_no == OVSP_LOCAL) {
|
|
|
|
err = -EINVAL;
|
2014-05-06 05:13:32 +08:00
|
|
|
goto exit_unlock_free;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
err = ovs_vport_cmd_fill_info(vport, reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0, OVS_VPORT_CMD_DEL);
|
|
|
|
BUG_ON(err < 0);
|
2011-10-26 10:26:31 +08:00
|
|
|
ovs_dp_detach_port(vport);
|
2014-05-06 05:13:32 +08:00
|
|
|
ovs_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2013-11-19 22:19:39 +08:00
|
|
|
ovs_notify(&dp_vport_genl_family, reply, info);
|
2014-05-06 05:13:32 +08:00
|
|
|
return 0;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
exit_unlock_free:
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_unlock();
|
2014-05-06 05:13:32 +08:00
|
|
|
kfree_skb(reply);
|
2011-10-26 10:26:31 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_vport_cmd_get(struct sk_buff *skb, struct genl_info *info)
|
|
|
|
{
|
|
|
|
struct nlattr **a = info->attrs;
|
|
|
|
struct ovs_header *ovs_header = info->userhdr;
|
|
|
|
struct sk_buff *reply;
|
|
|
|
struct vport *vport;
|
|
|
|
int err;
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
reply = ovs_vport_cmd_alloc_info();
|
|
|
|
if (!reply)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
rcu_read_lock();
|
2012-02-23 11:58:59 +08:00
|
|
|
vport = lookup_vport(sock_net(skb->sk), ovs_header, a);
|
2011-10-26 10:26:31 +08:00
|
|
|
err = PTR_ERR(vport);
|
|
|
|
if (IS_ERR(vport))
|
2014-05-06 05:13:32 +08:00
|
|
|
goto exit_unlock_free;
|
|
|
|
err = ovs_vport_cmd_fill_info(vport, reply, info->snd_portid,
|
|
|
|
info->snd_seq, 0, OVS_VPORT_CMD_NEW);
|
|
|
|
BUG_ON(err < 0);
|
2011-10-26 10:26:31 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
|
|
|
|
return genlmsg_reply(reply, info);
|
|
|
|
|
2014-05-06 05:13:32 +08:00
|
|
|
exit_unlock_free:
|
2011-10-26 10:26:31 +08:00
|
|
|
rcu_read_unlock();
|
2014-05-06 05:13:32 +08:00
|
|
|
kfree_skb(reply);
|
2011-10-26 10:26:31 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int ovs_vport_cmd_dump(struct sk_buff *skb, struct netlink_callback *cb)
|
|
|
|
{
|
|
|
|
struct ovs_header *ovs_header = genlmsg_data(nlmsg_data(cb->nlh));
|
|
|
|
struct datapath *dp;
|
2012-08-24 03:40:54 +08:00
|
|
|
int bucket = cb->args[0], skip = cb->args[1];
|
|
|
|
int i, j = 0;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2014-02-16 09:42:29 +08:00
|
|
|
rcu_read_lock();
|
2014-09-09 04:14:22 +08:00
|
|
|
dp = get_dp_rcu(sock_net(skb->sk), ovs_header->dp_ifindex);
|
2014-02-16 09:42:29 +08:00
|
|
|
if (!dp) {
|
|
|
|
rcu_read_unlock();
|
2011-10-26 10:26:31 +08:00
|
|
|
return -ENODEV;
|
2014-02-16 09:42:29 +08:00
|
|
|
}
|
2012-08-24 03:40:54 +08:00
|
|
|
for (i = bucket; i < DP_VPORT_HASH_BUCKETS; i++) {
|
2011-10-26 10:26:31 +08:00
|
|
|
struct vport *vport;
|
2012-08-24 03:40:54 +08:00
|
|
|
|
|
|
|
j = 0;
|
hlist: drop the node parameter from iterators
I'm not sure why, but the hlist for each entry iterators were conceived
list_for_each_entry(pos, head, member)
The hlist ones were greedy and wanted an extra parameter:
hlist_for_each_entry(tpos, pos, head, member)
Why did they need an extra pos parameter? I'm not quite sure. Not only
they don't really need it, it also prevents the iterator from looking
exactly like the list iterator, which is unfortunate.
Besides the semantic patch, there was some manual work required:
- Fix up the actual hlist iterators in linux/list.h
- Fix up the declaration of other iterators based on the hlist ones.
- A very small amount of places were using the 'node' parameter, this
was modified to use 'obj->member' instead.
- Coccinelle didn't handle the hlist_for_each_entry_safe iterator
properly, so those had to be fixed up manually.
The semantic patch which is mostly the work of Peter Senna Tschudin is here:
@@
iterator name hlist_for_each_entry, hlist_for_each_entry_continue, hlist_for_each_entry_from, hlist_for_each_entry_rcu, hlist_for_each_entry_rcu_bh, hlist_for_each_entry_continue_rcu_bh, for_each_busy_worker, ax25_uid_for_each, ax25_for_each, inet_bind_bucket_for_each, sctp_for_each_hentry, sk_for_each, sk_for_each_rcu, sk_for_each_from, sk_for_each_safe, sk_for_each_bound, hlist_for_each_entry_safe, hlist_for_each_entry_continue_rcu, nr_neigh_for_each, nr_neigh_for_each_safe, nr_node_for_each, nr_node_for_each_safe, for_each_gfn_indirect_valid_sp, for_each_gfn_sp, for_each_host;
type T;
expression a,c,d,e;
identifier b;
statement S;
@@
-T b;
<+... when != b
(
hlist_for_each_entry(a,
- b,
c, d) S
|
hlist_for_each_entry_continue(a,
- b,
c) S
|
hlist_for_each_entry_from(a,
- b,
c) S
|
hlist_for_each_entry_rcu(a,
- b,
c, d) S
|
hlist_for_each_entry_rcu_bh(a,
- b,
c, d) S
|
hlist_for_each_entry_continue_rcu_bh(a,
- b,
c) S
|
for_each_busy_worker(a, c,
- b,
d) S
|
ax25_uid_for_each(a,
- b,
c) S
|
ax25_for_each(a,
- b,
c) S
|
inet_bind_bucket_for_each(a,
- b,
c) S
|
sctp_for_each_hentry(a,
- b,
c) S
|
sk_for_each(a,
- b,
c) S
|
sk_for_each_rcu(a,
- b,
c) S
|
sk_for_each_from
-(a, b)
+(a)
S
+ sk_for_each_from(a) S
|
sk_for_each_safe(a,
- b,
c, d) S
|
sk_for_each_bound(a,
- b,
c) S
|
hlist_for_each_entry_safe(a,
- b,
c, d, e) S
|
hlist_for_each_entry_continue_rcu(a,
- b,
c) S
|
nr_neigh_for_each(a,
- b,
c) S
|
nr_neigh_for_each_safe(a,
- b,
c, d) S
|
nr_node_for_each(a,
- b,
c) S
|
nr_node_for_each_safe(a,
- b,
c, d) S
|
- for_each_gfn_sp(a, c, d, b) S
+ for_each_gfn_sp(a, c, d) S
|
- for_each_gfn_indirect_valid_sp(a, c, d, b) S
+ for_each_gfn_indirect_valid_sp(a, c, d) S
|
for_each_host(a,
- b,
c) S
|
for_each_host_safe(a,
- b,
c, d) S
|
for_each_mesh_entry(a,
- b,
c, d) S
)
...+>
[akpm@linux-foundation.org: drop bogus change from net/ipv4/raw.c]
[akpm@linux-foundation.org: drop bogus hunk from net/ipv6/raw.c]
[akpm@linux-foundation.org: checkpatch fixes]
[akpm@linux-foundation.org: fix warnings]
[akpm@linux-foudnation.org: redo intrusive kvm changes]
Tested-by: Peter Senna Tschudin <peter.senna@gmail.com>
Acked-by: Paul E. McKenney <paulmck@linux.vnet.ibm.com>
Signed-off-by: Sasha Levin <sasha.levin@oracle.com>
Cc: Wu Fengguang <fengguang.wu@intel.com>
Cc: Marcelo Tosatti <mtosatti@redhat.com>
Cc: Gleb Natapov <gleb@redhat.com>
Signed-off-by: Andrew Morton <akpm@linux-foundation.org>
Signed-off-by: Linus Torvalds <torvalds@linux-foundation.org>
2013-02-28 09:06:00 +08:00
|
|
|
hlist_for_each_entry_rcu(vport, &dp->ports[i], dp_hash_node) {
|
2012-08-24 03:40:54 +08:00
|
|
|
if (j >= skip &&
|
|
|
|
ovs_vport_cmd_fill_info(vport, skb,
|
2012-09-08 04:12:54 +08:00
|
|
|
NETLINK_CB(cb->skb).portid,
|
2012-08-24 03:40:54 +08:00
|
|
|
cb->nlh->nlmsg_seq,
|
|
|
|
NLM_F_MULTI,
|
|
|
|
OVS_VPORT_CMD_NEW) < 0)
|
|
|
|
goto out;
|
|
|
|
|
|
|
|
j++;
|
|
|
|
}
|
|
|
|
skip = 0;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
2012-08-24 03:40:54 +08:00
|
|
|
out:
|
2011-10-26 10:26:31 +08:00
|
|
|
rcu_read_unlock();
|
|
|
|
|
2012-08-24 03:40:54 +08:00
|
|
|
cb->args[0] = i;
|
|
|
|
cb->args[1] = j;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
2012-08-24 03:40:54 +08:00
|
|
|
return skb->len;
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
2014-05-07 07:44:50 +08:00
|
|
|
static const struct nla_policy vport_policy[OVS_VPORT_ATTR_MAX + 1] = {
|
|
|
|
[OVS_VPORT_ATTR_NAME] = { .type = NLA_NUL_STRING, .len = IFNAMSIZ - 1 },
|
|
|
|
[OVS_VPORT_ATTR_STATS] = { .len = sizeof(struct ovs_vport_stats) },
|
|
|
|
[OVS_VPORT_ATTR_PORT_NO] = { .type = NLA_U32 },
|
|
|
|
[OVS_VPORT_ATTR_TYPE] = { .type = NLA_U32 },
|
|
|
|
[OVS_VPORT_ATTR_UPCALL_PID] = { .type = NLA_U32 },
|
|
|
|
[OVS_VPORT_ATTR_OPTIONS] = { .type = NLA_NESTED },
|
|
|
|
};
|
|
|
|
|
2014-07-17 02:25:52 +08:00
|
|
|
static const struct genl_ops dp_vport_genl_ops[] = {
|
2011-10-26 10:26:31 +08:00
|
|
|
{ .cmd = OVS_VPORT_CMD_NEW,
|
|
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
|
|
.policy = vport_policy,
|
|
|
|
.doit = ovs_vport_cmd_new
|
|
|
|
},
|
|
|
|
{ .cmd = OVS_VPORT_CMD_DEL,
|
|
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
|
|
.policy = vport_policy,
|
|
|
|
.doit = ovs_vport_cmd_del
|
|
|
|
},
|
|
|
|
{ .cmd = OVS_VPORT_CMD_GET,
|
|
|
|
.flags = 0, /* OK for unprivileged users. */
|
|
|
|
.policy = vport_policy,
|
|
|
|
.doit = ovs_vport_cmd_get,
|
|
|
|
.dumpit = ovs_vport_cmd_dump
|
|
|
|
},
|
|
|
|
{ .cmd = OVS_VPORT_CMD_SET,
|
|
|
|
.flags = GENL_ADMIN_PERM, /* Requires CAP_NET_ADMIN privilege. */
|
|
|
|
.policy = vport_policy,
|
|
|
|
.doit = ovs_vport_cmd_set,
|
|
|
|
},
|
|
|
|
};
|
|
|
|
|
2014-05-07 07:44:50 +08:00
|
|
|
struct genl_family dp_vport_genl_family = {
|
|
|
|
.id = GENL_ID_GENERATE,
|
|
|
|
.hdrsize = sizeof(struct ovs_header),
|
|
|
|
.name = OVS_VPORT_FAMILY,
|
|
|
|
.version = OVS_VPORT_VERSION,
|
|
|
|
.maxattr = OVS_VPORT_ATTR_MAX,
|
|
|
|
.netnsok = true,
|
|
|
|
.parallel_ops = true,
|
|
|
|
.ops = dp_vport_genl_ops,
|
|
|
|
.n_ops = ARRAY_SIZE(dp_vport_genl_ops),
|
|
|
|
.mcgrps = &ovs_dp_vport_multicast_group,
|
|
|
|
.n_mcgrps = 1,
|
2011-10-26 10:26:31 +08:00
|
|
|
};
|
|
|
|
|
2014-05-07 07:44:50 +08:00
|
|
|
static struct genl_family * const dp_genl_families[] = {
|
|
|
|
&dp_datapath_genl_family,
|
|
|
|
&dp_vport_genl_family,
|
|
|
|
&dp_flow_genl_family,
|
|
|
|
&dp_packet_genl_family,
|
2011-10-26 10:26:31 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
static void dp_unregister_genl(int n_families)
|
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < n_families; i++)
|
2014-05-07 07:44:50 +08:00
|
|
|
genl_unregister_family(dp_genl_families[i]);
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static int dp_register_genl(void)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < ARRAY_SIZE(dp_genl_families); i++) {
|
|
|
|
|
2014-05-07 07:44:50 +08:00
|
|
|
err = genl_register_family(dp_genl_families[i]);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (err)
|
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
error:
|
2014-05-07 07:44:50 +08:00
|
|
|
dp_unregister_genl(i);
|
2011-10-26 10:26:31 +08:00
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
2012-02-23 11:58:59 +08:00
|
|
|
static int __net_init ovs_init_net(struct net *net)
|
|
|
|
{
|
|
|
|
struct ovs_net *ovs_net = net_generic(net, ovs_net_id);
|
|
|
|
|
|
|
|
INIT_LIST_HEAD(&ovs_net->dps);
|
2013-04-16 04:23:03 +08:00
|
|
|
INIT_WORK(&ovs_net->dp_notify_work, ovs_dp_notify_wq);
|
2015-08-27 02:31:52 +08:00
|
|
|
ovs_ct_init(net);
|
2012-02-23 11:58:59 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-02-18 03:23:10 +08:00
|
|
|
static void __net_exit list_vports_from_net(struct net *net, struct net *dnet,
|
|
|
|
struct list_head *head)
|
2012-02-23 11:58:59 +08:00
|
|
|
{
|
2013-04-16 04:23:03 +08:00
|
|
|
struct ovs_net *ovs_net = net_generic(net, ovs_net_id);
|
2015-02-18 03:23:10 +08:00
|
|
|
struct datapath *dp;
|
|
|
|
|
|
|
|
list_for_each_entry(dp, &ovs_net->dps, list_node) {
|
|
|
|
int i;
|
|
|
|
|
|
|
|
for (i = 0; i < DP_VPORT_HASH_BUCKETS; i++) {
|
|
|
|
struct vport *vport;
|
|
|
|
|
|
|
|
hlist_for_each_entry(vport, &dp->ports[i], dp_hash_node) {
|
|
|
|
if (vport->ops->type != OVS_VPORT_TYPE_INTERNAL)
|
|
|
|
continue;
|
|
|
|
|
2015-07-21 16:44:04 +08:00
|
|
|
if (dev_net(vport->dev) == dnet)
|
2015-02-18 03:23:10 +08:00
|
|
|
list_add(&vport->detach_list, head);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static void __net_exit ovs_exit_net(struct net *dnet)
|
|
|
|
{
|
|
|
|
struct datapath *dp, *dp_next;
|
|
|
|
struct ovs_net *ovs_net = net_generic(dnet, ovs_net_id);
|
|
|
|
struct vport *vport, *vport_next;
|
|
|
|
struct net *net;
|
|
|
|
LIST_HEAD(head);
|
2012-02-23 11:58:59 +08:00
|
|
|
|
2015-08-27 02:31:52 +08:00
|
|
|
ovs_ct_exit(dnet);
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_lock();
|
2012-02-23 11:58:59 +08:00
|
|
|
list_for_each_entry_safe(dp, dp_next, &ovs_net->dps, list_node)
|
|
|
|
__dp_destroy(dp);
|
2015-02-18 03:23:10 +08:00
|
|
|
|
|
|
|
rtnl_lock();
|
|
|
|
for_each_net(net)
|
|
|
|
list_vports_from_net(net, dnet, &head);
|
|
|
|
rtnl_unlock();
|
|
|
|
|
|
|
|
/* Detach all vports from given namespace. */
|
|
|
|
list_for_each_entry_safe(vport, vport_next, &head, detach_list) {
|
|
|
|
list_del(&vport->detach_list);
|
|
|
|
ovs_dp_detach_port(vport);
|
|
|
|
}
|
|
|
|
|
2013-04-16 04:23:03 +08:00
|
|
|
ovs_unlock();
|
|
|
|
|
|
|
|
cancel_work_sync(&ovs_net->dp_notify_work);
|
2012-02-23 11:58:59 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static struct pernet_operations ovs_net_ops = {
|
|
|
|
.init = ovs_init_net,
|
|
|
|
.exit = ovs_exit_net,
|
|
|
|
.id = &ovs_net_id,
|
|
|
|
.size = sizeof(struct ovs_net),
|
|
|
|
};
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
static int __init dp_init(void)
|
|
|
|
{
|
|
|
|
int err;
|
|
|
|
|
2013-01-09 15:19:55 +08:00
|
|
|
BUILD_BUG_ON(sizeof(struct ovs_skb_cb) > FIELD_SIZEOF(struct sk_buff, cb));
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
pr_info("Open vSwitch switching datapath\n");
|
|
|
|
|
2014-09-16 10:37:25 +08:00
|
|
|
err = action_fifos_init();
|
2011-10-26 10:26:31 +08:00
|
|
|
if (err)
|
|
|
|
goto error;
|
|
|
|
|
2014-09-16 10:37:25 +08:00
|
|
|
err = ovs_internal_dev_rtnl_link_register();
|
|
|
|
if (err)
|
|
|
|
goto error_action_fifos_exit;
|
|
|
|
|
2014-06-26 15:58:26 +08:00
|
|
|
err = ovs_flow_init();
|
|
|
|
if (err)
|
|
|
|
goto error_unreg_rtnl_link;
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
err = ovs_vport_init();
|
|
|
|
if (err)
|
|
|
|
goto error_flow_exit;
|
|
|
|
|
2012-02-23 11:58:59 +08:00
|
|
|
err = register_pernet_device(&ovs_net_ops);
|
2011-10-26 10:26:31 +08:00
|
|
|
if (err)
|
|
|
|
goto error_vport_exit;
|
|
|
|
|
2012-02-23 11:58:59 +08:00
|
|
|
err = register_netdevice_notifier(&ovs_dp_device_notifier);
|
|
|
|
if (err)
|
|
|
|
goto error_netns_exit;
|
|
|
|
|
2014-10-22 23:29:06 +08:00
|
|
|
err = ovs_netdev_init();
|
|
|
|
if (err)
|
|
|
|
goto error_unreg_notifier;
|
|
|
|
|
2011-10-26 10:26:31 +08:00
|
|
|
err = dp_register_genl();
|
|
|
|
if (err < 0)
|
2014-10-22 23:29:06 +08:00
|
|
|
goto error_unreg_netdev;
|
2011-10-26 10:26:31 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
2014-10-22 23:29:06 +08:00
|
|
|
error_unreg_netdev:
|
|
|
|
ovs_netdev_exit();
|
2011-10-26 10:26:31 +08:00
|
|
|
error_unreg_notifier:
|
|
|
|
unregister_netdevice_notifier(&ovs_dp_device_notifier);
|
2012-02-23 11:58:59 +08:00
|
|
|
error_netns_exit:
|
|
|
|
unregister_pernet_device(&ovs_net_ops);
|
2011-10-26 10:26:31 +08:00
|
|
|
error_vport_exit:
|
|
|
|
ovs_vport_exit();
|
|
|
|
error_flow_exit:
|
|
|
|
ovs_flow_exit();
|
2014-06-26 15:58:26 +08:00
|
|
|
error_unreg_rtnl_link:
|
|
|
|
ovs_internal_dev_rtnl_link_unregister();
|
2014-09-16 10:37:25 +08:00
|
|
|
error_action_fifos_exit:
|
|
|
|
action_fifos_exit();
|
2011-10-26 10:26:31 +08:00
|
|
|
error:
|
|
|
|
return err;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void dp_cleanup(void)
|
|
|
|
{
|
|
|
|
dp_unregister_genl(ARRAY_SIZE(dp_genl_families));
|
2014-10-22 23:29:06 +08:00
|
|
|
ovs_netdev_exit();
|
2011-10-26 10:26:31 +08:00
|
|
|
unregister_netdevice_notifier(&ovs_dp_device_notifier);
|
2012-02-23 11:58:59 +08:00
|
|
|
unregister_pernet_device(&ovs_net_ops);
|
|
|
|
rcu_barrier();
|
2011-10-26 10:26:31 +08:00
|
|
|
ovs_vport_exit();
|
|
|
|
ovs_flow_exit();
|
2014-06-26 15:58:26 +08:00
|
|
|
ovs_internal_dev_rtnl_link_unregister();
|
2014-09-16 10:37:25 +08:00
|
|
|
action_fifos_exit();
|
2011-10-26 10:26:31 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
module_init(dp_init);
|
|
|
|
module_exit(dp_cleanup);
|
|
|
|
|
|
|
|
MODULE_DESCRIPTION("Open vSwitch switching datapath");
|
|
|
|
MODULE_LICENSE("GPL");
|