net: hns: delete redundancy ring enable operations
[deliverable/linux.git] / drivers / net / macvtap.c
CommitLineData
20d29d7a
AB
1#include <linux/etherdevice.h>
2#include <linux/if_macvlan.h>
f09e2249 3#include <linux/if_vlan.h>
20d29d7a
AB
4#include <linux/interrupt.h>
5#include <linux/nsproxy.h>
6#include <linux/compat.h>
7#include <linux/if_tun.h>
8#include <linux/module.h>
9#include <linux/skbuff.h>
10#include <linux/cache.h>
11#include <linux/sched.h>
12#include <linux/types.h>
5a0e3ad6 13#include <linux/slab.h>
20d29d7a
AB
14#include <linux/wait.h>
15#include <linux/cdev.h>
40401530 16#include <linux/idr.h>
20d29d7a 17#include <linux/fs.h>
6c36d2e2 18#include <linux/uio.h>
20d29d7a
AB
19
20#include <net/net_namespace.h>
21#include <net/rtnetlink.h>
22#include <net/sock.h>
b9fb9ee0 23#include <linux/virtio_net.h>
20d29d7a
AB
24
25/*
26 * A macvtap queue is the central object of this driver, it connects
27 * an open character device to a macvlan interface. There can be
28 * multiple queues on one interface, which map back to queues
29 * implemented in hardware on the underlying device.
30 *
31 * macvtap_proto is used to allocate queues through the sock allocation
32 * mechanism.
33 *
20d29d7a
AB
34 */
35struct macvtap_queue {
36 struct sock sk;
37 struct socket sock;
43815482 38 struct socket_wq wq;
55afbd08 39 int vnet_hdr_sz;
13707f9e 40 struct macvlan_dev __rcu *vlan;
20d29d7a 41 struct file *file;
b9fb9ee0 42 unsigned int flags;
376b1aab 43 u16 queue_index;
815f236d
JW
44 bool enabled;
45 struct list_head next;
20d29d7a
AB
46};
47
01b07fb3
MT
48#define MACVTAP_FEATURES (IFF_VNET_HDR | IFF_MULTI_QUEUE)
49
50#define MACVTAP_VNET_LE 0x80000000
8b8e658b
GK
51#define MACVTAP_VNET_BE 0x40000000
52
53#ifdef CONFIG_TUN_VNET_CROSS_LE
54static inline bool macvtap_legacy_is_little_endian(struct macvtap_queue *q)
55{
56 return q->flags & MACVTAP_VNET_BE ? false :
57 virtio_legacy_is_little_endian();
58}
59
60static long macvtap_get_vnet_be(struct macvtap_queue *q, int __user *sp)
61{
62 int s = !!(q->flags & MACVTAP_VNET_BE);
63
64 if (put_user(s, sp))
65 return -EFAULT;
66
67 return 0;
68}
69
70static long macvtap_set_vnet_be(struct macvtap_queue *q, int __user *sp)
71{
72 int s;
73
74 if (get_user(s, sp))
75 return -EFAULT;
76
77 if (s)
78 q->flags |= MACVTAP_VNET_BE;
79 else
80 q->flags &= ~MACVTAP_VNET_BE;
81
82 return 0;
83}
84#else
85static inline bool macvtap_legacy_is_little_endian(struct macvtap_queue *q)
86{
87 return virtio_legacy_is_little_endian();
88}
89
90static long macvtap_get_vnet_be(struct macvtap_queue *q, int __user *argp)
91{
92 return -EINVAL;
93}
94
95static long macvtap_set_vnet_be(struct macvtap_queue *q, int __user *argp)
96{
97 return -EINVAL;
98}
99#endif /* CONFIG_TUN_VNET_CROSS_LE */
6ae7feb3 100
5b11e15f
GK
101static inline bool macvtap_is_little_endian(struct macvtap_queue *q)
102{
7d824109 103 return q->flags & MACVTAP_VNET_LE ||
8b8e658b 104 macvtap_legacy_is_little_endian(q);
5b11e15f 105}
6ae7feb3
MT
106
107static inline u16 macvtap16_to_cpu(struct macvtap_queue *q, __virtio16 val)
108{
5b11e15f 109 return __virtio16_to_cpu(macvtap_is_little_endian(q), val);
6ae7feb3
MT
110}
111
112static inline __virtio16 cpu_to_macvtap16(struct macvtap_queue *q, u16 val)
113{
5b11e15f 114 return __cpu_to_virtio16(macvtap_is_little_endian(q), val);
6ae7feb3
MT
115}
116
20d29d7a
AB
117static struct proto macvtap_proto = {
118 .name = "macvtap",
119 .owner = THIS_MODULE,
120 .obj_size = sizeof (struct macvtap_queue),
121};
122
123/*
e09eff7f 124 * Variables for dealing with macvtaps device numbers.
20d29d7a 125 */
1ebed71a 126static dev_t macvtap_major;
e09eff7f
EB
127#define MACVTAP_NUM_DEVS (1U << MINORBITS)
128static DEFINE_MUTEX(minor_lock);
129static DEFINE_IDR(minor_idr);
130
97bc3633 131#define GOODCOPY_LEN 128
17af2bce
MA
132static const void *macvtap_net_namespace(struct device *d)
133{
134 struct net_device *dev = to_net_dev(d->parent);
135 return dev_net(dev);
136}
137
138static struct class macvtap_class = {
139 .name = "macvtap",
140 .owner = THIS_MODULE,
141 .ns_type = &net_ns_type_operations,
142 .namespace = macvtap_net_namespace,
143};
20d29d7a
AB
144static struct cdev macvtap_cdev;
145
501c774c
AB
146static const struct proto_ops macvtap_socket_ops;
147
2be5c767 148#define TUN_OFFLOADS (NETIF_F_HW_CSUM | NETIF_F_TSO_ECN | NETIF_F_TSO | \
e3e3c423 149 NETIF_F_TSO6 | NETIF_F_UFO)
2be5c767 150#define RX_OFFLOADS (NETIF_F_GRO | NETIF_F_LRO)
f23d538b 151#define TAP_FEATURES (NETIF_F_GSO | NETIF_F_SG | NETIF_F_FRAGLIST)
a567dd62 152
6acf54f1
VY
153static struct macvlan_dev *macvtap_get_vlan_rcu(const struct net_device *dev)
154{
155 return rcu_dereference(dev->rx_handler_data);
156}
157
20d29d7a
AB
158/*
159 * RCU usage:
02df55d2
AB
160 * The macvtap_queue and the macvlan_dev are loosely coupled, the
161 * pointers from one to the other can only be read while rcu_read_lock
441ac0fc 162 * or rtnl is held.
20d29d7a 163 *
02df55d2
AB
164 * Both the file and the macvlan_dev hold a reference on the macvtap_queue
165 * through sock_hold(&q->sk). When the macvlan_dev goes away first,
166 * q->vlan becomes inaccessible. When the files gets closed,
167 * macvtap_get_queue() fails.
20d29d7a 168 *
02df55d2
AB
169 * There may still be references to the struct sock inside of the
170 * queue from outbound SKBs, but these never reference back to the
171 * file or the dev. The data structure is freed through __sk_free
172 * when both our references and any pending SKBs are gone.
20d29d7a 173 */
20d29d7a 174
815f236d 175static int macvtap_enable_queue(struct net_device *dev, struct file *file,
20d29d7a 176 struct macvtap_queue *q)
815f236d
JW
177{
178 struct macvlan_dev *vlan = netdev_priv(dev);
179 int err = -EINVAL;
180
441ac0fc 181 ASSERT_RTNL();
815f236d
JW
182
183 if (q->enabled)
184 goto out;
185
186 err = 0;
187 rcu_assign_pointer(vlan->taps[vlan->numvtaps], q);
188 q->queue_index = vlan->numvtaps;
189 q->enabled = true;
190
191 vlan->numvtaps++;
192out:
815f236d
JW
193 return err;
194}
195
40b8fe45 196/* Requires RTNL */
815f236d
JW
197static int macvtap_set_queue(struct net_device *dev, struct file *file,
198 struct macvtap_queue *q)
20d29d7a
AB
199{
200 struct macvlan_dev *vlan = netdev_priv(dev);
20d29d7a 201
815f236d 202 if (vlan->numqueues == MAX_MACVTAP_QUEUES)
40b8fe45 203 return -EBUSY;
20d29d7a 204
02df55d2 205 rcu_assign_pointer(q->vlan, vlan);
376b1aab 206 rcu_assign_pointer(vlan->taps[vlan->numvtaps], q);
02df55d2 207 sock_hold(&q->sk);
20d29d7a
AB
208
209 q->file = file;
376b1aab 210 q->queue_index = vlan->numvtaps;
815f236d 211 q->enabled = true;
02df55d2 212 file->private_data = q;
815f236d 213 list_add_tail(&q->next, &vlan->queue_list);
20d29d7a 214
1565c7c1 215 vlan->numvtaps++;
815f236d 216 vlan->numqueues++;
1565c7c1 217
40b8fe45 218 return 0;
20d29d7a
AB
219}
220
441ac0fc 221static int macvtap_disable_queue(struct macvtap_queue *q)
815f236d
JW
222{
223 struct macvlan_dev *vlan;
224 struct macvtap_queue *nq;
225
441ac0fc 226 ASSERT_RTNL();
815f236d
JW
227 if (!q->enabled)
228 return -EINVAL;
229
441ac0fc
VY
230 vlan = rtnl_dereference(q->vlan);
231
815f236d
JW
232 if (vlan) {
233 int index = q->queue_index;
234 BUG_ON(index >= vlan->numvtaps);
441ac0fc 235 nq = rtnl_dereference(vlan->taps[vlan->numvtaps - 1]);
815f236d
JW
236 nq->queue_index = index;
237
238 rcu_assign_pointer(vlan->taps[index], nq);
239 RCU_INIT_POINTER(vlan->taps[vlan->numvtaps - 1], NULL);
240 q->enabled = false;
241
242 vlan->numvtaps--;
243 }
244
245 return 0;
246}
247
20d29d7a 248/*
02df55d2
AB
249 * The file owning the queue got closed, give up both
250 * the reference that the files holds as well as the
251 * one from the macvlan_dev if that still exists.
20d29d7a
AB
252 *
253 * Using the spinlock makes sure that we don't get
254 * to the queue again after destroying it.
20d29d7a 255 */
02df55d2 256static void macvtap_put_queue(struct macvtap_queue *q)
20d29d7a 257{
02df55d2 258 struct macvlan_dev *vlan;
20d29d7a 259
441ac0fc
VY
260 rtnl_lock();
261 vlan = rtnl_dereference(q->vlan);
262
02df55d2 263 if (vlan) {
815f236d 264 if (q->enabled)
441ac0fc 265 BUG_ON(macvtap_disable_queue(q));
376b1aab 266
815f236d 267 vlan->numqueues--;
2cfa5a04 268 RCU_INIT_POINTER(q->vlan, NULL);
02df55d2 269 sock_put(&q->sk);
815f236d 270 list_del_init(&q->next);
20d29d7a
AB
271 }
272
441ac0fc 273 rtnl_unlock();
20d29d7a
AB
274
275 synchronize_rcu();
276 sock_put(&q->sk);
277}
278
279/*
1565c7c1
KK
280 * Select a queue based on the rxq of the device on which this packet
281 * arrived. If the incoming device is not mq, calculate a flow hash
282 * to select a queue. If all fails, find the first available queue.
283 * Cache vlan->numvtaps since it can become zero during the execution
284 * of this function.
20d29d7a
AB
285 */
286static struct macvtap_queue *macvtap_get_queue(struct net_device *dev,
287 struct sk_buff *skb)
288{
289 struct macvlan_dev *vlan = netdev_priv(dev);
1565c7c1 290 struct macvtap_queue *tap = NULL;
815f236d
JW
291 /* Access to taps array is protected by rcu, but access to numvtaps
292 * isn't. Below we use it to lookup a queue, but treat it as a hint
293 * and validate that the result isn't NULL - in case we are
294 * racing against queue removal.
295 */
ed0483fa 296 int numvtaps = ACCESS_ONCE(vlan->numvtaps);
1565c7c1
KK
297 __u32 rxq;
298
299 if (!numvtaps)
300 goto out;
301
ef0002b5 302 /* Check if we can use flow to select a queue */
3958afa1 303 rxq = skb_get_hash(skb);
ef0002b5
KK
304 if (rxq) {
305 tap = rcu_dereference(vlan->taps[rxq % numvtaps]);
376b1aab 306 goto out;
ef0002b5
KK
307 }
308
1565c7c1
KK
309 if (likely(skb_rx_queue_recorded(skb))) {
310 rxq = skb_get_rx_queue(skb);
20d29d7a 311
1565c7c1
KK
312 while (unlikely(rxq >= numvtaps))
313 rxq -= numvtaps;
314
315 tap = rcu_dereference(vlan->taps[rxq]);
376b1aab 316 goto out;
1565c7c1
KK
317 }
318
376b1aab 319 tap = rcu_dereference(vlan->taps[0]);
1565c7c1
KK
320out:
321 return tap;
20d29d7a
AB
322}
323
02df55d2
AB
324/*
325 * The net_device is going away, give up the reference
1565c7c1
KK
326 * that it holds on all queues and safely set the pointer
327 * from the queues to NULL.
02df55d2 328 */
20d29d7a
AB
329static void macvtap_del_queues(struct net_device *dev)
330{
331 struct macvlan_dev *vlan = netdev_priv(dev);
dfe816c5 332 struct macvtap_queue *q, *tmp;
02df55d2 333
441ac0fc 334 ASSERT_RTNL();
815f236d
JW
335 list_for_each_entry_safe(q, tmp, &vlan->queue_list, next) {
336 list_del_init(&q->next);
376b1aab 337 RCU_INIT_POINTER(q->vlan, NULL);
815f236d
JW
338 if (q->enabled)
339 vlan->numvtaps--;
340 vlan->numqueues--;
dfe816c5 341 sock_put(&q->sk);
564517e8 342 }
815f236d
JW
343 BUG_ON(vlan->numvtaps);
344 BUG_ON(vlan->numqueues);
99f34b38
EB
345 /* guarantee that any future macvtap_set_queue will fail */
346 vlan->numvtaps = MAX_MACVTAP_QUEUES;
20d29d7a
AB
347}
348
6acf54f1 349static rx_handler_result_t macvtap_handle_frame(struct sk_buff **pskb)
20d29d7a 350{
6acf54f1
VY
351 struct sk_buff *skb = *pskb;
352 struct net_device *dev = skb->dev;
353 struct macvlan_dev *vlan;
354 struct macvtap_queue *q;
a567dd62
VY
355 netdev_features_t features = TAP_FEATURES;
356
6acf54f1
VY
357 vlan = macvtap_get_vlan_rcu(dev);
358 if (!vlan)
359 return RX_HANDLER_PASS;
360
361 q = macvtap_get_queue(dev, skb);
20d29d7a 362 if (!q)
6acf54f1 363 return RX_HANDLER_PASS;
8a35747a
HX
364
365 if (skb_queue_len(&q->sk.sk_receive_queue) >= dev->tx_queue_len)
366 goto drop;
20d29d7a 367
6acf54f1
VY
368 skb_push(skb, ETH_HLEN);
369
3e4f8b78 370 /* Apply the forward feature mask so that we perform segmentation
e5733321
VY
371 * according to users wishes. This only works if VNET_HDR is
372 * enabled.
3e4f8b78 373 */
e5733321
VY
374 if (q->flags & IFF_VNET_HDR)
375 features |= vlan->tap_features;
8b86a61d 376 if (netif_needs_gso(skb, features)) {
3e4f8b78
VY
377 struct sk_buff *segs = __skb_gso_segment(skb, features, false);
378
379 if (IS_ERR(segs))
380 goto drop;
381
382 if (!segs) {
383 skb_queue_tail(&q->sk.sk_receive_queue, skb);
384 goto wake_up;
385 }
386
be0bd316 387 consume_skb(skb);
3e4f8b78
VY
388 while (segs) {
389 struct sk_buff *nskb = segs->next;
390
391 segs->next = NULL;
392 skb_queue_tail(&q->sk.sk_receive_queue, segs);
393 segs = nskb;
394 }
395 } else {
cbdb0427
VY
396 /* If we receive a partial checksum and the tap side
397 * doesn't support checksum offload, compute the checksum.
398 * Note: it doesn't matter which checksum feature to
399 * check, we either support them all or none.
400 */
401 if (skb->ip_summed == CHECKSUM_PARTIAL &&
a188222b 402 !(features & NETIF_F_CSUM_MASK) &&
cbdb0427
VY
403 skb_checksum_help(skb))
404 goto drop;
3e4f8b78
VY
405 skb_queue_tail(&q->sk.sk_receive_queue, skb);
406 }
407
408wake_up:
4a4771a5 409 wake_up_interruptible_poll(sk_sleep(&q->sk), POLLIN | POLLRDNORM | POLLRDBAND);
6acf54f1 410 return RX_HANDLER_CONSUMED;
8a35747a
HX
411
412drop:
6acf54f1
VY
413 /* Count errors/drops only here, thus don't care about args. */
414 macvlan_count_rx(vlan, 0, 0, 0);
8a35747a 415 kfree_skb(skb);
6acf54f1 416 return RX_HANDLER_CONSUMED;
20d29d7a
AB
417}
418
e09eff7f
EB
419static int macvtap_get_minor(struct macvlan_dev *vlan)
420{
421 int retval = -ENOMEM;
e09eff7f
EB
422
423 mutex_lock(&minor_lock);
ec09ebc1
TH
424 retval = idr_alloc(&minor_idr, vlan, 1, MACVTAP_NUM_DEVS, GFP_KERNEL);
425 if (retval >= 0) {
426 vlan->minor = retval;
427 } else if (retval == -ENOSPC) {
e09eff7f
EB
428 printk(KERN_ERR "too many macvtap devices\n");
429 retval = -EINVAL;
e09eff7f 430 }
e09eff7f 431 mutex_unlock(&minor_lock);
ec09ebc1 432 return retval < 0 ? retval : 0;
e09eff7f
EB
433}
434
435static void macvtap_free_minor(struct macvlan_dev *vlan)
436{
437 mutex_lock(&minor_lock);
438 if (vlan->minor) {
439 idr_remove(&minor_idr, vlan->minor);
440 vlan->minor = 0;
441 }
442 mutex_unlock(&minor_lock);
443}
444
445static struct net_device *dev_get_by_macvtap_minor(int minor)
446{
447 struct net_device *dev = NULL;
448 struct macvlan_dev *vlan;
449
450 mutex_lock(&minor_lock);
451 vlan = idr_find(&minor_idr, minor);
452 if (vlan) {
453 dev = vlan->dev;
454 dev_hold(dev);
455 }
456 mutex_unlock(&minor_lock);
457 return dev;
458}
459
20d29d7a
AB
460static int macvtap_newlink(struct net *src_net,
461 struct net_device *dev,
462 struct nlattr *tb[],
463 struct nlattr *data[])
464{
815f236d 465 struct macvlan_dev *vlan = netdev_priv(dev);
6acf54f1
VY
466 int err;
467
815f236d
JW
468 INIT_LIST_HEAD(&vlan->queue_list);
469
2be5c767
VY
470 /* Since macvlan supports all offloads by default, make
471 * tap support all offloads also.
472 */
473 vlan->tap_features = TUN_OFFLOADS;
474
6acf54f1
VY
475 err = netdev_rx_handler_register(dev, macvtap_handle_frame, vlan);
476 if (err)
477 return err;
478
9bf1907f
EB
479 /* Don't put anything that may fail after macvlan_common_newlink
480 * because we can't undo what it does.
481 */
2f6a1b66 482 return macvlan_common_newlink(src_net, dev, tb, data);
20d29d7a
AB
483}
484
485static void macvtap_dellink(struct net_device *dev,
486 struct list_head *head)
487{
6acf54f1 488 netdev_rx_handler_unregister(dev);
20d29d7a
AB
489 macvtap_del_queues(dev);
490 macvlan_dellink(dev, head);
491}
492
8a35747a
HX
493static void macvtap_setup(struct net_device *dev)
494{
495 macvlan_common_setup(dev);
496 dev->tx_queue_len = TUN_READQ_SIZE;
497}
498
20d29d7a
AB
499static struct rtnl_link_ops macvtap_link_ops __read_mostly = {
500 .kind = "macvtap",
8a35747a 501 .setup = macvtap_setup,
20d29d7a
AB
502 .newlink = macvtap_newlink,
503 .dellink = macvtap_dellink,
504};
505
506
507static void macvtap_sock_write_space(struct sock *sk)
508{
43815482
ED
509 wait_queue_head_t *wqueue;
510
20d29d7a 511 if (!sock_writeable(sk) ||
9cd3e072 512 !test_and_clear_bit(SOCKWQ_ASYNC_NOSPACE, &sk->sk_socket->flags))
20d29d7a
AB
513 return;
514
43815482
ED
515 wqueue = sk_sleep(sk);
516 if (wqueue && waitqueue_active(wqueue))
517 wake_up_interruptible_poll(wqueue, POLLOUT | POLLWRNORM | POLLWRBAND);
20d29d7a
AB
518}
519
2259fef0
EB
520static void macvtap_sock_destruct(struct sock *sk)
521{
522 skb_queue_purge(&sk->sk_receive_queue);
523}
524
20d29d7a
AB
525static int macvtap_open(struct inode *inode, struct file *file)
526{
527 struct net *net = current->nsproxy->net_ns;
40b8fe45 528 struct net_device *dev;
20d29d7a 529 struct macvtap_queue *q;
40b8fe45 530 int err = -ENODEV;
20d29d7a 531
40b8fe45
VY
532 rtnl_lock();
533 dev = dev_get_by_macvtap_minor(iminor(inode));
20d29d7a
AB
534 if (!dev)
535 goto out;
536
20d29d7a
AB
537 err = -ENOMEM;
538 q = (struct macvtap_queue *)sk_alloc(net, AF_UNSPEC, GFP_KERNEL,
11aa9c28 539 &macvtap_proto, 0);
20d29d7a
AB
540 if (!q)
541 goto out;
542
d9a90a31 543 RCU_INIT_POINTER(q->sock.wq, &q->wq);
43815482 544 init_waitqueue_head(&q->wq.wait);
20d29d7a
AB
545 q->sock.type = SOCK_RAW;
546 q->sock.state = SS_CONNECTED;
501c774c
AB
547 q->sock.file = file;
548 q->sock.ops = &macvtap_socket_ops;
20d29d7a 549 sock_init_data(&q->sock, &q->sk);
20d29d7a 550 q->sk.sk_write_space = macvtap_sock_write_space;
2259fef0 551 q->sk.sk_destruct = macvtap_sock_destruct;
b9fb9ee0 552 q->flags = IFF_VNET_HDR | IFF_NO_PI | IFF_TAP;
55afbd08 553 q->vnet_hdr_sz = sizeof(struct virtio_net_hdr);
20d29d7a 554
97bc3633
SM
555 /*
556 * so far only KVM virtio_net uses macvtap, enable zero copy between
557 * guest kernel and host kernel when lower device supports zerocopy
047af9cf
EB
558 *
559 * The macvlan supports zerocopy iff the lower device supports zero
560 * copy so we don't have to look at the lower device directly.
97bc3633 561 */
047af9cf
EB
562 if ((dev->features & NETIF_F_HIGHDMA) && (dev->features & NETIF_F_SG))
563 sock_set_flag(&q->sk, SOCK_ZEROCOPY);
97bc3633 564
20d29d7a
AB
565 err = macvtap_set_queue(dev, file, q);
566 if (err)
567 sock_put(&q->sk);
568
569out:
570 if (dev)
571 dev_put(dev);
572
40b8fe45 573 rtnl_unlock();
20d29d7a
AB
574 return err;
575}
576
577static int macvtap_release(struct inode *inode, struct file *file)
578{
02df55d2
AB
579 struct macvtap_queue *q = file->private_data;
580 macvtap_put_queue(q);
20d29d7a
AB
581 return 0;
582}
583
584static unsigned int macvtap_poll(struct file *file, poll_table * wait)
585{
02df55d2 586 struct macvtap_queue *q = file->private_data;
20d29d7a
AB
587 unsigned int mask = POLLERR;
588
589 if (!q)
590 goto out;
591
592 mask = 0;
43815482 593 poll_wait(file, &q->wq.wait, wait);
20d29d7a
AB
594
595 if (!skb_queue_empty(&q->sk.sk_receive_queue))
596 mask |= POLLIN | POLLRDNORM;
597
598 if (sock_writeable(&q->sk) ||
9cd3e072 599 (!test_and_set_bit(SOCKWQ_ASYNC_NOSPACE, &q->sock.flags) &&
20d29d7a
AB
600 sock_writeable(&q->sk)))
601 mask |= POLLOUT | POLLWRNORM;
602
603out:
20d29d7a
AB
604 return mask;
605}
606
b9fb9ee0
AB
607static inline struct sk_buff *macvtap_alloc_skb(struct sock *sk, size_t prepad,
608 size_t len, size_t linear,
609 int noblock, int *err)
610{
611 struct sk_buff *skb;
612
613 /* Under a page? Don't bother with paged skb. */
614 if (prepad + len < PAGE_SIZE || !linear)
615 linear = len;
616
617 skb = sock_alloc_send_pskb(sk, prepad + linear, len - linear, noblock,
28d64271 618 err, 0);
b9fb9ee0
AB
619 if (!skb)
620 return NULL;
621
622 skb_reserve(skb, prepad);
623 skb_put(skb, linear);
624 skb->data_len = len - linear;
625 skb->len += len - linear;
626
627 return skb;
628}
629
2f1d8b9e
ED
630/* Neighbour code has some assumptions on HH_DATA_MOD alignment */
631#define MACVTAP_RESERVE HH_DATA_OFF(ETH_HLEN)
632
20d29d7a 633/* Get packet from user space buffer */
97bc3633 634static ssize_t macvtap_get_user(struct macvtap_queue *q, struct msghdr *m,
f5ff53b4 635 struct iov_iter *from, int noblock)
20d29d7a 636{
2f1d8b9e 637 int good_linear = SKB_MAX_HEAD(MACVTAP_RESERVE);
20d29d7a 638 struct sk_buff *skb;
02df55d2 639 struct macvlan_dev *vlan;
f5ff53b4 640 unsigned long total_len = iov_iter_count(from);
97bc3633 641 unsigned long len = total_len;
20d29d7a 642 int err;
b9fb9ee0
AB
643 struct virtio_net_hdr vnet_hdr = { 0 };
644 int vnet_hdr_len = 0;
b92946e2 645 int copylen = 0;
c5c62f1b 646 int depth;
97bc3633 647 bool zerocopy = false;
61d46bf9 648 size_t linear;
f5ff53b4 649 ssize_t n;
b9fb9ee0
AB
650
651 if (q->flags & IFF_VNET_HDR) {
55afbd08 652 vnet_hdr_len = q->vnet_hdr_sz;
b9fb9ee0
AB
653
654 err = -EINVAL;
ce3c8692 655 if (len < vnet_hdr_len)
b9fb9ee0 656 goto err;
ce3c8692 657 len -= vnet_hdr_len;
b9fb9ee0 658
f5ff53b4
AV
659 err = -EFAULT;
660 n = copy_from_iter(&vnet_hdr, sizeof(vnet_hdr), from);
661 if (n != sizeof(vnet_hdr))
b9fb9ee0 662 goto err;
f5ff53b4 663 iov_iter_advance(from, vnet_hdr_len - sizeof(vnet_hdr));
b9fb9ee0 664 if ((vnet_hdr.flags & VIRTIO_NET_HDR_F_NEEDS_CSUM) &&
6ae7feb3
MT
665 macvtap16_to_cpu(q, vnet_hdr.csum_start) +
666 macvtap16_to_cpu(q, vnet_hdr.csum_offset) + 2 >
667 macvtap16_to_cpu(q, vnet_hdr.hdr_len))
668 vnet_hdr.hdr_len = cpu_to_macvtap16(q,
669 macvtap16_to_cpu(q, vnet_hdr.csum_start) +
670 macvtap16_to_cpu(q, vnet_hdr.csum_offset) + 2);
b9fb9ee0 671 err = -EINVAL;
6ae7feb3 672 if (macvtap16_to_cpu(q, vnet_hdr.hdr_len) > len)
b9fb9ee0
AB
673 goto err;
674 }
20d29d7a 675
b9fb9ee0 676 err = -EINVAL;
20d29d7a 677 if (unlikely(len < ETH_HLEN))
b9fb9ee0 678 goto err;
20d29d7a 679
ece793fc 680 if (m && m->msg_control && sock_flag(&q->sk, SOCK_ZEROCOPY)) {
f5ff53b4
AV
681 struct iov_iter i;
682
6ae7feb3
MT
683 copylen = vnet_hdr.hdr_len ?
684 macvtap16_to_cpu(q, vnet_hdr.hdr_len) : GOODCOPY_LEN;
16a3fa28
JW
685 if (copylen > good_linear)
686 copylen = good_linear;
8e2ad411
WB
687 else if (copylen < ETH_HLEN)
688 copylen = ETH_HLEN;
61d46bf9 689 linear = copylen;
f5ff53b4
AV
690 i = *from;
691 iov_iter_advance(&i, copylen);
692 if (iov_iter_npages(&i, INT_MAX) <= MAX_SKB_FRAGS)
ece793fc
JW
693 zerocopy = true;
694 }
695
696 if (!zerocopy) {
97bc3633 697 copylen = len;
8e2ad411
WB
698 linear = macvtap16_to_cpu(q, vnet_hdr.hdr_len);
699 if (linear > good_linear)
16a3fa28 700 linear = good_linear;
8e2ad411
WB
701 else if (linear < ETH_HLEN)
702 linear = ETH_HLEN;
61d46bf9 703 }
97bc3633 704
2f1d8b9e 705 skb = macvtap_alloc_skb(&q->sk, MACVTAP_RESERVE, copylen,
61d46bf9 706 linear, noblock, &err);
02df55d2
AB
707 if (!skb)
708 goto err;
20d29d7a 709
01d6657b 710 if (zerocopy)
f5ff53b4 711 err = zerocopy_sg_from_iter(skb, from);
ece793fc 712 else {
f5ff53b4 713 err = skb_copy_datagram_from_iter(skb, 0, from, len);
ece793fc
JW
714 if (!err && m && m->msg_control) {
715 struct ubuf_info *uarg = m->msg_control;
716 uarg->callback(uarg, false);
717 }
718 }
719
02df55d2 720 if (err)
b9fb9ee0 721 goto err_kfree;
20d29d7a
AB
722
723 skb_set_network_header(skb, ETH_HLEN);
b9fb9ee0
AB
724 skb_reset_mac_header(skb);
725 skb->protocol = eth_hdr(skb)->h_proto;
726
727 if (vnet_hdr_len) {
fd88d68b
MR
728 err = virtio_net_hdr_to_skb(skb, &vnet_hdr,
729 macvtap_is_little_endian(q));
b9fb9ee0
AB
730 if (err)
731 goto err_kfree;
732 }
733
40893fd0 734 skb_probe_transport_header(skb, ETH_HLEN);
9b4d669b 735
c5c62f1b
IV
736 /* Move network header to the right position for VLAN tagged packets */
737 if ((skb->protocol == htons(ETH_P_8021Q) ||
738 skb->protocol == htons(ETH_P_8021AD)) &&
739 __vlan_get_protocol(skb, skb->protocol, &depth) != 0)
740 skb_set_network_header(skb, depth);
741
ac4e4af1
VY
742 rcu_read_lock();
743 vlan = rcu_dereference(q->vlan);
97bc3633 744 /* copy skb_ubuf_info for callback when skb has no error */
01d6657b 745 if (zerocopy) {
97bc3633 746 skb_shinfo(skb)->destructor_arg = m->msg_control;
01d6657b 747 skb_shinfo(skb)->tx_flags |= SKBTX_DEV_ZEROCOPY;
c9af6db4 748 skb_shinfo(skb)->tx_flags |= SKBTX_SHARED_FRAG;
01d6657b 749 }
29d79196 750 if (vlan) {
6acf54f1
VY
751 skb->dev = vlan->dev;
752 dev_queue_xmit(skb);
29d79196 753 } else {
02df55d2 754 kfree_skb(skb);
29d79196 755 }
ac4e4af1 756 rcu_read_unlock();
20d29d7a 757
97bc3633 758 return total_len;
02df55d2 759
b9fb9ee0
AB
760err_kfree:
761 kfree_skb(skb);
762
02df55d2 763err:
ac4e4af1
VY
764 rcu_read_lock();
765 vlan = rcu_dereference(q->vlan);
02df55d2 766 if (vlan)
cd3e22b7 767 this_cpu_inc(vlan->pcpu_stats->tx_dropped);
ac4e4af1 768 rcu_read_unlock();
02df55d2 769
02df55d2 770 return err;
20d29d7a
AB
771}
772
f5ff53b4 773static ssize_t macvtap_write_iter(struct kiocb *iocb, struct iov_iter *from)
20d29d7a
AB
774{
775 struct file *file = iocb->ki_filp;
02df55d2 776 struct macvtap_queue *q = file->private_data;
20d29d7a 777
f5ff53b4 778 return macvtap_get_user(q, NULL, from, file->f_flags & O_NONBLOCK);
20d29d7a
AB
779}
780
781/* Put packet to the user space buffer */
782static ssize_t macvtap_put_user(struct macvtap_queue *q,
783 const struct sk_buff *skb,
6c36d2e2 784 struct iov_iter *iter)
20d29d7a 785{
20d29d7a 786 int ret;
b9fb9ee0 787 int vnet_hdr_len = 0;
f09e2249 788 int vlan_offset = 0;
6c36d2e2 789 int total;
b9fb9ee0
AB
790
791 if (q->flags & IFF_VNET_HDR) {
792 struct virtio_net_hdr vnet_hdr;
55afbd08 793 vnet_hdr_len = q->vnet_hdr_sz;
6c36d2e2 794 if (iov_iter_count(iter) < vnet_hdr_len)
b9fb9ee0
AB
795 return -EINVAL;
796
fd88d68b
MR
797 ret = virtio_net_hdr_from_skb(skb, &vnet_hdr,
798 macvtap_is_little_endian(q));
799 if (ret)
800 BUG();
b9fb9ee0 801
6c36d2e2
HX
802 if (copy_to_iter(&vnet_hdr, sizeof(vnet_hdr), iter) !=
803 sizeof(vnet_hdr))
b9fb9ee0 804 return -EFAULT;
7cc76f51
JW
805
806 iov_iter_advance(iter, vnet_hdr_len - sizeof(vnet_hdr));
b9fb9ee0 807 }
6c36d2e2 808 total = vnet_hdr_len;
ce232ce0 809 total += skb->len;
f09e2249 810
df8a39de 811 if (skb_vlan_tag_present(skb)) {
f09e2249
BG
812 struct {
813 __be16 h_vlan_proto;
814 __be16 h_vlan_TCI;
815 } veth;
0fbe0d47 816 veth.h_vlan_proto = skb->vlan_proto;
df8a39de 817 veth.h_vlan_TCI = htons(skb_vlan_tag_get(skb));
f09e2249
BG
818
819 vlan_offset = offsetof(struct vlan_ethhdr, h_vlan_proto);
ce232ce0 820 total += VLAN_HLEN;
f09e2249 821
6c36d2e2
HX
822 ret = skb_copy_datagram_iter(skb, 0, iter, vlan_offset);
823 if (ret || !iov_iter_count(iter))
f09e2249
BG
824 goto done;
825
6c36d2e2
HX
826 ret = copy_to_iter(&veth, sizeof(veth), iter);
827 if (ret != sizeof(veth) || !iov_iter_count(iter))
f09e2249
BG
828 goto done;
829 }
20d29d7a 830
6c36d2e2
HX
831 ret = skb_copy_datagram_iter(skb, vlan_offset, iter,
832 skb->len - vlan_offset);
20d29d7a 833
f09e2249 834done:
ce232ce0 835 return ret ? ret : total;
20d29d7a
AB
836}
837
55ec8e25 838static ssize_t macvtap_do_read(struct macvtap_queue *q,
3af0bfe5 839 struct iov_iter *to,
501c774c 840 int noblock)
20d29d7a 841{
ccf7e72b 842 DEFINE_WAIT(wait);
20d29d7a 843 struct sk_buff *skb;
501c774c 844 ssize_t ret = 0;
20d29d7a 845
3af0bfe5
AV
846 if (!iov_iter_count(to))
847 return 0;
848
849 while (1) {
89cee917
JW
850 if (!noblock)
851 prepare_to_wait(sk_sleep(&q->sk), &wait,
852 TASK_INTERRUPTIBLE);
20d29d7a
AB
853
854 /* Read frames from the queue */
855 skb = skb_dequeue(&q->sk.sk_receive_queue);
3af0bfe5
AV
856 if (skb)
857 break;
858 if (noblock) {
859 ret = -EAGAIN;
860 break;
20d29d7a 861 }
3af0bfe5
AV
862 if (signal_pending(current)) {
863 ret = -ERESTARTSYS;
864 break;
865 }
866 /* Nothing to read, let's sleep */
867 schedule();
868 }
a499a2e9
VY
869 if (!noblock)
870 finish_wait(sk_sleep(&q->sk), &wait);
871
3af0bfe5
AV
872 if (skb) {
873 ret = macvtap_put_user(q, skb, to);
f51a5e82
JW
874 if (unlikely(ret < 0))
875 kfree_skb(skb);
876 else
877 consume_skb(skb);
20d29d7a 878 }
501c774c
AB
879 return ret;
880}
881
3af0bfe5 882static ssize_t macvtap_read_iter(struct kiocb *iocb, struct iov_iter *to)
501c774c
AB
883{
884 struct file *file = iocb->ki_filp;
885 struct macvtap_queue *q = file->private_data;
3af0bfe5 886 ssize_t len = iov_iter_count(to), ret;
20d29d7a 887
3af0bfe5 888 ret = macvtap_do_read(q, to, file->f_flags & O_NONBLOCK);
ce232ce0 889 ret = min_t(ssize_t, ret, len);
e6ebc7f1
ZYW
890 if (ret > 0)
891 iocb->ki_pos = ret;
20d29d7a
AB
892 return ret;
893}
894
8f475a31
JW
895static struct macvlan_dev *macvtap_get_vlan(struct macvtap_queue *q)
896{
897 struct macvlan_dev *vlan;
898
441ac0fc
VY
899 ASSERT_RTNL();
900 vlan = rtnl_dereference(q->vlan);
8f475a31
JW
901 if (vlan)
902 dev_hold(vlan->dev);
8f475a31
JW
903
904 return vlan;
905}
906
907static void macvtap_put_vlan(struct macvlan_dev *vlan)
908{
909 dev_put(vlan->dev);
910}
911
815f236d
JW
912static int macvtap_ioctl_set_queue(struct file *file, unsigned int flags)
913{
914 struct macvtap_queue *q = file->private_data;
915 struct macvlan_dev *vlan;
916 int ret;
917
918 vlan = macvtap_get_vlan(q);
919 if (!vlan)
920 return -EINVAL;
921
922 if (flags & IFF_ATTACH_QUEUE)
923 ret = macvtap_enable_queue(vlan->dev, file, q);
924 else if (flags & IFF_DETACH_QUEUE)
925 ret = macvtap_disable_queue(q);
f57855a5
JW
926 else
927 ret = -EINVAL;
815f236d
JW
928
929 macvtap_put_vlan(vlan);
930 return ret;
931}
932
2be5c767
VY
933static int set_offload(struct macvtap_queue *q, unsigned long arg)
934{
935 struct macvlan_dev *vlan;
936 netdev_features_t features;
937 netdev_features_t feature_mask = 0;
938
939 vlan = rtnl_dereference(q->vlan);
940 if (!vlan)
941 return -ENOLINK;
942
943 features = vlan->dev->features;
944
945 if (arg & TUN_F_CSUM) {
946 feature_mask = NETIF_F_HW_CSUM;
947
948 if (arg & (TUN_F_TSO4 | TUN_F_TSO6)) {
949 if (arg & TUN_F_TSO_ECN)
950 feature_mask |= NETIF_F_TSO_ECN;
951 if (arg & TUN_F_TSO4)
952 feature_mask |= NETIF_F_TSO;
953 if (arg & TUN_F_TSO6)
954 feature_mask |= NETIF_F_TSO6;
955 }
e3e3c423
VY
956
957 if (arg & TUN_F_UFO)
958 feature_mask |= NETIF_F_UFO;
2be5c767
VY
959 }
960
961 /* tun/tap driver inverts the usage for TSO offloads, where
962 * setting the TSO bit means that the userspace wants to
963 * accept TSO frames and turning it off means that user space
964 * does not support TSO.
965 * For macvtap, we have to invert it to mean the same thing.
966 * When user space turns off TSO, we turn off GSO/LRO so that
967 * user-space will not receive TSO frames.
968 */
e3e3c423 969 if (feature_mask & (NETIF_F_TSO | NETIF_F_TSO6 | NETIF_F_UFO))
2be5c767
VY
970 features |= RX_OFFLOADS;
971 else
972 features &= ~RX_OFFLOADS;
973
974 /* tap_features are the same as features on tun/tap and
975 * reflect user expectations.
976 */
a567dd62 977 vlan->tap_features = feature_mask;
2be5c767
VY
978 vlan->set_features = features;
979 netdev_update_features(vlan->dev);
980
981 return 0;
982}
983
20d29d7a
AB
984/*
985 * provide compatibility with generic tun/tap interface
986 */
987static long macvtap_ioctl(struct file *file, unsigned int cmd,
988 unsigned long arg)
989{
02df55d2
AB
990 struct macvtap_queue *q = file->private_data;
991 struct macvlan_dev *vlan;
20d29d7a
AB
992 void __user *argp = (void __user *)arg;
993 struct ifreq __user *ifr = argp;
994 unsigned int __user *up = argp;
39ec7de7 995 unsigned short u;
55afbd08 996 int __user *sp = argp;
7f460d30 997 struct sockaddr sa;
55afbd08 998 int s;
02df55d2 999 int ret;
20d29d7a
AB
1000
1001 switch (cmd) {
1002 case TUNSETIFF:
1003 /* ignore the name, just look at flags */
1004 if (get_user(u, &ifr->ifr_flags))
1005 return -EFAULT;
b9fb9ee0
AB
1006
1007 ret = 0;
6ae7feb3 1008 if ((u & ~MACVTAP_FEATURES) != (IFF_NO_PI | IFF_TAP))
b9fb9ee0
AB
1009 ret = -EINVAL;
1010 else
39ec7de7 1011 q->flags = (q->flags & ~MACVTAP_FEATURES) | u;
b9fb9ee0
AB
1012
1013 return ret;
20d29d7a
AB
1014
1015 case TUNGETIFF:
441ac0fc 1016 rtnl_lock();
8f475a31 1017 vlan = macvtap_get_vlan(q);
441ac0fc
VY
1018 if (!vlan) {
1019 rtnl_unlock();
20d29d7a 1020 return -ENOLINK;
441ac0fc 1021 }
20d29d7a 1022
02df55d2 1023 ret = 0;
39ec7de7 1024 u = q->flags;
13707f9e 1025 if (copy_to_user(&ifr->ifr_name, vlan->dev->name, IFNAMSIZ) ||
39ec7de7 1026 put_user(u, &ifr->ifr_flags))
02df55d2 1027 ret = -EFAULT;
8f475a31 1028 macvtap_put_vlan(vlan);
441ac0fc 1029 rtnl_unlock();
02df55d2 1030 return ret;
20d29d7a 1031
815f236d
JW
1032 case TUNSETQUEUE:
1033 if (get_user(u, &ifr->ifr_flags))
1034 return -EFAULT;
441ac0fc
VY
1035 rtnl_lock();
1036 ret = macvtap_ioctl_set_queue(file, u);
1037 rtnl_unlock();
82a19eb8 1038 return ret;
815f236d 1039
20d29d7a 1040 case TUNGETFEATURES:
6ae7feb3 1041 if (put_user(IFF_TAP | IFF_NO_PI | MACVTAP_FEATURES, up))
20d29d7a
AB
1042 return -EFAULT;
1043 return 0;
1044
1045 case TUNSETSNDBUF:
3ea79249 1046 if (get_user(s, sp))
20d29d7a
AB
1047 return -EFAULT;
1048
3ea79249 1049 q->sk.sk_sndbuf = s;
20d29d7a
AB
1050 return 0;
1051
55afbd08
MT
1052 case TUNGETVNETHDRSZ:
1053 s = q->vnet_hdr_sz;
1054 if (put_user(s, sp))
1055 return -EFAULT;
1056 return 0;
1057
1058 case TUNSETVNETHDRSZ:
1059 if (get_user(s, sp))
1060 return -EFAULT;
1061 if (s < (int)sizeof(struct virtio_net_hdr))
1062 return -EINVAL;
1063
1064 q->vnet_hdr_sz = s;
1065 return 0;
1066
01b07fb3
MT
1067 case TUNGETVNETLE:
1068 s = !!(q->flags & MACVTAP_VNET_LE);
1069 if (put_user(s, sp))
1070 return -EFAULT;
1071 return 0;
1072
1073 case TUNSETVNETLE:
1074 if (get_user(s, sp))
1075 return -EFAULT;
1076 if (s)
1077 q->flags |= MACVTAP_VNET_LE;
1078 else
1079 q->flags &= ~MACVTAP_VNET_LE;
1080 return 0;
1081
8b8e658b
GK
1082 case TUNGETVNETBE:
1083 return macvtap_get_vnet_be(q, sp);
1084
1085 case TUNSETVNETBE:
1086 return macvtap_set_vnet_be(q, sp);
1087
20d29d7a
AB
1088 case TUNSETOFFLOAD:
1089 /* let the user check for future flags */
1090 if (arg & ~(TUN_F_CSUM | TUN_F_TSO4 | TUN_F_TSO6 |
e3e3c423 1091 TUN_F_TSO_ECN | TUN_F_UFO))
20d29d7a
AB
1092 return -EINVAL;
1093
2be5c767
VY
1094 rtnl_lock();
1095 ret = set_offload(q, arg);
1096 rtnl_unlock();
1097 return ret;
20d29d7a 1098
b5082083
JC
1099 case SIOCGIFHWADDR:
1100 rtnl_lock();
1101 vlan = macvtap_get_vlan(q);
1102 if (!vlan) {
1103 rtnl_unlock();
1104 return -ENOLINK;
1105 }
1106 ret = 0;
1107 u = vlan->dev->type;
1108 if (copy_to_user(&ifr->ifr_name, vlan->dev->name, IFNAMSIZ) ||
1109 copy_to_user(&ifr->ifr_hwaddr.sa_data, vlan->dev->dev_addr, ETH_ALEN) ||
1110 put_user(u, &ifr->ifr_hwaddr.sa_family))
1111 ret = -EFAULT;
1112 macvtap_put_vlan(vlan);
1113 rtnl_unlock();
1114 return ret;
1115
1116 case SIOCSIFHWADDR:
7f460d30
JC
1117 if (copy_from_user(&sa, &ifr->ifr_hwaddr, sizeof(sa)))
1118 return -EFAULT;
b5082083
JC
1119 rtnl_lock();
1120 vlan = macvtap_get_vlan(q);
1121 if (!vlan) {
1122 rtnl_unlock();
1123 return -ENOLINK;
1124 }
7f460d30 1125 ret = dev_set_mac_address(vlan->dev, &sa);
b5082083
JC
1126 macvtap_put_vlan(vlan);
1127 rtnl_unlock();
1128 return ret;
1129
20d29d7a
AB
1130 default:
1131 return -EINVAL;
1132 }
1133}
1134
1135#ifdef CONFIG_COMPAT
1136static long macvtap_compat_ioctl(struct file *file, unsigned int cmd,
1137 unsigned long arg)
1138{
1139 return macvtap_ioctl(file, cmd, (unsigned long)compat_ptr(arg));
1140}
1141#endif
1142
1143static const struct file_operations macvtap_fops = {
1144 .owner = THIS_MODULE,
1145 .open = macvtap_open,
1146 .release = macvtap_release,
3af0bfe5 1147 .read_iter = macvtap_read_iter,
f5ff53b4 1148 .write_iter = macvtap_write_iter,
20d29d7a
AB
1149 .poll = macvtap_poll,
1150 .llseek = no_llseek,
1151 .unlocked_ioctl = macvtap_ioctl,
1152#ifdef CONFIG_COMPAT
1153 .compat_ioctl = macvtap_compat_ioctl,
1154#endif
1155};
1156
1b784140
YX
1157static int macvtap_sendmsg(struct socket *sock, struct msghdr *m,
1158 size_t total_len)
501c774c
AB
1159{
1160 struct macvtap_queue *q = container_of(sock, struct macvtap_queue, sock);
c0371da6 1161 return macvtap_get_user(q, m, &m->msg_iter, m->msg_flags & MSG_DONTWAIT);
501c774c
AB
1162}
1163
1b784140
YX
1164static int macvtap_recvmsg(struct socket *sock, struct msghdr *m,
1165 size_t total_len, int flags)
501c774c
AB
1166{
1167 struct macvtap_queue *q = container_of(sock, struct macvtap_queue, sock);
1168 int ret;
1169 if (flags & ~(MSG_DONTWAIT|MSG_TRUNC))
1170 return -EINVAL;
c0371da6 1171 ret = macvtap_do_read(q, &m->msg_iter, flags & MSG_DONTWAIT);
de2aa476
DM
1172 if (ret > total_len) {
1173 m->msg_flags |= MSG_TRUNC;
1174 ret = flags & MSG_TRUNC ? ret : total_len;
1175 }
501c774c
AB
1176 return ret;
1177}
1178
1179/* Ops structure to mimic raw sockets with tun */
1180static const struct proto_ops macvtap_socket_ops = {
1181 .sendmsg = macvtap_sendmsg,
1182 .recvmsg = macvtap_recvmsg,
1183};
1184
1185/* Get an underlying socket object from tun file. Returns error unless file is
1186 * attached to a device. The returned object works like a packet socket, it
1187 * can be used for sock_sendmsg/sock_recvmsg. The caller is responsible for
1188 * holding a reference to the file for as long as the socket is in use. */
1189struct socket *macvtap_get_socket(struct file *file)
1190{
1191 struct macvtap_queue *q;
1192 if (file->f_op != &macvtap_fops)
1193 return ERR_PTR(-EINVAL);
1194 q = file->private_data;
1195 if (!q)
1196 return ERR_PTR(-EBADFD);
1197 return &q->sock;
1198}
1199EXPORT_SYMBOL_GPL(macvtap_get_socket);
1200
9bf1907f
EB
1201static int macvtap_device_event(struct notifier_block *unused,
1202 unsigned long event, void *ptr)
1203{
351638e7 1204 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
e09eff7f 1205 struct macvlan_dev *vlan;
9bf1907f
EB
1206 struct device *classdev;
1207 dev_t devt;
e09eff7f 1208 int err;
17af2bce 1209 char tap_name[IFNAMSIZ];
9bf1907f
EB
1210
1211 if (dev->rtnl_link_ops != &macvtap_link_ops)
1212 return NOTIFY_DONE;
1213
17af2bce 1214 snprintf(tap_name, IFNAMSIZ, "tap%d", dev->ifindex);
e09eff7f 1215 vlan = netdev_priv(dev);
9bf1907f
EB
1216
1217 switch (event) {
1218 case NETDEV_REGISTER:
1219 /* Create the device node here after the network device has
1220 * been registered but before register_netdevice has
1221 * finished running.
1222 */
e09eff7f
EB
1223 err = macvtap_get_minor(vlan);
1224 if (err)
1225 return notifier_from_errno(err);
1226
1227 devt = MKDEV(MAJOR(macvtap_major), vlan->minor);
17af2bce
MA
1228 classdev = device_create(&macvtap_class, &dev->dev, devt,
1229 dev, tap_name);
e09eff7f
EB
1230 if (IS_ERR(classdev)) {
1231 macvtap_free_minor(vlan);
9bf1907f 1232 return notifier_from_errno(PTR_ERR(classdev));
e09eff7f 1233 }
17af2bce
MA
1234 err = sysfs_create_link(&dev->dev.kobj, &classdev->kobj,
1235 tap_name);
1236 if (err)
1237 return notifier_from_errno(err);
9bf1907f
EB
1238 break;
1239 case NETDEV_UNREGISTER:
e96c37f1
FR
1240 /* vlan->minor == 0 if NETDEV_REGISTER above failed */
1241 if (vlan->minor == 0)
1242 break;
17af2bce 1243 sysfs_remove_link(&dev->dev.kobj, tap_name);
e09eff7f 1244 devt = MKDEV(MAJOR(macvtap_major), vlan->minor);
17af2bce 1245 device_destroy(&macvtap_class, devt);
e09eff7f 1246 macvtap_free_minor(vlan);
9bf1907f
EB
1247 break;
1248 }
1249
1250 return NOTIFY_DONE;
1251}
1252
1253static struct notifier_block macvtap_notifier_block __read_mostly = {
1254 .notifier_call = macvtap_device_event,
1255};
1256
20d29d7a
AB
1257static int macvtap_init(void)
1258{
1259 int err;
1260
1261 err = alloc_chrdev_region(&macvtap_major, 0,
1262 MACVTAP_NUM_DEVS, "macvtap");
1263 if (err)
1264 goto out1;
1265
1266 cdev_init(&macvtap_cdev, &macvtap_fops);
1267 err = cdev_add(&macvtap_cdev, macvtap_major, MACVTAP_NUM_DEVS);
1268 if (err)
1269 goto out2;
1270
17af2bce
MA
1271 err = class_register(&macvtap_class);
1272 if (err)
20d29d7a 1273 goto out3;
20d29d7a 1274
9bf1907f 1275 err = register_netdevice_notifier(&macvtap_notifier_block);
20d29d7a
AB
1276 if (err)
1277 goto out4;
1278
9bf1907f
EB
1279 err = macvlan_link_register(&macvtap_link_ops);
1280 if (err)
1281 goto out5;
1282
20d29d7a
AB
1283 return 0;
1284
9bf1907f
EB
1285out5:
1286 unregister_netdevice_notifier(&macvtap_notifier_block);
20d29d7a 1287out4:
17af2bce 1288 class_unregister(&macvtap_class);
20d29d7a
AB
1289out3:
1290 cdev_del(&macvtap_cdev);
1291out2:
1292 unregister_chrdev_region(macvtap_major, MACVTAP_NUM_DEVS);
1293out1:
1294 return err;
1295}
1296module_init(macvtap_init);
1297
1298static void macvtap_exit(void)
1299{
1300 rtnl_link_unregister(&macvtap_link_ops);
9bf1907f 1301 unregister_netdevice_notifier(&macvtap_notifier_block);
17af2bce 1302 class_unregister(&macvtap_class);
20d29d7a
AB
1303 cdev_del(&macvtap_cdev);
1304 unregister_chrdev_region(macvtap_major, MACVTAP_NUM_DEVS);
d5de1987 1305 idr_destroy(&minor_idr);
20d29d7a
AB
1306}
1307module_exit(macvtap_exit);
1308
1309MODULE_ALIAS_RTNL_LINK("macvtap");
1310MODULE_AUTHOR("Arnd Bergmann <arnd@arndb.de>");
1311MODULE_LICENSE("GPL");
This page took 0.596824 seconds and 5 git commands to generate.