net: phy: Provide Module 4 KSZ9477 errata (DS80000754C)
[linux-2.6-block.git] / drivers / net / veth.c
CommitLineData
09c434b8 1// SPDX-License-Identifier: GPL-2.0-only
e314dbdc
PE
2/*
3 * drivers/net/veth.c
4 *
5 * Copyright (C) 2007 OpenVZ http://openvz.org, SWsoft Inc
6 *
7 * Author: Pavel Emelianov <xemul@openvz.org>
8 * Ethtool interface from: Eric W. Biederman <ebiederm@xmission.com>
9 *
10 */
11
e314dbdc 12#include <linux/netdevice.h>
5a0e3ad6 13#include <linux/slab.h>
e314dbdc
PE
14#include <linux/ethtool.h>
15#include <linux/etherdevice.h>
cf05c700 16#include <linux/u64_stats_sync.h>
e314dbdc 17
f7b12606 18#include <net/rtnetlink.h>
e314dbdc
PE
19#include <net/dst.h>
20#include <net/xfrm.h>
af87a3aa 21#include <net/xdp.h>
ecef969e 22#include <linux/veth.h>
9d9779e7 23#include <linux/module.h>
948d4f21
TM
24#include <linux/bpf.h>
25#include <linux/filter.h>
26#include <linux/ptr_ring.h>
948d4f21 27#include <linux/bpf_trace.h>
aa4e689e 28#include <linux/net_tstamp.h>
a9ca9f9c 29#include <net/page_pool/helpers.h>
e314dbdc
PE
30
31#define DRV_NAME "veth"
32#define DRV_VERSION "1.0"
33
9fc8d518 34#define VETH_XDP_FLAG BIT(0)
948d4f21
TM
35#define VETH_RING_SIZE 256
36#define VETH_XDP_HEADROOM (XDP_PACKET_HEADROOM + NET_IP_ALIGN)
37
9cda7807 38#define VETH_XDP_TX_BULK_SIZE 16
65e6dcf7 39#define VETH_XDP_BATCH 16
9cda7807 40
65780c56 41struct veth_stats {
1c5b82e5
LB
42 u64 rx_drops;
43 /* xdp */
65780c56
LB
44 u64 xdp_packets;
45 u64 xdp_bytes;
1c5b82e5 46 u64 xdp_redirect;
65780c56 47 u64 xdp_drops;
1c5b82e5 48 u64 xdp_tx;
9152cff0 49 u64 xdp_tx_err;
5fe6e567
LB
50 u64 peer_tq_xdp_xmit;
51 u64 peer_tq_xdp_xmit_err;
65780c56
LB
52};
53
4195e54a 54struct veth_rq_stats {
65780c56 55 struct veth_stats vs;
4195e54a
TM
56 struct u64_stats_sync syncp;
57};
58
638264dc 59struct veth_rq {
948d4f21 60 struct napi_struct xdp_napi;
d3256efd 61 struct napi_struct __rcu *napi; /* points to xdp_napi when the latter is initialized */
948d4f21
TM
62 struct net_device *dev;
63 struct bpf_prog __rcu *xdp_prog;
d1396004 64 struct xdp_mem_info xdp_mem;
4195e54a 65 struct veth_rq_stats stats;
948d4f21
TM
66 bool rx_notify_masked;
67 struct ptr_ring xdp_ring;
68 struct xdp_rxq_info xdp_rxq;
0ebab78c 69 struct page_pool *page_pool;
e314dbdc
PE
70};
71
638264dc
TM
72struct veth_priv {
73 struct net_device __rcu *peer;
74 atomic64_t dropped;
75 struct bpf_prog *_xdp_prog;
76 struct veth_rq *rq;
77 unsigned int requested_headroom;
78};
79
9cda7807
TM
80struct veth_xdp_tx_bq {
81 struct xdp_frame *q[VETH_XDP_TX_BULK_SIZE];
82 unsigned int count;
83};
84
e314dbdc
PE
85/*
86 * ethtool interface
87 */
88
d397b968
TM
89struct veth_q_stat_desc {
90 char desc[ETH_GSTRING_LEN];
91 size_t offset;
92};
93
65780c56 94#define VETH_RQ_STAT(m) offsetof(struct veth_stats, m)
d397b968
TM
95
96static const struct veth_q_stat_desc veth_rq_stats_desc[] = {
97 { "xdp_packets", VETH_RQ_STAT(xdp_packets) },
98 { "xdp_bytes", VETH_RQ_STAT(xdp_bytes) },
5fe6e567
LB
99 { "drops", VETH_RQ_STAT(rx_drops) },
100 { "xdp_redirect", VETH_RQ_STAT(xdp_redirect) },
101 { "xdp_drops", VETH_RQ_STAT(xdp_drops) },
102 { "xdp_tx", VETH_RQ_STAT(xdp_tx) },
103 { "xdp_tx_errors", VETH_RQ_STAT(xdp_tx_err) },
d397b968
TM
104};
105
106#define VETH_RQ_STATS_LEN ARRAY_SIZE(veth_rq_stats_desc)
107
5fe6e567
LB
108static const struct veth_q_stat_desc veth_tq_stats_desc[] = {
109 { "xdp_xmit", VETH_RQ_STAT(peer_tq_xdp_xmit) },
110 { "xdp_xmit_errors", VETH_RQ_STAT(peer_tq_xdp_xmit_err) },
111};
112
113#define VETH_TQ_STATS_LEN ARRAY_SIZE(veth_tq_stats_desc)
114
e314dbdc
PE
115static struct {
116 const char string[ETH_GSTRING_LEN];
117} ethtool_stats_keys[] = {
118 { "peer_ifindex" },
119};
120
fefb695a
SF
121struct veth_xdp_buff {
122 struct xdp_buff xdp;
306531f0 123 struct sk_buff *skb;
fefb695a
SF
124};
125
56607b98
PR
126static int veth_get_link_ksettings(struct net_device *dev,
127 struct ethtool_link_ksettings *cmd)
e314dbdc 128{
56607b98
PR
129 cmd->base.speed = SPEED_10000;
130 cmd->base.duplex = DUPLEX_FULL;
131 cmd->base.port = PORT_TP;
132 cmd->base.autoneg = AUTONEG_DISABLE;
e314dbdc
PE
133 return 0;
134}
135
136static void veth_get_drvinfo(struct net_device *dev, struct ethtool_drvinfo *info)
137{
fb3ceec1
WS
138 strscpy(info->driver, DRV_NAME, sizeof(info->driver));
139 strscpy(info->version, DRV_VERSION, sizeof(info->version));
e314dbdc
PE
140}
141
142static void veth_get_strings(struct net_device *dev, u32 stringset, u8 *buf)
143{
a0341b73 144 u8 *p = buf;
d397b968
TM
145 int i, j;
146
e314dbdc
PE
147 switch(stringset) {
148 case ETH_SS_STATS:
d397b968
TM
149 memcpy(p, &ethtool_stats_keys, sizeof(ethtool_stats_keys));
150 p += sizeof(ethtool_stats_keys);
a0341b73
TZ
151 for (i = 0; i < dev->real_num_rx_queues; i++)
152 for (j = 0; j < VETH_RQ_STATS_LEN; j++)
153 ethtool_sprintf(&p, "rx_queue_%u_%.18s",
154 i, veth_rq_stats_desc[j].desc);
155
156 for (i = 0; i < dev->real_num_tx_queues; i++)
157 for (j = 0; j < VETH_TQ_STATS_LEN; j++)
158 ethtool_sprintf(&p, "tx_queue_%u_%.18s",
159 i, veth_tq_stats_desc[j].desc);
4fc41805
LB
160
161 page_pool_ethtool_stats_get_strings(p);
e314dbdc
PE
162 break;
163 }
164}
165
b9f2c044 166static int veth_get_sset_count(struct net_device *dev, int sset)
e314dbdc 167{
b9f2c044
JG
168 switch (sset) {
169 case ETH_SS_STATS:
d397b968 170 return ARRAY_SIZE(ethtool_stats_keys) +
5fe6e567 171 VETH_RQ_STATS_LEN * dev->real_num_rx_queues +
4fc41805
LB
172 VETH_TQ_STATS_LEN * dev->real_num_tx_queues +
173 page_pool_ethtool_stats_get_count();
b9f2c044
JG
174 default:
175 return -EOPNOTSUPP;
176 }
e314dbdc
PE
177}
178
5e316a81
LB
179static void veth_get_page_pool_stats(struct net_device *dev, u64 *data)
180{
181#ifdef CONFIG_PAGE_POOL_STATS
182 struct veth_priv *priv = netdev_priv(dev);
183 struct page_pool_stats pp_stats = {};
184 int i;
185
186 for (i = 0; i < dev->real_num_rx_queues; i++) {
187 if (!priv->rq[i].page_pool)
188 continue;
189 page_pool_get_stats(priv->rq[i].page_pool, &pp_stats);
190 }
191 page_pool_ethtool_stats_get(data, &pp_stats);
192#endif /* CONFIG_PAGE_POOL_STATS */
193}
194
e314dbdc
PE
195static void veth_get_ethtool_stats(struct net_device *dev,
196 struct ethtool_stats *stats, u64 *data)
197{
5fe6e567 198 struct veth_priv *rcv_priv, *priv = netdev_priv(dev);
d0e2c55e 199 struct net_device *peer = rtnl_dereference(priv->peer);
4fc41805 200 int i, j, idx, pp_idx;
e314dbdc 201
d0e2c55e 202 data[0] = peer ? peer->ifindex : 0;
d397b968
TM
203 idx = 1;
204 for (i = 0; i < dev->real_num_rx_queues; i++) {
205 const struct veth_rq_stats *rq_stats = &priv->rq[i].stats;
65780c56 206 const void *stats_base = (void *)&rq_stats->vs;
d397b968
TM
207 unsigned int start;
208 size_t offset;
209
210 do {
068c38ad 211 start = u64_stats_fetch_begin(&rq_stats->syncp);
d397b968
TM
212 for (j = 0; j < VETH_RQ_STATS_LEN; j++) {
213 offset = veth_rq_stats_desc[j].offset;
214 data[idx + j] = *(u64 *)(stats_base + offset);
215 }
068c38ad 216 } while (u64_stats_fetch_retry(&rq_stats->syncp, start));
d397b968
TM
217 idx += VETH_RQ_STATS_LEN;
218 }
4fc41805 219 pp_idx = idx;
5fe6e567
LB
220
221 if (!peer)
4fc41805 222 goto page_pool_stats;
5fe6e567
LB
223
224 rcv_priv = netdev_priv(peer);
225 for (i = 0; i < peer->real_num_rx_queues; i++) {
226 const struct veth_rq_stats *rq_stats = &rcv_priv->rq[i].stats;
227 const void *base = (void *)&rq_stats->vs;
228 unsigned int start, tx_idx = idx;
229 size_t offset;
230
231 tx_idx += (i % dev->real_num_tx_queues) * VETH_TQ_STATS_LEN;
232 do {
068c38ad 233 start = u64_stats_fetch_begin(&rq_stats->syncp);
5fe6e567
LB
234 for (j = 0; j < VETH_TQ_STATS_LEN; j++) {
235 offset = veth_tq_stats_desc[j].offset;
236 data[tx_idx + j] += *(u64 *)(base + offset);
237 }
068c38ad 238 } while (u64_stats_fetch_retry(&rq_stats->syncp, start));
4fc41805
LB
239 pp_idx = tx_idx + VETH_TQ_STATS_LEN;
240 }
241
242page_pool_stats:
5e316a81 243 veth_get_page_pool_stats(dev, &data[pp_idx]);
e314dbdc
PE
244}
245
34829eec
MF
246static void veth_get_channels(struct net_device *dev,
247 struct ethtool_channels *channels)
248{
249 channels->tx_count = dev->real_num_tx_queues;
250 channels->rx_count = dev->real_num_rx_queues;
4752eeb3
PA
251 channels->max_tx = dev->num_tx_queues;
252 channels->max_rx = dev->num_rx_queues;
34829eec
MF
253}
254
4752eeb3
PA
255static int veth_set_channels(struct net_device *dev,
256 struct ethtool_channels *ch);
257
0fc0b732 258static const struct ethtool_ops veth_ethtool_ops = {
e314dbdc
PE
259 .get_drvinfo = veth_get_drvinfo,
260 .get_link = ethtool_op_get_link,
e314dbdc 261 .get_strings = veth_get_strings,
b9f2c044 262 .get_sset_count = veth_get_sset_count,
e314dbdc 263 .get_ethtool_stats = veth_get_ethtool_stats,
56607b98 264 .get_link_ksettings = veth_get_link_ksettings,
056b21fb 265 .get_ts_info = ethtool_op_get_ts_info,
34829eec 266 .get_channels = veth_get_channels,
4752eeb3 267 .set_channels = veth_set_channels,
e314dbdc
PE
268};
269
948d4f21
TM
270/* general routines */
271
9fc8d518
TM
272static bool veth_is_xdp_frame(void *ptr)
273{
274 return (unsigned long)ptr & VETH_XDP_FLAG;
275}
276
defcffeb 277static struct xdp_frame *veth_ptr_to_xdp(void *ptr)
9fc8d518
TM
278{
279 return (void *)((unsigned long)ptr & ~VETH_XDP_FLAG);
280}
281
defcffeb 282static void *veth_xdp_to_ptr(struct xdp_frame *xdp)
af87a3aa 283{
defcffeb 284 return (void *)((unsigned long)xdp | VETH_XDP_FLAG);
af87a3aa
TM
285}
286
9fc8d518
TM
287static void veth_ptr_free(void *ptr)
288{
289 if (veth_is_xdp_frame(ptr))
290 xdp_return_frame(veth_ptr_to_xdp(ptr));
291 else
292 kfree_skb(ptr);
293}
294
638264dc 295static void __veth_xdp_flush(struct veth_rq *rq)
948d4f21
TM
296{
297 /* Write ptr_ring before reading rx_notify_masked */
298 smp_mb();
68468d8c
ED
299 if (!READ_ONCE(rq->rx_notify_masked) &&
300 napi_schedule_prep(&rq->xdp_napi)) {
301 WRITE_ONCE(rq->rx_notify_masked, true);
302 __napi_schedule(&rq->xdp_napi);
948d4f21
TM
303 }
304}
305
638264dc 306static int veth_xdp_rx(struct veth_rq *rq, struct sk_buff *skb)
948d4f21 307{
638264dc 308 if (unlikely(ptr_ring_produce(&rq->xdp_ring, skb))) {
948d4f21
TM
309 dev_kfree_skb_any(skb);
310 return NET_RX_DROP;
311 }
312
313 return NET_RX_SUCCESS;
314}
315
638264dc
TM
316static int veth_forward_skb(struct net_device *dev, struct sk_buff *skb,
317 struct veth_rq *rq, bool xdp)
e314dbdc 318{
948d4f21 319 return __dev_forward_skb(dev, skb) ?: xdp ?
638264dc 320 veth_xdp_rx(rq, skb) :
baebdf48 321 __netif_rx(skb);
948d4f21
TM
322}
323
47e550e0
PA
324/* return true if the specified skb has chances of GRO aggregation
325 * Don't strive for accuracy, but try to avoid GRO overhead in the most
326 * common scenarios.
327 * When XDP is enabled, all traffic is considered eligible, as the xmit
328 * device has TSO off.
329 * When TSO is enabled on the xmit device, we are likely interested only
330 * in UDP aggregation, explicitly check for that if the skb is suspected
331 * - the sock_wfree destructor is used by UDP, ICMP and XDP sockets -
332 * to belong to locally generated UDP traffic.
333 */
334static bool veth_skb_is_eligible_for_gro(const struct net_device *dev,
335 const struct net_device *rcv,
336 const struct sk_buff *skb)
337{
338 return !(dev->features & NETIF_F_ALL_TSO) ||
339 (skb->destructor == sock_wfree &&
340 rcv->features & (NETIF_F_GRO_FRAGLIST | NETIF_F_GRO_UDP_FWD));
341}
342
948d4f21
TM
343static netdev_tx_t veth_xmit(struct sk_buff *skb, struct net_device *dev)
344{
345 struct veth_priv *rcv_priv, *priv = netdev_priv(dev);
638264dc 346 struct veth_rq *rq = NULL;
151e887d 347 int ret = NETDEV_TX_OK;
d0e2c55e 348 struct net_device *rcv;
2681128f 349 int length = skb->len;
d3256efd 350 bool use_napi = false;
638264dc 351 int rxq;
e314dbdc 352
d0e2c55e
ED
353 rcu_read_lock();
354 rcv = rcu_dereference(priv->peer);
726e2c59 355 if (unlikely(!rcv) || !pskb_may_pull(skb, ETH_HLEN)) {
d0e2c55e
ED
356 kfree_skb(skb);
357 goto drop;
358 }
e314dbdc 359
948d4f21 360 rcv_priv = netdev_priv(rcv);
638264dc
TM
361 rxq = skb_get_queue_mapping(skb);
362 if (rxq < rcv->real_num_rx_queues) {
363 rq = &rcv_priv->rq[rxq];
d3256efd
PA
364
365 /* The napi pointer is available when an XDP program is
366 * attached or when GRO is enabled
47e550e0 367 * Don't bother with napi/GRO if the skb can't be aggregated
d3256efd 368 */
47e550e0
PA
369 use_napi = rcu_access_pointer(rq->napi) &&
370 veth_skb_is_eligible_for_gro(dev, rcv, skb);
638264dc 371 }
948d4f21 372
aa4e689e 373 skb_tx_timestamp(skb);
d3256efd
PA
374 if (likely(veth_forward_skb(rcv, skb, rq, use_napi) == NET_RX_SUCCESS)) {
375 if (!use_napi)
b4fba476 376 dev_lstats_add(dev, length);
215eb9f9
LC
377 else
378 __veth_xdp_flush(rq);
2681128f 379 } else {
d0e2c55e 380drop:
2681128f 381 atomic64_inc(&priv->dropped);
151e887d 382 ret = NET_XMIT_DROP;
2681128f 383 }
948d4f21 384
d0e2c55e 385 rcu_read_unlock();
948d4f21 386
151e887d 387 return ret;
e314dbdc
PE
388}
389
b4fba476 390static u64 veth_stats_tx(struct net_device *dev, u64 *packets, u64 *bytes)
e314dbdc 391{
cf05c700 392 struct veth_priv *priv = netdev_priv(dev);
cf05c700 393
b4fba476 394 dev_lstats_read(dev, packets, bytes);
2681128f
ED
395 return atomic64_read(&priv->dropped);
396}
397
65780c56 398static void veth_stats_rx(struct veth_stats *result, struct net_device *dev)
4195e54a
TM
399{
400 struct veth_priv *priv = netdev_priv(dev);
401 int i;
402
5fe6e567 403 result->peer_tq_xdp_xmit_err = 0;
4195e54a 404 result->xdp_packets = 0;
d99a7c2f 405 result->xdp_tx_err = 0;
4195e54a 406 result->xdp_bytes = 0;
66fe4a07 407 result->rx_drops = 0;
4195e54a 408 for (i = 0; i < dev->num_rx_queues; i++) {
5fe6e567 409 u64 packets, bytes, drops, xdp_tx_err, peer_tq_xdp_xmit_err;
4195e54a 410 struct veth_rq_stats *stats = &priv->rq[i].stats;
4195e54a
TM
411 unsigned int start;
412
413 do {
068c38ad 414 start = u64_stats_fetch_begin(&stats->syncp);
5fe6e567 415 peer_tq_xdp_xmit_err = stats->vs.peer_tq_xdp_xmit_err;
d99a7c2f 416 xdp_tx_err = stats->vs.xdp_tx_err;
65780c56
LB
417 packets = stats->vs.xdp_packets;
418 bytes = stats->vs.xdp_bytes;
66fe4a07 419 drops = stats->vs.rx_drops;
068c38ad 420 } while (u64_stats_fetch_retry(&stats->syncp, start));
5fe6e567 421 result->peer_tq_xdp_xmit_err += peer_tq_xdp_xmit_err;
d99a7c2f 422 result->xdp_tx_err += xdp_tx_err;
4195e54a
TM
423 result->xdp_packets += packets;
424 result->xdp_bytes += bytes;
66fe4a07 425 result->rx_drops += drops;
4195e54a
TM
426 }
427}
428
bc1f4470 429static void veth_get_stats64(struct net_device *dev,
430 struct rtnl_link_stats64 *tot)
2681128f
ED
431{
432 struct veth_priv *priv = netdev_priv(dev);
d0e2c55e 433 struct net_device *peer;
65780c56 434 struct veth_stats rx;
b4fba476 435 u64 packets, bytes;
4195e54a 436
b4fba476
ED
437 tot->tx_dropped = veth_stats_tx(dev, &packets, &bytes);
438 tot->tx_bytes = bytes;
439 tot->tx_packets = packets;
2681128f 440
4195e54a 441 veth_stats_rx(&rx, dev);
5fe6e567
LB
442 tot->tx_dropped += rx.xdp_tx_err;
443 tot->rx_dropped = rx.rx_drops + rx.peer_tq_xdp_xmit_err;
4195e54a
TM
444 tot->rx_bytes = rx.xdp_bytes;
445 tot->rx_packets = rx.xdp_packets;
2681128f 446
d0e2c55e
ED
447 rcu_read_lock();
448 peer = rcu_dereference(priv->peer);
449 if (peer) {
e25d5dbc 450 veth_stats_tx(peer, &packets, &bytes);
b4fba476
ED
451 tot->rx_bytes += bytes;
452 tot->rx_packets += packets;
4195e54a
TM
453
454 veth_stats_rx(&rx, peer);
5fe6e567
LB
455 tot->tx_dropped += rx.peer_tq_xdp_xmit_err;
456 tot->rx_dropped += rx.xdp_tx_err;
4195e54a
TM
457 tot->tx_bytes += rx.xdp_bytes;
458 tot->tx_packets += rx.xdp_packets;
d0e2c55e
ED
459 }
460 rcu_read_unlock();
e314dbdc
PE
461}
462
5c70ef85
G
463/* fake multicast ability */
464static void veth_set_multicast_list(struct net_device *dev)
465{
466}
467
638264dc
TM
468static int veth_select_rxq(struct net_device *dev)
469{
470 return smp_processor_id() % dev->real_num_rx_queues;
471}
472
9aa1206e
DB
473static struct net_device *veth_peer_dev(struct net_device *dev)
474{
475 struct veth_priv *priv = netdev_priv(dev);
476
477 /* Callers must be under RCU read side. */
478 return rcu_dereference(priv->peer);
479}
480
af87a3aa 481static int veth_xdp_xmit(struct net_device *dev, int n,
9152cff0
LB
482 struct xdp_frame **frames,
483 u32 flags, bool ndo_xmit)
af87a3aa
TM
484{
485 struct veth_priv *rcv_priv, *priv = netdev_priv(dev);
fdc13979 486 int i, ret = -ENXIO, nxmit = 0;
af87a3aa 487 struct net_device *rcv;
5fe6e567 488 unsigned int max_len;
638264dc 489 struct veth_rq *rq;
af87a3aa 490
5fe6e567 491 if (unlikely(flags & ~XDP_XMIT_FLAGS_MASK))
d99a7c2f 492 return -EINVAL;
af87a3aa 493
5fe6e567 494 rcu_read_lock();
af87a3aa 495 rcv = rcu_dereference(priv->peer);
5fe6e567
LB
496 if (unlikely(!rcv))
497 goto out;
af87a3aa
TM
498
499 rcv_priv = netdev_priv(rcv);
5fe6e567 500 rq = &rcv_priv->rq[veth_select_rxq(rcv)];
0e672f30
THJ
501 /* The napi pointer is set if NAPI is enabled, which ensures that
502 * xdp_ring is initialized on receive side and the peer device is up.
af87a3aa 503 */
0e672f30 504 if (!rcu_access_pointer(rq->napi))
5fe6e567 505 goto out;
af87a3aa
TM
506
507 max_len = rcv->mtu + rcv->hard_header_len + VLAN_HLEN;
508
638264dc 509 spin_lock(&rq->xdp_ring.producer_lock);
af87a3aa
TM
510 for (i = 0; i < n; i++) {
511 struct xdp_frame *frame = frames[i];
512 void *ptr = veth_xdp_to_ptr(frame);
513
5142239a 514 if (unlikely(xdp_get_frame_len(frame) > max_len ||
fdc13979
LB
515 __ptr_ring_produce(&rq->xdp_ring, ptr)))
516 break;
517 nxmit++;
af87a3aa 518 }
638264dc 519 spin_unlock(&rq->xdp_ring.producer_lock);
af87a3aa
TM
520
521 if (flags & XDP_XMIT_FLUSH)
638264dc 522 __veth_xdp_flush(rq);
af87a3aa 523
fdc13979 524 ret = nxmit;
9152cff0 525 if (ndo_xmit) {
5fe6e567 526 u64_stats_update_begin(&rq->stats.syncp);
fdc13979
LB
527 rq->stats.vs.peer_tq_xdp_xmit += nxmit;
528 rq->stats.vs.peer_tq_xdp_xmit_err += n - nxmit;
5fe6e567 529 u64_stats_update_end(&rq->stats.syncp);
9152cff0 530 }
9152cff0 531
5fe6e567 532out:
b23bfa56 533 rcu_read_unlock();
2131479d
TM
534
535 return ret;
af87a3aa
TM
536}
537
9152cff0
LB
538static int veth_ndo_xdp_xmit(struct net_device *dev, int n,
539 struct xdp_frame **frames, u32 flags)
540{
5fe6e567
LB
541 int err;
542
543 err = veth_xdp_xmit(dev, n, frames, flags, true);
544 if (err < 0) {
545 struct veth_priv *priv = netdev_priv(dev);
546
547 atomic64_add(n, &priv->dropped);
548 }
549
550 return err;
9152cff0
LB
551}
552
bd32aa1f 553static void veth_xdp_flush_bq(struct veth_rq *rq, struct veth_xdp_tx_bq *bq)
9cda7807 554{
fdc13979 555 int sent, i, err = 0, drops;
9cda7807 556
bd32aa1f 557 sent = veth_xdp_xmit(rq->dev, bq->count, bq->q, 0, false);
9cda7807
TM
558 if (sent < 0) {
559 err = sent;
560 sent = 0;
9cda7807 561 }
fdc13979
LB
562
563 for (i = sent; unlikely(i < bq->count); i++)
564 xdp_return_frame(bq->q[i]);
565
566 drops = bq->count - sent;
567 trace_xdp_bulk_tx(rq->dev, sent, drops, err);
9cda7807 568
5fe6e567
LB
569 u64_stats_update_begin(&rq->stats.syncp);
570 rq->stats.vs.xdp_tx += sent;
fdc13979 571 rq->stats.vs.xdp_tx_err += drops;
5fe6e567
LB
572 u64_stats_update_end(&rq->stats.syncp);
573
9cda7807
TM
574 bq->count = 0;
575}
576
bd32aa1f 577static void veth_xdp_flush(struct veth_rq *rq, struct veth_xdp_tx_bq *bq)
d1396004 578{
bd32aa1f 579 struct veth_priv *rcv_priv, *priv = netdev_priv(rq->dev);
d1396004 580 struct net_device *rcv;
bd32aa1f 581 struct veth_rq *rcv_rq;
d1396004
TM
582
583 rcu_read_lock();
bd32aa1f 584 veth_xdp_flush_bq(rq, bq);
d1396004
TM
585 rcv = rcu_dereference(priv->peer);
586 if (unlikely(!rcv))
587 goto out;
588
589 rcv_priv = netdev_priv(rcv);
bd32aa1f 590 rcv_rq = &rcv_priv->rq[veth_select_rxq(rcv)];
d1396004 591 /* xdp_ring is initialized on receive side? */
bd32aa1f 592 if (unlikely(!rcu_access_pointer(rcv_rq->xdp_prog)))
d1396004
TM
593 goto out;
594
bd32aa1f 595 __veth_xdp_flush(rcv_rq);
d1396004
TM
596out:
597 rcu_read_unlock();
598}
599
bd32aa1f 600static int veth_xdp_tx(struct veth_rq *rq, struct xdp_buff *xdp,
9cda7807 601 struct veth_xdp_tx_bq *bq)
d1396004 602{
1b698fa5 603 struct xdp_frame *frame = xdp_convert_buff_to_frame(xdp);
d1396004
TM
604
605 if (unlikely(!frame))
606 return -EOVERFLOW;
607
9cda7807 608 if (unlikely(bq->count == VETH_XDP_TX_BULK_SIZE))
bd32aa1f 609 veth_xdp_flush_bq(rq, bq);
9cda7807
TM
610
611 bq->q[bq->count++] = frame;
612
613 return 0;
d1396004
TM
614}
615
65e6dcf7
LB
616static struct xdp_frame *veth_xdp_rcv_one(struct veth_rq *rq,
617 struct xdp_frame *frame,
618 struct veth_xdp_tx_bq *bq,
619 struct veth_stats *stats)
9fc8d518 620{
d1396004 621 struct xdp_frame orig_frame;
9fc8d518 622 struct bpf_prog *xdp_prog;
9fc8d518
TM
623
624 rcu_read_lock();
638264dc 625 xdp_prog = rcu_dereference(rq->xdp_prog);
9fc8d518 626 if (likely(xdp_prog)) {
fefb695a
SF
627 struct veth_xdp_buff vxbuf;
628 struct xdp_buff *xdp = &vxbuf.xdp;
9fc8d518
TM
629 u32 act;
630
fefb695a
SF
631 xdp_convert_frame_to_buff(frame, xdp);
632 xdp->rxq = &rq->xdp_rxq;
306531f0 633 vxbuf.skb = NULL;
9fc8d518 634
fefb695a 635 act = bpf_prog_run_xdp(xdp_prog, xdp);
9fc8d518
TM
636
637 switch (act) {
638 case XDP_PASS:
fefb695a 639 if (xdp_update_frame_from_buff(xdp, frame))
89f479f0 640 goto err_xdp;
9fc8d518 641 break;
d1396004
TM
642 case XDP_TX:
643 orig_frame = *frame;
fefb695a
SF
644 xdp->rxq->mem = frame->mem;
645 if (unlikely(veth_xdp_tx(rq, xdp, bq) < 0)) {
638264dc 646 trace_xdp_exception(rq->dev, xdp_prog, act);
d1396004 647 frame = &orig_frame;
1c5b82e5 648 stats->rx_drops++;
d1396004
TM
649 goto err_xdp;
650 }
1c5b82e5 651 stats->xdp_tx++;
d1396004
TM
652 rcu_read_unlock();
653 goto xdp_xmit;
654 case XDP_REDIRECT:
655 orig_frame = *frame;
fefb695a
SF
656 xdp->rxq->mem = frame->mem;
657 if (xdp_do_redirect(rq->dev, xdp, xdp_prog)) {
d1396004 658 frame = &orig_frame;
1c5b82e5 659 stats->rx_drops++;
d1396004
TM
660 goto err_xdp;
661 }
1c5b82e5 662 stats->xdp_redirect++;
d1396004
TM
663 rcu_read_unlock();
664 goto xdp_xmit;
9fc8d518 665 default:
c8064e5b 666 bpf_warn_invalid_xdp_action(rq->dev, xdp_prog, act);
df561f66 667 fallthrough;
9fc8d518 668 case XDP_ABORTED:
638264dc 669 trace_xdp_exception(rq->dev, xdp_prog, act);
df561f66 670 fallthrough;
9fc8d518 671 case XDP_DROP:
1c5b82e5 672 stats->xdp_drops++;
9fc8d518
TM
673 goto err_xdp;
674 }
675 }
676 rcu_read_unlock();
677
65e6dcf7 678 return frame;
9fc8d518
TM
679err_xdp:
680 rcu_read_unlock();
681 xdp_return_frame(frame);
d1396004 682xdp_xmit:
9fc8d518
TM
683 return NULL;
684}
685
65e6dcf7
LB
686/* frames array contains VETH_XDP_BATCH at most */
687static void veth_xdp_rcv_bulk_skb(struct veth_rq *rq, void **frames,
688 int n_xdpf, struct veth_xdp_tx_bq *bq,
689 struct veth_stats *stats)
690{
691 void *skbs[VETH_XDP_BATCH];
692 int i;
693
694 if (xdp_alloc_skb_bulk(skbs, n_xdpf,
695 GFP_ATOMIC | __GFP_ZERO) < 0) {
696 for (i = 0; i < n_xdpf; i++)
697 xdp_return_frame(frames[i]);
698 stats->rx_drops += n_xdpf;
699
700 return;
701 }
702
703 for (i = 0; i < n_xdpf; i++) {
704 struct sk_buff *skb = skbs[i];
705
706 skb = __xdp_build_skb_from_frame(frames[i], skb,
707 rq->dev);
708 if (!skb) {
709 xdp_return_frame(frames[i]);
710 stats->rx_drops++;
711 continue;
712 }
713 napi_gro_receive(&rq->xdp_napi, skb);
714 }
715}
716
718a18a0 717static void veth_xdp_get(struct xdp_buff *xdp)
948d4f21 718{
718a18a0
LB
719 struct skb_shared_info *sinfo = xdp_get_shared_info_from_buff(xdp);
720 int i;
948d4f21 721
718a18a0
LB
722 get_page(virt_to_page(xdp->data));
723 if (likely(!xdp_buff_has_frags(xdp)))
724 return;
4bf9ffa0 725
718a18a0
LB
726 for (i = 0; i < sinfo->nr_frags; i++)
727 __skb_frag_ref(&sinfo->frags[i]);
728}
948d4f21 729
718a18a0
LB
730static int veth_convert_skb_to_xdp_buff(struct veth_rq *rq,
731 struct xdp_buff *xdp,
732 struct sk_buff **pskb)
733{
734 struct sk_buff *skb = *pskb;
735 u32 frame_sz;
948d4f21
TM
736
737 if (skb_shared(skb) || skb_head_is_locked(skb) ||
7c101318
SB
738 skb_shinfo(skb)->nr_frags ||
739 skb_headroom(skb) < XDP_PACKET_HEADROOM) {
718a18a0 740 u32 size, len, max_head_size, off;
948d4f21 741 struct sk_buff *nskb;
948d4f21 742 struct page *page;
718a18a0 743 int i, head_off;
948d4f21 744
718a18a0
LB
745 /* We need a private copy of the skb and data buffers since
746 * the ebpf program can modify it. We segment the original skb
747 * into order-0 pages without linearize it.
748 *
749 * Make sure we have enough space for linear and paged area
750 */
751 max_head_size = SKB_WITH_OVERHEAD(PAGE_SIZE -
752 VETH_XDP_HEADROOM);
753 if (skb->len > PAGE_SIZE * MAX_SKB_FRAGS + max_head_size)
948d4f21
TM
754 goto drop;
755
718a18a0 756 /* Allocate skb head */
0ebab78c 757 page = page_pool_dev_alloc_pages(rq->page_pool);
948d4f21
TM
758 if (!page)
759 goto drop;
760
9d142ed4 761 nskb = napi_build_skb(page_address(page), PAGE_SIZE);
718a18a0 762 if (!nskb) {
0ebab78c 763 page_pool_put_full_page(rq->page_pool, page, true);
948d4f21
TM
764 goto drop;
765 }
766
718a18a0 767 skb_reserve(nskb, VETH_XDP_HEADROOM);
0ebab78c
LB
768 skb_copy_header(nskb, skb);
769 skb_mark_for_recycle(nskb);
770
718a18a0
LB
771 size = min_t(u32, skb->len, max_head_size);
772 if (skb_copy_bits(skb, 0, nskb->data, size)) {
773 consume_skb(nskb);
948d4f21
TM
774 goto drop;
775 }
718a18a0 776 skb_put(nskb, size);
948d4f21 777
948d4f21
TM
778 head_off = skb_headroom(nskb) - skb_headroom(skb);
779 skb_headers_offset_update(nskb, head_off);
718a18a0
LB
780
781 /* Allocate paged area of new skb */
782 off = size;
783 len = skb->len - off;
784
785 for (i = 0; i < MAX_SKB_FRAGS && off < skb->len; i++) {
0ebab78c 786 page = page_pool_dev_alloc_pages(rq->page_pool);
718a18a0
LB
787 if (!page) {
788 consume_skb(nskb);
789 goto drop;
790 }
791
792 size = min_t(u32, len, PAGE_SIZE);
793 skb_add_rx_frag(nskb, i, page, 0, size, PAGE_SIZE);
794 if (skb_copy_bits(skb, off, page_address(page),
795 size)) {
796 consume_skb(nskb);
797 goto drop;
798 }
799
800 len -= size;
801 off += size;
802 }
803
948d4f21
TM
804 consume_skb(skb);
805 skb = nskb;
806 }
807
45a9e6d8 808 /* SKB "head" area always have tailroom for skb_shared_info */
be9df4af 809 frame_sz = skb_end_pointer(skb) - skb->head;
43b5169d 810 frame_sz += SKB_DATA_ALIGN(sizeof(struct skb_shared_info));
718a18a0
LB
811 xdp_init_buff(xdp, frame_sz, &rq->xdp_rxq);
812 xdp_prepare_buff(xdp, skb->head, skb_headroom(skb),
813 skb_headlen(skb), true);
814
815 if (skb_is_nonlinear(skb)) {
816 skb_shinfo(skb)->xdp_frags_size = skb->data_len;
817 xdp_buff_set_frags_flag(xdp);
818 } else {
819 xdp_buff_clear_frags_flag(xdp);
820 }
821 *pskb = skb;
822
823 return 0;
824drop:
825 consume_skb(skb);
826 *pskb = NULL;
827
828 return -ENOMEM;
829}
830
831static struct sk_buff *veth_xdp_rcv_skb(struct veth_rq *rq,
832 struct sk_buff *skb,
833 struct veth_xdp_tx_bq *bq,
834 struct veth_stats *stats)
835{
836 void *orig_data, *orig_data_end;
837 struct bpf_prog *xdp_prog;
fefb695a
SF
838 struct veth_xdp_buff vxbuf;
839 struct xdp_buff *xdp = &vxbuf.xdp;
718a18a0
LB
840 u32 act, metalen;
841 int off;
842
843 skb_prepare_for_gro(skb);
844
845 rcu_read_lock();
846 xdp_prog = rcu_dereference(rq->xdp_prog);
847 if (unlikely(!xdp_prog)) {
848 rcu_read_unlock();
849 goto out;
850 }
851
852 __skb_push(skb, skb->data - skb_mac_header(skb));
fefb695a 853 if (veth_convert_skb_to_xdp_buff(rq, xdp, &skb))
718a18a0 854 goto drop;
306531f0 855 vxbuf.skb = skb;
45a9e6d8 856
fefb695a
SF
857 orig_data = xdp->data;
858 orig_data_end = xdp->data_end;
948d4f21 859
fefb695a 860 act = bpf_prog_run_xdp(xdp_prog, xdp);
948d4f21
TM
861
862 switch (act) {
863 case XDP_PASS:
864 break;
d1396004 865 case XDP_TX:
fefb695a 866 veth_xdp_get(xdp);
d1396004 867 consume_skb(skb);
fefb695a
SF
868 xdp->rxq->mem = rq->xdp_mem;
869 if (unlikely(veth_xdp_tx(rq, xdp, bq) < 0)) {
638264dc 870 trace_xdp_exception(rq->dev, xdp_prog, act);
1c5b82e5 871 stats->rx_drops++;
d1396004
TM
872 goto err_xdp;
873 }
1c5b82e5 874 stats->xdp_tx++;
d1396004
TM
875 rcu_read_unlock();
876 goto xdp_xmit;
877 case XDP_REDIRECT:
fefb695a 878 veth_xdp_get(xdp);
d1396004 879 consume_skb(skb);
fefb695a
SF
880 xdp->rxq->mem = rq->xdp_mem;
881 if (xdp_do_redirect(rq->dev, xdp, xdp_prog)) {
1c5b82e5 882 stats->rx_drops++;
d1396004 883 goto err_xdp;
1c5b82e5
LB
884 }
885 stats->xdp_redirect++;
d1396004
TM
886 rcu_read_unlock();
887 goto xdp_xmit;
948d4f21 888 default:
c8064e5b 889 bpf_warn_invalid_xdp_action(rq->dev, xdp_prog, act);
df561f66 890 fallthrough;
948d4f21 891 case XDP_ABORTED:
638264dc 892 trace_xdp_exception(rq->dev, xdp_prog, act);
df561f66 893 fallthrough;
948d4f21 894 case XDP_DROP:
1c5b82e5
LB
895 stats->xdp_drops++;
896 goto xdp_drop;
948d4f21
TM
897 }
898 rcu_read_unlock();
899
45a9e6d8 900 /* check if bpf_xdp_adjust_head was used */
fefb695a 901 off = orig_data - xdp->data;
948d4f21
TM
902 if (off > 0)
903 __skb_push(skb, off);
904 else if (off < 0)
905 __skb_pull(skb, -off);
718a18a0
LB
906
907 skb_reset_mac_header(skb);
45a9e6d8
JDB
908
909 /* check if bpf_xdp_adjust_tail was used */
fefb695a 910 off = xdp->data_end - orig_data_end;
948d4f21 911 if (off != 0)
45a9e6d8 912 __skb_put(skb, off); /* positive on grow, negative on shrink */
718a18a0
LB
913
914 /* XDP frag metadata (e.g. nr_frags) are updated in eBPF helpers
915 * (e.g. bpf_xdp_adjust_tail), we need to update data_len here.
916 */
fefb695a 917 if (xdp_buff_has_frags(xdp))
718a18a0
LB
918 skb->data_len = skb_shinfo(skb)->xdp_frags_size;
919 else
920 skb->data_len = 0;
921
638264dc 922 skb->protocol = eth_type_trans(skb, rq->dev);
948d4f21 923
fefb695a 924 metalen = xdp->data - xdp->data_meta;
948d4f21
TM
925 if (metalen)
926 skb_metadata_set(skb, metalen);
927out:
928 return skb;
929drop:
1c5b82e5
LB
930 stats->rx_drops++;
931xdp_drop:
948d4f21
TM
932 rcu_read_unlock();
933 kfree_skb(skb);
934 return NULL;
d1396004
TM
935err_xdp:
936 rcu_read_unlock();
fefb695a 937 xdp_return_buff(xdp);
d1396004
TM
938xdp_xmit:
939 return NULL;
948d4f21
TM
940}
941
1c5b82e5
LB
942static int veth_xdp_rcv(struct veth_rq *rq, int budget,
943 struct veth_xdp_tx_bq *bq,
944 struct veth_stats *stats)
948d4f21 945{
65e6dcf7
LB
946 int i, done = 0, n_xdpf = 0;
947 void *xdpf[VETH_XDP_BATCH];
948d4f21
TM
948
949 for (i = 0; i < budget; i++) {
638264dc 950 void *ptr = __ptr_ring_consume(&rq->xdp_ring);
948d4f21 951
9fc8d518 952 if (!ptr)
948d4f21
TM
953 break;
954
d1396004 955 if (veth_is_xdp_frame(ptr)) {
65e6dcf7 956 /* ndo_xdp_xmit */
4195e54a
TM
957 struct xdp_frame *frame = veth_ptr_to_xdp(ptr);
958
5142239a 959 stats->xdp_bytes += xdp_get_frame_len(frame);
65e6dcf7
LB
960 frame = veth_xdp_rcv_one(rq, frame, bq, stats);
961 if (frame) {
962 /* XDP_PASS */
963 xdpf[n_xdpf++] = frame;
964 if (n_xdpf == VETH_XDP_BATCH) {
965 veth_xdp_rcv_bulk_skb(rq, xdpf, n_xdpf,
966 bq, stats);
967 n_xdpf = 0;
968 }
969 }
d1396004 970 } else {
65e6dcf7
LB
971 /* ndo_start_xmit */
972 struct sk_buff *skb = ptr;
973
1c5b82e5
LB
974 stats->xdp_bytes += skb->len;
975 skb = veth_xdp_rcv_skb(rq, skb, bq, stats);
9695b7de
PA
976 if (skb) {
977 if (skb_shared(skb) || skb_unclone(skb, GFP_ATOMIC))
978 netif_receive_skb(skb);
979 else
980 napi_gro_receive(&rq->xdp_napi, skb);
981 }
d1396004 982 }
948d4f21
TM
983 done++;
984 }
985
65e6dcf7
LB
986 if (n_xdpf)
987 veth_xdp_rcv_bulk_skb(rq, xdpf, n_xdpf, bq, stats);
988
4195e54a 989 u64_stats_update_begin(&rq->stats.syncp);
9152cff0 990 rq->stats.vs.xdp_redirect += stats->xdp_redirect;
1c5b82e5 991 rq->stats.vs.xdp_bytes += stats->xdp_bytes;
66fe4a07
LB
992 rq->stats.vs.xdp_drops += stats->xdp_drops;
993 rq->stats.vs.rx_drops += stats->rx_drops;
65780c56 994 rq->stats.vs.xdp_packets += done;
4195e54a
TM
995 u64_stats_update_end(&rq->stats.syncp);
996
948d4f21
TM
997 return done;
998}
999
1000static int veth_poll(struct napi_struct *napi, int budget)
1001{
638264dc
TM
1002 struct veth_rq *rq =
1003 container_of(napi, struct veth_rq, xdp_napi);
1c5b82e5 1004 struct veth_stats stats = {};
9cda7807 1005 struct veth_xdp_tx_bq bq;
948d4f21
TM
1006 int done;
1007
9cda7807
TM
1008 bq.count = 0;
1009
d1396004 1010 xdp_set_return_frame_no_direct();
1c5b82e5 1011 done = veth_xdp_rcv(rq, budget, &bq, &stats);
948d4f21 1012
fa349e39
SB
1013 if (stats.xdp_redirect > 0)
1014 xdp_do_flush();
1015
948d4f21
TM
1016 if (done < budget && napi_complete_done(napi, done)) {
1017 /* Write rx_notify_masked before reading ptr_ring */
638264dc
TM
1018 smp_store_mb(rq->rx_notify_masked, false);
1019 if (unlikely(!__ptr_ring_empty(&rq->xdp_ring))) {
68468d8c
ED
1020 if (napi_schedule_prep(&rq->xdp_napi)) {
1021 WRITE_ONCE(rq->rx_notify_masked, true);
1022 __napi_schedule(&rq->xdp_napi);
1023 }
948d4f21
TM
1024 }
1025 }
1026
1c5b82e5 1027 if (stats.xdp_tx > 0)
bd32aa1f 1028 veth_xdp_flush(rq, &bq);
d1396004
TM
1029 xdp_clear_return_frame_no_direct();
1030
948d4f21
TM
1031 return done;
1032}
1033
0ebab78c
LB
1034static int veth_create_page_pool(struct veth_rq *rq)
1035{
1036 struct page_pool_params pp_params = {
1037 .order = 0,
1038 .pool_size = VETH_RING_SIZE,
1039 .nid = NUMA_NO_NODE,
1040 .dev = &rq->dev->dev,
1041 };
1042
1043 rq->page_pool = page_pool_create(&pp_params);
1044 if (IS_ERR(rq->page_pool)) {
1045 int err = PTR_ERR(rq->page_pool);
1046
1047 rq->page_pool = NULL;
1048 return err;
1049 }
1050
1051 return 0;
1052}
1053
dedd53c5 1054static int __veth_napi_enable_range(struct net_device *dev, int start, int end)
948d4f21
TM
1055{
1056 struct veth_priv *priv = netdev_priv(dev);
638264dc 1057 int err, i;
948d4f21 1058
0ebab78c
LB
1059 for (i = start; i < end; i++) {
1060 err = veth_create_page_pool(&priv->rq[i]);
1061 if (err)
1062 goto err_page_pool;
1063 }
1064
dedd53c5 1065 for (i = start; i < end; i++) {
638264dc
TM
1066 struct veth_rq *rq = &priv->rq[i];
1067
1068 err = ptr_ring_init(&rq->xdp_ring, VETH_RING_SIZE, GFP_KERNEL);
1069 if (err)
1070 goto err_xdp_ring;
1071 }
948d4f21 1072
dedd53c5 1073 for (i = start; i < end; i++) {
638264dc
TM
1074 struct veth_rq *rq = &priv->rq[i];
1075
638264dc 1076 napi_enable(&rq->xdp_napi);
d3256efd 1077 rcu_assign_pointer(priv->rq[i].napi, &priv->rq[i].xdp_napi);
638264dc 1078 }
948d4f21
TM
1079
1080 return 0;
dedd53c5 1081
638264dc 1082err_xdp_ring:
dedd53c5 1083 for (i--; i >= start; i--)
638264dc 1084 ptr_ring_cleanup(&priv->rq[i].xdp_ring, veth_ptr_free);
8a519a57 1085 i = end;
0ebab78c 1086err_page_pool:
8a519a57 1087 for (i--; i >= start; i--) {
0ebab78c
LB
1088 page_pool_destroy(priv->rq[i].page_pool);
1089 priv->rq[i].page_pool = NULL;
1090 }
638264dc
TM
1091
1092 return err;
948d4f21
TM
1093}
1094
dedd53c5
PA
1095static int __veth_napi_enable(struct net_device *dev)
1096{
1097 return __veth_napi_enable_range(dev, 0, dev->real_num_rx_queues);
1098}
1099
1100static void veth_napi_del_range(struct net_device *dev, int start, int end)
948d4f21
TM
1101{
1102 struct veth_priv *priv = netdev_priv(dev);
638264dc 1103 int i;
948d4f21 1104
dedd53c5 1105 for (i = start; i < end; i++) {
638264dc
TM
1106 struct veth_rq *rq = &priv->rq[i];
1107
d3256efd 1108 rcu_assign_pointer(priv->rq[i].napi, NULL);
638264dc 1109 napi_disable(&rq->xdp_napi);
5198d545 1110 __netif_napi_del(&rq->xdp_napi);
638264dc
TM
1111 }
1112 synchronize_net();
1113
dedd53c5 1114 for (i = start; i < end; i++) {
638264dc
TM
1115 struct veth_rq *rq = &priv->rq[i];
1116
638264dc
TM
1117 rq->rx_notify_masked = false;
1118 ptr_ring_cleanup(&rq->xdp_ring, veth_ptr_free);
1119 }
0ebab78c
LB
1120
1121 for (i = start; i < end; i++) {
1122 page_pool_destroy(priv->rq[i].page_pool);
1123 priv->rq[i].page_pool = NULL;
1124 }
948d4f21
TM
1125}
1126
dedd53c5
PA
1127static void veth_napi_del(struct net_device *dev)
1128{
1129 veth_napi_del_range(dev, 0, dev->real_num_rx_queues);
1130}
1131
d3256efd
PA
1132static bool veth_gro_requested(const struct net_device *dev)
1133{
1134 return !!(dev->wanted_features & NETIF_F_GRO);
1135}
1136
dedd53c5
PA
1137static int veth_enable_xdp_range(struct net_device *dev, int start, int end,
1138 bool napi_already_on)
948d4f21
TM
1139{
1140 struct veth_priv *priv = netdev_priv(dev);
638264dc 1141 int err, i;
948d4f21 1142
dedd53c5
PA
1143 for (i = start; i < end; i++) {
1144 struct veth_rq *rq = &priv->rq[i];
948d4f21 1145
dedd53c5 1146 if (!napi_already_on)
b48b89f9 1147 netif_napi_add(dev, &rq->xdp_napi, veth_poll);
dedd53c5
PA
1148 err = xdp_rxq_info_reg(&rq->xdp_rxq, dev, i, rq->xdp_napi.napi_id);
1149 if (err < 0)
1150 goto err_rxq_reg;
1151
1152 err = xdp_rxq_info_reg_mem_model(&rq->xdp_rxq,
1153 MEM_TYPE_PAGE_SHARED,
1154 NULL);
1155 if (err < 0)
1156 goto err_reg_mem;
1157
1158 /* Save original mem info as it can be overwritten */
1159 rq->xdp_mem = rq->xdp_rxq.mem;
1160 }
1161 return 0;
638264dc 1162
dedd53c5
PA
1163err_reg_mem:
1164 xdp_rxq_info_unreg(&priv->rq[i].xdp_rxq);
1165err_rxq_reg:
1166 for (i--; i >= start; i--) {
1167 struct veth_rq *rq = &priv->rq[i];
638264dc 1168
dedd53c5
PA
1169 xdp_rxq_info_unreg(&rq->xdp_rxq);
1170 if (!napi_already_on)
1171 netif_napi_del(&rq->xdp_napi);
1172 }
1173
1174 return err;
1175}
1176
1177static void veth_disable_xdp_range(struct net_device *dev, int start, int end,
1178 bool delete_napi)
1179{
1180 struct veth_priv *priv = netdev_priv(dev);
1181 int i;
1182
1183 for (i = start; i < end; i++) {
1184 struct veth_rq *rq = &priv->rq[i];
1185
1186 rq->xdp_rxq.mem = rq->xdp_mem;
1187 xdp_rxq_info_unreg(&rq->xdp_rxq);
1188
1189 if (delete_napi)
1190 netif_napi_del(&rq->xdp_napi);
1191 }
1192}
1193
1194static int veth_enable_xdp(struct net_device *dev)
1195{
5e8d3dc7 1196 bool napi_already_on = veth_gro_requested(dev) && (dev->flags & IFF_UP);
dedd53c5
PA
1197 struct veth_priv *priv = netdev_priv(dev);
1198 int err, i;
1199
1200 if (!xdp_rxq_info_is_reg(&priv->rq[0].xdp_rxq)) {
1201 err = veth_enable_xdp_range(dev, 0, dev->real_num_rx_queues, napi_already_on);
1202 if (err)
1203 return err;
948d4f21 1204
d3256efd
PA
1205 if (!napi_already_on) {
1206 err = __veth_napi_enable(dev);
dedd53c5
PA
1207 if (err) {
1208 veth_disable_xdp_range(dev, 0, dev->real_num_rx_queues, true);
1209 return err;
1210 }
d3256efd
PA
1211
1212 if (!veth_gro_requested(dev)) {
1213 /* user-space did not require GRO, but adding XDP
1214 * is supposed to get GRO working
1215 */
1216 dev->features |= NETIF_F_GRO;
1217 netdev_features_change(dev);
1218 }
1219 }
948d4f21
TM
1220 }
1221
d3256efd 1222 for (i = 0; i < dev->real_num_rx_queues; i++) {
638264dc 1223 rcu_assign_pointer(priv->rq[i].xdp_prog, priv->_xdp_prog);
d3256efd
PA
1224 rcu_assign_pointer(priv->rq[i].napi, &priv->rq[i].xdp_napi);
1225 }
948d4f21
TM
1226
1227 return 0;
948d4f21
TM
1228}
1229
1230static void veth_disable_xdp(struct net_device *dev)
1231{
1232 struct veth_priv *priv = netdev_priv(dev);
638264dc 1233 int i;
948d4f21 1234
638264dc
TM
1235 for (i = 0; i < dev->real_num_rx_queues; i++)
1236 rcu_assign_pointer(priv->rq[i].xdp_prog, NULL);
d3256efd
PA
1237
1238 if (!netif_running(dev) || !veth_gro_requested(dev)) {
1239 veth_napi_del(dev);
1240
1241 /* if user-space did not require GRO, since adding XDP
1242 * enabled it, clear it now
1243 */
1244 if (!veth_gro_requested(dev) && netif_running(dev)) {
1245 dev->features &= ~NETIF_F_GRO;
1246 netdev_features_change(dev);
1247 }
1248 }
1249
dedd53c5 1250 veth_disable_xdp_range(dev, 0, dev->real_num_rx_queues, false);
948d4f21
TM
1251}
1252
dedd53c5 1253static int veth_napi_enable_range(struct net_device *dev, int start, int end)
d3256efd
PA
1254{
1255 struct veth_priv *priv = netdev_priv(dev);
1256 int err, i;
1257
dedd53c5 1258 for (i = start; i < end; i++) {
d3256efd
PA
1259 struct veth_rq *rq = &priv->rq[i];
1260
b48b89f9 1261 netif_napi_add(dev, &rq->xdp_napi, veth_poll);
d3256efd
PA
1262 }
1263
dedd53c5 1264 err = __veth_napi_enable_range(dev, start, end);
d3256efd 1265 if (err) {
dedd53c5 1266 for (i = start; i < end; i++) {
d3256efd
PA
1267 struct veth_rq *rq = &priv->rq[i];
1268
1269 netif_napi_del(&rq->xdp_napi);
1270 }
1271 return err;
1272 }
1273 return err;
1274}
1275
dedd53c5
PA
1276static int veth_napi_enable(struct net_device *dev)
1277{
1278 return veth_napi_enable_range(dev, 0, dev->real_num_rx_queues);
1279}
1280
4752eeb3
PA
1281static void veth_disable_range_safe(struct net_device *dev, int start, int end)
1282{
1283 struct veth_priv *priv = netdev_priv(dev);
1284
1285 if (start >= end)
1286 return;
1287
1288 if (priv->_xdp_prog) {
1289 veth_napi_del_range(dev, start, end);
1290 veth_disable_xdp_range(dev, start, end, false);
1291 } else if (veth_gro_requested(dev)) {
1292 veth_napi_del_range(dev, start, end);
1293 }
1294}
1295
1296static int veth_enable_range_safe(struct net_device *dev, int start, int end)
1297{
1298 struct veth_priv *priv = netdev_priv(dev);
1299 int err;
1300
1301 if (start >= end)
1302 return 0;
1303
1304 if (priv->_xdp_prog) {
1305 /* these channels are freshly initialized, napi is not on there even
1306 * when GRO is requeste
1307 */
1308 err = veth_enable_xdp_range(dev, start, end, false);
1309 if (err)
1310 return err;
1311
1312 err = __veth_napi_enable_range(dev, start, end);
1313 if (err) {
1314 /* on error always delete the newly added napis */
1315 veth_disable_xdp_range(dev, start, end, true);
1316 return err;
1317 }
1318 } else if (veth_gro_requested(dev)) {
1319 return veth_napi_enable_range(dev, start, end);
1320 }
1321 return 0;
1322}
1323
fccca038
LB
1324static void veth_set_xdp_features(struct net_device *dev)
1325{
1326 struct veth_priv *priv = netdev_priv(dev);
1327 struct net_device *peer;
1328
5ce76fe1 1329 peer = rtnl_dereference(priv->peer);
fccca038 1330 if (peer && peer->real_num_tx_queues <= dev->real_num_rx_queues) {
8267fc71 1331 struct veth_priv *priv_peer = netdev_priv(peer);
fccca038
LB
1332 xdp_features_t val = NETDEV_XDP_ACT_BASIC |
1333 NETDEV_XDP_ACT_REDIRECT |
1334 NETDEV_XDP_ACT_RX_SG;
1335
8267fc71 1336 if (priv_peer->_xdp_prog || veth_gro_requested(peer))
fccca038
LB
1337 val |= NETDEV_XDP_ACT_NDO_XMIT |
1338 NETDEV_XDP_ACT_NDO_XMIT_SG;
1339 xdp_set_features_flag(dev, val);
1340 } else {
1341 xdp_clear_features_flag(dev);
1342 }
1343}
1344
4752eeb3
PA
1345static int veth_set_channels(struct net_device *dev,
1346 struct ethtool_channels *ch)
1347{
1348 struct veth_priv *priv = netdev_priv(dev);
1349 unsigned int old_rx_count, new_rx_count;
1350 struct veth_priv *peer_priv;
1351 struct net_device *peer;
1352 int err;
1353
1354 /* sanity check. Upper bounds are already enforced by the caller */
1355 if (!ch->rx_count || !ch->tx_count)
1356 return -EINVAL;
1357
1358 /* avoid braking XDP, if that is enabled */
1359 peer = rtnl_dereference(priv->peer);
1360 peer_priv = peer ? netdev_priv(peer) : NULL;
1361 if (priv->_xdp_prog && peer && ch->rx_count < peer->real_num_tx_queues)
1362 return -EINVAL;
1363
1364 if (peer && peer_priv && peer_priv->_xdp_prog && ch->tx_count > peer->real_num_rx_queues)
1365 return -EINVAL;
1366
1367 old_rx_count = dev->real_num_rx_queues;
1368 new_rx_count = ch->rx_count;
1369 if (netif_running(dev)) {
1370 /* turn device off */
1371 netif_carrier_off(dev);
1372 if (peer)
1373 netif_carrier_off(peer);
1374
1375 /* try to allocate new resurces, as needed*/
1376 err = veth_enable_range_safe(dev, old_rx_count, new_rx_count);
1377 if (err)
1378 goto out;
1379 }
1380
1381 err = netif_set_real_num_rx_queues(dev, ch->rx_count);
1382 if (err)
1383 goto revert;
1384
1385 err = netif_set_real_num_tx_queues(dev, ch->tx_count);
1386 if (err) {
1387 int err2 = netif_set_real_num_rx_queues(dev, old_rx_count);
1388
1389 /* this error condition could happen only if rx and tx change
1390 * in opposite directions (e.g. tx nr raises, rx nr decreases)
1391 * and we can't do anything to fully restore the original
1392 * status
1393 */
1394 if (err2)
1395 pr_warn("Can't restore rx queues config %d -> %d %d",
1396 new_rx_count, old_rx_count, err2);
1397 else
1398 goto revert;
1399 }
1400
1401out:
1402 if (netif_running(dev)) {
1403 /* note that we need to swap the arguments WRT the enable part
1404 * to identify the range we have to disable
1405 */
1406 veth_disable_range_safe(dev, new_rx_count, old_rx_count);
1407 netif_carrier_on(dev);
1408 if (peer)
1409 netif_carrier_on(peer);
1410 }
fccca038
LB
1411
1412 /* update XDP supported features */
1413 veth_set_xdp_features(dev);
1414 if (peer)
1415 veth_set_xdp_features(peer);
1416
4752eeb3
PA
1417 return err;
1418
1419revert:
1420 new_rx_count = old_rx_count;
1421 old_rx_count = ch->rx_count;
1422 goto out;
1423}
1424
e314dbdc
PE
1425static int veth_open(struct net_device *dev)
1426{
5e8d3dc7 1427 struct veth_priv *priv = netdev_priv(dev);
d0e2c55e 1428 struct net_device *peer = rtnl_dereference(priv->peer);
948d4f21 1429 int err;
e314dbdc 1430
d0e2c55e 1431 if (!peer)
e314dbdc
PE
1432 return -ENOTCONN;
1433
948d4f21
TM
1434 if (priv->_xdp_prog) {
1435 err = veth_enable_xdp(dev);
1436 if (err)
1437 return err;
5e8d3dc7 1438 } else if (veth_gro_requested(dev)) {
d3256efd
PA
1439 err = veth_napi_enable(dev);
1440 if (err)
1441 return err;
948d4f21
TM
1442 }
1443
d0e2c55e 1444 if (peer->flags & IFF_UP) {
e314dbdc 1445 netif_carrier_on(dev);
d0e2c55e 1446 netif_carrier_on(peer);
e314dbdc 1447 }
948d4f21 1448
e314dbdc
PE
1449 return 0;
1450}
1451
2cf48a10
EB
1452static int veth_close(struct net_device *dev)
1453{
5e8d3dc7 1454 struct veth_priv *priv = netdev_priv(dev);
2efd32ee 1455 struct net_device *peer = rtnl_dereference(priv->peer);
2cf48a10
EB
1456
1457 netif_carrier_off(dev);
5e8d3dc7
HQ
1458 if (peer)
1459 netif_carrier_off(peer);
2cf48a10 1460
5e8d3dc7 1461 if (priv->_xdp_prog)
948d4f21 1462 veth_disable_xdp(dev);
5e8d3dc7 1463 else if (veth_gro_requested(dev))
d3256efd 1464 veth_napi_del(dev);
948d4f21 1465
2cf48a10
EB
1466 return 0;
1467}
1468
91572088 1469static int is_valid_veth_mtu(int mtu)
38d40815 1470{
91572088 1471 return mtu >= ETH_MIN_MTU && mtu <= ETH_MAX_MTU;
38d40815
EB
1472}
1473
7797b93b
TM
1474static int veth_alloc_queues(struct net_device *dev)
1475{
1476 struct veth_priv *priv = netdev_priv(dev);
1477 int i;
1478
961c6136 1479 priv->rq = kcalloc(dev->num_rx_queues, sizeof(*priv->rq), GFP_KERNEL_ACCOUNT);
7797b93b
TM
1480 if (!priv->rq)
1481 return -ENOMEM;
1482
4195e54a 1483 for (i = 0; i < dev->num_rx_queues; i++) {
7797b93b 1484 priv->rq[i].dev = dev;
4195e54a
TM
1485 u64_stats_init(&priv->rq[i].stats.syncp);
1486 }
7797b93b
TM
1487
1488 return 0;
1489}
1490
1491static void veth_free_queues(struct net_device *dev)
1492{
1493 struct veth_priv *priv = netdev_priv(dev);
1494
1495 kfree(priv->rq);
1496}
1497
e314dbdc
PE
1498static int veth_dev_init(struct net_device *dev)
1499{
7797b93b
TM
1500 int err;
1501
14d73416
LR
1502 dev->lstats = netdev_alloc_pcpu_stats(struct pcpu_lstats);
1503 if (!dev->lstats)
e314dbdc 1504 return -ENOMEM;
7797b93b
TM
1505
1506 err = veth_alloc_queues(dev);
1507 if (err) {
14d73416 1508 free_percpu(dev->lstats);
7797b93b
TM
1509 return err;
1510 }
1511
e314dbdc
PE
1512 return 0;
1513}
1514
11687a10
DM
1515static void veth_dev_free(struct net_device *dev)
1516{
7797b93b 1517 veth_free_queues(dev);
14d73416 1518 free_percpu(dev->lstats);
11687a10
DM
1519}
1520
bb446c19
WC
1521#ifdef CONFIG_NET_POLL_CONTROLLER
1522static void veth_poll_controller(struct net_device *dev)
1523{
1524 /* veth only receives frames when its peer sends one
948d4f21 1525 * Since it has nothing to do with disabling irqs, we are guaranteed
bb446c19
WC
1526 * never to have pending data when we poll for it so
1527 * there is nothing to do here.
1528 *
1529 * We need this though so netpoll recognizes us as an interface that
1530 * supports polling, which enables bridge devices in virt setups to
1531 * still use netconsole
1532 */
1533}
1534#endif /* CONFIG_NET_POLL_CONTROLLER */
1535
a45253bf
ND
1536static int veth_get_iflink(const struct net_device *dev)
1537{
1538 struct veth_priv *priv = netdev_priv(dev);
1539 struct net_device *peer;
1540 int iflink;
1541
1542 rcu_read_lock();
1543 peer = rcu_dereference(priv->peer);
1544 iflink = peer ? peer->ifindex : 0;
1545 rcu_read_unlock();
1546
1547 return iflink;
1548}
1549
dc224822
TM
1550static netdev_features_t veth_fix_features(struct net_device *dev,
1551 netdev_features_t features)
1552{
1553 struct veth_priv *priv = netdev_priv(dev);
1554 struct net_device *peer;
1555
1556 peer = rtnl_dereference(priv->peer);
1557 if (peer) {
1558 struct veth_priv *peer_priv = netdev_priv(peer);
1559
1560 if (peer_priv->_xdp_prog)
1561 features &= ~NETIF_F_GSO_SOFTWARE;
1562 }
d3256efd
PA
1563 if (priv->_xdp_prog)
1564 features |= NETIF_F_GRO;
dc224822
TM
1565
1566 return features;
1567}
1568
d3256efd
PA
1569static int veth_set_features(struct net_device *dev,
1570 netdev_features_t features)
1571{
1572 netdev_features_t changed = features ^ dev->features;
1573 struct veth_priv *priv = netdev_priv(dev);
8267fc71 1574 struct net_device *peer;
d3256efd
PA
1575 int err;
1576
1577 if (!(changed & NETIF_F_GRO) || !(dev->flags & IFF_UP) || priv->_xdp_prog)
1578 return 0;
1579
8267fc71 1580 peer = rtnl_dereference(priv->peer);
d3256efd 1581 if (features & NETIF_F_GRO) {
5e8d3dc7
HQ
1582 err = veth_napi_enable(dev);
1583 if (err)
1584 return err;
fccca038 1585
8267fc71
LB
1586 if (peer)
1587 xdp_features_set_redirect_target(peer, true);
d3256efd 1588 } else {
8267fc71
LB
1589 if (peer)
1590 xdp_features_clear_redirect_target(peer);
5e8d3dc7 1591 veth_napi_del(dev);
d3256efd
PA
1592 }
1593 return 0;
1594}
1595
163e5292
PA
1596static void veth_set_rx_headroom(struct net_device *dev, int new_hr)
1597{
1598 struct veth_priv *peer_priv, *priv = netdev_priv(dev);
1599 struct net_device *peer;
1600
1601 if (new_hr < 0)
1602 new_hr = 0;
1603
1604 rcu_read_lock();
1605 peer = rcu_dereference(priv->peer);
1606 if (unlikely(!peer))
1607 goto out;
1608
1609 peer_priv = netdev_priv(peer);
1610 priv->requested_headroom = new_hr;
1611 new_hr = max(priv->requested_headroom, peer_priv->requested_headroom);
1612 dev->needed_headroom = new_hr;
1613 peer->needed_headroom = new_hr;
1614
1615out:
1616 rcu_read_unlock();
1617}
1618
948d4f21
TM
1619static int veth_xdp_set(struct net_device *dev, struct bpf_prog *prog,
1620 struct netlink_ext_ack *extack)
1621{
1622 struct veth_priv *priv = netdev_priv(dev);
1623 struct bpf_prog *old_prog;
1624 struct net_device *peer;
dc224822 1625 unsigned int max_mtu;
948d4f21
TM
1626 int err;
1627
1628 old_prog = priv->_xdp_prog;
1629 priv->_xdp_prog = prog;
1630 peer = rtnl_dereference(priv->peer);
1631
1632 if (prog) {
1633 if (!peer) {
1634 NL_SET_ERR_MSG_MOD(extack, "Cannot set XDP when peer is detached");
1635 err = -ENOTCONN;
1636 goto err;
1637 }
1638
7cda76d8
LB
1639 max_mtu = SKB_WITH_OVERHEAD(PAGE_SIZE - VETH_XDP_HEADROOM) -
1640 peer->hard_header_len;
1641 /* Allow increasing the max_mtu if the program supports
1642 * XDP fragments.
1643 */
1644 if (prog->aux->xdp_has_frags)
1645 max_mtu += PAGE_SIZE * MAX_SKB_FRAGS;
1646
dc224822
TM
1647 if (peer->mtu > max_mtu) {
1648 NL_SET_ERR_MSG_MOD(extack, "Peer MTU is too large to set XDP");
1649 err = -ERANGE;
1650 goto err;
1651 }
1652
638264dc
TM
1653 if (dev->real_num_rx_queues < peer->real_num_tx_queues) {
1654 NL_SET_ERR_MSG_MOD(extack, "XDP expects number of rx queues not less than peer tx queues");
1655 err = -ENOSPC;
1656 goto err;
1657 }
1658
948d4f21
TM
1659 if (dev->flags & IFF_UP) {
1660 err = veth_enable_xdp(dev);
1661 if (err) {
1662 NL_SET_ERR_MSG_MOD(extack, "Setup for XDP failed");
1663 goto err;
1664 }
1665 }
dc224822
TM
1666
1667 if (!old_prog) {
1668 peer->hw_features &= ~NETIF_F_GSO_SOFTWARE;
1669 peer->max_mtu = max_mtu;
1670 }
fccca038 1671
8267fc71 1672 xdp_features_set_redirect_target(peer, true);
948d4f21
TM
1673 }
1674
1675 if (old_prog) {
dc224822 1676 if (!prog) {
8267fc71
LB
1677 if (peer && !veth_gro_requested(dev))
1678 xdp_features_clear_redirect_target(peer);
fccca038 1679
dc224822
TM
1680 if (dev->flags & IFF_UP)
1681 veth_disable_xdp(dev);
1682
1683 if (peer) {
1684 peer->hw_features |= NETIF_F_GSO_SOFTWARE;
1685 peer->max_mtu = ETH_MAX_MTU;
1686 }
1687 }
948d4f21
TM
1688 bpf_prog_put(old_prog);
1689 }
1690
dc224822
TM
1691 if ((!!old_prog ^ !!prog) && peer)
1692 netdev_update_features(peer);
1693
948d4f21
TM
1694 return 0;
1695err:
1696 priv->_xdp_prog = old_prog;
1697
1698 return err;
1699}
1700
948d4f21
TM
1701static int veth_xdp(struct net_device *dev, struct netdev_bpf *xdp)
1702{
1703 switch (xdp->command) {
1704 case XDP_SETUP_PROG:
1705 return veth_xdp_set(dev, xdp->prog, xdp->extack);
948d4f21
TM
1706 default:
1707 return -EINVAL;
1708 }
1709}
1710
306531f0
SF
1711static int veth_xdp_rx_timestamp(const struct xdp_md *ctx, u64 *timestamp)
1712{
1713 struct veth_xdp_buff *_ctx = (void *)ctx;
1714
1715 if (!_ctx->skb)
915efd8a 1716 return -ENODATA;
306531f0
SF
1717
1718 *timestamp = skb_hwtstamps(_ctx->skb)->hwtstamp;
1719 return 0;
1720}
1721
0cd917a4
JDB
1722static int veth_xdp_rx_hash(const struct xdp_md *ctx, u32 *hash,
1723 enum xdp_rss_hash_type *rss_type)
306531f0
SF
1724{
1725 struct veth_xdp_buff *_ctx = (void *)ctx;
96b1a098 1726 struct sk_buff *skb = _ctx->skb;
306531f0 1727
96b1a098 1728 if (!skb)
915efd8a 1729 return -ENODATA;
306531f0 1730
96b1a098
JDB
1731 *hash = skb_get_hash(skb);
1732 *rss_type = skb->l4_hash ? XDP_RSS_TYPE_L4_ANY : XDP_RSS_TYPE_NONE;
1733
306531f0
SF
1734 return 0;
1735}
1736
4456e7bd 1737static const struct net_device_ops veth_netdev_ops = {
ee923623
DL
1738 .ndo_init = veth_dev_init,
1739 .ndo_open = veth_open,
2cf48a10 1740 .ndo_stop = veth_close,
ee923623 1741 .ndo_start_xmit = veth_xmit,
6311cc44 1742 .ndo_get_stats64 = veth_get_stats64,
5c70ef85 1743 .ndo_set_rx_mode = veth_set_multicast_list,
ee923623 1744 .ndo_set_mac_address = eth_mac_addr,
bb446c19
WC
1745#ifdef CONFIG_NET_POLL_CONTROLLER
1746 .ndo_poll_controller = veth_poll_controller,
1747#endif
a45253bf 1748 .ndo_get_iflink = veth_get_iflink,
dc224822 1749 .ndo_fix_features = veth_fix_features,
d3256efd 1750 .ndo_set_features = veth_set_features,
1a04a821 1751 .ndo_features_check = passthru_features_check,
163e5292 1752 .ndo_set_rx_headroom = veth_set_rx_headroom,
948d4f21 1753 .ndo_bpf = veth_xdp,
9152cff0 1754 .ndo_xdp_xmit = veth_ndo_xdp_xmit,
9aa1206e 1755 .ndo_get_peer_dev = veth_peer_dev,
4456e7bd
SH
1756};
1757
306531f0
SF
1758static const struct xdp_metadata_ops veth_xdp_metadata_ops = {
1759 .xmo_rx_timestamp = veth_xdp_rx_timestamp,
1760 .xmo_rx_hash = veth_xdp_rx_hash,
1761};
1762
732912d7 1763#define VETH_FEATURES (NETIF_F_SG | NETIF_F_FRAGLIST | NETIF_F_HW_CSUM | \
c80fafbb 1764 NETIF_F_RXCSUM | NETIF_F_SCTP_CRC | NETIF_F_HIGHDMA | \
732912d7 1765 NETIF_F_GSO_SOFTWARE | NETIF_F_GSO_ENCAP_ALL | \
28d2b136
PM
1766 NETIF_F_HW_VLAN_CTAG_TX | NETIF_F_HW_VLAN_CTAG_RX | \
1767 NETIF_F_HW_VLAN_STAG_TX | NETIF_F_HW_VLAN_STAG_RX )
8093315a 1768
e314dbdc
PE
1769static void veth_setup(struct net_device *dev)
1770{
1771 ether_setup(dev);
1772
550fd08c 1773 dev->priv_flags &= ~IFF_TX_SKB_SHARING;
23ea5a96 1774 dev->priv_flags |= IFF_LIVE_ADDR_CHANGE;
02f01ec1 1775 dev->priv_flags |= IFF_NO_QUEUE;
163e5292 1776 dev->priv_flags |= IFF_PHONY_HEADROOM;
550fd08c 1777
4456e7bd 1778 dev->netdev_ops = &veth_netdev_ops;
306531f0 1779 dev->xdp_metadata_ops = &veth_xdp_metadata_ops;
e314dbdc
PE
1780 dev->ethtool_ops = &veth_ethtool_ops;
1781 dev->features |= NETIF_F_LLTX;
8093315a 1782 dev->features |= VETH_FEATURES;
8d0d21f4 1783 dev->vlan_features = dev->features &
3f8c707b
VY
1784 ~(NETIF_F_HW_VLAN_CTAG_TX |
1785 NETIF_F_HW_VLAN_STAG_TX |
1786 NETIF_F_HW_VLAN_CTAG_RX |
1787 NETIF_F_HW_VLAN_STAG_RX);
cf124db5
DM
1788 dev->needs_free_netdev = true;
1789 dev->priv_destructor = veth_dev_free;
91572088 1790 dev->max_mtu = ETH_MAX_MTU;
a2c725fa 1791
8093315a 1792 dev->hw_features = VETH_FEATURES;
82d81898 1793 dev->hw_enc_features = VETH_FEATURES;
607fca9a 1794 dev->mpls_features = NETIF_F_HW_CSUM | NETIF_F_GSO_SOFTWARE;
d406099d 1795 netif_set_tso_max_size(dev, GSO_MAX_SIZE);
e314dbdc
PE
1796}
1797
1798/*
1799 * netlink interface
1800 */
1801
a8b8a889
MS
1802static int veth_validate(struct nlattr *tb[], struct nlattr *data[],
1803 struct netlink_ext_ack *extack)
e314dbdc
PE
1804{
1805 if (tb[IFLA_ADDRESS]) {
1806 if (nla_len(tb[IFLA_ADDRESS]) != ETH_ALEN)
1807 return -EINVAL;
1808 if (!is_valid_ether_addr(nla_data(tb[IFLA_ADDRESS])))
1809 return -EADDRNOTAVAIL;
1810 }
38d40815
EB
1811 if (tb[IFLA_MTU]) {
1812 if (!is_valid_veth_mtu(nla_get_u32(tb[IFLA_MTU])))
1813 return -EINVAL;
1814 }
e314dbdc
PE
1815 return 0;
1816}
1817
1818static struct rtnl_link_ops veth_link_ops;
1819
d3256efd
PA
1820static void veth_disable_gro(struct net_device *dev)
1821{
1822 dev->features &= ~NETIF_F_GRO;
1823 dev->wanted_features &= ~NETIF_F_GRO;
1824 netdev_update_features(dev);
1825}
1826
9d3684c2
PA
1827static int veth_init_queues(struct net_device *dev, struct nlattr *tb[])
1828{
1829 int err;
1830
1831 if (!tb[IFLA_NUM_TX_QUEUES] && dev->num_tx_queues > 1) {
1832 err = netif_set_real_num_tx_queues(dev, 1);
1833 if (err)
1834 return err;
1835 }
1836 if (!tb[IFLA_NUM_RX_QUEUES] && dev->num_rx_queues > 1) {
1837 err = netif_set_real_num_rx_queues(dev, 1);
1838 if (err)
1839 return err;
1840 }
1841 return 0;
1842}
1843
81adee47 1844static int veth_newlink(struct net *src_net, struct net_device *dev,
7a3f4a18
MS
1845 struct nlattr *tb[], struct nlattr *data[],
1846 struct netlink_ext_ack *extack)
e314dbdc 1847{
7797b93b 1848 int err;
e314dbdc
PE
1849 struct net_device *peer;
1850 struct veth_priv *priv;
1851 char ifname[IFNAMSIZ];
1852 struct nlattr *peer_tb[IFLA_MAX + 1], **tbp;
5517750f 1853 unsigned char name_assign_type;
3729d502 1854 struct ifinfomsg *ifmp;
81adee47 1855 struct net *net;
e314dbdc
PE
1856
1857 /*
1858 * create and register peer first
e314dbdc 1859 */
e314dbdc
PE
1860 if (data != NULL && data[VETH_INFO_PEER] != NULL) {
1861 struct nlattr *nla_peer;
1862
1863 nla_peer = data[VETH_INFO_PEER];
3729d502 1864 ifmp = nla_data(nla_peer);
f534f658 1865 err = rtnl_nla_parse_ifinfomsg(peer_tb, nla_peer, extack);
e314dbdc
PE
1866 if (err < 0)
1867 return err;
1868
a8b8a889 1869 err = veth_validate(peer_tb, NULL, extack);
e314dbdc
PE
1870 if (err < 0)
1871 return err;
1872
1873 tbp = peer_tb;
3729d502
PM
1874 } else {
1875 ifmp = NULL;
e314dbdc 1876 tbp = tb;
3729d502 1877 }
e314dbdc 1878
191cdb38 1879 if (ifmp && tbp[IFLA_IFNAME]) {
872f6903 1880 nla_strscpy(ifname, tbp[IFLA_IFNAME], IFNAMSIZ);
5517750f
TG
1881 name_assign_type = NET_NAME_USER;
1882 } else {
e314dbdc 1883 snprintf(ifname, IFNAMSIZ, DRV_NAME "%%d");
5517750f
TG
1884 name_assign_type = NET_NAME_ENUM;
1885 }
e314dbdc 1886
81adee47
EB
1887 net = rtnl_link_get_net(src_net, tbp);
1888 if (IS_ERR(net))
1889 return PTR_ERR(net);
1890
5517750f 1891 peer = rtnl_create_link(net, ifname, name_assign_type,
d0522f1c 1892 &veth_link_ops, tbp, extack);
81adee47
EB
1893 if (IS_ERR(peer)) {
1894 put_net(net);
e314dbdc 1895 return PTR_ERR(peer);
81adee47 1896 }
e314dbdc 1897
191cdb38 1898 if (!ifmp || !tbp[IFLA_ADDRESS])
f2cedb63 1899 eth_hw_addr_random(peer);
e6f8f1a7
PE
1900
1901 if (ifmp && (dev->ifindex != 0))
1902 peer->ifindex = ifmp->ifi_index;
e314dbdc 1903
6df6398f 1904 netif_inherit_tso_max(peer, dev);
72d24955 1905
e314dbdc 1906 err = register_netdevice(peer);
81adee47
EB
1907 put_net(net);
1908 net = NULL;
e314dbdc
PE
1909 if (err < 0)
1910 goto err_register_peer;
1911
d3256efd
PA
1912 /* keep GRO disabled by default to be consistent with the established
1913 * veth behavior
1914 */
1915 veth_disable_gro(peer);
e314dbdc
PE
1916 netif_carrier_off(peer);
1917
1d997f10 1918 err = rtnl_configure_link(peer, ifmp, 0, NULL);
3729d502
PM
1919 if (err < 0)
1920 goto err_configure_peer;
1921
e314dbdc
PE
1922 /*
1923 * register dev last
1924 *
1925 * note, that since we've registered new device the dev's name
1926 * should be re-allocated
1927 */
1928
1929 if (tb[IFLA_ADDRESS] == NULL)
f2cedb63 1930 eth_hw_addr_random(dev);
e314dbdc 1931
6c8c4446 1932 if (tb[IFLA_IFNAME])
872f6903 1933 nla_strscpy(dev->name, tb[IFLA_IFNAME], IFNAMSIZ);
6c8c4446
JP
1934 else
1935 snprintf(dev->name, IFNAMSIZ, DRV_NAME "%%d");
1936
e314dbdc
PE
1937 err = register_netdevice(dev);
1938 if (err < 0)
1939 goto err_register_dev;
1940
1941 netif_carrier_off(dev);
1942
1943 /*
1944 * tie the deviced together
1945 */
1946
1947 priv = netdev_priv(dev);
d0e2c55e 1948 rcu_assign_pointer(priv->peer, peer);
9d3684c2
PA
1949 err = veth_init_queues(dev, tb);
1950 if (err)
1951 goto err_queues;
e314dbdc
PE
1952
1953 priv = netdev_priv(peer);
d0e2c55e 1954 rcu_assign_pointer(priv->peer, dev);
9d3684c2
PA
1955 err = veth_init_queues(peer, tb);
1956 if (err)
1957 goto err_queues;
948d4f21 1958
d3256efd 1959 veth_disable_gro(dev);
fccca038
LB
1960 /* update XDP supported features */
1961 veth_set_xdp_features(dev);
1962 veth_set_xdp_features(peer);
1963
e314dbdc
PE
1964 return 0;
1965
9d3684c2
PA
1966err_queues:
1967 unregister_netdevice(dev);
e314dbdc
PE
1968err_register_dev:
1969 /* nothing to do */
3729d502 1970err_configure_peer:
e314dbdc
PE
1971 unregister_netdevice(peer);
1972 return err;
1973
1974err_register_peer:
1975 free_netdev(peer);
1976 return err;
1977}
1978
23289a37 1979static void veth_dellink(struct net_device *dev, struct list_head *head)
e314dbdc
PE
1980{
1981 struct veth_priv *priv;
1982 struct net_device *peer;
1983
1984 priv = netdev_priv(dev);
d0e2c55e
ED
1985 peer = rtnl_dereference(priv->peer);
1986
1987 /* Note : dellink() is called from default_device_exit_batch(),
1988 * before a rcu_synchronize() point. The devices are guaranteed
1989 * not being freed before one RCU grace period.
1990 */
1991 RCU_INIT_POINTER(priv->peer, NULL);
24540535 1992 unregister_netdevice_queue(dev, head);
f45a5c26
ED
1993
1994 if (peer) {
1995 priv = netdev_priv(peer);
1996 RCU_INIT_POINTER(priv->peer, NULL);
1997 unregister_netdevice_queue(peer, head);
1998 }
e314dbdc
PE
1999}
2000
23711438
TG
2001static const struct nla_policy veth_policy[VETH_INFO_MAX + 1] = {
2002 [VETH_INFO_PEER] = { .len = sizeof(struct ifinfomsg) },
2003};
e314dbdc 2004
e5f4e7b9
ND
2005static struct net *veth_get_link_net(const struct net_device *dev)
2006{
2007 struct veth_priv *priv = netdev_priv(dev);
2008 struct net_device *peer = rtnl_dereference(priv->peer);
2009
2010 return peer ? dev_net(peer) : dev_net(dev);
2011}
2012
9d3684c2
PA
2013static unsigned int veth_get_num_queues(void)
2014{
2015 /* enforce the same queue limit as rtnl_create_link */
2016 int queues = num_possible_cpus();
2017
2018 if (queues > 4096)
2019 queues = 4096;
2020 return queues;
2021}
2022
e314dbdc
PE
2023static struct rtnl_link_ops veth_link_ops = {
2024 .kind = DRV_NAME,
2025 .priv_size = sizeof(struct veth_priv),
2026 .setup = veth_setup,
2027 .validate = veth_validate,
2028 .newlink = veth_newlink,
2029 .dellink = veth_dellink,
2030 .policy = veth_policy,
2031 .maxtype = VETH_INFO_MAX,
e5f4e7b9 2032 .get_link_net = veth_get_link_net,
9d3684c2
PA
2033 .get_num_tx_queues = veth_get_num_queues,
2034 .get_num_rx_queues = veth_get_num_queues,
e314dbdc
PE
2035};
2036
2037/*
2038 * init/fini
2039 */
2040
2041static __init int veth_init(void)
2042{
2043 return rtnl_link_register(&veth_link_ops);
2044}
2045
2046static __exit void veth_exit(void)
2047{
68365458 2048 rtnl_link_unregister(&veth_link_ops);
e314dbdc
PE
2049}
2050
2051module_init(veth_init);
2052module_exit(veth_exit);
2053
2054MODULE_DESCRIPTION("Virtual Ethernet Tunnel");
2055MODULE_LICENSE("GPL v2");
2056MODULE_ALIAS_RTNL_LINK(DRV_NAME);