ASoC: SOF: Drop superfluous snd_pcm_sgbuf_ops_page
[linux-2.6-block.git] / net / core / pktgen.c
CommitLineData
2874c5fd 1// SPDX-License-Identifier: GPL-2.0-or-later
1da177e4
LT
2/*
3 * Authors:
4 * Copyright 2001, 2002 by Robert Olsson <robert.olsson@its.uu.se>
5 * Uppsala University and
6 * Swedish University of Agricultural Sciences
7 *
8 * Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
9 * Ben Greear <greearb@candelatech.com>
96de0e25 10 * Jens Låås <jens.laas@data.slu.se>
1da177e4 11 *
1da177e4 12 * A tool for loading the network with preconfigurated packets.
4ec93edb 13 * The tool is implemented as a linux module. Parameters are output
1da177e4
LT
14 * device, delay (to hard_xmit), number of packets, and whether
15 * to use multiple SKBs or just the same one.
16 * pktgen uses the installed interface's output routine.
17 *
18 * Additional hacking by:
19 *
20 * Jens.Laas@data.slu.se
21 * Improved by ANK. 010120.
22 * Improved by ANK even more. 010212.
23 * MAC address typo fixed. 010417 --ro
24 * Integrated. 020301 --DaveM
25 * Added multiskb option 020301 --DaveM
26 * Scaling of results. 020417--sigurdur@linpro.no
27 * Significant re-work of the module:
28 * * Convert to threaded model to more efficiently be able to transmit
29 * and receive on multiple interfaces at once.
30 * * Converted many counters to __u64 to allow longer runs.
31 * * Allow configuration of ranges, like min/max IP address, MACs,
32 * and UDP-ports, for both source and destination, and can
33 * set to use a random distribution or sequentially walk the range.
34 * * Can now change most values after starting.
35 * * Place 12-byte packet in UDP payload with magic number,
36 * sequence number, and timestamp.
37 * * Add receiver code that detects dropped pkts, re-ordered pkts, and
38 * latencies (with micro-second) precision.
39 * * Add IOCTL interface to easily get counters & configuration.
40 * --Ben Greear <greearb@candelatech.com>
41 *
4ec93edb
YH
42 * Renamed multiskb to clone_skb and cleaned up sending core for two distinct
43 * skb modes. A clone_skb=0 mode for Ben "ranges" work and a clone_skb != 0
1da177e4 44 * as a "fastpath" with a configurable number of clones after alloc's.
4ec93edb
YH
45 * clone_skb=0 means all packets are allocated this also means ranges time
46 * stamps etc can be used. clone_skb=100 means 1 malloc is followed by 100
1da177e4
LT
47 * clones.
48 *
4ec93edb 49 * Also moved to /proc/net/pktgen/
1da177e4
LT
50 * --ro
51 *
52 * Sept 10: Fixed threading/locking. Lots of bone-headed and more clever
53 * mistakes. Also merged in DaveM's patch in the -pre6 patch.
54 * --Ben Greear <greearb@candelatech.com>
55 *
56 * Integrated to 2.5.x 021029 --Lucio Maciel (luciomaciel@zipmail.com.br)
57 *
1da177e4
LT
58 * 021124 Finished major redesign and rewrite for new functionality.
59 * See Documentation/networking/pktgen.txt for how to use this.
60 *
61 * The new operation:
4ec93edb
YH
62 * For each CPU one thread/process is created at start. This process checks
63 * for running devices in the if_list and sends packets until count is 0 it
64 * also the thread checks the thread->control which is used for inter-process
65 * communication. controlling process "posts" operations to the threads this
8788370a
JDB
66 * way.
67 * The if_list is RCU protected, and the if_lock remains to protect updating
68 * of if_list, from "add_device" as it invoked from userspace (via proc write).
1da177e4 69 *
4ec93edb
YH
70 * By design there should only be *one* "controlling" process. In practice
71 * multiple write accesses gives unpredictable result. Understood by "write"
1da177e4 72 * to /proc gives result code thats should be read be the "writer".
b4099fab 73 * For practical use this should be no problem.
1da177e4 74 *
4ec93edb
YH
75 * Note when adding devices to a specific CPU there good idea to also assign
76 * /proc/irq/XX/smp_affinity so TX-interrupts gets bound to the same CPU.
1da177e4
LT
77 * --ro
78 *
4ec93edb 79 * Fix refcount off by one if first packet fails, potential null deref,
1da177e4
LT
80 * memleak 030710- KJP
81 *
82 * First "ranges" functionality for ipv6 030726 --ro
83 *
84 * Included flow support. 030802 ANK.
85 *
86 * Fixed unaligned access on IA-64 Grant Grundler <grundler@parisc-linux.org>
4ec93edb 87 *
1da177e4
LT
88 * Remove if fix from added Harald Welte <laforge@netfilter.org> 040419
89 * ia64 compilation fix from Aron Griffis <aron@hp.com> 040604
90 *
4ec93edb 91 * New xmit() return, do_div and misc clean up by Stephen Hemminger
1da177e4
LT
92 * <shemminger@osdl.org> 040923
93 *
ca9f1fd2 94 * Randy Dunlap fixed u64 printk compiler warning
1da177e4
LT
95 *
96 * Remove FCS from BW calculation. Lennert Buytenhek <buytenh@wantstofly.org>
97 * New time handling. Lennert Buytenhek <buytenh@wantstofly.org> 041213
98 *
4ec93edb 99 * Corrections from Nikolai Malykh (nmalykh@bilim.com)
1da177e4
LT
100 * Removed unused flags F_SET_SRCMAC & F_SET_SRCIP 041230
101 *
4ec93edb 102 * interruptible_sleep_on_timeout() replaced Nishanth Aravamudan <nacc@us.ibm.com>
1da177e4 103 * 050103
ca6549af
SW
104 *
105 * MPLS support by Steven Whitehouse <steve@chygwyn.com>
106 *
34954ddc
FF
107 * 802.1Q/Q-in-Q support by Francesco Fondelli (FF) <francesco.fondelli@gmail.com>
108 *
ce5d0b47
AR
109 * Fixed src_mac command to set source mac of packet to value specified in
110 * command by Adit Ranadive <adit.262@gmail.com>
1da177e4 111 */
f9467eae
JP
112
113#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
114
1da177e4
LT
115#include <linux/sys.h>
116#include <linux/types.h>
117#include <linux/module.h>
118#include <linux/moduleparam.h>
119#include <linux/kernel.h>
222fa076 120#include <linux/mutex.h>
1da177e4
LT
121#include <linux/sched.h>
122#include <linux/slab.h>
123#include <linux/vmalloc.h>
1da177e4
LT
124#include <linux/unistd.h>
125#include <linux/string.h>
126#include <linux/ptrace.h>
127#include <linux/errno.h>
128#include <linux/ioport.h>
129#include <linux/interrupt.h>
4fc268d2 130#include <linux/capability.h>
2bc481cf 131#include <linux/hrtimer.h>
09fe3ef4 132#include <linux/freezer.h>
1da177e4
LT
133#include <linux/delay.h>
134#include <linux/timer.h>
cdcdbe0b 135#include <linux/list.h>
1da177e4
LT
136#include <linux/init.h>
137#include <linux/skbuff.h>
138#include <linux/netdevice.h>
139#include <linux/inet.h>
140#include <linux/inetdevice.h>
141#include <linux/rtnetlink.h>
142#include <linux/if_arp.h>
34954ddc 143#include <linux/if_vlan.h>
1da177e4
LT
144#include <linux/in.h>
145#include <linux/ip.h>
146#include <linux/ipv6.h>
147#include <linux/udp.h>
148#include <linux/proc_fs.h>
d50a6b56 149#include <linux/seq_file.h>
1da177e4 150#include <linux/wait.h>
f404e9a6 151#include <linux/etherdevice.h>
ee74baa7 152#include <linux/kthread.h>
268bb0ce 153#include <linux/prefetch.h>
98fa15f3 154#include <linux/mmzone.h>
457c4cbc 155#include <net/net_namespace.h>
1da177e4
LT
156#include <net/checksum.h>
157#include <net/ipv6.h>
c26bf4a5 158#include <net/udp.h>
73d94e94 159#include <net/ip6_checksum.h>
1da177e4 160#include <net/addrconf.h>
a553e4a6
JHS
161#ifdef CONFIG_XFRM
162#include <net/xfrm.h>
163#endif
4e58a027 164#include <net/netns/generic.h>
1da177e4
LT
165#include <asm/byteorder.h>
166#include <linux/rcupdate.h>
1977f032 167#include <linux/bitops.h>
63adc6fb
SH
168#include <linux/io.h>
169#include <linux/timex.h>
170#include <linux/uaccess.h>
1da177e4 171#include <asm/dma.h>
222f1806 172#include <asm/div64.h> /* do_div */
1da177e4 173
40207264 174#define VERSION "2.75"
1da177e4 175#define IP_NAME_SZ 32
ca6549af 176#define MAX_MPLS_LABELS 16 /* This is the max label stack depth */
d5f1ce9a 177#define MPLS_STACK_BOTTOM htonl(0x00000100)
1da177e4 178
f9467eae
JP
179#define func_enter() pr_debug("entering %s\n", __func__);
180
6f107c74
DS
181#define PKT_FLAGS \
182 pf(IPV6) /* Interface in IPV6 Mode */ \
183 pf(IPSRC_RND) /* IP-Src Random */ \
184 pf(IPDST_RND) /* IP-Dst Random */ \
185 pf(TXSIZE_RND) /* Transmit size is random */ \
186 pf(UDPSRC_RND) /* UDP-Src Random */ \
187 pf(UDPDST_RND) /* UDP-Dst Random */ \
188 pf(UDPCSUM) /* Include UDP checksum */ \
189 pf(NO_TIMESTAMP) /* Don't timestamp packets (default TS) */ \
190 pf(MPLS_RND) /* Random MPLS labels */ \
191 pf(QUEUE_MAP_RND) /* queue map Random */ \
192 pf(QUEUE_MAP_CPU) /* queue map mirrors smp_processor_id() */ \
193 pf(FLOW_SEQ) /* Sequential flows */ \
194 pf(IPSEC) /* ipsec on for flows */ \
195 pf(MACSRC_RND) /* MAC-Src Random */ \
196 pf(MACDST_RND) /* MAC-Dst Random */ \
197 pf(VID_RND) /* Random VLAN ID */ \
198 pf(SVID_RND) /* Random SVLAN ID */ \
199 pf(NODE) /* Node memory alloc*/ \
200
201#define pf(flag) flag##_SHIFT,
202enum pkt_flags {
203 PKT_FLAGS
204};
205#undef pf
206
1da177e4 207/* Device flag bits */
6f107c74
DS
208#define pf(flag) static const __u32 F_##flag = (1<<flag##_SHIFT);
209PKT_FLAGS
210#undef pf
1da177e4 211
99c6d3d2
DS
212#define pf(flag) __stringify(flag),
213static char *pkt_flag_names[] = {
214 PKT_FLAGS
215};
216#undef pf
217
218#define NR_PKT_FLAGS ARRAY_SIZE(pkt_flag_names)
219
1da177e4 220/* Thread control flag bits */
6b80d6a6
SH
221#define T_STOP (1<<0) /* Stop run */
222#define T_RUN (1<<1) /* Start run */
223#define T_REMDEVALL (1<<2) /* Remove all devs */
224#define T_REMDEV (1<<3) /* Remove one dev */
1da177e4 225
62f64aed
AS
226/* Xmit modes */
227#define M_START_XMIT 0 /* Default normal TX */
228#define M_NETIF_RECEIVE 1 /* Inject packets into stack */
0967f244 229#define M_QUEUE_XMIT 2 /* Inject packet into qdisc */
62f64aed 230
8788370a 231/* If lock -- protects updating of if_list */
9a0b1e8b
ED
232#define if_lock(t) mutex_lock(&(t->if_lock));
233#define if_unlock(t) mutex_unlock(&(t->if_lock));
1da177e4
LT
234
235/* Used to help with determining the pkts on receive */
236#define PKTGEN_MAGIC 0xbe9be955
d50a6b56
SH
237#define PG_PROC_DIR "pktgen"
238#define PGCTRL "pgctrl"
1da177e4
LT
239
240#define MAX_CFLOWS 65536
241
34954ddc
FF
242#define VLAN_TAG_SIZE(x) ((x)->vlan_id == 0xffff ? 0 : 4)
243#define SVLAN_TAG_SIZE(x) ((x)->svlan_id == 0xffff ? 0 : 4)
244
222f1806 245struct flow_state {
252e3346 246 __be32 cur_daddr;
222f1806 247 int count;
a553e4a6
JHS
248#ifdef CONFIG_XFRM
249 struct xfrm_state *x;
250#endif
007a531b 251 __u32 flags;
1da177e4
LT
252};
253
007a531b
JHS
254/* flow flag bits */
255#define F_INIT (1<<0) /* flow has been initialized */
256
1da177e4 257struct pktgen_dev {
1da177e4
LT
258 /*
259 * Try to keep frequent/infrequent used vars. separated.
260 */
39df232f
SH
261 struct proc_dir_entry *entry; /* proc file */
262 struct pktgen_thread *pg_thread;/* the owner */
63adc6fb 263 struct list_head list; /* chaining in the thread's run-queue */
8788370a 264 struct rcu_head rcu; /* freed by RCU */
1da177e4 265
63adc6fb 266 int running; /* if false, the test will stop */
1da177e4 267
222f1806
LC
268 /* If min != max, then we will either do a linear iteration, or
269 * we will do a random selection from within the range.
270 */
271 __u32 flags;
62f64aed 272 int xmit_mode;
68bf9f0b
AW
273 int min_pkt_size;
274 int max_pkt_size;
16dab72f 275 int pkt_overhead; /* overhead for MPLS, VLANs, IPSEC etc */
222f1806 276 int nfrags;
62f64aed
AS
277 int removal_mark; /* non-zero => the device is marked for
278 * removal by worker thread */
279
26ad7879 280 struct page *page;
fd29cf72
SH
281 u64 delay; /* nano-seconds */
282
222f1806
LC
283 __u64 count; /* Default No packets to send */
284 __u64 sofar; /* How many pkts we've sent so far */
285 __u64 tx_bytes; /* How many bytes we've transmitted */
f466dba1 286 __u64 errors; /* Errors when trying to transmit, */
222f1806
LC
287
288 /* runtime counters relating to clone_skb */
222f1806 289
222f1806
LC
290 __u32 clone_count;
291 int last_ok; /* Was last skb sent?
63adc6fb
SH
292 * Or a failed transmit of some sort?
293 * This will keep sequence numbers in order
222f1806 294 */
fd29cf72
SH
295 ktime_t next_tx;
296 ktime_t started_at;
297 ktime_t stopped_at;
298 u64 idle_acc; /* nano-seconds */
299
222f1806
LC
300 __u32 seq_num;
301
63adc6fb
SH
302 int clone_skb; /*
303 * Use multiple SKBs during packet gen.
304 * If this number is greater than 1, then
305 * that many copies of the same packet will be
306 * sent before a new packet is allocated.
307 * If you want to send 1024 identical packets
308 * before creating a new packet,
309 * set clone_skb to 1024.
222f1806
LC
310 */
311
312 char dst_min[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
313 char dst_max[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
314 char src_min[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
315 char src_max[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
316
317 struct in6_addr in6_saddr;
318 struct in6_addr in6_daddr;
319 struct in6_addr cur_in6_daddr;
320 struct in6_addr cur_in6_saddr;
1da177e4 321 /* For ranges */
222f1806
LC
322 struct in6_addr min_in6_daddr;
323 struct in6_addr max_in6_daddr;
324 struct in6_addr min_in6_saddr;
325 struct in6_addr max_in6_saddr;
326
327 /* If we're doing ranges, random or incremental, then this
328 * defines the min/max for those ranges.
329 */
252e3346
AV
330 __be32 saddr_min; /* inclusive, source IP address */
331 __be32 saddr_max; /* exclusive, source IP address */
332 __be32 daddr_min; /* inclusive, dest IP address */
333 __be32 daddr_max; /* exclusive, dest IP address */
222f1806
LC
334
335 __u16 udp_src_min; /* inclusive, source UDP port */
336 __u16 udp_src_max; /* exclusive, source UDP port */
337 __u16 udp_dst_min; /* inclusive, dest UDP port */
338 __u16 udp_dst_max; /* exclusive, dest UDP port */
339
1ca7768c 340 /* DSCP + ECN */
63adc6fb
SH
341 __u8 tos; /* six MSB of (former) IPv4 TOS
342 are for dscp codepoint */
343 __u8 traffic_class; /* ditto for the (former) Traffic Class in IPv6
344 (see RFC 3260, sec. 4) */
1ca7768c 345
ca6549af 346 /* MPLS */
95c96174 347 unsigned int nr_labels; /* Depth of stack, 0 = no MPLS */
ca6549af
SW
348 __be32 labels[MAX_MPLS_LABELS];
349
34954ddc
FF
350 /* VLAN/SVLAN (802.1Q/Q-in-Q) */
351 __u8 vlan_p;
352 __u8 vlan_cfi;
353 __u16 vlan_id; /* 0xffff means no vlan tag */
354
355 __u8 svlan_p;
356 __u8 svlan_cfi;
357 __u16 svlan_id; /* 0xffff means no svlan tag */
358
222f1806
LC
359 __u32 src_mac_count; /* How many MACs to iterate through */
360 __u32 dst_mac_count; /* How many MACs to iterate through */
361
362 unsigned char dst_mac[ETH_ALEN];
363 unsigned char src_mac[ETH_ALEN];
364
365 __u32 cur_dst_mac_offset;
366 __u32 cur_src_mac_offset;
252e3346
AV
367 __be32 cur_saddr;
368 __be32 cur_daddr;
66ed1e5e 369 __u16 ip_id;
222f1806
LC
370 __u16 cur_udp_dst;
371 __u16 cur_udp_src;
45b270f8 372 __u16 cur_queue_map;
222f1806 373 __u32 cur_pkt_size;
baac8564 374 __u32 last_pkt_size;
222f1806
LC
375
376 __u8 hh[14];
377 /* = {
378 0x00, 0x80, 0xC8, 0x79, 0xB3, 0xCB,
379
380 We fill in SRC address later
381 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
382 0x08, 0x00
383 };
384 */
385 __u16 pad; /* pad out the hh struct to an even 16 bytes */
386
63adc6fb 387 struct sk_buff *skb; /* skb we are to transmit next, used for when we
222f1806
LC
388 * are transmitting the same one multiple times
389 */
63adc6fb
SH
390 struct net_device *odev; /* The out-going device.
391 * Note that the device should have it's
392 * pg_info pointer pointing back to this
393 * device.
394 * Set when the user specifies the out-going
395 * device name (not when the inject is
396 * started as it used to do.)
397 */
593f63b0 398 char odevname[32];
1da177e4 399 struct flow_state *flows;
95c96174
ED
400 unsigned int cflows; /* Concurrent flows (config) */
401 unsigned int lflow; /* Flow length (config) */
402 unsigned int nflows; /* accumulated flows (stats) */
403 unsigned int curfl; /* current sequenced flow (state)*/
45b270f8
RO
404
405 u16 queue_map_min;
406 u16 queue_map_max;
9e50e3ac 407 __u32 skb_priority; /* skb priority field */
38b2cf29 408 unsigned int burst; /* number of duplicated packets to burst */
e99b99b4 409 int node; /* Memory node */
45b270f8 410
a553e4a6
JHS
411#ifdef CONFIG_XFRM
412 __u8 ipsmode; /* IPSEC mode (config) */
413 __u8 ipsproto; /* IPSEC type (config) */
de4aee7d 414 __u32 spi;
b6ca8bd5 415 struct xfrm_dst xdst;
cf93d47e 416 struct dst_ops dstops;
a553e4a6 417#endif
39df232f 418 char result[512];
1da177e4
LT
419};
420
421struct pktgen_hdr {
252e3346
AV
422 __be32 pgh_magic;
423 __be32 seq_num;
424 __be32 tv_sec;
425 __be32 tv_usec;
1da177e4
LT
426};
427
4e58a027 428
c7d03a00 429static unsigned int pg_net_id __read_mostly;
4e58a027
CW
430
431struct pktgen_net {
432 struct net *net;
433 struct proc_dir_entry *proc_dir;
434 struct list_head pktgen_threads;
435 bool pktgen_exiting;
436};
551eaff1 437
1da177e4 438struct pktgen_thread {
9a0b1e8b 439 struct mutex if_lock; /* for list of devices */
c26a8016 440 struct list_head if_list; /* All device here */
cdcdbe0b 441 struct list_head th_list;
ee74baa7 442 struct task_struct *tsk;
222f1806 443 char result[512];
222f1806 444
63adc6fb
SH
445 /* Field for thread to receive "posted" events terminate,
446 stop ifs etc. */
222f1806
LC
447
448 u32 control;
1da177e4
LT
449 int cpu;
450
222f1806 451 wait_queue_head_t queue;
d3ede327 452 struct completion start_done;
4e58a027 453 struct pktgen_net *net;
1da177e4
LT
454};
455
456#define REMOVE 1
457#define FIND 0
458
c3d2f52d 459static const char version[] =
f9467eae
JP
460 "Packet Generator for packet performance testing. "
461 "Version: " VERSION "\n";
1da177e4 462
222f1806
LC
463static int pktgen_remove_device(struct pktgen_thread *t, struct pktgen_dev *i);
464static int pktgen_add_device(struct pktgen_thread *t, const char *ifname);
465static struct pktgen_dev *pktgen_find_dev(struct pktgen_thread *t,
3e984840 466 const char *ifname, bool exact);
1da177e4 467static int pktgen_device_event(struct notifier_block *, unsigned long, void *);
4e58a027
CW
468static void pktgen_run_all_threads(struct pktgen_net *pn);
469static void pktgen_reset_all_threads(struct pktgen_net *pn);
470static void pktgen_stop_all_threads_ifs(struct pktgen_net *pn);
3bda06a3 471
222f1806 472static void pktgen_stop(struct pktgen_thread *t);
1da177e4 473static void pktgen_clear_counters(struct pktgen_dev *pkt_dev);
39df232f 474
1da177e4 475/* Module parameters, defaults. */
65c5b786
SH
476static int pg_count_d __read_mostly = 1000;
477static int pg_delay_d __read_mostly;
478static int pg_clone_skb_d __read_mostly;
479static int debug __read_mostly;
1da177e4 480
222fa076 481static DEFINE_MUTEX(pktgen_thread_lock);
1da177e4 482
1da177e4
LT
483static struct notifier_block pktgen_notifier_block = {
484 .notifier_call = pktgen_device_event,
485};
486
1da177e4 487/*
4ec93edb 488 * /proc handling functions
1da177e4
LT
489 *
490 */
491
d50a6b56 492static int pgctrl_show(struct seq_file *seq, void *v)
222f1806 493{
c3d2f52d 494 seq_puts(seq, version);
d50a6b56 495 return 0;
1da177e4
LT
496}
497
63adc6fb
SH
498static ssize_t pgctrl_write(struct file *file, const char __user *buf,
499 size_t count, loff_t *ppos)
1da177e4 500{
d50a6b56 501 char data[128];
4e58a027 502 struct pktgen_net *pn = net_generic(current->nsproxy->net_ns, pg_net_id);
1da177e4 503
09455747
MK
504 if (!capable(CAP_NET_ADMIN))
505 return -EPERM;
1da177e4 506
20b0c718
MK
507 if (count == 0)
508 return -EINVAL;
509
d50a6b56
SH
510 if (count > sizeof(data))
511 count = sizeof(data);
1da177e4 512
09455747
MK
513 if (copy_from_user(data, buf, count))
514 return -EFAULT;
515
20b0c718 516 data[count - 1] = 0; /* Strip trailing '\n' and terminate string */
1da177e4 517
222f1806 518 if (!strcmp(data, "stop"))
4e58a027 519 pktgen_stop_all_threads_ifs(pn);
1da177e4 520
222f1806 521 else if (!strcmp(data, "start"))
4e58a027 522 pktgen_run_all_threads(pn);
1da177e4 523
eb37b41c 524 else if (!strcmp(data, "reset"))
4e58a027 525 pktgen_reset_all_threads(pn);
eb37b41c 526
222f1806 527 else
40207264 528 return -EINVAL;
1da177e4 529
09455747 530 return count;
1da177e4
LT
531}
532
d50a6b56
SH
533static int pgctrl_open(struct inode *inode, struct file *file)
534{
d9dda78b 535 return single_open(file, pgctrl_show, PDE_DATA(inode));
d50a6b56
SH
536}
537
9a32144e 538static const struct file_operations pktgen_fops = {
222f1806
LC
539 .open = pgctrl_open,
540 .read = seq_read,
541 .llseek = seq_lseek,
542 .write = pgctrl_write,
543 .release = single_release,
d50a6b56
SH
544};
545
546static int pktgen_if_show(struct seq_file *seq, void *v)
1da177e4 547{
648fda74 548 const struct pktgen_dev *pkt_dev = seq->private;
fd29cf72 549 ktime_t stopped;
99c6d3d2 550 unsigned int i;
fd29cf72 551 u64 idle;
222f1806
LC
552
553 seq_printf(seq,
554 "Params: count %llu min_pkt_size: %u max_pkt_size: %u\n",
555 (unsigned long long)pkt_dev->count, pkt_dev->min_pkt_size,
556 pkt_dev->max_pkt_size);
557
558 seq_printf(seq,
fd29cf72
SH
559 " frags: %d delay: %llu clone_skb: %d ifname: %s\n",
560 pkt_dev->nfrags, (unsigned long long) pkt_dev->delay,
593f63b0 561 pkt_dev->clone_skb, pkt_dev->odevname);
222f1806
LC
562
563 seq_printf(seq, " flows: %u flowlen: %u\n", pkt_dev->cflows,
564 pkt_dev->lflow);
565
45b270f8
RO
566 seq_printf(seq,
567 " queue_map_min: %u queue_map_max: %u\n",
568 pkt_dev->queue_map_min,
569 pkt_dev->queue_map_max);
570
9e50e3ac
JF
571 if (pkt_dev->skb_priority)
572 seq_printf(seq, " skb_priority: %u\n",
573 pkt_dev->skb_priority);
574
222f1806 575 if (pkt_dev->flags & F_IPV6) {
222f1806 576 seq_printf(seq,
47a0200d
AD
577 " saddr: %pI6c min_saddr: %pI6c max_saddr: %pI6c\n"
578 " daddr: %pI6c min_daddr: %pI6c max_daddr: %pI6c\n",
579 &pkt_dev->in6_saddr,
580 &pkt_dev->min_in6_saddr, &pkt_dev->max_in6_saddr,
581 &pkt_dev->in6_daddr,
582 &pkt_dev->min_in6_daddr, &pkt_dev->max_in6_daddr);
63adc6fb
SH
583 } else {
584 seq_printf(seq,
585 " dst_min: %s dst_max: %s\n",
586 pkt_dev->dst_min, pkt_dev->dst_max);
222f1806 587 seq_printf(seq,
d079abd1 588 " src_min: %s src_max: %s\n",
63adc6fb
SH
589 pkt_dev->src_min, pkt_dev->src_max);
590 }
1da177e4 591
222f1806 592 seq_puts(seq, " src_mac: ");
1da177e4 593
e174961c
JB
594 seq_printf(seq, "%pM ",
595 is_zero_ether_addr(pkt_dev->src_mac) ?
596 pkt_dev->odev->dev_addr : pkt_dev->src_mac);
222f1806 597
97dc48e2 598 seq_puts(seq, "dst_mac: ");
e174961c 599 seq_printf(seq, "%pM\n", pkt_dev->dst_mac);
222f1806
LC
600
601 seq_printf(seq,
63adc6fb
SH
602 " udp_src_min: %d udp_src_max: %d"
603 " udp_dst_min: %d udp_dst_max: %d\n",
222f1806
LC
604 pkt_dev->udp_src_min, pkt_dev->udp_src_max,
605 pkt_dev->udp_dst_min, pkt_dev->udp_dst_max);
606
607 seq_printf(seq,
ca6549af 608 " src_mac_count: %d dst_mac_count: %d\n",
222f1806 609 pkt_dev->src_mac_count, pkt_dev->dst_mac_count);
1da177e4 610
ca6549af 611 if (pkt_dev->nr_labels) {
97dc48e2 612 seq_puts(seq, " mpls: ");
e71a4783 613 for (i = 0; i < pkt_dev->nr_labels; i++)
ca6549af
SW
614 seq_printf(seq, "%08x%s", ntohl(pkt_dev->labels[i]),
615 i == pkt_dev->nr_labels-1 ? "\n" : ", ");
616 }
617
63adc6fb 618 if (pkt_dev->vlan_id != 0xffff)
34954ddc 619 seq_printf(seq, " vlan_id: %u vlan_p: %u vlan_cfi: %u\n",
63adc6fb
SH
620 pkt_dev->vlan_id, pkt_dev->vlan_p,
621 pkt_dev->vlan_cfi);
34954ddc 622
63adc6fb 623 if (pkt_dev->svlan_id != 0xffff)
34954ddc 624 seq_printf(seq, " svlan_id: %u vlan_p: %u vlan_cfi: %u\n",
63adc6fb
SH
625 pkt_dev->svlan_id, pkt_dev->svlan_p,
626 pkt_dev->svlan_cfi);
34954ddc 627
63adc6fb 628 if (pkt_dev->tos)
1ca7768c 629 seq_printf(seq, " tos: 0x%02x\n", pkt_dev->tos);
1ca7768c 630
63adc6fb 631 if (pkt_dev->traffic_class)
1ca7768c 632 seq_printf(seq, " traffic_class: 0x%02x\n", pkt_dev->traffic_class);
1ca7768c 633
38b2cf29
AS
634 if (pkt_dev->burst > 1)
635 seq_printf(seq, " burst: %d\n", pkt_dev->burst);
636
e99b99b4
RO
637 if (pkt_dev->node >= 0)
638 seq_printf(seq, " node: %d\n", pkt_dev->node);
639
62f64aed
AS
640 if (pkt_dev->xmit_mode == M_NETIF_RECEIVE)
641 seq_puts(seq, " xmit_mode: netif_receive\n");
0967f244
JF
642 else if (pkt_dev->xmit_mode == M_QUEUE_XMIT)
643 seq_puts(seq, " xmit_mode: xmit_queue\n");
62f64aed 644
97dc48e2 645 seq_puts(seq, " Flags: ");
ca6549af 646
99c6d3d2
DS
647 for (i = 0; i < NR_PKT_FLAGS; i++) {
648 if (i == F_FLOW_SEQ)
649 if (!pkt_dev->cflows)
650 continue;
afb84b62 651
99c6d3d2
DS
652 if (pkt_dev->flags & (1 << i))
653 seq_printf(seq, "%s ", pkt_flag_names[i]);
654 else if (i == F_FLOW_SEQ)
655 seq_puts(seq, "FLOW_RND ");
007a531b 656
a553e4a6 657#ifdef CONFIG_XFRM
99c6d3d2 658 if (i == F_IPSEC && pkt_dev->spi)
8101328b 659 seq_printf(seq, "spi:%u", pkt_dev->spi);
a553e4a6 660#endif
99c6d3d2 661 }
e99b99b4 662
222f1806
LC
663 seq_puts(seq, "\n");
664
fd29cf72 665 /* not really stopped, more like last-running-at */
398f382c 666 stopped = pkt_dev->running ? ktime_get() : pkt_dev->stopped_at;
fd29cf72
SH
667 idle = pkt_dev->idle_acc;
668 do_div(idle, NSEC_PER_USEC);
1da177e4 669
222f1806 670 seq_printf(seq,
fd29cf72 671 "Current:\n pkts-sofar: %llu errors: %llu\n",
222f1806 672 (unsigned long long)pkt_dev->sofar,
fd29cf72
SH
673 (unsigned long long)pkt_dev->errors);
674
675 seq_printf(seq,
676 " started: %lluus stopped: %lluus idle: %lluus\n",
677 (unsigned long long) ktime_to_us(pkt_dev->started_at),
678 (unsigned long long) ktime_to_us(stopped),
679 (unsigned long long) idle);
1da177e4 680
222f1806
LC
681 seq_printf(seq,
682 " seq_num: %d cur_dst_mac_offset: %d cur_src_mac_offset: %d\n",
d50a6b56
SH
683 pkt_dev->seq_num, pkt_dev->cur_dst_mac_offset,
684 pkt_dev->cur_src_mac_offset);
1da177e4 685
222f1806 686 if (pkt_dev->flags & F_IPV6) {
47a0200d
AD
687 seq_printf(seq, " cur_saddr: %pI6c cur_daddr: %pI6c\n",
688 &pkt_dev->cur_in6_saddr,
689 &pkt_dev->cur_in6_daddr);
222f1806 690 } else
0373a946
AW
691 seq_printf(seq, " cur_saddr: %pI4 cur_daddr: %pI4\n",
692 &pkt_dev->cur_saddr, &pkt_dev->cur_daddr);
1da177e4 693
222f1806 694 seq_printf(seq, " cur_udp_dst: %d cur_udp_src: %d\n",
d50a6b56 695 pkt_dev->cur_udp_dst, pkt_dev->cur_udp_src);
1da177e4 696
45b270f8
RO
697 seq_printf(seq, " cur_queue_map: %u\n", pkt_dev->cur_queue_map);
698
222f1806 699 seq_printf(seq, " flows: %u\n", pkt_dev->nflows);
1da177e4
LT
700
701 if (pkt_dev->result[0])
222f1806 702 seq_printf(seq, "Result: %s\n", pkt_dev->result);
1da177e4 703 else
97dc48e2 704 seq_puts(seq, "Result: Idle\n");
1da177e4 705
d50a6b56 706 return 0;
1da177e4
LT
707}
708
ca6549af 709
63adc6fb
SH
710static int hex32_arg(const char __user *user_buffer, unsigned long maxlen,
711 __u32 *num)
ca6549af
SW
712{
713 int i = 0;
714 *num = 0;
715
e71a4783 716 for (; i < maxlen; i++) {
82fd5b5d 717 int value;
ca6549af
SW
718 char c;
719 *num <<= 4;
720 if (get_user(c, &user_buffer[i]))
721 return -EFAULT;
82fd5b5d
AS
722 value = hex_to_bin(c);
723 if (value >= 0)
724 *num |= value;
ca6549af
SW
725 else
726 break;
727 }
728 return i;
729}
730
222f1806
LC
731static int count_trail_chars(const char __user * user_buffer,
732 unsigned int maxlen)
1da177e4
LT
733{
734 int i;
735
736 for (i = 0; i < maxlen; i++) {
222f1806
LC
737 char c;
738 if (get_user(c, &user_buffer[i]))
739 return -EFAULT;
740 switch (c) {
1da177e4
LT
741 case '\"':
742 case '\n':
743 case '\r':
744 case '\t':
745 case ' ':
746 case '=':
747 break;
748 default:
749 goto done;
3ff50b79 750 }
1da177e4
LT
751 }
752done:
753 return i;
754}
755
bf0813bd
PG
756static long num_arg(const char __user *user_buffer, unsigned long maxlen,
757 unsigned long *num)
1da177e4 758{
d6182223 759 int i;
1da177e4 760 *num = 0;
222f1806 761
d6182223 762 for (i = 0; i < maxlen; i++) {
222f1806
LC
763 char c;
764 if (get_user(c, &user_buffer[i]))
765 return -EFAULT;
766 if ((c >= '0') && (c <= '9')) {
1da177e4 767 *num *= 10;
222f1806 768 *num += c - '0';
1da177e4
LT
769 } else
770 break;
771 }
772 return i;
773}
774
222f1806 775static int strn_len(const char __user * user_buffer, unsigned int maxlen)
1da177e4 776{
d6182223 777 int i;
1da177e4 778
d6182223 779 for (i = 0; i < maxlen; i++) {
222f1806
LC
780 char c;
781 if (get_user(c, &user_buffer[i]))
782 return -EFAULT;
783 switch (c) {
1da177e4
LT
784 case '\"':
785 case '\n':
786 case '\r':
787 case '\t':
788 case ' ':
789 goto done_str;
1da177e4
LT
790 default:
791 break;
3ff50b79 792 }
1da177e4
LT
793 }
794done_str:
1da177e4
LT
795 return i;
796}
797
ca6549af
SW
798static ssize_t get_labels(const char __user *buffer, struct pktgen_dev *pkt_dev)
799{
95c96174 800 unsigned int n = 0;
ca6549af
SW
801 char c;
802 ssize_t i = 0;
803 int len;
804
805 pkt_dev->nr_labels = 0;
806 do {
807 __u32 tmp;
1ca7768c 808 len = hex32_arg(&buffer[i], 8, &tmp);
ca6549af
SW
809 if (len <= 0)
810 return len;
811 pkt_dev->labels[n] = htonl(tmp);
812 if (pkt_dev->labels[n] & MPLS_STACK_BOTTOM)
813 pkt_dev->flags |= F_MPLS_RND;
814 i += len;
815 if (get_user(c, &buffer[i]))
816 return -EFAULT;
817 i++;
818 n++;
819 if (n >= MAX_MPLS_LABELS)
820 return -E2BIG;
e71a4783 821 } while (c == ',');
ca6549af
SW
822
823 pkt_dev->nr_labels = n;
824 return i;
825}
826
52e12d5d
DS
827static __u32 pktgen_read_flag(const char *f, bool *disable)
828{
829 __u32 i;
830
831 if (f[0] == '!') {
832 *disable = true;
833 f++;
834 }
835
836 for (i = 0; i < NR_PKT_FLAGS; i++) {
837 if (!IS_ENABLED(CONFIG_XFRM) && i == IPSEC_SHIFT)
838 continue;
839
840 /* allow only disabling ipv6 flag */
841 if (!*disable && i == IPV6_SHIFT)
842 continue;
843
844 if (strcmp(f, pkt_flag_names[i]) == 0)
845 return 1 << i;
846 }
847
848 if (strcmp(f, "FLOW_RND") == 0) {
849 *disable = !*disable;
850 return F_FLOW_SEQ;
851 }
852
853 return 0;
854}
855
222f1806
LC
856static ssize_t pktgen_if_write(struct file *file,
857 const char __user * user_buffer, size_t count,
858 loff_t * offset)
1da177e4 859{
8a994a71 860 struct seq_file *seq = file->private_data;
222f1806 861 struct pktgen_dev *pkt_dev = seq->private;
d6182223 862 int i, max, len;
1da177e4
LT
863 char name[16], valstr[32];
864 unsigned long value = 0;
222f1806
LC
865 char *pg_result = NULL;
866 int tmp = 0;
1da177e4 867 char buf[128];
222f1806
LC
868
869 pg_result = &(pkt_dev->result[0]);
870
1da177e4 871 if (count < 1) {
294a0b7f 872 pr_warn("wrong command format\n");
1da177e4
LT
873 return -EINVAL;
874 }
222f1806 875
d6182223
PG
876 max = count;
877 tmp = count_trail_chars(user_buffer, max);
222f1806 878 if (tmp < 0) {
294a0b7f 879 pr_warn("illegal format\n");
222f1806 880 return tmp;
1da177e4 881 }
d6182223 882 i = tmp;
222f1806 883
1da177e4
LT
884 /* Read variable name */
885
886 len = strn_len(&user_buffer[i], sizeof(name) - 1);
63adc6fb 887 if (len < 0)
222f1806 888 return len;
63adc6fb 889
1da177e4 890 memset(name, 0, sizeof(name));
222f1806 891 if (copy_from_user(name, &user_buffer[i], len))
1da177e4
LT
892 return -EFAULT;
893 i += len;
222f1806
LC
894
895 max = count - i;
1da177e4 896 len = count_trail_chars(&user_buffer[i], max);
222f1806
LC
897 if (len < 0)
898 return len;
899
1da177e4
LT
900 i += len;
901
902 if (debug) {
a870a02c
AB
903 size_t copy = min_t(size_t, count + 1, 1024);
904 char *tp = strndup_user(user_buffer, copy);
905
906 if (IS_ERR(tp))
907 return PTR_ERR(tp);
908
909 pr_debug("%s,%zu buffer -:%s:-\n", name, count, tp);
29d1df72 910 kfree(tp);
222f1806 911 }
1da177e4
LT
912
913 if (!strcmp(name, "min_pkt_size")) {
914 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 915 if (len < 0)
222f1806 916 return len;
63adc6fb 917
1da177e4 918 i += len;
222f1806
LC
919 if (value < 14 + 20 + 8)
920 value = 14 + 20 + 8;
921 if (value != pkt_dev->min_pkt_size) {
922 pkt_dev->min_pkt_size = value;
923 pkt_dev->cur_pkt_size = value;
924 }
925 sprintf(pg_result, "OK: min_pkt_size=%u",
926 pkt_dev->min_pkt_size);
1da177e4
LT
927 return count;
928 }
929
222f1806 930 if (!strcmp(name, "max_pkt_size")) {
1da177e4 931 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 932 if (len < 0)
222f1806 933 return len;
63adc6fb 934
1da177e4 935 i += len;
222f1806
LC
936 if (value < 14 + 20 + 8)
937 value = 14 + 20 + 8;
938 if (value != pkt_dev->max_pkt_size) {
939 pkt_dev->max_pkt_size = value;
940 pkt_dev->cur_pkt_size = value;
941 }
942 sprintf(pg_result, "OK: max_pkt_size=%u",
943 pkt_dev->max_pkt_size);
1da177e4
LT
944 return count;
945 }
946
222f1806 947 /* Shortcut for min = max */
1da177e4
LT
948
949 if (!strcmp(name, "pkt_size")) {
950 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 951 if (len < 0)
222f1806 952 return len;
63adc6fb 953
1da177e4 954 i += len;
222f1806
LC
955 if (value < 14 + 20 + 8)
956 value = 14 + 20 + 8;
957 if (value != pkt_dev->min_pkt_size) {
958 pkt_dev->min_pkt_size = value;
959 pkt_dev->max_pkt_size = value;
960 pkt_dev->cur_pkt_size = value;
961 }
1da177e4
LT
962 sprintf(pg_result, "OK: pkt_size=%u", pkt_dev->min_pkt_size);
963 return count;
964 }
965
222f1806 966 if (!strcmp(name, "debug")) {
1da177e4 967 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 968 if (len < 0)
222f1806 969 return len;
63adc6fb 970
1da177e4 971 i += len;
222f1806 972 debug = value;
1da177e4
LT
973 sprintf(pg_result, "OK: debug=%u", debug);
974 return count;
975 }
976
222f1806 977 if (!strcmp(name, "frags")) {
1da177e4 978 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 979 if (len < 0)
222f1806 980 return len;
63adc6fb 981
1da177e4
LT
982 i += len;
983 pkt_dev->nfrags = value;
984 sprintf(pg_result, "OK: frags=%u", pkt_dev->nfrags);
985 return count;
986 }
987 if (!strcmp(name, "delay")) {
988 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 989 if (len < 0)
222f1806 990 return len;
63adc6fb 991
1da177e4 992 i += len;
fd29cf72
SH
993 if (value == 0x7FFFFFFF)
994 pkt_dev->delay = ULLONG_MAX;
995 else
9240d715 996 pkt_dev->delay = (u64)value;
fd29cf72
SH
997
998 sprintf(pg_result, "OK: delay=%llu",
999 (unsigned long long) pkt_dev->delay);
1da177e4
LT
1000 return count;
1001 }
43d28b65
DT
1002 if (!strcmp(name, "rate")) {
1003 len = num_arg(&user_buffer[i], 10, &value);
1004 if (len < 0)
1005 return len;
1006
1007 i += len;
1008 if (!value)
1009 return len;
1010 pkt_dev->delay = pkt_dev->min_pkt_size*8*NSEC_PER_USEC/value;
1011 if (debug)
f9467eae 1012 pr_info("Delay set at: %llu ns\n", pkt_dev->delay);
43d28b65
DT
1013
1014 sprintf(pg_result, "OK: rate=%lu", value);
1015 return count;
1016 }
1017 if (!strcmp(name, "ratep")) {
1018 len = num_arg(&user_buffer[i], 10, &value);
1019 if (len < 0)
1020 return len;
1021
1022 i += len;
1023 if (!value)
1024 return len;
1025 pkt_dev->delay = NSEC_PER_SEC/value;
1026 if (debug)
f9467eae 1027 pr_info("Delay set at: %llu ns\n", pkt_dev->delay);
43d28b65
DT
1028
1029 sprintf(pg_result, "OK: rate=%lu", value);
1030 return count;
1031 }
222f1806 1032 if (!strcmp(name, "udp_src_min")) {
1da177e4 1033 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 1034 if (len < 0)
222f1806 1035 return len;
63adc6fb 1036
1da177e4 1037 i += len;
222f1806
LC
1038 if (value != pkt_dev->udp_src_min) {
1039 pkt_dev->udp_src_min = value;
1040 pkt_dev->cur_udp_src = value;
1041 }
1da177e4
LT
1042 sprintf(pg_result, "OK: udp_src_min=%u", pkt_dev->udp_src_min);
1043 return count;
1044 }
222f1806 1045 if (!strcmp(name, "udp_dst_min")) {
1da177e4 1046 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 1047 if (len < 0)
222f1806 1048 return len;
63adc6fb 1049
1da177e4 1050 i += len;
222f1806
LC
1051 if (value != pkt_dev->udp_dst_min) {
1052 pkt_dev->udp_dst_min = value;
1053 pkt_dev->cur_udp_dst = value;
1054 }
1da177e4
LT
1055 sprintf(pg_result, "OK: udp_dst_min=%u", pkt_dev->udp_dst_min);
1056 return count;
1057 }
222f1806 1058 if (!strcmp(name, "udp_src_max")) {
1da177e4 1059 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 1060 if (len < 0)
222f1806 1061 return len;
63adc6fb 1062
1da177e4 1063 i += len;
222f1806
LC
1064 if (value != pkt_dev->udp_src_max) {
1065 pkt_dev->udp_src_max = value;
1066 pkt_dev->cur_udp_src = value;
1067 }
1da177e4
LT
1068 sprintf(pg_result, "OK: udp_src_max=%u", pkt_dev->udp_src_max);
1069 return count;
1070 }
222f1806 1071 if (!strcmp(name, "udp_dst_max")) {
1da177e4 1072 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 1073 if (len < 0)
222f1806 1074 return len;
63adc6fb 1075
1da177e4 1076 i += len;
222f1806
LC
1077 if (value != pkt_dev->udp_dst_max) {
1078 pkt_dev->udp_dst_max = value;
1079 pkt_dev->cur_udp_dst = value;
1080 }
1da177e4
LT
1081 sprintf(pg_result, "OK: udp_dst_max=%u", pkt_dev->udp_dst_max);
1082 return count;
1083 }
1084 if (!strcmp(name, "clone_skb")) {
1085 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 1086 if (len < 0)
222f1806 1087 return len;
d8873315 1088 if ((value > 0) &&
62f64aed
AS
1089 ((pkt_dev->xmit_mode == M_NETIF_RECEIVE) ||
1090 !(pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)))
d8873315 1091 return -ENOTSUPP;
1da177e4 1092 i += len;
222f1806
LC
1093 pkt_dev->clone_skb = value;
1094
1da177e4
LT
1095 sprintf(pg_result, "OK: clone_skb=%d", pkt_dev->clone_skb);
1096 return count;
1097 }
1098 if (!strcmp(name, "count")) {
1099 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 1100 if (len < 0)
222f1806 1101 return len;
63adc6fb 1102
1da177e4
LT
1103 i += len;
1104 pkt_dev->count = value;
1105 sprintf(pg_result, "OK: count=%llu",
222f1806 1106 (unsigned long long)pkt_dev->count);
1da177e4
LT
1107 return count;
1108 }
1109 if (!strcmp(name, "src_mac_count")) {
1110 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 1111 if (len < 0)
222f1806 1112 return len;
63adc6fb 1113
1da177e4
LT
1114 i += len;
1115 if (pkt_dev->src_mac_count != value) {
222f1806
LC
1116 pkt_dev->src_mac_count = value;
1117 pkt_dev->cur_src_mac_offset = 0;
1118 }
1119 sprintf(pg_result, "OK: src_mac_count=%d",
1120 pkt_dev->src_mac_count);
1da177e4
LT
1121 return count;
1122 }
1123 if (!strcmp(name, "dst_mac_count")) {
1124 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 1125 if (len < 0)
222f1806 1126 return len;
63adc6fb 1127
1da177e4
LT
1128 i += len;
1129 if (pkt_dev->dst_mac_count != value) {
222f1806
LC
1130 pkt_dev->dst_mac_count = value;
1131 pkt_dev->cur_dst_mac_offset = 0;
1132 }
1133 sprintf(pg_result, "OK: dst_mac_count=%d",
1134 pkt_dev->dst_mac_count);
1da177e4
LT
1135 return count;
1136 }
38b2cf29
AS
1137 if (!strcmp(name, "burst")) {
1138 len = num_arg(&user_buffer[i], 10, &value);
1139 if (len < 0)
1140 return len;
1141
1142 i += len;
0967f244
JF
1143 if ((value > 1) &&
1144 ((pkt_dev->xmit_mode == M_QUEUE_XMIT) ||
1145 ((pkt_dev->xmit_mode == M_START_XMIT) &&
1146 (!(pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)))))
52d6c8c6 1147 return -ENOTSUPP;
38b2cf29
AS
1148 pkt_dev->burst = value < 1 ? 1 : value;
1149 sprintf(pg_result, "OK: burst=%d", pkt_dev->burst);
1150 return count;
1151 }
e99b99b4
RO
1152 if (!strcmp(name, "node")) {
1153 len = num_arg(&user_buffer[i], 10, &value);
1154 if (len < 0)
1155 return len;
1156
1157 i += len;
1158
1159 if (node_possible(value)) {
1160 pkt_dev->node = value;
1161 sprintf(pg_result, "OK: node=%d", pkt_dev->node);
26ad7879
ED
1162 if (pkt_dev->page) {
1163 put_page(pkt_dev->page);
1164 pkt_dev->page = NULL;
1165 }
e99b99b4
RO
1166 }
1167 else
1168 sprintf(pg_result, "ERROR: node not possible");
1169 return count;
1170 }
62f64aed
AS
1171 if (!strcmp(name, "xmit_mode")) {
1172 char f[32];
1173
1174 memset(f, 0, 32);
1175 len = strn_len(&user_buffer[i], sizeof(f) - 1);
1176 if (len < 0)
1177 return len;
1178
1179 if (copy_from_user(f, &user_buffer[i], len))
1180 return -EFAULT;
1181 i += len;
1182
1183 if (strcmp(f, "start_xmit") == 0) {
1184 pkt_dev->xmit_mode = M_START_XMIT;
1185 } else if (strcmp(f, "netif_receive") == 0) {
1186 /* clone_skb set earlier, not supported in this mode */
1187 if (pkt_dev->clone_skb > 0)
1188 return -ENOTSUPP;
1189
1190 pkt_dev->xmit_mode = M_NETIF_RECEIVE;
9eea9222
AS
1191
1192 /* make sure new packet is allocated every time
1193 * pktgen_xmit() is called
1194 */
1195 pkt_dev->last_ok = 1;
1196
1197 /* override clone_skb if user passed default value
1198 * at module loading time
1199 */
1200 pkt_dev->clone_skb = 0;
0967f244
JF
1201 } else if (strcmp(f, "queue_xmit") == 0) {
1202 pkt_dev->xmit_mode = M_QUEUE_XMIT;
1203 pkt_dev->last_ok = 1;
62f64aed
AS
1204 } else {
1205 sprintf(pg_result,
1206 "xmit_mode -:%s:- unknown\nAvailable modes: %s",
1207 f, "start_xmit, netif_receive\n");
1208 return count;
1209 }
1210 sprintf(pg_result, "OK: xmit_mode=%s", f);
1211 return count;
1212 }
1da177e4 1213 if (!strcmp(name, "flag")) {
52e12d5d 1214 __u32 flag;
222f1806 1215 char f[32];
52e12d5d
DS
1216 bool disable = false;
1217
222f1806 1218 memset(f, 0, 32);
1da177e4 1219 len = strn_len(&user_buffer[i], sizeof(f) - 1);
63adc6fb 1220 if (len < 0)
222f1806 1221 return len;
63adc6fb 1222
1da177e4
LT
1223 if (copy_from_user(f, &user_buffer[i], len))
1224 return -EFAULT;
1225 i += len;
222f1806 1226
52e12d5d 1227 flag = pktgen_read_flag(f, &disable);
222f1806 1228
52e12d5d
DS
1229 if (flag) {
1230 if (disable)
1231 pkt_dev->flags &= ~flag;
1232 else
1233 pkt_dev->flags |= flag;
1234 } else {
222f1806
LC
1235 sprintf(pg_result,
1236 "Flag -:%s:- unknown\nAvailable flags, (prepend ! to un-set flag):\n%s",
1237 f,
1ca7768c 1238 "IPSRC_RND, IPDST_RND, UDPSRC_RND, UDPDST_RND, "
72f8e06f
MK
1239 "MACSRC_RND, MACDST_RND, TXSIZE_RND, IPV6, "
1240 "MPLS_RND, VID_RND, SVID_RND, FLOW_SEQ, "
1241 "QUEUE_MAP_RND, QUEUE_MAP_CPU, UDPCSUM, "
afb84b62 1242 "NO_TIMESTAMP, "
72f8e06f
MK
1243#ifdef CONFIG_XFRM
1244 "IPSEC, "
1245#endif
1246 "NODE_ALLOC\n");
222f1806
LC
1247 return count;
1248 }
1da177e4
LT
1249 sprintf(pg_result, "OK: flags=0x%x", pkt_dev->flags);
1250 return count;
1251 }
1252 if (!strcmp(name, "dst_min") || !strcmp(name, "dst")) {
1253 len = strn_len(&user_buffer[i], sizeof(pkt_dev->dst_min) - 1);
63adc6fb 1254 if (len < 0)
222f1806 1255 return len;
1da177e4 1256
222f1806 1257 if (copy_from_user(buf, &user_buffer[i], len))
1da177e4 1258 return -EFAULT;
222f1806
LC
1259 buf[len] = 0;
1260 if (strcmp(buf, pkt_dev->dst_min) != 0) {
1261 memset(pkt_dev->dst_min, 0, sizeof(pkt_dev->dst_min));
f15f084f 1262 strcpy(pkt_dev->dst_min, buf);
222f1806
LC
1263 pkt_dev->daddr_min = in_aton(pkt_dev->dst_min);
1264 pkt_dev->cur_daddr = pkt_dev->daddr_min;
1265 }
1266 if (debug)
f342cda7 1267 pr_debug("dst_min set to: %s\n", pkt_dev->dst_min);
222f1806 1268 i += len;
1da177e4
LT
1269 sprintf(pg_result, "OK: dst_min=%s", pkt_dev->dst_min);
1270 return count;
1271 }
1272 if (!strcmp(name, "dst_max")) {
1273 len = strn_len(&user_buffer[i], sizeof(pkt_dev->dst_max) - 1);
63adc6fb 1274 if (len < 0)
222f1806 1275 return len;
63adc6fb 1276
222f1806 1277 if (copy_from_user(buf, &user_buffer[i], len))
1da177e4 1278 return -EFAULT;
222f1806
LC
1279 buf[len] = 0;
1280 if (strcmp(buf, pkt_dev->dst_max) != 0) {
1281 memset(pkt_dev->dst_max, 0, sizeof(pkt_dev->dst_max));
f15f084f 1282 strcpy(pkt_dev->dst_max, buf);
222f1806
LC
1283 pkt_dev->daddr_max = in_aton(pkt_dev->dst_max);
1284 pkt_dev->cur_daddr = pkt_dev->daddr_max;
1285 }
1286 if (debug)
f342cda7 1287 pr_debug("dst_max set to: %s\n", pkt_dev->dst_max);
1da177e4
LT
1288 i += len;
1289 sprintf(pg_result, "OK: dst_max=%s", pkt_dev->dst_max);
1290 return count;
1291 }
1292 if (!strcmp(name, "dst6")) {
1293 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
222f1806
LC
1294 if (len < 0)
1295 return len;
1da177e4
LT
1296
1297 pkt_dev->flags |= F_IPV6;
1298
222f1806 1299 if (copy_from_user(buf, &user_buffer[i], len))
1da177e4 1300 return -EFAULT;
222f1806 1301 buf[len] = 0;
1da177e4 1302
c468fb13 1303 in6_pton(buf, -1, pkt_dev->in6_daddr.s6_addr, -1, NULL);
47a0200d 1304 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->in6_daddr);
1da177e4 1305
4e3fd7a0 1306 pkt_dev->cur_in6_daddr = pkt_dev->in6_daddr;
1da177e4 1307
222f1806 1308 if (debug)
f342cda7 1309 pr_debug("dst6 set to: %s\n", buf);
1da177e4 1310
222f1806 1311 i += len;
1da177e4
LT
1312 sprintf(pg_result, "OK: dst6=%s", buf);
1313 return count;
1314 }
1315 if (!strcmp(name, "dst6_min")) {
1316 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
222f1806
LC
1317 if (len < 0)
1318 return len;
1da177e4
LT
1319
1320 pkt_dev->flags |= F_IPV6;
1321
222f1806 1322 if (copy_from_user(buf, &user_buffer[i], len))
1da177e4 1323 return -EFAULT;
222f1806 1324 buf[len] = 0;
1da177e4 1325
c468fb13 1326 in6_pton(buf, -1, pkt_dev->min_in6_daddr.s6_addr, -1, NULL);
47a0200d 1327 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->min_in6_daddr);
1da177e4 1328
4e3fd7a0 1329 pkt_dev->cur_in6_daddr = pkt_dev->min_in6_daddr;
222f1806 1330 if (debug)
f342cda7 1331 pr_debug("dst6_min set to: %s\n", buf);
1da177e4 1332
222f1806 1333 i += len;
1da177e4
LT
1334 sprintf(pg_result, "OK: dst6_min=%s", buf);
1335 return count;
1336 }
1337 if (!strcmp(name, "dst6_max")) {
1338 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
222f1806
LC
1339 if (len < 0)
1340 return len;
1da177e4
LT
1341
1342 pkt_dev->flags |= F_IPV6;
1343
222f1806 1344 if (copy_from_user(buf, &user_buffer[i], len))
1da177e4 1345 return -EFAULT;
222f1806 1346 buf[len] = 0;
1da177e4 1347
c468fb13 1348 in6_pton(buf, -1, pkt_dev->max_in6_daddr.s6_addr, -1, NULL);
47a0200d 1349 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->max_in6_daddr);
1da177e4 1350
222f1806 1351 if (debug)
f342cda7 1352 pr_debug("dst6_max set to: %s\n", buf);
1da177e4 1353
222f1806 1354 i += len;
1da177e4
LT
1355 sprintf(pg_result, "OK: dst6_max=%s", buf);
1356 return count;
1357 }
1358 if (!strcmp(name, "src6")) {
1359 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
222f1806
LC
1360 if (len < 0)
1361 return len;
1da177e4
LT
1362
1363 pkt_dev->flags |= F_IPV6;
1364
222f1806 1365 if (copy_from_user(buf, &user_buffer[i], len))
1da177e4 1366 return -EFAULT;
222f1806 1367 buf[len] = 0;
1da177e4 1368
c468fb13 1369 in6_pton(buf, -1, pkt_dev->in6_saddr.s6_addr, -1, NULL);
47a0200d 1370 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->in6_saddr);
1da177e4 1371
4e3fd7a0 1372 pkt_dev->cur_in6_saddr = pkt_dev->in6_saddr;
1da177e4 1373
222f1806 1374 if (debug)
f342cda7 1375 pr_debug("src6 set to: %s\n", buf);
222f1806
LC
1376
1377 i += len;
1da177e4
LT
1378 sprintf(pg_result, "OK: src6=%s", buf);
1379 return count;
1380 }
1381 if (!strcmp(name, "src_min")) {
1382 len = strn_len(&user_buffer[i], sizeof(pkt_dev->src_min) - 1);
63adc6fb 1383 if (len < 0)
222f1806 1384 return len;
63adc6fb 1385
222f1806 1386 if (copy_from_user(buf, &user_buffer[i], len))
1da177e4 1387 return -EFAULT;
222f1806
LC
1388 buf[len] = 0;
1389 if (strcmp(buf, pkt_dev->src_min) != 0) {
1390 memset(pkt_dev->src_min, 0, sizeof(pkt_dev->src_min));
f15f084f 1391 strcpy(pkt_dev->src_min, buf);
222f1806
LC
1392 pkt_dev->saddr_min = in_aton(pkt_dev->src_min);
1393 pkt_dev->cur_saddr = pkt_dev->saddr_min;
1394 }
1395 if (debug)
f342cda7 1396 pr_debug("src_min set to: %s\n", pkt_dev->src_min);
1da177e4
LT
1397 i += len;
1398 sprintf(pg_result, "OK: src_min=%s", pkt_dev->src_min);
1399 return count;
1400 }
1401 if (!strcmp(name, "src_max")) {
1402 len = strn_len(&user_buffer[i], sizeof(pkt_dev->src_max) - 1);
63adc6fb 1403 if (len < 0)
222f1806 1404 return len;
63adc6fb 1405
222f1806 1406 if (copy_from_user(buf, &user_buffer[i], len))
1da177e4 1407 return -EFAULT;
222f1806
LC
1408 buf[len] = 0;
1409 if (strcmp(buf, pkt_dev->src_max) != 0) {
1410 memset(pkt_dev->src_max, 0, sizeof(pkt_dev->src_max));
f15f084f 1411 strcpy(pkt_dev->src_max, buf);
222f1806
LC
1412 pkt_dev->saddr_max = in_aton(pkt_dev->src_max);
1413 pkt_dev->cur_saddr = pkt_dev->saddr_max;
1414 }
1415 if (debug)
f342cda7 1416 pr_debug("src_max set to: %s\n", pkt_dev->src_max);
1da177e4
LT
1417 i += len;
1418 sprintf(pg_result, "OK: src_max=%s", pkt_dev->src_max);
1419 return count;
1420 }
1421 if (!strcmp(name, "dst_mac")) {
1da177e4 1422 len = strn_len(&user_buffer[i], sizeof(valstr) - 1);
63adc6fb 1423 if (len < 0)
222f1806 1424 return len;
63adc6fb 1425
1da177e4 1426 memset(valstr, 0, sizeof(valstr));
222f1806 1427 if (copy_from_user(valstr, &user_buffer[i], len))
1da177e4 1428 return -EFAULT;
1da177e4 1429
4940fc88
AD
1430 if (!mac_pton(valstr, pkt_dev->dst_mac))
1431 return -EINVAL;
1da177e4 1432 /* Set up Dest MAC */
9ea08b12 1433 ether_addr_copy(&pkt_dev->hh[0], pkt_dev->dst_mac);
222f1806 1434
4940fc88 1435 sprintf(pg_result, "OK: dstmac %pM", pkt_dev->dst_mac);
1da177e4
LT
1436 return count;
1437 }
1438 if (!strcmp(name, "src_mac")) {
1da177e4 1439 len = strn_len(&user_buffer[i], sizeof(valstr) - 1);
63adc6fb 1440 if (len < 0)
222f1806 1441 return len;
63adc6fb 1442
1da177e4 1443 memset(valstr, 0, sizeof(valstr));
222f1806 1444 if (copy_from_user(valstr, &user_buffer[i], len))
1da177e4 1445 return -EFAULT;
1da177e4 1446
4940fc88
AD
1447 if (!mac_pton(valstr, pkt_dev->src_mac))
1448 return -EINVAL;
ce5d0b47 1449 /* Set up Src MAC */
9ea08b12 1450 ether_addr_copy(&pkt_dev->hh[6], pkt_dev->src_mac);
ce5d0b47 1451
4940fc88 1452 sprintf(pg_result, "OK: srcmac %pM", pkt_dev->src_mac);
1da177e4
LT
1453 return count;
1454 }
1455
222f1806
LC
1456 if (!strcmp(name, "clear_counters")) {
1457 pktgen_clear_counters(pkt_dev);
1458 sprintf(pg_result, "OK: Clearing counters.\n");
1459 return count;
1460 }
1da177e4
LT
1461
1462 if (!strcmp(name, "flows")) {
1463 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 1464 if (len < 0)
222f1806 1465 return len;
63adc6fb 1466
1da177e4
LT
1467 i += len;
1468 if (value > MAX_CFLOWS)
1469 value = MAX_CFLOWS;
1470
1471 pkt_dev->cflows = value;
1472 sprintf(pg_result, "OK: flows=%u", pkt_dev->cflows);
1473 return count;
1474 }
6bae9190 1475#ifdef CONFIG_XFRM
de4aee7d
FD
1476 if (!strcmp(name, "spi")) {
1477 len = num_arg(&user_buffer[i], 10, &value);
1478 if (len < 0)
1479 return len;
1480
1481 i += len;
1482 pkt_dev->spi = value;
1483 sprintf(pg_result, "OK: spi=%u", pkt_dev->spi);
1484 return count;
1485 }
6bae9190 1486#endif
1da177e4
LT
1487 if (!strcmp(name, "flowlen")) {
1488 len = num_arg(&user_buffer[i], 10, &value);
63adc6fb 1489 if (len < 0)
222f1806 1490 return len;
63adc6fb 1491
1da177e4
LT
1492 i += len;
1493 pkt_dev->lflow = value;
1494 sprintf(pg_result, "OK: flowlen=%u", pkt_dev->lflow);
1495 return count;
1496 }
222f1806 1497
45b270f8
RO
1498 if (!strcmp(name, "queue_map_min")) {
1499 len = num_arg(&user_buffer[i], 5, &value);
63adc6fb 1500 if (len < 0)
45b270f8 1501 return len;
63adc6fb 1502
45b270f8
RO
1503 i += len;
1504 pkt_dev->queue_map_min = value;
1505 sprintf(pg_result, "OK: queue_map_min=%u", pkt_dev->queue_map_min);
1506 return count;
1507 }
1508
1509 if (!strcmp(name, "queue_map_max")) {
1510 len = num_arg(&user_buffer[i], 5, &value);
63adc6fb 1511 if (len < 0)
45b270f8 1512 return len;
63adc6fb 1513
45b270f8
RO
1514 i += len;
1515 pkt_dev->queue_map_max = value;
1516 sprintf(pg_result, "OK: queue_map_max=%u", pkt_dev->queue_map_max);
1517 return count;
1518 }
1519
ca6549af 1520 if (!strcmp(name, "mpls")) {
95c96174 1521 unsigned int n, cnt;
cfcabdcc 1522
ca6549af 1523 len = get_labels(&user_buffer[i], pkt_dev);
cfcabdcc
SH
1524 if (len < 0)
1525 return len;
ca6549af 1526 i += len;
cfcabdcc 1527 cnt = sprintf(pg_result, "OK: mpls=");
e71a4783 1528 for (n = 0; n < pkt_dev->nr_labels; n++)
cfcabdcc
SH
1529 cnt += sprintf(pg_result + cnt,
1530 "%08x%s", ntohl(pkt_dev->labels[n]),
1531 n == pkt_dev->nr_labels-1 ? "" : ",");
34954ddc
FF
1532
1533 if (pkt_dev->nr_labels && pkt_dev->vlan_id != 0xffff) {
1534 pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
1535 pkt_dev->svlan_id = 0xffff;
1536
1537 if (debug)
f342cda7 1538 pr_debug("VLAN/SVLAN auto turned off\n");
34954ddc
FF
1539 }
1540 return count;
1541 }
1542
1543 if (!strcmp(name, "vlan_id")) {
1544 len = num_arg(&user_buffer[i], 4, &value);
63adc6fb 1545 if (len < 0)
34954ddc 1546 return len;
63adc6fb 1547
34954ddc
FF
1548 i += len;
1549 if (value <= 4095) {
1550 pkt_dev->vlan_id = value; /* turn on VLAN */
1551
1552 if (debug)
f342cda7 1553 pr_debug("VLAN turned on\n");
34954ddc
FF
1554
1555 if (debug && pkt_dev->nr_labels)
f342cda7 1556 pr_debug("MPLS auto turned off\n");
34954ddc
FF
1557
1558 pkt_dev->nr_labels = 0; /* turn off MPLS */
1559 sprintf(pg_result, "OK: vlan_id=%u", pkt_dev->vlan_id);
1560 } else {
1561 pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
1562 pkt_dev->svlan_id = 0xffff;
1563
1564 if (debug)
f342cda7 1565 pr_debug("VLAN/SVLAN turned off\n");
34954ddc
FF
1566 }
1567 return count;
1568 }
1569
1570 if (!strcmp(name, "vlan_p")) {
1571 len = num_arg(&user_buffer[i], 1, &value);
63adc6fb 1572 if (len < 0)
34954ddc 1573 return len;
63adc6fb 1574
34954ddc
FF
1575 i += len;
1576 if ((value <= 7) && (pkt_dev->vlan_id != 0xffff)) {
1577 pkt_dev->vlan_p = value;
1578 sprintf(pg_result, "OK: vlan_p=%u", pkt_dev->vlan_p);
1579 } else {
1580 sprintf(pg_result, "ERROR: vlan_p must be 0-7");
1581 }
1582 return count;
1583 }
1584
1585 if (!strcmp(name, "vlan_cfi")) {
1586 len = num_arg(&user_buffer[i], 1, &value);
63adc6fb 1587 if (len < 0)
34954ddc 1588 return len;
63adc6fb 1589
34954ddc
FF
1590 i += len;
1591 if ((value <= 1) && (pkt_dev->vlan_id != 0xffff)) {
1592 pkt_dev->vlan_cfi = value;
1593 sprintf(pg_result, "OK: vlan_cfi=%u", pkt_dev->vlan_cfi);
1594 } else {
1595 sprintf(pg_result, "ERROR: vlan_cfi must be 0-1");
1596 }
1597 return count;
1598 }
1599
1600 if (!strcmp(name, "svlan_id")) {
1601 len = num_arg(&user_buffer[i], 4, &value);
63adc6fb 1602 if (len < 0)
34954ddc 1603 return len;
63adc6fb 1604
34954ddc
FF
1605 i += len;
1606 if ((value <= 4095) && ((pkt_dev->vlan_id != 0xffff))) {
1607 pkt_dev->svlan_id = value; /* turn on SVLAN */
1608
1609 if (debug)
f342cda7 1610 pr_debug("SVLAN turned on\n");
34954ddc
FF
1611
1612 if (debug && pkt_dev->nr_labels)
f342cda7 1613 pr_debug("MPLS auto turned off\n");
34954ddc
FF
1614
1615 pkt_dev->nr_labels = 0; /* turn off MPLS */
1616 sprintf(pg_result, "OK: svlan_id=%u", pkt_dev->svlan_id);
1617 } else {
1618 pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
1619 pkt_dev->svlan_id = 0xffff;
1620
1621 if (debug)
f342cda7 1622 pr_debug("VLAN/SVLAN turned off\n");
34954ddc
FF
1623 }
1624 return count;
1625 }
1626
1627 if (!strcmp(name, "svlan_p")) {
1628 len = num_arg(&user_buffer[i], 1, &value);
63adc6fb 1629 if (len < 0)
34954ddc 1630 return len;
63adc6fb 1631
34954ddc
FF
1632 i += len;
1633 if ((value <= 7) && (pkt_dev->svlan_id != 0xffff)) {
1634 pkt_dev->svlan_p = value;
1635 sprintf(pg_result, "OK: svlan_p=%u", pkt_dev->svlan_p);
1636 } else {
1637 sprintf(pg_result, "ERROR: svlan_p must be 0-7");
1638 }
1639 return count;
1640 }
1641
1642 if (!strcmp(name, "svlan_cfi")) {
1643 len = num_arg(&user_buffer[i], 1, &value);
63adc6fb 1644 if (len < 0)
34954ddc 1645 return len;
63adc6fb 1646
34954ddc
FF
1647 i += len;
1648 if ((value <= 1) && (pkt_dev->svlan_id != 0xffff)) {
1649 pkt_dev->svlan_cfi = value;
1650 sprintf(pg_result, "OK: svlan_cfi=%u", pkt_dev->svlan_cfi);
1651 } else {
1652 sprintf(pg_result, "ERROR: svlan_cfi must be 0-1");
1653 }
ca6549af
SW
1654 return count;
1655 }
1656
1ca7768c
FF
1657 if (!strcmp(name, "tos")) {
1658 __u32 tmp_value = 0;
1659 len = hex32_arg(&user_buffer[i], 2, &tmp_value);
63adc6fb 1660 if (len < 0)
1ca7768c 1661 return len;
63adc6fb 1662
1ca7768c
FF
1663 i += len;
1664 if (len == 2) {
1665 pkt_dev->tos = tmp_value;
1666 sprintf(pg_result, "OK: tos=0x%02x", pkt_dev->tos);
1667 } else {
1668 sprintf(pg_result, "ERROR: tos must be 00-ff");
1669 }
1670 return count;
1671 }
1672
1673 if (!strcmp(name, "traffic_class")) {
1674 __u32 tmp_value = 0;
1675 len = hex32_arg(&user_buffer[i], 2, &tmp_value);
63adc6fb 1676 if (len < 0)
1ca7768c 1677 return len;
63adc6fb 1678
1ca7768c
FF
1679 i += len;
1680 if (len == 2) {
1681 pkt_dev->traffic_class = tmp_value;
1682 sprintf(pg_result, "OK: traffic_class=0x%02x", pkt_dev->traffic_class);
1683 } else {
1684 sprintf(pg_result, "ERROR: traffic_class must be 00-ff");
1685 }
1686 return count;
1687 }
1688
9e50e3ac
JF
1689 if (!strcmp(name, "skb_priority")) {
1690 len = num_arg(&user_buffer[i], 9, &value);
1691 if (len < 0)
1692 return len;
1693
1694 i += len;
1695 pkt_dev->skb_priority = value;
1696 sprintf(pg_result, "OK: skb_priority=%i",
1697 pkt_dev->skb_priority);
1698 return count;
1699 }
1700
1da177e4
LT
1701 sprintf(pkt_dev->result, "No such parameter \"%s\"", name);
1702 return -EINVAL;
1703}
1704
d50a6b56 1705static int pktgen_if_open(struct inode *inode, struct file *file)
1da177e4 1706{
d9dda78b 1707 return single_open(file, pktgen_if_show, PDE_DATA(inode));
d50a6b56 1708}
1da177e4 1709
9a32144e 1710static const struct file_operations pktgen_if_fops = {
222f1806
LC
1711 .open = pktgen_if_open,
1712 .read = seq_read,
1713 .llseek = seq_lseek,
1714 .write = pktgen_if_write,
1715 .release = single_release,
d50a6b56 1716};
1da177e4 1717
d50a6b56
SH
1718static int pktgen_thread_show(struct seq_file *seq, void *v)
1719{
222f1806 1720 struct pktgen_thread *t = seq->private;
648fda74 1721 const struct pktgen_dev *pkt_dev;
d50a6b56
SH
1722
1723 BUG_ON(!t);
1da177e4 1724
97dc48e2 1725 seq_puts(seq, "Running: ");
1da177e4 1726
8788370a
JDB
1727 rcu_read_lock();
1728 list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
222f1806 1729 if (pkt_dev->running)
593f63b0 1730 seq_printf(seq, "%s ", pkt_dev->odevname);
1da177e4 1731
97dc48e2 1732 seq_puts(seq, "\nStopped: ");
222f1806 1733
8788370a 1734 list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
222f1806 1735 if (!pkt_dev->running)
593f63b0 1736 seq_printf(seq, "%s ", pkt_dev->odevname);
1da177e4
LT
1737
1738 if (t->result[0])
d50a6b56 1739 seq_printf(seq, "\nResult: %s\n", t->result);
1da177e4 1740 else
97dc48e2 1741 seq_puts(seq, "\nResult: NA\n");
1da177e4 1742
8788370a 1743 rcu_read_unlock();
1da177e4 1744
d50a6b56 1745 return 0;
1da177e4
LT
1746}
1747
d50a6b56 1748static ssize_t pktgen_thread_write(struct file *file,
222f1806
LC
1749 const char __user * user_buffer,
1750 size_t count, loff_t * offset)
1da177e4 1751{
8a994a71 1752 struct seq_file *seq = file->private_data;
222f1806 1753 struct pktgen_thread *t = seq->private;
d6182223 1754 int i, max, len, ret;
1da177e4 1755 char name[40];
222f1806 1756 char *pg_result;
d50a6b56 1757
1da177e4 1758 if (count < 1) {
222f1806 1759 // sprintf(pg_result, "Wrong command format");
1da177e4
LT
1760 return -EINVAL;
1761 }
d50a6b56 1762
d6182223
PG
1763 max = count;
1764 len = count_trail_chars(user_buffer, max);
222f1806 1765 if (len < 0)
d50a6b56
SH
1766 return len;
1767
d6182223 1768 i = len;
d50a6b56 1769
1da177e4
LT
1770 /* Read variable name */
1771
1772 len = strn_len(&user_buffer[i], sizeof(name) - 1);
222f1806 1773 if (len < 0)
d50a6b56 1774 return len;
222f1806 1775
1da177e4
LT
1776 memset(name, 0, sizeof(name));
1777 if (copy_from_user(name, &user_buffer[i], len))
1778 return -EFAULT;
1779 i += len;
d50a6b56 1780
222f1806 1781 max = count - i;
1da177e4 1782 len = count_trail_chars(&user_buffer[i], max);
222f1806 1783 if (len < 0)
d50a6b56
SH
1784 return len;
1785
1da177e4
LT
1786 i += len;
1787
d50a6b56 1788 if (debug)
f342cda7 1789 pr_debug("t=%s, count=%lu\n", name, (unsigned long)count);
1da177e4 1790
222f1806 1791 if (!t) {
f9467eae 1792 pr_err("ERROR: No thread\n");
1da177e4
LT
1793 ret = -EINVAL;
1794 goto out;
1795 }
1796
1797 pg_result = &(t->result[0]);
1798
222f1806
LC
1799 if (!strcmp(name, "add_device")) {
1800 char f[32];
1801 memset(f, 0, 32);
1da177e4 1802 len = strn_len(&user_buffer[i], sizeof(f) - 1);
222f1806
LC
1803 if (len < 0) {
1804 ret = len;
1da177e4
LT
1805 goto out;
1806 }
222f1806 1807 if (copy_from_user(f, &user_buffer[i], len))
1da177e4
LT
1808 return -EFAULT;
1809 i += len;
6146e6a4 1810 mutex_lock(&pktgen_thread_lock);
604dfd6e 1811 ret = pktgen_add_device(t, f);
6146e6a4 1812 mutex_unlock(&pktgen_thread_lock);
604dfd6e
CW
1813 if (!ret) {
1814 ret = count;
1815 sprintf(pg_result, "OK: add_device=%s", f);
1816 } else
1817 sprintf(pg_result, "ERROR: can not add device %s", f);
1da177e4
LT
1818 goto out;
1819 }
1820
222f1806 1821 if (!strcmp(name, "rem_device_all")) {
6146e6a4 1822 mutex_lock(&pktgen_thread_lock);
95ed63f7 1823 t->control |= T_REMDEVALL;
6146e6a4 1824 mutex_unlock(&pktgen_thread_lock);
222f1806 1825 schedule_timeout_interruptible(msecs_to_jiffies(125)); /* Propagate thread->control */
1da177e4 1826 ret = count;
222f1806 1827 sprintf(pg_result, "OK: rem_device_all");
1da177e4
LT
1828 goto out;
1829 }
1830
222f1806 1831 if (!strcmp(name, "max_before_softirq")) {
b163911f 1832 sprintf(pg_result, "OK: Note! max_before_softirq is obsoleted -- Do not use");
222f1806 1833 ret = count;
1da177e4
LT
1834 goto out;
1835 }
1836
1837 ret = -EINVAL;
222f1806 1838out:
1da177e4
LT
1839 return ret;
1840}
1841
d50a6b56 1842static int pktgen_thread_open(struct inode *inode, struct file *file)
1da177e4 1843{
d9dda78b 1844 return single_open(file, pktgen_thread_show, PDE_DATA(inode));
1da177e4
LT
1845}
1846
9a32144e 1847static const struct file_operations pktgen_thread_fops = {
222f1806
LC
1848 .open = pktgen_thread_open,
1849 .read = seq_read,
1850 .llseek = seq_lseek,
1851 .write = pktgen_thread_write,
1852 .release = single_release,
d50a6b56 1853};
1da177e4
LT
1854
1855/* Think find or remove for NN */
4e58a027
CW
1856static struct pktgen_dev *__pktgen_NN_threads(const struct pktgen_net *pn,
1857 const char *ifname, int remove)
1da177e4
LT
1858{
1859 struct pktgen_thread *t;
1860 struct pktgen_dev *pkt_dev = NULL;
3e984840 1861 bool exact = (remove == FIND);
1da177e4 1862
4e58a027 1863 list_for_each_entry(t, &pn->pktgen_threads, th_list) {
3e984840 1864 pkt_dev = pktgen_find_dev(t, ifname, exact);
1da177e4 1865 if (pkt_dev) {
222f1806 1866 if (remove) {
222f1806
LC
1867 pkt_dev->removal_mark = 1;
1868 t->control |= T_REMDEV;
222f1806 1869 }
1da177e4
LT
1870 break;
1871 }
1da177e4 1872 }
222f1806 1873 return pkt_dev;
1da177e4
LT
1874}
1875
95ed63f7
AK
1876/*
1877 * mark a device for removal
1878 */
4e58a027 1879static void pktgen_mark_device(const struct pktgen_net *pn, const char *ifname)
1da177e4
LT
1880{
1881 struct pktgen_dev *pkt_dev = NULL;
95ed63f7
AK
1882 const int max_tries = 10, msec_per_try = 125;
1883 int i = 0;
95ed63f7 1884
6146e6a4 1885 mutex_lock(&pktgen_thread_lock);
f9467eae 1886 pr_debug("%s: marking %s for removal\n", __func__, ifname);
95ed63f7 1887
222f1806 1888 while (1) {
95ed63f7 1889
4e58a027 1890 pkt_dev = __pktgen_NN_threads(pn, ifname, REMOVE);
222f1806
LC
1891 if (pkt_dev == NULL)
1892 break; /* success */
95ed63f7 1893
6146e6a4 1894 mutex_unlock(&pktgen_thread_lock);
f9467eae
JP
1895 pr_debug("%s: waiting for %s to disappear....\n",
1896 __func__, ifname);
95ed63f7 1897 schedule_timeout_interruptible(msecs_to_jiffies(msec_per_try));
6146e6a4 1898 mutex_lock(&pktgen_thread_lock);
95ed63f7
AK
1899
1900 if (++i >= max_tries) {
f9467eae
JP
1901 pr_err("%s: timed out after waiting %d msec for device %s to be removed\n",
1902 __func__, msec_per_try * i, ifname);
95ed63f7
AK
1903 break;
1904 }
1905
1906 }
1907
6146e6a4 1908 mutex_unlock(&pktgen_thread_lock);
39df232f 1909}
95ed63f7 1910
4e58a027 1911static void pktgen_change_name(const struct pktgen_net *pn, struct net_device *dev)
39df232f
SH
1912{
1913 struct pktgen_thread *t;
1914
9a0b1e8b
ED
1915 mutex_lock(&pktgen_thread_lock);
1916
4e58a027 1917 list_for_each_entry(t, &pn->pktgen_threads, th_list) {
39df232f
SH
1918 struct pktgen_dev *pkt_dev;
1919
9a0b1e8b
ED
1920 if_lock(t);
1921 list_for_each_entry(pkt_dev, &t->if_list, list) {
39df232f
SH
1922 if (pkt_dev->odev != dev)
1923 continue;
1924
a8ca16ea 1925 proc_remove(pkt_dev->entry);
39df232f 1926
2975315b 1927 pkt_dev->entry = proc_create_data(dev->name, 0600,
4e58a027 1928 pn->proc_dir,
2975315b
AD
1929 &pktgen_if_fops,
1930 pkt_dev);
39df232f 1931 if (!pkt_dev->entry)
f9467eae
JP
1932 pr_err("can't move proc entry for '%s'\n",
1933 dev->name);
39df232f
SH
1934 break;
1935 }
9a0b1e8b 1936 if_unlock(t);
39df232f 1937 }
9a0b1e8b 1938 mutex_unlock(&pktgen_thread_lock);
1da177e4
LT
1939}
1940
222f1806
LC
1941static int pktgen_device_event(struct notifier_block *unused,
1942 unsigned long event, void *ptr)
1da177e4 1943{
351638e7 1944 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
4e58a027 1945 struct pktgen_net *pn = net_generic(dev_net(dev), pg_net_id);
1da177e4 1946
4e58a027 1947 if (pn->pktgen_exiting)
e9dc8653
EB
1948 return NOTIFY_DONE;
1949
1da177e4
LT
1950 /* It is OK that we do not hold the group lock right now,
1951 * as we run under the RTNL lock.
1952 */
1953
1954 switch (event) {
39df232f 1955 case NETDEV_CHANGENAME:
4e58a027 1956 pktgen_change_name(pn, dev);
1da177e4 1957 break;
222f1806 1958
1da177e4 1959 case NETDEV_UNREGISTER:
4e58a027 1960 pktgen_mark_device(pn, dev->name);
1da177e4 1961 break;
3ff50b79 1962 }
1da177e4
LT
1963
1964 return NOTIFY_DONE;
1965}
1966
4e58a027
CW
1967static struct net_device *pktgen_dev_get_by_name(const struct pktgen_net *pn,
1968 struct pktgen_dev *pkt_dev,
63adc6fb 1969 const char *ifname)
e6fce5b9
RO
1970{
1971 char b[IFNAMSIZ+5];
d6182223 1972 int i;
e6fce5b9 1973
63adc6fb
SH
1974 for (i = 0; ifname[i] != '@'; i++) {
1975 if (i == IFNAMSIZ)
e6fce5b9
RO
1976 break;
1977
1978 b[i] = ifname[i];
1979 }
1980 b[i] = 0;
1981
4e58a027 1982 return dev_get_by_name(pn->net, b);
e6fce5b9
RO
1983}
1984
1985
1da177e4
LT
1986/* Associate pktgen_dev with a device. */
1987
4e58a027
CW
1988static int pktgen_setup_dev(const struct pktgen_net *pn,
1989 struct pktgen_dev *pkt_dev, const char *ifname)
222f1806 1990{
1da177e4 1991 struct net_device *odev;
39df232f 1992 int err;
1da177e4
LT
1993
1994 /* Clean old setups */
1da177e4
LT
1995 if (pkt_dev->odev) {
1996 dev_put(pkt_dev->odev);
222f1806
LC
1997 pkt_dev->odev = NULL;
1998 }
1da177e4 1999
4e58a027 2000 odev = pktgen_dev_get_by_name(pn, pkt_dev, ifname);
1da177e4 2001 if (!odev) {
f9467eae 2002 pr_err("no such netdevice: \"%s\"\n", ifname);
39df232f 2003 return -ENODEV;
1da177e4 2004 }
39df232f 2005
1da177e4 2006 if (odev->type != ARPHRD_ETHER) {
f9467eae 2007 pr_err("not an ethernet device: \"%s\"\n", ifname);
39df232f
SH
2008 err = -EINVAL;
2009 } else if (!netif_running(odev)) {
f9467eae 2010 pr_err("device is down: \"%s\"\n", ifname);
39df232f
SH
2011 err = -ENETDOWN;
2012 } else {
2013 pkt_dev->odev = odev;
2014 return 0;
1da177e4 2015 }
1da177e4 2016
1da177e4 2017 dev_put(odev);
39df232f 2018 return err;
1da177e4
LT
2019}
2020
2021/* Read pkt_dev from the interface and set up internal pktgen_dev
2022 * structure to have the right information to create/send packets
2023 */
2024static void pktgen_setup_inject(struct pktgen_dev *pkt_dev)
2025{
64c00d81
AG
2026 int ntxq;
2027
222f1806 2028 if (!pkt_dev->odev) {
f9467eae 2029 pr_err("ERROR: pkt_dev->odev == NULL in setup_inject\n");
222f1806
LC
2030 sprintf(pkt_dev->result,
2031 "ERROR: pkt_dev->odev == NULL in setup_inject.\n");
2032 return;
2033 }
2034
64c00d81
AG
2035 /* make sure that we don't pick a non-existing transmit queue */
2036 ntxq = pkt_dev->odev->real_num_tx_queues;
bfdbc0ac 2037
64c00d81 2038 if (ntxq <= pkt_dev->queue_map_min) {
294a0b7f
JP
2039 pr_warn("WARNING: Requested queue_map_min (zero-based) (%d) exceeds valid range [0 - %d] for (%d) queues on %s, resetting\n",
2040 pkt_dev->queue_map_min, (ntxq ?: 1) - 1, ntxq,
2041 pkt_dev->odevname);
26e29eed 2042 pkt_dev->queue_map_min = (ntxq ?: 1) - 1;
64c00d81 2043 }
88271660 2044 if (pkt_dev->queue_map_max >= ntxq) {
294a0b7f
JP
2045 pr_warn("WARNING: Requested queue_map_max (zero-based) (%d) exceeds valid range [0 - %d] for (%d) queues on %s, resetting\n",
2046 pkt_dev->queue_map_max, (ntxq ?: 1) - 1, ntxq,
2047 pkt_dev->odevname);
26e29eed 2048 pkt_dev->queue_map_max = (ntxq ?: 1) - 1;
64c00d81
AG
2049 }
2050
222f1806 2051 /* Default to the interface's mac if not explicitly set. */
1da177e4 2052
f404e9a6 2053 if (is_zero_ether_addr(pkt_dev->src_mac))
9ea08b12 2054 ether_addr_copy(&(pkt_dev->hh[6]), pkt_dev->odev->dev_addr);
1da177e4 2055
222f1806 2056 /* Set up Dest MAC */
9ea08b12 2057 ether_addr_copy(&(pkt_dev->hh[0]), pkt_dev->dst_mac);
1da177e4 2058
222f1806 2059 if (pkt_dev->flags & F_IPV6) {
4c139b8c
AW
2060 int i, set = 0, err = 1;
2061 struct inet6_dev *idev;
2062
68bf9f0b
AW
2063 if (pkt_dev->min_pkt_size == 0) {
2064 pkt_dev->min_pkt_size = 14 + sizeof(struct ipv6hdr)
2065 + sizeof(struct udphdr)
2066 + sizeof(struct pktgen_hdr)
2067 + pkt_dev->pkt_overhead;
2068 }
2069
df7e8e2e 2070 for (i = 0; i < sizeof(struct in6_addr); i++)
222f1806 2071 if (pkt_dev->cur_in6_saddr.s6_addr[i]) {
1da177e4
LT
2072 set = 1;
2073 break;
2074 }
2075
222f1806
LC
2076 if (!set) {
2077
1da177e4
LT
2078 /*
2079 * Use linklevel address if unconfigured.
2080 *
2081 * use ipv6_get_lladdr if/when it's get exported
2082 */
2083
8814c4b5 2084 rcu_read_lock();
63adc6fb
SH
2085 idev = __in6_dev_get(pkt_dev->odev);
2086 if (idev) {
1da177e4
LT
2087 struct inet6_ifaddr *ifp;
2088
2089 read_lock_bh(&idev->lock);
4c139b8c
AW
2090 list_for_each_entry(ifp, &idev->addr_list, if_list) {
2091 if ((ifp->scope & IFA_LINK) &&
f64f9e71 2092 !(ifp->flags & IFA_F_TENTATIVE)) {
4e3fd7a0 2093 pkt_dev->cur_in6_saddr = ifp->addr;
1da177e4
LT
2094 err = 0;
2095 break;
2096 }
2097 }
2098 read_unlock_bh(&idev->lock);
2099 }
8814c4b5 2100 rcu_read_unlock();
222f1806 2101 if (err)
f9467eae 2102 pr_err("ERROR: IPv6 link address not available\n");
1da177e4 2103 }
222f1806 2104 } else {
68bf9f0b
AW
2105 if (pkt_dev->min_pkt_size == 0) {
2106 pkt_dev->min_pkt_size = 14 + sizeof(struct iphdr)
2107 + sizeof(struct udphdr)
2108 + sizeof(struct pktgen_hdr)
2109 + pkt_dev->pkt_overhead;
2110 }
2111
1da177e4
LT
2112 pkt_dev->saddr_min = 0;
2113 pkt_dev->saddr_max = 0;
2114 if (strlen(pkt_dev->src_min) == 0) {
222f1806
LC
2115
2116 struct in_device *in_dev;
1da177e4
LT
2117
2118 rcu_read_lock();
e5ed6399 2119 in_dev = __in_dev_get_rcu(pkt_dev->odev);
1da177e4 2120 if (in_dev) {
2638eb8b
FW
2121 const struct in_ifaddr *ifa;
2122
2123 ifa = rcu_dereference(in_dev->ifa_list);
2124 if (ifa) {
2125 pkt_dev->saddr_min = ifa->ifa_address;
1da177e4
LT
2126 pkt_dev->saddr_max = pkt_dev->saddr_min;
2127 }
1da177e4
LT
2128 }
2129 rcu_read_unlock();
222f1806 2130 } else {
1da177e4
LT
2131 pkt_dev->saddr_min = in_aton(pkt_dev->src_min);
2132 pkt_dev->saddr_max = in_aton(pkt_dev->src_max);
2133 }
2134
2135 pkt_dev->daddr_min = in_aton(pkt_dev->dst_min);
2136 pkt_dev->daddr_max = in_aton(pkt_dev->dst_max);
2137 }
222f1806 2138 /* Initialize current values. */
68bf9f0b
AW
2139 pkt_dev->cur_pkt_size = pkt_dev->min_pkt_size;
2140 if (pkt_dev->min_pkt_size > pkt_dev->max_pkt_size)
2141 pkt_dev->max_pkt_size = pkt_dev->min_pkt_size;
2142
222f1806
LC
2143 pkt_dev->cur_dst_mac_offset = 0;
2144 pkt_dev->cur_src_mac_offset = 0;
2145 pkt_dev->cur_saddr = pkt_dev->saddr_min;
2146 pkt_dev->cur_daddr = pkt_dev->daddr_min;
2147 pkt_dev->cur_udp_dst = pkt_dev->udp_dst_min;
2148 pkt_dev->cur_udp_src = pkt_dev->udp_src_min;
1da177e4
LT
2149 pkt_dev->nflows = 0;
2150}
2151
fd29cf72
SH
2152
2153static void spin(struct pktgen_dev *pkt_dev, ktime_t spin_until)
2154{
ef87979c 2155 ktime_t start_time, end_time;
417bc4b8 2156 s64 remaining;
2bc481cf
SH
2157 struct hrtimer_sleeper t;
2158
dbc1625f 2159 hrtimer_init_sleeper_on_stack(&t, CLOCK_MONOTONIC, HRTIMER_MODE_ABS);
2bc481cf
SH
2160 hrtimer_set_expires(&t.timer, spin_until);
2161
43d28b65 2162 remaining = ktime_to_ns(hrtimer_expires_remaining(&t.timer));
bcf91bdb
GR
2163 if (remaining <= 0)
2164 goto out;
2bc481cf 2165
398f382c 2166 start_time = ktime_get();
33136d12
ED
2167 if (remaining < 100000) {
2168 /* for small delays (<100us), just loop until limit is reached */
2169 do {
398f382c
DB
2170 end_time = ktime_get();
2171 } while (ktime_compare(end_time, spin_until) < 0);
33136d12 2172 } else {
2bc481cf
SH
2173 do {
2174 set_current_state(TASK_INTERRUPTIBLE);
9dd8813e 2175 hrtimer_sleeper_start_expires(&t, HRTIMER_MODE_ABS);
2bc481cf
SH
2176
2177 if (likely(t.task))
1da177e4 2178 schedule();
1da177e4 2179
2bc481cf
SH
2180 hrtimer_cancel(&t.timer);
2181 } while (t.task && pkt_dev->running && !signal_pending(current));
2182 __set_current_state(TASK_RUNNING);
398f382c 2183 end_time = ktime_get();
1da177e4 2184 }
ef87979c
SH
2185
2186 pkt_dev->idle_acc += ktime_to_ns(ktime_sub(end_time, start_time));
bcf91bdb 2187out:
07a0f0f0 2188 pkt_dev->next_tx = ktime_add_ns(spin_until, pkt_dev->delay);
bcf91bdb 2189 destroy_hrtimer_on_stack(&t.timer);
1da177e4
LT
2190}
2191
16dab72f
JHS
2192static inline void set_pkt_overhead(struct pktgen_dev *pkt_dev)
2193{
63d75463 2194 pkt_dev->pkt_overhead = 0;
16dab72f
JHS
2195 pkt_dev->pkt_overhead += pkt_dev->nr_labels*sizeof(u32);
2196 pkt_dev->pkt_overhead += VLAN_TAG_SIZE(pkt_dev);
2197 pkt_dev->pkt_overhead += SVLAN_TAG_SIZE(pkt_dev);
2198}
2199
648fda74 2200static inline int f_seen(const struct pktgen_dev *pkt_dev, int flow)
007a531b 2201{
648fda74 2202 return !!(pkt_dev->flows[flow].flags & F_INIT);
007a531b
JHS
2203}
2204
2205static inline int f_pick(struct pktgen_dev *pkt_dev)
2206{
2207 int flow = pkt_dev->curfl;
2208
2209 if (pkt_dev->flags & F_FLOW_SEQ) {
2210 if (pkt_dev->flows[flow].count >= pkt_dev->lflow) {
2211 /* reset time */
2212 pkt_dev->flows[flow].count = 0;
1211a645 2213 pkt_dev->flows[flow].flags = 0;
007a531b
JHS
2214 pkt_dev->curfl += 1;
2215 if (pkt_dev->curfl >= pkt_dev->cflows)
2216 pkt_dev->curfl = 0; /*reset */
2217 }
2218 } else {
33d7c5e5 2219 flow = prandom_u32() % pkt_dev->cflows;
1211a645 2220 pkt_dev->curfl = flow;
007a531b 2221
1211a645 2222 if (pkt_dev->flows[flow].count > pkt_dev->lflow) {
007a531b 2223 pkt_dev->flows[flow].count = 0;
1211a645
RO
2224 pkt_dev->flows[flow].flags = 0;
2225 }
007a531b
JHS
2226 }
2227
2228 return pkt_dev->curfl;
2229}
2230
a553e4a6
JHS
2231
2232#ifdef CONFIG_XFRM
2233/* If there was already an IPSEC SA, we keep it as is, else
2234 * we go look for it ...
2235*/
bd55775c 2236#define DUMMY_MARK 0
fea1ab0f 2237static void get_ipsec_sa(struct pktgen_dev *pkt_dev, int flow)
a553e4a6
JHS
2238{
2239 struct xfrm_state *x = pkt_dev->flows[flow].x;
4e58a027 2240 struct pktgen_net *pn = net_generic(dev_net(pkt_dev->odev), pg_net_id);
a553e4a6 2241 if (!x) {
c454997e
FD
2242
2243 if (pkt_dev->spi) {
2244 /* We need as quick as possible to find the right SA
2245 * Searching with minimum criteria to archieve this.
2246 */
2247 x = xfrm_state_lookup_byspi(pn->net, htonl(pkt_dev->spi), AF_INET);
2248 } else {
2249 /* slow path: we dont already have xfrm_state */
7e652640 2250 x = xfrm_stateonly_find(pn->net, DUMMY_MARK, 0,
c454997e
FD
2251 (xfrm_address_t *)&pkt_dev->cur_daddr,
2252 (xfrm_address_t *)&pkt_dev->cur_saddr,
2253 AF_INET,
2254 pkt_dev->ipsmode,
2255 pkt_dev->ipsproto, 0);
2256 }
a553e4a6
JHS
2257 if (x) {
2258 pkt_dev->flows[flow].x = x;
2259 set_pkt_overhead(pkt_dev);
63adc6fb 2260 pkt_dev->pkt_overhead += x->props.header_len;
a553e4a6
JHS
2261 }
2262
2263 }
2264}
2265#endif
fd2ea0a7
DM
2266static void set_cur_queue_map(struct pktgen_dev *pkt_dev)
2267{
e6fce5b9
RO
2268
2269 if (pkt_dev->flags & F_QUEUE_MAP_CPU)
2270 pkt_dev->cur_queue_map = smp_processor_id();
2271
896a7cf8 2272 else if (pkt_dev->queue_map_min <= pkt_dev->queue_map_max) {
fd2ea0a7
DM
2273 __u16 t;
2274 if (pkt_dev->flags & F_QUEUE_MAP_RND) {
33d7c5e5 2275 t = prandom_u32() %
fd2ea0a7
DM
2276 (pkt_dev->queue_map_max -
2277 pkt_dev->queue_map_min + 1)
2278 + pkt_dev->queue_map_min;
2279 } else {
2280 t = pkt_dev->cur_queue_map + 1;
2281 if (t > pkt_dev->queue_map_max)
2282 t = pkt_dev->queue_map_min;
2283 }
2284 pkt_dev->cur_queue_map = t;
2285 }
bfdbc0ac 2286 pkt_dev->cur_queue_map = pkt_dev->cur_queue_map % pkt_dev->odev->real_num_tx_queues;
fd2ea0a7
DM
2287}
2288
1da177e4
LT
2289/* Increment/randomize headers according to flags and current values
2290 * for IP src/dest, UDP src/dst port, MAC-Addr src/dst
2291 */
222f1806
LC
2292static void mod_cur_headers(struct pktgen_dev *pkt_dev)
2293{
2294 __u32 imn;
2295 __u32 imx;
2296 int flow = 0;
1da177e4 2297
007a531b
JHS
2298 if (pkt_dev->cflows)
2299 flow = f_pick(pkt_dev);
1da177e4
LT
2300
2301 /* Deal with source MAC */
222f1806
LC
2302 if (pkt_dev->src_mac_count > 1) {
2303 __u32 mc;
2304 __u32 tmp;
2305
2306 if (pkt_dev->flags & F_MACSRC_RND)
33d7c5e5 2307 mc = prandom_u32() % pkt_dev->src_mac_count;
222f1806
LC
2308 else {
2309 mc = pkt_dev->cur_src_mac_offset++;
ff2a79a5 2310 if (pkt_dev->cur_src_mac_offset >=
222f1806
LC
2311 pkt_dev->src_mac_count)
2312 pkt_dev->cur_src_mac_offset = 0;
2313 }
2314
2315 tmp = pkt_dev->src_mac[5] + (mc & 0xFF);
2316 pkt_dev->hh[11] = tmp;
2317 tmp = (pkt_dev->src_mac[4] + ((mc >> 8) & 0xFF) + (tmp >> 8));
2318 pkt_dev->hh[10] = tmp;
2319 tmp = (pkt_dev->src_mac[3] + ((mc >> 16) & 0xFF) + (tmp >> 8));
2320 pkt_dev->hh[9] = tmp;
2321 tmp = (pkt_dev->src_mac[2] + ((mc >> 24) & 0xFF) + (tmp >> 8));
2322 pkt_dev->hh[8] = tmp;
2323 tmp = (pkt_dev->src_mac[1] + (tmp >> 8));
2324 pkt_dev->hh[7] = tmp;
2325 }
2326
2327 /* Deal with Destination MAC */
2328 if (pkt_dev->dst_mac_count > 1) {
2329 __u32 mc;
2330 __u32 tmp;
2331
2332 if (pkt_dev->flags & F_MACDST_RND)
33d7c5e5 2333 mc = prandom_u32() % pkt_dev->dst_mac_count;
222f1806
LC
2334
2335 else {
2336 mc = pkt_dev->cur_dst_mac_offset++;
ff2a79a5 2337 if (pkt_dev->cur_dst_mac_offset >=
222f1806
LC
2338 pkt_dev->dst_mac_count) {
2339 pkt_dev->cur_dst_mac_offset = 0;
2340 }
2341 }
2342
2343 tmp = pkt_dev->dst_mac[5] + (mc & 0xFF);
2344 pkt_dev->hh[5] = tmp;
2345 tmp = (pkt_dev->dst_mac[4] + ((mc >> 8) & 0xFF) + (tmp >> 8));
2346 pkt_dev->hh[4] = tmp;
2347 tmp = (pkt_dev->dst_mac[3] + ((mc >> 16) & 0xFF) + (tmp >> 8));
2348 pkt_dev->hh[3] = tmp;
2349 tmp = (pkt_dev->dst_mac[2] + ((mc >> 24) & 0xFF) + (tmp >> 8));
2350 pkt_dev->hh[2] = tmp;
2351 tmp = (pkt_dev->dst_mac[1] + (tmp >> 8));
2352 pkt_dev->hh[1] = tmp;
2353 }
2354
ca6549af 2355 if (pkt_dev->flags & F_MPLS_RND) {
95c96174 2356 unsigned int i;
e71a4783 2357 for (i = 0; i < pkt_dev->nr_labels; i++)
ca6549af
SW
2358 if (pkt_dev->labels[i] & MPLS_STACK_BOTTOM)
2359 pkt_dev->labels[i] = MPLS_STACK_BOTTOM |
33d7c5e5 2360 ((__force __be32)prandom_u32() &
ca6549af
SW
2361 htonl(0x000fffff));
2362 }
2363
34954ddc 2364 if ((pkt_dev->flags & F_VID_RND) && (pkt_dev->vlan_id != 0xffff)) {
33d7c5e5 2365 pkt_dev->vlan_id = prandom_u32() & (4096 - 1);
34954ddc
FF
2366 }
2367
2368 if ((pkt_dev->flags & F_SVID_RND) && (pkt_dev->svlan_id != 0xffff)) {
33d7c5e5 2369 pkt_dev->svlan_id = prandom_u32() & (4096 - 1);
34954ddc
FF
2370 }
2371
222f1806
LC
2372 if (pkt_dev->udp_src_min < pkt_dev->udp_src_max) {
2373 if (pkt_dev->flags & F_UDPSRC_RND)
33d7c5e5 2374 pkt_dev->cur_udp_src = prandom_u32() %
5fa6fc76
SH
2375 (pkt_dev->udp_src_max - pkt_dev->udp_src_min)
2376 + pkt_dev->udp_src_min;
222f1806
LC
2377
2378 else {
1da177e4
LT
2379 pkt_dev->cur_udp_src++;
2380 if (pkt_dev->cur_udp_src >= pkt_dev->udp_src_max)
2381 pkt_dev->cur_udp_src = pkt_dev->udp_src_min;
222f1806
LC
2382 }
2383 }
2384
2385 if (pkt_dev->udp_dst_min < pkt_dev->udp_dst_max) {
2386 if (pkt_dev->flags & F_UDPDST_RND) {
33d7c5e5 2387 pkt_dev->cur_udp_dst = prandom_u32() %
5fa6fc76
SH
2388 (pkt_dev->udp_dst_max - pkt_dev->udp_dst_min)
2389 + pkt_dev->udp_dst_min;
222f1806 2390 } else {
1da177e4 2391 pkt_dev->cur_udp_dst++;
222f1806 2392 if (pkt_dev->cur_udp_dst >= pkt_dev->udp_dst_max)
1da177e4 2393 pkt_dev->cur_udp_dst = pkt_dev->udp_dst_min;
222f1806
LC
2394 }
2395 }
1da177e4
LT
2396
2397 if (!(pkt_dev->flags & F_IPV6)) {
2398
63adc6fb
SH
2399 imn = ntohl(pkt_dev->saddr_min);
2400 imx = ntohl(pkt_dev->saddr_max);
2401 if (imn < imx) {
1da177e4 2402 __u32 t;
222f1806 2403 if (pkt_dev->flags & F_IPSRC_RND)
33d7c5e5 2404 t = prandom_u32() % (imx - imn) + imn;
1da177e4
LT
2405 else {
2406 t = ntohl(pkt_dev->cur_saddr);
2407 t++;
63adc6fb 2408 if (t > imx)
1da177e4 2409 t = imn;
63adc6fb 2410
1da177e4
LT
2411 }
2412 pkt_dev->cur_saddr = htonl(t);
2413 }
222f1806 2414
007a531b 2415 if (pkt_dev->cflows && f_seen(pkt_dev, flow)) {
1da177e4
LT
2416 pkt_dev->cur_daddr = pkt_dev->flows[flow].cur_daddr;
2417 } else {
252e3346
AV
2418 imn = ntohl(pkt_dev->daddr_min);
2419 imx = ntohl(pkt_dev->daddr_max);
2420 if (imn < imx) {
1da177e4 2421 __u32 t;
252e3346 2422 __be32 s;
1da177e4
LT
2423 if (pkt_dev->flags & F_IPDST_RND) {
2424
70e3ba72 2425 do {
33d7c5e5
AM
2426 t = prandom_u32() %
2427 (imx - imn) + imn;
252e3346 2428 s = htonl(t);
70e3ba72
AM
2429 } while (ipv4_is_loopback(s) ||
2430 ipv4_is_multicast(s) ||
2431 ipv4_is_lbcast(s) ||
2432 ipv4_is_zeronet(s) ||
2433 ipv4_is_local_multicast(s));
252e3346
AV
2434 pkt_dev->cur_daddr = s;
2435 } else {
1da177e4
LT
2436 t = ntohl(pkt_dev->cur_daddr);
2437 t++;
2438 if (t > imx) {
2439 t = imn;
2440 }
2441 pkt_dev->cur_daddr = htonl(t);
2442 }
2443 }
222f1806 2444 if (pkt_dev->cflows) {
007a531b 2445 pkt_dev->flows[flow].flags |= F_INIT;
222f1806
LC
2446 pkt_dev->flows[flow].cur_daddr =
2447 pkt_dev->cur_daddr;
a553e4a6 2448#ifdef CONFIG_XFRM
6f107c74 2449 if (pkt_dev->flags & F_IPSEC)
a553e4a6
JHS
2450 get_ipsec_sa(pkt_dev, flow);
2451#endif
1da177e4
LT
2452 pkt_dev->nflows++;
2453 }
2454 }
222f1806
LC
2455 } else { /* IPV6 * */
2456
06e30411 2457 if (!ipv6_addr_any(&pkt_dev->min_in6_daddr)) {
1da177e4
LT
2458 int i;
2459
2460 /* Only random destinations yet */
2461
222f1806 2462 for (i = 0; i < 4; i++) {
1da177e4 2463 pkt_dev->cur_in6_daddr.s6_addr32[i] =
33d7c5e5 2464 (((__force __be32)prandom_u32() |
222f1806
LC
2465 pkt_dev->min_in6_daddr.s6_addr32[i]) &
2466 pkt_dev->max_in6_daddr.s6_addr32[i]);
1da177e4 2467 }
222f1806 2468 }
1da177e4
LT
2469 }
2470
222f1806
LC
2471 if (pkt_dev->min_pkt_size < pkt_dev->max_pkt_size) {
2472 __u32 t;
2473 if (pkt_dev->flags & F_TXSIZE_RND) {
33d7c5e5 2474 t = prandom_u32() %
5fa6fc76
SH
2475 (pkt_dev->max_pkt_size - pkt_dev->min_pkt_size)
2476 + pkt_dev->min_pkt_size;
222f1806 2477 } else {
1da177e4 2478 t = pkt_dev->cur_pkt_size + 1;
222f1806 2479 if (t > pkt_dev->max_pkt_size)
1da177e4 2480 t = pkt_dev->min_pkt_size;
222f1806
LC
2481 }
2482 pkt_dev->cur_pkt_size = t;
2483 }
1da177e4 2484
fd2ea0a7 2485 set_cur_queue_map(pkt_dev);
45b270f8 2486
1da177e4
LT
2487 pkt_dev->flows[flow].count++;
2488}
2489
a553e4a6
JHS
2490
2491#ifdef CONFIG_XFRM
5537a055 2492static u32 pktgen_dst_metrics[RTAX_MAX + 1] = {
cf93d47e
FD
2493
2494 [RTAX_HOPLIMIT] = 0x5, /* Set a static hoplimit */
2495};
2496
a553e4a6
JHS
2497static int pktgen_output_ipsec(struct sk_buff *skb, struct pktgen_dev *pkt_dev)
2498{
2499 struct xfrm_state *x = pkt_dev->flows[pkt_dev->curfl].x;
2500 int err = 0;
6de9ace4 2501 struct net *net = dev_net(pkt_dev->odev);
a553e4a6
JHS
2502
2503 if (!x)
2504 return 0;
2505 /* XXX: we dont support tunnel mode for now until
2506 * we resolve the dst issue */
cf93d47e 2507 if ((x->props.mode != XFRM_MODE_TRANSPORT) && (pkt_dev->spi == 0))
a553e4a6
JHS
2508 return 0;
2509
cf93d47e
FD
2510 /* But when user specify an valid SPI, transformation
2511 * supports both transport/tunnel mode + ESP/AH type.
2512 */
2513 if ((x->props.mode == XFRM_MODE_TUNNEL) && (pkt_dev->spi != 0))
b6ca8bd5 2514 skb->_skb_refdst = (unsigned long)&pkt_dev->xdst.u.dst | SKB_DST_NOREF;
cf93d47e
FD
2515
2516 rcu_read_lock_bh();
0c620e97 2517 err = pktgen_xfrm_outer_mode_output(x, skb);
cf93d47e 2518 rcu_read_unlock_bh();
6de9ace4
FD
2519 if (err) {
2520 XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTSTATEMODEERROR);
a553e4a6 2521 goto error;
6de9ace4 2522 }
a553e4a6 2523 err = x->type->output(x, skb);
6de9ace4
FD
2524 if (err) {
2525 XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTSTATEPROTOERROR);
a553e4a6 2526 goto error;
6de9ace4 2527 }
0af0a413 2528 spin_lock_bh(&x->lock);
63adc6fb 2529 x->curlft.bytes += skb->len;
a553e4a6 2530 x->curlft.packets++;
0af0a413 2531 spin_unlock_bh(&x->lock);
a553e4a6 2532error:
a553e4a6
JHS
2533 return err;
2534}
2535
475ac1e4 2536static void free_SAs(struct pktgen_dev *pkt_dev)
a553e4a6
JHS
2537{
2538 if (pkt_dev->cflows) {
2539 /* let go of the SAs if we have them */
d6182223
PG
2540 int i;
2541 for (i = 0; i < pkt_dev->cflows; i++) {
a553e4a6
JHS
2542 struct xfrm_state *x = pkt_dev->flows[i].x;
2543 if (x) {
2544 xfrm_state_put(x);
2545 pkt_dev->flows[i].x = NULL;
2546 }
2547 }
2548 }
2549}
2550
475ac1e4 2551static int process_ipsec(struct pktgen_dev *pkt_dev,
a553e4a6
JHS
2552 struct sk_buff *skb, __be16 protocol)
2553{
6f107c74 2554 if (pkt_dev->flags & F_IPSEC) {
a553e4a6
JHS
2555 struct xfrm_state *x = pkt_dev->flows[pkt_dev->curfl].x;
2556 int nhead = 0;
2557 if (x) {
d4969581 2558 struct ethhdr *eth;
3868204d 2559 struct iphdr *iph;
d4969581 2560 int ret;
3868204d 2561
a553e4a6 2562 nhead = x->props.header_len - skb_headroom(skb);
63adc6fb 2563 if (nhead > 0) {
a553e4a6
JHS
2564 ret = pskb_expand_head(skb, nhead, 0, GFP_ATOMIC);
2565 if (ret < 0) {
f9467eae
JP
2566 pr_err("Error expanding ipsec packet %d\n",
2567 ret);
b4bb4ac8 2568 goto err;
a553e4a6
JHS
2569 }
2570 }
2571
2572 /* ipsec is not expecting ll header */
2573 skb_pull(skb, ETH_HLEN);
2574 ret = pktgen_output_ipsec(skb, pkt_dev);
2575 if (ret) {
f9467eae 2576 pr_err("Error creating ipsec packet %d\n", ret);
b4bb4ac8 2577 goto err;
a553e4a6
JHS
2578 }
2579 /* restore ll */
d58ff351 2580 eth = skb_push(skb, ETH_HLEN);
d4969581
ED
2581 memcpy(eth, pkt_dev->hh, 2 * ETH_ALEN);
2582 eth->h_proto = protocol;
3868204d 2583
2584 /* Update IPv4 header len as well as checksum value */
2585 iph = ip_hdr(skb);
2586 iph->tot_len = htons(skb->len - ETH_HLEN);
2587 ip_send_check(iph);
a553e4a6
JHS
2588 }
2589 }
2590 return 1;
b4bb4ac8
IJ
2591err:
2592 kfree_skb(skb);
2593 return 0;
a553e4a6
JHS
2594}
2595#endif
2596
ca6549af
SW
2597static void mpls_push(__be32 *mpls, struct pktgen_dev *pkt_dev)
2598{
95c96174 2599 unsigned int i;
63adc6fb 2600 for (i = 0; i < pkt_dev->nr_labels; i++)
ca6549af 2601 *mpls++ = pkt_dev->labels[i] & ~MPLS_STACK_BOTTOM;
63adc6fb 2602
ca6549af
SW
2603 mpls--;
2604 *mpls |= MPLS_STACK_BOTTOM;
2605}
2606
0f37c605
AV
2607static inline __be16 build_tci(unsigned int id, unsigned int cfi,
2608 unsigned int prio)
2609{
2610 return htons(id | (cfi << 12) | (prio << 13));
2611}
2612
26ad7879
ED
2613static void pktgen_finalize_skb(struct pktgen_dev *pkt_dev, struct sk_buff *skb,
2614 int datalen)
2615{
7f5d3f27 2616 struct timespec64 timestamp;
26ad7879
ED
2617 struct pktgen_hdr *pgh;
2618
4df864c1 2619 pgh = skb_put(skb, sizeof(*pgh));
26ad7879
ED
2620 datalen -= sizeof(*pgh);
2621
2622 if (pkt_dev->nfrags <= 0) {
b080db58 2623 skb_put_zero(skb, datalen);
26ad7879
ED
2624 } else {
2625 int frags = pkt_dev->nfrags;
2626 int i, len;
7d36a991 2627 int frag_len;
26ad7879
ED
2628
2629
2630 if (frags > MAX_SKB_FRAGS)
2631 frags = MAX_SKB_FRAGS;
2632 len = datalen - frags * PAGE_SIZE;
2633 if (len > 0) {
b080db58 2634 skb_put_zero(skb, len);
26ad7879
ED
2635 datalen = frags * PAGE_SIZE;
2636 }
2637
2638 i = 0;
7d36a991 2639 frag_len = (datalen/frags) < PAGE_SIZE ?
2640 (datalen/frags) : PAGE_SIZE;
26ad7879
ED
2641 while (datalen > 0) {
2642 if (unlikely(!pkt_dev->page)) {
2643 int node = numa_node_id();
2644
2645 if (pkt_dev->node >= 0 && (pkt_dev->flags & F_NODE))
2646 node = pkt_dev->node;
2647 pkt_dev->page = alloc_pages_node(node, GFP_KERNEL | __GFP_ZERO, 0);
2648 if (!pkt_dev->page)
2649 break;
2650 }
a0bec1cd 2651 get_page(pkt_dev->page);
ea2ab693 2652 skb_frag_set_page(skb, i, pkt_dev->page);
b54c9d5b 2653 skb_frag_off_set(&skb_shinfo(skb)->frags[i], 0);
7d36a991 2654 /*last fragment, fill rest of data*/
2655 if (i == (frags - 1))
9e903e08
ED
2656 skb_frag_size_set(&skb_shinfo(skb)->frags[i],
2657 (datalen < PAGE_SIZE ? datalen : PAGE_SIZE));
7d36a991 2658 else
9e903e08
ED
2659 skb_frag_size_set(&skb_shinfo(skb)->frags[i], frag_len);
2660 datalen -= skb_frag_size(&skb_shinfo(skb)->frags[i]);
2661 skb->len += skb_frag_size(&skb_shinfo(skb)->frags[i]);
2662 skb->data_len += skb_frag_size(&skb_shinfo(skb)->frags[i]);
26ad7879
ED
2663 i++;
2664 skb_shinfo(skb)->nr_frags = i;
2665 }
26ad7879
ED
2666 }
2667
2668 /* Stamp the time, and sequence number,
2669 * convert them to network byte order
2670 */
2671 pgh->pgh_magic = htonl(PKTGEN_MAGIC);
2672 pgh->seq_num = htonl(pkt_dev->seq_num);
2673
afb84b62
JDB
2674 if (pkt_dev->flags & F_NO_TIMESTAMP) {
2675 pgh->tv_sec = 0;
2676 pgh->tv_usec = 0;
2677 } else {
7f5d3f27
AB
2678 /*
2679 * pgh->tv_sec wraps in y2106 when interpreted as unsigned
2680 * as done by wireshark, or y2038 when interpreted as signed.
2681 * This is probably harmless, but if anyone wants to improve
2682 * it, we could introduce a variant that puts 64-bit nanoseconds
2683 * into the respective header bytes.
2684 * This would also be slightly faster to read.
2685 */
2686 ktime_get_real_ts64(&timestamp);
afb84b62 2687 pgh->tv_sec = htonl(timestamp.tv_sec);
7f5d3f27 2688 pgh->tv_usec = htonl(timestamp.tv_nsec / NSEC_PER_USEC);
afb84b62 2689 }
26ad7879
ED
2690}
2691
7a6e288d 2692static struct sk_buff *pktgen_alloc_skb(struct net_device *dev,
63d75463 2693 struct pktgen_dev *pkt_dev)
7a6e288d 2694{
63d75463 2695 unsigned int extralen = LL_RESERVED_SPACE(dev);
7a6e288d 2696 struct sk_buff *skb = NULL;
63d75463 2697 unsigned int size;
7a6e288d 2698
63d75463 2699 size = pkt_dev->cur_pkt_size + 64 + extralen + pkt_dev->pkt_overhead;
7a6e288d
DB
2700 if (pkt_dev->flags & F_NODE) {
2701 int node = pkt_dev->node >= 0 ? pkt_dev->node : numa_node_id();
2702
2703 skb = __alloc_skb(NET_SKB_PAD + size, GFP_NOWAIT, 0, node);
2704 if (likely(skb)) {
2705 skb_reserve(skb, NET_SKB_PAD);
2706 skb->dev = dev;
2707 }
2708 } else {
2709 skb = __netdev_alloc_skb(dev, size, GFP_NOWAIT);
2710 }
3de03596 2711
63d75463 2712 /* the caller pre-fetches from skb->data and reserves for the mac hdr */
3de03596 2713 if (likely(skb))
63d75463 2714 skb_reserve(skb, extralen - 16);
7a6e288d
DB
2715
2716 return skb;
2717}
2718
222f1806
LC
2719static struct sk_buff *fill_packet_ipv4(struct net_device *odev,
2720 struct pktgen_dev *pkt_dev)
1da177e4
LT
2721{
2722 struct sk_buff *skb = NULL;
2723 __u8 *eth;
2724 struct udphdr *udph;
2725 int datalen, iplen;
2726 struct iphdr *iph;
d5f1ce9a 2727 __be16 protocol = htons(ETH_P_IP);
ca6549af 2728 __be32 *mpls;
34954ddc
FF
2729 __be16 *vlan_tci = NULL; /* Encapsulates priority and VLAN ID */
2730 __be16 *vlan_encapsulated_proto = NULL; /* packet type ID field (or len) for VLAN tag */
2731 __be16 *svlan_tci = NULL; /* Encapsulates priority and SVLAN ID */
2732 __be16 *svlan_encapsulated_proto = NULL; /* packet type ID field (or len) for SVLAN tag */
fd2ea0a7 2733 u16 queue_map;
ca6549af
SW
2734
2735 if (pkt_dev->nr_labels)
d5f1ce9a 2736 protocol = htons(ETH_P_MPLS_UC);
222f1806 2737
34954ddc 2738 if (pkt_dev->vlan_id != 0xffff)
d5f1ce9a 2739 protocol = htons(ETH_P_8021Q);
34954ddc 2740
64053bee
RO
2741 /* Update any of the values, used when we're incrementing various
2742 * fields.
2743 */
2744 mod_cur_headers(pkt_dev);
eb589063 2745 queue_map = pkt_dev->cur_queue_map;
64053bee 2746
63d75463 2747 skb = pktgen_alloc_skb(odev, pkt_dev);
1da177e4
LT
2748 if (!skb) {
2749 sprintf(pkt_dev->result, "No memory");
2750 return NULL;
2751 }
2752
7a6e288d 2753 prefetchw(skb->data);
63d75463 2754 skb_reserve(skb, 16);
1da177e4
LT
2755
2756 /* Reserve for ethernet and IP header */
d58ff351 2757 eth = skb_push(skb, 14);
4df864c1 2758 mpls = skb_put(skb, pkt_dev->nr_labels * sizeof(__u32));
ca6549af
SW
2759 if (pkt_dev->nr_labels)
2760 mpls_push(mpls, pkt_dev);
34954ddc
FF
2761
2762 if (pkt_dev->vlan_id != 0xffff) {
e71a4783 2763 if (pkt_dev->svlan_id != 0xffff) {
4df864c1 2764 svlan_tci = skb_put(skb, sizeof(__be16));
0f37c605
AV
2765 *svlan_tci = build_tci(pkt_dev->svlan_id,
2766 pkt_dev->svlan_cfi,
2767 pkt_dev->svlan_p);
4df864c1
JB
2768 svlan_encapsulated_proto = skb_put(skb,
2769 sizeof(__be16));
d5f1ce9a 2770 *svlan_encapsulated_proto = htons(ETH_P_8021Q);
34954ddc 2771 }
4df864c1 2772 vlan_tci = skb_put(skb, sizeof(__be16));
0f37c605
AV
2773 *vlan_tci = build_tci(pkt_dev->vlan_id,
2774 pkt_dev->vlan_cfi,
2775 pkt_dev->vlan_p);
4df864c1 2776 vlan_encapsulated_proto = skb_put(skb, sizeof(__be16));
d5f1ce9a 2777 *vlan_encapsulated_proto = htons(ETH_P_IP);
34954ddc
FF
2778 }
2779
c145aeb3 2780 skb_reset_mac_header(skb);
525cebed 2781 skb_set_network_header(skb, skb->len);
4df864c1 2782 iph = skb_put(skb, sizeof(struct iphdr));
525cebed
TG
2783
2784 skb_set_transport_header(skb, skb->len);
4df864c1 2785 udph = skb_put(skb, sizeof(struct udphdr));
fd2ea0a7 2786 skb_set_queue_mapping(skb, queue_map);
9e50e3ac
JF
2787 skb->priority = pkt_dev->skb_priority;
2788
1da177e4 2789 memcpy(eth, pkt_dev->hh, 12);
252e3346 2790 *(__be16 *) & eth[12] = protocol;
1da177e4 2791
ca6549af
SW
2792 /* Eth + IPh + UDPh + mpls */
2793 datalen = pkt_dev->cur_pkt_size - 14 - 20 - 8 -
16dab72f 2794 pkt_dev->pkt_overhead;
6af773e7 2795 if (datalen < 0 || datalen < sizeof(struct pktgen_hdr))
1da177e4 2796 datalen = sizeof(struct pktgen_hdr);
222f1806 2797
1da177e4
LT
2798 udph->source = htons(pkt_dev->cur_udp_src);
2799 udph->dest = htons(pkt_dev->cur_udp_dst);
222f1806 2800 udph->len = htons(datalen + 8); /* DATA + udphdr */
c26bf4a5 2801 udph->check = 0;
1da177e4
LT
2802
2803 iph->ihl = 5;
2804 iph->version = 4;
2805 iph->ttl = 32;
1ca7768c 2806 iph->tos = pkt_dev->tos;
222f1806 2807 iph->protocol = IPPROTO_UDP; /* UDP */
1da177e4
LT
2808 iph->saddr = pkt_dev->cur_saddr;
2809 iph->daddr = pkt_dev->cur_daddr;
66ed1e5e
ED
2810 iph->id = htons(pkt_dev->ip_id);
2811 pkt_dev->ip_id++;
1da177e4
LT
2812 iph->frag_off = 0;
2813 iplen = 20 + 8 + datalen;
2814 iph->tot_len = htons(iplen);
03c633e7 2815 ip_send_check(iph);
ca6549af 2816 skb->protocol = protocol;
1da177e4
LT
2817 skb->dev = odev;
2818 skb->pkt_type = PACKET_HOST;
c26bf4a5 2819
7744b5f3
SD
2820 pktgen_finalize_skb(pkt_dev, skb, datalen);
2821
c26bf4a5
TG
2822 if (!(pkt_dev->flags & F_UDPCSUM)) {
2823 skb->ip_summed = CHECKSUM_NONE;
c8cd0989 2824 } else if (odev->features & (NETIF_F_HW_CSUM | NETIF_F_IP_CSUM)) {
c26bf4a5
TG
2825 skb->ip_summed = CHECKSUM_PARTIAL;
2826 skb->csum = 0;
7744b5f3 2827 udp4_hwcsum(skb, iph->saddr, iph->daddr);
c26bf4a5 2828 } else {
7744b5f3 2829 __wsum csum = skb_checksum(skb, skb_transport_offset(skb), datalen + 8, 0);
c26bf4a5
TG
2830
2831 /* add protocol-dependent pseudo-header */
7744b5f3 2832 udph->check = csum_tcpudp_magic(iph->saddr, iph->daddr,
c26bf4a5
TG
2833 datalen + 8, IPPROTO_UDP, csum);
2834
2835 if (udph->check == 0)
2836 udph->check = CSUM_MANGLED_0;
2837 }
2838
a553e4a6
JHS
2839#ifdef CONFIG_XFRM
2840 if (!process_ipsec(pkt_dev, skb, protocol))
2841 return NULL;
2842#endif
2843
1da177e4
LT
2844 return skb;
2845}
2846
222f1806
LC
2847static struct sk_buff *fill_packet_ipv6(struct net_device *odev,
2848 struct pktgen_dev *pkt_dev)
1da177e4
LT
2849{
2850 struct sk_buff *skb = NULL;
2851 __u8 *eth;
2852 struct udphdr *udph;
c26bf4a5 2853 int datalen, udplen;
1da177e4 2854 struct ipv6hdr *iph;
d5f1ce9a 2855 __be16 protocol = htons(ETH_P_IPV6);
ca6549af 2856 __be32 *mpls;
34954ddc
FF
2857 __be16 *vlan_tci = NULL; /* Encapsulates priority and VLAN ID */
2858 __be16 *vlan_encapsulated_proto = NULL; /* packet type ID field (or len) for VLAN tag */
2859 __be16 *svlan_tci = NULL; /* Encapsulates priority and SVLAN ID */
2860 __be16 *svlan_encapsulated_proto = NULL; /* packet type ID field (or len) for SVLAN tag */
fd2ea0a7 2861 u16 queue_map;
ca6549af
SW
2862
2863 if (pkt_dev->nr_labels)
d5f1ce9a 2864 protocol = htons(ETH_P_MPLS_UC);
64053bee 2865
34954ddc 2866 if (pkt_dev->vlan_id != 0xffff)
d5f1ce9a 2867 protocol = htons(ETH_P_8021Q);
34954ddc 2868
64053bee
RO
2869 /* Update any of the values, used when we're incrementing various
2870 * fields.
2871 */
2872 mod_cur_headers(pkt_dev);
eb589063 2873 queue_map = pkt_dev->cur_queue_map;
64053bee 2874
63d75463 2875 skb = pktgen_alloc_skb(odev, pkt_dev);
1da177e4
LT
2876 if (!skb) {
2877 sprintf(pkt_dev->result, "No memory");
2878 return NULL;
2879 }
2880
7a6e288d 2881 prefetchw(skb->data);
1da177e4
LT
2882 skb_reserve(skb, 16);
2883
2884 /* Reserve for ethernet and IP header */
d58ff351 2885 eth = skb_push(skb, 14);
4df864c1 2886 mpls = skb_put(skb, pkt_dev->nr_labels * sizeof(__u32));
ca6549af
SW
2887 if (pkt_dev->nr_labels)
2888 mpls_push(mpls, pkt_dev);
34954ddc
FF
2889
2890 if (pkt_dev->vlan_id != 0xffff) {
e71a4783 2891 if (pkt_dev->svlan_id != 0xffff) {
4df864c1 2892 svlan_tci = skb_put(skb, sizeof(__be16));
0f37c605
AV
2893 *svlan_tci = build_tci(pkt_dev->svlan_id,
2894 pkt_dev->svlan_cfi,
2895 pkt_dev->svlan_p);
4df864c1
JB
2896 svlan_encapsulated_proto = skb_put(skb,
2897 sizeof(__be16));
d5f1ce9a 2898 *svlan_encapsulated_proto = htons(ETH_P_8021Q);
34954ddc 2899 }
4df864c1 2900 vlan_tci = skb_put(skb, sizeof(__be16));
0f37c605
AV
2901 *vlan_tci = build_tci(pkt_dev->vlan_id,
2902 pkt_dev->vlan_cfi,
2903 pkt_dev->vlan_p);
4df864c1 2904 vlan_encapsulated_proto = skb_put(skb, sizeof(__be16));
d5f1ce9a 2905 *vlan_encapsulated_proto = htons(ETH_P_IPV6);
34954ddc
FF
2906 }
2907
c145aeb3 2908 skb_reset_mac_header(skb);
525cebed 2909 skb_set_network_header(skb, skb->len);
4df864c1 2910 iph = skb_put(skb, sizeof(struct ipv6hdr));
525cebed
TG
2911
2912 skb_set_transport_header(skb, skb->len);
4df864c1 2913 udph = skb_put(skb, sizeof(struct udphdr));
fd2ea0a7 2914 skb_set_queue_mapping(skb, queue_map);
9e50e3ac 2915 skb->priority = pkt_dev->skb_priority;
1da177e4 2916
1da177e4 2917 memcpy(eth, pkt_dev->hh, 12);
63adc6fb 2918 *(__be16 *) &eth[12] = protocol;
64053bee 2919
ca6549af
SW
2920 /* Eth + IPh + UDPh + mpls */
2921 datalen = pkt_dev->cur_pkt_size - 14 -
2922 sizeof(struct ipv6hdr) - sizeof(struct udphdr) -
16dab72f 2923 pkt_dev->pkt_overhead;
1da177e4 2924
5aa8b572 2925 if (datalen < 0 || datalen < sizeof(struct pktgen_hdr)) {
1da177e4 2926 datalen = sizeof(struct pktgen_hdr);
e87cc472 2927 net_info_ratelimited("increased datalen to %d\n", datalen);
1da177e4
LT
2928 }
2929
c26bf4a5 2930 udplen = datalen + sizeof(struct udphdr);
1da177e4
LT
2931 udph->source = htons(pkt_dev->cur_udp_src);
2932 udph->dest = htons(pkt_dev->cur_udp_dst);
c26bf4a5
TG
2933 udph->len = htons(udplen);
2934 udph->check = 0;
1da177e4 2935
d5f1ce9a 2936 *(__be32 *) iph = htonl(0x60000000); /* Version + flow */
1da177e4 2937
1ca7768c
FF
2938 if (pkt_dev->traffic_class) {
2939 /* Version + traffic class + flow (0) */
252e3346 2940 *(__be32 *)iph |= htonl(0x60000000 | (pkt_dev->traffic_class << 20));
1ca7768c
FF
2941 }
2942
1da177e4
LT
2943 iph->hop_limit = 32;
2944
c26bf4a5 2945 iph->payload_len = htons(udplen);
1da177e4
LT
2946 iph->nexthdr = IPPROTO_UDP;
2947
4e3fd7a0
AD
2948 iph->daddr = pkt_dev->cur_in6_daddr;
2949 iph->saddr = pkt_dev->cur_in6_saddr;
1da177e4 2950
ca6549af 2951 skb->protocol = protocol;
1da177e4
LT
2952 skb->dev = odev;
2953 skb->pkt_type = PACKET_HOST;
2954
7744b5f3
SD
2955 pktgen_finalize_skb(pkt_dev, skb, datalen);
2956
c26bf4a5
TG
2957 if (!(pkt_dev->flags & F_UDPCSUM)) {
2958 skb->ip_summed = CHECKSUM_NONE;
c8cd0989 2959 } else if (odev->features & (NETIF_F_HW_CSUM | NETIF_F_IPV6_CSUM)) {
c26bf4a5
TG
2960 skb->ip_summed = CHECKSUM_PARTIAL;
2961 skb->csum_start = skb_transport_header(skb) - skb->head;
2962 skb->csum_offset = offsetof(struct udphdr, check);
2963 udph->check = ~csum_ipv6_magic(&iph->saddr, &iph->daddr, udplen, IPPROTO_UDP, 0);
2964 } else {
7744b5f3 2965 __wsum csum = skb_checksum(skb, skb_transport_offset(skb), udplen, 0);
c26bf4a5
TG
2966
2967 /* add protocol-dependent pseudo-header */
2968 udph->check = csum_ipv6_magic(&iph->saddr, &iph->daddr, udplen, IPPROTO_UDP, csum);
2969
2970 if (udph->check == 0)
2971 udph->check = CSUM_MANGLED_0;
2972 }
2973
1da177e4
LT
2974 return skb;
2975}
2976
475ac1e4
SH
2977static struct sk_buff *fill_packet(struct net_device *odev,
2978 struct pktgen_dev *pkt_dev)
1da177e4 2979{
222f1806 2980 if (pkt_dev->flags & F_IPV6)
1da177e4
LT
2981 return fill_packet_ipv6(odev, pkt_dev);
2982 else
2983 return fill_packet_ipv4(odev, pkt_dev);
2984}
2985
222f1806 2986static void pktgen_clear_counters(struct pktgen_dev *pkt_dev)
1da177e4 2987{
222f1806
LC
2988 pkt_dev->seq_num = 1;
2989 pkt_dev->idle_acc = 0;
1da177e4 2990 pkt_dev->sofar = 0;
222f1806
LC
2991 pkt_dev->tx_bytes = 0;
2992 pkt_dev->errors = 0;
1da177e4
LT
2993}
2994
2995/* Set up structure for sending pkts, clear counters */
2996
2997static void pktgen_run(struct pktgen_thread *t)
2998{
c26a8016 2999 struct pktgen_dev *pkt_dev;
1da177e4
LT
3000 int started = 0;
3001
f9467eae 3002 func_enter();
1da177e4 3003
8788370a
JDB
3004 rcu_read_lock();
3005 list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
1da177e4
LT
3006
3007 /*
3008 * setup odev and create initial packet.
3009 */
3010 pktgen_setup_inject(pkt_dev);
3011
222f1806 3012 if (pkt_dev->odev) {
1da177e4 3013 pktgen_clear_counters(pkt_dev);
1da177e4 3014 pkt_dev->skb = NULL;
398f382c 3015 pkt_dev->started_at = pkt_dev->next_tx = ktime_get();
fd29cf72 3016
16dab72f 3017 set_pkt_overhead(pkt_dev);
222f1806 3018
1da177e4 3019 strcpy(pkt_dev->result, "Starting");
8788370a 3020 pkt_dev->running = 1; /* Cranke yeself! */
1da177e4 3021 started++;
222f1806 3022 } else
1da177e4
LT
3023 strcpy(pkt_dev->result, "Error starting");
3024 }
8788370a 3025 rcu_read_unlock();
222f1806
LC
3026 if (started)
3027 t->control &= ~(T_STOP);
1da177e4
LT
3028}
3029
4e58a027 3030static void pktgen_stop_all_threads_ifs(struct pktgen_net *pn)
1da177e4 3031{
cdcdbe0b 3032 struct pktgen_thread *t;
1da177e4 3033
f9467eae 3034 func_enter();
1da177e4 3035
6146e6a4 3036 mutex_lock(&pktgen_thread_lock);
cdcdbe0b 3037
4e58a027 3038 list_for_each_entry(t, &pn->pktgen_threads, th_list)
95ed63f7 3039 t->control |= T_STOP;
cdcdbe0b 3040
6146e6a4 3041 mutex_unlock(&pktgen_thread_lock);
1da177e4
LT
3042}
3043
648fda74 3044static int thread_is_running(const struct pktgen_thread *t)
1da177e4 3045{
648fda74 3046 const struct pktgen_dev *pkt_dev;
1da177e4 3047
8788370a
JDB
3048 rcu_read_lock();
3049 list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
3050 if (pkt_dev->running) {
3051 rcu_read_unlock();
648fda74 3052 return 1;
8788370a
JDB
3053 }
3054 rcu_read_unlock();
648fda74 3055 return 0;
1da177e4
LT
3056}
3057
222f1806 3058static int pktgen_wait_thread_run(struct pktgen_thread *t)
1da177e4 3059{
222f1806 3060 while (thread_is_running(t)) {
1da177e4 3061
720f1de4
PA
3062 /* note: 't' will still be around even after the unlock/lock
3063 * cycle because pktgen_thread threads are only cleared at
3064 * net exit
3065 */
3066 mutex_unlock(&pktgen_thread_lock);
222f1806 3067 msleep_interruptible(100);
720f1de4 3068 mutex_lock(&pktgen_thread_lock);
1da177e4 3069
222f1806
LC
3070 if (signal_pending(current))
3071 goto signal;
222f1806 3072 }
222f1806
LC
3073 return 1;
3074signal:
3075 return 0;
1da177e4
LT
3076}
3077
4e58a027 3078static int pktgen_wait_all_threads_run(struct pktgen_net *pn)
1da177e4 3079{
cdcdbe0b 3080 struct pktgen_thread *t;
1da177e4 3081 int sig = 1;
222f1806 3082
720f1de4
PA
3083 /* prevent from racing with rmmod */
3084 if (!try_module_get(THIS_MODULE))
3085 return sig;
3086
6146e6a4 3087 mutex_lock(&pktgen_thread_lock);
cdcdbe0b 3088
4e58a027 3089 list_for_each_entry(t, &pn->pktgen_threads, th_list) {
1da177e4 3090 sig = pktgen_wait_thread_run(t);
222f1806
LC
3091 if (sig == 0)
3092 break;
1da177e4 3093 }
cdcdbe0b
LC
3094
3095 if (sig == 0)
4e58a027 3096 list_for_each_entry(t, &pn->pktgen_threads, th_list)
1da177e4 3097 t->control |= (T_STOP);
cdcdbe0b 3098
6146e6a4 3099 mutex_unlock(&pktgen_thread_lock);
720f1de4 3100 module_put(THIS_MODULE);
1da177e4
LT
3101 return sig;
3102}
3103
4e58a027 3104static void pktgen_run_all_threads(struct pktgen_net *pn)
1da177e4 3105{
cdcdbe0b 3106 struct pktgen_thread *t;
1da177e4 3107
f9467eae 3108 func_enter();
1da177e4 3109
6146e6a4 3110 mutex_lock(&pktgen_thread_lock);
1da177e4 3111
4e58a027 3112 list_for_each_entry(t, &pn->pktgen_threads, th_list)
1da177e4 3113 t->control |= (T_RUN);
cdcdbe0b 3114
6146e6a4 3115 mutex_unlock(&pktgen_thread_lock);
1da177e4 3116
63adc6fb
SH
3117 /* Propagate thread->control */
3118 schedule_timeout_interruptible(msecs_to_jiffies(125));
222f1806 3119
4e58a027 3120 pktgen_wait_all_threads_run(pn);
1da177e4
LT
3121}
3122
4e58a027 3123static void pktgen_reset_all_threads(struct pktgen_net *pn)
eb37b41c
JB
3124{
3125 struct pktgen_thread *t;
3126
f9467eae 3127 func_enter();
eb37b41c
JB
3128
3129 mutex_lock(&pktgen_thread_lock);
3130
4e58a027 3131 list_for_each_entry(t, &pn->pktgen_threads, th_list)
eb37b41c
JB
3132 t->control |= (T_REMDEVALL);
3133
3134 mutex_unlock(&pktgen_thread_lock);
3135
63adc6fb
SH
3136 /* Propagate thread->control */
3137 schedule_timeout_interruptible(msecs_to_jiffies(125));
eb37b41c 3138
4e58a027 3139 pktgen_wait_all_threads_run(pn);
eb37b41c
JB
3140}
3141
1da177e4
LT
3142static void show_results(struct pktgen_dev *pkt_dev, int nr_frags)
3143{
fd29cf72 3144 __u64 bps, mbps, pps;
222f1806 3145 char *p = pkt_dev->result;
fd29cf72
SH
3146 ktime_t elapsed = ktime_sub(pkt_dev->stopped_at,
3147 pkt_dev->started_at);
3148 ktime_t idle = ns_to_ktime(pkt_dev->idle_acc);
3149
03a14ab1 3150 p += sprintf(p, "OK: %llu(c%llu+d%llu) usec, %llu (%dbyte,%dfrags)\n",
fd29cf72
SH
3151 (unsigned long long)ktime_to_us(elapsed),
3152 (unsigned long long)ktime_to_us(ktime_sub(elapsed, idle)),
3153 (unsigned long long)ktime_to_us(idle),
222f1806
LC
3154 (unsigned long long)pkt_dev->sofar,
3155 pkt_dev->cur_pkt_size, nr_frags);
3156
fd29cf72
SH
3157 pps = div64_u64(pkt_dev->sofar * NSEC_PER_SEC,
3158 ktime_to_ns(elapsed));
222f1806
LC
3159
3160 bps = pps * 8 * pkt_dev->cur_pkt_size;
3161
3162 mbps = bps;
3163 do_div(mbps, 1000000);
3164 p += sprintf(p, " %llupps %lluMb/sec (%llubps) errors: %llu",
3165 (unsigned long long)pps,
3166 (unsigned long long)mbps,
3167 (unsigned long long)bps,
3168 (unsigned long long)pkt_dev->errors);
1da177e4 3169}
1da177e4
LT
3170
3171/* Set stopped-at timer, remove from running list, do counters & statistics */
222f1806 3172static int pktgen_stop_device(struct pktgen_dev *pkt_dev)
1da177e4 3173{
222f1806 3174 int nr_frags = pkt_dev->skb ? skb_shinfo(pkt_dev->skb)->nr_frags : -1;
95ed63f7 3175
222f1806 3176 if (!pkt_dev->running) {
294a0b7f
JP
3177 pr_warn("interface: %s is already stopped\n",
3178 pkt_dev->odevname);
222f1806
LC
3179 return -EINVAL;
3180 }
1da177e4 3181
8788370a 3182 pkt_dev->running = 0;
3bda06a3
SH
3183 kfree_skb(pkt_dev->skb);
3184 pkt_dev->skb = NULL;
398f382c 3185 pkt_dev->stopped_at = ktime_get();
1da177e4 3186
95ed63f7 3187 show_results(pkt_dev, nr_frags);
1da177e4 3188
222f1806 3189 return 0;
1da177e4
LT
3190}
3191
222f1806 3192static struct pktgen_dev *next_to_run(struct pktgen_thread *t)
1da177e4 3193{
c26a8016 3194 struct pktgen_dev *pkt_dev, *best = NULL;
222f1806 3195
8788370a
JDB
3196 rcu_read_lock();
3197 list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
c26a8016 3198 if (!pkt_dev->running)
222f1806
LC
3199 continue;
3200 if (best == NULL)
c26a8016 3201 best = pkt_dev;
398f382c 3202 else if (ktime_compare(pkt_dev->next_tx, best->next_tx) < 0)
c26a8016 3203 best = pkt_dev;
1da177e4 3204 }
8788370a
JDB
3205 rcu_read_unlock();
3206
222f1806 3207 return best;
1da177e4
LT
3208}
3209
222f1806
LC
3210static void pktgen_stop(struct pktgen_thread *t)
3211{
c26a8016 3212 struct pktgen_dev *pkt_dev;
1da177e4 3213
f9467eae 3214 func_enter();
1da177e4 3215
8788370a 3216 rcu_read_lock();
1da177e4 3217
8788370a 3218 list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
c26a8016 3219 pktgen_stop_device(pkt_dev);
95ed63f7 3220 }
1da177e4 3221
8788370a 3222 rcu_read_unlock();
1da177e4
LT
3223}
3224
95ed63f7
AK
3225/*
3226 * one of our devices needs to be removed - find it
3227 * and remove it
3228 */
3229static void pktgen_rem_one_if(struct pktgen_thread *t)
3230{
c26a8016
LC
3231 struct list_head *q, *n;
3232 struct pktgen_dev *cur;
95ed63f7 3233
f9467eae 3234 func_enter();
95ed63f7 3235
c26a8016
LC
3236 list_for_each_safe(q, n, &t->if_list) {
3237 cur = list_entry(q, struct pktgen_dev, list);
95ed63f7 3238
222f1806
LC
3239 if (!cur->removal_mark)
3240 continue;
95ed63f7 3241
86dc1ad2 3242 kfree_skb(cur->skb);
95ed63f7
AK
3243 cur->skb = NULL;
3244
3245 pktgen_remove_device(t, cur);
3246
3247 break;
3248 }
95ed63f7
AK
3249}
3250
222f1806 3251static void pktgen_rem_all_ifs(struct pktgen_thread *t)
1da177e4 3252{
c26a8016
LC
3253 struct list_head *q, *n;
3254 struct pktgen_dev *cur;
222f1806 3255
f9467eae
JP
3256 func_enter();
3257
222f1806 3258 /* Remove all devices, free mem */
95ed63f7 3259
c26a8016
LC
3260 list_for_each_safe(q, n, &t->if_list) {
3261 cur = list_entry(q, struct pktgen_dev, list);
95ed63f7 3262
86dc1ad2 3263 kfree_skb(cur->skb);
95ed63f7
AK
3264 cur->skb = NULL;
3265
1da177e4
LT
3266 pktgen_remove_device(t, cur);
3267 }
1da177e4
LT
3268}
3269
222f1806 3270static void pktgen_rem_thread(struct pktgen_thread *t)
1da177e4 3271{
222f1806 3272 /* Remove from the thread list */
4e58a027 3273 remove_proc_entry(t->tsk->comm, t->net->proc_dir);
1da177e4
LT
3274}
3275
ef87979c 3276static void pktgen_resched(struct pktgen_dev *pkt_dev)
3791decb 3277{
398f382c 3278 ktime_t idle_start = ktime_get();
ef87979c 3279 schedule();
398f382c 3280 pkt_dev->idle_acc += ktime_to_ns(ktime_sub(ktime_get(), idle_start));
ef87979c 3281}
3791decb 3282
ef87979c
SH
3283static void pktgen_wait_for_skb(struct pktgen_dev *pkt_dev)
3284{
398f382c 3285 ktime_t idle_start = ktime_get();
3791decb 3286
63354797 3287 while (refcount_read(&(pkt_dev->skb->users)) != 1) {
ef87979c
SH
3288 if (signal_pending(current))
3289 break;
3290
3291 if (need_resched())
3292 pktgen_resched(pkt_dev);
3293 else
3294 cpu_relax();
3295 }
398f382c 3296 pkt_dev->idle_acc += ktime_to_ns(ktime_sub(ktime_get(), idle_start));
3791decb
SH
3297}
3298
475ac1e4 3299static void pktgen_xmit(struct pktgen_dev *pkt_dev)
1da177e4 3300{
6aa7de05 3301 unsigned int burst = READ_ONCE(pkt_dev->burst);
00829823 3302 struct net_device *odev = pkt_dev->odev;
fd2ea0a7 3303 struct netdev_queue *txq;
62f64aed 3304 struct sk_buff *skb;
1da177e4
LT
3305 int ret;
3306
ef87979c
SH
3307 /* If device is offline, then don't send */
3308 if (unlikely(!netif_running(odev) || !netif_carrier_ok(odev))) {
3309 pktgen_stop_device(pkt_dev);
3310 return;
fd2ea0a7
DM
3311 }
3312
ef87979c
SH
3313 /* This is max DELAY, this has special meaning of
3314 * "never transmit"
3315 */
3316 if (unlikely(pkt_dev->delay == ULLONG_MAX)) {
398f382c 3317 pkt_dev->next_tx = ktime_add_ns(ktime_get(), ULONG_MAX);
3791decb 3318 return;
1da177e4 3319 }
222f1806 3320
ef87979c 3321 /* If no skb or clone count exhausted then get new one */
7d7bb1cf
SH
3322 if (!pkt_dev->skb || (pkt_dev->last_ok &&
3323 ++pkt_dev->clone_count >= pkt_dev->clone_skb)) {
3324 /* build a new pkt */
3325 kfree_skb(pkt_dev->skb);
3326
3327 pkt_dev->skb = fill_packet(odev, pkt_dev);
3328 if (pkt_dev->skb == NULL) {
f9467eae 3329 pr_err("ERROR: couldn't allocate skb in fill_packet\n");
7d7bb1cf
SH
3330 schedule();
3331 pkt_dev->clone_count--; /* back out increment, OOM */
3332 return;
1da177e4 3333 }
baac8564 3334 pkt_dev->last_pkt_size = pkt_dev->skb->len;
7d7bb1cf 3335 pkt_dev->clone_count = 0; /* reset counter */
1da177e4 3336 }
95ed63f7 3337
ef87979c
SH
3338 if (pkt_dev->delay && pkt_dev->last_ok)
3339 spin(pkt_dev, pkt_dev->next_tx);
3340
62f64aed
AS
3341 if (pkt_dev->xmit_mode == M_NETIF_RECEIVE) {
3342 skb = pkt_dev->skb;
3343 skb->protocol = eth_type_trans(skb, skb->dev);
63354797 3344 refcount_add(burst, &skb->users);
62f64aed
AS
3345 local_bh_disable();
3346 do {
3347 ret = netif_receive_skb(skb);
3348 if (ret == NET_RX_DROP)
3349 pkt_dev->errors++;
3350 pkt_dev->sofar++;
3351 pkt_dev->seq_num++;
63354797 3352 if (refcount_read(&skb->users) != burst) {
62f64aed
AS
3353 /* skb was queued by rps/rfs or taps,
3354 * so cannot reuse this skb
3355 */
63354797 3356 WARN_ON(refcount_sub_and_test(burst - 1, &skb->users));
62f64aed
AS
3357 /* get out of the loop and wait
3358 * until skb is consumed
3359 */
62f64aed
AS
3360 break;
3361 }
3362 /* skb was 'freed' by stack, so clean few
3363 * bits and reuse it
3364 */
a5135bcf 3365 skb_reset_tc(skb);
62f64aed
AS
3366 } while (--burst > 0);
3367 goto out; /* Skips xmit_mode M_START_XMIT */
0967f244
JF
3368 } else if (pkt_dev->xmit_mode == M_QUEUE_XMIT) {
3369 local_bh_disable();
63354797 3370 refcount_inc(&pkt_dev->skb->users);
0967f244
JF
3371
3372 ret = dev_queue_xmit(pkt_dev->skb);
3373 switch (ret) {
3374 case NET_XMIT_SUCCESS:
3375 pkt_dev->sofar++;
3376 pkt_dev->seq_num++;
3377 pkt_dev->tx_bytes += pkt_dev->last_pkt_size;
3378 break;
3379 case NET_XMIT_DROP:
3380 case NET_XMIT_CN:
3381 /* These are all valid return codes for a qdisc but
3382 * indicate packets are being dropped or will likely
3383 * be dropped soon.
3384 */
3385 case NETDEV_TX_BUSY:
3386 /* qdisc may call dev_hard_start_xmit directly in cases
3387 * where no queues exist e.g. loopback device, virtual
3388 * devices, etc. In this case we need to handle
3389 * NETDEV_TX_ codes.
3390 */
3391 default:
3392 pkt_dev->errors++;
3393 net_info_ratelimited("%s xmit error: %d\n",
3394 pkt_dev->odevname, ret);
3395 break;
3396 }
3397 goto out;
62f64aed
AS
3398 }
3399
10c51b56 3400 txq = skb_get_tx_queue(odev, pkt_dev->skb);
fd2ea0a7 3401
0f2eea4b
DB
3402 local_bh_disable();
3403
3404 HARD_TX_LOCK(odev, txq, smp_processor_id());
5b8db2f5 3405
6f25cd47 3406 if (unlikely(netif_xmit_frozen_or_drv_stopped(txq))) {
ef87979c 3407 ret = NETDEV_TX_BUSY;
0835acfe
ED
3408 pkt_dev->last_ok = 0;
3409 goto unlock;
3410 }
63354797 3411 refcount_add(burst, &pkt_dev->skb->users);
38b2cf29
AS
3412
3413xmit_more:
3414 ret = netdev_start_xmit(pkt_dev->skb, odev, txq, --burst > 0);
ef87979c
SH
3415
3416 switch (ret) {
3417 case NETDEV_TX_OK:
ef87979c
SH
3418 pkt_dev->last_ok = 1;
3419 pkt_dev->sofar++;
3420 pkt_dev->seq_num++;
baac8564 3421 pkt_dev->tx_bytes += pkt_dev->last_pkt_size;
38b2cf29
AS
3422 if (burst > 0 && !netif_xmit_frozen_or_drv_stopped(txq))
3423 goto xmit_more;
ef87979c 3424 break;
f466dba1
JF
3425 case NET_XMIT_DROP:
3426 case NET_XMIT_CN:
f466dba1
JF
3427 /* skb has been consumed */
3428 pkt_dev->errors++;
3429 break;
ef87979c 3430 default: /* Drivers are not supposed to return other values! */
e87cc472
JP
3431 net_info_ratelimited("%s xmit error: %d\n",
3432 pkt_dev->odevname, ret);
ef87979c 3433 pkt_dev->errors++;
f91845da 3434 /* fall through */
ef87979c
SH
3435 case NETDEV_TX_BUSY:
3436 /* Retry it next time */
63354797 3437 refcount_dec(&(pkt_dev->skb->users));
ef87979c 3438 pkt_dev->last_ok = 0;
222f1806 3439 }
38b2cf29 3440 if (unlikely(burst))
63354797 3441 WARN_ON(refcount_sub_and_test(burst, &pkt_dev->skb->users));
0835acfe 3442unlock:
0f2eea4b
DB
3443 HARD_TX_UNLOCK(odev, txq);
3444
62f64aed 3445out:
0f2eea4b 3446 local_bh_enable();
222f1806 3447
1da177e4
LT
3448 /* If pkt_dev->count is zero, then run forever */
3449 if ((pkt_dev->count != 0) && (pkt_dev->sofar >= pkt_dev->count)) {
ef87979c 3450 pktgen_wait_for_skb(pkt_dev);
222f1806 3451
1da177e4
LT
3452 /* Done with this */
3453 pktgen_stop_device(pkt_dev);
222f1806 3454 }
222f1806 3455}
1da177e4 3456
4ec93edb 3457/*
1da177e4
LT
3458 * Main loop of the thread goes here
3459 */
3460
ee74baa7 3461static int pktgen_thread_worker(void *arg)
1da177e4
LT
3462{
3463 DEFINE_WAIT(wait);
ee74baa7 3464 struct pktgen_thread *t = arg;
222f1806 3465 struct pktgen_dev *pkt_dev = NULL;
1da177e4 3466 int cpu = t->cpu;
1da177e4 3467
ee74baa7 3468 BUG_ON(smp_processor_id() != cpu);
1da177e4
LT
3469
3470 init_waitqueue_head(&t->queue);
d3ede327 3471 complete(&t->start_done);
1da177e4 3472
f9467eae 3473 pr_debug("starting pktgen/%d: pid=%d\n", cpu, task_pid_nr(current));
1da177e4 3474
83144186
RW
3475 set_freezable();
3476
ee74baa7
DM
3477 while (!kthread_should_stop()) {
3478 pkt_dev = next_to_run(t);
1da177e4 3479
ef87979c 3480 if (unlikely(!pkt_dev && t->control == 0)) {
4e58a027 3481 if (t->net->pktgen_exiting)
551eaff1 3482 break;
ef87979c
SH
3483 wait_event_interruptible_timeout(t->queue,
3484 t->control != 0,
3485 HZ/10);
1b3f720b 3486 try_to_freeze();
ef87979c 3487 continue;
ee74baa7 3488 }
1da177e4 3489
ef87979c 3490 if (likely(pkt_dev)) {
1da177e4
LT
3491 pktgen_xmit(pkt_dev);
3492
ef87979c
SH
3493 if (need_resched())
3494 pktgen_resched(pkt_dev);
3495 else
3496 cpu_relax();
3497 }
3498
222f1806 3499 if (t->control & T_STOP) {
1da177e4
LT
3500 pktgen_stop(t);
3501 t->control &= ~(T_STOP);
3502 }
3503
222f1806 3504 if (t->control & T_RUN) {
1da177e4
LT
3505 pktgen_run(t);
3506 t->control &= ~(T_RUN);
3507 }
3508
222f1806 3509 if (t->control & T_REMDEVALL) {
1da177e4 3510 pktgen_rem_all_ifs(t);
95ed63f7
AK
3511 t->control &= ~(T_REMDEVALL);
3512 }
3513
222f1806 3514 if (t->control & T_REMDEV) {
95ed63f7 3515 pktgen_rem_one_if(t);
1da177e4
LT
3516 t->control &= ~(T_REMDEV);
3517 }
3518
09fe3ef4 3519 try_to_freeze();
222f1806 3520 }
1da177e4 3521
f9467eae 3522 pr_debug("%s stopping all device\n", t->tsk->comm);
222f1806 3523 pktgen_stop(t);
1da177e4 3524
f9467eae 3525 pr_debug("%s removing all device\n", t->tsk->comm);
222f1806 3526 pktgen_rem_all_ifs(t);
1da177e4 3527
f9467eae 3528 pr_debug("%s removing thread\n", t->tsk->comm);
222f1806 3529 pktgen_rem_thread(t);
cdcdbe0b 3530
ee74baa7 3531 return 0;
1da177e4
LT
3532}
3533
222f1806 3534static struct pktgen_dev *pktgen_find_dev(struct pktgen_thread *t,
3e984840 3535 const char *ifname, bool exact)
1da177e4 3536{
c26a8016 3537 struct pktgen_dev *p, *pkt_dev = NULL;
3e984840 3538 size_t len = strlen(ifname);
222f1806 3539
8788370a
JDB
3540 rcu_read_lock();
3541 list_for_each_entry_rcu(p, &t->if_list, list)
3e984840
ED
3542 if (strncmp(p->odevname, ifname, len) == 0) {
3543 if (p->odevname[len]) {
3544 if (exact || p->odevname[len] != '@')
3545 continue;
3546 }
c26a8016 3547 pkt_dev = p;
222f1806
LC
3548 break;
3549 }
222f1806 3550
8788370a 3551 rcu_read_unlock();
f9467eae 3552 pr_debug("find_dev(%s) returning %p\n", ifname, pkt_dev);
222f1806 3553 return pkt_dev;
1da177e4
LT
3554}
3555
4ec93edb
YH
3556/*
3557 * Adds a dev at front of if_list.
1da177e4
LT
3558 */
3559
222f1806
LC
3560static int add_dev_to_thread(struct pktgen_thread *t,
3561 struct pktgen_dev *pkt_dev)
1da177e4
LT
3562{
3563 int rv = 0;
222f1806 3564
8788370a
JDB
3565 /* This function cannot be called concurrently, as its called
3566 * under pktgen_thread_lock mutex, but it can run from
3567 * userspace on another CPU than the kthread. The if_lock()
3568 * is used here to sync with concurrent instances of
3569 * _rem_dev_from_if_list() invoked via kthread, which is also
3570 * updating the if_list */
222f1806
LC
3571 if_lock(t);
3572
3573 if (pkt_dev->pg_thread) {
f9467eae 3574 pr_err("ERROR: already assigned to a thread\n");
222f1806
LC
3575 rv = -EBUSY;
3576 goto out;
3577 }
c26a8016 3578
1da177e4 3579 pkt_dev->running = 0;
8788370a
JDB
3580 pkt_dev->pg_thread = t;
3581 list_add_rcu(&pkt_dev->list, &t->if_list);
1da177e4 3582
222f1806
LC
3583out:
3584 if_unlock(t);
3585 return rv;
1da177e4
LT
3586}
3587
3588/* Called under thread lock */
3589
222f1806 3590static int pktgen_add_device(struct pktgen_thread *t, const char *ifname)
1da177e4 3591{
222f1806 3592 struct pktgen_dev *pkt_dev;
39df232f 3593 int err;
3291b9db 3594 int node = cpu_to_node(t->cpu);
222f1806 3595
1da177e4
LT
3596 /* We don't allow a device to be on several threads */
3597
4e58a027 3598 pkt_dev = __pktgen_NN_threads(t->net, ifname, FIND);
d50a6b56 3599 if (pkt_dev) {
f9467eae 3600 pr_err("ERROR: interface already used\n");
222f1806
LC
3601 return -EBUSY;
3602 }
d50a6b56 3603
3291b9db 3604 pkt_dev = kzalloc_node(sizeof(struct pktgen_dev), GFP_KERNEL, node);
d50a6b56
SH
3605 if (!pkt_dev)
3606 return -ENOMEM;
3607
593f63b0 3608 strcpy(pkt_dev->odevname, ifname);
fd7beced
KC
3609 pkt_dev->flows = vzalloc_node(array_size(MAX_CFLOWS,
3610 sizeof(struct flow_state)),
3291b9db 3611 node);
d50a6b56
SH
3612 if (pkt_dev->flows == NULL) {
3613 kfree(pkt_dev);
3614 return -ENOMEM;
3615 }
d50a6b56 3616
95ed63f7 3617 pkt_dev->removal_mark = 0;
d50a6b56 3618 pkt_dev->nfrags = 0;
fd29cf72 3619 pkt_dev->delay = pg_delay_d;
d50a6b56
SH
3620 pkt_dev->count = pg_count_d;
3621 pkt_dev->sofar = 0;
222f1806 3622 pkt_dev->udp_src_min = 9; /* sink port */
d50a6b56
SH
3623 pkt_dev->udp_src_max = 9;
3624 pkt_dev->udp_dst_min = 9;
3625 pkt_dev->udp_dst_max = 9;
34954ddc
FF
3626 pkt_dev->vlan_p = 0;
3627 pkt_dev->vlan_cfi = 0;
3628 pkt_dev->vlan_id = 0xffff;
3629 pkt_dev->svlan_p = 0;
3630 pkt_dev->svlan_cfi = 0;
3631 pkt_dev->svlan_id = 0xffff;
38b2cf29 3632 pkt_dev->burst = 1;
98fa15f3 3633 pkt_dev->node = NUMA_NO_NODE;
34954ddc 3634
4e58a027 3635 err = pktgen_setup_dev(t->net, pkt_dev, ifname);
39df232f
SH
3636 if (err)
3637 goto out1;
d8873315
NH
3638 if (pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)
3639 pkt_dev->clone_skb = pg_clone_skb_d;
d50a6b56 3640
4e58a027 3641 pkt_dev->entry = proc_create_data(ifname, 0600, t->net->proc_dir,
5efdccbc 3642 &pktgen_if_fops, pkt_dev);
39df232f 3643 if (!pkt_dev->entry) {
f9467eae 3644 pr_err("cannot create %s/%s procfs entry\n",
d50a6b56 3645 PG_PROC_DIR, ifname);
39df232f
SH
3646 err = -EINVAL;
3647 goto out2;
d50a6b56 3648 }
a553e4a6
JHS
3649#ifdef CONFIG_XFRM
3650 pkt_dev->ipsmode = XFRM_MODE_TRANSPORT;
3651 pkt_dev->ipsproto = IPPROTO_ESP;
cf93d47e
FD
3652
3653 /* xfrm tunnel mode needs additional dst to extract outter
3654 * ip header protocol/ttl/id field, here creat a phony one.
3655 * instead of looking for a valid rt, which definitely hurting
3656 * performance under such circumstance.
3657 */
3658 pkt_dev->dstops.family = AF_INET;
b6ca8bd5
DM
3659 pkt_dev->xdst.u.dst.dev = pkt_dev->odev;
3660 dst_init_metrics(&pkt_dev->xdst.u.dst, pktgen_dst_metrics, false);
3661 pkt_dev->xdst.child = &pkt_dev->xdst.u.dst;
3662 pkt_dev->xdst.u.dst.ops = &pkt_dev->dstops;
a553e4a6 3663#endif
d50a6b56
SH
3664
3665 return add_dev_to_thread(t, pkt_dev);
39df232f
SH
3666out2:
3667 dev_put(pkt_dev->odev);
3668out1:
a553e4a6
JHS
3669#ifdef CONFIG_XFRM
3670 free_SAs(pkt_dev);
3671#endif
1d0ebfe7 3672 vfree(pkt_dev->flows);
39df232f
SH
3673 kfree(pkt_dev);
3674 return err;
1da177e4
LT
3675}
3676
4e58a027 3677static int __net_init pktgen_create_thread(int cpu, struct pktgen_net *pn)
1da177e4 3678{
cdcdbe0b 3679 struct pktgen_thread *t;
d50a6b56 3680 struct proc_dir_entry *pe;
ee74baa7 3681 struct task_struct *p;
222f1806 3682
3291b9db
ED
3683 t = kzalloc_node(sizeof(struct pktgen_thread), GFP_KERNEL,
3684 cpu_to_node(cpu));
222f1806 3685 if (!t) {
f9467eae 3686 pr_err("ERROR: out of memory, can't create new thread\n");
222f1806
LC
3687 return -ENOMEM;
3688 }
3689
9a0b1e8b 3690 mutex_init(&t->if_lock);
1da177e4 3691 t->cpu = cpu;
222f1806 3692
ee74baa7
DM
3693 INIT_LIST_HEAD(&t->if_list);
3694
4e58a027 3695 list_add_tail(&t->th_list, &pn->pktgen_threads);
d3ede327 3696 init_completion(&t->start_done);
ee74baa7 3697
94dcf29a
ED
3698 p = kthread_create_on_node(pktgen_thread_worker,
3699 t,
3700 cpu_to_node(cpu),
3701 "kpktgend_%d", cpu);
ee74baa7 3702 if (IS_ERR(p)) {
f9467eae 3703 pr_err("kernel_thread() failed for cpu %d\n", t->cpu);
ee74baa7
DM
3704 list_del(&t->th_list);
3705 kfree(t);
3706 return PTR_ERR(p);
3707 }
3708 kthread_bind(p, cpu);
3709 t->tsk = p;
3710
4e58a027 3711 pe = proc_create_data(t->tsk->comm, 0600, pn->proc_dir,
5efdccbc 3712 &pktgen_thread_fops, t);
222f1806 3713 if (!pe) {
f9467eae 3714 pr_err("cannot create %s/%s procfs entry\n",
ee74baa7
DM
3715 PG_PROC_DIR, t->tsk->comm);
3716 kthread_stop(p);
3717 list_del(&t->th_list);
222f1806
LC
3718 kfree(t);
3719 return -EINVAL;
3720 }
d50a6b56 3721
4e58a027 3722 t->net = pn;
1fbe4b46 3723 get_task_struct(p);
ee74baa7 3724 wake_up_process(p);
d3ede327 3725 wait_for_completion(&t->start_done);
1da177e4
LT
3726
3727 return 0;
3728}
3729
4ec93edb
YH
3730/*
3731 * Removes a device from the thread if_list.
1da177e4 3732 */
222f1806
LC
3733static void _rem_dev_from_if_list(struct pktgen_thread *t,
3734 struct pktgen_dev *pkt_dev)
1da177e4 3735{
c26a8016
LC
3736 struct list_head *q, *n;
3737 struct pktgen_dev *p;
1da177e4 3738
8788370a 3739 if_lock(t);
c26a8016
LC
3740 list_for_each_safe(q, n, &t->if_list) {
3741 p = list_entry(q, struct pktgen_dev, list);
3742 if (p == pkt_dev)
8788370a 3743 list_del_rcu(&p->list);
1da177e4 3744 }
8788370a 3745 if_unlock(t);
1da177e4
LT
3746}
3747
222f1806
LC
3748static int pktgen_remove_device(struct pktgen_thread *t,
3749 struct pktgen_dev *pkt_dev)
1da177e4 3750{
f9467eae 3751 pr_debug("remove_device pkt_dev=%p\n", pkt_dev);
1da177e4 3752
222f1806 3753 if (pkt_dev->running) {
294a0b7f 3754 pr_warn("WARNING: trying to remove a running interface, stopping it now\n");
222f1806
LC
3755 pktgen_stop_device(pkt_dev);
3756 }
3757
3758 /* Dis-associate from the interface */
1da177e4
LT
3759
3760 if (pkt_dev->odev) {
3761 dev_put(pkt_dev->odev);
222f1806
LC
3762 pkt_dev->odev = NULL;
3763 }
3764
8788370a
JDB
3765 /* Remove proc before if_list entry, because add_device uses
3766 * list to determine if interface already exist, avoid race
3767 * with proc_create_data() */
ef87c5d6 3768 proc_remove(pkt_dev->entry);
1da177e4 3769
8788370a
JDB
3770 /* And update the thread if_list */
3771 _rem_dev_from_if_list(t, pkt_dev);
3772
a553e4a6
JHS
3773#ifdef CONFIG_XFRM
3774 free_SAs(pkt_dev);
3775#endif
1d0ebfe7 3776 vfree(pkt_dev->flows);
26ad7879
ED
3777 if (pkt_dev->page)
3778 put_page(pkt_dev->page);
8788370a 3779 kfree_rcu(pkt_dev, rcu);
222f1806 3780 return 0;
1da177e4
LT
3781}
3782
4e58a027 3783static int __net_init pg_net_init(struct net *net)
1da177e4 3784{
4e58a027 3785 struct pktgen_net *pn = net_generic(net, pg_net_id);
d50a6b56 3786 struct proc_dir_entry *pe;
4e58a027
CW
3787 int cpu, ret = 0;
3788
3789 pn->net = net;
3790 INIT_LIST_HEAD(&pn->pktgen_threads);
3791 pn->pktgen_exiting = false;
3792 pn->proc_dir = proc_mkdir(PG_PROC_DIR, pn->net->proc_net);
3793 if (!pn->proc_dir) {
3794 pr_warn("cannot create /proc/net/%s\n", PG_PROC_DIR);
d50a6b56 3795 return -ENODEV;
4e58a027
CW
3796 }
3797 pe = proc_create(PGCTRL, 0600, pn->proc_dir, &pktgen_fops);
222f1806 3798 if (pe == NULL) {
4e58a027 3799 pr_err("cannot create %s procfs entry\n", PGCTRL);
ce14f894 3800 ret = -EINVAL;
4e58a027 3801 goto remove;
222f1806 3802 }
1da177e4 3803
670c02c2 3804 for_each_online_cpu(cpu) {
8024bb24 3805 int err;
1da177e4 3806
4e58a027 3807 err = pktgen_create_thread(cpu, pn);
8024bb24 3808 if (err)
4e58a027 3809 pr_warn("Cannot create thread for cpu %d (%d)\n",
f9467eae 3810 cpu, err);
222f1806 3811 }
8024bb24 3812
4e58a027
CW
3813 if (list_empty(&pn->pktgen_threads)) {
3814 pr_err("Initialization failed for all threads\n");
ce14f894 3815 ret = -ENODEV;
4e58a027 3816 goto remove_entry;
8024bb24
LC
3817 }
3818
222f1806 3819 return 0;
ce14f894 3820
4e58a027
CW
3821remove_entry:
3822 remove_proc_entry(PGCTRL, pn->proc_dir);
3823remove:
ece31ffd 3824 remove_proc_entry(PG_PROC_DIR, pn->net->proc_net);
ce14f894 3825 return ret;
1da177e4
LT
3826}
3827
4e58a027 3828static void __net_exit pg_net_exit(struct net *net)
1da177e4 3829{
4e58a027 3830 struct pktgen_net *pn = net_generic(net, pg_net_id);
cdcdbe0b
LC
3831 struct pktgen_thread *t;
3832 struct list_head *q, *n;
d4b11335 3833 LIST_HEAD(list);
1da177e4 3834
222f1806 3835 /* Stop all interfaces & threads */
4e58a027 3836 pn->pktgen_exiting = true;
1da177e4 3837
c57b5468 3838 mutex_lock(&pktgen_thread_lock);
4e58a027 3839 list_splice_init(&pn->pktgen_threads, &list);
c57b5468
ED
3840 mutex_unlock(&pktgen_thread_lock);
3841
3842 list_for_each_safe(q, n, &list) {
cdcdbe0b 3843 t = list_entry(q, struct pktgen_thread, th_list);
c57b5468 3844 list_del(&t->th_list);
ee74baa7 3845 kthread_stop(t->tsk);
1fbe4b46 3846 put_task_struct(t->tsk);
ee74baa7 3847 kfree(t);
222f1806 3848 }
1da177e4 3849
4e58a027 3850 remove_proc_entry(PGCTRL, pn->proc_dir);
ece31ffd 3851 remove_proc_entry(PG_PROC_DIR, pn->net->proc_net);
4e58a027
CW
3852}
3853
3854static struct pernet_operations pg_net_ops = {
3855 .init = pg_net_init,
3856 .exit = pg_net_exit,
3857 .id = &pg_net_id,
3858 .size = sizeof(struct pktgen_net),
3859};
3860
3861static int __init pg_init(void)
3862{
3863 int ret = 0;
1da177e4 3864
4e58a027
CW
3865 pr_info("%s", version);
3866 ret = register_pernet_subsys(&pg_net_ops);
3867 if (ret)
3868 return ret;
3869 ret = register_netdevice_notifier(&pktgen_notifier_block);
3870 if (ret)
3871 unregister_pernet_subsys(&pg_net_ops);
3872
3873 return ret;
3874}
3875
3876static void __exit pg_cleanup(void)
3877{
3878 unregister_netdevice_notifier(&pktgen_notifier_block);
3879 unregister_pernet_subsys(&pg_net_ops);
8788370a 3880 /* Don't need rcu_barrier() due to use of kfree_rcu() */
1da177e4
LT
3881}
3882
1da177e4
LT
3883module_init(pg_init);
3884module_exit(pg_cleanup);
3885
c3d2f52d 3886MODULE_AUTHOR("Robert Olsson <robert.olsson@its.uu.se>");
1da177e4
LT
3887MODULE_DESCRIPTION("Packet Generator tool");
3888MODULE_LICENSE("GPL");
c3d2f52d 3889MODULE_VERSION(VERSION);
1da177e4 3890module_param(pg_count_d, int, 0);
c3d2f52d 3891MODULE_PARM_DESC(pg_count_d, "Default number of packets to inject");
1da177e4 3892module_param(pg_delay_d, int, 0);
c3d2f52d 3893MODULE_PARM_DESC(pg_delay_d, "Default delay between packets (nanoseconds)");
1da177e4 3894module_param(pg_clone_skb_d, int, 0);
c3d2f52d 3895MODULE_PARM_DESC(pg_clone_skb_d, "Default number of copies of the same packet");
1da177e4 3896module_param(debug, int, 0);
c3d2f52d 3897MODULE_PARM_DESC(debug, "Enable debugging of pktgen module");