Loading...
1// SPDX-License-Identifier: GPL-2.0-or-later
2/*
3 * Authors:
4 * Copyright 2001, 2002 by Robert Olsson <robert.olsson@its.uu.se>
5 * Uppsala University and
6 * Swedish University of Agricultural Sciences
7 *
8 * Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
9 * Ben Greear <greearb@candelatech.com>
10 * Jens Låås <jens.laas@data.slu.se>
11 *
12 * A tool for loading the network with preconfigurated packets.
13 * The tool is implemented as a linux module. Parameters are output
14 * device, delay (to hard_xmit), number of packets, and whether
15 * to use multiple SKBs or just the same one.
16 * pktgen uses the installed interface's output routine.
17 *
18 * Additional hacking by:
19 *
20 * Jens.Laas@data.slu.se
21 * Improved by ANK. 010120.
22 * Improved by ANK even more. 010212.
23 * MAC address typo fixed. 010417 --ro
24 * Integrated. 020301 --DaveM
25 * Added multiskb option 020301 --DaveM
26 * Scaling of results. 020417--sigurdur@linpro.no
27 * Significant re-work of the module:
28 * * Convert to threaded model to more efficiently be able to transmit
29 * and receive on multiple interfaces at once.
30 * * Converted many counters to __u64 to allow longer runs.
31 * * Allow configuration of ranges, like min/max IP address, MACs,
32 * and UDP-ports, for both source and destination, and can
33 * set to use a random distribution or sequentially walk the range.
34 * * Can now change most values after starting.
35 * * Place 12-byte packet in UDP payload with magic number,
36 * sequence number, and timestamp.
37 * * Add receiver code that detects dropped pkts, re-ordered pkts, and
38 * latencies (with micro-second) precision.
39 * * Add IOCTL interface to easily get counters & configuration.
40 * --Ben Greear <greearb@candelatech.com>
41 *
42 * Renamed multiskb to clone_skb and cleaned up sending core for two distinct
43 * skb modes. A clone_skb=0 mode for Ben "ranges" work and a clone_skb != 0
44 * as a "fastpath" with a configurable number of clones after alloc's.
45 * clone_skb=0 means all packets are allocated this also means ranges time
46 * stamps etc can be used. clone_skb=100 means 1 malloc is followed by 100
47 * clones.
48 *
49 * Also moved to /proc/net/pktgen/
50 * --ro
51 *
52 * Sept 10: Fixed threading/locking. Lots of bone-headed and more clever
53 * mistakes. Also merged in DaveM's patch in the -pre6 patch.
54 * --Ben Greear <greearb@candelatech.com>
55 *
56 * Integrated to 2.5.x 021029 --Lucio Maciel (luciomaciel@zipmail.com.br)
57 *
58 * 021124 Finished major redesign and rewrite for new functionality.
59 * See Documentation/networking/pktgen.rst for how to use this.
60 *
61 * The new operation:
62 * For each CPU one thread/process is created at start. This process checks
63 * for running devices in the if_list and sends packets until count is 0 it
64 * also the thread checks the thread->control which is used for inter-process
65 * communication. controlling process "posts" operations to the threads this
66 * way.
67 * The if_list is RCU protected, and the if_lock remains to protect updating
68 * of if_list, from "add_device" as it invoked from userspace (via proc write).
69 *
70 * By design there should only be *one* "controlling" process. In practice
71 * multiple write accesses gives unpredictable result. Understood by "write"
72 * to /proc gives result code thats should be read be the "writer".
73 * For practical use this should be no problem.
74 *
75 * Note when adding devices to a specific CPU there good idea to also assign
76 * /proc/irq/XX/smp_affinity so TX-interrupts gets bound to the same CPU.
77 * --ro
78 *
79 * Fix refcount off by one if first packet fails, potential null deref,
80 * memleak 030710- KJP
81 *
82 * First "ranges" functionality for ipv6 030726 --ro
83 *
84 * Included flow support. 030802 ANK.
85 *
86 * Fixed unaligned access on IA-64 Grant Grundler <grundler@parisc-linux.org>
87 *
88 * Remove if fix from added Harald Welte <laforge@netfilter.org> 040419
89 * ia64 compilation fix from Aron Griffis <aron@hp.com> 040604
90 *
91 * New xmit() return, do_div and misc clean up by Stephen Hemminger
92 * <shemminger@osdl.org> 040923
93 *
94 * Randy Dunlap fixed u64 printk compiler warning
95 *
96 * Remove FCS from BW calculation. Lennert Buytenhek <buytenh@wantstofly.org>
97 * New time handling. Lennert Buytenhek <buytenh@wantstofly.org> 041213
98 *
99 * Corrections from Nikolai Malykh (nmalykh@bilim.com)
100 * Removed unused flags F_SET_SRCMAC & F_SET_SRCIP 041230
101 *
102 * interruptible_sleep_on_timeout() replaced Nishanth Aravamudan <nacc@us.ibm.com>
103 * 050103
104 *
105 * MPLS support by Steven Whitehouse <steve@chygwyn.com>
106 *
107 * 802.1Q/Q-in-Q support by Francesco Fondelli (FF) <francesco.fondelli@gmail.com>
108 *
109 * Fixed src_mac command to set source mac of packet to value specified in
110 * command by Adit Ranadive <adit.262@gmail.com>
111 */
112
113#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
114
115#include <linux/sys.h>
116#include <linux/types.h>
117#include <linux/module.h>
118#include <linux/moduleparam.h>
119#include <linux/kernel.h>
120#include <linux/mutex.h>
121#include <linux/sched.h>
122#include <linux/slab.h>
123#include <linux/vmalloc.h>
124#include <linux/unistd.h>
125#include <linux/string.h>
126#include <linux/ptrace.h>
127#include <linux/errno.h>
128#include <linux/ioport.h>
129#include <linux/interrupt.h>
130#include <linux/capability.h>
131#include <linux/hrtimer.h>
132#include <linux/freezer.h>
133#include <linux/delay.h>
134#include <linux/timer.h>
135#include <linux/list.h>
136#include <linux/init.h>
137#include <linux/skbuff.h>
138#include <linux/netdevice.h>
139#include <linux/inet.h>
140#include <linux/inetdevice.h>
141#include <linux/rtnetlink.h>
142#include <linux/if_arp.h>
143#include <linux/if_vlan.h>
144#include <linux/in.h>
145#include <linux/ip.h>
146#include <linux/ipv6.h>
147#include <linux/udp.h>
148#include <linux/proc_fs.h>
149#include <linux/seq_file.h>
150#include <linux/wait.h>
151#include <linux/etherdevice.h>
152#include <linux/kthread.h>
153#include <linux/prefetch.h>
154#include <linux/mmzone.h>
155#include <net/net_namespace.h>
156#include <net/checksum.h>
157#include <net/ipv6.h>
158#include <net/udp.h>
159#include <net/ip6_checksum.h>
160#include <net/addrconf.h>
161#ifdef CONFIG_XFRM
162#include <net/xfrm.h>
163#endif
164#include <net/netns/generic.h>
165#include <asm/byteorder.h>
166#include <linux/rcupdate.h>
167#include <linux/bitops.h>
168#include <linux/io.h>
169#include <linux/timex.h>
170#include <linux/uaccess.h>
171#include <asm/dma.h>
172#include <asm/div64.h> /* do_div */
173
174#define VERSION "2.75"
175#define IP_NAME_SZ 32
176#define MAX_MPLS_LABELS 16 /* This is the max label stack depth */
177#define MPLS_STACK_BOTTOM htonl(0x00000100)
178
179#define func_enter() pr_debug("entering %s\n", __func__);
180
181#define PKT_FLAGS \
182 pf(IPV6) /* Interface in IPV6 Mode */ \
183 pf(IPSRC_RND) /* IP-Src Random */ \
184 pf(IPDST_RND) /* IP-Dst Random */ \
185 pf(TXSIZE_RND) /* Transmit size is random */ \
186 pf(UDPSRC_RND) /* UDP-Src Random */ \
187 pf(UDPDST_RND) /* UDP-Dst Random */ \
188 pf(UDPCSUM) /* Include UDP checksum */ \
189 pf(NO_TIMESTAMP) /* Don't timestamp packets (default TS) */ \
190 pf(MPLS_RND) /* Random MPLS labels */ \
191 pf(QUEUE_MAP_RND) /* queue map Random */ \
192 pf(QUEUE_MAP_CPU) /* queue map mirrors smp_processor_id() */ \
193 pf(FLOW_SEQ) /* Sequential flows */ \
194 pf(IPSEC) /* ipsec on for flows */ \
195 pf(MACSRC_RND) /* MAC-Src Random */ \
196 pf(MACDST_RND) /* MAC-Dst Random */ \
197 pf(VID_RND) /* Random VLAN ID */ \
198 pf(SVID_RND) /* Random SVLAN ID */ \
199 pf(NODE) /* Node memory alloc*/ \
200
201#define pf(flag) flag##_SHIFT,
202enum pkt_flags {
203 PKT_FLAGS
204};
205#undef pf
206
207/* Device flag bits */
208#define pf(flag) static const __u32 F_##flag = (1<<flag##_SHIFT);
209PKT_FLAGS
210#undef pf
211
212#define pf(flag) __stringify(flag),
213static char *pkt_flag_names[] = {
214 PKT_FLAGS
215};
216#undef pf
217
218#define NR_PKT_FLAGS ARRAY_SIZE(pkt_flag_names)
219
220/* Thread control flag bits */
221#define T_STOP (1<<0) /* Stop run */
222#define T_RUN (1<<1) /* Start run */
223#define T_REMDEVALL (1<<2) /* Remove all devs */
224#define T_REMDEV (1<<3) /* Remove one dev */
225
226/* Xmit modes */
227#define M_START_XMIT 0 /* Default normal TX */
228#define M_NETIF_RECEIVE 1 /* Inject packets into stack */
229#define M_QUEUE_XMIT 2 /* Inject packet into qdisc */
230
231/* If lock -- protects updating of if_list */
232#define if_lock(t) mutex_lock(&(t->if_lock));
233#define if_unlock(t) mutex_unlock(&(t->if_lock));
234
235/* Used to help with determining the pkts on receive */
236#define PKTGEN_MAGIC 0xbe9be955
237#define PG_PROC_DIR "pktgen"
238#define PGCTRL "pgctrl"
239
240#define MAX_CFLOWS 65536
241
242#define VLAN_TAG_SIZE(x) ((x)->vlan_id == 0xffff ? 0 : 4)
243#define SVLAN_TAG_SIZE(x) ((x)->svlan_id == 0xffff ? 0 : 4)
244
245struct flow_state {
246 __be32 cur_daddr;
247 int count;
248#ifdef CONFIG_XFRM
249 struct xfrm_state *x;
250#endif
251 __u32 flags;
252};
253
254/* flow flag bits */
255#define F_INIT (1<<0) /* flow has been initialized */
256
257struct pktgen_dev {
258 /*
259 * Try to keep frequent/infrequent used vars. separated.
260 */
261 struct proc_dir_entry *entry; /* proc file */
262 struct pktgen_thread *pg_thread;/* the owner */
263 struct list_head list; /* chaining in the thread's run-queue */
264 struct rcu_head rcu; /* freed by RCU */
265
266 int running; /* if false, the test will stop */
267
268 /* If min != max, then we will either do a linear iteration, or
269 * we will do a random selection from within the range.
270 */
271 __u32 flags;
272 int xmit_mode;
273 int min_pkt_size;
274 int max_pkt_size;
275 int pkt_overhead; /* overhead for MPLS, VLANs, IPSEC etc */
276 int nfrags;
277 int removal_mark; /* non-zero => the device is marked for
278 * removal by worker thread */
279
280 struct page *page;
281 u64 delay; /* nano-seconds */
282
283 __u64 count; /* Default No packets to send */
284 __u64 sofar; /* How many pkts we've sent so far */
285 __u64 tx_bytes; /* How many bytes we've transmitted */
286 __u64 errors; /* Errors when trying to transmit, */
287
288 /* runtime counters relating to clone_skb */
289
290 __u32 clone_count;
291 int last_ok; /* Was last skb sent?
292 * Or a failed transmit of some sort?
293 * This will keep sequence numbers in order
294 */
295 ktime_t next_tx;
296 ktime_t started_at;
297 ktime_t stopped_at;
298 u64 idle_acc; /* nano-seconds */
299
300 __u32 seq_num;
301
302 int clone_skb; /*
303 * Use multiple SKBs during packet gen.
304 * If this number is greater than 1, then
305 * that many copies of the same packet will be
306 * sent before a new packet is allocated.
307 * If you want to send 1024 identical packets
308 * before creating a new packet,
309 * set clone_skb to 1024.
310 */
311
312 char dst_min[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
313 char dst_max[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
314 char src_min[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
315 char src_max[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
316
317 struct in6_addr in6_saddr;
318 struct in6_addr in6_daddr;
319 struct in6_addr cur_in6_daddr;
320 struct in6_addr cur_in6_saddr;
321 /* For ranges */
322 struct in6_addr min_in6_daddr;
323 struct in6_addr max_in6_daddr;
324 struct in6_addr min_in6_saddr;
325 struct in6_addr max_in6_saddr;
326
327 /* If we're doing ranges, random or incremental, then this
328 * defines the min/max for those ranges.
329 */
330 __be32 saddr_min; /* inclusive, source IP address */
331 __be32 saddr_max; /* exclusive, source IP address */
332 __be32 daddr_min; /* inclusive, dest IP address */
333 __be32 daddr_max; /* exclusive, dest IP address */
334
335 __u16 udp_src_min; /* inclusive, source UDP port */
336 __u16 udp_src_max; /* exclusive, source UDP port */
337 __u16 udp_dst_min; /* inclusive, dest UDP port */
338 __u16 udp_dst_max; /* exclusive, dest UDP port */
339
340 /* DSCP + ECN */
341 __u8 tos; /* six MSB of (former) IPv4 TOS
342 are for dscp codepoint */
343 __u8 traffic_class; /* ditto for the (former) Traffic Class in IPv6
344 (see RFC 3260, sec. 4) */
345
346 /* MPLS */
347 unsigned int nr_labels; /* Depth of stack, 0 = no MPLS */
348 __be32 labels[MAX_MPLS_LABELS];
349
350 /* VLAN/SVLAN (802.1Q/Q-in-Q) */
351 __u8 vlan_p;
352 __u8 vlan_cfi;
353 __u16 vlan_id; /* 0xffff means no vlan tag */
354
355 __u8 svlan_p;
356 __u8 svlan_cfi;
357 __u16 svlan_id; /* 0xffff means no svlan tag */
358
359 __u32 src_mac_count; /* How many MACs to iterate through */
360 __u32 dst_mac_count; /* How many MACs to iterate through */
361
362 unsigned char dst_mac[ETH_ALEN];
363 unsigned char src_mac[ETH_ALEN];
364
365 __u32 cur_dst_mac_offset;
366 __u32 cur_src_mac_offset;
367 __be32 cur_saddr;
368 __be32 cur_daddr;
369 __u16 ip_id;
370 __u16 cur_udp_dst;
371 __u16 cur_udp_src;
372 __u16 cur_queue_map;
373 __u32 cur_pkt_size;
374 __u32 last_pkt_size;
375
376 __u8 hh[14];
377 /* = {
378 0x00, 0x80, 0xC8, 0x79, 0xB3, 0xCB,
379
380 We fill in SRC address later
381 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
382 0x08, 0x00
383 };
384 */
385 __u16 pad; /* pad out the hh struct to an even 16 bytes */
386
387 struct sk_buff *skb; /* skb we are to transmit next, used for when we
388 * are transmitting the same one multiple times
389 */
390 struct net_device *odev; /* The out-going device.
391 * Note that the device should have it's
392 * pg_info pointer pointing back to this
393 * device.
394 * Set when the user specifies the out-going
395 * device name (not when the inject is
396 * started as it used to do.)
397 */
398 char odevname[32];
399 struct flow_state *flows;
400 unsigned int cflows; /* Concurrent flows (config) */
401 unsigned int lflow; /* Flow length (config) */
402 unsigned int nflows; /* accumulated flows (stats) */
403 unsigned int curfl; /* current sequenced flow (state)*/
404
405 u16 queue_map_min;
406 u16 queue_map_max;
407 __u32 skb_priority; /* skb priority field */
408 unsigned int burst; /* number of duplicated packets to burst */
409 int node; /* Memory node */
410
411#ifdef CONFIG_XFRM
412 __u8 ipsmode; /* IPSEC mode (config) */
413 __u8 ipsproto; /* IPSEC type (config) */
414 __u32 spi;
415 struct xfrm_dst xdst;
416 struct dst_ops dstops;
417#endif
418 char result[512];
419};
420
421struct pktgen_hdr {
422 __be32 pgh_magic;
423 __be32 seq_num;
424 __be32 tv_sec;
425 __be32 tv_usec;
426};
427
428
429static unsigned int pg_net_id __read_mostly;
430
431struct pktgen_net {
432 struct net *net;
433 struct proc_dir_entry *proc_dir;
434 struct list_head pktgen_threads;
435 bool pktgen_exiting;
436};
437
438struct pktgen_thread {
439 struct mutex if_lock; /* for list of devices */
440 struct list_head if_list; /* All device here */
441 struct list_head th_list;
442 struct task_struct *tsk;
443 char result[512];
444
445 /* Field for thread to receive "posted" events terminate,
446 stop ifs etc. */
447
448 u32 control;
449 int cpu;
450
451 wait_queue_head_t queue;
452 struct completion start_done;
453 struct pktgen_net *net;
454};
455
456#define REMOVE 1
457#define FIND 0
458
459static const char version[] =
460 "Packet Generator for packet performance testing. "
461 "Version: " VERSION "\n";
462
463static int pktgen_remove_device(struct pktgen_thread *t, struct pktgen_dev *i);
464static int pktgen_add_device(struct pktgen_thread *t, const char *ifname);
465static struct pktgen_dev *pktgen_find_dev(struct pktgen_thread *t,
466 const char *ifname, bool exact);
467static int pktgen_device_event(struct notifier_block *, unsigned long, void *);
468static void pktgen_run_all_threads(struct pktgen_net *pn);
469static void pktgen_reset_all_threads(struct pktgen_net *pn);
470static void pktgen_stop_all_threads(struct pktgen_net *pn);
471
472static void pktgen_stop(struct pktgen_thread *t);
473static void pktgen_clear_counters(struct pktgen_dev *pkt_dev);
474
475/* Module parameters, defaults. */
476static int pg_count_d __read_mostly = 1000;
477static int pg_delay_d __read_mostly;
478static int pg_clone_skb_d __read_mostly;
479static int debug __read_mostly;
480
481static DEFINE_MUTEX(pktgen_thread_lock);
482
483static struct notifier_block pktgen_notifier_block = {
484 .notifier_call = pktgen_device_event,
485};
486
487/*
488 * /proc handling functions
489 *
490 */
491
492static int pgctrl_show(struct seq_file *seq, void *v)
493{
494 seq_puts(seq, version);
495 return 0;
496}
497
498static ssize_t pgctrl_write(struct file *file, const char __user *buf,
499 size_t count, loff_t *ppos)
500{
501 char data[128];
502 struct pktgen_net *pn = net_generic(current->nsproxy->net_ns, pg_net_id);
503
504 if (!capable(CAP_NET_ADMIN))
505 return -EPERM;
506
507 if (count == 0)
508 return -EINVAL;
509
510 if (count > sizeof(data))
511 count = sizeof(data);
512
513 if (copy_from_user(data, buf, count))
514 return -EFAULT;
515
516 data[count - 1] = 0; /* Strip trailing '\n' and terminate string */
517
518 if (!strcmp(data, "stop"))
519 pktgen_stop_all_threads(pn);
520 else if (!strcmp(data, "start"))
521 pktgen_run_all_threads(pn);
522 else if (!strcmp(data, "reset"))
523 pktgen_reset_all_threads(pn);
524 else
525 return -EINVAL;
526
527 return count;
528}
529
530static int pgctrl_open(struct inode *inode, struct file *file)
531{
532 return single_open(file, pgctrl_show, PDE_DATA(inode));
533}
534
535static const struct proc_ops pktgen_proc_ops = {
536 .proc_open = pgctrl_open,
537 .proc_read = seq_read,
538 .proc_lseek = seq_lseek,
539 .proc_write = pgctrl_write,
540 .proc_release = single_release,
541};
542
543static int pktgen_if_show(struct seq_file *seq, void *v)
544{
545 const struct pktgen_dev *pkt_dev = seq->private;
546 ktime_t stopped;
547 unsigned int i;
548 u64 idle;
549
550 seq_printf(seq,
551 "Params: count %llu min_pkt_size: %u max_pkt_size: %u\n",
552 (unsigned long long)pkt_dev->count, pkt_dev->min_pkt_size,
553 pkt_dev->max_pkt_size);
554
555 seq_printf(seq,
556 " frags: %d delay: %llu clone_skb: %d ifname: %s\n",
557 pkt_dev->nfrags, (unsigned long long) pkt_dev->delay,
558 pkt_dev->clone_skb, pkt_dev->odevname);
559
560 seq_printf(seq, " flows: %u flowlen: %u\n", pkt_dev->cflows,
561 pkt_dev->lflow);
562
563 seq_printf(seq,
564 " queue_map_min: %u queue_map_max: %u\n",
565 pkt_dev->queue_map_min,
566 pkt_dev->queue_map_max);
567
568 if (pkt_dev->skb_priority)
569 seq_printf(seq, " skb_priority: %u\n",
570 pkt_dev->skb_priority);
571
572 if (pkt_dev->flags & F_IPV6) {
573 seq_printf(seq,
574 " saddr: %pI6c min_saddr: %pI6c max_saddr: %pI6c\n"
575 " daddr: %pI6c min_daddr: %pI6c max_daddr: %pI6c\n",
576 &pkt_dev->in6_saddr,
577 &pkt_dev->min_in6_saddr, &pkt_dev->max_in6_saddr,
578 &pkt_dev->in6_daddr,
579 &pkt_dev->min_in6_daddr, &pkt_dev->max_in6_daddr);
580 } else {
581 seq_printf(seq,
582 " dst_min: %s dst_max: %s\n",
583 pkt_dev->dst_min, pkt_dev->dst_max);
584 seq_printf(seq,
585 " src_min: %s src_max: %s\n",
586 pkt_dev->src_min, pkt_dev->src_max);
587 }
588
589 seq_puts(seq, " src_mac: ");
590
591 seq_printf(seq, "%pM ",
592 is_zero_ether_addr(pkt_dev->src_mac) ?
593 pkt_dev->odev->dev_addr : pkt_dev->src_mac);
594
595 seq_puts(seq, "dst_mac: ");
596 seq_printf(seq, "%pM\n", pkt_dev->dst_mac);
597
598 seq_printf(seq,
599 " udp_src_min: %d udp_src_max: %d"
600 " udp_dst_min: %d udp_dst_max: %d\n",
601 pkt_dev->udp_src_min, pkt_dev->udp_src_max,
602 pkt_dev->udp_dst_min, pkt_dev->udp_dst_max);
603
604 seq_printf(seq,
605 " src_mac_count: %d dst_mac_count: %d\n",
606 pkt_dev->src_mac_count, pkt_dev->dst_mac_count);
607
608 if (pkt_dev->nr_labels) {
609 seq_puts(seq, " mpls: ");
610 for (i = 0; i < pkt_dev->nr_labels; i++)
611 seq_printf(seq, "%08x%s", ntohl(pkt_dev->labels[i]),
612 i == pkt_dev->nr_labels-1 ? "\n" : ", ");
613 }
614
615 if (pkt_dev->vlan_id != 0xffff)
616 seq_printf(seq, " vlan_id: %u vlan_p: %u vlan_cfi: %u\n",
617 pkt_dev->vlan_id, pkt_dev->vlan_p,
618 pkt_dev->vlan_cfi);
619
620 if (pkt_dev->svlan_id != 0xffff)
621 seq_printf(seq, " svlan_id: %u vlan_p: %u vlan_cfi: %u\n",
622 pkt_dev->svlan_id, pkt_dev->svlan_p,
623 pkt_dev->svlan_cfi);
624
625 if (pkt_dev->tos)
626 seq_printf(seq, " tos: 0x%02x\n", pkt_dev->tos);
627
628 if (pkt_dev->traffic_class)
629 seq_printf(seq, " traffic_class: 0x%02x\n", pkt_dev->traffic_class);
630
631 if (pkt_dev->burst > 1)
632 seq_printf(seq, " burst: %d\n", pkt_dev->burst);
633
634 if (pkt_dev->node >= 0)
635 seq_printf(seq, " node: %d\n", pkt_dev->node);
636
637 if (pkt_dev->xmit_mode == M_NETIF_RECEIVE)
638 seq_puts(seq, " xmit_mode: netif_receive\n");
639 else if (pkt_dev->xmit_mode == M_QUEUE_XMIT)
640 seq_puts(seq, " xmit_mode: xmit_queue\n");
641
642 seq_puts(seq, " Flags: ");
643
644 for (i = 0; i < NR_PKT_FLAGS; i++) {
645 if (i == F_FLOW_SEQ)
646 if (!pkt_dev->cflows)
647 continue;
648
649 if (pkt_dev->flags & (1 << i))
650 seq_printf(seq, "%s ", pkt_flag_names[i]);
651 else if (i == F_FLOW_SEQ)
652 seq_puts(seq, "FLOW_RND ");
653
654#ifdef CONFIG_XFRM
655 if (i == F_IPSEC && pkt_dev->spi)
656 seq_printf(seq, "spi:%u", pkt_dev->spi);
657#endif
658 }
659
660 seq_puts(seq, "\n");
661
662 /* not really stopped, more like last-running-at */
663 stopped = pkt_dev->running ? ktime_get() : pkt_dev->stopped_at;
664 idle = pkt_dev->idle_acc;
665 do_div(idle, NSEC_PER_USEC);
666
667 seq_printf(seq,
668 "Current:\n pkts-sofar: %llu errors: %llu\n",
669 (unsigned long long)pkt_dev->sofar,
670 (unsigned long long)pkt_dev->errors);
671
672 seq_printf(seq,
673 " started: %lluus stopped: %lluus idle: %lluus\n",
674 (unsigned long long) ktime_to_us(pkt_dev->started_at),
675 (unsigned long long) ktime_to_us(stopped),
676 (unsigned long long) idle);
677
678 seq_printf(seq,
679 " seq_num: %d cur_dst_mac_offset: %d cur_src_mac_offset: %d\n",
680 pkt_dev->seq_num, pkt_dev->cur_dst_mac_offset,
681 pkt_dev->cur_src_mac_offset);
682
683 if (pkt_dev->flags & F_IPV6) {
684 seq_printf(seq, " cur_saddr: %pI6c cur_daddr: %pI6c\n",
685 &pkt_dev->cur_in6_saddr,
686 &pkt_dev->cur_in6_daddr);
687 } else
688 seq_printf(seq, " cur_saddr: %pI4 cur_daddr: %pI4\n",
689 &pkt_dev->cur_saddr, &pkt_dev->cur_daddr);
690
691 seq_printf(seq, " cur_udp_dst: %d cur_udp_src: %d\n",
692 pkt_dev->cur_udp_dst, pkt_dev->cur_udp_src);
693
694 seq_printf(seq, " cur_queue_map: %u\n", pkt_dev->cur_queue_map);
695
696 seq_printf(seq, " flows: %u\n", pkt_dev->nflows);
697
698 if (pkt_dev->result[0])
699 seq_printf(seq, "Result: %s\n", pkt_dev->result);
700 else
701 seq_puts(seq, "Result: Idle\n");
702
703 return 0;
704}
705
706
707static int hex32_arg(const char __user *user_buffer, unsigned long maxlen,
708 __u32 *num)
709{
710 int i = 0;
711 *num = 0;
712
713 for (; i < maxlen; i++) {
714 int value;
715 char c;
716 *num <<= 4;
717 if (get_user(c, &user_buffer[i]))
718 return -EFAULT;
719 value = hex_to_bin(c);
720 if (value >= 0)
721 *num |= value;
722 else
723 break;
724 }
725 return i;
726}
727
728static int count_trail_chars(const char __user * user_buffer,
729 unsigned int maxlen)
730{
731 int i;
732
733 for (i = 0; i < maxlen; i++) {
734 char c;
735 if (get_user(c, &user_buffer[i]))
736 return -EFAULT;
737 switch (c) {
738 case '\"':
739 case '\n':
740 case '\r':
741 case '\t':
742 case ' ':
743 case '=':
744 break;
745 default:
746 goto done;
747 }
748 }
749done:
750 return i;
751}
752
753static long num_arg(const char __user *user_buffer, unsigned long maxlen,
754 unsigned long *num)
755{
756 int i;
757 *num = 0;
758
759 for (i = 0; i < maxlen; i++) {
760 char c;
761 if (get_user(c, &user_buffer[i]))
762 return -EFAULT;
763 if ((c >= '0') && (c <= '9')) {
764 *num *= 10;
765 *num += c - '0';
766 } else
767 break;
768 }
769 return i;
770}
771
772static int strn_len(const char __user * user_buffer, unsigned int maxlen)
773{
774 int i;
775
776 for (i = 0; i < maxlen; i++) {
777 char c;
778 if (get_user(c, &user_buffer[i]))
779 return -EFAULT;
780 switch (c) {
781 case '\"':
782 case '\n':
783 case '\r':
784 case '\t':
785 case ' ':
786 goto done_str;
787 default:
788 break;
789 }
790 }
791done_str:
792 return i;
793}
794
795static ssize_t get_labels(const char __user *buffer, struct pktgen_dev *pkt_dev)
796{
797 unsigned int n = 0;
798 char c;
799 ssize_t i = 0;
800 int len;
801
802 pkt_dev->nr_labels = 0;
803 do {
804 __u32 tmp;
805 len = hex32_arg(&buffer[i], 8, &tmp);
806 if (len <= 0)
807 return len;
808 pkt_dev->labels[n] = htonl(tmp);
809 if (pkt_dev->labels[n] & MPLS_STACK_BOTTOM)
810 pkt_dev->flags |= F_MPLS_RND;
811 i += len;
812 if (get_user(c, &buffer[i]))
813 return -EFAULT;
814 i++;
815 n++;
816 if (n >= MAX_MPLS_LABELS)
817 return -E2BIG;
818 } while (c == ',');
819
820 pkt_dev->nr_labels = n;
821 return i;
822}
823
824static __u32 pktgen_read_flag(const char *f, bool *disable)
825{
826 __u32 i;
827
828 if (f[0] == '!') {
829 *disable = true;
830 f++;
831 }
832
833 for (i = 0; i < NR_PKT_FLAGS; i++) {
834 if (!IS_ENABLED(CONFIG_XFRM) && i == IPSEC_SHIFT)
835 continue;
836
837 /* allow only disabling ipv6 flag */
838 if (!*disable && i == IPV6_SHIFT)
839 continue;
840
841 if (strcmp(f, pkt_flag_names[i]) == 0)
842 return 1 << i;
843 }
844
845 if (strcmp(f, "FLOW_RND") == 0) {
846 *disable = !*disable;
847 return F_FLOW_SEQ;
848 }
849
850 return 0;
851}
852
853static ssize_t pktgen_if_write(struct file *file,
854 const char __user * user_buffer, size_t count,
855 loff_t * offset)
856{
857 struct seq_file *seq = file->private_data;
858 struct pktgen_dev *pkt_dev = seq->private;
859 int i, max, len;
860 char name[16], valstr[32];
861 unsigned long value = 0;
862 char *pg_result = NULL;
863 int tmp = 0;
864 char buf[128];
865
866 pg_result = &(pkt_dev->result[0]);
867
868 if (count < 1) {
869 pr_warn("wrong command format\n");
870 return -EINVAL;
871 }
872
873 max = count;
874 tmp = count_trail_chars(user_buffer, max);
875 if (tmp < 0) {
876 pr_warn("illegal format\n");
877 return tmp;
878 }
879 i = tmp;
880
881 /* Read variable name */
882
883 len = strn_len(&user_buffer[i], sizeof(name) - 1);
884 if (len < 0)
885 return len;
886
887 memset(name, 0, sizeof(name));
888 if (copy_from_user(name, &user_buffer[i], len))
889 return -EFAULT;
890 i += len;
891
892 max = count - i;
893 len = count_trail_chars(&user_buffer[i], max);
894 if (len < 0)
895 return len;
896
897 i += len;
898
899 if (debug) {
900 size_t copy = min_t(size_t, count + 1, 1024);
901 char *tp = strndup_user(user_buffer, copy);
902
903 if (IS_ERR(tp))
904 return PTR_ERR(tp);
905
906 pr_debug("%s,%zu buffer -:%s:-\n", name, count, tp);
907 kfree(tp);
908 }
909
910 if (!strcmp(name, "min_pkt_size")) {
911 len = num_arg(&user_buffer[i], 10, &value);
912 if (len < 0)
913 return len;
914
915 i += len;
916 if (value < 14 + 20 + 8)
917 value = 14 + 20 + 8;
918 if (value != pkt_dev->min_pkt_size) {
919 pkt_dev->min_pkt_size = value;
920 pkt_dev->cur_pkt_size = value;
921 }
922 sprintf(pg_result, "OK: min_pkt_size=%d",
923 pkt_dev->min_pkt_size);
924 return count;
925 }
926
927 if (!strcmp(name, "max_pkt_size")) {
928 len = num_arg(&user_buffer[i], 10, &value);
929 if (len < 0)
930 return len;
931
932 i += len;
933 if (value < 14 + 20 + 8)
934 value = 14 + 20 + 8;
935 if (value != pkt_dev->max_pkt_size) {
936 pkt_dev->max_pkt_size = value;
937 pkt_dev->cur_pkt_size = value;
938 }
939 sprintf(pg_result, "OK: max_pkt_size=%d",
940 pkt_dev->max_pkt_size);
941 return count;
942 }
943
944 /* Shortcut for min = max */
945
946 if (!strcmp(name, "pkt_size")) {
947 len = num_arg(&user_buffer[i], 10, &value);
948 if (len < 0)
949 return len;
950
951 i += len;
952 if (value < 14 + 20 + 8)
953 value = 14 + 20 + 8;
954 if (value != pkt_dev->min_pkt_size) {
955 pkt_dev->min_pkt_size = value;
956 pkt_dev->max_pkt_size = value;
957 pkt_dev->cur_pkt_size = value;
958 }
959 sprintf(pg_result, "OK: pkt_size=%d", pkt_dev->min_pkt_size);
960 return count;
961 }
962
963 if (!strcmp(name, "debug")) {
964 len = num_arg(&user_buffer[i], 10, &value);
965 if (len < 0)
966 return len;
967
968 i += len;
969 debug = value;
970 sprintf(pg_result, "OK: debug=%u", debug);
971 return count;
972 }
973
974 if (!strcmp(name, "frags")) {
975 len = num_arg(&user_buffer[i], 10, &value);
976 if (len < 0)
977 return len;
978
979 i += len;
980 pkt_dev->nfrags = value;
981 sprintf(pg_result, "OK: frags=%d", pkt_dev->nfrags);
982 return count;
983 }
984 if (!strcmp(name, "delay")) {
985 len = num_arg(&user_buffer[i], 10, &value);
986 if (len < 0)
987 return len;
988
989 i += len;
990 if (value == 0x7FFFFFFF)
991 pkt_dev->delay = ULLONG_MAX;
992 else
993 pkt_dev->delay = (u64)value;
994
995 sprintf(pg_result, "OK: delay=%llu",
996 (unsigned long long) pkt_dev->delay);
997 return count;
998 }
999 if (!strcmp(name, "rate")) {
1000 len = num_arg(&user_buffer[i], 10, &value);
1001 if (len < 0)
1002 return len;
1003
1004 i += len;
1005 if (!value)
1006 return len;
1007 pkt_dev->delay = pkt_dev->min_pkt_size*8*NSEC_PER_USEC/value;
1008 if (debug)
1009 pr_info("Delay set at: %llu ns\n", pkt_dev->delay);
1010
1011 sprintf(pg_result, "OK: rate=%lu", value);
1012 return count;
1013 }
1014 if (!strcmp(name, "ratep")) {
1015 len = num_arg(&user_buffer[i], 10, &value);
1016 if (len < 0)
1017 return len;
1018
1019 i += len;
1020 if (!value)
1021 return len;
1022 pkt_dev->delay = NSEC_PER_SEC/value;
1023 if (debug)
1024 pr_info("Delay set at: %llu ns\n", pkt_dev->delay);
1025
1026 sprintf(pg_result, "OK: rate=%lu", value);
1027 return count;
1028 }
1029 if (!strcmp(name, "udp_src_min")) {
1030 len = num_arg(&user_buffer[i], 10, &value);
1031 if (len < 0)
1032 return len;
1033
1034 i += len;
1035 if (value != pkt_dev->udp_src_min) {
1036 pkt_dev->udp_src_min = value;
1037 pkt_dev->cur_udp_src = value;
1038 }
1039 sprintf(pg_result, "OK: udp_src_min=%u", pkt_dev->udp_src_min);
1040 return count;
1041 }
1042 if (!strcmp(name, "udp_dst_min")) {
1043 len = num_arg(&user_buffer[i], 10, &value);
1044 if (len < 0)
1045 return len;
1046
1047 i += len;
1048 if (value != pkt_dev->udp_dst_min) {
1049 pkt_dev->udp_dst_min = value;
1050 pkt_dev->cur_udp_dst = value;
1051 }
1052 sprintf(pg_result, "OK: udp_dst_min=%u", pkt_dev->udp_dst_min);
1053 return count;
1054 }
1055 if (!strcmp(name, "udp_src_max")) {
1056 len = num_arg(&user_buffer[i], 10, &value);
1057 if (len < 0)
1058 return len;
1059
1060 i += len;
1061 if (value != pkt_dev->udp_src_max) {
1062 pkt_dev->udp_src_max = value;
1063 pkt_dev->cur_udp_src = value;
1064 }
1065 sprintf(pg_result, "OK: udp_src_max=%u", pkt_dev->udp_src_max);
1066 return count;
1067 }
1068 if (!strcmp(name, "udp_dst_max")) {
1069 len = num_arg(&user_buffer[i], 10, &value);
1070 if (len < 0)
1071 return len;
1072
1073 i += len;
1074 if (value != pkt_dev->udp_dst_max) {
1075 pkt_dev->udp_dst_max = value;
1076 pkt_dev->cur_udp_dst = value;
1077 }
1078 sprintf(pg_result, "OK: udp_dst_max=%u", pkt_dev->udp_dst_max);
1079 return count;
1080 }
1081 if (!strcmp(name, "clone_skb")) {
1082 len = num_arg(&user_buffer[i], 10, &value);
1083 if (len < 0)
1084 return len;
1085 if ((value > 0) &&
1086 ((pkt_dev->xmit_mode == M_NETIF_RECEIVE) ||
1087 !(pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)))
1088 return -ENOTSUPP;
1089 i += len;
1090 pkt_dev->clone_skb = value;
1091
1092 sprintf(pg_result, "OK: clone_skb=%d", pkt_dev->clone_skb);
1093 return count;
1094 }
1095 if (!strcmp(name, "count")) {
1096 len = num_arg(&user_buffer[i], 10, &value);
1097 if (len < 0)
1098 return len;
1099
1100 i += len;
1101 pkt_dev->count = value;
1102 sprintf(pg_result, "OK: count=%llu",
1103 (unsigned long long)pkt_dev->count);
1104 return count;
1105 }
1106 if (!strcmp(name, "src_mac_count")) {
1107 len = num_arg(&user_buffer[i], 10, &value);
1108 if (len < 0)
1109 return len;
1110
1111 i += len;
1112 if (pkt_dev->src_mac_count != value) {
1113 pkt_dev->src_mac_count = value;
1114 pkt_dev->cur_src_mac_offset = 0;
1115 }
1116 sprintf(pg_result, "OK: src_mac_count=%d",
1117 pkt_dev->src_mac_count);
1118 return count;
1119 }
1120 if (!strcmp(name, "dst_mac_count")) {
1121 len = num_arg(&user_buffer[i], 10, &value);
1122 if (len < 0)
1123 return len;
1124
1125 i += len;
1126 if (pkt_dev->dst_mac_count != value) {
1127 pkt_dev->dst_mac_count = value;
1128 pkt_dev->cur_dst_mac_offset = 0;
1129 }
1130 sprintf(pg_result, "OK: dst_mac_count=%d",
1131 pkt_dev->dst_mac_count);
1132 return count;
1133 }
1134 if (!strcmp(name, "burst")) {
1135 len = num_arg(&user_buffer[i], 10, &value);
1136 if (len < 0)
1137 return len;
1138
1139 i += len;
1140 if ((value > 1) &&
1141 ((pkt_dev->xmit_mode == M_QUEUE_XMIT) ||
1142 ((pkt_dev->xmit_mode == M_START_XMIT) &&
1143 (!(pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)))))
1144 return -ENOTSUPP;
1145 pkt_dev->burst = value < 1 ? 1 : value;
1146 sprintf(pg_result, "OK: burst=%u", pkt_dev->burst);
1147 return count;
1148 }
1149 if (!strcmp(name, "node")) {
1150 len = num_arg(&user_buffer[i], 10, &value);
1151 if (len < 0)
1152 return len;
1153
1154 i += len;
1155
1156 if (node_possible(value)) {
1157 pkt_dev->node = value;
1158 sprintf(pg_result, "OK: node=%d", pkt_dev->node);
1159 if (pkt_dev->page) {
1160 put_page(pkt_dev->page);
1161 pkt_dev->page = NULL;
1162 }
1163 }
1164 else
1165 sprintf(pg_result, "ERROR: node not possible");
1166 return count;
1167 }
1168 if (!strcmp(name, "xmit_mode")) {
1169 char f[32];
1170
1171 memset(f, 0, 32);
1172 len = strn_len(&user_buffer[i], sizeof(f) - 1);
1173 if (len < 0)
1174 return len;
1175
1176 if (copy_from_user(f, &user_buffer[i], len))
1177 return -EFAULT;
1178 i += len;
1179
1180 if (strcmp(f, "start_xmit") == 0) {
1181 pkt_dev->xmit_mode = M_START_XMIT;
1182 } else if (strcmp(f, "netif_receive") == 0) {
1183 /* clone_skb set earlier, not supported in this mode */
1184 if (pkt_dev->clone_skb > 0)
1185 return -ENOTSUPP;
1186
1187 pkt_dev->xmit_mode = M_NETIF_RECEIVE;
1188
1189 /* make sure new packet is allocated every time
1190 * pktgen_xmit() is called
1191 */
1192 pkt_dev->last_ok = 1;
1193
1194 /* override clone_skb if user passed default value
1195 * at module loading time
1196 */
1197 pkt_dev->clone_skb = 0;
1198 } else if (strcmp(f, "queue_xmit") == 0) {
1199 pkt_dev->xmit_mode = M_QUEUE_XMIT;
1200 pkt_dev->last_ok = 1;
1201 } else {
1202 sprintf(pg_result,
1203 "xmit_mode -:%s:- unknown\nAvailable modes: %s",
1204 f, "start_xmit, netif_receive\n");
1205 return count;
1206 }
1207 sprintf(pg_result, "OK: xmit_mode=%s", f);
1208 return count;
1209 }
1210 if (!strcmp(name, "flag")) {
1211 __u32 flag;
1212 char f[32];
1213 bool disable = false;
1214
1215 memset(f, 0, 32);
1216 len = strn_len(&user_buffer[i], sizeof(f) - 1);
1217 if (len < 0)
1218 return len;
1219
1220 if (copy_from_user(f, &user_buffer[i], len))
1221 return -EFAULT;
1222 i += len;
1223
1224 flag = pktgen_read_flag(f, &disable);
1225
1226 if (flag) {
1227 if (disable)
1228 pkt_dev->flags &= ~flag;
1229 else
1230 pkt_dev->flags |= flag;
1231 } else {
1232 sprintf(pg_result,
1233 "Flag -:%s:- unknown\nAvailable flags, (prepend ! to un-set flag):\n%s",
1234 f,
1235 "IPSRC_RND, IPDST_RND, UDPSRC_RND, UDPDST_RND, "
1236 "MACSRC_RND, MACDST_RND, TXSIZE_RND, IPV6, "
1237 "MPLS_RND, VID_RND, SVID_RND, FLOW_SEQ, "
1238 "QUEUE_MAP_RND, QUEUE_MAP_CPU, UDPCSUM, "
1239 "NO_TIMESTAMP, "
1240#ifdef CONFIG_XFRM
1241 "IPSEC, "
1242#endif
1243 "NODE_ALLOC\n");
1244 return count;
1245 }
1246 sprintf(pg_result, "OK: flags=0x%x", pkt_dev->flags);
1247 return count;
1248 }
1249 if (!strcmp(name, "dst_min") || !strcmp(name, "dst")) {
1250 len = strn_len(&user_buffer[i], sizeof(pkt_dev->dst_min) - 1);
1251 if (len < 0)
1252 return len;
1253
1254 if (copy_from_user(buf, &user_buffer[i], len))
1255 return -EFAULT;
1256 buf[len] = 0;
1257 if (strcmp(buf, pkt_dev->dst_min) != 0) {
1258 memset(pkt_dev->dst_min, 0, sizeof(pkt_dev->dst_min));
1259 strcpy(pkt_dev->dst_min, buf);
1260 pkt_dev->daddr_min = in_aton(pkt_dev->dst_min);
1261 pkt_dev->cur_daddr = pkt_dev->daddr_min;
1262 }
1263 if (debug)
1264 pr_debug("dst_min set to: %s\n", pkt_dev->dst_min);
1265 i += len;
1266 sprintf(pg_result, "OK: dst_min=%s", pkt_dev->dst_min);
1267 return count;
1268 }
1269 if (!strcmp(name, "dst_max")) {
1270 len = strn_len(&user_buffer[i], sizeof(pkt_dev->dst_max) - 1);
1271 if (len < 0)
1272 return len;
1273
1274 if (copy_from_user(buf, &user_buffer[i], len))
1275 return -EFAULT;
1276 buf[len] = 0;
1277 if (strcmp(buf, pkt_dev->dst_max) != 0) {
1278 memset(pkt_dev->dst_max, 0, sizeof(pkt_dev->dst_max));
1279 strcpy(pkt_dev->dst_max, buf);
1280 pkt_dev->daddr_max = in_aton(pkt_dev->dst_max);
1281 pkt_dev->cur_daddr = pkt_dev->daddr_max;
1282 }
1283 if (debug)
1284 pr_debug("dst_max set to: %s\n", pkt_dev->dst_max);
1285 i += len;
1286 sprintf(pg_result, "OK: dst_max=%s", pkt_dev->dst_max);
1287 return count;
1288 }
1289 if (!strcmp(name, "dst6")) {
1290 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
1291 if (len < 0)
1292 return len;
1293
1294 pkt_dev->flags |= F_IPV6;
1295
1296 if (copy_from_user(buf, &user_buffer[i], len))
1297 return -EFAULT;
1298 buf[len] = 0;
1299
1300 in6_pton(buf, -1, pkt_dev->in6_daddr.s6_addr, -1, NULL);
1301 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->in6_daddr);
1302
1303 pkt_dev->cur_in6_daddr = pkt_dev->in6_daddr;
1304
1305 if (debug)
1306 pr_debug("dst6 set to: %s\n", buf);
1307
1308 i += len;
1309 sprintf(pg_result, "OK: dst6=%s", buf);
1310 return count;
1311 }
1312 if (!strcmp(name, "dst6_min")) {
1313 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
1314 if (len < 0)
1315 return len;
1316
1317 pkt_dev->flags |= F_IPV6;
1318
1319 if (copy_from_user(buf, &user_buffer[i], len))
1320 return -EFAULT;
1321 buf[len] = 0;
1322
1323 in6_pton(buf, -1, pkt_dev->min_in6_daddr.s6_addr, -1, NULL);
1324 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->min_in6_daddr);
1325
1326 pkt_dev->cur_in6_daddr = pkt_dev->min_in6_daddr;
1327 if (debug)
1328 pr_debug("dst6_min set to: %s\n", buf);
1329
1330 i += len;
1331 sprintf(pg_result, "OK: dst6_min=%s", buf);
1332 return count;
1333 }
1334 if (!strcmp(name, "dst6_max")) {
1335 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
1336 if (len < 0)
1337 return len;
1338
1339 pkt_dev->flags |= F_IPV6;
1340
1341 if (copy_from_user(buf, &user_buffer[i], len))
1342 return -EFAULT;
1343 buf[len] = 0;
1344
1345 in6_pton(buf, -1, pkt_dev->max_in6_daddr.s6_addr, -1, NULL);
1346 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->max_in6_daddr);
1347
1348 if (debug)
1349 pr_debug("dst6_max set to: %s\n", buf);
1350
1351 i += len;
1352 sprintf(pg_result, "OK: dst6_max=%s", buf);
1353 return count;
1354 }
1355 if (!strcmp(name, "src6")) {
1356 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
1357 if (len < 0)
1358 return len;
1359
1360 pkt_dev->flags |= F_IPV6;
1361
1362 if (copy_from_user(buf, &user_buffer[i], len))
1363 return -EFAULT;
1364 buf[len] = 0;
1365
1366 in6_pton(buf, -1, pkt_dev->in6_saddr.s6_addr, -1, NULL);
1367 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->in6_saddr);
1368
1369 pkt_dev->cur_in6_saddr = pkt_dev->in6_saddr;
1370
1371 if (debug)
1372 pr_debug("src6 set to: %s\n", buf);
1373
1374 i += len;
1375 sprintf(pg_result, "OK: src6=%s", buf);
1376 return count;
1377 }
1378 if (!strcmp(name, "src_min")) {
1379 len = strn_len(&user_buffer[i], sizeof(pkt_dev->src_min) - 1);
1380 if (len < 0)
1381 return len;
1382
1383 if (copy_from_user(buf, &user_buffer[i], len))
1384 return -EFAULT;
1385 buf[len] = 0;
1386 if (strcmp(buf, pkt_dev->src_min) != 0) {
1387 memset(pkt_dev->src_min, 0, sizeof(pkt_dev->src_min));
1388 strcpy(pkt_dev->src_min, buf);
1389 pkt_dev->saddr_min = in_aton(pkt_dev->src_min);
1390 pkt_dev->cur_saddr = pkt_dev->saddr_min;
1391 }
1392 if (debug)
1393 pr_debug("src_min set to: %s\n", pkt_dev->src_min);
1394 i += len;
1395 sprintf(pg_result, "OK: src_min=%s", pkt_dev->src_min);
1396 return count;
1397 }
1398 if (!strcmp(name, "src_max")) {
1399 len = strn_len(&user_buffer[i], sizeof(pkt_dev->src_max) - 1);
1400 if (len < 0)
1401 return len;
1402
1403 if (copy_from_user(buf, &user_buffer[i], len))
1404 return -EFAULT;
1405 buf[len] = 0;
1406 if (strcmp(buf, pkt_dev->src_max) != 0) {
1407 memset(pkt_dev->src_max, 0, sizeof(pkt_dev->src_max));
1408 strcpy(pkt_dev->src_max, buf);
1409 pkt_dev->saddr_max = in_aton(pkt_dev->src_max);
1410 pkt_dev->cur_saddr = pkt_dev->saddr_max;
1411 }
1412 if (debug)
1413 pr_debug("src_max set to: %s\n", pkt_dev->src_max);
1414 i += len;
1415 sprintf(pg_result, "OK: src_max=%s", pkt_dev->src_max);
1416 return count;
1417 }
1418 if (!strcmp(name, "dst_mac")) {
1419 len = strn_len(&user_buffer[i], sizeof(valstr) - 1);
1420 if (len < 0)
1421 return len;
1422
1423 memset(valstr, 0, sizeof(valstr));
1424 if (copy_from_user(valstr, &user_buffer[i], len))
1425 return -EFAULT;
1426
1427 if (!mac_pton(valstr, pkt_dev->dst_mac))
1428 return -EINVAL;
1429 /* Set up Dest MAC */
1430 ether_addr_copy(&pkt_dev->hh[0], pkt_dev->dst_mac);
1431
1432 sprintf(pg_result, "OK: dstmac %pM", pkt_dev->dst_mac);
1433 return count;
1434 }
1435 if (!strcmp(name, "src_mac")) {
1436 len = strn_len(&user_buffer[i], sizeof(valstr) - 1);
1437 if (len < 0)
1438 return len;
1439
1440 memset(valstr, 0, sizeof(valstr));
1441 if (copy_from_user(valstr, &user_buffer[i], len))
1442 return -EFAULT;
1443
1444 if (!mac_pton(valstr, pkt_dev->src_mac))
1445 return -EINVAL;
1446 /* Set up Src MAC */
1447 ether_addr_copy(&pkt_dev->hh[6], pkt_dev->src_mac);
1448
1449 sprintf(pg_result, "OK: srcmac %pM", pkt_dev->src_mac);
1450 return count;
1451 }
1452
1453 if (!strcmp(name, "clear_counters")) {
1454 pktgen_clear_counters(pkt_dev);
1455 sprintf(pg_result, "OK: Clearing counters.\n");
1456 return count;
1457 }
1458
1459 if (!strcmp(name, "flows")) {
1460 len = num_arg(&user_buffer[i], 10, &value);
1461 if (len < 0)
1462 return len;
1463
1464 i += len;
1465 if (value > MAX_CFLOWS)
1466 value = MAX_CFLOWS;
1467
1468 pkt_dev->cflows = value;
1469 sprintf(pg_result, "OK: flows=%u", pkt_dev->cflows);
1470 return count;
1471 }
1472#ifdef CONFIG_XFRM
1473 if (!strcmp(name, "spi")) {
1474 len = num_arg(&user_buffer[i], 10, &value);
1475 if (len < 0)
1476 return len;
1477
1478 i += len;
1479 pkt_dev->spi = value;
1480 sprintf(pg_result, "OK: spi=%u", pkt_dev->spi);
1481 return count;
1482 }
1483#endif
1484 if (!strcmp(name, "flowlen")) {
1485 len = num_arg(&user_buffer[i], 10, &value);
1486 if (len < 0)
1487 return len;
1488
1489 i += len;
1490 pkt_dev->lflow = value;
1491 sprintf(pg_result, "OK: flowlen=%u", pkt_dev->lflow);
1492 return count;
1493 }
1494
1495 if (!strcmp(name, "queue_map_min")) {
1496 len = num_arg(&user_buffer[i], 5, &value);
1497 if (len < 0)
1498 return len;
1499
1500 i += len;
1501 pkt_dev->queue_map_min = value;
1502 sprintf(pg_result, "OK: queue_map_min=%u", pkt_dev->queue_map_min);
1503 return count;
1504 }
1505
1506 if (!strcmp(name, "queue_map_max")) {
1507 len = num_arg(&user_buffer[i], 5, &value);
1508 if (len < 0)
1509 return len;
1510
1511 i += len;
1512 pkt_dev->queue_map_max = value;
1513 sprintf(pg_result, "OK: queue_map_max=%u", pkt_dev->queue_map_max);
1514 return count;
1515 }
1516
1517 if (!strcmp(name, "mpls")) {
1518 unsigned int n, cnt;
1519
1520 len = get_labels(&user_buffer[i], pkt_dev);
1521 if (len < 0)
1522 return len;
1523 i += len;
1524 cnt = sprintf(pg_result, "OK: mpls=");
1525 for (n = 0; n < pkt_dev->nr_labels; n++)
1526 cnt += sprintf(pg_result + cnt,
1527 "%08x%s", ntohl(pkt_dev->labels[n]),
1528 n == pkt_dev->nr_labels-1 ? "" : ",");
1529
1530 if (pkt_dev->nr_labels && pkt_dev->vlan_id != 0xffff) {
1531 pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
1532 pkt_dev->svlan_id = 0xffff;
1533
1534 if (debug)
1535 pr_debug("VLAN/SVLAN auto turned off\n");
1536 }
1537 return count;
1538 }
1539
1540 if (!strcmp(name, "vlan_id")) {
1541 len = num_arg(&user_buffer[i], 4, &value);
1542 if (len < 0)
1543 return len;
1544
1545 i += len;
1546 if (value <= 4095) {
1547 pkt_dev->vlan_id = value; /* turn on VLAN */
1548
1549 if (debug)
1550 pr_debug("VLAN turned on\n");
1551
1552 if (debug && pkt_dev->nr_labels)
1553 pr_debug("MPLS auto turned off\n");
1554
1555 pkt_dev->nr_labels = 0; /* turn off MPLS */
1556 sprintf(pg_result, "OK: vlan_id=%u", pkt_dev->vlan_id);
1557 } else {
1558 pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
1559 pkt_dev->svlan_id = 0xffff;
1560
1561 if (debug)
1562 pr_debug("VLAN/SVLAN turned off\n");
1563 }
1564 return count;
1565 }
1566
1567 if (!strcmp(name, "vlan_p")) {
1568 len = num_arg(&user_buffer[i], 1, &value);
1569 if (len < 0)
1570 return len;
1571
1572 i += len;
1573 if ((value <= 7) && (pkt_dev->vlan_id != 0xffff)) {
1574 pkt_dev->vlan_p = value;
1575 sprintf(pg_result, "OK: vlan_p=%u", pkt_dev->vlan_p);
1576 } else {
1577 sprintf(pg_result, "ERROR: vlan_p must be 0-7");
1578 }
1579 return count;
1580 }
1581
1582 if (!strcmp(name, "vlan_cfi")) {
1583 len = num_arg(&user_buffer[i], 1, &value);
1584 if (len < 0)
1585 return len;
1586
1587 i += len;
1588 if ((value <= 1) && (pkt_dev->vlan_id != 0xffff)) {
1589 pkt_dev->vlan_cfi = value;
1590 sprintf(pg_result, "OK: vlan_cfi=%u", pkt_dev->vlan_cfi);
1591 } else {
1592 sprintf(pg_result, "ERROR: vlan_cfi must be 0-1");
1593 }
1594 return count;
1595 }
1596
1597 if (!strcmp(name, "svlan_id")) {
1598 len = num_arg(&user_buffer[i], 4, &value);
1599 if (len < 0)
1600 return len;
1601
1602 i += len;
1603 if ((value <= 4095) && ((pkt_dev->vlan_id != 0xffff))) {
1604 pkt_dev->svlan_id = value; /* turn on SVLAN */
1605
1606 if (debug)
1607 pr_debug("SVLAN turned on\n");
1608
1609 if (debug && pkt_dev->nr_labels)
1610 pr_debug("MPLS auto turned off\n");
1611
1612 pkt_dev->nr_labels = 0; /* turn off MPLS */
1613 sprintf(pg_result, "OK: svlan_id=%u", pkt_dev->svlan_id);
1614 } else {
1615 pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
1616 pkt_dev->svlan_id = 0xffff;
1617
1618 if (debug)
1619 pr_debug("VLAN/SVLAN turned off\n");
1620 }
1621 return count;
1622 }
1623
1624 if (!strcmp(name, "svlan_p")) {
1625 len = num_arg(&user_buffer[i], 1, &value);
1626 if (len < 0)
1627 return len;
1628
1629 i += len;
1630 if ((value <= 7) && (pkt_dev->svlan_id != 0xffff)) {
1631 pkt_dev->svlan_p = value;
1632 sprintf(pg_result, "OK: svlan_p=%u", pkt_dev->svlan_p);
1633 } else {
1634 sprintf(pg_result, "ERROR: svlan_p must be 0-7");
1635 }
1636 return count;
1637 }
1638
1639 if (!strcmp(name, "svlan_cfi")) {
1640 len = num_arg(&user_buffer[i], 1, &value);
1641 if (len < 0)
1642 return len;
1643
1644 i += len;
1645 if ((value <= 1) && (pkt_dev->svlan_id != 0xffff)) {
1646 pkt_dev->svlan_cfi = value;
1647 sprintf(pg_result, "OK: svlan_cfi=%u", pkt_dev->svlan_cfi);
1648 } else {
1649 sprintf(pg_result, "ERROR: svlan_cfi must be 0-1");
1650 }
1651 return count;
1652 }
1653
1654 if (!strcmp(name, "tos")) {
1655 __u32 tmp_value = 0;
1656 len = hex32_arg(&user_buffer[i], 2, &tmp_value);
1657 if (len < 0)
1658 return len;
1659
1660 i += len;
1661 if (len == 2) {
1662 pkt_dev->tos = tmp_value;
1663 sprintf(pg_result, "OK: tos=0x%02x", pkt_dev->tos);
1664 } else {
1665 sprintf(pg_result, "ERROR: tos must be 00-ff");
1666 }
1667 return count;
1668 }
1669
1670 if (!strcmp(name, "traffic_class")) {
1671 __u32 tmp_value = 0;
1672 len = hex32_arg(&user_buffer[i], 2, &tmp_value);
1673 if (len < 0)
1674 return len;
1675
1676 i += len;
1677 if (len == 2) {
1678 pkt_dev->traffic_class = tmp_value;
1679 sprintf(pg_result, "OK: traffic_class=0x%02x", pkt_dev->traffic_class);
1680 } else {
1681 sprintf(pg_result, "ERROR: traffic_class must be 00-ff");
1682 }
1683 return count;
1684 }
1685
1686 if (!strcmp(name, "skb_priority")) {
1687 len = num_arg(&user_buffer[i], 9, &value);
1688 if (len < 0)
1689 return len;
1690
1691 i += len;
1692 pkt_dev->skb_priority = value;
1693 sprintf(pg_result, "OK: skb_priority=%i",
1694 pkt_dev->skb_priority);
1695 return count;
1696 }
1697
1698 sprintf(pkt_dev->result, "No such parameter \"%s\"", name);
1699 return -EINVAL;
1700}
1701
1702static int pktgen_if_open(struct inode *inode, struct file *file)
1703{
1704 return single_open(file, pktgen_if_show, PDE_DATA(inode));
1705}
1706
1707static const struct proc_ops pktgen_if_proc_ops = {
1708 .proc_open = pktgen_if_open,
1709 .proc_read = seq_read,
1710 .proc_lseek = seq_lseek,
1711 .proc_write = pktgen_if_write,
1712 .proc_release = single_release,
1713};
1714
1715static int pktgen_thread_show(struct seq_file *seq, void *v)
1716{
1717 struct pktgen_thread *t = seq->private;
1718 const struct pktgen_dev *pkt_dev;
1719
1720 BUG_ON(!t);
1721
1722 seq_puts(seq, "Running: ");
1723
1724 rcu_read_lock();
1725 list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
1726 if (pkt_dev->running)
1727 seq_printf(seq, "%s ", pkt_dev->odevname);
1728
1729 seq_puts(seq, "\nStopped: ");
1730
1731 list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
1732 if (!pkt_dev->running)
1733 seq_printf(seq, "%s ", pkt_dev->odevname);
1734
1735 if (t->result[0])
1736 seq_printf(seq, "\nResult: %s\n", t->result);
1737 else
1738 seq_puts(seq, "\nResult: NA\n");
1739
1740 rcu_read_unlock();
1741
1742 return 0;
1743}
1744
1745static ssize_t pktgen_thread_write(struct file *file,
1746 const char __user * user_buffer,
1747 size_t count, loff_t * offset)
1748{
1749 struct seq_file *seq = file->private_data;
1750 struct pktgen_thread *t = seq->private;
1751 int i, max, len, ret;
1752 char name[40];
1753 char *pg_result;
1754
1755 if (count < 1) {
1756 // sprintf(pg_result, "Wrong command format");
1757 return -EINVAL;
1758 }
1759
1760 max = count;
1761 len = count_trail_chars(user_buffer, max);
1762 if (len < 0)
1763 return len;
1764
1765 i = len;
1766
1767 /* Read variable name */
1768
1769 len = strn_len(&user_buffer[i], sizeof(name) - 1);
1770 if (len < 0)
1771 return len;
1772
1773 memset(name, 0, sizeof(name));
1774 if (copy_from_user(name, &user_buffer[i], len))
1775 return -EFAULT;
1776 i += len;
1777
1778 max = count - i;
1779 len = count_trail_chars(&user_buffer[i], max);
1780 if (len < 0)
1781 return len;
1782
1783 i += len;
1784
1785 if (debug)
1786 pr_debug("t=%s, count=%lu\n", name, (unsigned long)count);
1787
1788 if (!t) {
1789 pr_err("ERROR: No thread\n");
1790 ret = -EINVAL;
1791 goto out;
1792 }
1793
1794 pg_result = &(t->result[0]);
1795
1796 if (!strcmp(name, "add_device")) {
1797 char f[32];
1798 memset(f, 0, 32);
1799 len = strn_len(&user_buffer[i], sizeof(f) - 1);
1800 if (len < 0) {
1801 ret = len;
1802 goto out;
1803 }
1804 if (copy_from_user(f, &user_buffer[i], len))
1805 return -EFAULT;
1806 i += len;
1807 mutex_lock(&pktgen_thread_lock);
1808 ret = pktgen_add_device(t, f);
1809 mutex_unlock(&pktgen_thread_lock);
1810 if (!ret) {
1811 ret = count;
1812 sprintf(pg_result, "OK: add_device=%s", f);
1813 } else
1814 sprintf(pg_result, "ERROR: can not add device %s", f);
1815 goto out;
1816 }
1817
1818 if (!strcmp(name, "rem_device_all")) {
1819 mutex_lock(&pktgen_thread_lock);
1820 t->control |= T_REMDEVALL;
1821 mutex_unlock(&pktgen_thread_lock);
1822 schedule_timeout_interruptible(msecs_to_jiffies(125)); /* Propagate thread->control */
1823 ret = count;
1824 sprintf(pg_result, "OK: rem_device_all");
1825 goto out;
1826 }
1827
1828 if (!strcmp(name, "max_before_softirq")) {
1829 sprintf(pg_result, "OK: Note! max_before_softirq is obsoleted -- Do not use");
1830 ret = count;
1831 goto out;
1832 }
1833
1834 ret = -EINVAL;
1835out:
1836 return ret;
1837}
1838
1839static int pktgen_thread_open(struct inode *inode, struct file *file)
1840{
1841 return single_open(file, pktgen_thread_show, PDE_DATA(inode));
1842}
1843
1844static const struct proc_ops pktgen_thread_proc_ops = {
1845 .proc_open = pktgen_thread_open,
1846 .proc_read = seq_read,
1847 .proc_lseek = seq_lseek,
1848 .proc_write = pktgen_thread_write,
1849 .proc_release = single_release,
1850};
1851
1852/* Think find or remove for NN */
1853static struct pktgen_dev *__pktgen_NN_threads(const struct pktgen_net *pn,
1854 const char *ifname, int remove)
1855{
1856 struct pktgen_thread *t;
1857 struct pktgen_dev *pkt_dev = NULL;
1858 bool exact = (remove == FIND);
1859
1860 list_for_each_entry(t, &pn->pktgen_threads, th_list) {
1861 pkt_dev = pktgen_find_dev(t, ifname, exact);
1862 if (pkt_dev) {
1863 if (remove) {
1864 pkt_dev->removal_mark = 1;
1865 t->control |= T_REMDEV;
1866 }
1867 break;
1868 }
1869 }
1870 return pkt_dev;
1871}
1872
1873/*
1874 * mark a device for removal
1875 */
1876static void pktgen_mark_device(const struct pktgen_net *pn, const char *ifname)
1877{
1878 struct pktgen_dev *pkt_dev = NULL;
1879 const int max_tries = 10, msec_per_try = 125;
1880 int i = 0;
1881
1882 mutex_lock(&pktgen_thread_lock);
1883 pr_debug("%s: marking %s for removal\n", __func__, ifname);
1884
1885 while (1) {
1886
1887 pkt_dev = __pktgen_NN_threads(pn, ifname, REMOVE);
1888 if (pkt_dev == NULL)
1889 break; /* success */
1890
1891 mutex_unlock(&pktgen_thread_lock);
1892 pr_debug("%s: waiting for %s to disappear....\n",
1893 __func__, ifname);
1894 schedule_timeout_interruptible(msecs_to_jiffies(msec_per_try));
1895 mutex_lock(&pktgen_thread_lock);
1896
1897 if (++i >= max_tries) {
1898 pr_err("%s: timed out after waiting %d msec for device %s to be removed\n",
1899 __func__, msec_per_try * i, ifname);
1900 break;
1901 }
1902
1903 }
1904
1905 mutex_unlock(&pktgen_thread_lock);
1906}
1907
1908static void pktgen_change_name(const struct pktgen_net *pn, struct net_device *dev)
1909{
1910 struct pktgen_thread *t;
1911
1912 mutex_lock(&pktgen_thread_lock);
1913
1914 list_for_each_entry(t, &pn->pktgen_threads, th_list) {
1915 struct pktgen_dev *pkt_dev;
1916
1917 if_lock(t);
1918 list_for_each_entry(pkt_dev, &t->if_list, list) {
1919 if (pkt_dev->odev != dev)
1920 continue;
1921
1922 proc_remove(pkt_dev->entry);
1923
1924 pkt_dev->entry = proc_create_data(dev->name, 0600,
1925 pn->proc_dir,
1926 &pktgen_if_proc_ops,
1927 pkt_dev);
1928 if (!pkt_dev->entry)
1929 pr_err("can't move proc entry for '%s'\n",
1930 dev->name);
1931 break;
1932 }
1933 if_unlock(t);
1934 }
1935 mutex_unlock(&pktgen_thread_lock);
1936}
1937
1938static int pktgen_device_event(struct notifier_block *unused,
1939 unsigned long event, void *ptr)
1940{
1941 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
1942 struct pktgen_net *pn = net_generic(dev_net(dev), pg_net_id);
1943
1944 if (pn->pktgen_exiting)
1945 return NOTIFY_DONE;
1946
1947 /* It is OK that we do not hold the group lock right now,
1948 * as we run under the RTNL lock.
1949 */
1950
1951 switch (event) {
1952 case NETDEV_CHANGENAME:
1953 pktgen_change_name(pn, dev);
1954 break;
1955
1956 case NETDEV_UNREGISTER:
1957 pktgen_mark_device(pn, dev->name);
1958 break;
1959 }
1960
1961 return NOTIFY_DONE;
1962}
1963
1964static struct net_device *pktgen_dev_get_by_name(const struct pktgen_net *pn,
1965 struct pktgen_dev *pkt_dev,
1966 const char *ifname)
1967{
1968 char b[IFNAMSIZ+5];
1969 int i;
1970
1971 for (i = 0; ifname[i] != '@'; i++) {
1972 if (i == IFNAMSIZ)
1973 break;
1974
1975 b[i] = ifname[i];
1976 }
1977 b[i] = 0;
1978
1979 return dev_get_by_name(pn->net, b);
1980}
1981
1982
1983/* Associate pktgen_dev with a device. */
1984
1985static int pktgen_setup_dev(const struct pktgen_net *pn,
1986 struct pktgen_dev *pkt_dev, const char *ifname)
1987{
1988 struct net_device *odev;
1989 int err;
1990
1991 /* Clean old setups */
1992 if (pkt_dev->odev) {
1993 dev_put(pkt_dev->odev);
1994 pkt_dev->odev = NULL;
1995 }
1996
1997 odev = pktgen_dev_get_by_name(pn, pkt_dev, ifname);
1998 if (!odev) {
1999 pr_err("no such netdevice: \"%s\"\n", ifname);
2000 return -ENODEV;
2001 }
2002
2003 if (odev->type != ARPHRD_ETHER && odev->type != ARPHRD_LOOPBACK) {
2004 pr_err("not an ethernet or loopback device: \"%s\"\n", ifname);
2005 err = -EINVAL;
2006 } else if (!netif_running(odev)) {
2007 pr_err("device is down: \"%s\"\n", ifname);
2008 err = -ENETDOWN;
2009 } else {
2010 pkt_dev->odev = odev;
2011 return 0;
2012 }
2013
2014 dev_put(odev);
2015 return err;
2016}
2017
2018/* Read pkt_dev from the interface and set up internal pktgen_dev
2019 * structure to have the right information to create/send packets
2020 */
2021static void pktgen_setup_inject(struct pktgen_dev *pkt_dev)
2022{
2023 int ntxq;
2024
2025 if (!pkt_dev->odev) {
2026 pr_err("ERROR: pkt_dev->odev == NULL in setup_inject\n");
2027 sprintf(pkt_dev->result,
2028 "ERROR: pkt_dev->odev == NULL in setup_inject.\n");
2029 return;
2030 }
2031
2032 /* make sure that we don't pick a non-existing transmit queue */
2033 ntxq = pkt_dev->odev->real_num_tx_queues;
2034
2035 if (ntxq <= pkt_dev->queue_map_min) {
2036 pr_warn("WARNING: Requested queue_map_min (zero-based) (%d) exceeds valid range [0 - %d] for (%d) queues on %s, resetting\n",
2037 pkt_dev->queue_map_min, (ntxq ?: 1) - 1, ntxq,
2038 pkt_dev->odevname);
2039 pkt_dev->queue_map_min = (ntxq ?: 1) - 1;
2040 }
2041 if (pkt_dev->queue_map_max >= ntxq) {
2042 pr_warn("WARNING: Requested queue_map_max (zero-based) (%d) exceeds valid range [0 - %d] for (%d) queues on %s, resetting\n",
2043 pkt_dev->queue_map_max, (ntxq ?: 1) - 1, ntxq,
2044 pkt_dev->odevname);
2045 pkt_dev->queue_map_max = (ntxq ?: 1) - 1;
2046 }
2047
2048 /* Default to the interface's mac if not explicitly set. */
2049
2050 if (is_zero_ether_addr(pkt_dev->src_mac))
2051 ether_addr_copy(&(pkt_dev->hh[6]), pkt_dev->odev->dev_addr);
2052
2053 /* Set up Dest MAC */
2054 ether_addr_copy(&(pkt_dev->hh[0]), pkt_dev->dst_mac);
2055
2056 if (pkt_dev->flags & F_IPV6) {
2057 int i, set = 0, err = 1;
2058 struct inet6_dev *idev;
2059
2060 if (pkt_dev->min_pkt_size == 0) {
2061 pkt_dev->min_pkt_size = 14 + sizeof(struct ipv6hdr)
2062 + sizeof(struct udphdr)
2063 + sizeof(struct pktgen_hdr)
2064 + pkt_dev->pkt_overhead;
2065 }
2066
2067 for (i = 0; i < sizeof(struct in6_addr); i++)
2068 if (pkt_dev->cur_in6_saddr.s6_addr[i]) {
2069 set = 1;
2070 break;
2071 }
2072
2073 if (!set) {
2074
2075 /*
2076 * Use linklevel address if unconfigured.
2077 *
2078 * use ipv6_get_lladdr if/when it's get exported
2079 */
2080
2081 rcu_read_lock();
2082 idev = __in6_dev_get(pkt_dev->odev);
2083 if (idev) {
2084 struct inet6_ifaddr *ifp;
2085
2086 read_lock_bh(&idev->lock);
2087 list_for_each_entry(ifp, &idev->addr_list, if_list) {
2088 if ((ifp->scope & IFA_LINK) &&
2089 !(ifp->flags & IFA_F_TENTATIVE)) {
2090 pkt_dev->cur_in6_saddr = ifp->addr;
2091 err = 0;
2092 break;
2093 }
2094 }
2095 read_unlock_bh(&idev->lock);
2096 }
2097 rcu_read_unlock();
2098 if (err)
2099 pr_err("ERROR: IPv6 link address not available\n");
2100 }
2101 } else {
2102 if (pkt_dev->min_pkt_size == 0) {
2103 pkt_dev->min_pkt_size = 14 + sizeof(struct iphdr)
2104 + sizeof(struct udphdr)
2105 + sizeof(struct pktgen_hdr)
2106 + pkt_dev->pkt_overhead;
2107 }
2108
2109 pkt_dev->saddr_min = 0;
2110 pkt_dev->saddr_max = 0;
2111 if (strlen(pkt_dev->src_min) == 0) {
2112
2113 struct in_device *in_dev;
2114
2115 rcu_read_lock();
2116 in_dev = __in_dev_get_rcu(pkt_dev->odev);
2117 if (in_dev) {
2118 const struct in_ifaddr *ifa;
2119
2120 ifa = rcu_dereference(in_dev->ifa_list);
2121 if (ifa) {
2122 pkt_dev->saddr_min = ifa->ifa_address;
2123 pkt_dev->saddr_max = pkt_dev->saddr_min;
2124 }
2125 }
2126 rcu_read_unlock();
2127 } else {
2128 pkt_dev->saddr_min = in_aton(pkt_dev->src_min);
2129 pkt_dev->saddr_max = in_aton(pkt_dev->src_max);
2130 }
2131
2132 pkt_dev->daddr_min = in_aton(pkt_dev->dst_min);
2133 pkt_dev->daddr_max = in_aton(pkt_dev->dst_max);
2134 }
2135 /* Initialize current values. */
2136 pkt_dev->cur_pkt_size = pkt_dev->min_pkt_size;
2137 if (pkt_dev->min_pkt_size > pkt_dev->max_pkt_size)
2138 pkt_dev->max_pkt_size = pkt_dev->min_pkt_size;
2139
2140 pkt_dev->cur_dst_mac_offset = 0;
2141 pkt_dev->cur_src_mac_offset = 0;
2142 pkt_dev->cur_saddr = pkt_dev->saddr_min;
2143 pkt_dev->cur_daddr = pkt_dev->daddr_min;
2144 pkt_dev->cur_udp_dst = pkt_dev->udp_dst_min;
2145 pkt_dev->cur_udp_src = pkt_dev->udp_src_min;
2146 pkt_dev->nflows = 0;
2147}
2148
2149
2150static void spin(struct pktgen_dev *pkt_dev, ktime_t spin_until)
2151{
2152 ktime_t start_time, end_time;
2153 s64 remaining;
2154 struct hrtimer_sleeper t;
2155
2156 hrtimer_init_sleeper_on_stack(&t, CLOCK_MONOTONIC, HRTIMER_MODE_ABS);
2157 hrtimer_set_expires(&t.timer, spin_until);
2158
2159 remaining = ktime_to_ns(hrtimer_expires_remaining(&t.timer));
2160 if (remaining <= 0)
2161 goto out;
2162
2163 start_time = ktime_get();
2164 if (remaining < 100000) {
2165 /* for small delays (<100us), just loop until limit is reached */
2166 do {
2167 end_time = ktime_get();
2168 } while (ktime_compare(end_time, spin_until) < 0);
2169 } else {
2170 do {
2171 set_current_state(TASK_INTERRUPTIBLE);
2172 hrtimer_sleeper_start_expires(&t, HRTIMER_MODE_ABS);
2173
2174 if (likely(t.task))
2175 schedule();
2176
2177 hrtimer_cancel(&t.timer);
2178 } while (t.task && pkt_dev->running && !signal_pending(current));
2179 __set_current_state(TASK_RUNNING);
2180 end_time = ktime_get();
2181 }
2182
2183 pkt_dev->idle_acc += ktime_to_ns(ktime_sub(end_time, start_time));
2184out:
2185 pkt_dev->next_tx = ktime_add_ns(spin_until, pkt_dev->delay);
2186 destroy_hrtimer_on_stack(&t.timer);
2187}
2188
2189static inline void set_pkt_overhead(struct pktgen_dev *pkt_dev)
2190{
2191 pkt_dev->pkt_overhead = 0;
2192 pkt_dev->pkt_overhead += pkt_dev->nr_labels*sizeof(u32);
2193 pkt_dev->pkt_overhead += VLAN_TAG_SIZE(pkt_dev);
2194 pkt_dev->pkt_overhead += SVLAN_TAG_SIZE(pkt_dev);
2195}
2196
2197static inline int f_seen(const struct pktgen_dev *pkt_dev, int flow)
2198{
2199 return !!(pkt_dev->flows[flow].flags & F_INIT);
2200}
2201
2202static inline int f_pick(struct pktgen_dev *pkt_dev)
2203{
2204 int flow = pkt_dev->curfl;
2205
2206 if (pkt_dev->flags & F_FLOW_SEQ) {
2207 if (pkt_dev->flows[flow].count >= pkt_dev->lflow) {
2208 /* reset time */
2209 pkt_dev->flows[flow].count = 0;
2210 pkt_dev->flows[flow].flags = 0;
2211 pkt_dev->curfl += 1;
2212 if (pkt_dev->curfl >= pkt_dev->cflows)
2213 pkt_dev->curfl = 0; /*reset */
2214 }
2215 } else {
2216 flow = prandom_u32() % pkt_dev->cflows;
2217 pkt_dev->curfl = flow;
2218
2219 if (pkt_dev->flows[flow].count > pkt_dev->lflow) {
2220 pkt_dev->flows[flow].count = 0;
2221 pkt_dev->flows[flow].flags = 0;
2222 }
2223 }
2224
2225 return pkt_dev->curfl;
2226}
2227
2228
2229#ifdef CONFIG_XFRM
2230/* If there was already an IPSEC SA, we keep it as is, else
2231 * we go look for it ...
2232*/
2233#define DUMMY_MARK 0
2234static void get_ipsec_sa(struct pktgen_dev *pkt_dev, int flow)
2235{
2236 struct xfrm_state *x = pkt_dev->flows[flow].x;
2237 struct pktgen_net *pn = net_generic(dev_net(pkt_dev->odev), pg_net_id);
2238 if (!x) {
2239
2240 if (pkt_dev->spi) {
2241 /* We need as quick as possible to find the right SA
2242 * Searching with minimum criteria to archieve this.
2243 */
2244 x = xfrm_state_lookup_byspi(pn->net, htonl(pkt_dev->spi), AF_INET);
2245 } else {
2246 /* slow path: we dont already have xfrm_state */
2247 x = xfrm_stateonly_find(pn->net, DUMMY_MARK, 0,
2248 (xfrm_address_t *)&pkt_dev->cur_daddr,
2249 (xfrm_address_t *)&pkt_dev->cur_saddr,
2250 AF_INET,
2251 pkt_dev->ipsmode,
2252 pkt_dev->ipsproto, 0);
2253 }
2254 if (x) {
2255 pkt_dev->flows[flow].x = x;
2256 set_pkt_overhead(pkt_dev);
2257 pkt_dev->pkt_overhead += x->props.header_len;
2258 }
2259
2260 }
2261}
2262#endif
2263static void set_cur_queue_map(struct pktgen_dev *pkt_dev)
2264{
2265
2266 if (pkt_dev->flags & F_QUEUE_MAP_CPU)
2267 pkt_dev->cur_queue_map = smp_processor_id();
2268
2269 else if (pkt_dev->queue_map_min <= pkt_dev->queue_map_max) {
2270 __u16 t;
2271 if (pkt_dev->flags & F_QUEUE_MAP_RND) {
2272 t = prandom_u32() %
2273 (pkt_dev->queue_map_max -
2274 pkt_dev->queue_map_min + 1)
2275 + pkt_dev->queue_map_min;
2276 } else {
2277 t = pkt_dev->cur_queue_map + 1;
2278 if (t > pkt_dev->queue_map_max)
2279 t = pkt_dev->queue_map_min;
2280 }
2281 pkt_dev->cur_queue_map = t;
2282 }
2283 pkt_dev->cur_queue_map = pkt_dev->cur_queue_map % pkt_dev->odev->real_num_tx_queues;
2284}
2285
2286/* Increment/randomize headers according to flags and current values
2287 * for IP src/dest, UDP src/dst port, MAC-Addr src/dst
2288 */
2289static void mod_cur_headers(struct pktgen_dev *pkt_dev)
2290{
2291 __u32 imn;
2292 __u32 imx;
2293 int flow = 0;
2294
2295 if (pkt_dev->cflows)
2296 flow = f_pick(pkt_dev);
2297
2298 /* Deal with source MAC */
2299 if (pkt_dev->src_mac_count > 1) {
2300 __u32 mc;
2301 __u32 tmp;
2302
2303 if (pkt_dev->flags & F_MACSRC_RND)
2304 mc = prandom_u32() % pkt_dev->src_mac_count;
2305 else {
2306 mc = pkt_dev->cur_src_mac_offset++;
2307 if (pkt_dev->cur_src_mac_offset >=
2308 pkt_dev->src_mac_count)
2309 pkt_dev->cur_src_mac_offset = 0;
2310 }
2311
2312 tmp = pkt_dev->src_mac[5] + (mc & 0xFF);
2313 pkt_dev->hh[11] = tmp;
2314 tmp = (pkt_dev->src_mac[4] + ((mc >> 8) & 0xFF) + (tmp >> 8));
2315 pkt_dev->hh[10] = tmp;
2316 tmp = (pkt_dev->src_mac[3] + ((mc >> 16) & 0xFF) + (tmp >> 8));
2317 pkt_dev->hh[9] = tmp;
2318 tmp = (pkt_dev->src_mac[2] + ((mc >> 24) & 0xFF) + (tmp >> 8));
2319 pkt_dev->hh[8] = tmp;
2320 tmp = (pkt_dev->src_mac[1] + (tmp >> 8));
2321 pkt_dev->hh[7] = tmp;
2322 }
2323
2324 /* Deal with Destination MAC */
2325 if (pkt_dev->dst_mac_count > 1) {
2326 __u32 mc;
2327 __u32 tmp;
2328
2329 if (pkt_dev->flags & F_MACDST_RND)
2330 mc = prandom_u32() % pkt_dev->dst_mac_count;
2331
2332 else {
2333 mc = pkt_dev->cur_dst_mac_offset++;
2334 if (pkt_dev->cur_dst_mac_offset >=
2335 pkt_dev->dst_mac_count) {
2336 pkt_dev->cur_dst_mac_offset = 0;
2337 }
2338 }
2339
2340 tmp = pkt_dev->dst_mac[5] + (mc & 0xFF);
2341 pkt_dev->hh[5] = tmp;
2342 tmp = (pkt_dev->dst_mac[4] + ((mc >> 8) & 0xFF) + (tmp >> 8));
2343 pkt_dev->hh[4] = tmp;
2344 tmp = (pkt_dev->dst_mac[3] + ((mc >> 16) & 0xFF) + (tmp >> 8));
2345 pkt_dev->hh[3] = tmp;
2346 tmp = (pkt_dev->dst_mac[2] + ((mc >> 24) & 0xFF) + (tmp >> 8));
2347 pkt_dev->hh[2] = tmp;
2348 tmp = (pkt_dev->dst_mac[1] + (tmp >> 8));
2349 pkt_dev->hh[1] = tmp;
2350 }
2351
2352 if (pkt_dev->flags & F_MPLS_RND) {
2353 unsigned int i;
2354 for (i = 0; i < pkt_dev->nr_labels; i++)
2355 if (pkt_dev->labels[i] & MPLS_STACK_BOTTOM)
2356 pkt_dev->labels[i] = MPLS_STACK_BOTTOM |
2357 ((__force __be32)prandom_u32() &
2358 htonl(0x000fffff));
2359 }
2360
2361 if ((pkt_dev->flags & F_VID_RND) && (pkt_dev->vlan_id != 0xffff)) {
2362 pkt_dev->vlan_id = prandom_u32() & (4096 - 1);
2363 }
2364
2365 if ((pkt_dev->flags & F_SVID_RND) && (pkt_dev->svlan_id != 0xffff)) {
2366 pkt_dev->svlan_id = prandom_u32() & (4096 - 1);
2367 }
2368
2369 if (pkt_dev->udp_src_min < pkt_dev->udp_src_max) {
2370 if (pkt_dev->flags & F_UDPSRC_RND)
2371 pkt_dev->cur_udp_src = prandom_u32() %
2372 (pkt_dev->udp_src_max - pkt_dev->udp_src_min)
2373 + pkt_dev->udp_src_min;
2374
2375 else {
2376 pkt_dev->cur_udp_src++;
2377 if (pkt_dev->cur_udp_src >= pkt_dev->udp_src_max)
2378 pkt_dev->cur_udp_src = pkt_dev->udp_src_min;
2379 }
2380 }
2381
2382 if (pkt_dev->udp_dst_min < pkt_dev->udp_dst_max) {
2383 if (pkt_dev->flags & F_UDPDST_RND) {
2384 pkt_dev->cur_udp_dst = prandom_u32() %
2385 (pkt_dev->udp_dst_max - pkt_dev->udp_dst_min)
2386 + pkt_dev->udp_dst_min;
2387 } else {
2388 pkt_dev->cur_udp_dst++;
2389 if (pkt_dev->cur_udp_dst >= pkt_dev->udp_dst_max)
2390 pkt_dev->cur_udp_dst = pkt_dev->udp_dst_min;
2391 }
2392 }
2393
2394 if (!(pkt_dev->flags & F_IPV6)) {
2395
2396 imn = ntohl(pkt_dev->saddr_min);
2397 imx = ntohl(pkt_dev->saddr_max);
2398 if (imn < imx) {
2399 __u32 t;
2400 if (pkt_dev->flags & F_IPSRC_RND)
2401 t = prandom_u32() % (imx - imn) + imn;
2402 else {
2403 t = ntohl(pkt_dev->cur_saddr);
2404 t++;
2405 if (t > imx)
2406 t = imn;
2407
2408 }
2409 pkt_dev->cur_saddr = htonl(t);
2410 }
2411
2412 if (pkt_dev->cflows && f_seen(pkt_dev, flow)) {
2413 pkt_dev->cur_daddr = pkt_dev->flows[flow].cur_daddr;
2414 } else {
2415 imn = ntohl(pkt_dev->daddr_min);
2416 imx = ntohl(pkt_dev->daddr_max);
2417 if (imn < imx) {
2418 __u32 t;
2419 __be32 s;
2420 if (pkt_dev->flags & F_IPDST_RND) {
2421
2422 do {
2423 t = prandom_u32() %
2424 (imx - imn) + imn;
2425 s = htonl(t);
2426 } while (ipv4_is_loopback(s) ||
2427 ipv4_is_multicast(s) ||
2428 ipv4_is_lbcast(s) ||
2429 ipv4_is_zeronet(s) ||
2430 ipv4_is_local_multicast(s));
2431 pkt_dev->cur_daddr = s;
2432 } else {
2433 t = ntohl(pkt_dev->cur_daddr);
2434 t++;
2435 if (t > imx) {
2436 t = imn;
2437 }
2438 pkt_dev->cur_daddr = htonl(t);
2439 }
2440 }
2441 if (pkt_dev->cflows) {
2442 pkt_dev->flows[flow].flags |= F_INIT;
2443 pkt_dev->flows[flow].cur_daddr =
2444 pkt_dev->cur_daddr;
2445#ifdef CONFIG_XFRM
2446 if (pkt_dev->flags & F_IPSEC)
2447 get_ipsec_sa(pkt_dev, flow);
2448#endif
2449 pkt_dev->nflows++;
2450 }
2451 }
2452 } else { /* IPV6 * */
2453
2454 if (!ipv6_addr_any(&pkt_dev->min_in6_daddr)) {
2455 int i;
2456
2457 /* Only random destinations yet */
2458
2459 for (i = 0; i < 4; i++) {
2460 pkt_dev->cur_in6_daddr.s6_addr32[i] =
2461 (((__force __be32)prandom_u32() |
2462 pkt_dev->min_in6_daddr.s6_addr32[i]) &
2463 pkt_dev->max_in6_daddr.s6_addr32[i]);
2464 }
2465 }
2466 }
2467
2468 if (pkt_dev->min_pkt_size < pkt_dev->max_pkt_size) {
2469 __u32 t;
2470 if (pkt_dev->flags & F_TXSIZE_RND) {
2471 t = prandom_u32() %
2472 (pkt_dev->max_pkt_size - pkt_dev->min_pkt_size)
2473 + pkt_dev->min_pkt_size;
2474 } else {
2475 t = pkt_dev->cur_pkt_size + 1;
2476 if (t > pkt_dev->max_pkt_size)
2477 t = pkt_dev->min_pkt_size;
2478 }
2479 pkt_dev->cur_pkt_size = t;
2480 }
2481
2482 set_cur_queue_map(pkt_dev);
2483
2484 pkt_dev->flows[flow].count++;
2485}
2486
2487
2488#ifdef CONFIG_XFRM
2489static u32 pktgen_dst_metrics[RTAX_MAX + 1] = {
2490
2491 [RTAX_HOPLIMIT] = 0x5, /* Set a static hoplimit */
2492};
2493
2494static int pktgen_output_ipsec(struct sk_buff *skb, struct pktgen_dev *pkt_dev)
2495{
2496 struct xfrm_state *x = pkt_dev->flows[pkt_dev->curfl].x;
2497 int err = 0;
2498 struct net *net = dev_net(pkt_dev->odev);
2499
2500 if (!x)
2501 return 0;
2502 /* XXX: we dont support tunnel mode for now until
2503 * we resolve the dst issue */
2504 if ((x->props.mode != XFRM_MODE_TRANSPORT) && (pkt_dev->spi == 0))
2505 return 0;
2506
2507 /* But when user specify an valid SPI, transformation
2508 * supports both transport/tunnel mode + ESP/AH type.
2509 */
2510 if ((x->props.mode == XFRM_MODE_TUNNEL) && (pkt_dev->spi != 0))
2511 skb->_skb_refdst = (unsigned long)&pkt_dev->xdst.u.dst | SKB_DST_NOREF;
2512
2513 rcu_read_lock_bh();
2514 err = pktgen_xfrm_outer_mode_output(x, skb);
2515 rcu_read_unlock_bh();
2516 if (err) {
2517 XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTSTATEMODEERROR);
2518 goto error;
2519 }
2520 err = x->type->output(x, skb);
2521 if (err) {
2522 XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTSTATEPROTOERROR);
2523 goto error;
2524 }
2525 spin_lock_bh(&x->lock);
2526 x->curlft.bytes += skb->len;
2527 x->curlft.packets++;
2528 spin_unlock_bh(&x->lock);
2529error:
2530 return err;
2531}
2532
2533static void free_SAs(struct pktgen_dev *pkt_dev)
2534{
2535 if (pkt_dev->cflows) {
2536 /* let go of the SAs if we have them */
2537 int i;
2538 for (i = 0; i < pkt_dev->cflows; i++) {
2539 struct xfrm_state *x = pkt_dev->flows[i].x;
2540 if (x) {
2541 xfrm_state_put(x);
2542 pkt_dev->flows[i].x = NULL;
2543 }
2544 }
2545 }
2546}
2547
2548static int process_ipsec(struct pktgen_dev *pkt_dev,
2549 struct sk_buff *skb, __be16 protocol)
2550{
2551 if (pkt_dev->flags & F_IPSEC) {
2552 struct xfrm_state *x = pkt_dev->flows[pkt_dev->curfl].x;
2553 int nhead = 0;
2554 if (x) {
2555 struct ethhdr *eth;
2556 struct iphdr *iph;
2557 int ret;
2558
2559 nhead = x->props.header_len - skb_headroom(skb);
2560 if (nhead > 0) {
2561 ret = pskb_expand_head(skb, nhead, 0, GFP_ATOMIC);
2562 if (ret < 0) {
2563 pr_err("Error expanding ipsec packet %d\n",
2564 ret);
2565 goto err;
2566 }
2567 }
2568
2569 /* ipsec is not expecting ll header */
2570 skb_pull(skb, ETH_HLEN);
2571 ret = pktgen_output_ipsec(skb, pkt_dev);
2572 if (ret) {
2573 pr_err("Error creating ipsec packet %d\n", ret);
2574 goto err;
2575 }
2576 /* restore ll */
2577 eth = skb_push(skb, ETH_HLEN);
2578 memcpy(eth, pkt_dev->hh, 2 * ETH_ALEN);
2579 eth->h_proto = protocol;
2580
2581 /* Update IPv4 header len as well as checksum value */
2582 iph = ip_hdr(skb);
2583 iph->tot_len = htons(skb->len - ETH_HLEN);
2584 ip_send_check(iph);
2585 }
2586 }
2587 return 1;
2588err:
2589 kfree_skb(skb);
2590 return 0;
2591}
2592#endif
2593
2594static void mpls_push(__be32 *mpls, struct pktgen_dev *pkt_dev)
2595{
2596 unsigned int i;
2597 for (i = 0; i < pkt_dev->nr_labels; i++)
2598 *mpls++ = pkt_dev->labels[i] & ~MPLS_STACK_BOTTOM;
2599
2600 mpls--;
2601 *mpls |= MPLS_STACK_BOTTOM;
2602}
2603
2604static inline __be16 build_tci(unsigned int id, unsigned int cfi,
2605 unsigned int prio)
2606{
2607 return htons(id | (cfi << 12) | (prio << 13));
2608}
2609
2610static void pktgen_finalize_skb(struct pktgen_dev *pkt_dev, struct sk_buff *skb,
2611 int datalen)
2612{
2613 struct timespec64 timestamp;
2614 struct pktgen_hdr *pgh;
2615
2616 pgh = skb_put(skb, sizeof(*pgh));
2617 datalen -= sizeof(*pgh);
2618
2619 if (pkt_dev->nfrags <= 0) {
2620 skb_put_zero(skb, datalen);
2621 } else {
2622 int frags = pkt_dev->nfrags;
2623 int i, len;
2624 int frag_len;
2625
2626
2627 if (frags > MAX_SKB_FRAGS)
2628 frags = MAX_SKB_FRAGS;
2629 len = datalen - frags * PAGE_SIZE;
2630 if (len > 0) {
2631 skb_put_zero(skb, len);
2632 datalen = frags * PAGE_SIZE;
2633 }
2634
2635 i = 0;
2636 frag_len = (datalen/frags) < PAGE_SIZE ?
2637 (datalen/frags) : PAGE_SIZE;
2638 while (datalen > 0) {
2639 if (unlikely(!pkt_dev->page)) {
2640 int node = numa_node_id();
2641
2642 if (pkt_dev->node >= 0 && (pkt_dev->flags & F_NODE))
2643 node = pkt_dev->node;
2644 pkt_dev->page = alloc_pages_node(node, GFP_KERNEL | __GFP_ZERO, 0);
2645 if (!pkt_dev->page)
2646 break;
2647 }
2648 get_page(pkt_dev->page);
2649 skb_frag_set_page(skb, i, pkt_dev->page);
2650 skb_frag_off_set(&skb_shinfo(skb)->frags[i], 0);
2651 /*last fragment, fill rest of data*/
2652 if (i == (frags - 1))
2653 skb_frag_size_set(&skb_shinfo(skb)->frags[i],
2654 (datalen < PAGE_SIZE ? datalen : PAGE_SIZE));
2655 else
2656 skb_frag_size_set(&skb_shinfo(skb)->frags[i], frag_len);
2657 datalen -= skb_frag_size(&skb_shinfo(skb)->frags[i]);
2658 skb->len += skb_frag_size(&skb_shinfo(skb)->frags[i]);
2659 skb->data_len += skb_frag_size(&skb_shinfo(skb)->frags[i]);
2660 i++;
2661 skb_shinfo(skb)->nr_frags = i;
2662 }
2663 }
2664
2665 /* Stamp the time, and sequence number,
2666 * convert them to network byte order
2667 */
2668 pgh->pgh_magic = htonl(PKTGEN_MAGIC);
2669 pgh->seq_num = htonl(pkt_dev->seq_num);
2670
2671 if (pkt_dev->flags & F_NO_TIMESTAMP) {
2672 pgh->tv_sec = 0;
2673 pgh->tv_usec = 0;
2674 } else {
2675 /*
2676 * pgh->tv_sec wraps in y2106 when interpreted as unsigned
2677 * as done by wireshark, or y2038 when interpreted as signed.
2678 * This is probably harmless, but if anyone wants to improve
2679 * it, we could introduce a variant that puts 64-bit nanoseconds
2680 * into the respective header bytes.
2681 * This would also be slightly faster to read.
2682 */
2683 ktime_get_real_ts64(×tamp);
2684 pgh->tv_sec = htonl(timestamp.tv_sec);
2685 pgh->tv_usec = htonl(timestamp.tv_nsec / NSEC_PER_USEC);
2686 }
2687}
2688
2689static struct sk_buff *pktgen_alloc_skb(struct net_device *dev,
2690 struct pktgen_dev *pkt_dev)
2691{
2692 unsigned int extralen = LL_RESERVED_SPACE(dev);
2693 struct sk_buff *skb = NULL;
2694 unsigned int size;
2695
2696 size = pkt_dev->cur_pkt_size + 64 + extralen + pkt_dev->pkt_overhead;
2697 if (pkt_dev->flags & F_NODE) {
2698 int node = pkt_dev->node >= 0 ? pkt_dev->node : numa_node_id();
2699
2700 skb = __alloc_skb(NET_SKB_PAD + size, GFP_NOWAIT, 0, node);
2701 if (likely(skb)) {
2702 skb_reserve(skb, NET_SKB_PAD);
2703 skb->dev = dev;
2704 }
2705 } else {
2706 skb = __netdev_alloc_skb(dev, size, GFP_NOWAIT);
2707 }
2708
2709 /* the caller pre-fetches from skb->data and reserves for the mac hdr */
2710 if (likely(skb))
2711 skb_reserve(skb, extralen - 16);
2712
2713 return skb;
2714}
2715
2716static struct sk_buff *fill_packet_ipv4(struct net_device *odev,
2717 struct pktgen_dev *pkt_dev)
2718{
2719 struct sk_buff *skb = NULL;
2720 __u8 *eth;
2721 struct udphdr *udph;
2722 int datalen, iplen;
2723 struct iphdr *iph;
2724 __be16 protocol = htons(ETH_P_IP);
2725 __be32 *mpls;
2726 __be16 *vlan_tci = NULL; /* Encapsulates priority and VLAN ID */
2727 __be16 *vlan_encapsulated_proto = NULL; /* packet type ID field (or len) for VLAN tag */
2728 __be16 *svlan_tci = NULL; /* Encapsulates priority and SVLAN ID */
2729 __be16 *svlan_encapsulated_proto = NULL; /* packet type ID field (or len) for SVLAN tag */
2730 u16 queue_map;
2731
2732 if (pkt_dev->nr_labels)
2733 protocol = htons(ETH_P_MPLS_UC);
2734
2735 if (pkt_dev->vlan_id != 0xffff)
2736 protocol = htons(ETH_P_8021Q);
2737
2738 /* Update any of the values, used when we're incrementing various
2739 * fields.
2740 */
2741 mod_cur_headers(pkt_dev);
2742 queue_map = pkt_dev->cur_queue_map;
2743
2744 skb = pktgen_alloc_skb(odev, pkt_dev);
2745 if (!skb) {
2746 sprintf(pkt_dev->result, "No memory");
2747 return NULL;
2748 }
2749
2750 prefetchw(skb->data);
2751 skb_reserve(skb, 16);
2752
2753 /* Reserve for ethernet and IP header */
2754 eth = skb_push(skb, 14);
2755 mpls = skb_put(skb, pkt_dev->nr_labels * sizeof(__u32));
2756 if (pkt_dev->nr_labels)
2757 mpls_push(mpls, pkt_dev);
2758
2759 if (pkt_dev->vlan_id != 0xffff) {
2760 if (pkt_dev->svlan_id != 0xffff) {
2761 svlan_tci = skb_put(skb, sizeof(__be16));
2762 *svlan_tci = build_tci(pkt_dev->svlan_id,
2763 pkt_dev->svlan_cfi,
2764 pkt_dev->svlan_p);
2765 svlan_encapsulated_proto = skb_put(skb,
2766 sizeof(__be16));
2767 *svlan_encapsulated_proto = htons(ETH_P_8021Q);
2768 }
2769 vlan_tci = skb_put(skb, sizeof(__be16));
2770 *vlan_tci = build_tci(pkt_dev->vlan_id,
2771 pkt_dev->vlan_cfi,
2772 pkt_dev->vlan_p);
2773 vlan_encapsulated_proto = skb_put(skb, sizeof(__be16));
2774 *vlan_encapsulated_proto = htons(ETH_P_IP);
2775 }
2776
2777 skb_reset_mac_header(skb);
2778 skb_set_network_header(skb, skb->len);
2779 iph = skb_put(skb, sizeof(struct iphdr));
2780
2781 skb_set_transport_header(skb, skb->len);
2782 udph = skb_put(skb, sizeof(struct udphdr));
2783 skb_set_queue_mapping(skb, queue_map);
2784 skb->priority = pkt_dev->skb_priority;
2785
2786 memcpy(eth, pkt_dev->hh, 12);
2787 *(__be16 *) & eth[12] = protocol;
2788
2789 /* Eth + IPh + UDPh + mpls */
2790 datalen = pkt_dev->cur_pkt_size - 14 - 20 - 8 -
2791 pkt_dev->pkt_overhead;
2792 if (datalen < 0 || datalen < sizeof(struct pktgen_hdr))
2793 datalen = sizeof(struct pktgen_hdr);
2794
2795 udph->source = htons(pkt_dev->cur_udp_src);
2796 udph->dest = htons(pkt_dev->cur_udp_dst);
2797 udph->len = htons(datalen + 8); /* DATA + udphdr */
2798 udph->check = 0;
2799
2800 iph->ihl = 5;
2801 iph->version = 4;
2802 iph->ttl = 32;
2803 iph->tos = pkt_dev->tos;
2804 iph->protocol = IPPROTO_UDP; /* UDP */
2805 iph->saddr = pkt_dev->cur_saddr;
2806 iph->daddr = pkt_dev->cur_daddr;
2807 iph->id = htons(pkt_dev->ip_id);
2808 pkt_dev->ip_id++;
2809 iph->frag_off = 0;
2810 iplen = 20 + 8 + datalen;
2811 iph->tot_len = htons(iplen);
2812 ip_send_check(iph);
2813 skb->protocol = protocol;
2814 skb->dev = odev;
2815 skb->pkt_type = PACKET_HOST;
2816
2817 pktgen_finalize_skb(pkt_dev, skb, datalen);
2818
2819 if (!(pkt_dev->flags & F_UDPCSUM)) {
2820 skb->ip_summed = CHECKSUM_NONE;
2821 } else if (odev->features & (NETIF_F_HW_CSUM | NETIF_F_IP_CSUM)) {
2822 skb->ip_summed = CHECKSUM_PARTIAL;
2823 skb->csum = 0;
2824 udp4_hwcsum(skb, iph->saddr, iph->daddr);
2825 } else {
2826 __wsum csum = skb_checksum(skb, skb_transport_offset(skb), datalen + 8, 0);
2827
2828 /* add protocol-dependent pseudo-header */
2829 udph->check = csum_tcpudp_magic(iph->saddr, iph->daddr,
2830 datalen + 8, IPPROTO_UDP, csum);
2831
2832 if (udph->check == 0)
2833 udph->check = CSUM_MANGLED_0;
2834 }
2835
2836#ifdef CONFIG_XFRM
2837 if (!process_ipsec(pkt_dev, skb, protocol))
2838 return NULL;
2839#endif
2840
2841 return skb;
2842}
2843
2844static struct sk_buff *fill_packet_ipv6(struct net_device *odev,
2845 struct pktgen_dev *pkt_dev)
2846{
2847 struct sk_buff *skb = NULL;
2848 __u8 *eth;
2849 struct udphdr *udph;
2850 int datalen, udplen;
2851 struct ipv6hdr *iph;
2852 __be16 protocol = htons(ETH_P_IPV6);
2853 __be32 *mpls;
2854 __be16 *vlan_tci = NULL; /* Encapsulates priority and VLAN ID */
2855 __be16 *vlan_encapsulated_proto = NULL; /* packet type ID field (or len) for VLAN tag */
2856 __be16 *svlan_tci = NULL; /* Encapsulates priority and SVLAN ID */
2857 __be16 *svlan_encapsulated_proto = NULL; /* packet type ID field (or len) for SVLAN tag */
2858 u16 queue_map;
2859
2860 if (pkt_dev->nr_labels)
2861 protocol = htons(ETH_P_MPLS_UC);
2862
2863 if (pkt_dev->vlan_id != 0xffff)
2864 protocol = htons(ETH_P_8021Q);
2865
2866 /* Update any of the values, used when we're incrementing various
2867 * fields.
2868 */
2869 mod_cur_headers(pkt_dev);
2870 queue_map = pkt_dev->cur_queue_map;
2871
2872 skb = pktgen_alloc_skb(odev, pkt_dev);
2873 if (!skb) {
2874 sprintf(pkt_dev->result, "No memory");
2875 return NULL;
2876 }
2877
2878 prefetchw(skb->data);
2879 skb_reserve(skb, 16);
2880
2881 /* Reserve for ethernet and IP header */
2882 eth = skb_push(skb, 14);
2883 mpls = skb_put(skb, pkt_dev->nr_labels * sizeof(__u32));
2884 if (pkt_dev->nr_labels)
2885 mpls_push(mpls, pkt_dev);
2886
2887 if (pkt_dev->vlan_id != 0xffff) {
2888 if (pkt_dev->svlan_id != 0xffff) {
2889 svlan_tci = skb_put(skb, sizeof(__be16));
2890 *svlan_tci = build_tci(pkt_dev->svlan_id,
2891 pkt_dev->svlan_cfi,
2892 pkt_dev->svlan_p);
2893 svlan_encapsulated_proto = skb_put(skb,
2894 sizeof(__be16));
2895 *svlan_encapsulated_proto = htons(ETH_P_8021Q);
2896 }
2897 vlan_tci = skb_put(skb, sizeof(__be16));
2898 *vlan_tci = build_tci(pkt_dev->vlan_id,
2899 pkt_dev->vlan_cfi,
2900 pkt_dev->vlan_p);
2901 vlan_encapsulated_proto = skb_put(skb, sizeof(__be16));
2902 *vlan_encapsulated_proto = htons(ETH_P_IPV6);
2903 }
2904
2905 skb_reset_mac_header(skb);
2906 skb_set_network_header(skb, skb->len);
2907 iph = skb_put(skb, sizeof(struct ipv6hdr));
2908
2909 skb_set_transport_header(skb, skb->len);
2910 udph = skb_put(skb, sizeof(struct udphdr));
2911 skb_set_queue_mapping(skb, queue_map);
2912 skb->priority = pkt_dev->skb_priority;
2913
2914 memcpy(eth, pkt_dev->hh, 12);
2915 *(__be16 *) ð[12] = protocol;
2916
2917 /* Eth + IPh + UDPh + mpls */
2918 datalen = pkt_dev->cur_pkt_size - 14 -
2919 sizeof(struct ipv6hdr) - sizeof(struct udphdr) -
2920 pkt_dev->pkt_overhead;
2921
2922 if (datalen < 0 || datalen < sizeof(struct pktgen_hdr)) {
2923 datalen = sizeof(struct pktgen_hdr);
2924 net_info_ratelimited("increased datalen to %d\n", datalen);
2925 }
2926
2927 udplen = datalen + sizeof(struct udphdr);
2928 udph->source = htons(pkt_dev->cur_udp_src);
2929 udph->dest = htons(pkt_dev->cur_udp_dst);
2930 udph->len = htons(udplen);
2931 udph->check = 0;
2932
2933 *(__be32 *) iph = htonl(0x60000000); /* Version + flow */
2934
2935 if (pkt_dev->traffic_class) {
2936 /* Version + traffic class + flow (0) */
2937 *(__be32 *)iph |= htonl(0x60000000 | (pkt_dev->traffic_class << 20));
2938 }
2939
2940 iph->hop_limit = 32;
2941
2942 iph->payload_len = htons(udplen);
2943 iph->nexthdr = IPPROTO_UDP;
2944
2945 iph->daddr = pkt_dev->cur_in6_daddr;
2946 iph->saddr = pkt_dev->cur_in6_saddr;
2947
2948 skb->protocol = protocol;
2949 skb->dev = odev;
2950 skb->pkt_type = PACKET_HOST;
2951
2952 pktgen_finalize_skb(pkt_dev, skb, datalen);
2953
2954 if (!(pkt_dev->flags & F_UDPCSUM)) {
2955 skb->ip_summed = CHECKSUM_NONE;
2956 } else if (odev->features & (NETIF_F_HW_CSUM | NETIF_F_IPV6_CSUM)) {
2957 skb->ip_summed = CHECKSUM_PARTIAL;
2958 skb->csum_start = skb_transport_header(skb) - skb->head;
2959 skb->csum_offset = offsetof(struct udphdr, check);
2960 udph->check = ~csum_ipv6_magic(&iph->saddr, &iph->daddr, udplen, IPPROTO_UDP, 0);
2961 } else {
2962 __wsum csum = skb_checksum(skb, skb_transport_offset(skb), udplen, 0);
2963
2964 /* add protocol-dependent pseudo-header */
2965 udph->check = csum_ipv6_magic(&iph->saddr, &iph->daddr, udplen, IPPROTO_UDP, csum);
2966
2967 if (udph->check == 0)
2968 udph->check = CSUM_MANGLED_0;
2969 }
2970
2971 return skb;
2972}
2973
2974static struct sk_buff *fill_packet(struct net_device *odev,
2975 struct pktgen_dev *pkt_dev)
2976{
2977 if (pkt_dev->flags & F_IPV6)
2978 return fill_packet_ipv6(odev, pkt_dev);
2979 else
2980 return fill_packet_ipv4(odev, pkt_dev);
2981}
2982
2983static void pktgen_clear_counters(struct pktgen_dev *pkt_dev)
2984{
2985 pkt_dev->seq_num = 1;
2986 pkt_dev->idle_acc = 0;
2987 pkt_dev->sofar = 0;
2988 pkt_dev->tx_bytes = 0;
2989 pkt_dev->errors = 0;
2990}
2991
2992/* Set up structure for sending pkts, clear counters */
2993
2994static void pktgen_run(struct pktgen_thread *t)
2995{
2996 struct pktgen_dev *pkt_dev;
2997 int started = 0;
2998
2999 func_enter();
3000
3001 rcu_read_lock();
3002 list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
3003
3004 /*
3005 * setup odev and create initial packet.
3006 */
3007 pktgen_setup_inject(pkt_dev);
3008
3009 if (pkt_dev->odev) {
3010 pktgen_clear_counters(pkt_dev);
3011 pkt_dev->skb = NULL;
3012 pkt_dev->started_at = pkt_dev->next_tx = ktime_get();
3013
3014 set_pkt_overhead(pkt_dev);
3015
3016 strcpy(pkt_dev->result, "Starting");
3017 pkt_dev->running = 1; /* Cranke yeself! */
3018 started++;
3019 } else
3020 strcpy(pkt_dev->result, "Error starting");
3021 }
3022 rcu_read_unlock();
3023 if (started)
3024 t->control &= ~(T_STOP);
3025}
3026
3027static void pktgen_handle_all_threads(struct pktgen_net *pn, u32 flags)
3028{
3029 struct pktgen_thread *t;
3030
3031 mutex_lock(&pktgen_thread_lock);
3032
3033 list_for_each_entry(t, &pn->pktgen_threads, th_list)
3034 t->control |= (flags);
3035
3036 mutex_unlock(&pktgen_thread_lock);
3037}
3038
3039static void pktgen_stop_all_threads(struct pktgen_net *pn)
3040{
3041 func_enter();
3042
3043 pktgen_handle_all_threads(pn, T_STOP);
3044}
3045
3046static int thread_is_running(const struct pktgen_thread *t)
3047{
3048 const struct pktgen_dev *pkt_dev;
3049
3050 rcu_read_lock();
3051 list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
3052 if (pkt_dev->running) {
3053 rcu_read_unlock();
3054 return 1;
3055 }
3056 rcu_read_unlock();
3057 return 0;
3058}
3059
3060static int pktgen_wait_thread_run(struct pktgen_thread *t)
3061{
3062 while (thread_is_running(t)) {
3063
3064 /* note: 't' will still be around even after the unlock/lock
3065 * cycle because pktgen_thread threads are only cleared at
3066 * net exit
3067 */
3068 mutex_unlock(&pktgen_thread_lock);
3069 msleep_interruptible(100);
3070 mutex_lock(&pktgen_thread_lock);
3071
3072 if (signal_pending(current))
3073 goto signal;
3074 }
3075 return 1;
3076signal:
3077 return 0;
3078}
3079
3080static int pktgen_wait_all_threads_run(struct pktgen_net *pn)
3081{
3082 struct pktgen_thread *t;
3083 int sig = 1;
3084
3085 /* prevent from racing with rmmod */
3086 if (!try_module_get(THIS_MODULE))
3087 return sig;
3088
3089 mutex_lock(&pktgen_thread_lock);
3090
3091 list_for_each_entry(t, &pn->pktgen_threads, th_list) {
3092 sig = pktgen_wait_thread_run(t);
3093 if (sig == 0)
3094 break;
3095 }
3096
3097 if (sig == 0)
3098 list_for_each_entry(t, &pn->pktgen_threads, th_list)
3099 t->control |= (T_STOP);
3100
3101 mutex_unlock(&pktgen_thread_lock);
3102 module_put(THIS_MODULE);
3103 return sig;
3104}
3105
3106static void pktgen_run_all_threads(struct pktgen_net *pn)
3107{
3108 func_enter();
3109
3110 pktgen_handle_all_threads(pn, T_RUN);
3111
3112 /* Propagate thread->control */
3113 schedule_timeout_interruptible(msecs_to_jiffies(125));
3114
3115 pktgen_wait_all_threads_run(pn);
3116}
3117
3118static void pktgen_reset_all_threads(struct pktgen_net *pn)
3119{
3120 func_enter();
3121
3122 pktgen_handle_all_threads(pn, T_REMDEVALL);
3123
3124 /* Propagate thread->control */
3125 schedule_timeout_interruptible(msecs_to_jiffies(125));
3126
3127 pktgen_wait_all_threads_run(pn);
3128}
3129
3130static void show_results(struct pktgen_dev *pkt_dev, int nr_frags)
3131{
3132 __u64 bps, mbps, pps;
3133 char *p = pkt_dev->result;
3134 ktime_t elapsed = ktime_sub(pkt_dev->stopped_at,
3135 pkt_dev->started_at);
3136 ktime_t idle = ns_to_ktime(pkt_dev->idle_acc);
3137
3138 p += sprintf(p, "OK: %llu(c%llu+d%llu) usec, %llu (%dbyte,%dfrags)\n",
3139 (unsigned long long)ktime_to_us(elapsed),
3140 (unsigned long long)ktime_to_us(ktime_sub(elapsed, idle)),
3141 (unsigned long long)ktime_to_us(idle),
3142 (unsigned long long)pkt_dev->sofar,
3143 pkt_dev->cur_pkt_size, nr_frags);
3144
3145 pps = div64_u64(pkt_dev->sofar * NSEC_PER_SEC,
3146 ktime_to_ns(elapsed));
3147
3148 bps = pps * 8 * pkt_dev->cur_pkt_size;
3149
3150 mbps = bps;
3151 do_div(mbps, 1000000);
3152 p += sprintf(p, " %llupps %lluMb/sec (%llubps) errors: %llu",
3153 (unsigned long long)pps,
3154 (unsigned long long)mbps,
3155 (unsigned long long)bps,
3156 (unsigned long long)pkt_dev->errors);
3157}
3158
3159/* Set stopped-at timer, remove from running list, do counters & statistics */
3160static int pktgen_stop_device(struct pktgen_dev *pkt_dev)
3161{
3162 int nr_frags = pkt_dev->skb ? skb_shinfo(pkt_dev->skb)->nr_frags : -1;
3163
3164 if (!pkt_dev->running) {
3165 pr_warn("interface: %s is already stopped\n",
3166 pkt_dev->odevname);
3167 return -EINVAL;
3168 }
3169
3170 pkt_dev->running = 0;
3171 kfree_skb(pkt_dev->skb);
3172 pkt_dev->skb = NULL;
3173 pkt_dev->stopped_at = ktime_get();
3174
3175 show_results(pkt_dev, nr_frags);
3176
3177 return 0;
3178}
3179
3180static struct pktgen_dev *next_to_run(struct pktgen_thread *t)
3181{
3182 struct pktgen_dev *pkt_dev, *best = NULL;
3183
3184 rcu_read_lock();
3185 list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
3186 if (!pkt_dev->running)
3187 continue;
3188 if (best == NULL)
3189 best = pkt_dev;
3190 else if (ktime_compare(pkt_dev->next_tx, best->next_tx) < 0)
3191 best = pkt_dev;
3192 }
3193 rcu_read_unlock();
3194
3195 return best;
3196}
3197
3198static void pktgen_stop(struct pktgen_thread *t)
3199{
3200 struct pktgen_dev *pkt_dev;
3201
3202 func_enter();
3203
3204 rcu_read_lock();
3205
3206 list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
3207 pktgen_stop_device(pkt_dev);
3208 }
3209
3210 rcu_read_unlock();
3211}
3212
3213/*
3214 * one of our devices needs to be removed - find it
3215 * and remove it
3216 */
3217static void pktgen_rem_one_if(struct pktgen_thread *t)
3218{
3219 struct list_head *q, *n;
3220 struct pktgen_dev *cur;
3221
3222 func_enter();
3223
3224 list_for_each_safe(q, n, &t->if_list) {
3225 cur = list_entry(q, struct pktgen_dev, list);
3226
3227 if (!cur->removal_mark)
3228 continue;
3229
3230 kfree_skb(cur->skb);
3231 cur->skb = NULL;
3232
3233 pktgen_remove_device(t, cur);
3234
3235 break;
3236 }
3237}
3238
3239static void pktgen_rem_all_ifs(struct pktgen_thread *t)
3240{
3241 struct list_head *q, *n;
3242 struct pktgen_dev *cur;
3243
3244 func_enter();
3245
3246 /* Remove all devices, free mem */
3247
3248 list_for_each_safe(q, n, &t->if_list) {
3249 cur = list_entry(q, struct pktgen_dev, list);
3250
3251 kfree_skb(cur->skb);
3252 cur->skb = NULL;
3253
3254 pktgen_remove_device(t, cur);
3255 }
3256}
3257
3258static void pktgen_rem_thread(struct pktgen_thread *t)
3259{
3260 /* Remove from the thread list */
3261 remove_proc_entry(t->tsk->comm, t->net->proc_dir);
3262}
3263
3264static void pktgen_resched(struct pktgen_dev *pkt_dev)
3265{
3266 ktime_t idle_start = ktime_get();
3267 schedule();
3268 pkt_dev->idle_acc += ktime_to_ns(ktime_sub(ktime_get(), idle_start));
3269}
3270
3271static void pktgen_wait_for_skb(struct pktgen_dev *pkt_dev)
3272{
3273 ktime_t idle_start = ktime_get();
3274
3275 while (refcount_read(&(pkt_dev->skb->users)) != 1) {
3276 if (signal_pending(current))
3277 break;
3278
3279 if (need_resched())
3280 pktgen_resched(pkt_dev);
3281 else
3282 cpu_relax();
3283 }
3284 pkt_dev->idle_acc += ktime_to_ns(ktime_sub(ktime_get(), idle_start));
3285}
3286
3287static void pktgen_xmit(struct pktgen_dev *pkt_dev)
3288{
3289 unsigned int burst = READ_ONCE(pkt_dev->burst);
3290 struct net_device *odev = pkt_dev->odev;
3291 struct netdev_queue *txq;
3292 struct sk_buff *skb;
3293 int ret;
3294
3295 /* If device is offline, then don't send */
3296 if (unlikely(!netif_running(odev) || !netif_carrier_ok(odev))) {
3297 pktgen_stop_device(pkt_dev);
3298 return;
3299 }
3300
3301 /* This is max DELAY, this has special meaning of
3302 * "never transmit"
3303 */
3304 if (unlikely(pkt_dev->delay == ULLONG_MAX)) {
3305 pkt_dev->next_tx = ktime_add_ns(ktime_get(), ULONG_MAX);
3306 return;
3307 }
3308
3309 /* If no skb or clone count exhausted then get new one */
3310 if (!pkt_dev->skb || (pkt_dev->last_ok &&
3311 ++pkt_dev->clone_count >= pkt_dev->clone_skb)) {
3312 /* build a new pkt */
3313 kfree_skb(pkt_dev->skb);
3314
3315 pkt_dev->skb = fill_packet(odev, pkt_dev);
3316 if (pkt_dev->skb == NULL) {
3317 pr_err("ERROR: couldn't allocate skb in fill_packet\n");
3318 schedule();
3319 pkt_dev->clone_count--; /* back out increment, OOM */
3320 return;
3321 }
3322 pkt_dev->last_pkt_size = pkt_dev->skb->len;
3323 pkt_dev->clone_count = 0; /* reset counter */
3324 }
3325
3326 if (pkt_dev->delay && pkt_dev->last_ok)
3327 spin(pkt_dev, pkt_dev->next_tx);
3328
3329 if (pkt_dev->xmit_mode == M_NETIF_RECEIVE) {
3330 skb = pkt_dev->skb;
3331 skb->protocol = eth_type_trans(skb, skb->dev);
3332 refcount_add(burst, &skb->users);
3333 local_bh_disable();
3334 do {
3335 ret = netif_receive_skb(skb);
3336 if (ret == NET_RX_DROP)
3337 pkt_dev->errors++;
3338 pkt_dev->sofar++;
3339 pkt_dev->seq_num++;
3340 if (refcount_read(&skb->users) != burst) {
3341 /* skb was queued by rps/rfs or taps,
3342 * so cannot reuse this skb
3343 */
3344 WARN_ON(refcount_sub_and_test(burst - 1, &skb->users));
3345 /* get out of the loop and wait
3346 * until skb is consumed
3347 */
3348 break;
3349 }
3350 /* skb was 'freed' by stack, so clean few
3351 * bits and reuse it
3352 */
3353 skb_reset_redirect(skb);
3354 } while (--burst > 0);
3355 goto out; /* Skips xmit_mode M_START_XMIT */
3356 } else if (pkt_dev->xmit_mode == M_QUEUE_XMIT) {
3357 local_bh_disable();
3358 refcount_inc(&pkt_dev->skb->users);
3359
3360 ret = dev_queue_xmit(pkt_dev->skb);
3361 switch (ret) {
3362 case NET_XMIT_SUCCESS:
3363 pkt_dev->sofar++;
3364 pkt_dev->seq_num++;
3365 pkt_dev->tx_bytes += pkt_dev->last_pkt_size;
3366 break;
3367 case NET_XMIT_DROP:
3368 case NET_XMIT_CN:
3369 /* These are all valid return codes for a qdisc but
3370 * indicate packets are being dropped or will likely
3371 * be dropped soon.
3372 */
3373 case NETDEV_TX_BUSY:
3374 /* qdisc may call dev_hard_start_xmit directly in cases
3375 * where no queues exist e.g. loopback device, virtual
3376 * devices, etc. In this case we need to handle
3377 * NETDEV_TX_ codes.
3378 */
3379 default:
3380 pkt_dev->errors++;
3381 net_info_ratelimited("%s xmit error: %d\n",
3382 pkt_dev->odevname, ret);
3383 break;
3384 }
3385 goto out;
3386 }
3387
3388 txq = skb_get_tx_queue(odev, pkt_dev->skb);
3389
3390 local_bh_disable();
3391
3392 HARD_TX_LOCK(odev, txq, smp_processor_id());
3393
3394 if (unlikely(netif_xmit_frozen_or_drv_stopped(txq))) {
3395 pkt_dev->last_ok = 0;
3396 goto unlock;
3397 }
3398 refcount_add(burst, &pkt_dev->skb->users);
3399
3400xmit_more:
3401 ret = netdev_start_xmit(pkt_dev->skb, odev, txq, --burst > 0);
3402
3403 switch (ret) {
3404 case NETDEV_TX_OK:
3405 pkt_dev->last_ok = 1;
3406 pkt_dev->sofar++;
3407 pkt_dev->seq_num++;
3408 pkt_dev->tx_bytes += pkt_dev->last_pkt_size;
3409 if (burst > 0 && !netif_xmit_frozen_or_drv_stopped(txq))
3410 goto xmit_more;
3411 break;
3412 case NET_XMIT_DROP:
3413 case NET_XMIT_CN:
3414 /* skb has been consumed */
3415 pkt_dev->errors++;
3416 break;
3417 default: /* Drivers are not supposed to return other values! */
3418 net_info_ratelimited("%s xmit error: %d\n",
3419 pkt_dev->odevname, ret);
3420 pkt_dev->errors++;
3421 fallthrough;
3422 case NETDEV_TX_BUSY:
3423 /* Retry it next time */
3424 refcount_dec(&(pkt_dev->skb->users));
3425 pkt_dev->last_ok = 0;
3426 }
3427 if (unlikely(burst))
3428 WARN_ON(refcount_sub_and_test(burst, &pkt_dev->skb->users));
3429unlock:
3430 HARD_TX_UNLOCK(odev, txq);
3431
3432out:
3433 local_bh_enable();
3434
3435 /* If pkt_dev->count is zero, then run forever */
3436 if ((pkt_dev->count != 0) && (pkt_dev->sofar >= pkt_dev->count)) {
3437 pktgen_wait_for_skb(pkt_dev);
3438
3439 /* Done with this */
3440 pktgen_stop_device(pkt_dev);
3441 }
3442}
3443
3444/*
3445 * Main loop of the thread goes here
3446 */
3447
3448static int pktgen_thread_worker(void *arg)
3449{
3450 DEFINE_WAIT(wait);
3451 struct pktgen_thread *t = arg;
3452 struct pktgen_dev *pkt_dev = NULL;
3453 int cpu = t->cpu;
3454
3455 WARN_ON(smp_processor_id() != cpu);
3456
3457 init_waitqueue_head(&t->queue);
3458 complete(&t->start_done);
3459
3460 pr_debug("starting pktgen/%d: pid=%d\n", cpu, task_pid_nr(current));
3461
3462 set_freezable();
3463
3464 while (!kthread_should_stop()) {
3465 pkt_dev = next_to_run(t);
3466
3467 if (unlikely(!pkt_dev && t->control == 0)) {
3468 if (t->net->pktgen_exiting)
3469 break;
3470 wait_event_interruptible_timeout(t->queue,
3471 t->control != 0,
3472 HZ/10);
3473 try_to_freeze();
3474 continue;
3475 }
3476
3477 if (likely(pkt_dev)) {
3478 pktgen_xmit(pkt_dev);
3479
3480 if (need_resched())
3481 pktgen_resched(pkt_dev);
3482 else
3483 cpu_relax();
3484 }
3485
3486 if (t->control & T_STOP) {
3487 pktgen_stop(t);
3488 t->control &= ~(T_STOP);
3489 }
3490
3491 if (t->control & T_RUN) {
3492 pktgen_run(t);
3493 t->control &= ~(T_RUN);
3494 }
3495
3496 if (t->control & T_REMDEVALL) {
3497 pktgen_rem_all_ifs(t);
3498 t->control &= ~(T_REMDEVALL);
3499 }
3500
3501 if (t->control & T_REMDEV) {
3502 pktgen_rem_one_if(t);
3503 t->control &= ~(T_REMDEV);
3504 }
3505
3506 try_to_freeze();
3507 }
3508
3509 pr_debug("%s stopping all device\n", t->tsk->comm);
3510 pktgen_stop(t);
3511
3512 pr_debug("%s removing all device\n", t->tsk->comm);
3513 pktgen_rem_all_ifs(t);
3514
3515 pr_debug("%s removing thread\n", t->tsk->comm);
3516 pktgen_rem_thread(t);
3517
3518 return 0;
3519}
3520
3521static struct pktgen_dev *pktgen_find_dev(struct pktgen_thread *t,
3522 const char *ifname, bool exact)
3523{
3524 struct pktgen_dev *p, *pkt_dev = NULL;
3525 size_t len = strlen(ifname);
3526
3527 rcu_read_lock();
3528 list_for_each_entry_rcu(p, &t->if_list, list)
3529 if (strncmp(p->odevname, ifname, len) == 0) {
3530 if (p->odevname[len]) {
3531 if (exact || p->odevname[len] != '@')
3532 continue;
3533 }
3534 pkt_dev = p;
3535 break;
3536 }
3537
3538 rcu_read_unlock();
3539 pr_debug("find_dev(%s) returning %p\n", ifname, pkt_dev);
3540 return pkt_dev;
3541}
3542
3543/*
3544 * Adds a dev at front of if_list.
3545 */
3546
3547static int add_dev_to_thread(struct pktgen_thread *t,
3548 struct pktgen_dev *pkt_dev)
3549{
3550 int rv = 0;
3551
3552 /* This function cannot be called concurrently, as its called
3553 * under pktgen_thread_lock mutex, but it can run from
3554 * userspace on another CPU than the kthread. The if_lock()
3555 * is used here to sync with concurrent instances of
3556 * _rem_dev_from_if_list() invoked via kthread, which is also
3557 * updating the if_list */
3558 if_lock(t);
3559
3560 if (pkt_dev->pg_thread) {
3561 pr_err("ERROR: already assigned to a thread\n");
3562 rv = -EBUSY;
3563 goto out;
3564 }
3565
3566 pkt_dev->running = 0;
3567 pkt_dev->pg_thread = t;
3568 list_add_rcu(&pkt_dev->list, &t->if_list);
3569
3570out:
3571 if_unlock(t);
3572 return rv;
3573}
3574
3575/* Called under thread lock */
3576
3577static int pktgen_add_device(struct pktgen_thread *t, const char *ifname)
3578{
3579 struct pktgen_dev *pkt_dev;
3580 int err;
3581 int node = cpu_to_node(t->cpu);
3582
3583 /* We don't allow a device to be on several threads */
3584
3585 pkt_dev = __pktgen_NN_threads(t->net, ifname, FIND);
3586 if (pkt_dev) {
3587 pr_err("ERROR: interface already used\n");
3588 return -EBUSY;
3589 }
3590
3591 pkt_dev = kzalloc_node(sizeof(struct pktgen_dev), GFP_KERNEL, node);
3592 if (!pkt_dev)
3593 return -ENOMEM;
3594
3595 strcpy(pkt_dev->odevname, ifname);
3596 pkt_dev->flows = vzalloc_node(array_size(MAX_CFLOWS,
3597 sizeof(struct flow_state)),
3598 node);
3599 if (pkt_dev->flows == NULL) {
3600 kfree(pkt_dev);
3601 return -ENOMEM;
3602 }
3603
3604 pkt_dev->removal_mark = 0;
3605 pkt_dev->nfrags = 0;
3606 pkt_dev->delay = pg_delay_d;
3607 pkt_dev->count = pg_count_d;
3608 pkt_dev->sofar = 0;
3609 pkt_dev->udp_src_min = 9; /* sink port */
3610 pkt_dev->udp_src_max = 9;
3611 pkt_dev->udp_dst_min = 9;
3612 pkt_dev->udp_dst_max = 9;
3613 pkt_dev->vlan_p = 0;
3614 pkt_dev->vlan_cfi = 0;
3615 pkt_dev->vlan_id = 0xffff;
3616 pkt_dev->svlan_p = 0;
3617 pkt_dev->svlan_cfi = 0;
3618 pkt_dev->svlan_id = 0xffff;
3619 pkt_dev->burst = 1;
3620 pkt_dev->node = NUMA_NO_NODE;
3621
3622 err = pktgen_setup_dev(t->net, pkt_dev, ifname);
3623 if (err)
3624 goto out1;
3625 if (pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)
3626 pkt_dev->clone_skb = pg_clone_skb_d;
3627
3628 pkt_dev->entry = proc_create_data(ifname, 0600, t->net->proc_dir,
3629 &pktgen_if_proc_ops, pkt_dev);
3630 if (!pkt_dev->entry) {
3631 pr_err("cannot create %s/%s procfs entry\n",
3632 PG_PROC_DIR, ifname);
3633 err = -EINVAL;
3634 goto out2;
3635 }
3636#ifdef CONFIG_XFRM
3637 pkt_dev->ipsmode = XFRM_MODE_TRANSPORT;
3638 pkt_dev->ipsproto = IPPROTO_ESP;
3639
3640 /* xfrm tunnel mode needs additional dst to extract outter
3641 * ip header protocol/ttl/id field, here creat a phony one.
3642 * instead of looking for a valid rt, which definitely hurting
3643 * performance under such circumstance.
3644 */
3645 pkt_dev->dstops.family = AF_INET;
3646 pkt_dev->xdst.u.dst.dev = pkt_dev->odev;
3647 dst_init_metrics(&pkt_dev->xdst.u.dst, pktgen_dst_metrics, false);
3648 pkt_dev->xdst.child = &pkt_dev->xdst.u.dst;
3649 pkt_dev->xdst.u.dst.ops = &pkt_dev->dstops;
3650#endif
3651
3652 return add_dev_to_thread(t, pkt_dev);
3653out2:
3654 dev_put(pkt_dev->odev);
3655out1:
3656#ifdef CONFIG_XFRM
3657 free_SAs(pkt_dev);
3658#endif
3659 vfree(pkt_dev->flows);
3660 kfree(pkt_dev);
3661 return err;
3662}
3663
3664static int __net_init pktgen_create_thread(int cpu, struct pktgen_net *pn)
3665{
3666 struct pktgen_thread *t;
3667 struct proc_dir_entry *pe;
3668 struct task_struct *p;
3669
3670 t = kzalloc_node(sizeof(struct pktgen_thread), GFP_KERNEL,
3671 cpu_to_node(cpu));
3672 if (!t) {
3673 pr_err("ERROR: out of memory, can't create new thread\n");
3674 return -ENOMEM;
3675 }
3676
3677 mutex_init(&t->if_lock);
3678 t->cpu = cpu;
3679
3680 INIT_LIST_HEAD(&t->if_list);
3681
3682 list_add_tail(&t->th_list, &pn->pktgen_threads);
3683 init_completion(&t->start_done);
3684
3685 p = kthread_create_on_node(pktgen_thread_worker,
3686 t,
3687 cpu_to_node(cpu),
3688 "kpktgend_%d", cpu);
3689 if (IS_ERR(p)) {
3690 pr_err("kthread_create_on_node() failed for cpu %d\n", t->cpu);
3691 list_del(&t->th_list);
3692 kfree(t);
3693 return PTR_ERR(p);
3694 }
3695 kthread_bind(p, cpu);
3696 t->tsk = p;
3697
3698 pe = proc_create_data(t->tsk->comm, 0600, pn->proc_dir,
3699 &pktgen_thread_proc_ops, t);
3700 if (!pe) {
3701 pr_err("cannot create %s/%s procfs entry\n",
3702 PG_PROC_DIR, t->tsk->comm);
3703 kthread_stop(p);
3704 list_del(&t->th_list);
3705 kfree(t);
3706 return -EINVAL;
3707 }
3708
3709 t->net = pn;
3710 get_task_struct(p);
3711 wake_up_process(p);
3712 wait_for_completion(&t->start_done);
3713
3714 return 0;
3715}
3716
3717/*
3718 * Removes a device from the thread if_list.
3719 */
3720static void _rem_dev_from_if_list(struct pktgen_thread *t,
3721 struct pktgen_dev *pkt_dev)
3722{
3723 struct list_head *q, *n;
3724 struct pktgen_dev *p;
3725
3726 if_lock(t);
3727 list_for_each_safe(q, n, &t->if_list) {
3728 p = list_entry(q, struct pktgen_dev, list);
3729 if (p == pkt_dev)
3730 list_del_rcu(&p->list);
3731 }
3732 if_unlock(t);
3733}
3734
3735static int pktgen_remove_device(struct pktgen_thread *t,
3736 struct pktgen_dev *pkt_dev)
3737{
3738 pr_debug("remove_device pkt_dev=%p\n", pkt_dev);
3739
3740 if (pkt_dev->running) {
3741 pr_warn("WARNING: trying to remove a running interface, stopping it now\n");
3742 pktgen_stop_device(pkt_dev);
3743 }
3744
3745 /* Dis-associate from the interface */
3746
3747 if (pkt_dev->odev) {
3748 dev_put(pkt_dev->odev);
3749 pkt_dev->odev = NULL;
3750 }
3751
3752 /* Remove proc before if_list entry, because add_device uses
3753 * list to determine if interface already exist, avoid race
3754 * with proc_create_data() */
3755 proc_remove(pkt_dev->entry);
3756
3757 /* And update the thread if_list */
3758 _rem_dev_from_if_list(t, pkt_dev);
3759
3760#ifdef CONFIG_XFRM
3761 free_SAs(pkt_dev);
3762#endif
3763 vfree(pkt_dev->flows);
3764 if (pkt_dev->page)
3765 put_page(pkt_dev->page);
3766 kfree_rcu(pkt_dev, rcu);
3767 return 0;
3768}
3769
3770static int __net_init pg_net_init(struct net *net)
3771{
3772 struct pktgen_net *pn = net_generic(net, pg_net_id);
3773 struct proc_dir_entry *pe;
3774 int cpu, ret = 0;
3775
3776 pn->net = net;
3777 INIT_LIST_HEAD(&pn->pktgen_threads);
3778 pn->pktgen_exiting = false;
3779 pn->proc_dir = proc_mkdir(PG_PROC_DIR, pn->net->proc_net);
3780 if (!pn->proc_dir) {
3781 pr_warn("cannot create /proc/net/%s\n", PG_PROC_DIR);
3782 return -ENODEV;
3783 }
3784 pe = proc_create(PGCTRL, 0600, pn->proc_dir, &pktgen_proc_ops);
3785 if (pe == NULL) {
3786 pr_err("cannot create %s procfs entry\n", PGCTRL);
3787 ret = -EINVAL;
3788 goto remove;
3789 }
3790
3791 for_each_online_cpu(cpu) {
3792 int err;
3793
3794 err = pktgen_create_thread(cpu, pn);
3795 if (err)
3796 pr_warn("Cannot create thread for cpu %d (%d)\n",
3797 cpu, err);
3798 }
3799
3800 if (list_empty(&pn->pktgen_threads)) {
3801 pr_err("Initialization failed for all threads\n");
3802 ret = -ENODEV;
3803 goto remove_entry;
3804 }
3805
3806 return 0;
3807
3808remove_entry:
3809 remove_proc_entry(PGCTRL, pn->proc_dir);
3810remove:
3811 remove_proc_entry(PG_PROC_DIR, pn->net->proc_net);
3812 return ret;
3813}
3814
3815static void __net_exit pg_net_exit(struct net *net)
3816{
3817 struct pktgen_net *pn = net_generic(net, pg_net_id);
3818 struct pktgen_thread *t;
3819 struct list_head *q, *n;
3820 LIST_HEAD(list);
3821
3822 /* Stop all interfaces & threads */
3823 pn->pktgen_exiting = true;
3824
3825 mutex_lock(&pktgen_thread_lock);
3826 list_splice_init(&pn->pktgen_threads, &list);
3827 mutex_unlock(&pktgen_thread_lock);
3828
3829 list_for_each_safe(q, n, &list) {
3830 t = list_entry(q, struct pktgen_thread, th_list);
3831 list_del(&t->th_list);
3832 kthread_stop(t->tsk);
3833 put_task_struct(t->tsk);
3834 kfree(t);
3835 }
3836
3837 remove_proc_entry(PGCTRL, pn->proc_dir);
3838 remove_proc_entry(PG_PROC_DIR, pn->net->proc_net);
3839}
3840
3841static struct pernet_operations pg_net_ops = {
3842 .init = pg_net_init,
3843 .exit = pg_net_exit,
3844 .id = &pg_net_id,
3845 .size = sizeof(struct pktgen_net),
3846};
3847
3848static int __init pg_init(void)
3849{
3850 int ret = 0;
3851
3852 pr_info("%s", version);
3853 ret = register_pernet_subsys(&pg_net_ops);
3854 if (ret)
3855 return ret;
3856 ret = register_netdevice_notifier(&pktgen_notifier_block);
3857 if (ret)
3858 unregister_pernet_subsys(&pg_net_ops);
3859
3860 return ret;
3861}
3862
3863static void __exit pg_cleanup(void)
3864{
3865 unregister_netdevice_notifier(&pktgen_notifier_block);
3866 unregister_pernet_subsys(&pg_net_ops);
3867 /* Don't need rcu_barrier() due to use of kfree_rcu() */
3868}
3869
3870module_init(pg_init);
3871module_exit(pg_cleanup);
3872
3873MODULE_AUTHOR("Robert Olsson <robert.olsson@its.uu.se>");
3874MODULE_DESCRIPTION("Packet Generator tool");
3875MODULE_LICENSE("GPL");
3876MODULE_VERSION(VERSION);
3877module_param(pg_count_d, int, 0);
3878MODULE_PARM_DESC(pg_count_d, "Default number of packets to inject");
3879module_param(pg_delay_d, int, 0);
3880MODULE_PARM_DESC(pg_delay_d, "Default delay between packets (nanoseconds)");
3881module_param(pg_clone_skb_d, int, 0);
3882MODULE_PARM_DESC(pg_clone_skb_d, "Default number of copies of the same packet");
3883module_param(debug, int, 0);
3884MODULE_PARM_DESC(debug, "Enable debugging of pktgen module");
1/*
2 * Authors:
3 * Copyright 2001, 2002 by Robert Olsson <robert.olsson@its.uu.se>
4 * Uppsala University and
5 * Swedish University of Agricultural Sciences
6 *
7 * Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
8 * Ben Greear <greearb@candelatech.com>
9 * Jens Låås <jens.laas@data.slu.se>
10 *
11 * This program is free software; you can redistribute it and/or
12 * modify it under the terms of the GNU General Public License
13 * as published by the Free Software Foundation; either version
14 * 2 of the License, or (at your option) any later version.
15 *
16 *
17 * A tool for loading the network with preconfigurated packets.
18 * The tool is implemented as a linux module. Parameters are output
19 * device, delay (to hard_xmit), number of packets, and whether
20 * to use multiple SKBs or just the same one.
21 * pktgen uses the installed interface's output routine.
22 *
23 * Additional hacking by:
24 *
25 * Jens.Laas@data.slu.se
26 * Improved by ANK. 010120.
27 * Improved by ANK even more. 010212.
28 * MAC address typo fixed. 010417 --ro
29 * Integrated. 020301 --DaveM
30 * Added multiskb option 020301 --DaveM
31 * Scaling of results. 020417--sigurdur@linpro.no
32 * Significant re-work of the module:
33 * * Convert to threaded model to more efficiently be able to transmit
34 * and receive on multiple interfaces at once.
35 * * Converted many counters to __u64 to allow longer runs.
36 * * Allow configuration of ranges, like min/max IP address, MACs,
37 * and UDP-ports, for both source and destination, and can
38 * set to use a random distribution or sequentially walk the range.
39 * * Can now change most values after starting.
40 * * Place 12-byte packet in UDP payload with magic number,
41 * sequence number, and timestamp.
42 * * Add receiver code that detects dropped pkts, re-ordered pkts, and
43 * latencies (with micro-second) precision.
44 * * Add IOCTL interface to easily get counters & configuration.
45 * --Ben Greear <greearb@candelatech.com>
46 *
47 * Renamed multiskb to clone_skb and cleaned up sending core for two distinct
48 * skb modes. A clone_skb=0 mode for Ben "ranges" work and a clone_skb != 0
49 * as a "fastpath" with a configurable number of clones after alloc's.
50 * clone_skb=0 means all packets are allocated this also means ranges time
51 * stamps etc can be used. clone_skb=100 means 1 malloc is followed by 100
52 * clones.
53 *
54 * Also moved to /proc/net/pktgen/
55 * --ro
56 *
57 * Sept 10: Fixed threading/locking. Lots of bone-headed and more clever
58 * mistakes. Also merged in DaveM's patch in the -pre6 patch.
59 * --Ben Greear <greearb@candelatech.com>
60 *
61 * Integrated to 2.5.x 021029 --Lucio Maciel (luciomaciel@zipmail.com.br)
62 *
63 *
64 * 021124 Finished major redesign and rewrite for new functionality.
65 * See Documentation/networking/pktgen.txt for how to use this.
66 *
67 * The new operation:
68 * For each CPU one thread/process is created at start. This process checks
69 * for running devices in the if_list and sends packets until count is 0 it
70 * also the thread checks the thread->control which is used for inter-process
71 * communication. controlling process "posts" operations to the threads this
72 * way.
73 * The if_list is RCU protected, and the if_lock remains to protect updating
74 * of if_list, from "add_device" as it invoked from userspace (via proc write).
75 *
76 * By design there should only be *one* "controlling" process. In practice
77 * multiple write accesses gives unpredictable result. Understood by "write"
78 * to /proc gives result code thats should be read be the "writer".
79 * For practical use this should be no problem.
80 *
81 * Note when adding devices to a specific CPU there good idea to also assign
82 * /proc/irq/XX/smp_affinity so TX-interrupts gets bound to the same CPU.
83 * --ro
84 *
85 * Fix refcount off by one if first packet fails, potential null deref,
86 * memleak 030710- KJP
87 *
88 * First "ranges" functionality for ipv6 030726 --ro
89 *
90 * Included flow support. 030802 ANK.
91 *
92 * Fixed unaligned access on IA-64 Grant Grundler <grundler@parisc-linux.org>
93 *
94 * Remove if fix from added Harald Welte <laforge@netfilter.org> 040419
95 * ia64 compilation fix from Aron Griffis <aron@hp.com> 040604
96 *
97 * New xmit() return, do_div and misc clean up by Stephen Hemminger
98 * <shemminger@osdl.org> 040923
99 *
100 * Randy Dunlap fixed u64 printk compiler warning
101 *
102 * Remove FCS from BW calculation. Lennert Buytenhek <buytenh@wantstofly.org>
103 * New time handling. Lennert Buytenhek <buytenh@wantstofly.org> 041213
104 *
105 * Corrections from Nikolai Malykh (nmalykh@bilim.com)
106 * Removed unused flags F_SET_SRCMAC & F_SET_SRCIP 041230
107 *
108 * interruptible_sleep_on_timeout() replaced Nishanth Aravamudan <nacc@us.ibm.com>
109 * 050103
110 *
111 * MPLS support by Steven Whitehouse <steve@chygwyn.com>
112 *
113 * 802.1Q/Q-in-Q support by Francesco Fondelli (FF) <francesco.fondelli@gmail.com>
114 *
115 * Fixed src_mac command to set source mac of packet to value specified in
116 * command by Adit Ranadive <adit.262@gmail.com>
117 *
118 */
119
120#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
121
122#include <linux/sys.h>
123#include <linux/types.h>
124#include <linux/module.h>
125#include <linux/moduleparam.h>
126#include <linux/kernel.h>
127#include <linux/mutex.h>
128#include <linux/sched.h>
129#include <linux/slab.h>
130#include <linux/vmalloc.h>
131#include <linux/unistd.h>
132#include <linux/string.h>
133#include <linux/ptrace.h>
134#include <linux/errno.h>
135#include <linux/ioport.h>
136#include <linux/interrupt.h>
137#include <linux/capability.h>
138#include <linux/hrtimer.h>
139#include <linux/freezer.h>
140#include <linux/delay.h>
141#include <linux/timer.h>
142#include <linux/list.h>
143#include <linux/init.h>
144#include <linux/skbuff.h>
145#include <linux/netdevice.h>
146#include <linux/inet.h>
147#include <linux/inetdevice.h>
148#include <linux/rtnetlink.h>
149#include <linux/if_arp.h>
150#include <linux/if_vlan.h>
151#include <linux/in.h>
152#include <linux/ip.h>
153#include <linux/ipv6.h>
154#include <linux/udp.h>
155#include <linux/proc_fs.h>
156#include <linux/seq_file.h>
157#include <linux/wait.h>
158#include <linux/etherdevice.h>
159#include <linux/kthread.h>
160#include <linux/prefetch.h>
161#include <net/net_namespace.h>
162#include <net/checksum.h>
163#include <net/ipv6.h>
164#include <net/udp.h>
165#include <net/ip6_checksum.h>
166#include <net/addrconf.h>
167#ifdef CONFIG_XFRM
168#include <net/xfrm.h>
169#endif
170#include <net/netns/generic.h>
171#include <asm/byteorder.h>
172#include <linux/rcupdate.h>
173#include <linux/bitops.h>
174#include <linux/io.h>
175#include <linux/timex.h>
176#include <linux/uaccess.h>
177#include <asm/dma.h>
178#include <asm/div64.h> /* do_div */
179
180#define VERSION "2.75"
181#define IP_NAME_SZ 32
182#define MAX_MPLS_LABELS 16 /* This is the max label stack depth */
183#define MPLS_STACK_BOTTOM htonl(0x00000100)
184
185#define func_enter() pr_debug("entering %s\n", __func__);
186
187#define PKT_FLAGS \
188 pf(IPV6) /* Interface in IPV6 Mode */ \
189 pf(IPSRC_RND) /* IP-Src Random */ \
190 pf(IPDST_RND) /* IP-Dst Random */ \
191 pf(TXSIZE_RND) /* Transmit size is random */ \
192 pf(UDPSRC_RND) /* UDP-Src Random */ \
193 pf(UDPDST_RND) /* UDP-Dst Random */ \
194 pf(UDPCSUM) /* Include UDP checksum */ \
195 pf(NO_TIMESTAMP) /* Don't timestamp packets (default TS) */ \
196 pf(MPLS_RND) /* Random MPLS labels */ \
197 pf(QUEUE_MAP_RND) /* queue map Random */ \
198 pf(QUEUE_MAP_CPU) /* queue map mirrors smp_processor_id() */ \
199 pf(FLOW_SEQ) /* Sequential flows */ \
200 pf(IPSEC) /* ipsec on for flows */ \
201 pf(MACSRC_RND) /* MAC-Src Random */ \
202 pf(MACDST_RND) /* MAC-Dst Random */ \
203 pf(VID_RND) /* Random VLAN ID */ \
204 pf(SVID_RND) /* Random SVLAN ID */ \
205 pf(NODE) /* Node memory alloc*/ \
206
207#define pf(flag) flag##_SHIFT,
208enum pkt_flags {
209 PKT_FLAGS
210};
211#undef pf
212
213/* Device flag bits */
214#define pf(flag) static const __u32 F_##flag = (1<<flag##_SHIFT);
215PKT_FLAGS
216#undef pf
217
218#define pf(flag) __stringify(flag),
219static char *pkt_flag_names[] = {
220 PKT_FLAGS
221};
222#undef pf
223
224#define NR_PKT_FLAGS ARRAY_SIZE(pkt_flag_names)
225
226/* Thread control flag bits */
227#define T_STOP (1<<0) /* Stop run */
228#define T_RUN (1<<1) /* Start run */
229#define T_REMDEVALL (1<<2) /* Remove all devs */
230#define T_REMDEV (1<<3) /* Remove one dev */
231
232/* Xmit modes */
233#define M_START_XMIT 0 /* Default normal TX */
234#define M_NETIF_RECEIVE 1 /* Inject packets into stack */
235#define M_QUEUE_XMIT 2 /* Inject packet into qdisc */
236
237/* If lock -- protects updating of if_list */
238#define if_lock(t) mutex_lock(&(t->if_lock));
239#define if_unlock(t) mutex_unlock(&(t->if_lock));
240
241/* Used to help with determining the pkts on receive */
242#define PKTGEN_MAGIC 0xbe9be955
243#define PG_PROC_DIR "pktgen"
244#define PGCTRL "pgctrl"
245
246#define MAX_CFLOWS 65536
247
248#define VLAN_TAG_SIZE(x) ((x)->vlan_id == 0xffff ? 0 : 4)
249#define SVLAN_TAG_SIZE(x) ((x)->svlan_id == 0xffff ? 0 : 4)
250
251struct flow_state {
252 __be32 cur_daddr;
253 int count;
254#ifdef CONFIG_XFRM
255 struct xfrm_state *x;
256#endif
257 __u32 flags;
258};
259
260/* flow flag bits */
261#define F_INIT (1<<0) /* flow has been initialized */
262
263struct pktgen_dev {
264 /*
265 * Try to keep frequent/infrequent used vars. separated.
266 */
267 struct proc_dir_entry *entry; /* proc file */
268 struct pktgen_thread *pg_thread;/* the owner */
269 struct list_head list; /* chaining in the thread's run-queue */
270 struct rcu_head rcu; /* freed by RCU */
271
272 int running; /* if false, the test will stop */
273
274 /* If min != max, then we will either do a linear iteration, or
275 * we will do a random selection from within the range.
276 */
277 __u32 flags;
278 int xmit_mode;
279 int min_pkt_size;
280 int max_pkt_size;
281 int pkt_overhead; /* overhead for MPLS, VLANs, IPSEC etc */
282 int nfrags;
283 int removal_mark; /* non-zero => the device is marked for
284 * removal by worker thread */
285
286 struct page *page;
287 u64 delay; /* nano-seconds */
288
289 __u64 count; /* Default No packets to send */
290 __u64 sofar; /* How many pkts we've sent so far */
291 __u64 tx_bytes; /* How many bytes we've transmitted */
292 __u64 errors; /* Errors when trying to transmit, */
293
294 /* runtime counters relating to clone_skb */
295
296 __u32 clone_count;
297 int last_ok; /* Was last skb sent?
298 * Or a failed transmit of some sort?
299 * This will keep sequence numbers in order
300 */
301 ktime_t next_tx;
302 ktime_t started_at;
303 ktime_t stopped_at;
304 u64 idle_acc; /* nano-seconds */
305
306 __u32 seq_num;
307
308 int clone_skb; /*
309 * Use multiple SKBs during packet gen.
310 * If this number is greater than 1, then
311 * that many copies of the same packet will be
312 * sent before a new packet is allocated.
313 * If you want to send 1024 identical packets
314 * before creating a new packet,
315 * set clone_skb to 1024.
316 */
317
318 char dst_min[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
319 char dst_max[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
320 char src_min[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
321 char src_max[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
322
323 struct in6_addr in6_saddr;
324 struct in6_addr in6_daddr;
325 struct in6_addr cur_in6_daddr;
326 struct in6_addr cur_in6_saddr;
327 /* For ranges */
328 struct in6_addr min_in6_daddr;
329 struct in6_addr max_in6_daddr;
330 struct in6_addr min_in6_saddr;
331 struct in6_addr max_in6_saddr;
332
333 /* If we're doing ranges, random or incremental, then this
334 * defines the min/max for those ranges.
335 */
336 __be32 saddr_min; /* inclusive, source IP address */
337 __be32 saddr_max; /* exclusive, source IP address */
338 __be32 daddr_min; /* inclusive, dest IP address */
339 __be32 daddr_max; /* exclusive, dest IP address */
340
341 __u16 udp_src_min; /* inclusive, source UDP port */
342 __u16 udp_src_max; /* exclusive, source UDP port */
343 __u16 udp_dst_min; /* inclusive, dest UDP port */
344 __u16 udp_dst_max; /* exclusive, dest UDP port */
345
346 /* DSCP + ECN */
347 __u8 tos; /* six MSB of (former) IPv4 TOS
348 are for dscp codepoint */
349 __u8 traffic_class; /* ditto for the (former) Traffic Class in IPv6
350 (see RFC 3260, sec. 4) */
351
352 /* MPLS */
353 unsigned int nr_labels; /* Depth of stack, 0 = no MPLS */
354 __be32 labels[MAX_MPLS_LABELS];
355
356 /* VLAN/SVLAN (802.1Q/Q-in-Q) */
357 __u8 vlan_p;
358 __u8 vlan_cfi;
359 __u16 vlan_id; /* 0xffff means no vlan tag */
360
361 __u8 svlan_p;
362 __u8 svlan_cfi;
363 __u16 svlan_id; /* 0xffff means no svlan tag */
364
365 __u32 src_mac_count; /* How many MACs to iterate through */
366 __u32 dst_mac_count; /* How many MACs to iterate through */
367
368 unsigned char dst_mac[ETH_ALEN];
369 unsigned char src_mac[ETH_ALEN];
370
371 __u32 cur_dst_mac_offset;
372 __u32 cur_src_mac_offset;
373 __be32 cur_saddr;
374 __be32 cur_daddr;
375 __u16 ip_id;
376 __u16 cur_udp_dst;
377 __u16 cur_udp_src;
378 __u16 cur_queue_map;
379 __u32 cur_pkt_size;
380 __u32 last_pkt_size;
381
382 __u8 hh[14];
383 /* = {
384 0x00, 0x80, 0xC8, 0x79, 0xB3, 0xCB,
385
386 We fill in SRC address later
387 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
388 0x08, 0x00
389 };
390 */
391 __u16 pad; /* pad out the hh struct to an even 16 bytes */
392
393 struct sk_buff *skb; /* skb we are to transmit next, used for when we
394 * are transmitting the same one multiple times
395 */
396 struct net_device *odev; /* The out-going device.
397 * Note that the device should have it's
398 * pg_info pointer pointing back to this
399 * device.
400 * Set when the user specifies the out-going
401 * device name (not when the inject is
402 * started as it used to do.)
403 */
404 char odevname[32];
405 struct flow_state *flows;
406 unsigned int cflows; /* Concurrent flows (config) */
407 unsigned int lflow; /* Flow length (config) */
408 unsigned int nflows; /* accumulated flows (stats) */
409 unsigned int curfl; /* current sequenced flow (state)*/
410
411 u16 queue_map_min;
412 u16 queue_map_max;
413 __u32 skb_priority; /* skb priority field */
414 unsigned int burst; /* number of duplicated packets to burst */
415 int node; /* Memory node */
416
417#ifdef CONFIG_XFRM
418 __u8 ipsmode; /* IPSEC mode (config) */
419 __u8 ipsproto; /* IPSEC type (config) */
420 __u32 spi;
421 struct xfrm_dst xdst;
422 struct dst_ops dstops;
423#endif
424 char result[512];
425};
426
427struct pktgen_hdr {
428 __be32 pgh_magic;
429 __be32 seq_num;
430 __be32 tv_sec;
431 __be32 tv_usec;
432};
433
434
435static unsigned int pg_net_id __read_mostly;
436
437struct pktgen_net {
438 struct net *net;
439 struct proc_dir_entry *proc_dir;
440 struct list_head pktgen_threads;
441 bool pktgen_exiting;
442};
443
444struct pktgen_thread {
445 struct mutex if_lock; /* for list of devices */
446 struct list_head if_list; /* All device here */
447 struct list_head th_list;
448 struct task_struct *tsk;
449 char result[512];
450
451 /* Field for thread to receive "posted" events terminate,
452 stop ifs etc. */
453
454 u32 control;
455 int cpu;
456
457 wait_queue_head_t queue;
458 struct completion start_done;
459 struct pktgen_net *net;
460};
461
462#define REMOVE 1
463#define FIND 0
464
465static const char version[] =
466 "Packet Generator for packet performance testing. "
467 "Version: " VERSION "\n";
468
469static int pktgen_remove_device(struct pktgen_thread *t, struct pktgen_dev *i);
470static int pktgen_add_device(struct pktgen_thread *t, const char *ifname);
471static struct pktgen_dev *pktgen_find_dev(struct pktgen_thread *t,
472 const char *ifname, bool exact);
473static int pktgen_device_event(struct notifier_block *, unsigned long, void *);
474static void pktgen_run_all_threads(struct pktgen_net *pn);
475static void pktgen_reset_all_threads(struct pktgen_net *pn);
476static void pktgen_stop_all_threads_ifs(struct pktgen_net *pn);
477
478static void pktgen_stop(struct pktgen_thread *t);
479static void pktgen_clear_counters(struct pktgen_dev *pkt_dev);
480
481/* Module parameters, defaults. */
482static int pg_count_d __read_mostly = 1000;
483static int pg_delay_d __read_mostly;
484static int pg_clone_skb_d __read_mostly;
485static int debug __read_mostly;
486
487static DEFINE_MUTEX(pktgen_thread_lock);
488
489static struct notifier_block pktgen_notifier_block = {
490 .notifier_call = pktgen_device_event,
491};
492
493/*
494 * /proc handling functions
495 *
496 */
497
498static int pgctrl_show(struct seq_file *seq, void *v)
499{
500 seq_puts(seq, version);
501 return 0;
502}
503
504static ssize_t pgctrl_write(struct file *file, const char __user *buf,
505 size_t count, loff_t *ppos)
506{
507 char data[128];
508 struct pktgen_net *pn = net_generic(current->nsproxy->net_ns, pg_net_id);
509
510 if (!capable(CAP_NET_ADMIN))
511 return -EPERM;
512
513 if (count == 0)
514 return -EINVAL;
515
516 if (count > sizeof(data))
517 count = sizeof(data);
518
519 if (copy_from_user(data, buf, count))
520 return -EFAULT;
521
522 data[count - 1] = 0; /* Strip trailing '\n' and terminate string */
523
524 if (!strcmp(data, "stop"))
525 pktgen_stop_all_threads_ifs(pn);
526
527 else if (!strcmp(data, "start"))
528 pktgen_run_all_threads(pn);
529
530 else if (!strcmp(data, "reset"))
531 pktgen_reset_all_threads(pn);
532
533 else
534 return -EINVAL;
535
536 return count;
537}
538
539static int pgctrl_open(struct inode *inode, struct file *file)
540{
541 return single_open(file, pgctrl_show, PDE_DATA(inode));
542}
543
544static const struct file_operations pktgen_fops = {
545 .open = pgctrl_open,
546 .read = seq_read,
547 .llseek = seq_lseek,
548 .write = pgctrl_write,
549 .release = single_release,
550};
551
552static int pktgen_if_show(struct seq_file *seq, void *v)
553{
554 const struct pktgen_dev *pkt_dev = seq->private;
555 ktime_t stopped;
556 unsigned int i;
557 u64 idle;
558
559 seq_printf(seq,
560 "Params: count %llu min_pkt_size: %u max_pkt_size: %u\n",
561 (unsigned long long)pkt_dev->count, pkt_dev->min_pkt_size,
562 pkt_dev->max_pkt_size);
563
564 seq_printf(seq,
565 " frags: %d delay: %llu clone_skb: %d ifname: %s\n",
566 pkt_dev->nfrags, (unsigned long long) pkt_dev->delay,
567 pkt_dev->clone_skb, pkt_dev->odevname);
568
569 seq_printf(seq, " flows: %u flowlen: %u\n", pkt_dev->cflows,
570 pkt_dev->lflow);
571
572 seq_printf(seq,
573 " queue_map_min: %u queue_map_max: %u\n",
574 pkt_dev->queue_map_min,
575 pkt_dev->queue_map_max);
576
577 if (pkt_dev->skb_priority)
578 seq_printf(seq, " skb_priority: %u\n",
579 pkt_dev->skb_priority);
580
581 if (pkt_dev->flags & F_IPV6) {
582 seq_printf(seq,
583 " saddr: %pI6c min_saddr: %pI6c max_saddr: %pI6c\n"
584 " daddr: %pI6c min_daddr: %pI6c max_daddr: %pI6c\n",
585 &pkt_dev->in6_saddr,
586 &pkt_dev->min_in6_saddr, &pkt_dev->max_in6_saddr,
587 &pkt_dev->in6_daddr,
588 &pkt_dev->min_in6_daddr, &pkt_dev->max_in6_daddr);
589 } else {
590 seq_printf(seq,
591 " dst_min: %s dst_max: %s\n",
592 pkt_dev->dst_min, pkt_dev->dst_max);
593 seq_printf(seq,
594 " src_min: %s src_max: %s\n",
595 pkt_dev->src_min, pkt_dev->src_max);
596 }
597
598 seq_puts(seq, " src_mac: ");
599
600 seq_printf(seq, "%pM ",
601 is_zero_ether_addr(pkt_dev->src_mac) ?
602 pkt_dev->odev->dev_addr : pkt_dev->src_mac);
603
604 seq_puts(seq, "dst_mac: ");
605 seq_printf(seq, "%pM\n", pkt_dev->dst_mac);
606
607 seq_printf(seq,
608 " udp_src_min: %d udp_src_max: %d"
609 " udp_dst_min: %d udp_dst_max: %d\n",
610 pkt_dev->udp_src_min, pkt_dev->udp_src_max,
611 pkt_dev->udp_dst_min, pkt_dev->udp_dst_max);
612
613 seq_printf(seq,
614 " src_mac_count: %d dst_mac_count: %d\n",
615 pkt_dev->src_mac_count, pkt_dev->dst_mac_count);
616
617 if (pkt_dev->nr_labels) {
618 seq_puts(seq, " mpls: ");
619 for (i = 0; i < pkt_dev->nr_labels; i++)
620 seq_printf(seq, "%08x%s", ntohl(pkt_dev->labels[i]),
621 i == pkt_dev->nr_labels-1 ? "\n" : ", ");
622 }
623
624 if (pkt_dev->vlan_id != 0xffff)
625 seq_printf(seq, " vlan_id: %u vlan_p: %u vlan_cfi: %u\n",
626 pkt_dev->vlan_id, pkt_dev->vlan_p,
627 pkt_dev->vlan_cfi);
628
629 if (pkt_dev->svlan_id != 0xffff)
630 seq_printf(seq, " svlan_id: %u vlan_p: %u vlan_cfi: %u\n",
631 pkt_dev->svlan_id, pkt_dev->svlan_p,
632 pkt_dev->svlan_cfi);
633
634 if (pkt_dev->tos)
635 seq_printf(seq, " tos: 0x%02x\n", pkt_dev->tos);
636
637 if (pkt_dev->traffic_class)
638 seq_printf(seq, " traffic_class: 0x%02x\n", pkt_dev->traffic_class);
639
640 if (pkt_dev->burst > 1)
641 seq_printf(seq, " burst: %d\n", pkt_dev->burst);
642
643 if (pkt_dev->node >= 0)
644 seq_printf(seq, " node: %d\n", pkt_dev->node);
645
646 if (pkt_dev->xmit_mode == M_NETIF_RECEIVE)
647 seq_puts(seq, " xmit_mode: netif_receive\n");
648 else if (pkt_dev->xmit_mode == M_QUEUE_XMIT)
649 seq_puts(seq, " xmit_mode: xmit_queue\n");
650
651 seq_puts(seq, " Flags: ");
652
653 for (i = 0; i < NR_PKT_FLAGS; i++) {
654 if (i == F_FLOW_SEQ)
655 if (!pkt_dev->cflows)
656 continue;
657
658 if (pkt_dev->flags & (1 << i))
659 seq_printf(seq, "%s ", pkt_flag_names[i]);
660 else if (i == F_FLOW_SEQ)
661 seq_puts(seq, "FLOW_RND ");
662
663#ifdef CONFIG_XFRM
664 if (i == F_IPSEC && pkt_dev->spi)
665 seq_printf(seq, "spi:%u", pkt_dev->spi);
666#endif
667 }
668
669 seq_puts(seq, "\n");
670
671 /* not really stopped, more like last-running-at */
672 stopped = pkt_dev->running ? ktime_get() : pkt_dev->stopped_at;
673 idle = pkt_dev->idle_acc;
674 do_div(idle, NSEC_PER_USEC);
675
676 seq_printf(seq,
677 "Current:\n pkts-sofar: %llu errors: %llu\n",
678 (unsigned long long)pkt_dev->sofar,
679 (unsigned long long)pkt_dev->errors);
680
681 seq_printf(seq,
682 " started: %lluus stopped: %lluus idle: %lluus\n",
683 (unsigned long long) ktime_to_us(pkt_dev->started_at),
684 (unsigned long long) ktime_to_us(stopped),
685 (unsigned long long) idle);
686
687 seq_printf(seq,
688 " seq_num: %d cur_dst_mac_offset: %d cur_src_mac_offset: %d\n",
689 pkt_dev->seq_num, pkt_dev->cur_dst_mac_offset,
690 pkt_dev->cur_src_mac_offset);
691
692 if (pkt_dev->flags & F_IPV6) {
693 seq_printf(seq, " cur_saddr: %pI6c cur_daddr: %pI6c\n",
694 &pkt_dev->cur_in6_saddr,
695 &pkt_dev->cur_in6_daddr);
696 } else
697 seq_printf(seq, " cur_saddr: %pI4 cur_daddr: %pI4\n",
698 &pkt_dev->cur_saddr, &pkt_dev->cur_daddr);
699
700 seq_printf(seq, " cur_udp_dst: %d cur_udp_src: %d\n",
701 pkt_dev->cur_udp_dst, pkt_dev->cur_udp_src);
702
703 seq_printf(seq, " cur_queue_map: %u\n", pkt_dev->cur_queue_map);
704
705 seq_printf(seq, " flows: %u\n", pkt_dev->nflows);
706
707 if (pkt_dev->result[0])
708 seq_printf(seq, "Result: %s\n", pkt_dev->result);
709 else
710 seq_puts(seq, "Result: Idle\n");
711
712 return 0;
713}
714
715
716static int hex32_arg(const char __user *user_buffer, unsigned long maxlen,
717 __u32 *num)
718{
719 int i = 0;
720 *num = 0;
721
722 for (; i < maxlen; i++) {
723 int value;
724 char c;
725 *num <<= 4;
726 if (get_user(c, &user_buffer[i]))
727 return -EFAULT;
728 value = hex_to_bin(c);
729 if (value >= 0)
730 *num |= value;
731 else
732 break;
733 }
734 return i;
735}
736
737static int count_trail_chars(const char __user * user_buffer,
738 unsigned int maxlen)
739{
740 int i;
741
742 for (i = 0; i < maxlen; i++) {
743 char c;
744 if (get_user(c, &user_buffer[i]))
745 return -EFAULT;
746 switch (c) {
747 case '\"':
748 case '\n':
749 case '\r':
750 case '\t':
751 case ' ':
752 case '=':
753 break;
754 default:
755 goto done;
756 }
757 }
758done:
759 return i;
760}
761
762static long num_arg(const char __user *user_buffer, unsigned long maxlen,
763 unsigned long *num)
764{
765 int i;
766 *num = 0;
767
768 for (i = 0; i < maxlen; i++) {
769 char c;
770 if (get_user(c, &user_buffer[i]))
771 return -EFAULT;
772 if ((c >= '0') && (c <= '9')) {
773 *num *= 10;
774 *num += c - '0';
775 } else
776 break;
777 }
778 return i;
779}
780
781static int strn_len(const char __user * user_buffer, unsigned int maxlen)
782{
783 int i;
784
785 for (i = 0; i < maxlen; i++) {
786 char c;
787 if (get_user(c, &user_buffer[i]))
788 return -EFAULT;
789 switch (c) {
790 case '\"':
791 case '\n':
792 case '\r':
793 case '\t':
794 case ' ':
795 goto done_str;
796 default:
797 break;
798 }
799 }
800done_str:
801 return i;
802}
803
804static ssize_t get_labels(const char __user *buffer, struct pktgen_dev *pkt_dev)
805{
806 unsigned int n = 0;
807 char c;
808 ssize_t i = 0;
809 int len;
810
811 pkt_dev->nr_labels = 0;
812 do {
813 __u32 tmp;
814 len = hex32_arg(&buffer[i], 8, &tmp);
815 if (len <= 0)
816 return len;
817 pkt_dev->labels[n] = htonl(tmp);
818 if (pkt_dev->labels[n] & MPLS_STACK_BOTTOM)
819 pkt_dev->flags |= F_MPLS_RND;
820 i += len;
821 if (get_user(c, &buffer[i]))
822 return -EFAULT;
823 i++;
824 n++;
825 if (n >= MAX_MPLS_LABELS)
826 return -E2BIG;
827 } while (c == ',');
828
829 pkt_dev->nr_labels = n;
830 return i;
831}
832
833static __u32 pktgen_read_flag(const char *f, bool *disable)
834{
835 __u32 i;
836
837 if (f[0] == '!') {
838 *disable = true;
839 f++;
840 }
841
842 for (i = 0; i < NR_PKT_FLAGS; i++) {
843 if (!IS_ENABLED(CONFIG_XFRM) && i == IPSEC_SHIFT)
844 continue;
845
846 /* allow only disabling ipv6 flag */
847 if (!*disable && i == IPV6_SHIFT)
848 continue;
849
850 if (strcmp(f, pkt_flag_names[i]) == 0)
851 return 1 << i;
852 }
853
854 if (strcmp(f, "FLOW_RND") == 0) {
855 *disable = !*disable;
856 return F_FLOW_SEQ;
857 }
858
859 return 0;
860}
861
862static ssize_t pktgen_if_write(struct file *file,
863 const char __user * user_buffer, size_t count,
864 loff_t * offset)
865{
866 struct seq_file *seq = file->private_data;
867 struct pktgen_dev *pkt_dev = seq->private;
868 int i, max, len;
869 char name[16], valstr[32];
870 unsigned long value = 0;
871 char *pg_result = NULL;
872 int tmp = 0;
873 char buf[128];
874
875 pg_result = &(pkt_dev->result[0]);
876
877 if (count < 1) {
878 pr_warn("wrong command format\n");
879 return -EINVAL;
880 }
881
882 max = count;
883 tmp = count_trail_chars(user_buffer, max);
884 if (tmp < 0) {
885 pr_warn("illegal format\n");
886 return tmp;
887 }
888 i = tmp;
889
890 /* Read variable name */
891
892 len = strn_len(&user_buffer[i], sizeof(name) - 1);
893 if (len < 0)
894 return len;
895
896 memset(name, 0, sizeof(name));
897 if (copy_from_user(name, &user_buffer[i], len))
898 return -EFAULT;
899 i += len;
900
901 max = count - i;
902 len = count_trail_chars(&user_buffer[i], max);
903 if (len < 0)
904 return len;
905
906 i += len;
907
908 if (debug) {
909 size_t copy = min_t(size_t, count + 1, 1024);
910 char *tp = strndup_user(user_buffer, copy);
911
912 if (IS_ERR(tp))
913 return PTR_ERR(tp);
914
915 pr_debug("%s,%zu buffer -:%s:-\n", name, count, tp);
916 kfree(tp);
917 }
918
919 if (!strcmp(name, "min_pkt_size")) {
920 len = num_arg(&user_buffer[i], 10, &value);
921 if (len < 0)
922 return len;
923
924 i += len;
925 if (value < 14 + 20 + 8)
926 value = 14 + 20 + 8;
927 if (value != pkt_dev->min_pkt_size) {
928 pkt_dev->min_pkt_size = value;
929 pkt_dev->cur_pkt_size = value;
930 }
931 sprintf(pg_result, "OK: min_pkt_size=%u",
932 pkt_dev->min_pkt_size);
933 return count;
934 }
935
936 if (!strcmp(name, "max_pkt_size")) {
937 len = num_arg(&user_buffer[i], 10, &value);
938 if (len < 0)
939 return len;
940
941 i += len;
942 if (value < 14 + 20 + 8)
943 value = 14 + 20 + 8;
944 if (value != pkt_dev->max_pkt_size) {
945 pkt_dev->max_pkt_size = value;
946 pkt_dev->cur_pkt_size = value;
947 }
948 sprintf(pg_result, "OK: max_pkt_size=%u",
949 pkt_dev->max_pkt_size);
950 return count;
951 }
952
953 /* Shortcut for min = max */
954
955 if (!strcmp(name, "pkt_size")) {
956 len = num_arg(&user_buffer[i], 10, &value);
957 if (len < 0)
958 return len;
959
960 i += len;
961 if (value < 14 + 20 + 8)
962 value = 14 + 20 + 8;
963 if (value != pkt_dev->min_pkt_size) {
964 pkt_dev->min_pkt_size = value;
965 pkt_dev->max_pkt_size = value;
966 pkt_dev->cur_pkt_size = value;
967 }
968 sprintf(pg_result, "OK: pkt_size=%u", pkt_dev->min_pkt_size);
969 return count;
970 }
971
972 if (!strcmp(name, "debug")) {
973 len = num_arg(&user_buffer[i], 10, &value);
974 if (len < 0)
975 return len;
976
977 i += len;
978 debug = value;
979 sprintf(pg_result, "OK: debug=%u", debug);
980 return count;
981 }
982
983 if (!strcmp(name, "frags")) {
984 len = num_arg(&user_buffer[i], 10, &value);
985 if (len < 0)
986 return len;
987
988 i += len;
989 pkt_dev->nfrags = value;
990 sprintf(pg_result, "OK: frags=%u", pkt_dev->nfrags);
991 return count;
992 }
993 if (!strcmp(name, "delay")) {
994 len = num_arg(&user_buffer[i], 10, &value);
995 if (len < 0)
996 return len;
997
998 i += len;
999 if (value == 0x7FFFFFFF)
1000 pkt_dev->delay = ULLONG_MAX;
1001 else
1002 pkt_dev->delay = (u64)value;
1003
1004 sprintf(pg_result, "OK: delay=%llu",
1005 (unsigned long long) pkt_dev->delay);
1006 return count;
1007 }
1008 if (!strcmp(name, "rate")) {
1009 len = num_arg(&user_buffer[i], 10, &value);
1010 if (len < 0)
1011 return len;
1012
1013 i += len;
1014 if (!value)
1015 return len;
1016 pkt_dev->delay = pkt_dev->min_pkt_size*8*NSEC_PER_USEC/value;
1017 if (debug)
1018 pr_info("Delay set at: %llu ns\n", pkt_dev->delay);
1019
1020 sprintf(pg_result, "OK: rate=%lu", value);
1021 return count;
1022 }
1023 if (!strcmp(name, "ratep")) {
1024 len = num_arg(&user_buffer[i], 10, &value);
1025 if (len < 0)
1026 return len;
1027
1028 i += len;
1029 if (!value)
1030 return len;
1031 pkt_dev->delay = NSEC_PER_SEC/value;
1032 if (debug)
1033 pr_info("Delay set at: %llu ns\n", pkt_dev->delay);
1034
1035 sprintf(pg_result, "OK: rate=%lu", value);
1036 return count;
1037 }
1038 if (!strcmp(name, "udp_src_min")) {
1039 len = num_arg(&user_buffer[i], 10, &value);
1040 if (len < 0)
1041 return len;
1042
1043 i += len;
1044 if (value != pkt_dev->udp_src_min) {
1045 pkt_dev->udp_src_min = value;
1046 pkt_dev->cur_udp_src = value;
1047 }
1048 sprintf(pg_result, "OK: udp_src_min=%u", pkt_dev->udp_src_min);
1049 return count;
1050 }
1051 if (!strcmp(name, "udp_dst_min")) {
1052 len = num_arg(&user_buffer[i], 10, &value);
1053 if (len < 0)
1054 return len;
1055
1056 i += len;
1057 if (value != pkt_dev->udp_dst_min) {
1058 pkt_dev->udp_dst_min = value;
1059 pkt_dev->cur_udp_dst = value;
1060 }
1061 sprintf(pg_result, "OK: udp_dst_min=%u", pkt_dev->udp_dst_min);
1062 return count;
1063 }
1064 if (!strcmp(name, "udp_src_max")) {
1065 len = num_arg(&user_buffer[i], 10, &value);
1066 if (len < 0)
1067 return len;
1068
1069 i += len;
1070 if (value != pkt_dev->udp_src_max) {
1071 pkt_dev->udp_src_max = value;
1072 pkt_dev->cur_udp_src = value;
1073 }
1074 sprintf(pg_result, "OK: udp_src_max=%u", pkt_dev->udp_src_max);
1075 return count;
1076 }
1077 if (!strcmp(name, "udp_dst_max")) {
1078 len = num_arg(&user_buffer[i], 10, &value);
1079 if (len < 0)
1080 return len;
1081
1082 i += len;
1083 if (value != pkt_dev->udp_dst_max) {
1084 pkt_dev->udp_dst_max = value;
1085 pkt_dev->cur_udp_dst = value;
1086 }
1087 sprintf(pg_result, "OK: udp_dst_max=%u", pkt_dev->udp_dst_max);
1088 return count;
1089 }
1090 if (!strcmp(name, "clone_skb")) {
1091 len = num_arg(&user_buffer[i], 10, &value);
1092 if (len < 0)
1093 return len;
1094 if ((value > 0) &&
1095 ((pkt_dev->xmit_mode == M_NETIF_RECEIVE) ||
1096 !(pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)))
1097 return -ENOTSUPP;
1098 i += len;
1099 pkt_dev->clone_skb = value;
1100
1101 sprintf(pg_result, "OK: clone_skb=%d", pkt_dev->clone_skb);
1102 return count;
1103 }
1104 if (!strcmp(name, "count")) {
1105 len = num_arg(&user_buffer[i], 10, &value);
1106 if (len < 0)
1107 return len;
1108
1109 i += len;
1110 pkt_dev->count = value;
1111 sprintf(pg_result, "OK: count=%llu",
1112 (unsigned long long)pkt_dev->count);
1113 return count;
1114 }
1115 if (!strcmp(name, "src_mac_count")) {
1116 len = num_arg(&user_buffer[i], 10, &value);
1117 if (len < 0)
1118 return len;
1119
1120 i += len;
1121 if (pkt_dev->src_mac_count != value) {
1122 pkt_dev->src_mac_count = value;
1123 pkt_dev->cur_src_mac_offset = 0;
1124 }
1125 sprintf(pg_result, "OK: src_mac_count=%d",
1126 pkt_dev->src_mac_count);
1127 return count;
1128 }
1129 if (!strcmp(name, "dst_mac_count")) {
1130 len = num_arg(&user_buffer[i], 10, &value);
1131 if (len < 0)
1132 return len;
1133
1134 i += len;
1135 if (pkt_dev->dst_mac_count != value) {
1136 pkt_dev->dst_mac_count = value;
1137 pkt_dev->cur_dst_mac_offset = 0;
1138 }
1139 sprintf(pg_result, "OK: dst_mac_count=%d",
1140 pkt_dev->dst_mac_count);
1141 return count;
1142 }
1143 if (!strcmp(name, "burst")) {
1144 len = num_arg(&user_buffer[i], 10, &value);
1145 if (len < 0)
1146 return len;
1147
1148 i += len;
1149 if ((value > 1) &&
1150 ((pkt_dev->xmit_mode == M_QUEUE_XMIT) ||
1151 ((pkt_dev->xmit_mode == M_START_XMIT) &&
1152 (!(pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)))))
1153 return -ENOTSUPP;
1154 pkt_dev->burst = value < 1 ? 1 : value;
1155 sprintf(pg_result, "OK: burst=%d", pkt_dev->burst);
1156 return count;
1157 }
1158 if (!strcmp(name, "node")) {
1159 len = num_arg(&user_buffer[i], 10, &value);
1160 if (len < 0)
1161 return len;
1162
1163 i += len;
1164
1165 if (node_possible(value)) {
1166 pkt_dev->node = value;
1167 sprintf(pg_result, "OK: node=%d", pkt_dev->node);
1168 if (pkt_dev->page) {
1169 put_page(pkt_dev->page);
1170 pkt_dev->page = NULL;
1171 }
1172 }
1173 else
1174 sprintf(pg_result, "ERROR: node not possible");
1175 return count;
1176 }
1177 if (!strcmp(name, "xmit_mode")) {
1178 char f[32];
1179
1180 memset(f, 0, 32);
1181 len = strn_len(&user_buffer[i], sizeof(f) - 1);
1182 if (len < 0)
1183 return len;
1184
1185 if (copy_from_user(f, &user_buffer[i], len))
1186 return -EFAULT;
1187 i += len;
1188
1189 if (strcmp(f, "start_xmit") == 0) {
1190 pkt_dev->xmit_mode = M_START_XMIT;
1191 } else if (strcmp(f, "netif_receive") == 0) {
1192 /* clone_skb set earlier, not supported in this mode */
1193 if (pkt_dev->clone_skb > 0)
1194 return -ENOTSUPP;
1195
1196 pkt_dev->xmit_mode = M_NETIF_RECEIVE;
1197
1198 /* make sure new packet is allocated every time
1199 * pktgen_xmit() is called
1200 */
1201 pkt_dev->last_ok = 1;
1202
1203 /* override clone_skb if user passed default value
1204 * at module loading time
1205 */
1206 pkt_dev->clone_skb = 0;
1207 } else if (strcmp(f, "queue_xmit") == 0) {
1208 pkt_dev->xmit_mode = M_QUEUE_XMIT;
1209 pkt_dev->last_ok = 1;
1210 } else {
1211 sprintf(pg_result,
1212 "xmit_mode -:%s:- unknown\nAvailable modes: %s",
1213 f, "start_xmit, netif_receive\n");
1214 return count;
1215 }
1216 sprintf(pg_result, "OK: xmit_mode=%s", f);
1217 return count;
1218 }
1219 if (!strcmp(name, "flag")) {
1220 __u32 flag;
1221 char f[32];
1222 bool disable = false;
1223
1224 memset(f, 0, 32);
1225 len = strn_len(&user_buffer[i], sizeof(f) - 1);
1226 if (len < 0)
1227 return len;
1228
1229 if (copy_from_user(f, &user_buffer[i], len))
1230 return -EFAULT;
1231 i += len;
1232
1233 flag = pktgen_read_flag(f, &disable);
1234
1235 if (flag) {
1236 if (disable)
1237 pkt_dev->flags &= ~flag;
1238 else
1239 pkt_dev->flags |= flag;
1240 } else {
1241 sprintf(pg_result,
1242 "Flag -:%s:- unknown\nAvailable flags, (prepend ! to un-set flag):\n%s",
1243 f,
1244 "IPSRC_RND, IPDST_RND, UDPSRC_RND, UDPDST_RND, "
1245 "MACSRC_RND, MACDST_RND, TXSIZE_RND, IPV6, "
1246 "MPLS_RND, VID_RND, SVID_RND, FLOW_SEQ, "
1247 "QUEUE_MAP_RND, QUEUE_MAP_CPU, UDPCSUM, "
1248 "NO_TIMESTAMP, "
1249#ifdef CONFIG_XFRM
1250 "IPSEC, "
1251#endif
1252 "NODE_ALLOC\n");
1253 return count;
1254 }
1255 sprintf(pg_result, "OK: flags=0x%x", pkt_dev->flags);
1256 return count;
1257 }
1258 if (!strcmp(name, "dst_min") || !strcmp(name, "dst")) {
1259 len = strn_len(&user_buffer[i], sizeof(pkt_dev->dst_min) - 1);
1260 if (len < 0)
1261 return len;
1262
1263 if (copy_from_user(buf, &user_buffer[i], len))
1264 return -EFAULT;
1265 buf[len] = 0;
1266 if (strcmp(buf, pkt_dev->dst_min) != 0) {
1267 memset(pkt_dev->dst_min, 0, sizeof(pkt_dev->dst_min));
1268 strncpy(pkt_dev->dst_min, buf, len);
1269 pkt_dev->daddr_min = in_aton(pkt_dev->dst_min);
1270 pkt_dev->cur_daddr = pkt_dev->daddr_min;
1271 }
1272 if (debug)
1273 pr_debug("dst_min set to: %s\n", pkt_dev->dst_min);
1274 i += len;
1275 sprintf(pg_result, "OK: dst_min=%s", pkt_dev->dst_min);
1276 return count;
1277 }
1278 if (!strcmp(name, "dst_max")) {
1279 len = strn_len(&user_buffer[i], sizeof(pkt_dev->dst_max) - 1);
1280 if (len < 0)
1281 return len;
1282
1283
1284 if (copy_from_user(buf, &user_buffer[i], len))
1285 return -EFAULT;
1286
1287 buf[len] = 0;
1288 if (strcmp(buf, pkt_dev->dst_max) != 0) {
1289 memset(pkt_dev->dst_max, 0, sizeof(pkt_dev->dst_max));
1290 strncpy(pkt_dev->dst_max, buf, len);
1291 pkt_dev->daddr_max = in_aton(pkt_dev->dst_max);
1292 pkt_dev->cur_daddr = pkt_dev->daddr_max;
1293 }
1294 if (debug)
1295 pr_debug("dst_max set to: %s\n", pkt_dev->dst_max);
1296 i += len;
1297 sprintf(pg_result, "OK: dst_max=%s", pkt_dev->dst_max);
1298 return count;
1299 }
1300 if (!strcmp(name, "dst6")) {
1301 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
1302 if (len < 0)
1303 return len;
1304
1305 pkt_dev->flags |= F_IPV6;
1306
1307 if (copy_from_user(buf, &user_buffer[i], len))
1308 return -EFAULT;
1309 buf[len] = 0;
1310
1311 in6_pton(buf, -1, pkt_dev->in6_daddr.s6_addr, -1, NULL);
1312 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->in6_daddr);
1313
1314 pkt_dev->cur_in6_daddr = pkt_dev->in6_daddr;
1315
1316 if (debug)
1317 pr_debug("dst6 set to: %s\n", buf);
1318
1319 i += len;
1320 sprintf(pg_result, "OK: dst6=%s", buf);
1321 return count;
1322 }
1323 if (!strcmp(name, "dst6_min")) {
1324 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
1325 if (len < 0)
1326 return len;
1327
1328 pkt_dev->flags |= F_IPV6;
1329
1330 if (copy_from_user(buf, &user_buffer[i], len))
1331 return -EFAULT;
1332 buf[len] = 0;
1333
1334 in6_pton(buf, -1, pkt_dev->min_in6_daddr.s6_addr, -1, NULL);
1335 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->min_in6_daddr);
1336
1337 pkt_dev->cur_in6_daddr = pkt_dev->min_in6_daddr;
1338 if (debug)
1339 pr_debug("dst6_min set to: %s\n", buf);
1340
1341 i += len;
1342 sprintf(pg_result, "OK: dst6_min=%s", buf);
1343 return count;
1344 }
1345 if (!strcmp(name, "dst6_max")) {
1346 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
1347 if (len < 0)
1348 return len;
1349
1350 pkt_dev->flags |= F_IPV6;
1351
1352 if (copy_from_user(buf, &user_buffer[i], len))
1353 return -EFAULT;
1354 buf[len] = 0;
1355
1356 in6_pton(buf, -1, pkt_dev->max_in6_daddr.s6_addr, -1, NULL);
1357 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->max_in6_daddr);
1358
1359 if (debug)
1360 pr_debug("dst6_max set to: %s\n", buf);
1361
1362 i += len;
1363 sprintf(pg_result, "OK: dst6_max=%s", buf);
1364 return count;
1365 }
1366 if (!strcmp(name, "src6")) {
1367 len = strn_len(&user_buffer[i], sizeof(buf) - 1);
1368 if (len < 0)
1369 return len;
1370
1371 pkt_dev->flags |= F_IPV6;
1372
1373 if (copy_from_user(buf, &user_buffer[i], len))
1374 return -EFAULT;
1375 buf[len] = 0;
1376
1377 in6_pton(buf, -1, pkt_dev->in6_saddr.s6_addr, -1, NULL);
1378 snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->in6_saddr);
1379
1380 pkt_dev->cur_in6_saddr = pkt_dev->in6_saddr;
1381
1382 if (debug)
1383 pr_debug("src6 set to: %s\n", buf);
1384
1385 i += len;
1386 sprintf(pg_result, "OK: src6=%s", buf);
1387 return count;
1388 }
1389 if (!strcmp(name, "src_min")) {
1390 len = strn_len(&user_buffer[i], sizeof(pkt_dev->src_min) - 1);
1391 if (len < 0)
1392 return len;
1393
1394 if (copy_from_user(buf, &user_buffer[i], len))
1395 return -EFAULT;
1396 buf[len] = 0;
1397 if (strcmp(buf, pkt_dev->src_min) != 0) {
1398 memset(pkt_dev->src_min, 0, sizeof(pkt_dev->src_min));
1399 strncpy(pkt_dev->src_min, buf, len);
1400 pkt_dev->saddr_min = in_aton(pkt_dev->src_min);
1401 pkt_dev->cur_saddr = pkt_dev->saddr_min;
1402 }
1403 if (debug)
1404 pr_debug("src_min set to: %s\n", pkt_dev->src_min);
1405 i += len;
1406 sprintf(pg_result, "OK: src_min=%s", pkt_dev->src_min);
1407 return count;
1408 }
1409 if (!strcmp(name, "src_max")) {
1410 len = strn_len(&user_buffer[i], sizeof(pkt_dev->src_max) - 1);
1411 if (len < 0)
1412 return len;
1413
1414 if (copy_from_user(buf, &user_buffer[i], len))
1415 return -EFAULT;
1416 buf[len] = 0;
1417 if (strcmp(buf, pkt_dev->src_max) != 0) {
1418 memset(pkt_dev->src_max, 0, sizeof(pkt_dev->src_max));
1419 strncpy(pkt_dev->src_max, buf, len);
1420 pkt_dev->saddr_max = in_aton(pkt_dev->src_max);
1421 pkt_dev->cur_saddr = pkt_dev->saddr_max;
1422 }
1423 if (debug)
1424 pr_debug("src_max set to: %s\n", pkt_dev->src_max);
1425 i += len;
1426 sprintf(pg_result, "OK: src_max=%s", pkt_dev->src_max);
1427 return count;
1428 }
1429 if (!strcmp(name, "dst_mac")) {
1430 len = strn_len(&user_buffer[i], sizeof(valstr) - 1);
1431 if (len < 0)
1432 return len;
1433
1434 memset(valstr, 0, sizeof(valstr));
1435 if (copy_from_user(valstr, &user_buffer[i], len))
1436 return -EFAULT;
1437
1438 if (!mac_pton(valstr, pkt_dev->dst_mac))
1439 return -EINVAL;
1440 /* Set up Dest MAC */
1441 ether_addr_copy(&pkt_dev->hh[0], pkt_dev->dst_mac);
1442
1443 sprintf(pg_result, "OK: dstmac %pM", pkt_dev->dst_mac);
1444 return count;
1445 }
1446 if (!strcmp(name, "src_mac")) {
1447 len = strn_len(&user_buffer[i], sizeof(valstr) - 1);
1448 if (len < 0)
1449 return len;
1450
1451 memset(valstr, 0, sizeof(valstr));
1452 if (copy_from_user(valstr, &user_buffer[i], len))
1453 return -EFAULT;
1454
1455 if (!mac_pton(valstr, pkt_dev->src_mac))
1456 return -EINVAL;
1457 /* Set up Src MAC */
1458 ether_addr_copy(&pkt_dev->hh[6], pkt_dev->src_mac);
1459
1460 sprintf(pg_result, "OK: srcmac %pM", pkt_dev->src_mac);
1461 return count;
1462 }
1463
1464 if (!strcmp(name, "clear_counters")) {
1465 pktgen_clear_counters(pkt_dev);
1466 sprintf(pg_result, "OK: Clearing counters.\n");
1467 return count;
1468 }
1469
1470 if (!strcmp(name, "flows")) {
1471 len = num_arg(&user_buffer[i], 10, &value);
1472 if (len < 0)
1473 return len;
1474
1475 i += len;
1476 if (value > MAX_CFLOWS)
1477 value = MAX_CFLOWS;
1478
1479 pkt_dev->cflows = value;
1480 sprintf(pg_result, "OK: flows=%u", pkt_dev->cflows);
1481 return count;
1482 }
1483#ifdef CONFIG_XFRM
1484 if (!strcmp(name, "spi")) {
1485 len = num_arg(&user_buffer[i], 10, &value);
1486 if (len < 0)
1487 return len;
1488
1489 i += len;
1490 pkt_dev->spi = value;
1491 sprintf(pg_result, "OK: spi=%u", pkt_dev->spi);
1492 return count;
1493 }
1494#endif
1495 if (!strcmp(name, "flowlen")) {
1496 len = num_arg(&user_buffer[i], 10, &value);
1497 if (len < 0)
1498 return len;
1499
1500 i += len;
1501 pkt_dev->lflow = value;
1502 sprintf(pg_result, "OK: flowlen=%u", pkt_dev->lflow);
1503 return count;
1504 }
1505
1506 if (!strcmp(name, "queue_map_min")) {
1507 len = num_arg(&user_buffer[i], 5, &value);
1508 if (len < 0)
1509 return len;
1510
1511 i += len;
1512 pkt_dev->queue_map_min = value;
1513 sprintf(pg_result, "OK: queue_map_min=%u", pkt_dev->queue_map_min);
1514 return count;
1515 }
1516
1517 if (!strcmp(name, "queue_map_max")) {
1518 len = num_arg(&user_buffer[i], 5, &value);
1519 if (len < 0)
1520 return len;
1521
1522 i += len;
1523 pkt_dev->queue_map_max = value;
1524 sprintf(pg_result, "OK: queue_map_max=%u", pkt_dev->queue_map_max);
1525 return count;
1526 }
1527
1528 if (!strcmp(name, "mpls")) {
1529 unsigned int n, cnt;
1530
1531 len = get_labels(&user_buffer[i], pkt_dev);
1532 if (len < 0)
1533 return len;
1534 i += len;
1535 cnt = sprintf(pg_result, "OK: mpls=");
1536 for (n = 0; n < pkt_dev->nr_labels; n++)
1537 cnt += sprintf(pg_result + cnt,
1538 "%08x%s", ntohl(pkt_dev->labels[n]),
1539 n == pkt_dev->nr_labels-1 ? "" : ",");
1540
1541 if (pkt_dev->nr_labels && pkt_dev->vlan_id != 0xffff) {
1542 pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
1543 pkt_dev->svlan_id = 0xffff;
1544
1545 if (debug)
1546 pr_debug("VLAN/SVLAN auto turned off\n");
1547 }
1548 return count;
1549 }
1550
1551 if (!strcmp(name, "vlan_id")) {
1552 len = num_arg(&user_buffer[i], 4, &value);
1553 if (len < 0)
1554 return len;
1555
1556 i += len;
1557 if (value <= 4095) {
1558 pkt_dev->vlan_id = value; /* turn on VLAN */
1559
1560 if (debug)
1561 pr_debug("VLAN turned on\n");
1562
1563 if (debug && pkt_dev->nr_labels)
1564 pr_debug("MPLS auto turned off\n");
1565
1566 pkt_dev->nr_labels = 0; /* turn off MPLS */
1567 sprintf(pg_result, "OK: vlan_id=%u", pkt_dev->vlan_id);
1568 } else {
1569 pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
1570 pkt_dev->svlan_id = 0xffff;
1571
1572 if (debug)
1573 pr_debug("VLAN/SVLAN turned off\n");
1574 }
1575 return count;
1576 }
1577
1578 if (!strcmp(name, "vlan_p")) {
1579 len = num_arg(&user_buffer[i], 1, &value);
1580 if (len < 0)
1581 return len;
1582
1583 i += len;
1584 if ((value <= 7) && (pkt_dev->vlan_id != 0xffff)) {
1585 pkt_dev->vlan_p = value;
1586 sprintf(pg_result, "OK: vlan_p=%u", pkt_dev->vlan_p);
1587 } else {
1588 sprintf(pg_result, "ERROR: vlan_p must be 0-7");
1589 }
1590 return count;
1591 }
1592
1593 if (!strcmp(name, "vlan_cfi")) {
1594 len = num_arg(&user_buffer[i], 1, &value);
1595 if (len < 0)
1596 return len;
1597
1598 i += len;
1599 if ((value <= 1) && (pkt_dev->vlan_id != 0xffff)) {
1600 pkt_dev->vlan_cfi = value;
1601 sprintf(pg_result, "OK: vlan_cfi=%u", pkt_dev->vlan_cfi);
1602 } else {
1603 sprintf(pg_result, "ERROR: vlan_cfi must be 0-1");
1604 }
1605 return count;
1606 }
1607
1608 if (!strcmp(name, "svlan_id")) {
1609 len = num_arg(&user_buffer[i], 4, &value);
1610 if (len < 0)
1611 return len;
1612
1613 i += len;
1614 if ((value <= 4095) && ((pkt_dev->vlan_id != 0xffff))) {
1615 pkt_dev->svlan_id = value; /* turn on SVLAN */
1616
1617 if (debug)
1618 pr_debug("SVLAN turned on\n");
1619
1620 if (debug && pkt_dev->nr_labels)
1621 pr_debug("MPLS auto turned off\n");
1622
1623 pkt_dev->nr_labels = 0; /* turn off MPLS */
1624 sprintf(pg_result, "OK: svlan_id=%u", pkt_dev->svlan_id);
1625 } else {
1626 pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
1627 pkt_dev->svlan_id = 0xffff;
1628
1629 if (debug)
1630 pr_debug("VLAN/SVLAN turned off\n");
1631 }
1632 return count;
1633 }
1634
1635 if (!strcmp(name, "svlan_p")) {
1636 len = num_arg(&user_buffer[i], 1, &value);
1637 if (len < 0)
1638 return len;
1639
1640 i += len;
1641 if ((value <= 7) && (pkt_dev->svlan_id != 0xffff)) {
1642 pkt_dev->svlan_p = value;
1643 sprintf(pg_result, "OK: svlan_p=%u", pkt_dev->svlan_p);
1644 } else {
1645 sprintf(pg_result, "ERROR: svlan_p must be 0-7");
1646 }
1647 return count;
1648 }
1649
1650 if (!strcmp(name, "svlan_cfi")) {
1651 len = num_arg(&user_buffer[i], 1, &value);
1652 if (len < 0)
1653 return len;
1654
1655 i += len;
1656 if ((value <= 1) && (pkt_dev->svlan_id != 0xffff)) {
1657 pkt_dev->svlan_cfi = value;
1658 sprintf(pg_result, "OK: svlan_cfi=%u", pkt_dev->svlan_cfi);
1659 } else {
1660 sprintf(pg_result, "ERROR: svlan_cfi must be 0-1");
1661 }
1662 return count;
1663 }
1664
1665 if (!strcmp(name, "tos")) {
1666 __u32 tmp_value = 0;
1667 len = hex32_arg(&user_buffer[i], 2, &tmp_value);
1668 if (len < 0)
1669 return len;
1670
1671 i += len;
1672 if (len == 2) {
1673 pkt_dev->tos = tmp_value;
1674 sprintf(pg_result, "OK: tos=0x%02x", pkt_dev->tos);
1675 } else {
1676 sprintf(pg_result, "ERROR: tos must be 00-ff");
1677 }
1678 return count;
1679 }
1680
1681 if (!strcmp(name, "traffic_class")) {
1682 __u32 tmp_value = 0;
1683 len = hex32_arg(&user_buffer[i], 2, &tmp_value);
1684 if (len < 0)
1685 return len;
1686
1687 i += len;
1688 if (len == 2) {
1689 pkt_dev->traffic_class = tmp_value;
1690 sprintf(pg_result, "OK: traffic_class=0x%02x", pkt_dev->traffic_class);
1691 } else {
1692 sprintf(pg_result, "ERROR: traffic_class must be 00-ff");
1693 }
1694 return count;
1695 }
1696
1697 if (!strcmp(name, "skb_priority")) {
1698 len = num_arg(&user_buffer[i], 9, &value);
1699 if (len < 0)
1700 return len;
1701
1702 i += len;
1703 pkt_dev->skb_priority = value;
1704 sprintf(pg_result, "OK: skb_priority=%i",
1705 pkt_dev->skb_priority);
1706 return count;
1707 }
1708
1709 sprintf(pkt_dev->result, "No such parameter \"%s\"", name);
1710 return -EINVAL;
1711}
1712
1713static int pktgen_if_open(struct inode *inode, struct file *file)
1714{
1715 return single_open(file, pktgen_if_show, PDE_DATA(inode));
1716}
1717
1718static const struct file_operations pktgen_if_fops = {
1719 .open = pktgen_if_open,
1720 .read = seq_read,
1721 .llseek = seq_lseek,
1722 .write = pktgen_if_write,
1723 .release = single_release,
1724};
1725
1726static int pktgen_thread_show(struct seq_file *seq, void *v)
1727{
1728 struct pktgen_thread *t = seq->private;
1729 const struct pktgen_dev *pkt_dev;
1730
1731 BUG_ON(!t);
1732
1733 seq_puts(seq, "Running: ");
1734
1735 rcu_read_lock();
1736 list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
1737 if (pkt_dev->running)
1738 seq_printf(seq, "%s ", pkt_dev->odevname);
1739
1740 seq_puts(seq, "\nStopped: ");
1741
1742 list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
1743 if (!pkt_dev->running)
1744 seq_printf(seq, "%s ", pkt_dev->odevname);
1745
1746 if (t->result[0])
1747 seq_printf(seq, "\nResult: %s\n", t->result);
1748 else
1749 seq_puts(seq, "\nResult: NA\n");
1750
1751 rcu_read_unlock();
1752
1753 return 0;
1754}
1755
1756static ssize_t pktgen_thread_write(struct file *file,
1757 const char __user * user_buffer,
1758 size_t count, loff_t * offset)
1759{
1760 struct seq_file *seq = file->private_data;
1761 struct pktgen_thread *t = seq->private;
1762 int i, max, len, ret;
1763 char name[40];
1764 char *pg_result;
1765
1766 if (count < 1) {
1767 // sprintf(pg_result, "Wrong command format");
1768 return -EINVAL;
1769 }
1770
1771 max = count;
1772 len = count_trail_chars(user_buffer, max);
1773 if (len < 0)
1774 return len;
1775
1776 i = len;
1777
1778 /* Read variable name */
1779
1780 len = strn_len(&user_buffer[i], sizeof(name) - 1);
1781 if (len < 0)
1782 return len;
1783
1784 memset(name, 0, sizeof(name));
1785 if (copy_from_user(name, &user_buffer[i], len))
1786 return -EFAULT;
1787 i += len;
1788
1789 max = count - i;
1790 len = count_trail_chars(&user_buffer[i], max);
1791 if (len < 0)
1792 return len;
1793
1794 i += len;
1795
1796 if (debug)
1797 pr_debug("t=%s, count=%lu\n", name, (unsigned long)count);
1798
1799 if (!t) {
1800 pr_err("ERROR: No thread\n");
1801 ret = -EINVAL;
1802 goto out;
1803 }
1804
1805 pg_result = &(t->result[0]);
1806
1807 if (!strcmp(name, "add_device")) {
1808 char f[32];
1809 memset(f, 0, 32);
1810 len = strn_len(&user_buffer[i], sizeof(f) - 1);
1811 if (len < 0) {
1812 ret = len;
1813 goto out;
1814 }
1815 if (copy_from_user(f, &user_buffer[i], len))
1816 return -EFAULT;
1817 i += len;
1818 mutex_lock(&pktgen_thread_lock);
1819 ret = pktgen_add_device(t, f);
1820 mutex_unlock(&pktgen_thread_lock);
1821 if (!ret) {
1822 ret = count;
1823 sprintf(pg_result, "OK: add_device=%s", f);
1824 } else
1825 sprintf(pg_result, "ERROR: can not add device %s", f);
1826 goto out;
1827 }
1828
1829 if (!strcmp(name, "rem_device_all")) {
1830 mutex_lock(&pktgen_thread_lock);
1831 t->control |= T_REMDEVALL;
1832 mutex_unlock(&pktgen_thread_lock);
1833 schedule_timeout_interruptible(msecs_to_jiffies(125)); /* Propagate thread->control */
1834 ret = count;
1835 sprintf(pg_result, "OK: rem_device_all");
1836 goto out;
1837 }
1838
1839 if (!strcmp(name, "max_before_softirq")) {
1840 sprintf(pg_result, "OK: Note! max_before_softirq is obsoleted -- Do not use");
1841 ret = count;
1842 goto out;
1843 }
1844
1845 ret = -EINVAL;
1846out:
1847 return ret;
1848}
1849
1850static int pktgen_thread_open(struct inode *inode, struct file *file)
1851{
1852 return single_open(file, pktgen_thread_show, PDE_DATA(inode));
1853}
1854
1855static const struct file_operations pktgen_thread_fops = {
1856 .open = pktgen_thread_open,
1857 .read = seq_read,
1858 .llseek = seq_lseek,
1859 .write = pktgen_thread_write,
1860 .release = single_release,
1861};
1862
1863/* Think find or remove for NN */
1864static struct pktgen_dev *__pktgen_NN_threads(const struct pktgen_net *pn,
1865 const char *ifname, int remove)
1866{
1867 struct pktgen_thread *t;
1868 struct pktgen_dev *pkt_dev = NULL;
1869 bool exact = (remove == FIND);
1870
1871 list_for_each_entry(t, &pn->pktgen_threads, th_list) {
1872 pkt_dev = pktgen_find_dev(t, ifname, exact);
1873 if (pkt_dev) {
1874 if (remove) {
1875 pkt_dev->removal_mark = 1;
1876 t->control |= T_REMDEV;
1877 }
1878 break;
1879 }
1880 }
1881 return pkt_dev;
1882}
1883
1884/*
1885 * mark a device for removal
1886 */
1887static void pktgen_mark_device(const struct pktgen_net *pn, const char *ifname)
1888{
1889 struct pktgen_dev *pkt_dev = NULL;
1890 const int max_tries = 10, msec_per_try = 125;
1891 int i = 0;
1892
1893 mutex_lock(&pktgen_thread_lock);
1894 pr_debug("%s: marking %s for removal\n", __func__, ifname);
1895
1896 while (1) {
1897
1898 pkt_dev = __pktgen_NN_threads(pn, ifname, REMOVE);
1899 if (pkt_dev == NULL)
1900 break; /* success */
1901
1902 mutex_unlock(&pktgen_thread_lock);
1903 pr_debug("%s: waiting for %s to disappear....\n",
1904 __func__, ifname);
1905 schedule_timeout_interruptible(msecs_to_jiffies(msec_per_try));
1906 mutex_lock(&pktgen_thread_lock);
1907
1908 if (++i >= max_tries) {
1909 pr_err("%s: timed out after waiting %d msec for device %s to be removed\n",
1910 __func__, msec_per_try * i, ifname);
1911 break;
1912 }
1913
1914 }
1915
1916 mutex_unlock(&pktgen_thread_lock);
1917}
1918
1919static void pktgen_change_name(const struct pktgen_net *pn, struct net_device *dev)
1920{
1921 struct pktgen_thread *t;
1922
1923 mutex_lock(&pktgen_thread_lock);
1924
1925 list_for_each_entry(t, &pn->pktgen_threads, th_list) {
1926 struct pktgen_dev *pkt_dev;
1927
1928 if_lock(t);
1929 list_for_each_entry(pkt_dev, &t->if_list, list) {
1930 if (pkt_dev->odev != dev)
1931 continue;
1932
1933 proc_remove(pkt_dev->entry);
1934
1935 pkt_dev->entry = proc_create_data(dev->name, 0600,
1936 pn->proc_dir,
1937 &pktgen_if_fops,
1938 pkt_dev);
1939 if (!pkt_dev->entry)
1940 pr_err("can't move proc entry for '%s'\n",
1941 dev->name);
1942 break;
1943 }
1944 if_unlock(t);
1945 }
1946 mutex_unlock(&pktgen_thread_lock);
1947}
1948
1949static int pktgen_device_event(struct notifier_block *unused,
1950 unsigned long event, void *ptr)
1951{
1952 struct net_device *dev = netdev_notifier_info_to_dev(ptr);
1953 struct pktgen_net *pn = net_generic(dev_net(dev), pg_net_id);
1954
1955 if (pn->pktgen_exiting)
1956 return NOTIFY_DONE;
1957
1958 /* It is OK that we do not hold the group lock right now,
1959 * as we run under the RTNL lock.
1960 */
1961
1962 switch (event) {
1963 case NETDEV_CHANGENAME:
1964 pktgen_change_name(pn, dev);
1965 break;
1966
1967 case NETDEV_UNREGISTER:
1968 pktgen_mark_device(pn, dev->name);
1969 break;
1970 }
1971
1972 return NOTIFY_DONE;
1973}
1974
1975static struct net_device *pktgen_dev_get_by_name(const struct pktgen_net *pn,
1976 struct pktgen_dev *pkt_dev,
1977 const char *ifname)
1978{
1979 char b[IFNAMSIZ+5];
1980 int i;
1981
1982 for (i = 0; ifname[i] != '@'; i++) {
1983 if (i == IFNAMSIZ)
1984 break;
1985
1986 b[i] = ifname[i];
1987 }
1988 b[i] = 0;
1989
1990 return dev_get_by_name(pn->net, b);
1991}
1992
1993
1994/* Associate pktgen_dev with a device. */
1995
1996static int pktgen_setup_dev(const struct pktgen_net *pn,
1997 struct pktgen_dev *pkt_dev, const char *ifname)
1998{
1999 struct net_device *odev;
2000 int err;
2001
2002 /* Clean old setups */
2003 if (pkt_dev->odev) {
2004 dev_put(pkt_dev->odev);
2005 pkt_dev->odev = NULL;
2006 }
2007
2008 odev = pktgen_dev_get_by_name(pn, pkt_dev, ifname);
2009 if (!odev) {
2010 pr_err("no such netdevice: \"%s\"\n", ifname);
2011 return -ENODEV;
2012 }
2013
2014 if (odev->type != ARPHRD_ETHER) {
2015 pr_err("not an ethernet device: \"%s\"\n", ifname);
2016 err = -EINVAL;
2017 } else if (!netif_running(odev)) {
2018 pr_err("device is down: \"%s\"\n", ifname);
2019 err = -ENETDOWN;
2020 } else {
2021 pkt_dev->odev = odev;
2022 return 0;
2023 }
2024
2025 dev_put(odev);
2026 return err;
2027}
2028
2029/* Read pkt_dev from the interface and set up internal pktgen_dev
2030 * structure to have the right information to create/send packets
2031 */
2032static void pktgen_setup_inject(struct pktgen_dev *pkt_dev)
2033{
2034 int ntxq;
2035
2036 if (!pkt_dev->odev) {
2037 pr_err("ERROR: pkt_dev->odev == NULL in setup_inject\n");
2038 sprintf(pkt_dev->result,
2039 "ERROR: pkt_dev->odev == NULL in setup_inject.\n");
2040 return;
2041 }
2042
2043 /* make sure that we don't pick a non-existing transmit queue */
2044 ntxq = pkt_dev->odev->real_num_tx_queues;
2045
2046 if (ntxq <= pkt_dev->queue_map_min) {
2047 pr_warn("WARNING: Requested queue_map_min (zero-based) (%d) exceeds valid range [0 - %d] for (%d) queues on %s, resetting\n",
2048 pkt_dev->queue_map_min, (ntxq ?: 1) - 1, ntxq,
2049 pkt_dev->odevname);
2050 pkt_dev->queue_map_min = (ntxq ?: 1) - 1;
2051 }
2052 if (pkt_dev->queue_map_max >= ntxq) {
2053 pr_warn("WARNING: Requested queue_map_max (zero-based) (%d) exceeds valid range [0 - %d] for (%d) queues on %s, resetting\n",
2054 pkt_dev->queue_map_max, (ntxq ?: 1) - 1, ntxq,
2055 pkt_dev->odevname);
2056 pkt_dev->queue_map_max = (ntxq ?: 1) - 1;
2057 }
2058
2059 /* Default to the interface's mac if not explicitly set. */
2060
2061 if (is_zero_ether_addr(pkt_dev->src_mac))
2062 ether_addr_copy(&(pkt_dev->hh[6]), pkt_dev->odev->dev_addr);
2063
2064 /* Set up Dest MAC */
2065 ether_addr_copy(&(pkt_dev->hh[0]), pkt_dev->dst_mac);
2066
2067 if (pkt_dev->flags & F_IPV6) {
2068 int i, set = 0, err = 1;
2069 struct inet6_dev *idev;
2070
2071 if (pkt_dev->min_pkt_size == 0) {
2072 pkt_dev->min_pkt_size = 14 + sizeof(struct ipv6hdr)
2073 + sizeof(struct udphdr)
2074 + sizeof(struct pktgen_hdr)
2075 + pkt_dev->pkt_overhead;
2076 }
2077
2078 for (i = 0; i < sizeof(struct in6_addr); i++)
2079 if (pkt_dev->cur_in6_saddr.s6_addr[i]) {
2080 set = 1;
2081 break;
2082 }
2083
2084 if (!set) {
2085
2086 /*
2087 * Use linklevel address if unconfigured.
2088 *
2089 * use ipv6_get_lladdr if/when it's get exported
2090 */
2091
2092 rcu_read_lock();
2093 idev = __in6_dev_get(pkt_dev->odev);
2094 if (idev) {
2095 struct inet6_ifaddr *ifp;
2096
2097 read_lock_bh(&idev->lock);
2098 list_for_each_entry(ifp, &idev->addr_list, if_list) {
2099 if ((ifp->scope & IFA_LINK) &&
2100 !(ifp->flags & IFA_F_TENTATIVE)) {
2101 pkt_dev->cur_in6_saddr = ifp->addr;
2102 err = 0;
2103 break;
2104 }
2105 }
2106 read_unlock_bh(&idev->lock);
2107 }
2108 rcu_read_unlock();
2109 if (err)
2110 pr_err("ERROR: IPv6 link address not available\n");
2111 }
2112 } else {
2113 if (pkt_dev->min_pkt_size == 0) {
2114 pkt_dev->min_pkt_size = 14 + sizeof(struct iphdr)
2115 + sizeof(struct udphdr)
2116 + sizeof(struct pktgen_hdr)
2117 + pkt_dev->pkt_overhead;
2118 }
2119
2120 pkt_dev->saddr_min = 0;
2121 pkt_dev->saddr_max = 0;
2122 if (strlen(pkt_dev->src_min) == 0) {
2123
2124 struct in_device *in_dev;
2125
2126 rcu_read_lock();
2127 in_dev = __in_dev_get_rcu(pkt_dev->odev);
2128 if (in_dev) {
2129 if (in_dev->ifa_list) {
2130 pkt_dev->saddr_min =
2131 in_dev->ifa_list->ifa_address;
2132 pkt_dev->saddr_max = pkt_dev->saddr_min;
2133 }
2134 }
2135 rcu_read_unlock();
2136 } else {
2137 pkt_dev->saddr_min = in_aton(pkt_dev->src_min);
2138 pkt_dev->saddr_max = in_aton(pkt_dev->src_max);
2139 }
2140
2141 pkt_dev->daddr_min = in_aton(pkt_dev->dst_min);
2142 pkt_dev->daddr_max = in_aton(pkt_dev->dst_max);
2143 }
2144 /* Initialize current values. */
2145 pkt_dev->cur_pkt_size = pkt_dev->min_pkt_size;
2146 if (pkt_dev->min_pkt_size > pkt_dev->max_pkt_size)
2147 pkt_dev->max_pkt_size = pkt_dev->min_pkt_size;
2148
2149 pkt_dev->cur_dst_mac_offset = 0;
2150 pkt_dev->cur_src_mac_offset = 0;
2151 pkt_dev->cur_saddr = pkt_dev->saddr_min;
2152 pkt_dev->cur_daddr = pkt_dev->daddr_min;
2153 pkt_dev->cur_udp_dst = pkt_dev->udp_dst_min;
2154 pkt_dev->cur_udp_src = pkt_dev->udp_src_min;
2155 pkt_dev->nflows = 0;
2156}
2157
2158
2159static void spin(struct pktgen_dev *pkt_dev, ktime_t spin_until)
2160{
2161 ktime_t start_time, end_time;
2162 s64 remaining;
2163 struct hrtimer_sleeper t;
2164
2165 hrtimer_init_on_stack(&t.timer, CLOCK_MONOTONIC, HRTIMER_MODE_ABS);
2166 hrtimer_set_expires(&t.timer, spin_until);
2167
2168 remaining = ktime_to_ns(hrtimer_expires_remaining(&t.timer));
2169 if (remaining <= 0)
2170 goto out;
2171
2172 start_time = ktime_get();
2173 if (remaining < 100000) {
2174 /* for small delays (<100us), just loop until limit is reached */
2175 do {
2176 end_time = ktime_get();
2177 } while (ktime_compare(end_time, spin_until) < 0);
2178 } else {
2179 /* see do_nanosleep */
2180 hrtimer_init_sleeper(&t, current);
2181 do {
2182 set_current_state(TASK_INTERRUPTIBLE);
2183 hrtimer_start_expires(&t.timer, HRTIMER_MODE_ABS);
2184
2185 if (likely(t.task))
2186 schedule();
2187
2188 hrtimer_cancel(&t.timer);
2189 } while (t.task && pkt_dev->running && !signal_pending(current));
2190 __set_current_state(TASK_RUNNING);
2191 end_time = ktime_get();
2192 }
2193
2194 pkt_dev->idle_acc += ktime_to_ns(ktime_sub(end_time, start_time));
2195out:
2196 pkt_dev->next_tx = ktime_add_ns(spin_until, pkt_dev->delay);
2197 destroy_hrtimer_on_stack(&t.timer);
2198}
2199
2200static inline void set_pkt_overhead(struct pktgen_dev *pkt_dev)
2201{
2202 pkt_dev->pkt_overhead = 0;
2203 pkt_dev->pkt_overhead += pkt_dev->nr_labels*sizeof(u32);
2204 pkt_dev->pkt_overhead += VLAN_TAG_SIZE(pkt_dev);
2205 pkt_dev->pkt_overhead += SVLAN_TAG_SIZE(pkt_dev);
2206}
2207
2208static inline int f_seen(const struct pktgen_dev *pkt_dev, int flow)
2209{
2210 return !!(pkt_dev->flows[flow].flags & F_INIT);
2211}
2212
2213static inline int f_pick(struct pktgen_dev *pkt_dev)
2214{
2215 int flow = pkt_dev->curfl;
2216
2217 if (pkt_dev->flags & F_FLOW_SEQ) {
2218 if (pkt_dev->flows[flow].count >= pkt_dev->lflow) {
2219 /* reset time */
2220 pkt_dev->flows[flow].count = 0;
2221 pkt_dev->flows[flow].flags = 0;
2222 pkt_dev->curfl += 1;
2223 if (pkt_dev->curfl >= pkt_dev->cflows)
2224 pkt_dev->curfl = 0; /*reset */
2225 }
2226 } else {
2227 flow = prandom_u32() % pkt_dev->cflows;
2228 pkt_dev->curfl = flow;
2229
2230 if (pkt_dev->flows[flow].count > pkt_dev->lflow) {
2231 pkt_dev->flows[flow].count = 0;
2232 pkt_dev->flows[flow].flags = 0;
2233 }
2234 }
2235
2236 return pkt_dev->curfl;
2237}
2238
2239
2240#ifdef CONFIG_XFRM
2241/* If there was already an IPSEC SA, we keep it as is, else
2242 * we go look for it ...
2243*/
2244#define DUMMY_MARK 0
2245static void get_ipsec_sa(struct pktgen_dev *pkt_dev, int flow)
2246{
2247 struct xfrm_state *x = pkt_dev->flows[flow].x;
2248 struct pktgen_net *pn = net_generic(dev_net(pkt_dev->odev), pg_net_id);
2249 if (!x) {
2250
2251 if (pkt_dev->spi) {
2252 /* We need as quick as possible to find the right SA
2253 * Searching with minimum criteria to archieve this.
2254 */
2255 x = xfrm_state_lookup_byspi(pn->net, htonl(pkt_dev->spi), AF_INET);
2256 } else {
2257 /* slow path: we dont already have xfrm_state */
2258 x = xfrm_stateonly_find(pn->net, DUMMY_MARK,
2259 (xfrm_address_t *)&pkt_dev->cur_daddr,
2260 (xfrm_address_t *)&pkt_dev->cur_saddr,
2261 AF_INET,
2262 pkt_dev->ipsmode,
2263 pkt_dev->ipsproto, 0);
2264 }
2265 if (x) {
2266 pkt_dev->flows[flow].x = x;
2267 set_pkt_overhead(pkt_dev);
2268 pkt_dev->pkt_overhead += x->props.header_len;
2269 }
2270
2271 }
2272}
2273#endif
2274static void set_cur_queue_map(struct pktgen_dev *pkt_dev)
2275{
2276
2277 if (pkt_dev->flags & F_QUEUE_MAP_CPU)
2278 pkt_dev->cur_queue_map = smp_processor_id();
2279
2280 else if (pkt_dev->queue_map_min <= pkt_dev->queue_map_max) {
2281 __u16 t;
2282 if (pkt_dev->flags & F_QUEUE_MAP_RND) {
2283 t = prandom_u32() %
2284 (pkt_dev->queue_map_max -
2285 pkt_dev->queue_map_min + 1)
2286 + pkt_dev->queue_map_min;
2287 } else {
2288 t = pkt_dev->cur_queue_map + 1;
2289 if (t > pkt_dev->queue_map_max)
2290 t = pkt_dev->queue_map_min;
2291 }
2292 pkt_dev->cur_queue_map = t;
2293 }
2294 pkt_dev->cur_queue_map = pkt_dev->cur_queue_map % pkt_dev->odev->real_num_tx_queues;
2295}
2296
2297/* Increment/randomize headers according to flags and current values
2298 * for IP src/dest, UDP src/dst port, MAC-Addr src/dst
2299 */
2300static void mod_cur_headers(struct pktgen_dev *pkt_dev)
2301{
2302 __u32 imn;
2303 __u32 imx;
2304 int flow = 0;
2305
2306 if (pkt_dev->cflows)
2307 flow = f_pick(pkt_dev);
2308
2309 /* Deal with source MAC */
2310 if (pkt_dev->src_mac_count > 1) {
2311 __u32 mc;
2312 __u32 tmp;
2313
2314 if (pkt_dev->flags & F_MACSRC_RND)
2315 mc = prandom_u32() % pkt_dev->src_mac_count;
2316 else {
2317 mc = pkt_dev->cur_src_mac_offset++;
2318 if (pkt_dev->cur_src_mac_offset >=
2319 pkt_dev->src_mac_count)
2320 pkt_dev->cur_src_mac_offset = 0;
2321 }
2322
2323 tmp = pkt_dev->src_mac[5] + (mc & 0xFF);
2324 pkt_dev->hh[11] = tmp;
2325 tmp = (pkt_dev->src_mac[4] + ((mc >> 8) & 0xFF) + (tmp >> 8));
2326 pkt_dev->hh[10] = tmp;
2327 tmp = (pkt_dev->src_mac[3] + ((mc >> 16) & 0xFF) + (tmp >> 8));
2328 pkt_dev->hh[9] = tmp;
2329 tmp = (pkt_dev->src_mac[2] + ((mc >> 24) & 0xFF) + (tmp >> 8));
2330 pkt_dev->hh[8] = tmp;
2331 tmp = (pkt_dev->src_mac[1] + (tmp >> 8));
2332 pkt_dev->hh[7] = tmp;
2333 }
2334
2335 /* Deal with Destination MAC */
2336 if (pkt_dev->dst_mac_count > 1) {
2337 __u32 mc;
2338 __u32 tmp;
2339
2340 if (pkt_dev->flags & F_MACDST_RND)
2341 mc = prandom_u32() % pkt_dev->dst_mac_count;
2342
2343 else {
2344 mc = pkt_dev->cur_dst_mac_offset++;
2345 if (pkt_dev->cur_dst_mac_offset >=
2346 pkt_dev->dst_mac_count) {
2347 pkt_dev->cur_dst_mac_offset = 0;
2348 }
2349 }
2350
2351 tmp = pkt_dev->dst_mac[5] + (mc & 0xFF);
2352 pkt_dev->hh[5] = tmp;
2353 tmp = (pkt_dev->dst_mac[4] + ((mc >> 8) & 0xFF) + (tmp >> 8));
2354 pkt_dev->hh[4] = tmp;
2355 tmp = (pkt_dev->dst_mac[3] + ((mc >> 16) & 0xFF) + (tmp >> 8));
2356 pkt_dev->hh[3] = tmp;
2357 tmp = (pkt_dev->dst_mac[2] + ((mc >> 24) & 0xFF) + (tmp >> 8));
2358 pkt_dev->hh[2] = tmp;
2359 tmp = (pkt_dev->dst_mac[1] + (tmp >> 8));
2360 pkt_dev->hh[1] = tmp;
2361 }
2362
2363 if (pkt_dev->flags & F_MPLS_RND) {
2364 unsigned int i;
2365 for (i = 0; i < pkt_dev->nr_labels; i++)
2366 if (pkt_dev->labels[i] & MPLS_STACK_BOTTOM)
2367 pkt_dev->labels[i] = MPLS_STACK_BOTTOM |
2368 ((__force __be32)prandom_u32() &
2369 htonl(0x000fffff));
2370 }
2371
2372 if ((pkt_dev->flags & F_VID_RND) && (pkt_dev->vlan_id != 0xffff)) {
2373 pkt_dev->vlan_id = prandom_u32() & (4096 - 1);
2374 }
2375
2376 if ((pkt_dev->flags & F_SVID_RND) && (pkt_dev->svlan_id != 0xffff)) {
2377 pkt_dev->svlan_id = prandom_u32() & (4096 - 1);
2378 }
2379
2380 if (pkt_dev->udp_src_min < pkt_dev->udp_src_max) {
2381 if (pkt_dev->flags & F_UDPSRC_RND)
2382 pkt_dev->cur_udp_src = prandom_u32() %
2383 (pkt_dev->udp_src_max - pkt_dev->udp_src_min)
2384 + pkt_dev->udp_src_min;
2385
2386 else {
2387 pkt_dev->cur_udp_src++;
2388 if (pkt_dev->cur_udp_src >= pkt_dev->udp_src_max)
2389 pkt_dev->cur_udp_src = pkt_dev->udp_src_min;
2390 }
2391 }
2392
2393 if (pkt_dev->udp_dst_min < pkt_dev->udp_dst_max) {
2394 if (pkt_dev->flags & F_UDPDST_RND) {
2395 pkt_dev->cur_udp_dst = prandom_u32() %
2396 (pkt_dev->udp_dst_max - pkt_dev->udp_dst_min)
2397 + pkt_dev->udp_dst_min;
2398 } else {
2399 pkt_dev->cur_udp_dst++;
2400 if (pkt_dev->cur_udp_dst >= pkt_dev->udp_dst_max)
2401 pkt_dev->cur_udp_dst = pkt_dev->udp_dst_min;
2402 }
2403 }
2404
2405 if (!(pkt_dev->flags & F_IPV6)) {
2406
2407 imn = ntohl(pkt_dev->saddr_min);
2408 imx = ntohl(pkt_dev->saddr_max);
2409 if (imn < imx) {
2410 __u32 t;
2411 if (pkt_dev->flags & F_IPSRC_RND)
2412 t = prandom_u32() % (imx - imn) + imn;
2413 else {
2414 t = ntohl(pkt_dev->cur_saddr);
2415 t++;
2416 if (t > imx)
2417 t = imn;
2418
2419 }
2420 pkt_dev->cur_saddr = htonl(t);
2421 }
2422
2423 if (pkt_dev->cflows && f_seen(pkt_dev, flow)) {
2424 pkt_dev->cur_daddr = pkt_dev->flows[flow].cur_daddr;
2425 } else {
2426 imn = ntohl(pkt_dev->daddr_min);
2427 imx = ntohl(pkt_dev->daddr_max);
2428 if (imn < imx) {
2429 __u32 t;
2430 __be32 s;
2431 if (pkt_dev->flags & F_IPDST_RND) {
2432
2433 do {
2434 t = prandom_u32() %
2435 (imx - imn) + imn;
2436 s = htonl(t);
2437 } while (ipv4_is_loopback(s) ||
2438 ipv4_is_multicast(s) ||
2439 ipv4_is_lbcast(s) ||
2440 ipv4_is_zeronet(s) ||
2441 ipv4_is_local_multicast(s));
2442 pkt_dev->cur_daddr = s;
2443 } else {
2444 t = ntohl(pkt_dev->cur_daddr);
2445 t++;
2446 if (t > imx) {
2447 t = imn;
2448 }
2449 pkt_dev->cur_daddr = htonl(t);
2450 }
2451 }
2452 if (pkt_dev->cflows) {
2453 pkt_dev->flows[flow].flags |= F_INIT;
2454 pkt_dev->flows[flow].cur_daddr =
2455 pkt_dev->cur_daddr;
2456#ifdef CONFIG_XFRM
2457 if (pkt_dev->flags & F_IPSEC)
2458 get_ipsec_sa(pkt_dev, flow);
2459#endif
2460 pkt_dev->nflows++;
2461 }
2462 }
2463 } else { /* IPV6 * */
2464
2465 if (!ipv6_addr_any(&pkt_dev->min_in6_daddr)) {
2466 int i;
2467
2468 /* Only random destinations yet */
2469
2470 for (i = 0; i < 4; i++) {
2471 pkt_dev->cur_in6_daddr.s6_addr32[i] =
2472 (((__force __be32)prandom_u32() |
2473 pkt_dev->min_in6_daddr.s6_addr32[i]) &
2474 pkt_dev->max_in6_daddr.s6_addr32[i]);
2475 }
2476 }
2477 }
2478
2479 if (pkt_dev->min_pkt_size < pkt_dev->max_pkt_size) {
2480 __u32 t;
2481 if (pkt_dev->flags & F_TXSIZE_RND) {
2482 t = prandom_u32() %
2483 (pkt_dev->max_pkt_size - pkt_dev->min_pkt_size)
2484 + pkt_dev->min_pkt_size;
2485 } else {
2486 t = pkt_dev->cur_pkt_size + 1;
2487 if (t > pkt_dev->max_pkt_size)
2488 t = pkt_dev->min_pkt_size;
2489 }
2490 pkt_dev->cur_pkt_size = t;
2491 }
2492
2493 set_cur_queue_map(pkt_dev);
2494
2495 pkt_dev->flows[flow].count++;
2496}
2497
2498
2499#ifdef CONFIG_XFRM
2500static u32 pktgen_dst_metrics[RTAX_MAX + 1] = {
2501
2502 [RTAX_HOPLIMIT] = 0x5, /* Set a static hoplimit */
2503};
2504
2505static int pktgen_output_ipsec(struct sk_buff *skb, struct pktgen_dev *pkt_dev)
2506{
2507 struct xfrm_state *x = pkt_dev->flows[pkt_dev->curfl].x;
2508 int err = 0;
2509 struct net *net = dev_net(pkt_dev->odev);
2510
2511 if (!x)
2512 return 0;
2513 /* XXX: we dont support tunnel mode for now until
2514 * we resolve the dst issue */
2515 if ((x->props.mode != XFRM_MODE_TRANSPORT) && (pkt_dev->spi == 0))
2516 return 0;
2517
2518 /* But when user specify an valid SPI, transformation
2519 * supports both transport/tunnel mode + ESP/AH type.
2520 */
2521 if ((x->props.mode == XFRM_MODE_TUNNEL) && (pkt_dev->spi != 0))
2522 skb->_skb_refdst = (unsigned long)&pkt_dev->xdst.u.dst | SKB_DST_NOREF;
2523
2524 rcu_read_lock_bh();
2525 err = x->outer_mode->output(x, skb);
2526 rcu_read_unlock_bh();
2527 if (err) {
2528 XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTSTATEMODEERROR);
2529 goto error;
2530 }
2531 err = x->type->output(x, skb);
2532 if (err) {
2533 XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTSTATEPROTOERROR);
2534 goto error;
2535 }
2536 spin_lock_bh(&x->lock);
2537 x->curlft.bytes += skb->len;
2538 x->curlft.packets++;
2539 spin_unlock_bh(&x->lock);
2540error:
2541 return err;
2542}
2543
2544static void free_SAs(struct pktgen_dev *pkt_dev)
2545{
2546 if (pkt_dev->cflows) {
2547 /* let go of the SAs if we have them */
2548 int i;
2549 for (i = 0; i < pkt_dev->cflows; i++) {
2550 struct xfrm_state *x = pkt_dev->flows[i].x;
2551 if (x) {
2552 xfrm_state_put(x);
2553 pkt_dev->flows[i].x = NULL;
2554 }
2555 }
2556 }
2557}
2558
2559static int process_ipsec(struct pktgen_dev *pkt_dev,
2560 struct sk_buff *skb, __be16 protocol)
2561{
2562 if (pkt_dev->flags & F_IPSEC) {
2563 struct xfrm_state *x = pkt_dev->flows[pkt_dev->curfl].x;
2564 int nhead = 0;
2565 if (x) {
2566 struct ethhdr *eth;
2567 struct iphdr *iph;
2568 int ret;
2569
2570 nhead = x->props.header_len - skb_headroom(skb);
2571 if (nhead > 0) {
2572 ret = pskb_expand_head(skb, nhead, 0, GFP_ATOMIC);
2573 if (ret < 0) {
2574 pr_err("Error expanding ipsec packet %d\n",
2575 ret);
2576 goto err;
2577 }
2578 }
2579
2580 /* ipsec is not expecting ll header */
2581 skb_pull(skb, ETH_HLEN);
2582 ret = pktgen_output_ipsec(skb, pkt_dev);
2583 if (ret) {
2584 pr_err("Error creating ipsec packet %d\n", ret);
2585 goto err;
2586 }
2587 /* restore ll */
2588 eth = skb_push(skb, ETH_HLEN);
2589 memcpy(eth, pkt_dev->hh, 2 * ETH_ALEN);
2590 eth->h_proto = protocol;
2591
2592 /* Update IPv4 header len as well as checksum value */
2593 iph = ip_hdr(skb);
2594 iph->tot_len = htons(skb->len - ETH_HLEN);
2595 ip_send_check(iph);
2596 }
2597 }
2598 return 1;
2599err:
2600 kfree_skb(skb);
2601 return 0;
2602}
2603#endif
2604
2605static void mpls_push(__be32 *mpls, struct pktgen_dev *pkt_dev)
2606{
2607 unsigned int i;
2608 for (i = 0; i < pkt_dev->nr_labels; i++)
2609 *mpls++ = pkt_dev->labels[i] & ~MPLS_STACK_BOTTOM;
2610
2611 mpls--;
2612 *mpls |= MPLS_STACK_BOTTOM;
2613}
2614
2615static inline __be16 build_tci(unsigned int id, unsigned int cfi,
2616 unsigned int prio)
2617{
2618 return htons(id | (cfi << 12) | (prio << 13));
2619}
2620
2621static void pktgen_finalize_skb(struct pktgen_dev *pkt_dev, struct sk_buff *skb,
2622 int datalen)
2623{
2624 struct timespec64 timestamp;
2625 struct pktgen_hdr *pgh;
2626
2627 pgh = skb_put(skb, sizeof(*pgh));
2628 datalen -= sizeof(*pgh);
2629
2630 if (pkt_dev->nfrags <= 0) {
2631 skb_put_zero(skb, datalen);
2632 } else {
2633 int frags = pkt_dev->nfrags;
2634 int i, len;
2635 int frag_len;
2636
2637
2638 if (frags > MAX_SKB_FRAGS)
2639 frags = MAX_SKB_FRAGS;
2640 len = datalen - frags * PAGE_SIZE;
2641 if (len > 0) {
2642 skb_put_zero(skb, len);
2643 datalen = frags * PAGE_SIZE;
2644 }
2645
2646 i = 0;
2647 frag_len = (datalen/frags) < PAGE_SIZE ?
2648 (datalen/frags) : PAGE_SIZE;
2649 while (datalen > 0) {
2650 if (unlikely(!pkt_dev->page)) {
2651 int node = numa_node_id();
2652
2653 if (pkt_dev->node >= 0 && (pkt_dev->flags & F_NODE))
2654 node = pkt_dev->node;
2655 pkt_dev->page = alloc_pages_node(node, GFP_KERNEL | __GFP_ZERO, 0);
2656 if (!pkt_dev->page)
2657 break;
2658 }
2659 get_page(pkt_dev->page);
2660 skb_frag_set_page(skb, i, pkt_dev->page);
2661 skb_shinfo(skb)->frags[i].page_offset = 0;
2662 /*last fragment, fill rest of data*/
2663 if (i == (frags - 1))
2664 skb_frag_size_set(&skb_shinfo(skb)->frags[i],
2665 (datalen < PAGE_SIZE ? datalen : PAGE_SIZE));
2666 else
2667 skb_frag_size_set(&skb_shinfo(skb)->frags[i], frag_len);
2668 datalen -= skb_frag_size(&skb_shinfo(skb)->frags[i]);
2669 skb->len += skb_frag_size(&skb_shinfo(skb)->frags[i]);
2670 skb->data_len += skb_frag_size(&skb_shinfo(skb)->frags[i]);
2671 i++;
2672 skb_shinfo(skb)->nr_frags = i;
2673 }
2674 }
2675
2676 /* Stamp the time, and sequence number,
2677 * convert them to network byte order
2678 */
2679 pgh->pgh_magic = htonl(PKTGEN_MAGIC);
2680 pgh->seq_num = htonl(pkt_dev->seq_num);
2681
2682 if (pkt_dev->flags & F_NO_TIMESTAMP) {
2683 pgh->tv_sec = 0;
2684 pgh->tv_usec = 0;
2685 } else {
2686 /*
2687 * pgh->tv_sec wraps in y2106 when interpreted as unsigned
2688 * as done by wireshark, or y2038 when interpreted as signed.
2689 * This is probably harmless, but if anyone wants to improve
2690 * it, we could introduce a variant that puts 64-bit nanoseconds
2691 * into the respective header bytes.
2692 * This would also be slightly faster to read.
2693 */
2694 ktime_get_real_ts64(×tamp);
2695 pgh->tv_sec = htonl(timestamp.tv_sec);
2696 pgh->tv_usec = htonl(timestamp.tv_nsec / NSEC_PER_USEC);
2697 }
2698}
2699
2700static struct sk_buff *pktgen_alloc_skb(struct net_device *dev,
2701 struct pktgen_dev *pkt_dev)
2702{
2703 unsigned int extralen = LL_RESERVED_SPACE(dev);
2704 struct sk_buff *skb = NULL;
2705 unsigned int size;
2706
2707 size = pkt_dev->cur_pkt_size + 64 + extralen + pkt_dev->pkt_overhead;
2708 if (pkt_dev->flags & F_NODE) {
2709 int node = pkt_dev->node >= 0 ? pkt_dev->node : numa_node_id();
2710
2711 skb = __alloc_skb(NET_SKB_PAD + size, GFP_NOWAIT, 0, node);
2712 if (likely(skb)) {
2713 skb_reserve(skb, NET_SKB_PAD);
2714 skb->dev = dev;
2715 }
2716 } else {
2717 skb = __netdev_alloc_skb(dev, size, GFP_NOWAIT);
2718 }
2719
2720 /* the caller pre-fetches from skb->data and reserves for the mac hdr */
2721 if (likely(skb))
2722 skb_reserve(skb, extralen - 16);
2723
2724 return skb;
2725}
2726
2727static struct sk_buff *fill_packet_ipv4(struct net_device *odev,
2728 struct pktgen_dev *pkt_dev)
2729{
2730 struct sk_buff *skb = NULL;
2731 __u8 *eth;
2732 struct udphdr *udph;
2733 int datalen, iplen;
2734 struct iphdr *iph;
2735 __be16 protocol = htons(ETH_P_IP);
2736 __be32 *mpls;
2737 __be16 *vlan_tci = NULL; /* Encapsulates priority and VLAN ID */
2738 __be16 *vlan_encapsulated_proto = NULL; /* packet type ID field (or len) for VLAN tag */
2739 __be16 *svlan_tci = NULL; /* Encapsulates priority and SVLAN ID */
2740 __be16 *svlan_encapsulated_proto = NULL; /* packet type ID field (or len) for SVLAN tag */
2741 u16 queue_map;
2742
2743 if (pkt_dev->nr_labels)
2744 protocol = htons(ETH_P_MPLS_UC);
2745
2746 if (pkt_dev->vlan_id != 0xffff)
2747 protocol = htons(ETH_P_8021Q);
2748
2749 /* Update any of the values, used when we're incrementing various
2750 * fields.
2751 */
2752 mod_cur_headers(pkt_dev);
2753 queue_map = pkt_dev->cur_queue_map;
2754
2755 skb = pktgen_alloc_skb(odev, pkt_dev);
2756 if (!skb) {
2757 sprintf(pkt_dev->result, "No memory");
2758 return NULL;
2759 }
2760
2761 prefetchw(skb->data);
2762 skb_reserve(skb, 16);
2763
2764 /* Reserve for ethernet and IP header */
2765 eth = skb_push(skb, 14);
2766 mpls = skb_put(skb, pkt_dev->nr_labels * sizeof(__u32));
2767 if (pkt_dev->nr_labels)
2768 mpls_push(mpls, pkt_dev);
2769
2770 if (pkt_dev->vlan_id != 0xffff) {
2771 if (pkt_dev->svlan_id != 0xffff) {
2772 svlan_tci = skb_put(skb, sizeof(__be16));
2773 *svlan_tci = build_tci(pkt_dev->svlan_id,
2774 pkt_dev->svlan_cfi,
2775 pkt_dev->svlan_p);
2776 svlan_encapsulated_proto = skb_put(skb,
2777 sizeof(__be16));
2778 *svlan_encapsulated_proto = htons(ETH_P_8021Q);
2779 }
2780 vlan_tci = skb_put(skb, sizeof(__be16));
2781 *vlan_tci = build_tci(pkt_dev->vlan_id,
2782 pkt_dev->vlan_cfi,
2783 pkt_dev->vlan_p);
2784 vlan_encapsulated_proto = skb_put(skb, sizeof(__be16));
2785 *vlan_encapsulated_proto = htons(ETH_P_IP);
2786 }
2787
2788 skb_reset_mac_header(skb);
2789 skb_set_network_header(skb, skb->len);
2790 iph = skb_put(skb, sizeof(struct iphdr));
2791
2792 skb_set_transport_header(skb, skb->len);
2793 udph = skb_put(skb, sizeof(struct udphdr));
2794 skb_set_queue_mapping(skb, queue_map);
2795 skb->priority = pkt_dev->skb_priority;
2796
2797 memcpy(eth, pkt_dev->hh, 12);
2798 *(__be16 *) & eth[12] = protocol;
2799
2800 /* Eth + IPh + UDPh + mpls */
2801 datalen = pkt_dev->cur_pkt_size - 14 - 20 - 8 -
2802 pkt_dev->pkt_overhead;
2803 if (datalen < 0 || datalen < sizeof(struct pktgen_hdr))
2804 datalen = sizeof(struct pktgen_hdr);
2805
2806 udph->source = htons(pkt_dev->cur_udp_src);
2807 udph->dest = htons(pkt_dev->cur_udp_dst);
2808 udph->len = htons(datalen + 8); /* DATA + udphdr */
2809 udph->check = 0;
2810
2811 iph->ihl = 5;
2812 iph->version = 4;
2813 iph->ttl = 32;
2814 iph->tos = pkt_dev->tos;
2815 iph->protocol = IPPROTO_UDP; /* UDP */
2816 iph->saddr = pkt_dev->cur_saddr;
2817 iph->daddr = pkt_dev->cur_daddr;
2818 iph->id = htons(pkt_dev->ip_id);
2819 pkt_dev->ip_id++;
2820 iph->frag_off = 0;
2821 iplen = 20 + 8 + datalen;
2822 iph->tot_len = htons(iplen);
2823 ip_send_check(iph);
2824 skb->protocol = protocol;
2825 skb->dev = odev;
2826 skb->pkt_type = PACKET_HOST;
2827
2828 pktgen_finalize_skb(pkt_dev, skb, datalen);
2829
2830 if (!(pkt_dev->flags & F_UDPCSUM)) {
2831 skb->ip_summed = CHECKSUM_NONE;
2832 } else if (odev->features & (NETIF_F_HW_CSUM | NETIF_F_IP_CSUM)) {
2833 skb->ip_summed = CHECKSUM_PARTIAL;
2834 skb->csum = 0;
2835 udp4_hwcsum(skb, iph->saddr, iph->daddr);
2836 } else {
2837 __wsum csum = skb_checksum(skb, skb_transport_offset(skb), datalen + 8, 0);
2838
2839 /* add protocol-dependent pseudo-header */
2840 udph->check = csum_tcpudp_magic(iph->saddr, iph->daddr,
2841 datalen + 8, IPPROTO_UDP, csum);
2842
2843 if (udph->check == 0)
2844 udph->check = CSUM_MANGLED_0;
2845 }
2846
2847#ifdef CONFIG_XFRM
2848 if (!process_ipsec(pkt_dev, skb, protocol))
2849 return NULL;
2850#endif
2851
2852 return skb;
2853}
2854
2855static struct sk_buff *fill_packet_ipv6(struct net_device *odev,
2856 struct pktgen_dev *pkt_dev)
2857{
2858 struct sk_buff *skb = NULL;
2859 __u8 *eth;
2860 struct udphdr *udph;
2861 int datalen, udplen;
2862 struct ipv6hdr *iph;
2863 __be16 protocol = htons(ETH_P_IPV6);
2864 __be32 *mpls;
2865 __be16 *vlan_tci = NULL; /* Encapsulates priority and VLAN ID */
2866 __be16 *vlan_encapsulated_proto = NULL; /* packet type ID field (or len) for VLAN tag */
2867 __be16 *svlan_tci = NULL; /* Encapsulates priority and SVLAN ID */
2868 __be16 *svlan_encapsulated_proto = NULL; /* packet type ID field (or len) for SVLAN tag */
2869 u16 queue_map;
2870
2871 if (pkt_dev->nr_labels)
2872 protocol = htons(ETH_P_MPLS_UC);
2873
2874 if (pkt_dev->vlan_id != 0xffff)
2875 protocol = htons(ETH_P_8021Q);
2876
2877 /* Update any of the values, used when we're incrementing various
2878 * fields.
2879 */
2880 mod_cur_headers(pkt_dev);
2881 queue_map = pkt_dev->cur_queue_map;
2882
2883 skb = pktgen_alloc_skb(odev, pkt_dev);
2884 if (!skb) {
2885 sprintf(pkt_dev->result, "No memory");
2886 return NULL;
2887 }
2888
2889 prefetchw(skb->data);
2890 skb_reserve(skb, 16);
2891
2892 /* Reserve for ethernet and IP header */
2893 eth = skb_push(skb, 14);
2894 mpls = skb_put(skb, pkt_dev->nr_labels * sizeof(__u32));
2895 if (pkt_dev->nr_labels)
2896 mpls_push(mpls, pkt_dev);
2897
2898 if (pkt_dev->vlan_id != 0xffff) {
2899 if (pkt_dev->svlan_id != 0xffff) {
2900 svlan_tci = skb_put(skb, sizeof(__be16));
2901 *svlan_tci = build_tci(pkt_dev->svlan_id,
2902 pkt_dev->svlan_cfi,
2903 pkt_dev->svlan_p);
2904 svlan_encapsulated_proto = skb_put(skb,
2905 sizeof(__be16));
2906 *svlan_encapsulated_proto = htons(ETH_P_8021Q);
2907 }
2908 vlan_tci = skb_put(skb, sizeof(__be16));
2909 *vlan_tci = build_tci(pkt_dev->vlan_id,
2910 pkt_dev->vlan_cfi,
2911 pkt_dev->vlan_p);
2912 vlan_encapsulated_proto = skb_put(skb, sizeof(__be16));
2913 *vlan_encapsulated_proto = htons(ETH_P_IPV6);
2914 }
2915
2916 skb_reset_mac_header(skb);
2917 skb_set_network_header(skb, skb->len);
2918 iph = skb_put(skb, sizeof(struct ipv6hdr));
2919
2920 skb_set_transport_header(skb, skb->len);
2921 udph = skb_put(skb, sizeof(struct udphdr));
2922 skb_set_queue_mapping(skb, queue_map);
2923 skb->priority = pkt_dev->skb_priority;
2924
2925 memcpy(eth, pkt_dev->hh, 12);
2926 *(__be16 *) ð[12] = protocol;
2927
2928 /* Eth + IPh + UDPh + mpls */
2929 datalen = pkt_dev->cur_pkt_size - 14 -
2930 sizeof(struct ipv6hdr) - sizeof(struct udphdr) -
2931 pkt_dev->pkt_overhead;
2932
2933 if (datalen < 0 || datalen < sizeof(struct pktgen_hdr)) {
2934 datalen = sizeof(struct pktgen_hdr);
2935 net_info_ratelimited("increased datalen to %d\n", datalen);
2936 }
2937
2938 udplen = datalen + sizeof(struct udphdr);
2939 udph->source = htons(pkt_dev->cur_udp_src);
2940 udph->dest = htons(pkt_dev->cur_udp_dst);
2941 udph->len = htons(udplen);
2942 udph->check = 0;
2943
2944 *(__be32 *) iph = htonl(0x60000000); /* Version + flow */
2945
2946 if (pkt_dev->traffic_class) {
2947 /* Version + traffic class + flow (0) */
2948 *(__be32 *)iph |= htonl(0x60000000 | (pkt_dev->traffic_class << 20));
2949 }
2950
2951 iph->hop_limit = 32;
2952
2953 iph->payload_len = htons(udplen);
2954 iph->nexthdr = IPPROTO_UDP;
2955
2956 iph->daddr = pkt_dev->cur_in6_daddr;
2957 iph->saddr = pkt_dev->cur_in6_saddr;
2958
2959 skb->protocol = protocol;
2960 skb->dev = odev;
2961 skb->pkt_type = PACKET_HOST;
2962
2963 pktgen_finalize_skb(pkt_dev, skb, datalen);
2964
2965 if (!(pkt_dev->flags & F_UDPCSUM)) {
2966 skb->ip_summed = CHECKSUM_NONE;
2967 } else if (odev->features & (NETIF_F_HW_CSUM | NETIF_F_IPV6_CSUM)) {
2968 skb->ip_summed = CHECKSUM_PARTIAL;
2969 skb->csum_start = skb_transport_header(skb) - skb->head;
2970 skb->csum_offset = offsetof(struct udphdr, check);
2971 udph->check = ~csum_ipv6_magic(&iph->saddr, &iph->daddr, udplen, IPPROTO_UDP, 0);
2972 } else {
2973 __wsum csum = skb_checksum(skb, skb_transport_offset(skb), udplen, 0);
2974
2975 /* add protocol-dependent pseudo-header */
2976 udph->check = csum_ipv6_magic(&iph->saddr, &iph->daddr, udplen, IPPROTO_UDP, csum);
2977
2978 if (udph->check == 0)
2979 udph->check = CSUM_MANGLED_0;
2980 }
2981
2982 return skb;
2983}
2984
2985static struct sk_buff *fill_packet(struct net_device *odev,
2986 struct pktgen_dev *pkt_dev)
2987{
2988 if (pkt_dev->flags & F_IPV6)
2989 return fill_packet_ipv6(odev, pkt_dev);
2990 else
2991 return fill_packet_ipv4(odev, pkt_dev);
2992}
2993
2994static void pktgen_clear_counters(struct pktgen_dev *pkt_dev)
2995{
2996 pkt_dev->seq_num = 1;
2997 pkt_dev->idle_acc = 0;
2998 pkt_dev->sofar = 0;
2999 pkt_dev->tx_bytes = 0;
3000 pkt_dev->errors = 0;
3001}
3002
3003/* Set up structure for sending pkts, clear counters */
3004
3005static void pktgen_run(struct pktgen_thread *t)
3006{
3007 struct pktgen_dev *pkt_dev;
3008 int started = 0;
3009
3010 func_enter();
3011
3012 rcu_read_lock();
3013 list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
3014
3015 /*
3016 * setup odev and create initial packet.
3017 */
3018 pktgen_setup_inject(pkt_dev);
3019
3020 if (pkt_dev->odev) {
3021 pktgen_clear_counters(pkt_dev);
3022 pkt_dev->skb = NULL;
3023 pkt_dev->started_at = pkt_dev->next_tx = ktime_get();
3024
3025 set_pkt_overhead(pkt_dev);
3026
3027 strcpy(pkt_dev->result, "Starting");
3028 pkt_dev->running = 1; /* Cranke yeself! */
3029 started++;
3030 } else
3031 strcpy(pkt_dev->result, "Error starting");
3032 }
3033 rcu_read_unlock();
3034 if (started)
3035 t->control &= ~(T_STOP);
3036}
3037
3038static void pktgen_stop_all_threads_ifs(struct pktgen_net *pn)
3039{
3040 struct pktgen_thread *t;
3041
3042 func_enter();
3043
3044 mutex_lock(&pktgen_thread_lock);
3045
3046 list_for_each_entry(t, &pn->pktgen_threads, th_list)
3047 t->control |= T_STOP;
3048
3049 mutex_unlock(&pktgen_thread_lock);
3050}
3051
3052static int thread_is_running(const struct pktgen_thread *t)
3053{
3054 const struct pktgen_dev *pkt_dev;
3055
3056 rcu_read_lock();
3057 list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
3058 if (pkt_dev->running) {
3059 rcu_read_unlock();
3060 return 1;
3061 }
3062 rcu_read_unlock();
3063 return 0;
3064}
3065
3066static int pktgen_wait_thread_run(struct pktgen_thread *t)
3067{
3068 while (thread_is_running(t)) {
3069
3070 msleep_interruptible(100);
3071
3072 if (signal_pending(current))
3073 goto signal;
3074 }
3075 return 1;
3076signal:
3077 return 0;
3078}
3079
3080static int pktgen_wait_all_threads_run(struct pktgen_net *pn)
3081{
3082 struct pktgen_thread *t;
3083 int sig = 1;
3084
3085 mutex_lock(&pktgen_thread_lock);
3086
3087 list_for_each_entry(t, &pn->pktgen_threads, th_list) {
3088 sig = pktgen_wait_thread_run(t);
3089 if (sig == 0)
3090 break;
3091 }
3092
3093 if (sig == 0)
3094 list_for_each_entry(t, &pn->pktgen_threads, th_list)
3095 t->control |= (T_STOP);
3096
3097 mutex_unlock(&pktgen_thread_lock);
3098 return sig;
3099}
3100
3101static void pktgen_run_all_threads(struct pktgen_net *pn)
3102{
3103 struct pktgen_thread *t;
3104
3105 func_enter();
3106
3107 mutex_lock(&pktgen_thread_lock);
3108
3109 list_for_each_entry(t, &pn->pktgen_threads, th_list)
3110 t->control |= (T_RUN);
3111
3112 mutex_unlock(&pktgen_thread_lock);
3113
3114 /* Propagate thread->control */
3115 schedule_timeout_interruptible(msecs_to_jiffies(125));
3116
3117 pktgen_wait_all_threads_run(pn);
3118}
3119
3120static void pktgen_reset_all_threads(struct pktgen_net *pn)
3121{
3122 struct pktgen_thread *t;
3123
3124 func_enter();
3125
3126 mutex_lock(&pktgen_thread_lock);
3127
3128 list_for_each_entry(t, &pn->pktgen_threads, th_list)
3129 t->control |= (T_REMDEVALL);
3130
3131 mutex_unlock(&pktgen_thread_lock);
3132
3133 /* Propagate thread->control */
3134 schedule_timeout_interruptible(msecs_to_jiffies(125));
3135
3136 pktgen_wait_all_threads_run(pn);
3137}
3138
3139static void show_results(struct pktgen_dev *pkt_dev, int nr_frags)
3140{
3141 __u64 bps, mbps, pps;
3142 char *p = pkt_dev->result;
3143 ktime_t elapsed = ktime_sub(pkt_dev->stopped_at,
3144 pkt_dev->started_at);
3145 ktime_t idle = ns_to_ktime(pkt_dev->idle_acc);
3146
3147 p += sprintf(p, "OK: %llu(c%llu+d%llu) usec, %llu (%dbyte,%dfrags)\n",
3148 (unsigned long long)ktime_to_us(elapsed),
3149 (unsigned long long)ktime_to_us(ktime_sub(elapsed, idle)),
3150 (unsigned long long)ktime_to_us(idle),
3151 (unsigned long long)pkt_dev->sofar,
3152 pkt_dev->cur_pkt_size, nr_frags);
3153
3154 pps = div64_u64(pkt_dev->sofar * NSEC_PER_SEC,
3155 ktime_to_ns(elapsed));
3156
3157 bps = pps * 8 * pkt_dev->cur_pkt_size;
3158
3159 mbps = bps;
3160 do_div(mbps, 1000000);
3161 p += sprintf(p, " %llupps %lluMb/sec (%llubps) errors: %llu",
3162 (unsigned long long)pps,
3163 (unsigned long long)mbps,
3164 (unsigned long long)bps,
3165 (unsigned long long)pkt_dev->errors);
3166}
3167
3168/* Set stopped-at timer, remove from running list, do counters & statistics */
3169static int pktgen_stop_device(struct pktgen_dev *pkt_dev)
3170{
3171 int nr_frags = pkt_dev->skb ? skb_shinfo(pkt_dev->skb)->nr_frags : -1;
3172
3173 if (!pkt_dev->running) {
3174 pr_warn("interface: %s is already stopped\n",
3175 pkt_dev->odevname);
3176 return -EINVAL;
3177 }
3178
3179 pkt_dev->running = 0;
3180 kfree_skb(pkt_dev->skb);
3181 pkt_dev->skb = NULL;
3182 pkt_dev->stopped_at = ktime_get();
3183
3184 show_results(pkt_dev, nr_frags);
3185
3186 return 0;
3187}
3188
3189static struct pktgen_dev *next_to_run(struct pktgen_thread *t)
3190{
3191 struct pktgen_dev *pkt_dev, *best = NULL;
3192
3193 rcu_read_lock();
3194 list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
3195 if (!pkt_dev->running)
3196 continue;
3197 if (best == NULL)
3198 best = pkt_dev;
3199 else if (ktime_compare(pkt_dev->next_tx, best->next_tx) < 0)
3200 best = pkt_dev;
3201 }
3202 rcu_read_unlock();
3203
3204 return best;
3205}
3206
3207static void pktgen_stop(struct pktgen_thread *t)
3208{
3209 struct pktgen_dev *pkt_dev;
3210
3211 func_enter();
3212
3213 rcu_read_lock();
3214
3215 list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
3216 pktgen_stop_device(pkt_dev);
3217 }
3218
3219 rcu_read_unlock();
3220}
3221
3222/*
3223 * one of our devices needs to be removed - find it
3224 * and remove it
3225 */
3226static void pktgen_rem_one_if(struct pktgen_thread *t)
3227{
3228 struct list_head *q, *n;
3229 struct pktgen_dev *cur;
3230
3231 func_enter();
3232
3233 list_for_each_safe(q, n, &t->if_list) {
3234 cur = list_entry(q, struct pktgen_dev, list);
3235
3236 if (!cur->removal_mark)
3237 continue;
3238
3239 kfree_skb(cur->skb);
3240 cur->skb = NULL;
3241
3242 pktgen_remove_device(t, cur);
3243
3244 break;
3245 }
3246}
3247
3248static void pktgen_rem_all_ifs(struct pktgen_thread *t)
3249{
3250 struct list_head *q, *n;
3251 struct pktgen_dev *cur;
3252
3253 func_enter();
3254
3255 /* Remove all devices, free mem */
3256
3257 list_for_each_safe(q, n, &t->if_list) {
3258 cur = list_entry(q, struct pktgen_dev, list);
3259
3260 kfree_skb(cur->skb);
3261 cur->skb = NULL;
3262
3263 pktgen_remove_device(t, cur);
3264 }
3265}
3266
3267static void pktgen_rem_thread(struct pktgen_thread *t)
3268{
3269 /* Remove from the thread list */
3270 remove_proc_entry(t->tsk->comm, t->net->proc_dir);
3271}
3272
3273static void pktgen_resched(struct pktgen_dev *pkt_dev)
3274{
3275 ktime_t idle_start = ktime_get();
3276 schedule();
3277 pkt_dev->idle_acc += ktime_to_ns(ktime_sub(ktime_get(), idle_start));
3278}
3279
3280static void pktgen_wait_for_skb(struct pktgen_dev *pkt_dev)
3281{
3282 ktime_t idle_start = ktime_get();
3283
3284 while (refcount_read(&(pkt_dev->skb->users)) != 1) {
3285 if (signal_pending(current))
3286 break;
3287
3288 if (need_resched())
3289 pktgen_resched(pkt_dev);
3290 else
3291 cpu_relax();
3292 }
3293 pkt_dev->idle_acc += ktime_to_ns(ktime_sub(ktime_get(), idle_start));
3294}
3295
3296static void pktgen_xmit(struct pktgen_dev *pkt_dev)
3297{
3298 unsigned int burst = READ_ONCE(pkt_dev->burst);
3299 struct net_device *odev = pkt_dev->odev;
3300 struct netdev_queue *txq;
3301 struct sk_buff *skb;
3302 int ret;
3303
3304 /* If device is offline, then don't send */
3305 if (unlikely(!netif_running(odev) || !netif_carrier_ok(odev))) {
3306 pktgen_stop_device(pkt_dev);
3307 return;
3308 }
3309
3310 /* This is max DELAY, this has special meaning of
3311 * "never transmit"
3312 */
3313 if (unlikely(pkt_dev->delay == ULLONG_MAX)) {
3314 pkt_dev->next_tx = ktime_add_ns(ktime_get(), ULONG_MAX);
3315 return;
3316 }
3317
3318 /* If no skb or clone count exhausted then get new one */
3319 if (!pkt_dev->skb || (pkt_dev->last_ok &&
3320 ++pkt_dev->clone_count >= pkt_dev->clone_skb)) {
3321 /* build a new pkt */
3322 kfree_skb(pkt_dev->skb);
3323
3324 pkt_dev->skb = fill_packet(odev, pkt_dev);
3325 if (pkt_dev->skb == NULL) {
3326 pr_err("ERROR: couldn't allocate skb in fill_packet\n");
3327 schedule();
3328 pkt_dev->clone_count--; /* back out increment, OOM */
3329 return;
3330 }
3331 pkt_dev->last_pkt_size = pkt_dev->skb->len;
3332 pkt_dev->clone_count = 0; /* reset counter */
3333 }
3334
3335 if (pkt_dev->delay && pkt_dev->last_ok)
3336 spin(pkt_dev, pkt_dev->next_tx);
3337
3338 if (pkt_dev->xmit_mode == M_NETIF_RECEIVE) {
3339 skb = pkt_dev->skb;
3340 skb->protocol = eth_type_trans(skb, skb->dev);
3341 refcount_add(burst, &skb->users);
3342 local_bh_disable();
3343 do {
3344 ret = netif_receive_skb(skb);
3345 if (ret == NET_RX_DROP)
3346 pkt_dev->errors++;
3347 pkt_dev->sofar++;
3348 pkt_dev->seq_num++;
3349 if (refcount_read(&skb->users) != burst) {
3350 /* skb was queued by rps/rfs or taps,
3351 * so cannot reuse this skb
3352 */
3353 WARN_ON(refcount_sub_and_test(burst - 1, &skb->users));
3354 /* get out of the loop and wait
3355 * until skb is consumed
3356 */
3357 break;
3358 }
3359 /* skb was 'freed' by stack, so clean few
3360 * bits and reuse it
3361 */
3362 skb_reset_tc(skb);
3363 } while (--burst > 0);
3364 goto out; /* Skips xmit_mode M_START_XMIT */
3365 } else if (pkt_dev->xmit_mode == M_QUEUE_XMIT) {
3366 local_bh_disable();
3367 refcount_inc(&pkt_dev->skb->users);
3368
3369 ret = dev_queue_xmit(pkt_dev->skb);
3370 switch (ret) {
3371 case NET_XMIT_SUCCESS:
3372 pkt_dev->sofar++;
3373 pkt_dev->seq_num++;
3374 pkt_dev->tx_bytes += pkt_dev->last_pkt_size;
3375 break;
3376 case NET_XMIT_DROP:
3377 case NET_XMIT_CN:
3378 /* These are all valid return codes for a qdisc but
3379 * indicate packets are being dropped or will likely
3380 * be dropped soon.
3381 */
3382 case NETDEV_TX_BUSY:
3383 /* qdisc may call dev_hard_start_xmit directly in cases
3384 * where no queues exist e.g. loopback device, virtual
3385 * devices, etc. In this case we need to handle
3386 * NETDEV_TX_ codes.
3387 */
3388 default:
3389 pkt_dev->errors++;
3390 net_info_ratelimited("%s xmit error: %d\n",
3391 pkt_dev->odevname, ret);
3392 break;
3393 }
3394 goto out;
3395 }
3396
3397 txq = skb_get_tx_queue(odev, pkt_dev->skb);
3398
3399 local_bh_disable();
3400
3401 HARD_TX_LOCK(odev, txq, smp_processor_id());
3402
3403 if (unlikely(netif_xmit_frozen_or_drv_stopped(txq))) {
3404 ret = NETDEV_TX_BUSY;
3405 pkt_dev->last_ok = 0;
3406 goto unlock;
3407 }
3408 refcount_add(burst, &pkt_dev->skb->users);
3409
3410xmit_more:
3411 ret = netdev_start_xmit(pkt_dev->skb, odev, txq, --burst > 0);
3412
3413 switch (ret) {
3414 case NETDEV_TX_OK:
3415 pkt_dev->last_ok = 1;
3416 pkt_dev->sofar++;
3417 pkt_dev->seq_num++;
3418 pkt_dev->tx_bytes += pkt_dev->last_pkt_size;
3419 if (burst > 0 && !netif_xmit_frozen_or_drv_stopped(txq))
3420 goto xmit_more;
3421 break;
3422 case NET_XMIT_DROP:
3423 case NET_XMIT_CN:
3424 /* skb has been consumed */
3425 pkt_dev->errors++;
3426 break;
3427 default: /* Drivers are not supposed to return other values! */
3428 net_info_ratelimited("%s xmit error: %d\n",
3429 pkt_dev->odevname, ret);
3430 pkt_dev->errors++;
3431 /* fallthru */
3432 case NETDEV_TX_BUSY:
3433 /* Retry it next time */
3434 refcount_dec(&(pkt_dev->skb->users));
3435 pkt_dev->last_ok = 0;
3436 }
3437 if (unlikely(burst))
3438 WARN_ON(refcount_sub_and_test(burst, &pkt_dev->skb->users));
3439unlock:
3440 HARD_TX_UNLOCK(odev, txq);
3441
3442out:
3443 local_bh_enable();
3444
3445 /* If pkt_dev->count is zero, then run forever */
3446 if ((pkt_dev->count != 0) && (pkt_dev->sofar >= pkt_dev->count)) {
3447 pktgen_wait_for_skb(pkt_dev);
3448
3449 /* Done with this */
3450 pktgen_stop_device(pkt_dev);
3451 }
3452}
3453
3454/*
3455 * Main loop of the thread goes here
3456 */
3457
3458static int pktgen_thread_worker(void *arg)
3459{
3460 DEFINE_WAIT(wait);
3461 struct pktgen_thread *t = arg;
3462 struct pktgen_dev *pkt_dev = NULL;
3463 int cpu = t->cpu;
3464
3465 BUG_ON(smp_processor_id() != cpu);
3466
3467 init_waitqueue_head(&t->queue);
3468 complete(&t->start_done);
3469
3470 pr_debug("starting pktgen/%d: pid=%d\n", cpu, task_pid_nr(current));
3471
3472 set_freezable();
3473
3474 while (!kthread_should_stop()) {
3475 pkt_dev = next_to_run(t);
3476
3477 if (unlikely(!pkt_dev && t->control == 0)) {
3478 if (t->net->pktgen_exiting)
3479 break;
3480 wait_event_interruptible_timeout(t->queue,
3481 t->control != 0,
3482 HZ/10);
3483 try_to_freeze();
3484 continue;
3485 }
3486
3487 if (likely(pkt_dev)) {
3488 pktgen_xmit(pkt_dev);
3489
3490 if (need_resched())
3491 pktgen_resched(pkt_dev);
3492 else
3493 cpu_relax();
3494 }
3495
3496 if (t->control & T_STOP) {
3497 pktgen_stop(t);
3498 t->control &= ~(T_STOP);
3499 }
3500
3501 if (t->control & T_RUN) {
3502 pktgen_run(t);
3503 t->control &= ~(T_RUN);
3504 }
3505
3506 if (t->control & T_REMDEVALL) {
3507 pktgen_rem_all_ifs(t);
3508 t->control &= ~(T_REMDEVALL);
3509 }
3510
3511 if (t->control & T_REMDEV) {
3512 pktgen_rem_one_if(t);
3513 t->control &= ~(T_REMDEV);
3514 }
3515
3516 try_to_freeze();
3517 }
3518
3519 pr_debug("%s stopping all device\n", t->tsk->comm);
3520 pktgen_stop(t);
3521
3522 pr_debug("%s removing all device\n", t->tsk->comm);
3523 pktgen_rem_all_ifs(t);
3524
3525 pr_debug("%s removing thread\n", t->tsk->comm);
3526 pktgen_rem_thread(t);
3527
3528 return 0;
3529}
3530
3531static struct pktgen_dev *pktgen_find_dev(struct pktgen_thread *t,
3532 const char *ifname, bool exact)
3533{
3534 struct pktgen_dev *p, *pkt_dev = NULL;
3535 size_t len = strlen(ifname);
3536
3537 rcu_read_lock();
3538 list_for_each_entry_rcu(p, &t->if_list, list)
3539 if (strncmp(p->odevname, ifname, len) == 0) {
3540 if (p->odevname[len]) {
3541 if (exact || p->odevname[len] != '@')
3542 continue;
3543 }
3544 pkt_dev = p;
3545 break;
3546 }
3547
3548 rcu_read_unlock();
3549 pr_debug("find_dev(%s) returning %p\n", ifname, pkt_dev);
3550 return pkt_dev;
3551}
3552
3553/*
3554 * Adds a dev at front of if_list.
3555 */
3556
3557static int add_dev_to_thread(struct pktgen_thread *t,
3558 struct pktgen_dev *pkt_dev)
3559{
3560 int rv = 0;
3561
3562 /* This function cannot be called concurrently, as its called
3563 * under pktgen_thread_lock mutex, but it can run from
3564 * userspace on another CPU than the kthread. The if_lock()
3565 * is used here to sync with concurrent instances of
3566 * _rem_dev_from_if_list() invoked via kthread, which is also
3567 * updating the if_list */
3568 if_lock(t);
3569
3570 if (pkt_dev->pg_thread) {
3571 pr_err("ERROR: already assigned to a thread\n");
3572 rv = -EBUSY;
3573 goto out;
3574 }
3575
3576 pkt_dev->running = 0;
3577 pkt_dev->pg_thread = t;
3578 list_add_rcu(&pkt_dev->list, &t->if_list);
3579
3580out:
3581 if_unlock(t);
3582 return rv;
3583}
3584
3585/* Called under thread lock */
3586
3587static int pktgen_add_device(struct pktgen_thread *t, const char *ifname)
3588{
3589 struct pktgen_dev *pkt_dev;
3590 int err;
3591 int node = cpu_to_node(t->cpu);
3592
3593 /* We don't allow a device to be on several threads */
3594
3595 pkt_dev = __pktgen_NN_threads(t->net, ifname, FIND);
3596 if (pkt_dev) {
3597 pr_err("ERROR: interface already used\n");
3598 return -EBUSY;
3599 }
3600
3601 pkt_dev = kzalloc_node(sizeof(struct pktgen_dev), GFP_KERNEL, node);
3602 if (!pkt_dev)
3603 return -ENOMEM;
3604
3605 strcpy(pkt_dev->odevname, ifname);
3606 pkt_dev->flows = vzalloc_node(MAX_CFLOWS * sizeof(struct flow_state),
3607 node);
3608 if (pkt_dev->flows == NULL) {
3609 kfree(pkt_dev);
3610 return -ENOMEM;
3611 }
3612
3613 pkt_dev->removal_mark = 0;
3614 pkt_dev->nfrags = 0;
3615 pkt_dev->delay = pg_delay_d;
3616 pkt_dev->count = pg_count_d;
3617 pkt_dev->sofar = 0;
3618 pkt_dev->udp_src_min = 9; /* sink port */
3619 pkt_dev->udp_src_max = 9;
3620 pkt_dev->udp_dst_min = 9;
3621 pkt_dev->udp_dst_max = 9;
3622 pkt_dev->vlan_p = 0;
3623 pkt_dev->vlan_cfi = 0;
3624 pkt_dev->vlan_id = 0xffff;
3625 pkt_dev->svlan_p = 0;
3626 pkt_dev->svlan_cfi = 0;
3627 pkt_dev->svlan_id = 0xffff;
3628 pkt_dev->burst = 1;
3629 pkt_dev->node = -1;
3630
3631 err = pktgen_setup_dev(t->net, pkt_dev, ifname);
3632 if (err)
3633 goto out1;
3634 if (pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)
3635 pkt_dev->clone_skb = pg_clone_skb_d;
3636
3637 pkt_dev->entry = proc_create_data(ifname, 0600, t->net->proc_dir,
3638 &pktgen_if_fops, pkt_dev);
3639 if (!pkt_dev->entry) {
3640 pr_err("cannot create %s/%s procfs entry\n",
3641 PG_PROC_DIR, ifname);
3642 err = -EINVAL;
3643 goto out2;
3644 }
3645#ifdef CONFIG_XFRM
3646 pkt_dev->ipsmode = XFRM_MODE_TRANSPORT;
3647 pkt_dev->ipsproto = IPPROTO_ESP;
3648
3649 /* xfrm tunnel mode needs additional dst to extract outter
3650 * ip header protocol/ttl/id field, here creat a phony one.
3651 * instead of looking for a valid rt, which definitely hurting
3652 * performance under such circumstance.
3653 */
3654 pkt_dev->dstops.family = AF_INET;
3655 pkt_dev->xdst.u.dst.dev = pkt_dev->odev;
3656 dst_init_metrics(&pkt_dev->xdst.u.dst, pktgen_dst_metrics, false);
3657 pkt_dev->xdst.child = &pkt_dev->xdst.u.dst;
3658 pkt_dev->xdst.u.dst.ops = &pkt_dev->dstops;
3659#endif
3660
3661 return add_dev_to_thread(t, pkt_dev);
3662out2:
3663 dev_put(pkt_dev->odev);
3664out1:
3665#ifdef CONFIG_XFRM
3666 free_SAs(pkt_dev);
3667#endif
3668 vfree(pkt_dev->flows);
3669 kfree(pkt_dev);
3670 return err;
3671}
3672
3673static int __net_init pktgen_create_thread(int cpu, struct pktgen_net *pn)
3674{
3675 struct pktgen_thread *t;
3676 struct proc_dir_entry *pe;
3677 struct task_struct *p;
3678
3679 t = kzalloc_node(sizeof(struct pktgen_thread), GFP_KERNEL,
3680 cpu_to_node(cpu));
3681 if (!t) {
3682 pr_err("ERROR: out of memory, can't create new thread\n");
3683 return -ENOMEM;
3684 }
3685
3686 mutex_init(&t->if_lock);
3687 t->cpu = cpu;
3688
3689 INIT_LIST_HEAD(&t->if_list);
3690
3691 list_add_tail(&t->th_list, &pn->pktgen_threads);
3692 init_completion(&t->start_done);
3693
3694 p = kthread_create_on_node(pktgen_thread_worker,
3695 t,
3696 cpu_to_node(cpu),
3697 "kpktgend_%d", cpu);
3698 if (IS_ERR(p)) {
3699 pr_err("kernel_thread() failed for cpu %d\n", t->cpu);
3700 list_del(&t->th_list);
3701 kfree(t);
3702 return PTR_ERR(p);
3703 }
3704 kthread_bind(p, cpu);
3705 t->tsk = p;
3706
3707 pe = proc_create_data(t->tsk->comm, 0600, pn->proc_dir,
3708 &pktgen_thread_fops, t);
3709 if (!pe) {
3710 pr_err("cannot create %s/%s procfs entry\n",
3711 PG_PROC_DIR, t->tsk->comm);
3712 kthread_stop(p);
3713 list_del(&t->th_list);
3714 kfree(t);
3715 return -EINVAL;
3716 }
3717
3718 t->net = pn;
3719 get_task_struct(p);
3720 wake_up_process(p);
3721 wait_for_completion(&t->start_done);
3722
3723 return 0;
3724}
3725
3726/*
3727 * Removes a device from the thread if_list.
3728 */
3729static void _rem_dev_from_if_list(struct pktgen_thread *t,
3730 struct pktgen_dev *pkt_dev)
3731{
3732 struct list_head *q, *n;
3733 struct pktgen_dev *p;
3734
3735 if_lock(t);
3736 list_for_each_safe(q, n, &t->if_list) {
3737 p = list_entry(q, struct pktgen_dev, list);
3738 if (p == pkt_dev)
3739 list_del_rcu(&p->list);
3740 }
3741 if_unlock(t);
3742}
3743
3744static int pktgen_remove_device(struct pktgen_thread *t,
3745 struct pktgen_dev *pkt_dev)
3746{
3747 pr_debug("remove_device pkt_dev=%p\n", pkt_dev);
3748
3749 if (pkt_dev->running) {
3750 pr_warn("WARNING: trying to remove a running interface, stopping it now\n");
3751 pktgen_stop_device(pkt_dev);
3752 }
3753
3754 /* Dis-associate from the interface */
3755
3756 if (pkt_dev->odev) {
3757 dev_put(pkt_dev->odev);
3758 pkt_dev->odev = NULL;
3759 }
3760
3761 /* Remove proc before if_list entry, because add_device uses
3762 * list to determine if interface already exist, avoid race
3763 * with proc_create_data() */
3764 proc_remove(pkt_dev->entry);
3765
3766 /* And update the thread if_list */
3767 _rem_dev_from_if_list(t, pkt_dev);
3768
3769#ifdef CONFIG_XFRM
3770 free_SAs(pkt_dev);
3771#endif
3772 vfree(pkt_dev->flows);
3773 if (pkt_dev->page)
3774 put_page(pkt_dev->page);
3775 kfree_rcu(pkt_dev, rcu);
3776 return 0;
3777}
3778
3779static int __net_init pg_net_init(struct net *net)
3780{
3781 struct pktgen_net *pn = net_generic(net, pg_net_id);
3782 struct proc_dir_entry *pe;
3783 int cpu, ret = 0;
3784
3785 pn->net = net;
3786 INIT_LIST_HEAD(&pn->pktgen_threads);
3787 pn->pktgen_exiting = false;
3788 pn->proc_dir = proc_mkdir(PG_PROC_DIR, pn->net->proc_net);
3789 if (!pn->proc_dir) {
3790 pr_warn("cannot create /proc/net/%s\n", PG_PROC_DIR);
3791 return -ENODEV;
3792 }
3793 pe = proc_create(PGCTRL, 0600, pn->proc_dir, &pktgen_fops);
3794 if (pe == NULL) {
3795 pr_err("cannot create %s procfs entry\n", PGCTRL);
3796 ret = -EINVAL;
3797 goto remove;
3798 }
3799
3800 for_each_online_cpu(cpu) {
3801 int err;
3802
3803 err = pktgen_create_thread(cpu, pn);
3804 if (err)
3805 pr_warn("Cannot create thread for cpu %d (%d)\n",
3806 cpu, err);
3807 }
3808
3809 if (list_empty(&pn->pktgen_threads)) {
3810 pr_err("Initialization failed for all threads\n");
3811 ret = -ENODEV;
3812 goto remove_entry;
3813 }
3814
3815 return 0;
3816
3817remove_entry:
3818 remove_proc_entry(PGCTRL, pn->proc_dir);
3819remove:
3820 remove_proc_entry(PG_PROC_DIR, pn->net->proc_net);
3821 return ret;
3822}
3823
3824static void __net_exit pg_net_exit(struct net *net)
3825{
3826 struct pktgen_net *pn = net_generic(net, pg_net_id);
3827 struct pktgen_thread *t;
3828 struct list_head *q, *n;
3829 LIST_HEAD(list);
3830
3831 /* Stop all interfaces & threads */
3832 pn->pktgen_exiting = true;
3833
3834 mutex_lock(&pktgen_thread_lock);
3835 list_splice_init(&pn->pktgen_threads, &list);
3836 mutex_unlock(&pktgen_thread_lock);
3837
3838 list_for_each_safe(q, n, &list) {
3839 t = list_entry(q, struct pktgen_thread, th_list);
3840 list_del(&t->th_list);
3841 kthread_stop(t->tsk);
3842 put_task_struct(t->tsk);
3843 kfree(t);
3844 }
3845
3846 remove_proc_entry(PGCTRL, pn->proc_dir);
3847 remove_proc_entry(PG_PROC_DIR, pn->net->proc_net);
3848}
3849
3850static struct pernet_operations pg_net_ops = {
3851 .init = pg_net_init,
3852 .exit = pg_net_exit,
3853 .id = &pg_net_id,
3854 .size = sizeof(struct pktgen_net),
3855};
3856
3857static int __init pg_init(void)
3858{
3859 int ret = 0;
3860
3861 pr_info("%s", version);
3862 ret = register_pernet_subsys(&pg_net_ops);
3863 if (ret)
3864 return ret;
3865 ret = register_netdevice_notifier(&pktgen_notifier_block);
3866 if (ret)
3867 unregister_pernet_subsys(&pg_net_ops);
3868
3869 return ret;
3870}
3871
3872static void __exit pg_cleanup(void)
3873{
3874 unregister_netdevice_notifier(&pktgen_notifier_block);
3875 unregister_pernet_subsys(&pg_net_ops);
3876 /* Don't need rcu_barrier() due to use of kfree_rcu() */
3877}
3878
3879module_init(pg_init);
3880module_exit(pg_cleanup);
3881
3882MODULE_AUTHOR("Robert Olsson <robert.olsson@its.uu.se>");
3883MODULE_DESCRIPTION("Packet Generator tool");
3884MODULE_LICENSE("GPL");
3885MODULE_VERSION(VERSION);
3886module_param(pg_count_d, int, 0);
3887MODULE_PARM_DESC(pg_count_d, "Default number of packets to inject");
3888module_param(pg_delay_d, int, 0);
3889MODULE_PARM_DESC(pg_delay_d, "Default delay between packets (nanoseconds)");
3890module_param(pg_clone_skb_d, int, 0);
3891MODULE_PARM_DESC(pg_clone_skb_d, "Default number of copies of the same packet");
3892module_param(debug, int, 0);
3893MODULE_PARM_DESC(debug, "Enable debugging of pktgen module");