pktgen.c 101 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668166916701671167216731674167516761677167816791680168116821683168416851686168716881689169016911692169316941695169616971698169917001701170217031704170517061707170817091710171117121713171417151716171717181719172017211722172317241725172617271728172917301731173217331734173517361737173817391740174117421743174417451746174717481749175017511752175317541755175617571758175917601761176217631764176517661767176817691770177117721773177417751776177717781779178017811782178317841785178617871788178917901791179217931794179517961797179817991800180118021803180418051806180718081809181018111812181318141815181618171818181918201821182218231824182518261827182818291830183118321833183418351836183718381839184018411842184318441845184618471848184918501851185218531854185518561857185818591860186118621863186418651866186718681869187018711872187318741875187618771878187918801881188218831884188518861887188818891890189118921893189418951896189718981899190019011902190319041905190619071908190919101911191219131914191519161917191819191920192119221923192419251926192719281929193019311932193319341935193619371938193919401941194219431944194519461947194819491950195119521953195419551956195719581959196019611962196319641965196619671968196919701971197219731974197519761977197819791980198119821983198419851986198719881989199019911992199319941995199619971998199920002001200220032004200520062007200820092010201120122013201420152016201720182019202020212022202320242025202620272028202920302031203220332034203520362037203820392040204120422043204420452046204720482049205020512052205320542055205620572058205920602061206220632064206520662067206820692070207120722073207420752076207720782079208020812082208320842085208620872088208920902091209220932094209520962097209820992100210121022103210421052106210721082109211021112112211321142115211621172118211921202121212221232124212521262127212821292130213121322133213421352136213721382139214021412142214321442145214621472148214921502151215221532154215521562157215821592160216121622163216421652166216721682169217021712172217321742175217621772178217921802181218221832184218521862187218821892190219121922193219421952196219721982199220022012202220322042205220622072208220922102211221222132214221522162217221822192220222122222223222422252226222722282229223022312232223322342235223622372238223922402241224222432244224522462247224822492250225122522253225422552256225722582259226022612262226322642265226622672268226922702271227222732274227522762277227822792280228122822283228422852286228722882289229022912292229322942295229622972298229923002301230223032304230523062307230823092310231123122313231423152316231723182319232023212322232323242325232623272328232923302331233223332334233523362337233823392340234123422343234423452346234723482349235023512352235323542355235623572358235923602361236223632364236523662367236823692370237123722373237423752376237723782379238023812382238323842385238623872388238923902391239223932394239523962397239823992400240124022403240424052406240724082409241024112412241324142415241624172418241924202421242224232424242524262427242824292430243124322433243424352436243724382439244024412442244324442445244624472448244924502451245224532454245524562457245824592460246124622463246424652466246724682469247024712472247324742475247624772478247924802481248224832484248524862487248824892490249124922493249424952496249724982499250025012502250325042505250625072508250925102511251225132514251525162517251825192520252125222523252425252526252725282529253025312532253325342535253625372538253925402541254225432544254525462547254825492550255125522553255425552556255725582559256025612562256325642565256625672568256925702571257225732574257525762577257825792580258125822583258425852586258725882589259025912592259325942595259625972598259926002601260226032604260526062607260826092610261126122613261426152616261726182619262026212622262326242625262626272628262926302631263226332634263526362637263826392640264126422643264426452646264726482649265026512652265326542655265626572658265926602661266226632664266526662667266826692670267126722673267426752676267726782679268026812682268326842685268626872688268926902691269226932694269526962697269826992700270127022703270427052706270727082709271027112712271327142715271627172718271927202721272227232724272527262727272827292730273127322733273427352736273727382739274027412742274327442745274627472748274927502751275227532754275527562757275827592760276127622763276427652766276727682769277027712772277327742775277627772778277927802781278227832784278527862787278827892790279127922793279427952796279727982799280028012802280328042805280628072808280928102811281228132814281528162817281828192820282128222823282428252826282728282829283028312832283328342835283628372838283928402841284228432844284528462847284828492850285128522853285428552856285728582859286028612862286328642865286628672868286928702871287228732874287528762877287828792880288128822883288428852886288728882889289028912892289328942895289628972898289929002901290229032904290529062907290829092910291129122913291429152916291729182919292029212922292329242925292629272928292929302931293229332934293529362937293829392940294129422943294429452946294729482949295029512952295329542955295629572958295929602961296229632964296529662967296829692970297129722973297429752976297729782979298029812982298329842985298629872988298929902991299229932994299529962997299829993000300130023003300430053006300730083009301030113012301330143015301630173018301930203021302230233024302530263027302830293030303130323033303430353036303730383039304030413042304330443045304630473048304930503051305230533054305530563057305830593060306130623063306430653066306730683069307030713072307330743075307630773078307930803081308230833084308530863087308830893090309130923093309430953096309730983099310031013102310331043105310631073108310931103111311231133114311531163117311831193120312131223123312431253126312731283129313031313132313331343135313631373138313931403141314231433144314531463147314831493150315131523153315431553156315731583159316031613162316331643165316631673168316931703171317231733174317531763177317831793180318131823183318431853186318731883189319031913192319331943195319631973198319932003201320232033204320532063207320832093210321132123213321432153216321732183219322032213222322332243225322632273228322932303231323232333234323532363237323832393240324132423243324432453246324732483249325032513252325332543255325632573258325932603261326232633264326532663267326832693270327132723273327432753276327732783279328032813282328332843285328632873288328932903291329232933294329532963297329832993300330133023303330433053306330733083309331033113312331333143315331633173318331933203321332233233324332533263327332833293330333133323333333433353336333733383339334033413342334333443345334633473348334933503351335233533354335533563357335833593360336133623363336433653366336733683369337033713372337333743375337633773378337933803381338233833384338533863387338833893390339133923393339433953396339733983399340034013402340334043405340634073408340934103411341234133414341534163417341834193420342134223423342434253426342734283429343034313432343334343435343634373438343934403441344234433444344534463447344834493450345134523453345434553456345734583459346034613462346334643465346634673468346934703471347234733474347534763477347834793480348134823483348434853486348734883489349034913492349334943495349634973498349935003501350235033504350535063507350835093510351135123513351435153516351735183519352035213522352335243525352635273528352935303531353235333534353535363537353835393540354135423543354435453546354735483549355035513552355335543555355635573558355935603561356235633564356535663567356835693570357135723573357435753576357735783579358035813582358335843585358635873588358935903591359235933594359535963597359835993600360136023603360436053606360736083609361036113612361336143615361636173618361936203621362236233624362536263627362836293630363136323633363436353636363736383639364036413642364336443645364636473648364936503651365236533654365536563657365836593660366136623663366436653666366736683669367036713672367336743675367636773678367936803681368236833684368536863687368836893690369136923693369436953696369736983699370037013702370337043705370637073708370937103711371237133714371537163717371837193720372137223723372437253726372737283729373037313732373337343735373637373738373937403741374237433744374537463747374837493750375137523753375437553756375737583759376037613762376337643765376637673768376937703771377237733774377537763777377837793780378137823783378437853786378737883789379037913792379337943795379637973798379938003801380238033804380538063807380838093810381138123813381438153816381738183819382038213822382338243825382638273828382938303831383238333834383538363837383838393840384138423843384438453846384738483849385038513852385338543855385638573858385938603861386238633864386538663867386838693870387138723873387438753876387738783879388038813882388338843885388638873888388938903891389238933894389538963897389838993900390139023903390439053906390739083909391039113912391339143915391639173918391939203921392239233924392539263927392839293930393139323933393439353936393739383939394039413942394339443945394639473948394939503951395239533954395539563957395839593960396139623963396439653966396739683969397039713972397339743975397639773978397939803981398239833984398539863987398839893990399139923993399439953996399739983999400040014002400340044005400640074008400940104011401240134014401540164017401840194020402140224023402440254026402740284029403040314032403340344035403640374038403940404041404240434044404540464047404840494050405140524053405440554056405740584059406040614062406340644065406640674068406940704071407240734074407540764077407840794080408140824083408440854086408740884089
  1. // SPDX-License-Identifier: GPL-2.0-or-later
  2. /*
  3. * Authors:
  4. * Copyright 2001, 2002 by Robert Olsson <robert.olsson@its.uu.se>
  5. * Uppsala University and
  6. * Swedish University of Agricultural Sciences
  7. *
  8. * Alexey Kuznetsov <kuznet@ms2.inr.ac.ru>
  9. * Ben Greear <greearb@candelatech.com>
  10. * Jens Låås <jens.laas@data.slu.se>
  11. *
  12. * A tool for loading the network with preconfigurated packets.
  13. * The tool is implemented as a linux module. Parameters are output
  14. * device, delay (to hard_xmit), number of packets, and whether
  15. * to use multiple SKBs or just the same one.
  16. * pktgen uses the installed interface's output routine.
  17. *
  18. * Additional hacking by:
  19. *
  20. * Jens.Laas@data.slu.se
  21. * Improved by ANK. 010120.
  22. * Improved by ANK even more. 010212.
  23. * MAC address typo fixed. 010417 --ro
  24. * Integrated. 020301 --DaveM
  25. * Added multiskb option 020301 --DaveM
  26. * Scaling of results. 020417--sigurdur@linpro.no
  27. * Significant re-work of the module:
  28. * * Convert to threaded model to more efficiently be able to transmit
  29. * and receive on multiple interfaces at once.
  30. * * Converted many counters to __u64 to allow longer runs.
  31. * * Allow configuration of ranges, like min/max IP address, MACs,
  32. * and UDP-ports, for both source and destination, and can
  33. * set to use a random distribution or sequentially walk the range.
  34. * * Can now change most values after starting.
  35. * * Place 12-byte packet in UDP payload with magic number,
  36. * sequence number, and timestamp.
  37. * * Add receiver code that detects dropped pkts, re-ordered pkts, and
  38. * latencies (with micro-second) precision.
  39. * * Add IOCTL interface to easily get counters & configuration.
  40. * --Ben Greear <greearb@candelatech.com>
  41. *
  42. * Renamed multiskb to clone_skb and cleaned up sending core for two distinct
  43. * skb modes. A clone_skb=0 mode for Ben "ranges" work and a clone_skb != 0
  44. * as a "fastpath" with a configurable number of clones after alloc's.
  45. * clone_skb=0 means all packets are allocated this also means ranges time
  46. * stamps etc can be used. clone_skb=100 means 1 malloc is followed by 100
  47. * clones.
  48. *
  49. * Also moved to /proc/net/pktgen/
  50. * --ro
  51. *
  52. * Sept 10: Fixed threading/locking. Lots of bone-headed and more clever
  53. * mistakes. Also merged in DaveM's patch in the -pre6 patch.
  54. * --Ben Greear <greearb@candelatech.com>
  55. *
  56. * Integrated to 2.5.x 021029 --Lucio Maciel (luciomaciel@zipmail.com.br)
  57. *
  58. * 021124 Finished major redesign and rewrite for new functionality.
  59. * See Documentation/networking/pktgen.rst for how to use this.
  60. *
  61. * The new operation:
  62. * For each CPU one thread/process is created at start. This process checks
  63. * for running devices in the if_list and sends packets until count is 0 it
  64. * also the thread checks the thread->control which is used for inter-process
  65. * communication. controlling process "posts" operations to the threads this
  66. * way.
  67. * The if_list is RCU protected, and the if_lock remains to protect updating
  68. * of if_list, from "add_device" as it invoked from userspace (via proc write).
  69. *
  70. * By design there should only be *one* "controlling" process. In practice
  71. * multiple write accesses gives unpredictable result. Understood by "write"
  72. * to /proc gives result code that should be read be the "writer".
  73. * For practical use this should be no problem.
  74. *
  75. * Note when adding devices to a specific CPU there good idea to also assign
  76. * /proc/irq/XX/smp_affinity so TX-interrupts gets bound to the same CPU.
  77. * --ro
  78. *
  79. * Fix refcount off by one if first packet fails, potential null deref,
  80. * memleak 030710- KJP
  81. *
  82. * First "ranges" functionality for ipv6 030726 --ro
  83. *
  84. * Included flow support. 030802 ANK.
  85. *
  86. * Fixed unaligned access on IA-64 Grant Grundler <grundler@parisc-linux.org>
  87. *
  88. * Remove if fix from added Harald Welte <laforge@netfilter.org> 040419
  89. * ia64 compilation fix from Aron Griffis <aron@hp.com> 040604
  90. *
  91. * New xmit() return, do_div and misc clean up by Stephen Hemminger
  92. * <shemminger@osdl.org> 040923
  93. *
  94. * Randy Dunlap fixed u64 printk compiler warning
  95. *
  96. * Remove FCS from BW calculation. Lennert Buytenhek <buytenh@wantstofly.org>
  97. * New time handling. Lennert Buytenhek <buytenh@wantstofly.org> 041213
  98. *
  99. * Corrections from Nikolai Malykh (nmalykh@bilim.com)
  100. * Removed unused flags F_SET_SRCMAC & F_SET_SRCIP 041230
  101. *
  102. * interruptible_sleep_on_timeout() replaced Nishanth Aravamudan <nacc@us.ibm.com>
  103. * 050103
  104. *
  105. * MPLS support by Steven Whitehouse <steve@chygwyn.com>
  106. *
  107. * 802.1Q/Q-in-Q support by Francesco Fondelli (FF) <francesco.fondelli@gmail.com>
  108. *
  109. * Fixed src_mac command to set source mac of packet to value specified in
  110. * command by Adit Ranadive <adit.262@gmail.com>
  111. */
  112. #define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
  113. #include <linux/sys.h>
  114. #include <linux/types.h>
  115. #include <linux/module.h>
  116. #include <linux/moduleparam.h>
  117. #include <linux/kernel.h>
  118. #include <linux/mutex.h>
  119. #include <linux/sched.h>
  120. #include <linux/slab.h>
  121. #include <linux/vmalloc.h>
  122. #include <linux/unistd.h>
  123. #include <linux/string.h>
  124. #include <linux/ptrace.h>
  125. #include <linux/errno.h>
  126. #include <linux/ioport.h>
  127. #include <linux/interrupt.h>
  128. #include <linux/capability.h>
  129. #include <linux/hrtimer.h>
  130. #include <linux/freezer.h>
  131. #include <linux/delay.h>
  132. #include <linux/timer.h>
  133. #include <linux/list.h>
  134. #include <linux/init.h>
  135. #include <linux/skbuff.h>
  136. #include <linux/netdevice.h>
  137. #include <linux/inet.h>
  138. #include <linux/inetdevice.h>
  139. #include <linux/rtnetlink.h>
  140. #include <linux/if_arp.h>
  141. #include <linux/if_vlan.h>
  142. #include <linux/in.h>
  143. #include <linux/ip.h>
  144. #include <linux/ipv6.h>
  145. #include <linux/udp.h>
  146. #include <linux/proc_fs.h>
  147. #include <linux/seq_file.h>
  148. #include <linux/wait.h>
  149. #include <linux/etherdevice.h>
  150. #include <linux/kthread.h>
  151. #include <linux/prefetch.h>
  152. #include <linux/mmzone.h>
  153. #include <net/net_namespace.h>
  154. #include <net/checksum.h>
  155. #include <net/ipv6.h>
  156. #include <net/udp.h>
  157. #include <net/ip6_checksum.h>
  158. #include <net/addrconf.h>
  159. #ifdef CONFIG_XFRM
  160. #include <net/xfrm.h>
  161. #endif
  162. #include <net/netns/generic.h>
  163. #include <asm/byteorder.h>
  164. #include <linux/rcupdate.h>
  165. #include <linux/bitops.h>
  166. #include <linux/io.h>
  167. #include <linux/timex.h>
  168. #include <linux/uaccess.h>
  169. #include <asm/dma.h>
  170. #include <asm/div64.h> /* do_div */
  171. #define VERSION "2.75"
  172. #define IP_NAME_SZ 32
  173. #define MAX_MPLS_LABELS 16 /* This is the max label stack depth */
  174. #define MPLS_STACK_BOTTOM htonl(0x00000100)
  175. /* Max number of internet mix entries that can be specified in imix_weights. */
  176. #define MAX_IMIX_ENTRIES 20
  177. #define IMIX_PRECISION 100 /* Precision of IMIX distribution */
  178. #define func_enter() pr_debug("entering %s\n", __func__);
  179. #define PKT_FLAGS \
  180. pf(IPV6) /* Interface in IPV6 Mode */ \
  181. pf(IPSRC_RND) /* IP-Src Random */ \
  182. pf(IPDST_RND) /* IP-Dst Random */ \
  183. pf(TXSIZE_RND) /* Transmit size is random */ \
  184. pf(UDPSRC_RND) /* UDP-Src Random */ \
  185. pf(UDPDST_RND) /* UDP-Dst Random */ \
  186. pf(UDPCSUM) /* Include UDP checksum */ \
  187. pf(NO_TIMESTAMP) /* Don't timestamp packets (default TS) */ \
  188. pf(MPLS_RND) /* Random MPLS labels */ \
  189. pf(QUEUE_MAP_RND) /* queue map Random */ \
  190. pf(QUEUE_MAP_CPU) /* queue map mirrors smp_processor_id() */ \
  191. pf(FLOW_SEQ) /* Sequential flows */ \
  192. pf(IPSEC) /* ipsec on for flows */ \
  193. pf(MACSRC_RND) /* MAC-Src Random */ \
  194. pf(MACDST_RND) /* MAC-Dst Random */ \
  195. pf(VID_RND) /* Random VLAN ID */ \
  196. pf(SVID_RND) /* Random SVLAN ID */ \
  197. pf(NODE) /* Node memory alloc*/ \
  198. pf(SHARED) /* Shared SKB */ \
  199. #define pf(flag) flag##_SHIFT,
  200. enum pkt_flags {
  201. PKT_FLAGS
  202. };
  203. #undef pf
  204. /* Device flag bits */
  205. #define pf(flag) static const __u32 F_##flag = (1<<flag##_SHIFT);
  206. PKT_FLAGS
  207. #undef pf
  208. #define pf(flag) __stringify(flag),
  209. static char *pkt_flag_names[] = {
  210. PKT_FLAGS
  211. };
  212. #undef pf
  213. #define NR_PKT_FLAGS ARRAY_SIZE(pkt_flag_names)
  214. /* Thread control flag bits */
  215. #define T_STOP (1<<0) /* Stop run */
  216. #define T_RUN (1<<1) /* Start run */
  217. #define T_REMDEVALL (1<<2) /* Remove all devs */
  218. #define T_REMDEV (1<<3) /* Remove one dev */
  219. /* Xmit modes */
  220. #define M_START_XMIT 0 /* Default normal TX */
  221. #define M_NETIF_RECEIVE 1 /* Inject packets into stack */
  222. #define M_QUEUE_XMIT 2 /* Inject packet into qdisc */
  223. /* If lock -- protects updating of if_list */
  224. #define if_lock(t) mutex_lock(&(t->if_lock));
  225. #define if_unlock(t) mutex_unlock(&(t->if_lock));
  226. /* Used to help with determining the pkts on receive */
  227. #define PKTGEN_MAGIC 0xbe9be955
  228. #define PG_PROC_DIR "pktgen"
  229. #define PGCTRL "pgctrl"
  230. #define MAX_CFLOWS 65536
  231. #define VLAN_TAG_SIZE(x) ((x)->vlan_id == 0xffff ? 0 : 4)
  232. #define SVLAN_TAG_SIZE(x) ((x)->svlan_id == 0xffff ? 0 : 4)
  233. struct imix_pkt {
  234. u64 size;
  235. u64 weight;
  236. u64 count_so_far;
  237. };
  238. struct flow_state {
  239. __be32 cur_daddr;
  240. int count;
  241. #ifdef CONFIG_XFRM
  242. struct xfrm_state *x;
  243. #endif
  244. __u32 flags;
  245. };
  246. /* flow flag bits */
  247. #define F_INIT (1<<0) /* flow has been initialized */
  248. struct pktgen_dev {
  249. /*
  250. * Try to keep frequent/infrequent used vars. separated.
  251. */
  252. struct proc_dir_entry *entry; /* proc file */
  253. struct pktgen_thread *pg_thread;/* the owner */
  254. struct list_head list; /* chaining in the thread's run-queue */
  255. struct rcu_head rcu; /* freed by RCU */
  256. int running; /* if false, the test will stop */
  257. /* If min != max, then we will either do a linear iteration, or
  258. * we will do a random selection from within the range.
  259. */
  260. __u32 flags;
  261. int xmit_mode;
  262. int min_pkt_size;
  263. int max_pkt_size;
  264. int pkt_overhead; /* overhead for MPLS, VLANs, IPSEC etc */
  265. int nfrags;
  266. int removal_mark; /* non-zero => the device is marked for
  267. * removal by worker thread */
  268. struct page *page;
  269. u64 delay; /* nano-seconds */
  270. __u64 count; /* Default No packets to send */
  271. __u64 sofar; /* How many pkts we've sent so far */
  272. __u64 tx_bytes; /* How many bytes we've transmitted */
  273. __u64 errors; /* Errors when trying to transmit, */
  274. /* runtime counters relating to clone_skb */
  275. __u32 clone_count;
  276. int last_ok; /* Was last skb sent?
  277. * Or a failed transmit of some sort?
  278. * This will keep sequence numbers in order
  279. */
  280. ktime_t next_tx;
  281. ktime_t started_at;
  282. ktime_t stopped_at;
  283. u64 idle_acc; /* nano-seconds */
  284. __u32 seq_num;
  285. int clone_skb; /*
  286. * Use multiple SKBs during packet gen.
  287. * If this number is greater than 1, then
  288. * that many copies of the same packet will be
  289. * sent before a new packet is allocated.
  290. * If you want to send 1024 identical packets
  291. * before creating a new packet,
  292. * set clone_skb to 1024.
  293. */
  294. char dst_min[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
  295. char dst_max[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
  296. char src_min[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
  297. char src_max[IP_NAME_SZ]; /* IP, ie 1.2.3.4 */
  298. struct in6_addr in6_saddr;
  299. struct in6_addr in6_daddr;
  300. struct in6_addr cur_in6_daddr;
  301. struct in6_addr cur_in6_saddr;
  302. /* For ranges */
  303. struct in6_addr min_in6_daddr;
  304. struct in6_addr max_in6_daddr;
  305. struct in6_addr min_in6_saddr;
  306. struct in6_addr max_in6_saddr;
  307. /* If we're doing ranges, random or incremental, then this
  308. * defines the min/max for those ranges.
  309. */
  310. __be32 saddr_min; /* inclusive, source IP address */
  311. __be32 saddr_max; /* exclusive, source IP address */
  312. __be32 daddr_min; /* inclusive, dest IP address */
  313. __be32 daddr_max; /* exclusive, dest IP address */
  314. __u16 udp_src_min; /* inclusive, source UDP port */
  315. __u16 udp_src_max; /* exclusive, source UDP port */
  316. __u16 udp_dst_min; /* inclusive, dest UDP port */
  317. __u16 udp_dst_max; /* exclusive, dest UDP port */
  318. /* DSCP + ECN */
  319. __u8 tos; /* six MSB of (former) IPv4 TOS
  320. are for dscp codepoint */
  321. __u8 traffic_class; /* ditto for the (former) Traffic Class in IPv6
  322. (see RFC 3260, sec. 4) */
  323. /* IMIX */
  324. unsigned int n_imix_entries;
  325. struct imix_pkt imix_entries[MAX_IMIX_ENTRIES];
  326. /* Maps 0-IMIX_PRECISION range to imix_entry based on probability*/
  327. __u8 imix_distribution[IMIX_PRECISION];
  328. /* MPLS */
  329. unsigned int nr_labels; /* Depth of stack, 0 = no MPLS */
  330. __be32 labels[MAX_MPLS_LABELS];
  331. /* VLAN/SVLAN (802.1Q/Q-in-Q) */
  332. __u8 vlan_p;
  333. __u8 vlan_cfi;
  334. __u16 vlan_id; /* 0xffff means no vlan tag */
  335. __u8 svlan_p;
  336. __u8 svlan_cfi;
  337. __u16 svlan_id; /* 0xffff means no svlan tag */
  338. __u32 src_mac_count; /* How many MACs to iterate through */
  339. __u32 dst_mac_count; /* How many MACs to iterate through */
  340. unsigned char dst_mac[ETH_ALEN];
  341. unsigned char src_mac[ETH_ALEN];
  342. __u32 cur_dst_mac_offset;
  343. __u32 cur_src_mac_offset;
  344. __be32 cur_saddr;
  345. __be32 cur_daddr;
  346. __u16 ip_id;
  347. __u16 cur_udp_dst;
  348. __u16 cur_udp_src;
  349. __u16 cur_queue_map;
  350. __u32 cur_pkt_size;
  351. __u32 last_pkt_size;
  352. __u8 hh[14];
  353. /* = {
  354. 0x00, 0x80, 0xC8, 0x79, 0xB3, 0xCB,
  355. We fill in SRC address later
  356. 0x00, 0x00, 0x00, 0x00, 0x00, 0x00,
  357. 0x08, 0x00
  358. };
  359. */
  360. __u16 pad; /* pad out the hh struct to an even 16 bytes */
  361. struct sk_buff *skb; /* skb we are to transmit next, used for when we
  362. * are transmitting the same one multiple times
  363. */
  364. struct net_device *odev; /* The out-going device.
  365. * Note that the device should have it's
  366. * pg_info pointer pointing back to this
  367. * device.
  368. * Set when the user specifies the out-going
  369. * device name (not when the inject is
  370. * started as it used to do.)
  371. */
  372. netdevice_tracker dev_tracker;
  373. char odevname[32];
  374. struct flow_state *flows;
  375. unsigned int cflows; /* Concurrent flows (config) */
  376. unsigned int lflow; /* Flow length (config) */
  377. unsigned int nflows; /* accumulated flows (stats) */
  378. unsigned int curfl; /* current sequenced flow (state)*/
  379. u16 queue_map_min;
  380. u16 queue_map_max;
  381. __u32 skb_priority; /* skb priority field */
  382. unsigned int burst; /* number of duplicated packets to burst */
  383. int node; /* Memory node */
  384. #ifdef CONFIG_XFRM
  385. __u8 ipsmode; /* IPSEC mode (config) */
  386. __u8 ipsproto; /* IPSEC type (config) */
  387. __u32 spi;
  388. struct xfrm_dst xdst;
  389. struct dst_ops dstops;
  390. #endif
  391. char result[512];
  392. };
  393. struct pktgen_hdr {
  394. __be32 pgh_magic;
  395. __be32 seq_num;
  396. __be32 tv_sec;
  397. __be32 tv_usec;
  398. };
  399. static unsigned int pg_net_id __read_mostly;
  400. struct pktgen_net {
  401. struct net *net;
  402. struct proc_dir_entry *proc_dir;
  403. struct list_head pktgen_threads;
  404. bool pktgen_exiting;
  405. };
  406. struct pktgen_thread {
  407. struct mutex if_lock; /* for list of devices */
  408. struct list_head if_list; /* All device here */
  409. struct list_head th_list;
  410. struct task_struct *tsk;
  411. char result[512];
  412. /* Field for thread to receive "posted" events terminate,
  413. stop ifs etc. */
  414. u32 control;
  415. int cpu;
  416. wait_queue_head_t queue;
  417. struct completion start_done;
  418. struct pktgen_net *net;
  419. };
  420. #define REMOVE 1
  421. #define FIND 0
  422. static const char version[] =
  423. "Packet Generator for packet performance testing. "
  424. "Version: " VERSION "\n";
  425. static int pktgen_remove_device(struct pktgen_thread *t, struct pktgen_dev *i);
  426. static int pktgen_add_device(struct pktgen_thread *t, const char *ifname);
  427. static struct pktgen_dev *pktgen_find_dev(struct pktgen_thread *t,
  428. const char *ifname, bool exact);
  429. static int pktgen_device_event(struct notifier_block *, unsigned long, void *);
  430. static void pktgen_run_all_threads(struct pktgen_net *pn);
  431. static void pktgen_reset_all_threads(struct pktgen_net *pn);
  432. static void pktgen_stop_all_threads(struct pktgen_net *pn);
  433. static void pktgen_stop(struct pktgen_thread *t);
  434. static void pktgen_clear_counters(struct pktgen_dev *pkt_dev);
  435. static void fill_imix_distribution(struct pktgen_dev *pkt_dev);
  436. /* Module parameters, defaults. */
  437. static int pg_count_d __read_mostly = 1000;
  438. static int pg_delay_d __read_mostly;
  439. static int pg_clone_skb_d __read_mostly;
  440. static int debug __read_mostly;
  441. static DEFINE_MUTEX(pktgen_thread_lock);
  442. static struct notifier_block pktgen_notifier_block = {
  443. .notifier_call = pktgen_device_event,
  444. };
  445. /*
  446. * /proc handling functions
  447. *
  448. */
  449. static int pgctrl_show(struct seq_file *seq, void *v)
  450. {
  451. seq_puts(seq, version);
  452. return 0;
  453. }
  454. static ssize_t pgctrl_write(struct file *file, const char __user *buf,
  455. size_t count, loff_t *ppos)
  456. {
  457. char data[128];
  458. struct pktgen_net *pn = net_generic(current->nsproxy->net_ns, pg_net_id);
  459. if (!capable(CAP_NET_ADMIN))
  460. return -EPERM;
  461. if (count == 0)
  462. return -EINVAL;
  463. if (count > sizeof(data))
  464. count = sizeof(data);
  465. if (copy_from_user(data, buf, count))
  466. return -EFAULT;
  467. data[count - 1] = 0; /* Strip trailing '\n' and terminate string */
  468. if (!strcmp(data, "stop"))
  469. pktgen_stop_all_threads(pn);
  470. else if (!strcmp(data, "start"))
  471. pktgen_run_all_threads(pn);
  472. else if (!strcmp(data, "reset"))
  473. pktgen_reset_all_threads(pn);
  474. else
  475. return -EINVAL;
  476. return count;
  477. }
  478. static int pgctrl_open(struct inode *inode, struct file *file)
  479. {
  480. return single_open(file, pgctrl_show, pde_data(inode));
  481. }
  482. static const struct proc_ops pktgen_proc_ops = {
  483. .proc_open = pgctrl_open,
  484. .proc_read = seq_read,
  485. .proc_lseek = seq_lseek,
  486. .proc_write = pgctrl_write,
  487. .proc_release = single_release,
  488. };
  489. static int pktgen_if_show(struct seq_file *seq, void *v)
  490. {
  491. const struct pktgen_dev *pkt_dev = seq->private;
  492. ktime_t stopped;
  493. unsigned int i;
  494. u64 idle;
  495. seq_printf(seq,
  496. "Params: count %llu min_pkt_size: %u max_pkt_size: %u\n",
  497. (unsigned long long)pkt_dev->count, pkt_dev->min_pkt_size,
  498. pkt_dev->max_pkt_size);
  499. if (pkt_dev->n_imix_entries > 0) {
  500. seq_puts(seq, " imix_weights: ");
  501. for (i = 0; i < pkt_dev->n_imix_entries; i++) {
  502. seq_printf(seq, "%llu,%llu ",
  503. pkt_dev->imix_entries[i].size,
  504. pkt_dev->imix_entries[i].weight);
  505. }
  506. seq_puts(seq, "\n");
  507. }
  508. seq_printf(seq,
  509. " frags: %d delay: %llu clone_skb: %d ifname: %s\n",
  510. pkt_dev->nfrags, (unsigned long long) pkt_dev->delay,
  511. pkt_dev->clone_skb, pkt_dev->odevname);
  512. seq_printf(seq, " flows: %u flowlen: %u\n", pkt_dev->cflows,
  513. pkt_dev->lflow);
  514. seq_printf(seq,
  515. " queue_map_min: %u queue_map_max: %u\n",
  516. pkt_dev->queue_map_min,
  517. pkt_dev->queue_map_max);
  518. if (pkt_dev->skb_priority)
  519. seq_printf(seq, " skb_priority: %u\n",
  520. pkt_dev->skb_priority);
  521. if (pkt_dev->flags & F_IPV6) {
  522. seq_printf(seq,
  523. " saddr: %pI6c min_saddr: %pI6c max_saddr: %pI6c\n"
  524. " daddr: %pI6c min_daddr: %pI6c max_daddr: %pI6c\n",
  525. &pkt_dev->in6_saddr,
  526. &pkt_dev->min_in6_saddr, &pkt_dev->max_in6_saddr,
  527. &pkt_dev->in6_daddr,
  528. &pkt_dev->min_in6_daddr, &pkt_dev->max_in6_daddr);
  529. } else {
  530. seq_printf(seq,
  531. " dst_min: %s dst_max: %s\n",
  532. pkt_dev->dst_min, pkt_dev->dst_max);
  533. seq_printf(seq,
  534. " src_min: %s src_max: %s\n",
  535. pkt_dev->src_min, pkt_dev->src_max);
  536. }
  537. seq_puts(seq, " src_mac: ");
  538. seq_printf(seq, "%pM ",
  539. is_zero_ether_addr(pkt_dev->src_mac) ?
  540. pkt_dev->odev->dev_addr : pkt_dev->src_mac);
  541. seq_puts(seq, "dst_mac: ");
  542. seq_printf(seq, "%pM\n", pkt_dev->dst_mac);
  543. seq_printf(seq,
  544. " udp_src_min: %d udp_src_max: %d"
  545. " udp_dst_min: %d udp_dst_max: %d\n",
  546. pkt_dev->udp_src_min, pkt_dev->udp_src_max,
  547. pkt_dev->udp_dst_min, pkt_dev->udp_dst_max);
  548. seq_printf(seq,
  549. " src_mac_count: %d dst_mac_count: %d\n",
  550. pkt_dev->src_mac_count, pkt_dev->dst_mac_count);
  551. if (pkt_dev->nr_labels) {
  552. seq_puts(seq, " mpls: ");
  553. for (i = 0; i < pkt_dev->nr_labels; i++)
  554. seq_printf(seq, "%08x%s", ntohl(pkt_dev->labels[i]),
  555. i == pkt_dev->nr_labels-1 ? "\n" : ", ");
  556. }
  557. if (pkt_dev->vlan_id != 0xffff)
  558. seq_printf(seq, " vlan_id: %u vlan_p: %u vlan_cfi: %u\n",
  559. pkt_dev->vlan_id, pkt_dev->vlan_p,
  560. pkt_dev->vlan_cfi);
  561. if (pkt_dev->svlan_id != 0xffff)
  562. seq_printf(seq, " svlan_id: %u vlan_p: %u vlan_cfi: %u\n",
  563. pkt_dev->svlan_id, pkt_dev->svlan_p,
  564. pkt_dev->svlan_cfi);
  565. if (pkt_dev->tos)
  566. seq_printf(seq, " tos: 0x%02x\n", pkt_dev->tos);
  567. if (pkt_dev->traffic_class)
  568. seq_printf(seq, " traffic_class: 0x%02x\n", pkt_dev->traffic_class);
  569. if (pkt_dev->burst > 1)
  570. seq_printf(seq, " burst: %d\n", pkt_dev->burst);
  571. if (pkt_dev->node >= 0)
  572. seq_printf(seq, " node: %d\n", pkt_dev->node);
  573. if (pkt_dev->xmit_mode == M_NETIF_RECEIVE)
  574. seq_puts(seq, " xmit_mode: netif_receive\n");
  575. else if (pkt_dev->xmit_mode == M_QUEUE_XMIT)
  576. seq_puts(seq, " xmit_mode: xmit_queue\n");
  577. seq_puts(seq, " Flags: ");
  578. for (i = 0; i < NR_PKT_FLAGS; i++) {
  579. if (i == FLOW_SEQ_SHIFT)
  580. if (!pkt_dev->cflows)
  581. continue;
  582. if (pkt_dev->flags & (1 << i)) {
  583. seq_printf(seq, "%s ", pkt_flag_names[i]);
  584. #ifdef CONFIG_XFRM
  585. if (i == IPSEC_SHIFT && pkt_dev->spi)
  586. seq_printf(seq, "spi:%u ", pkt_dev->spi);
  587. #endif
  588. } else if (i == FLOW_SEQ_SHIFT) {
  589. seq_puts(seq, "FLOW_RND ");
  590. }
  591. }
  592. seq_puts(seq, "\n");
  593. /* not really stopped, more like last-running-at */
  594. stopped = pkt_dev->running ? ktime_get() : pkt_dev->stopped_at;
  595. idle = pkt_dev->idle_acc;
  596. do_div(idle, NSEC_PER_USEC);
  597. seq_printf(seq,
  598. "Current:\n pkts-sofar: %llu errors: %llu\n",
  599. (unsigned long long)pkt_dev->sofar,
  600. (unsigned long long)pkt_dev->errors);
  601. if (pkt_dev->n_imix_entries > 0) {
  602. int i;
  603. seq_puts(seq, " imix_size_counts: ");
  604. for (i = 0; i < pkt_dev->n_imix_entries; i++) {
  605. seq_printf(seq, "%llu,%llu ",
  606. pkt_dev->imix_entries[i].size,
  607. pkt_dev->imix_entries[i].count_so_far);
  608. }
  609. seq_puts(seq, "\n");
  610. }
  611. seq_printf(seq,
  612. " started: %lluus stopped: %lluus idle: %lluus\n",
  613. (unsigned long long) ktime_to_us(pkt_dev->started_at),
  614. (unsigned long long) ktime_to_us(stopped),
  615. (unsigned long long) idle);
  616. seq_printf(seq,
  617. " seq_num: %d cur_dst_mac_offset: %d cur_src_mac_offset: %d\n",
  618. pkt_dev->seq_num, pkt_dev->cur_dst_mac_offset,
  619. pkt_dev->cur_src_mac_offset);
  620. if (pkt_dev->flags & F_IPV6) {
  621. seq_printf(seq, " cur_saddr: %pI6c cur_daddr: %pI6c\n",
  622. &pkt_dev->cur_in6_saddr,
  623. &pkt_dev->cur_in6_daddr);
  624. } else
  625. seq_printf(seq, " cur_saddr: %pI4 cur_daddr: %pI4\n",
  626. &pkt_dev->cur_saddr, &pkt_dev->cur_daddr);
  627. seq_printf(seq, " cur_udp_dst: %d cur_udp_src: %d\n",
  628. pkt_dev->cur_udp_dst, pkt_dev->cur_udp_src);
  629. seq_printf(seq, " cur_queue_map: %u\n", pkt_dev->cur_queue_map);
  630. seq_printf(seq, " flows: %u\n", pkt_dev->nflows);
  631. if (pkt_dev->result[0])
  632. seq_printf(seq, "Result: %s\n", pkt_dev->result);
  633. else
  634. seq_puts(seq, "Result: Idle\n");
  635. return 0;
  636. }
  637. static int hex32_arg(const char __user *user_buffer, unsigned long maxlen,
  638. __u32 *num)
  639. {
  640. int i = 0;
  641. *num = 0;
  642. for (; i < maxlen; i++) {
  643. int value;
  644. char c;
  645. *num <<= 4;
  646. if (get_user(c, &user_buffer[i]))
  647. return -EFAULT;
  648. value = hex_to_bin(c);
  649. if (value >= 0)
  650. *num |= value;
  651. else
  652. break;
  653. }
  654. return i;
  655. }
  656. static int count_trail_chars(const char __user * user_buffer,
  657. unsigned int maxlen)
  658. {
  659. int i;
  660. for (i = 0; i < maxlen; i++) {
  661. char c;
  662. if (get_user(c, &user_buffer[i]))
  663. return -EFAULT;
  664. switch (c) {
  665. case '\"':
  666. case '\n':
  667. case '\r':
  668. case '\t':
  669. case ' ':
  670. case '=':
  671. break;
  672. default:
  673. goto done;
  674. }
  675. }
  676. done:
  677. return i;
  678. }
  679. static long num_arg(const char __user *user_buffer, unsigned long maxlen,
  680. unsigned long *num)
  681. {
  682. int i;
  683. *num = 0;
  684. for (i = 0; i < maxlen; i++) {
  685. char c;
  686. if (get_user(c, &user_buffer[i]))
  687. return -EFAULT;
  688. if ((c >= '0') && (c <= '9')) {
  689. *num *= 10;
  690. *num += c - '0';
  691. } else
  692. break;
  693. }
  694. return i;
  695. }
  696. static int strn_len(const char __user * user_buffer, unsigned int maxlen)
  697. {
  698. int i;
  699. for (i = 0; i < maxlen; i++) {
  700. char c;
  701. if (get_user(c, &user_buffer[i]))
  702. return -EFAULT;
  703. switch (c) {
  704. case '\"':
  705. case '\n':
  706. case '\r':
  707. case '\t':
  708. case ' ':
  709. goto done_str;
  710. default:
  711. break;
  712. }
  713. }
  714. done_str:
  715. return i;
  716. }
  717. /* Parses imix entries from user buffer.
  718. * The user buffer should consist of imix entries separated by spaces
  719. * where each entry consists of size and weight delimited by commas.
  720. * "size1,weight_1 size2,weight_2 ... size_n,weight_n" for example.
  721. */
  722. static ssize_t get_imix_entries(const char __user *buffer,
  723. struct pktgen_dev *pkt_dev)
  724. {
  725. const int max_digits = 10;
  726. int i = 0;
  727. long len;
  728. char c;
  729. pkt_dev->n_imix_entries = 0;
  730. do {
  731. unsigned long weight;
  732. unsigned long size;
  733. if (pkt_dev->n_imix_entries >= MAX_IMIX_ENTRIES)
  734. return -E2BIG;
  735. len = num_arg(&buffer[i], max_digits, &size);
  736. if (len < 0)
  737. return len;
  738. i += len;
  739. if (get_user(c, &buffer[i]))
  740. return -EFAULT;
  741. /* Check for comma between size_i and weight_i */
  742. if (c != ',')
  743. return -EINVAL;
  744. i++;
  745. if (size < 14 + 20 + 8)
  746. size = 14 + 20 + 8;
  747. len = num_arg(&buffer[i], max_digits, &weight);
  748. if (len < 0)
  749. return len;
  750. if (weight <= 0)
  751. return -EINVAL;
  752. pkt_dev->imix_entries[pkt_dev->n_imix_entries].size = size;
  753. pkt_dev->imix_entries[pkt_dev->n_imix_entries].weight = weight;
  754. i += len;
  755. if (get_user(c, &buffer[i]))
  756. return -EFAULT;
  757. i++;
  758. pkt_dev->n_imix_entries++;
  759. } while (c == ' ');
  760. return i;
  761. }
  762. static ssize_t get_labels(const char __user *buffer, struct pktgen_dev *pkt_dev)
  763. {
  764. unsigned int n = 0;
  765. char c;
  766. ssize_t i = 0;
  767. int len;
  768. pkt_dev->nr_labels = 0;
  769. do {
  770. __u32 tmp;
  771. if (n >= MAX_MPLS_LABELS)
  772. return -E2BIG;
  773. len = hex32_arg(&buffer[i], 8, &tmp);
  774. if (len <= 0)
  775. return len;
  776. pkt_dev->labels[n] = htonl(tmp);
  777. if (pkt_dev->labels[n] & MPLS_STACK_BOTTOM)
  778. pkt_dev->flags |= F_MPLS_RND;
  779. i += len;
  780. if (get_user(c, &buffer[i]))
  781. return -EFAULT;
  782. i++;
  783. n++;
  784. } while (c == ',');
  785. pkt_dev->nr_labels = n;
  786. return i;
  787. }
  788. static __u32 pktgen_read_flag(const char *f, bool *disable)
  789. {
  790. __u32 i;
  791. if (f[0] == '!') {
  792. *disable = true;
  793. f++;
  794. }
  795. for (i = 0; i < NR_PKT_FLAGS; i++) {
  796. if (!IS_ENABLED(CONFIG_XFRM) && i == IPSEC_SHIFT)
  797. continue;
  798. /* allow only disabling ipv6 flag */
  799. if (!*disable && i == IPV6_SHIFT)
  800. continue;
  801. if (strcmp(f, pkt_flag_names[i]) == 0)
  802. return 1 << i;
  803. }
  804. if (strcmp(f, "FLOW_RND") == 0) {
  805. *disable = !*disable;
  806. return F_FLOW_SEQ;
  807. }
  808. return 0;
  809. }
  810. static ssize_t pktgen_if_write(struct file *file,
  811. const char __user * user_buffer, size_t count,
  812. loff_t * offset)
  813. {
  814. struct seq_file *seq = file->private_data;
  815. struct pktgen_dev *pkt_dev = seq->private;
  816. int i, max, len;
  817. char name[16], valstr[32];
  818. unsigned long value = 0;
  819. char *pg_result = NULL;
  820. int tmp = 0;
  821. char buf[128];
  822. pg_result = &(pkt_dev->result[0]);
  823. if (count < 1) {
  824. pr_warn("wrong command format\n");
  825. return -EINVAL;
  826. }
  827. max = count;
  828. tmp = count_trail_chars(user_buffer, max);
  829. if (tmp < 0) {
  830. pr_warn("illegal format\n");
  831. return tmp;
  832. }
  833. i = tmp;
  834. /* Read variable name */
  835. len = strn_len(&user_buffer[i], sizeof(name) - 1);
  836. if (len < 0)
  837. return len;
  838. memset(name, 0, sizeof(name));
  839. if (copy_from_user(name, &user_buffer[i], len))
  840. return -EFAULT;
  841. i += len;
  842. max = count - i;
  843. len = count_trail_chars(&user_buffer[i], max);
  844. if (len < 0)
  845. return len;
  846. i += len;
  847. if (debug) {
  848. size_t copy = min_t(size_t, count + 1, 1024);
  849. char *tp = strndup_user(user_buffer, copy);
  850. if (IS_ERR(tp))
  851. return PTR_ERR(tp);
  852. pr_debug("%s,%zu buffer -:%s:-\n", name, count, tp);
  853. kfree(tp);
  854. }
  855. if (!strcmp(name, "min_pkt_size")) {
  856. len = num_arg(&user_buffer[i], 10, &value);
  857. if (len < 0)
  858. return len;
  859. i += len;
  860. if (value < 14 + 20 + 8)
  861. value = 14 + 20 + 8;
  862. if (value != pkt_dev->min_pkt_size) {
  863. pkt_dev->min_pkt_size = value;
  864. pkt_dev->cur_pkt_size = value;
  865. }
  866. sprintf(pg_result, "OK: min_pkt_size=%d",
  867. pkt_dev->min_pkt_size);
  868. return count;
  869. }
  870. if (!strcmp(name, "max_pkt_size")) {
  871. len = num_arg(&user_buffer[i], 10, &value);
  872. if (len < 0)
  873. return len;
  874. i += len;
  875. if (value < 14 + 20 + 8)
  876. value = 14 + 20 + 8;
  877. if (value != pkt_dev->max_pkt_size) {
  878. pkt_dev->max_pkt_size = value;
  879. pkt_dev->cur_pkt_size = value;
  880. }
  881. sprintf(pg_result, "OK: max_pkt_size=%d",
  882. pkt_dev->max_pkt_size);
  883. return count;
  884. }
  885. /* Shortcut for min = max */
  886. if (!strcmp(name, "pkt_size")) {
  887. len = num_arg(&user_buffer[i], 10, &value);
  888. if (len < 0)
  889. return len;
  890. i += len;
  891. if (value < 14 + 20 + 8)
  892. value = 14 + 20 + 8;
  893. if (value != pkt_dev->min_pkt_size) {
  894. pkt_dev->min_pkt_size = value;
  895. pkt_dev->max_pkt_size = value;
  896. pkt_dev->cur_pkt_size = value;
  897. }
  898. sprintf(pg_result, "OK: pkt_size=%d", pkt_dev->min_pkt_size);
  899. return count;
  900. }
  901. if (!strcmp(name, "imix_weights")) {
  902. if (pkt_dev->clone_skb > 0)
  903. return -EINVAL;
  904. len = get_imix_entries(&user_buffer[i], pkt_dev);
  905. if (len < 0)
  906. return len;
  907. fill_imix_distribution(pkt_dev);
  908. i += len;
  909. return count;
  910. }
  911. if (!strcmp(name, "debug")) {
  912. len = num_arg(&user_buffer[i], 10, &value);
  913. if (len < 0)
  914. return len;
  915. i += len;
  916. debug = value;
  917. sprintf(pg_result, "OK: debug=%u", debug);
  918. return count;
  919. }
  920. if (!strcmp(name, "frags")) {
  921. len = num_arg(&user_buffer[i], 10, &value);
  922. if (len < 0)
  923. return len;
  924. i += len;
  925. pkt_dev->nfrags = value;
  926. sprintf(pg_result, "OK: frags=%d", pkt_dev->nfrags);
  927. return count;
  928. }
  929. if (!strcmp(name, "delay")) {
  930. len = num_arg(&user_buffer[i], 10, &value);
  931. if (len < 0)
  932. return len;
  933. i += len;
  934. if (value == 0x7FFFFFFF)
  935. pkt_dev->delay = ULLONG_MAX;
  936. else
  937. pkt_dev->delay = (u64)value;
  938. sprintf(pg_result, "OK: delay=%llu",
  939. (unsigned long long) pkt_dev->delay);
  940. return count;
  941. }
  942. if (!strcmp(name, "rate")) {
  943. len = num_arg(&user_buffer[i], 10, &value);
  944. if (len < 0)
  945. return len;
  946. i += len;
  947. if (!value)
  948. return len;
  949. pkt_dev->delay = pkt_dev->min_pkt_size*8*NSEC_PER_USEC/value;
  950. if (debug)
  951. pr_info("Delay set at: %llu ns\n", pkt_dev->delay);
  952. sprintf(pg_result, "OK: rate=%lu", value);
  953. return count;
  954. }
  955. if (!strcmp(name, "ratep")) {
  956. len = num_arg(&user_buffer[i], 10, &value);
  957. if (len < 0)
  958. return len;
  959. i += len;
  960. if (!value)
  961. return len;
  962. pkt_dev->delay = NSEC_PER_SEC/value;
  963. if (debug)
  964. pr_info("Delay set at: %llu ns\n", pkt_dev->delay);
  965. sprintf(pg_result, "OK: rate=%lu", value);
  966. return count;
  967. }
  968. if (!strcmp(name, "udp_src_min")) {
  969. len = num_arg(&user_buffer[i], 10, &value);
  970. if (len < 0)
  971. return len;
  972. i += len;
  973. if (value != pkt_dev->udp_src_min) {
  974. pkt_dev->udp_src_min = value;
  975. pkt_dev->cur_udp_src = value;
  976. }
  977. sprintf(pg_result, "OK: udp_src_min=%u", pkt_dev->udp_src_min);
  978. return count;
  979. }
  980. if (!strcmp(name, "udp_dst_min")) {
  981. len = num_arg(&user_buffer[i], 10, &value);
  982. if (len < 0)
  983. return len;
  984. i += len;
  985. if (value != pkt_dev->udp_dst_min) {
  986. pkt_dev->udp_dst_min = value;
  987. pkt_dev->cur_udp_dst = value;
  988. }
  989. sprintf(pg_result, "OK: udp_dst_min=%u", pkt_dev->udp_dst_min);
  990. return count;
  991. }
  992. if (!strcmp(name, "udp_src_max")) {
  993. len = num_arg(&user_buffer[i], 10, &value);
  994. if (len < 0)
  995. return len;
  996. i += len;
  997. if (value != pkt_dev->udp_src_max) {
  998. pkt_dev->udp_src_max = value;
  999. pkt_dev->cur_udp_src = value;
  1000. }
  1001. sprintf(pg_result, "OK: udp_src_max=%u", pkt_dev->udp_src_max);
  1002. return count;
  1003. }
  1004. if (!strcmp(name, "udp_dst_max")) {
  1005. len = num_arg(&user_buffer[i], 10, &value);
  1006. if (len < 0)
  1007. return len;
  1008. i += len;
  1009. if (value != pkt_dev->udp_dst_max) {
  1010. pkt_dev->udp_dst_max = value;
  1011. pkt_dev->cur_udp_dst = value;
  1012. }
  1013. sprintf(pg_result, "OK: udp_dst_max=%u", pkt_dev->udp_dst_max);
  1014. return count;
  1015. }
  1016. if (!strcmp(name, "clone_skb")) {
  1017. len = num_arg(&user_buffer[i], 10, &value);
  1018. if (len < 0)
  1019. return len;
  1020. /* clone_skb is not supported for netif_receive xmit_mode and
  1021. * IMIX mode.
  1022. */
  1023. if ((value > 0) &&
  1024. ((pkt_dev->xmit_mode == M_NETIF_RECEIVE) ||
  1025. !(pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)))
  1026. return -ENOTSUPP;
  1027. if (value > 0 && (pkt_dev->n_imix_entries > 0 ||
  1028. !(pkt_dev->flags & F_SHARED)))
  1029. return -EINVAL;
  1030. i += len;
  1031. pkt_dev->clone_skb = value;
  1032. sprintf(pg_result, "OK: clone_skb=%d", pkt_dev->clone_skb);
  1033. return count;
  1034. }
  1035. if (!strcmp(name, "count")) {
  1036. len = num_arg(&user_buffer[i], 10, &value);
  1037. if (len < 0)
  1038. return len;
  1039. i += len;
  1040. pkt_dev->count = value;
  1041. sprintf(pg_result, "OK: count=%llu",
  1042. (unsigned long long)pkt_dev->count);
  1043. return count;
  1044. }
  1045. if (!strcmp(name, "src_mac_count")) {
  1046. len = num_arg(&user_buffer[i], 10, &value);
  1047. if (len < 0)
  1048. return len;
  1049. i += len;
  1050. if (pkt_dev->src_mac_count != value) {
  1051. pkt_dev->src_mac_count = value;
  1052. pkt_dev->cur_src_mac_offset = 0;
  1053. }
  1054. sprintf(pg_result, "OK: src_mac_count=%d",
  1055. pkt_dev->src_mac_count);
  1056. return count;
  1057. }
  1058. if (!strcmp(name, "dst_mac_count")) {
  1059. len = num_arg(&user_buffer[i], 10, &value);
  1060. if (len < 0)
  1061. return len;
  1062. i += len;
  1063. if (pkt_dev->dst_mac_count != value) {
  1064. pkt_dev->dst_mac_count = value;
  1065. pkt_dev->cur_dst_mac_offset = 0;
  1066. }
  1067. sprintf(pg_result, "OK: dst_mac_count=%d",
  1068. pkt_dev->dst_mac_count);
  1069. return count;
  1070. }
  1071. if (!strcmp(name, "burst")) {
  1072. len = num_arg(&user_buffer[i], 10, &value);
  1073. if (len < 0)
  1074. return len;
  1075. i += len;
  1076. if ((value > 1) &&
  1077. ((pkt_dev->xmit_mode == M_QUEUE_XMIT) ||
  1078. ((pkt_dev->xmit_mode == M_START_XMIT) &&
  1079. (!(pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)))))
  1080. return -ENOTSUPP;
  1081. if (value > 1 && !(pkt_dev->flags & F_SHARED))
  1082. return -EINVAL;
  1083. pkt_dev->burst = value < 1 ? 1 : value;
  1084. sprintf(pg_result, "OK: burst=%u", pkt_dev->burst);
  1085. return count;
  1086. }
  1087. if (!strcmp(name, "node")) {
  1088. len = num_arg(&user_buffer[i], 10, &value);
  1089. if (len < 0)
  1090. return len;
  1091. i += len;
  1092. if (node_possible(value)) {
  1093. pkt_dev->node = value;
  1094. sprintf(pg_result, "OK: node=%d", pkt_dev->node);
  1095. if (pkt_dev->page) {
  1096. put_page(pkt_dev->page);
  1097. pkt_dev->page = NULL;
  1098. }
  1099. }
  1100. else
  1101. sprintf(pg_result, "ERROR: node not possible");
  1102. return count;
  1103. }
  1104. if (!strcmp(name, "xmit_mode")) {
  1105. char f[32];
  1106. memset(f, 0, 32);
  1107. len = strn_len(&user_buffer[i], sizeof(f) - 1);
  1108. if (len < 0)
  1109. return len;
  1110. if (copy_from_user(f, &user_buffer[i], len))
  1111. return -EFAULT;
  1112. i += len;
  1113. if (strcmp(f, "start_xmit") == 0) {
  1114. pkt_dev->xmit_mode = M_START_XMIT;
  1115. } else if (strcmp(f, "netif_receive") == 0) {
  1116. /* clone_skb set earlier, not supported in this mode */
  1117. if (pkt_dev->clone_skb > 0)
  1118. return -ENOTSUPP;
  1119. pkt_dev->xmit_mode = M_NETIF_RECEIVE;
  1120. /* make sure new packet is allocated every time
  1121. * pktgen_xmit() is called
  1122. */
  1123. pkt_dev->last_ok = 1;
  1124. } else if (strcmp(f, "queue_xmit") == 0) {
  1125. pkt_dev->xmit_mode = M_QUEUE_XMIT;
  1126. pkt_dev->last_ok = 1;
  1127. } else {
  1128. sprintf(pg_result,
  1129. "xmit_mode -:%s:- unknown\nAvailable modes: %s",
  1130. f, "start_xmit, netif_receive\n");
  1131. return count;
  1132. }
  1133. sprintf(pg_result, "OK: xmit_mode=%s", f);
  1134. return count;
  1135. }
  1136. if (!strcmp(name, "flag")) {
  1137. bool disable = false;
  1138. __u32 flag;
  1139. char f[32];
  1140. char *end;
  1141. memset(f, 0, 32);
  1142. len = strn_len(&user_buffer[i], sizeof(f) - 1);
  1143. if (len < 0)
  1144. return len;
  1145. if (copy_from_user(f, &user_buffer[i], len))
  1146. return -EFAULT;
  1147. i += len;
  1148. flag = pktgen_read_flag(f, &disable);
  1149. if (flag) {
  1150. if (disable) {
  1151. /* If "clone_skb", or "burst" parameters are
  1152. * configured, it means that the skb still
  1153. * needs to be referenced by the pktgen, so
  1154. * the skb must be shared.
  1155. */
  1156. if (flag == F_SHARED && (pkt_dev->clone_skb ||
  1157. pkt_dev->burst > 1))
  1158. return -EINVAL;
  1159. pkt_dev->flags &= ~flag;
  1160. } else {
  1161. pkt_dev->flags |= flag;
  1162. }
  1163. sprintf(pg_result, "OK: flags=0x%x", pkt_dev->flags);
  1164. return count;
  1165. }
  1166. /* Unknown flag */
  1167. end = pkt_dev->result + sizeof(pkt_dev->result);
  1168. pg_result += sprintf(pg_result,
  1169. "Flag -:%s:- unknown\n"
  1170. "Available flags, (prepend ! to un-set flag):\n", f);
  1171. for (int n = 0; n < NR_PKT_FLAGS && pg_result < end; n++) {
  1172. if (!IS_ENABLED(CONFIG_XFRM) && n == IPSEC_SHIFT)
  1173. continue;
  1174. pg_result += snprintf(pg_result, end - pg_result,
  1175. "%s, ", pkt_flag_names[n]);
  1176. }
  1177. if (!WARN_ON_ONCE(pg_result >= end)) {
  1178. /* Remove the comma and whitespace at the end */
  1179. *(pg_result - 2) = '\0';
  1180. }
  1181. return count;
  1182. }
  1183. if (!strcmp(name, "dst_min") || !strcmp(name, "dst")) {
  1184. len = strn_len(&user_buffer[i], sizeof(pkt_dev->dst_min) - 1);
  1185. if (len < 0)
  1186. return len;
  1187. if (copy_from_user(buf, &user_buffer[i], len))
  1188. return -EFAULT;
  1189. buf[len] = 0;
  1190. if (strcmp(buf, pkt_dev->dst_min) != 0) {
  1191. memset(pkt_dev->dst_min, 0, sizeof(pkt_dev->dst_min));
  1192. strcpy(pkt_dev->dst_min, buf);
  1193. pkt_dev->daddr_min = in_aton(pkt_dev->dst_min);
  1194. pkt_dev->cur_daddr = pkt_dev->daddr_min;
  1195. }
  1196. if (debug)
  1197. pr_debug("dst_min set to: %s\n", pkt_dev->dst_min);
  1198. i += len;
  1199. sprintf(pg_result, "OK: dst_min=%s", pkt_dev->dst_min);
  1200. return count;
  1201. }
  1202. if (!strcmp(name, "dst_max")) {
  1203. len = strn_len(&user_buffer[i], sizeof(pkt_dev->dst_max) - 1);
  1204. if (len < 0)
  1205. return len;
  1206. if (copy_from_user(buf, &user_buffer[i], len))
  1207. return -EFAULT;
  1208. buf[len] = 0;
  1209. if (strcmp(buf, pkt_dev->dst_max) != 0) {
  1210. memset(pkt_dev->dst_max, 0, sizeof(pkt_dev->dst_max));
  1211. strcpy(pkt_dev->dst_max, buf);
  1212. pkt_dev->daddr_max = in_aton(pkt_dev->dst_max);
  1213. pkt_dev->cur_daddr = pkt_dev->daddr_max;
  1214. }
  1215. if (debug)
  1216. pr_debug("dst_max set to: %s\n", pkt_dev->dst_max);
  1217. i += len;
  1218. sprintf(pg_result, "OK: dst_max=%s", pkt_dev->dst_max);
  1219. return count;
  1220. }
  1221. if (!strcmp(name, "dst6")) {
  1222. len = strn_len(&user_buffer[i], sizeof(buf) - 1);
  1223. if (len < 0)
  1224. return len;
  1225. pkt_dev->flags |= F_IPV6;
  1226. if (copy_from_user(buf, &user_buffer[i], len))
  1227. return -EFAULT;
  1228. buf[len] = 0;
  1229. in6_pton(buf, -1, pkt_dev->in6_daddr.s6_addr, -1, NULL);
  1230. snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->in6_daddr);
  1231. pkt_dev->cur_in6_daddr = pkt_dev->in6_daddr;
  1232. if (debug)
  1233. pr_debug("dst6 set to: %s\n", buf);
  1234. i += len;
  1235. sprintf(pg_result, "OK: dst6=%s", buf);
  1236. return count;
  1237. }
  1238. if (!strcmp(name, "dst6_min")) {
  1239. len = strn_len(&user_buffer[i], sizeof(buf) - 1);
  1240. if (len < 0)
  1241. return len;
  1242. pkt_dev->flags |= F_IPV6;
  1243. if (copy_from_user(buf, &user_buffer[i], len))
  1244. return -EFAULT;
  1245. buf[len] = 0;
  1246. in6_pton(buf, -1, pkt_dev->min_in6_daddr.s6_addr, -1, NULL);
  1247. snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->min_in6_daddr);
  1248. pkt_dev->cur_in6_daddr = pkt_dev->min_in6_daddr;
  1249. if (debug)
  1250. pr_debug("dst6_min set to: %s\n", buf);
  1251. i += len;
  1252. sprintf(pg_result, "OK: dst6_min=%s", buf);
  1253. return count;
  1254. }
  1255. if (!strcmp(name, "dst6_max")) {
  1256. len = strn_len(&user_buffer[i], sizeof(buf) - 1);
  1257. if (len < 0)
  1258. return len;
  1259. pkt_dev->flags |= F_IPV6;
  1260. if (copy_from_user(buf, &user_buffer[i], len))
  1261. return -EFAULT;
  1262. buf[len] = 0;
  1263. in6_pton(buf, -1, pkt_dev->max_in6_daddr.s6_addr, -1, NULL);
  1264. snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->max_in6_daddr);
  1265. if (debug)
  1266. pr_debug("dst6_max set to: %s\n", buf);
  1267. i += len;
  1268. sprintf(pg_result, "OK: dst6_max=%s", buf);
  1269. return count;
  1270. }
  1271. if (!strcmp(name, "src6")) {
  1272. len = strn_len(&user_buffer[i], sizeof(buf) - 1);
  1273. if (len < 0)
  1274. return len;
  1275. pkt_dev->flags |= F_IPV6;
  1276. if (copy_from_user(buf, &user_buffer[i], len))
  1277. return -EFAULT;
  1278. buf[len] = 0;
  1279. in6_pton(buf, -1, pkt_dev->in6_saddr.s6_addr, -1, NULL);
  1280. snprintf(buf, sizeof(buf), "%pI6c", &pkt_dev->in6_saddr);
  1281. pkt_dev->cur_in6_saddr = pkt_dev->in6_saddr;
  1282. if (debug)
  1283. pr_debug("src6 set to: %s\n", buf);
  1284. i += len;
  1285. sprintf(pg_result, "OK: src6=%s", buf);
  1286. return count;
  1287. }
  1288. if (!strcmp(name, "src_min")) {
  1289. len = strn_len(&user_buffer[i], sizeof(pkt_dev->src_min) - 1);
  1290. if (len < 0)
  1291. return len;
  1292. if (copy_from_user(buf, &user_buffer[i], len))
  1293. return -EFAULT;
  1294. buf[len] = 0;
  1295. if (strcmp(buf, pkt_dev->src_min) != 0) {
  1296. memset(pkt_dev->src_min, 0, sizeof(pkt_dev->src_min));
  1297. strcpy(pkt_dev->src_min, buf);
  1298. pkt_dev->saddr_min = in_aton(pkt_dev->src_min);
  1299. pkt_dev->cur_saddr = pkt_dev->saddr_min;
  1300. }
  1301. if (debug)
  1302. pr_debug("src_min set to: %s\n", pkt_dev->src_min);
  1303. i += len;
  1304. sprintf(pg_result, "OK: src_min=%s", pkt_dev->src_min);
  1305. return count;
  1306. }
  1307. if (!strcmp(name, "src_max")) {
  1308. len = strn_len(&user_buffer[i], sizeof(pkt_dev->src_max) - 1);
  1309. if (len < 0)
  1310. return len;
  1311. if (copy_from_user(buf, &user_buffer[i], len))
  1312. return -EFAULT;
  1313. buf[len] = 0;
  1314. if (strcmp(buf, pkt_dev->src_max) != 0) {
  1315. memset(pkt_dev->src_max, 0, sizeof(pkt_dev->src_max));
  1316. strcpy(pkt_dev->src_max, buf);
  1317. pkt_dev->saddr_max = in_aton(pkt_dev->src_max);
  1318. pkt_dev->cur_saddr = pkt_dev->saddr_max;
  1319. }
  1320. if (debug)
  1321. pr_debug("src_max set to: %s\n", pkt_dev->src_max);
  1322. i += len;
  1323. sprintf(pg_result, "OK: src_max=%s", pkt_dev->src_max);
  1324. return count;
  1325. }
  1326. if (!strcmp(name, "dst_mac")) {
  1327. len = strn_len(&user_buffer[i], sizeof(valstr) - 1);
  1328. if (len < 0)
  1329. return len;
  1330. memset(valstr, 0, sizeof(valstr));
  1331. if (copy_from_user(valstr, &user_buffer[i], len))
  1332. return -EFAULT;
  1333. if (!mac_pton(valstr, pkt_dev->dst_mac))
  1334. return -EINVAL;
  1335. /* Set up Dest MAC */
  1336. ether_addr_copy(&pkt_dev->hh[0], pkt_dev->dst_mac);
  1337. sprintf(pg_result, "OK: dstmac %pM", pkt_dev->dst_mac);
  1338. return count;
  1339. }
  1340. if (!strcmp(name, "src_mac")) {
  1341. len = strn_len(&user_buffer[i], sizeof(valstr) - 1);
  1342. if (len < 0)
  1343. return len;
  1344. memset(valstr, 0, sizeof(valstr));
  1345. if (copy_from_user(valstr, &user_buffer[i], len))
  1346. return -EFAULT;
  1347. if (!mac_pton(valstr, pkt_dev->src_mac))
  1348. return -EINVAL;
  1349. /* Set up Src MAC */
  1350. ether_addr_copy(&pkt_dev->hh[6], pkt_dev->src_mac);
  1351. sprintf(pg_result, "OK: srcmac %pM", pkt_dev->src_mac);
  1352. return count;
  1353. }
  1354. if (!strcmp(name, "clear_counters")) {
  1355. pktgen_clear_counters(pkt_dev);
  1356. sprintf(pg_result, "OK: Clearing counters.\n");
  1357. return count;
  1358. }
  1359. if (!strcmp(name, "flows")) {
  1360. len = num_arg(&user_buffer[i], 10, &value);
  1361. if (len < 0)
  1362. return len;
  1363. i += len;
  1364. if (value > MAX_CFLOWS)
  1365. value = MAX_CFLOWS;
  1366. pkt_dev->cflows = value;
  1367. sprintf(pg_result, "OK: flows=%u", pkt_dev->cflows);
  1368. return count;
  1369. }
  1370. #ifdef CONFIG_XFRM
  1371. if (!strcmp(name, "spi")) {
  1372. len = num_arg(&user_buffer[i], 10, &value);
  1373. if (len < 0)
  1374. return len;
  1375. i += len;
  1376. pkt_dev->spi = value;
  1377. sprintf(pg_result, "OK: spi=%u", pkt_dev->spi);
  1378. return count;
  1379. }
  1380. #endif
  1381. if (!strcmp(name, "flowlen")) {
  1382. len = num_arg(&user_buffer[i], 10, &value);
  1383. if (len < 0)
  1384. return len;
  1385. i += len;
  1386. pkt_dev->lflow = value;
  1387. sprintf(pg_result, "OK: flowlen=%u", pkt_dev->lflow);
  1388. return count;
  1389. }
  1390. if (!strcmp(name, "queue_map_min")) {
  1391. len = num_arg(&user_buffer[i], 5, &value);
  1392. if (len < 0)
  1393. return len;
  1394. i += len;
  1395. pkt_dev->queue_map_min = value;
  1396. sprintf(pg_result, "OK: queue_map_min=%u", pkt_dev->queue_map_min);
  1397. return count;
  1398. }
  1399. if (!strcmp(name, "queue_map_max")) {
  1400. len = num_arg(&user_buffer[i], 5, &value);
  1401. if (len < 0)
  1402. return len;
  1403. i += len;
  1404. pkt_dev->queue_map_max = value;
  1405. sprintf(pg_result, "OK: queue_map_max=%u", pkt_dev->queue_map_max);
  1406. return count;
  1407. }
  1408. if (!strcmp(name, "mpls")) {
  1409. unsigned int n, cnt;
  1410. len = get_labels(&user_buffer[i], pkt_dev);
  1411. if (len < 0)
  1412. return len;
  1413. i += len;
  1414. cnt = sprintf(pg_result, "OK: mpls=");
  1415. for (n = 0; n < pkt_dev->nr_labels; n++)
  1416. cnt += sprintf(pg_result + cnt,
  1417. "%08x%s", ntohl(pkt_dev->labels[n]),
  1418. n == pkt_dev->nr_labels-1 ? "" : ",");
  1419. if (pkt_dev->nr_labels && pkt_dev->vlan_id != 0xffff) {
  1420. pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
  1421. pkt_dev->svlan_id = 0xffff;
  1422. if (debug)
  1423. pr_debug("VLAN/SVLAN auto turned off\n");
  1424. }
  1425. return count;
  1426. }
  1427. if (!strcmp(name, "vlan_id")) {
  1428. len = num_arg(&user_buffer[i], 4, &value);
  1429. if (len < 0)
  1430. return len;
  1431. i += len;
  1432. if (value <= 4095) {
  1433. pkt_dev->vlan_id = value; /* turn on VLAN */
  1434. if (debug)
  1435. pr_debug("VLAN turned on\n");
  1436. if (debug && pkt_dev->nr_labels)
  1437. pr_debug("MPLS auto turned off\n");
  1438. pkt_dev->nr_labels = 0; /* turn off MPLS */
  1439. sprintf(pg_result, "OK: vlan_id=%u", pkt_dev->vlan_id);
  1440. } else {
  1441. pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
  1442. pkt_dev->svlan_id = 0xffff;
  1443. if (debug)
  1444. pr_debug("VLAN/SVLAN turned off\n");
  1445. }
  1446. return count;
  1447. }
  1448. if (!strcmp(name, "vlan_p")) {
  1449. len = num_arg(&user_buffer[i], 1, &value);
  1450. if (len < 0)
  1451. return len;
  1452. i += len;
  1453. if ((value <= 7) && (pkt_dev->vlan_id != 0xffff)) {
  1454. pkt_dev->vlan_p = value;
  1455. sprintf(pg_result, "OK: vlan_p=%u", pkt_dev->vlan_p);
  1456. } else {
  1457. sprintf(pg_result, "ERROR: vlan_p must be 0-7");
  1458. }
  1459. return count;
  1460. }
  1461. if (!strcmp(name, "vlan_cfi")) {
  1462. len = num_arg(&user_buffer[i], 1, &value);
  1463. if (len < 0)
  1464. return len;
  1465. i += len;
  1466. if ((value <= 1) && (pkt_dev->vlan_id != 0xffff)) {
  1467. pkt_dev->vlan_cfi = value;
  1468. sprintf(pg_result, "OK: vlan_cfi=%u", pkt_dev->vlan_cfi);
  1469. } else {
  1470. sprintf(pg_result, "ERROR: vlan_cfi must be 0-1");
  1471. }
  1472. return count;
  1473. }
  1474. if (!strcmp(name, "svlan_id")) {
  1475. len = num_arg(&user_buffer[i], 4, &value);
  1476. if (len < 0)
  1477. return len;
  1478. i += len;
  1479. if ((value <= 4095) && ((pkt_dev->vlan_id != 0xffff))) {
  1480. pkt_dev->svlan_id = value; /* turn on SVLAN */
  1481. if (debug)
  1482. pr_debug("SVLAN turned on\n");
  1483. if (debug && pkt_dev->nr_labels)
  1484. pr_debug("MPLS auto turned off\n");
  1485. pkt_dev->nr_labels = 0; /* turn off MPLS */
  1486. sprintf(pg_result, "OK: svlan_id=%u", pkt_dev->svlan_id);
  1487. } else {
  1488. pkt_dev->vlan_id = 0xffff; /* turn off VLAN/SVLAN */
  1489. pkt_dev->svlan_id = 0xffff;
  1490. if (debug)
  1491. pr_debug("VLAN/SVLAN turned off\n");
  1492. }
  1493. return count;
  1494. }
  1495. if (!strcmp(name, "svlan_p")) {
  1496. len = num_arg(&user_buffer[i], 1, &value);
  1497. if (len < 0)
  1498. return len;
  1499. i += len;
  1500. if ((value <= 7) && (pkt_dev->svlan_id != 0xffff)) {
  1501. pkt_dev->svlan_p = value;
  1502. sprintf(pg_result, "OK: svlan_p=%u", pkt_dev->svlan_p);
  1503. } else {
  1504. sprintf(pg_result, "ERROR: svlan_p must be 0-7");
  1505. }
  1506. return count;
  1507. }
  1508. if (!strcmp(name, "svlan_cfi")) {
  1509. len = num_arg(&user_buffer[i], 1, &value);
  1510. if (len < 0)
  1511. return len;
  1512. i += len;
  1513. if ((value <= 1) && (pkt_dev->svlan_id != 0xffff)) {
  1514. pkt_dev->svlan_cfi = value;
  1515. sprintf(pg_result, "OK: svlan_cfi=%u", pkt_dev->svlan_cfi);
  1516. } else {
  1517. sprintf(pg_result, "ERROR: svlan_cfi must be 0-1");
  1518. }
  1519. return count;
  1520. }
  1521. if (!strcmp(name, "tos")) {
  1522. __u32 tmp_value = 0;
  1523. len = hex32_arg(&user_buffer[i], 2, &tmp_value);
  1524. if (len < 0)
  1525. return len;
  1526. i += len;
  1527. if (len == 2) {
  1528. pkt_dev->tos = tmp_value;
  1529. sprintf(pg_result, "OK: tos=0x%02x", pkt_dev->tos);
  1530. } else {
  1531. sprintf(pg_result, "ERROR: tos must be 00-ff");
  1532. }
  1533. return count;
  1534. }
  1535. if (!strcmp(name, "traffic_class")) {
  1536. __u32 tmp_value = 0;
  1537. len = hex32_arg(&user_buffer[i], 2, &tmp_value);
  1538. if (len < 0)
  1539. return len;
  1540. i += len;
  1541. if (len == 2) {
  1542. pkt_dev->traffic_class = tmp_value;
  1543. sprintf(pg_result, "OK: traffic_class=0x%02x", pkt_dev->traffic_class);
  1544. } else {
  1545. sprintf(pg_result, "ERROR: traffic_class must be 00-ff");
  1546. }
  1547. return count;
  1548. }
  1549. if (!strcmp(name, "skb_priority")) {
  1550. len = num_arg(&user_buffer[i], 9, &value);
  1551. if (len < 0)
  1552. return len;
  1553. i += len;
  1554. pkt_dev->skb_priority = value;
  1555. sprintf(pg_result, "OK: skb_priority=%i",
  1556. pkt_dev->skb_priority);
  1557. return count;
  1558. }
  1559. sprintf(pkt_dev->result, "No such parameter \"%s\"", name);
  1560. return -EINVAL;
  1561. }
  1562. static int pktgen_if_open(struct inode *inode, struct file *file)
  1563. {
  1564. return single_open(file, pktgen_if_show, pde_data(inode));
  1565. }
  1566. static const struct proc_ops pktgen_if_proc_ops = {
  1567. .proc_open = pktgen_if_open,
  1568. .proc_read = seq_read,
  1569. .proc_lseek = seq_lseek,
  1570. .proc_write = pktgen_if_write,
  1571. .proc_release = single_release,
  1572. };
  1573. static int pktgen_thread_show(struct seq_file *seq, void *v)
  1574. {
  1575. struct pktgen_thread *t = seq->private;
  1576. const struct pktgen_dev *pkt_dev;
  1577. BUG_ON(!t);
  1578. seq_puts(seq, "Running: ");
  1579. rcu_read_lock();
  1580. list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
  1581. if (pkt_dev->running)
  1582. seq_printf(seq, "%s ", pkt_dev->odevname);
  1583. seq_puts(seq, "\nStopped: ");
  1584. list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
  1585. if (!pkt_dev->running)
  1586. seq_printf(seq, "%s ", pkt_dev->odevname);
  1587. if (t->result[0])
  1588. seq_printf(seq, "\nResult: %s\n", t->result);
  1589. else
  1590. seq_puts(seq, "\nResult: NA\n");
  1591. rcu_read_unlock();
  1592. return 0;
  1593. }
  1594. static ssize_t pktgen_thread_write(struct file *file,
  1595. const char __user * user_buffer,
  1596. size_t count, loff_t * offset)
  1597. {
  1598. struct seq_file *seq = file->private_data;
  1599. struct pktgen_thread *t = seq->private;
  1600. int i, max, len, ret;
  1601. char name[40];
  1602. char *pg_result;
  1603. if (count < 1) {
  1604. // sprintf(pg_result, "Wrong command format");
  1605. return -EINVAL;
  1606. }
  1607. max = count;
  1608. len = count_trail_chars(user_buffer, max);
  1609. if (len < 0)
  1610. return len;
  1611. i = len;
  1612. /* Read variable name */
  1613. max = min(sizeof(name) - 1, count - i);
  1614. len = strn_len(&user_buffer[i], max);
  1615. if (len < 0)
  1616. return len;
  1617. memset(name, 0, sizeof(name));
  1618. if (copy_from_user(name, &user_buffer[i], len))
  1619. return -EFAULT;
  1620. i += len;
  1621. max = count - i;
  1622. len = count_trail_chars(&user_buffer[i], max);
  1623. if (len < 0)
  1624. return len;
  1625. i += len;
  1626. if (debug)
  1627. pr_debug("t=%s, count=%lu\n", name, (unsigned long)count);
  1628. if (!t) {
  1629. pr_err("ERROR: No thread\n");
  1630. ret = -EINVAL;
  1631. goto out;
  1632. }
  1633. pg_result = &(t->result[0]);
  1634. if (!strcmp(name, "add_device")) {
  1635. char f[32];
  1636. memset(f, 0, 32);
  1637. max = min(sizeof(f) - 1, count - i);
  1638. len = strn_len(&user_buffer[i], max);
  1639. if (len < 0) {
  1640. ret = len;
  1641. goto out;
  1642. }
  1643. if (copy_from_user(f, &user_buffer[i], len))
  1644. return -EFAULT;
  1645. i += len;
  1646. mutex_lock(&pktgen_thread_lock);
  1647. ret = pktgen_add_device(t, f);
  1648. mutex_unlock(&pktgen_thread_lock);
  1649. if (!ret) {
  1650. ret = count;
  1651. sprintf(pg_result, "OK: add_device=%s", f);
  1652. } else
  1653. sprintf(pg_result, "ERROR: can not add device %s", f);
  1654. goto out;
  1655. }
  1656. if (!strcmp(name, "rem_device_all")) {
  1657. mutex_lock(&pktgen_thread_lock);
  1658. t->control |= T_REMDEVALL;
  1659. mutex_unlock(&pktgen_thread_lock);
  1660. schedule_timeout_interruptible(msecs_to_jiffies(125)); /* Propagate thread->control */
  1661. ret = count;
  1662. sprintf(pg_result, "OK: rem_device_all");
  1663. goto out;
  1664. }
  1665. if (!strcmp(name, "max_before_softirq")) {
  1666. sprintf(pg_result, "OK: Note! max_before_softirq is obsoleted -- Do not use");
  1667. ret = count;
  1668. goto out;
  1669. }
  1670. ret = -EINVAL;
  1671. out:
  1672. return ret;
  1673. }
  1674. static int pktgen_thread_open(struct inode *inode, struct file *file)
  1675. {
  1676. return single_open(file, pktgen_thread_show, pde_data(inode));
  1677. }
  1678. static const struct proc_ops pktgen_thread_proc_ops = {
  1679. .proc_open = pktgen_thread_open,
  1680. .proc_read = seq_read,
  1681. .proc_lseek = seq_lseek,
  1682. .proc_write = pktgen_thread_write,
  1683. .proc_release = single_release,
  1684. };
  1685. /* Think find or remove for NN */
  1686. static struct pktgen_dev *__pktgen_NN_threads(const struct pktgen_net *pn,
  1687. const char *ifname, int remove)
  1688. {
  1689. struct pktgen_thread *t;
  1690. struct pktgen_dev *pkt_dev = NULL;
  1691. bool exact = (remove == FIND);
  1692. list_for_each_entry(t, &pn->pktgen_threads, th_list) {
  1693. pkt_dev = pktgen_find_dev(t, ifname, exact);
  1694. if (pkt_dev) {
  1695. if (remove) {
  1696. pkt_dev->removal_mark = 1;
  1697. t->control |= T_REMDEV;
  1698. }
  1699. break;
  1700. }
  1701. }
  1702. return pkt_dev;
  1703. }
  1704. /*
  1705. * mark a device for removal
  1706. */
  1707. static void pktgen_mark_device(const struct pktgen_net *pn, const char *ifname)
  1708. {
  1709. struct pktgen_dev *pkt_dev = NULL;
  1710. const int max_tries = 10, msec_per_try = 125;
  1711. int i = 0;
  1712. mutex_lock(&pktgen_thread_lock);
  1713. pr_debug("%s: marking %s for removal\n", __func__, ifname);
  1714. while (1) {
  1715. pkt_dev = __pktgen_NN_threads(pn, ifname, REMOVE);
  1716. if (pkt_dev == NULL)
  1717. break; /* success */
  1718. mutex_unlock(&pktgen_thread_lock);
  1719. pr_debug("%s: waiting for %s to disappear....\n",
  1720. __func__, ifname);
  1721. schedule_timeout_interruptible(msecs_to_jiffies(msec_per_try));
  1722. mutex_lock(&pktgen_thread_lock);
  1723. if (++i >= max_tries) {
  1724. pr_err("%s: timed out after waiting %d msec for device %s to be removed\n",
  1725. __func__, msec_per_try * i, ifname);
  1726. break;
  1727. }
  1728. }
  1729. mutex_unlock(&pktgen_thread_lock);
  1730. }
  1731. static void pktgen_change_name(const struct pktgen_net *pn, struct net_device *dev)
  1732. {
  1733. struct pktgen_thread *t;
  1734. mutex_lock(&pktgen_thread_lock);
  1735. list_for_each_entry(t, &pn->pktgen_threads, th_list) {
  1736. struct pktgen_dev *pkt_dev;
  1737. if_lock(t);
  1738. list_for_each_entry(pkt_dev, &t->if_list, list) {
  1739. if (pkt_dev->odev != dev)
  1740. continue;
  1741. proc_remove(pkt_dev->entry);
  1742. pkt_dev->entry = proc_create_data(dev->name, 0600,
  1743. pn->proc_dir,
  1744. &pktgen_if_proc_ops,
  1745. pkt_dev);
  1746. if (!pkt_dev->entry)
  1747. pr_err("can't move proc entry for '%s'\n",
  1748. dev->name);
  1749. break;
  1750. }
  1751. if_unlock(t);
  1752. }
  1753. mutex_unlock(&pktgen_thread_lock);
  1754. }
  1755. static int pktgen_device_event(struct notifier_block *unused,
  1756. unsigned long event, void *ptr)
  1757. {
  1758. struct net_device *dev = netdev_notifier_info_to_dev(ptr);
  1759. struct pktgen_net *pn = net_generic(dev_net(dev), pg_net_id);
  1760. if (pn->pktgen_exiting)
  1761. return NOTIFY_DONE;
  1762. /* It is OK that we do not hold the group lock right now,
  1763. * as we run under the RTNL lock.
  1764. */
  1765. switch (event) {
  1766. case NETDEV_CHANGENAME:
  1767. pktgen_change_name(pn, dev);
  1768. break;
  1769. case NETDEV_UNREGISTER:
  1770. pktgen_mark_device(pn, dev->name);
  1771. break;
  1772. }
  1773. return NOTIFY_DONE;
  1774. }
  1775. static struct net_device *pktgen_dev_get_by_name(const struct pktgen_net *pn,
  1776. struct pktgen_dev *pkt_dev,
  1777. const char *ifname)
  1778. {
  1779. char b[IFNAMSIZ+5];
  1780. int i;
  1781. for (i = 0; ifname[i] != '@'; i++) {
  1782. if (i == IFNAMSIZ)
  1783. break;
  1784. b[i] = ifname[i];
  1785. }
  1786. b[i] = 0;
  1787. return dev_get_by_name(pn->net, b);
  1788. }
  1789. /* Associate pktgen_dev with a device. */
  1790. static int pktgen_setup_dev(const struct pktgen_net *pn,
  1791. struct pktgen_dev *pkt_dev, const char *ifname)
  1792. {
  1793. struct net_device *odev;
  1794. int err;
  1795. /* Clean old setups */
  1796. if (pkt_dev->odev) {
  1797. netdev_put(pkt_dev->odev, &pkt_dev->dev_tracker);
  1798. pkt_dev->odev = NULL;
  1799. }
  1800. odev = pktgen_dev_get_by_name(pn, pkt_dev, ifname);
  1801. if (!odev) {
  1802. pr_err("no such netdevice: \"%s\"\n", ifname);
  1803. return -ENODEV;
  1804. }
  1805. if (odev->type != ARPHRD_ETHER && odev->type != ARPHRD_LOOPBACK) {
  1806. pr_err("not an ethernet or loopback device: \"%s\"\n", ifname);
  1807. err = -EINVAL;
  1808. } else if (!netif_running(odev)) {
  1809. pr_err("device is down: \"%s\"\n", ifname);
  1810. err = -ENETDOWN;
  1811. } else {
  1812. pkt_dev->odev = odev;
  1813. netdev_tracker_alloc(odev, &pkt_dev->dev_tracker, GFP_KERNEL);
  1814. return 0;
  1815. }
  1816. dev_put(odev);
  1817. return err;
  1818. }
  1819. /* Read pkt_dev from the interface and set up internal pktgen_dev
  1820. * structure to have the right information to create/send packets
  1821. */
  1822. static void pktgen_setup_inject(struct pktgen_dev *pkt_dev)
  1823. {
  1824. int ntxq;
  1825. if (!pkt_dev->odev) {
  1826. pr_err("ERROR: pkt_dev->odev == NULL in setup_inject\n");
  1827. sprintf(pkt_dev->result,
  1828. "ERROR: pkt_dev->odev == NULL in setup_inject.\n");
  1829. return;
  1830. }
  1831. /* make sure that we don't pick a non-existing transmit queue */
  1832. ntxq = pkt_dev->odev->real_num_tx_queues;
  1833. if (ntxq <= pkt_dev->queue_map_min) {
  1834. pr_warn("WARNING: Requested queue_map_min (zero-based) (%d) exceeds valid range [0 - %d] for (%d) queues on %s, resetting\n",
  1835. pkt_dev->queue_map_min, (ntxq ?: 1) - 1, ntxq,
  1836. pkt_dev->odevname);
  1837. pkt_dev->queue_map_min = (ntxq ?: 1) - 1;
  1838. }
  1839. if (pkt_dev->queue_map_max >= ntxq) {
  1840. pr_warn("WARNING: Requested queue_map_max (zero-based) (%d) exceeds valid range [0 - %d] for (%d) queues on %s, resetting\n",
  1841. pkt_dev->queue_map_max, (ntxq ?: 1) - 1, ntxq,
  1842. pkt_dev->odevname);
  1843. pkt_dev->queue_map_max = (ntxq ?: 1) - 1;
  1844. }
  1845. /* Default to the interface's mac if not explicitly set. */
  1846. if (is_zero_ether_addr(pkt_dev->src_mac))
  1847. ether_addr_copy(&(pkt_dev->hh[6]), pkt_dev->odev->dev_addr);
  1848. /* Set up Dest MAC */
  1849. ether_addr_copy(&(pkt_dev->hh[0]), pkt_dev->dst_mac);
  1850. if (pkt_dev->flags & F_IPV6) {
  1851. int i, set = 0, err = 1;
  1852. struct inet6_dev *idev;
  1853. if (pkt_dev->min_pkt_size == 0) {
  1854. pkt_dev->min_pkt_size = 14 + sizeof(struct ipv6hdr)
  1855. + sizeof(struct udphdr)
  1856. + sizeof(struct pktgen_hdr)
  1857. + pkt_dev->pkt_overhead;
  1858. }
  1859. for (i = 0; i < sizeof(struct in6_addr); i++)
  1860. if (pkt_dev->cur_in6_saddr.s6_addr[i]) {
  1861. set = 1;
  1862. break;
  1863. }
  1864. if (!set) {
  1865. /*
  1866. * Use linklevel address if unconfigured.
  1867. *
  1868. * use ipv6_get_lladdr if/when it's get exported
  1869. */
  1870. rcu_read_lock();
  1871. idev = __in6_dev_get(pkt_dev->odev);
  1872. if (idev) {
  1873. struct inet6_ifaddr *ifp;
  1874. read_lock_bh(&idev->lock);
  1875. list_for_each_entry(ifp, &idev->addr_list, if_list) {
  1876. if ((ifp->scope & IFA_LINK) &&
  1877. !(ifp->flags & IFA_F_TENTATIVE)) {
  1878. pkt_dev->cur_in6_saddr = ifp->addr;
  1879. err = 0;
  1880. break;
  1881. }
  1882. }
  1883. read_unlock_bh(&idev->lock);
  1884. }
  1885. rcu_read_unlock();
  1886. if (err)
  1887. pr_err("ERROR: IPv6 link address not available\n");
  1888. }
  1889. } else {
  1890. if (pkt_dev->min_pkt_size == 0) {
  1891. pkt_dev->min_pkt_size = 14 + sizeof(struct iphdr)
  1892. + sizeof(struct udphdr)
  1893. + sizeof(struct pktgen_hdr)
  1894. + pkt_dev->pkt_overhead;
  1895. }
  1896. pkt_dev->saddr_min = 0;
  1897. pkt_dev->saddr_max = 0;
  1898. if (strlen(pkt_dev->src_min) == 0) {
  1899. struct in_device *in_dev;
  1900. rcu_read_lock();
  1901. in_dev = __in_dev_get_rcu(pkt_dev->odev);
  1902. if (in_dev) {
  1903. const struct in_ifaddr *ifa;
  1904. ifa = rcu_dereference(in_dev->ifa_list);
  1905. if (ifa) {
  1906. pkt_dev->saddr_min = ifa->ifa_address;
  1907. pkt_dev->saddr_max = pkt_dev->saddr_min;
  1908. }
  1909. }
  1910. rcu_read_unlock();
  1911. } else {
  1912. pkt_dev->saddr_min = in_aton(pkt_dev->src_min);
  1913. pkt_dev->saddr_max = in_aton(pkt_dev->src_max);
  1914. }
  1915. pkt_dev->daddr_min = in_aton(pkt_dev->dst_min);
  1916. pkt_dev->daddr_max = in_aton(pkt_dev->dst_max);
  1917. }
  1918. /* Initialize current values. */
  1919. pkt_dev->cur_pkt_size = pkt_dev->min_pkt_size;
  1920. if (pkt_dev->min_pkt_size > pkt_dev->max_pkt_size)
  1921. pkt_dev->max_pkt_size = pkt_dev->min_pkt_size;
  1922. pkt_dev->cur_dst_mac_offset = 0;
  1923. pkt_dev->cur_src_mac_offset = 0;
  1924. pkt_dev->cur_saddr = pkt_dev->saddr_min;
  1925. pkt_dev->cur_daddr = pkt_dev->daddr_min;
  1926. pkt_dev->cur_udp_dst = pkt_dev->udp_dst_min;
  1927. pkt_dev->cur_udp_src = pkt_dev->udp_src_min;
  1928. pkt_dev->nflows = 0;
  1929. }
  1930. static void spin(struct pktgen_dev *pkt_dev, ktime_t spin_until)
  1931. {
  1932. ktime_t start_time, end_time;
  1933. s64 remaining;
  1934. struct hrtimer_sleeper t;
  1935. hrtimer_init_sleeper_on_stack(&t, CLOCK_MONOTONIC, HRTIMER_MODE_ABS);
  1936. hrtimer_set_expires(&t.timer, spin_until);
  1937. remaining = ktime_to_ns(hrtimer_expires_remaining(&t.timer));
  1938. if (remaining <= 0)
  1939. goto out;
  1940. start_time = ktime_get();
  1941. if (remaining < 100000) {
  1942. /* for small delays (<100us), just loop until limit is reached */
  1943. do {
  1944. end_time = ktime_get();
  1945. } while (ktime_compare(end_time, spin_until) < 0);
  1946. } else {
  1947. do {
  1948. set_current_state(TASK_INTERRUPTIBLE);
  1949. hrtimer_sleeper_start_expires(&t, HRTIMER_MODE_ABS);
  1950. if (likely(t.task))
  1951. schedule();
  1952. hrtimer_cancel(&t.timer);
  1953. } while (t.task && pkt_dev->running && !signal_pending(current));
  1954. __set_current_state(TASK_RUNNING);
  1955. end_time = ktime_get();
  1956. }
  1957. pkt_dev->idle_acc += ktime_to_ns(ktime_sub(end_time, start_time));
  1958. out:
  1959. pkt_dev->next_tx = ktime_add_ns(spin_until, pkt_dev->delay);
  1960. destroy_hrtimer_on_stack(&t.timer);
  1961. }
  1962. static inline void set_pkt_overhead(struct pktgen_dev *pkt_dev)
  1963. {
  1964. pkt_dev->pkt_overhead = 0;
  1965. pkt_dev->pkt_overhead += pkt_dev->nr_labels*sizeof(u32);
  1966. pkt_dev->pkt_overhead += VLAN_TAG_SIZE(pkt_dev);
  1967. pkt_dev->pkt_overhead += SVLAN_TAG_SIZE(pkt_dev);
  1968. }
  1969. static inline int f_seen(const struct pktgen_dev *pkt_dev, int flow)
  1970. {
  1971. return !!(pkt_dev->flows[flow].flags & F_INIT);
  1972. }
  1973. static inline int f_pick(struct pktgen_dev *pkt_dev)
  1974. {
  1975. int flow = pkt_dev->curfl;
  1976. if (pkt_dev->flags & F_FLOW_SEQ) {
  1977. if (pkt_dev->flows[flow].count >= pkt_dev->lflow) {
  1978. /* reset time */
  1979. pkt_dev->flows[flow].count = 0;
  1980. pkt_dev->flows[flow].flags = 0;
  1981. pkt_dev->curfl += 1;
  1982. if (pkt_dev->curfl >= pkt_dev->cflows)
  1983. pkt_dev->curfl = 0; /*reset */
  1984. }
  1985. } else {
  1986. flow = get_random_u32_below(pkt_dev->cflows);
  1987. pkt_dev->curfl = flow;
  1988. if (pkt_dev->flows[flow].count > pkt_dev->lflow) {
  1989. pkt_dev->flows[flow].count = 0;
  1990. pkt_dev->flows[flow].flags = 0;
  1991. }
  1992. }
  1993. return pkt_dev->curfl;
  1994. }
  1995. #ifdef CONFIG_XFRM
  1996. /* If there was already an IPSEC SA, we keep it as is, else
  1997. * we go look for it ...
  1998. */
  1999. #define DUMMY_MARK 0
  2000. static void get_ipsec_sa(struct pktgen_dev *pkt_dev, int flow)
  2001. {
  2002. struct xfrm_state *x = pkt_dev->flows[flow].x;
  2003. struct pktgen_net *pn = net_generic(dev_net(pkt_dev->odev), pg_net_id);
  2004. if (!x) {
  2005. if (pkt_dev->spi) {
  2006. /* We need as quick as possible to find the right SA
  2007. * Searching with minimum criteria to achieve, this.
  2008. */
  2009. x = xfrm_state_lookup_byspi(pn->net, htonl(pkt_dev->spi), AF_INET);
  2010. } else {
  2011. /* slow path: we don't already have xfrm_state */
  2012. x = xfrm_stateonly_find(pn->net, DUMMY_MARK, 0,
  2013. (xfrm_address_t *)&pkt_dev->cur_daddr,
  2014. (xfrm_address_t *)&pkt_dev->cur_saddr,
  2015. AF_INET,
  2016. pkt_dev->ipsmode,
  2017. pkt_dev->ipsproto, 0);
  2018. }
  2019. if (x) {
  2020. pkt_dev->flows[flow].x = x;
  2021. set_pkt_overhead(pkt_dev);
  2022. pkt_dev->pkt_overhead += x->props.header_len;
  2023. }
  2024. }
  2025. }
  2026. #endif
  2027. static void set_cur_queue_map(struct pktgen_dev *pkt_dev)
  2028. {
  2029. if (pkt_dev->flags & F_QUEUE_MAP_CPU)
  2030. pkt_dev->cur_queue_map = smp_processor_id();
  2031. else if (pkt_dev->queue_map_min <= pkt_dev->queue_map_max) {
  2032. __u16 t;
  2033. if (pkt_dev->flags & F_QUEUE_MAP_RND) {
  2034. t = get_random_u32_inclusive(pkt_dev->queue_map_min,
  2035. pkt_dev->queue_map_max);
  2036. } else {
  2037. t = pkt_dev->cur_queue_map + 1;
  2038. if (t > pkt_dev->queue_map_max)
  2039. t = pkt_dev->queue_map_min;
  2040. }
  2041. pkt_dev->cur_queue_map = t;
  2042. }
  2043. pkt_dev->cur_queue_map = pkt_dev->cur_queue_map % pkt_dev->odev->real_num_tx_queues;
  2044. }
  2045. /* Increment/randomize headers according to flags and current values
  2046. * for IP src/dest, UDP src/dst port, MAC-Addr src/dst
  2047. */
  2048. static void mod_cur_headers(struct pktgen_dev *pkt_dev)
  2049. {
  2050. __u32 imn;
  2051. __u32 imx;
  2052. int flow = 0;
  2053. if (pkt_dev->cflows)
  2054. flow = f_pick(pkt_dev);
  2055. /* Deal with source MAC */
  2056. if (pkt_dev->src_mac_count > 1) {
  2057. __u32 mc;
  2058. __u32 tmp;
  2059. if (pkt_dev->flags & F_MACSRC_RND)
  2060. mc = get_random_u32_below(pkt_dev->src_mac_count);
  2061. else {
  2062. mc = pkt_dev->cur_src_mac_offset++;
  2063. if (pkt_dev->cur_src_mac_offset >=
  2064. pkt_dev->src_mac_count)
  2065. pkt_dev->cur_src_mac_offset = 0;
  2066. }
  2067. tmp = pkt_dev->src_mac[5] + (mc & 0xFF);
  2068. pkt_dev->hh[11] = tmp;
  2069. tmp = (pkt_dev->src_mac[4] + ((mc >> 8) & 0xFF) + (tmp >> 8));
  2070. pkt_dev->hh[10] = tmp;
  2071. tmp = (pkt_dev->src_mac[3] + ((mc >> 16) & 0xFF) + (tmp >> 8));
  2072. pkt_dev->hh[9] = tmp;
  2073. tmp = (pkt_dev->src_mac[2] + ((mc >> 24) & 0xFF) + (tmp >> 8));
  2074. pkt_dev->hh[8] = tmp;
  2075. tmp = (pkt_dev->src_mac[1] + (tmp >> 8));
  2076. pkt_dev->hh[7] = tmp;
  2077. }
  2078. /* Deal with Destination MAC */
  2079. if (pkt_dev->dst_mac_count > 1) {
  2080. __u32 mc;
  2081. __u32 tmp;
  2082. if (pkt_dev->flags & F_MACDST_RND)
  2083. mc = get_random_u32_below(pkt_dev->dst_mac_count);
  2084. else {
  2085. mc = pkt_dev->cur_dst_mac_offset++;
  2086. if (pkt_dev->cur_dst_mac_offset >=
  2087. pkt_dev->dst_mac_count) {
  2088. pkt_dev->cur_dst_mac_offset = 0;
  2089. }
  2090. }
  2091. tmp = pkt_dev->dst_mac[5] + (mc & 0xFF);
  2092. pkt_dev->hh[5] = tmp;
  2093. tmp = (pkt_dev->dst_mac[4] + ((mc >> 8) & 0xFF) + (tmp >> 8));
  2094. pkt_dev->hh[4] = tmp;
  2095. tmp = (pkt_dev->dst_mac[3] + ((mc >> 16) & 0xFF) + (tmp >> 8));
  2096. pkt_dev->hh[3] = tmp;
  2097. tmp = (pkt_dev->dst_mac[2] + ((mc >> 24) & 0xFF) + (tmp >> 8));
  2098. pkt_dev->hh[2] = tmp;
  2099. tmp = (pkt_dev->dst_mac[1] + (tmp >> 8));
  2100. pkt_dev->hh[1] = tmp;
  2101. }
  2102. if (pkt_dev->flags & F_MPLS_RND) {
  2103. unsigned int i;
  2104. for (i = 0; i < pkt_dev->nr_labels; i++)
  2105. if (pkt_dev->labels[i] & MPLS_STACK_BOTTOM)
  2106. pkt_dev->labels[i] = MPLS_STACK_BOTTOM |
  2107. ((__force __be32)get_random_u32() &
  2108. htonl(0x000fffff));
  2109. }
  2110. if ((pkt_dev->flags & F_VID_RND) && (pkt_dev->vlan_id != 0xffff)) {
  2111. pkt_dev->vlan_id = get_random_u32_below(4096);
  2112. }
  2113. if ((pkt_dev->flags & F_SVID_RND) && (pkt_dev->svlan_id != 0xffff)) {
  2114. pkt_dev->svlan_id = get_random_u32_below(4096);
  2115. }
  2116. if (pkt_dev->udp_src_min < pkt_dev->udp_src_max) {
  2117. if (pkt_dev->flags & F_UDPSRC_RND)
  2118. pkt_dev->cur_udp_src = get_random_u32_inclusive(pkt_dev->udp_src_min,
  2119. pkt_dev->udp_src_max - 1);
  2120. else {
  2121. pkt_dev->cur_udp_src++;
  2122. if (pkt_dev->cur_udp_src >= pkt_dev->udp_src_max)
  2123. pkt_dev->cur_udp_src = pkt_dev->udp_src_min;
  2124. }
  2125. }
  2126. if (pkt_dev->udp_dst_min < pkt_dev->udp_dst_max) {
  2127. if (pkt_dev->flags & F_UDPDST_RND) {
  2128. pkt_dev->cur_udp_dst = get_random_u32_inclusive(pkt_dev->udp_dst_min,
  2129. pkt_dev->udp_dst_max - 1);
  2130. } else {
  2131. pkt_dev->cur_udp_dst++;
  2132. if (pkt_dev->cur_udp_dst >= pkt_dev->udp_dst_max)
  2133. pkt_dev->cur_udp_dst = pkt_dev->udp_dst_min;
  2134. }
  2135. }
  2136. if (!(pkt_dev->flags & F_IPV6)) {
  2137. imn = ntohl(pkt_dev->saddr_min);
  2138. imx = ntohl(pkt_dev->saddr_max);
  2139. if (imn < imx) {
  2140. __u32 t;
  2141. if (pkt_dev->flags & F_IPSRC_RND)
  2142. t = get_random_u32_inclusive(imn, imx - 1);
  2143. else {
  2144. t = ntohl(pkt_dev->cur_saddr);
  2145. t++;
  2146. if (t > imx)
  2147. t = imn;
  2148. }
  2149. pkt_dev->cur_saddr = htonl(t);
  2150. }
  2151. if (pkt_dev->cflows && f_seen(pkt_dev, flow)) {
  2152. pkt_dev->cur_daddr = pkt_dev->flows[flow].cur_daddr;
  2153. } else {
  2154. imn = ntohl(pkt_dev->daddr_min);
  2155. imx = ntohl(pkt_dev->daddr_max);
  2156. if (imn < imx) {
  2157. __u32 t;
  2158. __be32 s;
  2159. if (pkt_dev->flags & F_IPDST_RND) {
  2160. do {
  2161. t = get_random_u32_inclusive(imn, imx - 1);
  2162. s = htonl(t);
  2163. } while (ipv4_is_loopback(s) ||
  2164. ipv4_is_multicast(s) ||
  2165. ipv4_is_lbcast(s) ||
  2166. ipv4_is_zeronet(s) ||
  2167. ipv4_is_local_multicast(s));
  2168. pkt_dev->cur_daddr = s;
  2169. } else {
  2170. t = ntohl(pkt_dev->cur_daddr);
  2171. t++;
  2172. if (t > imx) {
  2173. t = imn;
  2174. }
  2175. pkt_dev->cur_daddr = htonl(t);
  2176. }
  2177. }
  2178. if (pkt_dev->cflows) {
  2179. pkt_dev->flows[flow].flags |= F_INIT;
  2180. pkt_dev->flows[flow].cur_daddr =
  2181. pkt_dev->cur_daddr;
  2182. #ifdef CONFIG_XFRM
  2183. if (pkt_dev->flags & F_IPSEC)
  2184. get_ipsec_sa(pkt_dev, flow);
  2185. #endif
  2186. pkt_dev->nflows++;
  2187. }
  2188. }
  2189. } else { /* IPV6 * */
  2190. if (!ipv6_addr_any(&pkt_dev->min_in6_daddr)) {
  2191. int i;
  2192. /* Only random destinations yet */
  2193. for (i = 0; i < 4; i++) {
  2194. pkt_dev->cur_in6_daddr.s6_addr32[i] =
  2195. (((__force __be32)get_random_u32() |
  2196. pkt_dev->min_in6_daddr.s6_addr32[i]) &
  2197. pkt_dev->max_in6_daddr.s6_addr32[i]);
  2198. }
  2199. }
  2200. }
  2201. if (pkt_dev->min_pkt_size < pkt_dev->max_pkt_size) {
  2202. __u32 t;
  2203. if (pkt_dev->flags & F_TXSIZE_RND) {
  2204. t = get_random_u32_inclusive(pkt_dev->min_pkt_size,
  2205. pkt_dev->max_pkt_size - 1);
  2206. } else {
  2207. t = pkt_dev->cur_pkt_size + 1;
  2208. if (t > pkt_dev->max_pkt_size)
  2209. t = pkt_dev->min_pkt_size;
  2210. }
  2211. pkt_dev->cur_pkt_size = t;
  2212. } else if (pkt_dev->n_imix_entries > 0) {
  2213. struct imix_pkt *entry;
  2214. __u32 t = get_random_u32_below(IMIX_PRECISION);
  2215. __u8 entry_index = pkt_dev->imix_distribution[t];
  2216. entry = &pkt_dev->imix_entries[entry_index];
  2217. entry->count_so_far++;
  2218. pkt_dev->cur_pkt_size = entry->size;
  2219. }
  2220. set_cur_queue_map(pkt_dev);
  2221. pkt_dev->flows[flow].count++;
  2222. }
  2223. static void fill_imix_distribution(struct pktgen_dev *pkt_dev)
  2224. {
  2225. int cumulative_probabilites[MAX_IMIX_ENTRIES];
  2226. int j = 0;
  2227. __u64 cumulative_prob = 0;
  2228. __u64 total_weight = 0;
  2229. int i = 0;
  2230. for (i = 0; i < pkt_dev->n_imix_entries; i++)
  2231. total_weight += pkt_dev->imix_entries[i].weight;
  2232. /* Fill cumulative_probabilites with sum of normalized probabilities */
  2233. for (i = 0; i < pkt_dev->n_imix_entries - 1; i++) {
  2234. cumulative_prob += div64_u64(pkt_dev->imix_entries[i].weight *
  2235. IMIX_PRECISION,
  2236. total_weight);
  2237. cumulative_probabilites[i] = cumulative_prob;
  2238. }
  2239. cumulative_probabilites[pkt_dev->n_imix_entries - 1] = 100;
  2240. for (i = 0; i < IMIX_PRECISION; i++) {
  2241. if (i == cumulative_probabilites[j])
  2242. j++;
  2243. pkt_dev->imix_distribution[i] = j;
  2244. }
  2245. }
  2246. #ifdef CONFIG_XFRM
  2247. static u32 pktgen_dst_metrics[RTAX_MAX + 1] = {
  2248. [RTAX_HOPLIMIT] = 0x5, /* Set a static hoplimit */
  2249. };
  2250. static int pktgen_output_ipsec(struct sk_buff *skb, struct pktgen_dev *pkt_dev)
  2251. {
  2252. struct xfrm_state *x = pkt_dev->flows[pkt_dev->curfl].x;
  2253. int err = 0;
  2254. struct net *net = dev_net(pkt_dev->odev);
  2255. if (!x)
  2256. return 0;
  2257. /* XXX: we dont support tunnel mode for now until
  2258. * we resolve the dst issue */
  2259. if ((x->props.mode != XFRM_MODE_TRANSPORT) && (pkt_dev->spi == 0))
  2260. return 0;
  2261. /* But when user specify an valid SPI, transformation
  2262. * supports both transport/tunnel mode + ESP/AH type.
  2263. */
  2264. if ((x->props.mode == XFRM_MODE_TUNNEL) && (pkt_dev->spi != 0))
  2265. skb->_skb_refdst = (unsigned long)&pkt_dev->xdst.u.dst | SKB_DST_NOREF;
  2266. rcu_read_lock_bh();
  2267. err = pktgen_xfrm_outer_mode_output(x, skb);
  2268. rcu_read_unlock_bh();
  2269. if (err) {
  2270. XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTSTATEMODEERROR);
  2271. goto error;
  2272. }
  2273. err = x->type->output(x, skb);
  2274. if (err) {
  2275. XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTSTATEPROTOERROR);
  2276. goto error;
  2277. }
  2278. spin_lock_bh(&x->lock);
  2279. x->curlft.bytes += skb->len;
  2280. x->curlft.packets++;
  2281. spin_unlock_bh(&x->lock);
  2282. error:
  2283. return err;
  2284. }
  2285. static void free_SAs(struct pktgen_dev *pkt_dev)
  2286. {
  2287. if (pkt_dev->cflows) {
  2288. /* let go of the SAs if we have them */
  2289. int i;
  2290. for (i = 0; i < pkt_dev->cflows; i++) {
  2291. struct xfrm_state *x = pkt_dev->flows[i].x;
  2292. if (x) {
  2293. xfrm_state_put(x);
  2294. pkt_dev->flows[i].x = NULL;
  2295. }
  2296. }
  2297. }
  2298. }
  2299. static int process_ipsec(struct pktgen_dev *pkt_dev,
  2300. struct sk_buff *skb, __be16 protocol)
  2301. {
  2302. if (pkt_dev->flags & F_IPSEC) {
  2303. struct xfrm_state *x = pkt_dev->flows[pkt_dev->curfl].x;
  2304. int nhead = 0;
  2305. if (x) {
  2306. struct ethhdr *eth;
  2307. struct iphdr *iph;
  2308. int ret;
  2309. nhead = x->props.header_len - skb_headroom(skb);
  2310. if (nhead > 0) {
  2311. ret = pskb_expand_head(skb, nhead, 0, GFP_ATOMIC);
  2312. if (ret < 0) {
  2313. pr_err("Error expanding ipsec packet %d\n",
  2314. ret);
  2315. goto err;
  2316. }
  2317. }
  2318. /* ipsec is not expecting ll header */
  2319. skb_pull(skb, ETH_HLEN);
  2320. ret = pktgen_output_ipsec(skb, pkt_dev);
  2321. if (ret) {
  2322. pr_err("Error creating ipsec packet %d\n", ret);
  2323. goto err;
  2324. }
  2325. /* restore ll */
  2326. eth = skb_push(skb, ETH_HLEN);
  2327. memcpy(eth, pkt_dev->hh, 2 * ETH_ALEN);
  2328. eth->h_proto = protocol;
  2329. /* Update IPv4 header len as well as checksum value */
  2330. iph = ip_hdr(skb);
  2331. iph->tot_len = htons(skb->len - ETH_HLEN);
  2332. ip_send_check(iph);
  2333. }
  2334. }
  2335. return 1;
  2336. err:
  2337. kfree_skb(skb);
  2338. return 0;
  2339. }
  2340. #endif
  2341. static void mpls_push(__be32 *mpls, struct pktgen_dev *pkt_dev)
  2342. {
  2343. unsigned int i;
  2344. for (i = 0; i < pkt_dev->nr_labels; i++)
  2345. *mpls++ = pkt_dev->labels[i] & ~MPLS_STACK_BOTTOM;
  2346. mpls--;
  2347. *mpls |= MPLS_STACK_BOTTOM;
  2348. }
  2349. static inline __be16 build_tci(unsigned int id, unsigned int cfi,
  2350. unsigned int prio)
  2351. {
  2352. return htons(id | (cfi << 12) | (prio << 13));
  2353. }
  2354. static void pktgen_finalize_skb(struct pktgen_dev *pkt_dev, struct sk_buff *skb,
  2355. int datalen)
  2356. {
  2357. struct timespec64 timestamp;
  2358. struct pktgen_hdr *pgh;
  2359. pgh = skb_put(skb, sizeof(*pgh));
  2360. datalen -= sizeof(*pgh);
  2361. if (pkt_dev->nfrags <= 0) {
  2362. skb_put_zero(skb, datalen);
  2363. } else {
  2364. int frags = pkt_dev->nfrags;
  2365. int i, len;
  2366. int frag_len;
  2367. if (frags > MAX_SKB_FRAGS)
  2368. frags = MAX_SKB_FRAGS;
  2369. len = datalen - frags * PAGE_SIZE;
  2370. if (len > 0) {
  2371. skb_put_zero(skb, len);
  2372. datalen = frags * PAGE_SIZE;
  2373. }
  2374. i = 0;
  2375. frag_len = (datalen/frags) < PAGE_SIZE ?
  2376. (datalen/frags) : PAGE_SIZE;
  2377. while (datalen > 0) {
  2378. if (unlikely(!pkt_dev->page)) {
  2379. int node = numa_node_id();
  2380. if (pkt_dev->node >= 0 && (pkt_dev->flags & F_NODE))
  2381. node = pkt_dev->node;
  2382. pkt_dev->page = alloc_pages_node(node, GFP_KERNEL | __GFP_ZERO, 0);
  2383. if (!pkt_dev->page)
  2384. break;
  2385. }
  2386. get_page(pkt_dev->page);
  2387. /*last fragment, fill rest of data*/
  2388. if (i == (frags - 1))
  2389. skb_frag_fill_page_desc(&skb_shinfo(skb)->frags[i],
  2390. pkt_dev->page, 0,
  2391. (datalen < PAGE_SIZE ?
  2392. datalen : PAGE_SIZE));
  2393. else
  2394. skb_frag_fill_page_desc(&skb_shinfo(skb)->frags[i],
  2395. pkt_dev->page, 0, frag_len);
  2396. datalen -= skb_frag_size(&skb_shinfo(skb)->frags[i]);
  2397. skb->len += skb_frag_size(&skb_shinfo(skb)->frags[i]);
  2398. skb->data_len += skb_frag_size(&skb_shinfo(skb)->frags[i]);
  2399. i++;
  2400. skb_shinfo(skb)->nr_frags = i;
  2401. }
  2402. }
  2403. /* Stamp the time, and sequence number,
  2404. * convert them to network byte order
  2405. */
  2406. pgh->pgh_magic = htonl(PKTGEN_MAGIC);
  2407. pgh->seq_num = htonl(pkt_dev->seq_num);
  2408. if (pkt_dev->flags & F_NO_TIMESTAMP) {
  2409. pgh->tv_sec = 0;
  2410. pgh->tv_usec = 0;
  2411. } else {
  2412. /*
  2413. * pgh->tv_sec wraps in y2106 when interpreted as unsigned
  2414. * as done by wireshark, or y2038 when interpreted as signed.
  2415. * This is probably harmless, but if anyone wants to improve
  2416. * it, we could introduce a variant that puts 64-bit nanoseconds
  2417. * into the respective header bytes.
  2418. * This would also be slightly faster to read.
  2419. */
  2420. ktime_get_real_ts64(&timestamp);
  2421. pgh->tv_sec = htonl(timestamp.tv_sec);
  2422. pgh->tv_usec = htonl(timestamp.tv_nsec / NSEC_PER_USEC);
  2423. }
  2424. }
  2425. static struct sk_buff *pktgen_alloc_skb(struct net_device *dev,
  2426. struct pktgen_dev *pkt_dev)
  2427. {
  2428. unsigned int extralen = LL_RESERVED_SPACE(dev);
  2429. struct sk_buff *skb = NULL;
  2430. unsigned int size;
  2431. size = pkt_dev->cur_pkt_size + 64 + extralen + pkt_dev->pkt_overhead;
  2432. if (pkt_dev->flags & F_NODE) {
  2433. int node = pkt_dev->node >= 0 ? pkt_dev->node : numa_node_id();
  2434. skb = __alloc_skb(NET_SKB_PAD + size, GFP_NOWAIT, 0, node);
  2435. if (likely(skb)) {
  2436. skb_reserve(skb, NET_SKB_PAD);
  2437. skb->dev = dev;
  2438. }
  2439. } else {
  2440. skb = __netdev_alloc_skb(dev, size, GFP_NOWAIT);
  2441. }
  2442. /* the caller pre-fetches from skb->data and reserves for the mac hdr */
  2443. if (likely(skb))
  2444. skb_reserve(skb, extralen - 16);
  2445. return skb;
  2446. }
  2447. static struct sk_buff *fill_packet_ipv4(struct net_device *odev,
  2448. struct pktgen_dev *pkt_dev)
  2449. {
  2450. struct sk_buff *skb = NULL;
  2451. __u8 *eth;
  2452. struct udphdr *udph;
  2453. int datalen, iplen;
  2454. struct iphdr *iph;
  2455. __be16 protocol = htons(ETH_P_IP);
  2456. __be32 *mpls;
  2457. __be16 *vlan_tci = NULL; /* Encapsulates priority and VLAN ID */
  2458. __be16 *vlan_encapsulated_proto = NULL; /* packet type ID field (or len) for VLAN tag */
  2459. __be16 *svlan_tci = NULL; /* Encapsulates priority and SVLAN ID */
  2460. __be16 *svlan_encapsulated_proto = NULL; /* packet type ID field (or len) for SVLAN tag */
  2461. u16 queue_map;
  2462. if (pkt_dev->nr_labels)
  2463. protocol = htons(ETH_P_MPLS_UC);
  2464. if (pkt_dev->vlan_id != 0xffff)
  2465. protocol = htons(ETH_P_8021Q);
  2466. /* Update any of the values, used when we're incrementing various
  2467. * fields.
  2468. */
  2469. mod_cur_headers(pkt_dev);
  2470. queue_map = pkt_dev->cur_queue_map;
  2471. skb = pktgen_alloc_skb(odev, pkt_dev);
  2472. if (!skb) {
  2473. sprintf(pkt_dev->result, "No memory");
  2474. return NULL;
  2475. }
  2476. prefetchw(skb->data);
  2477. skb_reserve(skb, 16);
  2478. /* Reserve for ethernet and IP header */
  2479. eth = skb_push(skb, 14);
  2480. mpls = skb_put(skb, pkt_dev->nr_labels * sizeof(__u32));
  2481. if (pkt_dev->nr_labels)
  2482. mpls_push(mpls, pkt_dev);
  2483. if (pkt_dev->vlan_id != 0xffff) {
  2484. if (pkt_dev->svlan_id != 0xffff) {
  2485. svlan_tci = skb_put(skb, sizeof(__be16));
  2486. *svlan_tci = build_tci(pkt_dev->svlan_id,
  2487. pkt_dev->svlan_cfi,
  2488. pkt_dev->svlan_p);
  2489. svlan_encapsulated_proto = skb_put(skb,
  2490. sizeof(__be16));
  2491. *svlan_encapsulated_proto = htons(ETH_P_8021Q);
  2492. }
  2493. vlan_tci = skb_put(skb, sizeof(__be16));
  2494. *vlan_tci = build_tci(pkt_dev->vlan_id,
  2495. pkt_dev->vlan_cfi,
  2496. pkt_dev->vlan_p);
  2497. vlan_encapsulated_proto = skb_put(skb, sizeof(__be16));
  2498. *vlan_encapsulated_proto = htons(ETH_P_IP);
  2499. }
  2500. skb_reset_mac_header(skb);
  2501. skb_set_network_header(skb, skb->len);
  2502. iph = skb_put(skb, sizeof(struct iphdr));
  2503. skb_set_transport_header(skb, skb->len);
  2504. udph = skb_put(skb, sizeof(struct udphdr));
  2505. skb_set_queue_mapping(skb, queue_map);
  2506. skb->priority = pkt_dev->skb_priority;
  2507. memcpy(eth, pkt_dev->hh, 12);
  2508. *(__be16 *) & eth[12] = protocol;
  2509. /* Eth + IPh + UDPh + mpls */
  2510. datalen = pkt_dev->cur_pkt_size - 14 - 20 - 8 -
  2511. pkt_dev->pkt_overhead;
  2512. if (datalen < 0 || datalen < sizeof(struct pktgen_hdr))
  2513. datalen = sizeof(struct pktgen_hdr);
  2514. udph->source = htons(pkt_dev->cur_udp_src);
  2515. udph->dest = htons(pkt_dev->cur_udp_dst);
  2516. udph->len = htons(datalen + 8); /* DATA + udphdr */
  2517. udph->check = 0;
  2518. iph->ihl = 5;
  2519. iph->version = 4;
  2520. iph->ttl = 32;
  2521. iph->tos = pkt_dev->tos;
  2522. iph->protocol = IPPROTO_UDP; /* UDP */
  2523. iph->saddr = pkt_dev->cur_saddr;
  2524. iph->daddr = pkt_dev->cur_daddr;
  2525. iph->id = htons(pkt_dev->ip_id);
  2526. pkt_dev->ip_id++;
  2527. iph->frag_off = 0;
  2528. iplen = 20 + 8 + datalen;
  2529. iph->tot_len = htons(iplen);
  2530. ip_send_check(iph);
  2531. skb->protocol = protocol;
  2532. skb->dev = odev;
  2533. skb->pkt_type = PACKET_HOST;
  2534. pktgen_finalize_skb(pkt_dev, skb, datalen);
  2535. if (!(pkt_dev->flags & F_UDPCSUM)) {
  2536. skb->ip_summed = CHECKSUM_NONE;
  2537. } else if (odev->features & (NETIF_F_HW_CSUM | NETIF_F_IP_CSUM)) {
  2538. skb->ip_summed = CHECKSUM_PARTIAL;
  2539. skb->csum = 0;
  2540. udp4_hwcsum(skb, iph->saddr, iph->daddr);
  2541. } else {
  2542. __wsum csum = skb_checksum(skb, skb_transport_offset(skb), datalen + 8, 0);
  2543. /* add protocol-dependent pseudo-header */
  2544. udph->check = csum_tcpudp_magic(iph->saddr, iph->daddr,
  2545. datalen + 8, IPPROTO_UDP, csum);
  2546. if (udph->check == 0)
  2547. udph->check = CSUM_MANGLED_0;
  2548. }
  2549. #ifdef CONFIG_XFRM
  2550. if (!process_ipsec(pkt_dev, skb, protocol))
  2551. return NULL;
  2552. #endif
  2553. return skb;
  2554. }
  2555. static struct sk_buff *fill_packet_ipv6(struct net_device *odev,
  2556. struct pktgen_dev *pkt_dev)
  2557. {
  2558. struct sk_buff *skb = NULL;
  2559. __u8 *eth;
  2560. struct udphdr *udph;
  2561. int datalen, udplen;
  2562. struct ipv6hdr *iph;
  2563. __be16 protocol = htons(ETH_P_IPV6);
  2564. __be32 *mpls;
  2565. __be16 *vlan_tci = NULL; /* Encapsulates priority and VLAN ID */
  2566. __be16 *vlan_encapsulated_proto = NULL; /* packet type ID field (or len) for VLAN tag */
  2567. __be16 *svlan_tci = NULL; /* Encapsulates priority and SVLAN ID */
  2568. __be16 *svlan_encapsulated_proto = NULL; /* packet type ID field (or len) for SVLAN tag */
  2569. u16 queue_map;
  2570. if (pkt_dev->nr_labels)
  2571. protocol = htons(ETH_P_MPLS_UC);
  2572. if (pkt_dev->vlan_id != 0xffff)
  2573. protocol = htons(ETH_P_8021Q);
  2574. /* Update any of the values, used when we're incrementing various
  2575. * fields.
  2576. */
  2577. mod_cur_headers(pkt_dev);
  2578. queue_map = pkt_dev->cur_queue_map;
  2579. skb = pktgen_alloc_skb(odev, pkt_dev);
  2580. if (!skb) {
  2581. sprintf(pkt_dev->result, "No memory");
  2582. return NULL;
  2583. }
  2584. prefetchw(skb->data);
  2585. skb_reserve(skb, 16);
  2586. /* Reserve for ethernet and IP header */
  2587. eth = skb_push(skb, 14);
  2588. mpls = skb_put(skb, pkt_dev->nr_labels * sizeof(__u32));
  2589. if (pkt_dev->nr_labels)
  2590. mpls_push(mpls, pkt_dev);
  2591. if (pkt_dev->vlan_id != 0xffff) {
  2592. if (pkt_dev->svlan_id != 0xffff) {
  2593. svlan_tci = skb_put(skb, sizeof(__be16));
  2594. *svlan_tci = build_tci(pkt_dev->svlan_id,
  2595. pkt_dev->svlan_cfi,
  2596. pkt_dev->svlan_p);
  2597. svlan_encapsulated_proto = skb_put(skb,
  2598. sizeof(__be16));
  2599. *svlan_encapsulated_proto = htons(ETH_P_8021Q);
  2600. }
  2601. vlan_tci = skb_put(skb, sizeof(__be16));
  2602. *vlan_tci = build_tci(pkt_dev->vlan_id,
  2603. pkt_dev->vlan_cfi,
  2604. pkt_dev->vlan_p);
  2605. vlan_encapsulated_proto = skb_put(skb, sizeof(__be16));
  2606. *vlan_encapsulated_proto = htons(ETH_P_IPV6);
  2607. }
  2608. skb_reset_mac_header(skb);
  2609. skb_set_network_header(skb, skb->len);
  2610. iph = skb_put(skb, sizeof(struct ipv6hdr));
  2611. skb_set_transport_header(skb, skb->len);
  2612. udph = skb_put(skb, sizeof(struct udphdr));
  2613. skb_set_queue_mapping(skb, queue_map);
  2614. skb->priority = pkt_dev->skb_priority;
  2615. memcpy(eth, pkt_dev->hh, 12);
  2616. *(__be16 *) &eth[12] = protocol;
  2617. /* Eth + IPh + UDPh + mpls */
  2618. datalen = pkt_dev->cur_pkt_size - 14 -
  2619. sizeof(struct ipv6hdr) - sizeof(struct udphdr) -
  2620. pkt_dev->pkt_overhead;
  2621. if (datalen < 0 || datalen < sizeof(struct pktgen_hdr)) {
  2622. datalen = sizeof(struct pktgen_hdr);
  2623. net_info_ratelimited("increased datalen to %d\n", datalen);
  2624. }
  2625. udplen = datalen + sizeof(struct udphdr);
  2626. udph->source = htons(pkt_dev->cur_udp_src);
  2627. udph->dest = htons(pkt_dev->cur_udp_dst);
  2628. udph->len = htons(udplen);
  2629. udph->check = 0;
  2630. *(__be32 *) iph = htonl(0x60000000); /* Version + flow */
  2631. if (pkt_dev->traffic_class) {
  2632. /* Version + traffic class + flow (0) */
  2633. *(__be32 *)iph |= htonl(0x60000000 | (pkt_dev->traffic_class << 20));
  2634. }
  2635. iph->hop_limit = 32;
  2636. iph->payload_len = htons(udplen);
  2637. iph->nexthdr = IPPROTO_UDP;
  2638. iph->daddr = pkt_dev->cur_in6_daddr;
  2639. iph->saddr = pkt_dev->cur_in6_saddr;
  2640. skb->protocol = protocol;
  2641. skb->dev = odev;
  2642. skb->pkt_type = PACKET_HOST;
  2643. pktgen_finalize_skb(pkt_dev, skb, datalen);
  2644. if (!(pkt_dev->flags & F_UDPCSUM)) {
  2645. skb->ip_summed = CHECKSUM_NONE;
  2646. } else if (odev->features & (NETIF_F_HW_CSUM | NETIF_F_IPV6_CSUM)) {
  2647. skb->ip_summed = CHECKSUM_PARTIAL;
  2648. skb->csum_start = skb_transport_header(skb) - skb->head;
  2649. skb->csum_offset = offsetof(struct udphdr, check);
  2650. udph->check = ~csum_ipv6_magic(&iph->saddr, &iph->daddr, udplen, IPPROTO_UDP, 0);
  2651. } else {
  2652. __wsum csum = skb_checksum(skb, skb_transport_offset(skb), udplen, 0);
  2653. /* add protocol-dependent pseudo-header */
  2654. udph->check = csum_ipv6_magic(&iph->saddr, &iph->daddr, udplen, IPPROTO_UDP, csum);
  2655. if (udph->check == 0)
  2656. udph->check = CSUM_MANGLED_0;
  2657. }
  2658. return skb;
  2659. }
  2660. static struct sk_buff *fill_packet(struct net_device *odev,
  2661. struct pktgen_dev *pkt_dev)
  2662. {
  2663. if (pkt_dev->flags & F_IPV6)
  2664. return fill_packet_ipv6(odev, pkt_dev);
  2665. else
  2666. return fill_packet_ipv4(odev, pkt_dev);
  2667. }
  2668. static void pktgen_clear_counters(struct pktgen_dev *pkt_dev)
  2669. {
  2670. pkt_dev->seq_num = 1;
  2671. pkt_dev->idle_acc = 0;
  2672. pkt_dev->sofar = 0;
  2673. pkt_dev->tx_bytes = 0;
  2674. pkt_dev->errors = 0;
  2675. }
  2676. /* Set up structure for sending pkts, clear counters */
  2677. static void pktgen_run(struct pktgen_thread *t)
  2678. {
  2679. struct pktgen_dev *pkt_dev;
  2680. int started = 0;
  2681. func_enter();
  2682. rcu_read_lock();
  2683. list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
  2684. /*
  2685. * setup odev and create initial packet.
  2686. */
  2687. pktgen_setup_inject(pkt_dev);
  2688. if (pkt_dev->odev) {
  2689. pktgen_clear_counters(pkt_dev);
  2690. pkt_dev->skb = NULL;
  2691. pkt_dev->started_at = pkt_dev->next_tx = ktime_get();
  2692. set_pkt_overhead(pkt_dev);
  2693. strcpy(pkt_dev->result, "Starting");
  2694. pkt_dev->running = 1; /* Cranke yeself! */
  2695. started++;
  2696. } else
  2697. strcpy(pkt_dev->result, "Error starting");
  2698. }
  2699. rcu_read_unlock();
  2700. if (started)
  2701. t->control &= ~(T_STOP);
  2702. }
  2703. static void pktgen_handle_all_threads(struct pktgen_net *pn, u32 flags)
  2704. {
  2705. struct pktgen_thread *t;
  2706. mutex_lock(&pktgen_thread_lock);
  2707. list_for_each_entry(t, &pn->pktgen_threads, th_list)
  2708. t->control |= (flags);
  2709. mutex_unlock(&pktgen_thread_lock);
  2710. }
  2711. static void pktgen_stop_all_threads(struct pktgen_net *pn)
  2712. {
  2713. func_enter();
  2714. pktgen_handle_all_threads(pn, T_STOP);
  2715. }
  2716. static int thread_is_running(const struct pktgen_thread *t)
  2717. {
  2718. const struct pktgen_dev *pkt_dev;
  2719. rcu_read_lock();
  2720. list_for_each_entry_rcu(pkt_dev, &t->if_list, list)
  2721. if (pkt_dev->running) {
  2722. rcu_read_unlock();
  2723. return 1;
  2724. }
  2725. rcu_read_unlock();
  2726. return 0;
  2727. }
  2728. static int pktgen_wait_thread_run(struct pktgen_thread *t)
  2729. {
  2730. while (thread_is_running(t)) {
  2731. /* note: 't' will still be around even after the unlock/lock
  2732. * cycle because pktgen_thread threads are only cleared at
  2733. * net exit
  2734. */
  2735. mutex_unlock(&pktgen_thread_lock);
  2736. msleep_interruptible(100);
  2737. mutex_lock(&pktgen_thread_lock);
  2738. if (signal_pending(current))
  2739. goto signal;
  2740. }
  2741. return 1;
  2742. signal:
  2743. return 0;
  2744. }
  2745. static int pktgen_wait_all_threads_run(struct pktgen_net *pn)
  2746. {
  2747. struct pktgen_thread *t;
  2748. int sig = 1;
  2749. /* prevent from racing with rmmod */
  2750. if (!try_module_get(THIS_MODULE))
  2751. return sig;
  2752. mutex_lock(&pktgen_thread_lock);
  2753. list_for_each_entry(t, &pn->pktgen_threads, th_list) {
  2754. sig = pktgen_wait_thread_run(t);
  2755. if (sig == 0)
  2756. break;
  2757. }
  2758. if (sig == 0)
  2759. list_for_each_entry(t, &pn->pktgen_threads, th_list)
  2760. t->control |= (T_STOP);
  2761. mutex_unlock(&pktgen_thread_lock);
  2762. module_put(THIS_MODULE);
  2763. return sig;
  2764. }
  2765. static void pktgen_run_all_threads(struct pktgen_net *pn)
  2766. {
  2767. func_enter();
  2768. pktgen_handle_all_threads(pn, T_RUN);
  2769. /* Propagate thread->control */
  2770. schedule_timeout_interruptible(msecs_to_jiffies(125));
  2771. pktgen_wait_all_threads_run(pn);
  2772. }
  2773. static void pktgen_reset_all_threads(struct pktgen_net *pn)
  2774. {
  2775. func_enter();
  2776. pktgen_handle_all_threads(pn, T_REMDEVALL);
  2777. /* Propagate thread->control */
  2778. schedule_timeout_interruptible(msecs_to_jiffies(125));
  2779. pktgen_wait_all_threads_run(pn);
  2780. }
  2781. static void show_results(struct pktgen_dev *pkt_dev, int nr_frags)
  2782. {
  2783. __u64 bps, mbps, pps;
  2784. char *p = pkt_dev->result;
  2785. ktime_t elapsed = ktime_sub(pkt_dev->stopped_at,
  2786. pkt_dev->started_at);
  2787. ktime_t idle = ns_to_ktime(pkt_dev->idle_acc);
  2788. p += sprintf(p, "OK: %llu(c%llu+d%llu) usec, %llu (%dbyte,%dfrags)\n",
  2789. (unsigned long long)ktime_to_us(elapsed),
  2790. (unsigned long long)ktime_to_us(ktime_sub(elapsed, idle)),
  2791. (unsigned long long)ktime_to_us(idle),
  2792. (unsigned long long)pkt_dev->sofar,
  2793. pkt_dev->cur_pkt_size, nr_frags);
  2794. pps = div64_u64(pkt_dev->sofar * NSEC_PER_SEC,
  2795. ktime_to_ns(elapsed));
  2796. if (pkt_dev->n_imix_entries > 0) {
  2797. int i;
  2798. struct imix_pkt *entry;
  2799. bps = 0;
  2800. for (i = 0; i < pkt_dev->n_imix_entries; i++) {
  2801. entry = &pkt_dev->imix_entries[i];
  2802. bps += entry->size * entry->count_so_far;
  2803. }
  2804. bps = div64_u64(bps * 8 * NSEC_PER_SEC, ktime_to_ns(elapsed));
  2805. } else {
  2806. bps = pps * 8 * pkt_dev->cur_pkt_size;
  2807. }
  2808. mbps = bps;
  2809. do_div(mbps, 1000000);
  2810. p += sprintf(p, " %llupps %lluMb/sec (%llubps) errors: %llu",
  2811. (unsigned long long)pps,
  2812. (unsigned long long)mbps,
  2813. (unsigned long long)bps,
  2814. (unsigned long long)pkt_dev->errors);
  2815. }
  2816. /* Set stopped-at timer, remove from running list, do counters & statistics */
  2817. static int pktgen_stop_device(struct pktgen_dev *pkt_dev)
  2818. {
  2819. int nr_frags = pkt_dev->skb ? skb_shinfo(pkt_dev->skb)->nr_frags : -1;
  2820. if (!pkt_dev->running) {
  2821. pr_warn("interface: %s is already stopped\n",
  2822. pkt_dev->odevname);
  2823. return -EINVAL;
  2824. }
  2825. pkt_dev->running = 0;
  2826. kfree_skb(pkt_dev->skb);
  2827. pkt_dev->skb = NULL;
  2828. pkt_dev->stopped_at = ktime_get();
  2829. show_results(pkt_dev, nr_frags);
  2830. return 0;
  2831. }
  2832. static struct pktgen_dev *next_to_run(struct pktgen_thread *t)
  2833. {
  2834. struct pktgen_dev *pkt_dev, *best = NULL;
  2835. rcu_read_lock();
  2836. list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
  2837. if (!pkt_dev->running)
  2838. continue;
  2839. if (best == NULL)
  2840. best = pkt_dev;
  2841. else if (ktime_compare(pkt_dev->next_tx, best->next_tx) < 0)
  2842. best = pkt_dev;
  2843. }
  2844. rcu_read_unlock();
  2845. return best;
  2846. }
  2847. static void pktgen_stop(struct pktgen_thread *t)
  2848. {
  2849. struct pktgen_dev *pkt_dev;
  2850. func_enter();
  2851. rcu_read_lock();
  2852. list_for_each_entry_rcu(pkt_dev, &t->if_list, list) {
  2853. pktgen_stop_device(pkt_dev);
  2854. }
  2855. rcu_read_unlock();
  2856. }
  2857. /*
  2858. * one of our devices needs to be removed - find it
  2859. * and remove it
  2860. */
  2861. static void pktgen_rem_one_if(struct pktgen_thread *t)
  2862. {
  2863. struct list_head *q, *n;
  2864. struct pktgen_dev *cur;
  2865. func_enter();
  2866. list_for_each_safe(q, n, &t->if_list) {
  2867. cur = list_entry(q, struct pktgen_dev, list);
  2868. if (!cur->removal_mark)
  2869. continue;
  2870. kfree_skb(cur->skb);
  2871. cur->skb = NULL;
  2872. pktgen_remove_device(t, cur);
  2873. break;
  2874. }
  2875. }
  2876. static void pktgen_rem_all_ifs(struct pktgen_thread *t)
  2877. {
  2878. struct list_head *q, *n;
  2879. struct pktgen_dev *cur;
  2880. func_enter();
  2881. /* Remove all devices, free mem */
  2882. list_for_each_safe(q, n, &t->if_list) {
  2883. cur = list_entry(q, struct pktgen_dev, list);
  2884. kfree_skb(cur->skb);
  2885. cur->skb = NULL;
  2886. pktgen_remove_device(t, cur);
  2887. }
  2888. }
  2889. static void pktgen_rem_thread(struct pktgen_thread *t)
  2890. {
  2891. /* Remove from the thread list */
  2892. remove_proc_entry(t->tsk->comm, t->net->proc_dir);
  2893. }
  2894. static void pktgen_resched(struct pktgen_dev *pkt_dev)
  2895. {
  2896. ktime_t idle_start = ktime_get();
  2897. schedule();
  2898. pkt_dev->idle_acc += ktime_to_ns(ktime_sub(ktime_get(), idle_start));
  2899. }
  2900. static void pktgen_wait_for_skb(struct pktgen_dev *pkt_dev)
  2901. {
  2902. ktime_t idle_start = ktime_get();
  2903. while (refcount_read(&(pkt_dev->skb->users)) != 1) {
  2904. if (signal_pending(current))
  2905. break;
  2906. if (need_resched())
  2907. pktgen_resched(pkt_dev);
  2908. else
  2909. cpu_relax();
  2910. }
  2911. pkt_dev->idle_acc += ktime_to_ns(ktime_sub(ktime_get(), idle_start));
  2912. }
  2913. static void pktgen_xmit(struct pktgen_dev *pkt_dev)
  2914. {
  2915. bool skb_shared = !!(READ_ONCE(pkt_dev->flags) & F_SHARED);
  2916. struct net_device *odev = pkt_dev->odev;
  2917. struct netdev_queue *txq;
  2918. unsigned int burst = 1;
  2919. struct sk_buff *skb;
  2920. int clone_skb = 0;
  2921. int ret;
  2922. /* If 'skb_shared' is false, the read of possible
  2923. * new values (if any) for 'burst' and 'clone_skb' will be skipped to
  2924. * prevent some concurrent changes from slipping in. And the stabilized
  2925. * config will be read in during the next run of pktgen_xmit.
  2926. */
  2927. if (skb_shared) {
  2928. burst = READ_ONCE(pkt_dev->burst);
  2929. clone_skb = READ_ONCE(pkt_dev->clone_skb);
  2930. }
  2931. /* If device is offline, then don't send */
  2932. if (unlikely(!netif_running(odev) || !netif_carrier_ok(odev))) {
  2933. pktgen_stop_device(pkt_dev);
  2934. return;
  2935. }
  2936. /* This is max DELAY, this has special meaning of
  2937. * "never transmit"
  2938. */
  2939. if (unlikely(pkt_dev->delay == ULLONG_MAX)) {
  2940. pkt_dev->next_tx = ktime_add_ns(ktime_get(), ULONG_MAX);
  2941. return;
  2942. }
  2943. /* If no skb or clone count exhausted then get new one */
  2944. if (!pkt_dev->skb || (pkt_dev->last_ok &&
  2945. ++pkt_dev->clone_count >= clone_skb)) {
  2946. /* build a new pkt */
  2947. kfree_skb(pkt_dev->skb);
  2948. pkt_dev->skb = fill_packet(odev, pkt_dev);
  2949. if (pkt_dev->skb == NULL) {
  2950. pr_err("ERROR: couldn't allocate skb in fill_packet\n");
  2951. schedule();
  2952. pkt_dev->clone_count--; /* back out increment, OOM */
  2953. return;
  2954. }
  2955. pkt_dev->last_pkt_size = pkt_dev->skb->len;
  2956. pkt_dev->clone_count = 0; /* reset counter */
  2957. }
  2958. if (pkt_dev->delay && pkt_dev->last_ok)
  2959. spin(pkt_dev, pkt_dev->next_tx);
  2960. if (pkt_dev->xmit_mode == M_NETIF_RECEIVE) {
  2961. skb = pkt_dev->skb;
  2962. skb->protocol = eth_type_trans(skb, skb->dev);
  2963. if (skb_shared)
  2964. refcount_add(burst, &skb->users);
  2965. local_bh_disable();
  2966. do {
  2967. ret = netif_receive_skb(skb);
  2968. if (ret == NET_RX_DROP)
  2969. pkt_dev->errors++;
  2970. pkt_dev->sofar++;
  2971. pkt_dev->seq_num++;
  2972. if (unlikely(!skb_shared)) {
  2973. pkt_dev->skb = NULL;
  2974. break;
  2975. }
  2976. if (refcount_read(&skb->users) != burst) {
  2977. /* skb was queued by rps/rfs or taps,
  2978. * so cannot reuse this skb
  2979. */
  2980. WARN_ON(refcount_sub_and_test(burst - 1, &skb->users));
  2981. /* get out of the loop and wait
  2982. * until skb is consumed
  2983. */
  2984. break;
  2985. }
  2986. /* skb was 'freed' by stack, so clean few
  2987. * bits and reuse it
  2988. */
  2989. skb_reset_redirect(skb);
  2990. } while (--burst > 0);
  2991. goto out; /* Skips xmit_mode M_START_XMIT */
  2992. } else if (pkt_dev->xmit_mode == M_QUEUE_XMIT) {
  2993. local_bh_disable();
  2994. if (skb_shared)
  2995. refcount_inc(&pkt_dev->skb->users);
  2996. ret = dev_queue_xmit(pkt_dev->skb);
  2997. if (!skb_shared && dev_xmit_complete(ret))
  2998. pkt_dev->skb = NULL;
  2999. switch (ret) {
  3000. case NET_XMIT_SUCCESS:
  3001. pkt_dev->sofar++;
  3002. pkt_dev->seq_num++;
  3003. pkt_dev->tx_bytes += pkt_dev->last_pkt_size;
  3004. break;
  3005. case NET_XMIT_DROP:
  3006. case NET_XMIT_CN:
  3007. /* These are all valid return codes for a qdisc but
  3008. * indicate packets are being dropped or will likely
  3009. * be dropped soon.
  3010. */
  3011. case NETDEV_TX_BUSY:
  3012. /* qdisc may call dev_hard_start_xmit directly in cases
  3013. * where no queues exist e.g. loopback device, virtual
  3014. * devices, etc. In this case we need to handle
  3015. * NETDEV_TX_ codes.
  3016. */
  3017. default:
  3018. pkt_dev->errors++;
  3019. net_info_ratelimited("%s xmit error: %d\n",
  3020. pkt_dev->odevname, ret);
  3021. break;
  3022. }
  3023. goto out;
  3024. }
  3025. txq = skb_get_tx_queue(odev, pkt_dev->skb);
  3026. local_bh_disable();
  3027. HARD_TX_LOCK(odev, txq, smp_processor_id());
  3028. if (unlikely(netif_xmit_frozen_or_drv_stopped(txq))) {
  3029. pkt_dev->last_ok = 0;
  3030. goto unlock;
  3031. }
  3032. if (skb_shared)
  3033. refcount_add(burst, &pkt_dev->skb->users);
  3034. xmit_more:
  3035. ret = netdev_start_xmit(pkt_dev->skb, odev, txq, --burst > 0);
  3036. if (!skb_shared && dev_xmit_complete(ret))
  3037. pkt_dev->skb = NULL;
  3038. switch (ret) {
  3039. case NETDEV_TX_OK:
  3040. pkt_dev->last_ok = 1;
  3041. pkt_dev->sofar++;
  3042. pkt_dev->seq_num++;
  3043. pkt_dev->tx_bytes += pkt_dev->last_pkt_size;
  3044. if (burst > 0 && !netif_xmit_frozen_or_drv_stopped(txq))
  3045. goto xmit_more;
  3046. break;
  3047. case NET_XMIT_DROP:
  3048. case NET_XMIT_CN:
  3049. /* skb has been consumed */
  3050. pkt_dev->errors++;
  3051. break;
  3052. default: /* Drivers are not supposed to return other values! */
  3053. net_info_ratelimited("%s xmit error: %d\n",
  3054. pkt_dev->odevname, ret);
  3055. pkt_dev->errors++;
  3056. fallthrough;
  3057. case NETDEV_TX_BUSY:
  3058. /* Retry it next time */
  3059. if (skb_shared)
  3060. refcount_dec(&pkt_dev->skb->users);
  3061. pkt_dev->last_ok = 0;
  3062. }
  3063. if (unlikely(burst))
  3064. WARN_ON(refcount_sub_and_test(burst, &pkt_dev->skb->users));
  3065. unlock:
  3066. HARD_TX_UNLOCK(odev, txq);
  3067. out:
  3068. local_bh_enable();
  3069. /* If pkt_dev->count is zero, then run forever */
  3070. if ((pkt_dev->count != 0) && (pkt_dev->sofar >= pkt_dev->count)) {
  3071. if (pkt_dev->skb)
  3072. pktgen_wait_for_skb(pkt_dev);
  3073. /* Done with this */
  3074. pktgen_stop_device(pkt_dev);
  3075. }
  3076. }
  3077. /*
  3078. * Main loop of the thread goes here
  3079. */
  3080. static int pktgen_thread_worker(void *arg)
  3081. {
  3082. struct pktgen_thread *t = arg;
  3083. struct pktgen_dev *pkt_dev = NULL;
  3084. int cpu = t->cpu;
  3085. WARN_ON_ONCE(smp_processor_id() != cpu);
  3086. init_waitqueue_head(&t->queue);
  3087. complete(&t->start_done);
  3088. pr_debug("starting pktgen/%d: pid=%d\n", cpu, task_pid_nr(current));
  3089. set_freezable();
  3090. while (!kthread_should_stop()) {
  3091. pkt_dev = next_to_run(t);
  3092. if (unlikely(!pkt_dev && t->control == 0)) {
  3093. if (t->net->pktgen_exiting)
  3094. break;
  3095. wait_event_freezable_timeout(t->queue,
  3096. t->control != 0, HZ / 10);
  3097. continue;
  3098. }
  3099. if (likely(pkt_dev)) {
  3100. pktgen_xmit(pkt_dev);
  3101. if (need_resched())
  3102. pktgen_resched(pkt_dev);
  3103. else
  3104. cpu_relax();
  3105. }
  3106. if (t->control & T_STOP) {
  3107. pktgen_stop(t);
  3108. t->control &= ~(T_STOP);
  3109. }
  3110. if (t->control & T_RUN) {
  3111. pktgen_run(t);
  3112. t->control &= ~(T_RUN);
  3113. }
  3114. if (t->control & T_REMDEVALL) {
  3115. pktgen_rem_all_ifs(t);
  3116. t->control &= ~(T_REMDEVALL);
  3117. }
  3118. if (t->control & T_REMDEV) {
  3119. pktgen_rem_one_if(t);
  3120. t->control &= ~(T_REMDEV);
  3121. }
  3122. try_to_freeze();
  3123. }
  3124. pr_debug("%s stopping all device\n", t->tsk->comm);
  3125. pktgen_stop(t);
  3126. pr_debug("%s removing all device\n", t->tsk->comm);
  3127. pktgen_rem_all_ifs(t);
  3128. pr_debug("%s removing thread\n", t->tsk->comm);
  3129. pktgen_rem_thread(t);
  3130. return 0;
  3131. }
  3132. static struct pktgen_dev *pktgen_find_dev(struct pktgen_thread *t,
  3133. const char *ifname, bool exact)
  3134. {
  3135. struct pktgen_dev *p, *pkt_dev = NULL;
  3136. size_t len = strlen(ifname);
  3137. rcu_read_lock();
  3138. list_for_each_entry_rcu(p, &t->if_list, list)
  3139. if (strncmp(p->odevname, ifname, len) == 0) {
  3140. if (p->odevname[len]) {
  3141. if (exact || p->odevname[len] != '@')
  3142. continue;
  3143. }
  3144. pkt_dev = p;
  3145. break;
  3146. }
  3147. rcu_read_unlock();
  3148. pr_debug("find_dev(%s) returning %p\n", ifname, pkt_dev);
  3149. return pkt_dev;
  3150. }
  3151. /*
  3152. * Adds a dev at front of if_list.
  3153. */
  3154. static int add_dev_to_thread(struct pktgen_thread *t,
  3155. struct pktgen_dev *pkt_dev)
  3156. {
  3157. int rv = 0;
  3158. /* This function cannot be called concurrently, as its called
  3159. * under pktgen_thread_lock mutex, but it can run from
  3160. * userspace on another CPU than the kthread. The if_lock()
  3161. * is used here to sync with concurrent instances of
  3162. * _rem_dev_from_if_list() invoked via kthread, which is also
  3163. * updating the if_list */
  3164. if_lock(t);
  3165. if (pkt_dev->pg_thread) {
  3166. pr_err("ERROR: already assigned to a thread\n");
  3167. rv = -EBUSY;
  3168. goto out;
  3169. }
  3170. pkt_dev->running = 0;
  3171. pkt_dev->pg_thread = t;
  3172. list_add_rcu(&pkt_dev->list, &t->if_list);
  3173. out:
  3174. if_unlock(t);
  3175. return rv;
  3176. }
  3177. /* Called under thread lock */
  3178. static int pktgen_add_device(struct pktgen_thread *t, const char *ifname)
  3179. {
  3180. struct pktgen_dev *pkt_dev;
  3181. int err;
  3182. int node = cpu_to_node(t->cpu);
  3183. /* We don't allow a device to be on several threads */
  3184. pkt_dev = __pktgen_NN_threads(t->net, ifname, FIND);
  3185. if (pkt_dev) {
  3186. pr_err("ERROR: interface already used\n");
  3187. return -EBUSY;
  3188. }
  3189. pkt_dev = kzalloc_node(sizeof(struct pktgen_dev), GFP_KERNEL, node);
  3190. if (!pkt_dev)
  3191. return -ENOMEM;
  3192. strcpy(pkt_dev->odevname, ifname);
  3193. pkt_dev->flows = vzalloc_node(array_size(MAX_CFLOWS,
  3194. sizeof(struct flow_state)),
  3195. node);
  3196. if (pkt_dev->flows == NULL) {
  3197. kfree(pkt_dev);
  3198. return -ENOMEM;
  3199. }
  3200. pkt_dev->removal_mark = 0;
  3201. pkt_dev->nfrags = 0;
  3202. pkt_dev->delay = pg_delay_d;
  3203. pkt_dev->count = pg_count_d;
  3204. pkt_dev->sofar = 0;
  3205. pkt_dev->udp_src_min = 9; /* sink port */
  3206. pkt_dev->udp_src_max = 9;
  3207. pkt_dev->udp_dst_min = 9;
  3208. pkt_dev->udp_dst_max = 9;
  3209. pkt_dev->vlan_p = 0;
  3210. pkt_dev->vlan_cfi = 0;
  3211. pkt_dev->vlan_id = 0xffff;
  3212. pkt_dev->svlan_p = 0;
  3213. pkt_dev->svlan_cfi = 0;
  3214. pkt_dev->svlan_id = 0xffff;
  3215. pkt_dev->burst = 1;
  3216. pkt_dev->node = NUMA_NO_NODE;
  3217. pkt_dev->flags = F_SHARED; /* SKB shared by default */
  3218. err = pktgen_setup_dev(t->net, pkt_dev, ifname);
  3219. if (err)
  3220. goto out1;
  3221. if (pkt_dev->odev->priv_flags & IFF_TX_SKB_SHARING)
  3222. pkt_dev->clone_skb = pg_clone_skb_d;
  3223. pkt_dev->entry = proc_create_data(ifname, 0600, t->net->proc_dir,
  3224. &pktgen_if_proc_ops, pkt_dev);
  3225. if (!pkt_dev->entry) {
  3226. pr_err("cannot create %s/%s procfs entry\n",
  3227. PG_PROC_DIR, ifname);
  3228. err = -EINVAL;
  3229. goto out2;
  3230. }
  3231. #ifdef CONFIG_XFRM
  3232. pkt_dev->ipsmode = XFRM_MODE_TRANSPORT;
  3233. pkt_dev->ipsproto = IPPROTO_ESP;
  3234. /* xfrm tunnel mode needs additional dst to extract outer
  3235. * ip header protocol/ttl/id field, here create a phony one.
  3236. * instead of looking for a valid rt, which definitely hurting
  3237. * performance under such circumstance.
  3238. */
  3239. pkt_dev->dstops.family = AF_INET;
  3240. pkt_dev->xdst.u.dst.dev = pkt_dev->odev;
  3241. dst_init_metrics(&pkt_dev->xdst.u.dst, pktgen_dst_metrics, false);
  3242. pkt_dev->xdst.child = &pkt_dev->xdst.u.dst;
  3243. pkt_dev->xdst.u.dst.ops = &pkt_dev->dstops;
  3244. #endif
  3245. return add_dev_to_thread(t, pkt_dev);
  3246. out2:
  3247. netdev_put(pkt_dev->odev, &pkt_dev->dev_tracker);
  3248. out1:
  3249. #ifdef CONFIG_XFRM
  3250. free_SAs(pkt_dev);
  3251. #endif
  3252. vfree(pkt_dev->flows);
  3253. kfree(pkt_dev);
  3254. return err;
  3255. }
  3256. static int __net_init pktgen_create_thread(int cpu, struct pktgen_net *pn)
  3257. {
  3258. struct pktgen_thread *t;
  3259. struct proc_dir_entry *pe;
  3260. struct task_struct *p;
  3261. t = kzalloc_node(sizeof(struct pktgen_thread), GFP_KERNEL,
  3262. cpu_to_node(cpu));
  3263. if (!t) {
  3264. pr_err("ERROR: out of memory, can't create new thread\n");
  3265. return -ENOMEM;
  3266. }
  3267. mutex_init(&t->if_lock);
  3268. t->cpu = cpu;
  3269. INIT_LIST_HEAD(&t->if_list);
  3270. list_add_tail(&t->th_list, &pn->pktgen_threads);
  3271. init_completion(&t->start_done);
  3272. p = kthread_create_on_node(pktgen_thread_worker,
  3273. t,
  3274. cpu_to_node(cpu),
  3275. "kpktgend_%d", cpu);
  3276. if (IS_ERR(p)) {
  3277. pr_err("kthread_create_on_node() failed for cpu %d\n", t->cpu);
  3278. list_del(&t->th_list);
  3279. kfree(t);
  3280. return PTR_ERR(p);
  3281. }
  3282. kthread_bind(p, cpu);
  3283. t->tsk = p;
  3284. pe = proc_create_data(t->tsk->comm, 0600, pn->proc_dir,
  3285. &pktgen_thread_proc_ops, t);
  3286. if (!pe) {
  3287. pr_err("cannot create %s/%s procfs entry\n",
  3288. PG_PROC_DIR, t->tsk->comm);
  3289. kthread_stop(p);
  3290. list_del(&t->th_list);
  3291. kfree(t);
  3292. return -EINVAL;
  3293. }
  3294. t->net = pn;
  3295. get_task_struct(p);
  3296. wake_up_process(p);
  3297. wait_for_completion(&t->start_done);
  3298. return 0;
  3299. }
  3300. /*
  3301. * Removes a device from the thread if_list.
  3302. */
  3303. static void _rem_dev_from_if_list(struct pktgen_thread *t,
  3304. struct pktgen_dev *pkt_dev)
  3305. {
  3306. struct list_head *q, *n;
  3307. struct pktgen_dev *p;
  3308. if_lock(t);
  3309. list_for_each_safe(q, n, &t->if_list) {
  3310. p = list_entry(q, struct pktgen_dev, list);
  3311. if (p == pkt_dev)
  3312. list_del_rcu(&p->list);
  3313. }
  3314. if_unlock(t);
  3315. }
  3316. static int pktgen_remove_device(struct pktgen_thread *t,
  3317. struct pktgen_dev *pkt_dev)
  3318. {
  3319. pr_debug("remove_device pkt_dev=%p\n", pkt_dev);
  3320. if (pkt_dev->running) {
  3321. pr_warn("WARNING: trying to remove a running interface, stopping it now\n");
  3322. pktgen_stop_device(pkt_dev);
  3323. }
  3324. /* Dis-associate from the interface */
  3325. if (pkt_dev->odev) {
  3326. netdev_put(pkt_dev->odev, &pkt_dev->dev_tracker);
  3327. pkt_dev->odev = NULL;
  3328. }
  3329. /* Remove proc before if_list entry, because add_device uses
  3330. * list to determine if interface already exist, avoid race
  3331. * with proc_create_data() */
  3332. proc_remove(pkt_dev->entry);
  3333. /* And update the thread if_list */
  3334. _rem_dev_from_if_list(t, pkt_dev);
  3335. #ifdef CONFIG_XFRM
  3336. free_SAs(pkt_dev);
  3337. #endif
  3338. vfree(pkt_dev->flows);
  3339. if (pkt_dev->page)
  3340. put_page(pkt_dev->page);
  3341. kfree_rcu(pkt_dev, rcu);
  3342. return 0;
  3343. }
  3344. static int __net_init pg_net_init(struct net *net)
  3345. {
  3346. struct pktgen_net *pn = net_generic(net, pg_net_id);
  3347. struct proc_dir_entry *pe;
  3348. int cpu, ret = 0;
  3349. pn->net = net;
  3350. INIT_LIST_HEAD(&pn->pktgen_threads);
  3351. pn->pktgen_exiting = false;
  3352. pn->proc_dir = proc_mkdir(PG_PROC_DIR, pn->net->proc_net);
  3353. if (!pn->proc_dir) {
  3354. pr_warn("cannot create /proc/net/%s\n", PG_PROC_DIR);
  3355. return -ENODEV;
  3356. }
  3357. pe = proc_create(PGCTRL, 0600, pn->proc_dir, &pktgen_proc_ops);
  3358. if (pe == NULL) {
  3359. pr_err("cannot create %s procfs entry\n", PGCTRL);
  3360. ret = -EINVAL;
  3361. goto remove;
  3362. }
  3363. cpus_read_lock();
  3364. for_each_online_cpu(cpu) {
  3365. int err;
  3366. err = pktgen_create_thread(cpu, pn);
  3367. if (err)
  3368. pr_warn("Cannot create thread for cpu %d (%d)\n",
  3369. cpu, err);
  3370. }
  3371. cpus_read_unlock();
  3372. if (list_empty(&pn->pktgen_threads)) {
  3373. pr_err("Initialization failed for all threads\n");
  3374. ret = -ENODEV;
  3375. goto remove_entry;
  3376. }
  3377. return 0;
  3378. remove_entry:
  3379. remove_proc_entry(PGCTRL, pn->proc_dir);
  3380. remove:
  3381. remove_proc_entry(PG_PROC_DIR, pn->net->proc_net);
  3382. return ret;
  3383. }
  3384. static void __net_exit pg_net_exit(struct net *net)
  3385. {
  3386. struct pktgen_net *pn = net_generic(net, pg_net_id);
  3387. struct pktgen_thread *t;
  3388. struct list_head *q, *n;
  3389. LIST_HEAD(list);
  3390. /* Stop all interfaces & threads */
  3391. pn->pktgen_exiting = true;
  3392. mutex_lock(&pktgen_thread_lock);
  3393. list_splice_init(&pn->pktgen_threads, &list);
  3394. mutex_unlock(&pktgen_thread_lock);
  3395. list_for_each_safe(q, n, &list) {
  3396. t = list_entry(q, struct pktgen_thread, th_list);
  3397. list_del(&t->th_list);
  3398. kthread_stop_put(t->tsk);
  3399. kfree(t);
  3400. }
  3401. remove_proc_entry(PGCTRL, pn->proc_dir);
  3402. remove_proc_entry(PG_PROC_DIR, pn->net->proc_net);
  3403. }
  3404. static struct pernet_operations pg_net_ops = {
  3405. .init = pg_net_init,
  3406. .exit = pg_net_exit,
  3407. .id = &pg_net_id,
  3408. .size = sizeof(struct pktgen_net),
  3409. };
  3410. static int __init pg_init(void)
  3411. {
  3412. int ret = 0;
  3413. pr_info("%s", version);
  3414. ret = register_pernet_subsys(&pg_net_ops);
  3415. if (ret)
  3416. return ret;
  3417. ret = register_netdevice_notifier(&pktgen_notifier_block);
  3418. if (ret)
  3419. unregister_pernet_subsys(&pg_net_ops);
  3420. return ret;
  3421. }
  3422. static void __exit pg_cleanup(void)
  3423. {
  3424. unregister_netdevice_notifier(&pktgen_notifier_block);
  3425. unregister_pernet_subsys(&pg_net_ops);
  3426. /* Don't need rcu_barrier() due to use of kfree_rcu() */
  3427. }
  3428. module_init(pg_init);
  3429. module_exit(pg_cleanup);
  3430. MODULE_AUTHOR("Robert Olsson <robert.olsson@its.uu.se>");
  3431. MODULE_DESCRIPTION("Packet Generator tool");
  3432. MODULE_LICENSE("GPL");
  3433. MODULE_VERSION(VERSION);
  3434. module_param(pg_count_d, int, 0);
  3435. MODULE_PARM_DESC(pg_count_d, "Default number of packets to inject");
  3436. module_param(pg_delay_d, int, 0);
  3437. MODULE_PARM_DESC(pg_delay_d, "Default delay between packets (nanoseconds)");
  3438. module_param(pg_clone_skb_d, int, 0);
  3439. MODULE_PARM_DESC(pg_clone_skb_d, "Default number of copies of the same packet");
  3440. module_param(debug, int, 0);
  3441. MODULE_PARM_DESC(debug, "Enable debugging of pktgen module");