| /* |
| *------------------------------------------------------------------ |
| * Copyright (c) 2017 Cisco and/or its affiliates. |
| * Licensed under the Apache License, Version 2.0 (the "License"); |
| * you may not use this file except in compliance with the License. |
| * You may obtain a copy of the License at: |
| * |
| * http://www.apache.org/licenses/LICENSE-2.0 |
| * |
| * Unless required by applicable law or agreed to in writing, software |
| * distributed under the License is distributed on an "AS IS" BASIS, |
| * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| * See the License for the specific language governing permissions and |
| * limitations under the License. |
| *------------------------------------------------------------------ |
| */ |
| |
| #define _GNU_SOURCE |
| #include <sys/types.h> |
| #include <sys/stat.h> |
| #include <sys/socket.h> |
| #include <fcntl.h> |
| #include <net/if.h> |
| #include <linux/if_tun.h> |
| #include <sys/ioctl.h> |
| #include <linux/ethtool.h> |
| #include <linux/sockios.h> |
| #include <sys/eventfd.h> |
| #include <net/if_arp.h> |
| #include <limits.h> |
| |
| #include <linux/netlink.h> |
| #include <linux/rtnetlink.h> |
| |
| #include <vlib/vlib.h> |
| #include <vlib/physmem.h> |
| #include <vlib/unix/unix.h> |
| #include <vppinfra/linux/netns.h> |
| #include <vnet/ethernet/ethernet.h> |
| #include <vnet/ip/ip4_packet.h> |
| #include <vnet/ip/ip6_packet.h> |
| #include <vnet/devices/netlink.h> |
| #include <vnet/devices/virtio/virtio.h> |
| #include <vnet/devices/tap/tap.h> |
| |
| tap_main_t tap_main; |
| |
| #define tap_log_err(dev, f, ...) \ |
| vlib_log (VLIB_LOG_LEVEL_ERR, tap_main.log_default, "tap%u: " f, dev->dev_instance, ## __VA_ARGS__) |
| #define tap_log_dbg(dev, f, ...) \ |
| vlib_log (VLIB_LOG_LEVEL_DEBUG, tap_main.log_default, "tap%u: " f, dev->dev_instance, ## __VA_ARGS__) |
| |
| #define _IOCTL(fd,a,...) \ |
| if (ioctl (fd, a, __VA_ARGS__) < 0) \ |
| { \ |
| err = clib_error_return_unix (0, "ioctl(" #a ")"); \ |
| tap_log_err (vif, "%U", format_clib_error, err); \ |
| goto error; \ |
| } |
| |
| /* *INDENT-OFF* */ |
| VNET_HW_INTERFACE_CLASS (tun_device_hw_interface_class, static) = |
| { |
| .name = "tun-device", |
| .flags = VNET_HW_INTERFACE_CLASS_FLAG_P2P, |
| }; |
| /* *INDENT-ON* */ |
| |
| #define TUN_MAX_PACKET_BYTES 65355 |
| #define TUN_MIN_PACKET_BYTES 64 |
| #define TUN_DEFAULT_PACKET_BYTES 1500 |
| |
| static u32 |
| virtio_eth_flag_change (vnet_main_t * vnm, vnet_hw_interface_t * hi, |
| u32 flags) |
| { |
| /* nothing for now */ |
| //TODO On MTU change call vnet_netlink_set_if_mtu |
| return 0; |
| } |
| |
| #define TAP_MAX_INSTANCE 1024 |
| |
| static void |
| tap_free (vlib_main_t * vm, virtio_if_t * vif) |
| { |
| virtio_main_t *mm = &virtio_main; |
| tap_main_t *tm = &tap_main; |
| clib_error_t *err = 0; |
| int i; |
| |
| /* *INDENT-OFF* */ |
| vec_foreach_index (i, vif->vhost_fds) if (vif->vhost_fds[i] != -1) |
| close (vif->vhost_fds[i]); |
| vec_foreach_index (i, vif->rxq_vrings) |
| virtio_vring_free_rx (vm, vif, RX_QUEUE (i)); |
| vec_foreach_index (i, vif->txq_vrings) |
| virtio_vring_free_tx (vm, vif, TX_QUEUE (i)); |
| /* *INDENT-ON* */ |
| |
| if (vif->tap_fds) |
| { |
| _IOCTL (vif->tap_fds[0], TUNSETPERSIST, (void *) (uintptr_t) 0); |
| tap_log_dbg (vif, "TUNSETPERSIST: unset"); |
| } |
| error: |
| vec_foreach_index (i, vif->tap_fds) close (vif->tap_fds[i]); |
| |
| vec_free (vif->tap_fds); |
| vec_free (vif->vhost_fds); |
| vec_free (vif->rxq_vrings); |
| vec_free (vif->txq_vrings); |
| vec_free (vif->host_if_name); |
| vec_free (vif->net_ns); |
| vec_free (vif->host_bridge); |
| clib_error_free (vif->error); |
| |
| tm->tap_ids = clib_bitmap_set (tm->tap_ids, vif->id, 0); |
| clib_memset (vif, 0, sizeof (*vif)); |
| pool_put (mm->interfaces, vif); |
| } |
| |
| void |
| tap_create_if (vlib_main_t * vm, tap_create_if_args_t * args) |
| { |
| vlib_thread_main_t *thm = vlib_get_thread_main (); |
| vlib_physmem_main_t *vpm = &vm->physmem_main; |
| vnet_main_t *vnm = vnet_get_main (); |
| virtio_main_t *vim = &virtio_main; |
| tap_main_t *tm = &tap_main; |
| vnet_sw_interface_t *sw; |
| vnet_hw_interface_t *hw; |
| int i, num_vhost_queues; |
| int old_netns_fd = -1; |
| struct ifreq ifr = {.ifr_flags = IFF_NO_PI | IFF_VNET_HDR }; |
| struct ifreq get_ifr = {.ifr_flags = 0 }; |
| size_t hdrsz; |
| vhost_memory_t *vhost_mem = 0; |
| virtio_if_t *vif = 0; |
| clib_error_t *err = 0; |
| unsigned int tap_features; |
| int tfd = -1, qfd = -1, vfd = -1, nfd = -1; |
| char *host_if_name = 0; |
| unsigned int offload = 0; |
| int sndbuf = 0; |
| |
| if (args->id != ~0) |
| { |
| if (clib_bitmap_get (tm->tap_ids, args->id)) |
| { |
| args->rv = VNET_API_ERROR_INVALID_INTERFACE; |
| args->error = clib_error_return (0, "interface already exists"); |
| return; |
| } |
| } |
| else |
| { |
| args->id = clib_bitmap_first_clear (tm->tap_ids); |
| } |
| |
| if (args->id > TAP_MAX_INSTANCE) |
| { |
| args->rv = VNET_API_ERROR_UNSPECIFIED; |
| args->error = clib_error_return (0, "cannot find free interface id"); |
| return; |
| } |
| |
| pool_get_zero (vim->interfaces, vif); |
| |
| if (args->tap_flags & TAP_FLAG_TUN) |
| { |
| vif->type = VIRTIO_IF_TYPE_TUN; |
| ifr.ifr_flags |= IFF_TUN; |
| |
| /* |
| * From kernel 4.20, xdp support has been added in tun_sendmsg. |
| * If sndbuf == INT_MAX, vhost batches the packet and processes |
| * them using xdp data path for tun driver. It assumes packets |
| * are ethernet frames (It needs to be fixed). |
| * To avoid xdp data path in tun driver, sndbuf value should |
| * be < INT_MAX. |
| */ |
| sndbuf = INT_MAX - 1; |
| } |
| else |
| { |
| vif->type = VIRTIO_IF_TYPE_TAP; |
| ifr.ifr_flags |= IFF_TAP; |
| sndbuf = INT_MAX; |
| } |
| |
| vif->dev_instance = vif - vim->interfaces; |
| vif->id = args->id; |
| vif->num_txqs = thm->n_vlib_mains; |
| vif->num_rxqs = clib_max (args->num_rx_queues, 1); |
| |
| if (args->tap_flags & TAP_FLAG_ATTACH) |
| { |
| if (args->host_if_name == NULL) |
| { |
| args->rv = VNET_API_ERROR_NO_MATCHING_INTERFACE; |
| err = clib_error_return (0, "host_if_name is not provided"); |
| goto error; |
| } |
| } |
| |
| /* if namespace is specified, all further netlink messages should be executed |
| * after we change our net namespace */ |
| if (args->host_namespace) |
| { |
| old_netns_fd = clib_netns_open (NULL /* self */); |
| if ((nfd = clib_netns_open (args->host_namespace)) == -1) |
| { |
| args->rv = VNET_API_ERROR_SYSCALL_ERROR_2; |
| args->error = clib_error_return_unix (0, "clib_netns_open '%s'", |
| args->host_namespace); |
| goto error; |
| } |
| if (clib_setns (nfd) == -1) |
| { |
| args->rv = VNET_API_ERROR_SYSCALL_ERROR_3; |
| args->error = |
| clib_error_return_unix (0, "setns '%s'", args->host_namespace); |
| goto error; |
| } |
| } |
| |
| if (args->host_if_name != NULL) |
| { |
| host_if_name = (char *) args->host_if_name; |
| clib_memcpy (ifr.ifr_name, host_if_name, |
| clib_min (IFNAMSIZ, vec_len (host_if_name))); |
| } |
| |
| if ((tfd = open ("/dev/net/tun", O_RDWR | O_NONBLOCK)) < 0) |
| { |
| args->rv = VNET_API_ERROR_SYSCALL_ERROR_2; |
| args->error = clib_error_return_unix (0, "open '/dev/net/tun'"); |
| goto error; |
| } |
| vec_add1 (vif->tap_fds, tfd); |
| tap_log_dbg (vif, "open tap fd %d", tfd); |
| |
| _IOCTL (tfd, TUNGETFEATURES, &tap_features); |
| tap_log_dbg (vif, "TUNGETFEATURES: features 0x%lx", tap_features); |
| if ((tap_features & IFF_VNET_HDR) == 0) |
| { |
| args->rv = VNET_API_ERROR_SYSCALL_ERROR_2; |
| args->error = clib_error_return (0, "vhost-net backend not available"); |
| goto error; |
| } |
| |
| if ((tap_features & IFF_MULTI_QUEUE) == 0) |
| { |
| if (vif->num_rxqs > 1) |
| { |
| args->rv = VNET_API_ERROR_SYSCALL_ERROR_2; |
| args->error = clib_error_return (0, "multiqueue not supported"); |
| goto error; |
| } |
| vif->num_rxqs = vif->num_txqs = 1; |
| } |
| else |
| ifr.ifr_flags |= IFF_MULTI_QUEUE; |
| |
| hdrsz = sizeof (virtio_net_hdr_v1_t); |
| if (args->tap_flags & TAP_FLAG_GSO) |
| { |
| offload = TUN_F_CSUM | TUN_F_TSO4 | TUN_F_TSO6; |
| vif->gso_enabled = 1; |
| } |
| else if (args->tap_flags & TAP_FLAG_CSUM_OFFLOAD) |
| { |
| offload = TUN_F_CSUM; |
| vif->csum_offload_enabled = 1; |
| } |
| |
| _IOCTL (tfd, TUNSETIFF, (void *) &ifr); |
| tap_log_dbg (vif, "TUNSETIFF fd %d name %s flags 0x%x", tfd, |
| ifr.ifr_ifrn.ifrn_name, ifr.ifr_flags); |
| |
| vif->ifindex = if_nametoindex (ifr.ifr_ifrn.ifrn_name); |
| tap_log_dbg (vif, "ifindex %d", vif->ifindex); |
| |
| if (!args->host_if_name) |
| host_if_name = ifr.ifr_ifrn.ifrn_name; |
| else |
| host_if_name = (char *) args->host_if_name; |
| |
| /* |
| * unset the persistence when attaching to existing |
| * interface |
| */ |
| if (args->tap_flags & TAP_FLAG_ATTACH) |
| { |
| _IOCTL (tfd, TUNSETPERSIST, (void *) (uintptr_t) 0); |
| tap_log_dbg (vif, "TUNSETPERSIST: unset"); |
| } |
| |
| /* set the persistence */ |
| if (args->tap_flags & TAP_FLAG_PERSIST) |
| { |
| _IOCTL (tfd, TUNSETPERSIST, (void *) (uintptr_t) 1); |
| tap_log_dbg (vif, "TUNSETPERSIST: set"); |
| |
| /* verify persistence is set, read the flags */ |
| _IOCTL (tfd, TUNGETIFF, (void *) &get_ifr); |
| tap_log_dbg (vif, "TUNGETIFF: flags 0x%lx", get_ifr.ifr_flags); |
| if ((get_ifr.ifr_flags & IFF_PERSIST) == 0) |
| { |
| args->rv = VNET_API_ERROR_SYSCALL_ERROR_2; |
| args->error = clib_error_return (0, "persistence not supported"); |
| goto error; |
| } |
| } |
| |
| /* create additional queues on the linux side. |
| * we create as many linux queue pairs as we have rx queues |
| */ |
| for (i = 1; i < vif->num_rxqs; i++) |
| { |
| if ((qfd = open ("/dev/net/tun", O_RDWR | O_NONBLOCK)) < 0) |
| { |
| args->rv = VNET_API_ERROR_SYSCALL_ERROR_2; |
| args->error = clib_error_return_unix (0, "open '/dev/net/tun'"); |
| goto error; |
| } |
| _IOCTL (qfd, TUNSETIFF, (void *) &ifr); |
| tap_log_dbg (vif, "TUNSETIFF fd %d name %s flags 0x%x", qfd, |
| ifr.ifr_ifrn.ifrn_name, ifr.ifr_flags); |
| vec_add1 (vif->tap_fds, qfd); |
| } |
| |
| for (i = 0; i < vif->num_rxqs; i++) |
| { |
| tap_log_dbg (vif, "TUNSETVNETHDRSZ: fd %d vnet_hdr_sz %u", |
| vif->tap_fds[i], hdrsz); |
| _IOCTL (vif->tap_fds[i], TUNSETVNETHDRSZ, &hdrsz); |
| |
| tap_log_dbg (vif, "TUNSETSNDBUF: fd %d sndbuf %d", vif->tap_fds[i], |
| sndbuf); |
| _IOCTL (vif->tap_fds[i], TUNSETSNDBUF, &sndbuf); |
| |
| tap_log_dbg (vif, "TUNSETOFFLOAD: fd %d offload 0x%lx", vif->tap_fds[i], |
| offload); |
| _IOCTL (vif->tap_fds[i], TUNSETOFFLOAD, offload); |
| |
| if (fcntl (vif->tap_fds[i], F_SETFL, O_NONBLOCK) < 0) |
| { |
| err = clib_error_return_unix (0, "fcntl(tfd, F_SETFL, O_NONBLOCK)"); |
| tap_log_err (vif, "set nonblocking: %U", format_clib_error, err); |
| goto error; |
| } |
| } |
| |
| /* open as many vhost-net fds as required and set ownership */ |
| num_vhost_queues = clib_max (vif->num_rxqs, vif->num_txqs); |
| for (i = 0; i < num_vhost_queues; i++) |
| { |
| if ((vfd = open ("/dev/vhost-net", O_RDWR | O_NONBLOCK)) < 0) |
| { |
| args->rv = VNET_API_ERROR_SYSCALL_ERROR_1; |
| args->error = clib_error_return_unix (0, "open '/dev/vhost-net'"); |
| goto error; |
| } |
| vec_add1 (vif->vhost_fds, vfd); |
| virtio_log_debug (vif, "open vhost-net fd %d qpair %u", vfd, i); |
| _IOCTL (vfd, VHOST_SET_OWNER, 0); |
| virtio_log_debug (vif, "VHOST_SET_OWNER: fd %u", vfd); |
| } |
| |
| _IOCTL (vif->vhost_fds[0], VHOST_GET_FEATURES, &vif->remote_features); |
| virtio_log_debug (vif, "VHOST_GET_FEATURES: features 0x%lx", |
| vif->remote_features); |
| |
| if ((vif->remote_features & VIRTIO_FEATURE (VIRTIO_NET_F_MRG_RXBUF)) == 0) |
| { |
| args->rv = VNET_API_ERROR_UNSUPPORTED; |
| args->error = clib_error_return (0, "vhost-net backend doesn't support " |
| "VIRTIO_NET_F_MRG_RXBUF feature"); |
| goto error; |
| } |
| |
| if ((vif->remote_features & VIRTIO_FEATURE (VIRTIO_RING_F_INDIRECT_DESC)) == |
| 0) |
| { |
| args->rv = VNET_API_ERROR_UNSUPPORTED; |
| args->error = clib_error_return (0, "vhost-net backend doesn't support " |
| "VIRTIO_RING_F_INDIRECT_DESC feature"); |
| goto error; |
| } |
| |
| if ((vif->remote_features & VIRTIO_FEATURE (VIRTIO_F_VERSION_1)) == 0) |
| { |
| args->rv = VNET_API_ERROR_UNSUPPORTED; |
| args->error = clib_error_return (0, "vhost-net backend doesn't support " |
| "VIRTIO_F_VERSION_1 features"); |
| goto error; |
| } |
| |
| vif->features |= VIRTIO_FEATURE (VIRTIO_NET_F_MRG_RXBUF); |
| vif->features |= VIRTIO_FEATURE (VIRTIO_F_VERSION_1); |
| vif->features |= VIRTIO_FEATURE (VIRTIO_RING_F_INDIRECT_DESC); |
| |
| virtio_set_net_hdr_size (vif); |
| |
| if (vif->type == VIRTIO_IF_TYPE_TAP) |
| { |
| if (ethernet_mac_address_is_zero (args->host_mac_addr.bytes)) |
| ethernet_mac_address_generate (args->host_mac_addr.bytes); |
| args->error = vnet_netlink_set_link_addr (vif->ifindex, |
| args->host_mac_addr.bytes); |
| if (args->error) |
| { |
| args->rv = VNET_API_ERROR_NETLINK_ERROR; |
| goto error; |
| } |
| |
| if (args->host_bridge) |
| { |
| args->error = vnet_netlink_set_link_master (vif->ifindex, |
| (char *) |
| args->host_bridge); |
| if (args->error) |
| { |
| args->rv = VNET_API_ERROR_NETLINK_ERROR; |
| goto error; |
| } |
| } |
| } |
| |
| if (args->host_ip4_prefix_len) |
| { |
| args->error = vnet_netlink_add_ip4_addr (vif->ifindex, |
| &args->host_ip4_addr, |
| args->host_ip4_prefix_len); |
| if (args->error) |
| { |
| args->rv = VNET_API_ERROR_NETLINK_ERROR; |
| goto error; |
| } |
| } |
| |
| if (args->host_ip6_prefix_len) |
| { |
| args->error = vnet_netlink_add_ip6_addr (vif->ifindex, |
| &args->host_ip6_addr, |
| args->host_ip6_prefix_len); |
| if (args->error) |
| { |
| args->rv = VNET_API_ERROR_NETLINK_ERROR; |
| goto error; |
| } |
| } |
| |
| args->error = vnet_netlink_set_link_state (vif->ifindex, 1 /* UP */ ); |
| if (args->error) |
| { |
| args->rv = VNET_API_ERROR_NETLINK_ERROR; |
| goto error; |
| } |
| |
| if (args->host_ip4_gw_set) |
| { |
| args->error = vnet_netlink_add_ip4_route (0, 0, &args->host_ip4_gw); |
| if (args->error) |
| { |
| args->rv = VNET_API_ERROR_NETLINK_ERROR; |
| goto error; |
| } |
| } |
| |
| if (args->host_ip6_gw_set) |
| { |
| args->error = vnet_netlink_add_ip6_route (0, 0, &args->host_ip6_gw); |
| if (args->error) |
| { |
| args->rv = VNET_API_ERROR_NETLINK_ERROR; |
| goto error; |
| } |
| } |
| |
| if (args->host_mtu_set) |
| { |
| args->error = |
| vnet_netlink_set_link_mtu (vif->ifindex, args->host_mtu_size); |
| if (args->error) |
| { |
| args->rv = VNET_API_ERROR_NETLINK_ERROR; |
| goto error; |
| } |
| } |
| else if (tm->host_mtu_size != 0) |
| { |
| args->error = |
| vnet_netlink_set_link_mtu (vif->ifindex, tm->host_mtu_size); |
| if (args->error) |
| { |
| args->rv = VNET_API_ERROR_NETLINK_ERROR; |
| goto error; |
| } |
| args->host_mtu_set = 1; |
| args->host_mtu_size = tm->host_mtu_size; |
| } |
| |
| /* switch back to old net namespace */ |
| if (args->host_namespace) |
| { |
| if (clib_setns (old_netns_fd) == -1) |
| { |
| args->rv = VNET_API_ERROR_SYSCALL_ERROR_2; |
| args->error = clib_error_return_unix (0, "setns '%s'", |
| args->host_namespace); |
| goto error; |
| } |
| } |
| |
| for (i = 0; i < num_vhost_queues; i++) |
| { |
| if (i < vif->num_rxqs && (args->error = |
| virtio_vring_init (vm, vif, RX_QUEUE (i), |
| args->rx_ring_sz))) |
| { |
| args->rv = VNET_API_ERROR_INIT_FAILED; |
| goto error; |
| } |
| |
| if (i < vif->num_txqs && (args->error = |
| virtio_vring_init (vm, vif, TX_QUEUE (i), |
| args->tx_ring_sz))) |
| { |
| args->rv = VNET_API_ERROR_INIT_FAILED; |
| goto error; |
| } |
| } |
| |
| /* setup features and memtable */ |
| i = sizeof (vhost_memory_t) + sizeof (vhost_memory_region_t); |
| vhost_mem = clib_mem_alloc (i); |
| clib_memset (vhost_mem, 0, i); |
| vhost_mem->nregions = 1; |
| vhost_mem->regions[0].memory_size = vpm->max_size; |
| vhost_mem->regions[0].guest_phys_addr = vpm->base_addr; |
| vhost_mem->regions[0].userspace_addr = |
| vhost_mem->regions[0].guest_phys_addr; |
| |
| for (i = 0; i < vhost_mem->nregions; i++) |
| virtio_log_debug (vif, "memtable region %u memory_size 0x%lx " |
| "guest_phys_addr 0x%lx userspace_addr 0x%lx", i, |
| vhost_mem->regions[0].memory_size, |
| vhost_mem->regions[0].guest_phys_addr, |
| vhost_mem->regions[0].userspace_addr); |
| |
| |
| for (i = 0; i < num_vhost_queues; i++) |
| { |
| int fd = vif->vhost_fds[i]; |
| _IOCTL (fd, VHOST_SET_FEATURES, &vif->features); |
| virtio_log_debug (vif, "VHOST_SET_FEATURES: fd %u features 0x%lx", |
| fd, vif->features); |
| _IOCTL (fd, VHOST_SET_MEM_TABLE, vhost_mem); |
| virtio_log_debug (vif, "VHOST_SET_MEM_TABLE: fd %u", fd); |
| } |
| |
| /* finish initializing queue pair */ |
| for (i = 0; i < num_vhost_queues * 2; i++) |
| { |
| vhost_vring_addr_t addr = { 0 }; |
| vhost_vring_state_t state = { 0 }; |
| vhost_vring_file_t file = { 0 }; |
| virtio_vring_t *vring; |
| u16 qp = i >> 1; |
| int fd = vif->vhost_fds[qp]; |
| |
| if (i & 1) |
| { |
| if (qp >= vif->num_txqs) |
| continue; |
| vring = vec_elt_at_index (vif->txq_vrings, qp); |
| } |
| else |
| { |
| if (qp >= vif->num_rxqs) |
| continue; |
| vring = vec_elt_at_index (vif->rxq_vrings, qp); |
| } |
| |
| addr.index = state.index = file.index = vring->queue_id & 1; |
| state.num = vring->size; |
| virtio_log_debug (vif, "VHOST_SET_VRING_NUM fd %d index %u num %u", fd, |
| state.index, state.num); |
| _IOCTL (fd, VHOST_SET_VRING_NUM, &state); |
| |
| addr.flags = 0; |
| addr.desc_user_addr = pointer_to_uword (vring->desc); |
| addr.avail_user_addr = pointer_to_uword (vring->avail); |
| addr.used_user_addr = pointer_to_uword (vring->used); |
| |
| virtio_log_debug (vif, "VHOST_SET_VRING_ADDR fd %d index %u flags 0x%x " |
| "desc_user_addr 0x%lx avail_user_addr 0x%lx " |
| "used_user_addr 0x%lx", fd, addr.index, |
| addr.flags, addr.desc_user_addr, addr.avail_user_addr, |
| addr.used_user_addr); |
| _IOCTL (fd, VHOST_SET_VRING_ADDR, &addr); |
| |
| file.fd = vring->call_fd; |
| virtio_log_debug (vif, "VHOST_SET_VRING_CALL fd %d index %u call_fd %d", |
| fd, file.index, file.fd); |
| _IOCTL (fd, VHOST_SET_VRING_CALL, &file); |
| |
| file.fd = vring->kick_fd; |
| virtio_log_debug (vif, "VHOST_SET_VRING_KICK fd %d index %u kick_fd %d", |
| fd, file.index, file.fd); |
| _IOCTL (fd, VHOST_SET_VRING_KICK, &file); |
| |
| file.fd = vif->tap_fds[qp % vif->num_rxqs]; |
| virtio_log_debug (vif, "VHOST_NET_SET_BACKEND fd %d index %u tap_fd %d", |
| fd, file.index, file.fd); |
| _IOCTL (fd, VHOST_NET_SET_BACKEND, &file); |
| } |
| |
| if (vif->type == VIRTIO_IF_TYPE_TAP) |
| { |
| if (!args->mac_addr_set) |
| ethernet_mac_address_generate (args->mac_addr.bytes); |
| |
| clib_memcpy (vif->mac_addr, args->mac_addr.bytes, 6); |
| vif->host_bridge = format (0, "%s%c", args->host_bridge, 0); |
| } |
| vif->host_if_name = format (0, "%s%c", host_if_name, 0); |
| vif->net_ns = format (0, "%s%c", args->host_namespace, 0); |
| vif->host_mtu_size = args->host_mtu_size; |
| vif->tap_flags = args->tap_flags; |
| clib_memcpy (vif->host_mac_addr, args->host_mac_addr.bytes, 6); |
| vif->host_ip4_prefix_len = args->host_ip4_prefix_len; |
| vif->host_ip6_prefix_len = args->host_ip6_prefix_len; |
| if (args->host_ip4_prefix_len) |
| clib_memcpy (&vif->host_ip4_addr, &args->host_ip4_addr, 4); |
| if (args->host_ip6_prefix_len) |
| clib_memcpy (&vif->host_ip6_addr, &args->host_ip6_addr, 16); |
| |
| if (vif->type != VIRTIO_IF_TYPE_TUN) |
| { |
| args->error = |
| ethernet_register_interface (vnm, virtio_device_class.index, |
| vif->dev_instance, vif->mac_addr, |
| &vif->hw_if_index, |
| virtio_eth_flag_change); |
| if (args->error) |
| { |
| args->rv = VNET_API_ERROR_INVALID_REGISTRATION; |
| goto error; |
| } |
| |
| } |
| else |
| { |
| vif->hw_if_index = vnet_register_interface |
| (vnm, virtio_device_class.index, |
| vif->dev_instance /* device instance */ , |
| tun_device_hw_interface_class.index, vif->dev_instance); |
| |
| } |
| tm->tap_ids = clib_bitmap_set (tm->tap_ids, vif->id, 1); |
| sw = vnet_get_hw_sw_interface (vnm, vif->hw_if_index); |
| vif->sw_if_index = sw->sw_if_index; |
| args->sw_if_index = vif->sw_if_index; |
| args->rv = 0; |
| hw = vnet_get_hw_interface (vnm, vif->hw_if_index); |
| hw->caps |= VNET_HW_INTERFACE_CAP_SUPPORTS_INT_MODE; |
| if (args->tap_flags & TAP_FLAG_GSO) |
| { |
| hw->caps |= VNET_HW_INTERFACE_CAP_SUPPORTS_TCP_GSO | |
| VNET_HW_INTERFACE_CAP_SUPPORTS_TX_TCP_CKSUM | |
| VNET_HW_INTERFACE_CAP_SUPPORTS_TX_UDP_CKSUM; |
| } |
| else if (args->tap_flags & TAP_FLAG_CSUM_OFFLOAD) |
| { |
| hw->caps |= VNET_HW_INTERFACE_CAP_SUPPORTS_TX_TCP_CKSUM | |
| VNET_HW_INTERFACE_CAP_SUPPORTS_TX_UDP_CKSUM; |
| } |
| if ((args->tap_flags & TAP_FLAG_GSO) |
| && (args->tap_flags & TAP_FLAG_GRO_COALESCE)) |
| { |
| virtio_set_packet_coalesce (vif); |
| } |
| if (vif->type == VIRTIO_IF_TYPE_TUN) |
| { |
| hw->max_supported_packet_bytes = TUN_MAX_PACKET_BYTES; |
| hw->min_packet_bytes = hw->min_supported_packet_bytes = |
| TUN_MIN_PACKET_BYTES; |
| hw->max_packet_bytes = |
| args->host_mtu_size ? args->host_mtu_size : TUN_DEFAULT_PACKET_BYTES; |
| vnet_sw_interface_set_mtu (vnm, hw->sw_if_index, hw->max_packet_bytes); |
| } |
| |
| virtio_vring_set_rx_queues (vm, vif); |
| |
| vif->per_interface_next_index = ~0; |
| vif->flags |= VIRTIO_IF_FLAG_ADMIN_UP; |
| vnet_hw_interface_set_flags (vnm, vif->hw_if_index, |
| VNET_HW_INTERFACE_FLAG_LINK_UP); |
| /* |
| * Host tun/tap driver link carrier state is "up" at creation. The |
| * driver never changes this unless the backend (VPP) changes it using |
| * TUNSETCARRIER ioctl(). See tap_set_carrier(). |
| */ |
| vif->host_carrier_up = 1; |
| |
| goto done; |
| |
| error: |
| if (err) |
| { |
| ASSERT (args->error == 0); |
| args->error = err; |
| args->rv = VNET_API_ERROR_SYSCALL_ERROR_3; |
| } |
| |
| tap_log_err (vif, "%U", format_clib_error, args->error); |
| tap_free (vm, vif); |
| done: |
| if (vhost_mem) |
| clib_mem_free (vhost_mem); |
| if (old_netns_fd != -1) |
| { |
| /* in case we errored with a switched netns */ |
| clib_setns (old_netns_fd); |
| close (old_netns_fd); |
| } |
| if (nfd != -1) |
| close (nfd); |
| } |
| |
| int |
| tap_delete_if (vlib_main_t * vm, u32 sw_if_index) |
| { |
| vnet_main_t *vnm = vnet_get_main (); |
| virtio_main_t *mm = &virtio_main; |
| virtio_if_t *vif; |
| vnet_hw_interface_t *hw; |
| |
| hw = vnet_get_sup_hw_interface_api_visible_or_null (vnm, sw_if_index); |
| if (hw == NULL || virtio_device_class.index != hw->dev_class_index) |
| return VNET_API_ERROR_INVALID_SW_IF_INDEX; |
| |
| vif = pool_elt_at_index (mm->interfaces, hw->dev_instance); |
| |
| if ((vif->type != VIRTIO_IF_TYPE_TAP) && (vif->type != VIRTIO_IF_TYPE_TUN)) |
| return VNET_API_ERROR_INVALID_INTERFACE; |
| |
| /* bring down the interface */ |
| vnet_hw_interface_set_flags (vnm, vif->hw_if_index, 0); |
| vnet_sw_interface_set_flags (vnm, vif->sw_if_index, 0); |
| |
| if (vif->type == VIRTIO_IF_TYPE_TAP) |
| ethernet_delete_interface (vnm, vif->hw_if_index); |
| else /* VIRTIO_IF_TYPE_TUN */ |
| vnet_delete_hw_interface (vnm, vif->hw_if_index); |
| vif->hw_if_index = ~0; |
| |
| tap_free (vm, vif); |
| |
| return 0; |
| } |
| |
| int |
| tap_csum_offload_enable_disable (vlib_main_t * vm, u32 sw_if_index, |
| int enable_disable) |
| { |
| vnet_main_t *vnm = vnet_get_main (); |
| virtio_main_t *mm = &virtio_main; |
| virtio_if_t *vif; |
| vnet_hw_interface_t *hw; |
| clib_error_t *err = 0; |
| int i = 0; |
| |
| hw = vnet_get_sup_hw_interface_api_visible_or_null (vnm, sw_if_index); |
| |
| if (hw == NULL || virtio_device_class.index != hw->dev_class_index) |
| return VNET_API_ERROR_INVALID_SW_IF_INDEX; |
| |
| vif = pool_elt_at_index (mm->interfaces, hw->dev_instance); |
| |
| const unsigned int csum_offload_on = TUN_F_CSUM; |
| const unsigned int csum_offload_off = 0; |
| unsigned int offload = enable_disable ? csum_offload_on : csum_offload_off; |
| vec_foreach_index (i, vif->tap_fds) |
| _IOCTL (vif->tap_fds[i], TUNSETOFFLOAD, offload); |
| vif->gso_enabled = 0; |
| vif->packet_coalesce = 0; |
| vif->csum_offload_enabled = enable_disable ? 1 : 0; |
| |
| if ((hw->caps & VNET_HW_INTERFACE_CAP_SUPPORTS_TCP_GSO) != 0) |
| { |
| hw->caps &= ~VNET_HW_INTERFACE_CAP_SUPPORTS_TCP_GSO; |
| } |
| |
| if (enable_disable) |
| { |
| hw->caps |= VNET_HW_INTERFACE_CAP_SUPPORTS_L4_TX_CKSUM; |
| } |
| else |
| { |
| hw->caps &= ~VNET_HW_INTERFACE_CAP_SUPPORTS_L4_TX_CKSUM; |
| } |
| |
| error: |
| if (err) |
| { |
| clib_warning ("Error %s checksum offload on sw_if_index %d", |
| enable_disable ? "enabling" : "disabling", sw_if_index); |
| return VNET_API_ERROR_SYSCALL_ERROR_3; |
| } |
| return 0; |
| } |
| |
| int |
| tap_gso_enable_disable (vlib_main_t * vm, u32 sw_if_index, int enable_disable, |
| int is_packet_coalesce) |
| { |
| vnet_main_t *vnm = vnet_get_main (); |
| virtio_main_t *mm = &virtio_main; |
| virtio_if_t *vif; |
| vnet_hw_interface_t *hw; |
| clib_error_t *err = 0; |
| int i = 0; |
| |
| hw = vnet_get_sup_hw_interface_api_visible_or_null (vnm, sw_if_index); |
| |
| if (hw == NULL || virtio_device_class.index != hw->dev_class_index) |
| return VNET_API_ERROR_INVALID_SW_IF_INDEX; |
| |
| vif = pool_elt_at_index (mm->interfaces, hw->dev_instance); |
| |
| const unsigned int gso_on = TUN_F_CSUM | TUN_F_TSO4 | TUN_F_TSO6; |
| const unsigned int gso_off = 0; |
| unsigned int offload = enable_disable ? gso_on : gso_off; |
| vec_foreach_index (i, vif->tap_fds) |
| _IOCTL (vif->tap_fds[i], TUNSETOFFLOAD, offload); |
| vif->gso_enabled = enable_disable ? 1 : 0; |
| vif->csum_offload_enabled = 0; |
| if (enable_disable) |
| { |
| if ((hw->caps & VNET_HW_INTERFACE_CAP_SUPPORTS_TCP_GSO) == 0) |
| { |
| hw->caps |= VNET_HW_INTERFACE_CAP_SUPPORTS_TCP_GSO | |
| VNET_HW_INTERFACE_CAP_SUPPORTS_L4_TX_CKSUM; |
| } |
| if (is_packet_coalesce) |
| { |
| virtio_set_packet_coalesce (vif); |
| } |
| } |
| else |
| { |
| if ((hw->caps & VNET_HW_INTERFACE_CAP_SUPPORTS_TCP_GSO) != 0) |
| { |
| hw->caps &= ~(VNET_HW_INTERFACE_CAP_SUPPORTS_TCP_GSO | |
| VNET_HW_INTERFACE_CAP_SUPPORTS_L4_TX_CKSUM); |
| } |
| vif->packet_coalesce = 0; |
| } |
| |
| error: |
| if (err) |
| { |
| clib_warning ("Error %s gso on sw_if_index %d", |
| enable_disable ? "enabling" : "disabling", sw_if_index); |
| return VNET_API_ERROR_SYSCALL_ERROR_3; |
| } |
| return 0; |
| } |
| |
| int |
| tap_dump_ifs (tap_interface_details_t ** out_tapids) |
| { |
| vnet_main_t *vnm = vnet_get_main (); |
| virtio_main_t *mm = &virtio_main; |
| virtio_if_t *vif; |
| virtio_vring_t *vring; |
| vnet_hw_interface_t *hi; |
| tap_interface_details_t *r_tapids = NULL; |
| tap_interface_details_t *tapid = NULL; |
| |
| /* *INDENT-OFF* */ |
| pool_foreach (vif, mm->interfaces) { |
| if ((vif->type != VIRTIO_IF_TYPE_TAP) |
| && (vif->type != VIRTIO_IF_TYPE_TUN)) |
| continue; |
| vec_add2(r_tapids, tapid, 1); |
| clib_memset (tapid, 0, sizeof (*tapid)); |
| tapid->id = vif->id; |
| tapid->sw_if_index = vif->sw_if_index; |
| hi = vnet_get_hw_interface (vnm, vif->hw_if_index); |
| clib_memcpy(tapid->dev_name, hi->name, |
| MIN (ARRAY_LEN (tapid->dev_name) - 1, vec_len (hi->name))); |
| vring = vec_elt_at_index (vif->rxq_vrings, RX_QUEUE_ACCESS(0)); |
| tapid->rx_ring_sz = vring->size; |
| vring = vec_elt_at_index (vif->txq_vrings, TX_QUEUE_ACCESS(0)); |
| tapid->tx_ring_sz = vring->size; |
| tapid->tap_flags = vif->tap_flags; |
| clib_memcpy(&tapid->host_mac_addr, vif->host_mac_addr, 6); |
| if (vif->host_if_name) |
| { |
| clib_memcpy(tapid->host_if_name, vif->host_if_name, |
| MIN (ARRAY_LEN (tapid->host_if_name) - 1, |
| vec_len (vif->host_if_name))); |
| } |
| if (vif->net_ns) |
| { |
| clib_memcpy(tapid->host_namespace, vif->net_ns, |
| MIN (ARRAY_LEN (tapid->host_namespace) - 1, |
| vec_len (vif->net_ns))); |
| } |
| if (vif->host_bridge) |
| { |
| clib_memcpy(tapid->host_bridge, vif->host_bridge, |
| MIN (ARRAY_LEN (tapid->host_bridge) - 1, |
| vec_len (vif->host_bridge))); |
| } |
| if (vif->host_ip4_prefix_len) |
| clib_memcpy(tapid->host_ip4_addr.as_u8, &vif->host_ip4_addr, 4); |
| tapid->host_ip4_prefix_len = vif->host_ip4_prefix_len; |
| if (vif->host_ip6_prefix_len) |
| clib_memcpy(tapid->host_ip6_addr.as_u8, &vif->host_ip6_addr, 16); |
| tapid->host_ip6_prefix_len = vif->host_ip6_prefix_len; |
| tapid->host_mtu_size = vif->host_mtu_size; |
| } |
| /* *INDENT-ON* */ |
| |
| *out_tapids = r_tapids; |
| |
| return 0; |
| } |
| |
| /* |
| * Set host tap/tun interface carrier state so it will appear to host |
| * applications that the interface's link state changed. |
| * |
| * If the kernel we're building against does not have support for the |
| * TUNSETCARRIER ioctl command, do nothing. |
| */ |
| int |
| tap_set_carrier (u32 hw_if_index, u32 carrier_up) |
| { |
| int ret = 0; |
| #ifdef TUNSETCARRIER |
| vnet_main_t *vnm = vnet_get_main (); |
| vnet_hw_interface_t *hi = vnet_get_hw_interface (vnm, hw_if_index); |
| virtio_main_t *mm = &virtio_main; |
| virtio_if_t *vif; |
| int *fd; |
| |
| vif = pool_elt_at_index (mm->interfaces, hi->dev_instance); |
| vec_foreach (fd, vif->tap_fds) |
| { |
| ret = ioctl (*fd, TUNSETCARRIER, &carrier_up); |
| if (ret < 0) |
| { |
| clib_warning ("ioctl (TUNSETCARRIER) returned %d", ret); |
| break; |
| } |
| } |
| if (!ret) |
| vif->host_carrier_up = (carrier_up != 0); |
| #endif |
| |
| return ret; |
| } |
| |
| static clib_error_t * |
| tap_mtu_config (vlib_main_t * vm, unformat_input_t * input) |
| { |
| tap_main_t *tm = &tap_main; |
| |
| while (unformat_check_input (input) != UNFORMAT_END_OF_INPUT) |
| { |
| if (unformat (input, "host-mtu %d", &tm->host_mtu_size)) |
| ; |
| else |
| return clib_error_return (0, "unknown input `%U'", |
| format_unformat_error, input); |
| } |
| |
| return 0; |
| } |
| |
| /* |
| * Set host tap/tun interface speed in Mbps. |
| */ |
| int |
| tap_set_speed (u32 hw_if_index, u32 speed) |
| { |
| vnet_main_t *vnm = vnet_get_main (); |
| vnet_hw_interface_t *hi = vnet_get_hw_interface (vnm, hw_if_index); |
| virtio_main_t *mm = &virtio_main; |
| virtio_if_t *vif; |
| int old_netns_fd = -1; |
| int nfd = -1; |
| int ctl_fd = -1; |
| struct ifreq ifr; |
| struct ethtool_cmd ecmd; |
| int ret = -1; |
| |
| vif = pool_elt_at_index (mm->interfaces, hi->dev_instance); |
| |
| if (vif->net_ns) |
| { |
| old_netns_fd = clib_netns_open (NULL /* self */); |
| if ((nfd = clib_netns_open (vif->net_ns)) == -1) |
| { |
| clib_warning ("Cannot open netns"); |
| goto done; |
| } |
| if (clib_setns (nfd) == -1) |
| { |
| clib_warning ("Cannot set ns"); |
| goto done; |
| } |
| } |
| |
| if ((ctl_fd = socket (AF_INET, SOCK_STREAM, 0)) == -1) |
| { |
| clib_warning ("Cannot open control socket"); |
| goto done; |
| } |
| |
| ecmd.cmd = ETHTOOL_GSET; |
| clib_memset (&ifr, 0, sizeof (ifr)); |
| clib_memcpy (ifr.ifr_name, vif->host_if_name, |
| strlen ((const char *) vif->host_if_name)); |
| ifr.ifr_data = (void *) &ecmd; |
| if ((ret = ioctl (ctl_fd, SIOCETHTOOL, &ifr)) < 0) |
| { |
| clib_warning ("Cannot get device settings"); |
| goto done; |
| } |
| |
| if (ethtool_cmd_speed (&ecmd) != speed) |
| { |
| ecmd.cmd = ETHTOOL_SSET; |
| ethtool_cmd_speed_set (&ecmd, speed); |
| if ((ret = ioctl (ctl_fd, SIOCETHTOOL, &ifr)) < 0) |
| { |
| clib_warning ("Cannot set device settings"); |
| goto done; |
| } |
| } |
| |
| done: |
| if (old_netns_fd != -1) |
| { |
| if (clib_setns (old_netns_fd) == -1) |
| { |
| clib_warning ("Cannot set old ns"); |
| } |
| close (old_netns_fd); |
| } |
| if (nfd != -1) |
| close (nfd); |
| if (ctl_fd != -1) |
| close (ctl_fd); |
| |
| return ret; |
| } |
| |
| /* tap { host-mtu <size> } configuration. */ |
| VLIB_CONFIG_FUNCTION (tap_mtu_config, "tap"); |
| |
| static clib_error_t * |
| tap_init (vlib_main_t * vm) |
| { |
| tap_main_t *tm = &tap_main; |
| clib_error_t *error = 0; |
| |
| tm->log_default = vlib_log_register_class ("tap", 0); |
| vlib_log_debug (tm->log_default, "initialized"); |
| |
| tm->host_mtu_size = 0; |
| |
| return error; |
| } |
| |
| VLIB_INIT_FUNCTION (tap_init); |
| |
| /* |
| * fd.io coding-style-patch-verification: ON |
| * |
| * Local Variables: |
| * eval: (c-set-style "gnu") |
| * End: |
| */ |