2013-06-08 14:56:03 +04:00
/*
* IPV4 GSO / GRO offload support
* Linux INET implementation
*
* This program is free software ; you can redistribute it and / or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation ; either version
* 2 of the License , or ( at your option ) any later version .
*
* UDPv4 GSO support
*/
# include <linux/skbuff.h>
# include <net/udp.h>
# include <net/protocol.h>
2014-01-20 15:59:19 +04:00
static DEFINE_SPINLOCK ( udp_offload_lock ) ;
2014-01-22 17:23:29 +04:00
static struct udp_offload_priv __rcu * udp_offload_base __read_mostly ;
2014-01-20 15:59:19 +04:00
2014-02-02 17:42:10 +04:00
# define udp_deref_protected(X) rcu_dereference_protected(X, lockdep_is_held(&udp_offload_lock))
2014-01-20 15:59:19 +04:00
struct udp_offload_priv {
struct udp_offload * offload ;
struct rcu_head rcu ;
struct udp_offload_priv __rcu * next ;
} ;
2013-06-08 14:56:03 +04:00
static int udp4_ufo_send_check ( struct sk_buff * skb )
{
if ( ! pskb_may_pull ( skb , sizeof ( struct udphdr ) ) )
return - EINVAL ;
if ( likely ( ! skb - > encapsulation ) ) {
const struct iphdr * iph ;
struct udphdr * uh ;
iph = ip_hdr ( skb ) ;
uh = udp_hdr ( skb ) ;
uh - > check = ~ csum_tcpudp_magic ( iph - > saddr , iph - > daddr , skb - > len ,
IPPROTO_UDP , 0 ) ;
skb - > csum_start = skb_transport_header ( skb ) - skb - > head ;
skb - > csum_offset = offsetof ( struct udphdr , check ) ;
skb - > ip_summed = CHECKSUM_PARTIAL ;
}
return 0 ;
}
static struct sk_buff * udp4_ufo_fragment ( struct sk_buff * skb ,
netdev_features_t features )
{
struct sk_buff * segs = ERR_PTR ( - EINVAL ) ;
unsigned int mss ;
2013-12-27 01:10:22 +04:00
int offset ;
__wsum csum ;
if ( skb - > encapsulation & &
2014-06-05 04:20:16 +04:00
( skb_shinfo ( skb ) - > gso_type &
( SKB_GSO_UDP_TUNNEL | SKB_GSO_UDP_TUNNEL_CSUM ) ) ) {
2013-12-27 01:10:22 +04:00
segs = skb_udp_tunnel_segment ( skb , features ) ;
goto out ;
}
2013-06-08 14:56:03 +04:00
mss = skb_shinfo ( skb ) - > gso_size ;
if ( unlikely ( skb - > len < = mss ) )
goto out ;
if ( skb_gso_ok ( skb , features | NETIF_F_GSO_ROBUST ) ) {
/* Packet is from an untrusted source, reset gso_segs. */
int type = skb_shinfo ( skb ) - > gso_type ;
if ( unlikely ( type & ~ ( SKB_GSO_UDP | SKB_GSO_DODGY |
SKB_GSO_UDP_TUNNEL |
2014-06-05 04:20:16 +04:00
SKB_GSO_UDP_TUNNEL_CSUM |
2013-10-19 22:42:57 +04:00
SKB_GSO_IPIP |
2014-06-05 04:20:23 +04:00
SKB_GSO_GRE | SKB_GSO_GRE_CSUM |
SKB_GSO_MPLS ) | |
2013-06-08 14:56:03 +04:00
! ( type & ( SKB_GSO_UDP ) ) ) )
goto out ;
skb_shinfo ( skb ) - > gso_segs = DIV_ROUND_UP ( skb - > len , mss ) ;
segs = NULL ;
goto out ;
}
2013-12-27 01:10:22 +04:00
/* Do software UFO. Complete and fill in the UDP checksum as
* HW cannot do checksum of UDP packets sent as multiple
* IP fragments .
*/
offset = skb_checksum_start_offset ( skb ) ;
csum = skb_checksum ( skb , offset , skb - > len - offset , 0 ) ;
offset + = skb - > csum_offset ;
* ( __sum16 * ) ( skb - > data + offset ) = csum_fold ( csum ) ;
skb - > ip_summed = CHECKSUM_NONE ;
2013-06-08 14:56:03 +04:00
/* Fragment the skb. IP headers of the fragments are updated in
* inet_gso_segment ( )
*/
2013-12-27 01:10:22 +04:00
segs = skb_segment ( skb , features ) ;
2013-06-08 14:56:03 +04:00
out :
return segs ;
}
2014-01-20 15:59:19 +04:00
int udp_add_offload ( struct udp_offload * uo )
{
2014-01-29 20:08:59 +04:00
struct udp_offload_priv * new_offload = kzalloc ( sizeof ( * new_offload ) , GFP_ATOMIC ) ;
2014-01-20 15:59:19 +04:00
if ( ! new_offload )
return - ENOMEM ;
new_offload - > offload = uo ;
spin_lock ( & udp_offload_lock ) ;
2014-02-02 17:42:10 +04:00
new_offload - > next = udp_offload_base ;
rcu_assign_pointer ( udp_offload_base , new_offload ) ;
2014-01-20 15:59:19 +04:00
spin_unlock ( & udp_offload_lock ) ;
return 0 ;
}
EXPORT_SYMBOL ( udp_add_offload ) ;
static void udp_offload_free_routine ( struct rcu_head * head )
{
struct udp_offload_priv * ou_priv = container_of ( head , struct udp_offload_priv , rcu ) ;
kfree ( ou_priv ) ;
}
void udp_del_offload ( struct udp_offload * uo )
{
struct udp_offload_priv __rcu * * head = & udp_offload_base ;
struct udp_offload_priv * uo_priv ;
spin_lock ( & udp_offload_lock ) ;
2014-02-02 17:42:10 +04:00
uo_priv = udp_deref_protected ( * head ) ;
2014-01-20 15:59:19 +04:00
for ( ; uo_priv ! = NULL ;
2014-02-02 17:42:10 +04:00
uo_priv = udp_deref_protected ( * head ) ) {
2014-01-20 15:59:19 +04:00
if ( uo_priv - > offload = = uo ) {
2014-02-02 17:42:10 +04:00
rcu_assign_pointer ( * head ,
udp_deref_protected ( uo_priv - > next ) ) ;
2014-01-20 15:59:19 +04:00
goto unlock ;
}
head = & uo_priv - > next ;
}
2014-01-22 17:23:29 +04:00
pr_warn ( " udp_del_offload: didn't find offload for port %d \n " , ntohs ( uo - > port ) ) ;
2014-01-20 15:59:19 +04:00
unlock :
spin_unlock ( & udp_offload_lock ) ;
if ( uo_priv ! = NULL )
call_rcu ( & uo_priv - > rcu , udp_offload_free_routine ) ;
}
EXPORT_SYMBOL ( udp_del_offload ) ;
static struct sk_buff * * udp_gro_receive ( struct sk_buff * * head , struct sk_buff * skb )
{
struct udp_offload_priv * uo_priv ;
struct sk_buff * p , * * pp = NULL ;
struct udphdr * uh , * uh2 ;
unsigned int hlen , off ;
int flush = 1 ;
if ( NAPI_GRO_CB ( skb ) - > udp_mark | |
( ! skb - > encapsulation & & skb - > ip_summed ! = CHECKSUM_COMPLETE ) )
goto out ;
/* mark that this skb passed once through the udp gro layer */
NAPI_GRO_CB ( skb ) - > udp_mark = 1 ;
off = skb_gro_offset ( skb ) ;
hlen = off + sizeof ( * uh ) ;
uh = skb_gro_header_fast ( skb , off ) ;
if ( skb_gro_header_hard ( skb , hlen ) ) {
uh = skb_gro_header_slow ( skb , hlen , off ) ;
if ( unlikely ( ! uh ) )
goto out ;
}
rcu_read_lock ( ) ;
uo_priv = rcu_dereference ( udp_offload_base ) ;
for ( ; uo_priv ! = NULL ; uo_priv = rcu_dereference ( uo_priv - > next ) ) {
if ( uo_priv - > offload - > port = = uh - > dest & &
uo_priv - > offload - > callbacks . gro_receive )
goto unflush ;
}
goto out_unlock ;
unflush :
flush = 0 ;
for ( p = * head ; p ; p = p - > next ) {
if ( ! NAPI_GRO_CB ( p ) - > same_flow )
continue ;
uh2 = ( struct udphdr * ) ( p - > data + off ) ;
if ( ( * ( u32 * ) & uh - > source ! = * ( u32 * ) & uh2 - > source ) ) {
NAPI_GRO_CB ( p ) - > same_flow = 0 ;
continue ;
}
}
skb_gro_pull ( skb , sizeof ( struct udphdr ) ) ; /* pull encapsulating udp header */
pp = uo_priv - > offload - > callbacks . gro_receive ( head , skb ) ;
out_unlock :
rcu_read_unlock ( ) ;
out :
NAPI_GRO_CB ( skb ) - > flush | = flush ;
return pp ;
}
static int udp_gro_complete ( struct sk_buff * skb , int nhoff )
{
struct udp_offload_priv * uo_priv ;
__be16 newlen = htons ( skb - > len - nhoff ) ;
struct udphdr * uh = ( struct udphdr * ) ( skb - > data + nhoff ) ;
int err = - ENOSYS ;
uh - > len = newlen ;
rcu_read_lock ( ) ;
uo_priv = rcu_dereference ( udp_offload_base ) ;
for ( ; uo_priv ! = NULL ; uo_priv = rcu_dereference ( uo_priv - > next ) ) {
if ( uo_priv - > offload - > port = = uh - > dest & &
uo_priv - > offload - > callbacks . gro_complete )
break ;
}
if ( uo_priv ! = NULL )
err = uo_priv - > offload - > callbacks . gro_complete ( skb , nhoff + sizeof ( struct udphdr ) ) ;
rcu_read_unlock ( ) ;
return err ;
}
2013-06-08 14:56:03 +04:00
static const struct net_offload udpv4_offload = {
. callbacks = {
. gso_send_check = udp4_ufo_send_check ,
. gso_segment = udp4_ufo_fragment ,
2014-01-20 15:59:19 +04:00
. gro_receive = udp_gro_receive ,
. gro_complete = udp_gro_complete ,
2013-06-08 14:56:03 +04:00
} ,
} ;
int __init udpv4_offload_init ( void )
{
return inet_add_offload ( & udpv4_offload , IPPROTO_UDP ) ;
}