2658b5a8a4
Instead of spreading networking critical fields all over the places, add a custom net_hotdata structure so that we can precisely control its layout. In this first patch, move : - gro_normal_batch used in rx (GRO stack) - offload_base used in rx and tx (GRO and TSO stacks) Signed-off-by: Eric Dumazet <edumazet@google.com> Acked-by: Soheil Hassas Yeganeh <soheil@google.com> Reviewed-by: David Ahern <dsahern@kernel.org> Link: https://lore.kernel.org/r/20240306160031.874438-2-edumazet@google.com Signed-off-by: Jakub Kicinski <kuba@kernel.org>
274 lines
7.7 KiB
C
274 lines
7.7 KiB
C
// SPDX-License-Identifier: GPL-2.0-or-later
|
|
#include <linux/skbuff.h>
|
|
#include <linux/sctp.h>
|
|
#include <net/gso.h>
|
|
#include <net/gro.h>
|
|
|
|
/**
|
|
* skb_eth_gso_segment - segmentation handler for ethernet protocols.
|
|
* @skb: buffer to segment
|
|
* @features: features for the output path (see dev->features)
|
|
* @type: Ethernet Protocol ID
|
|
*/
|
|
struct sk_buff *skb_eth_gso_segment(struct sk_buff *skb,
|
|
netdev_features_t features, __be16 type)
|
|
{
|
|
struct sk_buff *segs = ERR_PTR(-EPROTONOSUPPORT);
|
|
struct packet_offload *ptype;
|
|
|
|
rcu_read_lock();
|
|
list_for_each_entry_rcu(ptype, &net_hotdata.offload_base, list) {
|
|
if (ptype->type == type && ptype->callbacks.gso_segment) {
|
|
segs = ptype->callbacks.gso_segment(skb, features);
|
|
break;
|
|
}
|
|
}
|
|
rcu_read_unlock();
|
|
|
|
return segs;
|
|
}
|
|
EXPORT_SYMBOL(skb_eth_gso_segment);
|
|
|
|
/**
|
|
* skb_mac_gso_segment - mac layer segmentation handler.
|
|
* @skb: buffer to segment
|
|
* @features: features for the output path (see dev->features)
|
|
*/
|
|
struct sk_buff *skb_mac_gso_segment(struct sk_buff *skb,
|
|
netdev_features_t features)
|
|
{
|
|
struct sk_buff *segs = ERR_PTR(-EPROTONOSUPPORT);
|
|
struct packet_offload *ptype;
|
|
int vlan_depth = skb->mac_len;
|
|
__be16 type = skb_network_protocol(skb, &vlan_depth);
|
|
|
|
if (unlikely(!type))
|
|
return ERR_PTR(-EINVAL);
|
|
|
|
__skb_pull(skb, vlan_depth);
|
|
|
|
rcu_read_lock();
|
|
list_for_each_entry_rcu(ptype, &net_hotdata.offload_base, list) {
|
|
if (ptype->type == type && ptype->callbacks.gso_segment) {
|
|
segs = ptype->callbacks.gso_segment(skb, features);
|
|
break;
|
|
}
|
|
}
|
|
rcu_read_unlock();
|
|
|
|
__skb_push(skb, skb->data - skb_mac_header(skb));
|
|
|
|
return segs;
|
|
}
|
|
EXPORT_SYMBOL(skb_mac_gso_segment);
|
|
/* openvswitch calls this on rx path, so we need a different check.
|
|
*/
|
|
static bool skb_needs_check(const struct sk_buff *skb, bool tx_path)
|
|
{
|
|
if (tx_path)
|
|
return skb->ip_summed != CHECKSUM_PARTIAL &&
|
|
skb->ip_summed != CHECKSUM_UNNECESSARY;
|
|
|
|
return skb->ip_summed == CHECKSUM_NONE;
|
|
}
|
|
|
|
/**
|
|
* __skb_gso_segment - Perform segmentation on skb.
|
|
* @skb: buffer to segment
|
|
* @features: features for the output path (see dev->features)
|
|
* @tx_path: whether it is called in TX path
|
|
*
|
|
* This function segments the given skb and returns a list of segments.
|
|
*
|
|
* It may return NULL if the skb requires no segmentation. This is
|
|
* only possible when GSO is used for verifying header integrity.
|
|
*
|
|
* Segmentation preserves SKB_GSO_CB_OFFSET bytes of previous skb cb.
|
|
*/
|
|
struct sk_buff *__skb_gso_segment(struct sk_buff *skb,
|
|
netdev_features_t features, bool tx_path)
|
|
{
|
|
struct sk_buff *segs;
|
|
|
|
if (unlikely(skb_needs_check(skb, tx_path))) {
|
|
int err;
|
|
|
|
/* We're going to init ->check field in TCP or UDP header */
|
|
err = skb_cow_head(skb, 0);
|
|
if (err < 0)
|
|
return ERR_PTR(err);
|
|
}
|
|
|
|
/* Only report GSO partial support if it will enable us to
|
|
* support segmentation on this frame without needing additional
|
|
* work.
|
|
*/
|
|
if (features & NETIF_F_GSO_PARTIAL) {
|
|
netdev_features_t partial_features = NETIF_F_GSO_ROBUST;
|
|
struct net_device *dev = skb->dev;
|
|
|
|
partial_features |= dev->features & dev->gso_partial_features;
|
|
if (!skb_gso_ok(skb, features | partial_features))
|
|
features &= ~NETIF_F_GSO_PARTIAL;
|
|
}
|
|
|
|
BUILD_BUG_ON(SKB_GSO_CB_OFFSET +
|
|
sizeof(*SKB_GSO_CB(skb)) > sizeof(skb->cb));
|
|
|
|
SKB_GSO_CB(skb)->mac_offset = skb_headroom(skb);
|
|
SKB_GSO_CB(skb)->encap_level = 0;
|
|
|
|
skb_reset_mac_header(skb);
|
|
skb_reset_mac_len(skb);
|
|
|
|
segs = skb_mac_gso_segment(skb, features);
|
|
|
|
if (segs != skb && unlikely(skb_needs_check(skb, tx_path) && !IS_ERR(segs)))
|
|
skb_warn_bad_offload(skb);
|
|
|
|
return segs;
|
|
}
|
|
EXPORT_SYMBOL(__skb_gso_segment);
|
|
|
|
/**
|
|
* skb_gso_transport_seglen - Return length of individual segments of a gso packet
|
|
*
|
|
* @skb: GSO skb
|
|
*
|
|
* skb_gso_transport_seglen is used to determine the real size of the
|
|
* individual segments, including Layer4 headers (TCP/UDP).
|
|
*
|
|
* The MAC/L2 or network (IP, IPv6) headers are not accounted for.
|
|
*/
|
|
static unsigned int skb_gso_transport_seglen(const struct sk_buff *skb)
|
|
{
|
|
const struct skb_shared_info *shinfo = skb_shinfo(skb);
|
|
unsigned int thlen = 0;
|
|
|
|
if (skb->encapsulation) {
|
|
thlen = skb_inner_transport_header(skb) -
|
|
skb_transport_header(skb);
|
|
|
|
if (likely(shinfo->gso_type & (SKB_GSO_TCPV4 | SKB_GSO_TCPV6)))
|
|
thlen += inner_tcp_hdrlen(skb);
|
|
} else if (likely(shinfo->gso_type & (SKB_GSO_TCPV4 | SKB_GSO_TCPV6))) {
|
|
thlen = tcp_hdrlen(skb);
|
|
} else if (unlikely(skb_is_gso_sctp(skb))) {
|
|
thlen = sizeof(struct sctphdr);
|
|
} else if (shinfo->gso_type & SKB_GSO_UDP_L4) {
|
|
thlen = sizeof(struct udphdr);
|
|
}
|
|
/* UFO sets gso_size to the size of the fragmentation
|
|
* payload, i.e. the size of the L4 (UDP) header is already
|
|
* accounted for.
|
|
*/
|
|
return thlen + shinfo->gso_size;
|
|
}
|
|
|
|
/**
|
|
* skb_gso_network_seglen - Return length of individual segments of a gso packet
|
|
*
|
|
* @skb: GSO skb
|
|
*
|
|
* skb_gso_network_seglen is used to determine the real size of the
|
|
* individual segments, including Layer3 (IP, IPv6) and L4 headers (TCP/UDP).
|
|
*
|
|
* The MAC/L2 header is not accounted for.
|
|
*/
|
|
static unsigned int skb_gso_network_seglen(const struct sk_buff *skb)
|
|
{
|
|
unsigned int hdr_len = skb_transport_header(skb) -
|
|
skb_network_header(skb);
|
|
|
|
return hdr_len + skb_gso_transport_seglen(skb);
|
|
}
|
|
|
|
/**
|
|
* skb_gso_mac_seglen - Return length of individual segments of a gso packet
|
|
*
|
|
* @skb: GSO skb
|
|
*
|
|
* skb_gso_mac_seglen is used to determine the real size of the
|
|
* individual segments, including MAC/L2, Layer3 (IP, IPv6) and L4
|
|
* headers (TCP/UDP).
|
|
*/
|
|
static unsigned int skb_gso_mac_seglen(const struct sk_buff *skb)
|
|
{
|
|
unsigned int hdr_len = skb_transport_header(skb) - skb_mac_header(skb);
|
|
|
|
return hdr_len + skb_gso_transport_seglen(skb);
|
|
}
|
|
|
|
/**
|
|
* skb_gso_size_check - check the skb size, considering GSO_BY_FRAGS
|
|
*
|
|
* There are a couple of instances where we have a GSO skb, and we
|
|
* want to determine what size it would be after it is segmented.
|
|
*
|
|
* We might want to check:
|
|
* - L3+L4+payload size (e.g. IP forwarding)
|
|
* - L2+L3+L4+payload size (e.g. sanity check before passing to driver)
|
|
*
|
|
* This is a helper to do that correctly considering GSO_BY_FRAGS.
|
|
*
|
|
* @skb: GSO skb
|
|
*
|
|
* @seg_len: The segmented length (from skb_gso_*_seglen). In the
|
|
* GSO_BY_FRAGS case this will be [header sizes + GSO_BY_FRAGS].
|
|
*
|
|
* @max_len: The maximum permissible length.
|
|
*
|
|
* Returns true if the segmented length <= max length.
|
|
*/
|
|
static inline bool skb_gso_size_check(const struct sk_buff *skb,
|
|
unsigned int seg_len,
|
|
unsigned int max_len) {
|
|
const struct skb_shared_info *shinfo = skb_shinfo(skb);
|
|
const struct sk_buff *iter;
|
|
|
|
if (shinfo->gso_size != GSO_BY_FRAGS)
|
|
return seg_len <= max_len;
|
|
|
|
/* Undo this so we can re-use header sizes */
|
|
seg_len -= GSO_BY_FRAGS;
|
|
|
|
skb_walk_frags(skb, iter) {
|
|
if (seg_len + skb_headlen(iter) > max_len)
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
/**
|
|
* skb_gso_validate_network_len - Will a split GSO skb fit into a given MTU?
|
|
*
|
|
* @skb: GSO skb
|
|
* @mtu: MTU to validate against
|
|
*
|
|
* skb_gso_validate_network_len validates if a given skb will fit a
|
|
* wanted MTU once split. It considers L3 headers, L4 headers, and the
|
|
* payload.
|
|
*/
|
|
bool skb_gso_validate_network_len(const struct sk_buff *skb, unsigned int mtu)
|
|
{
|
|
return skb_gso_size_check(skb, skb_gso_network_seglen(skb), mtu);
|
|
}
|
|
EXPORT_SYMBOL_GPL(skb_gso_validate_network_len);
|
|
|
|
/**
|
|
* skb_gso_validate_mac_len - Will a split GSO skb fit in a given length?
|
|
*
|
|
* @skb: GSO skb
|
|
* @len: length to validate against
|
|
*
|
|
* skb_gso_validate_mac_len validates if a given skb will fit a wanted
|
|
* length once split, including L2, L3 and L4 headers and the payload.
|
|
*/
|
|
bool skb_gso_validate_mac_len(const struct sk_buff *skb, unsigned int len)
|
|
{
|
|
return skb_gso_size_check(skb, skb_gso_mac_seglen(skb), len);
|
|
}
|
|
EXPORT_SYMBOL_GPL(skb_gso_validate_mac_len);
|
|
|