aboutsummaryrefslogtreecommitdiffstats
path: root/drivers/net/xen-netback/netback.c
diff options
context:
space:
mode:
Diffstat (limited to 'drivers/net/xen-netback/netback.c')
-rw-r--r--drivers/net/xen-netback/netback.c267
1 files changed, 151 insertions, 116 deletions
diff --git a/drivers/net/xen-netback/netback.c b/drivers/net/xen-netback/netback.c
index 919b6509455c..e884ee1fe7ed 100644
--- a/drivers/net/xen-netback/netback.c
+++ b/drivers/net/xen-netback/netback.c
@@ -39,6 +39,7 @@
39#include <linux/udp.h> 39#include <linux/udp.h>
40 40
41#include <net/tcp.h> 41#include <net/tcp.h>
42#include <net/ip6_checksum.h>
42 43
43#include <xen/xen.h> 44#include <xen/xen.h>
44#include <xen/events.h> 45#include <xen/events.h>
@@ -451,7 +452,7 @@ static int xenvif_gop_skb(struct sk_buff *skb,
451 } 452 }
452 453
453 /* Set up a GSO prefix descriptor, if necessary */ 454 /* Set up a GSO prefix descriptor, if necessary */
454 if ((1 << skb_shinfo(skb)->gso_type) & vif->gso_prefix_mask) { 455 if ((1 << gso_type) & vif->gso_prefix_mask) {
455 req = RING_GET_REQUEST(&vif->rx, vif->rx.req_cons++); 456 req = RING_GET_REQUEST(&vif->rx, vif->rx.req_cons++);
456 meta = npo->meta + npo->meta_prod++; 457 meta = npo->meta + npo->meta_prod++;
457 meta->gso_type = gso_type; 458 meta->gso_type = gso_type;
@@ -1148,75 +1149,92 @@ static int xenvif_set_skb_gso(struct xenvif *vif,
1148 return 0; 1149 return 0;
1149} 1150}
1150 1151
1151static inline void maybe_pull_tail(struct sk_buff *skb, unsigned int len) 1152static inline int maybe_pull_tail(struct sk_buff *skb, unsigned int len,
1153 unsigned int max)
1152{ 1154{
1153 if (skb_is_nonlinear(skb) && skb_headlen(skb) < len) { 1155 if (skb_headlen(skb) >= len)
1154 /* If we need to pullup then pullup to the max, so we 1156 return 0;
1155 * won't need to do it again. 1157
1156 */ 1158 /* If we need to pullup then pullup to the max, so we
1157 int target = min_t(int, skb->len, MAX_TCP_HEADER); 1159 * won't need to do it again.
1158 __pskb_pull_tail(skb, target - skb_headlen(skb)); 1160 */
1159 } 1161 if (max > skb->len)
1162 max = skb->len;
1163
1164 if (__pskb_pull_tail(skb, max - skb_headlen(skb)) == NULL)
1165 return -ENOMEM;
1166
1167 if (skb_headlen(skb) < len)
1168 return -EPROTO;
1169
1170 return 0;
1160} 1171}
1161 1172
1173/* This value should be large enough to cover a tagged ethernet header plus
1174 * maximally sized IP and TCP or UDP headers.
1175 */
1176#define MAX_IP_HDR_LEN 128
1177
1162static int checksum_setup_ip(struct xenvif *vif, struct sk_buff *skb, 1178static int checksum_setup_ip(struct xenvif *vif, struct sk_buff *skb,
1163 int recalculate_partial_csum) 1179 int recalculate_partial_csum)
1164{ 1180{
1165 struct iphdr *iph = (void *)skb->data;
1166 unsigned int header_size;
1167 unsigned int off; 1181 unsigned int off;
1168 int err = -EPROTO; 1182 bool fragment;
1183 int err;
1169 1184
1170 off = sizeof(struct iphdr); 1185 fragment = false;
1171 1186
1172 header_size = skb->network_header + off + MAX_IPOPTLEN; 1187 err = maybe_pull_tail(skb,
1173 maybe_pull_tail(skb, header_size); 1188 sizeof(struct iphdr),
1189 MAX_IP_HDR_LEN);
1190 if (err < 0)
1191 goto out;
1174 1192
1175 off = iph->ihl * 4; 1193 if (ip_hdr(skb)->frag_off & htons(IP_OFFSET | IP_MF))
1194 fragment = true;
1176 1195
1177 switch (iph->protocol) { 1196 off = ip_hdrlen(skb);
1197
1198 err = -EPROTO;
1199
1200 switch (ip_hdr(skb)->protocol) {
1178 case IPPROTO_TCP: 1201 case IPPROTO_TCP:
1202 err = maybe_pull_tail(skb,
1203 off + sizeof(struct tcphdr),
1204 MAX_IP_HDR_LEN);
1205 if (err < 0)
1206 goto out;
1207
1179 if (!skb_partial_csum_set(skb, off, 1208 if (!skb_partial_csum_set(skb, off,
1180 offsetof(struct tcphdr, check))) 1209 offsetof(struct tcphdr, check)))
1181 goto out; 1210 goto out;
1182 1211
1183 if (recalculate_partial_csum) { 1212 if (recalculate_partial_csum)
1184 struct tcphdr *tcph = tcp_hdr(skb); 1213 tcp_hdr(skb)->check =
1185 1214 ~csum_tcpudp_magic(ip_hdr(skb)->saddr,
1186 header_size = skb->network_header + 1215 ip_hdr(skb)->daddr,
1187 off + 1216 skb->len - off,
1188 sizeof(struct tcphdr); 1217 IPPROTO_TCP, 0);
1189 maybe_pull_tail(skb, header_size);
1190
1191 tcph->check = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
1192 skb->len - off,
1193 IPPROTO_TCP, 0);
1194 }
1195 break; 1218 break;
1196 case IPPROTO_UDP: 1219 case IPPROTO_UDP:
1220 err = maybe_pull_tail(skb,
1221 off + sizeof(struct udphdr),
1222 MAX_IP_HDR_LEN);
1223 if (err < 0)
1224 goto out;
1225
1197 if (!skb_partial_csum_set(skb, off, 1226 if (!skb_partial_csum_set(skb, off,
1198 offsetof(struct udphdr, check))) 1227 offsetof(struct udphdr, check)))
1199 goto out; 1228 goto out;
1200 1229
1201 if (recalculate_partial_csum) { 1230 if (recalculate_partial_csum)
1202 struct udphdr *udph = udp_hdr(skb); 1231 udp_hdr(skb)->check =
1203 1232 ~csum_tcpudp_magic(ip_hdr(skb)->saddr,
1204 header_size = skb->network_header + 1233 ip_hdr(skb)->daddr,
1205 off + 1234 skb->len - off,
1206 sizeof(struct udphdr); 1235 IPPROTO_UDP, 0);
1207 maybe_pull_tail(skb, header_size);
1208
1209 udph->check = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
1210 skb->len - off,
1211 IPPROTO_UDP, 0);
1212 }
1213 break; 1236 break;
1214 default: 1237 default:
1215 if (net_ratelimit())
1216 netdev_err(vif->dev,
1217 "Attempting to checksum a non-TCP/UDP packet, "
1218 "dropping a protocol %d packet\n",
1219 iph->protocol);
1220 goto out; 1238 goto out;
1221 } 1239 }
1222 1240
@@ -1226,121 +1244,138 @@ out:
1226 return err; 1244 return err;
1227} 1245}
1228 1246
1247/* This value should be large enough to cover a tagged ethernet header plus
1248 * an IPv6 header, all options, and a maximal TCP or UDP header.
1249 */
1250#define MAX_IPV6_HDR_LEN 256
1251
1252#define OPT_HDR(type, skb, off) \
1253 (type *)(skb_network_header(skb) + (off))
1254
1229static int checksum_setup_ipv6(struct xenvif *vif, struct sk_buff *skb, 1255static int checksum_setup_ipv6(struct xenvif *vif, struct sk_buff *skb,
1230 int recalculate_partial_csum) 1256 int recalculate_partial_csum)
1231{ 1257{
1232 int err = -EPROTO; 1258 int err;
1233 struct ipv6hdr *ipv6h = (void *)skb->data;
1234 u8 nexthdr; 1259 u8 nexthdr;
1235 unsigned int header_size;
1236 unsigned int off; 1260 unsigned int off;
1261 unsigned int len;
1237 bool fragment; 1262 bool fragment;
1238 bool done; 1263 bool done;
1239 1264
1265 fragment = false;
1240 done = false; 1266 done = false;
1241 1267
1242 off = sizeof(struct ipv6hdr); 1268 off = sizeof(struct ipv6hdr);
1243 1269
1244 header_size = skb->network_header + off; 1270 err = maybe_pull_tail(skb, off, MAX_IPV6_HDR_LEN);
1245 maybe_pull_tail(skb, header_size); 1271 if (err < 0)
1272 goto out;
1246 1273
1247 nexthdr = ipv6h->nexthdr; 1274 nexthdr = ipv6_hdr(skb)->nexthdr;
1248 1275
1249 while ((off <= sizeof(struct ipv6hdr) + ntohs(ipv6h->payload_len)) && 1276 len = sizeof(struct ipv6hdr) + ntohs(ipv6_hdr(skb)->payload_len);
1250 !done) { 1277 while (off <= len && !done) {
1251 switch (nexthdr) { 1278 switch (nexthdr) {
1252 case IPPROTO_DSTOPTS: 1279 case IPPROTO_DSTOPTS:
1253 case IPPROTO_HOPOPTS: 1280 case IPPROTO_HOPOPTS:
1254 case IPPROTO_ROUTING: { 1281 case IPPROTO_ROUTING: {
1255 struct ipv6_opt_hdr *hp = (void *)(skb->data + off); 1282 struct ipv6_opt_hdr *hp;
1256 1283
1257 header_size = skb->network_header + 1284 err = maybe_pull_tail(skb,
1258 off + 1285 off +
1259 sizeof(struct ipv6_opt_hdr); 1286 sizeof(struct ipv6_opt_hdr),
1260 maybe_pull_tail(skb, header_size); 1287 MAX_IPV6_HDR_LEN);
1288 if (err < 0)
1289 goto out;
1261 1290
1291 hp = OPT_HDR(struct ipv6_opt_hdr, skb, off);
1262 nexthdr = hp->nexthdr; 1292 nexthdr = hp->nexthdr;
1263 off += ipv6_optlen(hp); 1293 off += ipv6_optlen(hp);
1264 break; 1294 break;
1265 } 1295 }
1266 case IPPROTO_AH: { 1296 case IPPROTO_AH: {
1267 struct ip_auth_hdr *hp = (void *)(skb->data + off); 1297 struct ip_auth_hdr *hp;
1268 1298
1269 header_size = skb->network_header + 1299 err = maybe_pull_tail(skb,
1270 off + 1300 off +
1271 sizeof(struct ip_auth_hdr); 1301 sizeof(struct ip_auth_hdr),
1272 maybe_pull_tail(skb, header_size); 1302 MAX_IPV6_HDR_LEN);
1303 if (err < 0)
1304 goto out;
1273 1305
1306 hp = OPT_HDR(struct ip_auth_hdr, skb, off);
1274 nexthdr = hp->nexthdr; 1307 nexthdr = hp->nexthdr;
1275 off += (hp->hdrlen+2)<<2; 1308 off += ipv6_authlen(hp);
1309 break;
1310 }
1311 case IPPROTO_FRAGMENT: {
1312 struct frag_hdr *hp;
1313
1314 err = maybe_pull_tail(skb,
1315 off +
1316 sizeof(struct frag_hdr),
1317 MAX_IPV6_HDR_LEN);
1318 if (err < 0)
1319 goto out;
1320
1321 hp = OPT_HDR(struct frag_hdr, skb, off);
1322
1323 if (hp->frag_off & htons(IP6_OFFSET | IP6_MF))
1324 fragment = true;
1325
1326 nexthdr = hp->nexthdr;
1327 off += sizeof(struct frag_hdr);
1276 break; 1328 break;
1277 } 1329 }
1278 case IPPROTO_FRAGMENT:
1279 fragment = true;
1280 /* fall through */
1281 default: 1330 default:
1282 done = true; 1331 done = true;
1283 break; 1332 break;
1284 } 1333 }
1285 } 1334 }
1286 1335
1287 if (!done) { 1336 err = -EPROTO;
1288 if (net_ratelimit())
1289 netdev_err(vif->dev, "Failed to parse packet header\n");
1290 goto out;
1291 }
1292 1337
1293 if (fragment) { 1338 if (!done || fragment)
1294 if (net_ratelimit())
1295 netdev_err(vif->dev, "Packet is a fragment!\n");
1296 goto out; 1339 goto out;
1297 }
1298 1340
1299 switch (nexthdr) { 1341 switch (nexthdr) {
1300 case IPPROTO_TCP: 1342 case IPPROTO_TCP:
1343 err = maybe_pull_tail(skb,
1344 off + sizeof(struct tcphdr),
1345 MAX_IPV6_HDR_LEN);
1346 if (err < 0)
1347 goto out;
1348
1301 if (!skb_partial_csum_set(skb, off, 1349 if (!skb_partial_csum_set(skb, off,
1302 offsetof(struct tcphdr, check))) 1350 offsetof(struct tcphdr, check)))
1303 goto out; 1351 goto out;
1304 1352
1305 if (recalculate_partial_csum) { 1353 if (recalculate_partial_csum)
1306 struct tcphdr *tcph = tcp_hdr(skb); 1354 tcp_hdr(skb)->check =
1307 1355 ~csum_ipv6_magic(&ipv6_hdr(skb)->saddr,
1308 header_size = skb->network_header + 1356 &ipv6_hdr(skb)->daddr,
1309 off + 1357 skb->len - off,
1310 sizeof(struct tcphdr); 1358 IPPROTO_TCP, 0);
1311 maybe_pull_tail(skb, header_size);
1312
1313 tcph->check = ~csum_ipv6_magic(&ipv6h->saddr,
1314 &ipv6h->daddr,
1315 skb->len - off,
1316 IPPROTO_TCP, 0);
1317 }
1318 break; 1359 break;
1319 case IPPROTO_UDP: 1360 case IPPROTO_UDP:
1361 err = maybe_pull_tail(skb,
1362 off + sizeof(struct udphdr),
1363 MAX_IPV6_HDR_LEN);
1364 if (err < 0)
1365 goto out;
1366
1320 if (!skb_partial_csum_set(skb, off, 1367 if (!skb_partial_csum_set(skb, off,
1321 offsetof(struct udphdr, check))) 1368 offsetof(struct udphdr, check)))
1322 goto out; 1369 goto out;
1323 1370
1324 if (recalculate_partial_csum) { 1371 if (recalculate_partial_csum)
1325 struct udphdr *udph = udp_hdr(skb); 1372 udp_hdr(skb)->check =
1326 1373 ~csum_ipv6_magic(&ipv6_hdr(skb)->saddr,
1327 header_size = skb->network_header + 1374 &ipv6_hdr(skb)->daddr,
1328 off + 1375 skb->len - off,
1329 sizeof(struct udphdr); 1376 IPPROTO_UDP, 0);
1330 maybe_pull_tail(skb, header_size);
1331
1332 udph->check = ~csum_ipv6_magic(&ipv6h->saddr,
1333 &ipv6h->daddr,
1334 skb->len - off,
1335 IPPROTO_UDP, 0);
1336 }
1337 break; 1377 break;
1338 default: 1378 default:
1339 if (net_ratelimit())
1340 netdev_err(vif->dev,
1341 "Attempting to checksum a non-TCP/UDP packet, "
1342 "dropping a protocol %d packet\n",
1343 nexthdr);
1344 goto out; 1379 goto out;
1345 } 1380 }
1346 1381
@@ -1410,14 +1445,15 @@ static bool tx_credit_exceeded(struct xenvif *vif, unsigned size)
1410 return false; 1445 return false;
1411} 1446}
1412 1447
1413static unsigned xenvif_tx_build_gops(struct xenvif *vif) 1448static unsigned xenvif_tx_build_gops(struct xenvif *vif, int budget)
1414{ 1449{
1415 struct gnttab_copy *gop = vif->tx_copy_ops, *request_gop; 1450 struct gnttab_copy *gop = vif->tx_copy_ops, *request_gop;
1416 struct sk_buff *skb; 1451 struct sk_buff *skb;
1417 int ret; 1452 int ret;
1418 1453
1419 while ((nr_pending_reqs(vif) + XEN_NETBK_LEGACY_SLOTS_MAX 1454 while ((nr_pending_reqs(vif) + XEN_NETBK_LEGACY_SLOTS_MAX
1420 < MAX_PENDING_REQS)) { 1455 < MAX_PENDING_REQS) &&
1456 (skb_queue_len(&vif->tx_queue) < budget)) {
1421 struct xen_netif_tx_request txreq; 1457 struct xen_netif_tx_request txreq;
1422 struct xen_netif_tx_request txfrags[XEN_NETBK_LEGACY_SLOTS_MAX]; 1458 struct xen_netif_tx_request txfrags[XEN_NETBK_LEGACY_SLOTS_MAX];
1423 struct page *page; 1459 struct page *page;
@@ -1439,7 +1475,7 @@ static unsigned xenvif_tx_build_gops(struct xenvif *vif)
1439 continue; 1475 continue;
1440 } 1476 }
1441 1477
1442 RING_FINAL_CHECK_FOR_REQUESTS(&vif->tx, work_to_do); 1478 work_to_do = RING_HAS_UNCONSUMED_REQUESTS(&vif->tx);
1443 if (!work_to_do) 1479 if (!work_to_do)
1444 break; 1480 break;
1445 1481
@@ -1579,14 +1615,13 @@ static unsigned xenvif_tx_build_gops(struct xenvif *vif)
1579} 1615}
1580 1616
1581 1617
1582static int xenvif_tx_submit(struct xenvif *vif, int budget) 1618static int xenvif_tx_submit(struct xenvif *vif)
1583{ 1619{
1584 struct gnttab_copy *gop = vif->tx_copy_ops; 1620 struct gnttab_copy *gop = vif->tx_copy_ops;
1585 struct sk_buff *skb; 1621 struct sk_buff *skb;
1586 int work_done = 0; 1622 int work_done = 0;
1587 1623
1588 while (work_done < budget && 1624 while ((skb = __skb_dequeue(&vif->tx_queue)) != NULL) {
1589 (skb = __skb_dequeue(&vif->tx_queue)) != NULL) {
1590 struct xen_netif_tx_request *txp; 1625 struct xen_netif_tx_request *txp;
1591 u16 pending_idx; 1626 u16 pending_idx;
1592 unsigned data_len; 1627 unsigned data_len;
@@ -1661,14 +1696,14 @@ int xenvif_tx_action(struct xenvif *vif, int budget)
1661 if (unlikely(!tx_work_todo(vif))) 1696 if (unlikely(!tx_work_todo(vif)))
1662 return 0; 1697 return 0;
1663 1698
1664 nr_gops = xenvif_tx_build_gops(vif); 1699 nr_gops = xenvif_tx_build_gops(vif, budget);
1665 1700
1666 if (nr_gops == 0) 1701 if (nr_gops == 0)
1667 return 0; 1702 return 0;
1668 1703
1669 gnttab_batch_copy(vif->tx_copy_ops, nr_gops); 1704 gnttab_batch_copy(vif->tx_copy_ops, nr_gops);
1670 1705
1671 work_done = xenvif_tx_submit(vif, nr_gops); 1706 work_done = xenvif_tx_submit(vif);
1672 1707
1673 return work_done; 1708 return work_done;
1674} 1709}