2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Definitions for the 'struct sk_buff' memory handlers.
|
|
|
|
*
|
|
|
|
* Authors:
|
|
|
|
* Alan Cox, <gw4pts@gw4pts.ampr.org>
|
|
|
|
* Florian La Roche, <rzsfl@rz.uni-sb.de>
|
|
|
|
*
|
|
|
|
* This program is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU General Public License
|
|
|
|
* as published by the Free Software Foundation; either version
|
|
|
|
* 2 of the License, or (at your option) any later version.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ifndef _LINUX_SKBUFF_H
|
|
|
|
#define _LINUX_SKBUFF_H
|
|
|
|
|
|
|
|
#include <linux/kernel.h>
|
|
|
|
#include <linux/compiler.h>
|
|
|
|
#include <linux/time.h>
|
2011-11-24 09:12:59 +08:00
|
|
|
#include <linux/bug.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <linux/cache.h>
|
2014-11-04 00:19:53 +08:00
|
|
|
#include <linux/rbtree.h>
|
2014-11-06 05:46:40 +08:00
|
|
|
#include <linux/socket.h>
|
2017-09-01 07:48:22 +08:00
|
|
|
#include <linux/refcount.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2011-07-27 07:09:06 +08:00
|
|
|
#include <linux/atomic.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <asm/types.h>
|
|
|
|
#include <linux/spinlock.h>
|
|
|
|
#include <linux/net.h>
|
2005-06-24 12:00:17 +08:00
|
|
|
#include <linux/textsearch.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
#include <net/checksum.h>
|
2006-12-05 04:41:19 +08:00
|
|
|
#include <linux/rcupdate.h>
|
2007-04-20 07:16:32 +08:00
|
|
|
#include <linux/hrtimer.h>
|
2011-08-19 14:25:00 +08:00
|
|
|
#include <linux/dma-mapping.h>
|
2011-11-15 23:29:55 +08:00
|
|
|
#include <linux/netdev_features.h>
|
2014-02-27 06:02:11 +08:00
|
|
|
#include <linux/sched.h>
|
2017-02-01 23:36:40 +08:00
|
|
|
#include <linux/sched/clock.h>
|
2015-05-12 20:56:07 +08:00
|
|
|
#include <net/flow_dissector.h>
|
2015-05-21 23:00:00 +08:00
|
|
|
#include <linux/splice.h>
|
2015-05-30 21:27:40 +08:00
|
|
|
#include <linux/in6.h>
|
2016-07-02 18:43:14 +08:00
|
|
|
#include <linux/if_packet.h>
|
2015-08-01 07:52:10 +08:00
|
|
|
#include <net/flow.h>
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2015-12-15 03:19:47 +08:00
|
|
|
/* The interface for checksum offload between the stack and networking drivers
|
|
|
|
* is as follows...
|
|
|
|
*
|
|
|
|
* A. IP checksum related features
|
|
|
|
*
|
|
|
|
* Drivers advertise checksum offload capabilities in the features of a device.
|
|
|
|
* From the stack's point of view these are capabilities offered by the driver,
|
|
|
|
* a driver typically only advertises features that it is capable of offloading
|
|
|
|
* to its device.
|
|
|
|
*
|
|
|
|
* The checksum related features are:
|
|
|
|
*
|
|
|
|
* NETIF_F_HW_CSUM - The driver (or its device) is able to compute one
|
|
|
|
* IP (one's complement) checksum for any combination
|
|
|
|
* of protocols or protocol layering. The checksum is
|
|
|
|
* computed and set in a packet per the CHECKSUM_PARTIAL
|
|
|
|
* interface (see below).
|
|
|
|
*
|
|
|
|
* NETIF_F_IP_CSUM - Driver (device) is only able to checksum plain
|
|
|
|
* TCP or UDP packets over IPv4. These are specifically
|
|
|
|
* unencapsulated packets of the form IPv4|TCP or
|
|
|
|
* IPv4|UDP where the Protocol field in the IPv4 header
|
|
|
|
* is TCP or UDP. The IPv4 header may contain IP options
|
|
|
|
* This feature cannot be set in features for a device
|
|
|
|
* with NETIF_F_HW_CSUM also set. This feature is being
|
|
|
|
* DEPRECATED (see below).
|
|
|
|
*
|
|
|
|
* NETIF_F_IPV6_CSUM - Driver (device) is only able to checksum plain
|
|
|
|
* TCP or UDP packets over IPv6. These are specifically
|
|
|
|
* unencapsulated packets of the form IPv6|TCP or
|
|
|
|
* IPv4|UDP where the Next Header field in the IPv6
|
|
|
|
* header is either TCP or UDP. IPv6 extension headers
|
|
|
|
* are not supported with this feature. This feature
|
|
|
|
* cannot be set in features for a device with
|
|
|
|
* NETIF_F_HW_CSUM also set. This feature is being
|
|
|
|
* DEPRECATED (see below).
|
|
|
|
*
|
|
|
|
* NETIF_F_RXCSUM - Driver (device) performs receive checksum offload.
|
|
|
|
* This flag is used only used to disable the RX checksum
|
|
|
|
* feature for a device. The stack will accept receive
|
|
|
|
* checksum indication in packets received on a device
|
|
|
|
* regardless of whether NETIF_F_RXCSUM is set.
|
|
|
|
*
|
|
|
|
* B. Checksumming of received packets by device. Indication of checksum
|
|
|
|
* verification is in set skb->ip_summed. Possible values are:
|
2013-12-17 06:27:09 +08:00
|
|
|
*
|
|
|
|
* CHECKSUM_NONE:
|
|
|
|
*
|
2015-12-15 03:19:47 +08:00
|
|
|
* Device did not checksum this packet e.g. due to lack of capabilities.
|
2013-12-17 06:27:09 +08:00
|
|
|
* The packet contains full (though not verified) checksum in packet but
|
|
|
|
* not in skb->csum. Thus, skb->csum is undefined in this case.
|
|
|
|
*
|
|
|
|
* CHECKSUM_UNNECESSARY:
|
|
|
|
*
|
|
|
|
* The hardware you're dealing with doesn't calculate the full checksum
|
|
|
|
* (as in CHECKSUM_COMPLETE), but it does parse headers and verify checksums
|
2014-08-28 12:26:46 +08:00
|
|
|
* for specific protocols. For such packets it will set CHECKSUM_UNNECESSARY
|
|
|
|
* if their checksums are okay. skb->csum is still undefined in this case
|
2015-12-15 03:19:47 +08:00
|
|
|
* though. A driver or device must never modify the checksum field in the
|
|
|
|
* packet even if checksum is verified.
|
2014-08-28 12:26:46 +08:00
|
|
|
*
|
|
|
|
* CHECKSUM_UNNECESSARY is applicable to following protocols:
|
|
|
|
* TCP: IPv6 and IPv4.
|
|
|
|
* UDP: IPv4 and IPv6. A device may apply CHECKSUM_UNNECESSARY to a
|
|
|
|
* zero UDP checksum for either IPv4 or IPv6, the networking stack
|
|
|
|
* may perform further validation in this case.
|
|
|
|
* GRE: only if the checksum is present in the header.
|
|
|
|
* SCTP: indicates the CRC in SCTP header has been validated.
|
2017-05-18 21:44:43 +08:00
|
|
|
* FCOE: indicates the CRC in FC frame has been validated.
|
2014-08-28 12:26:46 +08:00
|
|
|
*
|
|
|
|
* skb->csum_level indicates the number of consecutive checksums found in
|
|
|
|
* the packet minus one that have been verified as CHECKSUM_UNNECESSARY.
|
|
|
|
* For instance if a device receives an IPv6->UDP->GRE->IPv4->TCP packet
|
|
|
|
* and a device is able to verify the checksums for UDP (possibly zero),
|
|
|
|
* GRE (checksum flag is set), and TCP-- skb->csum_level would be set to
|
|
|
|
* two. If the device were only able to verify the UDP checksum and not
|
|
|
|
* GRE, either because it doesn't support GRE checksum of because GRE
|
|
|
|
* checksum is bad, skb->csum_level would be set to zero (TCP checksum is
|
|
|
|
* not considered in this case).
|
2013-12-17 06:27:09 +08:00
|
|
|
*
|
|
|
|
* CHECKSUM_COMPLETE:
|
|
|
|
*
|
|
|
|
* This is the most generic way. The device supplied checksum of the _whole_
|
|
|
|
* packet as seen by netif_rx() and fills out in skb->csum. Meaning, the
|
|
|
|
* hardware doesn't need to parse L3/L4 headers to implement this.
|
|
|
|
*
|
2017-05-18 21:44:43 +08:00
|
|
|
* Notes:
|
|
|
|
* - Even if device supports only some protocols, but is able to produce
|
|
|
|
* skb->csum, it MUST use CHECKSUM_COMPLETE, not CHECKSUM_UNNECESSARY.
|
|
|
|
* - CHECKSUM_COMPLETE is not applicable to SCTP and FCoE protocols.
|
2013-12-17 06:27:09 +08:00
|
|
|
*
|
|
|
|
* CHECKSUM_PARTIAL:
|
|
|
|
*
|
2015-02-11 08:30:28 +08:00
|
|
|
* A checksum is set up to be offloaded to a device as described in the
|
|
|
|
* output description for CHECKSUM_PARTIAL. This may occur on a packet
|
2013-12-17 06:27:09 +08:00
|
|
|
* received directly from another Linux OS, e.g., a virtualized Linux kernel
|
2015-02-11 08:30:28 +08:00
|
|
|
* on the same host, or it may be set in the input path in GRO or remote
|
|
|
|
* checksum offload. For the purposes of checksum verification, the checksum
|
|
|
|
* referred to by skb->csum_start + skb->csum_offset and any preceding
|
|
|
|
* checksums in the packet are considered verified. Any checksums in the
|
|
|
|
* packet that are after the checksum being offloaded are not considered to
|
|
|
|
* be verified.
|
2013-12-17 06:27:09 +08:00
|
|
|
*
|
2015-12-15 03:19:47 +08:00
|
|
|
* C. Checksumming on transmit for non-GSO. The stack requests checksum offload
|
|
|
|
* in the skb->ip_summed for a packet. Values are:
|
2013-12-17 06:27:09 +08:00
|
|
|
*
|
|
|
|
* CHECKSUM_PARTIAL:
|
|
|
|
*
|
2015-12-15 03:19:47 +08:00
|
|
|
* The driver is required to checksum the packet as seen by hard_start_xmit()
|
2013-12-17 06:27:09 +08:00
|
|
|
* from skb->csum_start up to the end, and to record/write the checksum at
|
2015-12-15 03:19:47 +08:00
|
|
|
* offset skb->csum_start + skb->csum_offset. A driver may verify that the
|
|
|
|
* csum_start and csum_offset values are valid values given the length and
|
|
|
|
* offset of the packet, however they should not attempt to validate that the
|
|
|
|
* checksum refers to a legitimate transport layer checksum-- it is the
|
|
|
|
* purview of the stack to validate that csum_start and csum_offset are set
|
|
|
|
* correctly.
|
|
|
|
*
|
|
|
|
* When the stack requests checksum offload for a packet, the driver MUST
|
|
|
|
* ensure that the checksum is set correctly. A driver can either offload the
|
|
|
|
* checksum calculation to the device, or call skb_checksum_help (in the case
|
|
|
|
* that the device does not support offload for a particular checksum).
|
|
|
|
*
|
|
|
|
* NETIF_F_IP_CSUM and NETIF_F_IPV6_CSUM are being deprecated in favor of
|
|
|
|
* NETIF_F_HW_CSUM. New devices should use NETIF_F_HW_CSUM to indicate
|
2017-05-18 21:44:41 +08:00
|
|
|
* checksum offload capability.
|
|
|
|
* skb_csum_hwoffload_help() can be called to resolve CHECKSUM_PARTIAL based
|
|
|
|
* on network device checksumming capabilities: if a packet does not match
|
|
|
|
* them, skb_checksum_help or skb_crc32c_help (depending on the value of
|
|
|
|
* csum_not_inet, see item D.) is called to resolve the checksum.
|
2013-12-17 06:27:09 +08:00
|
|
|
*
|
2015-12-15 03:19:47 +08:00
|
|
|
* CHECKSUM_NONE:
|
2013-12-17 06:27:09 +08:00
|
|
|
*
|
2015-12-15 03:19:47 +08:00
|
|
|
* The skb was already checksummed by the protocol, or a checksum is not
|
|
|
|
* required.
|
2013-12-17 06:27:09 +08:00
|
|
|
*
|
|
|
|
* CHECKSUM_UNNECESSARY:
|
|
|
|
*
|
2015-12-15 03:19:47 +08:00
|
|
|
* This has the same meaning on as CHECKSUM_NONE for checksum offload on
|
|
|
|
* output.
|
2013-12-17 06:27:09 +08:00
|
|
|
*
|
2015-12-15 03:19:47 +08:00
|
|
|
* CHECKSUM_COMPLETE:
|
|
|
|
* Not used in checksum output. If a driver observes a packet with this value
|
|
|
|
* set in skbuff, if should treat as CHECKSUM_NONE being set.
|
|
|
|
*
|
|
|
|
* D. Non-IP checksum (CRC) offloads
|
|
|
|
*
|
|
|
|
* NETIF_F_SCTP_CRC - This feature indicates that a device is capable of
|
|
|
|
* offloading the SCTP CRC in a packet. To perform this offload the stack
|
2017-05-18 21:44:40 +08:00
|
|
|
* will set set csum_start and csum_offset accordingly, set ip_summed to
|
|
|
|
* CHECKSUM_PARTIAL and set csum_not_inet to 1, to provide an indication in
|
|
|
|
* the skbuff that the CHECKSUM_PARTIAL refers to CRC32c.
|
|
|
|
* A driver that supports both IP checksum offload and SCTP CRC32c offload
|
|
|
|
* must verify which offload is configured for a packet by testing the
|
|
|
|
* value of skb->csum_not_inet; skb_crc32c_csum_help is provided to resolve
|
|
|
|
* CHECKSUM_PARTIAL on skbs where csum_not_inet is set to 1.
|
2015-12-15 03:19:47 +08:00
|
|
|
*
|
|
|
|
* NETIF_F_FCOE_CRC - This feature indicates that a device is capable of
|
|
|
|
* offloading the FCOE CRC in a packet. To perform this offload the stack
|
|
|
|
* will set ip_summed to CHECKSUM_PARTIAL and set csum_start and csum_offset
|
|
|
|
* accordingly. Note the there is no indication in the skbuff that the
|
|
|
|
* CHECKSUM_PARTIAL refers to an FCOE checksum, a driver that supports
|
|
|
|
* both IP checksum offload and FCOE CRC offload must verify which offload
|
|
|
|
* is configured for a packet presumably by inspecting packet headers.
|
|
|
|
*
|
|
|
|
* E. Checksumming on output with GSO.
|
|
|
|
*
|
|
|
|
* In the case of a GSO packet (skb_is_gso(skb) is true), checksum offload
|
|
|
|
* is implied by the SKB_GSO_* flags in gso_type. Most obviously, if the
|
|
|
|
* gso_type is SKB_GSO_TCPV4 or SKB_GSO_TCPV6, TCP checksum offload as
|
|
|
|
* part of the GSO operation is implied. If a checksum is being offloaded
|
|
|
|
* with GSO then ip_summed is CHECKSUM_PARTIAL, csum_start and csum_offset
|
|
|
|
* are set to refer to the outermost checksum being offload (two offloaded
|
|
|
|
* checksums are possible with UDP encapsulation).
|
2013-12-17 06:27:09 +08:00
|
|
|
*/
|
|
|
|
|
2007-04-10 02:59:39 +08:00
|
|
|
/* Don't change this without changing skb_csum_unnecessary! */
|
2013-12-17 06:27:09 +08:00
|
|
|
#define CHECKSUM_NONE 0
|
|
|
|
#define CHECKSUM_UNNECESSARY 1
|
|
|
|
#define CHECKSUM_COMPLETE 2
|
|
|
|
#define CHECKSUM_PARTIAL 3
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-08-28 12:26:46 +08:00
|
|
|
/* Maximum value in skb->csum_level */
|
|
|
|
#define SKB_MAX_CSUM_LEVEL 3
|
|
|
|
|
2014-07-22 18:06:23 +08:00
|
|
|
#define SKB_DATA_ALIGN(X) ALIGN(X, SMP_CACHE_BYTES)
|
2007-03-26 11:27:59 +08:00
|
|
|
#define SKB_WITH_OVERHEAD(X) \
|
2007-10-22 07:27:46 +08:00
|
|
|
((X) - SKB_DATA_ALIGN(sizeof(struct skb_shared_info)))
|
2007-03-26 11:27:59 +08:00
|
|
|
#define SKB_MAX_ORDER(X, ORDER) \
|
|
|
|
SKB_WITH_OVERHEAD((PAGE_SIZE << (ORDER)) - (X))
|
2005-04-17 06:20:36 +08:00
|
|
|
#define SKB_MAX_HEAD(X) (SKB_MAX_ORDER((X), 0))
|
|
|
|
#define SKB_MAX_ALLOC (SKB_MAX_ORDER(0, 2))
|
|
|
|
|
2011-10-13 15:28:54 +08:00
|
|
|
/* return minimum truesize of one skb containing X bytes of data */
|
|
|
|
#define SKB_TRUESIZE(X) ((X) + \
|
|
|
|
SKB_DATA_ALIGN(sizeof(struct sk_buff)) + \
|
|
|
|
SKB_DATA_ALIGN(sizeof(struct skb_shared_info)))
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
struct net_device;
|
2007-04-03 11:19:53 +08:00
|
|
|
struct scatterlist;
|
2007-11-07 15:30:13 +08:00
|
|
|
struct pipe_inode_info;
|
2014-11-07 21:22:22 +08:00
|
|
|
struct iov_iter;
|
2014-12-10 11:40:49 +08:00
|
|
|
struct napi_struct;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-03-24 02:17:07 +08:00
|
|
|
#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
|
2005-04-17 06:20:36 +08:00
|
|
|
struct nf_conntrack {
|
|
|
|
atomic_t use;
|
|
|
|
};
|
2007-03-24 02:17:07 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-09-18 17:29:03 +08:00
|
|
|
#if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
|
2005-04-17 06:20:36 +08:00
|
|
|
struct nf_bridge_info {
|
2017-06-30 18:07:57 +08:00
|
|
|
refcount_t use;
|
2015-04-02 20:31:44 +08:00
|
|
|
enum {
|
|
|
|
BRNF_PROTO_UNCHANGED,
|
|
|
|
BRNF_PROTO_8021Q,
|
|
|
|
BRNF_PROTO_PPPOE
|
2015-05-04 04:05:28 +08:00
|
|
|
} orig_proto:8;
|
2015-07-23 22:21:30 +08:00
|
|
|
u8 pkt_otherhost:1;
|
|
|
|
u8 in_prerouting:1;
|
|
|
|
u8 bridged_dnat:1;
|
2015-05-30 21:28:28 +08:00
|
|
|
__u16 frag_max_size;
|
2012-04-19 07:19:25 +08:00
|
|
|
struct net_device *physindev;
|
2015-09-14 23:06:27 +08:00
|
|
|
|
|
|
|
/* always valid & non-NULL from FORWARD on, for physdev match */
|
|
|
|
struct net_device *physoutdev;
|
2015-05-04 04:05:28 +08:00
|
|
|
union {
|
2015-07-23 22:21:30 +08:00
|
|
|
/* prerouting: detect dnat in orig/reply direction */
|
2015-05-30 21:27:40 +08:00
|
|
|
__be32 ipv4_daddr;
|
|
|
|
struct in6_addr ipv6_daddr;
|
2015-07-23 22:21:30 +08:00
|
|
|
|
|
|
|
/* after prerouting + nat detected: store original source
|
|
|
|
* mac since neigh resolution overwrites it, only used while
|
|
|
|
* skb is out in neigh layer.
|
|
|
|
*/
|
|
|
|
char neigh_header[8];
|
2015-05-30 21:27:40 +08:00
|
|
|
};
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
#endif
|
|
|
|
|
|
|
|
struct sk_buff_head {
|
|
|
|
/* These two members must be first. */
|
|
|
|
struct sk_buff *next;
|
|
|
|
struct sk_buff *prev;
|
|
|
|
|
|
|
|
__u32 qlen;
|
|
|
|
spinlock_t lock;
|
|
|
|
};
|
|
|
|
|
|
|
|
struct sk_buff;
|
|
|
|
|
2011-12-23 07:39:14 +08:00
|
|
|
/* To allow 64K frame to be packed as single skb without frag_list we
|
|
|
|
* require 64K/PAGE_SIZE pages plus 1 additional page to allow for
|
|
|
|
* buffers which do not start on a page boundary.
|
|
|
|
*
|
|
|
|
* Since GRO uses frags we allocate at least 16 regardless of page
|
|
|
|
* size.
|
2011-03-27 22:57:26 +08:00
|
|
|
*/
|
2011-12-23 07:39:14 +08:00
|
|
|
#if (65536/PAGE_SIZE + 1) < 16
|
2011-03-30 14:34:08 +08:00
|
|
|
#define MAX_SKB_FRAGS 16UL
|
2011-03-27 22:57:26 +08:00
|
|
|
#else
|
2011-12-23 07:39:14 +08:00
|
|
|
#define MAX_SKB_FRAGS (65536/PAGE_SIZE + 1)
|
2011-03-27 22:57:26 +08:00
|
|
|
#endif
|
2016-02-03 16:26:57 +08:00
|
|
|
extern int sysctl_max_skb_frags;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2016-06-03 02:05:40 +08:00
|
|
|
/* Set skb_shinfo(skb)->gso_size to this in case you want skb_segment to
|
|
|
|
* segment using its current segmentation instead.
|
|
|
|
*/
|
|
|
|
#define GSO_BY_FRAGS 0xFFFF
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
typedef struct skb_frag_struct skb_frag_t;
|
|
|
|
|
|
|
|
struct skb_frag_struct {
|
2011-10-20 07:01:49 +08:00
|
|
|
struct {
|
|
|
|
struct page *p;
|
|
|
|
} page;
|
2010-09-23 13:06:54 +08:00
|
|
|
#if (BITS_PER_LONG > 32) || (PAGE_SIZE >= 65536)
|
2007-07-31 09:47:03 +08:00
|
|
|
__u32 page_offset;
|
|
|
|
__u32 size;
|
2010-09-23 13:06:54 +08:00
|
|
|
#else
|
|
|
|
__u16 page_offset;
|
|
|
|
__u16 size;
|
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
2011-10-19 05:00:24 +08:00
|
|
|
static inline unsigned int skb_frag_size(const skb_frag_t *frag)
|
|
|
|
{
|
|
|
|
return frag->size;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_frag_size_set(skb_frag_t *frag, unsigned int size)
|
|
|
|
{
|
|
|
|
frag->size = size;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_frag_size_add(skb_frag_t *frag, int delta)
|
|
|
|
{
|
|
|
|
frag->size += delta;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_frag_size_sub(skb_frag_t *frag, int delta)
|
|
|
|
{
|
|
|
|
frag->size -= delta;
|
|
|
|
}
|
|
|
|
|
2017-07-31 20:15:47 +08:00
|
|
|
static inline bool skb_frag_must_loop(struct page *p)
|
|
|
|
{
|
|
|
|
#if defined(CONFIG_HIGHMEM)
|
|
|
|
if (PageHighMem(p))
|
|
|
|
return true;
|
|
|
|
#endif
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_frag_foreach_page - loop over pages in a fragment
|
|
|
|
*
|
|
|
|
* @f: skb frag to operate on
|
|
|
|
* @f_off: offset from start of f->page.p
|
|
|
|
* @f_len: length from f_off to loop over
|
|
|
|
* @p: (temp var) current page
|
|
|
|
* @p_off: (temp var) offset from start of current page,
|
|
|
|
* non-zero only on first page.
|
|
|
|
* @p_len: (temp var) length in current page,
|
|
|
|
* < PAGE_SIZE only on first and last page.
|
|
|
|
* @copied: (temp var) length so far, excluding current p_len.
|
|
|
|
*
|
|
|
|
* A fragment can hold a compound page, in which case per-page
|
|
|
|
* operations, notably kmap_atomic, must be called for each
|
|
|
|
* regular page.
|
|
|
|
*/
|
|
|
|
#define skb_frag_foreach_page(f, f_off, f_len, p, p_off, p_len, copied) \
|
|
|
|
for (p = skb_frag_page(f) + ((f_off) >> PAGE_SHIFT), \
|
|
|
|
p_off = (f_off) & (PAGE_SIZE - 1), \
|
|
|
|
p_len = skb_frag_must_loop(p) ? \
|
|
|
|
min_t(u32, f_len, PAGE_SIZE - p_off) : f_len, \
|
|
|
|
copied = 0; \
|
|
|
|
copied < f_len; \
|
|
|
|
copied += p_len, p++, p_off = 0, \
|
|
|
|
p_len = min_t(u32, f_len - copied, PAGE_SIZE)) \
|
|
|
|
|
2009-02-12 13:03:37 +08:00
|
|
|
#define HAVE_HW_TIME_STAMP
|
|
|
|
|
|
|
|
/**
|
2009-03-02 19:15:58 +08:00
|
|
|
* struct skb_shared_hwtstamps - hardware time stamps
|
2009-02-12 13:03:37 +08:00
|
|
|
* @hwtstamp: hardware time stamp transformed into duration
|
|
|
|
* since arbitrary point in time
|
|
|
|
*
|
|
|
|
* Software time stamps generated by ktime_get_real() are stored in
|
2014-07-26 06:01:32 +08:00
|
|
|
* skb->tstamp.
|
2009-02-12 13:03:37 +08:00
|
|
|
*
|
|
|
|
* hwtstamps can only be compared against other hwtstamps from
|
|
|
|
* the same device.
|
|
|
|
*
|
|
|
|
* This structure is attached to packets as part of the
|
|
|
|
* &skb_shared_info. Use skb_hwtstamps() to get a pointer.
|
|
|
|
*/
|
|
|
|
struct skb_shared_hwtstamps {
|
|
|
|
ktime_t hwtstamp;
|
|
|
|
};
|
|
|
|
|
2010-08-17 16:59:14 +08:00
|
|
|
/* Definitions for tx_flags in struct skb_shared_info */
|
|
|
|
enum {
|
|
|
|
/* generate hardware time stamp */
|
|
|
|
SKBTX_HW_TSTAMP = 1 << 0,
|
|
|
|
|
2014-08-05 10:11:48 +08:00
|
|
|
/* generate software time stamp when queueing packet to NIC */
|
2010-08-17 16:59:14 +08:00
|
|
|
SKBTX_SW_TSTAMP = 1 << 1,
|
|
|
|
|
|
|
|
/* device driver is going to provide hardware time stamp */
|
|
|
|
SKBTX_IN_PROGRESS = 1 << 2,
|
|
|
|
|
2011-07-06 20:22:12 +08:00
|
|
|
/* device driver supports TX zero-copy buffers */
|
2012-06-14 14:42:44 +08:00
|
|
|
SKBTX_DEV_ZEROCOPY = 1 << 3,
|
2011-11-09 17:15:42 +08:00
|
|
|
|
|
|
|
/* generate wifi status information (where possible) */
|
2012-06-14 14:42:44 +08:00
|
|
|
SKBTX_WIFI_STATUS = 1 << 4,
|
2013-02-11 17:27:41 +08:00
|
|
|
|
|
|
|
/* This indicates at least one fragment might be overwritten
|
|
|
|
* (as in vmsplice(), sendfile() ...)
|
|
|
|
* If we need to compute a TX checksum, we'll need to copy
|
|
|
|
* all frags to avoid possible bad checksum
|
|
|
|
*/
|
|
|
|
SKBTX_SHARED_FRAG = 1 << 5,
|
2014-08-05 10:11:48 +08:00
|
|
|
|
|
|
|
/* generate software time stamp when entering packet scheduling */
|
|
|
|
SKBTX_SCHED_TSTAMP = 1 << 6,
|
2011-07-06 20:22:12 +08:00
|
|
|
};
|
|
|
|
|
2017-08-04 04:29:39 +08:00
|
|
|
#define SKBTX_ZEROCOPY_FRAG (SKBTX_DEV_ZEROCOPY | SKBTX_SHARED_FRAG)
|
2014-08-05 10:11:50 +08:00
|
|
|
#define SKBTX_ANY_SW_TSTAMP (SKBTX_SW_TSTAMP | \
|
2016-04-28 11:39:01 +08:00
|
|
|
SKBTX_SCHED_TSTAMP)
|
2014-08-05 10:11:45 +08:00
|
|
|
#define SKBTX_ANY_TSTAMP (SKBTX_HW_TSTAMP | SKBTX_ANY_SW_TSTAMP)
|
|
|
|
|
2011-07-06 20:22:12 +08:00
|
|
|
/*
|
|
|
|
* The callback notifies userspace to release buffers when skb DMA is done in
|
|
|
|
* lower device, the skb last reference should be 0 when calling this.
|
2012-11-01 17:16:22 +08:00
|
|
|
* The zerocopy_success argument is true if zero copy transmit occurred,
|
|
|
|
* false on data copy or out of memory error caused by data copy attempt.
|
2012-04-09 08:24:02 +08:00
|
|
|
* The ctx field is used to track device context.
|
|
|
|
* The desc field is used to track userspace buffer index.
|
2011-07-06 20:22:12 +08:00
|
|
|
*/
|
|
|
|
struct ubuf_info {
|
2012-11-01 17:16:22 +08:00
|
|
|
void (*callback)(struct ubuf_info *, bool zerocopy_success);
|
2017-08-04 04:29:42 +08:00
|
|
|
union {
|
|
|
|
struct {
|
|
|
|
unsigned long desc;
|
|
|
|
void *ctx;
|
|
|
|
};
|
|
|
|
struct {
|
|
|
|
u32 id;
|
|
|
|
u16 len;
|
|
|
|
u16 zerocopy:1;
|
|
|
|
u32 bytelen;
|
|
|
|
};
|
|
|
|
};
|
2017-09-01 07:48:22 +08:00
|
|
|
refcount_t refcnt;
|
2017-08-04 04:29:43 +08:00
|
|
|
|
|
|
|
struct mmpin {
|
|
|
|
struct user_struct *user;
|
|
|
|
unsigned int num_pg;
|
|
|
|
} mmp;
|
2009-02-12 13:03:37 +08:00
|
|
|
};
|
|
|
|
|
2017-08-04 04:29:39 +08:00
|
|
|
#define skb_uarg(SKB) ((struct ubuf_info *)(skb_shinfo(SKB)->destructor_arg))
|
|
|
|
|
|
|
|
struct ubuf_info *sock_zerocopy_alloc(struct sock *sk, size_t size);
|
2017-08-04 04:29:42 +08:00
|
|
|
struct ubuf_info *sock_zerocopy_realloc(struct sock *sk, size_t size,
|
|
|
|
struct ubuf_info *uarg);
|
2017-08-04 04:29:39 +08:00
|
|
|
|
|
|
|
static inline void sock_zerocopy_get(struct ubuf_info *uarg)
|
|
|
|
{
|
2017-09-01 07:48:22 +08:00
|
|
|
refcount_inc(&uarg->refcnt);
|
2017-08-04 04:29:39 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
void sock_zerocopy_put(struct ubuf_info *uarg);
|
|
|
|
void sock_zerocopy_put_abort(struct ubuf_info *uarg);
|
|
|
|
|
|
|
|
void sock_zerocopy_callback(struct ubuf_info *uarg, bool success);
|
|
|
|
|
|
|
|
int skb_zerocopy_iter_stream(struct sock *sk, struct sk_buff *skb,
|
|
|
|
struct msghdr *msg, int len,
|
|
|
|
struct ubuf_info *uarg);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* This data is invariant across clones and lives at
|
|
|
|
* the end of the header data, ie. at skb->end.
|
|
|
|
*/
|
|
|
|
struct skb_shared_info {
|
bpf: add meta pointer for direct access
This work enables generic transfer of metadata from XDP into skb. The
basic idea is that we can make use of the fact that the resulting skb
must be linear and already comes with a larger headroom for supporting
bpf_xdp_adjust_head(), which mangles xdp->data. Here, we base our work
on a similar principle and introduce a small helper bpf_xdp_adjust_meta()
for adjusting a new pointer called xdp->data_meta. Thus, the packet has
a flexible and programmable room for meta data, followed by the actual
packet data. struct xdp_buff is therefore laid out that we first point
to data_hard_start, then data_meta directly prepended to data followed
by data_end marking the end of packet. bpf_xdp_adjust_head() takes into
account whether we have meta data already prepended and if so, memmove()s
this along with the given offset provided there's enough room.
xdp->data_meta is optional and programs are not required to use it. The
rationale is that when we process the packet in XDP (e.g. as DoS filter),
we can push further meta data along with it for the XDP_PASS case, and
give the guarantee that a clsact ingress BPF program on the same device
can pick this up for further post-processing. Since we work with skb
there, we can also set skb->mark, skb->priority or other skb meta data
out of BPF, thus having this scratch space generic and programmable
allows for more flexibility than defining a direct 1:1 transfer of
potentially new XDP members into skb (it's also more efficient as we
don't need to initialize/handle each of such new members). The facility
also works together with GRO aggregation. The scratch space at the head
of the packet can be multiple of 4 byte up to 32 byte large. Drivers not
yet supporting xdp->data_meta can simply be set up with xdp->data_meta
as xdp->data + 1 as bpf_xdp_adjust_meta() will detect this and bail out,
such that the subsequent match against xdp->data for later access is
guaranteed to fail.
The verifier treats xdp->data_meta/xdp->data the same way as we treat
xdp->data/xdp->data_end pointer comparisons. The requirement for doing
the compare against xdp->data is that it hasn't been modified from it's
original address we got from ctx access. It may have a range marking
already from prior successful xdp->data/xdp->data_end pointer comparisons
though.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-25 08:25:51 +08:00
|
|
|
__u8 __unused;
|
|
|
|
__u8 meta_len;
|
|
|
|
__u8 nr_frags;
|
2012-01-05 15:13:39 +08:00
|
|
|
__u8 tx_flags;
|
2006-06-22 17:40:14 +08:00
|
|
|
unsigned short gso_size;
|
|
|
|
/* Warning: this field is not always filled in (UFO)! */
|
|
|
|
unsigned short gso_segs;
|
2005-04-17 06:20:36 +08:00
|
|
|
struct sk_buff *frag_list;
|
2009-02-12 13:03:37 +08:00
|
|
|
struct skb_shared_hwtstamps hwtstamps;
|
skbuff: Extend gso_type to unsigned int.
All available gso_type flags are currently in use, so
extend gso_type from 'unsigned short' to 'unsigned int'
to be able to add further flags.
We reorder the struct skb_shared_info to use
two bytes of the four byte hole before dataref.
All fields before dataref are cleared, i.e.
four bytes more than before the change.
The remaining two byte hole is moved to the
beginning of the structure, this protects us
from immediate overwites on out of bound writes
to the sk_buff head.
Structure layout on x86-64 before the change:
struct skb_shared_info {
unsigned char nr_frags; /* 0 1 */
__u8 tx_flags; /* 1 1 */
short unsigned int gso_size; /* 2 2 */
short unsigned int gso_segs; /* 4 2 */
short unsigned int gso_type; /* 6 2 */
struct sk_buff * frag_list; /* 8 8 */
struct skb_shared_hwtstamps hwtstamps; /* 16 8 */
u32 tskey; /* 24 4 */
__be32 ip6_frag_id; /* 28 4 */
atomic_t dataref; /* 32 4 */
/* XXX 4 bytes hole, try to pack */
void * destructor_arg; /* 40 8 */
skb_frag_t frags[17]; /* 48 272 */
/* --- cacheline 5 boundary (320 bytes) --- */
/* size: 320, cachelines: 5, members: 12 */
/* sum members: 316, holes: 1, sum holes: 4 */
};
Structure layout on x86-64 after the change:
struct skb_shared_info {
short unsigned int _unused; /* 0 2 */
unsigned char nr_frags; /* 2 1 */
__u8 tx_flags; /* 3 1 */
short unsigned int gso_size; /* 4 2 */
short unsigned int gso_segs; /* 6 2 */
struct sk_buff * frag_list; /* 8 8 */
struct skb_shared_hwtstamps hwtstamps; /* 16 8 */
unsigned int gso_type; /* 24 4 */
u32 tskey; /* 28 4 */
__be32 ip6_frag_id; /* 32 4 */
atomic_t dataref; /* 36 4 */
void * destructor_arg; /* 40 8 */
skb_frag_t frags[17]; /* 48 272 */
/* --- cacheline 5 boundary (320 bytes) --- */
/* size: 320, cachelines: 5, members: 13 */
};
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Acked-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-04-09 02:36:24 +08:00
|
|
|
unsigned int gso_type;
|
2014-08-05 10:11:47 +08:00
|
|
|
u32 tskey;
|
2010-05-05 16:07:37 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Warning : all fields before dataref are cleared in __alloc_skb()
|
|
|
|
*/
|
|
|
|
atomic_t dataref;
|
|
|
|
|
2009-05-19 13:11:22 +08:00
|
|
|
/* Intermediate layers must ensure that destructor_arg
|
|
|
|
* remains valid until skb destructor */
|
|
|
|
void * destructor_arg;
|
2011-07-06 20:22:12 +08:00
|
|
|
|
2010-07-23 03:09:08 +08:00
|
|
|
/* must be last field, see pskb_expand_head() */
|
|
|
|
skb_frag_t frags[MAX_SKB_FRAGS];
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/* We divide dataref into two halves. The higher 16 bits hold references
|
|
|
|
* to the payload part of skb->data. The lower 16 bits hold references to
|
[SKBUFF]: Keep track of writable header len of headerless clones
Currently NAT (and others) that want to modify cloned skbs copy them,
even if in the vast majority of cases its not necessary because the
skb is a clone made by TCP and the portion NAT wants to modify is
actually writable because TCP release the header reference before
cloning.
The problem is that there is no clean way for NAT to find out how
long the writable header area is, so this patch introduces skb->hdr_len
to hold this length. When a headerless skb is cloned skb->hdr_len
is set to the current headroom, for regular clones it is copied from
the original. A new function skb_clone_writable(skb, len) returns
whether the skb is writable up to len bytes from skb->data. To avoid
enlarging the skb the mac_len field is reduced to 16 bit and the
new hdr_len field is put in the remaining 16 bit.
I've done a few rough benchmarks of NAT (not with this exact patch,
but a very similar one). As expected it saves huge amounts of system
time in case of sendfile, bringing it down to basically the same
amount as without NAT, with sendmsg it only helps on loopback,
probably because of the large MTU.
Transmit a 1GB file using sendfile/sendmsg over eth0/lo with and
without NAT:
- sendfile eth0, no NAT: sys 0m0.388s
- sendfile eth0, NAT: sys 0m1.835s
- sendfile eth0: NAT + path: sys 0m0.370s (~ -80%)
- sendfile lo, no NAT: sys 0m0.258s
- sendfile lo, NAT: sys 0m2.609s
- sendfile lo, NAT + patch: sys 0m0.260s (~ -90%)
- sendmsg eth0, no NAT: sys 0m2.508s
- sendmsg eth0, NAT: sys 0m2.539s
- sendmsg eth0, NAT + patch: sys 0m2.445s (no change)
- sendmsg lo, no NAT: sys 0m2.151s
- sendmsg lo, NAT: sys 0m3.557s
- sendmsg lo, NAT + patch: sys 0m2.159s (~ -40%)
I expect other users can see a similar performance improvement,
packet mangling iptables targets, ipip and ip_gre come to mind ..
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-06-25 19:35:20 +08:00
|
|
|
* the entire skb->data. A clone of a headerless skb holds the length of
|
|
|
|
* the header in skb->hdr_len.
|
2005-04-17 06:20:36 +08:00
|
|
|
*
|
|
|
|
* All users must obey the rule that the skb->data reference count must be
|
|
|
|
* greater than or equal to the payload reference count.
|
|
|
|
*
|
|
|
|
* Holding a reference to the payload part means that the user does not
|
|
|
|
* care about modifications to the header part of skb->data.
|
|
|
|
*/
|
|
|
|
#define SKB_DATAREF_SHIFT 16
|
|
|
|
#define SKB_DATAREF_MASK ((1 << SKB_DATAREF_SHIFT) - 1)
|
|
|
|
|
2005-08-18 05:57:30 +08:00
|
|
|
|
|
|
|
enum {
|
2014-10-03 01:00:43 +08:00
|
|
|
SKB_FCLONE_UNAVAILABLE, /* skb has no fclone (from head_cache) */
|
|
|
|
SKB_FCLONE_ORIG, /* orig skb (from fclone_cache) */
|
|
|
|
SKB_FCLONE_CLONE, /* companion fclone skb (from fclone_cache) */
|
2005-08-18 05:57:30 +08:00
|
|
|
};
|
|
|
|
|
2006-06-22 17:40:14 +08:00
|
|
|
enum {
|
|
|
|
SKB_GSO_TCPV4 = 1 << 0,
|
2006-06-28 04:22:38 +08:00
|
|
|
|
|
|
|
/* This indicates the skb is from an untrusted source. */
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_DODGY = 1 << 1,
|
2006-06-30 03:30:00 +08:00
|
|
|
|
|
|
|
/* This indicates the tcp segment has CWR set. */
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_TCP_ECN = 1 << 2,
|
2006-07-01 04:37:03 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_TCP_FIXEDID = 1 << 3,
|
2009-02-28 06:06:49 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_TCPV6 = 1 << 4,
|
2013-02-14 22:02:41 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_FCOE = 1 << 5,
|
2013-03-07 21:21:51 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_GRE = 1 << 6,
|
2013-05-24 05:02:52 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_GRE_CSUM = 1 << 7,
|
2013-10-20 02:42:57 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_IPXIP4 = 1 << 8,
|
2013-10-21 11:47:30 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_IPXIP6 = 1 << 9,
|
2014-06-05 08:20:16 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_UDP_TUNNEL = 1 << 10,
|
2014-06-05 08:20:23 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_UDP_TUNNEL_CSUM = 1 << 11,
|
2016-04-11 09:44:51 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_PARTIAL = 1 << 12,
|
2016-04-11 09:45:03 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_TUNNEL_REMCSUM = 1 << 13,
|
2016-06-03 02:05:43 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_SCTP = 1 << 14,
|
2017-04-14 16:05:36 +08:00
|
|
|
|
2017-07-03 22:31:57 +08:00
|
|
|
SKB_GSO_ESP = 1 << 15,
|
net: accept UFO datagrams from tuntap and packet
Tuntap and similar devices can inject GSO packets. Accept type
VIRTIO_NET_HDR_GSO_UDP, even though not generating UFO natively.
Processes are expected to use feature negotiation such as TUNSETOFFLOAD
to detect supported offload types and refrain from injecting other
packets. This process breaks down with live migration: guest kernels
do not renegotiate flags, so destination hosts need to expose all
features that the source host does.
Partially revert the UFO removal from 182e0b6b5846~1..d9d30adf5677.
This patch introduces nearly(*) no new code to simplify verification.
It brings back verbatim tuntap UFO negotiation, VIRTIO_NET_HDR_GSO_UDP
insertion and software UFO segmentation.
It does not reinstate protocol stack support, hardware offload
(NETIF_F_UFO), SKB_GSO_UDP tunneling in SKB_GSO_SOFTWARE or reception
of VIRTIO_NET_HDR_GSO_UDP packets in tuntap.
To support SKB_GSO_UDP reappearing in the stack, also reinstate
logic in act_csum and openvswitch. Achieve equivalence with v4.13 HEAD
by squashing in commit 939912216fa8 ("net: skb_needs_check() removes
CHECKSUM_UNNECESSARY check for tx.") and reverting commit 8d63bee643f1
("net: avoid skb_warn_bad_offload false positives on UFO").
(*) To avoid having to bring back skb_shinfo(skb)->ip6_frag_id,
ipv6_proxy_select_ident is changed to return a __be32 and this is
assigned directly to the frag_hdr. Also, SKB_GSO_UDP is inserted
at the end of the enum to minimize code churn.
Tested
Booted a v4.13 guest kernel with QEMU. On a host kernel before this
patch `ethtool -k eth0` shows UFO disabled. After the patch, it is
enabled, same as on a v4.13 host kernel.
A UFO packet sent from the guest appears on the tap device:
host:
nc -l -p -u 8000 &
tcpdump -n -i tap0
guest:
dd if=/dev/zero of=payload.txt bs=1 count=2000
nc -u 192.16.1.1 8000 < payload.txt
Direct tap to tap transmission of VIRTIO_NET_HDR_GSO_UDP succeeds,
packets arriving fragmented:
./with_tap_pair.sh ./tap_send_ufo tap0 tap1
(from https://github.com/wdebruij/kerneltools/tree/master/tests)
Changes
v1 -> v2
- simplified set_offload change (review comment)
- documented test procedure
Link: http://lkml.kernel.org/r/<CAF=yD-LuUeDuL9YWPJD9ykOZ0QCjNeznPDr6whqZ9NGMNF12Mw@mail.gmail.com>
Fixes: fb652fdfe837 ("macvlan/macvtap: Remove NETIF_F_UFO advertisement.")
Reported-by: Michal Kubecek <mkubecek@suse.cz>
Signed-off-by: Willem de Bruijn <willemb@google.com>
Acked-by: Jason Wang <jasowang@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-11-21 23:22:25 +08:00
|
|
|
|
|
|
|
SKB_GSO_UDP = 1 << 16,
|
2006-06-22 17:40:14 +08:00
|
|
|
};
|
|
|
|
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
#if BITS_PER_LONG > 32
|
|
|
|
#define NET_SKBUFF_DATA_USES_OFFSET 1
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifdef NET_SKBUFF_DATA_USES_OFFSET
|
|
|
|
typedef unsigned int sk_buff_data_t;
|
|
|
|
#else
|
|
|
|
typedef unsigned char *sk_buff_data_t;
|
|
|
|
#endif
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* struct sk_buff - socket buffer
|
|
|
|
* @next: Next buffer in list
|
|
|
|
* @prev: Previous buffer in list
|
2014-02-27 06:02:11 +08:00
|
|
|
* @tstamp: Time we arrived/left
|
2014-11-04 00:19:53 +08:00
|
|
|
* @rbnode: RB tree node, alternative to next/prev for netem/tcp
|
2011-07-10 22:04:04 +08:00
|
|
|
* @sk: Socket we are owned by
|
2005-04-17 06:20:36 +08:00
|
|
|
* @dev: Device we arrived on/are leaving by
|
2011-07-10 22:04:04 +08:00
|
|
|
* @cb: Control buffer. Free for use by every layer. Put private vars here
|
2010-05-12 07:19:48 +08:00
|
|
|
* @_skb_refdst: destination entry (with norefcount bit)
|
2005-05-01 23:59:26 +08:00
|
|
|
* @sp: the security path, used for xfrm
|
2005-04-17 06:20:36 +08:00
|
|
|
* @len: Length of actual data
|
|
|
|
* @data_len: Data length
|
|
|
|
* @mac_len: Length of link layer header
|
[SKBUFF]: Keep track of writable header len of headerless clones
Currently NAT (and others) that want to modify cloned skbs copy them,
even if in the vast majority of cases its not necessary because the
skb is a clone made by TCP and the portion NAT wants to modify is
actually writable because TCP release the header reference before
cloning.
The problem is that there is no clean way for NAT to find out how
long the writable header area is, so this patch introduces skb->hdr_len
to hold this length. When a headerless skb is cloned skb->hdr_len
is set to the current headroom, for regular clones it is copied from
the original. A new function skb_clone_writable(skb, len) returns
whether the skb is writable up to len bytes from skb->data. To avoid
enlarging the skb the mac_len field is reduced to 16 bit and the
new hdr_len field is put in the remaining 16 bit.
I've done a few rough benchmarks of NAT (not with this exact patch,
but a very similar one). As expected it saves huge amounts of system
time in case of sendfile, bringing it down to basically the same
amount as without NAT, with sendmsg it only helps on loopback,
probably because of the large MTU.
Transmit a 1GB file using sendfile/sendmsg over eth0/lo with and
without NAT:
- sendfile eth0, no NAT: sys 0m0.388s
- sendfile eth0, NAT: sys 0m1.835s
- sendfile eth0: NAT + path: sys 0m0.370s (~ -80%)
- sendfile lo, no NAT: sys 0m0.258s
- sendfile lo, NAT: sys 0m2.609s
- sendfile lo, NAT + patch: sys 0m0.260s (~ -90%)
- sendmsg eth0, no NAT: sys 0m2.508s
- sendmsg eth0, NAT: sys 0m2.539s
- sendmsg eth0, NAT + patch: sys 0m2.445s (no change)
- sendmsg lo, no NAT: sys 0m2.151s
- sendmsg lo, NAT: sys 0m3.557s
- sendmsg lo, NAT + patch: sys 0m2.159s (~ -40%)
I expect other users can see a similar performance improvement,
packet mangling iptables targets, ipip and ip_gre come to mind ..
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-06-25 19:35:20 +08:00
|
|
|
* @hdr_len: writable header length of cloned skb
|
2007-04-10 02:59:07 +08:00
|
|
|
* @csum: Checksum (must include start/offset pair)
|
|
|
|
* @csum_start: Offset from skb->head where checksumming should start
|
|
|
|
* @csum_offset: Offset from csum_start where checksum should be stored
|
2011-07-10 22:04:04 +08:00
|
|
|
* @priority: Packet queueing priority
|
2014-05-05 07:39:18 +08:00
|
|
|
* @ignore_df: allow local fragmentation
|
2005-04-17 06:20:36 +08:00
|
|
|
* @cloned: Head may be cloned (check refcnt to be sure)
|
2011-07-10 22:04:04 +08:00
|
|
|
* @ip_summed: Driver fed us an IP checksum
|
2005-04-17 06:20:36 +08:00
|
|
|
* @nohdr: Payload reference only, must not modify header
|
|
|
|
* @pkt_type: Packet class
|
2005-10-19 13:07:41 +08:00
|
|
|
* @fclone: skbuff clone status
|
|
|
|
* @ipvs_property: skbuff is owned by ipvs
|
2017-01-08 06:06:35 +08:00
|
|
|
* @tc_skip_classify: do not classify packet. set by IFB device
|
2017-01-08 06:06:37 +08:00
|
|
|
* @tc_at_ingress: used within tc_classify to distinguish in/egress
|
2017-01-08 06:06:38 +08:00
|
|
|
* @tc_redirected: packet was redirected by a tc action
|
|
|
|
* @tc_from_ingress: if tc_redirected, tc_at_ingress at time of redirect
|
2008-02-19 12:52:13 +08:00
|
|
|
* @peeked: this packet has been seen already, so stats have been
|
|
|
|
* done for it, don't do them again
|
2007-07-08 13:21:23 +08:00
|
|
|
* @nf_trace: netfilter packet trace flag
|
2011-07-10 22:04:04 +08:00
|
|
|
* @protocol: Packet protocol from driver
|
|
|
|
* @destructor: Destruct function
|
2017-10-05 03:59:58 +08:00
|
|
|
* @tcp_tsorted_anchor: list structure for TCP (tp->tsorted_sent_queue)
|
2017-01-24 01:21:59 +08:00
|
|
|
* @_nfct: Associated connection, if any (with nfctinfo bits)
|
2005-04-17 06:20:36 +08:00
|
|
|
* @nf_bridge: Saved data about a bridged frame - see br_netfilter.c
|
2009-11-21 07:35:04 +08:00
|
|
|
* @skb_iif: ifindex of device we arrived on
|
2005-04-17 06:20:36 +08:00
|
|
|
* @tc_index: Traffic control index
|
2014-03-25 06:34:47 +08:00
|
|
|
* @hash: the packet hash
|
2011-07-10 22:04:04 +08:00
|
|
|
* @queue_mapping: Queue mapping for multiqueue devices
|
2014-08-26 06:51:53 +08:00
|
|
|
* @xmit_more: More SKBs are pending for this queue
|
2008-04-21 01:51:01 +08:00
|
|
|
* @ndisc_nodetype: router type (from link layer)
|
2011-07-10 22:04:04 +08:00
|
|
|
* @ooo_okay: allow the mapping of a socket to a queue to be changed
|
2014-03-25 06:34:47 +08:00
|
|
|
* @l4_hash: indicate hash is a canonical 4-tuple hash over transport
|
2011-08-19 22:26:44 +08:00
|
|
|
* ports.
|
2014-07-02 12:33:17 +08:00
|
|
|
* @sw_hash: indicates hash was computed in software stack
|
2011-11-09 17:15:42 +08:00
|
|
|
* @wifi_acked_valid: wifi_acked was set
|
|
|
|
* @wifi_acked: whether frame was acked on wifi or not
|
2012-02-11 23:39:30 +08:00
|
|
|
* @no_fcs: Request NIC to treat last 4 bytes as Ethernet FCS
|
2017-05-18 21:44:40 +08:00
|
|
|
* @csum_not_inet: use CRC32c to resolve CHECKSUM_PARTIAL
|
2017-02-07 05:14:12 +08:00
|
|
|
* @dst_pending_confirm: need to confirm neighbour
|
2013-06-10 16:39:50 +08:00
|
|
|
* @napi_id: id of the NAPI struct this skb came from
|
2006-06-09 15:29:17 +08:00
|
|
|
* @secmark: security marking
|
2011-07-10 22:04:04 +08:00
|
|
|
* @mark: Generic packet mark
|
2013-04-19 10:04:30 +08:00
|
|
|
* @vlan_proto: vlan encapsulation protocol
|
2008-07-15 13:49:06 +08:00
|
|
|
* @vlan_tci: vlan tag control information
|
2013-05-24 05:02:52 +08:00
|
|
|
* @inner_protocol: Protocol (encapsulation)
|
2012-12-07 22:14:14 +08:00
|
|
|
* @inner_transport_header: Inner transport layer header (encapsulation)
|
|
|
|
* @inner_network_header: Network layer header (encapsulation)
|
2013-03-07 21:21:46 +08:00
|
|
|
* @inner_mac_header: Link layer header (encapsulation)
|
2011-07-10 22:04:04 +08:00
|
|
|
* @transport_header: Transport layer header
|
|
|
|
* @network_header: Network layer header
|
|
|
|
* @mac_header: Link layer header
|
|
|
|
* @tail: Tail pointer
|
|
|
|
* @end: End pointer
|
|
|
|
* @head: Head of buffer
|
|
|
|
* @data: Data head pointer
|
|
|
|
* @truesize: Buffer size
|
|
|
|
* @users: User count - see {datagram,tcp}.c
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
struct sk_buff {
|
2014-02-27 06:02:11 +08:00
|
|
|
union {
|
2014-11-04 00:19:53 +08:00
|
|
|
struct {
|
|
|
|
/* These two members must be first. */
|
|
|
|
struct sk_buff *next;
|
|
|
|
struct sk_buff *prev;
|
|
|
|
|
|
|
|
union {
|
2017-09-19 20:14:24 +08:00
|
|
|
struct net_device *dev;
|
|
|
|
/* Some protocols might use this space to store information,
|
|
|
|
* while device pointer would be NULL.
|
|
|
|
* UDP receive path is one user.
|
|
|
|
*/
|
|
|
|
unsigned long dev_scratch;
|
2014-11-04 00:19:53 +08:00
|
|
|
};
|
|
|
|
};
|
|
|
|
struct rb_node rbnode; /* used in netem & tcp stack */
|
2014-02-27 06:02:11 +08:00
|
|
|
};
|
2010-02-23 19:45:51 +08:00
|
|
|
struct sock *sk;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2016-12-09 03:41:55 +08:00
|
|
|
union {
|
2017-09-19 20:14:24 +08:00
|
|
|
ktime_t tstamp;
|
|
|
|
u64 skb_mstamp;
|
2016-12-09 03:41:55 +08:00
|
|
|
};
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* This is the control buffer. It is free to use for every
|
|
|
|
* layer. Please put your private variables there. If you
|
|
|
|
* want to keep them across layers you have to do a skb_clone()
|
|
|
|
* first. This is owned by whoever has the skb queued ATM.
|
|
|
|
*/
|
2010-02-23 19:45:51 +08:00
|
|
|
char cb[48] __aligned(8);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2017-10-05 03:59:58 +08:00
|
|
|
union {
|
|
|
|
struct {
|
|
|
|
unsigned long _skb_refdst;
|
|
|
|
void (*destructor)(struct sk_buff *skb);
|
|
|
|
};
|
|
|
|
struct list_head tcp_tsorted_anchor;
|
|
|
|
};
|
|
|
|
|
2010-02-23 19:45:51 +08:00
|
|
|
#ifdef CONFIG_XFRM
|
|
|
|
struct sec_path *sp;
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
#endif
|
|
|
|
#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
|
2017-01-24 01:21:59 +08:00
|
|
|
unsigned long _nfct;
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
#endif
|
Merge git://git.kernel.org/pub/scm/linux/kernel/git/pablo/nf-next
Pablo Neira Ayuso says:
====================
pull request: netfilter/ipvs updates for net-next
The following patchset contains Netfilter/IPVS updates for net-next,
most relevantly they are:
1) Four patches to make the new nf_tables masquerading support
independent of the x_tables infrastructure. This also resolves a
compilation breakage if the masquerade target is disabled but the
nf_tables masq expression is enabled.
2) ipset updates via Jozsef Kadlecsik. This includes the addition of the
skbinfo extension that allows you to store packet metainformation in the
elements. This can be used to fetch and restore this to the packets through
the iptables SET target, patches from Anton Danilov.
3) Add the hash:mac set type to ipset, from Jozsef Kadlecsick.
4) Add simple weighted fail-over scheduler via Simon Horman. This provides
a fail-over IPVS scheduler (unlike existing load balancing schedulers).
Connections are directed to the appropriate server based solely on
highest weight value and server availability, patch from Kenny Mathis.
5) Support IPv6 real servers in IPv4 virtual-services and vice versa.
Simon Horman informs that the motivation for this is to allow more
flexibility in the choice of IP version offered by both virtual-servers
and real-servers as they no longer need to match: An IPv4 connection
from an end-user may be forwarded to a real-server using IPv6 and
vice versa. No ip_vs_sync support yet though. Patches from Alex Gartrell
and Julian Anastasov.
6) Add global generation ID to the nf_tables ruleset. When dumping from
several different object lists, we need a way to identify that an update
has ocurred so userspace knows that it needs to refresh its lists. This
also includes a new command to obtain the 32-bits generation ID. The
less significant 16-bits of this ID is also exposed through res_id field
in the nfnetlink header to quickly detect the interference and retry when
there is no risk of ID wraparound.
7) Move br_netfilter out of the bridge core. The br_netfilter code is
built in the bridge core by default. This causes problems of different
kind to people that don't want this: Jesper reported performance drop due
to the inconditional hook registration and I remember to have read complains
on netdev from people regarding the unexpected behaviour of our bridging
stack when br_netfilter is enabled (fragmentation handling, layer 3 and
upper inspection). People that still need this should easily undo the
damage by modprobing the new br_netfilter module.
8) Dump the set policy nf_tables that allows set parameterization. So
userspace can keep user-defined preferences when saving the ruleset.
From Arturo Borrero.
9) Use __seq_open_private() helper function to reduce boiler plate code
in x_tables, From Rob Jones.
10) Safer default behaviour in case that you forget to load the protocol
tracker. Daniel Borkmann and Florian Westphal detected that if your
ruleset is stateful, you allow traffic to at least one single SCTP port
and the SCTP protocol tracker is not loaded, then any SCTP traffic may
be pass through unfiltered. After this patch, the connection tracking
classifies SCTP/DCCP/UDPlite/GRE packets as invalid if your kernel has
been compiled with support for these modules.
====================
Trivially resolved conflict in include/linux/skbuff.h, Eric moved some
netfilter skbuff members around, and the netfilter tree adjusted the
ifdef guards for the bridging info pointer.
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-30 02:46:53 +08:00
|
|
|
#if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
struct nf_bridge_info *nf_bridge;
|
2010-02-23 19:45:51 +08:00
|
|
|
#endif
|
2005-04-17 06:20:36 +08:00
|
|
|
unsigned int len,
|
[SKBUFF]: Keep track of writable header len of headerless clones
Currently NAT (and others) that want to modify cloned skbs copy them,
even if in the vast majority of cases its not necessary because the
skb is a clone made by TCP and the portion NAT wants to modify is
actually writable because TCP release the header reference before
cloning.
The problem is that there is no clean way for NAT to find out how
long the writable header area is, so this patch introduces skb->hdr_len
to hold this length. When a headerless skb is cloned skb->hdr_len
is set to the current headroom, for regular clones it is copied from
the original. A new function skb_clone_writable(skb, len) returns
whether the skb is writable up to len bytes from skb->data. To avoid
enlarging the skb the mac_len field is reduced to 16 bit and the
new hdr_len field is put in the remaining 16 bit.
I've done a few rough benchmarks of NAT (not with this exact patch,
but a very similar one). As expected it saves huge amounts of system
time in case of sendfile, bringing it down to basically the same
amount as without NAT, with sendmsg it only helps on loopback,
probably because of the large MTU.
Transmit a 1GB file using sendfile/sendmsg over eth0/lo with and
without NAT:
- sendfile eth0, no NAT: sys 0m0.388s
- sendfile eth0, NAT: sys 0m1.835s
- sendfile eth0: NAT + path: sys 0m0.370s (~ -80%)
- sendfile lo, no NAT: sys 0m0.258s
- sendfile lo, NAT: sys 0m2.609s
- sendfile lo, NAT + patch: sys 0m0.260s (~ -90%)
- sendmsg eth0, no NAT: sys 0m2.508s
- sendmsg eth0, NAT: sys 0m2.539s
- sendmsg eth0, NAT + patch: sys 0m2.445s (no change)
- sendmsg lo, no NAT: sys 0m2.151s
- sendmsg lo, NAT: sys 0m3.557s
- sendmsg lo, NAT + patch: sys 0m2.159s (~ -40%)
I expect other users can see a similar performance improvement,
packet mangling iptables targets, ipip and ip_gre come to mind ..
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-06-25 19:35:20 +08:00
|
|
|
data_len;
|
|
|
|
__u16 mac_len,
|
|
|
|
hdr_len;
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
|
|
|
|
/* Following fields are _not_ copied in __copy_skb_header()
|
|
|
|
* Note that queue_mapping is here mostly to fill a hole.
|
|
|
|
*/
|
|
|
|
__u16 queue_mapping;
|
bpf: direct packet write and access for helpers for clsact progs
This work implements direct packet access for helpers and direct packet
write in a similar fashion as already available for XDP types via commits
4acf6c0b84c9 ("bpf: enable direct packet data write for xdp progs") and
6841de8b0d03 ("bpf: allow helpers access the packet directly"), and as a
complementary feature to the already available direct packet read for tc
(cls/act) programs.
For enabling this, we need to introduce two helpers, bpf_skb_pull_data()
and bpf_csum_update(). The first is generally needed for both, read and
write, because they would otherwise only be limited to the current linear
skb head. Usually, when the data_end test fails, programs just bail out,
or, in the direct read case, use bpf_skb_load_bytes() as an alternative
to overcome this limitation. If such data sits in non-linear parts, we
can just pull them in once with the new helper, retest and eventually
access them.
At the same time, this also makes sure the skb is uncloned, which is, of
course, a necessary condition for direct write. As this needs to be an
invariant for the write part only, the verifier detects writes and adds
a prologue that is calling bpf_skb_pull_data() to effectively unclone the
skb from the very beginning in case it is indeed cloned. The heuristic
makes use of a similar trick that was done in 233577a22089 ("net: filter:
constify detection of pkt_type_offset"). This comes at zero cost for other
programs that do not use the direct write feature. Should a program use
this feature only sparsely and has read access for the most parts with,
for example, drop return codes, then such write action can be delegated
to a tail called program for mitigating this cost of potential uncloning
to a late point in time where it would have been paid similarly with the
bpf_skb_store_bytes() as well. Advantage of direct write is that the
writes are inlined whereas the helper cannot make any length assumptions
and thus needs to generate a call to memcpy() also for small sizes, as well
as cost of helper call itself with sanity checks are avoided. Plus, when
direct read is already used, we don't need to cache or perform rechecks
on the data boundaries (due to verifier invalidating previous checks for
helpers that change skb->data), so more complex programs using rewrites
can benefit from switching to direct read plus write.
For direct packet access to helpers, we save the otherwise needed copy into
a temp struct sitting on stack memory when use-case allows. Both facilities
are enabled via may_access_direct_pkt_data() in verifier. For now, we limit
this to map helpers and csum_diff, and can successively enable other helpers
where we find it makes sense. Helpers that definitely cannot be allowed for
this are those part of bpf_helper_changes_skb_data() since they can change
underlying data, and those that write into memory as this could happen for
packet typed args when still cloned. bpf_csum_update() helper accommodates
for the fact that we need to fixup checksum_complete when using direct write
instead of bpf_skb_store_bytes(), meaning the programs can use available
helpers like bpf_csum_diff(), and implement csum_add(), csum_sub(),
csum_block_add(), csum_block_sub() equivalents in eBPF together with the
new helper. A usage example will be provided for iproute2's examples/bpf/
directory.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-09-20 06:26:13 +08:00
|
|
|
|
|
|
|
/* if you move cloned around you also must adapt those constants */
|
|
|
|
#ifdef __BIG_ENDIAN_BITFIELD
|
|
|
|
#define CLONED_MASK (1 << 7)
|
|
|
|
#else
|
|
|
|
#define CLONED_MASK 1
|
|
|
|
#endif
|
|
|
|
#define CLONED_OFFSET() offsetof(struct sk_buff, __cloned_offset)
|
|
|
|
|
|
|
|
__u8 __cloned_offset[0];
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
__u8 cloned:1,
|
2005-08-10 10:24:19 +08:00
|
|
|
nohdr:1,
|
2005-11-21 13:19:21 +08:00
|
|
|
fclone:2,
|
2007-12-05 17:53:40 +08:00
|
|
|
peeked:1,
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
head_frag:1,
|
bpf: direct packet write and access for helpers for clsact progs
This work implements direct packet access for helpers and direct packet
write in a similar fashion as already available for XDP types via commits
4acf6c0b84c9 ("bpf: enable direct packet data write for xdp progs") and
6841de8b0d03 ("bpf: allow helpers access the packet directly"), and as a
complementary feature to the already available direct packet read for tc
(cls/act) programs.
For enabling this, we need to introduce two helpers, bpf_skb_pull_data()
and bpf_csum_update(). The first is generally needed for both, read and
write, because they would otherwise only be limited to the current linear
skb head. Usually, when the data_end test fails, programs just bail out,
or, in the direct read case, use bpf_skb_load_bytes() as an alternative
to overcome this limitation. If such data sits in non-linear parts, we
can just pull them in once with the new helper, retest and eventually
access them.
At the same time, this also makes sure the skb is uncloned, which is, of
course, a necessary condition for direct write. As this needs to be an
invariant for the write part only, the verifier detects writes and adds
a prologue that is calling bpf_skb_pull_data() to effectively unclone the
skb from the very beginning in case it is indeed cloned. The heuristic
makes use of a similar trick that was done in 233577a22089 ("net: filter:
constify detection of pkt_type_offset"). This comes at zero cost for other
programs that do not use the direct write feature. Should a program use
this feature only sparsely and has read access for the most parts with,
for example, drop return codes, then such write action can be delegated
to a tail called program for mitigating this cost of potential uncloning
to a late point in time where it would have been paid similarly with the
bpf_skb_store_bytes() as well. Advantage of direct write is that the
writes are inlined whereas the helper cannot make any length assumptions
and thus needs to generate a call to memcpy() also for small sizes, as well
as cost of helper call itself with sanity checks are avoided. Plus, when
direct read is already used, we don't need to cache or perform rechecks
on the data boundaries (due to verifier invalidating previous checks for
helpers that change skb->data), so more complex programs using rewrites
can benefit from switching to direct read plus write.
For direct packet access to helpers, we save the otherwise needed copy into
a temp struct sitting on stack memory when use-case allows. Both facilities
are enabled via may_access_direct_pkt_data() in verifier. For now, we limit
this to map helpers and csum_diff, and can successively enable other helpers
where we find it makes sense. Helpers that definitely cannot be allowed for
this are those part of bpf_helper_changes_skb_data() since they can change
underlying data, and those that write into memory as this could happen for
packet typed args when still cloned. bpf_csum_update() helper accommodates
for the fact that we need to fixup checksum_complete when using direct write
instead of bpf_skb_store_bytes(), meaning the programs can use available
helpers like bpf_csum_diff(), and implement csum_add(), csum_sub(),
csum_block_add(), csum_block_sub() equivalents in eBPF together with the
new helper. A usage example will be provided for iproute2's examples/bpf/
directory.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-09-20 06:26:13 +08:00
|
|
|
xmit_more:1,
|
|
|
|
__unused:1; /* one bit hole */
|
2012-01-27 14:22:53 +08:00
|
|
|
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
/* fields enclosed in headers_start/headers_end are copied
|
|
|
|
* using a single memcpy() in __copy_skb_header()
|
|
|
|
*/
|
2014-10-27 10:14:06 +08:00
|
|
|
/* private: */
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
__u32 headers_start[0];
|
2014-10-27 10:14:06 +08:00
|
|
|
/* public: */
|
2012-01-27 14:22:53 +08:00
|
|
|
|
2014-09-12 20:04:43 +08:00
|
|
|
/* if you move pkt_type around you also must adapt those constants */
|
|
|
|
#ifdef __BIG_ENDIAN_BITFIELD
|
|
|
|
#define PKT_TYPE_MAX (7 << 5)
|
|
|
|
#else
|
|
|
|
#define PKT_TYPE_MAX 7
|
2005-04-17 06:20:36 +08:00
|
|
|
#endif
|
2014-09-12 20:04:43 +08:00
|
|
|
#define PKT_TYPE_OFFSET() offsetof(struct sk_buff, __pkt_type_offset)
|
2008-08-30 18:16:35 +08:00
|
|
|
|
2014-09-12 20:04:43 +08:00
|
|
|
__u8 __pkt_type_offset[0];
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
__u8 pkt_type:3;
|
2012-08-01 07:44:19 +08:00
|
|
|
__u8 pfmemalloc:1;
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
__u8 ignore_df:1;
|
|
|
|
|
|
|
|
__u8 nf_trace:1;
|
|
|
|
__u8 ip_summed:2;
|
2010-11-21 21:17:29 +08:00
|
|
|
__u8 ooo_okay:1;
|
2014-03-25 06:34:47 +08:00
|
|
|
__u8 l4_hash:1;
|
2014-07-02 12:33:17 +08:00
|
|
|
__u8 sw_hash:1;
|
2011-11-09 17:15:42 +08:00
|
|
|
__u8 wifi_acked_valid:1;
|
|
|
|
__u8 wifi_acked:1;
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
|
2012-02-11 23:39:30 +08:00
|
|
|
__u8 no_fcs:1;
|
2014-08-28 12:26:46 +08:00
|
|
|
/* Indicates the inner headers are valid in the skbuff. */
|
2012-12-07 22:14:14 +08:00
|
|
|
__u8 encapsulation:1;
|
2014-06-05 08:20:02 +08:00
|
|
|
__u8 encap_hdr_csum:1;
|
2014-06-11 09:54:13 +08:00
|
|
|
__u8 csum_valid:1;
|
2014-06-11 09:54:19 +08:00
|
|
|
__u8 csum_complete_sw:1;
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
__u8 csum_level:2;
|
2017-05-18 21:44:40 +08:00
|
|
|
__u8 csum_not_inet:1;
|
2008-08-30 18:16:35 +08:00
|
|
|
|
2017-02-07 05:14:12 +08:00
|
|
|
__u8 dst_pending_confirm:1;
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
#ifdef CONFIG_IPV6_NDISC_NODETYPE
|
|
|
|
__u8 ndisc_nodetype:2;
|
|
|
|
#endif
|
|
|
|
__u8 ipvs_property:1;
|
2014-09-30 11:22:29 +08:00
|
|
|
__u8 inner_protocol_type:1;
|
2014-11-05 01:06:54 +08:00
|
|
|
__u8 remcsum_offload:1;
|
2016-08-26 00:42:37 +08:00
|
|
|
#ifdef CONFIG_NET_SWITCHDEV
|
|
|
|
__u8 offload_fwd_mark:1;
|
skbuff: Add the offload_mr_fwd_mark field
Similarly to the offload_fwd_mark field, the offload_mr_fwd_mark field is
used to allow partial offloading of MFC multicast routes.
Switchdev drivers can offload MFC multicast routes to the hardware by
registering to the FIB notification chain. When one of the route output
interfaces is not offload-able, i.e. has different parent ID, the route
cannot be fully offloaded by the hardware. Examples to non-offload-able
devices are a management NIC, dummy device, pimreg device, etc.
Similar problem exists in the bridge module, as one bridge can hold
interfaces with different parent IDs. At the bridge, the problem is solved
by the offload_fwd_mark skb field.
Currently, when a route cannot go through full offload, the only solution
for a switchdev driver is not to offload it at all and let the packet go
through slow path.
Using the offload_mr_fwd_mark field, a driver can indicate that a packet
was already forwarded by hardware to all the devices with the same parent
ID as the input device. Further patches in this patch-set are going to
enhance ipmr to skip multicast forwarding to devices with the same parent
ID if a packets is marked with that field.
The reason why the already existing "offload_fwd_mark" bit cannot be used
is that a switchdev driver would want to make the distinction between a
packet that has already gone through L2 forwarding but did not go through
multicast forwarding, and a packet that has already gone through both L2
and multicast forwarding.
For example: when a packet is ingressing from a switchport enslaved to a
bridge, which is configured with multicast forwarding, the following
scenarios are possible:
- The packet can be trapped to the CPU due to exception while multicast
forwarding (for example, MTU error). In that case, it had already gone
through L2 forwarding in the hardware, thus A switchdev driver would
want to set the skb->offload_fwd_mark and not the
skb->offload_mr_fwd_mark.
- The packet can also be trapped due to a pimreg/dummy device used as one
of the output interfaces. In that case, it can go through both L2 and
(partial) multicast forwarding inside the hardware, thus a switchdev
driver would want to set both the skb->offload_fwd_mark and
skb->offload_mr_fwd_mark.
Signed-off-by: Yotam Gigi <yotamg@mellanox.com>
Reviewed-by: Ido Schimmel <idosch@mellaox.com>
Signed-off-by: Jiri Pirko <jiri@mellanox.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-10-03 15:58:06 +08:00
|
|
|
__u8 offload_mr_fwd_mark:1;
|
2016-08-26 00:42:37 +08:00
|
|
|
#endif
|
2017-01-08 06:06:35 +08:00
|
|
|
#ifdef CONFIG_NET_CLS_ACT
|
|
|
|
__u8 tc_skip_classify:1;
|
2017-01-08 06:06:37 +08:00
|
|
|
__u8 tc_at_ingress:1;
|
2017-01-08 06:06:38 +08:00
|
|
|
__u8 tc_redirected:1;
|
|
|
|
__u8 tc_from_ingress:1;
|
2017-01-08 06:06:35 +08:00
|
|
|
#endif
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
|
|
|
|
#ifdef CONFIG_NET_SCHED
|
|
|
|
__u16 tc_index; /* traffic control index */
|
|
|
|
#endif
|
2008-08-30 18:16:35 +08:00
|
|
|
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
union {
|
|
|
|
__wsum csum;
|
|
|
|
struct {
|
|
|
|
__u16 csum_start;
|
|
|
|
__u16 csum_offset;
|
|
|
|
};
|
|
|
|
};
|
|
|
|
__u32 priority;
|
|
|
|
int skb_iif;
|
|
|
|
__u32 hash;
|
|
|
|
__be16 vlan_proto;
|
|
|
|
__u16 vlan_tci;
|
xps: fix xps for stacked devices
A typical qdisc setup is the following :
bond0 : bonding device, using HTB hierarchy
eth1/eth2 : slaves, multiqueue NIC, using MQ + FQ qdisc
XPS allows to spread packets on specific tx queues, based on the cpu
doing the send.
Problem is that dequeues from bond0 qdisc can happen on random cpus,
due to the fact that qdisc_run() can dequeue a batch of packets.
CPUA -> queue packet P1 on bond0 qdisc, P1->ooo_okay=1
CPUA -> queue packet P2 on bond0 qdisc, P2->ooo_okay=0
CPUB -> dequeue packet P1 from bond0
enqueue packet on eth1/eth2
CPUC -> dequeue packet P2 from bond0
enqueue packet on eth1/eth2 using sk cache (ooo_okay is 0)
get_xps_queue() then might select wrong queue for P1, since current cpu
might be different than CPUA.
P2 might be sent on the old queue (stored in sk->sk_tx_queue_mapping),
if CPUC runs a bit faster (or CPUB spins a bit on qdisc lock)
Effect of this bug is TCP reorders, and more generally not optimal
TX queue placement. (A victim bulk flow can be migrated to the wrong TX
queue for a while)
To fix this, we have to record sender cpu number the first time
dev_queue_xmit() is called for one tx skb.
We can union napi_id (used on receive path) and sender_cpu,
granted we clear sender_cpu in skb_scrub_packet() (credit to Willem for
this union idea)
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Willem de Bruijn <willemb@google.com>
Cc: Nandita Dukkipati <nanditad@google.com>
Cc: Yuchung Cheng <ycheng@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2015-02-04 15:48:24 +08:00
|
|
|
#if defined(CONFIG_NET_RX_BUSY_POLL) || defined(CONFIG_XPS)
|
|
|
|
union {
|
|
|
|
unsigned int napi_id;
|
|
|
|
unsigned int sender_cpu;
|
|
|
|
};
|
2006-05-24 08:55:33 +08:00
|
|
|
#endif
|
2006-06-09 15:29:17 +08:00
|
|
|
#ifdef CONFIG_NETWORK_SECMARK
|
2016-08-26 00:42:37 +08:00
|
|
|
__u32 secmark;
|
2015-07-19 09:24:48 +08:00
|
|
|
#endif
|
|
|
|
|
net: Generalize socket rx gap / receive queue overflow cmsg
Create a new socket level option to report number of queue overflows
Recently I augmented the AF_PACKET protocol to report the number of frames lost
on the socket receive queue between any two enqueued frames. This value was
exported via a SOL_PACKET level cmsg. AFter I completed that work it was
requested that this feature be generalized so that any datagram oriented socket
could make use of this option. As such I've created this patch, It creates a
new SOL_SOCKET level option called SO_RXQ_OVFL, which when enabled exports a
SOL_SOCKET level cmsg that reports the nubmer of times the sk_receive_queue
overflowed between any two given frames. It also augments the AF_PACKET
protocol to take advantage of this new feature (as it previously did not touch
sk->sk_drops, which this patch uses to record the overflow count). Tested
successfully by me.
Notes:
1) Unlike my previous patch, this patch simply records the sk_drops value, which
is not a number of drops between packets, but rather a total number of drops.
Deltas must be computed in user space.
2) While this patch currently works with datagram oriented protocols, it will
also be accepted by non-datagram oriented protocols. I'm not sure if thats
agreeable to everyone, but my argument in favor of doing so is that, for those
protocols which aren't applicable to this option, sk_drops will always be zero,
and reporting no drops on a receive queue that isn't used for those
non-participating protocols seems reasonable to me. This also saves us having
to code in a per-protocol opt in mechanism.
3) This applies cleanly to net-next assuming that commit
977750076d98c7ff6cbda51858bb5a5894a9d9ab (my af packet cmsg patch) is reverted
Signed-off-by: Neil Horman <nhorman@tuxdriver.com>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2009-10-13 04:26:31 +08:00
|
|
|
union {
|
|
|
|
__u32 mark;
|
2013-03-14 13:40:32 +08:00
|
|
|
__u32 reserved_tailroom;
|
net: Generalize socket rx gap / receive queue overflow cmsg
Create a new socket level option to report number of queue overflows
Recently I augmented the AF_PACKET protocol to report the number of frames lost
on the socket receive queue between any two enqueued frames. This value was
exported via a SOL_PACKET level cmsg. AFter I completed that work it was
requested that this feature be generalized so that any datagram oriented socket
could make use of this option. As such I've created this patch, It creates a
new SOL_SOCKET level option called SO_RXQ_OVFL, which when enabled exports a
SOL_SOCKET level cmsg that reports the nubmer of times the sk_receive_queue
overflowed between any two given frames. It also augments the AF_PACKET
protocol to take advantage of this new feature (as it previously did not touch
sk->sk_drops, which this patch uses to record the overflow count). Tested
successfully by me.
Notes:
1) Unlike my previous patch, this patch simply records the sk_drops value, which
is not a number of drops between packets, but rather a total number of drops.
Deltas must be computed in user space.
2) While this patch currently works with datagram oriented protocols, it will
also be accepted by non-datagram oriented protocols. I'm not sure if thats
agreeable to everyone, but my argument in favor of doing so is that, for those
protocols which aren't applicable to this option, sk_drops will always be zero,
and reporting no drops on a receive queue that isn't used for those
non-participating protocols seems reasonable to me. This also saves us having
to code in a per-protocol opt in mechanism.
3) This applies cleanly to net-next assuming that commit
977750076d98c7ff6cbda51858bb5a5894a9d9ab (my af packet cmsg patch) is reverted
Signed-off-by: Neil Horman <nhorman@tuxdriver.com>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2009-10-13 04:26:31 +08:00
|
|
|
};
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-09-30 11:22:29 +08:00
|
|
|
union {
|
|
|
|
__be16 inner_protocol;
|
|
|
|
__u8 inner_ipproto;
|
|
|
|
};
|
|
|
|
|
2013-05-24 05:02:51 +08:00
|
|
|
__u16 inner_transport_header;
|
|
|
|
__u16 inner_network_header;
|
|
|
|
__u16 inner_mac_header;
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
|
|
|
|
__be16 protocol;
|
2013-05-24 05:02:51 +08:00
|
|
|
__u16 transport_header;
|
|
|
|
__u16 network_header;
|
|
|
|
__u16 mac_header;
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
|
2014-10-27 10:14:06 +08:00
|
|
|
/* private: */
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
__u32 headers_end[0];
|
2014-10-27 10:14:06 +08:00
|
|
|
/* public: */
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* These elements must be at the end, see alloc_skb() for details. */
|
2007-04-20 11:29:13 +08:00
|
|
|
sk_buff_data_t tail;
|
2007-04-20 11:43:29 +08:00
|
|
|
sk_buff_data_t end;
|
2005-04-17 06:20:36 +08:00
|
|
|
unsigned char *head,
|
2007-04-20 11:43:29 +08:00
|
|
|
*data;
|
2007-04-20 11:29:13 +08:00
|
|
|
unsigned int truesize;
|
2017-06-30 18:07:58 +08:00
|
|
|
refcount_t users;
|
2005-04-17 06:20:36 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
#ifdef __KERNEL__
|
|
|
|
/*
|
|
|
|
* Handling routines are only of interest to the kernel
|
|
|
|
*/
|
|
|
|
#include <linux/slab.h>
|
|
|
|
|
|
|
|
|
2012-08-01 07:44:19 +08:00
|
|
|
#define SKB_ALLOC_FCLONE 0x01
|
|
|
|
#define SKB_ALLOC_RX 0x02
|
2014-12-10 11:40:49 +08:00
|
|
|
#define SKB_ALLOC_NAPI 0x04
|
2012-08-01 07:44:19 +08:00
|
|
|
|
|
|
|
/* Returns true if the skb was allocated from PFMEMALLOC reserves */
|
|
|
|
static inline bool skb_pfmemalloc(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return unlikely(skb->pfmemalloc);
|
|
|
|
}
|
|
|
|
|
2010-05-12 07:19:48 +08:00
|
|
|
/*
|
|
|
|
* skb might have a dst pointer attached, refcounted or not.
|
|
|
|
* _skb_refdst low order bit is set if refcount was _not_ taken
|
|
|
|
*/
|
|
|
|
#define SKB_DST_NOREF 1UL
|
|
|
|
#define SKB_DST_PTRMASK ~(SKB_DST_NOREF)
|
|
|
|
|
2017-01-24 01:21:59 +08:00
|
|
|
#define SKB_NFCT_PTRMASK ~(7UL)
|
2010-05-12 07:19:48 +08:00
|
|
|
/**
|
|
|
|
* skb_dst - returns skb dst_entry
|
|
|
|
* @skb: buffer
|
|
|
|
*
|
|
|
|
* Returns skb dst_entry, regardless of reference taken or not.
|
|
|
|
*/
|
2009-06-02 13:19:30 +08:00
|
|
|
static inline struct dst_entry *skb_dst(const struct sk_buff *skb)
|
|
|
|
{
|
2010-05-12 07:19:48 +08:00
|
|
|
/* If refdst was not refcounted, check we still are in a
|
|
|
|
* rcu_read_lock section
|
|
|
|
*/
|
|
|
|
WARN_ON((skb->_skb_refdst & SKB_DST_NOREF) &&
|
|
|
|
!rcu_read_lock_held() &&
|
|
|
|
!rcu_read_lock_bh_held());
|
|
|
|
return (struct dst_entry *)(skb->_skb_refdst & SKB_DST_PTRMASK);
|
2009-06-02 13:19:30 +08:00
|
|
|
}
|
|
|
|
|
2010-05-12 07:19:48 +08:00
|
|
|
/**
|
|
|
|
* skb_dst_set - sets skb dst
|
|
|
|
* @skb: buffer
|
|
|
|
* @dst: dst entry
|
|
|
|
*
|
|
|
|
* Sets skb dst, assuming a reference was taken on dst and should
|
|
|
|
* be released by skb_dst_drop()
|
|
|
|
*/
|
2009-06-02 13:19:30 +08:00
|
|
|
static inline void skb_dst_set(struct sk_buff *skb, struct dst_entry *dst)
|
|
|
|
{
|
2010-05-12 07:19:48 +08:00
|
|
|
skb->_skb_refdst = (unsigned long)dst;
|
|
|
|
}
|
|
|
|
|
2013-03-21 17:57:58 +08:00
|
|
|
/**
|
|
|
|
* skb_dst_set_noref - sets skb dst, hopefully, without taking reference
|
|
|
|
* @skb: buffer
|
|
|
|
* @dst: dst entry
|
|
|
|
*
|
|
|
|
* Sets skb dst, assuming a reference was not taken on dst.
|
|
|
|
* If dst entry is cached, we do not take reference and dst_release
|
|
|
|
* will be avoided by refdst_drop. If dst entry is not cached, we take
|
|
|
|
* reference, so that last dst_release can destroy the dst immediately.
|
|
|
|
*/
|
|
|
|
static inline void skb_dst_set_noref(struct sk_buff *skb, struct dst_entry *dst)
|
|
|
|
{
|
2014-12-07 02:19:42 +08:00
|
|
|
WARN_ON(!rcu_read_lock_held() && !rcu_read_lock_bh_held());
|
|
|
|
skb->_skb_refdst = (unsigned long)dst | SKB_DST_NOREF;
|
2013-03-21 17:57:58 +08:00
|
|
|
}
|
2010-05-12 07:19:48 +08:00
|
|
|
|
|
|
|
/**
|
2011-03-31 09:57:33 +08:00
|
|
|
* skb_dst_is_noref - Test if skb dst isn't refcounted
|
2010-05-12 07:19:48 +08:00
|
|
|
* @skb: buffer
|
|
|
|
*/
|
|
|
|
static inline bool skb_dst_is_noref(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return (skb->_skb_refdst & SKB_DST_NOREF) && skb_dst(skb);
|
2009-06-02 13:19:30 +08:00
|
|
|
}
|
|
|
|
|
2009-06-02 13:14:27 +08:00
|
|
|
static inline struct rtable *skb_rtable(const struct sk_buff *skb)
|
|
|
|
{
|
2009-06-02 13:19:30 +08:00
|
|
|
return (struct rtable *)skb_dst(skb);
|
2009-06-02 13:14:27 +08:00
|
|
|
}
|
|
|
|
|
2016-07-02 18:43:14 +08:00
|
|
|
/* For mangling skb->pkt_type from user space side from applications
|
|
|
|
* such as nft, tc, etc, we only allow a conservative subset of
|
|
|
|
* possible pkt_types to be set.
|
|
|
|
*/
|
|
|
|
static inline bool skb_pkt_type_ok(u32 ptype)
|
|
|
|
{
|
|
|
|
return ptype <= PACKET_OTHERHOST;
|
|
|
|
}
|
|
|
|
|
2017-05-19 23:52:37 +08:00
|
|
|
static inline unsigned int skb_napi_id(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
#ifdef CONFIG_NET_RX_BUSY_POLL
|
|
|
|
return skb->napi_id;
|
|
|
|
#else
|
|
|
|
return 0;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2017-06-12 17:23:41 +08:00
|
|
|
/* decrement the reference count and return true if we can free the skb */
|
|
|
|
static inline bool skb_unref(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
if (unlikely(!skb))
|
|
|
|
return false;
|
2017-06-30 18:07:58 +08:00
|
|
|
if (likely(refcount_read(&skb->users) == 1))
|
2017-06-12 17:23:41 +08:00
|
|
|
smp_rmb();
|
2017-06-30 18:07:58 +08:00
|
|
|
else if (likely(!refcount_dec_and_test(&skb->users)))
|
2017-06-12 17:23:41 +08:00
|
|
|
return false;
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
2017-06-12 17:23:42 +08:00
|
|
|
void skb_release_head_state(struct sk_buff *skb);
|
2013-09-27 05:48:15 +08:00
|
|
|
void kfree_skb(struct sk_buff *skb);
|
|
|
|
void kfree_skb_list(struct sk_buff *segs);
|
|
|
|
void skb_tx_error(struct sk_buff *skb);
|
|
|
|
void consume_skb(struct sk_buff *skb);
|
2017-09-06 20:44:36 +08:00
|
|
|
void __consume_stateless_skb(struct sk_buff *skb);
|
2013-09-27 05:48:15 +08:00
|
|
|
void __kfree_skb(struct sk_buff *skb);
|
2012-04-30 16:10:34 +08:00
|
|
|
extern struct kmem_cache *skbuff_head_cache;
|
2012-05-19 11:02:02 +08:00
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
void kfree_skb_partial(struct sk_buff *skb, bool head_stolen);
|
|
|
|
bool skb_try_coalesce(struct sk_buff *to, struct sk_buff *from,
|
|
|
|
bool *fragstolen, int *delta_truesize);
|
2012-05-19 11:02:02 +08:00
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
struct sk_buff *__alloc_skb(unsigned int size, gfp_t priority, int flags,
|
|
|
|
int node);
|
2015-04-25 07:05:01 +08:00
|
|
|
struct sk_buff *__build_skb(void *data, unsigned int frag_size);
|
2013-09-27 05:48:15 +08:00
|
|
|
struct sk_buff *build_skb(void *data, unsigned int frag_size);
|
2005-08-18 05:57:30 +08:00
|
|
|
static inline struct sk_buff *alloc_skb(unsigned int size,
|
2005-10-07 14:46:04 +08:00
|
|
|
gfp_t priority)
|
2005-08-18 05:57:30 +08:00
|
|
|
{
|
2010-10-12 03:05:25 +08:00
|
|
|
return __alloc_skb(size, priority, 0, NUMA_NO_NODE);
|
2005-08-18 05:57:30 +08:00
|
|
|
}
|
|
|
|
|
2014-09-17 19:49:49 +08:00
|
|
|
struct sk_buff *alloc_skb_with_frags(unsigned long header_len,
|
|
|
|
unsigned long data_len,
|
|
|
|
int max_page_order,
|
|
|
|
int *errcode,
|
|
|
|
gfp_t gfp_mask);
|
|
|
|
|
2014-09-30 04:29:15 +08:00
|
|
|
/* Layout of fast clones : [skb1][skb2][fclone_ref] */
|
|
|
|
struct sk_buff_fclones {
|
|
|
|
struct sk_buff skb1;
|
|
|
|
|
|
|
|
struct sk_buff skb2;
|
|
|
|
|
2017-06-30 18:07:59 +08:00
|
|
|
refcount_t fclone_ref;
|
2014-09-30 04:29:15 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_fclone_busy - check if fclone is busy
|
2016-10-24 00:28:29 +08:00
|
|
|
* @sk: socket
|
2014-09-30 04:29:15 +08:00
|
|
|
* @skb: buffer
|
|
|
|
*
|
2015-12-13 15:53:02 +08:00
|
|
|
* Returns true if skb is a fast clone, and its clone is not freed.
|
2014-10-31 01:32:34 +08:00
|
|
|
* Some drivers call skb_orphan() in their ndo_start_xmit(),
|
|
|
|
* so we also check that this didnt happen.
|
2014-09-30 04:29:15 +08:00
|
|
|
*/
|
2014-10-31 01:32:34 +08:00
|
|
|
static inline bool skb_fclone_busy(const struct sock *sk,
|
|
|
|
const struct sk_buff *skb)
|
2014-09-30 04:29:15 +08:00
|
|
|
{
|
|
|
|
const struct sk_buff_fclones *fclones;
|
|
|
|
|
|
|
|
fclones = container_of(skb, struct sk_buff_fclones, skb1);
|
|
|
|
|
|
|
|
return skb->fclone == SKB_FCLONE_ORIG &&
|
2017-06-30 18:07:59 +08:00
|
|
|
refcount_read(&fclones->fclone_ref) > 1 &&
|
2014-10-31 01:32:34 +08:00
|
|
|
fclones->skb2.sk == sk;
|
2014-09-30 04:29:15 +08:00
|
|
|
}
|
|
|
|
|
2005-08-18 05:57:30 +08:00
|
|
|
static inline struct sk_buff *alloc_skb_fclone(unsigned int size,
|
2005-10-07 14:46:04 +08:00
|
|
|
gfp_t priority)
|
2005-08-18 05:57:30 +08:00
|
|
|
{
|
2012-08-01 07:44:19 +08:00
|
|
|
return __alloc_skb(size, priority, SKB_ALLOC_FCLONE, NUMA_NO_NODE);
|
2005-08-18 05:57:30 +08:00
|
|
|
}
|
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
struct sk_buff *skb_morph(struct sk_buff *dst, struct sk_buff *src);
|
|
|
|
int skb_copy_ubufs(struct sk_buff *skb, gfp_t gfp_mask);
|
|
|
|
struct sk_buff *skb_clone(struct sk_buff *skb, gfp_t priority);
|
|
|
|
struct sk_buff *skb_copy(const struct sk_buff *skb, gfp_t priority);
|
2014-06-12 06:36:26 +08:00
|
|
|
struct sk_buff *__pskb_copy_fclone(struct sk_buff *skb, int headroom,
|
|
|
|
gfp_t gfp_mask, bool fclone);
|
|
|
|
static inline struct sk_buff *__pskb_copy(struct sk_buff *skb, int headroom,
|
|
|
|
gfp_t gfp_mask)
|
|
|
|
{
|
|
|
|
return __pskb_copy_fclone(skb, headroom, gfp_mask, false);
|
|
|
|
}
|
2013-09-27 05:48:15 +08:00
|
|
|
|
|
|
|
int pskb_expand_head(struct sk_buff *skb, int nhead, int ntail, gfp_t gfp_mask);
|
|
|
|
struct sk_buff *skb_realloc_headroom(struct sk_buff *skb,
|
|
|
|
unsigned int headroom);
|
|
|
|
struct sk_buff *skb_copy_expand(const struct sk_buff *skb, int newheadroom,
|
|
|
|
int newtailroom, gfp_t priority);
|
skbuff: return -EMSGSIZE in skb_to_sgvec to prevent overflow
This is a defense-in-depth measure in response to bugs like
4d6fa57b4dab ("macsec: avoid heap overflow in skb_to_sgvec"). There's
not only a potential overflow of sglist items, but also a stack overflow
potential, so we fix this by limiting the amount of recursion this function
is allowed to do. Not actually providing a bounded base case is a future
disaster that we can easily avoid here.
As a small matter of house keeping, we take this opportunity to move the
documentation comment over the actual function the documentation is for.
While this could be implemented by using an explicit stack of skbuffs,
when implementing this, the function complexity increased considerably,
and I don't think such complexity and bloat is actually worth it. So,
instead I built this and tested it on x86, x86_64, ARM, ARM64, and MIPS,
and measured the stack usage there. I also reverted the recent MIPS
changes that give it a separate IRQ stack, so that I could experience
some worst-case situations. I found that limiting it to 24 layers deep
yielded a good stack usage with room for safety, as well as being much
deeper than any driver actually ever creates.
Signed-off-by: Jason A. Donenfeld <Jason@zx2c4.com>
Cc: Steffen Klassert <steffen.klassert@secunet.com>
Cc: Herbert Xu <herbert@gondor.apana.org.au>
Cc: "David S. Miller" <davem@davemloft.net>
Cc: David Howells <dhowells@redhat.com>
Cc: Sabrina Dubroca <sd@queasysnail.net>
Cc: "Michael S. Tsirkin" <mst@redhat.com>
Cc: Jason Wang <jasowang@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-04 10:16:22 +08:00
|
|
|
int __must_check skb_to_sgvec_nomark(struct sk_buff *skb, struct scatterlist *sg,
|
|
|
|
int offset, int len);
|
|
|
|
int __must_check skb_to_sgvec(struct sk_buff *skb, struct scatterlist *sg,
|
|
|
|
int offset, int len);
|
2013-09-27 05:48:15 +08:00
|
|
|
int skb_cow_data(struct sk_buff *skb, int tailbits, struct sk_buff **trailer);
|
2017-08-23 06:12:14 +08:00
|
|
|
int __skb_pad(struct sk_buff *skb, int pad, bool free_on_error);
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_pad - zero pad the tail of an skb
|
|
|
|
* @skb: buffer to pad
|
|
|
|
* @pad: space to pad
|
|
|
|
*
|
|
|
|
* Ensure that a buffer is followed by a padding area that is zero
|
|
|
|
* filled. Used by network drivers which may DMA or transfer data
|
|
|
|
* beyond the buffer end onto the wire.
|
|
|
|
*
|
|
|
|
* May return error in out of memory cases. The skb is freed on error.
|
|
|
|
*/
|
|
|
|
static inline int skb_pad(struct sk_buff *skb, int pad)
|
|
|
|
{
|
|
|
|
return __skb_pad(skb, pad, true);
|
|
|
|
}
|
2009-03-11 17:49:55 +08:00
|
|
|
#define dev_kfree_skb(a) consume_skb(a)
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
int skb_append_datato_frags(struct sock *sk, struct sk_buff *skb,
|
|
|
|
int getfrag(void *from, char *to, int offset,
|
|
|
|
int len, int odd, struct sk_buff *skb),
|
|
|
|
void *from, int length);
|
2005-10-19 06:46:41 +08:00
|
|
|
|
2015-05-21 22:59:58 +08:00
|
|
|
int skb_append_pagefrags(struct sk_buff *skb, struct page *page,
|
|
|
|
int offset, size_t size);
|
|
|
|
|
2009-11-05 01:50:58 +08:00
|
|
|
struct skb_seq_state {
|
2005-06-24 11:59:51 +08:00
|
|
|
__u32 lower_offset;
|
|
|
|
__u32 upper_offset;
|
|
|
|
__u32 frag_idx;
|
|
|
|
__u32 stepped_offset;
|
|
|
|
struct sk_buff *root_skb;
|
|
|
|
struct sk_buff *cur_skb;
|
|
|
|
__u8 *frag_data;
|
|
|
|
};
|
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_prepare_seq_read(struct sk_buff *skb, unsigned int from,
|
|
|
|
unsigned int to, struct skb_seq_state *st);
|
|
|
|
unsigned int skb_seq_read(unsigned int consumed, const u8 **data,
|
|
|
|
struct skb_seq_state *st);
|
|
|
|
void skb_abort_seq_read(struct skb_seq_state *st);
|
2005-06-24 11:59:51 +08:00
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
unsigned int skb_find_text(struct sk_buff *skb, unsigned int from,
|
2015-02-22 18:46:35 +08:00
|
|
|
unsigned int to, struct ts_config *config);
|
2005-06-24 12:00:17 +08:00
|
|
|
|
2013-12-16 14:16:19 +08:00
|
|
|
/*
|
|
|
|
* Packet hash types specify the type of hash in skb_set_hash.
|
|
|
|
*
|
|
|
|
* Hash types refer to the protocol layer addresses which are used to
|
|
|
|
* construct a packet's hash. The hashes are used to differentiate or identify
|
|
|
|
* flows of the protocol layer for the hash type. Hash types are either
|
|
|
|
* layer-2 (L2), layer-3 (L3), or layer-4 (L4).
|
|
|
|
*
|
|
|
|
* Properties of hashes:
|
|
|
|
*
|
|
|
|
* 1) Two packets in different flows have different hash values
|
|
|
|
* 2) Two packets in the same flow should have the same hash value
|
|
|
|
*
|
|
|
|
* A hash at a higher layer is considered to be more specific. A driver should
|
|
|
|
* set the most specific hash possible.
|
|
|
|
*
|
|
|
|
* A driver cannot indicate a more specific hash than the layer at which a hash
|
|
|
|
* was computed. For instance an L3 hash cannot be set as an L4 hash.
|
|
|
|
*
|
|
|
|
* A driver may indicate a hash level which is less specific than the
|
|
|
|
* actual layer the hash was computed on. For instance, a hash computed
|
|
|
|
* at L4 may be considered an L3 hash. This should only be done if the
|
|
|
|
* driver can't unambiguously determine that the HW computed the hash at
|
|
|
|
* the higher layer. Note that the "should" in the second property above
|
|
|
|
* permits this.
|
|
|
|
*/
|
|
|
|
enum pkt_hash_types {
|
|
|
|
PKT_HASH_TYPE_NONE, /* Undefined type */
|
|
|
|
PKT_HASH_TYPE_L2, /* Input: src_MAC, dest_MAC */
|
|
|
|
PKT_HASH_TYPE_L3, /* Input: src_IP, dst_IP */
|
|
|
|
PKT_HASH_TYPE_L4, /* Input: src_IP, dst_IP, src_port, dst_port */
|
|
|
|
};
|
|
|
|
|
2015-09-02 00:24:24 +08:00
|
|
|
static inline void skb_clear_hash(struct sk_buff *skb)
|
2013-12-16 14:16:19 +08:00
|
|
|
{
|
2015-09-02 00:24:24 +08:00
|
|
|
skb->hash = 0;
|
2014-07-02 12:33:17 +08:00
|
|
|
skb->sw_hash = 0;
|
2015-09-02 00:24:24 +08:00
|
|
|
skb->l4_hash = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_clear_hash_if_not_l4(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
if (!skb->l4_hash)
|
|
|
|
skb_clear_hash(skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
__skb_set_hash(struct sk_buff *skb, __u32 hash, bool is_sw, bool is_l4)
|
|
|
|
{
|
|
|
|
skb->l4_hash = is_l4;
|
|
|
|
skb->sw_hash = is_sw;
|
2014-03-25 06:34:47 +08:00
|
|
|
skb->hash = hash;
|
2013-12-16 14:16:19 +08:00
|
|
|
}
|
|
|
|
|
2015-09-02 00:24:24 +08:00
|
|
|
static inline void
|
|
|
|
skb_set_hash(struct sk_buff *skb, __u32 hash, enum pkt_hash_types type)
|
|
|
|
{
|
|
|
|
/* Used by drivers to set hash from HW */
|
|
|
|
__skb_set_hash(skb, hash, false, type == PKT_HASH_TYPE_L4);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void
|
|
|
|
__skb_set_sw_hash(struct sk_buff *skb, __u32 hash, bool is_l4)
|
|
|
|
{
|
|
|
|
__skb_set_hash(skb, hash, true, is_l4);
|
|
|
|
}
|
|
|
|
|
2015-09-02 00:24:23 +08:00
|
|
|
void __skb_get_hash(struct sk_buff *skb);
|
2016-10-27 00:49:46 +08:00
|
|
|
u32 __skb_get_hash_symmetric(const struct sk_buff *skb);
|
2015-09-02 00:24:23 +08:00
|
|
|
u32 skb_get_poff(const struct sk_buff *skb);
|
|
|
|
u32 __skb_get_poff(const struct sk_buff *skb, void *data,
|
|
|
|
const struct flow_keys *keys, int hlen);
|
|
|
|
__be32 __skb_flow_get_ports(const struct sk_buff *skb, int thoff, u8 ip_proto,
|
|
|
|
void *data, int hlen_proto);
|
|
|
|
|
|
|
|
static inline __be32 skb_flow_get_ports(const struct sk_buff *skb,
|
|
|
|
int thoff, u8 ip_proto)
|
|
|
|
{
|
|
|
|
return __skb_flow_get_ports(skb, thoff, ip_proto, NULL, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
void skb_flow_dissector_init(struct flow_dissector *flow_dissector,
|
|
|
|
const struct flow_dissector_key *key,
|
|
|
|
unsigned int key_count);
|
|
|
|
|
|
|
|
bool __skb_flow_dissect(const struct sk_buff *skb,
|
|
|
|
struct flow_dissector *flow_dissector,
|
|
|
|
void *target_container,
|
2015-09-02 00:24:27 +08:00
|
|
|
void *data, __be16 proto, int nhoff, int hlen,
|
|
|
|
unsigned int flags);
|
2015-09-02 00:24:23 +08:00
|
|
|
|
|
|
|
static inline bool skb_flow_dissect(const struct sk_buff *skb,
|
|
|
|
struct flow_dissector *flow_dissector,
|
2015-09-02 00:24:27 +08:00
|
|
|
void *target_container, unsigned int flags)
|
2015-09-02 00:24:23 +08:00
|
|
|
{
|
|
|
|
return __skb_flow_dissect(skb, flow_dissector, target_container,
|
2015-09-02 00:24:27 +08:00
|
|
|
NULL, 0, 0, 0, flags);
|
2015-09-02 00:24:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool skb_flow_dissect_flow_keys(const struct sk_buff *skb,
|
2015-09-02 00:24:27 +08:00
|
|
|
struct flow_keys *flow,
|
|
|
|
unsigned int flags)
|
2015-09-02 00:24:23 +08:00
|
|
|
{
|
|
|
|
memset(flow, 0, sizeof(*flow));
|
|
|
|
return __skb_flow_dissect(skb, &flow_keys_dissector, flow,
|
2015-09-02 00:24:27 +08:00
|
|
|
NULL, 0, 0, 0, flags);
|
2015-09-02 00:24:23 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool skb_flow_dissect_flow_keys_buf(struct flow_keys *flow,
|
|
|
|
void *data, __be16 proto,
|
2015-09-02 00:24:27 +08:00
|
|
|
int nhoff, int hlen,
|
|
|
|
unsigned int flags)
|
2015-09-02 00:24:23 +08:00
|
|
|
{
|
|
|
|
memset(flow, 0, sizeof(*flow));
|
|
|
|
return __skb_flow_dissect(NULL, &flow_keys_buf_dissector, flow,
|
2015-09-02 00:24:27 +08:00
|
|
|
data, proto, nhoff, hlen, flags);
|
2015-09-02 00:24:23 +08:00
|
|
|
}
|
|
|
|
|
2013-12-16 14:12:06 +08:00
|
|
|
static inline __u32 skb_get_hash(struct sk_buff *skb)
|
2010-08-04 14:15:52 +08:00
|
|
|
{
|
2014-07-02 12:33:17 +08:00
|
|
|
if (!skb->l4_hash && !skb->sw_hash)
|
2013-12-16 14:12:06 +08:00
|
|
|
__skb_get_hash(skb);
|
2010-08-04 14:15:52 +08:00
|
|
|
|
2014-03-25 06:34:47 +08:00
|
|
|
return skb->hash;
|
2010-08-04 14:15:52 +08:00
|
|
|
}
|
|
|
|
|
2015-09-02 12:19:17 +08:00
|
|
|
static inline __u32 skb_get_hash_flowi6(struct sk_buff *skb, const struct flowi6 *fl6)
|
2015-08-01 07:52:10 +08:00
|
|
|
{
|
2015-09-02 00:24:25 +08:00
|
|
|
if (!skb->l4_hash && !skb->sw_hash) {
|
|
|
|
struct flow_keys keys;
|
2015-09-02 09:11:04 +08:00
|
|
|
__u32 hash = __get_hash_from_flowi6(fl6, &keys);
|
2015-09-02 00:24:25 +08:00
|
|
|
|
2015-09-02 09:11:04 +08:00
|
|
|
__skb_set_sw_hash(skb, hash, flow_keys_have_l4(&keys));
|
2015-09-02 00:24:25 +08:00
|
|
|
}
|
2015-08-01 07:52:10 +08:00
|
|
|
|
|
|
|
return skb->hash;
|
|
|
|
}
|
|
|
|
|
2015-05-02 02:30:12 +08:00
|
|
|
__u32 skb_get_hash_perturb(const struct sk_buff *skb, u32 perturb);
|
|
|
|
|
2014-01-16 00:57:54 +08:00
|
|
|
static inline __u32 skb_get_hash_raw(const struct sk_buff *skb)
|
|
|
|
{
|
2014-03-25 06:34:47 +08:00
|
|
|
return skb->hash;
|
2014-01-16 00:57:54 +08:00
|
|
|
}
|
|
|
|
|
2013-12-16 14:16:29 +08:00
|
|
|
static inline void skb_copy_hash(struct sk_buff *to, const struct sk_buff *from)
|
|
|
|
{
|
2014-03-25 06:34:47 +08:00
|
|
|
to->hash = from->hash;
|
2014-07-02 12:33:17 +08:00
|
|
|
to->sw_hash = from->sw_hash;
|
2014-03-25 06:34:47 +08:00
|
|
|
to->l4_hash = from->l4_hash;
|
2013-12-16 14:16:29 +08:00
|
|
|
};
|
|
|
|
|
2007-04-20 11:43:29 +08:00
|
|
|
#ifdef NET_SKBUFF_DATA_USES_OFFSET
|
|
|
|
static inline unsigned char *skb_end_pointer(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->head + skb->end;
|
|
|
|
}
|
2012-05-04 22:26:56 +08:00
|
|
|
|
|
|
|
static inline unsigned int skb_end_offset(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->end;
|
|
|
|
}
|
2007-04-20 11:43:29 +08:00
|
|
|
#else
|
|
|
|
static inline unsigned char *skb_end_pointer(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->end;
|
|
|
|
}
|
2012-05-04 22:26:56 +08:00
|
|
|
|
|
|
|
static inline unsigned int skb_end_offset(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->end - skb->head;
|
|
|
|
}
|
2007-04-20 11:43:29 +08:00
|
|
|
#endif
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/* Internal */
|
2007-04-20 11:43:29 +08:00
|
|
|
#define skb_shinfo(SKB) ((struct skb_shared_info *)(skb_end_pointer(SKB)))
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2009-02-12 13:03:37 +08:00
|
|
|
static inline struct skb_shared_hwtstamps *skb_hwtstamps(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return &skb_shinfo(skb)->hwtstamps;
|
|
|
|
}
|
|
|
|
|
2017-08-04 04:29:39 +08:00
|
|
|
static inline struct ubuf_info *skb_zcopy(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
bool is_zcopy = skb && skb_shinfo(skb)->tx_flags & SKBTX_DEV_ZEROCOPY;
|
|
|
|
|
|
|
|
return is_zcopy ? skb_uarg(skb) : NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_zcopy_set(struct sk_buff *skb, struct ubuf_info *uarg)
|
|
|
|
{
|
|
|
|
if (skb && uarg && !skb_zcopy(skb)) {
|
|
|
|
sock_zerocopy_get(uarg);
|
|
|
|
skb_shinfo(skb)->destructor_arg = uarg;
|
|
|
|
skb_shinfo(skb)->tx_flags |= SKBTX_ZEROCOPY_FRAG;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Release a reference on a zerocopy structure */
|
|
|
|
static inline void skb_zcopy_clear(struct sk_buff *skb, bool zerocopy)
|
|
|
|
{
|
|
|
|
struct ubuf_info *uarg = skb_zcopy(skb);
|
|
|
|
|
|
|
|
if (uarg) {
|
2017-08-10 07:09:44 +08:00
|
|
|
if (uarg->callback == sock_zerocopy_callback) {
|
|
|
|
uarg->zerocopy = uarg->zerocopy && zerocopy;
|
|
|
|
sock_zerocopy_put(uarg);
|
|
|
|
} else {
|
|
|
|
uarg->callback(uarg, zerocopy);
|
|
|
|
}
|
|
|
|
|
2017-08-04 04:29:39 +08:00
|
|
|
skb_shinfo(skb)->tx_flags &= ~SKBTX_ZEROCOPY_FRAG;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Abort a zerocopy operation and revert zckey on error in send syscall */
|
|
|
|
static inline void skb_zcopy_abort(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
struct ubuf_info *uarg = skb_zcopy(skb);
|
|
|
|
|
|
|
|
if (uarg) {
|
|
|
|
sock_zerocopy_put_abort(uarg);
|
|
|
|
skb_shinfo(skb)->tx_flags &= ~SKBTX_ZEROCOPY_FRAG;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* skb_queue_empty - check if a queue is empty
|
|
|
|
* @list: queue head
|
|
|
|
*
|
|
|
|
* Returns true if the queue is empty, false otherwise.
|
|
|
|
*/
|
|
|
|
static inline int skb_queue_empty(const struct sk_buff_head *list)
|
|
|
|
{
|
2014-01-08 06:23:44 +08:00
|
|
|
return list->next == (const struct sk_buff *) list;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2008-09-23 15:34:07 +08:00
|
|
|
/**
|
|
|
|
* skb_queue_is_last - check if skb is the last entry in the queue
|
|
|
|
* @list: queue head
|
|
|
|
* @skb: buffer
|
|
|
|
*
|
|
|
|
* Returns true if @skb is the last buffer on the list.
|
|
|
|
*/
|
|
|
|
static inline bool skb_queue_is_last(const struct sk_buff_head *list,
|
|
|
|
const struct sk_buff *skb)
|
|
|
|
{
|
2014-01-08 06:23:44 +08:00
|
|
|
return skb->next == (const struct sk_buff *) list;
|
2008-09-23 15:34:07 +08:00
|
|
|
}
|
|
|
|
|
tcp: Try to restore large SKBs while SACK processing
During SACK processing, most of the benefits of TSO are eaten by
the SACK blocks that one-by-one fragment SKBs to MSS sized chunks.
Then we're in problems when cleanup work for them has to be done
when a large cumulative ACK comes. Try to return back to pre-split
state already while more and more SACK info gets discovered by
combining newly discovered SACK areas with the previous skb if
that's SACKed as well.
This approach has a number of benefits:
1) The processing overhead is spread more equally over the RTT
2) Write queue has less skbs to process (affect everything
which has to walk in the queue past the sacked areas)
3) Write queue is consistent whole the time, so no other parts
of TCP has to be aware of this (this was not the case with
some other approach that was, well, quite intrusive all
around).
4) Clean_rtx_queue can release most of the pages using single
put_page instead of previous PAGE_SIZE/mss+1 calls
In case a hole is fully filled by the new SACK block, we attempt
to combine the next skb too which allows construction of skbs
that are even larger than what tso split them to and it handles
hole per on every nth patterns that often occur during slow start
overshoot pretty nicely. Though this to be really useful also
a retransmission would have to get lost since cumulative ACKs
advance one hole at a time in the most typical case.
TODO: handle upwards only merging. That should be rather easy
when segment is fully sacked but I'm leaving that as future
work item (it won't make very large difference anyway since
this current approach already covers quite a lot of normal
cases).
I was earlier thinking of some sophisticated way of tracking
timestamps of the first and the last segment but later on
realized that it won't be that necessary at all to store the
timestamp of the last segment. The cases that can occur are
basically either:
1) ambiguous => no sensible measurement can be taken anyway
2) non-ambiguous is due to reordering => having the timestamp
of the last segment there is just skewing things more off
than does some good since the ack got triggered by one of
the holes (besides some substle issues that would make
determining right hole/skb even harder problem). Anyway,
it has nothing to do with this change then.
I choose to route some abnormal looking cases with goto noop,
some could be handled differently (eg., by stopping the
walking at that skb but again). In general, they either
shouldn't happen at all or are rare enough to make no difference
in practice.
In theory this change (as whole) could cause some macroscale
regression (global) because of cache misses that are taken over
the round-trip time but it gets very likely better because of much
less (local) cache misses per other write queue walkers and the
big recovery clearing cumulative ack.
Worth to note that these benefits would be very easy to get also
without TSO/GSO being on as long as the data is in pages so that
we can merge them. Currently I won't let that happen because
DSACK splitting at fragment that would mess up pcounts due to
sk_can_gso in tcp_set_skb_tso_segs. Once DSACKs fragments gets
avoided, we have some conditions that can be made less strict.
TODO: I will probably have to convert the excessive pointer
passing to struct sacktag_state... :-)
My testing revealed that considerable amount of skbs couldn't
be shifted because they were cloned (most likely still awaiting
tx reclaim)...
[The rest is considering future work instead since I got
repeatably EFAULT to tcpdump's recvfrom when I added
pskb_expand_head to deal with clones, so I separated that
into another, later patch]
...To counter that, I gave up on the fifth advantage:
5) When growing previous SACK block, less allocs for new skbs
are done, basically a new alloc is needed only when new hole
is detected and when the previous skb runs out of frags space
...which now only happens of if reclaim is fast enough to dispose
the clone before the SACK block comes in (the window is RTT long),
otherwise we'll have to alloc some.
With clones being handled I got these numbers (will be somewhat
worse without that), taken with fine-grained mibs:
TCPSackShifted 398
TCPSackMerged 877
TCPSackShiftFallback 320
TCPSACKCOLLAPSEFALLBACKGSO 0
TCPSACKCOLLAPSEFALLBACKSKBBITS 0
TCPSACKCOLLAPSEFALLBACKSKBDATA 0
TCPSACKCOLLAPSEFALLBACKBELOW 0
TCPSACKCOLLAPSEFALLBACKFIRST 1
TCPSACKCOLLAPSEFALLBACKPREVBITS 318
TCPSACKCOLLAPSEFALLBACKMSS 1
TCPSACKCOLLAPSEFALLBACKNOHEAD 0
TCPSACKCOLLAPSEFALLBACKSHIFT 0
TCPSACKCOLLAPSENOOPSEQ 0
TCPSACKCOLLAPSENOOPSMALLPCOUNT 0
TCPSACKCOLLAPSENOOPSMALLLEN 0
TCPSACKCOLLAPSEHOLE 12
Signed-off-by: Ilpo Järvinen <ilpo.jarvinen@helsinki.fi>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-11-25 13:20:15 +08:00
|
|
|
/**
|
|
|
|
* skb_queue_is_first - check if skb is the first entry in the queue
|
|
|
|
* @list: queue head
|
|
|
|
* @skb: buffer
|
|
|
|
*
|
|
|
|
* Returns true if @skb is the first buffer on the list.
|
|
|
|
*/
|
|
|
|
static inline bool skb_queue_is_first(const struct sk_buff_head *list,
|
|
|
|
const struct sk_buff *skb)
|
|
|
|
{
|
2014-01-08 06:23:44 +08:00
|
|
|
return skb->prev == (const struct sk_buff *) list;
|
tcp: Try to restore large SKBs while SACK processing
During SACK processing, most of the benefits of TSO are eaten by
the SACK blocks that one-by-one fragment SKBs to MSS sized chunks.
Then we're in problems when cleanup work for them has to be done
when a large cumulative ACK comes. Try to return back to pre-split
state already while more and more SACK info gets discovered by
combining newly discovered SACK areas with the previous skb if
that's SACKed as well.
This approach has a number of benefits:
1) The processing overhead is spread more equally over the RTT
2) Write queue has less skbs to process (affect everything
which has to walk in the queue past the sacked areas)
3) Write queue is consistent whole the time, so no other parts
of TCP has to be aware of this (this was not the case with
some other approach that was, well, quite intrusive all
around).
4) Clean_rtx_queue can release most of the pages using single
put_page instead of previous PAGE_SIZE/mss+1 calls
In case a hole is fully filled by the new SACK block, we attempt
to combine the next skb too which allows construction of skbs
that are even larger than what tso split them to and it handles
hole per on every nth patterns that often occur during slow start
overshoot pretty nicely. Though this to be really useful also
a retransmission would have to get lost since cumulative ACKs
advance one hole at a time in the most typical case.
TODO: handle upwards only merging. That should be rather easy
when segment is fully sacked but I'm leaving that as future
work item (it won't make very large difference anyway since
this current approach already covers quite a lot of normal
cases).
I was earlier thinking of some sophisticated way of tracking
timestamps of the first and the last segment but later on
realized that it won't be that necessary at all to store the
timestamp of the last segment. The cases that can occur are
basically either:
1) ambiguous => no sensible measurement can be taken anyway
2) non-ambiguous is due to reordering => having the timestamp
of the last segment there is just skewing things more off
than does some good since the ack got triggered by one of
the holes (besides some substle issues that would make
determining right hole/skb even harder problem). Anyway,
it has nothing to do with this change then.
I choose to route some abnormal looking cases with goto noop,
some could be handled differently (eg., by stopping the
walking at that skb but again). In general, they either
shouldn't happen at all or are rare enough to make no difference
in practice.
In theory this change (as whole) could cause some macroscale
regression (global) because of cache misses that are taken over
the round-trip time but it gets very likely better because of much
less (local) cache misses per other write queue walkers and the
big recovery clearing cumulative ack.
Worth to note that these benefits would be very easy to get also
without TSO/GSO being on as long as the data is in pages so that
we can merge them. Currently I won't let that happen because
DSACK splitting at fragment that would mess up pcounts due to
sk_can_gso in tcp_set_skb_tso_segs. Once DSACKs fragments gets
avoided, we have some conditions that can be made less strict.
TODO: I will probably have to convert the excessive pointer
passing to struct sacktag_state... :-)
My testing revealed that considerable amount of skbs couldn't
be shifted because they were cloned (most likely still awaiting
tx reclaim)...
[The rest is considering future work instead since I got
repeatably EFAULT to tcpdump's recvfrom when I added
pskb_expand_head to deal with clones, so I separated that
into another, later patch]
...To counter that, I gave up on the fifth advantage:
5) When growing previous SACK block, less allocs for new skbs
are done, basically a new alloc is needed only when new hole
is detected and when the previous skb runs out of frags space
...which now only happens of if reclaim is fast enough to dispose
the clone before the SACK block comes in (the window is RTT long),
otherwise we'll have to alloc some.
With clones being handled I got these numbers (will be somewhat
worse without that), taken with fine-grained mibs:
TCPSackShifted 398
TCPSackMerged 877
TCPSackShiftFallback 320
TCPSACKCOLLAPSEFALLBACKGSO 0
TCPSACKCOLLAPSEFALLBACKSKBBITS 0
TCPSACKCOLLAPSEFALLBACKSKBDATA 0
TCPSACKCOLLAPSEFALLBACKBELOW 0
TCPSACKCOLLAPSEFALLBACKFIRST 1
TCPSACKCOLLAPSEFALLBACKPREVBITS 318
TCPSACKCOLLAPSEFALLBACKMSS 1
TCPSACKCOLLAPSEFALLBACKNOHEAD 0
TCPSACKCOLLAPSEFALLBACKSHIFT 0
TCPSACKCOLLAPSENOOPSEQ 0
TCPSACKCOLLAPSENOOPSMALLPCOUNT 0
TCPSACKCOLLAPSENOOPSMALLLEN 0
TCPSACKCOLLAPSEHOLE 12
Signed-off-by: Ilpo Järvinen <ilpo.jarvinen@helsinki.fi>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-11-25 13:20:15 +08:00
|
|
|
}
|
|
|
|
|
2008-09-23 15:44:42 +08:00
|
|
|
/**
|
|
|
|
* skb_queue_next - return the next packet in the queue
|
|
|
|
* @list: queue head
|
|
|
|
* @skb: current buffer
|
|
|
|
*
|
|
|
|
* Return the next packet in @list after @skb. It is only valid to
|
|
|
|
* call this if skb_queue_is_last() evaluates to false.
|
|
|
|
*/
|
|
|
|
static inline struct sk_buff *skb_queue_next(const struct sk_buff_head *list,
|
|
|
|
const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
/* This BUG_ON may seem severe, but if we just return then we
|
|
|
|
* are going to dereference garbage.
|
|
|
|
*/
|
|
|
|
BUG_ON(skb_queue_is_last(list, skb));
|
|
|
|
return skb->next;
|
|
|
|
}
|
|
|
|
|
tcp: Try to restore large SKBs while SACK processing
During SACK processing, most of the benefits of TSO are eaten by
the SACK blocks that one-by-one fragment SKBs to MSS sized chunks.
Then we're in problems when cleanup work for them has to be done
when a large cumulative ACK comes. Try to return back to pre-split
state already while more and more SACK info gets discovered by
combining newly discovered SACK areas with the previous skb if
that's SACKed as well.
This approach has a number of benefits:
1) The processing overhead is spread more equally over the RTT
2) Write queue has less skbs to process (affect everything
which has to walk in the queue past the sacked areas)
3) Write queue is consistent whole the time, so no other parts
of TCP has to be aware of this (this was not the case with
some other approach that was, well, quite intrusive all
around).
4) Clean_rtx_queue can release most of the pages using single
put_page instead of previous PAGE_SIZE/mss+1 calls
In case a hole is fully filled by the new SACK block, we attempt
to combine the next skb too which allows construction of skbs
that are even larger than what tso split them to and it handles
hole per on every nth patterns that often occur during slow start
overshoot pretty nicely. Though this to be really useful also
a retransmission would have to get lost since cumulative ACKs
advance one hole at a time in the most typical case.
TODO: handle upwards only merging. That should be rather easy
when segment is fully sacked but I'm leaving that as future
work item (it won't make very large difference anyway since
this current approach already covers quite a lot of normal
cases).
I was earlier thinking of some sophisticated way of tracking
timestamps of the first and the last segment but later on
realized that it won't be that necessary at all to store the
timestamp of the last segment. The cases that can occur are
basically either:
1) ambiguous => no sensible measurement can be taken anyway
2) non-ambiguous is due to reordering => having the timestamp
of the last segment there is just skewing things more off
than does some good since the ack got triggered by one of
the holes (besides some substle issues that would make
determining right hole/skb even harder problem). Anyway,
it has nothing to do with this change then.
I choose to route some abnormal looking cases with goto noop,
some could be handled differently (eg., by stopping the
walking at that skb but again). In general, they either
shouldn't happen at all or are rare enough to make no difference
in practice.
In theory this change (as whole) could cause some macroscale
regression (global) because of cache misses that are taken over
the round-trip time but it gets very likely better because of much
less (local) cache misses per other write queue walkers and the
big recovery clearing cumulative ack.
Worth to note that these benefits would be very easy to get also
without TSO/GSO being on as long as the data is in pages so that
we can merge them. Currently I won't let that happen because
DSACK splitting at fragment that would mess up pcounts due to
sk_can_gso in tcp_set_skb_tso_segs. Once DSACKs fragments gets
avoided, we have some conditions that can be made less strict.
TODO: I will probably have to convert the excessive pointer
passing to struct sacktag_state... :-)
My testing revealed that considerable amount of skbs couldn't
be shifted because they were cloned (most likely still awaiting
tx reclaim)...
[The rest is considering future work instead since I got
repeatably EFAULT to tcpdump's recvfrom when I added
pskb_expand_head to deal with clones, so I separated that
into another, later patch]
...To counter that, I gave up on the fifth advantage:
5) When growing previous SACK block, less allocs for new skbs
are done, basically a new alloc is needed only when new hole
is detected and when the previous skb runs out of frags space
...which now only happens of if reclaim is fast enough to dispose
the clone before the SACK block comes in (the window is RTT long),
otherwise we'll have to alloc some.
With clones being handled I got these numbers (will be somewhat
worse without that), taken with fine-grained mibs:
TCPSackShifted 398
TCPSackMerged 877
TCPSackShiftFallback 320
TCPSACKCOLLAPSEFALLBACKGSO 0
TCPSACKCOLLAPSEFALLBACKSKBBITS 0
TCPSACKCOLLAPSEFALLBACKSKBDATA 0
TCPSACKCOLLAPSEFALLBACKBELOW 0
TCPSACKCOLLAPSEFALLBACKFIRST 1
TCPSACKCOLLAPSEFALLBACKPREVBITS 318
TCPSACKCOLLAPSEFALLBACKMSS 1
TCPSACKCOLLAPSEFALLBACKNOHEAD 0
TCPSACKCOLLAPSEFALLBACKSHIFT 0
TCPSACKCOLLAPSENOOPSEQ 0
TCPSACKCOLLAPSENOOPSMALLPCOUNT 0
TCPSACKCOLLAPSENOOPSMALLLEN 0
TCPSACKCOLLAPSEHOLE 12
Signed-off-by: Ilpo Järvinen <ilpo.jarvinen@helsinki.fi>
Signed-off-by: David S. Miller <davem@davemloft.net>
2008-11-25 13:20:15 +08:00
|
|
|
/**
|
|
|
|
* skb_queue_prev - return the prev packet in the queue
|
|
|
|
* @list: queue head
|
|
|
|
* @skb: current buffer
|
|
|
|
*
|
|
|
|
* Return the prev packet in @list before @skb. It is only valid to
|
|
|
|
* call this if skb_queue_is_first() evaluates to false.
|
|
|
|
*/
|
|
|
|
static inline struct sk_buff *skb_queue_prev(const struct sk_buff_head *list,
|
|
|
|
const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
/* This BUG_ON may seem severe, but if we just return then we
|
|
|
|
* are going to dereference garbage.
|
|
|
|
*/
|
|
|
|
BUG_ON(skb_queue_is_first(list, skb));
|
|
|
|
return skb->prev;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* skb_get - reference buffer
|
|
|
|
* @skb: buffer to reference
|
|
|
|
*
|
|
|
|
* Makes another reference to a socket buffer and returns a pointer
|
|
|
|
* to the buffer.
|
|
|
|
*/
|
|
|
|
static inline struct sk_buff *skb_get(struct sk_buff *skb)
|
|
|
|
{
|
2017-06-30 18:07:58 +08:00
|
|
|
refcount_inc(&skb->users);
|
2005-04-17 06:20:36 +08:00
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
2017-11-30 21:33:56 +08:00
|
|
|
* If users == 1, we are the only owner and can avoid redundant atomic changes.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_cloned - is the buffer a clone
|
|
|
|
* @skb: buffer to check
|
|
|
|
*
|
|
|
|
* Returns true if the buffer was generated with skb_clone() and is
|
|
|
|
* one of multiple shared copies of the buffer. Cloned buffers are
|
|
|
|
* shared data so must not be written to under normal circumstances.
|
|
|
|
*/
|
|
|
|
static inline int skb_cloned(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->cloned &&
|
|
|
|
(atomic_read(&skb_shinfo(skb)->dataref) & SKB_DATAREF_MASK) != 1;
|
|
|
|
}
|
|
|
|
|
2013-02-14 17:44:49 +08:00
|
|
|
static inline int skb_unclone(struct sk_buff *skb, gfp_t pri)
|
|
|
|
{
|
2015-11-07 08:28:21 +08:00
|
|
|
might_sleep_if(gfpflags_allow_blocking(pri));
|
2013-02-14 17:44:49 +08:00
|
|
|
|
|
|
|
if (skb_cloned(skb))
|
|
|
|
return pskb_expand_head(skb, 0, 0, pri);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* skb_header_cloned - is the header a clone
|
|
|
|
* @skb: buffer to check
|
|
|
|
*
|
|
|
|
* Returns true if modifying the header part of the buffer requires
|
|
|
|
* the data to be copied.
|
|
|
|
*/
|
|
|
|
static inline int skb_header_cloned(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
int dataref;
|
|
|
|
|
|
|
|
if (!skb->cloned)
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
dataref = atomic_read(&skb_shinfo(skb)->dataref);
|
|
|
|
dataref = (dataref & SKB_DATAREF_MASK) - (dataref >> SKB_DATAREF_SHIFT);
|
|
|
|
return dataref != 1;
|
|
|
|
}
|
|
|
|
|
2016-05-01 01:19:29 +08:00
|
|
|
static inline int skb_header_unclone(struct sk_buff *skb, gfp_t pri)
|
|
|
|
{
|
|
|
|
might_sleep_if(gfpflags_allow_blocking(pri));
|
|
|
|
|
|
|
|
if (skb_header_cloned(skb))
|
|
|
|
return pskb_expand_head(skb, 0, 0, pri);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2014-09-23 07:29:32 +08:00
|
|
|
/**
|
|
|
|
* __skb_header_release - release reference to header
|
|
|
|
* @skb: buffer to operate on
|
|
|
|
*/
|
|
|
|
static inline void __skb_header_release(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb->nohdr = 1;
|
|
|
|
atomic_set(&skb_shinfo(skb)->dataref, 1 + (1 << SKB_DATAREF_SHIFT));
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* skb_shared - is the buffer shared
|
|
|
|
* @skb: buffer to check
|
|
|
|
*
|
|
|
|
* Returns true if more than one person has a reference to this
|
|
|
|
* buffer.
|
|
|
|
*/
|
|
|
|
static inline int skb_shared(const struct sk_buff *skb)
|
|
|
|
{
|
2017-06-30 18:07:58 +08:00
|
|
|
return refcount_read(&skb->users) != 1;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_share_check - check if buffer is shared and if so clone it
|
|
|
|
* @skb: buffer to check
|
|
|
|
* @pri: priority for memory allocation
|
|
|
|
*
|
|
|
|
* If the buffer is shared the buffer is cloned and the old copy
|
|
|
|
* drops a reference. A new clone with a single reference is returned.
|
|
|
|
* If the buffer is not shared the original buffer is returned. When
|
|
|
|
* being called from interrupt status or with spinlocks held pri must
|
|
|
|
* be GFP_ATOMIC.
|
|
|
|
*
|
|
|
|
* NULL is returned on a memory allocation failure.
|
|
|
|
*/
|
2012-08-04 04:54:15 +08:00
|
|
|
static inline struct sk_buff *skb_share_check(struct sk_buff *skb, gfp_t pri)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2015-11-07 08:28:21 +08:00
|
|
|
might_sleep_if(gfpflags_allow_blocking(pri));
|
2005-04-17 06:20:36 +08:00
|
|
|
if (skb_shared(skb)) {
|
|
|
|
struct sk_buff *nskb = skb_clone(skb, pri);
|
2012-08-04 04:54:15 +08:00
|
|
|
|
|
|
|
if (likely(nskb))
|
|
|
|
consume_skb(skb);
|
|
|
|
else
|
|
|
|
kfree_skb(skb);
|
2005-04-17 06:20:36 +08:00
|
|
|
skb = nskb;
|
|
|
|
}
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copy shared buffers into a new sk_buff. We effectively do COW on
|
|
|
|
* packets to handle cases where we have a local reader and forward
|
|
|
|
* and a couple of other messy ones. The normal one is tcpdumping
|
|
|
|
* a packet thats being forwarded.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_unshare - make a copy of a shared buffer
|
|
|
|
* @skb: buffer to check
|
|
|
|
* @pri: priority for memory allocation
|
|
|
|
*
|
|
|
|
* If the socket buffer is a clone then this function creates a new
|
|
|
|
* copy of the data, drops a reference count on the old copy and returns
|
|
|
|
* the new copy with the reference count at 1. If the buffer is not a clone
|
|
|
|
* the original buffer is returned. When called with a spinlock held or
|
|
|
|
* from interrupt state @pri must be %GFP_ATOMIC
|
|
|
|
*
|
|
|
|
* %NULL is returned on a memory allocation failure.
|
|
|
|
*/
|
2005-07-19 04:36:38 +08:00
|
|
|
static inline struct sk_buff *skb_unshare(struct sk_buff *skb,
|
2005-10-07 14:46:04 +08:00
|
|
|
gfp_t pri)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2015-11-07 08:28:21 +08:00
|
|
|
might_sleep_if(gfpflags_allow_blocking(pri));
|
2005-04-17 06:20:36 +08:00
|
|
|
if (skb_cloned(skb)) {
|
|
|
|
struct sk_buff *nskb = skb_copy(skb, pri);
|
2014-10-11 05:10:47 +08:00
|
|
|
|
|
|
|
/* Free our shared copy */
|
|
|
|
if (likely(nskb))
|
|
|
|
consume_skb(skb);
|
|
|
|
else
|
|
|
|
kfree_skb(skb);
|
2005-04-17 06:20:36 +08:00
|
|
|
skb = nskb;
|
|
|
|
}
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2010-02-15 14:35:47 +08:00
|
|
|
* skb_peek - peek at the head of an &sk_buff_head
|
2005-04-17 06:20:36 +08:00
|
|
|
* @list_: list to peek at
|
|
|
|
*
|
|
|
|
* Peek an &sk_buff. Unlike most other operations you _MUST_
|
|
|
|
* be careful with this one. A peek leaves the buffer on the
|
|
|
|
* list and someone else may run off with it. You must hold
|
|
|
|
* the appropriate locks or have a private queue to do this.
|
|
|
|
*
|
|
|
|
* Returns %NULL for an empty list or a pointer to the head element.
|
|
|
|
* The reference count is not incremented and the reference is therefore
|
|
|
|
* volatile. Use with caution.
|
|
|
|
*/
|
2011-10-21 05:45:43 +08:00
|
|
|
static inline struct sk_buff *skb_peek(const struct sk_buff_head *list_)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2012-05-01 00:31:46 +08:00
|
|
|
struct sk_buff *skb = list_->next;
|
|
|
|
|
|
|
|
if (skb == (struct sk_buff *)list_)
|
|
|
|
skb = NULL;
|
|
|
|
return skb;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2012-02-21 15:31:18 +08:00
|
|
|
/**
|
|
|
|
* skb_peek_next - peek skb following the given one from a queue
|
|
|
|
* @skb: skb to start from
|
|
|
|
* @list_: list to peek at
|
|
|
|
*
|
|
|
|
* Returns %NULL when the end of the list is met or a pointer to the
|
|
|
|
* next element. The reference count is not incremented and the
|
|
|
|
* reference is therefore volatile. Use with caution.
|
|
|
|
*/
|
|
|
|
static inline struct sk_buff *skb_peek_next(struct sk_buff *skb,
|
|
|
|
const struct sk_buff_head *list_)
|
|
|
|
{
|
|
|
|
struct sk_buff *next = skb->next;
|
2012-05-01 00:31:46 +08:00
|
|
|
|
2012-02-21 15:31:18 +08:00
|
|
|
if (next == (struct sk_buff *)list_)
|
|
|
|
next = NULL;
|
|
|
|
return next;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
2010-02-15 14:35:47 +08:00
|
|
|
* skb_peek_tail - peek at the tail of an &sk_buff_head
|
2005-04-17 06:20:36 +08:00
|
|
|
* @list_: list to peek at
|
|
|
|
*
|
|
|
|
* Peek an &sk_buff. Unlike most other operations you _MUST_
|
|
|
|
* be careful with this one. A peek leaves the buffer on the
|
|
|
|
* list and someone else may run off with it. You must hold
|
|
|
|
* the appropriate locks or have a private queue to do this.
|
|
|
|
*
|
|
|
|
* Returns %NULL for an empty list or a pointer to the tail element.
|
|
|
|
* The reference count is not incremented and the reference is therefore
|
|
|
|
* volatile. Use with caution.
|
|
|
|
*/
|
2011-10-21 05:45:43 +08:00
|
|
|
static inline struct sk_buff *skb_peek_tail(const struct sk_buff_head *list_)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2012-05-01 00:31:46 +08:00
|
|
|
struct sk_buff *skb = list_->prev;
|
|
|
|
|
|
|
|
if (skb == (struct sk_buff *)list_)
|
|
|
|
skb = NULL;
|
|
|
|
return skb;
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_queue_len - get queue length
|
|
|
|
* @list_: list to measure
|
|
|
|
*
|
|
|
|
* Return the length of an &sk_buff queue.
|
|
|
|
*/
|
|
|
|
static inline __u32 skb_queue_len(const struct sk_buff_head *list_)
|
|
|
|
{
|
|
|
|
return list_->qlen;
|
|
|
|
}
|
|
|
|
|
2008-09-22 13:36:24 +08:00
|
|
|
/**
|
|
|
|
* __skb_queue_head_init - initialize non-spinlock portions of sk_buff_head
|
|
|
|
* @list: queue to initialize
|
|
|
|
*
|
|
|
|
* This initializes only the list and queue length aspects of
|
|
|
|
* an sk_buff_head object. This allows to initialize the list
|
|
|
|
* aspects of an sk_buff_head without reinitializing things like
|
|
|
|
* the spinlock. It can also be used for on-stack sk_buff_head
|
|
|
|
* objects where the spinlock is known to not be used.
|
|
|
|
*/
|
|
|
|
static inline void __skb_queue_head_init(struct sk_buff_head *list)
|
|
|
|
{
|
|
|
|
list->prev = list->next = (struct sk_buff *)list;
|
|
|
|
list->qlen = 0;
|
|
|
|
}
|
|
|
|
|
2006-08-03 05:06:55 +08:00
|
|
|
/*
|
|
|
|
* This function creates a split out lock class for each invocation;
|
|
|
|
* this is needed for now since a whole lot of users of the skb-queue
|
|
|
|
* infrastructure in drivers have different locking usage (in hardirq)
|
|
|
|
* than the networking core (in softirq only). In the long run either the
|
|
|
|
* network layer or drivers should need annotation to consolidate the
|
|
|
|
* main types of usage into 3 classes.
|
|
|
|
*/
|
2005-04-17 06:20:36 +08:00
|
|
|
static inline void skb_queue_head_init(struct sk_buff_head *list)
|
|
|
|
{
|
|
|
|
spin_lock_init(&list->lock);
|
2008-09-22 13:36:24 +08:00
|
|
|
__skb_queue_head_init(list);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2007-04-18 03:45:31 +08:00
|
|
|
static inline void skb_queue_head_init_class(struct sk_buff_head *list,
|
|
|
|
struct lock_class_key *class)
|
|
|
|
{
|
|
|
|
skb_queue_head_init(list);
|
|
|
|
lockdep_set_class(&list->lock, class);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
2008-04-14 15:04:51 +08:00
|
|
|
* Insert an sk_buff on a list.
|
2005-04-17 06:20:36 +08:00
|
|
|
*
|
|
|
|
* The "__skb_xxxx()" functions are the non-atomic ones that
|
|
|
|
* can only be called with interrupts disabled.
|
|
|
|
*/
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_insert(struct sk_buff *old, struct sk_buff *newsk,
|
|
|
|
struct sk_buff_head *list);
|
2008-04-14 15:04:51 +08:00
|
|
|
static inline void __skb_insert(struct sk_buff *newsk,
|
|
|
|
struct sk_buff *prev, struct sk_buff *next,
|
|
|
|
struct sk_buff_head *list)
|
|
|
|
{
|
|
|
|
newsk->next = next;
|
|
|
|
newsk->prev = prev;
|
|
|
|
next->prev = prev->next = newsk;
|
|
|
|
list->qlen++;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2008-09-22 13:36:24 +08:00
|
|
|
static inline void __skb_queue_splice(const struct sk_buff_head *list,
|
|
|
|
struct sk_buff *prev,
|
|
|
|
struct sk_buff *next)
|
|
|
|
{
|
|
|
|
struct sk_buff *first = list->next;
|
|
|
|
struct sk_buff *last = list->prev;
|
|
|
|
|
|
|
|
first->prev = prev;
|
|
|
|
prev->next = first;
|
|
|
|
|
|
|
|
last->next = next;
|
|
|
|
next->prev = last;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_queue_splice - join two skb lists, this is designed for stacks
|
|
|
|
* @list: the new list to add
|
|
|
|
* @head: the place to add it in the first list
|
|
|
|
*/
|
|
|
|
static inline void skb_queue_splice(const struct sk_buff_head *list,
|
|
|
|
struct sk_buff_head *head)
|
|
|
|
{
|
|
|
|
if (!skb_queue_empty(list)) {
|
|
|
|
__skb_queue_splice(list, (struct sk_buff *) head, head->next);
|
2008-09-23 12:57:21 +08:00
|
|
|
head->qlen += list->qlen;
|
2008-09-22 13:36:24 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2012-05-01 05:29:16 +08:00
|
|
|
* skb_queue_splice_init - join two skb lists and reinitialise the emptied list
|
2008-09-22 13:36:24 +08:00
|
|
|
* @list: the new list to add
|
|
|
|
* @head: the place to add it in the first list
|
|
|
|
*
|
|
|
|
* The list at @list is reinitialised
|
|
|
|
*/
|
|
|
|
static inline void skb_queue_splice_init(struct sk_buff_head *list,
|
|
|
|
struct sk_buff_head *head)
|
|
|
|
{
|
|
|
|
if (!skb_queue_empty(list)) {
|
|
|
|
__skb_queue_splice(list, (struct sk_buff *) head, head->next);
|
2008-09-23 12:57:21 +08:00
|
|
|
head->qlen += list->qlen;
|
2008-09-22 13:36:24 +08:00
|
|
|
__skb_queue_head_init(list);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_queue_splice_tail - join two skb lists, each list being a queue
|
|
|
|
* @list: the new list to add
|
|
|
|
* @head: the place to add it in the first list
|
|
|
|
*/
|
|
|
|
static inline void skb_queue_splice_tail(const struct sk_buff_head *list,
|
|
|
|
struct sk_buff_head *head)
|
|
|
|
{
|
|
|
|
if (!skb_queue_empty(list)) {
|
|
|
|
__skb_queue_splice(list, head->prev, (struct sk_buff *) head);
|
2008-09-23 12:57:21 +08:00
|
|
|
head->qlen += list->qlen;
|
2008-09-22 13:36:24 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
2012-05-01 05:29:16 +08:00
|
|
|
* skb_queue_splice_tail_init - join two skb lists and reinitialise the emptied list
|
2008-09-22 13:36:24 +08:00
|
|
|
* @list: the new list to add
|
|
|
|
* @head: the place to add it in the first list
|
|
|
|
*
|
|
|
|
* Each of the lists is a queue.
|
|
|
|
* The list at @list is reinitialised
|
|
|
|
*/
|
|
|
|
static inline void skb_queue_splice_tail_init(struct sk_buff_head *list,
|
|
|
|
struct sk_buff_head *head)
|
|
|
|
{
|
|
|
|
if (!skb_queue_empty(list)) {
|
|
|
|
__skb_queue_splice(list, head->prev, (struct sk_buff *) head);
|
2008-09-23 12:57:21 +08:00
|
|
|
head->qlen += list->qlen;
|
2008-09-22 13:36:24 +08:00
|
|
|
__skb_queue_head_init(list);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
2005-10-31 05:47:34 +08:00
|
|
|
* __skb_queue_after - queue a buffer at the list head
|
2005-04-17 06:20:36 +08:00
|
|
|
* @list: list to use
|
2005-10-31 05:47:34 +08:00
|
|
|
* @prev: place after this buffer
|
2005-04-17 06:20:36 +08:00
|
|
|
* @newsk: buffer to queue
|
|
|
|
*
|
2005-10-31 05:47:34 +08:00
|
|
|
* Queue a buffer int the middle of a list. This function takes no locks
|
2005-04-17 06:20:36 +08:00
|
|
|
* and you must therefore hold required locks before calling it.
|
|
|
|
*
|
|
|
|
* A buffer cannot be placed on two lists at the same time.
|
|
|
|
*/
|
2005-10-31 05:47:34 +08:00
|
|
|
static inline void __skb_queue_after(struct sk_buff_head *list,
|
|
|
|
struct sk_buff *prev,
|
|
|
|
struct sk_buff *newsk)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2008-04-14 15:04:51 +08:00
|
|
|
__skb_insert(newsk, prev, prev->next, list);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_append(struct sk_buff *old, struct sk_buff *newsk,
|
|
|
|
struct sk_buff_head *list);
|
2008-04-14 15:05:09 +08:00
|
|
|
|
2008-04-14 15:05:28 +08:00
|
|
|
static inline void __skb_queue_before(struct sk_buff_head *list,
|
|
|
|
struct sk_buff *next,
|
|
|
|
struct sk_buff *newsk)
|
|
|
|
{
|
|
|
|
__skb_insert(newsk, next->prev, next, list);
|
|
|
|
}
|
|
|
|
|
2005-10-31 05:47:34 +08:00
|
|
|
/**
|
|
|
|
* __skb_queue_head - queue a buffer at the list head
|
|
|
|
* @list: list to use
|
|
|
|
* @newsk: buffer to queue
|
|
|
|
*
|
|
|
|
* Queue a buffer at the start of a list. This function takes no locks
|
|
|
|
* and you must therefore hold required locks before calling it.
|
|
|
|
*
|
|
|
|
* A buffer cannot be placed on two lists at the same time.
|
|
|
|
*/
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_queue_head(struct sk_buff_head *list, struct sk_buff *newsk);
|
2005-10-31 05:47:34 +08:00
|
|
|
static inline void __skb_queue_head(struct sk_buff_head *list,
|
|
|
|
struct sk_buff *newsk)
|
|
|
|
{
|
|
|
|
__skb_queue_after(list, (struct sk_buff *)list, newsk);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* __skb_queue_tail - queue a buffer at the list tail
|
|
|
|
* @list: list to use
|
|
|
|
* @newsk: buffer to queue
|
|
|
|
*
|
|
|
|
* Queue a buffer at the end of a list. This function takes no locks
|
|
|
|
* and you must therefore hold required locks before calling it.
|
|
|
|
*
|
|
|
|
* A buffer cannot be placed on two lists at the same time.
|
|
|
|
*/
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_queue_tail(struct sk_buff_head *list, struct sk_buff *newsk);
|
2005-04-17 06:20:36 +08:00
|
|
|
static inline void __skb_queue_tail(struct sk_buff_head *list,
|
|
|
|
struct sk_buff *newsk)
|
|
|
|
{
|
2008-04-14 15:05:28 +08:00
|
|
|
__skb_queue_before(list, (struct sk_buff *)list, newsk);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* remove sk_buff from list. _Must_ be called atomically, and with
|
|
|
|
* the list known..
|
|
|
|
*/
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_unlink(struct sk_buff *skb, struct sk_buff_head *list);
|
2005-04-17 06:20:36 +08:00
|
|
|
static inline void __skb_unlink(struct sk_buff *skb, struct sk_buff_head *list)
|
|
|
|
{
|
|
|
|
struct sk_buff *next, *prev;
|
|
|
|
|
|
|
|
list->qlen--;
|
|
|
|
next = skb->next;
|
|
|
|
prev = skb->prev;
|
|
|
|
skb->next = skb->prev = NULL;
|
|
|
|
next->prev = prev;
|
|
|
|
prev->next = next;
|
|
|
|
}
|
|
|
|
|
2008-04-14 15:04:12 +08:00
|
|
|
/**
|
|
|
|
* __skb_dequeue - remove from the head of the queue
|
|
|
|
* @list: list to dequeue from
|
|
|
|
*
|
|
|
|
* Remove the head of the list. This function does not take any locks
|
|
|
|
* so must be used with appropriate locks held only. The head item is
|
|
|
|
* returned or %NULL if the list is empty.
|
|
|
|
*/
|
2013-09-27 05:48:15 +08:00
|
|
|
struct sk_buff *skb_dequeue(struct sk_buff_head *list);
|
2008-04-14 15:04:12 +08:00
|
|
|
static inline struct sk_buff *__skb_dequeue(struct sk_buff_head *list)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb = skb_peek(list);
|
|
|
|
if (skb)
|
|
|
|
__skb_unlink(skb, list);
|
|
|
|
return skb;
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* __skb_dequeue_tail - remove from the tail of the queue
|
|
|
|
* @list: list to dequeue from
|
|
|
|
*
|
|
|
|
* Remove the tail of the list. This function does not take any locks
|
|
|
|
* so must be used with appropriate locks held only. The tail item is
|
|
|
|
* returned or %NULL if the list is empty.
|
|
|
|
*/
|
2013-09-27 05:48:15 +08:00
|
|
|
struct sk_buff *skb_dequeue_tail(struct sk_buff_head *list);
|
2005-04-17 06:20:36 +08:00
|
|
|
static inline struct sk_buff *__skb_dequeue_tail(struct sk_buff_head *list)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb = skb_peek_tail(list);
|
|
|
|
if (skb)
|
|
|
|
__skb_unlink(skb, list);
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-03-08 09:53:36 +08:00
|
|
|
static inline bool skb_is_nonlinear(const struct sk_buff *skb)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
return skb->data_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline unsigned int skb_headlen(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->len - skb->data_len;
|
|
|
|
}
|
|
|
|
|
2017-08-04 04:29:38 +08:00
|
|
|
static inline unsigned int __skb_pagelen(const struct sk_buff *skb)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2016-11-19 09:08:08 +08:00
|
|
|
unsigned int i, len = 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2016-11-19 09:08:08 +08:00
|
|
|
for (i = skb_shinfo(skb)->nr_frags - 1; (int)i >= 0; i--)
|
2011-10-19 05:00:24 +08:00
|
|
|
len += skb_frag_size(&skb_shinfo(skb)->frags[i]);
|
2017-08-04 04:29:38 +08:00
|
|
|
return len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline unsigned int skb_pagelen(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb_headlen(skb) + __skb_pagelen(skb);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2011-08-19 14:25:00 +08:00
|
|
|
/**
|
|
|
|
* __skb_fill_page_desc - initialise a paged fragment in an skb
|
|
|
|
* @skb: buffer containing fragment to be initialised
|
|
|
|
* @i: paged fragment index to initialise
|
|
|
|
* @page: the page to use for this fragment
|
|
|
|
* @off: the offset to the data with @page
|
|
|
|
* @size: the length of the data
|
|
|
|
*
|
|
|
|
* Initialises the @i'th fragment of @skb to point to &size bytes at
|
|
|
|
* offset @off within @page.
|
|
|
|
*
|
|
|
|
* Does not take any additional reference on the fragment.
|
|
|
|
*/
|
|
|
|
static inline void __skb_fill_page_desc(struct sk_buff *skb, int i,
|
|
|
|
struct page *page, int off, int size)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
skb_frag_t *frag = &skb_shinfo(skb)->frags[i];
|
|
|
|
|
2012-08-01 07:44:23 +08:00
|
|
|
/*
|
2015-08-22 05:11:51 +08:00
|
|
|
* Propagate page pfmemalloc to the skb if we can. The problem is
|
|
|
|
* that not all callers have unique ownership of the page but rely
|
|
|
|
* on page_is_pfmemalloc doing the right thing(tm).
|
2012-08-01 07:44:23 +08:00
|
|
|
*/
|
2011-10-20 07:01:49 +08:00
|
|
|
frag->page.p = page;
|
2005-04-17 06:20:36 +08:00
|
|
|
frag->page_offset = off;
|
2011-10-19 05:00:24 +08:00
|
|
|
skb_frag_size_set(frag, size);
|
skb: Propagate pfmemalloc on skb from head page only
Hi.
I'm trying to send big chunks of memory from application address space via
TCP socket using vmsplice + splice like this
mem = mmap(128Mb);
vmsplice(pipe[1], mem); /* splice memory into pipe */
splice(pipe[0], tcp_socket); /* send it into network */
When I'm lucky and a huge page splices into the pipe and then into the socket
_and_ client and server ends of the TCP connection are on the same host,
communicating via lo, the whole connection gets stuck! The sending queue
becomes full and app stops writing/splicing more into it, but the receiving
queue remains empty, and that's why.
The __skb_fill_page_desc observes a tail page of a huge page and erroneously
propagates its page->pfmemalloc value onto socket (the pfmemalloc on tail pages
contain garbage). Then this skb->pfmemalloc leaks through lo and due to the
tcp_v4_rcv
sk_filter
if (skb->pfmemalloc && !sock_flag(sk, SOCK_MEMALLOC)) /* true */
return -ENOMEM
goto release_and_discard;
no packets reach the socket. Even TCP re-transmits are dropped by this, as skb
cloning clones the pfmemalloc flag as well.
That said, here's the proper page->pfmemalloc propagation onto socket: we
must check the huge-page's head page only, other pages' pfmemalloc and mapping
values do not contain what is expected in this place. However, I'm not sure
whether this fix is _complete_, since pfmemalloc propagation via lo also
oesn't look great.
Both, bit propagation from page to skb and this check in sk_filter, were
introduced by c48a11c7 (netvm: propagate page->pfmemalloc to skb), in v3.5 so
Mel and stable@ are in Cc.
Signed-off-by: Pavel Emelyanov <xemul@parallels.com>
Acked-by: Eric Dumazet <edumazet@google.com>
Acked-by: Mel Gorman <mgorman@suse.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-03-14 11:29:40 +08:00
|
|
|
|
|
|
|
page = compound_head(page);
|
2015-08-22 05:11:51 +08:00
|
|
|
if (page_is_pfmemalloc(page))
|
skb: Propagate pfmemalloc on skb from head page only
Hi.
I'm trying to send big chunks of memory from application address space via
TCP socket using vmsplice + splice like this
mem = mmap(128Mb);
vmsplice(pipe[1], mem); /* splice memory into pipe */
splice(pipe[0], tcp_socket); /* send it into network */
When I'm lucky and a huge page splices into the pipe and then into the socket
_and_ client and server ends of the TCP connection are on the same host,
communicating via lo, the whole connection gets stuck! The sending queue
becomes full and app stops writing/splicing more into it, but the receiving
queue remains empty, and that's why.
The __skb_fill_page_desc observes a tail page of a huge page and erroneously
propagates its page->pfmemalloc value onto socket (the pfmemalloc on tail pages
contain garbage). Then this skb->pfmemalloc leaks through lo and due to the
tcp_v4_rcv
sk_filter
if (skb->pfmemalloc && !sock_flag(sk, SOCK_MEMALLOC)) /* true */
return -ENOMEM
goto release_and_discard;
no packets reach the socket. Even TCP re-transmits are dropped by this, as skb
cloning clones the pfmemalloc flag as well.
That said, here's the proper page->pfmemalloc propagation onto socket: we
must check the huge-page's head page only, other pages' pfmemalloc and mapping
values do not contain what is expected in this place. However, I'm not sure
whether this fix is _complete_, since pfmemalloc propagation via lo also
oesn't look great.
Both, bit propagation from page to skb and this check in sk_filter, were
introduced by c48a11c7 (netvm: propagate page->pfmemalloc to skb), in v3.5 so
Mel and stable@ are in Cc.
Signed-off-by: Pavel Emelyanov <xemul@parallels.com>
Acked-by: Eric Dumazet <edumazet@google.com>
Acked-by: Mel Gorman <mgorman@suse.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2013-03-14 11:29:40 +08:00
|
|
|
skb->pfmemalloc = true;
|
2011-08-19 14:25:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_fill_page_desc - initialise a paged fragment in an skb
|
|
|
|
* @skb: buffer containing fragment to be initialised
|
|
|
|
* @i: paged fragment index to initialise
|
|
|
|
* @page: the page to use for this fragment
|
|
|
|
* @off: the offset to the data with @page
|
|
|
|
* @size: the length of the data
|
|
|
|
*
|
|
|
|
* As per __skb_fill_page_desc() -- initialises the @i'th fragment of
|
2013-11-07 21:18:26 +08:00
|
|
|
* @skb to point to @size bytes at offset @off within @page. In
|
2011-08-19 14:25:00 +08:00
|
|
|
* addition updates @skb such that @i is the last fragment.
|
|
|
|
*
|
|
|
|
* Does not take any additional reference on the fragment.
|
|
|
|
*/
|
|
|
|
static inline void skb_fill_page_desc(struct sk_buff *skb, int i,
|
|
|
|
struct page *page, int off, int size)
|
|
|
|
{
|
|
|
|
__skb_fill_page_desc(skb, i, page, off, size);
|
2005-04-17 06:20:36 +08:00
|
|
|
skb_shinfo(skb)->nr_frags = i + 1;
|
|
|
|
}
|
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_add_rx_frag(struct sk_buff *skb, int i, struct page *page, int off,
|
|
|
|
int size, unsigned int truesize);
|
2008-10-08 05:22:33 +08:00
|
|
|
|
2013-11-01 14:07:47 +08:00
|
|
|
void skb_coalesce_rx_frag(struct sk_buff *skb, int i, int size,
|
|
|
|
unsigned int truesize);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#define SKB_PAGE_ASSERT(skb) BUG_ON(skb_shinfo(skb)->nr_frags)
|
2010-08-23 15:13:46 +08:00
|
|
|
#define SKB_FRAG_ASSERT(skb) BUG_ON(skb_has_frag_list(skb))
|
2005-04-17 06:20:36 +08:00
|
|
|
#define SKB_LINEAR_ASSERT(skb) BUG_ON(skb_is_nonlinear(skb))
|
|
|
|
|
2007-04-20 11:29:13 +08:00
|
|
|
#ifdef NET_SKBUFF_DATA_USES_OFFSET
|
|
|
|
static inline unsigned char *skb_tail_pointer(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->head + skb->tail;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_reset_tail_pointer(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb->tail = skb->data - skb->head;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_set_tail_pointer(struct sk_buff *skb, const int offset)
|
|
|
|
{
|
|
|
|
skb_reset_tail_pointer(skb);
|
|
|
|
skb->tail += offset;
|
|
|
|
}
|
2013-05-29 04:34:29 +08:00
|
|
|
|
2007-04-20 11:29:13 +08:00
|
|
|
#else /* NET_SKBUFF_DATA_USES_OFFSET */
|
|
|
|
static inline unsigned char *skb_tail_pointer(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->tail;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_reset_tail_pointer(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb->tail = skb->data;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_set_tail_pointer(struct sk_buff *skb, const int offset)
|
|
|
|
{
|
|
|
|
skb->tail = skb->data + offset;
|
|
|
|
}
|
2007-04-20 11:43:29 +08:00
|
|
|
|
2007-04-20 11:29:13 +08:00
|
|
|
#endif /* NET_SKBUFF_DATA_USES_OFFSET */
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* Add data to an sk_buff
|
|
|
|
*/
|
networking: make skb_put & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions (skb_put, __skb_put and pskb_put) return void *
and remove all the casts across the tree, adding a (u8 *) cast only
where the unsigned char pointer was used directly, all done with the
following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = { skb_put, __skb_put };
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = { skb_put, __skb_put };
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
which actually doesn't cover pskb_put since there are only three
users overall.
A handful of stragglers were converted manually, notably a macro in
drivers/isdn/i4l/isdn_bsdcomp.c and, oddly enough, one of the many
instances in net/bluetooth/hci_sock.c. In the former file, I also
had to fix one whitespace problem spatch introduced.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:21 +08:00
|
|
|
void *pskb_put(struct sk_buff *skb, struct sk_buff *tail, int len);
|
|
|
|
void *skb_put(struct sk_buff *skb, unsigned int len);
|
|
|
|
static inline void *__skb_put(struct sk_buff *skb, unsigned int len)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
networking: make skb_put & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions (skb_put, __skb_put and pskb_put) return void *
and remove all the casts across the tree, adding a (u8 *) cast only
where the unsigned char pointer was used directly, all done with the
following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = { skb_put, __skb_put };
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = { skb_put, __skb_put };
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
which actually doesn't cover pskb_put since there are only three
users overall.
A handful of stragglers were converted manually, notably a macro in
drivers/isdn/i4l/isdn_bsdcomp.c and, oddly enough, one of the many
instances in net/bluetooth/hci_sock.c. In the former file, I also
had to fix one whitespace problem spatch introduced.
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:21 +08:00
|
|
|
void *tmp = skb_tail_pointer(skb);
|
2005-04-17 06:20:36 +08:00
|
|
|
SKB_LINEAR_ASSERT(skb);
|
|
|
|
skb->tail += len;
|
|
|
|
skb->len += len;
|
|
|
|
return tmp;
|
|
|
|
}
|
|
|
|
|
net: introduce __skb_put_[zero, data, u8]
follow Johannes Berg, semantic patch file as below,
@@
identifier p, p2;
expression len;
expression skb;
type t, t2;
@@
(
-p = __skb_put(skb, len);
+p = __skb_put_zero(skb, len);
|
-p = (t)__skb_put(skb, len);
+p = __skb_put_zero(skb, len);
)
... when != p
(
p2 = (t2)p;
-memset(p2, 0, len);
|
-memset(p, 0, len);
)
@@
identifier p;
expression len;
expression skb;
type t;
@@
(
-t p = __skb_put(skb, len);
+t p = __skb_put_zero(skb, len);
)
... when != p
(
-memset(p, 0, len);
)
@@
type t, t2;
identifier p, p2;
expression skb;
@@
t *p;
...
(
-p = __skb_put(skb, sizeof(t));
+p = __skb_put_zero(skb, sizeof(t));
|
-p = (t *)__skb_put(skb, sizeof(t));
+p = __skb_put_zero(skb, sizeof(t));
)
... when != p
(
p2 = (t2)p;
-memset(p2, 0, sizeof(*p));
|
-memset(p, 0, sizeof(*p));
)
@@
expression skb, len;
@@
-memset(__skb_put(skb, len), 0, len);
+__skb_put_zero(skb, len);
@@
expression skb, len, data;
@@
-memcpy(__skb_put(skb, len), data, len);
+__skb_put_data(skb, data, len);
@@
expression SKB, C, S;
typedef u8;
identifier fn = {__skb_put};
fresh identifier fn2 = fn ## "_u8";
@@
- *(u8 *)fn(SKB, S) = C;
+ fn2(SKB, C);
Signed-off-by: yuan linyu <Linyu.Yuan@alcatel-sbell.com.cn>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-18 22:48:17 +08:00
|
|
|
static inline void *__skb_put_zero(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
|
|
|
void *tmp = __skb_put(skb, len);
|
|
|
|
|
|
|
|
memset(tmp, 0, len);
|
|
|
|
return tmp;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void *__skb_put_data(struct sk_buff *skb, const void *data,
|
|
|
|
unsigned int len)
|
|
|
|
{
|
|
|
|
void *tmp = __skb_put(skb, len);
|
|
|
|
|
|
|
|
memcpy(tmp, data, len);
|
|
|
|
return tmp;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void __skb_put_u8(struct sk_buff *skb, u8 val)
|
|
|
|
{
|
|
|
|
*(u8 *)__skb_put(skb, 1) = val;
|
|
|
|
}
|
|
|
|
|
2017-06-15 04:17:20 +08:00
|
|
|
static inline void *skb_put_zero(struct sk_buff *skb, unsigned int len)
|
2017-05-24 15:07:47 +08:00
|
|
|
{
|
2017-06-15 04:17:20 +08:00
|
|
|
void *tmp = skb_put(skb, len);
|
2017-05-24 15:07:47 +08:00
|
|
|
|
|
|
|
memset(tmp, 0, len);
|
|
|
|
|
|
|
|
return tmp;
|
|
|
|
}
|
|
|
|
|
networking: introduce and use skb_put_data()
A common pattern with skb_put() is to just want to memcpy()
some data into the new space, introduce skb_put_data() for
this.
An spatch similar to the one for skb_put_zero() converts many
of the places using it:
@@
identifier p, p2;
expression len, skb, data;
type t, t2;
@@
(
-p = skb_put(skb, len);
+p = skb_put_data(skb, data, len);
|
-p = (t)skb_put(skb, len);
+p = skb_put_data(skb, data, len);
)
(
p2 = (t2)p;
-memcpy(p2, data, len);
|
-memcpy(p, data, len);
)
@@
type t, t2;
identifier p, p2;
expression skb, data;
@@
t *p;
...
(
-p = skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
|
-p = (t *)skb_put(skb, sizeof(t));
+p = skb_put_data(skb, data, sizeof(t));
)
(
p2 = (t2)p;
-memcpy(p2, data, sizeof(*p));
|
-memcpy(p, data, sizeof(*p));
)
@@
expression skb, len, data;
@@
-memcpy(skb_put(skb, len), data, len);
+skb_put_data(skb, data, len);
(again, manually post-processed to retain some comments)
Reviewed-by: Stephen Hemminger <stephen@networkplumber.org>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:20 +08:00
|
|
|
static inline void *skb_put_data(struct sk_buff *skb, const void *data,
|
|
|
|
unsigned int len)
|
|
|
|
{
|
|
|
|
void *tmp = skb_put(skb, len);
|
|
|
|
|
|
|
|
memcpy(tmp, data, len);
|
|
|
|
|
|
|
|
return tmp;
|
|
|
|
}
|
|
|
|
|
networking: add and use skb_put_u8()
Joe and Bjørn suggested that it'd be nicer to not have the
cast in the fairly common case of doing
*(u8 *)skb_put(skb, 1) = c;
Add skb_put_u8() for this case, and use it across the code,
using the following spatch:
@@
expression SKB, C, S;
typedef u8;
identifier fn = {skb_put};
fresh identifier fn2 = fn ## "_u8";
@@
- *(u8 *)fn(SKB, S) = C;
+ fn2(SKB, C);
Note that due to the "S", the spatch isn't perfect, it should
have checked that S is 1, but there's also places that use a
sizeof expression like sizeof(var) or sizeof(u8) etc. Turns
out that nobody ever did something like
*(u8 *)skb_put(skb, 2) = c;
which would be wrong anyway since the second byte wouldn't be
initialized.
Suggested-by: Joe Perches <joe@perches.com>
Suggested-by: Bjørn Mork <bjorn@mork.no>
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:24 +08:00
|
|
|
static inline void skb_put_u8(struct sk_buff *skb, u8 val)
|
|
|
|
{
|
|
|
|
*(u8 *)skb_put(skb, 1) = val;
|
|
|
|
}
|
|
|
|
|
networking: make skb_push & __skb_push return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions return void * and remove all the casts across
the tree, adding a (u8 *) cast only where the unsigned char pointer
was used directly, all done with the following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = { skb_push, __skb_push, skb_push_rcsum };
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = { skb_push, __skb_push, skb_push_rcsum };
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
@@
expression SKB, LEN;
identifier fn = { skb_push, __skb_push, skb_push_rcsum };
@@
- fn(SKB, LEN)[0]
+ *(u8 *)fn(SKB, LEN)
Note that the last part there converts from push(...)[0] to the
more idiomatic *(u8 *)push(...).
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:23 +08:00
|
|
|
void *skb_push(struct sk_buff *skb, unsigned int len);
|
|
|
|
static inline void *__skb_push(struct sk_buff *skb, unsigned int len)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
skb->data -= len;
|
|
|
|
skb->len += len;
|
|
|
|
return skb->data;
|
|
|
|
}
|
|
|
|
|
networking: make skb_pull & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions return void * and remove all the casts across
the tree, adding a (u8 *) cast only where the unsigned char pointer
was used directly, all done with the following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:22 +08:00
|
|
|
void *skb_pull(struct sk_buff *skb, unsigned int len);
|
|
|
|
static inline void *__skb_pull(struct sk_buff *skb, unsigned int len)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
skb->len -= len;
|
|
|
|
BUG_ON(skb->len < skb->data_len);
|
|
|
|
return skb->data += len;
|
|
|
|
}
|
|
|
|
|
networking: make skb_pull & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions return void * and remove all the casts across
the tree, adding a (u8 *) cast only where the unsigned char pointer
was used directly, all done with the following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:22 +08:00
|
|
|
static inline void *skb_pull_inline(struct sk_buff *skb, unsigned int len)
|
2010-05-02 17:21:44 +08:00
|
|
|
{
|
|
|
|
return unlikely(len > skb->len) ? NULL : __skb_pull(skb, len);
|
|
|
|
}
|
|
|
|
|
networking: make skb_pull & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions return void * and remove all the casts across
the tree, adding a (u8 *) cast only where the unsigned char pointer
was used directly, all done with the following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:22 +08:00
|
|
|
void *__pskb_pull_tail(struct sk_buff *skb, int delta);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
networking: make skb_pull & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions return void * and remove all the casts across
the tree, adding a (u8 *) cast only where the unsigned char pointer
was used directly, all done with the following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:22 +08:00
|
|
|
static inline void *__pskb_pull(struct sk_buff *skb, unsigned int len)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
if (len > skb_headlen(skb) &&
|
2008-08-12 09:17:17 +08:00
|
|
|
!__pskb_pull_tail(skb, len - skb_headlen(skb)))
|
2005-04-17 06:20:36 +08:00
|
|
|
return NULL;
|
|
|
|
skb->len -= len;
|
|
|
|
return skb->data += len;
|
|
|
|
}
|
|
|
|
|
networking: make skb_pull & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions return void * and remove all the casts across
the tree, adding a (u8 *) cast only where the unsigned char pointer
was used directly, all done with the following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:22 +08:00
|
|
|
static inline void *pskb_pull(struct sk_buff *skb, unsigned int len)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
return unlikely(len > skb->len) ? NULL : __pskb_pull(skb, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int pskb_may_pull(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
|
|
|
if (likely(len <= skb_headlen(skb)))
|
|
|
|
return 1;
|
|
|
|
if (unlikely(len > skb->len))
|
|
|
|
return 0;
|
2008-08-12 09:17:17 +08:00
|
|
|
return __pskb_pull_tail(skb, len - skb_headlen(skb)) != NULL;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
udp: under rx pressure, try to condense skbs
Under UDP flood, many softirq producers try to add packets to
UDP receive queue, and one user thread is burning one cpu trying
to dequeue packets as fast as possible.
Two parts of the per packet cost are :
- copying payload from kernel space to user space,
- freeing memory pieces associated with skb.
If socket is under pressure, softirq handler(s) can try to pull in
skb->head the payload of the packet if it fits.
Meaning the softirq handler(s) can free/reuse the page fragment
immediately, instead of letting udp_recvmsg() do this hundreds of usec
later, possibly from another node.
Additional gains :
- We reduce skb->truesize and thus can store more packets per SO_RCVBUF
- We avoid cache line misses at copyout() time and consume_skb() time,
and avoid one put_page() with potential alien freeing on NUMA hosts.
This comes at the cost of a copy, bounded to available tail room, which
is usually small. (We might have to fix GRO_MAX_HEAD which looks bigger
than necessary)
This patch gave me about 5 % increase in throughput in my tests.
skb_condense() helper could probably used in other contexts.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Paolo Abeni <pabeni@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-12-08 01:19:33 +08:00
|
|
|
void skb_condense(struct sk_buff *skb);
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* skb_headroom - bytes at buffer head
|
|
|
|
* @skb: buffer to check
|
|
|
|
*
|
|
|
|
* Return the number of bytes of free space at the head of an &sk_buff.
|
|
|
|
*/
|
2007-10-24 12:07:32 +08:00
|
|
|
static inline unsigned int skb_headroom(const struct sk_buff *skb)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
return skb->data - skb->head;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_tailroom - bytes at buffer end
|
|
|
|
* @skb: buffer to check
|
|
|
|
*
|
|
|
|
* Return the number of bytes of free space at the tail of an sk_buff
|
|
|
|
*/
|
|
|
|
static inline int skb_tailroom(const struct sk_buff *skb)
|
|
|
|
{
|
2007-04-20 11:43:29 +08:00
|
|
|
return skb_is_nonlinear(skb) ? 0 : skb->end - skb->tail;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2012-04-11 04:30:48 +08:00
|
|
|
/**
|
|
|
|
* skb_availroom - bytes at buffer end
|
|
|
|
* @skb: buffer to check
|
|
|
|
*
|
|
|
|
* Return the number of bytes of free space at the tail of an sk_buff
|
|
|
|
* allocated by sk_stream_alloc()
|
|
|
|
*/
|
|
|
|
static inline int skb_availroom(const struct sk_buff *skb)
|
|
|
|
{
|
2013-03-14 13:40:32 +08:00
|
|
|
if (skb_is_nonlinear(skb))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
return skb->end - skb->tail - skb->reserved_tailroom;
|
2012-04-11 04:30:48 +08:00
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* skb_reserve - adjust headroom
|
|
|
|
* @skb: buffer to alter
|
|
|
|
* @len: bytes to move
|
|
|
|
*
|
|
|
|
* Increase the headroom of an empty &sk_buff by reducing the tail
|
|
|
|
* room. This is only allowed for an empty buffer.
|
|
|
|
*/
|
2006-01-17 18:54:21 +08:00
|
|
|
static inline void skb_reserve(struct sk_buff *skb, int len)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
skb->data += len;
|
|
|
|
skb->tail += len;
|
|
|
|
}
|
|
|
|
|
mld, igmp: Fix reserved tailroom calculation
The current reserved_tailroom calculation fails to take hlen and tlen into
account.
skb:
[__hlen__|__data____________|__tlen___|__extra__]
^ ^
head skb_end_offset
In this representation, hlen + data + tlen is the size passed to alloc_skb.
"extra" is the extra space made available in __alloc_skb because of
rounding up by kmalloc. We can reorder the representation like so:
[__hlen__|__data____________|__extra__|__tlen___]
^ ^
head skb_end_offset
The maximum space available for ip headers and payload without
fragmentation is min(mtu, data + extra). Therefore,
reserved_tailroom
= data + extra + tlen - min(mtu, data + extra)
= skb_end_offset - hlen - min(mtu, skb_end_offset - hlen - tlen)
= skb_tailroom - min(mtu, skb_tailroom - tlen) ; after skb_reserve(hlen)
Compare the second line to the current expression:
reserved_tailroom = skb_end_offset - min(mtu, skb_end_offset)
and we can see that hlen and tlen are not taken into account.
The min() in the third line can be expanded into:
if mtu < skb_tailroom - tlen:
reserved_tailroom = skb_tailroom - mtu
else:
reserved_tailroom = tlen
Depending on hlen, tlen, mtu and the number of multicast address records,
the current code may output skbs that have less tailroom than
dev->needed_tailroom or it may output more skbs than needed because not all
space available is used.
Fixes: 4c672e4b ("ipv6: mld: fix add_grhead skb_over_panic for devs with large MTUs")
Signed-off-by: Benjamin Poirier <bpoirier@suse.com>
Acked-by: Hannes Frederic Sowa <hannes@stressinduktion.org>
Acked-by: Daniel Borkmann <daniel@iogearbox.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-03-01 07:03:33 +08:00
|
|
|
/**
|
|
|
|
* skb_tailroom_reserve - adjust reserved_tailroom
|
|
|
|
* @skb: buffer to alter
|
|
|
|
* @mtu: maximum amount of headlen permitted
|
|
|
|
* @needed_tailroom: minimum amount of reserved_tailroom
|
|
|
|
*
|
|
|
|
* Set reserved_tailroom so that headlen can be as large as possible but
|
|
|
|
* not larger than mtu and tailroom cannot be smaller than
|
|
|
|
* needed_tailroom.
|
|
|
|
* The required headroom should already have been reserved before using
|
|
|
|
* this function.
|
|
|
|
*/
|
|
|
|
static inline void skb_tailroom_reserve(struct sk_buff *skb, unsigned int mtu,
|
|
|
|
unsigned int needed_tailroom)
|
|
|
|
{
|
|
|
|
SKB_LINEAR_ASSERT(skb);
|
|
|
|
if (mtu < skb_tailroom(skb) - needed_tailroom)
|
|
|
|
/* use at most mtu */
|
|
|
|
skb->reserved_tailroom = skb_tailroom(skb) - mtu;
|
|
|
|
else
|
|
|
|
/* use up to all available space */
|
|
|
|
skb->reserved_tailroom = needed_tailroom;
|
|
|
|
}
|
|
|
|
|
2014-09-30 11:22:29 +08:00
|
|
|
#define ENCAP_TYPE_ETHER 0
|
|
|
|
#define ENCAP_TYPE_IPPROTO 1
|
|
|
|
|
|
|
|
static inline void skb_set_inner_protocol(struct sk_buff *skb,
|
|
|
|
__be16 protocol)
|
|
|
|
{
|
|
|
|
skb->inner_protocol = protocol;
|
|
|
|
skb->inner_protocol_type = ENCAP_TYPE_ETHER;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_set_inner_ipproto(struct sk_buff *skb,
|
|
|
|
__u8 ipproto)
|
|
|
|
{
|
|
|
|
skb->inner_ipproto = ipproto;
|
|
|
|
skb->inner_protocol_type = ENCAP_TYPE_IPPROTO;
|
|
|
|
}
|
|
|
|
|
2012-12-07 22:14:14 +08:00
|
|
|
static inline void skb_reset_inner_headers(struct sk_buff *skb)
|
|
|
|
{
|
2013-03-07 21:21:46 +08:00
|
|
|
skb->inner_mac_header = skb->mac_header;
|
2012-12-07 22:14:14 +08:00
|
|
|
skb->inner_network_header = skb->network_header;
|
|
|
|
skb->inner_transport_header = skb->transport_header;
|
|
|
|
}
|
|
|
|
|
2011-06-10 14:56:58 +08:00
|
|
|
static inline void skb_reset_mac_len(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb->mac_len = skb->network_header - skb->mac_header;
|
|
|
|
}
|
|
|
|
|
2012-12-07 22:14:14 +08:00
|
|
|
static inline unsigned char *skb_inner_transport_header(const struct sk_buff
|
|
|
|
*skb)
|
|
|
|
{
|
|
|
|
return skb->head + skb->inner_transport_header;
|
|
|
|
}
|
|
|
|
|
2015-12-15 03:19:40 +08:00
|
|
|
static inline int skb_inner_transport_offset(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb_inner_transport_header(skb) - skb->data;
|
|
|
|
}
|
|
|
|
|
2012-12-07 22:14:14 +08:00
|
|
|
static inline void skb_reset_inner_transport_header(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb->inner_transport_header = skb->data - skb->head;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_set_inner_transport_header(struct sk_buff *skb,
|
|
|
|
const int offset)
|
|
|
|
{
|
|
|
|
skb_reset_inner_transport_header(skb);
|
|
|
|
skb->inner_transport_header += offset;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline unsigned char *skb_inner_network_header(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->head + skb->inner_network_header;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_reset_inner_network_header(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb->inner_network_header = skb->data - skb->head;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_set_inner_network_header(struct sk_buff *skb,
|
|
|
|
const int offset)
|
|
|
|
{
|
|
|
|
skb_reset_inner_network_header(skb);
|
|
|
|
skb->inner_network_header += offset;
|
|
|
|
}
|
|
|
|
|
2013-03-07 21:21:46 +08:00
|
|
|
static inline unsigned char *skb_inner_mac_header(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->head + skb->inner_mac_header;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_reset_inner_mac_header(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb->inner_mac_header = skb->data - skb->head;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_set_inner_mac_header(struct sk_buff *skb,
|
|
|
|
const int offset)
|
|
|
|
{
|
|
|
|
skb_reset_inner_mac_header(skb);
|
|
|
|
skb->inner_mac_header += offset;
|
|
|
|
}
|
2013-01-07 17:28:21 +08:00
|
|
|
static inline bool skb_transport_header_was_set(const struct sk_buff *skb)
|
|
|
|
{
|
2013-05-29 15:16:05 +08:00
|
|
|
return skb->transport_header != (typeof(skb->transport_header))~0U;
|
2013-01-07 17:28:21 +08:00
|
|
|
}
|
|
|
|
|
2007-04-26 09:04:18 +08:00
|
|
|
static inline unsigned char *skb_transport_header(const struct sk_buff *skb)
|
|
|
|
{
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
return skb->head + skb->transport_header;
|
2007-04-26 09:04:18 +08:00
|
|
|
}
|
|
|
|
|
2007-03-14 00:06:52 +08:00
|
|
|
static inline void skb_reset_transport_header(struct sk_buff *skb)
|
|
|
|
{
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
skb->transport_header = skb->data - skb->head;
|
2007-03-14 00:06:52 +08:00
|
|
|
}
|
|
|
|
|
2007-03-14 00:51:52 +08:00
|
|
|
static inline void skb_set_transport_header(struct sk_buff *skb,
|
|
|
|
const int offset)
|
|
|
|
{
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
skb_reset_transport_header(skb);
|
|
|
|
skb->transport_header += offset;
|
2007-04-26 08:55:53 +08:00
|
|
|
}
|
|
|
|
|
2007-04-11 11:50:43 +08:00
|
|
|
static inline unsigned char *skb_network_header(const struct sk_buff *skb)
|
|
|
|
{
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
return skb->head + skb->network_header;
|
2007-04-11 11:50:43 +08:00
|
|
|
}
|
|
|
|
|
2007-04-11 11:45:18 +08:00
|
|
|
static inline void skb_reset_network_header(struct sk_buff *skb)
|
|
|
|
{
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
skb->network_header = skb->data - skb->head;
|
2007-04-11 11:45:18 +08:00
|
|
|
}
|
|
|
|
|
2007-03-12 09:39:41 +08:00
|
|
|
static inline void skb_set_network_header(struct sk_buff *skb, const int offset)
|
|
|
|
{
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
skb_reset_network_header(skb);
|
|
|
|
skb->network_header += offset;
|
2007-03-12 09:39:41 +08:00
|
|
|
}
|
|
|
|
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
static inline unsigned char *skb_mac_header(const struct sk_buff *skb)
|
2007-03-11 09:16:10 +08:00
|
|
|
{
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
return skb->head + skb->mac_header;
|
2007-03-11 09:16:10 +08:00
|
|
|
}
|
|
|
|
|
2017-02-07 15:56:06 +08:00
|
|
|
static inline int skb_mac_offset(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb_mac_header(skb) - skb->data;
|
|
|
|
}
|
|
|
|
|
2017-07-02 08:13:25 +08:00
|
|
|
static inline u32 skb_mac_header_len(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->network_header - skb->mac_header;
|
|
|
|
}
|
|
|
|
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
static inline int skb_mac_header_was_set(const struct sk_buff *skb)
|
2007-03-17 04:26:39 +08:00
|
|
|
{
|
2013-05-29 15:16:05 +08:00
|
|
|
return skb->mac_header != (typeof(skb->mac_header))~0U;
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_reset_mac_header(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb->mac_header = skb->data - skb->head;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_set_mac_header(struct sk_buff *skb, const int offset)
|
|
|
|
{
|
|
|
|
skb_reset_mac_header(skb);
|
|
|
|
skb->mac_header += offset;
|
|
|
|
}
|
|
|
|
|
2013-12-16 17:02:09 +08:00
|
|
|
static inline void skb_pop_mac_header(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb->mac_header = skb->network_header;
|
|
|
|
}
|
|
|
|
|
2013-03-28 00:46:06 +08:00
|
|
|
static inline void skb_probe_transport_header(struct sk_buff *skb,
|
|
|
|
const int offset_hint)
|
|
|
|
{
|
|
|
|
struct flow_keys keys;
|
|
|
|
|
|
|
|
if (skb_transport_header_was_set(skb))
|
|
|
|
return;
|
2015-09-02 00:24:27 +08:00
|
|
|
else if (skb_flow_dissect_flow_keys(skb, &keys, 0))
|
2015-06-05 00:16:39 +08:00
|
|
|
skb_set_transport_header(skb, keys.control.thoff);
|
2013-03-28 00:46:06 +08:00
|
|
|
else
|
|
|
|
skb_set_transport_header(skb, offset_hint);
|
|
|
|
}
|
|
|
|
|
2012-02-23 18:55:02 +08:00
|
|
|
static inline void skb_mac_header_rebuild(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
if (skb_mac_header_was_set(skb)) {
|
|
|
|
const unsigned char *old_mac = skb_mac_header(skb);
|
|
|
|
|
|
|
|
skb_set_mac_header(skb, -skb->mac_len);
|
|
|
|
memmove(skb_mac_header(skb), old_mac, skb->mac_len);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-12-14 23:24:08 +08:00
|
|
|
static inline int skb_checksum_start_offset(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->csum_start - skb_headroom(skb);
|
|
|
|
}
|
|
|
|
|
2016-02-06 07:27:49 +08:00
|
|
|
static inline unsigned char *skb_checksum_start(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->head + skb->csum_start;
|
|
|
|
}
|
|
|
|
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
static inline int skb_transport_offset(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb_transport_header(skb) - skb->data;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline u32 skb_network_header_len(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->transport_header - skb->network_header;
|
|
|
|
}
|
|
|
|
|
2012-12-07 22:14:14 +08:00
|
|
|
static inline u32 skb_inner_network_header_len(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->inner_transport_header - skb->inner_network_header;
|
|
|
|
}
|
|
|
|
|
[SK_BUFF]: Use offsets for skb->{mac,network,transport}_header on 64bit architectures
With this we save 8 bytes per network packet, leaving a 4 bytes hole to be used
in further shrinking work, likely with the offsetization of other pointers,
such as ->{data,tail,end}, at the cost of adds, that were minimized by the
usual practice of setting skb->{mac,nh,n}.raw to a local variable that is then
accessed multiple times in each function, it also is not more expensive than
before with regards to most of the handling of such headers, like setting one
of these headers to another (transport to network, etc), or subtracting, adding
to/from it, comparing them, etc.
Now we have this layout for sk_buff on a x86_64 machine:
[acme@mica net-2.6.22]$ pahole vmlinux sk_buff
struct sk_buff {
struct sk_buff * next; /* 0 8 */
struct sk_buff * prev; /* 8 8 */
struct rb_node rb; /* 16 24 */
struct sock * sk; /* 40 8 */
ktime_t tstamp; /* 48 8 */
struct net_device * dev; /* 56 8 */
/* --- cacheline 1 boundary (64 bytes) --- */
struct net_device * input_dev; /* 64 8 */
sk_buff_data_t transport_header; /* 72 4 */
sk_buff_data_t network_header; /* 76 4 */
sk_buff_data_t mac_header; /* 80 4 */
/* XXX 4 bytes hole, try to pack */
struct dst_entry * dst; /* 88 8 */
struct sec_path * sp; /* 96 8 */
char cb[48]; /* 104 48 */
/* cacheline 2 boundary (128 bytes) was 24 bytes ago*/
unsigned int len; /* 152 4 */
unsigned int data_len; /* 156 4 */
unsigned int mac_len; /* 160 4 */
union {
__wsum csum; /* 4 */
__u32 csum_offset; /* 4 */
}; /* 164 4 */
__u32 priority; /* 168 4 */
__u8 local_df:1; /* 172 1 */
__u8 cloned:1; /* 172 1 */
__u8 ip_summed:2; /* 172 1 */
__u8 nohdr:1; /* 172 1 */
__u8 nfctinfo:3; /* 172 1 */
__u8 pkt_type:3; /* 173 1 */
__u8 fclone:2; /* 173 1 */
__u8 ipvs_property:1; /* 173 1 */
/* XXX 2 bits hole, try to pack */
__be16 protocol; /* 174 2 */
void (*destructor)(struct sk_buff *); /* 176 8 */
struct nf_conntrack * nfct; /* 184 8 */
/* --- cacheline 3 boundary (192 bytes) --- */
struct sk_buff * nfct_reasm; /* 192 8 */
struct nf_bridge_info *nf_bridge; /* 200 8 */
__u16 tc_index; /* 208 2 */
__u16 tc_verd; /* 210 2 */
dma_cookie_t dma_cookie; /* 212 4 */
__u32 secmark; /* 216 4 */
__u32 mark; /* 220 4 */
unsigned int truesize; /* 224 4 */
atomic_t users; /* 228 4 */
unsigned char * head; /* 232 8 */
unsigned char * data; /* 240 8 */
unsigned char * tail; /* 248 8 */
/* --- cacheline 4 boundary (256 bytes) --- */
unsigned char * end; /* 256 8 */
}; /* size: 264, cachelines: 5 */
/* sum members: 260, holes: 1, sum holes: 4 */
/* bit holes: 1, sum bit holes: 2 bits */
/* last cacheline: 8 bytes */
On 32 bits nothing changes, and pointers continue to be used with the compiler
turning all this abstraction layer into dust. But there are some sk_buff
validation tricks that are now possible, humm... :-)
Signed-off-by: Arnaldo Carvalho de Melo <acme@redhat.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-04-11 12:22:35 +08:00
|
|
|
static inline int skb_network_offset(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb_network_header(skb) - skb->data;
|
|
|
|
}
|
2007-03-10 23:30:58 +08:00
|
|
|
|
2012-12-07 22:14:14 +08:00
|
|
|
static inline int skb_inner_network_offset(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb_inner_network_header(skb) - skb->data;
|
|
|
|
}
|
|
|
|
|
2010-08-04 12:43:44 +08:00
|
|
|
static inline int pskb_network_may_pull(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
|
|
|
return pskb_may_pull(skb, skb_network_offset(skb) + len);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/*
|
|
|
|
* CPUs often take a performance hit when accessing unaligned memory
|
|
|
|
* locations. The actual performance hit varies, it can be small if the
|
|
|
|
* hardware handles it or large if we have to take an exception and fix it
|
|
|
|
* in software.
|
|
|
|
*
|
|
|
|
* Since an ethernet header is 14 bytes network drivers often end up with
|
|
|
|
* the IP header at an unaligned offset. The IP header can be aligned by
|
|
|
|
* shifting the start of the packet by 2 bytes. Drivers should do this
|
|
|
|
* with:
|
|
|
|
*
|
2009-07-14 06:48:16 +08:00
|
|
|
* skb_reserve(skb, NET_IP_ALIGN);
|
2005-04-17 06:20:36 +08:00
|
|
|
*
|
|
|
|
* The downside to this alignment of the IP header is that the DMA is now
|
|
|
|
* unaligned. On some architectures the cost of an unaligned DMA is high
|
|
|
|
* and this cost outweighs the gains made by aligning the IP header.
|
2009-07-14 06:48:16 +08:00
|
|
|
*
|
2005-04-17 06:20:36 +08:00
|
|
|
* Since this trade off varies between architectures, we allow NET_IP_ALIGN
|
|
|
|
* to be overridden.
|
|
|
|
*/
|
|
|
|
#ifndef NET_IP_ALIGN
|
|
|
|
#define NET_IP_ALIGN 2
|
|
|
|
#endif
|
|
|
|
|
2006-03-31 18:27:06 +08:00
|
|
|
/*
|
|
|
|
* The networking layer reserves some headroom in skb data (via
|
|
|
|
* dev_alloc_skb). This is used to avoid having to reallocate skb data when
|
|
|
|
* the header has to grow. In the default case, if the header has to grow
|
2009-02-09 11:24:13 +08:00
|
|
|
* 32 bytes or less we avoid the reallocation.
|
2006-03-31 18:27:06 +08:00
|
|
|
*
|
|
|
|
* Unfortunately this headroom changes the DMA alignment of the resulting
|
|
|
|
* network packet. As for NET_IP_ALIGN, this unaligned DMA is expensive
|
|
|
|
* on some architectures. An architecture can override this value,
|
|
|
|
* perhaps setting it to a cacheline in size (since that will maintain
|
|
|
|
* cacheline alignment of the DMA). It must be a power of 2.
|
|
|
|
*
|
2009-02-09 11:24:13 +08:00
|
|
|
* Various parts of the networking layer expect at least 32 bytes of
|
2006-03-31 18:27:06 +08:00
|
|
|
* headroom, you should not reduce this.
|
2010-06-16 09:16:43 +08:00
|
|
|
*
|
|
|
|
* Using max(32, L1_CACHE_BYTES) makes sense (especially with RPS)
|
|
|
|
* to reduce average number of cache lines per packet.
|
|
|
|
* get_rps_cpus() for example only access one 64 bytes aligned block :
|
2010-05-07 12:58:51 +08:00
|
|
|
* NET_IP_ALIGN(2) + ethernet_header(14) + IP_header(20/40) + ports(8)
|
2006-03-31 18:27:06 +08:00
|
|
|
*/
|
|
|
|
#ifndef NET_SKB_PAD
|
2010-06-16 09:16:43 +08:00
|
|
|
#define NET_SKB_PAD max(32, L1_CACHE_BYTES)
|
2006-03-31 18:27:06 +08:00
|
|
|
#endif
|
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
int ___pskb_trim(struct sk_buff *skb, unsigned int len);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2016-08-18 07:00:39 +08:00
|
|
|
static inline void __skb_set_length(struct sk_buff *skb, unsigned int len)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2011-05-22 03:46:09 +08:00
|
|
|
if (unlikely(skb_is_nonlinear(skb))) {
|
2006-06-10 07:13:38 +08:00
|
|
|
WARN_ON(1);
|
|
|
|
return;
|
|
|
|
}
|
2007-04-20 11:29:13 +08:00
|
|
|
skb->len = len;
|
|
|
|
skb_set_tail_pointer(skb, len);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2016-08-18 07:00:39 +08:00
|
|
|
static inline void __skb_trim(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
|
|
|
__skb_set_length(skb, len);
|
|
|
|
}
|
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_trim(struct sk_buff *skb, unsigned int len);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
|
|
|
static inline int __pskb_trim(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
2006-06-10 07:13:38 +08:00
|
|
|
if (skb->data_len)
|
|
|
|
return ___pskb_trim(skb, len);
|
|
|
|
__skb_trim(skb, len);
|
|
|
|
return 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline int pskb_trim(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
|
|
|
return (len < skb->len) ? __pskb_trim(skb, len) : 0;
|
|
|
|
}
|
|
|
|
|
2006-08-14 11:12:58 +08:00
|
|
|
/**
|
|
|
|
* pskb_trim_unique - remove end from a paged unique (not cloned) buffer
|
|
|
|
* @skb: buffer to alter
|
|
|
|
* @len: new length
|
|
|
|
*
|
|
|
|
* This is identical to pskb_trim except that the caller knows that
|
|
|
|
* the skb is not cloned so we should never get an error due to out-
|
|
|
|
* of-memory.
|
|
|
|
*/
|
|
|
|
static inline void pskb_trim_unique(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
|
|
|
int err = pskb_trim(skb, len);
|
|
|
|
BUG_ON(err);
|
|
|
|
}
|
|
|
|
|
2016-08-18 07:00:39 +08:00
|
|
|
static inline int __skb_grow(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
|
|
|
unsigned int diff = len - skb->len;
|
|
|
|
|
|
|
|
if (skb_tailroom(skb) < diff) {
|
|
|
|
int ret = pskb_expand_head(skb, 0, diff - skb_tailroom(skb),
|
|
|
|
GFP_ATOMIC);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
__skb_set_length(skb, len);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* skb_orphan - orphan a buffer
|
|
|
|
* @skb: buffer to orphan
|
|
|
|
*
|
|
|
|
* If a buffer currently has an owner then we call the owner's
|
|
|
|
* destructor function and make the @skb unowned. The buffer continues
|
|
|
|
* to exist but is no longer charged to its former owner.
|
|
|
|
*/
|
|
|
|
static inline void skb_orphan(struct sk_buff *skb)
|
|
|
|
{
|
2013-07-31 07:11:15 +08:00
|
|
|
if (skb->destructor) {
|
2005-04-17 06:20:36 +08:00
|
|
|
skb->destructor(skb);
|
2013-07-31 07:11:15 +08:00
|
|
|
skb->destructor = NULL;
|
|
|
|
skb->sk = NULL;
|
2013-08-02 02:43:08 +08:00
|
|
|
} else {
|
|
|
|
BUG_ON(skb->sk);
|
2013-07-31 07:11:15 +08:00
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2012-07-20 17:23:07 +08:00
|
|
|
/**
|
|
|
|
* skb_orphan_frags - orphan the frags contained in a buffer
|
|
|
|
* @skb: buffer to orphan frags from
|
|
|
|
* @gfp_mask: allocation mask for replacement pages
|
|
|
|
*
|
|
|
|
* For each frag in the SKB which needs a destructor (i.e. has an
|
|
|
|
* owner) create a copy of that frag and release the original
|
|
|
|
* page by calling the destructor.
|
|
|
|
*/
|
|
|
|
static inline int skb_orphan_frags(struct sk_buff *skb, gfp_t gfp_mask)
|
|
|
|
{
|
sock: enable MSG_ZEROCOPY
Prepare the datapath for refcounted ubuf_info. Clone ubuf_info with
skb_zerocopy_clone() wherever needed due to skb split, merge, resize
or clone.
Split skb_orphan_frags into two variants. The split, merge, .. paths
support reference counted zerocopy buffers, so do not do a deep copy.
Add skb_orphan_frags_rx for paths that may loop packets to receive
sockets. That is not allowed, as it may cause unbounded latency.
Deep copy all zerocopy copy buffers, ref-counted or not, in this path.
The exact locations to modify were chosen by exhaustively searching
through all code that might modify skb_frag references and/or the
the SKBTX_DEV_ZEROCOPY tx_flags bit.
The changes err on the safe side, in two ways.
(1) legacy ubuf_info paths virtio and tap are not modified. They keep
a 1:1 ubuf_info to sk_buff relationship. Calls to skb_orphan_frags
still call skb_copy_ubufs and thus copy frags in this case.
(2) not all copies deep in the stack are addressed yet. skb_shift,
skb_split and skb_try_coalesce can be refined to avoid copying.
These are not in the hot path and this patch is hairy enough as
is, so that is left for future refinement.
Signed-off-by: Willem de Bruijn <willemb@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-08-04 04:29:41 +08:00
|
|
|
if (likely(!skb_zcopy(skb)))
|
|
|
|
return 0;
|
|
|
|
if (skb_uarg(skb)->callback == sock_zerocopy_callback)
|
|
|
|
return 0;
|
|
|
|
return skb_copy_ubufs(skb, gfp_mask);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Frags must be orphaned, even if refcounted, if skb might loop to rx path */
|
|
|
|
static inline int skb_orphan_frags_rx(struct sk_buff *skb, gfp_t gfp_mask)
|
|
|
|
{
|
|
|
|
if (likely(!skb_zcopy(skb)))
|
2012-07-20 17:23:07 +08:00
|
|
|
return 0;
|
|
|
|
return skb_copy_ubufs(skb, gfp_mask);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* __skb_queue_purge - empty a list
|
|
|
|
* @list: list to empty
|
|
|
|
*
|
|
|
|
* Delete all buffers on an &sk_buff list. Each buffer is removed from
|
|
|
|
* the list and one reference dropped. This function does not take the
|
|
|
|
* list lock and the caller must hold the relevant locks to use it.
|
|
|
|
*/
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_queue_purge(struct sk_buff_head *list);
|
2005-04-17 06:20:36 +08:00
|
|
|
static inline void __skb_queue_purge(struct sk_buff_head *list)
|
|
|
|
{
|
|
|
|
struct sk_buff *skb;
|
|
|
|
while ((skb = __skb_dequeue(list)) != NULL)
|
|
|
|
kfree_skb(skb);
|
|
|
|
}
|
|
|
|
|
tcp: use an RB tree for ooo receive queue
Over the years, TCP BDP has increased by several orders of magnitude,
and some people are considering to reach the 2 Gbytes limit.
Even with current window scale limit of 14, ~1 Gbytes maps to ~740,000
MSS.
In presence of packet losses (or reorders), TCP stores incoming packets
into an out of order queue, and number of skbs sitting there waiting for
the missing packets to be received can be in the 10^5 range.
Most packets are appended to the tail of this queue, and when
packets can finally be transferred to receive queue, we scan the queue
from its head.
However, in presence of heavy losses, we might have to find an arbitrary
point in this queue, involving a linear scan for every incoming packet,
throwing away cpu caches.
This patch converts it to a RB tree, to get bounded latencies.
Yaogong wrote a preliminary patch about 2 years ago.
Eric did the rebase, added ofo_last_skb cache, polishing and tests.
Tested with network dropping between 1 and 10 % packets, with good
success (about 30 % increase of throughput in stress tests)
Next step would be to also use an RB tree for the write queue at sender
side ;)
Signed-off-by: Yaogong Wang <wygivan@google.com>
Signed-off-by: Eric Dumazet <edumazet@google.com>
Cc: Yuchung Cheng <ycheng@google.com>
Cc: Neal Cardwell <ncardwell@google.com>
Cc: Ilpo Järvinen <ilpo.jarvinen@helsinki.fi>
Acked-By: Ilpo Järvinen <ilpo.jarvinen@helsinki.fi>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-09-08 05:49:28 +08:00
|
|
|
void skb_rbtree_purge(struct rb_root *root);
|
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
void *netdev_alloc_frag(unsigned int fragsz);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
struct sk_buff *__netdev_alloc_skb(struct net_device *dev, unsigned int length,
|
|
|
|
gfp_t gfp_mask);
|
2006-08-01 13:35:23 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* netdev_alloc_skb - allocate an skbuff for rx on a specific device
|
|
|
|
* @dev: network device to receive on
|
|
|
|
* @length: length to allocate
|
|
|
|
*
|
|
|
|
* Allocate a new &sk_buff and assign it a usage count of one. The
|
|
|
|
* buffer has unspecified headroom built in. Users should allocate
|
|
|
|
* the headroom they think they need without accounting for the
|
|
|
|
* built in space. The built in space is used for optimisations.
|
|
|
|
*
|
|
|
|
* %NULL is returned if there is no free memory. Although this function
|
|
|
|
* allocates memory it can be called from an interrupt.
|
|
|
|
*/
|
|
|
|
static inline struct sk_buff *netdev_alloc_skb(struct net_device *dev,
|
2012-05-18 13:12:12 +08:00
|
|
|
unsigned int length)
|
2006-08-01 13:35:23 +08:00
|
|
|
{
|
|
|
|
return __netdev_alloc_skb(dev, length, GFP_ATOMIC);
|
|
|
|
}
|
|
|
|
|
2012-05-18 13:12:12 +08:00
|
|
|
/* legacy helper around __netdev_alloc_skb() */
|
|
|
|
static inline struct sk_buff *__dev_alloc_skb(unsigned int length,
|
|
|
|
gfp_t gfp_mask)
|
|
|
|
{
|
|
|
|
return __netdev_alloc_skb(NULL, length, gfp_mask);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* legacy helper around netdev_alloc_skb() */
|
|
|
|
static inline struct sk_buff *dev_alloc_skb(unsigned int length)
|
|
|
|
{
|
|
|
|
return netdev_alloc_skb(NULL, length);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-07-12 11:08:34 +08:00
|
|
|
static inline struct sk_buff *__netdev_alloc_skb_ip_align(struct net_device *dev,
|
|
|
|
unsigned int length, gfp_t gfp)
|
2009-10-08 01:11:23 +08:00
|
|
|
{
|
2011-07-12 11:08:34 +08:00
|
|
|
struct sk_buff *skb = __netdev_alloc_skb(dev, length + NET_IP_ALIGN, gfp);
|
2009-10-08 01:11:23 +08:00
|
|
|
|
|
|
|
if (NET_IP_ALIGN && skb)
|
|
|
|
skb_reserve(skb, NET_IP_ALIGN);
|
|
|
|
return skb;
|
|
|
|
}
|
|
|
|
|
2011-07-12 11:08:34 +08:00
|
|
|
static inline struct sk_buff *netdev_alloc_skb_ip_align(struct net_device *dev,
|
|
|
|
unsigned int length)
|
|
|
|
{
|
|
|
|
return __netdev_alloc_skb_ip_align(dev, length, GFP_ATOMIC);
|
|
|
|
}
|
|
|
|
|
2015-05-07 12:12:03 +08:00
|
|
|
static inline void skb_free_frag(void *addr)
|
|
|
|
{
|
2017-01-11 08:58:06 +08:00
|
|
|
page_frag_free(addr);
|
2015-05-07 12:12:03 +08:00
|
|
|
}
|
|
|
|
|
2014-12-10 11:40:42 +08:00
|
|
|
void *napi_alloc_frag(unsigned int fragsz);
|
2014-12-10 11:40:49 +08:00
|
|
|
struct sk_buff *__napi_alloc_skb(struct napi_struct *napi,
|
|
|
|
unsigned int length, gfp_t gfp_mask);
|
|
|
|
static inline struct sk_buff *napi_alloc_skb(struct napi_struct *napi,
|
|
|
|
unsigned int length)
|
|
|
|
{
|
|
|
|
return __napi_alloc_skb(napi, length, GFP_ATOMIC);
|
|
|
|
}
|
2016-02-08 20:14:59 +08:00
|
|
|
void napi_consume_skb(struct sk_buff *skb, int budget);
|
|
|
|
|
|
|
|
void __kfree_skb_flush(void);
|
2016-02-08 20:15:04 +08:00
|
|
|
void __kfree_skb_defer(struct sk_buff *skb);
|
2014-12-10 11:40:42 +08:00
|
|
|
|
2014-11-12 01:26:34 +08:00
|
|
|
/**
|
|
|
|
* __dev_alloc_pages - allocate page for network Rx
|
|
|
|
* @gfp_mask: allocation priority. Set __GFP_NOMEMALLOC if not for network Rx
|
|
|
|
* @order: size of the allocation
|
|
|
|
*
|
|
|
|
* Allocate a new page.
|
|
|
|
*
|
|
|
|
* %NULL is returned if there is no free memory.
|
|
|
|
*/
|
|
|
|
static inline struct page *__dev_alloc_pages(gfp_t gfp_mask,
|
|
|
|
unsigned int order)
|
|
|
|
{
|
|
|
|
/* This piece of code contains several assumptions.
|
|
|
|
* 1. This is for device Rx, therefor a cold page is preferred.
|
|
|
|
* 2. The expectation is the user wants a compound page.
|
|
|
|
* 3. If requesting a order 0 page it will not be compound
|
|
|
|
* due to the check to see if order has a value in prep_new_page
|
|
|
|
* 4. __GFP_MEMALLOC is ignored if __GFP_NOMEMALLOC is set due to
|
|
|
|
* code in gfp_to_alloc_flags that should be enforcing this.
|
|
|
|
*/
|
2017-11-16 09:38:03 +08:00
|
|
|
gfp_mask |= __GFP_COMP | __GFP_MEMALLOC;
|
2014-11-12 01:26:34 +08:00
|
|
|
|
|
|
|
return alloc_pages_node(NUMA_NO_NODE, gfp_mask, order);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct page *dev_alloc_pages(unsigned int order)
|
|
|
|
{
|
2016-05-19 23:30:54 +08:00
|
|
|
return __dev_alloc_pages(GFP_ATOMIC | __GFP_NOWARN, order);
|
2014-11-12 01:26:34 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* __dev_alloc_page - allocate a page for network Rx
|
|
|
|
* @gfp_mask: allocation priority. Set __GFP_NOMEMALLOC if not for network Rx
|
|
|
|
*
|
|
|
|
* Allocate a new page.
|
|
|
|
*
|
|
|
|
* %NULL is returned if there is no free memory.
|
|
|
|
*/
|
|
|
|
static inline struct page *__dev_alloc_page(gfp_t gfp_mask)
|
|
|
|
{
|
|
|
|
return __dev_alloc_pages(gfp_mask, 0);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline struct page *dev_alloc_page(void)
|
|
|
|
{
|
2016-05-19 23:30:54 +08:00
|
|
|
return dev_alloc_pages(0);
|
2014-11-12 01:26:34 +08:00
|
|
|
}
|
|
|
|
|
2012-08-01 07:44:24 +08:00
|
|
|
/**
|
|
|
|
* skb_propagate_pfmemalloc - Propagate pfmemalloc if skb is allocated after RX page
|
|
|
|
* @page: The page that was allocated from skb_alloc_page
|
|
|
|
* @skb: The skb that may need pfmemalloc set
|
|
|
|
*/
|
|
|
|
static inline void skb_propagate_pfmemalloc(struct page *page,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
2015-08-22 05:11:51 +08:00
|
|
|
if (page_is_pfmemalloc(page))
|
2012-08-01 07:44:24 +08:00
|
|
|
skb->pfmemalloc = true;
|
|
|
|
}
|
|
|
|
|
2011-08-19 14:25:00 +08:00
|
|
|
/**
|
2014-02-18 21:54:36 +08:00
|
|
|
* skb_frag_page - retrieve the page referred to by a paged fragment
|
2011-08-19 14:25:00 +08:00
|
|
|
* @frag: the paged fragment
|
|
|
|
*
|
|
|
|
* Returns the &struct page associated with @frag.
|
|
|
|
*/
|
|
|
|
static inline struct page *skb_frag_page(const skb_frag_t *frag)
|
|
|
|
{
|
2011-10-20 07:01:49 +08:00
|
|
|
return frag->page.p;
|
2011-08-19 14:25:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* __skb_frag_ref - take an addition reference on a paged fragment.
|
|
|
|
* @frag: the paged fragment
|
|
|
|
*
|
|
|
|
* Takes an additional reference on the paged fragment @frag.
|
|
|
|
*/
|
|
|
|
static inline void __skb_frag_ref(skb_frag_t *frag)
|
|
|
|
{
|
|
|
|
get_page(skb_frag_page(frag));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_frag_ref - take an addition reference on a paged fragment of an skb.
|
|
|
|
* @skb: the buffer
|
|
|
|
* @f: the fragment offset.
|
|
|
|
*
|
|
|
|
* Takes an additional reference on the @f'th paged fragment of @skb.
|
|
|
|
*/
|
|
|
|
static inline void skb_frag_ref(struct sk_buff *skb, int f)
|
|
|
|
{
|
|
|
|
__skb_frag_ref(&skb_shinfo(skb)->frags[f]);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* __skb_frag_unref - release a reference on a paged fragment.
|
|
|
|
* @frag: the paged fragment
|
|
|
|
*
|
|
|
|
* Releases a reference on the paged fragment @frag.
|
|
|
|
*/
|
|
|
|
static inline void __skb_frag_unref(skb_frag_t *frag)
|
|
|
|
{
|
|
|
|
put_page(skb_frag_page(frag));
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_frag_unref - release a reference on a paged fragment of an skb.
|
|
|
|
* @skb: the buffer
|
|
|
|
* @f: the fragment offset
|
|
|
|
*
|
|
|
|
* Releases a reference on the @f'th paged fragment of @skb.
|
|
|
|
*/
|
|
|
|
static inline void skb_frag_unref(struct sk_buff *skb, int f)
|
|
|
|
{
|
|
|
|
__skb_frag_unref(&skb_shinfo(skb)->frags[f]);
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_frag_address - gets the address of the data contained in a paged fragment
|
|
|
|
* @frag: the paged fragment buffer
|
|
|
|
*
|
|
|
|
* Returns the address of the data within @frag. The page must already
|
|
|
|
* be mapped.
|
|
|
|
*/
|
|
|
|
static inline void *skb_frag_address(const skb_frag_t *frag)
|
|
|
|
{
|
|
|
|
return page_address(skb_frag_page(frag)) + frag->page_offset;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_frag_address_safe - gets the address of the data contained in a paged fragment
|
|
|
|
* @frag: the paged fragment buffer
|
|
|
|
*
|
|
|
|
* Returns the address of the data within @frag. Checks that the page
|
|
|
|
* is mapped and returns %NULL otherwise.
|
|
|
|
*/
|
|
|
|
static inline void *skb_frag_address_safe(const skb_frag_t *frag)
|
|
|
|
{
|
|
|
|
void *ptr = page_address(skb_frag_page(frag));
|
|
|
|
if (unlikely(!ptr))
|
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return ptr + frag->page_offset;
|
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* __skb_frag_set_page - sets the page contained in a paged fragment
|
|
|
|
* @frag: the paged fragment
|
|
|
|
* @page: the page to set
|
|
|
|
*
|
|
|
|
* Sets the fragment @frag to contain @page.
|
|
|
|
*/
|
|
|
|
static inline void __skb_frag_set_page(skb_frag_t *frag, struct page *page)
|
|
|
|
{
|
2011-10-20 07:01:49 +08:00
|
|
|
frag->page.p = page;
|
2011-08-19 14:25:00 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_frag_set_page - sets the page contained in a paged fragment of an skb
|
|
|
|
* @skb: the buffer
|
|
|
|
* @f: the fragment offset
|
|
|
|
* @page: the page to set
|
|
|
|
*
|
|
|
|
* Sets the @f'th fragment of @skb to contain @page.
|
|
|
|
*/
|
|
|
|
static inline void skb_frag_set_page(struct sk_buff *skb, int f,
|
|
|
|
struct page *page)
|
|
|
|
{
|
|
|
|
__skb_frag_set_page(&skb_shinfo(skb)->frags[f], page);
|
|
|
|
}
|
|
|
|
|
2013-10-18 07:27:07 +08:00
|
|
|
bool skb_page_frag_refill(unsigned int sz, struct page_frag *pfrag, gfp_t prio);
|
|
|
|
|
2011-08-19 14:25:00 +08:00
|
|
|
/**
|
|
|
|
* skb_frag_dma_map - maps a paged fragment via the DMA API
|
2011-10-31 23:11:45 +08:00
|
|
|
* @dev: the device to map the fragment to
|
2011-08-19 14:25:00 +08:00
|
|
|
* @frag: the paged fragment to map
|
|
|
|
* @offset: the offset within the fragment (starting at the
|
|
|
|
* fragment's own offset)
|
|
|
|
* @size: the number of bytes to map
|
2017-05-12 20:19:29 +08:00
|
|
|
* @dir: the direction of the mapping (``PCI_DMA_*``)
|
2011-08-19 14:25:00 +08:00
|
|
|
*
|
|
|
|
* Maps the page associated with @frag to @device.
|
|
|
|
*/
|
|
|
|
static inline dma_addr_t skb_frag_dma_map(struct device *dev,
|
|
|
|
const skb_frag_t *frag,
|
|
|
|
size_t offset, size_t size,
|
|
|
|
enum dma_data_direction dir)
|
|
|
|
{
|
|
|
|
return dma_map_page(dev, skb_frag_page(frag),
|
|
|
|
frag->page_offset + offset, size, dir);
|
|
|
|
}
|
|
|
|
|
2011-12-04 05:39:53 +08:00
|
|
|
static inline struct sk_buff *pskb_copy(struct sk_buff *skb,
|
|
|
|
gfp_t gfp_mask)
|
|
|
|
{
|
|
|
|
return __pskb_copy(skb, skb_headroom(skb), gfp_mask);
|
|
|
|
}
|
|
|
|
|
2014-06-12 06:36:26 +08:00
|
|
|
|
|
|
|
static inline struct sk_buff *pskb_copy_for_clone(struct sk_buff *skb,
|
|
|
|
gfp_t gfp_mask)
|
|
|
|
{
|
|
|
|
return __pskb_copy_fclone(skb, skb_headroom(skb), gfp_mask, true);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
[SKBUFF]: Keep track of writable header len of headerless clones
Currently NAT (and others) that want to modify cloned skbs copy them,
even if in the vast majority of cases its not necessary because the
skb is a clone made by TCP and the portion NAT wants to modify is
actually writable because TCP release the header reference before
cloning.
The problem is that there is no clean way for NAT to find out how
long the writable header area is, so this patch introduces skb->hdr_len
to hold this length. When a headerless skb is cloned skb->hdr_len
is set to the current headroom, for regular clones it is copied from
the original. A new function skb_clone_writable(skb, len) returns
whether the skb is writable up to len bytes from skb->data. To avoid
enlarging the skb the mac_len field is reduced to 16 bit and the
new hdr_len field is put in the remaining 16 bit.
I've done a few rough benchmarks of NAT (not with this exact patch,
but a very similar one). As expected it saves huge amounts of system
time in case of sendfile, bringing it down to basically the same
amount as without NAT, with sendmsg it only helps on loopback,
probably because of the large MTU.
Transmit a 1GB file using sendfile/sendmsg over eth0/lo with and
without NAT:
- sendfile eth0, no NAT: sys 0m0.388s
- sendfile eth0, NAT: sys 0m1.835s
- sendfile eth0: NAT + path: sys 0m0.370s (~ -80%)
- sendfile lo, no NAT: sys 0m0.258s
- sendfile lo, NAT: sys 0m2.609s
- sendfile lo, NAT + patch: sys 0m0.260s (~ -90%)
- sendmsg eth0, no NAT: sys 0m2.508s
- sendmsg eth0, NAT: sys 0m2.539s
- sendmsg eth0, NAT + patch: sys 0m2.445s (no change)
- sendmsg lo, no NAT: sys 0m2.151s
- sendmsg lo, NAT: sys 0m3.557s
- sendmsg lo, NAT + patch: sys 0m2.159s (~ -40%)
I expect other users can see a similar performance improvement,
packet mangling iptables targets, ipip and ip_gre come to mind ..
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-06-25 19:35:20 +08:00
|
|
|
/**
|
|
|
|
* skb_clone_writable - is the header of a clone writable
|
|
|
|
* @skb: buffer to check
|
|
|
|
* @len: length up to which to write
|
|
|
|
*
|
|
|
|
* Returns true if modifying the header part of the cloned buffer
|
|
|
|
* does not requires the data to be copied.
|
|
|
|
*/
|
2011-10-21 05:45:43 +08:00
|
|
|
static inline int skb_clone_writable(const struct sk_buff *skb, unsigned int len)
|
[SKBUFF]: Keep track of writable header len of headerless clones
Currently NAT (and others) that want to modify cloned skbs copy them,
even if in the vast majority of cases its not necessary because the
skb is a clone made by TCP and the portion NAT wants to modify is
actually writable because TCP release the header reference before
cloning.
The problem is that there is no clean way for NAT to find out how
long the writable header area is, so this patch introduces skb->hdr_len
to hold this length. When a headerless skb is cloned skb->hdr_len
is set to the current headroom, for regular clones it is copied from
the original. A new function skb_clone_writable(skb, len) returns
whether the skb is writable up to len bytes from skb->data. To avoid
enlarging the skb the mac_len field is reduced to 16 bit and the
new hdr_len field is put in the remaining 16 bit.
I've done a few rough benchmarks of NAT (not with this exact patch,
but a very similar one). As expected it saves huge amounts of system
time in case of sendfile, bringing it down to basically the same
amount as without NAT, with sendmsg it only helps on loopback,
probably because of the large MTU.
Transmit a 1GB file using sendfile/sendmsg over eth0/lo with and
without NAT:
- sendfile eth0, no NAT: sys 0m0.388s
- sendfile eth0, NAT: sys 0m1.835s
- sendfile eth0: NAT + path: sys 0m0.370s (~ -80%)
- sendfile lo, no NAT: sys 0m0.258s
- sendfile lo, NAT: sys 0m2.609s
- sendfile lo, NAT + patch: sys 0m0.260s (~ -90%)
- sendmsg eth0, no NAT: sys 0m2.508s
- sendmsg eth0, NAT: sys 0m2.539s
- sendmsg eth0, NAT + patch: sys 0m2.445s (no change)
- sendmsg lo, no NAT: sys 0m2.151s
- sendmsg lo, NAT: sys 0m3.557s
- sendmsg lo, NAT + patch: sys 0m2.159s (~ -40%)
I expect other users can see a similar performance improvement,
packet mangling iptables targets, ipip and ip_gre come to mind ..
Signed-off-by: Patrick McHardy <kaber@trash.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2007-06-25 19:35:20 +08:00
|
|
|
{
|
|
|
|
return !skb_header_cloned(skb) &&
|
|
|
|
skb_headroom(skb) + len <= skb->hdr_len;
|
|
|
|
}
|
|
|
|
|
2016-02-20 06:05:25 +08:00
|
|
|
static inline int skb_try_make_writable(struct sk_buff *skb,
|
|
|
|
unsigned int write_len)
|
|
|
|
{
|
|
|
|
return skb_cloned(skb) && !skb_clone_writable(skb, write_len) &&
|
|
|
|
pskb_expand_head(skb, 0, 0, GFP_ATOMIC);
|
|
|
|
}
|
|
|
|
|
2007-09-17 07:21:16 +08:00
|
|
|
static inline int __skb_cow(struct sk_buff *skb, unsigned int headroom,
|
|
|
|
int cloned)
|
|
|
|
{
|
|
|
|
int delta = 0;
|
|
|
|
|
|
|
|
if (headroom > skb_headroom(skb))
|
|
|
|
delta = headroom - skb_headroom(skb);
|
|
|
|
|
|
|
|
if (delta || cloned)
|
|
|
|
return pskb_expand_head(skb, ALIGN(delta, NET_SKB_PAD), 0,
|
|
|
|
GFP_ATOMIC);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* skb_cow - copy header of skb when it is required
|
|
|
|
* @skb: buffer to cow
|
|
|
|
* @headroom: needed headroom
|
|
|
|
*
|
|
|
|
* If the skb passed lacks sufficient headroom or its data part
|
|
|
|
* is shared, data is reallocated. If reallocation fails, an error
|
|
|
|
* is returned and original skb is not changed.
|
|
|
|
*
|
|
|
|
* The result is skb with writable area skb->head...skb->tail
|
|
|
|
* and at least @headroom of space at head.
|
|
|
|
*/
|
|
|
|
static inline int skb_cow(struct sk_buff *skb, unsigned int headroom)
|
|
|
|
{
|
2007-09-17 07:21:16 +08:00
|
|
|
return __skb_cow(skb, headroom, skb_cloned(skb));
|
|
|
|
}
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2007-09-17 07:21:16 +08:00
|
|
|
/**
|
|
|
|
* skb_cow_head - skb_cow but only making the head writable
|
|
|
|
* @skb: buffer to cow
|
|
|
|
* @headroom: needed headroom
|
|
|
|
*
|
|
|
|
* This function is identical to skb_cow except that we replace the
|
|
|
|
* skb_cloned check by skb_header_cloned. It should be used when
|
|
|
|
* you only need to push on some header and do not need to modify
|
|
|
|
* the data.
|
|
|
|
*/
|
|
|
|
static inline int skb_cow_head(struct sk_buff *skb, unsigned int headroom)
|
|
|
|
{
|
|
|
|
return __skb_cow(skb, headroom, skb_header_cloned(skb));
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_padto - pad an skbuff up to a minimal size
|
|
|
|
* @skb: buffer to pad
|
|
|
|
* @len: minimal length
|
|
|
|
*
|
|
|
|
* Pads up a buffer to ensure the trailing bytes exist and are
|
|
|
|
* blanked. If the buffer already contains sufficient data it
|
2006-06-23 17:06:41 +08:00
|
|
|
* is untouched. Otherwise it is extended. Returns zero on
|
|
|
|
* success. The skb is freed on error.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
2006-06-23 17:06:41 +08:00
|
|
|
static inline int skb_padto(struct sk_buff *skb, unsigned int len)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
unsigned int size = skb->len;
|
|
|
|
if (likely(size >= len))
|
2006-06-23 17:06:41 +08:00
|
|
|
return 0;
|
2008-08-12 09:17:17 +08:00
|
|
|
return skb_pad(skb, len - size);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2014-12-04 00:17:33 +08:00
|
|
|
/**
|
|
|
|
* skb_put_padto - increase size and pad an skbuff up to a minimal size
|
|
|
|
* @skb: buffer to pad
|
|
|
|
* @len: minimal length
|
2017-08-23 06:12:14 +08:00
|
|
|
* @free_on_error: free buffer on error
|
2014-12-04 00:17:33 +08:00
|
|
|
*
|
|
|
|
* Pads up a buffer to ensure the trailing bytes exist and are
|
|
|
|
* blanked. If the buffer already contains sufficient data it
|
|
|
|
* is untouched. Otherwise it is extended. Returns zero on
|
2017-08-23 06:12:14 +08:00
|
|
|
* success. The skb is freed on error if @free_on_error is true.
|
2014-12-04 00:17:33 +08:00
|
|
|
*/
|
2017-08-23 06:12:14 +08:00
|
|
|
static inline int __skb_put_padto(struct sk_buff *skb, unsigned int len,
|
|
|
|
bool free_on_error)
|
2014-12-04 00:17:33 +08:00
|
|
|
{
|
|
|
|
unsigned int size = skb->len;
|
|
|
|
|
|
|
|
if (unlikely(size < len)) {
|
|
|
|
len -= size;
|
2017-08-23 06:12:14 +08:00
|
|
|
if (__skb_pad(skb, len, free_on_error))
|
2014-12-04 00:17:33 +08:00
|
|
|
return -ENOMEM;
|
|
|
|
__skb_put(skb, len);
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2017-08-23 06:12:14 +08:00
|
|
|
/**
|
|
|
|
* skb_put_padto - increase size and pad an skbuff up to a minimal size
|
|
|
|
* @skb: buffer to pad
|
|
|
|
* @len: minimal length
|
|
|
|
*
|
|
|
|
* Pads up a buffer to ensure the trailing bytes exist and are
|
|
|
|
* blanked. If the buffer already contains sufficient data it
|
|
|
|
* is untouched. Otherwise it is extended. Returns zero on
|
|
|
|
* success. The skb is freed on error.
|
|
|
|
*/
|
|
|
|
static inline int skb_put_padto(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
|
|
|
return __skb_put_padto(skb, len, true);
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
static inline int skb_add_data(struct sk_buff *skb,
|
2014-11-28 10:44:24 +08:00
|
|
|
struct iov_iter *from, int copy)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
|
|
|
const int off = skb->len;
|
|
|
|
|
|
|
|
if (skb->ip_summed == CHECKSUM_NONE) {
|
2014-11-28 10:44:24 +08:00
|
|
|
__wsum csum = 0;
|
2016-11-02 10:42:45 +08:00
|
|
|
if (csum_and_copy_from_iter_full(skb_put(skb, copy), copy,
|
|
|
|
&csum, from)) {
|
2005-04-17 06:20:36 +08:00
|
|
|
skb->csum = csum_block_add(skb->csum, csum, off);
|
|
|
|
return 0;
|
|
|
|
}
|
2016-11-02 10:42:45 +08:00
|
|
|
} else if (copy_from_iter_full(skb_put(skb, copy), copy, from))
|
2005-04-17 06:20:36 +08:00
|
|
|
return 0;
|
|
|
|
|
|
|
|
__skb_trim(skb, off);
|
|
|
|
return -EFAULT;
|
|
|
|
}
|
|
|
|
|
2012-04-24 01:48:27 +08:00
|
|
|
static inline bool skb_can_coalesce(struct sk_buff *skb, int i,
|
|
|
|
const struct page *page, int off)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
sock: enable MSG_ZEROCOPY
Prepare the datapath for refcounted ubuf_info. Clone ubuf_info with
skb_zerocopy_clone() wherever needed due to skb split, merge, resize
or clone.
Split skb_orphan_frags into two variants. The split, merge, .. paths
support reference counted zerocopy buffers, so do not do a deep copy.
Add skb_orphan_frags_rx for paths that may loop packets to receive
sockets. That is not allowed, as it may cause unbounded latency.
Deep copy all zerocopy copy buffers, ref-counted or not, in this path.
The exact locations to modify were chosen by exhaustively searching
through all code that might modify skb_frag references and/or the
the SKBTX_DEV_ZEROCOPY tx_flags bit.
The changes err on the safe side, in two ways.
(1) legacy ubuf_info paths virtio and tap are not modified. They keep
a 1:1 ubuf_info to sk_buff relationship. Calls to skb_orphan_frags
still call skb_copy_ubufs and thus copy frags in this case.
(2) not all copies deep in the stack are addressed yet. skb_shift,
skb_split and skb_try_coalesce can be refined to avoid copying.
These are not in the hot path and this patch is hairy enough as
is, so that is left for future refinement.
Signed-off-by: Willem de Bruijn <willemb@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-08-04 04:29:41 +08:00
|
|
|
if (skb_zcopy(skb))
|
|
|
|
return false;
|
2005-04-17 06:20:36 +08:00
|
|
|
if (i) {
|
2011-10-19 05:00:24 +08:00
|
|
|
const struct skb_frag_struct *frag = &skb_shinfo(skb)->frags[i - 1];
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2011-08-23 07:44:58 +08:00
|
|
|
return page == skb_frag_page(frag) &&
|
2011-10-19 05:00:24 +08:00
|
|
|
off == frag->page_offset + skb_frag_size(frag);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
2012-04-24 01:48:27 +08:00
|
|
|
return false;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
2006-06-10 07:10:40 +08:00
|
|
|
static inline int __skb_linearize(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return __pskb_pull_tail(skb, skb->data_len) ? 0 : -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* skb_linearize - convert paged skb to linear one
|
|
|
|
* @skb: buffer to linarize
|
|
|
|
*
|
|
|
|
* If there is no free memory -ENOMEM is returned, otherwise zero
|
|
|
|
* is returned and the old skb data released.
|
|
|
|
*/
|
2006-06-10 07:10:40 +08:00
|
|
|
static inline int skb_linearize(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb_is_nonlinear(skb) ? __skb_linearize(skb) : 0;
|
|
|
|
}
|
|
|
|
|
2013-01-26 04:34:37 +08:00
|
|
|
/**
|
|
|
|
* skb_has_shared_frag - can any frag be overwritten
|
|
|
|
* @skb: buffer to test
|
|
|
|
*
|
|
|
|
* Return true if the skb has at least one frag that might be modified
|
|
|
|
* by an external entity (as in vmsplice()/sendfile())
|
|
|
|
*/
|
|
|
|
static inline bool skb_has_shared_frag(const struct sk_buff *skb)
|
|
|
|
{
|
2013-02-11 17:27:41 +08:00
|
|
|
return skb_is_nonlinear(skb) &&
|
|
|
|
skb_shinfo(skb)->tx_flags & SKBTX_SHARED_FRAG;
|
2013-01-26 04:34:37 +08:00
|
|
|
}
|
|
|
|
|
2006-06-10 07:10:40 +08:00
|
|
|
/**
|
|
|
|
* skb_linearize_cow - make sure skb is linear and writable
|
|
|
|
* @skb: buffer to process
|
|
|
|
*
|
|
|
|
* If there is no free memory -ENOMEM is returned, otherwise zero
|
|
|
|
* is returned and the old skb data released.
|
|
|
|
*/
|
|
|
|
static inline int skb_linearize_cow(struct sk_buff *skb)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2006-06-10 07:10:40 +08:00
|
|
|
return skb_is_nonlinear(skb) || skb_cloned(skb) ?
|
|
|
|
__skb_linearize(skb) : 0;
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
bpf: fix checksum fixups on bpf_skb_store_bytes
bpf_skb_store_bytes() invocations above L2 header need BPF_F_RECOMPUTE_CSUM
flag for updates, so that CHECKSUM_COMPLETE will be fixed up along the way.
Where we ran into an issue with bpf_skb_store_bytes() is when we did a
single-byte update on the IPv6 hoplimit despite using BPF_F_RECOMPUTE_CSUM
flag; simple ping via ICMPv6 triggered a hw csum failure as a result. The
underlying issue has been tracked down to a buffer alignment issue.
Meaning, that csum_partial() computations via skb_postpull_rcsum() and
skb_postpush_rcsum() pair invoked had a wrong result since they operated on
an odd address for the hoplimit, while other computations were done on an
even address. This mix doesn't work as-is with skb_postpull_rcsum(),
skb_postpush_rcsum() pair as it always expects at least half-word alignment
of input buffers, which is normally the case. Thus, instead of these helpers
using csum_sub() and (implicitly) csum_add(), we need to use csum_block_sub(),
csum_block_add(), respectively. For unaligned offsets, they rotate the sum
to align it to a half-word boundary again, otherwise they work the same as
csum_sub() and csum_add().
Adding __skb_postpull_rcsum(), __skb_postpush_rcsum() variants that take the
offset as an input and adapting bpf_skb_store_bytes() to them fixes the hw
csum failures again. The skb_postpull_rcsum(), skb_postpush_rcsum() helpers
use a 0 constant for offset so that the compiler optimizes the offset & 1
test away and generates the same code as with csum_sub()/_add().
Fixes: 608cd71a9c7c ("tc: bpf: generalize pedit action")
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-05 06:11:12 +08:00
|
|
|
static __always_inline void
|
|
|
|
__skb_postpull_rcsum(struct sk_buff *skb, const void *start, unsigned int len,
|
|
|
|
unsigned int off)
|
|
|
|
{
|
|
|
|
if (skb->ip_summed == CHECKSUM_COMPLETE)
|
|
|
|
skb->csum = csum_block_sub(skb->csum,
|
|
|
|
csum_partial(start, len, 0), off);
|
|
|
|
else if (skb->ip_summed == CHECKSUM_PARTIAL &&
|
|
|
|
skb_checksum_start_offset(skb) < 0)
|
|
|
|
skb->ip_summed = CHECKSUM_NONE;
|
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
/**
|
|
|
|
* skb_postpull_rcsum - update checksum for received skb after pull
|
|
|
|
* @skb: buffer to update
|
|
|
|
* @start: start of data before pull
|
|
|
|
* @len: length of data pulled
|
|
|
|
*
|
|
|
|
* After doing a pull on a received packet, you need to call this to
|
2006-08-30 07:44:56 +08:00
|
|
|
* update the CHECKSUM_COMPLETE checksum, or set ip_summed to
|
|
|
|
* CHECKSUM_NONE so that it can be recomputed from scratch.
|
2005-04-17 06:20:36 +08:00
|
|
|
*/
|
|
|
|
static inline void skb_postpull_rcsum(struct sk_buff *skb,
|
2006-03-21 14:43:56 +08:00
|
|
|
const void *start, unsigned int len)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
bpf: fix checksum fixups on bpf_skb_store_bytes
bpf_skb_store_bytes() invocations above L2 header need BPF_F_RECOMPUTE_CSUM
flag for updates, so that CHECKSUM_COMPLETE will be fixed up along the way.
Where we ran into an issue with bpf_skb_store_bytes() is when we did a
single-byte update on the IPv6 hoplimit despite using BPF_F_RECOMPUTE_CSUM
flag; simple ping via ICMPv6 triggered a hw csum failure as a result. The
underlying issue has been tracked down to a buffer alignment issue.
Meaning, that csum_partial() computations via skb_postpull_rcsum() and
skb_postpush_rcsum() pair invoked had a wrong result since they operated on
an odd address for the hoplimit, while other computations were done on an
even address. This mix doesn't work as-is with skb_postpull_rcsum(),
skb_postpush_rcsum() pair as it always expects at least half-word alignment
of input buffers, which is normally the case. Thus, instead of these helpers
using csum_sub() and (implicitly) csum_add(), we need to use csum_block_sub(),
csum_block_add(), respectively. For unaligned offsets, they rotate the sum
to align it to a half-word boundary again, otherwise they work the same as
csum_sub() and csum_add().
Adding __skb_postpull_rcsum(), __skb_postpush_rcsum() variants that take the
offset as an input and adapting bpf_skb_store_bytes() to them fixes the hw
csum failures again. The skb_postpull_rcsum(), skb_postpush_rcsum() helpers
use a 0 constant for offset so that the compiler optimizes the offset & 1
test away and generates the same code as with csum_sub()/_add().
Fixes: 608cd71a9c7c ("tc: bpf: generalize pedit action")
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-05 06:11:12 +08:00
|
|
|
__skb_postpull_rcsum(skb, start, len, 0);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
|
bpf: fix checksum fixups on bpf_skb_store_bytes
bpf_skb_store_bytes() invocations above L2 header need BPF_F_RECOMPUTE_CSUM
flag for updates, so that CHECKSUM_COMPLETE will be fixed up along the way.
Where we ran into an issue with bpf_skb_store_bytes() is when we did a
single-byte update on the IPv6 hoplimit despite using BPF_F_RECOMPUTE_CSUM
flag; simple ping via ICMPv6 triggered a hw csum failure as a result. The
underlying issue has been tracked down to a buffer alignment issue.
Meaning, that csum_partial() computations via skb_postpull_rcsum() and
skb_postpush_rcsum() pair invoked had a wrong result since they operated on
an odd address for the hoplimit, while other computations were done on an
even address. This mix doesn't work as-is with skb_postpull_rcsum(),
skb_postpush_rcsum() pair as it always expects at least half-word alignment
of input buffers, which is normally the case. Thus, instead of these helpers
using csum_sub() and (implicitly) csum_add(), we need to use csum_block_sub(),
csum_block_add(), respectively. For unaligned offsets, they rotate the sum
to align it to a half-word boundary again, otherwise they work the same as
csum_sub() and csum_add().
Adding __skb_postpull_rcsum(), __skb_postpush_rcsum() variants that take the
offset as an input and adapting bpf_skb_store_bytes() to them fixes the hw
csum failures again. The skb_postpull_rcsum(), skb_postpush_rcsum() helpers
use a 0 constant for offset so that the compiler optimizes the offset & 1
test away and generates the same code as with csum_sub()/_add().
Fixes: 608cd71a9c7c ("tc: bpf: generalize pedit action")
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-05 06:11:12 +08:00
|
|
|
static __always_inline void
|
|
|
|
__skb_postpush_rcsum(struct sk_buff *skb, const void *start, unsigned int len,
|
|
|
|
unsigned int off)
|
|
|
|
{
|
|
|
|
if (skb->ip_summed == CHECKSUM_COMPLETE)
|
|
|
|
skb->csum = csum_block_add(skb->csum,
|
|
|
|
csum_partial(start, len, 0), off);
|
|
|
|
}
|
2006-03-21 14:43:56 +08:00
|
|
|
|
bpf: fix checksum fixups on bpf_skb_store_bytes
bpf_skb_store_bytes() invocations above L2 header need BPF_F_RECOMPUTE_CSUM
flag for updates, so that CHECKSUM_COMPLETE will be fixed up along the way.
Where we ran into an issue with bpf_skb_store_bytes() is when we did a
single-byte update on the IPv6 hoplimit despite using BPF_F_RECOMPUTE_CSUM
flag; simple ping via ICMPv6 triggered a hw csum failure as a result. The
underlying issue has been tracked down to a buffer alignment issue.
Meaning, that csum_partial() computations via skb_postpull_rcsum() and
skb_postpush_rcsum() pair invoked had a wrong result since they operated on
an odd address for the hoplimit, while other computations were done on an
even address. This mix doesn't work as-is with skb_postpull_rcsum(),
skb_postpush_rcsum() pair as it always expects at least half-word alignment
of input buffers, which is normally the case. Thus, instead of these helpers
using csum_sub() and (implicitly) csum_add(), we need to use csum_block_sub(),
csum_block_add(), respectively. For unaligned offsets, they rotate the sum
to align it to a half-word boundary again, otherwise they work the same as
csum_sub() and csum_add().
Adding __skb_postpull_rcsum(), __skb_postpush_rcsum() variants that take the
offset as an input and adapting bpf_skb_store_bytes() to them fixes the hw
csum failures again. The skb_postpull_rcsum(), skb_postpush_rcsum() helpers
use a 0 constant for offset so that the compiler optimizes the offset & 1
test away and generates the same code as with csum_sub()/_add().
Fixes: 608cd71a9c7c ("tc: bpf: generalize pedit action")
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-05 06:11:12 +08:00
|
|
|
/**
|
|
|
|
* skb_postpush_rcsum - update checksum for received skb after push
|
|
|
|
* @skb: buffer to update
|
|
|
|
* @start: start of data after push
|
|
|
|
* @len: length of data pushed
|
|
|
|
*
|
|
|
|
* After doing a push on a received packet, you need to call this to
|
|
|
|
* update the CHECKSUM_COMPLETE checksum.
|
|
|
|
*/
|
2016-01-07 22:50:23 +08:00
|
|
|
static inline void skb_postpush_rcsum(struct sk_buff *skb,
|
|
|
|
const void *start, unsigned int len)
|
|
|
|
{
|
bpf: fix checksum fixups on bpf_skb_store_bytes
bpf_skb_store_bytes() invocations above L2 header need BPF_F_RECOMPUTE_CSUM
flag for updates, so that CHECKSUM_COMPLETE will be fixed up along the way.
Where we ran into an issue with bpf_skb_store_bytes() is when we did a
single-byte update on the IPv6 hoplimit despite using BPF_F_RECOMPUTE_CSUM
flag; simple ping via ICMPv6 triggered a hw csum failure as a result. The
underlying issue has been tracked down to a buffer alignment issue.
Meaning, that csum_partial() computations via skb_postpull_rcsum() and
skb_postpush_rcsum() pair invoked had a wrong result since they operated on
an odd address for the hoplimit, while other computations were done on an
even address. This mix doesn't work as-is with skb_postpull_rcsum(),
skb_postpush_rcsum() pair as it always expects at least half-word alignment
of input buffers, which is normally the case. Thus, instead of these helpers
using csum_sub() and (implicitly) csum_add(), we need to use csum_block_sub(),
csum_block_add(), respectively. For unaligned offsets, they rotate the sum
to align it to a half-word boundary again, otherwise they work the same as
csum_sub() and csum_add().
Adding __skb_postpull_rcsum(), __skb_postpush_rcsum() variants that take the
offset as an input and adapting bpf_skb_store_bytes() to them fixes the hw
csum failures again. The skb_postpull_rcsum(), skb_postpush_rcsum() helpers
use a 0 constant for offset so that the compiler optimizes the offset & 1
test away and generates the same code as with csum_sub()/_add().
Fixes: 608cd71a9c7c ("tc: bpf: generalize pedit action")
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-05 06:11:12 +08:00
|
|
|
__skb_postpush_rcsum(skb, start, len, 0);
|
2016-01-07 22:50:23 +08:00
|
|
|
}
|
|
|
|
|
networking: make skb_pull & friends return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions return void * and remove all the casts across
the tree, adding a (u8 *) cast only where the unsigned char pointer
was used directly, all done with the following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = {
skb_pull,
__skb_pull,
skb_pull_inline,
__pskb_pull_tail,
__pskb_pull,
pskb_pull
};
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:22 +08:00
|
|
|
void *skb_pull_rcsum(struct sk_buff *skb, unsigned int len);
|
bpf: fix checksum fixups on bpf_skb_store_bytes
bpf_skb_store_bytes() invocations above L2 header need BPF_F_RECOMPUTE_CSUM
flag for updates, so that CHECKSUM_COMPLETE will be fixed up along the way.
Where we ran into an issue with bpf_skb_store_bytes() is when we did a
single-byte update on the IPv6 hoplimit despite using BPF_F_RECOMPUTE_CSUM
flag; simple ping via ICMPv6 triggered a hw csum failure as a result. The
underlying issue has been tracked down to a buffer alignment issue.
Meaning, that csum_partial() computations via skb_postpull_rcsum() and
skb_postpush_rcsum() pair invoked had a wrong result since they operated on
an odd address for the hoplimit, while other computations were done on an
even address. This mix doesn't work as-is with skb_postpull_rcsum(),
skb_postpush_rcsum() pair as it always expects at least half-word alignment
of input buffers, which is normally the case. Thus, instead of these helpers
using csum_sub() and (implicitly) csum_add(), we need to use csum_block_sub(),
csum_block_add(), respectively. For unaligned offsets, they rotate the sum
to align it to a half-word boundary again, otherwise they work the same as
csum_sub() and csum_add().
Adding __skb_postpull_rcsum(), __skb_postpush_rcsum() variants that take the
offset as an input and adapting bpf_skb_store_bytes() to them fixes the hw
csum failures again. The skb_postpull_rcsum(), skb_postpush_rcsum() helpers
use a 0 constant for offset so that the compiler optimizes the offset & 1
test away and generates the same code as with csum_sub()/_add().
Fixes: 608cd71a9c7c ("tc: bpf: generalize pedit action")
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-08-05 06:11:12 +08:00
|
|
|
|
2016-07-01 01:15:22 +08:00
|
|
|
/**
|
|
|
|
* skb_push_rcsum - push skb and update receive checksum
|
|
|
|
* @skb: buffer to update
|
|
|
|
* @len: length of data pulled
|
|
|
|
*
|
|
|
|
* This function performs an skb_push on the packet and updates
|
|
|
|
* the CHECKSUM_COMPLETE checksum. It should be used on
|
|
|
|
* receive path processing instead of skb_push unless you know
|
|
|
|
* that the checksum difference is zero (e.g., a valid IP header)
|
|
|
|
* or you are setting ip_summed to CHECKSUM_NONE.
|
|
|
|
*/
|
networking: make skb_push & __skb_push return void pointers
It seems like a historic accident that these return unsigned char *,
and in many places that means casts are required, more often than not.
Make these functions return void * and remove all the casts across
the tree, adding a (u8 *) cast only where the unsigned char pointer
was used directly, all done with the following spatch:
@@
expression SKB, LEN;
typedef u8;
identifier fn = { skb_push, __skb_push, skb_push_rcsum };
@@
- *(fn(SKB, LEN))
+ *(u8 *)fn(SKB, LEN)
@@
expression E, SKB, LEN;
identifier fn = { skb_push, __skb_push, skb_push_rcsum };
type T;
@@
- E = ((T *)(fn(SKB, LEN)))
+ E = fn(SKB, LEN)
@@
expression SKB, LEN;
identifier fn = { skb_push, __skb_push, skb_push_rcsum };
@@
- fn(SKB, LEN)[0]
+ *(u8 *)fn(SKB, LEN)
Note that the last part there converts from push(...)[0] to the
more idiomatic *(u8 *)push(...).
Signed-off-by: Johannes Berg <johannes.berg@intel.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-06-16 20:29:23 +08:00
|
|
|
static inline void *skb_push_rcsum(struct sk_buff *skb, unsigned int len)
|
2016-07-01 01:15:22 +08:00
|
|
|
{
|
|
|
|
skb_push(skb, len);
|
|
|
|
skb_postpush_rcsum(skb, skb->data, len);
|
|
|
|
return skb->data;
|
|
|
|
}
|
|
|
|
|
2013-12-03 06:26:05 +08:00
|
|
|
/**
|
|
|
|
* pskb_trim_rcsum - trim received skb and update checksum
|
|
|
|
* @skb: buffer to trim
|
|
|
|
* @len: new length
|
|
|
|
*
|
|
|
|
* This is exactly the same as pskb_trim except that it ensures the
|
|
|
|
* checksum of received packets are still valid after the operation.
|
|
|
|
*/
|
|
|
|
|
|
|
|
static inline int pskb_trim_rcsum(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
|
|
|
if (likely(len >= skb->len))
|
|
|
|
return 0;
|
|
|
|
if (skb->ip_summed == CHECKSUM_COMPLETE)
|
|
|
|
skb->ip_summed = CHECKSUM_NONE;
|
|
|
|
return __pskb_trim(skb, len);
|
|
|
|
}
|
|
|
|
|
2016-08-18 07:00:39 +08:00
|
|
|
static inline int __skb_trim_rcsum(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
|
|
|
if (skb->ip_summed == CHECKSUM_COMPLETE)
|
|
|
|
skb->ip_summed = CHECKSUM_NONE;
|
|
|
|
__skb_trim(skb, len);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline int __skb_grow_rcsum(struct sk_buff *skb, unsigned int len)
|
|
|
|
{
|
|
|
|
if (skb->ip_summed == CHECKSUM_COMPLETE)
|
|
|
|
skb->ip_summed = CHECKSUM_NONE;
|
|
|
|
return __skb_grow(skb, len);
|
|
|
|
}
|
|
|
|
|
2017-10-06 13:21:21 +08:00
|
|
|
#define rb_to_skb(rb) rb_entry_safe(rb, struct sk_buff, rbnode)
|
|
|
|
#define skb_rb_first(root) rb_to_skb(rb_first(root))
|
|
|
|
#define skb_rb_last(root) rb_to_skb(rb_last(root))
|
|
|
|
#define skb_rb_next(skb) rb_to_skb(rb_next(&(skb)->rbnode))
|
|
|
|
#define skb_rb_prev(skb) rb_to_skb(rb_prev(&(skb)->rbnode))
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#define skb_queue_walk(queue, skb) \
|
|
|
|
for (skb = (queue)->next; \
|
2011-05-23 07:51:43 +08:00
|
|
|
skb != (struct sk_buff *)(queue); \
|
2005-04-17 06:20:36 +08:00
|
|
|
skb = skb->next)
|
|
|
|
|
2007-04-30 15:07:31 +08:00
|
|
|
#define skb_queue_walk_safe(queue, skb, tmp) \
|
|
|
|
for (skb = (queue)->next, tmp = skb->next; \
|
|
|
|
skb != (struct sk_buff *)(queue); \
|
|
|
|
skb = tmp, tmp = skb->next)
|
|
|
|
|
2008-09-23 15:49:44 +08:00
|
|
|
#define skb_queue_walk_from(queue, skb) \
|
2011-05-23 07:51:43 +08:00
|
|
|
for (; skb != (struct sk_buff *)(queue); \
|
2008-09-23 15:49:44 +08:00
|
|
|
skb = skb->next)
|
|
|
|
|
2017-10-06 13:21:21 +08:00
|
|
|
#define skb_rbtree_walk(skb, root) \
|
|
|
|
for (skb = skb_rb_first(root); skb != NULL; \
|
|
|
|
skb = skb_rb_next(skb))
|
|
|
|
|
|
|
|
#define skb_rbtree_walk_from(skb) \
|
|
|
|
for (; skb != NULL; \
|
|
|
|
skb = skb_rb_next(skb))
|
|
|
|
|
|
|
|
#define skb_rbtree_walk_from_safe(skb, tmp) \
|
|
|
|
for (; tmp = skb ? skb_rb_next(skb) : NULL, (skb != NULL); \
|
|
|
|
skb = tmp)
|
|
|
|
|
2008-09-23 15:49:44 +08:00
|
|
|
#define skb_queue_walk_from_safe(queue, skb, tmp) \
|
|
|
|
for (tmp = skb->next; \
|
|
|
|
skb != (struct sk_buff *)(queue); \
|
|
|
|
skb = tmp, tmp = skb->next)
|
|
|
|
|
2005-10-31 05:47:34 +08:00
|
|
|
#define skb_queue_reverse_walk(queue, skb) \
|
|
|
|
for (skb = (queue)->prev; \
|
2011-05-23 07:51:43 +08:00
|
|
|
skb != (struct sk_buff *)(queue); \
|
2005-10-31 05:47:34 +08:00
|
|
|
skb = skb->prev)
|
|
|
|
|
2011-01-21 14:47:32 +08:00
|
|
|
#define skb_queue_reverse_walk_safe(queue, skb, tmp) \
|
|
|
|
for (skb = (queue)->prev, tmp = skb->prev; \
|
|
|
|
skb != (struct sk_buff *)(queue); \
|
|
|
|
skb = tmp, tmp = skb->prev)
|
|
|
|
|
|
|
|
#define skb_queue_reverse_walk_from_safe(queue, skb, tmp) \
|
|
|
|
for (tmp = skb->prev; \
|
|
|
|
skb != (struct sk_buff *)(queue); \
|
|
|
|
skb = tmp, tmp = skb->prev)
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2010-08-23 15:13:46 +08:00
|
|
|
static inline bool skb_has_frag_list(const struct sk_buff *skb)
|
2009-06-09 15:17:13 +08:00
|
|
|
{
|
|
|
|
return skb_shinfo(skb)->frag_list != NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_frag_list_init(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb_shinfo(skb)->frag_list = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define skb_walk_frags(skb, iter) \
|
|
|
|
for (iter = skb_shinfo(skb)->frag_list; iter; iter = iter->next)
|
|
|
|
|
2015-12-07 05:11:34 +08:00
|
|
|
|
|
|
|
int __skb_wait_for_more_packets(struct sock *sk, int *err, long *timeo_p,
|
|
|
|
const struct sk_buff *skb);
|
2017-05-16 17:20:13 +08:00
|
|
|
struct sk_buff *__skb_try_recv_from_queue(struct sock *sk,
|
|
|
|
struct sk_buff_head *queue,
|
|
|
|
unsigned int flags,
|
|
|
|
void (*destructor)(struct sock *sk,
|
|
|
|
struct sk_buff *skb),
|
|
|
|
int *peeked, int *off, int *err,
|
|
|
|
struct sk_buff **last);
|
2015-12-07 05:11:34 +08:00
|
|
|
struct sk_buff *__skb_try_recv_datagram(struct sock *sk, unsigned flags,
|
2016-11-04 18:28:59 +08:00
|
|
|
void (*destructor)(struct sock *sk,
|
|
|
|
struct sk_buff *skb),
|
2015-12-07 05:11:34 +08:00
|
|
|
int *peeked, int *off, int *err,
|
|
|
|
struct sk_buff **last);
|
2013-09-27 05:48:15 +08:00
|
|
|
struct sk_buff *__skb_recv_datagram(struct sock *sk, unsigned flags,
|
2016-11-04 18:28:59 +08:00
|
|
|
void (*destructor)(struct sock *sk,
|
|
|
|
struct sk_buff *skb),
|
2013-09-27 05:48:15 +08:00
|
|
|
int *peeked, int *off, int *err);
|
|
|
|
struct sk_buff *skb_recv_datagram(struct sock *sk, unsigned flags, int noblock,
|
|
|
|
int *err);
|
|
|
|
unsigned int datagram_poll(struct file *file, struct socket *sock,
|
|
|
|
struct poll_table_struct *wait);
|
2014-11-24 23:42:55 +08:00
|
|
|
int skb_copy_datagram_iter(const struct sk_buff *from, int offset,
|
|
|
|
struct iov_iter *to, int size);
|
2014-11-06 05:46:40 +08:00
|
|
|
static inline int skb_copy_datagram_msg(const struct sk_buff *from, int offset,
|
|
|
|
struct msghdr *msg, int size)
|
|
|
|
{
|
2014-11-25 07:17:55 +08:00
|
|
|
return skb_copy_datagram_iter(from, offset, &msg->msg_iter, size);
|
2014-04-07 06:47:38 +08:00
|
|
|
}
|
2014-11-25 07:17:55 +08:00
|
|
|
int skb_copy_and_csum_datagram_msg(struct sk_buff *skb, int hlen,
|
|
|
|
struct msghdr *msg);
|
2014-06-20 02:15:22 +08:00
|
|
|
int skb_copy_datagram_from_iter(struct sk_buff *skb, int offset,
|
|
|
|
struct iov_iter *from, int len);
|
|
|
|
int zerocopy_sg_from_iter(struct sk_buff *skb, struct iov_iter *frm);
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_free_datagram(struct sock *sk, struct sk_buff *skb);
|
2016-04-06 00:41:16 +08:00
|
|
|
void __skb_free_datagram_locked(struct sock *sk, struct sk_buff *skb, int len);
|
|
|
|
static inline void skb_free_datagram_locked(struct sock *sk,
|
|
|
|
struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
__skb_free_datagram_locked(sk, skb, 0);
|
|
|
|
}
|
2013-09-27 05:48:15 +08:00
|
|
|
int skb_kill_datagram(struct sock *sk, struct sk_buff *skb, unsigned int flags);
|
|
|
|
int skb_copy_bits(const struct sk_buff *skb, int offset, void *to, int len);
|
|
|
|
int skb_store_bits(struct sk_buff *skb, int offset, const void *from, int len);
|
|
|
|
__wsum skb_copy_and_csum_bits(const struct sk_buff *skb, int offset, u8 *to,
|
|
|
|
int len, __wsum csum);
|
2015-05-21 23:00:00 +08:00
|
|
|
int skb_splice_bits(struct sk_buff *skb, struct sock *sk, unsigned int offset,
|
2013-09-27 05:48:15 +08:00
|
|
|
struct pipe_inode_info *pipe, unsigned int len,
|
2016-09-18 09:02:10 +08:00
|
|
|
unsigned int flags);
|
2017-07-29 07:22:42 +08:00
|
|
|
int skb_send_sock_locked(struct sock *sk, struct sk_buff *skb, int offset,
|
|
|
|
int len);
|
|
|
|
int skb_send_sock(struct sock *sk, struct sk_buff *skb, int offset, int len);
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_copy_and_csum_dev(const struct sk_buff *skb, u8 *to);
|
2013-12-13 22:22:17 +08:00
|
|
|
unsigned int skb_zerocopy_headlen(const struct sk_buff *from);
|
2014-03-27 06:37:45 +08:00
|
|
|
int skb_zerocopy(struct sk_buff *to, struct sk_buff *from,
|
|
|
|
int len, int hlen);
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_split(struct sk_buff *skb, struct sk_buff *skb1, const u32 len);
|
|
|
|
int skb_shift(struct sk_buff *tgt, struct sk_buff *skb, int shiftlen);
|
|
|
|
void skb_scrub_packet(struct sk_buff *skb, bool xnet);
|
2014-01-26 17:58:16 +08:00
|
|
|
unsigned int skb_gso_transport_seglen(const struct sk_buff *skb);
|
2016-06-03 02:05:41 +08:00
|
|
|
bool skb_gso_validate_mtu(const struct sk_buff *skb, unsigned int mtu);
|
2013-09-27 05:48:15 +08:00
|
|
|
struct sk_buff *skb_segment(struct sk_buff *skb, netdev_features_t features);
|
net: Always untag vlan-tagged traffic on input.
Currently the functionality to untag traffic on input resides
as part of the vlan module and is build only when VLAN support
is enabled in the kernel. When VLAN is disabled, the function
vlan_untag() turns into a stub and doesn't really untag the
packets. This seems to create an interesting interaction
between VMs supporting checksum offloading and some network drivers.
There are some drivers that do not allow the user to change
tx-vlan-offload feature of the driver. These drivers also seem
to assume that any VLAN-tagged traffic they transmit will
have the vlan information in the vlan_tci and not in the vlan
header already in the skb. When transmitting skbs that already
have tagged data with partial checksum set, the checksum doesn't
appear to be updated correctly by the card thus resulting in a
failure to establish TCP connections.
The following is a packet trace taken on the receiver where a
sender is a VM with a VLAN configued. The host VM is running on
doest not have VLAN support and the outging interface on the
host is tg3:
10:12:43.503055 52:54:00:ae:42:3f > 28:d2:44:7d:c2:de, ethertype 802.1Q
(0x8100), length 78: vlan 100, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 27243,
offset 0, flags [DF], proto TCP (6), length 60)
10.0.100.1.58545 > 10.0.100.10.ircu-2: Flags [S], cksum 0xdc39 (incorrect
-> 0x48d9), seq 1069378582, win 29200, options [mss 1460,sackOK,TS val
4294837885 ecr 0,nop,wscale 7], length 0
10:12:44.505556 52:54:00:ae:42:3f > 28:d2:44:7d:c2:de, ethertype 802.1Q
(0x8100), length 78: vlan 100, p 0, ethertype IPv4, (tos 0x0, ttl 64, id 27244,
offset 0, flags [DF], proto TCP (6), length 60)
10.0.100.1.58545 > 10.0.100.10.ircu-2: Flags [S], cksum 0xdc39 (incorrect
-> 0x44ee), seq 1069378582, win 29200, options [mss 1460,sackOK,TS val
4294838888 ecr 0,nop,wscale 7], length 0
This connection finally times out.
I've only access to the TG3 hardware in this configuration thus have
only tested this with TG3 driver. There are a lot of other drivers
that do not permit user changes to vlan acceleration features, and
I don't know if they all suffere from a similar issue.
The patch attempt to fix this another way. It moves the vlan header
stipping code out of the vlan module and always builds it into the
kernel network core. This way, even if vlan is not supported on
a virtualizatoin host, the virtual machines running on top of such
host will still work with VLANs enabled.
CC: Patrick McHardy <kaber@trash.net>
CC: Nithin Nayak Sujir <nsujir@broadcom.com>
CC: Michael Chan <mchan@broadcom.com>
CC: Jiri Pirko <jiri@resnulli.us>
Signed-off-by: Vladislav Yasevich <vyasevic@redhat.com>
Acked-by: Jiri Pirko <jiri@resnulli.us>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-08-09 02:42:13 +08:00
|
|
|
struct sk_buff *skb_vlan_untag(struct sk_buff *skb);
|
2014-11-19 21:05:01 +08:00
|
|
|
int skb_ensure_writable(struct sk_buff *skb, int write_len);
|
2016-09-20 00:11:09 +08:00
|
|
|
int __skb_vlan_pop(struct sk_buff *skb, u16 *vlan_tci);
|
2014-11-19 21:05:02 +08:00
|
|
|
int skb_vlan_pop(struct sk_buff *skb);
|
|
|
|
int skb_vlan_push(struct sk_buff *skb, __be16 vlan_proto, u16 vlan_tci);
|
skbuff: Add pskb_extract() helper function
A pattern of skb usage seen in modules such as RDS-TCP is to
extract `to_copy' bytes from the received TCP segment, starting
at some offset `off' into a new skb `clone'. This is done in
the ->data_ready callback, where the clone skb is queued up for rx on
the PF_RDS socket, while the parent TCP segment is returned unchanged
back to the TCP engine.
The existing code uses the sequence
clone = skb_clone(..);
pskb_pull(clone, off, ..);
pskb_trim(clone, to_copy, ..);
with the intention of discarding the first `off' bytes. However,
skb_clone() + pskb_pull() implies pksb_expand_head(), which ends
up doing a redundant memcpy of bytes that will then get discarded
in __pskb_pull_tail().
To avoid this inefficiency, this commit adds pskb_extract() that
creates the clone, and memcpy's only the relevant header/frag/frag_list
to the start of `clone'. pskb_trim() is then invoked to trim clone
down to the requested to_copy bytes.
Signed-off-by: Sowmini Varadhan <sowmini.varadhan@oracle.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2016-04-23 09:36:35 +08:00
|
|
|
struct sk_buff *pskb_extract(struct sk_buff *skb, int off, int to_copy,
|
|
|
|
gfp_t gfp);
|
2005-08-16 13:18:02 +08:00
|
|
|
|
2014-04-07 09:25:44 +08:00
|
|
|
static inline int memcpy_from_msg(void *data, struct msghdr *msg, int len)
|
|
|
|
{
|
2017-02-18 12:13:25 +08:00
|
|
|
return copy_from_iter_full(data, len, &msg->msg_iter) ? 0 : -EFAULT;
|
2014-04-07 09:25:44 +08:00
|
|
|
}
|
|
|
|
|
2014-04-07 09:51:23 +08:00
|
|
|
static inline int memcpy_to_msg(struct msghdr *msg, void *data, int len)
|
|
|
|
{
|
2014-11-25 07:17:55 +08:00
|
|
|
return copy_to_iter(data, len, &msg->msg_iter) == len ? 0 : -EFAULT;
|
2014-04-07 09:51:23 +08:00
|
|
|
}
|
|
|
|
|
2013-10-30 18:50:51 +08:00
|
|
|
struct skb_checksum_ops {
|
|
|
|
__wsum (*update)(const void *mem, int len, __wsum wsum);
|
|
|
|
__wsum (*combine)(__wsum csum, __wsum csum2, int offset, int len);
|
|
|
|
};
|
|
|
|
|
2017-05-18 21:44:37 +08:00
|
|
|
extern const struct skb_checksum_ops *crc32c_csum_stub __read_mostly;
|
|
|
|
|
2013-10-30 18:50:51 +08:00
|
|
|
__wsum __skb_checksum(const struct sk_buff *skb, int offset, int len,
|
|
|
|
__wsum csum, const struct skb_checksum_ops *ops);
|
|
|
|
__wsum skb_checksum(const struct sk_buff *skb, int offset, int len,
|
|
|
|
__wsum csum);
|
|
|
|
|
2015-06-13 10:31:32 +08:00
|
|
|
static inline void * __must_check
|
|
|
|
__skb_header_pointer(const struct sk_buff *skb, int offset,
|
|
|
|
int len, void *data, int hlen, void *buffer)
|
2005-04-17 06:20:36 +08:00
|
|
|
{
|
2005-07-06 05:08:10 +08:00
|
|
|
if (hlen - offset >= len)
|
2014-08-24 03:13:41 +08:00
|
|
|
return data + offset;
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2014-08-24 03:13:41 +08:00
|
|
|
if (!skb ||
|
|
|
|
skb_copy_bits(skb, offset, buffer, len) < 0)
|
2005-04-17 06:20:36 +08:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
return buffer;
|
|
|
|
}
|
|
|
|
|
2015-06-13 10:31:32 +08:00
|
|
|
static inline void * __must_check
|
|
|
|
skb_header_pointer(const struct sk_buff *skb, int offset, int len, void *buffer)
|
2014-08-24 03:13:41 +08:00
|
|
|
{
|
|
|
|
return __skb_header_pointer(skb, offset, len, skb->data,
|
|
|
|
skb_headlen(skb), buffer);
|
|
|
|
}
|
|
|
|
|
2013-12-06 18:36:16 +08:00
|
|
|
/**
|
|
|
|
* skb_needs_linearize - check if we need to linearize a given skb
|
|
|
|
* depending on the given device features.
|
|
|
|
* @skb: socket buffer to check
|
|
|
|
* @features: net device features
|
|
|
|
*
|
|
|
|
* Returns true if either:
|
|
|
|
* 1. skb has frag_list and the device doesn't support FRAGLIST, or
|
|
|
|
* 2. skb is fragmented and the device does not support SG.
|
|
|
|
*/
|
|
|
|
static inline bool skb_needs_linearize(struct sk_buff *skb,
|
|
|
|
netdev_features_t features)
|
|
|
|
{
|
|
|
|
return skb_is_nonlinear(skb) &&
|
|
|
|
((skb_has_frag_list(skb) && !(features & NETIF_F_FRAGLIST)) ||
|
|
|
|
(skb_shinfo(skb)->nr_frags && !(features & NETIF_F_SG)));
|
|
|
|
}
|
|
|
|
|
2007-03-28 05:55:52 +08:00
|
|
|
static inline void skb_copy_from_linear_data(const struct sk_buff *skb,
|
|
|
|
void *to,
|
|
|
|
const unsigned int len)
|
|
|
|
{
|
|
|
|
memcpy(to, skb->data, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_copy_from_linear_data_offset(const struct sk_buff *skb,
|
|
|
|
const int offset, void *to,
|
|
|
|
const unsigned int len)
|
|
|
|
{
|
|
|
|
memcpy(to, skb->data + offset, len);
|
|
|
|
}
|
|
|
|
|
2007-03-31 22:55:19 +08:00
|
|
|
static inline void skb_copy_to_linear_data(struct sk_buff *skb,
|
|
|
|
const void *from,
|
|
|
|
const unsigned int len)
|
|
|
|
{
|
|
|
|
memcpy(skb->data, from, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_copy_to_linear_data_offset(struct sk_buff *skb,
|
|
|
|
const int offset,
|
|
|
|
const void *from,
|
|
|
|
const unsigned int len)
|
|
|
|
{
|
|
|
|
memcpy(skb->data + offset, from, len);
|
|
|
|
}
|
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_init(void);
|
2005-04-17 06:20:36 +08:00
|
|
|
|
2009-02-12 13:03:37 +08:00
|
|
|
static inline ktime_t skb_get_ktime(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->tstamp;
|
|
|
|
}
|
|
|
|
|
2005-08-15 08:24:31 +08:00
|
|
|
/**
|
|
|
|
* skb_get_timestamp - get timestamp from a skb
|
|
|
|
* @skb: skb to get stamp from
|
|
|
|
* @stamp: pointer to struct timeval to store stamp in
|
|
|
|
*
|
|
|
|
* Timestamps are stored in the skb as offsets to a base timestamp.
|
|
|
|
* This function converts the offset back to a struct timeval and stores
|
|
|
|
* it in stamp.
|
|
|
|
*/
|
2009-02-12 13:03:37 +08:00
|
|
|
static inline void skb_get_timestamp(const struct sk_buff *skb,
|
|
|
|
struct timeval *stamp)
|
2005-08-15 08:24:31 +08:00
|
|
|
{
|
2007-04-20 07:16:32 +08:00
|
|
|
*stamp = ktime_to_timeval(skb->tstamp);
|
2005-08-15 08:24:31 +08:00
|
|
|
}
|
|
|
|
|
2009-02-12 13:03:37 +08:00
|
|
|
static inline void skb_get_timestampns(const struct sk_buff *skb,
|
|
|
|
struct timespec *stamp)
|
|
|
|
{
|
|
|
|
*stamp = ktime_to_timespec(skb->tstamp);
|
|
|
|
}
|
|
|
|
|
2007-04-20 07:16:32 +08:00
|
|
|
static inline void __net_timestamp(struct sk_buff *skb)
|
2005-08-15 08:24:31 +08:00
|
|
|
{
|
2007-04-20 07:16:32 +08:00
|
|
|
skb->tstamp = ktime_get_real();
|
2005-08-15 08:24:31 +08:00
|
|
|
}
|
|
|
|
|
2007-04-24 13:26:16 +08:00
|
|
|
static inline ktime_t net_timedelta(ktime_t t)
|
|
|
|
{
|
|
|
|
return ktime_sub(ktime_get_real(), t);
|
|
|
|
}
|
|
|
|
|
2007-06-16 06:08:43 +08:00
|
|
|
static inline ktime_t net_invalid_timestamp(void)
|
|
|
|
{
|
2016-12-25 19:30:41 +08:00
|
|
|
return 0;
|
2007-06-16 06:08:43 +08:00
|
|
|
}
|
2005-08-15 08:24:31 +08:00
|
|
|
|
bpf: add meta pointer for direct access
This work enables generic transfer of metadata from XDP into skb. The
basic idea is that we can make use of the fact that the resulting skb
must be linear and already comes with a larger headroom for supporting
bpf_xdp_adjust_head(), which mangles xdp->data. Here, we base our work
on a similar principle and introduce a small helper bpf_xdp_adjust_meta()
for adjusting a new pointer called xdp->data_meta. Thus, the packet has
a flexible and programmable room for meta data, followed by the actual
packet data. struct xdp_buff is therefore laid out that we first point
to data_hard_start, then data_meta directly prepended to data followed
by data_end marking the end of packet. bpf_xdp_adjust_head() takes into
account whether we have meta data already prepended and if so, memmove()s
this along with the given offset provided there's enough room.
xdp->data_meta is optional and programs are not required to use it. The
rationale is that when we process the packet in XDP (e.g. as DoS filter),
we can push further meta data along with it for the XDP_PASS case, and
give the guarantee that a clsact ingress BPF program on the same device
can pick this up for further post-processing. Since we work with skb
there, we can also set skb->mark, skb->priority or other skb meta data
out of BPF, thus having this scratch space generic and programmable
allows for more flexibility than defining a direct 1:1 transfer of
potentially new XDP members into skb (it's also more efficient as we
don't need to initialize/handle each of such new members). The facility
also works together with GRO aggregation. The scratch space at the head
of the packet can be multiple of 4 byte up to 32 byte large. Drivers not
yet supporting xdp->data_meta can simply be set up with xdp->data_meta
as xdp->data + 1 as bpf_xdp_adjust_meta() will detect this and bail out,
such that the subsequent match against xdp->data for later access is
guaranteed to fail.
The verifier treats xdp->data_meta/xdp->data the same way as we treat
xdp->data/xdp->data_end pointer comparisons. The requirement for doing
the compare against xdp->data is that it hasn't been modified from it's
original address we got from ctx access. It may have a range marking
already from prior successful xdp->data/xdp->data_end pointer comparisons
though.
Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
Acked-by: Alexei Starovoitov <ast@kernel.org>
Acked-by: John Fastabend <john.fastabend@gmail.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2017-09-25 08:25:51 +08:00
|
|
|
static inline u8 skb_metadata_len(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb_shinfo(skb)->meta_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void *skb_metadata_end(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb_mac_header(skb);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool __skb_metadata_differs(const struct sk_buff *skb_a,
|
|
|
|
const struct sk_buff *skb_b,
|
|
|
|
u8 meta_len)
|
|
|
|
{
|
|
|
|
const void *a = skb_metadata_end(skb_a);
|
|
|
|
const void *b = skb_metadata_end(skb_b);
|
|
|
|
/* Using more efficient varaiant than plain call to memcmp(). */
|
|
|
|
#if defined(CONFIG_HAVE_EFFICIENT_UNALIGNED_ACCESS) && BITS_PER_LONG == 64
|
|
|
|
u64 diffs = 0;
|
|
|
|
|
|
|
|
switch (meta_len) {
|
|
|
|
#define __it(x, op) (x -= sizeof(u##op))
|
|
|
|
#define __it_diff(a, b, op) (*(u##op *)__it(a, op)) ^ (*(u##op *)__it(b, op))
|
|
|
|
case 32: diffs |= __it_diff(a, b, 64);
|
|
|
|
case 24: diffs |= __it_diff(a, b, 64);
|
|
|
|
case 16: diffs |= __it_diff(a, b, 64);
|
|
|
|
case 8: diffs |= __it_diff(a, b, 64);
|
|
|
|
break;
|
|
|
|
case 28: diffs |= __it_diff(a, b, 64);
|
|
|
|
case 20: diffs |= __it_diff(a, b, 64);
|
|
|
|
case 12: diffs |= __it_diff(a, b, 64);
|
|
|
|
case 4: diffs |= __it_diff(a, b, 32);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
return diffs;
|
|
|
|
#else
|
|
|
|
return memcmp(a - meta_len, b - meta_len, meta_len);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool skb_metadata_differs(const struct sk_buff *skb_a,
|
|
|
|
const struct sk_buff *skb_b)
|
|
|
|
{
|
|
|
|
u8 len_a = skb_metadata_len(skb_a);
|
|
|
|
u8 len_b = skb_metadata_len(skb_b);
|
|
|
|
|
|
|
|
if (!(len_a | len_b))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
return len_a != len_b ?
|
|
|
|
true : __skb_metadata_differs(skb_a, skb_b, len_a);
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_metadata_set(struct sk_buff *skb, u8 meta_len)
|
|
|
|
{
|
|
|
|
skb_shinfo(skb)->meta_len = meta_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_metadata_clear(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb_metadata_set(skb, 0);
|
|
|
|
}
|
|
|
|
|
2014-09-05 01:31:35 +08:00
|
|
|
struct sk_buff *skb_clone_sk(struct sk_buff *skb);
|
|
|
|
|
2010-07-17 16:49:36 +08:00
|
|
|
#ifdef CONFIG_NETWORK_PHY_TIMESTAMPING
|
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_clone_tx_timestamp(struct sk_buff *skb);
|
|
|
|
bool skb_defer_rx_timestamp(struct sk_buff *skb);
|
2010-07-17 16:49:36 +08:00
|
|
|
|
|
|
|
#else /* CONFIG_NETWORK_PHY_TIMESTAMPING */
|
|
|
|
|
|
|
|
static inline void skb_clone_tx_timestamp(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool skb_defer_rx_timestamp(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
#endif /* !CONFIG_NETWORK_PHY_TIMESTAMPING */
|
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_complete_tx_timestamp() - deliver cloned skb with tx timestamps
|
|
|
|
*
|
net: hold sock reference while processing tx timestamps
The pair of functions,
* skb_clone_tx_timestamp()
* skb_complete_tx_timestamp()
were designed to allow timestamping in PHY devices. The first
function, called during the MAC driver's hard_xmit method, identifies
PTP protocol packets, clones them, and gives them to the PHY device
driver. The PHY driver may hold onto the packet and deliver it at a
later time using the second function, which adds the packet to the
socket's error queue.
As pointed out by Johannes, nothing prevents the socket from
disappearing while the cloned packet is sitting in the PHY driver
awaiting a timestamp. This patch fixes the issue by taking a reference
on the socket for each such packet. In addition, the comments
regarding the usage of these function are expanded to highlight the
rule that PHY drivers must use skb_complete_tx_timestamp() to release
the packet, in order to release the socket reference, too.
These functions first appeared in v2.6.36.
Reported-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: Richard Cochran <richard.cochran@omicron.at>
Cc: <stable@vger.kernel.org>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Reviewed-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2011-10-21 08:49:15 +08:00
|
|
|
* PHY drivers may accept clones of transmitted packets for
|
|
|
|
* timestamping via their phy_driver.txtstamp method. These drivers
|
2015-08-08 00:32:21 +08:00
|
|
|
* must call this function to return the skb back to the stack with a
|
|
|
|
* timestamp.
|
net: hold sock reference while processing tx timestamps
The pair of functions,
* skb_clone_tx_timestamp()
* skb_complete_tx_timestamp()
were designed to allow timestamping in PHY devices. The first
function, called during the MAC driver's hard_xmit method, identifies
PTP protocol packets, clones them, and gives them to the PHY device
driver. The PHY driver may hold onto the packet and deliver it at a
later time using the second function, which adds the packet to the
socket's error queue.
As pointed out by Johannes, nothing prevents the socket from
disappearing while the cloned packet is sitting in the PHY driver
awaiting a timestamp. This patch fixes the issue by taking a reference
on the socket for each such packet. In addition, the comments
regarding the usage of these function are expanded to highlight the
rule that PHY drivers must use skb_complete_tx_timestamp() to release
the packet, in order to release the socket reference, too.
These functions first appeared in v2.6.36.
Reported-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: Richard Cochran <richard.cochran@omicron.at>
Cc: <stable@vger.kernel.org>
Signed-off-by: Eric Dumazet <eric.dumazet@gmail.com>
Reviewed-by: Johannes Berg <johannes@sipsolutions.net>
Signed-off-by: David S. Miller <davem@davemloft.net>
2011-10-21 08:49:15 +08:00
|
|
|
*
|
2010-07-17 16:49:36 +08:00
|
|
|
* @skb: clone of the the original outgoing packet
|
2015-08-08 00:32:21 +08:00
|
|
|
* @hwtstamps: hardware time stamps
|
2010-07-17 16:49:36 +08:00
|
|
|
*
|
|
|
|
*/
|
|
|
|
void skb_complete_tx_timestamp(struct sk_buff *skb,
|
|
|
|
struct skb_shared_hwtstamps *hwtstamps);
|
|
|
|
|
2014-08-05 10:11:48 +08:00
|
|
|
void __skb_tstamp_tx(struct sk_buff *orig_skb,
|
|
|
|
struct skb_shared_hwtstamps *hwtstamps,
|
|
|
|
struct sock *sk, int tstype);
|
|
|
|
|
2009-02-12 13:03:37 +08:00
|
|
|
/**
|
|
|
|
* skb_tstamp_tx - queue clone of skb with send time stamps
|
|
|
|
* @orig_skb: the original outgoing packet
|
|
|
|
* @hwtstamps: hardware time stamps, may be NULL if not available
|
|
|
|
*
|
|
|
|
* If the skb has a socket associated, then this function clones the
|
|
|
|
* skb (thus sharing the actual data and optional structures), stores
|
|
|
|
* the optional hardware time stamping information (if non NULL) or
|
|
|
|
* generates a software time stamp (otherwise), then queues the clone
|
|
|
|
* to the error queue of the socket. Errors are silently ignored.
|
|
|
|
*/
|
2013-09-27 05:48:15 +08:00
|
|
|
void skb_tstamp_tx(struct sk_buff *orig_skb,
|
|
|
|
struct skb_shared_hwtstamps *hwtstamps);
|
2009-02-12 13:03:37 +08:00
|
|
|
|
2010-07-17 16:48:28 +08:00
|
|
|
/**
|
|
|
|
* skb_tx_timestamp() - Driver hook for transmit timestamping
|
|
|
|
*
|
|
|
|
* Ethernet MAC Drivers should call this function in their hard_xmit()
|
2011-06-19 11:31:39 +08:00
|
|
|
* function immediately before giving the sk_buff to the MAC hardware.
|
2010-07-17 16:48:28 +08:00
|
|
|
*
|
2013-12-28 02:04:33 +08:00
|
|
|
* Specifically, one should make absolutely sure that this function is
|
|
|
|
* called before TX completion of this packet can trigger. Otherwise
|
|
|
|
* the packet could potentially already be freed.
|
|
|
|
*
|
2010-07-17 16:48:28 +08:00
|
|
|
* @skb: A socket buffer.
|
|
|
|
*/
|
|
|
|
static inline void skb_tx_timestamp(struct sk_buff *skb)
|
|
|
|
{
|
2010-07-17 16:49:36 +08:00
|
|
|
skb_clone_tx_timestamp(skb);
|
2017-05-19 23:52:40 +08:00
|
|
|
if (skb_shinfo(skb)->tx_flags & SKBTX_SW_TSTAMP)
|
|
|
|
skb_tstamp_tx(skb, NULL);
|
2010-07-17 16:48:28 +08:00
|
|
|
}
|
|
|
|
|
2011-11-09 17:15:42 +08:00
|
|
|
/**
|
|
|
|
* skb_complete_wifi_ack - deliver skb with wifi status
|
|
|
|
*
|
|
|
|
* @skb: the original outgoing packet
|
|
|
|
* @acked: ack status
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
void skb_complete_wifi_ack(struct sk_buff *skb, bool acked);
|
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
__sum16 __skb_checksum_complete_head(struct sk_buff *skb, int len);
|
|
|
|
__sum16 __skb_checksum_complete(struct sk_buff *skb);
|
2005-11-11 05:01:24 +08:00
|
|
|
|
2007-04-10 02:59:39 +08:00
|
|
|
static inline int skb_csum_unnecessary(const struct sk_buff *skb)
|
|
|
|
{
|
2015-02-11 08:30:28 +08:00
|
|
|
return ((skb->ip_summed == CHECKSUM_UNNECESSARY) ||
|
|
|
|
skb->csum_valid ||
|
|
|
|
(skb->ip_summed == CHECKSUM_PARTIAL &&
|
|
|
|
skb_checksum_start_offset(skb) >= 0));
|
2007-04-10 02:59:39 +08:00
|
|
|
}
|
|
|
|
|
2005-11-11 05:01:24 +08:00
|
|
|
/**
|
|
|
|
* skb_checksum_complete - Calculate checksum of an entire packet
|
|
|
|
* @skb: packet to process
|
|
|
|
*
|
|
|
|
* This function calculates the checksum over the entire packet plus
|
|
|
|
* the value of skb->csum. The latter can be used to supply the
|
|
|
|
* checksum of a pseudo header as used by TCP/UDP. It returns the
|
|
|
|
* checksum.
|
|
|
|
*
|
|
|
|
* For protocols that contain complete checksums such as ICMP/TCP/UDP,
|
|
|
|
* this function can be used to verify that checksum on received
|
|
|
|
* packets. In that case the function should return zero if the
|
|
|
|
* checksum is correct. In particular, this function will return zero
|
|
|
|
* if skb->ip_summed is CHECKSUM_UNNECESSARY which indicates that the
|
|
|
|
* hardware has already verified the correctness of the checksum.
|
|
|
|
*/
|
2007-07-16 04:00:11 +08:00
|
|
|
static inline __sum16 skb_checksum_complete(struct sk_buff *skb)
|
2005-11-11 05:01:24 +08:00
|
|
|
{
|
2007-04-10 02:59:39 +08:00
|
|
|
return skb_csum_unnecessary(skb) ?
|
|
|
|
0 : __skb_checksum_complete(skb);
|
2005-11-11 05:01:24 +08:00
|
|
|
}
|
|
|
|
|
2014-08-28 12:26:46 +08:00
|
|
|
static inline void __skb_decr_checksum_unnecessary(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
if (skb->ip_summed == CHECKSUM_UNNECESSARY) {
|
|
|
|
if (skb->csum_level == 0)
|
|
|
|
skb->ip_summed = CHECKSUM_NONE;
|
|
|
|
else
|
|
|
|
skb->csum_level--;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void __skb_incr_checksum_unnecessary(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
if (skb->ip_summed == CHECKSUM_UNNECESSARY) {
|
|
|
|
if (skb->csum_level < SKB_MAX_CSUM_LEVEL)
|
|
|
|
skb->csum_level++;
|
|
|
|
} else if (skb->ip_summed == CHECKSUM_NONE) {
|
|
|
|
skb->ip_summed = CHECKSUM_UNNECESSARY;
|
|
|
|
skb->csum_level = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-05-03 07:29:18 +08:00
|
|
|
/* Check if we need to perform checksum complete validation.
|
|
|
|
*
|
|
|
|
* Returns true if checksum complete is needed, false otherwise
|
|
|
|
* (either checksum is unnecessary or zero checksum is allowed).
|
|
|
|
*/
|
|
|
|
static inline bool __skb_checksum_validate_needed(struct sk_buff *skb,
|
|
|
|
bool zero_okay,
|
|
|
|
__sum16 check)
|
|
|
|
{
|
2014-06-11 09:54:13 +08:00
|
|
|
if (skb_csum_unnecessary(skb) || (zero_okay && !check)) {
|
|
|
|
skb->csum_valid = 1;
|
2014-08-28 12:26:46 +08:00
|
|
|
__skb_decr_checksum_unnecessary(skb);
|
2014-05-03 07:29:18 +08:00
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* For small packets <= CHECKSUM_BREAK peform checksum complete directly
|
|
|
|
* in checksum_init.
|
|
|
|
*/
|
|
|
|
#define CHECKSUM_BREAK 76
|
|
|
|
|
2015-04-21 05:10:04 +08:00
|
|
|
/* Unset checksum-complete
|
|
|
|
*
|
|
|
|
* Unset checksum complete can be done when packet is being modified
|
|
|
|
* (uncompressed for instance) and checksum-complete value is
|
|
|
|
* invalidated.
|
|
|
|
*/
|
|
|
|
static inline void skb_checksum_complete_unset(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
if (skb->ip_summed == CHECKSUM_COMPLETE)
|
|
|
|
skb->ip_summed = CHECKSUM_NONE;
|
|
|
|
}
|
|
|
|
|
2014-05-03 07:29:18 +08:00
|
|
|
/* Validate (init) checksum based on checksum complete.
|
|
|
|
*
|
|
|
|
* Return values:
|
|
|
|
* 0: checksum is validated or try to in skb_checksum_complete. In the latter
|
|
|
|
* case the ip_summed will not be CHECKSUM_UNNECESSARY and the pseudo
|
|
|
|
* checksum is stored in skb->csum for use in __skb_checksum_complete
|
|
|
|
* non-zero: value of invalid checksum
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
static inline __sum16 __skb_checksum_validate_complete(struct sk_buff *skb,
|
|
|
|
bool complete,
|
|
|
|
__wsum psum)
|
|
|
|
{
|
|
|
|
if (skb->ip_summed == CHECKSUM_COMPLETE) {
|
|
|
|
if (!csum_fold(csum_add(psum, skb->csum))) {
|
2014-06-11 09:54:13 +08:00
|
|
|
skb->csum_valid = 1;
|
2014-05-03 07:29:18 +08:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
skb->csum = psum;
|
|
|
|
|
2014-06-11 09:54:13 +08:00
|
|
|
if (complete || skb->len <= CHECKSUM_BREAK) {
|
|
|
|
__sum16 csum;
|
|
|
|
|
|
|
|
csum = __skb_checksum_complete(skb);
|
|
|
|
skb->csum_valid = !csum;
|
|
|
|
return csum;
|
|
|
|
}
|
2014-05-03 07:29:18 +08:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline __wsum null_compute_pseudo(struct sk_buff *skb, int proto)
|
|
|
|
{
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Perform checksum validate (init). Note that this is a macro since we only
|
|
|
|
* want to calculate the pseudo header which is an input function if necessary.
|
|
|
|
* First we try to validate without any computation (checksum unnecessary) and
|
|
|
|
* then calculate based on checksum complete calling the function to compute
|
|
|
|
* pseudo header.
|
|
|
|
*
|
|
|
|
* Return values:
|
|
|
|
* 0: checksum is validated or try to in skb_checksum_complete
|
|
|
|
* non-zero: value of invalid checksum
|
|
|
|
*/
|
|
|
|
#define __skb_checksum_validate(skb, proto, complete, \
|
|
|
|
zero_okay, check, compute_pseudo) \
|
|
|
|
({ \
|
|
|
|
__sum16 __ret = 0; \
|
2014-06-11 09:54:13 +08:00
|
|
|
skb->csum_valid = 0; \
|
2014-05-03 07:29:18 +08:00
|
|
|
if (__skb_checksum_validate_needed(skb, zero_okay, check)) \
|
|
|
|
__ret = __skb_checksum_validate_complete(skb, \
|
|
|
|
complete, compute_pseudo(skb, proto)); \
|
|
|
|
__ret; \
|
|
|
|
})
|
|
|
|
|
|
|
|
#define skb_checksum_init(skb, proto, compute_pseudo) \
|
|
|
|
__skb_checksum_validate(skb, proto, false, false, 0, compute_pseudo)
|
|
|
|
|
|
|
|
#define skb_checksum_init_zero_check(skb, proto, check, compute_pseudo) \
|
|
|
|
__skb_checksum_validate(skb, proto, false, true, check, compute_pseudo)
|
|
|
|
|
|
|
|
#define skb_checksum_validate(skb, proto, compute_pseudo) \
|
|
|
|
__skb_checksum_validate(skb, proto, true, false, 0, compute_pseudo)
|
|
|
|
|
|
|
|
#define skb_checksum_validate_zero_check(skb, proto, check, \
|
|
|
|
compute_pseudo) \
|
2015-02-07 01:54:19 +08:00
|
|
|
__skb_checksum_validate(skb, proto, true, true, check, compute_pseudo)
|
2014-05-03 07:29:18 +08:00
|
|
|
|
|
|
|
#define skb_checksum_simple_validate(skb) \
|
|
|
|
__skb_checksum_validate(skb, 0, true, false, 0, null_compute_pseudo)
|
|
|
|
|
2014-09-01 06:12:42 +08:00
|
|
|
static inline bool __skb_checksum_convert_check(struct sk_buff *skb)
|
|
|
|
{
|
2017-05-18 21:44:39 +08:00
|
|
|
return (skb->ip_summed == CHECKSUM_NONE && skb->csum_valid);
|
2014-09-01 06:12:42 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static inline void __skb_checksum_convert(struct sk_buff *skb,
|
|
|
|
__sum16 check, __wsum pseudo)
|
|
|
|
{
|
|
|
|
skb->csum = ~pseudo;
|
|
|
|
skb->ip_summed = CHECKSUM_COMPLETE;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define skb_checksum_try_convert(skb, proto, check, compute_pseudo) \
|
|
|
|
do { \
|
|
|
|
if (__skb_checksum_convert_check(skb)) \
|
|
|
|
__skb_checksum_convert(skb, check, \
|
|
|
|
compute_pseudo(skb, proto)); \
|
|
|
|
} while (0)
|
|
|
|
|
2015-02-11 08:30:31 +08:00
|
|
|
static inline void skb_remcsum_adjust_partial(struct sk_buff *skb, void *ptr,
|
|
|
|
u16 start, u16 offset)
|
|
|
|
{
|
|
|
|
skb->ip_summed = CHECKSUM_PARTIAL;
|
|
|
|
skb->csum_start = ((unsigned char *)ptr + start) - skb->head;
|
|
|
|
skb->csum_offset = offset - start;
|
|
|
|
}
|
|
|
|
|
2015-02-03 08:07:34 +08:00
|
|
|
/* Update skbuf and packet to reflect the remote checksum offload operation.
|
|
|
|
* When called, ptr indicates the starting point for skb->csum when
|
|
|
|
* ip_summed is CHECKSUM_COMPLETE. If we need create checksum complete
|
|
|
|
* here, skb_postpull_rcsum is done so skb->csum start is ptr.
|
|
|
|
*/
|
|
|
|
static inline void skb_remcsum_process(struct sk_buff *skb, void *ptr,
|
2015-02-11 08:30:31 +08:00
|
|
|
int start, int offset, bool nopartial)
|
2015-02-03 08:07:34 +08:00
|
|
|
{
|
|
|
|
__wsum delta;
|
|
|
|
|
2015-02-11 08:30:31 +08:00
|
|
|
if (!nopartial) {
|
|
|
|
skb_remcsum_adjust_partial(skb, ptr, start, offset);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-02-03 08:07:34 +08:00
|
|
|
if (unlikely(skb->ip_summed != CHECKSUM_COMPLETE)) {
|
|
|
|
__skb_checksum_complete(skb);
|
|
|
|
skb_postpull_rcsum(skb, skb->data, ptr - (void *)skb->data);
|
|
|
|
}
|
|
|
|
|
|
|
|
delta = remcsum_adjust(ptr, skb->csum, start, offset);
|
|
|
|
|
|
|
|
/* Adjust skb->csum since we changed the packet */
|
|
|
|
skb->csum = csum_add(skb->csum, delta);
|
|
|
|
}
|
|
|
|
|
2017-01-24 01:21:56 +08:00
|
|
|
static inline struct nf_conntrack *skb_nfct(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
#if IS_ENABLED(CONFIG_NF_CONNTRACK)
|
2017-01-24 01:21:59 +08:00
|
|
|
return (void *)(skb->_nfct & SKB_NFCT_PTRMASK);
|
2017-01-24 01:21:56 +08:00
|
|
|
#else
|
|
|
|
return NULL;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2007-03-24 02:17:07 +08:00
|
|
|
#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
|
2013-09-27 05:48:15 +08:00
|
|
|
void nf_conntrack_destroy(struct nf_conntrack *nfct);
|
2005-04-17 06:20:36 +08:00
|
|
|
static inline void nf_conntrack_put(struct nf_conntrack *nfct)
|
|
|
|
{
|
|
|
|
if (nfct && atomic_dec_and_test(&nfct->use))
|
2007-03-24 02:17:27 +08:00
|
|
|
nf_conntrack_destroy(nfct);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
static inline void nf_conntrack_get(struct nf_conntrack *nfct)
|
|
|
|
{
|
|
|
|
if (nfct)
|
|
|
|
atomic_inc(&nfct->use);
|
|
|
|
}
|
2011-01-13 03:25:08 +08:00
|
|
|
#endif
|
2014-09-18 17:29:03 +08:00
|
|
|
#if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
|
2005-04-17 06:20:36 +08:00
|
|
|
static inline void nf_bridge_put(struct nf_bridge_info *nf_bridge)
|
|
|
|
{
|
2017-06-30 18:07:57 +08:00
|
|
|
if (nf_bridge && refcount_dec_and_test(&nf_bridge->use))
|
2005-04-17 06:20:36 +08:00
|
|
|
kfree(nf_bridge);
|
|
|
|
}
|
|
|
|
static inline void nf_bridge_get(struct nf_bridge_info *nf_bridge)
|
|
|
|
{
|
|
|
|
if (nf_bridge)
|
2017-06-30 18:07:57 +08:00
|
|
|
refcount_inc(&nf_bridge->use);
|
2005-04-17 06:20:36 +08:00
|
|
|
}
|
|
|
|
#endif /* CONFIG_BRIDGE_NETFILTER */
|
2006-03-21 11:23:05 +08:00
|
|
|
static inline void nf_reset(struct sk_buff *skb)
|
|
|
|
{
|
2007-03-24 02:17:07 +08:00
|
|
|
#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
|
2017-01-24 01:21:59 +08:00
|
|
|
nf_conntrack_put(skb_nfct(skb));
|
|
|
|
skb->_nfct = 0;
|
2011-01-13 03:25:08 +08:00
|
|
|
#endif
|
2014-09-18 17:29:03 +08:00
|
|
|
#if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
|
2006-03-21 11:23:05 +08:00
|
|
|
nf_bridge_put(skb->nf_bridge);
|
|
|
|
skb->nf_bridge = NULL;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2013-04-06 02:42:05 +08:00
|
|
|
static inline void nf_reset_trace(struct sk_buff *skb)
|
|
|
|
{
|
2014-02-16 06:48:45 +08:00
|
|
|
#if IS_ENABLED(CONFIG_NETFILTER_XT_TARGET_TRACE) || defined(CONFIG_NF_TABLES)
|
2013-03-22 03:48:41 +08:00
|
|
|
skb->nf_trace = 0;
|
|
|
|
#endif
|
2006-03-21 11:23:05 +08:00
|
|
|
}
|
|
|
|
|
2017-10-26 16:57:05 +08:00
|
|
|
static inline void ipvs_reset(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
#if IS_ENABLED(CONFIG_IP_VS)
|
|
|
|
skb->ipvs_property = 0;
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2007-03-15 07:43:37 +08:00
|
|
|
/* Note: This doesn't put any conntrack and bridge info in dst. */
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
static inline void __nf_copy(struct sk_buff *dst, const struct sk_buff *src,
|
|
|
|
bool copy)
|
2007-03-15 07:43:37 +08:00
|
|
|
{
|
2007-03-24 02:17:07 +08:00
|
|
|
#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
|
2017-01-24 01:21:59 +08:00
|
|
|
dst->_nfct = src->_nfct;
|
|
|
|
nf_conntrack_get(skb_nfct(src));
|
2011-01-13 03:25:08 +08:00
|
|
|
#endif
|
2014-09-18 17:29:03 +08:00
|
|
|
#if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
|
2007-03-15 07:43:37 +08:00
|
|
|
dst->nf_bridge = src->nf_bridge;
|
|
|
|
nf_bridge_get(src->nf_bridge);
|
|
|
|
#endif
|
2014-02-16 06:48:45 +08:00
|
|
|
#if IS_ENABLED(CONFIG_NETFILTER_XT_TARGET_TRACE) || defined(CONFIG_NF_TABLES)
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
if (copy)
|
|
|
|
dst->nf_trace = src->nf_trace;
|
2014-02-16 06:48:45 +08:00
|
|
|
#endif
|
2007-03-15 07:43:37 +08:00
|
|
|
}
|
|
|
|
|
2007-03-15 07:44:01 +08:00
|
|
|
static inline void nf_copy(struct sk_buff *dst, const struct sk_buff *src)
|
|
|
|
{
|
|
|
|
#if defined(CONFIG_NF_CONNTRACK) || defined(CONFIG_NF_CONNTRACK_MODULE)
|
2017-01-24 01:21:59 +08:00
|
|
|
nf_conntrack_put(skb_nfct(dst));
|
2011-01-13 03:25:08 +08:00
|
|
|
#endif
|
2014-09-18 17:29:03 +08:00
|
|
|
#if IS_ENABLED(CONFIG_BRIDGE_NETFILTER)
|
2007-03-15 07:44:01 +08:00
|
|
|
nf_bridge_put(dst->nf_bridge);
|
|
|
|
#endif
|
net: reorganize sk_buff for faster __copy_skb_header()
With proliferation of bit fields in sk_buff, __copy_skb_header() became
quite expensive, showing as the most expensive function in a GSO
workload.
__copy_skb_header() performance is also critical for non GSO TCP
operations, as it is used from skb_clone()
This patch carefully moves all the fields that were not copied in a
separate zone : cloned, nohdr, fclone, peeked, head_frag, xmit_more
Then I moved all other fields and all other copied fields in a section
delimited by headers_start[0]/headers_end[0] section so that we
can use a single memcpy() call, inlined by compiler using long
word load/stores.
I also tried to make all copies in the natural orders of sk_buff,
to help hardware prefetching.
I made sure sk_buff size did not change.
Signed-off-by: Eric Dumazet <edumazet@google.com>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-09-29 13:18:47 +08:00
|
|
|
__nf_copy(dst, src, true);
|
2007-03-15 07:44:01 +08:00
|
|
|
}
|
|
|
|
|
2006-06-09 15:29:17 +08:00
|
|
|
#ifdef CONFIG_NETWORK_SECMARK
|
|
|
|
static inline void skb_copy_secmark(struct sk_buff *to, const struct sk_buff *from)
|
|
|
|
{
|
|
|
|
to->secmark = from->secmark;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline void skb_init_secmark(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb->secmark = 0;
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
static inline void skb_copy_secmark(struct sk_buff *to, const struct sk_buff *from)
|
|
|
|
{ }
|
|
|
|
|
|
|
|
static inline void skb_init_secmark(struct sk_buff *skb)
|
|
|
|
{ }
|
|
|
|
#endif
|
|
|
|
|
2014-04-02 03:20:24 +08:00
|
|
|
static inline bool skb_irq_freeable(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return !skb->destructor &&
|
|
|
|
#if IS_ENABLED(CONFIG_XFRM)
|
|
|
|
!skb->sp &&
|
|
|
|
#endif
|
2017-01-24 01:21:56 +08:00
|
|
|
!skb_nfct(skb) &&
|
2014-04-02 03:20:24 +08:00
|
|
|
!skb->_skb_refdst &&
|
|
|
|
!skb_has_frag_list(skb);
|
|
|
|
}
|
|
|
|
|
2007-07-07 04:36:20 +08:00
|
|
|
static inline void skb_set_queue_mapping(struct sk_buff *skb, u16 queue_mapping)
|
|
|
|
{
|
|
|
|
skb->queue_mapping = queue_mapping;
|
|
|
|
}
|
|
|
|
|
2009-03-22 04:39:26 +08:00
|
|
|
static inline u16 skb_get_queue_mapping(const struct sk_buff *skb)
|
2007-10-22 08:01:29 +08:00
|
|
|
{
|
|
|
|
return skb->queue_mapping;
|
|
|
|
}
|
|
|
|
|
2007-07-07 04:36:20 +08:00
|
|
|
static inline void skb_copy_queue_mapping(struct sk_buff *to, const struct sk_buff *from)
|
|
|
|
{
|
|
|
|
to->queue_mapping = from->queue_mapping;
|
|
|
|
}
|
|
|
|
|
2009-01-28 08:22:11 +08:00
|
|
|
static inline void skb_record_rx_queue(struct sk_buff *skb, u16 rx_queue)
|
|
|
|
{
|
|
|
|
skb->queue_mapping = rx_queue + 1;
|
|
|
|
}
|
|
|
|
|
2009-03-22 04:39:26 +08:00
|
|
|
static inline u16 skb_get_rx_queue(const struct sk_buff *skb)
|
2009-01-28 08:22:11 +08:00
|
|
|
{
|
|
|
|
return skb->queue_mapping - 1;
|
|
|
|
}
|
|
|
|
|
2009-03-22 04:39:26 +08:00
|
|
|
static inline bool skb_rx_queue_recorded(const struct sk_buff *skb)
|
2009-01-28 08:22:11 +08:00
|
|
|
{
|
2010-09-23 04:43:57 +08:00
|
|
|
return skb->queue_mapping != 0;
|
2009-01-28 08:22:11 +08:00
|
|
|
}
|
|
|
|
|
2017-02-07 05:14:12 +08:00
|
|
|
static inline void skb_set_dst_pending_confirm(struct sk_buff *skb, u32 val)
|
|
|
|
{
|
|
|
|
skb->dst_pending_confirm = val;
|
|
|
|
}
|
|
|
|
|
|
|
|
static inline bool skb_get_dst_pending_confirm(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return skb->dst_pending_confirm != 0;
|
|
|
|
}
|
|
|
|
|
2008-10-29 04:24:06 +08:00
|
|
|
static inline struct sec_path *skb_sec_path(struct sk_buff *skb)
|
|
|
|
{
|
2013-10-02 09:58:32 +08:00
|
|
|
#ifdef CONFIG_XFRM
|
2008-10-29 04:24:06 +08:00
|
|
|
return skb->sp;
|
|
|
|
#else
|
|
|
|
return NULL;
|
|
|
|
#endif
|
2013-10-02 09:58:32 +08:00
|
|
|
}
|
2008-10-29 04:24:06 +08:00
|
|
|
|
2013-02-14 22:02:41 +08:00
|
|
|
/* Keeps track of mac header offset relative to skb->head.
|
|
|
|
* It is useful for TSO of Tunneling protocol. e.g. GRE.
|
|
|
|
* For non-tunnel skb it points to skb_mac_header() and for
|
2013-10-20 02:42:56 +08:00
|
|
|
* tunnel skb it points to outer mac header.
|
|
|
|
* Keeps track of level of encapsulation of network headers.
|
|
|
|
*/
|
2013-02-14 22:02:41 +08:00
|
|
|
struct skb_gso_cb {
|
2016-04-11 09:45:03 +08:00
|
|
|
union {
|
|
|
|
int mac_offset;
|
|
|
|
int data_offset;
|
|
|
|
};
|
2013-10-20 02:42:56 +08:00
|
|
|
int encap_level;
|
2016-02-06 07:27:37 +08:00
|
|
|
__wsum csum;
|
2014-06-05 08:20:02 +08:00
|
|
|
__u16 csum_start;
|
2013-02-14 22:02:41 +08:00
|
|
|
};
|
2016-01-08 20:21:46 +08:00
|
|
|
#define SKB_SGO_CB_OFFSET 32
|
|
|
|
#define SKB_GSO_CB(skb) ((struct skb_gso_cb *)((skb)->cb + SKB_SGO_CB_OFFSET))
|
2013-02-14 22:02:41 +08:00
|
|
|
|
|
|
|
static inline int skb_tnl_header_len(const struct sk_buff *inner_skb)
|
|
|
|
{
|
|
|
|
return (skb_mac_header(inner_skb) - inner_skb->head) -
|
|
|
|
SKB_GSO_CB(inner_skb)->mac_offset;
|
|
|
|
}
|
|
|
|
|
2013-05-30 14:45:27 +08:00
|
|
|
static inline int gso_pskb_expand_head(struct sk_buff *skb, int extra)
|
|
|
|
{
|
|
|
|
int new_headroom, headroom;
|
|
|
|
int ret;
|
|
|
|
|
|
|
|
headroom = skb_headroom(skb);
|
|
|
|
ret = pskb_expand_head(skb, extra, 0, GFP_ATOMIC);
|
|
|
|
if (ret)
|
|
|
|
return ret;
|
|
|
|
|
|
|
|
new_headroom = skb_headroom(skb);
|
|
|
|
SKB_GSO_CB(skb)->mac_offset += (new_headroom - headroom);
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2016-02-06 07:27:49 +08:00
|
|
|
static inline void gso_reset_checksum(struct sk_buff *skb, __wsum res)
|
|
|
|
{
|
|
|
|
/* Do not update partial checksums if remote checksum is enabled. */
|
|
|
|
if (skb->remcsum_offload)
|
|
|
|
return;
|
|
|
|
|
|
|
|
SKB_GSO_CB(skb)->csum = res;
|
|
|
|
SKB_GSO_CB(skb)->csum_start = skb_checksum_start(skb) - skb->head;
|
|
|
|
}
|
|
|
|
|
2014-06-05 08:20:02 +08:00
|
|
|
/* Compute the checksum for a gso segment. First compute the checksum value
|
|
|
|
* from the start of transport header to SKB_GSO_CB(skb)->csum_start, and
|
|
|
|
* then add in skb->csum (checksum from csum_start to end of packet).
|
|
|
|
* skb->csum and csum_start are then updated to reflect the checksum of the
|
|
|
|
* resultant packet starting from the transport header-- the resultant checksum
|
|
|
|
* is in the res argument (i.e. normally zero or ~ of checksum of a pseudo
|
|
|
|
* header.
|
|
|
|
*/
|
|
|
|
static inline __sum16 gso_make_checksum(struct sk_buff *skb, __wsum res)
|
|
|
|
{
|
2016-02-06 07:27:37 +08:00
|
|
|
unsigned char *csum_start = skb_transport_header(skb);
|
|
|
|
int plen = (skb->head + SKB_GSO_CB(skb)->csum_start) - csum_start;
|
|
|
|
__wsum partial = SKB_GSO_CB(skb)->csum;
|
2014-06-05 08:20:02 +08:00
|
|
|
|
2016-02-06 07:27:37 +08:00
|
|
|
SKB_GSO_CB(skb)->csum = res;
|
|
|
|
SKB_GSO_CB(skb)->csum_start = csum_start - skb->head;
|
2014-06-05 08:20:02 +08:00
|
|
|
|
2016-02-06 07:27:37 +08:00
|
|
|
return csum_fold(csum_partial(csum_start, plen, partial));
|
2014-06-05 08:20:02 +08:00
|
|
|
}
|
|
|
|
|
2012-03-08 09:53:36 +08:00
|
|
|
static inline bool skb_is_gso(const struct sk_buff *skb)
|
2006-07-09 04:34:32 +08:00
|
|
|
{
|
|
|
|
return skb_shinfo(skb)->gso_size;
|
|
|
|
}
|
|
|
|
|
2013-09-29 16:21:32 +08:00
|
|
|
/* Note: Should be called only if skb_is_gso(skb) is true */
|
2012-03-08 09:53:36 +08:00
|
|
|
static inline bool skb_is_gso_v6(const struct sk_buff *skb)
|
2007-10-13 18:33:32 +08:00
|
|
|
{
|
|
|
|
return skb_shinfo(skb)->gso_type & SKB_GSO_TCPV6;
|
|
|
|
}
|
|
|
|
|
2016-08-18 07:00:39 +08:00
|
|
|
static inline void skb_gso_reset(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
skb_shinfo(skb)->gso_size = 0;
|
|
|
|
skb_shinfo(skb)->gso_segs = 0;
|
|
|
|
skb_shinfo(skb)->gso_type = 0;
|
|
|
|
}
|
|
|
|
|
2013-09-27 05:48:15 +08:00
|
|
|
void __skb_warn_lro_forwarding(const struct sk_buff *skb);
|
2008-06-20 07:22:28 +08:00
|
|
|
|
|
|
|
static inline bool skb_warn_if_lro(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
/* LRO sets gso_size but not gso_type, whereas if GSO is really
|
|
|
|
* wanted then gso_type will be set. */
|
2011-10-21 05:45:43 +08:00
|
|
|
const struct skb_shared_info *shinfo = skb_shinfo(skb);
|
|
|
|
|
2010-06-02 20:24:37 +08:00
|
|
|
if (skb_is_nonlinear(skb) && shinfo->gso_size != 0 &&
|
|
|
|
unlikely(shinfo->gso_type == 0)) {
|
2008-06-20 07:22:28 +08:00
|
|
|
__skb_warn_lro_forwarding(skb);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
2007-03-27 14:22:20 +08:00
|
|
|
static inline void skb_forward_csum(struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
/* Unfortunately we don't support this one. Any brave souls? */
|
|
|
|
if (skb->ip_summed == CHECKSUM_COMPLETE)
|
|
|
|
skb->ip_summed = CHECKSUM_NONE;
|
|
|
|
}
|
|
|
|
|
2010-09-03 04:07:41 +08:00
|
|
|
/**
|
|
|
|
* skb_checksum_none_assert - make sure skb ip_summed is CHECKSUM_NONE
|
|
|
|
* @skb: skb to check
|
|
|
|
*
|
|
|
|
* fresh skbs have their ip_summed set to CHECKSUM_NONE.
|
|
|
|
* Instead of forcing ip_summed to CHECKSUM_NONE, we can
|
|
|
|
* use this helper, to document places where we make this assertion.
|
|
|
|
*/
|
2011-10-21 05:45:43 +08:00
|
|
|
static inline void skb_checksum_none_assert(const struct sk_buff *skb)
|
2010-09-03 04:07:41 +08:00
|
|
|
{
|
|
|
|
#ifdef DEBUG
|
|
|
|
BUG_ON(skb->ip_summed != CHECKSUM_NONE);
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
2008-02-05 12:49:54 +08:00
|
|
|
bool skb_partial_csum_set(struct sk_buff *skb, u16 start, u16 off);
|
2011-07-06 20:22:12 +08:00
|
|
|
|
2014-01-09 18:02:46 +08:00
|
|
|
int skb_checksum_setup(struct sk_buff *skb, bool recalculate);
|
2015-05-02 20:01:07 +08:00
|
|
|
struct sk_buff *skb_checksum_trimmed(struct sk_buff *skb,
|
|
|
|
unsigned int transport_len,
|
|
|
|
__sum16(*skb_chkf)(struct sk_buff *skb));
|
2014-01-09 18:02:46 +08:00
|
|
|
|
2012-05-03 09:09:42 +08:00
|
|
|
/**
|
|
|
|
* skb_head_is_locked - Determine if the skb->head is locked down
|
|
|
|
* @skb: skb to check
|
|
|
|
*
|
|
|
|
* The head on skbs build around a head frag can be removed if they are
|
|
|
|
* not cloned. This function returns true if the skb head is locked down
|
|
|
|
* due to either being allocated via kmalloc, or by being a clone with
|
|
|
|
* multiple references to the head.
|
|
|
|
*/
|
|
|
|
static inline bool skb_head_is_locked(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
return !skb->head_frag || skb_cloned(skb);
|
|
|
|
}
|
net: ip, ipv6: handle gso skbs in forwarding path
Marcelo Ricardo Leitner reported problems when the forwarding link path
has a lower mtu than the incoming one if the inbound interface supports GRO.
Given:
Host <mtu1500> R1 <mtu1200> R2
Host sends tcp stream which is routed via R1 and R2. R1 performs GRO.
In this case, the kernel will fail to send ICMP fragmentation needed
messages (or pkt too big for ipv6), as GSO packets currently bypass dstmtu
checks in forward path. Instead, Linux tries to send out packets exceeding
the mtu.
When locking route MTU on Host (i.e., no ipv4 DF bit set), R1 does
not fragment the packets when forwarding, and again tries to send out
packets exceeding R1-R2 link mtu.
This alters the forwarding dstmtu checks to take the individual gso
segment lengths into account.
For ipv6, we send out pkt too big error for gso if the individual
segments are too big.
For ipv4, we either send icmp fragmentation needed, or, if the DF bit
is not set, perform software segmentation and let the output path
create fragments when the packet is leaving the machine.
It is not 100% correct as the error message will contain the headers of
the GRO skb instead of the original/segmented one, but it seems to
work fine in my (limited) tests.
Eric Dumazet suggested to simply shrink mss via ->gso_size to avoid
sofware segmentation.
However it turns out that skb_segment() assumes skb nr_frags is related
to mss size so we would BUG there. I don't want to mess with it considering
Herbert and Eric disagree on what the correct behavior should be.
Hannes Frederic Sowa notes that when we would shrink gso_size
skb_segment would then also need to deal with the case where
SKB_MAX_FRAGS would be exceeded.
This uses sofware segmentation in the forward path when we hit ipv4
non-DF packets and the outgoing link mtu is too small. Its not perfect,
but given the lack of bug reports wrt. GRO fwd being broken this is a
rare case anyway. Also its not like this could not be improved later
once the dust settles.
Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
Reported-by: Marcelo Ricardo Leitner <mleitner@redhat.com>
Signed-off-by: Florian Westphal <fw@strlen.de>
Signed-off-by: David S. Miller <davem@davemloft.net>
2014-02-14 06:09:12 +08:00
|
|
|
|
|
|
|
/**
|
|
|
|
* skb_gso_network_seglen - Return length of individual segments of a gso packet
|
|
|
|
*
|
|
|
|
* @skb: GSO skb
|
|
|
|
*
|
|
|
|
* skb_gso_network_seglen is used to determine the real size of the
|
|
|
|
* individual segments, including Layer3 (IP, IPv6) and L4 headers (TCP/UDP).
|
|
|
|
*
|
|
|
|
* The MAC/L2 header is not accounted for.
|
|
|
|
*/
|
|
|
|
static inline unsigned int skb_gso_network_seglen(const struct sk_buff *skb)
|
|
|
|
{
|
|
|
|
unsigned int hdr_len = skb_transport_header(skb) -
|
|
|
|
skb_network_header(skb);
|
|
|
|
return hdr_len + skb_gso_transport_seglen(skb);
|
|
|
|
}
|
2015-07-21 16:43:58 +08:00
|
|
|
|
2016-02-12 04:48:04 +08:00
|
|
|
/* Local Checksum Offload.
|
|
|
|
* Compute outer checksum based on the assumption that the
|
|
|
|
* inner checksum will be offloaded later.
|
2016-02-12 05:03:37 +08:00
|
|
|
* See Documentation/networking/checksum-offloads.txt for
|
|
|
|
* explanation of how this works.
|
2016-02-12 04:48:04 +08:00
|
|
|
* Fill in outer checksum adjustment (e.g. with sum of outer
|
|
|
|
* pseudo-header) before calling.
|
|
|
|
* Also ensure that inner checksum is in linear data area.
|
|
|
|
*/
|
|
|
|
static inline __wsum lco_csum(struct sk_buff *skb)
|
|
|
|
{
|
2016-02-18 03:23:55 +08:00
|
|
|
unsigned char *csum_start = skb_checksum_start(skb);
|
|
|
|
unsigned char *l4_hdr = skb_transport_header(skb);
|
|
|
|
__wsum partial;
|
2016-02-12 04:48:04 +08:00
|
|
|
|
|
|
|
/* Start with complement of inner checksum adjustment */
|
2016-02-18 03:23:55 +08:00
|
|
|
partial = ~csum_unfold(*(__force __sum16 *)(csum_start +
|
|
|
|
skb->csum_offset));
|
|
|
|
|
2016-02-12 04:48:04 +08:00
|
|
|
/* Add in checksum of our headers (incl. outer checksum
|
2016-02-18 03:23:55 +08:00
|
|
|
* adjustment filled in by caller) and return result.
|
2016-02-12 04:48:04 +08:00
|
|
|
*/
|
2016-02-18 03:23:55 +08:00
|
|
|
return csum_partial(l4_hdr, csum_start - l4_hdr, partial);
|
2016-02-12 04:48:04 +08:00
|
|
|
}
|
|
|
|
|
2005-04-17 06:20:36 +08:00
|
|
|
#endif /* __KERNEL__ */
|
|
|
|
#endif /* _LINUX_SKBUFF_H */
|