blob: 1121a9d5fed921abddd0d04cbef9b406b6b86ab5 [file] [log] [blame]
Thomas Gleixner2874c5f2019-05-27 08:55:01 +02001// SPDX-License-Identifier: GPL-2.0-or-later
Daniel Borkmannc50cd352013-07-01 19:24:00 +02002/*
3 * IPV4 GSO/GRO offload support
4 * Linux INET implementation
5 *
Daniel Borkmannc50cd352013-07-01 19:24:00 +02006 * GRE GSO support
7 */
8
9#include <linux/skbuff.h>
Paul Gortmakercf172282014-01-15 11:19:55 -050010#include <linux/init.h>
Daniel Borkmannc50cd352013-07-01 19:24:00 +020011#include <net/protocol.h>
12#include <net/gre.h>
13
Daniel Borkmannc50cd352013-07-01 19:24:00 +020014static struct sk_buff *gre_gso_segment(struct sk_buff *skb,
15 netdev_features_t features)
16{
Alexander Duyck2e598af2016-02-05 15:28:01 -080017 int tnl_hlen = skb_inner_mac_header(skb) - skb_transport_header(skb);
Xin Longefa1a652021-01-28 17:18:32 +080018 bool need_csum, offload_csum, gso_partial, need_ipsec;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020019 struct sk_buff *segs = ERR_PTR(-EINVAL);
Wei-Chun Chao7a7ffba2013-12-26 13:10:22 -080020 u16 mac_offset = skb->mac_header;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020021 __be16 protocol = skb->protocol;
Alexander Duyck2e598af2016-02-05 15:28:01 -080022 u16 mac_len = skb->mac_len;
23 int gre_offset, outer_hlen;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020024
Tom Herbert53e50392014-09-20 14:52:30 -070025 if (!skb->encapsulation)
26 goto out;
27
Alexander Duyck2e598af2016-02-05 15:28:01 -080028 if (unlikely(tnl_hlen < sizeof(struct gre_base_hdr)))
29 goto out;
30
31 if (unlikely(!pskb_may_pull(skb, tnl_hlen)))
Daniel Borkmannc50cd352013-07-01 19:24:00 +020032 goto out;
33
Daniel Borkmannc50cd352013-07-01 19:24:00 +020034 /* setup inner skb. */
Daniel Borkmannc50cd352013-07-01 19:24:00 +020035 skb->encapsulation = 0;
Alexander Duyck5197f342016-03-22 16:18:07 -070036 SKB_GSO_CB(skb)->encap_level = 0;
Alexander Duyck2e598af2016-02-05 15:28:01 -080037 __skb_pull(skb, tnl_hlen);
Daniel Borkmannc50cd352013-07-01 19:24:00 +020038 skb_reset_mac_header(skb);
39 skb_set_network_header(skb, skb_inner_network_offset(skb));
40 skb->mac_len = skb_inner_network_offset(skb);
Alexander Duyck38720352016-02-05 15:28:08 -080041 skb->protocol = skb->inner_protocol;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020042
Alexander Duyck2e598af2016-02-05 15:28:01 -080043 need_csum = !!(skb_shinfo(skb)->gso_type & SKB_GSO_GRE_CSUM);
44 skb->encap_hdr_csum = need_csum;
45
Alexander Duyckbef3c6c2016-02-05 15:27:31 -080046 features &= skb->dev->hw_enc_features;
Xin Long1a236762021-01-16 12:44:11 +080047 if (need_csum)
48 features &= ~NETIF_F_SCTP_CRC;
Alexander Duyckbef3c6c2016-02-05 15:27:31 -080049
Xin Longefa1a652021-01-28 17:18:32 +080050 need_ipsec = skb_dst(skb) && dst_xfrm(skb_dst(skb));
51 /* Try to offload checksum if possible */
52 offload_csum = !!(need_csum && !need_ipsec &&
53 (skb->dev->features & NETIF_F_HW_CSUM));
54
Daniel Borkmannc50cd352013-07-01 19:24:00 +020055 /* segment inner packet. */
Alexander Duyckbef3c6c2016-02-05 15:27:31 -080056 segs = skb_mac_gso_segment(skb, features);
Himangi Saraogi5a8dbf02014-07-27 12:36:51 +053057 if (IS_ERR_OR_NULL(segs)) {
Alexander Duyck2e598af2016-02-05 15:28:01 -080058 skb_gso_error_unwind(skb, protocol, tnl_hlen, mac_offset,
59 mac_len);
Daniel Borkmannc50cd352013-07-01 19:24:00 +020060 goto out;
Wei-Chun Chao7a7ffba2013-12-26 13:10:22 -080061 }
Daniel Borkmannc50cd352013-07-01 19:24:00 +020062
Steffen Klassert07b26c92016-09-19 12:58:47 +020063 gso_partial = !!(skb_shinfo(segs)->gso_type & SKB_GSO_PARTIAL);
64
Alexander Duyck2e598af2016-02-05 15:28:01 -080065 outer_hlen = skb_tnl_header_len(skb);
66 gre_offset = outer_hlen - tnl_hlen;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020067 skb = segs;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020068 do {
Alexander Duyck38720352016-02-05 15:28:08 -080069 struct gre_base_hdr *greh;
Alexander Duyck802ab552016-04-10 21:45:03 -040070 __sum16 *pcsum;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020071
Alexander Duyck22463872016-02-24 16:46:21 -080072 /* Set up inner headers if we are offloading inner checksum */
73 if (skb->ip_summed == CHECKSUM_PARTIAL) {
74 skb_reset_inner_headers(skb);
75 skb->encapsulation = 1;
76 }
Alexander Duyckcdbaa0b2013-07-10 17:05:06 -070077
Daniel Borkmannc50cd352013-07-01 19:24:00 +020078 skb->mac_len = mac_len;
79 skb->protocol = protocol;
Alexander Duyck2e598af2016-02-05 15:28:01 -080080
81 __skb_push(skb, outer_hlen);
82 skb_reset_mac_header(skb);
83 skb_set_network_header(skb, mac_len);
84 skb_set_transport_header(skb, gre_offset);
85
86 if (!need_csum)
87 continue;
88
89 greh = (struct gre_base_hdr *)skb_transport_header(skb);
Alexander Duyck802ab552016-04-10 21:45:03 -040090 pcsum = (__sum16 *)(greh + 1);
Alexander Duyck2e598af2016-02-05 15:28:01 -080091
Alexey Kodanev3d0241d2017-10-06 19:02:35 +030092 if (gso_partial && skb_is_gso(skb)) {
Alexander Duyck802ab552016-04-10 21:45:03 -040093 unsigned int partial_adj;
94
95 /* Adjust checksum to account for the fact that
96 * the partial checksum is based on actual size
97 * whereas headers should be based on MSS size.
98 */
99 partial_adj = skb->len + skb_headroom(skb) -
100 SKB_GSO_CB(skb)->data_offset -
101 skb_shinfo(skb)->gso_size;
102 *pcsum = ~csum_fold((__force __wsum)htonl(partial_adj));
103 } else {
104 *pcsum = 0;
105 }
106
107 *(pcsum + 1) = 0;
Xin Longefa1a652021-01-28 17:18:32 +0800108 if (skb->encapsulation || !offload_csum) {
109 *pcsum = gso_make_checksum(skb, 0);
110 } else {
111 skb->ip_summed = CHECKSUM_PARTIAL;
112 skb->csum_start = skb_transport_header(skb) - skb->head;
113 skb->csum_offset = sizeof(*greh);
114 }
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200115 } while ((skb = skb->next));
116out:
117 return segs;
118}
119
David Millerd4546c22018-06-24 14:13:49 +0900120static struct sk_buff *gre_gro_receive(struct list_head *head,
121 struct sk_buff *skb)
Jerry Chubf5a7552014-01-07 10:23:19 -0800122{
David Millerd4546c22018-06-24 14:13:49 +0900123 struct sk_buff *pp = NULL;
Jerry Chubf5a7552014-01-07 10:23:19 -0800124 struct sk_buff *p;
125 const struct gre_base_hdr *greh;
126 unsigned int hlen, grehlen;
127 unsigned int off;
128 int flush = 1;
129 struct packet_offload *ptype;
130 __be16 type;
131
Jesse Grossfac8e0f2016-03-19 09:32:01 -0700132 if (NAPI_GRO_CB(skb)->encap_mark)
133 goto out;
134
135 NAPI_GRO_CB(skb)->encap_mark = 1;
136
Jerry Chubf5a7552014-01-07 10:23:19 -0800137 off = skb_gro_offset(skb);
138 hlen = off + sizeof(*greh);
139 greh = skb_gro_header_fast(skb, off);
140 if (skb_gro_header_hard(skb, hlen)) {
141 greh = skb_gro_header_slow(skb, hlen, off);
142 if (unlikely(!greh))
143 goto out;
144 }
145
146 /* Only support version 0 and K (key), C (csum) flags. Note that
147 * although the support for the S (seq#) flag can be added easily
148 * for GRO, this is problematic for GSO hence can not be enabled
149 * here because a GRO pkt may end up in the forwarding path, thus
150 * requiring GSO support to break it up correctly.
151 */
152 if ((greh->flags & ~(GRE_KEY|GRE_CSUM)) != 0)
153 goto out;
154
Alexander Duycka0ca1532016-04-05 09:13:39 -0700155 /* We can only support GRE_CSUM if we can track the location of
156 * the GRE header. In the case of FOU/GUE we cannot because the
157 * outer UDP header displaces the GRE header leaving us in a state
158 * of limbo.
159 */
160 if ((greh->flags & GRE_CSUM) && NAPI_GRO_CB(skb)->is_fou)
161 goto out;
162
Jerry Chubf5a7552014-01-07 10:23:19 -0800163 type = greh->protocol;
164
165 rcu_read_lock();
166 ptype = gro_find_receive_by_type(type);
Ian Morris51456b22015-04-03 09:17:26 +0100167 if (!ptype)
Jerry Chubf5a7552014-01-07 10:23:19 -0800168 goto out_unlock;
169
170 grehlen = GRE_HEADER_SECTION;
171
172 if (greh->flags & GRE_KEY)
173 grehlen += GRE_HEADER_SECTION;
174
175 if (greh->flags & GRE_CSUM)
176 grehlen += GRE_HEADER_SECTION;
177
178 hlen = off + grehlen;
179 if (skb_gro_header_hard(skb, hlen)) {
180 greh = skb_gro_header_slow(skb, hlen, off);
181 if (unlikely(!greh))
182 goto out_unlock;
183 }
Jerry Chubf5a7552014-01-07 10:23:19 -0800184
Tom Herbert758f75d2014-08-22 13:34:22 -0700185 /* Don't bother verifying checksum if we're going to flush anyway. */
Tom Herbert884d3382014-08-31 15:12:44 -0700186 if ((greh->flags & GRE_CSUM) && !NAPI_GRO_CB(skb)->flush) {
187 if (skb_gro_checksum_simple_validate(skb))
Jerry Chubf5a7552014-01-07 10:23:19 -0800188 goto out_unlock;
Tom Herbert758f75d2014-08-22 13:34:22 -0700189
Li RongQingb39c78b2020-01-03 11:51:00 +0800190 skb_gro_checksum_try_convert(skb, IPPROTO_GRE,
Tom Herbert884d3382014-08-31 15:12:44 -0700191 null_compute_pseudo);
192 }
193
David Millerd4546c22018-06-24 14:13:49 +0900194 list_for_each_entry(p, head, list) {
Jerry Chubf5a7552014-01-07 10:23:19 -0800195 const struct gre_base_hdr *greh2;
196
197 if (!NAPI_GRO_CB(p)->same_flow)
198 continue;
199
200 /* The following checks are needed to ensure only pkts
201 * from the same tunnel are considered for aggregation.
202 * The criteria for "the same tunnel" includes:
203 * 1) same version (we only support version 0 here)
204 * 2) same protocol (we only support ETH_P_IP for now)
205 * 3) same set of flags
206 * 4) same key if the key field is present.
207 */
208 greh2 = (struct gre_base_hdr *)(p->data + off);
209
210 if (greh2->flags != greh->flags ||
211 greh2->protocol != greh->protocol) {
212 NAPI_GRO_CB(p)->same_flow = 0;
213 continue;
214 }
215 if (greh->flags & GRE_KEY) {
216 /* compare keys */
217 if (*(__be32 *)(greh2+1) != *(__be32 *)(greh+1)) {
218 NAPI_GRO_CB(p)->same_flow = 0;
219 continue;
220 }
221 }
222 }
223
224 skb_gro_pull(skb, grehlen);
225
226 /* Adjusted NAPI_GRO_CB(skb)->csum after skb_gro_pull()*/
227 skb_gro_postpull_rcsum(skb, greh, grehlen);
228
Sabrina Dubrocafcd91dd2016-10-20 15:58:02 +0200229 pp = call_gro_receive(ptype->callbacks.gro_receive, head, skb);
Alexander Duyckc194cf92016-03-09 09:24:23 -0800230 flush = 0;
Jerry Chubf5a7552014-01-07 10:23:19 -0800231
232out_unlock:
233 rcu_read_unlock();
234out:
Sabrina Dubroca603d4cf2018-06-30 17:38:55 +0200235 skb_gro_flush_final(skb, pp, flush);
Jerry Chubf5a7552014-01-07 10:23:19 -0800236
237 return pp;
238}
239
Wei Yongjund10dbad2014-01-09 22:22:05 +0800240static int gre_gro_complete(struct sk_buff *skb, int nhoff)
Jerry Chubf5a7552014-01-07 10:23:19 -0800241{
242 struct gre_base_hdr *greh = (struct gre_base_hdr *)(skb->data + nhoff);
243 struct packet_offload *ptype;
244 unsigned int grehlen = sizeof(*greh);
245 int err = -ENOENT;
246 __be16 type;
247
Jerry Chuc3caf112014-07-14 15:54:46 -0700248 skb->encapsulation = 1;
249 skb_shinfo(skb)->gso_type = SKB_GSO_GRE;
250
Jerry Chubf5a7552014-01-07 10:23:19 -0800251 type = greh->protocol;
252 if (greh->flags & GRE_KEY)
253 grehlen += GRE_HEADER_SECTION;
254
255 if (greh->flags & GRE_CSUM)
256 grehlen += GRE_HEADER_SECTION;
257
258 rcu_read_lock();
259 ptype = gro_find_complete_by_type(type);
Ian Morris00db4122015-04-03 09:17:27 +0100260 if (ptype)
Jerry Chubf5a7552014-01-07 10:23:19 -0800261 err = ptype->callbacks.gro_complete(skb, nhoff + grehlen);
262
263 rcu_read_unlock();
Tom Herbert6fb2a752014-11-29 09:59:45 -0800264
265 skb_set_inner_mac_header(skb, nhoff + grehlen);
266
Jerry Chubf5a7552014-01-07 10:23:19 -0800267 return err;
268}
269
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200270static const struct net_offload gre_offload = {
271 .callbacks = {
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200272 .gso_segment = gre_gso_segment,
Jerry Chubf5a7552014-01-07 10:23:19 -0800273 .gro_receive = gre_gro_receive,
274 .gro_complete = gre_gro_complete,
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200275 },
276};
277
Eric Dumazet438e38f2014-01-06 14:03:07 -0800278static int __init gre_offload_init(void)
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200279{
Alexander Duycke0c20962016-04-14 15:33:58 -0400280 int err;
281
282 err = inet_add_offload(&gre_offload, IPPROTO_GRE);
283#if IS_ENABLED(CONFIG_IPV6)
284 if (err)
285 return err;
286
287 err = inet6_add_offload(&gre_offload, IPPROTO_GRE);
288 if (err)
289 inet_del_offload(&gre_offload, IPPROTO_GRE);
290#endif
291
292 return err;
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200293}
Paul Gortmakercf172282014-01-15 11:19:55 -0500294device_initcall(gre_offload_init);