blob: 07073fa35205ef80882c854c6a7b3eebe746f365 [file] [log] [blame]
Thomas Gleixner2874c5f2019-05-27 08:55:01 +02001// SPDX-License-Identifier: GPL-2.0-or-later
Daniel Borkmannc50cd352013-07-01 19:24:00 +02002/*
3 * IPV4 GSO/GRO offload support
4 * Linux INET implementation
5 *
Daniel Borkmannc50cd352013-07-01 19:24:00 +02006 * GRE GSO support
7 */
8
9#include <linux/skbuff.h>
Paul Gortmakercf172282014-01-15 11:19:55 -050010#include <linux/init.h>
Daniel Borkmannc50cd352013-07-01 19:24:00 +020011#include <net/protocol.h>
12#include <net/gre.h>
Eric Dumazet47210312021-11-15 09:05:51 -080013#include <net/gro.h>
Daniel Borkmannc50cd352013-07-01 19:24:00 +020014
Daniel Borkmannc50cd352013-07-01 19:24:00 +020015static struct sk_buff *gre_gso_segment(struct sk_buff *skb,
16 netdev_features_t features)
17{
Alexander Duyck2e598af2016-02-05 15:28:01 -080018 int tnl_hlen = skb_inner_mac_header(skb) - skb_transport_header(skb);
Xin Longefa1a652021-01-28 17:18:32 +080019 bool need_csum, offload_csum, gso_partial, need_ipsec;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020020 struct sk_buff *segs = ERR_PTR(-EINVAL);
Wei-Chun Chao7a7ffba2013-12-26 13:10:22 -080021 u16 mac_offset = skb->mac_header;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020022 __be16 protocol = skb->protocol;
Alexander Duyck2e598af2016-02-05 15:28:01 -080023 u16 mac_len = skb->mac_len;
24 int gre_offset, outer_hlen;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020025
Tom Herbert53e50392014-09-20 14:52:30 -070026 if (!skb->encapsulation)
27 goto out;
28
Alexander Duyck2e598af2016-02-05 15:28:01 -080029 if (unlikely(tnl_hlen < sizeof(struct gre_base_hdr)))
30 goto out;
31
32 if (unlikely(!pskb_may_pull(skb, tnl_hlen)))
Daniel Borkmannc50cd352013-07-01 19:24:00 +020033 goto out;
34
Daniel Borkmannc50cd352013-07-01 19:24:00 +020035 /* setup inner skb. */
Daniel Borkmannc50cd352013-07-01 19:24:00 +020036 skb->encapsulation = 0;
Alexander Duyck5197f342016-03-22 16:18:07 -070037 SKB_GSO_CB(skb)->encap_level = 0;
Alexander Duyck2e598af2016-02-05 15:28:01 -080038 __skb_pull(skb, tnl_hlen);
Daniel Borkmannc50cd352013-07-01 19:24:00 +020039 skb_reset_mac_header(skb);
40 skb_set_network_header(skb, skb_inner_network_offset(skb));
41 skb->mac_len = skb_inner_network_offset(skb);
Alexander Duyck38720352016-02-05 15:28:08 -080042 skb->protocol = skb->inner_protocol;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020043
Alexander Duyck2e598af2016-02-05 15:28:01 -080044 need_csum = !!(skb_shinfo(skb)->gso_type & SKB_GSO_GRE_CSUM);
45 skb->encap_hdr_csum = need_csum;
46
Alexander Duyckbef3c6c2016-02-05 15:27:31 -080047 features &= skb->dev->hw_enc_features;
Xin Long1a236762021-01-16 12:44:11 +080048 if (need_csum)
49 features &= ~NETIF_F_SCTP_CRC;
Alexander Duyckbef3c6c2016-02-05 15:27:31 -080050
Xin Longefa1a652021-01-28 17:18:32 +080051 need_ipsec = skb_dst(skb) && dst_xfrm(skb_dst(skb));
52 /* Try to offload checksum if possible */
53 offload_csum = !!(need_csum && !need_ipsec &&
54 (skb->dev->features & NETIF_F_HW_CSUM));
55
Daniel Borkmannc50cd352013-07-01 19:24:00 +020056 /* segment inner packet. */
Alexander Duyckbef3c6c2016-02-05 15:27:31 -080057 segs = skb_mac_gso_segment(skb, features);
Himangi Saraogi5a8dbf02014-07-27 12:36:51 +053058 if (IS_ERR_OR_NULL(segs)) {
Alexander Duyck2e598af2016-02-05 15:28:01 -080059 skb_gso_error_unwind(skb, protocol, tnl_hlen, mac_offset,
60 mac_len);
Daniel Borkmannc50cd352013-07-01 19:24:00 +020061 goto out;
Wei-Chun Chao7a7ffba2013-12-26 13:10:22 -080062 }
Daniel Borkmannc50cd352013-07-01 19:24:00 +020063
Steffen Klassert07b26c92016-09-19 12:58:47 +020064 gso_partial = !!(skb_shinfo(segs)->gso_type & SKB_GSO_PARTIAL);
65
Alexander Duyck2e598af2016-02-05 15:28:01 -080066 outer_hlen = skb_tnl_header_len(skb);
67 gre_offset = outer_hlen - tnl_hlen;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020068 skb = segs;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020069 do {
Alexander Duyck38720352016-02-05 15:28:08 -080070 struct gre_base_hdr *greh;
Alexander Duyck802ab552016-04-10 21:45:03 -040071 __sum16 *pcsum;
Daniel Borkmannc50cd352013-07-01 19:24:00 +020072
Alexander Duyck22463872016-02-24 16:46:21 -080073 /* Set up inner headers if we are offloading inner checksum */
74 if (skb->ip_summed == CHECKSUM_PARTIAL) {
75 skb_reset_inner_headers(skb);
76 skb->encapsulation = 1;
77 }
Alexander Duyckcdbaa0b2013-07-10 17:05:06 -070078
Daniel Borkmannc50cd352013-07-01 19:24:00 +020079 skb->mac_len = mac_len;
80 skb->protocol = protocol;
Alexander Duyck2e598af2016-02-05 15:28:01 -080081
82 __skb_push(skb, outer_hlen);
83 skb_reset_mac_header(skb);
84 skb_set_network_header(skb, mac_len);
85 skb_set_transport_header(skb, gre_offset);
86
87 if (!need_csum)
88 continue;
89
90 greh = (struct gre_base_hdr *)skb_transport_header(skb);
Alexander Duyck802ab552016-04-10 21:45:03 -040091 pcsum = (__sum16 *)(greh + 1);
Alexander Duyck2e598af2016-02-05 15:28:01 -080092
Alexey Kodanev3d0241d2017-10-06 19:02:35 +030093 if (gso_partial && skb_is_gso(skb)) {
Alexander Duyck802ab552016-04-10 21:45:03 -040094 unsigned int partial_adj;
95
96 /* Adjust checksum to account for the fact that
97 * the partial checksum is based on actual size
98 * whereas headers should be based on MSS size.
99 */
100 partial_adj = skb->len + skb_headroom(skb) -
101 SKB_GSO_CB(skb)->data_offset -
102 skb_shinfo(skb)->gso_size;
103 *pcsum = ~csum_fold((__force __wsum)htonl(partial_adj));
104 } else {
105 *pcsum = 0;
106 }
107
108 *(pcsum + 1) = 0;
Xin Longefa1a652021-01-28 17:18:32 +0800109 if (skb->encapsulation || !offload_csum) {
110 *pcsum = gso_make_checksum(skb, 0);
111 } else {
112 skb->ip_summed = CHECKSUM_PARTIAL;
113 skb->csum_start = skb_transport_header(skb) - skb->head;
114 skb->csum_offset = sizeof(*greh);
115 }
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200116 } while ((skb = skb->next));
117out:
118 return segs;
119}
120
David Millerd4546c22018-06-24 14:13:49 +0900121static struct sk_buff *gre_gro_receive(struct list_head *head,
122 struct sk_buff *skb)
Jerry Chubf5a7552014-01-07 10:23:19 -0800123{
David Millerd4546c22018-06-24 14:13:49 +0900124 struct sk_buff *pp = NULL;
Jerry Chubf5a7552014-01-07 10:23:19 -0800125 struct sk_buff *p;
126 const struct gre_base_hdr *greh;
127 unsigned int hlen, grehlen;
128 unsigned int off;
129 int flush = 1;
130 struct packet_offload *ptype;
131 __be16 type;
132
Jesse Grossfac8e0f2016-03-19 09:32:01 -0700133 if (NAPI_GRO_CB(skb)->encap_mark)
134 goto out;
135
136 NAPI_GRO_CB(skb)->encap_mark = 1;
137
Jerry Chubf5a7552014-01-07 10:23:19 -0800138 off = skb_gro_offset(skb);
139 hlen = off + sizeof(*greh);
140 greh = skb_gro_header_fast(skb, off);
141 if (skb_gro_header_hard(skb, hlen)) {
142 greh = skb_gro_header_slow(skb, hlen, off);
143 if (unlikely(!greh))
144 goto out;
145 }
146
147 /* Only support version 0 and K (key), C (csum) flags. Note that
148 * although the support for the S (seq#) flag can be added easily
149 * for GRO, this is problematic for GSO hence can not be enabled
150 * here because a GRO pkt may end up in the forwarding path, thus
151 * requiring GSO support to break it up correctly.
152 */
153 if ((greh->flags & ~(GRE_KEY|GRE_CSUM)) != 0)
154 goto out;
155
Alexander Duycka0ca1532016-04-05 09:13:39 -0700156 /* We can only support GRE_CSUM if we can track the location of
157 * the GRE header. In the case of FOU/GUE we cannot because the
158 * outer UDP header displaces the GRE header leaving us in a state
159 * of limbo.
160 */
161 if ((greh->flags & GRE_CSUM) && NAPI_GRO_CB(skb)->is_fou)
162 goto out;
163
Jerry Chubf5a7552014-01-07 10:23:19 -0800164 type = greh->protocol;
165
Jerry Chubf5a7552014-01-07 10:23:19 -0800166 ptype = gro_find_receive_by_type(type);
Ian Morris51456b22015-04-03 09:17:26 +0100167 if (!ptype)
Eric Dumazetfc1ca332021-11-23 14:56:07 -0800168 goto out;
Jerry Chubf5a7552014-01-07 10:23:19 -0800169
170 grehlen = GRE_HEADER_SECTION;
171
172 if (greh->flags & GRE_KEY)
173 grehlen += GRE_HEADER_SECTION;
174
175 if (greh->flags & GRE_CSUM)
176 grehlen += GRE_HEADER_SECTION;
177
178 hlen = off + grehlen;
179 if (skb_gro_header_hard(skb, hlen)) {
180 greh = skb_gro_header_slow(skb, hlen, off);
181 if (unlikely(!greh))
Eric Dumazetfc1ca332021-11-23 14:56:07 -0800182 goto out;
Jerry Chubf5a7552014-01-07 10:23:19 -0800183 }
Jerry Chubf5a7552014-01-07 10:23:19 -0800184
Tom Herbert758f75d2014-08-22 13:34:22 -0700185 /* Don't bother verifying checksum if we're going to flush anyway. */
Tom Herbert884d3382014-08-31 15:12:44 -0700186 if ((greh->flags & GRE_CSUM) && !NAPI_GRO_CB(skb)->flush) {
187 if (skb_gro_checksum_simple_validate(skb))
Eric Dumazetfc1ca332021-11-23 14:56:07 -0800188 goto out;
Tom Herbert758f75d2014-08-22 13:34:22 -0700189
Li RongQingb39c78b2020-01-03 11:51:00 +0800190 skb_gro_checksum_try_convert(skb, IPPROTO_GRE,
Tom Herbert884d3382014-08-31 15:12:44 -0700191 null_compute_pseudo);
192 }
193
David Millerd4546c22018-06-24 14:13:49 +0900194 list_for_each_entry(p, head, list) {
Jerry Chubf5a7552014-01-07 10:23:19 -0800195 const struct gre_base_hdr *greh2;
196
197 if (!NAPI_GRO_CB(p)->same_flow)
198 continue;
199
200 /* The following checks are needed to ensure only pkts
201 * from the same tunnel are considered for aggregation.
202 * The criteria for "the same tunnel" includes:
203 * 1) same version (we only support version 0 here)
204 * 2) same protocol (we only support ETH_P_IP for now)
205 * 3) same set of flags
206 * 4) same key if the key field is present.
207 */
208 greh2 = (struct gre_base_hdr *)(p->data + off);
209
210 if (greh2->flags != greh->flags ||
211 greh2->protocol != greh->protocol) {
212 NAPI_GRO_CB(p)->same_flow = 0;
213 continue;
214 }
215 if (greh->flags & GRE_KEY) {
216 /* compare keys */
217 if (*(__be32 *)(greh2+1) != *(__be32 *)(greh+1)) {
218 NAPI_GRO_CB(p)->same_flow = 0;
219 continue;
220 }
221 }
222 }
223
224 skb_gro_pull(skb, grehlen);
225
226 /* Adjusted NAPI_GRO_CB(skb)->csum after skb_gro_pull()*/
227 skb_gro_postpull_rcsum(skb, greh, grehlen);
228
Sabrina Dubrocafcd91dd2016-10-20 15:58:02 +0200229 pp = call_gro_receive(ptype->callbacks.gro_receive, head, skb);
Alexander Duyckc194cf92016-03-09 09:24:23 -0800230 flush = 0;
Jerry Chubf5a7552014-01-07 10:23:19 -0800231
Jerry Chubf5a7552014-01-07 10:23:19 -0800232out:
Sabrina Dubroca603d4cf2018-06-30 17:38:55 +0200233 skb_gro_flush_final(skb, pp, flush);
Jerry Chubf5a7552014-01-07 10:23:19 -0800234
235 return pp;
236}
237
Wei Yongjund10dbad2014-01-09 22:22:05 +0800238static int gre_gro_complete(struct sk_buff *skb, int nhoff)
Jerry Chubf5a7552014-01-07 10:23:19 -0800239{
240 struct gre_base_hdr *greh = (struct gre_base_hdr *)(skb->data + nhoff);
241 struct packet_offload *ptype;
242 unsigned int grehlen = sizeof(*greh);
243 int err = -ENOENT;
244 __be16 type;
245
Jerry Chuc3caf112014-07-14 15:54:46 -0700246 skb->encapsulation = 1;
247 skb_shinfo(skb)->gso_type = SKB_GSO_GRE;
248
Jerry Chubf5a7552014-01-07 10:23:19 -0800249 type = greh->protocol;
250 if (greh->flags & GRE_KEY)
251 grehlen += GRE_HEADER_SECTION;
252
253 if (greh->flags & GRE_CSUM)
254 grehlen += GRE_HEADER_SECTION;
255
Jerry Chubf5a7552014-01-07 10:23:19 -0800256 ptype = gro_find_complete_by_type(type);
Ian Morris00db4122015-04-03 09:17:27 +0100257 if (ptype)
Jerry Chubf5a7552014-01-07 10:23:19 -0800258 err = ptype->callbacks.gro_complete(skb, nhoff + grehlen);
259
Tom Herbert6fb2a752014-11-29 09:59:45 -0800260 skb_set_inner_mac_header(skb, nhoff + grehlen);
261
Jerry Chubf5a7552014-01-07 10:23:19 -0800262 return err;
263}
264
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200265static const struct net_offload gre_offload = {
266 .callbacks = {
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200267 .gso_segment = gre_gso_segment,
Jerry Chubf5a7552014-01-07 10:23:19 -0800268 .gro_receive = gre_gro_receive,
269 .gro_complete = gre_gro_complete,
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200270 },
271};
272
Eric Dumazet438e38f2014-01-06 14:03:07 -0800273static int __init gre_offload_init(void)
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200274{
Alexander Duycke0c20962016-04-14 15:33:58 -0400275 int err;
276
277 err = inet_add_offload(&gre_offload, IPPROTO_GRE);
278#if IS_ENABLED(CONFIG_IPV6)
279 if (err)
280 return err;
281
282 err = inet6_add_offload(&gre_offload, IPPROTO_GRE);
283 if (err)
284 inet_del_offload(&gre_offload, IPPROTO_GRE);
285#endif
286
287 return err;
Daniel Borkmannc50cd352013-07-01 19:24:00 +0200288}
Paul Gortmakercf172282014-01-15 11:19:55 -0500289device_initcall(gre_offload_init);