NetBSD/sys/netinet/in_offload.c
ozaki-r 9e0f6c5e36 Stop using rt_gwroute on packet sending paths
rt_gwroute of rtentry is a reference to a rtentry of the gateway
for a rtentry with RTF_GATEWAY. That was used by L2 (arp and ndp)
to look up L2 addresses. By separating L2 nexthop caches, we don't
need a route for the purpose and we can stop using rt_gwroute.
By doing so, we can reduce referencing and modifying rtentries,
which makes it easy to apply a lock (and/or psref) to the
routing table and rtentries.

One issue to do this is to keep RTF_REJECT behavior. It seems it
was broken when we moved rtalloc1 things from L2 output routines
(e.g., ether_output) to ip_hresolv_output, but (fortunately?)
it works unexpectedly. What we mistook are:
- RTF_REJECT was checked for any routes in L2 output routines,
  but in ip_hresolv_output it is checked only when the route
  is RTF_GATEWAY
- The RTF_REJECT check wasn't copied to IPv6 (nd6_output)

It seems that rt_gwroute checks hid the mistakes and it looked
work (unexpectedly) and removing rt_gwroute checks unveil the
issue. So we need to fix RTF_REJECT checks in ip_hresolv_output
and also add them to nd6_output.

One more point we have to care is returning an errno; we need
to mimic looutput behavior. Originally RTF_REJECT check was
done either in L2 output routines or in looutput. The latter is
applied when a reject route directs to a loopback interface.
However, now RTF_REJECT check is done before looutput so to keep
the original behavior we need to return an errno which looutput
chooses. Added rt_check_reject_route does such tweaks.
2016-04-26 09:30:01 +00:00

255 lines
6.0 KiB
C

/* $NetBSD: in_offload.c,v 1.7 2016/04/26 09:30:01 ozaki-r Exp $ */
/*-
* Copyright (c)2005, 2006 YAMAMOTO Takashi,
* All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in the
* documentation and/or other materials provided with the distribution.
*
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
* SUCH DAMAGE.
*/
#include <sys/cdefs.h>
__KERNEL_RCSID(0, "$NetBSD: in_offload.c,v 1.7 2016/04/26 09:30:01 ozaki-r Exp $");
#include <sys/param.h>
#include <sys/mbuf.h>
#include <net/if.h>
#include <netinet/in.h>
#include <netinet/in_systm.h>
#include <netinet/ip.h>
#include <netinet/ip_var.h>
#include <netinet/tcp.h>
#include <netinet/in_offload.h>
struct ip_tso_output_args {
struct ifnet *ifp;
const struct sockaddr *sa;
struct rtentry *rt;
};
static int ip_tso_output_callback(void *, struct mbuf *);
static int
ip_tso_output_callback(void *vp, struct mbuf *m)
{
struct ip_tso_output_args *args = vp;
struct ifnet *ifp = args->ifp;
return ip_if_output(ifp, m, args->sa, args->rt);
}
int
ip_tso_output(struct ifnet *ifp, struct mbuf *m, const struct sockaddr *sa,
struct rtentry *rt)
{
struct ip_tso_output_args args;
args.ifp = ifp;
args.sa = sa;
args.rt = rt;
return tcp4_segment(m, ip_tso_output_callback, &args);
}
/*
* tcp4_segment: handle M_CSUM_TSOv4 by software.
*
* => always consume m.
* => call output_func with output_arg for each segments.
*/
int
tcp4_segment(struct mbuf *m, int (*output_func)(void *, struct mbuf *),
void *output_arg)
{
int mss;
int iphlen;
int thlen;
int hlen;
int len;
struct ip *iph;
struct tcphdr *th;
uint16_t ipid;
uint32_t tcpseq;
struct mbuf *hdr = NULL;
struct mbuf *t;
int error = 0;
KASSERT((m->m_flags & M_PKTHDR) != 0);
KASSERT((m->m_pkthdr.csum_flags & M_CSUM_TSOv4) != 0);
m->m_pkthdr.csum_flags = 0;
len = m->m_pkthdr.len;
KASSERT(len >= sizeof(*iph) + sizeof(*th));
if (m->m_len < sizeof(*iph)) {
m = m_pullup(m, sizeof(*iph));
if (m == NULL) {
error = ENOMEM;
goto quit;
}
}
iph = mtod(m, struct ip *);
iphlen = iph->ip_hl * 4;
KASSERT(iph->ip_v == IPVERSION);
KASSERT(iphlen >= sizeof(*iph));
KASSERT(iph->ip_p == IPPROTO_TCP);
ipid = ntohs(iph->ip_id);
hlen = iphlen + sizeof(*th);
if (m->m_len < hlen) {
m = m_pullup(m, hlen);
if (m == NULL) {
error = ENOMEM;
goto quit;
}
}
th = (void *)(mtod(m, char *) + iphlen);
tcpseq = ntohl(th->th_seq);
thlen = th->th_off * 4;
hlen = iphlen + thlen;
mss = m->m_pkthdr.segsz;
KASSERT(mss != 0);
KASSERT(len > hlen);
t = m_split(m, hlen, M_NOWAIT);
if (t == NULL) {
error = ENOMEM;
goto quit;
}
hdr = m;
m = t;
len -= hlen;
KASSERT(len % mss == 0);
while (len > 0) {
struct mbuf *n;
n = m_dup(hdr, 0, hlen, M_NOWAIT);
if (n == NULL) {
error = ENOMEM;
goto quit;
}
KASSERT(n->m_len == hlen); /* XXX */
t = m_split(m, mss, M_NOWAIT);
if (t == NULL) {
m_freem(n);
error = ENOMEM;
goto quit;
}
m_cat(n, m);
m = t;
KASSERT(n->m_len >= hlen); /* XXX */
n->m_pkthdr.len = hlen + mss;
iph = mtod(n, struct ip *);
KASSERT(iph->ip_v == IPVERSION);
iph->ip_len = htons(n->m_pkthdr.len);
iph->ip_id = htons(ipid);
th = (void *)(mtod(n, char *) + iphlen);
th->th_seq = htonl(tcpseq);
iph->ip_sum = 0;
iph->ip_sum = in_cksum(n, iphlen);
th->th_sum = 0;
th->th_sum = in4_cksum(n, IPPROTO_TCP, iphlen, thlen + mss);
error = (*output_func)(output_arg, n);
if (error) {
goto quit;
}
tcpseq += mss;
ipid++;
len -= mss;
}
quit:
if (hdr != NULL) {
m_freem(hdr);
}
if (m != NULL) {
m_freem(m);
}
return error;
}
void
ip_undefer_csum(struct mbuf *m, size_t hdrlen, int csum_flags)
{
const size_t iphdrlen = M_CSUM_DATA_IPv4_IPHL(m->m_pkthdr.csum_data);
uint16_t csum;
uint16_t ip_len;
uint16_t *csump;
KASSERT(m->m_flags & M_PKTHDR);
KASSERT((m->m_pkthdr.csum_flags & csum_flags) == csum_flags);
if (__predict_true(hdrlen + sizeof(struct ip) <= m->m_len)) {
struct ip *ip = (struct ip *)(mtod(m, uint8_t *) + hdrlen);
ip_len = ip->ip_len;
csump = &ip->ip_sum;
} else {
const size_t ip_len_offset =
hdrlen + offsetof(struct ip, ip_len);
m_copydata(m, ip_len_offset, sizeof(ip_len), &ip_len);
csump = NULL;
}
ip_len = ntohs(ip_len);
if (csum_flags & M_CSUM_IPv4) {
csum = in4_cksum(m, 0, hdrlen, iphdrlen);
if (csump != NULL) {
*csump = csum;
} else {
const size_t offset = hdrlen +
offsetof(struct ip, ip_sum);
m_copyback(m, offset, sizeof(uint16_t), &csum);
}
}
if (csum_flags & (M_CSUM_UDPv4|M_CSUM_TCPv4)) {
size_t l4offset = hdrlen + iphdrlen;
csum = in4_cksum(m, 0, l4offset, ip_len - l4offset - hdrlen);
if (csum == 0 && (csum_flags & M_CSUM_UDPv4) != 0)
csum = 0xffff;
l4offset += M_CSUM_DATA_IPv4_OFFSET(m->m_pkthdr.csum_data);
if (__predict_true(l4offset + sizeof(uint16_t) <= m->m_len)) {
*(uint16_t *)(mtod(m, char *) + l4offset) = csum;
} else {
m_copyback(m, l4offset, sizeof(csum), (void *) &csum);
}
}
m->m_pkthdr.csum_flags ^= csum_flags;
}