1 // SPDX-License-Identifier: GPL-2.0-or-later
2 #include <linux/skbuff.h>
3 #include <linux/sctp.h>
8 * skb_eth_gso_segment - segmentation handler for ethernet protocols.
9 * @skb: buffer to segment
10 * @features: features for the output path (see dev->features)
11 * @type: Ethernet Protocol ID
13 struct sk_buff
*skb_eth_gso_segment(struct sk_buff
*skb
,
14 netdev_features_t features
, __be16 type
)
16 struct sk_buff
*segs
= ERR_PTR(-EPROTONOSUPPORT
);
17 struct packet_offload
*ptype
;
20 list_for_each_entry_rcu(ptype
, &net_hotdata
.offload_base
, list
) {
21 if (ptype
->type
== type
&& ptype
->callbacks
.gso_segment
) {
22 segs
= ptype
->callbacks
.gso_segment(skb
, features
);
30 EXPORT_SYMBOL(skb_eth_gso_segment
);
33 * skb_mac_gso_segment - mac layer segmentation handler.
34 * @skb: buffer to segment
35 * @features: features for the output path (see dev->features)
37 struct sk_buff
*skb_mac_gso_segment(struct sk_buff
*skb
,
38 netdev_features_t features
)
40 struct sk_buff
*segs
= ERR_PTR(-EPROTONOSUPPORT
);
41 struct packet_offload
*ptype
;
42 int vlan_depth
= skb
->mac_len
;
43 __be16 type
= skb_network_protocol(skb
, &vlan_depth
);
46 return ERR_PTR(-EINVAL
);
48 __skb_pull(skb
, vlan_depth
);
51 list_for_each_entry_rcu(ptype
, &net_hotdata
.offload_base
, list
) {
52 if (ptype
->type
== type
&& ptype
->callbacks
.gso_segment
) {
53 segs
= ptype
->callbacks
.gso_segment(skb
, features
);
59 __skb_push(skb
, skb
->data
- skb_mac_header(skb
));
63 EXPORT_SYMBOL(skb_mac_gso_segment
);
64 /* openvswitch calls this on rx path, so we need a different check.
66 static bool skb_needs_check(const struct sk_buff
*skb
, bool tx_path
)
69 return skb
->ip_summed
!= CHECKSUM_PARTIAL
&&
70 skb
->ip_summed
!= CHECKSUM_UNNECESSARY
;
72 return skb
->ip_summed
== CHECKSUM_NONE
;
76 * __skb_gso_segment - Perform segmentation on skb.
77 * @skb: buffer to segment
78 * @features: features for the output path (see dev->features)
79 * @tx_path: whether it is called in TX path
81 * This function segments the given skb and returns a list of segments.
83 * It may return NULL if the skb requires no segmentation. This is
84 * only possible when GSO is used for verifying header integrity.
86 * Segmentation preserves SKB_GSO_CB_OFFSET bytes of previous skb cb.
88 struct sk_buff
*__skb_gso_segment(struct sk_buff
*skb
,
89 netdev_features_t features
, bool tx_path
)
93 if (unlikely(skb_needs_check(skb
, tx_path
))) {
96 /* We're going to init ->check field in TCP or UDP header */
97 err
= skb_cow_head(skb
, 0);
102 /* Only report GSO partial support if it will enable us to
103 * support segmentation on this frame without needing additional
106 if (features
& NETIF_F_GSO_PARTIAL
) {
107 netdev_features_t partial_features
= NETIF_F_GSO_ROBUST
;
108 struct net_device
*dev
= skb
->dev
;
110 partial_features
|= dev
->features
& dev
->gso_partial_features
;
111 if (!skb_gso_ok(skb
, features
| partial_features
))
112 features
&= ~NETIF_F_GSO_PARTIAL
;
115 BUILD_BUG_ON(SKB_GSO_CB_OFFSET
+
116 sizeof(*SKB_GSO_CB(skb
)) > sizeof(skb
->cb
));
118 SKB_GSO_CB(skb
)->mac_offset
= skb_headroom(skb
);
119 SKB_GSO_CB(skb
)->encap_level
= 0;
121 skb_reset_mac_header(skb
);
122 skb_reset_mac_len(skb
);
124 segs
= skb_mac_gso_segment(skb
, features
);
126 if (segs
!= skb
&& unlikely(skb_needs_check(skb
, tx_path
) && !IS_ERR(segs
)))
127 skb_warn_bad_offload(skb
);
131 EXPORT_SYMBOL(__skb_gso_segment
);
134 * skb_gso_transport_seglen - Return length of individual segments of a gso packet
138 * skb_gso_transport_seglen is used to determine the real size of the
139 * individual segments, including Layer4 headers (TCP/UDP).
141 * The MAC/L2 or network (IP, IPv6) headers are not accounted for.
143 static unsigned int skb_gso_transport_seglen(const struct sk_buff
*skb
)
145 const struct skb_shared_info
*shinfo
= skb_shinfo(skb
);
146 unsigned int thlen
= 0;
148 if (skb
->encapsulation
) {
149 thlen
= skb_inner_transport_header(skb
) -
150 skb_transport_header(skb
);
152 if (likely(shinfo
->gso_type
& (SKB_GSO_TCPV4
| SKB_GSO_TCPV6
)))
153 thlen
+= inner_tcp_hdrlen(skb
);
154 } else if (likely(shinfo
->gso_type
& (SKB_GSO_TCPV4
| SKB_GSO_TCPV6
))) {
155 thlen
= tcp_hdrlen(skb
);
156 } else if (unlikely(skb_is_gso_sctp(skb
))) {
157 thlen
= sizeof(struct sctphdr
);
158 } else if (shinfo
->gso_type
& SKB_GSO_UDP_L4
) {
159 thlen
= sizeof(struct udphdr
);
161 /* UFO sets gso_size to the size of the fragmentation
162 * payload, i.e. the size of the L4 (UDP) header is already
165 return thlen
+ shinfo
->gso_size
;
169 * skb_gso_network_seglen - Return length of individual segments of a gso packet
173 * skb_gso_network_seglen is used to determine the real size of the
174 * individual segments, including Layer3 (IP, IPv6) and L4 headers (TCP/UDP).
176 * The MAC/L2 header is not accounted for.
178 static unsigned int skb_gso_network_seglen(const struct sk_buff
*skb
)
180 unsigned int hdr_len
= skb_transport_header(skb
) -
181 skb_network_header(skb
);
183 return hdr_len
+ skb_gso_transport_seglen(skb
);
187 * skb_gso_mac_seglen - Return length of individual segments of a gso packet
191 * skb_gso_mac_seglen is used to determine the real size of the
192 * individual segments, including MAC/L2, Layer3 (IP, IPv6) and L4
195 static unsigned int skb_gso_mac_seglen(const struct sk_buff
*skb
)
197 unsigned int hdr_len
= skb_transport_header(skb
) - skb_mac_header(skb
);
199 return hdr_len
+ skb_gso_transport_seglen(skb
);
203 * skb_gso_size_check - check the skb size, considering GSO_BY_FRAGS
205 * There are a couple of instances where we have a GSO skb, and we
206 * want to determine what size it would be after it is segmented.
208 * We might want to check:
209 * - L3+L4+payload size (e.g. IP forwarding)
210 * - L2+L3+L4+payload size (e.g. sanity check before passing to driver)
212 * This is a helper to do that correctly considering GSO_BY_FRAGS.
216 * @seg_len: The segmented length (from skb_gso_*_seglen). In the
217 * GSO_BY_FRAGS case this will be [header sizes + GSO_BY_FRAGS].
219 * @max_len: The maximum permissible length.
221 * Returns true if the segmented length <= max length.
223 static inline bool skb_gso_size_check(const struct sk_buff
*skb
,
224 unsigned int seg_len
,
225 unsigned int max_len
) {
226 const struct skb_shared_info
*shinfo
= skb_shinfo(skb
);
227 const struct sk_buff
*iter
;
229 if (shinfo
->gso_size
!= GSO_BY_FRAGS
)
230 return seg_len
<= max_len
;
232 /* Undo this so we can re-use header sizes */
233 seg_len
-= GSO_BY_FRAGS
;
235 skb_walk_frags(skb
, iter
) {
236 if (seg_len
+ skb_headlen(iter
) > max_len
)
244 * skb_gso_validate_network_len - Will a split GSO skb fit into a given MTU?
247 * @mtu: MTU to validate against
249 * skb_gso_validate_network_len validates if a given skb will fit a
250 * wanted MTU once split. It considers L3 headers, L4 headers, and the
253 bool skb_gso_validate_network_len(const struct sk_buff
*skb
, unsigned int mtu
)
255 return skb_gso_size_check(skb
, skb_gso_network_seglen(skb
), mtu
);
257 EXPORT_SYMBOL_GPL(skb_gso_validate_network_len
);
260 * skb_gso_validate_mac_len - Will a split GSO skb fit in a given length?
263 * @len: length to validate against
265 * skb_gso_validate_mac_len validates if a given skb will fit a wanted
266 * length once split, including L2, L3 and L4 headers and the payload.
268 bool skb_gso_validate_mac_len(const struct sk_buff
*skb
, unsigned int len
)
270 return skb_gso_size_check(skb
, skb_gso_mac_seglen(skb
), len
);
272 EXPORT_SYMBOL_GPL(skb_gso_validate_mac_len
);