lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 23 Jul 2009 19:16:49 +0200
From:	Eric Dumazet <eric.dumazet@...il.com>
To:	Kalpesh Rathod <kalpeshrathod@...il.com>
CC:	linux-net@...r.kernel.org, linux-kernel@...r.kernel.org
Subject: Re: [query] skb alignment in tx path of driver

Kalpesh Rathod a écrit :
> Hi,
> 
> I am writing n/w device driver for sdio wifi card. I am testing it on
> embedded platform.
> DMA controller on the platform is able to xfer data to sdio only if
> source data buf address is 4 byte aligned.
> 
> The firmware on the card understands 802.3 frames with snap headers.
> So, I convert it to the required format in my driver.
> 4 byte additional header is also attached to this frame and sent over sdio.
> This all conversion effectively adds 12 byes to the frame received in
> hard_xmit method.
> 
> Problem is, frame received in hard_xmit method is 2 byte aligned.
> (skb->data is 2 byte aligned). As a result,
> after addition of 12 bytes header, skb->data remains 2 byte aligned
> instead of 4 byte aligned. And DMA controller refuses
> to transfer it.
> 
> So, how can I request IP stack so that frame received in hard_xmit is
> on 4 byte aligned boundry?

You cannot.

Search for skb_copy_and_csum_dev() use in drivers.

drivers/net/via-rhine.c is a good example of a driver dealing with same
alignment requirement.

        if ((rp->quirks & rqRhineI) &&
            (((unsigned long)skb->data & 3) || skb_shinfo(skb)->nr_frags != 0 || skb->ip_summed == CHECKSUM_PARTIAL)) {
                /* Must use alignment buffer. */
                if (skb->len > PKT_BUF_SZ) {
                        /* packet too long, drop it */
                        dev_kfree_skb(skb);
                        rp->tx_skbuff[entry] = NULL;
                        dev->stats.tx_dropped++;
                        return NETDEV_TX_OK;
                }

                /* Padding is not copied and so must be redone. */
                skb_copy_and_csum_dev(skb, rp->tx_buf[entry]);
                if (skb->len < ETH_ZLEN)
                        memset(rp->tx_buf[entry] + skb->len, 0,
                               ETH_ZLEN - skb->len);
                rp->tx_skbuff_dma[entry] = 0;
                rp->tx_ring[entry].addr = cpu_to_le32(rp->tx_bufs_dma +
                                                      (rp->tx_buf[entry] -
                                                       rp->tx_bufs));
        } else {
                rp->tx_skbuff_dma[entry] =
                        pci_map_single(rp->pdev, skb->data, skb->len,
                                       PCI_DMA_TODEVICE);
                rp->tx_ring[entry].addr = cpu_to_le32(rp->tx_skbuff_dma[entry]);
        }


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ