[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAKgT0UcUmbEsXj5PAWee0JufENG=XMYQbgQzUap7rfxX=oZJBQ@mail.gmail.com>
Date: Fri, 8 Jan 2016 23:59:43 -0800
From: Alexander Duyck <alexander.duyck@...il.com>
To: Tom Herbert <tom@...bertland.com>
Cc: Edward Cree <ecree@...arflare.com>,
David Miller <davem@...emloft.net>,
Netdev <netdev@...r.kernel.org>, linux-net-drivers@...arflare.com
Subject: Re: [PATCH net-next 7/8] net: ip_tunnel: remove 'csum_help' argument
to iptunnel_handle_offloads
On Fri, Jan 8, 2016 at 7:00 PM, Tom Herbert <tom@...bertland.com> wrote:
> On Fri, Jan 8, 2016 at 6:05 PM, Alexander Duyck
> <alexander.duyck@...il.com> wrote:
>> On Fri, Jan 8, 2016 at 4:44 PM, Tom Herbert <tom@...bertland.com> wrote:
>>> On Fri, Jan 8, 2016 at 4:35 PM, Alexander Duyck
>>> <alexander.duyck@...il.com> wrote:
>>>> On Fri, Jan 8, 2016 at 11:47 AM, Edward Cree <ecree@...arflare.com> wrote:
>>>>> All users now pass false, so we can remove it, and remove the code that
>>>>> was conditional upon it.
>>>>>
>>>>> Signed-off-by: Edward Cree <ecree@...arflare.com>
>>>>> ---
>>>>> drivers/net/vxlan.c | 4 ++--
>>>>> include/net/ip_tunnels.h | 3 +--
>>>>> include/net/udp_tunnel.h | 3 +--
>>>>> net/ipv4/fou.c | 4 ++--
>>>>> net/ipv4/ip_gre.c | 3 +--
>>>>> net/ipv4/ip_tunnel_core.c | 15 +--------------
>>>>> net/ipv4/ipip.c | 2 +-
>>>>> net/ipv6/sit.c | 4 ++--
>>>>> net/netfilter/ipvs/ip_vs_xmit.c | 6 ++----
>>>>> 9 files changed, 13 insertions(+), 31 deletions(-)
>>>>>
>>>>
>>>>
>>>>> diff --git a/net/ipv4/ip_tunnel_core.c b/net/ipv4/ip_tunnel_core.c
>>>>> index 1db8418..f98bd53 100644
>>>>> --- a/net/ipv4/ip_tunnel_core.c
>>>>> +++ b/net/ipv4/ip_tunnel_core.c
>>>>> @@ -147,7 +147,6 @@ struct metadata_dst *iptunnel_metadata_reply(struct metadata_dst *md,
>>>>> EXPORT_SYMBOL_GPL(iptunnel_metadata_reply);
>>>>>
>>>>> struct sk_buff *iptunnel_handle_offloads(struct sk_buff *skb,
>>>>> - bool csum_help,
>>>>> int gso_type_mask)
>>>>> {
>>>>> int err;
>>>>> @@ -165,19 +164,7 @@ struct sk_buff *iptunnel_handle_offloads(struct sk_buff *skb,
>>>>> return skb;
>>>>> }
>>>>>
>>>>> - /* If packet is not gso and we are resolving any partial checksum,
>>>>> - * clear encapsulation flag. This allows setting CHECKSUM_PARTIAL
>>>>> - * on the outer header without confusing devices that implement
>>>>> - * NETIF_F_IP_CSUM with encapsulation.
>>>>> - */
>>>>> - if (csum_help)
>>>>> - skb->encapsulation = 0;
>>>>> -
>>>>> - if (skb->ip_summed == CHECKSUM_PARTIAL && csum_help) {
>>>>> - err = skb_checksum_help(skb);
>>>>> - if (unlikely(err))
>>>>> - goto error;
>>>>> - } else if (skb->ip_summed != CHECKSUM_PARTIAL)
>>>>> + if (skb->ip_summed != CHECKSUM_PARTIAL)
>>>>> skb->ip_summed = CHECKSUM_NONE;
>>>>>
>>>>
>>>> So this patch is a bit broken here. We should be clearing
>>>> skb->encapsulation if CHECKSUM_PARTIAL is not set. That way we don't
>>>> incorrectly pull in the inner headers when computing the outer
>>>> checksum.
>>>>
>>> In the original code this is done in csum_help argument is true in
>>> iptunnel_handle_offloads. These patches essentially imply that
>>> csum_help would always be false so we shouldn't need to clear
>>> skb->encapsulation any more?
>>
>> Actually it is causing me to throw warnings on an ixgbe NIC because it
>> implies that we want to offload the inner checksum, but we are setting
>> things up to offload the outer checksum. For example if the inner is
>> just an ARP or ICMP frame I don't need to checksum the inner headers,
>> but skb->encapsulation is still set so the inner headers are being
>> evaluated instead of the outer ones in the Tx checksum routine in the
>> driver.
>>
>> If we clear skb->encapsulation if we don't have CHECKSUM_PARTIAL set
>> then we don't have the issue. Really the addition of the line
>> clearing skb->encapsulation should probably be added to the first
>> patch so that we don't leave skb->encapsulation set when we aren't
>> requesting offloads.
>>
> As I pointed out previously drivers that use skb->encapsulation to
> determine that an inner checksum is being offloaded are not correct.
> The checksum to be offloaded is indicated solely in csum_start and
> csum_offset, skb->encapulation really should have nothing to do with
> checksum. This is just and indication that the inner headers are valid
> for the skbuf. We can retain clearing of skb->encapasulation for
> compatibility until the drivers that handle encapsulated checksums
> based on skb->encapsulation (I think there's like six of them) are
> converted to read csum_start/csum_offset (i.e. using
> skb_csum_offload_chk). New driver implemenation should not be using
> skb->encapsulation in the checksum offload interface.
Well part of the problem is that the stack is doing some of this as
well. In validate_xmit_skb what is happening is that the
inner_transport_hdr is being reset with the csum_start value.
Odds are the quickest way to fix most of the drivers would be to drop
their checks for skb->encapsulation and instead add a function to
determine if skb_checksum_start_offset is equal to
skb_transport_offset. If it is not then we can assume we are doing
checksums for an inner header instead of the outer one.
I was actually looking over the code for the Intel drivers tonight
while sorting this out. I realized the drivers were far more complex
then they needed to be based on their datasheets. I should have
patches next week that will convert igb, ixgbe, igbvf, and ixgbevf
over to using NETIF_F_HW_CSUM instead of the IP/IPV6_CSUM logic they
do now. The only real snag I am sorting out is how to deal with
SCTP_CRC. I'm wondering if it is okay for me to simply assume that if
skb->csum_offset is 8 we are dealing with an SCTP crc32c request or do
you think I should look into another way of identifying SCTP frames?
- Alex
Powered by blists - more mailing lists