From: David Dillow <dave@thedillows.org>
To: netdev@oss.sgi.com
Cc: dave@thedillows.org
Subject: [RFC BK 8/22] xfrm offload v2: Add routines to manage applied offloads per skb
Date: Mon, 10 Jan 2005 10:37:00 -0500 [thread overview]
Message-ID: <20040110014300.17@ori.thedillows.org> (raw)
In-Reply-To: 20040110014300.16@ori.thedillows.org
# This is a BitKeeper generated diff -Nru style patch.
#
# ChangeSet
# 2005/01/10 00:49:03-05:00 dave@thedillows.org
# Add fields to sk_buff to track offloaded xfrm_states for this
# packet. On Tx, these will be pointers to struct xfrm_offload.
# On Rx, these will be a 4 bit bitfield indicating what operations
# were performed, and the result of those operations.
#
# skb_push_xfrm_offload() records an offloaded xfrm on Tx. It will
# return an error code if it is unable to record the offload.
# skb_get_xfrm_offload() returns the xfrm_offload struct at the
# given position on the stack. It will return NULL if there
# are no more offloads available.
# skb_has_xfrm_offload() returns true if the sk_buff has offload
# information available.
# skb_put_xfrm_result() records an offload result on Rx at the given
# index. It will return an error code if it is unable to
# record the result.
# skb_pop_xfrm_result() pops the current offload result from the.
# stack. If there are no more results, it will return
# XFRM_OFFLOAD_NONE.
#
# Signed-off-by: David Dillow <dave@thedillows.org>
#
# net/core/skbuff.c
# 2005/01/10 00:48:46-05:00 dave@thedillows.org +31 -0
# When an sk_buff is cloned, we must gain a reference to each
# xfrm_offload that it references.
#
# When an sk_buff is freed, we must release our references
# to the xfrm_offloads attached to it.
#
# Signed-off-by: David Dillow <dave@thedillows.org>
#
# include/net/xfrm.h
# 2005/01/10 00:48:46-05:00 dave@thedillows.org +9 -0
# Add the values for the result bitfield.
#
# Signed-off-by: David Dillow <dave@thedillows.org>
#
# include/linux/skbuff.h
# 2005/01/10 00:48:46-05:00 dave@thedillows.org +55 -0
# Add the fields and functins to track offloads and results, as
# well as the current position in the stack.
#
# Signed-off-by: David Dillow <dave@thedillows.org>
#
diff -Nru a/include/linux/skbuff.h b/include/linux/skbuff.h
--- a/include/linux/skbuff.h 2005-01-10 01:19:13 -05:00
+++ b/include/linux/skbuff.h 2005-01-10 01:19:13 -05:00
@@ -146,6 +146,14 @@
skb_frag_t frags[MAX_SKB_FRAGS];
};
+/* XXX UGH. We cannot include <net/xfrm.h> in this file without some
+ * header file surgery, so define our own max xfrm depth. This should
+ * be kept >= XFRM_MAX_DEPTH until we fix the includes, and it can
+ * go away.
+ */
+#define SKB_XFRM_MAX_DEPTH 4
+struct xfrm_offload;
+
/**
* struct sk_buff - socket buffer
* @next: Next buffer in list
@@ -187,6 +195,8 @@
* @nf_bridge: Saved data about a bridged frame - see br_netfilter.c
* @private: Data which is private to the HIPPI implementation
* @tc_index: Traffic control index
+ * @xfrm_offload: Tx offload info, Rx offload results
+ * @xfrm_offload_idx: The number of cookies/results stored currently
*/
struct sk_buff {
@@ -272,6 +282,8 @@
#endif
+ int xfrm_offload_idx;
+ struct xfrm_offload * xfrm_offload[SKB_XFRM_MAX_DEPTH];
/* These elements must be at the end, see alloc_skb() for details. */
unsigned int truesize;
@@ -1184,6 +1196,49 @@
#else /* CONFIG_NETFILTER */
static inline void nf_reset(struct sk_buff *skb) {}
#endif /* CONFIG_NETFILTER */
+
+static inline int skb_push_xfrm_offload(struct sk_buff *skb,
+ struct xfrm_offload *xol)
+{
+ if (likely(skb->xfrm_offload_idx < SKB_XFRM_MAX_DEPTH)) {
+ skb->xfrm_offload[skb->xfrm_offload_idx++] = xol;
+ return 0;
+ }
+
+ return -ENOMEM;
+}
+
+static inline struct xfrm_offload *
+skb_get_xfrm_offload(const struct sk_buff *skb, int idx)
+{
+ if (likely(idx < skb->xfrm_offload_idx))
+ return skb->xfrm_offload[idx];
+ else
+ return NULL;
+}
+
+static inline int skb_has_xfrm_offload(const struct sk_buff *skb)
+{
+ return !!skb_get_xfrm_offload(skb, 0);
+}
+
+static inline int skb_put_xfrm_result(struct sk_buff *skb, int result, int idx)
+{
+ if (likely(idx < SKB_XFRM_MAX_DEPTH)) {
+ skb->xfrm_offload[idx] = (struct xfrm_offload *) result;
+ return 0;
+ }
+ return -ENOMEM;
+}
+
+static inline int skb_pop_xfrm_result(struct sk_buff *skb)
+{
+ /* XXX XFRM_OFFLOAD_NONE == 0, but cannot include <net/xfrm.h> */
+ int res = 0;
+ if (likely(skb->xfrm_offload_idx < SKB_XFRM_MAX_DEPTH))
+ res = (int) skb->xfrm_offload[skb->xfrm_offload_idx++];
+ return res;
+}
#endif /* __KERNEL__ */
#endif /* _LINUX_SKBUFF_H */
diff -Nru a/include/net/xfrm.h b/include/net/xfrm.h
--- a/include/net/xfrm.h 2005-01-10 01:19:12 -05:00
+++ b/include/net/xfrm.h 2005-01-10 01:19:12 -05:00
@@ -171,6 +171,15 @@
XFRM_STATE_DIR_OUT,
};
+enum {
+ XFRM_OFFLOAD_NONE = 0,
+ XFRM_OFFLOAD_CONF = 1,
+ XFRM_OFFLOAD_AUTH = 2,
+ XFRM_OFFLOAD_AUTH_OK = 4,
+ XFRM_OFFLOAD_AUTH_FAIL = 8,
+ XFRM_OFFLOAD_FIELD = 0x0f
+};
+
struct xfrm_offload
{
struct list_head bydev;
diff -Nru a/net/core/skbuff.c b/net/core/skbuff.c
--- a/net/core/skbuff.c 2005-01-10 01:19:12 -05:00
+++ b/net/core/skbuff.c 2005-01-10 01:19:12 -05:00
@@ -283,6 +283,14 @@
dst_release(skb->dst);
#ifdef CONFIG_XFRM
+ {
+ int i = 0;
+ struct xfrm_offload *xol;
+ while ((xol = skb_get_xfrm_offload(skb, i++)) != NULL) {
+ if ((unsigned long) xol > XFRM_OFFLOAD_FIELD)
+ xfrm_offload_release(xol);
+ }
+ }
secpath_put(skb->sp);
#endif
if(skb->destructor) {
@@ -387,6 +395,17 @@
#endif
#endif
+ C(xfrm_offload_idx);
+ memcpy(n->xfrm_offload, skb->xfrm_offload,
+ sizeof(struct xfrm_offload *) * SKB_XFRM_MAX_DEPTH);
+ {
+ int i = 0;
+ struct xfrm_offload *xol;
+ while ((xol = skb_get_xfrm_offload(skb, i++)) != NULL) {
+ if ((unsigned long) xol > XFRM_OFFLOAD_FIELD)
+ xfrm_offload_hold(xol);
+ }
+ }
C(truesize);
atomic_set(&n->users, 1);
C(head);
@@ -449,6 +468,18 @@
atomic_set(&new->users, 1);
skb_shinfo(new)->tso_size = skb_shinfo(old)->tso_size;
skb_shinfo(new)->tso_segs = skb_shinfo(old)->tso_segs;
+
+ new->xfrm_offload_idx = old->xfrm_offload_idx;
+ memcpy(new->xfrm_offload, old->xfrm_offload,
+ sizeof(struct xfrm_offload *) * SKB_XFRM_MAX_DEPTH);
+ {
+ int i = 0;
+ struct xfrm_offload *xol;
+ while ((xol = skb_get_xfrm_offload(old, i++)) != NULL) {
+ if ((unsigned long) xol > XFRM_OFFLOAD_FIELD)
+ xfrm_offload_hold(xol);
+ }
+ }
}
/**
next prev parent reply other threads:[~2005-01-10 15:37 UTC|newest]
Thread overview: 25+ messages / expand[flat|nested] mbox.gz Atom feed top
2005-01-10 15:36 [RFC BK 0/22] xfrm offload v2: Add hardware assist for IPSEC crypto David Dillow
2005-01-10 15:36 ` [RFC BK 1/22] xfrm offload v2: Add direction information to xfrm_state David Dillow
2005-01-10 15:36 ` [RFC BK 2/22] xfrm offload v2: Add xfrm offload management calls to struct netdevice David Dillow
2005-01-10 15:36 ` [RFC BK 3/22] xfrm offload v2: Add offload management routines David Dillow
2005-01-10 15:36 ` [RFC BK 4/22] xfrm offload v2: Try to offload inbound xfrm_states David Dillow
2005-01-10 15:37 ` [RFC BK 5/22] xfrm offload v2: Attempt to offload bundled xfrm_states for outbound xfrms David Dillow
2005-01-10 15:37 ` [RFC BK 6/22] xfrm offload v2: add a parameter to xfrm_prune_bundles() David Dillow
2005-01-10 15:37 ` [RFC BK 7/22] xfrm offload v2: Allow device drivers to force recalculation of offloads David Dillow
2005-01-10 15:37 ` David Dillow [this message]
2005-01-10 15:37 ` [RFC BK 9/22] xfrm offload v2: Split AH header initialization from zeroing of mutable fields David Dillow
2005-01-10 15:37 ` [RFC BK 10/22] xfrm offload v2: Add offloading of outbound AH & ESP packets David Dillow
2005-01-10 15:37 ` [RFC BK 11/22] xfrm offload v2: Add offloading of inbound " David Dillow
2005-01-10 15:37 ` [RFC BK 12/22] xfrm offload v2: Add ethtool support for crypto offload control David Dillow
2005-01-10 15:37 ` [RFC BK 13/22] xfrm offload v2: typhoon: Make the ipsec descriptor match actual usage David Dillow
2005-01-10 15:37 ` [RFC BK 14/22] xfrm offload v2: typhoon: add inbound offload result processing David Dillow
2005-01-10 15:37 ` [RFC BK 15/22] xfrm offload v2: typhoon: add outbound offload processing David Dillow
2005-01-10 15:37 ` [RFC BK 16/22] xfrm offload v2: typhoon: collect crypto offload capabilities David Dillow
2005-01-10 15:37 ` [RFC BK 17/22] xfrm offload v2: typhoon: split out setting of offloaded tasks David Dillow
2005-01-10 15:37 ` [RFC BK 18/22] xfrm offload v2: typhoon: add validation of offloaded xfrm_states David Dillow
2005-01-10 15:37 ` [RFC BK 19/22] xfrm offload v2: typhoon: add loading of xfrm_states to hardware David Dillow
2005-01-10 15:37 ` [RFC BK 20/22] xfrm offload v2: typhoon: add management of outbound bundles David Dillow
2005-01-10 15:37 ` [RFC BK 21/22] xfrm offload v2: typhoon: add callbacks to support crypto offload David Dillow
2005-01-10 15:37 ` [RFC BK 22/22] xfrm offload v2: Add some documentation for the IPSEC " David Dillow
2005-01-17 19:00 ` [RFC BK 0/22] xfrm offload v2: Add hardware assist for IPSEC crypto James Morris
2005-01-20 17:22 ` Dave Dillow
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20040110014300.17@ori.thedillows.org \
--to=dave@thedillows.org \
--cc=netdev@oss.sgi.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).