netif.h 6.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193
  1. /******************************************************************************
  2. * netif.h
  3. *
  4. * Unified network-device I/O interface for Xen guest OSes.
  5. *
  6. * Copyright (c) 2003-2004, Keir Fraser
  7. */
  8. #ifndef __XEN_PUBLIC_IO_NETIF_H__
  9. #define __XEN_PUBLIC_IO_NETIF_H__
  10. #include <xen/interface/io/ring.h>
  11. #include <xen/interface/grant_table.h>
  12. /*
  13. * Older implementation of Xen network frontend / backend has an
  14. * implicit dependency on the MAX_SKB_FRAGS as the maximum number of
  15. * ring slots a skb can use. Netfront / netback may not work as
  16. * expected when frontend and backend have different MAX_SKB_FRAGS.
  17. *
  18. * A better approach is to add mechanism for netfront / netback to
  19. * negotiate this value. However we cannot fix all possible
  20. * frontends, so we need to define a value which states the minimum
  21. * slots backend must support.
  22. *
  23. * The minimum value derives from older Linux kernel's MAX_SKB_FRAGS
  24. * (18), which is proved to work with most frontends. Any new backend
  25. * which doesn't negotiate with frontend should expect frontend to
  26. * send a valid packet using slots up to this value.
  27. */
  28. #define XEN_NETIF_NR_SLOTS_MIN 18
  29. /*
  30. * Notifications after enqueuing any type of message should be conditional on
  31. * the appropriate req_event or rsp_event field in the shared ring.
  32. * If the client sends notification for rx requests then it should specify
  33. * feature 'feature-rx-notify' via xenbus. Otherwise the backend will assume
  34. * that it cannot safely queue packets (as it may not be kicked to send them).
  35. */
  36. /*
  37. * "feature-split-event-channels" is introduced to separate guest TX
  38. * and RX notificaion. Backend either doesn't support this feature or
  39. * advertise it via xenstore as 0 (disabled) or 1 (enabled).
  40. *
  41. * To make use of this feature, frontend should allocate two event
  42. * channels for TX and RX, advertise them to backend as
  43. * "event-channel-tx" and "event-channel-rx" respectively. If frontend
  44. * doesn't want to use this feature, it just writes "event-channel"
  45. * node as before.
  46. */
  47. /*
  48. * This is the 'wire' format for packets:
  49. * Request 1: xen_netif_tx_request -- XEN_NETTXF_* (any flags)
  50. * [Request 2: xen_netif_extra_info] (only if request 1 has XEN_NETTXF_extra_info)
  51. * [Request 3: xen_netif_extra_info] (only if request 2 has XEN_NETIF_EXTRA_MORE)
  52. * Request 4: xen_netif_tx_request -- XEN_NETTXF_more_data
  53. * Request 5: xen_netif_tx_request -- XEN_NETTXF_more_data
  54. * ...
  55. * Request N: xen_netif_tx_request -- 0
  56. */
  57. /* Protocol checksum field is blank in the packet (hardware offload)? */
  58. #define _XEN_NETTXF_csum_blank (0)
  59. #define XEN_NETTXF_csum_blank (1U<<_XEN_NETTXF_csum_blank)
  60. /* Packet data has been validated against protocol checksum. */
  61. #define _XEN_NETTXF_data_validated (1)
  62. #define XEN_NETTXF_data_validated (1U<<_XEN_NETTXF_data_validated)
  63. /* Packet continues in the next request descriptor. */
  64. #define _XEN_NETTXF_more_data (2)
  65. #define XEN_NETTXF_more_data (1U<<_XEN_NETTXF_more_data)
  66. /* Packet to be followed by extra descriptor(s). */
  67. #define _XEN_NETTXF_extra_info (3)
  68. #define XEN_NETTXF_extra_info (1U<<_XEN_NETTXF_extra_info)
  69. #define XEN_NETIF_MAX_TX_SIZE 0xFFFF
  70. struct xen_netif_tx_request {
  71. grant_ref_t gref; /* Reference to buffer page */
  72. uint16_t offset; /* Offset within buffer page */
  73. uint16_t flags; /* XEN_NETTXF_* */
  74. uint16_t id; /* Echoed in response message. */
  75. uint16_t size; /* Packet size in bytes. */
  76. };
  77. /* Types of xen_netif_extra_info descriptors. */
  78. #define XEN_NETIF_EXTRA_TYPE_NONE (0) /* Never used - invalid */
  79. #define XEN_NETIF_EXTRA_TYPE_GSO (1) /* u.gso */
  80. #define XEN_NETIF_EXTRA_TYPE_MAX (2)
  81. /* xen_netif_extra_info flags. */
  82. #define _XEN_NETIF_EXTRA_FLAG_MORE (0)
  83. #define XEN_NETIF_EXTRA_FLAG_MORE (1U<<_XEN_NETIF_EXTRA_FLAG_MORE)
  84. /* GSO types - only TCPv4 currently supported. */
  85. #define XEN_NETIF_GSO_TYPE_TCPV4 (1)
  86. /*
  87. * This structure needs to fit within both netif_tx_request and
  88. * netif_rx_response for compatibility.
  89. */
  90. struct xen_netif_extra_info {
  91. uint8_t type; /* XEN_NETIF_EXTRA_TYPE_* */
  92. uint8_t flags; /* XEN_NETIF_EXTRA_FLAG_* */
  93. union {
  94. struct {
  95. /*
  96. * Maximum payload size of each segment. For
  97. * example, for TCP this is just the path MSS.
  98. */
  99. uint16_t size;
  100. /*
  101. * GSO type. This determines the protocol of
  102. * the packet and any extra features required
  103. * to segment the packet properly.
  104. */
  105. uint8_t type; /* XEN_NETIF_GSO_TYPE_* */
  106. /* Future expansion. */
  107. uint8_t pad;
  108. /*
  109. * GSO features. This specifies any extra GSO
  110. * features required to process this packet,
  111. * such as ECN support for TCPv4.
  112. */
  113. uint16_t features; /* XEN_NETIF_GSO_FEAT_* */
  114. } gso;
  115. uint16_t pad[3];
  116. } u;
  117. };
  118. struct xen_netif_tx_response {
  119. uint16_t id;
  120. int16_t status; /* XEN_NETIF_RSP_* */
  121. };
  122. struct xen_netif_rx_request {
  123. uint16_t id; /* Echoed in response message. */
  124. grant_ref_t gref; /* Reference to incoming granted frame */
  125. };
  126. /* Packet data has been validated against protocol checksum. */
  127. #define _XEN_NETRXF_data_validated (0)
  128. #define XEN_NETRXF_data_validated (1U<<_XEN_NETRXF_data_validated)
  129. /* Protocol checksum field is blank in the packet (hardware offload)? */
  130. #define _XEN_NETRXF_csum_blank (1)
  131. #define XEN_NETRXF_csum_blank (1U<<_XEN_NETRXF_csum_blank)
  132. /* Packet continues in the next request descriptor. */
  133. #define _XEN_NETRXF_more_data (2)
  134. #define XEN_NETRXF_more_data (1U<<_XEN_NETRXF_more_data)
  135. /* Packet to be followed by extra descriptor(s). */
  136. #define _XEN_NETRXF_extra_info (3)
  137. #define XEN_NETRXF_extra_info (1U<<_XEN_NETRXF_extra_info)
  138. /* GSO Prefix descriptor. */
  139. #define _XEN_NETRXF_gso_prefix (4)
  140. #define XEN_NETRXF_gso_prefix (1U<<_XEN_NETRXF_gso_prefix)
  141. struct xen_netif_rx_response {
  142. uint16_t id;
  143. uint16_t offset; /* Offset in page of start of received packet */
  144. uint16_t flags; /* XEN_NETRXF_* */
  145. int16_t status; /* -ve: BLKIF_RSP_* ; +ve: Rx'ed pkt size. */
  146. };
  147. /*
  148. * Generate netif ring structures and types.
  149. */
  150. DEFINE_RING_TYPES(xen_netif_tx,
  151. struct xen_netif_tx_request,
  152. struct xen_netif_tx_response);
  153. DEFINE_RING_TYPES(xen_netif_rx,
  154. struct xen_netif_rx_request,
  155. struct xen_netif_rx_response);
  156. #define XEN_NETIF_RSP_DROPPED -2
  157. #define XEN_NETIF_RSP_ERROR -1
  158. #define XEN_NETIF_RSP_OKAY 0
  159. /* No response: used for auxiliary requests (e.g., xen_netif_extra_info). */
  160. #define XEN_NETIF_RSP_NULL 1
  161. #endif