163 lines
5.0 KiB
C
163 lines
5.0 KiB
C
/******************************************************************************
|
|
* netif.h
|
|
*
|
|
* Unified network-device I/O interface for Xen guest OSes.
|
|
*
|
|
* Copyright (c) 2003-2004, Keir Fraser
|
|
*/
|
|
|
|
#ifndef __XEN_PUBLIC_IO_NETIF_H__
|
|
#define __XEN_PUBLIC_IO_NETIF_H__
|
|
|
|
#include "ring.h"
|
|
#include "../grant_table.h"
|
|
|
|
/*
|
|
* Notifications after enqueuing any type of message should be conditional on
|
|
* the appropriate req_event or rsp_event field in the shared ring.
|
|
* If the client sends notification for rx requests then it should specify
|
|
* feature 'feature-rx-notify' via xenbus. Otherwise the backend will assume
|
|
* that it cannot safely queue packets (as it may not be kicked to send them).
|
|
*/
|
|
|
|
/*
|
|
* This is the 'wire' format for packets:
|
|
* Request 1: xen_netif_tx_request -- XEN_NETTXF_* (any flags)
|
|
* [Request 2: xen_netif_extra_info] (only if request 1 has XEN_NETTXF_extra_info)
|
|
* [Request 3: xen_netif_extra_info] (only if request 2 has XEN_NETIF_EXTRA_MORE)
|
|
* Request 4: xen_netif_tx_request -- XEN_NETTXF_more_data
|
|
* Request 5: xen_netif_tx_request -- XEN_NETTXF_more_data
|
|
* ...
|
|
* Request N: xen_netif_tx_request -- 0
|
|
*/
|
|
|
|
/* Protocol checksum field is blank in the packet (hardware offload)? */
|
|
#define _XEN_NETTXF_csum_blank (0)
|
|
#define XEN_NETTXF_csum_blank (1U<<_XEN_NETTXF_csum_blank)
|
|
|
|
/* Packet data has been validated against protocol checksum. */
|
|
#define _XEN_NETTXF_data_validated (1)
|
|
#define XEN_NETTXF_data_validated (1U<<_XEN_NETTXF_data_validated)
|
|
|
|
/* Packet continues in the next request descriptor. */
|
|
#define _XEN_NETTXF_more_data (2)
|
|
#define XEN_NETTXF_more_data (1U<<_XEN_NETTXF_more_data)
|
|
|
|
/* Packet to be followed by extra descriptor(s). */
|
|
#define _XEN_NETTXF_extra_info (3)
|
|
#define XEN_NETTXF_extra_info (1U<<_XEN_NETTXF_extra_info)
|
|
|
|
struct xen_netif_tx_request {
|
|
grant_ref_t gref; /* Reference to buffer page */
|
|
uint16_t offset; /* Offset within buffer page */
|
|
uint16_t flags; /* XEN_NETTXF_* */
|
|
uint16_t id; /* Echoed in response message. */
|
|
uint16_t size; /* Packet size in bytes. */
|
|
};
|
|
|
|
/* Types of xen_netif_extra_info descriptors. */
|
|
#define XEN_NETIF_EXTRA_TYPE_NONE (0) /* Never used - invalid */
|
|
#define XEN_NETIF_EXTRA_TYPE_GSO (1) /* u.gso */
|
|
#define XEN_NETIF_EXTRA_TYPE_MAX (2)
|
|
|
|
/* xen_netif_extra_info flags. */
|
|
#define _XEN_NETIF_EXTRA_FLAG_MORE (0)
|
|
#define XEN_NETIF_EXTRA_FLAG_MORE (1U<<_XEN_NETIF_EXTRA_FLAG_MORE)
|
|
|
|
/* GSO types - only TCPv4 currently supported. */
|
|
#define XEN_NETIF_GSO_TYPE_TCPV4 (1)
|
|
|
|
/*
|
|
* This structure needs to fit within both netif_tx_request and
|
|
* netif_rx_response for compatibility.
|
|
*/
|
|
struct xen_netif_extra_info {
|
|
uint8_t type; /* XEN_NETIF_EXTRA_TYPE_* */
|
|
uint8_t flags; /* XEN_NETIF_EXTRA_FLAG_* */
|
|
|
|
union {
|
|
struct {
|
|
/*
|
|
* Maximum payload size of each segment. For
|
|
* example, for TCP this is just the path MSS.
|
|
*/
|
|
uint16_t size;
|
|
|
|
/*
|
|
* GSO type. This determines the protocol of
|
|
* the packet and any extra features required
|
|
* to segment the packet properly.
|
|
*/
|
|
uint8_t type; /* XEN_NETIF_GSO_TYPE_* */
|
|
|
|
/* Future expansion. */
|
|
uint8_t pad;
|
|
|
|
/*
|
|
* GSO features. This specifies any extra GSO
|
|
* features required to process this packet,
|
|
* such as ECN support for TCPv4.
|
|
*/
|
|
uint16_t features; /* XEN_NETIF_GSO_FEAT_* */
|
|
} gso;
|
|
|
|
uint16_t pad[3];
|
|
} u;
|
|
};
|
|
|
|
struct xen_netif_tx_response {
|
|
uint16_t id;
|
|
int16_t status; /* XEN_NETIF_RSP_* */
|
|
};
|
|
|
|
struct xen_netif_rx_request {
|
|
uint16_t id; /* Echoed in response message. */
|
|
grant_ref_t gref; /* Reference to incoming granted frame */
|
|
};
|
|
|
|
/* Packet data has been validated against protocol checksum. */
|
|
#define _XEN_NETRXF_data_validated (0)
|
|
#define XEN_NETRXF_data_validated (1U<<_XEN_NETRXF_data_validated)
|
|
|
|
/* Protocol checksum field is blank in the packet (hardware offload)? */
|
|
#define _XEN_NETRXF_csum_blank (1)
|
|
#define XEN_NETRXF_csum_blank (1U<<_XEN_NETRXF_csum_blank)
|
|
|
|
/* Packet continues in the next request descriptor. */
|
|
#define _XEN_NETRXF_more_data (2)
|
|
#define XEN_NETRXF_more_data (1U<<_XEN_NETRXF_more_data)
|
|
|
|
/* Packet to be followed by extra descriptor(s). */
|
|
#define _XEN_NETRXF_extra_info (3)
|
|
#define XEN_NETRXF_extra_info (1U<<_XEN_NETRXF_extra_info)
|
|
|
|
/* GSO Prefix descriptor. */
|
|
#define _XEN_NETRXF_gso_prefix (4)
|
|
#define XEN_NETRXF_gso_prefix (1U<<_XEN_NETRXF_gso_prefix)
|
|
|
|
struct xen_netif_rx_response {
|
|
uint16_t id;
|
|
uint16_t offset; /* Offset in page of start of received packet */
|
|
uint16_t flags; /* XEN_NETRXF_* */
|
|
int16_t status; /* -ve: BLKIF_RSP_* ; +ve: Rx'ed pkt size. */
|
|
};
|
|
|
|
/*
|
|
* Generate netif ring structures and types.
|
|
*/
|
|
|
|
DEFINE_RING_TYPES(xen_netif_tx,
|
|
struct xen_netif_tx_request,
|
|
struct xen_netif_tx_response);
|
|
DEFINE_RING_TYPES(xen_netif_rx,
|
|
struct xen_netif_rx_request,
|
|
struct xen_netif_rx_response);
|
|
|
|
#define XEN_NETIF_RSP_DROPPED -2
|
|
#define XEN_NETIF_RSP_ERROR -1
|
|
#define XEN_NETIF_RSP_OKAY 0
|
|
/* No response: used for auxiliary requests (e.g., xen_netif_extra_info). */
|
|
#define XEN_NETIF_RSP_NULL 1
|
|
|
|
#endif
|