summaryrefslogtreecommitdiff
path: root/datapath-windows/ovsext/BufferMgmt.c
diff options
context:
space:
mode:
authorSairam Venugopal <vsairam@vmware.com>2016-02-29 11:42:12 -0800
committerBen Pfaff <blp@ovn.org>2016-03-14 20:38:09 -0700
commit884d541fdffe44714eb9381fb92f8f4e1cfcf668 (patch)
tree72d02f8c19d49f5e01b2c517ca5d3277df292fd4 /datapath-windows/ovsext/BufferMgmt.c
parentb6446b9fa0fd0a41b5ec28fbff96eab7128c05a9 (diff)
downloadopenvswitch-884d541fdffe44714eb9381fb92f8f4e1cfcf668.tar.gz
datapath-windows: Support for IPv6 in TCP segmentation
When a packet which needs segmentation is received, the header for each segment is being calculated, i.e. IP length, checksum, TCP seq, TCP checksum. The problem with the current code is that it wrongly assumes that the Ethernet frame payload is always an IPv4 packet. This patch checks the EtherType field of the Ethernet frame to see which protocol is encapsulated in its payload, IPv4 or IPv6, and calculates the segment's header accordingly. Signed-off-by: Sorin Vinturis <svinturis@cloudbasesolutions.com> Co-authored-by: Sairam Venugopal <vsairam@vmware.com> Reported-by: Sairam Venugopal <vsairam@vmware.com> Reported-at: https://github.com/openvswitch/ovs-issues/issues/105 Acked-by: Alin Gabriel Serdean <aserdean@cloudbasesolutions.com> Signed-off-by: Ben Pfaff <blp@ovn.org>
Diffstat (limited to 'datapath-windows/ovsext/BufferMgmt.c')
-rw-r--r--datapath-windows/ovsext/BufferMgmt.c119
1 files changed, 80 insertions, 39 deletions
diff --git a/datapath-windows/ovsext/BufferMgmt.c b/datapath-windows/ovsext/BufferMgmt.c
index 3189e9b61..00db31f04 100644
--- a/datapath-windows/ovsext/BufferMgmt.c
+++ b/datapath-windows/ovsext/BufferMgmt.c
@@ -1122,11 +1122,10 @@ static NDIS_STATUS
FixSegmentHeader(PNET_BUFFER nb, UINT16 segmentSize, UINT32 seqNumber,
BOOLEAN lastPacket, UINT16 packetCounter)
{
- EthHdr *dstEth;
- IPHdr *dstIP;
- TCPHdr *dstTCP;
- PMDL mdl;
- PUINT8 bufferStart;
+ EthHdr *dstEth = NULL;
+ TCPHdr *dstTCP = NULL;
+ PMDL mdl = NULL;
+ PUINT8 bufferStart = NULL;
mdl = NET_BUFFER_FIRST_MDL(nb);
@@ -1135,44 +1134,86 @@ FixSegmentHeader(PNET_BUFFER nb, UINT16 segmentSize, UINT32 seqNumber,
return NDIS_STATUS_RESOURCES;
}
dstEth = (EthHdr *)(bufferStart + NET_BUFFER_CURRENT_MDL_OFFSET(nb));
- ASSERT((INT)MmGetMdlByteCount(mdl) - NET_BUFFER_CURRENT_MDL_OFFSET(nb)
- >= sizeof(EthHdr) + sizeof(IPHdr) + sizeof(TCPHdr));
- dstIP = (IPHdr *)((PCHAR)dstEth + sizeof *dstEth);
- dstTCP = (TCPHdr *)((PCHAR)dstIP + dstIP->ihl * 4);
- ASSERT((INT)MmGetMdlByteCount(mdl) - NET_BUFFER_CURRENT_MDL_OFFSET(nb)
- >= sizeof(EthHdr) + dstIP->ihl * 4 + TCP_HDR_LEN(dstTCP));
-
- /* Fix IP length and checksum */
- ASSERT(dstIP->protocol == IPPROTO_TCP);
- dstIP->tot_len = htons(segmentSize + dstIP->ihl * 4 + TCP_HDR_LEN(dstTCP));
- dstIP->id += packetCounter;
- dstIP->check = 0;
- dstIP->check = IPChecksum((UINT8 *)dstIP, dstIP->ihl * 4, 0);
-
- /* Fix TCP checksum */
- dstTCP->seq = htonl(seqNumber);
- /*
- * Set the TCP FIN and PSH bit only for the last packet
- * More information can be found under:
- * https://msdn.microsoft.com/en-us/library/windows/hardware/ff568840%28v=vs.85%29.aspx
- */
- if (dstTCP->fin) {
- dstTCP->fin = lastPacket;
+ switch (dstEth->Type) {
+ case ETH_TYPE_IPV4_NBO:
+ {
+ IPHdr *dstIP = NULL;
+
+ ASSERT((INT)MmGetMdlByteCount(mdl) - NET_BUFFER_CURRENT_MDL_OFFSET(nb)
+ >= sizeof(EthHdr) + sizeof(IPHdr) + sizeof(TCPHdr));
+ dstIP = (IPHdr *)((PCHAR)dstEth + sizeof(*dstEth));
+ dstTCP = (TCPHdr *)((PCHAR)dstIP + dstIP->ihl * 4);
+ ASSERT((INT)MmGetMdlByteCount(mdl) - NET_BUFFER_CURRENT_MDL_OFFSET(nb)
+ >= sizeof(EthHdr) + dstIP->ihl * 4 + TCP_HDR_LEN(dstTCP));
+
+ /* Fix IP length and checksum */
+ ASSERT(dstIP->protocol == IPPROTO_TCP);
+ dstIP->tot_len = htons(segmentSize + dstIP->ihl * 4 + TCP_HDR_LEN(dstTCP));
+ dstIP->id += packetCounter;
+ dstIP->check = 0;
+ dstIP->check = IPChecksum((UINT8 *)dstIP, dstIP->ihl * 4, 0);
+ dstTCP->seq = htonl(seqNumber);
+
+ /*
+ * Set the TCP FIN and PSH bit only for the last packet
+ * More information can be found under:
+ * https://msdn.microsoft.com/en-us/library/windows/hardware/ff568840%28v=vs.85%29.aspx
+ */
+ if (dstTCP->fin) {
+ dstTCP->fin = lastPacket;
+ }
+ if (dstTCP->psh) {
+ dstTCP->psh = lastPacket;
+ }
+ UINT16 csumLength = segmentSize + TCP_HDR_LEN(dstTCP);
+ dstTCP->check = IPPseudoChecksum(&dstIP->saddr,
+ &dstIP->daddr,
+ IPPROTO_TCP,
+ csumLength);
+ dstTCP->check = CalculateChecksumNB(nb,
+ csumLength,
+ sizeof(*dstEth) + dstIP->ihl * 4);
+ break;
+ }
+ case ETH_TYPE_IPV6_NBO:
+ {
+ IPv6Hdr *dstIP = NULL;
+
+ ASSERT((INT)MmGetMdlByteCount(mdl) - NET_BUFFER_CURRENT_MDL_OFFSET(nb)
+ >= sizeof(EthHdr) + sizeof(IPv6Hdr) + sizeof(TCPHdr));
+ dstIP = (IPv6Hdr *)((PCHAR)dstEth + sizeof(*dstEth));
+ dstTCP = (TCPHdr *)((PCHAR)dstIP + sizeof(IPv6Hdr));
+ ASSERT((INT)MmGetMdlByteCount(mdl) - NET_BUFFER_CURRENT_MDL_OFFSET(nb)
+ >= sizeof(EthHdr) + sizeof(IPv6Hdr) + TCP_HDR_LEN(dstTCP));
+
+ /* Fix IP length */
+ ASSERT(dstIP->nexthdr == IPPROTO_TCP);
+ dstIP->payload_len = htons(segmentSize + sizeof(IPv6Hdr) + TCP_HDR_LEN(dstTCP));
+
+ dstTCP->seq = htonl(seqNumber);
+ if (dstTCP->fin) {
+ dstTCP->fin = lastPacket;
+ }
+ if (dstTCP->psh) {
+ dstTCP->psh = lastPacket;
+ }
+
+ UINT16 csumLength = segmentSize + TCP_HDR_LEN(dstTCP);
+ dstTCP->check = IPv6PseudoChecksum((UINT32*)&dstIP->saddr,
+ (UINT32*)&dstIP->daddr,
+ IPPROTO_TCP,
+ csumLength);
+ dstTCP->check = CalculateChecksumNB(nb,
+ csumLength,
+ sizeof(*dstEth) + sizeof(IPv6Hdr));
+ break;
}
- if (dstTCP->psh) {
- dstTCP->psh = lastPacket;
+ default:
+ OVS_LOG_ERROR("Invalid eth type: %d\n", dstEth->Type);
+ ASSERT(! "Invalid eth type");
}
- UINT16 csumLength = segmentSize + TCP_HDR_LEN(dstTCP);
- dstTCP->check = IPPseudoChecksum(&dstIP->saddr,
- &dstIP->daddr,
- IPPROTO_TCP,
- csumLength);
- dstTCP->check = CalculateChecksumNB(nb,
- csumLength,
- sizeof *dstEth + dstIP->ihl * 4);
-
return STATUS_SUCCESS;
}