blob: a36c87a6623de4f55fdf1504da1798d14c034fa5 [file] [log] [blame]
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -07001/******************************************************************************
2 * netif.h
3 *
4 * Unified network-device I/O interface for Xen guest OSes.
5 *
6 * Copyright (c) 2003-2004, Keir Fraser
7 */
8
9#ifndef __XEN_PUBLIC_IO_NETIF_H__
10#define __XEN_PUBLIC_IO_NETIF_H__
11
12#include "ring.h"
13#include "../grant_table.h"
14
15/*
Wei Liu9832f4a2013-04-22 02:20:42 +000016 * Older implementation of Xen network frontend / backend has an
17 * implicit dependency on the MAX_SKB_FRAGS as the maximum number of
18 * ring slots a skb can use. Netfront / netback may not work as
19 * expected when frontend and backend have different MAX_SKB_FRAGS.
20 *
21 * A better approach is to add mechanism for netfront / netback to
22 * negotiate this value. However we cannot fix all possible
23 * frontends, so we need to define a value which states the minimum
24 * slots backend must support.
25 *
26 * The minimum value derives from older Linux kernel's MAX_SKB_FRAGS
27 * (18), which is proved to work with most frontends. Any new backend
28 * which doesn't negotiate with frontend should expect frontend to
29 * send a valid packet using slots up to this value.
30 */
31#define XEN_NETIF_NR_SLOTS_MIN 18
32
33/*
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -070034 * Notifications after enqueuing any type of message should be conditional on
35 * the appropriate req_event or rsp_event field in the shared ring.
36 * If the client sends notification for rx requests then it should specify
37 * feature 'feature-rx-notify' via xenbus. Otherwise the backend will assume
38 * that it cannot safely queue packets (as it may not be kicked to send them).
39 */
40
41/*
42 * This is the 'wire' format for packets:
Ian Campbellf942dc22011-03-15 00:06:18 +000043 * Request 1: xen_netif_tx_request -- XEN_NETTXF_* (any flags)
44 * [Request 2: xen_netif_extra_info] (only if request 1 has XEN_NETTXF_extra_info)
45 * [Request 3: xen_netif_extra_info] (only if request 2 has XEN_NETIF_EXTRA_MORE)
46 * Request 4: xen_netif_tx_request -- XEN_NETTXF_more_data
47 * Request 5: xen_netif_tx_request -- XEN_NETTXF_more_data
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -070048 * ...
Ian Campbellf942dc22011-03-15 00:06:18 +000049 * Request N: xen_netif_tx_request -- 0
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -070050 */
51
52/* Protocol checksum field is blank in the packet (hardware offload)? */
Ian Campbellf942dc22011-03-15 00:06:18 +000053#define _XEN_NETTXF_csum_blank (0)
54#define XEN_NETTXF_csum_blank (1U<<_XEN_NETTXF_csum_blank)
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -070055
56/* Packet data has been validated against protocol checksum. */
Ian Campbellf942dc22011-03-15 00:06:18 +000057#define _XEN_NETTXF_data_validated (1)
58#define XEN_NETTXF_data_validated (1U<<_XEN_NETTXF_data_validated)
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -070059
60/* Packet continues in the next request descriptor. */
Ian Campbellf942dc22011-03-15 00:06:18 +000061#define _XEN_NETTXF_more_data (2)
62#define XEN_NETTXF_more_data (1U<<_XEN_NETTXF_more_data)
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -070063
64/* Packet to be followed by extra descriptor(s). */
Ian Campbellf942dc22011-03-15 00:06:18 +000065#define _XEN_NETTXF_extra_info (3)
66#define XEN_NETTXF_extra_info (1U<<_XEN_NETTXF_extra_info)
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -070067
68struct xen_netif_tx_request {
69 grant_ref_t gref; /* Reference to buffer page */
70 uint16_t offset; /* Offset within buffer page */
Ian Campbellf942dc22011-03-15 00:06:18 +000071 uint16_t flags; /* XEN_NETTXF_* */
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -070072 uint16_t id; /* Echoed in response message. */
73 uint16_t size; /* Packet size in bytes. */
74};
75
Ian Campbellf942dc22011-03-15 00:06:18 +000076/* Types of xen_netif_extra_info descriptors. */
77#define XEN_NETIF_EXTRA_TYPE_NONE (0) /* Never used - invalid */
78#define XEN_NETIF_EXTRA_TYPE_GSO (1) /* u.gso */
79#define XEN_NETIF_EXTRA_TYPE_MAX (2)
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -070080
Ian Campbellf942dc22011-03-15 00:06:18 +000081/* xen_netif_extra_info flags. */
82#define _XEN_NETIF_EXTRA_FLAG_MORE (0)
83#define XEN_NETIF_EXTRA_FLAG_MORE (1U<<_XEN_NETIF_EXTRA_FLAG_MORE)
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -070084
85/* GSO types - only TCPv4 currently supported. */
Ian Campbellf942dc22011-03-15 00:06:18 +000086#define XEN_NETIF_GSO_TYPE_TCPV4 (1)
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -070087
88/*
89 * This structure needs to fit within both netif_tx_request and
90 * netif_rx_response for compatibility.
91 */
92struct xen_netif_extra_info {
93 uint8_t type; /* XEN_NETIF_EXTRA_TYPE_* */
94 uint8_t flags; /* XEN_NETIF_EXTRA_FLAG_* */
95
96 union {
97 struct {
98 /*
99 * Maximum payload size of each segment. For
100 * example, for TCP this is just the path MSS.
101 */
102 uint16_t size;
103
104 /*
105 * GSO type. This determines the protocol of
106 * the packet and any extra features required
107 * to segment the packet properly.
108 */
109 uint8_t type; /* XEN_NETIF_GSO_TYPE_* */
110
111 /* Future expansion. */
112 uint8_t pad;
113
114 /*
115 * GSO features. This specifies any extra GSO
116 * features required to process this packet,
117 * such as ECN support for TCPv4.
118 */
119 uint16_t features; /* XEN_NETIF_GSO_FEAT_* */
120 } gso;
121
122 uint16_t pad[3];
123 } u;
124};
125
126struct xen_netif_tx_response {
127 uint16_t id;
Ian Campbellf942dc22011-03-15 00:06:18 +0000128 int16_t status; /* XEN_NETIF_RSP_* */
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -0700129};
130
131struct xen_netif_rx_request {
132 uint16_t id; /* Echoed in response message. */
133 grant_ref_t gref; /* Reference to incoming granted frame */
134};
135
136/* Packet data has been validated against protocol checksum. */
Ian Campbellf942dc22011-03-15 00:06:18 +0000137#define _XEN_NETRXF_data_validated (0)
138#define XEN_NETRXF_data_validated (1U<<_XEN_NETRXF_data_validated)
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -0700139
140/* Protocol checksum field is blank in the packet (hardware offload)? */
Ian Campbellf942dc22011-03-15 00:06:18 +0000141#define _XEN_NETRXF_csum_blank (1)
142#define XEN_NETRXF_csum_blank (1U<<_XEN_NETRXF_csum_blank)
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -0700143
144/* Packet continues in the next request descriptor. */
Ian Campbellf942dc22011-03-15 00:06:18 +0000145#define _XEN_NETRXF_more_data (2)
146#define XEN_NETRXF_more_data (1U<<_XEN_NETRXF_more_data)
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -0700147
148/* Packet to be followed by extra descriptor(s). */
Ian Campbellf942dc22011-03-15 00:06:18 +0000149#define _XEN_NETRXF_extra_info (3)
150#define XEN_NETRXF_extra_info (1U<<_XEN_NETRXF_extra_info)
151
152/* GSO Prefix descriptor. */
153#define _XEN_NETRXF_gso_prefix (4)
154#define XEN_NETRXF_gso_prefix (1U<<_XEN_NETRXF_gso_prefix)
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -0700155
156struct xen_netif_rx_response {
157 uint16_t id;
158 uint16_t offset; /* Offset in page of start of received packet */
Ian Campbellf942dc22011-03-15 00:06:18 +0000159 uint16_t flags; /* XEN_NETRXF_* */
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -0700160 int16_t status; /* -ve: BLKIF_RSP_* ; +ve: Rx'ed pkt size. */
161};
162
163/*
164 * Generate netif ring structures and types.
165 */
166
167DEFINE_RING_TYPES(xen_netif_tx,
168 struct xen_netif_tx_request,
169 struct xen_netif_tx_response);
170DEFINE_RING_TYPES(xen_netif_rx,
171 struct xen_netif_rx_request,
172 struct xen_netif_rx_response);
173
Ian Campbellf942dc22011-03-15 00:06:18 +0000174#define XEN_NETIF_RSP_DROPPED -2
175#define XEN_NETIF_RSP_ERROR -1
176#define XEN_NETIF_RSP_OKAY 0
177/* No response: used for auxiliary requests (e.g., xen_netif_extra_info). */
178#define XEN_NETIF_RSP_NULL 1
Jeremy Fitzhardingea42089d2007-07-17 18:37:04 -0700179
180#endif