npf_mbuf.c revision 1.22 1 1.1 rmind /*-
2 1.9 rmind * Copyright (c) 2009-2012 The NetBSD Foundation, Inc.
3 1.1 rmind * All rights reserved.
4 1.1 rmind *
5 1.1 rmind * This material is based upon work partially supported by The
6 1.1 rmind * NetBSD Foundation under a contract with Mindaugas Rasiukevicius.
7 1.1 rmind *
8 1.1 rmind * Redistribution and use in source and binary forms, with or without
9 1.1 rmind * modification, are permitted provided that the following conditions
10 1.1 rmind * are met:
11 1.1 rmind * 1. Redistributions of source code must retain the above copyright
12 1.1 rmind * notice, this list of conditions and the following disclaimer.
13 1.1 rmind * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 rmind * notice, this list of conditions and the following disclaimer in the
15 1.1 rmind * documentation and/or other materials provided with the distribution.
16 1.1 rmind *
17 1.1 rmind * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
18 1.1 rmind * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
19 1.1 rmind * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
20 1.1 rmind * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
21 1.1 rmind * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
22 1.1 rmind * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
23 1.1 rmind * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
24 1.1 rmind * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
25 1.1 rmind * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
26 1.1 rmind * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27 1.1 rmind * POSSIBILITY OF SUCH DAMAGE.
28 1.1 rmind */
29 1.1 rmind
30 1.1 rmind /*
31 1.1 rmind * NPF network buffer management interface.
32 1.1 rmind *
33 1.1 rmind * Network buffer in NetBSD is mbuf. Internal mbuf structures are
34 1.1 rmind * abstracted within this source.
35 1.1 rmind */
36 1.1 rmind
37 1.18 christos #ifdef _KERNEL
38 1.1 rmind #include <sys/cdefs.h>
39 1.22 maxv __KERNEL_RCSID(0, "$NetBSD: npf_mbuf.c,v 1.22 2018/11/15 10:23:56 maxv Exp $");
40 1.1 rmind
41 1.1 rmind #include <sys/param.h>
42 1.1 rmind #include <sys/mbuf.h>
43 1.19 maxv #include <netinet/in_offload.h>
44 1.18 christos #endif
45 1.1 rmind
46 1.1 rmind #include "npf_impl.h"
47 1.1 rmind
48 1.20 maxv #ifdef _KERNEL
49 1.20 maxv #ifdef INET6
50 1.20 maxv #include <netinet6/in6.h>
51 1.20 maxv #include <netinet6/in6_offload.h>
52 1.20 maxv #endif
53 1.20 maxv #endif
54 1.20 maxv
55 1.18 christos #if defined(_NPF_STANDALONE)
56 1.18 christos #define m_length(m) (nbuf)->nb_mops->getchainlen(m)
57 1.18 christos #define m_buflen(m) (nbuf)->nb_mops->getlen(m)
58 1.18 christos #define m_next_ptr(m) (nbuf)->nb_mops->getnext(m)
59 1.18 christos #define m_ensure_contig(m,t) (nbuf)->nb_mops->ensure_contig((m), (t))
60 1.18 christos #define m_makewritable(m,o,l,f) (nbuf)->nb_mops->ensure_writable((m), (o+l))
61 1.18 christos #define mtod(m,t) ((t)((nbuf)->nb_mops->getdata(m)))
62 1.18 christos #define m_flags_p(m,f) true
63 1.18 christos #else
64 1.18 christos #define m_next_ptr(m) (m)->m_next
65 1.18 christos #define m_buflen(m) (m)->m_len
66 1.18 christos #define m_flags_p(m,f) (((m)->m_flags & (f)) != 0)
67 1.18 christos #endif
68 1.18 christos
69 1.9 rmind #define NBUF_ENSURE_ALIGN (MAX(COHERENCY_UNIT, 64))
70 1.9 rmind #define NBUF_ENSURE_MASK (NBUF_ENSURE_ALIGN - 1)
71 1.9 rmind #define NBUF_ENSURE_ROUNDUP(x) (((x) + NBUF_ENSURE_ALIGN) & ~NBUF_ENSURE_MASK)
72 1.9 rmind
73 1.9 rmind void
74 1.18 christos nbuf_init(npf_t *npf, nbuf_t *nbuf, struct mbuf *m, const ifnet_t *ifp)
75 1.9 rmind {
76 1.18 christos u_int ifid = npf_ifmap_getid(npf, ifp);
77 1.12 rmind
78 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
79 1.18 christos nbuf->nb_mops = npf->mbufops;
80 1.9 rmind
81 1.9 rmind nbuf->nb_mbuf0 = m;
82 1.9 rmind nbuf->nb_ifp = ifp;
83 1.14 rmind nbuf->nb_ifid = ifid;
84 1.9 rmind nbuf_reset(nbuf);
85 1.9 rmind }
86 1.9 rmind
87 1.9 rmind void
88 1.9 rmind nbuf_reset(nbuf_t *nbuf)
89 1.9 rmind {
90 1.9 rmind struct mbuf *m = nbuf->nb_mbuf0;
91 1.9 rmind
92 1.9 rmind nbuf->nb_mbuf = m;
93 1.9 rmind nbuf->nb_nptr = mtod(m, void *);
94 1.9 rmind }
95 1.9 rmind
96 1.1 rmind void *
97 1.1 rmind nbuf_dataptr(nbuf_t *nbuf)
98 1.1 rmind {
99 1.9 rmind KASSERT(nbuf->nb_nptr);
100 1.9 rmind return nbuf->nb_nptr;
101 1.9 rmind }
102 1.9 rmind
103 1.9 rmind size_t
104 1.9 rmind nbuf_offset(const nbuf_t *nbuf)
105 1.9 rmind {
106 1.9 rmind const struct mbuf *m = nbuf->nb_mbuf;
107 1.9 rmind const u_int off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t);
108 1.9 rmind const int poff = m_length(nbuf->nb_mbuf0) - m_length(m) + off;
109 1.9 rmind
110 1.9 rmind return poff;
111 1.9 rmind }
112 1.9 rmind
113 1.9 rmind struct mbuf *
114 1.9 rmind nbuf_head_mbuf(nbuf_t *nbuf)
115 1.9 rmind {
116 1.9 rmind return nbuf->nb_mbuf0;
117 1.9 rmind }
118 1.1 rmind
119 1.9 rmind bool
120 1.9 rmind nbuf_flag_p(const nbuf_t *nbuf, int flag)
121 1.9 rmind {
122 1.9 rmind return (nbuf->nb_flags & flag) != 0;
123 1.9 rmind }
124 1.9 rmind
125 1.9 rmind void
126 1.9 rmind nbuf_unset_flag(nbuf_t *nbuf, int flag)
127 1.9 rmind {
128 1.9 rmind nbuf->nb_flags &= ~flag;
129 1.1 rmind }
130 1.1 rmind
131 1.1 rmind /*
132 1.9 rmind * nbuf_advance: advance in nbuf or chain by specified amount of bytes and,
133 1.9 rmind * if requested, ensure that the area *after* advance is contiguous.
134 1.1 rmind *
135 1.9 rmind * => Returns new pointer to data in nbuf or NULL if offset is invalid.
136 1.9 rmind * => Current nbuf and the offset is stored in the nbuf metadata.
137 1.1 rmind */
138 1.1 rmind void *
139 1.9 rmind nbuf_advance(nbuf_t *nbuf, size_t len, size_t ensure)
140 1.1 rmind {
141 1.9 rmind struct mbuf *m = nbuf->nb_mbuf;
142 1.1 rmind u_int off, wmark;
143 1.1 rmind uint8_t *d;
144 1.1 rmind
145 1.1 rmind /* Offset with amount to advance. */
146 1.9 rmind off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t) + len;
147 1.18 christos wmark = m_buflen(m);
148 1.1 rmind
149 1.1 rmind /* Find the mbuf according to offset. */
150 1.1 rmind while (__predict_false(wmark <= off)) {
151 1.18 christos m = m_next_ptr(m);
152 1.1 rmind if (__predict_false(m == NULL)) {
153 1.1 rmind /*
154 1.9 rmind * If end of the chain, then the offset is
155 1.1 rmind * higher than packet length.
156 1.1 rmind */
157 1.1 rmind return NULL;
158 1.1 rmind }
159 1.18 christos wmark += m_buflen(m);
160 1.1 rmind }
161 1.9 rmind KASSERT(off < m_length(nbuf->nb_mbuf0));
162 1.1 rmind
163 1.1 rmind /* Offset in mbuf data. */
164 1.1 rmind d = mtod(m, uint8_t *);
165 1.18 christos KASSERT(off >= (wmark - m_buflen(m)));
166 1.18 christos d += (off - (wmark - m_buflen(m)));
167 1.1 rmind
168 1.9 rmind nbuf->nb_mbuf = m;
169 1.9 rmind nbuf->nb_nptr = d;
170 1.9 rmind
171 1.9 rmind if (ensure) {
172 1.9 rmind /* Ensure contiguousness (may change nbuf chain). */
173 1.9 rmind d = nbuf_ensure_contig(nbuf, ensure);
174 1.9 rmind }
175 1.1 rmind return d;
176 1.1 rmind }
177 1.1 rmind
178 1.1 rmind /*
179 1.9 rmind * nbuf_ensure_contig: check whether the specified length from the current
180 1.9 rmind * point in the nbuf is contiguous. If not, rearrange the chain to be so.
181 1.1 rmind *
182 1.9 rmind * => Returns pointer to the data at the current offset in the buffer.
183 1.9 rmind * => Returns NULL on failure and nbuf becomes invalid.
184 1.1 rmind */
185 1.9 rmind void *
186 1.9 rmind nbuf_ensure_contig(nbuf_t *nbuf, size_t len)
187 1.1 rmind {
188 1.10 rmind const struct mbuf * const n = nbuf->nb_mbuf;
189 1.10 rmind const size_t off = (uintptr_t)nbuf->nb_nptr - mtod(n, uintptr_t);
190 1.9 rmind
191 1.18 christos KASSERT(off <= m_buflen(n));
192 1.9 rmind
193 1.18 christos if (__predict_false(m_buflen(n) < (off + len))) {
194 1.10 rmind struct mbuf *m = nbuf->nb_mbuf0;
195 1.10 rmind const size_t foff = nbuf_offset(nbuf);
196 1.10 rmind const size_t plen = m_length(m);
197 1.18 christos const size_t mlen = m_buflen(m);
198 1.10 rmind size_t target;
199 1.10 rmind bool success;
200 1.9 rmind
201 1.18 christos //npf_stats_inc(npf, NPF_STAT_NBUF_NONCONTIG);
202 1.9 rmind
203 1.9 rmind /* Attempt to round-up to NBUF_ENSURE_ALIGN bytes. */
204 1.10 rmind if ((target = NBUF_ENSURE_ROUNDUP(foff + len)) > plen) {
205 1.10 rmind target = foff + len;
206 1.9 rmind }
207 1.1 rmind
208 1.9 rmind /* Rearrange the chain to be contiguous. */
209 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
210 1.10 rmind success = m_ensure_contig(&m, target);
211 1.10 rmind KASSERT(m != NULL);
212 1.10 rmind
213 1.10 rmind /* If no change in the chain: return what we have. */
214 1.18 christos if (m == nbuf->nb_mbuf0 && m_buflen(m) == mlen) {
215 1.10 rmind return success ? nbuf->nb_nptr : NULL;
216 1.9 rmind }
217 1.1 rmind
218 1.9 rmind /*
219 1.10 rmind * The mbuf chain was re-arranged. Update the pointers
220 1.10 rmind * accordingly and indicate that the references to the data
221 1.10 rmind * might need a reset.
222 1.9 rmind */
223 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
224 1.10 rmind nbuf->nb_mbuf0 = m;
225 1.10 rmind nbuf->nb_mbuf = m;
226 1.10 rmind
227 1.18 christos KASSERT(foff < m_buflen(m) && foff < m_length(m));
228 1.10 rmind nbuf->nb_nptr = mtod(m, uint8_t *) + foff;
229 1.10 rmind nbuf->nb_flags |= NBUF_DATAREF_RESET;
230 1.10 rmind
231 1.10 rmind if (!success) {
232 1.18 christos //npf_stats_inc(npf, NPF_STAT_NBUF_CONTIG_FAIL);
233 1.10 rmind return NULL;
234 1.1 rmind }
235 1.1 rmind }
236 1.9 rmind return nbuf->nb_nptr;
237 1.1 rmind }
238 1.1 rmind
239 1.9 rmind void *
240 1.9 rmind nbuf_ensure_writable(nbuf_t *nbuf, size_t len)
241 1.1 rmind {
242 1.9 rmind struct mbuf *m = nbuf->nb_mbuf;
243 1.9 rmind const u_int off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t);
244 1.9 rmind const int tlen = off + len;
245 1.9 rmind bool head_buf;
246 1.1 rmind
247 1.9 rmind KASSERT(off < m_length(nbuf->nb_mbuf0));
248 1.1 rmind
249 1.9 rmind if (!M_UNWRITABLE(m, tlen)) {
250 1.9 rmind return nbuf->nb_nptr;
251 1.9 rmind }
252 1.9 rmind head_buf = (nbuf->nb_mbuf0 == m);
253 1.9 rmind if (m_makewritable(&m, 0, tlen, M_NOWAIT)) {
254 1.9 rmind memset(nbuf, 0, sizeof(nbuf_t));
255 1.9 rmind return NULL;
256 1.9 rmind }
257 1.9 rmind if (head_buf) {
258 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
259 1.9 rmind KASSERT(off < m_length(m));
260 1.9 rmind nbuf->nb_mbuf0 = m;
261 1.9 rmind }
262 1.9 rmind nbuf->nb_mbuf = m;
263 1.9 rmind nbuf->nb_nptr = mtod(m, uint8_t *) + off;
264 1.1 rmind
265 1.9 rmind return nbuf->nb_nptr;
266 1.1 rmind }
267 1.1 rmind
268 1.9 rmind bool
269 1.9 rmind nbuf_cksum_barrier(nbuf_t *nbuf, int di)
270 1.3 rmind {
271 1.18 christos #ifdef _KERNEL
272 1.9 rmind struct mbuf *m;
273 1.3 rmind
274 1.9 rmind if (di != PFIL_OUT) {
275 1.9 rmind return false;
276 1.5 rmind }
277 1.9 rmind m = nbuf->nb_mbuf0;
278 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
279 1.8 rmind
280 1.8 rmind if (m->m_pkthdr.csum_flags & (M_CSUM_TCPv4 | M_CSUM_UDPv4)) {
281 1.19 maxv in_undefer_cksum_tcpudp(m);
282 1.8 rmind m->m_pkthdr.csum_flags &= ~(M_CSUM_TCPv4 | M_CSUM_UDPv4);
283 1.9 rmind return true;
284 1.8 rmind }
285 1.16 mrg #ifdef INET6
286 1.15 mlelstv if (m->m_pkthdr.csum_flags & (M_CSUM_TCPv6 | M_CSUM_UDPv6)) {
287 1.20 maxv in6_undefer_cksum_tcpudp(m);
288 1.15 mlelstv m->m_pkthdr.csum_flags &= ~(M_CSUM_TCPv6 | M_CSUM_UDPv6);
289 1.15 mlelstv return true;
290 1.15 mlelstv }
291 1.16 mrg #endif
292 1.18 christos #else
293 1.18 christos (void)nbuf; (void)di;
294 1.18 christos #endif
295 1.9 rmind return false;
296 1.8 rmind }
297 1.8 rmind
298 1.5 rmind /*
299 1.1 rmind * nbuf_add_tag: add a tag to specified network buffer.
300 1.1 rmind *
301 1.9 rmind * => Returns 0 on success or errno on failure.
302 1.1 rmind */
303 1.1 rmind int
304 1.17 rmind nbuf_add_tag(nbuf_t *nbuf, uint32_t val)
305 1.1 rmind {
306 1.18 christos #ifdef _KERNEL
307 1.9 rmind struct mbuf *m = nbuf->nb_mbuf0;
308 1.1 rmind struct m_tag *mt;
309 1.1 rmind uint32_t *dat;
310 1.1 rmind
311 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
312 1.9 rmind
313 1.1 rmind mt = m_tag_get(PACKET_TAG_NPF, sizeof(uint32_t), M_NOWAIT);
314 1.9 rmind if (mt == NULL) {
315 1.1 rmind return ENOMEM;
316 1.1 rmind }
317 1.1 rmind dat = (uint32_t *)(mt + 1);
318 1.1 rmind *dat = val;
319 1.1 rmind m_tag_prepend(m, mt);
320 1.1 rmind return 0;
321 1.18 christos #else
322 1.18 christos (void)nbuf; (void)val;
323 1.18 christos return ENOTSUP;
324 1.18 christos #endif
325 1.1 rmind }
326 1.1 rmind
327 1.1 rmind /*
328 1.1 rmind * nbuf_find_tag: find a tag in specified network buffer.
329 1.1 rmind *
330 1.9 rmind * => Returns 0 on success or errno on failure.
331 1.1 rmind */
332 1.1 rmind int
333 1.17 rmind nbuf_find_tag(nbuf_t *nbuf, uint32_t *val)
334 1.1 rmind {
335 1.18 christos #ifdef _KERNEL
336 1.9 rmind struct mbuf *m = nbuf->nb_mbuf0;
337 1.1 rmind struct m_tag *mt;
338 1.1 rmind
339 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
340 1.9 rmind
341 1.22 maxv mt = m_tag_find(m, PACKET_TAG_NPF);
342 1.9 rmind if (mt == NULL) {
343 1.1 rmind return EINVAL;
344 1.1 rmind }
345 1.17 rmind *val = *(uint32_t *)(mt + 1);
346 1.1 rmind return 0;
347 1.18 christos #else
348 1.18 christos (void)nbuf; (void)val;
349 1.18 christos return ENOTSUP;
350 1.18 christos #endif
351 1.1 rmind }
352