npf_mbuf.c revision 1.24 1 1.1 rmind /*-
2 1.24 rmind * Copyright (c) 2009-2020 The NetBSD Foundation, Inc.
3 1.1 rmind * All rights reserved.
4 1.1 rmind *
5 1.1 rmind * This material is based upon work partially supported by The
6 1.1 rmind * NetBSD Foundation under a contract with Mindaugas Rasiukevicius.
7 1.1 rmind *
8 1.1 rmind * Redistribution and use in source and binary forms, with or without
9 1.1 rmind * modification, are permitted provided that the following conditions
10 1.1 rmind * are met:
11 1.1 rmind * 1. Redistributions of source code must retain the above copyright
12 1.1 rmind * notice, this list of conditions and the following disclaimer.
13 1.1 rmind * 2. Redistributions in binary form must reproduce the above copyright
14 1.1 rmind * notice, this list of conditions and the following disclaimer in the
15 1.1 rmind * documentation and/or other materials provided with the distribution.
16 1.1 rmind *
17 1.1 rmind * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
18 1.1 rmind * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
19 1.1 rmind * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
20 1.1 rmind * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
21 1.1 rmind * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
22 1.1 rmind * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
23 1.1 rmind * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
24 1.1 rmind * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
25 1.1 rmind * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
26 1.1 rmind * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
27 1.1 rmind * POSSIBILITY OF SUCH DAMAGE.
28 1.1 rmind */
29 1.1 rmind
30 1.1 rmind /*
31 1.1 rmind * NPF network buffer management interface.
32 1.1 rmind *
33 1.1 rmind * Network buffer in NetBSD is mbuf. Internal mbuf structures are
34 1.1 rmind * abstracted within this source.
35 1.1 rmind */
36 1.1 rmind
37 1.18 christos #ifdef _KERNEL
38 1.1 rmind #include <sys/cdefs.h>
39 1.24 rmind __KERNEL_RCSID(0, "$NetBSD: npf_mbuf.c,v 1.24 2020/05/30 14:16:56 rmind Exp $");
40 1.1 rmind
41 1.1 rmind #include <sys/param.h>
42 1.1 rmind #include <sys/mbuf.h>
43 1.19 maxv #include <netinet/in_offload.h>
44 1.18 christos #endif
45 1.1 rmind
46 1.1 rmind #include "npf_impl.h"
47 1.1 rmind
48 1.20 maxv #ifdef _KERNEL
49 1.20 maxv #ifdef INET6
50 1.20 maxv #include <netinet6/in6.h>
51 1.20 maxv #include <netinet6/in6_offload.h>
52 1.20 maxv #endif
53 1.20 maxv #endif
54 1.20 maxv
55 1.18 christos #if defined(_NPF_STANDALONE)
56 1.18 christos #define m_length(m) (nbuf)->nb_mops->getchainlen(m)
57 1.18 christos #define m_buflen(m) (nbuf)->nb_mops->getlen(m)
58 1.18 christos #define m_next_ptr(m) (nbuf)->nb_mops->getnext(m)
59 1.18 christos #define m_ensure_contig(m,t) (nbuf)->nb_mops->ensure_contig((m), (t))
60 1.18 christos #define m_makewritable(m,o,l,f) (nbuf)->nb_mops->ensure_writable((m), (o+l))
61 1.18 christos #define mtod(m,t) ((t)((nbuf)->nb_mops->getdata(m)))
62 1.18 christos #define m_flags_p(m,f) true
63 1.24 rmind #define M_UNWRITABLE(m, l) false
64 1.18 christos #else
65 1.18 christos #define m_next_ptr(m) (m)->m_next
66 1.23 christos #define m_buflen(m) ((size_t)(m)->m_len)
67 1.18 christos #define m_flags_p(m,f) (((m)->m_flags & (f)) != 0)
68 1.18 christos #endif
69 1.18 christos
70 1.9 rmind #define NBUF_ENSURE_ALIGN (MAX(COHERENCY_UNIT, 64))
71 1.9 rmind #define NBUF_ENSURE_MASK (NBUF_ENSURE_ALIGN - 1)
72 1.9 rmind #define NBUF_ENSURE_ROUNDUP(x) (((x) + NBUF_ENSURE_ALIGN) & ~NBUF_ENSURE_MASK)
73 1.9 rmind
74 1.9 rmind void
75 1.18 christos nbuf_init(npf_t *npf, nbuf_t *nbuf, struct mbuf *m, const ifnet_t *ifp)
76 1.9 rmind {
77 1.24 rmind unsigned ifid = npf_ifmap_getid(npf, ifp);
78 1.12 rmind
79 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
80 1.18 christos nbuf->nb_mops = npf->mbufops;
81 1.9 rmind
82 1.9 rmind nbuf->nb_mbuf0 = m;
83 1.9 rmind nbuf->nb_ifp = ifp;
84 1.14 rmind nbuf->nb_ifid = ifid;
85 1.9 rmind nbuf_reset(nbuf);
86 1.9 rmind }
87 1.9 rmind
88 1.9 rmind void
89 1.9 rmind nbuf_reset(nbuf_t *nbuf)
90 1.9 rmind {
91 1.9 rmind struct mbuf *m = nbuf->nb_mbuf0;
92 1.9 rmind
93 1.9 rmind nbuf->nb_mbuf = m;
94 1.9 rmind nbuf->nb_nptr = mtod(m, void *);
95 1.9 rmind }
96 1.9 rmind
97 1.1 rmind void *
98 1.1 rmind nbuf_dataptr(nbuf_t *nbuf)
99 1.1 rmind {
100 1.9 rmind KASSERT(nbuf->nb_nptr);
101 1.9 rmind return nbuf->nb_nptr;
102 1.9 rmind }
103 1.9 rmind
104 1.9 rmind size_t
105 1.9 rmind nbuf_offset(const nbuf_t *nbuf)
106 1.9 rmind {
107 1.9 rmind const struct mbuf *m = nbuf->nb_mbuf;
108 1.24 rmind const unsigned off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t);
109 1.9 rmind const int poff = m_length(nbuf->nb_mbuf0) - m_length(m) + off;
110 1.9 rmind
111 1.9 rmind return poff;
112 1.9 rmind }
113 1.9 rmind
114 1.9 rmind struct mbuf *
115 1.9 rmind nbuf_head_mbuf(nbuf_t *nbuf)
116 1.9 rmind {
117 1.9 rmind return nbuf->nb_mbuf0;
118 1.9 rmind }
119 1.1 rmind
120 1.9 rmind bool
121 1.9 rmind nbuf_flag_p(const nbuf_t *nbuf, int flag)
122 1.9 rmind {
123 1.9 rmind return (nbuf->nb_flags & flag) != 0;
124 1.9 rmind }
125 1.9 rmind
126 1.9 rmind void
127 1.9 rmind nbuf_unset_flag(nbuf_t *nbuf, int flag)
128 1.9 rmind {
129 1.9 rmind nbuf->nb_flags &= ~flag;
130 1.1 rmind }
131 1.1 rmind
132 1.1 rmind /*
133 1.9 rmind * nbuf_advance: advance in nbuf or chain by specified amount of bytes and,
134 1.9 rmind * if requested, ensure that the area *after* advance is contiguous.
135 1.1 rmind *
136 1.9 rmind * => Returns new pointer to data in nbuf or NULL if offset is invalid.
137 1.9 rmind * => Current nbuf and the offset is stored in the nbuf metadata.
138 1.1 rmind */
139 1.1 rmind void *
140 1.9 rmind nbuf_advance(nbuf_t *nbuf, size_t len, size_t ensure)
141 1.1 rmind {
142 1.9 rmind struct mbuf *m = nbuf->nb_mbuf;
143 1.24 rmind unsigned off, wmark;
144 1.1 rmind uint8_t *d;
145 1.1 rmind
146 1.1 rmind /* Offset with amount to advance. */
147 1.9 rmind off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t) + len;
148 1.18 christos wmark = m_buflen(m);
149 1.1 rmind
150 1.1 rmind /* Find the mbuf according to offset. */
151 1.1 rmind while (__predict_false(wmark <= off)) {
152 1.18 christos m = m_next_ptr(m);
153 1.1 rmind if (__predict_false(m == NULL)) {
154 1.1 rmind /*
155 1.9 rmind * If end of the chain, then the offset is
156 1.1 rmind * higher than packet length.
157 1.1 rmind */
158 1.1 rmind return NULL;
159 1.1 rmind }
160 1.18 christos wmark += m_buflen(m);
161 1.1 rmind }
162 1.9 rmind KASSERT(off < m_length(nbuf->nb_mbuf0));
163 1.1 rmind
164 1.1 rmind /* Offset in mbuf data. */
165 1.1 rmind d = mtod(m, uint8_t *);
166 1.18 christos KASSERT(off >= (wmark - m_buflen(m)));
167 1.18 christos d += (off - (wmark - m_buflen(m)));
168 1.1 rmind
169 1.9 rmind nbuf->nb_mbuf = m;
170 1.9 rmind nbuf->nb_nptr = d;
171 1.9 rmind
172 1.9 rmind if (ensure) {
173 1.9 rmind /* Ensure contiguousness (may change nbuf chain). */
174 1.9 rmind d = nbuf_ensure_contig(nbuf, ensure);
175 1.9 rmind }
176 1.1 rmind return d;
177 1.1 rmind }
178 1.1 rmind
179 1.1 rmind /*
180 1.9 rmind * nbuf_ensure_contig: check whether the specified length from the current
181 1.9 rmind * point in the nbuf is contiguous. If not, rearrange the chain to be so.
182 1.1 rmind *
183 1.9 rmind * => Returns pointer to the data at the current offset in the buffer.
184 1.9 rmind * => Returns NULL on failure and nbuf becomes invalid.
185 1.1 rmind */
186 1.9 rmind void *
187 1.9 rmind nbuf_ensure_contig(nbuf_t *nbuf, size_t len)
188 1.1 rmind {
189 1.10 rmind const struct mbuf * const n = nbuf->nb_mbuf;
190 1.10 rmind const size_t off = (uintptr_t)nbuf->nb_nptr - mtod(n, uintptr_t);
191 1.9 rmind
192 1.18 christos KASSERT(off <= m_buflen(n));
193 1.9 rmind
194 1.18 christos if (__predict_false(m_buflen(n) < (off + len))) {
195 1.10 rmind struct mbuf *m = nbuf->nb_mbuf0;
196 1.10 rmind const size_t foff = nbuf_offset(nbuf);
197 1.10 rmind const size_t plen = m_length(m);
198 1.18 christos const size_t mlen = m_buflen(m);
199 1.10 rmind size_t target;
200 1.10 rmind bool success;
201 1.9 rmind
202 1.18 christos //npf_stats_inc(npf, NPF_STAT_NBUF_NONCONTIG);
203 1.9 rmind
204 1.9 rmind /* Attempt to round-up to NBUF_ENSURE_ALIGN bytes. */
205 1.10 rmind if ((target = NBUF_ENSURE_ROUNDUP(foff + len)) > plen) {
206 1.10 rmind target = foff + len;
207 1.9 rmind }
208 1.1 rmind
209 1.9 rmind /* Rearrange the chain to be contiguous. */
210 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
211 1.10 rmind success = m_ensure_contig(&m, target);
212 1.10 rmind KASSERT(m != NULL);
213 1.10 rmind
214 1.10 rmind /* If no change in the chain: return what we have. */
215 1.18 christos if (m == nbuf->nb_mbuf0 && m_buflen(m) == mlen) {
216 1.10 rmind return success ? nbuf->nb_nptr : NULL;
217 1.9 rmind }
218 1.1 rmind
219 1.9 rmind /*
220 1.10 rmind * The mbuf chain was re-arranged. Update the pointers
221 1.10 rmind * accordingly and indicate that the references to the data
222 1.10 rmind * might need a reset.
223 1.9 rmind */
224 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
225 1.10 rmind nbuf->nb_mbuf0 = m;
226 1.10 rmind nbuf->nb_mbuf = m;
227 1.10 rmind
228 1.18 christos KASSERT(foff < m_buflen(m) && foff < m_length(m));
229 1.10 rmind nbuf->nb_nptr = mtod(m, uint8_t *) + foff;
230 1.10 rmind nbuf->nb_flags |= NBUF_DATAREF_RESET;
231 1.10 rmind
232 1.10 rmind if (!success) {
233 1.18 christos //npf_stats_inc(npf, NPF_STAT_NBUF_CONTIG_FAIL);
234 1.10 rmind return NULL;
235 1.1 rmind }
236 1.1 rmind }
237 1.9 rmind return nbuf->nb_nptr;
238 1.1 rmind }
239 1.1 rmind
240 1.9 rmind void *
241 1.9 rmind nbuf_ensure_writable(nbuf_t *nbuf, size_t len)
242 1.1 rmind {
243 1.9 rmind struct mbuf *m = nbuf->nb_mbuf;
244 1.24 rmind const unsigned off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t);
245 1.9 rmind const int tlen = off + len;
246 1.9 rmind bool head_buf;
247 1.1 rmind
248 1.9 rmind KASSERT(off < m_length(nbuf->nb_mbuf0));
249 1.1 rmind
250 1.9 rmind if (!M_UNWRITABLE(m, tlen)) {
251 1.9 rmind return nbuf->nb_nptr;
252 1.9 rmind }
253 1.9 rmind head_buf = (nbuf->nb_mbuf0 == m);
254 1.9 rmind if (m_makewritable(&m, 0, tlen, M_NOWAIT)) {
255 1.9 rmind memset(nbuf, 0, sizeof(nbuf_t));
256 1.9 rmind return NULL;
257 1.9 rmind }
258 1.9 rmind if (head_buf) {
259 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
260 1.9 rmind KASSERT(off < m_length(m));
261 1.9 rmind nbuf->nb_mbuf0 = m;
262 1.9 rmind }
263 1.9 rmind nbuf->nb_mbuf = m;
264 1.9 rmind nbuf->nb_nptr = mtod(m, uint8_t *) + off;
265 1.1 rmind
266 1.9 rmind return nbuf->nb_nptr;
267 1.1 rmind }
268 1.1 rmind
269 1.9 rmind bool
270 1.9 rmind nbuf_cksum_barrier(nbuf_t *nbuf, int di)
271 1.3 rmind {
272 1.18 christos #ifdef _KERNEL
273 1.9 rmind struct mbuf *m;
274 1.3 rmind
275 1.9 rmind if (di != PFIL_OUT) {
276 1.9 rmind return false;
277 1.5 rmind }
278 1.9 rmind m = nbuf->nb_mbuf0;
279 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
280 1.8 rmind
281 1.8 rmind if (m->m_pkthdr.csum_flags & (M_CSUM_TCPv4 | M_CSUM_UDPv4)) {
282 1.19 maxv in_undefer_cksum_tcpudp(m);
283 1.8 rmind m->m_pkthdr.csum_flags &= ~(M_CSUM_TCPv4 | M_CSUM_UDPv4);
284 1.9 rmind return true;
285 1.8 rmind }
286 1.16 mrg #ifdef INET6
287 1.15 mlelstv if (m->m_pkthdr.csum_flags & (M_CSUM_TCPv6 | M_CSUM_UDPv6)) {
288 1.20 maxv in6_undefer_cksum_tcpudp(m);
289 1.15 mlelstv m->m_pkthdr.csum_flags &= ~(M_CSUM_TCPv6 | M_CSUM_UDPv6);
290 1.15 mlelstv return true;
291 1.15 mlelstv }
292 1.16 mrg #endif
293 1.18 christos #else
294 1.18 christos (void)nbuf; (void)di;
295 1.18 christos #endif
296 1.9 rmind return false;
297 1.8 rmind }
298 1.8 rmind
299 1.5 rmind /*
300 1.24 rmind * nbuf_add_tag: associate a tag with the network buffer.
301 1.1 rmind *
302 1.24 rmind * => Returns 0 on success or error number on failure.
303 1.1 rmind */
304 1.1 rmind int
305 1.17 rmind nbuf_add_tag(nbuf_t *nbuf, uint32_t val)
306 1.1 rmind {
307 1.24 rmind struct mbuf *m = nbuf->nb_mbuf0;
308 1.18 christos #ifdef _KERNEL
309 1.1 rmind struct m_tag *mt;
310 1.1 rmind uint32_t *dat;
311 1.1 rmind
312 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
313 1.9 rmind
314 1.1 rmind mt = m_tag_get(PACKET_TAG_NPF, sizeof(uint32_t), M_NOWAIT);
315 1.9 rmind if (mt == NULL) {
316 1.1 rmind return ENOMEM;
317 1.1 rmind }
318 1.1 rmind dat = (uint32_t *)(mt + 1);
319 1.1 rmind *dat = val;
320 1.1 rmind m_tag_prepend(m, mt);
321 1.1 rmind return 0;
322 1.18 christos #else
323 1.24 rmind if (!nbuf->nb_mops->set_tag) {
324 1.24 rmind return ENOTSUP;
325 1.24 rmind }
326 1.24 rmind return nbuf->nb_mops->set_tag(m, val);
327 1.18 christos #endif
328 1.1 rmind }
329 1.1 rmind
330 1.1 rmind /*
331 1.24 rmind * nbuf_find_tag: find a tag associated with a network buffer.
332 1.1 rmind *
333 1.24 rmind * => Returns 0 on success or error number on failure.
334 1.1 rmind */
335 1.1 rmind int
336 1.17 rmind nbuf_find_tag(nbuf_t *nbuf, uint32_t *val)
337 1.1 rmind {
338 1.24 rmind struct mbuf *m = nbuf->nb_mbuf0;
339 1.18 christos #ifdef _KERNEL
340 1.1 rmind struct m_tag *mt;
341 1.1 rmind
342 1.18 christos KASSERT(m_flags_p(m, M_PKTHDR));
343 1.9 rmind
344 1.22 maxv mt = m_tag_find(m, PACKET_TAG_NPF);
345 1.9 rmind if (mt == NULL) {
346 1.1 rmind return EINVAL;
347 1.1 rmind }
348 1.17 rmind *val = *(uint32_t *)(mt + 1);
349 1.1 rmind return 0;
350 1.18 christos #else
351 1.24 rmind if (!nbuf->nb_mops->get_tag) {
352 1.24 rmind return ENOTSUP;
353 1.24 rmind }
354 1.24 rmind return nbuf->nb_mops->get_tag(m, val);
355 1.18 christos #endif
356 1.1 rmind }
357