npf_mbuf.c revision 1.7.2.2 1 1.7.2.2 tls /* $NetBSD: npf_mbuf.c,v 1.7.2.2 2014/08/20 00:04:35 tls Exp $ */
2 1.1 rmind
3 1.1 rmind /*-
4 1.7.2.1 tls * Copyright (c) 2009-2012 The NetBSD Foundation, Inc.
5 1.1 rmind * All rights reserved.
6 1.1 rmind *
7 1.1 rmind * This material is based upon work partially supported by The
8 1.1 rmind * NetBSD Foundation under a contract with Mindaugas Rasiukevicius.
9 1.1 rmind *
10 1.1 rmind * Redistribution and use in source and binary forms, with or without
11 1.1 rmind * modification, are permitted provided that the following conditions
12 1.1 rmind * are met:
13 1.1 rmind * 1. Redistributions of source code must retain the above copyright
14 1.1 rmind * notice, this list of conditions and the following disclaimer.
15 1.1 rmind * 2. Redistributions in binary form must reproduce the above copyright
16 1.1 rmind * notice, this list of conditions and the following disclaimer in the
17 1.1 rmind * documentation and/or other materials provided with the distribution.
18 1.1 rmind *
19 1.1 rmind * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20 1.1 rmind * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21 1.1 rmind * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22 1.1 rmind * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23 1.1 rmind * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24 1.1 rmind * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25 1.1 rmind * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26 1.1 rmind * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27 1.1 rmind * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28 1.1 rmind * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29 1.1 rmind * POSSIBILITY OF SUCH DAMAGE.
30 1.1 rmind */
31 1.1 rmind
32 1.1 rmind /*
33 1.1 rmind * NPF network buffer management interface.
34 1.1 rmind *
35 1.1 rmind * Network buffer in NetBSD is mbuf. Internal mbuf structures are
36 1.1 rmind * abstracted within this source.
37 1.1 rmind */
38 1.1 rmind
39 1.1 rmind #include <sys/cdefs.h>
40 1.7.2.2 tls __KERNEL_RCSID(0, "$NetBSD: npf_mbuf.c,v 1.7.2.2 2014/08/20 00:04:35 tls Exp $");
41 1.1 rmind
42 1.1 rmind #include <sys/param.h>
43 1.1 rmind #include <sys/mbuf.h>
44 1.1 rmind
45 1.1 rmind #include "npf_impl.h"
46 1.1 rmind
47 1.7.2.1 tls #define NBUF_ENSURE_ALIGN (MAX(COHERENCY_UNIT, 64))
48 1.7.2.1 tls #define NBUF_ENSURE_MASK (NBUF_ENSURE_ALIGN - 1)
49 1.7.2.1 tls #define NBUF_ENSURE_ROUNDUP(x) (((x) + NBUF_ENSURE_ALIGN) & ~NBUF_ENSURE_MASK)
50 1.7.2.1 tls
51 1.7.2.1 tls void
52 1.7.2.1 tls nbuf_init(nbuf_t *nbuf, struct mbuf *m, const ifnet_t *ifp)
53 1.7.2.1 tls {
54 1.7.2.2 tls u_int ifid = npf_ifmap_getid(ifp);
55 1.7.2.2 tls
56 1.7.2.1 tls KASSERT((m->m_flags & M_PKTHDR) != 0);
57 1.7.2.1 tls
58 1.7.2.1 tls nbuf->nb_mbuf0 = m;
59 1.7.2.1 tls nbuf->nb_ifp = ifp;
60 1.7.2.2 tls nbuf->nb_ifid = ifid;
61 1.7.2.1 tls nbuf_reset(nbuf);
62 1.7.2.1 tls }
63 1.7.2.1 tls
64 1.7.2.1 tls void
65 1.7.2.1 tls nbuf_reset(nbuf_t *nbuf)
66 1.7.2.1 tls {
67 1.7.2.1 tls struct mbuf *m = nbuf->nb_mbuf0;
68 1.7.2.1 tls
69 1.7.2.1 tls nbuf->nb_mbuf = m;
70 1.7.2.1 tls nbuf->nb_nptr = mtod(m, void *);
71 1.7.2.1 tls }
72 1.7.2.1 tls
73 1.1 rmind void *
74 1.1 rmind nbuf_dataptr(nbuf_t *nbuf)
75 1.1 rmind {
76 1.7.2.1 tls KASSERT(nbuf->nb_nptr);
77 1.7.2.1 tls return nbuf->nb_nptr;
78 1.7.2.1 tls }
79 1.7.2.1 tls
80 1.7.2.1 tls size_t
81 1.7.2.1 tls nbuf_offset(const nbuf_t *nbuf)
82 1.7.2.1 tls {
83 1.7.2.1 tls const struct mbuf *m = nbuf->nb_mbuf;
84 1.7.2.1 tls const u_int off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t);
85 1.7.2.1 tls const int poff = m_length(nbuf->nb_mbuf0) - m_length(m) + off;
86 1.7.2.1 tls
87 1.7.2.1 tls return poff;
88 1.7.2.1 tls }
89 1.7.2.1 tls
90 1.7.2.1 tls struct mbuf *
91 1.7.2.1 tls nbuf_head_mbuf(nbuf_t *nbuf)
92 1.7.2.1 tls {
93 1.7.2.1 tls return nbuf->nb_mbuf0;
94 1.7.2.1 tls }
95 1.7.2.1 tls
96 1.7.2.1 tls bool
97 1.7.2.1 tls nbuf_flag_p(const nbuf_t *nbuf, int flag)
98 1.7.2.1 tls {
99 1.7.2.1 tls return (nbuf->nb_flags & flag) != 0;
100 1.7.2.1 tls }
101 1.1 rmind
102 1.7.2.1 tls void
103 1.7.2.1 tls nbuf_unset_flag(nbuf_t *nbuf, int flag)
104 1.7.2.1 tls {
105 1.7.2.1 tls nbuf->nb_flags &= ~flag;
106 1.1 rmind }
107 1.1 rmind
108 1.1 rmind /*
109 1.7.2.1 tls * nbuf_advance: advance in nbuf or chain by specified amount of bytes and,
110 1.7.2.1 tls * if requested, ensure that the area *after* advance is contiguous.
111 1.1 rmind *
112 1.7.2.1 tls * => Returns new pointer to data in nbuf or NULL if offset is invalid.
113 1.7.2.1 tls * => Current nbuf and the offset is stored in the nbuf metadata.
114 1.1 rmind */
115 1.1 rmind void *
116 1.7.2.1 tls nbuf_advance(nbuf_t *nbuf, size_t len, size_t ensure)
117 1.1 rmind {
118 1.7.2.1 tls struct mbuf *m = nbuf->nb_mbuf;
119 1.1 rmind u_int off, wmark;
120 1.1 rmind uint8_t *d;
121 1.1 rmind
122 1.1 rmind /* Offset with amount to advance. */
123 1.7.2.1 tls off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t) + len;
124 1.1 rmind wmark = m->m_len;
125 1.1 rmind
126 1.1 rmind /* Find the mbuf according to offset. */
127 1.1 rmind while (__predict_false(wmark <= off)) {
128 1.1 rmind m = m->m_next;
129 1.1 rmind if (__predict_false(m == NULL)) {
130 1.1 rmind /*
131 1.7.2.1 tls * If end of the chain, then the offset is
132 1.1 rmind * higher than packet length.
133 1.1 rmind */
134 1.1 rmind return NULL;
135 1.1 rmind }
136 1.1 rmind wmark += m->m_len;
137 1.1 rmind }
138 1.7.2.1 tls KASSERT(off < m_length(nbuf->nb_mbuf0));
139 1.1 rmind
140 1.1 rmind /* Offset in mbuf data. */
141 1.1 rmind d = mtod(m, uint8_t *);
142 1.1 rmind KASSERT(off >= (wmark - m->m_len));
143 1.1 rmind d += (off - (wmark - m->m_len));
144 1.1 rmind
145 1.7.2.1 tls nbuf->nb_mbuf = m;
146 1.7.2.1 tls nbuf->nb_nptr = d;
147 1.7.2.1 tls
148 1.7.2.1 tls if (ensure) {
149 1.7.2.1 tls /* Ensure contiguousness (may change nbuf chain). */
150 1.7.2.1 tls d = nbuf_ensure_contig(nbuf, ensure);
151 1.7.2.1 tls }
152 1.1 rmind return d;
153 1.1 rmind }
154 1.1 rmind
155 1.1 rmind /*
156 1.7.2.1 tls * nbuf_ensure_contig: check whether the specified length from the current
157 1.7.2.1 tls * point in the nbuf is contiguous. If not, rearrange the chain to be so.
158 1.1 rmind *
159 1.7.2.1 tls * => Returns pointer to the data at the current offset in the buffer.
160 1.7.2.1 tls * => Returns NULL on failure and nbuf becomes invalid.
161 1.1 rmind */
162 1.7.2.1 tls void *
163 1.7.2.1 tls nbuf_ensure_contig(nbuf_t *nbuf, size_t len)
164 1.1 rmind {
165 1.7.2.1 tls const struct mbuf * const n = nbuf->nb_mbuf;
166 1.7.2.1 tls const size_t off = (uintptr_t)nbuf->nb_nptr - mtod(n, uintptr_t);
167 1.1 rmind
168 1.7.2.1 tls KASSERT(off <= n->m_len);
169 1.1 rmind
170 1.7.2.1 tls if (__predict_false(n->m_len < (off + len))) {
171 1.7.2.1 tls struct mbuf *m = nbuf->nb_mbuf0;
172 1.7.2.1 tls const size_t foff = nbuf_offset(nbuf);
173 1.7.2.1 tls const size_t plen = m_length(m);
174 1.7.2.1 tls const size_t mlen = m->m_len;
175 1.7.2.1 tls size_t target;
176 1.7.2.1 tls bool success;
177 1.7.2.1 tls
178 1.7.2.1 tls npf_stats_inc(NPF_STAT_NBUF_NONCONTIG);
179 1.7.2.1 tls
180 1.7.2.1 tls /* Attempt to round-up to NBUF_ENSURE_ALIGN bytes. */
181 1.7.2.1 tls if ((target = NBUF_ENSURE_ROUNDUP(foff + len)) > plen) {
182 1.7.2.1 tls target = foff + len;
183 1.1 rmind }
184 1.1 rmind
185 1.7.2.1 tls /* Rearrange the chain to be contiguous. */
186 1.7.2.1 tls KASSERT((m->m_flags & M_PKTHDR) != 0);
187 1.7.2.1 tls success = m_ensure_contig(&m, target);
188 1.7.2.1 tls KASSERT(m != NULL);
189 1.7.2.1 tls
190 1.7.2.1 tls /* If no change in the chain: return what we have. */
191 1.7.2.1 tls if (m == nbuf->nb_mbuf0 && m->m_len == mlen) {
192 1.7.2.1 tls return success ? nbuf->nb_nptr : NULL;
193 1.1 rmind }
194 1.1 rmind
195 1.7.2.1 tls /*
196 1.7.2.1 tls * The mbuf chain was re-arranged. Update the pointers
197 1.7.2.1 tls * accordingly and indicate that the references to the data
198 1.7.2.1 tls * might need a reset.
199 1.7.2.1 tls */
200 1.7.2.1 tls KASSERT((m->m_flags & M_PKTHDR) != 0);
201 1.7.2.1 tls nbuf->nb_mbuf0 = m;
202 1.7.2.1 tls nbuf->nb_mbuf = m;
203 1.7.2.1 tls
204 1.7.2.1 tls KASSERT(foff < m->m_len && foff < m_length(m));
205 1.7.2.1 tls nbuf->nb_nptr = mtod(m, uint8_t *) + foff;
206 1.7.2.1 tls nbuf->nb_flags |= NBUF_DATAREF_RESET;
207 1.1 rmind
208 1.7.2.1 tls if (!success) {
209 1.7.2.1 tls npf_stats_inc(NPF_STAT_NBUF_CONTIG_FAIL);
210 1.7.2.1 tls return NULL;
211 1.7.2.1 tls }
212 1.7.2.1 tls }
213 1.7.2.1 tls return nbuf->nb_nptr;
214 1.1 rmind }
215 1.1 rmind
216 1.7.2.1 tls void *
217 1.7.2.1 tls nbuf_ensure_writable(nbuf_t *nbuf, size_t len)
218 1.1 rmind {
219 1.7.2.1 tls struct mbuf *m = nbuf->nb_mbuf;
220 1.7.2.1 tls const u_int off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t);
221 1.7.2.1 tls const int tlen = off + len;
222 1.7.2.1 tls bool head_buf;
223 1.1 rmind
224 1.7.2.1 tls KASSERT(off < m_length(nbuf->nb_mbuf0));
225 1.1 rmind
226 1.7.2.1 tls if (!M_UNWRITABLE(m, tlen)) {
227 1.7.2.1 tls return nbuf->nb_nptr;
228 1.4 rmind }
229 1.7.2.1 tls head_buf = (nbuf->nb_mbuf0 == m);
230 1.7.2.1 tls if (m_makewritable(&m, 0, tlen, M_NOWAIT)) {
231 1.7.2.1 tls memset(nbuf, 0, sizeof(nbuf_t));
232 1.7.2.1 tls return NULL;
233 1.3 rmind }
234 1.7.2.1 tls if (head_buf) {
235 1.7.2.1 tls KASSERT((m->m_flags & M_PKTHDR) != 0);
236 1.7.2.1 tls KASSERT(off < m_length(m));
237 1.7.2.1 tls nbuf->nb_mbuf0 = m;
238 1.7.2.1 tls }
239 1.7.2.1 tls nbuf->nb_mbuf = m;
240 1.7.2.1 tls nbuf->nb_nptr = mtod(m, uint8_t *) + off;
241 1.7.2.1 tls
242 1.7.2.1 tls return nbuf->nb_nptr;
243 1.3 rmind }
244 1.3 rmind
245 1.7.2.1 tls bool
246 1.7.2.1 tls nbuf_cksum_barrier(nbuf_t *nbuf, int di)
247 1.5 rmind {
248 1.7.2.1 tls struct mbuf *m;
249 1.7.2.1 tls
250 1.7.2.1 tls if (di != PFIL_OUT) {
251 1.7.2.1 tls return false;
252 1.5 rmind }
253 1.7.2.1 tls m = nbuf->nb_mbuf0;
254 1.7.2.1 tls KASSERT((m->m_flags & M_PKTHDR) != 0);
255 1.7.2.1 tls
256 1.7.2.1 tls if (m->m_pkthdr.csum_flags & (M_CSUM_TCPv4 | M_CSUM_UDPv4)) {
257 1.7.2.1 tls in_delayed_cksum(m);
258 1.7.2.1 tls m->m_pkthdr.csum_flags &= ~(M_CSUM_TCPv4 | M_CSUM_UDPv4);
259 1.7.2.1 tls return true;
260 1.5 rmind }
261 1.7.2.1 tls return false;
262 1.5 rmind }
263 1.5 rmind
264 1.5 rmind /*
265 1.1 rmind * nbuf_add_tag: add a tag to specified network buffer.
266 1.1 rmind *
267 1.7.2.1 tls * => Returns 0 on success or errno on failure.
268 1.1 rmind */
269 1.1 rmind int
270 1.1 rmind nbuf_add_tag(nbuf_t *nbuf, uint32_t key, uint32_t val)
271 1.1 rmind {
272 1.7.2.1 tls struct mbuf *m = nbuf->nb_mbuf0;
273 1.1 rmind struct m_tag *mt;
274 1.1 rmind uint32_t *dat;
275 1.1 rmind
276 1.7.2.1 tls KASSERT((m->m_flags & M_PKTHDR) != 0);
277 1.7.2.1 tls
278 1.1 rmind mt = m_tag_get(PACKET_TAG_NPF, sizeof(uint32_t), M_NOWAIT);
279 1.7.2.1 tls if (mt == NULL) {
280 1.1 rmind return ENOMEM;
281 1.1 rmind }
282 1.1 rmind dat = (uint32_t *)(mt + 1);
283 1.1 rmind *dat = val;
284 1.1 rmind m_tag_prepend(m, mt);
285 1.1 rmind return 0;
286 1.1 rmind }
287 1.1 rmind
288 1.1 rmind /*
289 1.1 rmind * nbuf_find_tag: find a tag in specified network buffer.
290 1.1 rmind *
291 1.7.2.1 tls * => Returns 0 on success or errno on failure.
292 1.1 rmind */
293 1.1 rmind int
294 1.1 rmind nbuf_find_tag(nbuf_t *nbuf, uint32_t key, void **data)
295 1.1 rmind {
296 1.7.2.1 tls struct mbuf *m = nbuf->nb_mbuf0;
297 1.1 rmind struct m_tag *mt;
298 1.1 rmind
299 1.7.2.1 tls KASSERT((m->m_flags & M_PKTHDR) != 0);
300 1.7.2.1 tls
301 1.1 rmind mt = m_tag_find(m, PACKET_TAG_NPF, NULL);
302 1.7.2.1 tls if (mt == NULL) {
303 1.1 rmind return EINVAL;
304 1.1 rmind }
305 1.1 rmind *data = (void *)(mt + 1);
306 1.1 rmind return 0;
307 1.1 rmind }
308