ipsec_mbuf.c revision 1.12.30.1 1 1.12.30.1 martin /* $NetBSD: ipsec_mbuf.c,v 1.12.30.1 2018/04/17 15:10:53 martin Exp $ */
2 1.4 thorpej /*-
3 1.4 thorpej * Copyright (c) 2002, 2003 Sam Leffler, Errno Consulting
4 1.4 thorpej * All rights reserved.
5 1.4 thorpej *
6 1.4 thorpej * Redistribution and use in source and binary forms, with or without
7 1.4 thorpej * modification, are permitted provided that the following conditions
8 1.4 thorpej * are met:
9 1.4 thorpej * 1. Redistributions of source code must retain the above copyright
10 1.4 thorpej * notice, this list of conditions and the following disclaimer.
11 1.4 thorpej * 2. Redistributions in binary form must reproduce the above copyright
12 1.4 thorpej * notice, this list of conditions and the following disclaimer in the
13 1.4 thorpej * documentation and/or other materials provided with the distribution.
14 1.4 thorpej *
15 1.4 thorpej * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16 1.4 thorpej * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 1.4 thorpej * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 1.4 thorpej * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19 1.4 thorpej * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20 1.4 thorpej * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21 1.4 thorpej * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22 1.4 thorpej * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 1.4 thorpej * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24 1.4 thorpej * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25 1.4 thorpej * SUCH DAMAGE.
26 1.4 thorpej *
27 1.4 thorpej * $FreeBSD: /repoman/r/ncvs/src/sys/netipsec/ipsec_mbuf.c,v 1.5.2.2 2003/03/28 20:32:53 sam Exp $
28 1.4 thorpej */
29 1.1 jonathan
30 1.1 jonathan #include <sys/cdefs.h>
31 1.12.30.1 martin __KERNEL_RCSID(0, "$NetBSD: ipsec_mbuf.c,v 1.12.30.1 2018/04/17 15:10:53 martin Exp $");
32 1.1 jonathan
33 1.1 jonathan /*
34 1.1 jonathan * IPsec-specific mbuf routines.
35 1.1 jonathan */
36 1.1 jonathan
37 1.3 jonathan #ifdef __FreeBSD__
38 1.1 jonathan #include "opt_param.h"
39 1.3 jonathan #endif
40 1.1 jonathan
41 1.1 jonathan #include <sys/param.h>
42 1.1 jonathan #include <sys/systm.h>
43 1.1 jonathan #include <sys/mbuf.h>
44 1.1 jonathan #include <sys/socket.h>
45 1.1 jonathan
46 1.1 jonathan #include <net/route.h>
47 1.1 jonathan #include <netinet/in.h>
48 1.1 jonathan
49 1.1 jonathan #include <netipsec/ipsec.h>
50 1.5 jonathan #include <netipsec/ipsec_var.h>
51 1.11 thorpej #include <netipsec/ipsec_private.h>
52 1.1 jonathan
53 1.1 jonathan #include <netipsec/ipsec_osdep.h>
54 1.1 jonathan #include <net/net_osdep.h>
55 1.1 jonathan
56 1.1 jonathan /*
57 1.1 jonathan * Create a writable copy of the mbuf chain. While doing this
58 1.1 jonathan * we compact the chain with a goal of producing a chain with
59 1.1 jonathan * at most two mbufs. The second mbuf in this chain is likely
60 1.1 jonathan * to be a cluster. The primary purpose of this work is to create
61 1.1 jonathan * a writable packet for encryption, compression, etc. The
62 1.1 jonathan * secondary goal is to linearize the data so the data can be
63 1.1 jonathan * passed to crypto hardware in the most efficient manner possible.
64 1.1 jonathan */
65 1.1 jonathan struct mbuf *
66 1.1 jonathan m_clone(struct mbuf *m0)
67 1.1 jonathan {
68 1.1 jonathan struct mbuf *m, *mprev;
69 1.1 jonathan struct mbuf *n, *mfirst, *mlast;
70 1.1 jonathan int len, off;
71 1.1 jonathan
72 1.1 jonathan IPSEC_ASSERT(m0 != NULL, ("m_clone: null mbuf"));
73 1.1 jonathan
74 1.1 jonathan mprev = NULL;
75 1.1 jonathan for (m = m0; m != NULL; m = mprev->m_next) {
76 1.1 jonathan /*
77 1.1 jonathan * Regular mbufs are ignored unless there's a cluster
78 1.1 jonathan * in front of it that we can use to coalesce. We do
79 1.1 jonathan * the latter mainly so later clusters can be coalesced
80 1.1 jonathan * also w/o having to handle them specially (i.e. convert
81 1.1 jonathan * mbuf+cluster -> cluster). This optimization is heavily
82 1.1 jonathan * influenced by the assumption that we're running over
83 1.1 jonathan * Ethernet where MCLBYTES is large enough that the max
84 1.1 jonathan * packet size will permit lots of coalescing into a
85 1.1 jonathan * single cluster. This in turn permits efficient
86 1.1 jonathan * crypto operations, especially when using hardware.
87 1.1 jonathan */
88 1.1 jonathan if ((m->m_flags & M_EXT) == 0) {
89 1.1 jonathan if (mprev && (mprev->m_flags & M_EXT) &&
90 1.1 jonathan m->m_len <= M_TRAILINGSPACE(mprev)) {
91 1.1 jonathan /* XXX: this ignores mbuf types */
92 1.9 degroote memcpy(mtod(mprev, char *) + mprev->m_len,
93 1.9 degroote mtod(m, char *), m->m_len);
94 1.1 jonathan mprev->m_len += m->m_len;
95 1.1 jonathan mprev->m_next = m->m_next; /* unlink from chain */
96 1.1 jonathan m_free(m); /* reclaim mbuf */
97 1.11 thorpej IPSEC_STATINC(IPSEC_STAT_MBCOALESCED);
98 1.1 jonathan } else {
99 1.1 jonathan mprev = m;
100 1.1 jonathan }
101 1.1 jonathan continue;
102 1.1 jonathan }
103 1.1 jonathan /*
104 1.1 jonathan * Writable mbufs are left alone (for now). Note
105 1.1 jonathan * that for 4.x systems it's not possible to identify
106 1.1 jonathan * whether or not mbufs with external buffers are
107 1.1 jonathan * writable unless they use clusters.
108 1.1 jonathan */
109 1.1 jonathan if (M_EXT_WRITABLE(m)) {
110 1.1 jonathan mprev = m;
111 1.1 jonathan continue;
112 1.1 jonathan }
113 1.1 jonathan
114 1.1 jonathan /*
115 1.1 jonathan * Not writable, replace with a copy or coalesce with
116 1.1 jonathan * the previous mbuf if possible (since we have to copy
117 1.1 jonathan * it anyway, we try to reduce the number of mbufs and
118 1.1 jonathan * clusters so that future work is easier).
119 1.1 jonathan */
120 1.1 jonathan IPSEC_ASSERT(m->m_flags & M_EXT,
121 1.1 jonathan ("m_clone: m_flags 0x%x", m->m_flags));
122 1.1 jonathan /* NB: we only coalesce into a cluster or larger */
123 1.1 jonathan if (mprev != NULL && (mprev->m_flags & M_EXT) &&
124 1.1 jonathan m->m_len <= M_TRAILINGSPACE(mprev)) {
125 1.1 jonathan /* XXX: this ignores mbuf types */
126 1.9 degroote memcpy(mtod(mprev, char *) + mprev->m_len,
127 1.9 degroote mtod(m, char *), m->m_len);
128 1.1 jonathan mprev->m_len += m->m_len;
129 1.1 jonathan mprev->m_next = m->m_next; /* unlink from chain */
130 1.1 jonathan m_free(m); /* reclaim mbuf */
131 1.11 thorpej IPSEC_STATINC(IPSEC_STAT_CLCOALESCED);
132 1.1 jonathan continue;
133 1.1 jonathan }
134 1.1 jonathan
135 1.1 jonathan /*
136 1.1 jonathan * Allocate new space to hold the copy...
137 1.1 jonathan */
138 1.1 jonathan /* XXX why can M_PKTHDR be set past the first mbuf? */
139 1.1 jonathan if (mprev == NULL && (m->m_flags & M_PKTHDR)) {
140 1.1 jonathan /*
141 1.1 jonathan * NB: if a packet header is present we must
142 1.1 jonathan * allocate the mbuf separately from any cluster
143 1.1 jonathan * because M_MOVE_PKTHDR will smash the data
144 1.1 jonathan * pointer and drop the M_EXT marker.
145 1.1 jonathan */
146 1.1 jonathan MGETHDR(n, M_DONTWAIT, m->m_type);
147 1.1 jonathan if (n == NULL) {
148 1.1 jonathan m_freem(m0);
149 1.1 jonathan return (NULL);
150 1.1 jonathan }
151 1.1 jonathan M_MOVE_PKTHDR(n, m);
152 1.1 jonathan MCLGET(n, M_DONTWAIT);
153 1.1 jonathan if ((n->m_flags & M_EXT) == 0) {
154 1.1 jonathan m_free(n);
155 1.1 jonathan m_freem(m0);
156 1.1 jonathan return (NULL);
157 1.1 jonathan }
158 1.1 jonathan } else {
159 1.1 jonathan n = m_getcl(M_DONTWAIT, m->m_type, m->m_flags);
160 1.1 jonathan if (n == NULL) {
161 1.1 jonathan m_freem(m0);
162 1.1 jonathan return (NULL);
163 1.1 jonathan }
164 1.1 jonathan }
165 1.1 jonathan /*
166 1.1 jonathan * ... and copy the data. We deal with jumbo mbufs
167 1.1 jonathan * (i.e. m_len > MCLBYTES) by splitting them into
168 1.1 jonathan * clusters. We could just malloc a buffer and make
169 1.1 jonathan * it external but too many device drivers don't know
170 1.1 jonathan * how to break up the non-contiguous memory when
171 1.1 jonathan * doing DMA.
172 1.1 jonathan */
173 1.1 jonathan len = m->m_len;
174 1.1 jonathan off = 0;
175 1.1 jonathan mfirst = n;
176 1.1 jonathan mlast = NULL;
177 1.1 jonathan for (;;) {
178 1.1 jonathan int cc = min(len, MCLBYTES);
179 1.9 degroote memcpy(mtod(n, char *), mtod(m, char *) + off, cc);
180 1.1 jonathan n->m_len = cc;
181 1.1 jonathan if (mlast != NULL)
182 1.1 jonathan mlast->m_next = n;
183 1.6 perry mlast = n;
184 1.11 thorpej IPSEC_STATINC(IPSEC_STAT_CLCOPIED);
185 1.1 jonathan
186 1.1 jonathan len -= cc;
187 1.1 jonathan if (len <= 0)
188 1.1 jonathan break;
189 1.1 jonathan off += cc;
190 1.1 jonathan
191 1.1 jonathan n = m_getcl(M_DONTWAIT, m->m_type, m->m_flags);
192 1.1 jonathan if (n == NULL) {
193 1.1 jonathan m_freem(mfirst);
194 1.1 jonathan m_freem(m0);
195 1.1 jonathan return (NULL);
196 1.1 jonathan }
197 1.1 jonathan }
198 1.6 perry n->m_next = m->m_next;
199 1.1 jonathan if (mprev == NULL)
200 1.1 jonathan m0 = mfirst; /* new head of chain */
201 1.1 jonathan else
202 1.1 jonathan mprev->m_next = mfirst; /* replace old mbuf */
203 1.1 jonathan m_free(m); /* release old mbuf */
204 1.1 jonathan mprev = mfirst;
205 1.1 jonathan }
206 1.1 jonathan return (m0);
207 1.1 jonathan }
208 1.1 jonathan
209 1.1 jonathan /*
210 1.1 jonathan * Make space for a new header of length hlen at skip bytes
211 1.1 jonathan * into the packet. When doing this we allocate new mbufs only
212 1.1 jonathan * when absolutely necessary. The mbuf where the new header
213 1.1 jonathan * is to go is returned together with an offset into the mbuf.
214 1.1 jonathan * If NULL is returned then the mbuf chain may have been modified;
215 1.1 jonathan * the caller is assumed to always free the chain.
216 1.1 jonathan */
217 1.1 jonathan struct mbuf *
218 1.1 jonathan m_makespace(struct mbuf *m0, int skip, int hlen, int *off)
219 1.1 jonathan {
220 1.1 jonathan struct mbuf *m;
221 1.1 jonathan unsigned remain;
222 1.1 jonathan
223 1.1 jonathan IPSEC_ASSERT(m0 != NULL, ("m_dmakespace: null mbuf"));
224 1.1 jonathan IPSEC_ASSERT(hlen < MHLEN, ("m_makespace: hlen too big: %u", hlen));
225 1.1 jonathan
226 1.1 jonathan for (m = m0; m && skip > m->m_len; m = m->m_next)
227 1.1 jonathan skip -= m->m_len;
228 1.1 jonathan if (m == NULL)
229 1.1 jonathan return (NULL);
230 1.1 jonathan /*
231 1.1 jonathan * At this point skip is the offset into the mbuf m
232 1.1 jonathan * where the new header should be placed. Figure out
233 1.1 jonathan * if there's space to insert the new header. If so,
234 1.1 jonathan * and copying the remainder makese sense then do so.
235 1.1 jonathan * Otherwise insert a new mbuf in the chain, splitting
236 1.1 jonathan * the contents of m as needed.
237 1.1 jonathan */
238 1.1 jonathan remain = m->m_len - skip; /* data to move */
239 1.1 jonathan if (hlen > M_TRAILINGSPACE(m)) {
240 1.10 seanb struct mbuf *n0, *n, **np;
241 1.10 seanb int todo, len, done, alloc;
242 1.10 seanb
243 1.10 seanb n0 = NULL;
244 1.10 seanb np = &n0;
245 1.10 seanb alloc = 0;
246 1.10 seanb done = 0;
247 1.10 seanb todo = remain;
248 1.10 seanb while (todo > 0) {
249 1.10 seanb if (todo > MHLEN) {
250 1.10 seanb n = m_getcl(M_DONTWAIT, m->m_type, 0);
251 1.10 seanb len = MCLBYTES;
252 1.10 seanb }
253 1.10 seanb else {
254 1.10 seanb n = m_get(M_DONTWAIT, m->m_type);
255 1.10 seanb len = MHLEN;
256 1.10 seanb }
257 1.10 seanb if (n == NULL) {
258 1.10 seanb m_freem(n0);
259 1.10 seanb return NULL;
260 1.10 seanb }
261 1.10 seanb *np = n;
262 1.10 seanb np = &n->m_next;
263 1.10 seanb alloc++;
264 1.10 seanb len = min(todo, len);
265 1.10 seanb memcpy(n->m_data, mtod(m, char *) + skip + done, len);
266 1.10 seanb n->m_len = len;
267 1.10 seanb done += len;
268 1.10 seanb todo -= len;
269 1.10 seanb }
270 1.1 jonathan
271 1.1 jonathan if (hlen <= M_TRAILINGSPACE(m) + remain) {
272 1.1 jonathan m->m_len = skip + hlen;
273 1.1 jonathan *off = skip;
274 1.10 seanb if (n0 != NULL) {
275 1.10 seanb *np = m->m_next;
276 1.10 seanb m->m_next = n0;
277 1.10 seanb }
278 1.10 seanb }
279 1.10 seanb else {
280 1.10 seanb n = m_get(M_DONTWAIT, m->m_type);
281 1.10 seanb if (n == NULL) {
282 1.10 seanb m_freem(n0);
283 1.10 seanb return NULL;
284 1.1 jonathan }
285 1.10 seanb alloc++;
286 1.10 seanb
287 1.10 seanb if ((n->m_next = n0) == NULL)
288 1.10 seanb np = &n->m_next;
289 1.10 seanb n0 = n;
290 1.10 seanb
291 1.10 seanb *np = m->m_next;
292 1.10 seanb m->m_next = n0;
293 1.10 seanb
294 1.10 seanb n->m_len = hlen;
295 1.10 seanb m->m_len = skip;
296 1.10 seanb
297 1.1 jonathan m = n; /* header is at front ... */
298 1.1 jonathan *off = 0; /* ... of new mbuf */
299 1.1 jonathan }
300 1.10 seanb
301 1.11 thorpej IPSEC_STATADD(IPSEC_STAT_MBINSERTED, alloc);
302 1.1 jonathan } else {
303 1.1 jonathan /*
304 1.1 jonathan * Copy the remainder to the back of the mbuf
305 1.1 jonathan * so there's space to write the new header.
306 1.1 jonathan */
307 1.1 jonathan /* XXX can this be memcpy? does it handle overlap? */
308 1.9 degroote ovbcopy(mtod(m, char *) + skip,
309 1.9 degroote mtod(m, char *) + skip + hlen, remain);
310 1.1 jonathan m->m_len += hlen;
311 1.1 jonathan *off = skip;
312 1.1 jonathan }
313 1.1 jonathan m0->m_pkthdr.len += hlen; /* adjust packet length */
314 1.1 jonathan return m;
315 1.1 jonathan }
316 1.1 jonathan
317 1.1 jonathan /*
318 1.1 jonathan * m_pad(m, n) pads <m> with <n> bytes at the end. The packet header
319 1.1 jonathan * length is updated, and a pointer to the first byte of the padding
320 1.1 jonathan * (which is guaranteed to be all in one mbuf) is returned.
321 1.1 jonathan */
322 1.8 christos void *
323 1.1 jonathan m_pad(struct mbuf *m, int n)
324 1.1 jonathan {
325 1.1 jonathan register struct mbuf *m0, *m1;
326 1.1 jonathan register int len, pad;
327 1.8 christos void *retval;
328 1.1 jonathan
329 1.1 jonathan if (n <= 0) { /* No stupid arguments. */
330 1.1 jonathan DPRINTF(("m_pad: pad length invalid (%d)\n", n));
331 1.1 jonathan m_freem(m);
332 1.1 jonathan return NULL;
333 1.1 jonathan }
334 1.1 jonathan
335 1.1 jonathan len = m->m_pkthdr.len;
336 1.1 jonathan pad = n;
337 1.1 jonathan m0 = m;
338 1.1 jonathan
339 1.1 jonathan while (m0->m_len < len) {
340 1.1 jonathan IPSEC_ASSERT(m0->m_next != NULL, ("m_pad: m0 null, len %u m_len %u", len, m0->m_len));/*XXX*/
341 1.1 jonathan len -= m0->m_len;
342 1.1 jonathan m0 = m0->m_next;
343 1.1 jonathan }
344 1.1 jonathan
345 1.1 jonathan if (m0->m_len != len) {
346 1.1 jonathan DPRINTF(("m_pad: length mismatch (should be %d instead of %d)\n",
347 1.1 jonathan m->m_pkthdr.len, m->m_pkthdr.len + m0->m_len - len));
348 1.1 jonathan
349 1.1 jonathan m_freem(m);
350 1.1 jonathan return NULL;
351 1.1 jonathan }
352 1.1 jonathan
353 1.1 jonathan /* Check for zero-length trailing mbufs, and find the last one. */
354 1.1 jonathan for (m1 = m0; m1->m_next; m1 = m1->m_next) {
355 1.1 jonathan if (m1->m_next->m_len != 0) {
356 1.1 jonathan DPRINTF(("m_pad: length mismatch (should be %d "
357 1.1 jonathan "instead of %d)\n",
358 1.1 jonathan m->m_pkthdr.len,
359 1.1 jonathan m->m_pkthdr.len + m1->m_next->m_len));
360 1.1 jonathan
361 1.1 jonathan m_freem(m);
362 1.1 jonathan return NULL;
363 1.1 jonathan }
364 1.1 jonathan
365 1.1 jonathan m0 = m1->m_next;
366 1.1 jonathan }
367 1.1 jonathan
368 1.1 jonathan if (pad > M_TRAILINGSPACE(m0)) {
369 1.1 jonathan /* Add an mbuf to the chain. */
370 1.1 jonathan MGET(m1, M_DONTWAIT, MT_DATA);
371 1.1 jonathan if (m1 == 0) {
372 1.1 jonathan m_freem(m0);
373 1.1 jonathan DPRINTF(("m_pad: unable to get extra mbuf\n"));
374 1.1 jonathan return NULL;
375 1.1 jonathan }
376 1.1 jonathan
377 1.1 jonathan m0->m_next = m1;
378 1.1 jonathan m0 = m1;
379 1.1 jonathan m0->m_len = 0;
380 1.1 jonathan }
381 1.1 jonathan
382 1.1 jonathan retval = m0->m_data + m0->m_len;
383 1.1 jonathan m0->m_len += pad;
384 1.1 jonathan m->m_pkthdr.len += pad;
385 1.1 jonathan
386 1.1 jonathan return retval;
387 1.1 jonathan }
388 1.1 jonathan
389 1.1 jonathan /*
390 1.1 jonathan * Remove hlen data at offset skip in the packet. This is used by
391 1.1 jonathan * the protocols strip protocol headers and associated data (e.g. IV,
392 1.1 jonathan * authenticator) on input.
393 1.1 jonathan */
394 1.1 jonathan int
395 1.1 jonathan m_striphdr(struct mbuf *m, int skip, int hlen)
396 1.1 jonathan {
397 1.1 jonathan struct mbuf *m1;
398 1.1 jonathan int roff;
399 1.1 jonathan
400 1.1 jonathan /* Find beginning of header */
401 1.1 jonathan m1 = m_getptr(m, skip, &roff);
402 1.1 jonathan if (m1 == NULL)
403 1.1 jonathan return (EINVAL);
404 1.1 jonathan
405 1.1 jonathan /* Remove the header and associated data from the mbuf. */
406 1.1 jonathan if (roff == 0) {
407 1.1 jonathan /* The header was at the beginning of the mbuf */
408 1.11 thorpej IPSEC_STATINC(IPSEC_STAT_INPUT_FRONT);
409 1.1 jonathan m_adj(m1, hlen);
410 1.12.30.1 martin if (m1 != m)
411 1.1 jonathan m->m_pkthdr.len -= hlen;
412 1.1 jonathan } else if (roff + hlen >= m1->m_len) {
413 1.1 jonathan struct mbuf *mo;
414 1.12.30.1 martin int adjlen;
415 1.1 jonathan
416 1.1 jonathan /*
417 1.1 jonathan * Part or all of the header is at the end of this mbuf,
418 1.1 jonathan * so first let's remove the remainder of the header from
419 1.1 jonathan * the beginning of the remainder of the mbuf chain, if any.
420 1.1 jonathan */
421 1.11 thorpej IPSEC_STATINC(IPSEC_STAT_INPUT_END);
422 1.1 jonathan if (roff + hlen > m1->m_len) {
423 1.12.30.1 martin adjlen = roff + hlen - m1->m_len;
424 1.12.30.1 martin
425 1.1 jonathan /* Adjust the next mbuf by the remainder */
426 1.12.30.1 martin m_adj(m1->m_next, adjlen);
427 1.1 jonathan
428 1.1 jonathan /* The second mbuf is guaranteed not to have a pkthdr... */
429 1.12.30.1 martin m->m_pkthdr.len -= adjlen;
430 1.1 jonathan }
431 1.1 jonathan
432 1.1 jonathan /* Now, let's unlink the mbuf chain for a second...*/
433 1.1 jonathan mo = m1->m_next;
434 1.1 jonathan m1->m_next = NULL;
435 1.1 jonathan
436 1.1 jonathan /* ...and trim the end of the first part of the chain...sick */
437 1.12.30.1 martin adjlen = m1->m_len - roff;
438 1.12.30.1 martin m_adj(m1, -adjlen);
439 1.12.30.1 martin if (m1 != m)
440 1.12.30.1 martin m->m_pkthdr.len -= adjlen;
441 1.1 jonathan
442 1.1 jonathan /* Finally, let's relink */
443 1.1 jonathan m1->m_next = mo;
444 1.1 jonathan } else {
445 1.1 jonathan /*
446 1.1 jonathan * The header lies in the "middle" of the mbuf; copy
447 1.1 jonathan * the remainder of the mbuf down over the header.
448 1.1 jonathan */
449 1.11 thorpej IPSEC_STATINC(IPSEC_STAT_INPUT_MIDDLE);
450 1.2 jonathan ovbcopy(mtod(m1, u_char *) + roff + hlen,
451 1.1 jonathan mtod(m1, u_char *) + roff,
452 1.1 jonathan m1->m_len - (roff + hlen));
453 1.1 jonathan m1->m_len -= hlen;
454 1.1 jonathan m->m_pkthdr.len -= hlen;
455 1.1 jonathan }
456 1.1 jonathan return (0);
457 1.1 jonathan }
458 1.1 jonathan
459 1.1 jonathan /*
460 1.1 jonathan * Diagnostic routine to check mbuf alignment as required by the
461 1.1 jonathan * crypto device drivers (that use DMA).
462 1.1 jonathan */
463 1.1 jonathan void
464 1.1 jonathan m_checkalignment(const char* where, struct mbuf *m0, int off, int len)
465 1.1 jonathan {
466 1.1 jonathan int roff;
467 1.1 jonathan struct mbuf *m = m_getptr(m0, off, &roff);
468 1.8 christos void *addr;
469 1.1 jonathan
470 1.1 jonathan if (m == NULL)
471 1.1 jonathan return;
472 1.1 jonathan printf("%s (off %u len %u): ", where, off, len);
473 1.9 degroote addr = mtod(m, char *) + roff;
474 1.1 jonathan do {
475 1.1 jonathan int mlen;
476 1.1 jonathan
477 1.1 jonathan if (((uintptr_t) addr) & 3) {
478 1.1 jonathan printf("addr misaligned %p,", addr);
479 1.1 jonathan break;
480 1.1 jonathan }
481 1.1 jonathan mlen = m->m_len;
482 1.1 jonathan if (mlen > len)
483 1.1 jonathan mlen = len;
484 1.1 jonathan len -= mlen;
485 1.1 jonathan if (len && (mlen & 3)) {
486 1.1 jonathan printf("len mismatch %u,", mlen);
487 1.1 jonathan break;
488 1.1 jonathan }
489 1.1 jonathan m = m->m_next;
490 1.8 christos addr = m ? mtod(m, void *) : NULL;
491 1.1 jonathan } while (m && len > 0);
492 1.1 jonathan for (m = m0; m; m = m->m_next)
493 1.8 christos printf(" [%p:%u]", mtod(m, void *), m->m_len);
494 1.1 jonathan printf("\n");
495 1.1 jonathan }
496