xref: /netbsd-src/sys/net/npf/npf_mbuf.c (revision 7788a0781fe6ff2cce37368b4578a7ade0850cb1)
1 /*	$NetBSD: npf_mbuf.c,v 1.11 2013/02/19 23:57:37 rmind Exp $	*/
2 
3 /*-
4  * Copyright (c) 2009-2012 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * This material is based upon work partially supported by The
8  * NetBSD Foundation under a contract with Mindaugas Rasiukevicius.
9  *
10  * Redistribution and use in source and binary forms, with or without
11  * modification, are permitted provided that the following conditions
12  * are met:
13  * 1. Redistributions of source code must retain the above copyright
14  *    notice, this list of conditions and the following disclaimer.
15  * 2. Redistributions in binary form must reproduce the above copyright
16  *    notice, this list of conditions and the following disclaimer in the
17  *    documentation and/or other materials provided with the distribution.
18  *
19  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
20  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
21  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
22  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
23  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
24  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
25  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
26  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
27  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
28  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
29  * POSSIBILITY OF SUCH DAMAGE.
30  */
31 
32 /*
33  * NPF network buffer management interface.
34  *
35  * Network buffer in NetBSD is mbuf.  Internal mbuf structures are
36  * abstracted within this source.
37  */
38 
39 #include <sys/cdefs.h>
40 __KERNEL_RCSID(0, "$NetBSD: npf_mbuf.c,v 1.11 2013/02/19 23:57:37 rmind Exp $");
41 
42 #include <sys/param.h>
43 #include <sys/mbuf.h>
44 
45 #include "npf_impl.h"
46 
47 #define	NBUF_ENSURE_ALIGN	(MAX(COHERENCY_UNIT, 64))
48 #define	NBUF_ENSURE_MASK	(NBUF_ENSURE_ALIGN - 1)
49 #define	NBUF_ENSURE_ROUNDUP(x)	(((x) + NBUF_ENSURE_ALIGN) & ~NBUF_ENSURE_MASK)
50 
51 void
52 nbuf_init(nbuf_t *nbuf, struct mbuf *m, const ifnet_t *ifp)
53 {
54 	KASSERT((m->m_flags & M_PKTHDR) != 0);
55 	KASSERT(ifp != NULL);
56 
57 	nbuf->nb_mbuf0 = m;
58 	nbuf->nb_ifp = ifp;
59 	nbuf_reset(nbuf);
60 }
61 
62 void
63 nbuf_reset(nbuf_t *nbuf)
64 {
65 	struct mbuf *m = nbuf->nb_mbuf0;
66 
67 	nbuf->nb_mbuf = m;
68 	nbuf->nb_nptr = mtod(m, void *);
69 }
70 
71 void *
72 nbuf_dataptr(nbuf_t *nbuf)
73 {
74 	KASSERT(nbuf->nb_nptr);
75 	return nbuf->nb_nptr;
76 }
77 
78 size_t
79 nbuf_offset(const nbuf_t *nbuf)
80 {
81 	const struct mbuf *m = nbuf->nb_mbuf;
82 	const u_int off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t);
83 	const int poff = m_length(nbuf->nb_mbuf0) - m_length(m) + off;
84 
85 	return poff;
86 }
87 
88 struct mbuf *
89 nbuf_head_mbuf(nbuf_t *nbuf)
90 {
91 	return nbuf->nb_mbuf0;
92 }
93 
94 bool
95 nbuf_flag_p(const nbuf_t *nbuf, int flag)
96 {
97 	return (nbuf->nb_flags & flag) != 0;
98 }
99 
100 void
101 nbuf_unset_flag(nbuf_t *nbuf, int flag)
102 {
103 	nbuf->nb_flags &= ~flag;
104 }
105 
106 /*
107  * nbuf_advance: advance in nbuf or chain by specified amount of bytes and,
108  * if requested, ensure that the area *after* advance is contiguous.
109  *
110  * => Returns new pointer to data in nbuf or NULL if offset is invalid.
111  * => Current nbuf and the offset is stored in the nbuf metadata.
112  */
113 void *
114 nbuf_advance(nbuf_t *nbuf, size_t len, size_t ensure)
115 {
116 	struct mbuf *m = nbuf->nb_mbuf;
117 	u_int off, wmark;
118 	uint8_t *d;
119 
120 	/* Offset with amount to advance. */
121 	off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t) + len;
122 	wmark = m->m_len;
123 
124 	/* Find the mbuf according to offset. */
125 	while (__predict_false(wmark <= off)) {
126 		m = m->m_next;
127 		if (__predict_false(m == NULL)) {
128 			/*
129 			 * If end of the chain, then the offset is
130 			 * higher than packet length.
131 			 */
132 			return NULL;
133 		}
134 		wmark += m->m_len;
135 	}
136 	KASSERT(off < m_length(nbuf->nb_mbuf0));
137 
138 	/* Offset in mbuf data. */
139 	d = mtod(m, uint8_t *);
140 	KASSERT(off >= (wmark - m->m_len));
141 	d += (off - (wmark - m->m_len));
142 
143 	nbuf->nb_mbuf = m;
144 	nbuf->nb_nptr = d;
145 
146 	if (ensure) {
147 		/* Ensure contiguousness (may change nbuf chain). */
148 		d = nbuf_ensure_contig(nbuf, ensure);
149 	}
150 	return d;
151 }
152 
153 /*
154  * nbuf_ensure_contig: check whether the specified length from the current
155  * point in the nbuf is contiguous.  If not, rearrange the chain to be so.
156  *
157  * => Returns pointer to the data at the current offset in the buffer.
158  * => Returns NULL on failure and nbuf becomes invalid.
159  */
160 void *
161 nbuf_ensure_contig(nbuf_t *nbuf, size_t len)
162 {
163 	const struct mbuf * const n = nbuf->nb_mbuf;
164 	const size_t off = (uintptr_t)nbuf->nb_nptr - mtod(n, uintptr_t);
165 
166 	KASSERT(off <= n->m_len);
167 
168 	if (__predict_false(n->m_len < (off + len))) {
169 		struct mbuf *m = nbuf->nb_mbuf0;
170 		const size_t foff = nbuf_offset(nbuf);
171 		const size_t plen = m_length(m);
172 		const size_t mlen = m->m_len;
173 		size_t target;
174 		bool success;
175 
176 		npf_stats_inc(NPF_STAT_NBUF_NONCONTIG);
177 
178 		/* Attempt to round-up to NBUF_ENSURE_ALIGN bytes. */
179 		if ((target = NBUF_ENSURE_ROUNDUP(foff + len)) > plen) {
180 			target = foff + len;
181 		}
182 
183 		/* Rearrange the chain to be contiguous. */
184 		KASSERT((m->m_flags & M_PKTHDR) != 0);
185 		success = m_ensure_contig(&m, target);
186 		KASSERT(m != NULL);
187 
188 		/* If no change in the chain: return what we have. */
189 		if (m == nbuf->nb_mbuf0 && m->m_len == mlen) {
190 			return success ? nbuf->nb_nptr : NULL;
191 		}
192 
193 		/*
194 		 * The mbuf chain was re-arranged.  Update the pointers
195 		 * accordingly and indicate that the references to the data
196 		 * might need a reset.
197 		 */
198 		KASSERT((m->m_flags & M_PKTHDR) != 0);
199 		nbuf->nb_mbuf0 = m;
200 		nbuf->nb_mbuf = m;
201 
202 		KASSERT(foff < m->m_len && foff < m_length(m));
203 		nbuf->nb_nptr = mtod(m, uint8_t *) + foff;
204 		nbuf->nb_flags |= NBUF_DATAREF_RESET;
205 
206 		if (!success) {
207 			npf_stats_inc(NPF_STAT_NBUF_CONTIG_FAIL);
208 			return NULL;
209 		}
210 	}
211 	return nbuf->nb_nptr;
212 }
213 
214 void *
215 nbuf_ensure_writable(nbuf_t *nbuf, size_t len)
216 {
217 	struct mbuf *m = nbuf->nb_mbuf;
218 	const u_int off = (uintptr_t)nbuf->nb_nptr - mtod(m, uintptr_t);
219 	const int tlen = off + len;
220 	bool head_buf;
221 
222 	KASSERT(off < m_length(nbuf->nb_mbuf0));
223 
224 	if (!M_UNWRITABLE(m, tlen)) {
225 		return nbuf->nb_nptr;
226 	}
227 	head_buf = (nbuf->nb_mbuf0 == m);
228 	if (m_makewritable(&m, 0, tlen, M_NOWAIT)) {
229 		memset(nbuf, 0, sizeof(nbuf_t));
230 		return NULL;
231 	}
232 	if (head_buf) {
233 		KASSERT((m->m_flags & M_PKTHDR) != 0);
234 		KASSERT(off < m_length(m));
235 		nbuf->nb_mbuf0 = m;
236 	}
237 	nbuf->nb_mbuf = m;
238 	nbuf->nb_nptr = mtod(m, uint8_t *) + off;
239 
240 	return nbuf->nb_nptr;
241 }
242 
243 bool
244 nbuf_cksum_barrier(nbuf_t *nbuf, int di)
245 {
246 	struct mbuf *m;
247 
248 	if (di != PFIL_OUT) {
249 		return false;
250 	}
251 	m = nbuf->nb_mbuf0;
252 	KASSERT((m->m_flags & M_PKTHDR) != 0);
253 
254 	if (m->m_pkthdr.csum_flags & (M_CSUM_TCPv4 | M_CSUM_UDPv4)) {
255 		in_delayed_cksum(m);
256 		m->m_pkthdr.csum_flags &= ~(M_CSUM_TCPv4 | M_CSUM_UDPv4);
257 		return true;
258 	}
259 	return false;
260 }
261 
262 /*
263  * nbuf_add_tag: add a tag to specified network buffer.
264  *
265  * => Returns 0 on success or errno on failure.
266  */
267 int
268 nbuf_add_tag(nbuf_t *nbuf, uint32_t key, uint32_t val)
269 {
270 	struct mbuf *m = nbuf->nb_mbuf0;
271 	struct m_tag *mt;
272 	uint32_t *dat;
273 
274 	KASSERT((m->m_flags & M_PKTHDR) != 0);
275 
276 	mt = m_tag_get(PACKET_TAG_NPF, sizeof(uint32_t), M_NOWAIT);
277 	if (mt == NULL) {
278 		return ENOMEM;
279 	}
280 	dat = (uint32_t *)(mt + 1);
281 	*dat = val;
282 	m_tag_prepend(m, mt);
283 	return 0;
284 }
285 
286 /*
287  * nbuf_find_tag: find a tag in specified network buffer.
288  *
289  * => Returns 0 on success or errno on failure.
290  */
291 int
292 nbuf_find_tag(nbuf_t *nbuf, uint32_t key, void **data)
293 {
294 	struct mbuf *m = nbuf->nb_mbuf0;
295 	struct m_tag *mt;
296 
297 	KASSERT((m->m_flags & M_PKTHDR) != 0);
298 
299 	mt = m_tag_find(m, PACKET_TAG_NPF, NULL);
300 	if (mt == NULL) {
301 		return EINVAL;
302 	}
303 	*data = (void *)(mt + 1);
304 	return 0;
305 }
306