rmnet_descriptor.c 42 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820821822823824825826827828829830831832833834835836837838839840841842843844845846847848849850851852853854855856857858859860861862863864865866867868869870871872873874875876877878879880881882883884885886887888889890891892893894895896897898899900901902903904905906907908909910911912913914915916917918919920921922923924925926927928929930931932933934935936937938939940941942943944945946947948949950951952953954955956957958959960961962963964965966967968969970971972973974975976977978979980981982983984985986987988989990991992993994995996997998999100010011002100310041005100610071008100910101011101210131014101510161017101810191020102110221023102410251026102710281029103010311032103310341035103610371038103910401041104210431044104510461047104810491050105110521053105410551056105710581059106010611062106310641065106610671068106910701071107210731074107510761077107810791080108110821083108410851086108710881089109010911092109310941095109610971098109911001101110211031104110511061107110811091110111111121113111411151116111711181119112011211122112311241125112611271128112911301131113211331134113511361137113811391140114111421143114411451146114711481149115011511152115311541155115611571158115911601161116211631164116511661167116811691170117111721173117411751176117711781179118011811182118311841185118611871188118911901191119211931194119511961197119811991200120112021203120412051206120712081209121012111212121312141215121612171218121912201221122212231224122512261227122812291230123112321233123412351236123712381239124012411242124312441245124612471248124912501251125212531254125512561257125812591260126112621263126412651266126712681269127012711272127312741275127612771278127912801281128212831284128512861287128812891290129112921293129412951296129712981299130013011302130313041305130613071308130913101311131213131314131513161317131813191320132113221323132413251326132713281329133013311332133313341335133613371338133913401341134213431344134513461347134813491350135113521353135413551356135713581359136013611362136313641365136613671368136913701371137213731374137513761377137813791380138113821383138413851386138713881389139013911392139313941395139613971398139914001401140214031404140514061407140814091410141114121413141414151416141714181419142014211422142314241425142614271428142914301431143214331434143514361437143814391440144114421443144414451446144714481449145014511452145314541455145614571458145914601461146214631464146514661467146814691470147114721473147414751476147714781479148014811482148314841485148614871488148914901491149214931494149514961497149814991500150115021503150415051506150715081509151015111512151315141515151615171518151915201521152215231524152515261527152815291530153115321533153415351536153715381539154015411542154315441545154615471548154915501551155215531554155515561557155815591560156115621563156415651566156715681569157015711572157315741575157615771578157915801581158215831584158515861587158815891590159115921593159415951596159715981599160016011602160316041605160616071608160916101611161216131614161516161617161816191620162116221623162416251626162716281629163016311632163316341635163616371638163916401641164216431644164516461647164816491650165116521653165416551656165716581659166016611662166316641665166616671668
  1. /* Copyright (c) 2013-2021, The Linux Foundation. All rights reserved.
  2. *
  3. * This program is free software; you can redistribute it and/or modify
  4. * it under the terms of the GNU General Public License version 2 and
  5. * only version 2 as published by the Free Software Foundation.
  6. *
  7. * This program is distributed in the hope that it will be useful,
  8. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. * GNU General Public License for more details.
  11. *
  12. * RMNET Packet Descriptor Framework
  13. *
  14. */
  15. #include <linux/ip.h>
  16. #include <linux/ipv6.h>
  17. #include <net/ipv6.h>
  18. #include <net/ip6_checksum.h>
  19. #include "rmnet_config.h"
  20. #include "rmnet_descriptor.h"
  21. #include "rmnet_handlers.h"
  22. #include "rmnet_private.h"
  23. #include "rmnet_vnd.h"
  24. #include "rmnet_qmi.h"
  25. #include "qmi_rmnet.h"
  26. #define RMNET_FRAG_DESCRIPTOR_POOL_SIZE 64
  27. #define RMNET_DL_IND_HDR_SIZE (sizeof(struct rmnet_map_dl_ind_hdr) + \
  28. sizeof(struct rmnet_map_header) + \
  29. sizeof(struct rmnet_map_control_command_header))
  30. #define RMNET_DL_IND_TRL_SIZE (sizeof(struct rmnet_map_dl_ind_trl) + \
  31. sizeof(struct rmnet_map_header) + \
  32. sizeof(struct rmnet_map_control_command_header))
  33. typedef void (*rmnet_perf_desc_hook_t)(struct rmnet_frag_descriptor *frag_desc,
  34. struct rmnet_port *port);
  35. typedef void (*rmnet_perf_chain_hook_t)(void);
  36. struct rmnet_frag_descriptor *
  37. rmnet_get_frag_descriptor(struct rmnet_port *port)
  38. {
  39. struct rmnet_frag_descriptor_pool *pool = port->frag_desc_pool;
  40. struct rmnet_frag_descriptor *frag_desc;
  41. unsigned long flags;
  42. spin_lock_irqsave(&port->desc_pool_lock, flags);
  43. if (!list_empty(&pool->free_list)) {
  44. frag_desc = list_first_entry(&pool->free_list,
  45. struct rmnet_frag_descriptor,
  46. list);
  47. list_del_init(&frag_desc->list);
  48. } else {
  49. frag_desc = kzalloc(sizeof(*frag_desc), GFP_ATOMIC);
  50. if (!frag_desc)
  51. goto out;
  52. INIT_LIST_HEAD(&frag_desc->list);
  53. INIT_LIST_HEAD(&frag_desc->frags);
  54. pool->pool_size++;
  55. }
  56. out:
  57. spin_unlock_irqrestore(&port->desc_pool_lock, flags);
  58. return frag_desc;
  59. }
  60. EXPORT_SYMBOL(rmnet_get_frag_descriptor);
  61. void rmnet_recycle_frag_descriptor(struct rmnet_frag_descriptor *frag_desc,
  62. struct rmnet_port *port)
  63. {
  64. struct rmnet_frag_descriptor_pool *pool = port->frag_desc_pool;
  65. struct rmnet_fragment *frag, *tmp;
  66. unsigned long flags;
  67. list_del(&frag_desc->list);
  68. list_for_each_entry_safe(frag, tmp, &frag_desc->frags, list) {
  69. struct page *page = skb_frag_page(&frag->frag);
  70. if (page)
  71. put_page(page);
  72. list_del(&frag->list);
  73. kfree(frag);
  74. }
  75. memset(frag_desc, 0, sizeof(*frag_desc));
  76. INIT_LIST_HEAD(&frag_desc->list);
  77. INIT_LIST_HEAD(&frag_desc->frags);
  78. spin_lock_irqsave(&port->desc_pool_lock, flags);
  79. list_add_tail(&frag_desc->list, &pool->free_list);
  80. spin_unlock_irqrestore(&port->desc_pool_lock, flags);
  81. }
  82. EXPORT_SYMBOL(rmnet_recycle_frag_descriptor);
  83. void *rmnet_frag_pull(struct rmnet_frag_descriptor *frag_desc,
  84. struct rmnet_port *port, unsigned int size)
  85. {
  86. struct rmnet_fragment *frag, *tmp;
  87. if (size >= frag_desc->len) {
  88. pr_info("%s(): Pulling %u bytes from %u byte pkt. Dropping\n",
  89. __func__, size, frag_desc->len);
  90. rmnet_recycle_frag_descriptor(frag_desc, port);
  91. return NULL;
  92. }
  93. list_for_each_entry_safe(frag, tmp, &frag_desc->frags, list) {
  94. u32 frag_size = skb_frag_size(&frag->frag);
  95. if (!size)
  96. break;
  97. if (size >= frag_size) {
  98. /* Remove the whole frag */
  99. struct page *page = skb_frag_page(&frag->frag);
  100. if (page)
  101. put_page(page);
  102. list_del(&frag->list);
  103. size -= frag_size;
  104. frag_desc->len -= frag_size;
  105. kfree(frag);
  106. continue;
  107. }
  108. /* Pull off 'size' bytes */
  109. skb_frag_off_add(&frag->frag, size);
  110. skb_frag_size_sub(&frag->frag, size);
  111. frag_desc->len -= size;
  112. break;
  113. }
  114. return rmnet_frag_data_ptr(frag_desc);
  115. }
  116. EXPORT_SYMBOL(rmnet_frag_pull);
  117. void *rmnet_frag_trim(struct rmnet_frag_descriptor *frag_desc,
  118. struct rmnet_port *port, unsigned int size)
  119. {
  120. struct rmnet_fragment *frag, *tmp;
  121. unsigned int eat;
  122. if (!size) {
  123. pr_info("%s(): Trimming %u byte pkt to 0. Dropping\n",
  124. __func__, frag_desc->len);
  125. rmnet_recycle_frag_descriptor(frag_desc, port);
  126. return NULL;
  127. }
  128. /* Growing bigger doesn't make sense */
  129. if (size >= frag_desc->len)
  130. goto out;
  131. /* Compute number of bytes to remove from the end */
  132. eat = frag_desc->len - size;
  133. list_for_each_entry_safe_reverse(frag, tmp, &frag_desc->frags, list) {
  134. u32 frag_size = skb_frag_size(&frag->frag);
  135. if (!eat)
  136. goto out;
  137. if (eat >= frag_size) {
  138. /* Remove the whole frag */
  139. struct page *page = skb_frag_page(&frag->frag);
  140. if (page)
  141. put_page(page);
  142. list_del(&frag->list);
  143. eat -= frag_size;
  144. frag_desc->len -= frag_size;
  145. kfree(frag);
  146. continue;
  147. }
  148. /* Chop off 'eat' bytes from the end */
  149. skb_frag_size_sub(&frag->frag, eat);
  150. frag_desc->len -= eat;
  151. goto out;
  152. }
  153. out:
  154. return rmnet_frag_data_ptr(frag_desc);
  155. }
  156. EXPORT_SYMBOL(rmnet_frag_trim);
  157. static int rmnet_frag_copy_data(struct rmnet_frag_descriptor *frag_desc,
  158. u32 off, u32 len, void *buf)
  159. {
  160. struct rmnet_fragment *frag;
  161. u32 frag_size, copy_len;
  162. u32 buf_offset = 0;
  163. /* Don't make me do something we'd both regret */
  164. if (off > frag_desc->len || len > frag_desc->len ||
  165. off + len > frag_desc->len)
  166. return -EINVAL;
  167. /* Copy 'len' bytes into the bufer starting from 'off' */
  168. list_for_each_entry(frag, &frag_desc->frags, list) {
  169. if (!len)
  170. break;
  171. frag_size = skb_frag_size(&frag->frag);
  172. if (off < frag_size) {
  173. copy_len = min_t(u32, len, frag_size - off);
  174. memcpy(buf + buf_offset,
  175. skb_frag_address(&frag->frag) + off,
  176. copy_len);
  177. buf_offset += copy_len;
  178. len -= copy_len;
  179. off = 0;
  180. } else {
  181. off -= frag_size;
  182. }
  183. }
  184. return 0;
  185. }
  186. void *rmnet_frag_header_ptr(struct rmnet_frag_descriptor *frag_desc, u32 off,
  187. u32 len, void *buf)
  188. {
  189. struct rmnet_fragment *frag;
  190. u8 *start;
  191. u32 frag_size, offset;
  192. /* Don't take a long pointer off a short frag */
  193. if (off > frag_desc->len || len > frag_desc->len ||
  194. off + len > frag_desc->len)
  195. return NULL;
  196. /* Find the starting fragment */
  197. offset = off;
  198. list_for_each_entry(frag, &frag_desc->frags, list) {
  199. frag_size = skb_frag_size(&frag->frag);
  200. if (off < frag_size) {
  201. start = skb_frag_address(&frag->frag) + off;
  202. /* If the header is entirely on this frag, just return
  203. * a pointer to it.
  204. */
  205. if (off + len <= frag_size)
  206. return start;
  207. /* Otherwise, we need to copy the data into a linear
  208. * buffer.
  209. */
  210. break;
  211. }
  212. off -= frag_size;
  213. }
  214. if (rmnet_frag_copy_data(frag_desc, offset, len, buf) < 0)
  215. return NULL;
  216. return buf;
  217. }
  218. EXPORT_SYMBOL(rmnet_frag_header_ptr);
  219. int rmnet_frag_descriptor_add_frag(struct rmnet_frag_descriptor *frag_desc,
  220. struct page *p, u32 page_offset, u32 len)
  221. {
  222. struct rmnet_fragment *frag;
  223. frag = kzalloc(sizeof(*frag), GFP_ATOMIC);
  224. if (!frag)
  225. return -ENOMEM;
  226. INIT_LIST_HEAD(&frag->list);
  227. get_page(p);
  228. __skb_frag_set_page(&frag->frag, p);
  229. skb_frag_size_set(&frag->frag, len);
  230. skb_frag_off_set(&frag->frag, page_offset);
  231. list_add_tail(&frag->list, &frag_desc->frags);
  232. frag_desc->len += len;
  233. return 0;
  234. }
  235. EXPORT_SYMBOL(rmnet_frag_descriptor_add_frag);
  236. int rmnet_frag_descriptor_add_frags_from(struct rmnet_frag_descriptor *to,
  237. struct rmnet_frag_descriptor *from,
  238. u32 off, u32 len)
  239. {
  240. struct rmnet_fragment *frag;
  241. int rc;
  242. /* Sanity check the lengths */
  243. if (off > from->len || len > from->len || off + len > from->len)
  244. return -EINVAL;
  245. list_for_each_entry(frag, &from->frags, list) {
  246. u32 frag_size;
  247. if (!len)
  248. break;
  249. frag_size = skb_frag_size(&frag->frag);
  250. if (off < frag_size) {
  251. struct page *p = skb_frag_page(&frag->frag);
  252. u32 page_off = skb_frag_off(&frag->frag);
  253. u32 copy_len = min_t(u32, len, frag_size - off);
  254. rc = rmnet_frag_descriptor_add_frag(to, p,
  255. page_off + off,
  256. copy_len);
  257. if (rc < 0)
  258. return rc;
  259. len -= copy_len;
  260. off = 0;
  261. } else {
  262. off -= frag_size;
  263. }
  264. }
  265. return 0;
  266. }
  267. EXPORT_SYMBOL(rmnet_frag_descriptor_add_frags_from);
  268. int rmnet_frag_ipv6_skip_exthdr(struct rmnet_frag_descriptor *frag_desc,
  269. int start, u8 *nexthdrp, __be16 *fragp)
  270. {
  271. u8 nexthdr = *nexthdrp;
  272. *fragp = 0;
  273. while (ipv6_ext_hdr(nexthdr)) {
  274. struct ipv6_opt_hdr *hp, __hp;
  275. int hdrlen;
  276. if (nexthdr == NEXTHDR_NONE)
  277. return -EINVAL;
  278. hp = rmnet_frag_header_ptr(frag_desc, (u32)start, sizeof(*hp),
  279. &__hp);
  280. if (!hp)
  281. return -EINVAL;
  282. if (nexthdr == NEXTHDR_FRAGMENT) {
  283. u32 off = offsetof(struct frag_hdr, frag_off);
  284. __be16 *fp, __fp;
  285. fp = rmnet_frag_header_ptr(frag_desc, (u32)start + off,
  286. sizeof(*fp), &__fp);
  287. if (!fp)
  288. return -EINVAL;
  289. *fragp = *fp;
  290. if (ntohs(*fragp) & ~0x7)
  291. break;
  292. hdrlen = 8;
  293. } else if (nexthdr == NEXTHDR_AUTH) {
  294. hdrlen = (hp->hdrlen + 2) << 2;
  295. } else {
  296. hdrlen = ipv6_optlen(hp);
  297. }
  298. nexthdr = hp->nexthdr;
  299. start += hdrlen;
  300. }
  301. *nexthdrp = nexthdr;
  302. return start;
  303. }
  304. EXPORT_SYMBOL(rmnet_frag_ipv6_skip_exthdr);
  305. static u8 rmnet_frag_do_flow_control(struct rmnet_map_header *qmap,
  306. struct rmnet_map_control_command *cmd,
  307. struct rmnet_port *port,
  308. int enable)
  309. {
  310. struct rmnet_endpoint *ep;
  311. struct net_device *vnd;
  312. u16 ip_family;
  313. u16 fc_seq;
  314. u32 qos_id;
  315. u8 mux_id;
  316. int r;
  317. mux_id = qmap->mux_id;
  318. if (mux_id >= RMNET_MAX_LOGICAL_EP)
  319. return RX_HANDLER_CONSUMED;
  320. ep = rmnet_get_endpoint(port, mux_id);
  321. if (!ep)
  322. return RX_HANDLER_CONSUMED;
  323. vnd = ep->egress_dev;
  324. ip_family = cmd->flow_control.ip_family;
  325. fc_seq = ntohs(cmd->flow_control.flow_control_seq_num);
  326. qos_id = ntohl(cmd->flow_control.qos_id);
  327. /* Ignore the ip family and pass the sequence number for both v4 and v6
  328. * sequence. User space does not support creating dedicated flows for
  329. * the 2 protocols
  330. */
  331. r = rmnet_vnd_do_flow_control(vnd, enable);
  332. if (r)
  333. return RMNET_MAP_COMMAND_UNSUPPORTED;
  334. else
  335. return RMNET_MAP_COMMAND_ACK;
  336. }
  337. static void rmnet_frag_send_ack(struct rmnet_map_header *qmap,
  338. unsigned char type,
  339. struct rmnet_port *port)
  340. {
  341. struct rmnet_map_control_command *cmd;
  342. struct net_device *dev = port->dev;
  343. struct sk_buff *skb;
  344. u16 alloc_len = ntohs(qmap->pkt_len) + sizeof(*qmap);
  345. skb = alloc_skb(alloc_len, GFP_ATOMIC);
  346. if (!skb)
  347. return;
  348. skb->protocol = htons(ETH_P_MAP);
  349. skb->dev = dev;
  350. cmd = rmnet_map_get_cmd_start(skb);
  351. cmd->cmd_type = type & 0x03;
  352. netif_tx_lock(dev);
  353. dev->netdev_ops->ndo_start_xmit(skb, dev);
  354. netif_tx_unlock(dev);
  355. }
  356. static void
  357. rmnet_frag_process_flow_start(struct rmnet_frag_descriptor *frag_desc,
  358. struct rmnet_map_control_command_header *cmd,
  359. struct rmnet_port *port,
  360. u16 cmd_len)
  361. {
  362. struct rmnet_map_dl_ind_hdr *dlhdr, __dlhdr;
  363. u32 offset = sizeof(struct rmnet_map_header);
  364. u32 data_format;
  365. bool is_dl_mark_v2;
  366. if (cmd_len + offset < RMNET_DL_IND_HDR_SIZE)
  367. return;
  368. data_format = port->data_format;
  369. is_dl_mark_v2 = data_format & RMNET_INGRESS_FORMAT_DL_MARKER_V2;
  370. dlhdr = rmnet_frag_header_ptr(frag_desc, offset + sizeof(*cmd),
  371. sizeof(*dlhdr), &__dlhdr);
  372. if (!dlhdr)
  373. return;
  374. port->stats.dl_hdr_last_ep_id = cmd->source_id;
  375. port->stats.dl_hdr_last_qmap_vers = cmd->reserved;
  376. port->stats.dl_hdr_last_trans_id = cmd->transaction_id;
  377. port->stats.dl_hdr_last_seq = dlhdr->le.seq;
  378. port->stats.dl_hdr_last_bytes = dlhdr->le.bytes;
  379. port->stats.dl_hdr_last_pkts = dlhdr->le.pkts;
  380. port->stats.dl_hdr_last_flows = dlhdr->le.flows;
  381. port->stats.dl_hdr_total_bytes += port->stats.dl_hdr_last_bytes;
  382. port->stats.dl_hdr_total_pkts += port->stats.dl_hdr_last_pkts;
  383. port->stats.dl_hdr_count++;
  384. /* If a target is taking frag path, we can assume DL marker v2 is in
  385. * play
  386. */
  387. if (is_dl_mark_v2)
  388. rmnet_map_dl_hdr_notify_v2(port, dlhdr, cmd);
  389. }
  390. static void
  391. rmnet_frag_process_flow_end(struct rmnet_frag_descriptor *frag_desc,
  392. struct rmnet_map_control_command_header *cmd,
  393. struct rmnet_port *port, u16 cmd_len)
  394. {
  395. struct rmnet_map_dl_ind_trl *dltrl, __dltrl;
  396. u32 offset = sizeof(struct rmnet_map_header);
  397. u32 data_format;
  398. bool is_dl_mark_v2;
  399. if (cmd_len + offset < RMNET_DL_IND_TRL_SIZE)
  400. return;
  401. data_format = port->data_format;
  402. is_dl_mark_v2 = data_format & RMNET_INGRESS_FORMAT_DL_MARKER_V2;
  403. dltrl = rmnet_frag_header_ptr(frag_desc, offset + sizeof(*cmd),
  404. sizeof(*dltrl), &__dltrl);
  405. if (!dltrl)
  406. return;
  407. port->stats.dl_trl_last_seq = dltrl->seq_le;
  408. port->stats.dl_trl_count++;
  409. /* If a target is taking frag path, we can assume DL marker v2 is in
  410. * play
  411. */
  412. if (is_dl_mark_v2)
  413. rmnet_map_dl_trl_notify_v2(port, dltrl, cmd);
  414. }
  415. /* Process MAP command frame and send N/ACK message as appropriate. Message cmd
  416. * name is decoded here and appropriate handler is called.
  417. */
  418. void rmnet_frag_command(struct rmnet_frag_descriptor *frag_desc,
  419. struct rmnet_map_header *qmap, struct rmnet_port *port)
  420. {
  421. struct rmnet_map_control_command *cmd, __cmd;
  422. unsigned char rc = 0;
  423. cmd = rmnet_frag_header_ptr(frag_desc, sizeof(*qmap), sizeof(*cmd),
  424. &__cmd);
  425. if (!cmd)
  426. return;
  427. switch (cmd->command_name) {
  428. case RMNET_MAP_COMMAND_FLOW_ENABLE:
  429. rc = rmnet_frag_do_flow_control(qmap, cmd, port, 1);
  430. break;
  431. case RMNET_MAP_COMMAND_FLOW_DISABLE:
  432. rc = rmnet_frag_do_flow_control(qmap, cmd, port, 0);
  433. break;
  434. default:
  435. rc = RMNET_MAP_COMMAND_UNSUPPORTED;
  436. break;
  437. }
  438. if (rc == RMNET_MAP_COMMAND_ACK)
  439. rmnet_frag_send_ack(qmap, rc, port);
  440. }
  441. int rmnet_frag_flow_command(struct rmnet_frag_descriptor *frag_desc,
  442. struct rmnet_port *port, u16 pkt_len)
  443. {
  444. struct rmnet_map_control_command_header *cmd, __cmd;
  445. cmd = rmnet_frag_header_ptr(frag_desc, sizeof(struct rmnet_map_header),
  446. sizeof(*cmd), &__cmd);
  447. if (!cmd)
  448. return -1;
  449. switch (cmd->command_name) {
  450. case RMNET_MAP_COMMAND_FLOW_START:
  451. rmnet_frag_process_flow_start(frag_desc, cmd, port, pkt_len);
  452. break;
  453. case RMNET_MAP_COMMAND_FLOW_END:
  454. rmnet_frag_process_flow_end(frag_desc, cmd, port, pkt_len);
  455. break;
  456. default:
  457. return 1;
  458. }
  459. return 0;
  460. }
  461. EXPORT_SYMBOL(rmnet_frag_flow_command);
  462. static int rmnet_frag_deaggregate_one(struct sk_buff *skb,
  463. struct rmnet_port *port,
  464. struct list_head *list,
  465. u32 start)
  466. {
  467. struct skb_shared_info *shinfo = skb_shinfo(skb);
  468. struct rmnet_frag_descriptor *frag_desc;
  469. struct rmnet_map_header *maph, __maph;
  470. skb_frag_t *frag;
  471. u32 start_frag, offset, i;
  472. u32 start_frag_size, start_frag_off;
  473. u32 pkt_len, copy_len = 0;
  474. int rc;
  475. for (start_frag = 0, offset = 0; start_frag < shinfo->nr_frags;
  476. start_frag++) {
  477. frag = &shinfo->frags[start_frag];
  478. if (start < skb_frag_size(frag) + offset)
  479. break;
  480. offset += skb_frag_size(frag);
  481. }
  482. if (start_frag == shinfo->nr_frags)
  483. return -1;
  484. /* start - offset is the additional offset into the page to account
  485. * for any data on it we've already used.
  486. */
  487. start_frag_size = skb_frag_size(frag) - (start - offset);
  488. start_frag_off = skb_frag_off(frag) + (start - offset);
  489. /* Grab the QMAP header. Careful, as there's no guarantee that it's
  490. * continugous!
  491. */
  492. if (likely(start_frag_size >= sizeof(*maph))) {
  493. maph = skb_frag_address(frag) + (start - offset);
  494. } else {
  495. /* The header's split across pages. We can rebuild it.
  496. * Probably not faster or stronger than before. But certainly
  497. * more linear.
  498. */
  499. if (skb_copy_bits(skb, start, &__maph, sizeof(__maph)) < 0)
  500. return -1;
  501. maph = &__maph;
  502. }
  503. pkt_len = ntohs(maph->pkt_len);
  504. /* Catch empty frames */
  505. if (!pkt_len)
  506. return -1;
  507. frag_desc = rmnet_get_frag_descriptor(port);
  508. if (!frag_desc)
  509. return -1;
  510. pkt_len += sizeof(*maph);
  511. if (port->data_format & RMNET_FLAGS_INGRESS_MAP_CKSUMV4) {
  512. pkt_len += sizeof(struct rmnet_map_dl_csum_trailer);
  513. } else if ((port->data_format & (RMNET_FLAGS_INGRESS_MAP_CKSUMV5 |
  514. RMNET_FLAGS_INGRESS_COALESCE)) &&
  515. !maph->cd_bit) {
  516. u32 hsize = 0;
  517. u8 type;
  518. /* Check the type. This seems like should be overkill for less
  519. * than a single byte, doesn't it?
  520. */
  521. if (likely(start_frag_size >= sizeof(*maph) + 1)) {
  522. type = *((u8 *)maph + sizeof(*maph));
  523. } else {
  524. if (skb_copy_bits(skb, start + sizeof(*maph), &type,
  525. sizeof(type)) < 0)
  526. return -1;
  527. }
  528. /* Type only uses the first 7 bits */
  529. switch ((type & 0xFE) >> 1) {
  530. case RMNET_MAP_HEADER_TYPE_COALESCING:
  531. hsize = sizeof(struct rmnet_map_v5_coal_header);
  532. break;
  533. case RMNET_MAP_HEADER_TYPE_CSUM_OFFLOAD:
  534. hsize = sizeof(struct rmnet_map_v5_csum_header);
  535. break;
  536. }
  537. pkt_len += hsize;
  538. }
  539. /* Add all frags containing the packet data to the descriptor */
  540. for (i = start_frag; pkt_len > 0 && i < shinfo->nr_frags; ) {
  541. u32 size, off;
  542. u32 copy;
  543. frag = &shinfo->frags[i];
  544. size = skb_frag_size(frag);
  545. off = skb_frag_off(frag);
  546. if (i == start_frag) {
  547. /* These are different for the first one to account for
  548. * the starting offset.
  549. */
  550. size = start_frag_size;
  551. off = start_frag_off;
  552. }
  553. copy = min_t(u32, size, pkt_len);
  554. rc = rmnet_frag_descriptor_add_frag(frag_desc,
  555. skb_frag_page(frag), off,
  556. copy);
  557. if (rc < 0) {
  558. rmnet_recycle_frag_descriptor(frag_desc, port);
  559. return -1;
  560. }
  561. pkt_len -= copy;
  562. copy_len += copy;
  563. /* If the fragment is exhausted, we can move to the next one */
  564. if (!(size - copy_len)) {
  565. i++;
  566. copy_len = 0;
  567. }
  568. }
  569. if (pkt_len) {
  570. /* Packet length is larger than the amount of data we have */
  571. rmnet_recycle_frag_descriptor(frag_desc, port);
  572. return -1;
  573. }
  574. list_add_tail(&frag_desc->list, list);
  575. return (int)frag_desc->len;
  576. }
  577. void rmnet_frag_deaggregate(struct sk_buff *skb, struct rmnet_port *port,
  578. struct list_head *list)
  579. {
  580. u32 start = 0;
  581. int rc;
  582. while (start < skb->len) {
  583. rc = rmnet_frag_deaggregate_one(skb, port, list, start);
  584. if (rc < 0)
  585. return;
  586. start += (u32)rc;
  587. }
  588. }
  589. /* Fill in GSO metadata to allow the SKB to be segmented by the NW stack
  590. * if needed (i.e. forwarding, UDP GRO)
  591. */
  592. static void rmnet_frag_gso_stamp(struct sk_buff *skb,
  593. struct rmnet_frag_descriptor *frag_desc)
  594. {
  595. struct skb_shared_info *shinfo = skb_shinfo(skb);
  596. if (frag_desc->trans_proto == IPPROTO_TCP)
  597. shinfo->gso_type = (frag_desc->ip_proto == 4) ?
  598. SKB_GSO_TCPV4 : SKB_GSO_TCPV6;
  599. else
  600. shinfo->gso_type = SKB_GSO_UDP_L4;
  601. shinfo->gso_size = frag_desc->gso_size;
  602. shinfo->gso_segs = frag_desc->gso_segs;
  603. }
  604. /* Set the partial checksum information. Sets the transport checksum to the
  605. * pseudoheader checksum and sets the offload metadata.
  606. */
  607. static void rmnet_frag_partial_csum(struct sk_buff *skb,
  608. struct rmnet_frag_descriptor *frag_desc)
  609. {
  610. struct iphdr *iph = (struct iphdr *)skb->data;
  611. __sum16 pseudo;
  612. u16 pkt_len = skb->len - frag_desc->ip_len;
  613. if (frag_desc->ip_proto == 4) {
  614. iph->tot_len = htons(skb->len);
  615. iph->check = 0;
  616. iph->check = ip_fast_csum(iph, iph->ihl);
  617. pseudo = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
  618. pkt_len, frag_desc->trans_proto,
  619. 0);
  620. } else {
  621. struct ipv6hdr *ip6h = (struct ipv6hdr *)iph;
  622. /* Payload length includes any extension headers */
  623. ip6h->payload_len = htons(skb->len - sizeof(*ip6h));
  624. pseudo = ~csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
  625. pkt_len, frag_desc->trans_proto, 0);
  626. }
  627. if (frag_desc->trans_proto == IPPROTO_TCP) {
  628. struct tcphdr *tp = (struct tcphdr *)
  629. ((u8 *)iph + frag_desc->ip_len);
  630. tp->check = pseudo;
  631. skb->csum_offset = offsetof(struct tcphdr, check);
  632. } else {
  633. struct udphdr *up = (struct udphdr *)
  634. ((u8 *)iph + frag_desc->ip_len);
  635. up->len = htons(pkt_len);
  636. up->check = pseudo;
  637. skb->csum_offset = offsetof(struct udphdr, check);
  638. }
  639. skb->ip_summed = CHECKSUM_PARTIAL;
  640. skb->csum_start = (u8 *)iph + frag_desc->ip_len - skb->head;
  641. }
  642. /* Allocate and populate an skb to contain the packet represented by the
  643. * frag descriptor.
  644. */
  645. static struct sk_buff *rmnet_alloc_skb(struct rmnet_frag_descriptor *frag_desc,
  646. struct rmnet_port *port)
  647. {
  648. struct sk_buff *head_skb, *current_skb, *skb;
  649. struct skb_shared_info *shinfo;
  650. struct rmnet_fragment *frag, *tmp;
  651. /* Use the exact sizes if we know them (i.e. RSB/RSC, rmnet_perf) */
  652. if (frag_desc->hdrs_valid) {
  653. u16 hdr_len = frag_desc->ip_len + frag_desc->trans_len;
  654. head_skb = alloc_skb(hdr_len + RMNET_MAP_DEAGGR_HEADROOM,
  655. GFP_ATOMIC);
  656. if (!head_skb)
  657. return NULL;
  658. skb_reserve(head_skb, RMNET_MAP_DEAGGR_HEADROOM);
  659. rmnet_frag_copy_data(frag_desc, 0, hdr_len,
  660. skb_put(head_skb, hdr_len));
  661. skb_reset_network_header(head_skb);
  662. if (frag_desc->trans_len)
  663. skb_set_transport_header(head_skb, frag_desc->ip_len);
  664. /* Pull the headers off carefully */
  665. if (hdr_len == frag_desc->len)
  666. /* Fast forward "header only" packets */
  667. goto skip_frags;
  668. if (!rmnet_frag_pull(frag_desc, port, hdr_len)) {
  669. kfree(head_skb);
  670. return NULL;
  671. }
  672. } else {
  673. /* Allocate enough space to avoid penalties in the stack
  674. * from __pskb_pull_tail()
  675. */
  676. head_skb = alloc_skb(256 + RMNET_MAP_DEAGGR_HEADROOM,
  677. GFP_ATOMIC);
  678. if (!head_skb)
  679. return NULL;
  680. skb_reserve(head_skb, RMNET_MAP_DEAGGR_HEADROOM);
  681. }
  682. shinfo = skb_shinfo(head_skb);
  683. current_skb = head_skb;
  684. /* Add in the page fragments */
  685. list_for_each_entry_safe(frag, tmp, &frag_desc->frags, list) {
  686. struct page *p = skb_frag_page(&frag->frag);
  687. u32 frag_size = skb_frag_size(&frag->frag);
  688. add_frag:
  689. if (shinfo->nr_frags < MAX_SKB_FRAGS) {
  690. get_page(p);
  691. skb_add_rx_frag(current_skb, shinfo->nr_frags, p,
  692. skb_frag_off(&frag->frag), frag_size,
  693. frag_size);
  694. if (current_skb != head_skb) {
  695. head_skb->len += frag_size;
  696. head_skb->data_len += frag_size;
  697. }
  698. } else {
  699. /* Alloc a new skb and try again */
  700. skb = alloc_skb(0, GFP_ATOMIC);
  701. if (!skb)
  702. break;
  703. if (current_skb == head_skb)
  704. shinfo->frag_list = skb;
  705. else
  706. current_skb->next = skb;
  707. current_skb = skb;
  708. shinfo = skb_shinfo(current_skb);
  709. goto add_frag;
  710. }
  711. }
  712. skip_frags:
  713. head_skb->dev = frag_desc->dev;
  714. rmnet_set_skb_proto(head_skb);
  715. /* Handle any header metadata that needs to be updated after RSB/RSC
  716. * segmentation
  717. */
  718. if (frag_desc->ip_id_set) {
  719. struct iphdr *iph;
  720. iph = (struct iphdr *)rmnet_map_data_ptr(head_skb);
  721. csum_replace2(&iph->check, iph->id, frag_desc->ip_id);
  722. iph->id = frag_desc->ip_id;
  723. }
  724. if (frag_desc->tcp_seq_set) {
  725. struct tcphdr *th;
  726. th = (struct tcphdr *)
  727. (rmnet_map_data_ptr(head_skb) + frag_desc->ip_len);
  728. th->seq = frag_desc->tcp_seq;
  729. }
  730. if (frag_desc->tcp_flags_set) {
  731. struct tcphdr *th;
  732. __be16 *flags;
  733. th = (struct tcphdr *)
  734. (rmnet_map_data_ptr(head_skb) + frag_desc->ip_len);
  735. flags = (__be16 *)&tcp_flag_word(th);
  736. *flags = frag_desc->tcp_flags;
  737. }
  738. /* Handle csum offloading */
  739. if (frag_desc->csum_valid && frag_desc->hdrs_valid) {
  740. /* Set the partial checksum information */
  741. rmnet_frag_partial_csum(head_skb, frag_desc);
  742. } else if (frag_desc->csum_valid) {
  743. /* Non-RSB/RSC/perf packet. The current checksum is fine */
  744. head_skb->ip_summed = CHECKSUM_UNNECESSARY;
  745. } else if (frag_desc->hdrs_valid &&
  746. (frag_desc->trans_proto == IPPROTO_TCP ||
  747. frag_desc->trans_proto == IPPROTO_UDP)) {
  748. /* Unfortunately, we have to fake a bad checksum here, since
  749. * the original bad value is lost by the hardware. The only
  750. * reliable way to do it is to calculate the actual checksum
  751. * and corrupt it.
  752. */
  753. __sum16 *check;
  754. __wsum csum;
  755. unsigned int offset = skb_transport_offset(head_skb);
  756. __sum16 pseudo;
  757. /* Calculate pseudo header and update header fields */
  758. if (frag_desc->ip_proto == 4) {
  759. struct iphdr *iph = ip_hdr(head_skb);
  760. __be16 tot_len = htons(head_skb->len);
  761. csum_replace2(&iph->check, iph->tot_len, tot_len);
  762. iph->tot_len = tot_len;
  763. pseudo = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
  764. head_skb->len -
  765. frag_desc->ip_len,
  766. frag_desc->trans_proto, 0);
  767. } else {
  768. struct ipv6hdr *ip6h = ipv6_hdr(head_skb);
  769. ip6h->payload_len = htons(head_skb->len -
  770. sizeof(*ip6h));
  771. pseudo = ~csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
  772. head_skb->len -
  773. frag_desc->ip_len,
  774. frag_desc->trans_proto, 0);
  775. }
  776. if (frag_desc->trans_proto == IPPROTO_TCP) {
  777. check = &tcp_hdr(head_skb)->check;
  778. } else {
  779. udp_hdr(head_skb)->len = htons(head_skb->len -
  780. frag_desc->ip_len);
  781. check = &udp_hdr(head_skb)->check;
  782. }
  783. *check = pseudo;
  784. csum = skb_checksum(head_skb, offset, head_skb->len - offset,
  785. 0);
  786. /* Add 1 to corrupt. This cannot produce a final value of 0
  787. * since csum_fold() can't return a value of 0xFFFF
  788. */
  789. *check = csum16_add(csum_fold(csum), htons(1));
  790. head_skb->ip_summed = CHECKSUM_NONE;
  791. }
  792. /* Handle any rmnet_perf metadata */
  793. if (frag_desc->hash) {
  794. head_skb->hash = frag_desc->hash;
  795. head_skb->sw_hash = 1;
  796. }
  797. if (frag_desc->flush_shs)
  798. head_skb->cb[0] = 1;
  799. /* Handle coalesced packets */
  800. if (frag_desc->gso_segs > 1)
  801. rmnet_frag_gso_stamp(head_skb, frag_desc);
  802. return head_skb;
  803. }
  804. /* Deliver the packets contained within a frag descriptor */
  805. void rmnet_frag_deliver(struct rmnet_frag_descriptor *frag_desc,
  806. struct rmnet_port *port)
  807. {
  808. struct sk_buff *skb;
  809. skb = rmnet_alloc_skb(frag_desc, port);
  810. if (skb)
  811. rmnet_deliver_skb(skb, port);
  812. rmnet_recycle_frag_descriptor(frag_desc, port);
  813. }
  814. EXPORT_SYMBOL(rmnet_frag_deliver);
  815. static void __rmnet_frag_segment_data(struct rmnet_frag_descriptor *coal_desc,
  816. struct rmnet_port *port,
  817. struct list_head *list, u8 pkt_id,
  818. bool csum_valid)
  819. {
  820. struct rmnet_priv *priv = netdev_priv(coal_desc->dev);
  821. struct rmnet_frag_descriptor *new_desc;
  822. u32 dlen = coal_desc->gso_size * coal_desc->gso_segs;
  823. u32 hlen = coal_desc->ip_len + coal_desc->trans_len;
  824. u32 offset = hlen + coal_desc->data_offset;
  825. int rc;
  826. new_desc = rmnet_get_frag_descriptor(port);
  827. if (!new_desc)
  828. return;
  829. /* Header information and most metadata is the same as the original */
  830. memcpy(new_desc, coal_desc, sizeof(*coal_desc));
  831. INIT_LIST_HEAD(&new_desc->list);
  832. INIT_LIST_HEAD(&new_desc->frags);
  833. new_desc->len = 0;
  834. /* Add the header fragments */
  835. rc = rmnet_frag_descriptor_add_frags_from(new_desc, coal_desc, 0,
  836. hlen);
  837. if (rc < 0)
  838. goto recycle;
  839. /* Add in the data fragments */
  840. rc = rmnet_frag_descriptor_add_frags_from(new_desc, coal_desc, offset,
  841. dlen);
  842. if (rc < 0)
  843. goto recycle;
  844. /* Update protocol-specific metadata */
  845. if (coal_desc->trans_proto == IPPROTO_TCP) {
  846. struct tcphdr *th, __th;
  847. th = rmnet_frag_header_ptr(coal_desc, coal_desc->ip_len,
  848. sizeof(*th), &__th);
  849. if (!th)
  850. goto recycle;
  851. new_desc->tcp_seq_set = 1;
  852. new_desc->tcp_seq = htonl(ntohl(th->seq) +
  853. coal_desc->data_offset);
  854. /* Don't allow any dangerous flags to appear in any segments
  855. * other than the last.
  856. */
  857. if (th->fin || th->psh) {
  858. if (offset + dlen < coal_desc->len) {
  859. __be32 flag_word = tcp_flag_word(th);
  860. /* Clear the FIN and PSH flags from this
  861. * segment.
  862. */
  863. flag_word &= ~TCP_FLAG_FIN;
  864. flag_word &= ~TCP_FLAG_PSH;
  865. new_desc->tcp_flags_set = 1;
  866. new_desc->tcp_flags = *((__be16 *)&flag_word);
  867. }
  868. }
  869. } else if (coal_desc->trans_proto == IPPROTO_UDP) {
  870. struct udphdr *uh, __uh;
  871. uh = rmnet_frag_header_ptr(coal_desc, coal_desc->ip_len,
  872. sizeof(*uh), &__uh);
  873. if (!uh)
  874. goto recycle;
  875. if (coal_desc->ip_proto == 4 && !uh->check)
  876. csum_valid = true;
  877. }
  878. if (coal_desc->ip_proto == 4) {
  879. struct iphdr *iph, __iph;
  880. iph = rmnet_frag_header_ptr(coal_desc, 0, sizeof(*iph),
  881. &__iph);
  882. if (!iph)
  883. goto recycle;
  884. new_desc->ip_id_set = 1;
  885. new_desc->ip_id = htons(ntohs(iph->id) + coal_desc->pkt_id);
  886. }
  887. new_desc->csum_valid = csum_valid;
  888. priv->stats.coal.coal_reconstruct++;
  889. /* Update meta information to move past the data we just segmented */
  890. coal_desc->data_offset += dlen;
  891. coal_desc->pkt_id = pkt_id + 1;
  892. coal_desc->gso_segs = 0;
  893. list_add_tail(&new_desc->list, list);
  894. return;
  895. recycle:
  896. rmnet_recycle_frag_descriptor(new_desc, port);
  897. }
  898. static bool rmnet_frag_validate_csum(struct rmnet_frag_descriptor *frag_desc)
  899. {
  900. u8 *data = rmnet_frag_data_ptr(frag_desc);
  901. unsigned int datagram_len;
  902. __wsum csum;
  903. __sum16 pseudo;
  904. /* Keep analysis tools happy, since they will see that
  905. * rmnet_frag_data_ptr() could return NULL. It can't in this case,
  906. * since we can't get this far otherwise...
  907. */
  908. if (unlikely(!data))
  909. return false;
  910. datagram_len = frag_desc->len - frag_desc->ip_len;
  911. if (frag_desc->ip_proto == 4) {
  912. struct iphdr *iph = (struct iphdr *)data;
  913. pseudo = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
  914. datagram_len,
  915. frag_desc->trans_proto, 0);
  916. } else {
  917. struct ipv6hdr *ip6h = (struct ipv6hdr *)data;
  918. pseudo = ~csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
  919. datagram_len, frag_desc->trans_proto,
  920. 0);
  921. }
  922. csum = csum_partial(data + frag_desc->ip_len, datagram_len,
  923. csum_unfold(pseudo));
  924. return !csum_fold(csum);
  925. }
  926. /* Converts the coalesced frame into a list of descriptors.
  927. * NLOs containing csum erros will not be included.
  928. */
  929. static void
  930. rmnet_frag_segment_coal_data(struct rmnet_frag_descriptor *coal_desc,
  931. u64 nlo_err_mask, struct rmnet_port *port,
  932. struct list_head *list)
  933. {
  934. struct rmnet_priv *priv = netdev_priv(coal_desc->dev);
  935. struct rmnet_map_v5_coal_header coal_hdr;
  936. u8 *version;
  937. u16 pkt_len;
  938. u8 pkt, total_pkt = 0;
  939. u8 nlo;
  940. bool gro = coal_desc->dev->features & NETIF_F_GRO_HW;
  941. bool zero_csum = false;
  942. /* Copy the coal header into our local storage before pulling it. It's
  943. * possible that this header (or part of it) is the last port of a page
  944. * a pulling it off would cause it to be freed. Referring back to the
  945. * header would be invalid in that case.
  946. */
  947. if (rmnet_frag_copy_data(coal_desc, sizeof(struct rmnet_map_header),
  948. sizeof(coal_hdr), &coal_hdr) < 0)
  949. return;
  950. /* Pull off the headers we no longer need */
  951. if (!rmnet_frag_pull(coal_desc, port, sizeof(struct rmnet_map_header) +
  952. sizeof(coal_hdr)))
  953. return;
  954. /* By definition, this byte is linear, and the first byte on the
  955. * first fragment. ;) Hence why no header_ptr() call is needed
  956. * for it.
  957. */
  958. version = rmnet_frag_data_ptr(coal_desc);
  959. if (unlikely(!version))
  960. return;
  961. if ((*version & 0xF0) == 0x40) {
  962. struct iphdr *iph, __iph;
  963. iph = rmnet_frag_header_ptr(coal_desc, 0, sizeof(*iph),
  964. &__iph);
  965. if (!iph)
  966. return;
  967. coal_desc->ip_proto = 4;
  968. coal_desc->ip_len = iph->ihl * 4;
  969. coal_desc->trans_proto = iph->protocol;
  970. /* Don't allow coalescing of any packets with IP options */
  971. if (iph->ihl != 5)
  972. gro = false;
  973. } else if ((*version & 0xF0) == 0x60) {
  974. struct ipv6hdr *ip6h, __ip6h;
  975. int ip_len;
  976. __be16 frag_off;
  977. u8 protocol;
  978. ip6h = rmnet_frag_header_ptr(coal_desc, 0, sizeof(*ip6h),
  979. &__ip6h);
  980. if (!ip6h)
  981. return;
  982. coal_desc->ip_proto = 6;
  983. protocol = ip6h->nexthdr;
  984. ip_len = rmnet_frag_ipv6_skip_exthdr(coal_desc,
  985. sizeof(*ip6h),
  986. &protocol,
  987. &frag_off);
  988. coal_desc->trans_proto = protocol;
  989. /* If we run into a problem, or this has a fragment header
  990. * (which should technically not be possible, if the HW
  991. * works as intended...), bail.
  992. */
  993. if (ip_len < 0 || frag_off) {
  994. priv->stats.coal.coal_ip_invalid++;
  995. return;
  996. }
  997. coal_desc->ip_len = (u16)ip_len;
  998. if (coal_desc->ip_len > sizeof(*ip6h)) {
  999. /* Don't allow coalescing of any packets with IPv6
  1000. * extension headers.
  1001. */
  1002. gro = false;
  1003. }
  1004. } else {
  1005. priv->stats.coal.coal_ip_invalid++;
  1006. return;
  1007. }
  1008. if (coal_desc->trans_proto == IPPROTO_TCP) {
  1009. struct tcphdr *th, __th;
  1010. th = rmnet_frag_header_ptr(coal_desc,
  1011. coal_desc->ip_len, sizeof(*th),
  1012. &__th);
  1013. if (!th)
  1014. return;
  1015. coal_desc->trans_len = th->doff * 4;
  1016. priv->stats.coal.coal_tcp++;
  1017. priv->stats.coal.coal_tcp_bytes += coal_desc->len;
  1018. } else if (coal_desc->trans_proto == IPPROTO_UDP) {
  1019. struct udphdr *uh, __uh;
  1020. uh = rmnet_frag_header_ptr(coal_desc,
  1021. coal_desc->ip_len, sizeof(*uh),
  1022. &__uh);
  1023. if (!uh)
  1024. return;
  1025. coal_desc->trans_len = sizeof(*uh);
  1026. priv->stats.coal.coal_udp++;
  1027. priv->stats.coal.coal_udp_bytes += coal_desc->len;
  1028. if (coal_desc->ip_proto == 4 && !uh->check)
  1029. zero_csum = true;
  1030. } else {
  1031. priv->stats.coal.coal_trans_invalid++;
  1032. return;
  1033. }
  1034. coal_desc->hdrs_valid = 1;
  1035. if (rmnet_map_v5_csum_buggy(&coal_hdr) && !zero_csum) {
  1036. /* Mark the checksum as valid if it checks out */
  1037. if (rmnet_frag_validate_csum(coal_desc))
  1038. coal_desc->csum_valid = true;
  1039. coal_desc->gso_size = ntohs(coal_hdr.nl_pairs[0].pkt_len);
  1040. coal_desc->gso_size -= coal_desc->ip_len + coal_desc->trans_len;
  1041. coal_desc->gso_segs = coal_hdr.nl_pairs[0].num_packets;
  1042. list_add_tail(&coal_desc->list, list);
  1043. return;
  1044. }
  1045. /* Fast-forward the case where we have 1 NLO (i.e. 1 packet length),
  1046. * no checksum errors, and are allowing GRO. We can just reuse this
  1047. * descriptor unchanged.
  1048. */
  1049. if (gro && coal_hdr.num_nlos == 1 && coal_hdr.csum_valid) {
  1050. coal_desc->csum_valid = true;
  1051. coal_desc->gso_size = ntohs(coal_hdr.nl_pairs[0].pkt_len);
  1052. coal_desc->gso_size -= coal_desc->ip_len + coal_desc->trans_len;
  1053. coal_desc->gso_segs = coal_hdr.nl_pairs[0].num_packets;
  1054. list_add_tail(&coal_desc->list, list);
  1055. return;
  1056. }
  1057. /* Segment the coalesced descriptor into new packets */
  1058. for (nlo = 0; nlo < coal_hdr.num_nlos; nlo++) {
  1059. pkt_len = ntohs(coal_hdr.nl_pairs[nlo].pkt_len);
  1060. pkt_len -= coal_desc->ip_len + coal_desc->trans_len;
  1061. coal_desc->gso_size = pkt_len;
  1062. for (pkt = 0; pkt < coal_hdr.nl_pairs[nlo].num_packets;
  1063. pkt++, total_pkt++, nlo_err_mask >>= 1) {
  1064. bool csum_err = nlo_err_mask & 1;
  1065. /* Segment the packet if we're not sending the larger
  1066. * packet up the stack.
  1067. */
  1068. if (!gro) {
  1069. coal_desc->gso_segs = 1;
  1070. if (csum_err)
  1071. priv->stats.coal.coal_csum_err++;
  1072. __rmnet_frag_segment_data(coal_desc, port,
  1073. list, total_pkt,
  1074. !csum_err);
  1075. continue;
  1076. }
  1077. if (csum_err) {
  1078. priv->stats.coal.coal_csum_err++;
  1079. /* Segment out the good data */
  1080. if (coal_desc->gso_segs)
  1081. __rmnet_frag_segment_data(coal_desc,
  1082. port,
  1083. list,
  1084. total_pkt,
  1085. true);
  1086. /* Segment out the bad checksum */
  1087. coal_desc->gso_segs = 1;
  1088. __rmnet_frag_segment_data(coal_desc, port,
  1089. list, total_pkt,
  1090. false);
  1091. } else {
  1092. coal_desc->gso_segs++;
  1093. }
  1094. }
  1095. /* If we're switching NLOs, we need to send out everything from
  1096. * the previous one, if we haven't done so. NLOs only switch
  1097. * when the packet length changes.
  1098. */
  1099. if (coal_desc->gso_segs)
  1100. __rmnet_frag_segment_data(coal_desc, port, list,
  1101. total_pkt, true);
  1102. }
  1103. }
  1104. /* Record reason for coalescing pipe closure */
  1105. static void rmnet_frag_data_log_close_stats(struct rmnet_priv *priv, u8 type,
  1106. u8 code)
  1107. {
  1108. struct rmnet_coal_close_stats *stats = &priv->stats.coal.close;
  1109. switch (type) {
  1110. case RMNET_MAP_COAL_CLOSE_NON_COAL:
  1111. stats->non_coal++;
  1112. break;
  1113. case RMNET_MAP_COAL_CLOSE_IP_MISS:
  1114. stats->ip_miss++;
  1115. break;
  1116. case RMNET_MAP_COAL_CLOSE_TRANS_MISS:
  1117. stats->trans_miss++;
  1118. break;
  1119. case RMNET_MAP_COAL_CLOSE_HW:
  1120. switch (code) {
  1121. case RMNET_MAP_COAL_CLOSE_HW_NL:
  1122. stats->hw_nl++;
  1123. break;
  1124. case RMNET_MAP_COAL_CLOSE_HW_PKT:
  1125. stats->hw_pkt++;
  1126. break;
  1127. case RMNET_MAP_COAL_CLOSE_HW_BYTE:
  1128. stats->hw_byte++;
  1129. break;
  1130. case RMNET_MAP_COAL_CLOSE_HW_TIME:
  1131. stats->hw_time++;
  1132. break;
  1133. case RMNET_MAP_COAL_CLOSE_HW_EVICT:
  1134. stats->hw_evict++;
  1135. break;
  1136. default:
  1137. break;
  1138. }
  1139. break;
  1140. case RMNET_MAP_COAL_CLOSE_COAL:
  1141. stats->coal++;
  1142. break;
  1143. default:
  1144. break;
  1145. }
  1146. }
  1147. /* Check if the coalesced header has any incorrect values, in which case, the
  1148. * entire coalesced frame must be dropped. Then check if there are any
  1149. * checksum issues
  1150. */
  1151. static int
  1152. rmnet_frag_data_check_coal_header(struct rmnet_frag_descriptor *frag_desc,
  1153. u64 *nlo_err_mask)
  1154. {
  1155. struct rmnet_map_v5_coal_header *coal_hdr, __coal_hdr;
  1156. struct rmnet_priv *priv = netdev_priv(frag_desc->dev);
  1157. u64 mask = 0;
  1158. int i;
  1159. u8 veid, pkts = 0;
  1160. coal_hdr = rmnet_frag_header_ptr(frag_desc,
  1161. sizeof(struct rmnet_map_header),
  1162. sizeof(*coal_hdr), &__coal_hdr);
  1163. if (!coal_hdr)
  1164. return -EINVAL;
  1165. veid = coal_hdr->virtual_channel_id;
  1166. if (coal_hdr->num_nlos == 0 ||
  1167. coal_hdr->num_nlos > RMNET_MAP_V5_MAX_NLOS) {
  1168. priv->stats.coal.coal_hdr_nlo_err++;
  1169. return -EINVAL;
  1170. }
  1171. for (i = 0; i < RMNET_MAP_V5_MAX_NLOS; i++) {
  1172. /* If there is a checksum issue, we need to split
  1173. * up the skb. Rebuild the full csum error field
  1174. */
  1175. u8 err = coal_hdr->nl_pairs[i].csum_error_bitmap;
  1176. u8 pkt = coal_hdr->nl_pairs[i].num_packets;
  1177. mask |= ((u64)err) << (8 * i);
  1178. /* Track total packets in frame */
  1179. pkts += pkt;
  1180. if (pkts > RMNET_MAP_V5_MAX_PACKETS) {
  1181. priv->stats.coal.coal_hdr_pkt_err++;
  1182. return -EINVAL;
  1183. }
  1184. }
  1185. /* Track number of packets we get inside of coalesced frames */
  1186. priv->stats.coal.coal_pkts += pkts;
  1187. /* Update ethtool stats */
  1188. rmnet_frag_data_log_close_stats(priv,
  1189. coal_hdr->close_type,
  1190. coal_hdr->close_value);
  1191. if (veid < RMNET_MAX_VEID)
  1192. priv->stats.coal.coal_veid[veid]++;
  1193. *nlo_err_mask = mask;
  1194. return 0;
  1195. }
  1196. /* Process a QMAPv5 packet header */
  1197. int rmnet_frag_process_next_hdr_packet(struct rmnet_frag_descriptor *frag_desc,
  1198. struct rmnet_port *port,
  1199. struct list_head *list,
  1200. u16 len)
  1201. {
  1202. struct rmnet_map_v5_csum_header *csum_hdr, __csum_hdr;
  1203. struct rmnet_priv *priv = netdev_priv(frag_desc->dev);
  1204. u64 nlo_err_mask;
  1205. u32 offset = sizeof(struct rmnet_map_header);
  1206. int rc = 0;
  1207. /* Grab the header type. It's easier to grab enough for a full csum
  1208. * offload header here since it's only 8 bytes and then check the
  1209. * header type using that. This also doubles as a check to make sure
  1210. * there's enough data after the QMAP header to ensure that another
  1211. * header is present.
  1212. */
  1213. csum_hdr = rmnet_frag_header_ptr(frag_desc, offset, sizeof(*csum_hdr),
  1214. &__csum_hdr);
  1215. if (!csum_hdr)
  1216. return -EINVAL;
  1217. switch (csum_hdr->header_type) {
  1218. case RMNET_MAP_HEADER_TYPE_COALESCING:
  1219. priv->stats.coal.coal_rx++;
  1220. rc = rmnet_frag_data_check_coal_header(frag_desc,
  1221. &nlo_err_mask);
  1222. if (rc)
  1223. return rc;
  1224. rmnet_frag_segment_coal_data(frag_desc, nlo_err_mask, port,
  1225. list);
  1226. if (list_first_entry(list, struct rmnet_frag_descriptor,
  1227. list) != frag_desc)
  1228. rmnet_recycle_frag_descriptor(frag_desc, port);
  1229. break;
  1230. case RMNET_MAP_HEADER_TYPE_CSUM_OFFLOAD:
  1231. if (unlikely(!(frag_desc->dev->features & NETIF_F_RXCSUM))) {
  1232. priv->stats.csum_sw++;
  1233. } else if (csum_hdr->csum_valid_required) {
  1234. priv->stats.csum_ok++;
  1235. frag_desc->csum_valid = true;
  1236. } else {
  1237. priv->stats.csum_valid_unset++;
  1238. }
  1239. if (!rmnet_frag_pull(frag_desc, port,
  1240. offset + sizeof(*csum_hdr))) {
  1241. rc = -EINVAL;
  1242. break;
  1243. }
  1244. /* Remove padding only for csum offload packets.
  1245. * Coalesced packets should never have padding.
  1246. */
  1247. if (!rmnet_frag_trim(frag_desc, port, len)) {
  1248. rc = -EINVAL;
  1249. break;
  1250. }
  1251. list_del_init(&frag_desc->list);
  1252. list_add_tail(&frag_desc->list, list);
  1253. break;
  1254. default:
  1255. rc = -EINVAL;
  1256. break;
  1257. }
  1258. return rc;
  1259. }
  1260. /* Perf hook handler */
  1261. rmnet_perf_desc_hook_t rmnet_perf_desc_entry __rcu __read_mostly;
  1262. EXPORT_SYMBOL(rmnet_perf_desc_entry);
  1263. static void
  1264. __rmnet_frag_ingress_handler(struct rmnet_frag_descriptor *frag_desc,
  1265. struct rmnet_port *port)
  1266. {
  1267. rmnet_perf_desc_hook_t rmnet_perf_ingress;
  1268. struct rmnet_map_header *qmap, __qmap;
  1269. struct rmnet_endpoint *ep;
  1270. struct rmnet_frag_descriptor *frag, *tmp;
  1271. LIST_HEAD(segs);
  1272. u16 len, pad;
  1273. u8 mux_id;
  1274. qmap = rmnet_frag_header_ptr(frag_desc, 0, sizeof(*qmap), &__qmap);
  1275. if (!qmap)
  1276. goto recycle;
  1277. mux_id = qmap->mux_id;
  1278. pad = qmap->pad_len;
  1279. len = ntohs(qmap->pkt_len) - pad;
  1280. if (qmap->cd_bit) {
  1281. qmi_rmnet_set_dl_msg_active(port);
  1282. if (port->data_format & RMNET_INGRESS_FORMAT_DL_MARKER) {
  1283. rmnet_frag_flow_command(frag_desc, port, len);
  1284. goto recycle;
  1285. }
  1286. if (port->data_format & RMNET_FLAGS_INGRESS_MAP_COMMANDS)
  1287. rmnet_frag_command(frag_desc, qmap, port);
  1288. goto recycle;
  1289. }
  1290. if (mux_id >= RMNET_MAX_LOGICAL_EP)
  1291. goto recycle;
  1292. ep = rmnet_get_endpoint(port, mux_id);
  1293. if (!ep)
  1294. goto recycle;
  1295. frag_desc->dev = ep->egress_dev;
  1296. /* Handle QMAPv5 packet */
  1297. if (qmap->next_hdr &&
  1298. (port->data_format & (RMNET_FLAGS_INGRESS_COALESCE |
  1299. RMNET_FLAGS_INGRESS_MAP_CKSUMV5))) {
  1300. if (rmnet_frag_process_next_hdr_packet(frag_desc, port, &segs,
  1301. len))
  1302. goto recycle;
  1303. } else {
  1304. /* We only have the main QMAP header to worry about */
  1305. if (!rmnet_frag_pull(frag_desc, port, sizeof(*qmap)))
  1306. return;
  1307. if (!rmnet_frag_trim(frag_desc, port, len))
  1308. return;
  1309. list_add_tail(&frag_desc->list, &segs);
  1310. }
  1311. if (port->data_format & RMNET_INGRESS_FORMAT_PS)
  1312. qmi_rmnet_work_maybe_restart(port);
  1313. rcu_read_lock();
  1314. rmnet_perf_ingress = rcu_dereference(rmnet_perf_desc_entry);
  1315. if (rmnet_perf_ingress) {
  1316. list_for_each_entry_safe(frag, tmp, &segs, list) {
  1317. list_del_init(&frag->list);
  1318. rmnet_perf_ingress(frag, port);
  1319. }
  1320. rcu_read_unlock();
  1321. return;
  1322. }
  1323. rcu_read_unlock();
  1324. list_for_each_entry_safe(frag, tmp, &segs, list) {
  1325. list_del_init(&frag->list);
  1326. rmnet_frag_deliver(frag, port);
  1327. }
  1328. return;
  1329. recycle:
  1330. rmnet_recycle_frag_descriptor(frag_desc, port);
  1331. }
  1332. /* Notify perf at the end of SKB chain */
  1333. rmnet_perf_chain_hook_t rmnet_perf_chain_end __rcu __read_mostly;
  1334. EXPORT_SYMBOL(rmnet_perf_chain_end);
  1335. void rmnet_frag_ingress_handler(struct sk_buff *skb,
  1336. struct rmnet_port *port)
  1337. {
  1338. rmnet_perf_chain_hook_t rmnet_perf_opt_chain_end;
  1339. LIST_HEAD(desc_list);
  1340. /* Deaggregation and freeing of HW originating
  1341. * buffers is done within here
  1342. */
  1343. while (skb) {
  1344. struct sk_buff *skb_frag;
  1345. rmnet_frag_deaggregate(skb, port, &desc_list);
  1346. if (!list_empty(&desc_list)) {
  1347. struct rmnet_frag_descriptor *frag_desc, *tmp;
  1348. list_for_each_entry_safe(frag_desc, tmp, &desc_list,
  1349. list) {
  1350. list_del_init(&frag_desc->list);
  1351. __rmnet_frag_ingress_handler(frag_desc, port);
  1352. }
  1353. }
  1354. skb_frag = skb_shinfo(skb)->frag_list;
  1355. skb_shinfo(skb)->frag_list = NULL;
  1356. consume_skb(skb);
  1357. skb = skb_frag;
  1358. }
  1359. rcu_read_lock();
  1360. rmnet_perf_opt_chain_end = rcu_dereference(rmnet_perf_chain_end);
  1361. if (rmnet_perf_opt_chain_end)
  1362. rmnet_perf_opt_chain_end();
  1363. rcu_read_unlock();
  1364. }
  1365. void rmnet_descriptor_deinit(struct rmnet_port *port)
  1366. {
  1367. struct rmnet_frag_descriptor_pool *pool;
  1368. struct rmnet_frag_descriptor *frag_desc, *tmp;
  1369. pool = port->frag_desc_pool;
  1370. list_for_each_entry_safe(frag_desc, tmp, &pool->free_list, list) {
  1371. kfree(frag_desc);
  1372. pool->pool_size--;
  1373. }
  1374. kfree(pool);
  1375. }
  1376. int rmnet_descriptor_init(struct rmnet_port *port)
  1377. {
  1378. struct rmnet_frag_descriptor_pool *pool;
  1379. int i;
  1380. spin_lock_init(&port->desc_pool_lock);
  1381. pool = kzalloc(sizeof(*pool), GFP_ATOMIC);
  1382. if (!pool)
  1383. return -ENOMEM;
  1384. INIT_LIST_HEAD(&pool->free_list);
  1385. port->frag_desc_pool = pool;
  1386. for (i = 0; i < RMNET_FRAG_DESCRIPTOR_POOL_SIZE; i++) {
  1387. struct rmnet_frag_descriptor *frag_desc;
  1388. frag_desc = kzalloc(sizeof(*frag_desc), GFP_ATOMIC);
  1389. if (!frag_desc)
  1390. return -ENOMEM;
  1391. INIT_LIST_HEAD(&frag_desc->list);
  1392. INIT_LIST_HEAD(&frag_desc->frags);
  1393. list_add_tail(&frag_desc->list, &pool->free_list);
  1394. pool->pool_size++;
  1395. }
  1396. return 0;
  1397. }