ipa_nat.c 40 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630
  1. // SPDX-License-Identifier: GPL-2.0-only
  2. /*
  3. * Copyright (c) 2012-2019, The Linux Foundation. All rights reserved.
  4. */
  5. #include <linux/device.h>
  6. #include <linux/fs.h>
  7. #include <linux/init.h>
  8. #include <linux/kernel.h>
  9. #include <linux/mm.h>
  10. #include <linux/uaccess.h>
  11. #include "ipa_i.h"
  12. #include "ipahal/ipahal.h"
  13. #include "ipahal/ipahal_nat.h"
  14. /*
  15. * The following for adding code (ie. for EMULATION) not found on x86.
  16. */
  17. #if defined(CONFIG_IPA_EMULATION)
  18. # include "ipa_emulation_stubs.h"
  19. #endif
  20. #define IPA_NAT_PHYS_MEM_OFFSET 0
  21. #define IPA_IPV6CT_PHYS_MEM_OFFSET 0
  22. #define IPA_NAT_PHYS_MEM_SIZE IPA_RAM_NAT_SIZE
  23. #define IPA_IPV6CT_PHYS_MEM_SIZE IPA_RAM_IPV6CT_SIZE
  24. #define IPA_NAT_IPV6CT_TEMP_MEM_SIZE 128
  25. #define IPA_NAT_MAX_NUM_OF_INIT_CMD_DESC 3
  26. #define IPA_IPV6CT_MAX_NUM_OF_INIT_CMD_DESC 2
  27. #define IPA_MAX_NUM_OF_TABLE_DMA_CMD_DESC 4
  28. /*
  29. * The base table max entries is limited by index into table 13 bits number.
  30. * Limit the memory size required by user to prevent kernel memory starvation
  31. */
  32. #define IPA_TABLE_MAX_ENTRIES 8192
  33. #define MAX_ALLOC_NAT_SIZE(size) (IPA_TABLE_MAX_ENTRIES * size)
  34. enum ipa_nat_ipv6ct_table_type {
  35. IPA_NAT_BASE_TBL = 0,
  36. IPA_NAT_EXPN_TBL = 1,
  37. IPA_NAT_INDX_TBL = 2,
  38. IPA_NAT_INDEX_EXPN_TBL = 3,
  39. IPA_IPV6CT_BASE_TBL = 4,
  40. IPA_IPV6CT_EXPN_TBL = 5
  41. };
  42. static int ipa3_nat_ipv6ct_vma_fault_remap(struct vm_fault *vmf)
  43. {
  44. vmf->page = NULL;
  45. IPADBG("\n");
  46. return VM_FAULT_SIGBUS;
  47. }
  48. /* VMA related file operations functions */
  49. static const struct vm_operations_struct ipa3_nat_ipv6ct_remap_vm_ops = {
  50. .fault = ipa3_nat_ipv6ct_vma_fault_remap,
  51. };
  52. static int ipa3_nat_ipv6ct_open(struct inode *inode, struct file *filp)
  53. {
  54. struct ipa3_nat_ipv6ct_common_mem *dev;
  55. IPADBG("\n");
  56. dev = container_of(inode->i_cdev,
  57. struct ipa3_nat_ipv6ct_common_mem, cdev);
  58. filp->private_data = dev;
  59. IPADBG("return\n");
  60. return 0;
  61. }
  62. static int ipa3_nat_ipv6ct_mmap(struct file *filp, struct vm_area_struct *vma)
  63. {
  64. struct ipa3_nat_ipv6ct_common_mem *dev =
  65. (struct ipa3_nat_ipv6ct_common_mem *)filp->private_data;
  66. unsigned long vsize = vma->vm_end - vma->vm_start;
  67. unsigned long phys_addr;
  68. int result = 0;
  69. struct ipa_smmu_cb_ctx *cb = ipa3_get_smmu_ctx(IPA_SMMU_CB_AP);
  70. IPADBG("\n");
  71. if (!dev->is_dev_init) {
  72. IPAERR("attempt to mmap %s before dev init\n", dev->name);
  73. return -EPERM;
  74. }
  75. mutex_lock(&dev->lock);
  76. if (!dev->is_mem_allocated) {
  77. IPAERR_RL("attempt to mmap %s before the memory allocation\n",
  78. dev->name);
  79. result = -EPERM;
  80. goto bail;
  81. }
  82. if (dev->is_sys_mem) {
  83. if (dev->is_mapped) {
  84. IPAERR("%s already mapped, only 1 mapping supported\n",
  85. dev->name);
  86. result = -EINVAL;
  87. goto bail;
  88. }
  89. } else {
  90. if ((dev->phys_mem_size == 0) || (vsize > dev->phys_mem_size)) {
  91. IPAERR_RL("wrong parameters to %s mapping\n",
  92. dev->name);
  93. result = -EINVAL;
  94. goto bail;
  95. }
  96. }
  97. /* check if smmu enable & dma_coherent mode */
  98. if (!cb->valid ||
  99. !is_device_dma_coherent(cb->dev)) {
  100. vma->vm_page_prot =
  101. pgprot_noncached(vma->vm_page_prot);
  102. IPADBG("App smmu enable in DMA mode\n");
  103. }
  104. if (dev->is_sys_mem) {
  105. IPADBG("Mapping system memory\n");
  106. IPADBG("map sz=0x%zx\n", dev->size);
  107. result =
  108. dma_mmap_coherent(
  109. ipa3_ctx->pdev, vma,
  110. dev->vaddr, dev->dma_handle,
  111. dev->size);
  112. if (result) {
  113. IPAERR("unable to map memory. Err:%d\n", result);
  114. goto bail;
  115. }
  116. dev->base_address = dev->vaddr;
  117. } else {
  118. IPADBG("Mapping shared(local) memory\n");
  119. IPADBG("map sz=0x%lx\n", vsize);
  120. phys_addr = ipa3_ctx->ipa_wrapper_base +
  121. ipa3_ctx->ctrl->ipa_reg_base_ofst +
  122. ipahal_get_reg_n_ofst(IPA_SW_AREA_RAM_DIRECT_ACCESS_n,
  123. dev->smem_offset);
  124. if (remap_pfn_range(
  125. vma, vma->vm_start,
  126. phys_addr >> PAGE_SHIFT, vsize, vma->vm_page_prot)) {
  127. IPAERR("remap failed\n");
  128. result = -EAGAIN;
  129. goto bail;
  130. }
  131. dev->base_address = (void *)vma->vm_start;
  132. }
  133. result = 0;
  134. vma->vm_ops = &ipa3_nat_ipv6ct_remap_vm_ops;
  135. dev->is_mapped = true;
  136. IPADBG("return\n");
  137. bail:
  138. mutex_unlock(&dev->lock);
  139. return result;
  140. }
  141. static const struct file_operations ipa3_nat_ipv6ct_fops = {
  142. .owner = THIS_MODULE,
  143. .open = ipa3_nat_ipv6ct_open,
  144. .mmap = ipa3_nat_ipv6ct_mmap
  145. };
  146. /**
  147. * ipa3_allocate_nat_ipv6ct_tmp_memory() - Allocates the NAT\IPv6CT temp memory
  148. */
  149. static struct ipa3_nat_ipv6ct_tmp_mem *ipa3_nat_ipv6ct_allocate_tmp_memory(void)
  150. {
  151. struct ipa3_nat_ipv6ct_tmp_mem *tmp_mem;
  152. gfp_t gfp_flags = GFP_KERNEL | __GFP_ZERO;
  153. IPADBG("\n");
  154. tmp_mem = kzalloc(sizeof(*tmp_mem), GFP_KERNEL);
  155. if (tmp_mem == NULL)
  156. return NULL;
  157. tmp_mem->vaddr =
  158. dma_alloc_coherent(ipa3_ctx->pdev, IPA_NAT_IPV6CT_TEMP_MEM_SIZE,
  159. &tmp_mem->dma_handle, gfp_flags);
  160. if (tmp_mem->vaddr == NULL)
  161. goto bail_tmp_mem;
  162. IPADBG("IPA successfully allocated temp memory\n");
  163. return tmp_mem;
  164. bail_tmp_mem:
  165. kfree(tmp_mem);
  166. return NULL;
  167. }
  168. static int ipa3_nat_ipv6ct_init_device(
  169. struct ipa3_nat_ipv6ct_common_mem *dev,
  170. const char *name,
  171. u32 phys_mem_size,
  172. u32 smem_offset,
  173. struct ipa3_nat_ipv6ct_tmp_mem *tmp_mem)
  174. {
  175. int result;
  176. IPADBG("Init %s\n", name);
  177. if (strnlen(name, IPA_DEV_NAME_MAX_LEN) == IPA_DEV_NAME_MAX_LEN) {
  178. IPAERR("device name is too long\n");
  179. return -ENODEV;
  180. }
  181. strlcpy(dev->name, name, IPA_DEV_NAME_MAX_LEN);
  182. dev->class = class_create(THIS_MODULE, name);
  183. if (IS_ERR(dev->class)) {
  184. IPAERR("unable to create the class for %s\n", name);
  185. return -ENODEV;
  186. }
  187. result = alloc_chrdev_region(&dev->dev_num, 0, 1, name);
  188. if (result) {
  189. IPAERR("alloc_chrdev_region err. for %s\n", name);
  190. result = -ENODEV;
  191. goto alloc_chrdev_region_fail;
  192. }
  193. dev->dev = device_create(dev->class, NULL, dev->dev_num, NULL, name);
  194. if (IS_ERR(dev->dev)) {
  195. IPAERR("device_create err:%ld\n", PTR_ERR(dev->dev));
  196. result = -ENODEV;
  197. goto device_create_fail;
  198. }
  199. cdev_init(&dev->cdev, &ipa3_nat_ipv6ct_fops);
  200. dev->cdev.owner = THIS_MODULE;
  201. mutex_init(&dev->lock);
  202. mutex_lock(&dev->lock);
  203. result = cdev_add(&dev->cdev, dev->dev_num, 1);
  204. if (result) {
  205. IPAERR("cdev_add err=%d\n", -result);
  206. goto cdev_add_fail;
  207. }
  208. dev->phys_mem_size = phys_mem_size;
  209. dev->smem_offset = smem_offset;
  210. dev->is_dev_init = true;
  211. dev->tmp_mem = tmp_mem;
  212. mutex_unlock(&dev->lock);
  213. IPADBG("ipa dev %s added successful. major:%d minor:%d\n", name,
  214. MAJOR(dev->dev_num), MINOR(dev->dev_num));
  215. return 0;
  216. cdev_add_fail:
  217. mutex_unlock(&dev->lock);
  218. device_destroy(dev->class, dev->dev_num);
  219. device_create_fail:
  220. unregister_chrdev_region(dev->dev_num, 1);
  221. alloc_chrdev_region_fail:
  222. class_destroy(dev->class);
  223. return result;
  224. }
  225. static void ipa3_nat_ipv6ct_destroy_device(
  226. struct ipa3_nat_ipv6ct_common_mem *dev)
  227. {
  228. IPADBG("\n");
  229. mutex_lock(&dev->lock);
  230. if (dev->tmp_mem != NULL &&
  231. !(ipa3_ctx->nat_mem.is_tmp_mem_allocated)) {
  232. dev->tmp_mem = NULL;
  233. } else if (dev->tmp_mem != NULL &&
  234. ipa3_ctx->nat_mem.is_tmp_mem_allocated) {
  235. dma_free_coherent(ipa3_ctx->pdev, IPA_NAT_IPV6CT_TEMP_MEM_SIZE,
  236. dev->tmp_mem->vaddr, dev->tmp_mem->dma_handle);
  237. kfree(dev->tmp_mem);
  238. dev->tmp_mem = NULL;
  239. ipa3_ctx->nat_mem.is_tmp_mem_allocated = false;
  240. }
  241. device_destroy(dev->class, dev->dev_num);
  242. unregister_chrdev_region(dev->dev_num, 1);
  243. class_destroy(dev->class);
  244. dev->is_dev_init = false;
  245. mutex_unlock(&dev->lock);
  246. IPADBG("return\n");
  247. }
  248. /**
  249. * ipa3_nat_ipv6ct_init_devices() - Initialize the NAT and IPv6CT devices
  250. *
  251. * Called during IPA init to create memory device
  252. *
  253. * Returns: 0 on success, negative on failure
  254. */
  255. int ipa3_nat_ipv6ct_init_devices(void)
  256. {
  257. struct ipa3_nat_ipv6ct_tmp_mem *tmp_mem;
  258. int result;
  259. IPADBG("\n");
  260. /*
  261. * Allocate NAT/IPv6CT temporary memory. The memory is never deleted,
  262. * because provided to HW once NAT or IPv6CT table is deleted.
  263. */
  264. tmp_mem = ipa3_nat_ipv6ct_allocate_tmp_memory();
  265. if (tmp_mem == NULL) {
  266. IPAERR("unable to allocate tmp_mem\n");
  267. return -ENOMEM;
  268. }
  269. ipa3_ctx->nat_mem.is_tmp_mem_allocated = true;
  270. if (ipa3_nat_ipv6ct_init_device(
  271. &ipa3_ctx->nat_mem.dev,
  272. IPA_NAT_DEV_NAME,
  273. IPA_NAT_PHYS_MEM_SIZE,
  274. IPA_NAT_PHYS_MEM_OFFSET,
  275. tmp_mem)) {
  276. IPAERR("unable to create nat device\n");
  277. result = -ENODEV;
  278. goto fail_init_nat_dev;
  279. }
  280. if ((ipa3_ctx->ipa_hw_type >= IPA_HW_v4_0) &&
  281. ipa3_nat_ipv6ct_init_device(
  282. &ipa3_ctx->ipv6ct_mem.dev,
  283. IPA_IPV6CT_DEV_NAME,
  284. IPA_IPV6CT_PHYS_MEM_SIZE,
  285. IPA_IPV6CT_PHYS_MEM_OFFSET,
  286. tmp_mem)) {
  287. IPAERR("unable to create IPv6CT device\n");
  288. result = -ENODEV;
  289. goto fail_init_ipv6ct_dev;
  290. }
  291. return 0;
  292. fail_init_ipv6ct_dev:
  293. ipa3_nat_ipv6ct_destroy_device(&ipa3_ctx->nat_mem.dev);
  294. fail_init_nat_dev:
  295. if (tmp_mem != NULL && ipa3_ctx->nat_mem.is_tmp_mem_allocated) {
  296. dma_free_coherent(ipa3_ctx->pdev, IPA_NAT_IPV6CT_TEMP_MEM_SIZE,
  297. tmp_mem->vaddr, tmp_mem->dma_handle);
  298. kfree(tmp_mem);
  299. ipa3_ctx->nat_mem.is_tmp_mem_allocated = false;
  300. }
  301. return result;
  302. }
  303. /**
  304. * ipa3_nat_ipv6ct_destroy_devices() - destroy the NAT and IPv6CT devices
  305. *
  306. * Called during IPA init to destroy nat device
  307. */
  308. void ipa3_nat_ipv6ct_destroy_devices(void)
  309. {
  310. ipa3_nat_ipv6ct_destroy_device(&ipa3_ctx->nat_mem.dev);
  311. if (ipa3_ctx->ipa_hw_type >= IPA_HW_v4_0)
  312. ipa3_nat_ipv6ct_destroy_device(&ipa3_ctx->ipv6ct_mem.dev);
  313. }
  314. static int ipa3_nat_ipv6ct_allocate_mem(struct ipa3_nat_ipv6ct_common_mem *dev,
  315. struct ipa_ioc_nat_ipv6ct_table_alloc *table_alloc,
  316. enum ipahal_nat_type nat_type)
  317. {
  318. gfp_t gfp_flags = GFP_KERNEL | __GFP_ZERO;
  319. int result = 0;
  320. size_t nat_entry_size;
  321. IPADBG("passed memory size %zu for %s\n",
  322. table_alloc->size, dev->name);
  323. if (!dev->is_dev_init) {
  324. IPAERR("%s hasn't been initialized\n", dev->name);
  325. result = -EPERM;
  326. goto bail;
  327. }
  328. if (dev->is_mem_allocated) {
  329. IPAERR("Memory already allocated\n");
  330. result = -EPERM;
  331. goto bail;
  332. }
  333. ipahal_nat_entry_size(nat_type, &nat_entry_size);
  334. if (table_alloc->size > MAX_ALLOC_NAT_SIZE(nat_entry_size)) {
  335. IPAERR("Trying allocate more size = %zu, Max allowed = %zu\n",
  336. table_alloc->size,
  337. MAX_ALLOC_NAT_SIZE(nat_entry_size));
  338. result = -EPERM;
  339. goto bail;
  340. }
  341. if (!table_alloc->size) {
  342. IPAERR_RL("Invalid Parameters\n");
  343. result = -EPERM;
  344. goto bail;
  345. }
  346. if (table_alloc->size > IPA_NAT_PHYS_MEM_SIZE) {
  347. IPADBG("Allocating system memory\n");
  348. dev->is_sys_mem = true;
  349. dev->vaddr =
  350. dma_alloc_coherent(ipa3_ctx->pdev, table_alloc->size,
  351. &dev->dma_handle, gfp_flags);
  352. if (dev->vaddr == NULL) {
  353. IPAERR("memory alloc failed\n");
  354. result = -ENOMEM;
  355. goto bail;
  356. }
  357. dev->size = table_alloc->size;
  358. } else {
  359. IPADBG("using shared(local) memory\n");
  360. dev->is_sys_mem = false;
  361. }
  362. IPADBG("return\n");
  363. bail:
  364. return result;
  365. }
  366. /**
  367. * ipa3_allocate_nat_device() - Allocates memory for the NAT device
  368. * @mem: [in/out] memory parameters
  369. *
  370. * Called by NAT client driver to allocate memory for the NAT entries. Based on
  371. * the request size either shared or system memory will be used.
  372. *
  373. * Returns: 0 on success, negative on failure
  374. */
  375. int ipa3_allocate_nat_device(struct ipa_ioc_nat_alloc_mem *mem)
  376. {
  377. int result;
  378. struct ipa_ioc_nat_ipv6ct_table_alloc tmp;
  379. tmp.size = mem->size;
  380. tmp.offset = 0;
  381. result = ipa3_allocate_nat_table(&tmp);
  382. if (result)
  383. goto bail;
  384. mem->offset = tmp.offset;
  385. bail:
  386. return result;
  387. }
  388. /**
  389. * ipa3_allocate_nat_table() - Allocates memory for the NAT table
  390. * @table_alloc: [in/out] memory parameters
  391. *
  392. * Called by NAT client to allocate memory for the table entries.
  393. * Based on the request size either shared or system memory will be used.
  394. *
  395. * Returns: 0 on success, negative on failure
  396. */
  397. int ipa3_allocate_nat_table(struct ipa_ioc_nat_ipv6ct_table_alloc *table_alloc)
  398. {
  399. struct ipa3_nat_mem *nat_ctx = &(ipa3_ctx->nat_mem);
  400. gfp_t gfp_flags = GFP_KERNEL | __GFP_ZERO;
  401. int result;
  402. IPADBG("\n");
  403. mutex_lock(&nat_ctx->dev.lock);
  404. result = ipa3_nat_ipv6ct_allocate_mem(&nat_ctx->dev, table_alloc,
  405. IPAHAL_NAT_IPV4);
  406. if (result)
  407. goto bail;
  408. if (ipa3_ctx->ipa_hw_type >= IPA_HW_v4_0) {
  409. size_t pdn_entry_size;
  410. struct ipa_mem_buffer *pdn_mem = &nat_ctx->pdn_mem;
  411. ipahal_nat_entry_size(IPAHAL_NAT_IPV4_PDN, &pdn_entry_size);
  412. pdn_mem->size = pdn_entry_size * IPA_MAX_PDN_NUM;
  413. if (IPA_MEM_PART(pdn_config_size) < pdn_mem->size) {
  414. IPAERR(
  415. "number of PDN entries exceeds SRAM available space\n");
  416. result = -ENOMEM;
  417. goto fail_alloc_pdn;
  418. }
  419. pdn_mem->base = dma_zalloc_coherent(ipa3_ctx->pdev,
  420. pdn_mem->size,
  421. &pdn_mem->phys_base,
  422. gfp_flags);
  423. if (!pdn_mem->base) {
  424. IPAERR("fail to allocate PDN memory\n");
  425. result = -ENOMEM;
  426. goto fail_alloc_pdn;
  427. }
  428. IPADBG("IPA NAT dev allocated PDN memory successfully\n");
  429. }
  430. nat_ctx->dev.is_mem_allocated = true;
  431. IPADBG("IPA NAT dev init successfully\n");
  432. mutex_unlock(&nat_ctx->dev.lock);
  433. IPADBG("return\n");
  434. return 0;
  435. fail_alloc_pdn:
  436. if (nat_ctx->dev.vaddr) {
  437. dma_free_coherent(ipa3_ctx->pdev, table_alloc->size,
  438. nat_ctx->dev.vaddr, nat_ctx->dev.dma_handle);
  439. nat_ctx->dev.vaddr = NULL;
  440. }
  441. bail:
  442. mutex_unlock(&nat_ctx->dev.lock);
  443. return result;
  444. }
  445. /**
  446. * ipa3_allocate_ipv6ct_table() - Allocates memory for the IPv6CT table
  447. * @table_alloc: [in/out] memory parameters
  448. *
  449. * Called by IPv6CT client to allocate memory for the table entries.
  450. * Based on the request size either shared or system memory will be used.
  451. *
  452. * Returns: 0 on success, negative on failure
  453. */
  454. int ipa3_allocate_ipv6ct_table(
  455. struct ipa_ioc_nat_ipv6ct_table_alloc *table_alloc)
  456. {
  457. int result;
  458. IPADBG("\n");
  459. if (ipa3_ctx->ipa_hw_type < IPA_HW_v4_0) {
  460. IPAERR_RL("IPv6 connection tracking isn't supported\n");
  461. return -EPERM;
  462. }
  463. mutex_lock(&ipa3_ctx->ipv6ct_mem.dev.lock);
  464. result = ipa3_nat_ipv6ct_allocate_mem(
  465. &ipa3_ctx->ipv6ct_mem.dev, table_alloc, IPAHAL_NAT_IPV6CT);
  466. if (result)
  467. goto bail;
  468. ipa3_ctx->ipv6ct_mem.dev.is_mem_allocated = true;
  469. IPADBG("IPA IPv6CT dev init successfully\n");
  470. bail:
  471. mutex_unlock(&ipa3_ctx->ipv6ct_mem.dev.lock);
  472. return result;
  473. }
  474. static int ipa3_nat_ipv6ct_check_table_params(
  475. struct ipa3_nat_ipv6ct_common_mem *dev,
  476. uint32_t offset, uint16_t entries_num,
  477. enum ipahal_nat_type nat_type)
  478. {
  479. int result;
  480. size_t entry_size, table_size;
  481. result = ipahal_nat_entry_size(nat_type, &entry_size);
  482. if (result) {
  483. IPAERR("Failed to retrieve size of entry for %s\n",
  484. ipahal_nat_type_str(nat_type));
  485. return result;
  486. }
  487. table_size = entry_size * entries_num;
  488. /* check for integer overflow */
  489. if (offset > UINT_MAX - table_size) {
  490. IPAERR_RL("Detected overflow\n");
  491. return -EPERM;
  492. }
  493. /* Check offset is not beyond allocated size */
  494. if (dev->size < offset + table_size) {
  495. IPAERR_RL("Table offset not valid\n");
  496. IPAERR_RL("offset:%d entries:%d table_size:%zu mem_size:%zu\n",
  497. offset, entries_num, table_size, dev->size);
  498. return -EPERM;
  499. }
  500. if (dev->is_sys_mem && offset > UINT_MAX - dev->dma_handle) {
  501. IPAERR_RL("Failed due to integer overflow\n");
  502. IPAERR_RL("%s dma_handle: 0x%pa offset: 0x%x\n",
  503. dev->name, &dev->dma_handle, offset);
  504. return -EPERM;
  505. }
  506. return 0;
  507. }
  508. static inline void ipa3_nat_ipv6ct_create_init_cmd(
  509. struct ipahal_imm_cmd_nat_ipv6ct_init_common *table_init_cmd,
  510. bool is_shared,
  511. dma_addr_t base_addr,
  512. uint8_t tbl_index,
  513. uint32_t base_table_offset,
  514. uint32_t expn_table_offset,
  515. uint16_t table_entries,
  516. uint16_t expn_table_entries,
  517. const char *table_name)
  518. {
  519. table_init_cmd->base_table_addr_shared = is_shared;
  520. table_init_cmd->expansion_table_addr_shared = is_shared;
  521. table_init_cmd->base_table_addr = base_addr + base_table_offset;
  522. IPADBG("%s base table offset:0x%x\n", table_name, base_table_offset);
  523. table_init_cmd->expansion_table_addr = base_addr + expn_table_offset;
  524. IPADBG("%s expn table offset:0x%x\n", table_name, expn_table_offset);
  525. table_init_cmd->table_index = tbl_index;
  526. IPADBG("%s table index:0x%x\n", table_name, tbl_index);
  527. table_init_cmd->size_base_table = table_entries;
  528. IPADBG("%s base table size:0x%x\n", table_name, table_entries);
  529. table_init_cmd->size_expansion_table = expn_table_entries;
  530. IPADBG("%s expansion table size:0x%x\n",
  531. table_name, expn_table_entries);
  532. }
  533. static inline void ipa3_nat_ipv6ct_init_device_structure(
  534. struct ipa3_nat_ipv6ct_common_mem *dev,
  535. uint32_t base_table_offset,
  536. uint32_t expn_table_offset,
  537. uint16_t table_entries,
  538. uint16_t expn_table_entries)
  539. {
  540. dev->base_table_addr = (char *)dev->base_address + base_table_offset;
  541. IPADBG("%s base_table_addr: 0x%pK\n", dev->name, dev->base_table_addr);
  542. dev->expansion_table_addr =
  543. (char *)dev->base_address + expn_table_offset;
  544. IPADBG("%s expansion_table_addr: 0x%pK\n",
  545. dev->name, dev->expansion_table_addr);
  546. IPADBG("%s table_entries: %d\n", dev->name, table_entries);
  547. dev->table_entries = table_entries;
  548. IPADBG("%s expn_table_entries: %d\n", dev->name, expn_table_entries);
  549. dev->expn_table_entries = expn_table_entries;
  550. }
  551. static void ipa3_nat_create_init_cmd(
  552. struct ipa_ioc_v4_nat_init *init,
  553. bool is_shared,
  554. dma_addr_t base_addr,
  555. struct ipahal_imm_cmd_ip_v4_nat_init *cmd)
  556. {
  557. IPADBG("\n");
  558. ipa3_nat_ipv6ct_create_init_cmd(
  559. &cmd->table_init,
  560. is_shared,
  561. base_addr,
  562. init->tbl_index,
  563. init->ipv4_rules_offset,
  564. init->expn_rules_offset,
  565. init->table_entries,
  566. init->expn_table_entries,
  567. ipa3_ctx->nat_mem.dev.name);
  568. cmd->index_table_addr_shared = is_shared;
  569. cmd->index_table_expansion_addr_shared = is_shared;
  570. cmd->index_table_addr =
  571. base_addr + init->index_offset;
  572. IPADBG("index_offset:0x%x\n", init->index_offset);
  573. cmd->index_table_expansion_addr =
  574. base_addr + init->index_expn_offset;
  575. IPADBG("index_expn_offset:0x%x\n", init->index_expn_offset);
  576. if (ipa3_ctx->ipa_hw_type >= IPA_HW_v4_0) {
  577. /*
  578. * starting IPAv4.0 public ip field changed to store the
  579. * PDN config table offset in SMEM
  580. */
  581. cmd->public_addr_info = IPA_MEM_PART(pdn_config_ofst);
  582. IPADBG("pdn config base:0x%x\n", cmd->public_addr_info);
  583. } else {
  584. cmd->public_addr_info = init->ip_addr;
  585. IPADBG("Public IP address:%pI4h\n", &cmd->public_addr_info);
  586. }
  587. IPADBG("return\n");
  588. }
  589. static void ipa3_nat_create_modify_pdn_cmd(
  590. struct ipahal_imm_cmd_dma_shared_mem *mem_cmd, bool zero_mem)
  591. {
  592. size_t pdn_entry_size, mem_size;
  593. IPADBG("\n");
  594. ipahal_nat_entry_size(IPAHAL_NAT_IPV4_PDN, &pdn_entry_size);
  595. mem_size = pdn_entry_size * IPA_MAX_PDN_NUM;
  596. if (zero_mem)
  597. memset(ipa3_ctx->nat_mem.pdn_mem.base, 0, mem_size);
  598. /* Copy the PDN config table to SRAM */
  599. mem_cmd->is_read = false;
  600. mem_cmd->skip_pipeline_clear = false;
  601. mem_cmd->pipeline_clear_options = IPAHAL_HPS_CLEAR;
  602. mem_cmd->size = mem_size;
  603. mem_cmd->system_addr = ipa3_ctx->nat_mem.pdn_mem.phys_base;
  604. mem_cmd->local_addr = ipa3_ctx->smem_restricted_bytes +
  605. IPA_MEM_PART(pdn_config_ofst);
  606. IPADBG("return\n");
  607. }
  608. static int ipa3_nat_send_init_cmd(struct ipahal_imm_cmd_ip_v4_nat_init *cmd,
  609. bool zero_pdn_table)
  610. {
  611. struct ipa3_desc desc[IPA_NAT_MAX_NUM_OF_INIT_CMD_DESC];
  612. struct ipahal_imm_cmd_pyld *cmd_pyld[IPA_NAT_MAX_NUM_OF_INIT_CMD_DESC];
  613. int i, num_cmd = 0, result;
  614. IPADBG("\n");
  615. /* NO-OP IC for ensuring that IPA pipeline is empty */
  616. cmd_pyld[num_cmd] =
  617. ipahal_construct_nop_imm_cmd(false, IPAHAL_HPS_CLEAR, false);
  618. if (!cmd_pyld[num_cmd]) {
  619. IPAERR("failed to construct NOP imm cmd\n");
  620. return -ENOMEM;
  621. }
  622. ipa3_init_imm_cmd_desc(&desc[num_cmd], cmd_pyld[num_cmd]);
  623. ++num_cmd;
  624. cmd_pyld[num_cmd] = ipahal_construct_imm_cmd(
  625. IPA_IMM_CMD_IP_V4_NAT_INIT, cmd, false);
  626. if (!cmd_pyld[num_cmd]) {
  627. IPAERR_RL("fail to construct NAT init imm cmd\n");
  628. result = -EPERM;
  629. goto destroy_imm_cmd;
  630. }
  631. ipa3_init_imm_cmd_desc(&desc[num_cmd], cmd_pyld[num_cmd]);
  632. ++num_cmd;
  633. if (ipa3_ctx->ipa_hw_type >= IPA_HW_v4_0) {
  634. struct ipahal_imm_cmd_dma_shared_mem mem_cmd = { 0 };
  635. if (num_cmd >= IPA_NAT_MAX_NUM_OF_INIT_CMD_DESC) {
  636. IPAERR("number of commands is out of range\n");
  637. result = -ENOBUFS;
  638. goto destroy_imm_cmd;
  639. }
  640. /* Copy the PDN config table to SRAM */
  641. ipa3_nat_create_modify_pdn_cmd(&mem_cmd, zero_pdn_table);
  642. cmd_pyld[num_cmd] = ipahal_construct_imm_cmd(
  643. IPA_IMM_CMD_DMA_SHARED_MEM, &mem_cmd, false);
  644. if (!cmd_pyld[num_cmd]) {
  645. IPAERR(
  646. "fail construct dma_shared_mem cmd: for pdn table");
  647. result = -ENOMEM;
  648. goto destroy_imm_cmd;
  649. }
  650. ipa3_init_imm_cmd_desc(&desc[num_cmd], cmd_pyld[num_cmd]);
  651. ++num_cmd;
  652. IPADBG("added PDN table copy cmd\n");
  653. }
  654. result = ipa3_send_cmd(num_cmd, desc);
  655. if (result) {
  656. IPAERR("fail to send NAT init immediate command\n");
  657. goto destroy_imm_cmd;
  658. }
  659. IPADBG("return\n");
  660. destroy_imm_cmd:
  661. for (i = 0; i < num_cmd; ++i)
  662. ipahal_destroy_imm_cmd(cmd_pyld[i]);
  663. return result;
  664. }
  665. static int ipa3_ipv6ct_send_init_cmd(struct ipahal_imm_cmd_ip_v6_ct_init *cmd)
  666. {
  667. struct ipa3_desc desc[IPA_IPV6CT_MAX_NUM_OF_INIT_CMD_DESC];
  668. struct ipahal_imm_cmd_pyld
  669. *cmd_pyld[IPA_IPV6CT_MAX_NUM_OF_INIT_CMD_DESC];
  670. int i, num_cmd = 0, result;
  671. IPADBG("\n");
  672. /* NO-OP IC for ensuring that IPA pipeline is empty */
  673. cmd_pyld[num_cmd] =
  674. ipahal_construct_nop_imm_cmd(false, IPAHAL_HPS_CLEAR, false);
  675. if (!cmd_pyld[num_cmd]) {
  676. IPAERR("failed to construct NOP imm cmd\n");
  677. return -ENOMEM;
  678. }
  679. ipa3_init_imm_cmd_desc(&desc[num_cmd], cmd_pyld[num_cmd]);
  680. ++num_cmd;
  681. if (num_cmd >= IPA_IPV6CT_MAX_NUM_OF_INIT_CMD_DESC) {
  682. IPAERR("number of commands is out of range\n");
  683. result = -ENOBUFS;
  684. goto destroy_imm_cmd;
  685. }
  686. cmd_pyld[num_cmd] = ipahal_construct_imm_cmd(
  687. IPA_IMM_CMD_IP_V6_CT_INIT, cmd, false);
  688. if (!cmd_pyld[num_cmd]) {
  689. IPAERR_RL("fail to construct IPv6CT init imm cmd\n");
  690. result = -EPERM;
  691. goto destroy_imm_cmd;
  692. }
  693. ipa3_init_imm_cmd_desc(&desc[num_cmd], cmd_pyld[num_cmd]);
  694. ++num_cmd;
  695. result = ipa3_send_cmd(num_cmd, desc);
  696. if (result) {
  697. IPAERR("Fail to send IPv6CT init immediate command\n");
  698. goto destroy_imm_cmd;
  699. }
  700. IPADBG("return\n");
  701. destroy_imm_cmd:
  702. for (i = 0; i < num_cmd; ++i)
  703. ipahal_destroy_imm_cmd(cmd_pyld[i]);
  704. return result;
  705. }
  706. /* IOCTL function handlers */
  707. /**
  708. * ipa3_nat_init_cmd() - Post IP_V4_NAT_INIT command to IPA HW
  709. * @init: [in] initialization command attributes
  710. *
  711. * Called by NAT client driver to post IP_V4_NAT_INIT command to IPA HW
  712. *
  713. * Returns: 0 on success, negative on failure
  714. */
  715. int ipa3_nat_init_cmd(struct ipa_ioc_v4_nat_init *init)
  716. {
  717. struct ipahal_imm_cmd_ip_v4_nat_init cmd;
  718. int result;
  719. IPADBG("\n");
  720. if (!ipa3_ctx->nat_mem.dev.is_mapped) {
  721. IPAERR_RL("attempt to init %s before mmap\n",
  722. ipa3_ctx->nat_mem.dev.name);
  723. return -EPERM;
  724. }
  725. if (init->tbl_index >= 1) {
  726. IPAERR_RL("Unsupported table index %d\n", init->tbl_index);
  727. return -EPERM;
  728. }
  729. if (init->table_entries == 0) {
  730. IPAERR_RL("Table entries is zero\n");
  731. return -EPERM;
  732. }
  733. result = ipa3_nat_ipv6ct_check_table_params(
  734. &ipa3_ctx->nat_mem.dev,
  735. init->ipv4_rules_offset,
  736. init->table_entries + 1,
  737. IPAHAL_NAT_IPV4);
  738. if (result) {
  739. IPAERR_RL("Bad params for NAT base table\n");
  740. return result;
  741. }
  742. result = ipa3_nat_ipv6ct_check_table_params(
  743. &ipa3_ctx->nat_mem.dev,
  744. init->expn_rules_offset,
  745. init->expn_table_entries,
  746. IPAHAL_NAT_IPV4);
  747. if (result) {
  748. IPAERR_RL("Bad params for NAT expansion table\n");
  749. return result;
  750. }
  751. result = ipa3_nat_ipv6ct_check_table_params(
  752. &ipa3_ctx->nat_mem.dev,
  753. init->index_offset,
  754. init->table_entries + 1,
  755. IPAHAL_NAT_IPV4_INDEX);
  756. if (result) {
  757. IPAERR_RL("Bad params for index table\n");
  758. return result;
  759. }
  760. result = ipa3_nat_ipv6ct_check_table_params(
  761. &ipa3_ctx->nat_mem.dev,
  762. init->index_expn_offset,
  763. init->expn_table_entries,
  764. IPAHAL_NAT_IPV4_INDEX);
  765. if (result) {
  766. IPAERR_RL("Bad params for index expansion table\n");
  767. return result;
  768. }
  769. if (ipa3_ctx->nat_mem.dev.is_sys_mem) {
  770. IPADBG("using system memory for nat table\n");
  771. /*
  772. * Safe to process, since integer overflow was
  773. * checked in ipa3_nat_ipv6ct_check_table_params
  774. */
  775. ipa3_nat_create_init_cmd(init, false,
  776. ipa3_ctx->nat_mem.dev.dma_handle, &cmd);
  777. } else {
  778. IPADBG("using shared(local) memory for nat table\n");
  779. ipa3_nat_create_init_cmd(init, true, IPA_RAM_NAT_OFST, &cmd);
  780. }
  781. if (ipa3_ctx->ipa_hw_type >= IPA_HW_v4_0) {
  782. struct ipahal_nat_pdn_entry pdn_entry;
  783. /* store ip in pdn entry cache array */
  784. pdn_entry.public_ip = init->ip_addr;
  785. pdn_entry.src_metadata = 0;
  786. pdn_entry.dst_metadata = 0;
  787. result = ipahal_nat_construct_entry(
  788. IPAHAL_NAT_IPV4_PDN,
  789. &pdn_entry,
  790. ipa3_ctx->nat_mem.pdn_mem.base);
  791. if (result) {
  792. IPAERR("Fail to construct NAT pdn entry\n");
  793. return result;
  794. }
  795. IPADBG("Public ip address:0x%x\n", init->ip_addr);
  796. }
  797. IPADBG("posting NAT init command\n");
  798. result = ipa3_nat_send_init_cmd(&cmd, false);
  799. if (result) {
  800. IPAERR("Fail to send NAT init immediate command\n");
  801. return result;
  802. }
  803. ipa3_nat_ipv6ct_init_device_structure(
  804. &ipa3_ctx->nat_mem.dev,
  805. init->ipv4_rules_offset,
  806. init->expn_rules_offset,
  807. init->table_entries,
  808. init->expn_table_entries);
  809. ipa3_ctx->nat_mem.public_ip_addr = init->ip_addr;
  810. IPADBG("Public IP address:%pI4h\n", &ipa3_ctx->nat_mem.public_ip_addr);
  811. ipa3_ctx->nat_mem.index_table_addr =
  812. (char *)ipa3_ctx->nat_mem.dev.base_address +
  813. init->index_offset;
  814. IPADBG("index_table_addr: 0x%pK\n",
  815. ipa3_ctx->nat_mem.index_table_addr);
  816. ipa3_ctx->nat_mem.index_table_expansion_addr =
  817. (char *)ipa3_ctx->nat_mem.dev.base_address + init->index_expn_offset;
  818. IPADBG("index_table_expansion_addr: 0x%pK\n",
  819. ipa3_ctx->nat_mem.index_table_expansion_addr);
  820. ipa3_ctx->nat_mem.dev.is_hw_init = true;
  821. IPADBG("return\n");
  822. return 0;
  823. }
  824. /**
  825. * ipa3_ipv6ct_init_cmd() - Post IP_V6_CONN_TRACK_INIT command to IPA HW
  826. * @init: [in] initialization command attributes
  827. *
  828. * Called by NAT client driver to post IP_V6_CONN_TRACK_INIT command to IPA HW
  829. *
  830. * Returns: 0 on success, negative on failure
  831. */
  832. int ipa3_ipv6ct_init_cmd(struct ipa_ioc_ipv6ct_init *init)
  833. {
  834. struct ipahal_imm_cmd_ip_v6_ct_init cmd;
  835. int result;
  836. IPADBG("\n");
  837. if (ipa3_ctx->ipa_hw_type < IPA_HW_v4_0) {
  838. IPAERR_RL("IPv6 connection tracking isn't supported\n");
  839. return -EPERM;
  840. }
  841. if (!ipa3_ctx->ipv6ct_mem.dev.is_mapped) {
  842. IPAERR_RL("attempt to init %s before mmap\n",
  843. ipa3_ctx->ipv6ct_mem.dev.name);
  844. return -EPERM;
  845. }
  846. if (init->tbl_index >= 1) {
  847. IPAERR_RL("Unsupported table index %d\n", init->tbl_index);
  848. return -EPERM;
  849. }
  850. if (init->table_entries == 0) {
  851. IPAERR_RL("Table entries is zero\n");
  852. return -EPERM;
  853. }
  854. result = ipa3_nat_ipv6ct_check_table_params(
  855. &ipa3_ctx->ipv6ct_mem.dev,
  856. init->base_table_offset,
  857. init->table_entries + 1,
  858. IPAHAL_NAT_IPV6CT);
  859. if (result) {
  860. IPAERR_RL("Bad params for IPv6CT base table\n");
  861. return result;
  862. }
  863. result = ipa3_nat_ipv6ct_check_table_params(
  864. &ipa3_ctx->ipv6ct_mem.dev,
  865. init->expn_table_offset,
  866. init->expn_table_entries,
  867. IPAHAL_NAT_IPV6CT);
  868. if (result) {
  869. IPAERR_RL("Bad params for IPv6CT expansion table\n");
  870. return result;
  871. }
  872. if (ipa3_ctx->ipv6ct_mem.dev.is_sys_mem) {
  873. IPADBG("using system memory for nat table\n");
  874. /*
  875. * Safe to process, since integer overflow was
  876. * checked in ipa3_nat_ipv6ct_check_table_params
  877. */
  878. ipa3_nat_ipv6ct_create_init_cmd(
  879. &cmd.table_init,
  880. false,
  881. ipa3_ctx->ipv6ct_mem.dev.dma_handle,
  882. init->tbl_index,
  883. init->base_table_offset,
  884. init->expn_table_offset,
  885. init->table_entries,
  886. init->expn_table_entries,
  887. ipa3_ctx->ipv6ct_mem.dev.name);
  888. } else {
  889. IPADBG("using shared(local) memory for nat table\n");
  890. ipa3_nat_ipv6ct_create_init_cmd(
  891. &cmd.table_init,
  892. true,
  893. IPA_RAM_IPV6CT_OFST,
  894. init->tbl_index,
  895. init->base_table_offset,
  896. init->expn_table_offset,
  897. init->table_entries,
  898. init->expn_table_entries,
  899. ipa3_ctx->ipv6ct_mem.dev.name);
  900. }
  901. IPADBG("posting ip_v6_ct_init imm command\n");
  902. result = ipa3_ipv6ct_send_init_cmd(&cmd);
  903. if (result) {
  904. IPAERR("fail to send IPv6CT init immediate command\n");
  905. return result;
  906. }
  907. ipa3_nat_ipv6ct_init_device_structure(
  908. &ipa3_ctx->ipv6ct_mem.dev,
  909. init->base_table_offset,
  910. init->expn_table_offset,
  911. init->table_entries,
  912. init->expn_table_entries);
  913. ipa3_ctx->ipv6ct_mem.dev.is_hw_init = true;
  914. IPADBG("return\n");
  915. return 0;
  916. }
  917. /**
  918. * ipa3_nat_mdfy_pdn() - Modify a PDN entry in PDN config table in IPA SRAM
  919. * @mdfy_pdn: [in] PDN info to be written to SRAM
  920. *
  921. * Called by NAT client driver to modify an entry in the PDN config table
  922. *
  923. * Returns: 0 on success, negative on failure
  924. */
  925. int ipa3_nat_mdfy_pdn(struct ipa_ioc_nat_pdn_entry *mdfy_pdn)
  926. {
  927. struct ipahal_imm_cmd_dma_shared_mem mem_cmd = { 0 };
  928. struct ipa3_desc desc;
  929. struct ipahal_imm_cmd_pyld *cmd_pyld;
  930. int result = 0;
  931. struct ipa3_nat_mem *nat_ctx = &(ipa3_ctx->nat_mem);
  932. struct ipahal_nat_pdn_entry pdn_fields;
  933. size_t entry_size;
  934. IPADBG("\n");
  935. mutex_lock(&nat_ctx->dev.lock);
  936. if (ipa3_ctx->ipa_hw_type < IPA_HW_v4_0) {
  937. IPAERR_RL("IPA HW does not support multi PDN\n");
  938. result = -EPERM;
  939. goto bail;
  940. }
  941. if (!nat_ctx->dev.is_mem_allocated) {
  942. IPAERR_RL(
  943. "attempt to modify a PDN entry before the PDN table memory allocation\n");
  944. result = -EPERM;
  945. goto bail;
  946. }
  947. if (mdfy_pdn->pdn_index > (IPA_MAX_PDN_NUM - 1)) {
  948. IPAERR_RL("pdn index out of range %d\n", mdfy_pdn->pdn_index);
  949. result = -EPERM;
  950. goto bail;
  951. }
  952. /* store ip in pdn entry cache array */
  953. pdn_fields.public_ip = mdfy_pdn->public_ip;
  954. pdn_fields.dst_metadata = mdfy_pdn->dst_metadata;
  955. pdn_fields.src_metadata = mdfy_pdn->src_metadata;
  956. /* mark tethering bit for remote modem */
  957. if (ipa3_ctx->ipa_hw_type == IPA_HW_v4_1) {
  958. pdn_fields.src_metadata |=
  959. IPA_QMAP_TETH_BIT;
  960. }
  961. /* get size of the entry */
  962. result = ipahal_nat_entry_size(
  963. IPAHAL_NAT_IPV4_PDN,
  964. &entry_size);
  965. if (result) {
  966. IPAERR("Failed to retrieve pdn entry size\n");
  967. goto bail;
  968. }
  969. result = ipahal_nat_construct_entry(
  970. IPAHAL_NAT_IPV4_PDN,
  971. &pdn_fields,
  972. (nat_ctx->pdn_mem.base +
  973. (mdfy_pdn->pdn_index)*(entry_size)));
  974. if (result) {
  975. IPAERR("Fail to construct NAT pdn entry\n");
  976. goto bail;
  977. }
  978. IPADBG("Modify PDN in index: %d Public ip address:%pI4h\n",
  979. mdfy_pdn->pdn_index,
  980. &pdn_fields.public_ip);
  981. IPADBG("Modify PDN dst metadata: 0x%x src metadata: 0x%x\n",
  982. pdn_fields.dst_metadata,
  983. pdn_fields.src_metadata);
  984. /* Copy the PDN config table to SRAM */
  985. ipa3_nat_create_modify_pdn_cmd(&mem_cmd, false);
  986. cmd_pyld = ipahal_construct_imm_cmd(
  987. IPA_IMM_CMD_DMA_SHARED_MEM, &mem_cmd, false);
  988. if (!cmd_pyld) {
  989. IPAERR(
  990. "fail construct dma_shared_mem cmd: for pdn table\n");
  991. result = -ENOMEM;
  992. goto bail;
  993. }
  994. ipa3_init_imm_cmd_desc(&desc, cmd_pyld);
  995. IPADBG("sending PDN table copy cmd\n");
  996. result = ipa3_send_cmd(1, &desc);
  997. if (result)
  998. IPAERR("Fail to send PDN table copy immediate command\n");
  999. ipahal_destroy_imm_cmd(cmd_pyld);
  1000. IPADBG("return\n");
  1001. bail:
  1002. mutex_unlock(&nat_ctx->dev.lock);
  1003. return result;
  1004. }
  1005. static uint32_t ipa3_nat_ipv6ct_calculate_table_size(uint8_t base_addr)
  1006. {
  1007. size_t entry_size;
  1008. u32 entries_num;
  1009. enum ipahal_nat_type nat_type;
  1010. switch (base_addr) {
  1011. case IPA_NAT_BASE_TBL:
  1012. entries_num = ipa3_ctx->nat_mem.dev.table_entries + 1;
  1013. nat_type = IPAHAL_NAT_IPV4;
  1014. break;
  1015. case IPA_NAT_EXPN_TBL:
  1016. entries_num = ipa3_ctx->nat_mem.dev.expn_table_entries;
  1017. nat_type = IPAHAL_NAT_IPV4;
  1018. break;
  1019. case IPA_NAT_INDX_TBL:
  1020. entries_num = ipa3_ctx->nat_mem.dev.table_entries + 1;
  1021. nat_type = IPAHAL_NAT_IPV4_INDEX;
  1022. break;
  1023. case IPA_NAT_INDEX_EXPN_TBL:
  1024. entries_num = ipa3_ctx->nat_mem.dev.expn_table_entries;
  1025. nat_type = IPAHAL_NAT_IPV4_INDEX;
  1026. break;
  1027. case IPA_IPV6CT_BASE_TBL:
  1028. entries_num = ipa3_ctx->ipv6ct_mem.dev.table_entries + 1;
  1029. nat_type = IPAHAL_NAT_IPV6CT;
  1030. break;
  1031. case IPA_IPV6CT_EXPN_TBL:
  1032. entries_num = ipa3_ctx->ipv6ct_mem.dev.expn_table_entries;
  1033. nat_type = IPAHAL_NAT_IPV6CT;
  1034. break;
  1035. default:
  1036. IPAERR_RL("Invalid base_addr %d for table DMA command\n",
  1037. base_addr);
  1038. return 0;
  1039. }
  1040. ipahal_nat_entry_size(nat_type, &entry_size);
  1041. return entry_size * entries_num;
  1042. }
  1043. static int ipa3_table_validate_table_dma_one(struct ipa_ioc_nat_dma_one *param)
  1044. {
  1045. uint32_t table_size;
  1046. if (param->table_index >= 1) {
  1047. IPAERR_RL("Unsupported table index %d\n", param->table_index);
  1048. return -EPERM;
  1049. }
  1050. switch (param->base_addr) {
  1051. case IPA_NAT_BASE_TBL:
  1052. case IPA_NAT_EXPN_TBL:
  1053. case IPA_NAT_INDX_TBL:
  1054. case IPA_NAT_INDEX_EXPN_TBL:
  1055. if (!ipa3_ctx->nat_mem.dev.is_hw_init) {
  1056. IPAERR_RL("attempt to write to %s before HW int\n",
  1057. ipa3_ctx->nat_mem.dev.name);
  1058. return -EPERM;
  1059. }
  1060. break;
  1061. case IPA_IPV6CT_BASE_TBL:
  1062. case IPA_IPV6CT_EXPN_TBL:
  1063. if (ipa3_ctx->ipa_hw_type < IPA_HW_v4_0) {
  1064. IPAERR_RL("IPv6 connection tracking isn't supported\n");
  1065. return -EPERM;
  1066. }
  1067. if (!ipa3_ctx->ipv6ct_mem.dev.is_hw_init) {
  1068. IPAERR_RL("attempt to write to %s before HW int\n",
  1069. ipa3_ctx->ipv6ct_mem.dev.name);
  1070. return -EPERM;
  1071. }
  1072. break;
  1073. default:
  1074. IPAERR_RL("Invalid base_addr %d for table DMA command\n",
  1075. param->base_addr);
  1076. return -EPERM;
  1077. }
  1078. table_size = ipa3_nat_ipv6ct_calculate_table_size(param->base_addr);
  1079. if (!table_size) {
  1080. IPAERR_RL("Failed to calculate table size for base_addr %d\n",
  1081. param->base_addr);
  1082. return -EPERM;
  1083. }
  1084. if (param->offset >= table_size) {
  1085. IPAERR_RL("Invalid offset %d for table DMA command\n",
  1086. param->offset);
  1087. IPAERR_RL("table_index %d base addr %d size %d\n",
  1088. param->table_index, param->base_addr, table_size);
  1089. return -EPERM;
  1090. }
  1091. return 0;
  1092. }
  1093. /**
  1094. * ipa3_table_dma_cmd() - Post TABLE_DMA command to IPA HW
  1095. * @dma: [in] initialization command attributes
  1096. *
  1097. * Called by NAT/IPv6CT clients to post TABLE_DMA command to IPA HW
  1098. *
  1099. * Returns: 0 on success, negative on failure
  1100. */
  1101. int ipa3_table_dma_cmd(struct ipa_ioc_nat_dma_cmd *dma)
  1102. {
  1103. struct ipahal_imm_cmd_table_dma cmd;
  1104. enum ipahal_imm_cmd_name cmd_name = IPA_IMM_CMD_NAT_DMA;
  1105. struct ipahal_imm_cmd_pyld *cmd_pyld[IPA_MAX_NUM_OF_TABLE_DMA_CMD_DESC];
  1106. struct ipa3_desc desc[IPA_MAX_NUM_OF_TABLE_DMA_CMD_DESC];
  1107. uint8_t cnt, num_cmd = 0;
  1108. int result = 0;
  1109. IPADBG("\n");
  1110. if (!dma->entries ||
  1111. dma->entries >= IPA_MAX_NUM_OF_TABLE_DMA_CMD_DESC) {
  1112. IPAERR_RL("Invalid number of entries %d\n",
  1113. dma->entries);
  1114. result = -EPERM;
  1115. goto bail;
  1116. }
  1117. if (!ipa3_ctx->nat_mem.dev.is_dev_init) {
  1118. IPAERR_RL("NAT hasn't been initialized\n");
  1119. return -EPERM;
  1120. }
  1121. for (cnt = 0; cnt < dma->entries; ++cnt) {
  1122. result = ipa3_table_validate_table_dma_one(&dma->dma[cnt]);
  1123. if (result) {
  1124. IPAERR_RL("Table DMA command parameter %d is invalid\n",
  1125. cnt);
  1126. goto bail;
  1127. }
  1128. }
  1129. /* NO-OP IC for ensuring that IPA pipeline is empty */
  1130. cmd_pyld[num_cmd] =
  1131. ipahal_construct_nop_imm_cmd(false, IPAHAL_HPS_CLEAR, false);
  1132. if (!cmd_pyld[num_cmd]) {
  1133. IPAERR("Failed to construct NOP imm cmd\n");
  1134. result = -ENOMEM;
  1135. goto destroy_imm_cmd;
  1136. }
  1137. ipa3_init_imm_cmd_desc(&desc[num_cmd], cmd_pyld[num_cmd]);
  1138. ++num_cmd;
  1139. /* NAT_DMA was renamed to TABLE_DMA starting from IPAv4 */
  1140. if (ipa3_ctx->ipa_hw_type >= IPA_HW_v4_0)
  1141. cmd_name = IPA_IMM_CMD_TABLE_DMA;
  1142. for (cnt = 0; cnt < dma->entries; ++cnt) {
  1143. cmd.table_index = dma->dma[cnt].table_index;
  1144. cmd.base_addr = dma->dma[cnt].base_addr;
  1145. cmd.offset = dma->dma[cnt].offset;
  1146. cmd.data = dma->dma[cnt].data;
  1147. cmd_pyld[num_cmd] =
  1148. ipahal_construct_imm_cmd(cmd_name, &cmd, false);
  1149. if (!cmd_pyld[num_cmd]) {
  1150. IPAERR_RL("Fail to construct table_dma imm cmd\n");
  1151. result = -ENOMEM;
  1152. goto destroy_imm_cmd;
  1153. }
  1154. ipa3_init_imm_cmd_desc(&desc[num_cmd], cmd_pyld[num_cmd]);
  1155. ++num_cmd;
  1156. }
  1157. result = ipa3_send_cmd(num_cmd, desc);
  1158. if (result)
  1159. IPAERR("Fail to send table_dma immediate command\n");
  1160. IPADBG("return\n");
  1161. destroy_imm_cmd:
  1162. for (cnt = 0; cnt < num_cmd; ++cnt)
  1163. ipahal_destroy_imm_cmd(cmd_pyld[cnt]);
  1164. bail:
  1165. return result;
  1166. }
  1167. /**
  1168. * ipa3_nat_dma_cmd() - Post NAT_DMA command to IPA HW
  1169. * @dma: [in] initialization command attributes
  1170. *
  1171. * Called by NAT client driver to post NAT_DMA command to IPA HW
  1172. *
  1173. * Returns: 0 on success, negative on failure
  1174. */
  1175. int ipa3_nat_dma_cmd(struct ipa_ioc_nat_dma_cmd *dma)
  1176. {
  1177. return ipa3_table_dma_cmd(dma);
  1178. }
  1179. static void ipa3_nat_ipv6ct_free_mem(struct ipa3_nat_ipv6ct_common_mem *dev)
  1180. {
  1181. IPADBG("\n");
  1182. if (!dev->is_mem_allocated) {
  1183. IPADBG("attempt to delete %s before memory allocation\n",
  1184. dev->name);
  1185. /* Deletion of partly initialized table is not an error */
  1186. goto clear;
  1187. }
  1188. if (dev->is_sys_mem) {
  1189. IPADBG("freeing the dma memory for %s\n", dev->name);
  1190. dma_free_coherent(
  1191. ipa3_ctx->pdev, dev->size,
  1192. dev->vaddr, dev->dma_handle);
  1193. dev->size = 0;
  1194. dev->vaddr = NULL;
  1195. }
  1196. dev->is_mem_allocated = false;
  1197. clear:
  1198. dev->table_entries = 0;
  1199. dev->expn_table_entries = 0;
  1200. dev->base_table_addr = NULL;
  1201. dev->expansion_table_addr = NULL;
  1202. dev->is_hw_init = false;
  1203. dev->is_mapped = false;
  1204. dev->is_sys_mem = false;
  1205. IPADBG("return\n");
  1206. }
  1207. static int ipa3_nat_ipv6ct_create_del_table_cmd(
  1208. uint8_t tbl_index,
  1209. u32 base_addr,
  1210. struct ipa3_nat_ipv6ct_common_mem *dev,
  1211. struct ipahal_imm_cmd_nat_ipv6ct_init_common *table_init_cmd)
  1212. {
  1213. bool mem_type_shared = true;
  1214. IPADBG("\n");
  1215. if (tbl_index >= 1) {
  1216. IPAERR_RL("Unsupported table index %d\n", tbl_index);
  1217. return -EPERM;
  1218. }
  1219. if (dev->tmp_mem != NULL) {
  1220. IPADBG("using temp memory during %s del\n", dev->name);
  1221. mem_type_shared = false;
  1222. base_addr = dev->tmp_mem->dma_handle;
  1223. }
  1224. table_init_cmd->table_index = tbl_index;
  1225. table_init_cmd->base_table_addr = base_addr;
  1226. table_init_cmd->base_table_addr_shared = mem_type_shared;
  1227. table_init_cmd->expansion_table_addr = base_addr;
  1228. table_init_cmd->expansion_table_addr_shared = mem_type_shared;
  1229. table_init_cmd->size_base_table = 0;
  1230. table_init_cmd->size_expansion_table = 0;
  1231. IPADBG("return\n");
  1232. return 0;
  1233. }
  1234. static int ipa3_nat_send_del_table_cmd(uint8_t tbl_index)
  1235. {
  1236. struct ipahal_imm_cmd_ip_v4_nat_init cmd;
  1237. int result;
  1238. IPADBG("\n");
  1239. result = ipa3_nat_ipv6ct_create_del_table_cmd(
  1240. tbl_index,
  1241. IPA_NAT_PHYS_MEM_OFFSET,
  1242. &ipa3_ctx->nat_mem.dev,
  1243. &cmd.table_init);
  1244. if (result) {
  1245. IPAERR(
  1246. "Fail to create immediate command to delete NAT table\n");
  1247. return result;
  1248. }
  1249. cmd.index_table_addr = cmd.table_init.base_table_addr;
  1250. cmd.index_table_addr_shared = cmd.table_init.base_table_addr_shared;
  1251. cmd.index_table_expansion_addr = cmd.index_table_addr;
  1252. cmd.index_table_expansion_addr_shared = cmd.index_table_addr_shared;
  1253. cmd.public_addr_info = 0;
  1254. IPADBG("posting NAT delete command\n");
  1255. result = ipa3_nat_send_init_cmd(&cmd, true);
  1256. if (result) {
  1257. IPAERR("Fail to send NAT delete immediate command\n");
  1258. return result;
  1259. }
  1260. IPADBG("return\n");
  1261. return 0;
  1262. }
  1263. static int ipa3_ipv6ct_send_del_table_cmd(uint8_t tbl_index)
  1264. {
  1265. struct ipahal_imm_cmd_ip_v6_ct_init cmd;
  1266. int result;
  1267. IPADBG("\n");
  1268. result = ipa3_nat_ipv6ct_create_del_table_cmd(
  1269. tbl_index,
  1270. IPA_IPV6CT_PHYS_MEM_OFFSET,
  1271. &ipa3_ctx->ipv6ct_mem.dev,
  1272. &cmd.table_init);
  1273. if (result) {
  1274. IPAERR(
  1275. "Fail to create immediate command to delete IPv6CT table\n");
  1276. return result;
  1277. }
  1278. IPADBG("posting IPv6CT delete command\n");
  1279. result = ipa3_ipv6ct_send_init_cmd(&cmd);
  1280. if (result) {
  1281. IPAERR("Fail to send IPv6CT delete immediate command\n");
  1282. return result;
  1283. }
  1284. IPADBG("return\n");
  1285. return 0;
  1286. }
  1287. /**
  1288. * ipa3_nat_del_cmd() - Delete a NAT table
  1289. * @del: [in] delete table table table parameters
  1290. *
  1291. * Called by NAT client driver to delete the nat table
  1292. *
  1293. * Returns: 0 on success, negative on failure
  1294. */
  1295. int ipa3_nat_del_cmd(struct ipa_ioc_v4_nat_del *del)
  1296. {
  1297. struct ipa_ioc_nat_ipv6ct_table_del tmp;
  1298. tmp.table_index = del->table_index;
  1299. return ipa3_del_nat_table(&tmp);
  1300. }
  1301. /**
  1302. * ipa3_del_nat_table() - Delete the NAT table
  1303. * @del: [in] delete table parameters
  1304. *
  1305. * Called by NAT client to delete the table
  1306. *
  1307. * Returns: 0 on success, negative on failure
  1308. */
  1309. int ipa3_del_nat_table(struct ipa_ioc_nat_ipv6ct_table_del *del)
  1310. {
  1311. int result = 0;
  1312. IPADBG("\n");
  1313. if (!ipa3_ctx->nat_mem.dev.is_dev_init) {
  1314. IPAERR("NAT hasn't been initialized\n");
  1315. return -EPERM;
  1316. }
  1317. mutex_lock(&ipa3_ctx->nat_mem.dev.lock);
  1318. if (ipa3_ctx->nat_mem.dev.is_hw_init) {
  1319. result = ipa3_nat_send_del_table_cmd(del->table_index);
  1320. if (result) {
  1321. IPAERR(
  1322. "Fail to send immediate command to delete NAT table\n");
  1323. goto bail;
  1324. }
  1325. }
  1326. ipa3_ctx->nat_mem.public_ip_addr = 0;
  1327. ipa3_ctx->nat_mem.index_table_addr = 0;
  1328. ipa3_ctx->nat_mem.index_table_expansion_addr = 0;
  1329. if (ipa3_ctx->ipa_hw_type >= IPA_HW_v4_0 &&
  1330. ipa3_ctx->nat_mem.dev.is_mem_allocated) {
  1331. IPADBG("freeing the PDN memory\n");
  1332. dma_free_coherent(ipa3_ctx->pdev,
  1333. ipa3_ctx->nat_mem.pdn_mem.size,
  1334. ipa3_ctx->nat_mem.pdn_mem.base,
  1335. ipa3_ctx->nat_mem.pdn_mem.phys_base);
  1336. ipa3_ctx->nat_mem.pdn_mem.base = NULL;
  1337. }
  1338. ipa3_nat_ipv6ct_free_mem(&ipa3_ctx->nat_mem.dev);
  1339. IPADBG("return\n");
  1340. bail:
  1341. mutex_unlock(&ipa3_ctx->nat_mem.dev.lock);
  1342. return result;
  1343. }
  1344. /**
  1345. * ipa3_del_ipv6ct_table() - Delete the IPv6CT table
  1346. * @del: [in] delete table parameters
  1347. *
  1348. * Called by IPv6CT client to delete the table
  1349. *
  1350. * Returns: 0 on success, negative on failure
  1351. */
  1352. int ipa3_del_ipv6ct_table(struct ipa_ioc_nat_ipv6ct_table_del *del)
  1353. {
  1354. int result = 0;
  1355. IPADBG("\n");
  1356. if (ipa3_ctx->ipa_hw_type < IPA_HW_v4_0) {
  1357. IPAERR_RL("IPv6 connection tracking isn't supported\n");
  1358. return -EPERM;
  1359. }
  1360. if (!ipa3_ctx->ipv6ct_mem.dev.is_dev_init) {
  1361. IPAERR("IPv6 connection tracking hasn't been initialized\n");
  1362. return -EPERM;
  1363. }
  1364. mutex_lock(&ipa3_ctx->ipv6ct_mem.dev.lock);
  1365. if (ipa3_ctx->ipv6ct_mem.dev.is_hw_init) {
  1366. result = ipa3_ipv6ct_send_del_table_cmd(del->table_index);
  1367. if (result) {
  1368. IPAERR(
  1369. "Fail to send immediate command to delete IPv6CT table\n");
  1370. goto bail;
  1371. }
  1372. }
  1373. ipa3_nat_ipv6ct_free_mem(&ipa3_ctx->ipv6ct_mem.dev);
  1374. IPADBG("return\n");
  1375. bail:
  1376. mutex_unlock(&ipa3_ctx->ipv6ct_mem.dev.lock);
  1377. return result;
  1378. }