rmnet_descriptor.c 43 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681
  1. /* Copyright (c) 2013-2021, The Linux Foundation. All rights reserved.
  2. *
  3. * This program is free software; you can redistribute it and/or modify
  4. * it under the terms of the GNU General Public License version 2 and
  5. * only version 2 as published by the Free Software Foundation.
  6. *
  7. * This program is distributed in the hope that it will be useful,
  8. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  9. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  10. * GNU General Public License for more details.
  11. *
  12. * RMNET Packet Descriptor Framework
  13. *
  14. */
  15. #include <linux/ip.h>
  16. #include <linux/ipv6.h>
  17. #include <net/ipv6.h>
  18. #include <net/ip6_checksum.h>
  19. #include "rmnet_config.h"
  20. #include "rmnet_descriptor.h"
  21. #include "rmnet_handlers.h"
  22. #include "rmnet_private.h"
  23. #include "rmnet_vnd.h"
  24. #include "rmnet_qmi.h"
  25. #include "qmi_rmnet.h"
  26. #define RMNET_FRAG_DESCRIPTOR_POOL_SIZE 64
  27. #define RMNET_DL_IND_HDR_SIZE (sizeof(struct rmnet_map_dl_ind_hdr) + \
  28. sizeof(struct rmnet_map_header) + \
  29. sizeof(struct rmnet_map_control_command_header))
  30. #define RMNET_DL_IND_TRL_SIZE (sizeof(struct rmnet_map_dl_ind_trl) + \
  31. sizeof(struct rmnet_map_header) + \
  32. sizeof(struct rmnet_map_control_command_header))
  33. typedef void (*rmnet_perf_desc_hook_t)(struct rmnet_frag_descriptor *frag_desc,
  34. struct rmnet_port *port);
  35. typedef void (*rmnet_perf_chain_hook_t)(void);
  36. typedef void (*rmnet_perf_tether_ingress_hook_t)(struct tcphdr *tp, struct sk_buff *skb);
  37. rmnet_perf_tether_ingress_hook_t rmnet_perf_tether_ingress_hook __rcu __read_mostly;
  38. EXPORT_SYMBOL(rmnet_perf_tether_ingress_hook);
  39. struct rmnet_frag_descriptor *
  40. rmnet_get_frag_descriptor(struct rmnet_port *port)
  41. {
  42. struct rmnet_frag_descriptor_pool *pool = port->frag_desc_pool;
  43. struct rmnet_frag_descriptor *frag_desc;
  44. unsigned long flags;
  45. spin_lock_irqsave(&port->desc_pool_lock, flags);
  46. if (!list_empty(&pool->free_list)) {
  47. frag_desc = list_first_entry(&pool->free_list,
  48. struct rmnet_frag_descriptor,
  49. list);
  50. list_del_init(&frag_desc->list);
  51. } else {
  52. frag_desc = kzalloc(sizeof(*frag_desc), GFP_ATOMIC);
  53. if (!frag_desc)
  54. goto out;
  55. INIT_LIST_HEAD(&frag_desc->list);
  56. INIT_LIST_HEAD(&frag_desc->frags);
  57. pool->pool_size++;
  58. }
  59. out:
  60. spin_unlock_irqrestore(&port->desc_pool_lock, flags);
  61. return frag_desc;
  62. }
  63. EXPORT_SYMBOL(rmnet_get_frag_descriptor);
  64. void rmnet_recycle_frag_descriptor(struct rmnet_frag_descriptor *frag_desc,
  65. struct rmnet_port *port)
  66. {
  67. struct rmnet_frag_descriptor_pool *pool = port->frag_desc_pool;
  68. struct rmnet_fragment *frag, *tmp;
  69. unsigned long flags;
  70. list_del(&frag_desc->list);
  71. list_for_each_entry_safe(frag, tmp, &frag_desc->frags, list) {
  72. struct page *page = skb_frag_page(&frag->frag);
  73. if (page)
  74. put_page(page);
  75. list_del(&frag->list);
  76. kfree(frag);
  77. }
  78. memset(frag_desc, 0, sizeof(*frag_desc));
  79. INIT_LIST_HEAD(&frag_desc->list);
  80. INIT_LIST_HEAD(&frag_desc->frags);
  81. spin_lock_irqsave(&port->desc_pool_lock, flags);
  82. list_add_tail(&frag_desc->list, &pool->free_list);
  83. spin_unlock_irqrestore(&port->desc_pool_lock, flags);
  84. }
  85. EXPORT_SYMBOL(rmnet_recycle_frag_descriptor);
  86. void *rmnet_frag_pull(struct rmnet_frag_descriptor *frag_desc,
  87. struct rmnet_port *port, unsigned int size)
  88. {
  89. struct rmnet_fragment *frag, *tmp;
  90. if (size >= frag_desc->len) {
  91. pr_info("%s(): Pulling %u bytes from %u byte pkt. Dropping\n",
  92. __func__, size, frag_desc->len);
  93. rmnet_recycle_frag_descriptor(frag_desc, port);
  94. return NULL;
  95. }
  96. list_for_each_entry_safe(frag, tmp, &frag_desc->frags, list) {
  97. u32 frag_size = skb_frag_size(&frag->frag);
  98. if (!size)
  99. break;
  100. if (size >= frag_size) {
  101. /* Remove the whole frag */
  102. struct page *page = skb_frag_page(&frag->frag);
  103. if (page)
  104. put_page(page);
  105. list_del(&frag->list);
  106. size -= frag_size;
  107. frag_desc->len -= frag_size;
  108. kfree(frag);
  109. continue;
  110. }
  111. /* Pull off 'size' bytes */
  112. skb_frag_off_add(&frag->frag, size);
  113. skb_frag_size_sub(&frag->frag, size);
  114. frag_desc->len -= size;
  115. break;
  116. }
  117. return rmnet_frag_data_ptr(frag_desc);
  118. }
  119. EXPORT_SYMBOL(rmnet_frag_pull);
  120. void *rmnet_frag_trim(struct rmnet_frag_descriptor *frag_desc,
  121. struct rmnet_port *port, unsigned int size)
  122. {
  123. struct rmnet_fragment *frag, *tmp;
  124. unsigned int eat;
  125. if (!size) {
  126. pr_info("%s(): Trimming %u byte pkt to 0. Dropping\n",
  127. __func__, frag_desc->len);
  128. rmnet_recycle_frag_descriptor(frag_desc, port);
  129. return NULL;
  130. }
  131. /* Growing bigger doesn't make sense */
  132. if (size >= frag_desc->len)
  133. goto out;
  134. /* Compute number of bytes to remove from the end */
  135. eat = frag_desc->len - size;
  136. list_for_each_entry_safe_reverse(frag, tmp, &frag_desc->frags, list) {
  137. u32 frag_size = skb_frag_size(&frag->frag);
  138. if (!eat)
  139. goto out;
  140. if (eat >= frag_size) {
  141. /* Remove the whole frag */
  142. struct page *page = skb_frag_page(&frag->frag);
  143. if (page)
  144. put_page(page);
  145. list_del(&frag->list);
  146. eat -= frag_size;
  147. frag_desc->len -= frag_size;
  148. kfree(frag);
  149. continue;
  150. }
  151. /* Chop off 'eat' bytes from the end */
  152. skb_frag_size_sub(&frag->frag, eat);
  153. frag_desc->len -= eat;
  154. goto out;
  155. }
  156. out:
  157. return rmnet_frag_data_ptr(frag_desc);
  158. }
  159. EXPORT_SYMBOL(rmnet_frag_trim);
  160. static int rmnet_frag_copy_data(struct rmnet_frag_descriptor *frag_desc,
  161. u32 off, u32 len, void *buf)
  162. {
  163. struct rmnet_fragment *frag;
  164. u32 frag_size, copy_len;
  165. u32 buf_offset = 0;
  166. /* Don't make me do something we'd both regret */
  167. if (off > frag_desc->len || len > frag_desc->len ||
  168. off + len > frag_desc->len)
  169. return -EINVAL;
  170. /* Copy 'len' bytes into the bufer starting from 'off' */
  171. list_for_each_entry(frag, &frag_desc->frags, list) {
  172. if (!len)
  173. break;
  174. frag_size = skb_frag_size(&frag->frag);
  175. if (off < frag_size) {
  176. copy_len = min_t(u32, len, frag_size - off);
  177. memcpy(buf + buf_offset,
  178. skb_frag_address(&frag->frag) + off,
  179. copy_len);
  180. buf_offset += copy_len;
  181. len -= copy_len;
  182. off = 0;
  183. } else {
  184. off -= frag_size;
  185. }
  186. }
  187. return 0;
  188. }
  189. void *rmnet_frag_header_ptr(struct rmnet_frag_descriptor *frag_desc, u32 off,
  190. u32 len, void *buf)
  191. {
  192. struct rmnet_fragment *frag;
  193. u8 *start;
  194. u32 frag_size, offset;
  195. /* Don't take a long pointer off a short frag */
  196. if (off > frag_desc->len || len > frag_desc->len ||
  197. off + len > frag_desc->len)
  198. return NULL;
  199. /* Find the starting fragment */
  200. offset = off;
  201. list_for_each_entry(frag, &frag_desc->frags, list) {
  202. frag_size = skb_frag_size(&frag->frag);
  203. if (off < frag_size) {
  204. start = skb_frag_address(&frag->frag) + off;
  205. /* If the header is entirely on this frag, just return
  206. * a pointer to it.
  207. */
  208. if (off + len <= frag_size)
  209. return start;
  210. /* Otherwise, we need to copy the data into a linear
  211. * buffer.
  212. */
  213. break;
  214. }
  215. off -= frag_size;
  216. }
  217. if (rmnet_frag_copy_data(frag_desc, offset, len, buf) < 0)
  218. return NULL;
  219. return buf;
  220. }
  221. EXPORT_SYMBOL(rmnet_frag_header_ptr);
  222. int rmnet_frag_descriptor_add_frag(struct rmnet_frag_descriptor *frag_desc,
  223. struct page *p, u32 page_offset, u32 len)
  224. {
  225. struct rmnet_fragment *frag;
  226. frag = kzalloc(sizeof(*frag), GFP_ATOMIC);
  227. if (!frag)
  228. return -ENOMEM;
  229. INIT_LIST_HEAD(&frag->list);
  230. get_page(p);
  231. __skb_frag_set_page(&frag->frag, p);
  232. skb_frag_size_set(&frag->frag, len);
  233. skb_frag_off_set(&frag->frag, page_offset);
  234. list_add_tail(&frag->list, &frag_desc->frags);
  235. frag_desc->len += len;
  236. return 0;
  237. }
  238. EXPORT_SYMBOL(rmnet_frag_descriptor_add_frag);
  239. int rmnet_frag_descriptor_add_frags_from(struct rmnet_frag_descriptor *to,
  240. struct rmnet_frag_descriptor *from,
  241. u32 off, u32 len)
  242. {
  243. struct rmnet_fragment *frag;
  244. int rc;
  245. /* Sanity check the lengths */
  246. if (off > from->len || len > from->len || off + len > from->len)
  247. return -EINVAL;
  248. list_for_each_entry(frag, &from->frags, list) {
  249. u32 frag_size;
  250. if (!len)
  251. break;
  252. frag_size = skb_frag_size(&frag->frag);
  253. if (off < frag_size) {
  254. struct page *p = skb_frag_page(&frag->frag);
  255. u32 page_off = skb_frag_off(&frag->frag);
  256. u32 copy_len = min_t(u32, len, frag_size - off);
  257. rc = rmnet_frag_descriptor_add_frag(to, p,
  258. page_off + off,
  259. copy_len);
  260. if (rc < 0)
  261. return rc;
  262. len -= copy_len;
  263. off = 0;
  264. } else {
  265. off -= frag_size;
  266. }
  267. }
  268. return 0;
  269. }
  270. EXPORT_SYMBOL(rmnet_frag_descriptor_add_frags_from);
  271. int rmnet_frag_ipv6_skip_exthdr(struct rmnet_frag_descriptor *frag_desc,
  272. int start, u8 *nexthdrp, __be16 *fragp)
  273. {
  274. u8 nexthdr = *nexthdrp;
  275. *fragp = 0;
  276. while (ipv6_ext_hdr(nexthdr)) {
  277. struct ipv6_opt_hdr *hp, __hp;
  278. int hdrlen;
  279. if (nexthdr == NEXTHDR_NONE)
  280. return -EINVAL;
  281. hp = rmnet_frag_header_ptr(frag_desc, (u32)start, sizeof(*hp),
  282. &__hp);
  283. if (!hp)
  284. return -EINVAL;
  285. if (nexthdr == NEXTHDR_FRAGMENT) {
  286. u32 off = offsetof(struct frag_hdr, frag_off);
  287. __be16 *fp, __fp;
  288. fp = rmnet_frag_header_ptr(frag_desc, (u32)start + off,
  289. sizeof(*fp), &__fp);
  290. if (!fp)
  291. return -EINVAL;
  292. *fragp = *fp;
  293. if (ntohs(*fragp) & ~0x7)
  294. break;
  295. hdrlen = 8;
  296. } else if (nexthdr == NEXTHDR_AUTH) {
  297. hdrlen = (hp->hdrlen + 2) << 2;
  298. } else {
  299. hdrlen = ipv6_optlen(hp);
  300. }
  301. nexthdr = hp->nexthdr;
  302. start += hdrlen;
  303. }
  304. *nexthdrp = nexthdr;
  305. return start;
  306. }
  307. EXPORT_SYMBOL(rmnet_frag_ipv6_skip_exthdr);
  308. static u8 rmnet_frag_do_flow_control(struct rmnet_map_header *qmap,
  309. struct rmnet_map_control_command *cmd,
  310. struct rmnet_port *port,
  311. int enable)
  312. {
  313. struct rmnet_endpoint *ep;
  314. struct net_device *vnd;
  315. u16 ip_family;
  316. u16 fc_seq;
  317. u32 qos_id;
  318. u8 mux_id;
  319. int r;
  320. mux_id = qmap->mux_id;
  321. if (mux_id >= RMNET_MAX_LOGICAL_EP)
  322. return RX_HANDLER_CONSUMED;
  323. ep = rmnet_get_endpoint(port, mux_id);
  324. if (!ep)
  325. return RX_HANDLER_CONSUMED;
  326. vnd = ep->egress_dev;
  327. ip_family = cmd->flow_control.ip_family;
  328. fc_seq = ntohs(cmd->flow_control.flow_control_seq_num);
  329. qos_id = ntohl(cmd->flow_control.qos_id);
  330. /* Ignore the ip family and pass the sequence number for both v4 and v6
  331. * sequence. User space does not support creating dedicated flows for
  332. * the 2 protocols
  333. */
  334. r = rmnet_vnd_do_flow_control(vnd, enable);
  335. if (r)
  336. return RMNET_MAP_COMMAND_UNSUPPORTED;
  337. else
  338. return RMNET_MAP_COMMAND_ACK;
  339. }
  340. static void rmnet_frag_send_ack(struct rmnet_map_header *qmap,
  341. unsigned char type,
  342. struct rmnet_port *port)
  343. {
  344. struct rmnet_map_control_command *cmd;
  345. struct net_device *dev = port->dev;
  346. struct sk_buff *skb;
  347. u16 alloc_len = ntohs(qmap->pkt_len) + sizeof(*qmap);
  348. skb = alloc_skb(alloc_len, GFP_ATOMIC);
  349. if (!skb)
  350. return;
  351. skb->protocol = htons(ETH_P_MAP);
  352. skb->dev = dev;
  353. cmd = rmnet_map_get_cmd_start(skb);
  354. cmd->cmd_type = type & 0x03;
  355. netif_tx_lock(dev);
  356. dev->netdev_ops->ndo_start_xmit(skb, dev);
  357. netif_tx_unlock(dev);
  358. }
  359. static void
  360. rmnet_frag_process_flow_start(struct rmnet_frag_descriptor *frag_desc,
  361. struct rmnet_map_control_command_header *cmd,
  362. struct rmnet_port *port,
  363. u16 cmd_len)
  364. {
  365. struct rmnet_map_dl_ind_hdr *dlhdr, __dlhdr;
  366. u32 offset = sizeof(struct rmnet_map_header);
  367. u32 data_format;
  368. bool is_dl_mark_v2;
  369. if (cmd_len + offset < RMNET_DL_IND_HDR_SIZE)
  370. return;
  371. data_format = port->data_format;
  372. is_dl_mark_v2 = data_format & RMNET_INGRESS_FORMAT_DL_MARKER_V2;
  373. dlhdr = rmnet_frag_header_ptr(frag_desc, offset + sizeof(*cmd),
  374. sizeof(*dlhdr), &__dlhdr);
  375. if (!dlhdr)
  376. return;
  377. port->stats.dl_hdr_last_ep_id = cmd->source_id;
  378. port->stats.dl_hdr_last_qmap_vers = cmd->reserved;
  379. port->stats.dl_hdr_last_trans_id = cmd->transaction_id;
  380. port->stats.dl_hdr_last_seq = dlhdr->le.seq;
  381. port->stats.dl_hdr_last_bytes = dlhdr->le.bytes;
  382. port->stats.dl_hdr_last_pkts = dlhdr->le.pkts;
  383. port->stats.dl_hdr_last_flows = dlhdr->le.flows;
  384. port->stats.dl_hdr_total_bytes += port->stats.dl_hdr_last_bytes;
  385. port->stats.dl_hdr_total_pkts += port->stats.dl_hdr_last_pkts;
  386. port->stats.dl_hdr_count++;
  387. /* If a target is taking frag path, we can assume DL marker v2 is in
  388. * play
  389. */
  390. if (is_dl_mark_v2)
  391. rmnet_map_dl_hdr_notify_v2(port, dlhdr, cmd);
  392. }
  393. static void
  394. rmnet_frag_process_flow_end(struct rmnet_frag_descriptor *frag_desc,
  395. struct rmnet_map_control_command_header *cmd,
  396. struct rmnet_port *port, u16 cmd_len)
  397. {
  398. struct rmnet_map_dl_ind_trl *dltrl, __dltrl;
  399. u32 offset = sizeof(struct rmnet_map_header);
  400. u32 data_format;
  401. bool is_dl_mark_v2;
  402. if (cmd_len + offset < RMNET_DL_IND_TRL_SIZE)
  403. return;
  404. data_format = port->data_format;
  405. is_dl_mark_v2 = data_format & RMNET_INGRESS_FORMAT_DL_MARKER_V2;
  406. dltrl = rmnet_frag_header_ptr(frag_desc, offset + sizeof(*cmd),
  407. sizeof(*dltrl), &__dltrl);
  408. if (!dltrl)
  409. return;
  410. port->stats.dl_trl_last_seq = dltrl->seq_le;
  411. port->stats.dl_trl_count++;
  412. /* If a target is taking frag path, we can assume DL marker v2 is in
  413. * play
  414. */
  415. if (is_dl_mark_v2)
  416. rmnet_map_dl_trl_notify_v2(port, dltrl, cmd);
  417. }
  418. /* Process MAP command frame and send N/ACK message as appropriate. Message cmd
  419. * name is decoded here and appropriate handler is called.
  420. */
  421. void rmnet_frag_command(struct rmnet_frag_descriptor *frag_desc,
  422. struct rmnet_map_header *qmap, struct rmnet_port *port)
  423. {
  424. struct rmnet_map_control_command *cmd, __cmd;
  425. unsigned char rc = 0;
  426. cmd = rmnet_frag_header_ptr(frag_desc, sizeof(*qmap), sizeof(*cmd),
  427. &__cmd);
  428. if (!cmd)
  429. return;
  430. switch (cmd->command_name) {
  431. case RMNET_MAP_COMMAND_FLOW_ENABLE:
  432. rc = rmnet_frag_do_flow_control(qmap, cmd, port, 1);
  433. break;
  434. case RMNET_MAP_COMMAND_FLOW_DISABLE:
  435. rc = rmnet_frag_do_flow_control(qmap, cmd, port, 0);
  436. break;
  437. default:
  438. rc = RMNET_MAP_COMMAND_UNSUPPORTED;
  439. break;
  440. }
  441. if (rc == RMNET_MAP_COMMAND_ACK)
  442. rmnet_frag_send_ack(qmap, rc, port);
  443. }
  444. int rmnet_frag_flow_command(struct rmnet_frag_descriptor *frag_desc,
  445. struct rmnet_port *port, u16 pkt_len)
  446. {
  447. struct rmnet_map_control_command_header *cmd, __cmd;
  448. cmd = rmnet_frag_header_ptr(frag_desc, sizeof(struct rmnet_map_header),
  449. sizeof(*cmd), &__cmd);
  450. if (!cmd)
  451. return -1;
  452. switch (cmd->command_name) {
  453. case RMNET_MAP_COMMAND_FLOW_START:
  454. rmnet_frag_process_flow_start(frag_desc, cmd, port, pkt_len);
  455. break;
  456. case RMNET_MAP_COMMAND_FLOW_END:
  457. rmnet_frag_process_flow_end(frag_desc, cmd, port, pkt_len);
  458. break;
  459. default:
  460. return 1;
  461. }
  462. return 0;
  463. }
  464. EXPORT_SYMBOL(rmnet_frag_flow_command);
  465. static int rmnet_frag_deaggregate_one(struct sk_buff *skb,
  466. struct rmnet_port *port,
  467. struct list_head *list,
  468. u32 start, u32 priority)
  469. {
  470. struct skb_shared_info *shinfo = skb_shinfo(skb);
  471. struct rmnet_frag_descriptor *frag_desc;
  472. struct rmnet_map_header *maph, __maph;
  473. skb_frag_t *frag;
  474. u32 start_frag, offset, i;
  475. u32 start_frag_size, start_frag_off;
  476. u32 pkt_len, copy_len = 0;
  477. int rc;
  478. for (start_frag = 0, offset = 0; start_frag < shinfo->nr_frags;
  479. start_frag++) {
  480. frag = &shinfo->frags[start_frag];
  481. if (start < skb_frag_size(frag) + offset)
  482. break;
  483. offset += skb_frag_size(frag);
  484. }
  485. if (start_frag == shinfo->nr_frags)
  486. return -1;
  487. /* start - offset is the additional offset into the page to account
  488. * for any data on it we've already used.
  489. */
  490. start_frag_size = skb_frag_size(frag) - (start - offset);
  491. start_frag_off = skb_frag_off(frag) + (start - offset);
  492. /* Grab the QMAP header. Careful, as there's no guarantee that it's
  493. * continugous!
  494. */
  495. if (likely(start_frag_size >= sizeof(*maph))) {
  496. maph = skb_frag_address(frag) + (start - offset);
  497. } else {
  498. /* The header's split across pages. We can rebuild it.
  499. * Probably not faster or stronger than before. But certainly
  500. * more linear.
  501. */
  502. if (skb_copy_bits(skb, start, &__maph, sizeof(__maph)) < 0)
  503. return -1;
  504. maph = &__maph;
  505. }
  506. pkt_len = ntohs(maph->pkt_len);
  507. /* Catch empty frames */
  508. if (!pkt_len)
  509. return -1;
  510. frag_desc = rmnet_get_frag_descriptor(port);
  511. if (!frag_desc)
  512. return -1;
  513. frag_desc->priority = priority;
  514. pkt_len += sizeof(*maph);
  515. if (port->data_format & RMNET_FLAGS_INGRESS_MAP_CKSUMV4) {
  516. pkt_len += sizeof(struct rmnet_map_dl_csum_trailer);
  517. } else if ((port->data_format & (RMNET_FLAGS_INGRESS_MAP_CKSUMV5 |
  518. RMNET_FLAGS_INGRESS_COALESCE)) &&
  519. !maph->cd_bit) {
  520. u32 hsize = 0;
  521. u8 type;
  522. /* Check the type. This seems like should be overkill for less
  523. * than a single byte, doesn't it?
  524. */
  525. if (likely(start_frag_size >= sizeof(*maph) + 1)) {
  526. type = *((u8 *)maph + sizeof(*maph));
  527. } else {
  528. if (skb_copy_bits(skb, start + sizeof(*maph), &type,
  529. sizeof(type)) < 0)
  530. return -1;
  531. }
  532. /* Type only uses the first 7 bits */
  533. switch ((type & 0xFE) >> 1) {
  534. case RMNET_MAP_HEADER_TYPE_COALESCING:
  535. hsize = sizeof(struct rmnet_map_v5_coal_header);
  536. break;
  537. case RMNET_MAP_HEADER_TYPE_CSUM_OFFLOAD:
  538. hsize = sizeof(struct rmnet_map_v5_csum_header);
  539. break;
  540. }
  541. pkt_len += hsize;
  542. }
  543. /* Add all frags containing the packet data to the descriptor */
  544. for (i = start_frag; pkt_len > 0 && i < shinfo->nr_frags; ) {
  545. u32 size, off;
  546. u32 copy;
  547. frag = &shinfo->frags[i];
  548. size = skb_frag_size(frag);
  549. off = skb_frag_off(frag);
  550. if (i == start_frag) {
  551. /* These are different for the first one to account for
  552. * the starting offset.
  553. */
  554. size = start_frag_size;
  555. off = start_frag_off;
  556. }
  557. copy = min_t(u32, size, pkt_len);
  558. rc = rmnet_frag_descriptor_add_frag(frag_desc,
  559. skb_frag_page(frag), off,
  560. copy);
  561. if (rc < 0) {
  562. rmnet_recycle_frag_descriptor(frag_desc, port);
  563. return -1;
  564. }
  565. pkt_len -= copy;
  566. copy_len += copy;
  567. /* If the fragment is exhausted, we can move to the next one */
  568. if (!(size - copy_len)) {
  569. i++;
  570. copy_len = 0;
  571. }
  572. }
  573. if (pkt_len) {
  574. /* Packet length is larger than the amount of data we have */
  575. rmnet_recycle_frag_descriptor(frag_desc, port);
  576. return -1;
  577. }
  578. list_add_tail(&frag_desc->list, list);
  579. return (int)frag_desc->len;
  580. }
  581. void rmnet_frag_deaggregate(struct sk_buff *skb, struct rmnet_port *port,
  582. struct list_head *list, u32 priority)
  583. {
  584. u32 start = 0;
  585. int rc;
  586. while (start < skb->len) {
  587. rc = rmnet_frag_deaggregate_one(skb, port, list, start,
  588. priority);
  589. if (rc < 0)
  590. return;
  591. start += (u32)rc;
  592. }
  593. }
  594. /* Fill in GSO metadata to allow the SKB to be segmented by the NW stack
  595. * if needed (i.e. forwarding, UDP GRO)
  596. */
  597. static void rmnet_frag_gso_stamp(struct sk_buff *skb,
  598. struct rmnet_frag_descriptor *frag_desc)
  599. {
  600. struct skb_shared_info *shinfo = skb_shinfo(skb);
  601. if (frag_desc->trans_proto == IPPROTO_TCP)
  602. shinfo->gso_type = (frag_desc->ip_proto == 4) ?
  603. SKB_GSO_TCPV4 : SKB_GSO_TCPV6;
  604. else
  605. shinfo->gso_type = SKB_GSO_UDP_L4;
  606. shinfo->gso_size = frag_desc->gso_size;
  607. shinfo->gso_segs = frag_desc->gso_segs;
  608. }
  609. /* Set the partial checksum information. Sets the transport checksum to the
  610. * pseudoheader checksum and sets the offload metadata.
  611. */
  612. static void rmnet_frag_partial_csum(struct sk_buff *skb,
  613. struct rmnet_frag_descriptor *frag_desc)
  614. {
  615. rmnet_perf_tether_ingress_hook_t rmnet_perf_tether_ingress;
  616. struct iphdr *iph = (struct iphdr *)skb->data;
  617. __sum16 pseudo;
  618. u16 pkt_len = skb->len - frag_desc->ip_len;
  619. if (frag_desc->ip_proto == 4) {
  620. iph->tot_len = htons(skb->len);
  621. iph->check = 0;
  622. iph->check = ip_fast_csum(iph, iph->ihl);
  623. pseudo = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
  624. pkt_len, frag_desc->trans_proto,
  625. 0);
  626. } else {
  627. struct ipv6hdr *ip6h = (struct ipv6hdr *)iph;
  628. /* Payload length includes any extension headers */
  629. ip6h->payload_len = htons(skb->len - sizeof(*ip6h));
  630. pseudo = ~csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
  631. pkt_len, frag_desc->trans_proto, 0);
  632. }
  633. if (frag_desc->trans_proto == IPPROTO_TCP) {
  634. struct tcphdr *tp = (struct tcphdr *)
  635. ((u8 *)iph + frag_desc->ip_len);
  636. tp->check = pseudo;
  637. skb->csum_offset = offsetof(struct tcphdr, check);
  638. rmnet_perf_tether_ingress = rcu_dereference(rmnet_perf_tether_ingress_hook);
  639. if (rmnet_perf_tether_ingress)
  640. rmnet_perf_tether_ingress(tp, skb);
  641. } else {
  642. struct udphdr *up = (struct udphdr *)
  643. ((u8 *)iph + frag_desc->ip_len);
  644. up->len = htons(pkt_len);
  645. up->check = pseudo;
  646. skb->csum_offset = offsetof(struct udphdr, check);
  647. }
  648. skb->ip_summed = CHECKSUM_PARTIAL;
  649. skb->csum_start = (u8 *)iph + frag_desc->ip_len - skb->head;
  650. }
  651. /* Allocate and populate an skb to contain the packet represented by the
  652. * frag descriptor.
  653. */
  654. static struct sk_buff *rmnet_alloc_skb(struct rmnet_frag_descriptor *frag_desc,
  655. struct rmnet_port *port)
  656. {
  657. struct sk_buff *head_skb, *current_skb, *skb;
  658. struct skb_shared_info *shinfo;
  659. struct rmnet_fragment *frag, *tmp;
  660. /* Use the exact sizes if we know them (i.e. RSB/RSC, rmnet_perf) */
  661. if (frag_desc->hdrs_valid) {
  662. u16 hdr_len = frag_desc->ip_len + frag_desc->trans_len;
  663. head_skb = alloc_skb(hdr_len + RMNET_MAP_DEAGGR_HEADROOM,
  664. GFP_ATOMIC);
  665. if (!head_skb)
  666. return NULL;
  667. skb_reserve(head_skb, RMNET_MAP_DEAGGR_HEADROOM);
  668. rmnet_frag_copy_data(frag_desc, 0, hdr_len,
  669. skb_put(head_skb, hdr_len));
  670. skb_reset_network_header(head_skb);
  671. if (frag_desc->trans_len)
  672. skb_set_transport_header(head_skb, frag_desc->ip_len);
  673. /* Pull the headers off carefully */
  674. if (hdr_len == frag_desc->len)
  675. /* Fast forward "header only" packets */
  676. goto skip_frags;
  677. if (!rmnet_frag_pull(frag_desc, port, hdr_len)) {
  678. kfree(head_skb);
  679. return NULL;
  680. }
  681. } else {
  682. /* Allocate enough space to avoid penalties in the stack
  683. * from __pskb_pull_tail()
  684. */
  685. head_skb = alloc_skb(256 + RMNET_MAP_DEAGGR_HEADROOM,
  686. GFP_ATOMIC);
  687. if (!head_skb)
  688. return NULL;
  689. skb_reserve(head_skb, RMNET_MAP_DEAGGR_HEADROOM);
  690. }
  691. shinfo = skb_shinfo(head_skb);
  692. current_skb = head_skb;
  693. /* Add in the page fragments */
  694. list_for_each_entry_safe(frag, tmp, &frag_desc->frags, list) {
  695. struct page *p = skb_frag_page(&frag->frag);
  696. u32 frag_size = skb_frag_size(&frag->frag);
  697. add_frag:
  698. if (shinfo->nr_frags < MAX_SKB_FRAGS) {
  699. get_page(p);
  700. skb_add_rx_frag(current_skb, shinfo->nr_frags, p,
  701. skb_frag_off(&frag->frag), frag_size,
  702. frag_size);
  703. if (current_skb != head_skb) {
  704. head_skb->len += frag_size;
  705. head_skb->data_len += frag_size;
  706. }
  707. } else {
  708. /* Alloc a new skb and try again */
  709. skb = alloc_skb(0, GFP_ATOMIC);
  710. if (!skb)
  711. break;
  712. if (current_skb == head_skb)
  713. shinfo->frag_list = skb;
  714. else
  715. current_skb->next = skb;
  716. current_skb = skb;
  717. shinfo = skb_shinfo(current_skb);
  718. goto add_frag;
  719. }
  720. }
  721. skip_frags:
  722. head_skb->dev = frag_desc->dev;
  723. rmnet_set_skb_proto(head_skb);
  724. /* Handle any header metadata that needs to be updated after RSB/RSC
  725. * segmentation
  726. */
  727. if (frag_desc->ip_id_set) {
  728. struct iphdr *iph;
  729. iph = (struct iphdr *)rmnet_map_data_ptr(head_skb);
  730. csum_replace2(&iph->check, iph->id, frag_desc->ip_id);
  731. iph->id = frag_desc->ip_id;
  732. }
  733. if (frag_desc->tcp_seq_set) {
  734. struct tcphdr *th;
  735. th = (struct tcphdr *)
  736. (rmnet_map_data_ptr(head_skb) + frag_desc->ip_len);
  737. th->seq = frag_desc->tcp_seq;
  738. }
  739. if (frag_desc->tcp_flags_set) {
  740. struct tcphdr *th;
  741. __be16 *flags;
  742. th = (struct tcphdr *)
  743. (rmnet_map_data_ptr(head_skb) + frag_desc->ip_len);
  744. flags = (__be16 *)&tcp_flag_word(th);
  745. *flags = frag_desc->tcp_flags;
  746. }
  747. /* Handle csum offloading */
  748. if (frag_desc->csum_valid && frag_desc->hdrs_valid) {
  749. /* Set the partial checksum information */
  750. rmnet_frag_partial_csum(head_skb, frag_desc);
  751. } else if (frag_desc->csum_valid) {
  752. /* Non-RSB/RSC/perf packet. The current checksum is fine */
  753. head_skb->ip_summed = CHECKSUM_UNNECESSARY;
  754. } else if (frag_desc->hdrs_valid &&
  755. (frag_desc->trans_proto == IPPROTO_TCP ||
  756. frag_desc->trans_proto == IPPROTO_UDP)) {
  757. /* Unfortunately, we have to fake a bad checksum here, since
  758. * the original bad value is lost by the hardware. The only
  759. * reliable way to do it is to calculate the actual checksum
  760. * and corrupt it.
  761. */
  762. __sum16 *check;
  763. __wsum csum;
  764. unsigned int offset = skb_transport_offset(head_skb);
  765. __sum16 pseudo;
  766. /* Calculate pseudo header and update header fields */
  767. if (frag_desc->ip_proto == 4) {
  768. struct iphdr *iph = ip_hdr(head_skb);
  769. __be16 tot_len = htons(head_skb->len);
  770. csum_replace2(&iph->check, iph->tot_len, tot_len);
  771. iph->tot_len = tot_len;
  772. pseudo = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
  773. head_skb->len -
  774. frag_desc->ip_len,
  775. frag_desc->trans_proto, 0);
  776. } else {
  777. struct ipv6hdr *ip6h = ipv6_hdr(head_skb);
  778. ip6h->payload_len = htons(head_skb->len -
  779. sizeof(*ip6h));
  780. pseudo = ~csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
  781. head_skb->len -
  782. frag_desc->ip_len,
  783. frag_desc->trans_proto, 0);
  784. }
  785. if (frag_desc->trans_proto == IPPROTO_TCP) {
  786. check = &tcp_hdr(head_skb)->check;
  787. } else {
  788. udp_hdr(head_skb)->len = htons(head_skb->len -
  789. frag_desc->ip_len);
  790. check = &udp_hdr(head_skb)->check;
  791. }
  792. *check = pseudo;
  793. csum = skb_checksum(head_skb, offset, head_skb->len - offset,
  794. 0);
  795. /* Add 1 to corrupt. This cannot produce a final value of 0
  796. * since csum_fold() can't return a value of 0xFFFF
  797. */
  798. *check = csum16_add(csum_fold(csum), htons(1));
  799. head_skb->ip_summed = CHECKSUM_NONE;
  800. }
  801. /* Handle any rmnet_perf metadata */
  802. if (frag_desc->hash) {
  803. head_skb->hash = frag_desc->hash;
  804. head_skb->sw_hash = 1;
  805. }
  806. if (frag_desc->flush_shs)
  807. head_skb->cb[0] = 1;
  808. /* Handle coalesced packets */
  809. if (frag_desc->gso_segs > 1)
  810. rmnet_frag_gso_stamp(head_skb, frag_desc);
  811. /* Propagate original priority value */
  812. head_skb->priority = frag_desc->priority;
  813. return head_skb;
  814. }
  815. /* Deliver the packets contained within a frag descriptor */
  816. void rmnet_frag_deliver(struct rmnet_frag_descriptor *frag_desc,
  817. struct rmnet_port *port)
  818. {
  819. struct sk_buff *skb;
  820. skb = rmnet_alloc_skb(frag_desc, port);
  821. if (skb)
  822. rmnet_deliver_skb(skb, port);
  823. rmnet_recycle_frag_descriptor(frag_desc, port);
  824. }
  825. EXPORT_SYMBOL(rmnet_frag_deliver);
  826. static void __rmnet_frag_segment_data(struct rmnet_frag_descriptor *coal_desc,
  827. struct rmnet_port *port,
  828. struct list_head *list, u8 pkt_id,
  829. bool csum_valid)
  830. {
  831. struct rmnet_priv *priv = netdev_priv(coal_desc->dev);
  832. struct rmnet_frag_descriptor *new_desc;
  833. u32 dlen = coal_desc->gso_size * coal_desc->gso_segs;
  834. u32 hlen = coal_desc->ip_len + coal_desc->trans_len;
  835. u32 offset = hlen + coal_desc->data_offset;
  836. int rc;
  837. new_desc = rmnet_get_frag_descriptor(port);
  838. if (!new_desc)
  839. return;
  840. /* Header information and most metadata is the same as the original */
  841. memcpy(new_desc, coal_desc, sizeof(*coal_desc));
  842. INIT_LIST_HEAD(&new_desc->list);
  843. INIT_LIST_HEAD(&new_desc->frags);
  844. new_desc->len = 0;
  845. /* Add the header fragments */
  846. rc = rmnet_frag_descriptor_add_frags_from(new_desc, coal_desc, 0,
  847. hlen);
  848. if (rc < 0)
  849. goto recycle;
  850. /* Add in the data fragments */
  851. rc = rmnet_frag_descriptor_add_frags_from(new_desc, coal_desc, offset,
  852. dlen);
  853. if (rc < 0)
  854. goto recycle;
  855. /* Update protocol-specific metadata */
  856. if (coal_desc->trans_proto == IPPROTO_TCP) {
  857. struct tcphdr *th, __th;
  858. th = rmnet_frag_header_ptr(coal_desc, coal_desc->ip_len,
  859. sizeof(*th), &__th);
  860. if (!th)
  861. goto recycle;
  862. new_desc->tcp_seq_set = 1;
  863. new_desc->tcp_seq = htonl(ntohl(th->seq) +
  864. coal_desc->data_offset);
  865. /* Don't allow any dangerous flags to appear in any segments
  866. * other than the last.
  867. */
  868. if (th->fin || th->psh) {
  869. if (offset + dlen < coal_desc->len) {
  870. __be32 flag_word = tcp_flag_word(th);
  871. /* Clear the FIN and PSH flags from this
  872. * segment.
  873. */
  874. flag_word &= ~TCP_FLAG_FIN;
  875. flag_word &= ~TCP_FLAG_PSH;
  876. new_desc->tcp_flags_set = 1;
  877. new_desc->tcp_flags = *((__be16 *)&flag_word);
  878. }
  879. }
  880. } else if (coal_desc->trans_proto == IPPROTO_UDP) {
  881. struct udphdr *uh, __uh;
  882. uh = rmnet_frag_header_ptr(coal_desc, coal_desc->ip_len,
  883. sizeof(*uh), &__uh);
  884. if (!uh)
  885. goto recycle;
  886. if (coal_desc->ip_proto == 4 && !uh->check)
  887. csum_valid = true;
  888. }
  889. if (coal_desc->ip_proto == 4) {
  890. struct iphdr *iph, __iph;
  891. iph = rmnet_frag_header_ptr(coal_desc, 0, sizeof(*iph),
  892. &__iph);
  893. if (!iph)
  894. goto recycle;
  895. new_desc->ip_id_set = 1;
  896. new_desc->ip_id = htons(ntohs(iph->id) + coal_desc->pkt_id);
  897. }
  898. new_desc->csum_valid = csum_valid;
  899. priv->stats.coal.coal_reconstruct++;
  900. /* Update meta information to move past the data we just segmented */
  901. coal_desc->data_offset += dlen;
  902. coal_desc->pkt_id = pkt_id + 1;
  903. coal_desc->gso_segs = 0;
  904. list_add_tail(&new_desc->list, list);
  905. return;
  906. recycle:
  907. rmnet_recycle_frag_descriptor(new_desc, port);
  908. }
  909. static bool rmnet_frag_validate_csum(struct rmnet_frag_descriptor *frag_desc)
  910. {
  911. u8 *data = rmnet_frag_data_ptr(frag_desc);
  912. unsigned int datagram_len;
  913. __wsum csum;
  914. __sum16 pseudo;
  915. /* Keep analysis tools happy, since they will see that
  916. * rmnet_frag_data_ptr() could return NULL. It can't in this case,
  917. * since we can't get this far otherwise...
  918. */
  919. if (unlikely(!data))
  920. return false;
  921. datagram_len = frag_desc->len - frag_desc->ip_len;
  922. if (frag_desc->ip_proto == 4) {
  923. struct iphdr *iph = (struct iphdr *)data;
  924. pseudo = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
  925. datagram_len,
  926. frag_desc->trans_proto, 0);
  927. } else {
  928. struct ipv6hdr *ip6h = (struct ipv6hdr *)data;
  929. pseudo = ~csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
  930. datagram_len, frag_desc->trans_proto,
  931. 0);
  932. }
  933. csum = csum_partial(data + frag_desc->ip_len, datagram_len,
  934. csum_unfold(pseudo));
  935. return !csum_fold(csum);
  936. }
  937. /* Converts the coalesced frame into a list of descriptors.
  938. * NLOs containing csum erros will not be included.
  939. */
  940. static void
  941. rmnet_frag_segment_coal_data(struct rmnet_frag_descriptor *coal_desc,
  942. u64 nlo_err_mask, struct rmnet_port *port,
  943. struct list_head *list)
  944. {
  945. struct rmnet_priv *priv = netdev_priv(coal_desc->dev);
  946. struct rmnet_map_v5_coal_header coal_hdr;
  947. u8 *version;
  948. u16 pkt_len;
  949. u8 pkt, total_pkt = 0;
  950. u8 nlo;
  951. bool gro = coal_desc->dev->features & NETIF_F_GRO_HW;
  952. bool zero_csum = false;
  953. /* Copy the coal header into our local storage before pulling it. It's
  954. * possible that this header (or part of it) is the last port of a page
  955. * a pulling it off would cause it to be freed. Referring back to the
  956. * header would be invalid in that case.
  957. */
  958. if (rmnet_frag_copy_data(coal_desc, sizeof(struct rmnet_map_header),
  959. sizeof(coal_hdr), &coal_hdr) < 0)
  960. return;
  961. /* Pull off the headers we no longer need */
  962. if (!rmnet_frag_pull(coal_desc, port, sizeof(struct rmnet_map_header) +
  963. sizeof(coal_hdr)))
  964. return;
  965. /* By definition, this byte is linear, and the first byte on the
  966. * first fragment. ;) Hence why no header_ptr() call is needed
  967. * for it.
  968. */
  969. version = rmnet_frag_data_ptr(coal_desc);
  970. if (unlikely(!version))
  971. return;
  972. if ((*version & 0xF0) == 0x40) {
  973. struct iphdr *iph, __iph;
  974. iph = rmnet_frag_header_ptr(coal_desc, 0, sizeof(*iph),
  975. &__iph);
  976. if (!iph)
  977. return;
  978. coal_desc->ip_proto = 4;
  979. coal_desc->ip_len = iph->ihl * 4;
  980. coal_desc->trans_proto = iph->protocol;
  981. /* Don't allow coalescing of any packets with IP options */
  982. if (iph->ihl != 5)
  983. gro = false;
  984. } else if ((*version & 0xF0) == 0x60) {
  985. struct ipv6hdr *ip6h, __ip6h;
  986. int ip_len;
  987. __be16 frag_off;
  988. u8 protocol;
  989. ip6h = rmnet_frag_header_ptr(coal_desc, 0, sizeof(*ip6h),
  990. &__ip6h);
  991. if (!ip6h)
  992. return;
  993. coal_desc->ip_proto = 6;
  994. protocol = ip6h->nexthdr;
  995. ip_len = rmnet_frag_ipv6_skip_exthdr(coal_desc,
  996. sizeof(*ip6h),
  997. &protocol,
  998. &frag_off);
  999. coal_desc->trans_proto = protocol;
  1000. /* If we run into a problem, or this has a fragment header
  1001. * (which should technically not be possible, if the HW
  1002. * works as intended...), bail.
  1003. */
  1004. if (ip_len < 0 || frag_off) {
  1005. priv->stats.coal.coal_ip_invalid++;
  1006. return;
  1007. }
  1008. coal_desc->ip_len = (u16)ip_len;
  1009. if (coal_desc->ip_len > sizeof(*ip6h)) {
  1010. /* Don't allow coalescing of any packets with IPv6
  1011. * extension headers.
  1012. */
  1013. gro = false;
  1014. }
  1015. } else {
  1016. priv->stats.coal.coal_ip_invalid++;
  1017. return;
  1018. }
  1019. if (coal_desc->trans_proto == IPPROTO_TCP) {
  1020. struct tcphdr *th, __th;
  1021. th = rmnet_frag_header_ptr(coal_desc,
  1022. coal_desc->ip_len, sizeof(*th),
  1023. &__th);
  1024. if (!th)
  1025. return;
  1026. coal_desc->trans_len = th->doff * 4;
  1027. priv->stats.coal.coal_tcp++;
  1028. priv->stats.coal.coal_tcp_bytes += coal_desc->len;
  1029. } else if (coal_desc->trans_proto == IPPROTO_UDP) {
  1030. struct udphdr *uh, __uh;
  1031. uh = rmnet_frag_header_ptr(coal_desc,
  1032. coal_desc->ip_len, sizeof(*uh),
  1033. &__uh);
  1034. if (!uh)
  1035. return;
  1036. coal_desc->trans_len = sizeof(*uh);
  1037. priv->stats.coal.coal_udp++;
  1038. priv->stats.coal.coal_udp_bytes += coal_desc->len;
  1039. if (coal_desc->ip_proto == 4 && !uh->check)
  1040. zero_csum = true;
  1041. } else {
  1042. priv->stats.coal.coal_trans_invalid++;
  1043. return;
  1044. }
  1045. coal_desc->hdrs_valid = 1;
  1046. if (rmnet_map_v5_csum_buggy(&coal_hdr) && !zero_csum) {
  1047. /* Mark the checksum as valid if it checks out */
  1048. if (rmnet_frag_validate_csum(coal_desc))
  1049. coal_desc->csum_valid = true;
  1050. coal_desc->gso_size = ntohs(coal_hdr.nl_pairs[0].pkt_len);
  1051. coal_desc->gso_size -= coal_desc->ip_len + coal_desc->trans_len;
  1052. coal_desc->gso_segs = coal_hdr.nl_pairs[0].num_packets;
  1053. list_add_tail(&coal_desc->list, list);
  1054. return;
  1055. }
  1056. /* Fast-forward the case where we have 1 NLO (i.e. 1 packet length),
  1057. * no checksum errors, and are allowing GRO. We can just reuse this
  1058. * descriptor unchanged.
  1059. */
  1060. if (gro && coal_hdr.num_nlos == 1 && coal_hdr.csum_valid) {
  1061. coal_desc->csum_valid = true;
  1062. coal_desc->gso_size = ntohs(coal_hdr.nl_pairs[0].pkt_len);
  1063. coal_desc->gso_size -= coal_desc->ip_len + coal_desc->trans_len;
  1064. coal_desc->gso_segs = coal_hdr.nl_pairs[0].num_packets;
  1065. list_add_tail(&coal_desc->list, list);
  1066. return;
  1067. }
  1068. /* Segment the coalesced descriptor into new packets */
  1069. for (nlo = 0; nlo < coal_hdr.num_nlos; nlo++) {
  1070. pkt_len = ntohs(coal_hdr.nl_pairs[nlo].pkt_len);
  1071. pkt_len -= coal_desc->ip_len + coal_desc->trans_len;
  1072. coal_desc->gso_size = pkt_len;
  1073. for (pkt = 0; pkt < coal_hdr.nl_pairs[nlo].num_packets;
  1074. pkt++, total_pkt++, nlo_err_mask >>= 1) {
  1075. bool csum_err = nlo_err_mask & 1;
  1076. /* Segment the packet if we're not sending the larger
  1077. * packet up the stack.
  1078. */
  1079. if (!gro) {
  1080. coal_desc->gso_segs = 1;
  1081. if (csum_err)
  1082. priv->stats.coal.coal_csum_err++;
  1083. __rmnet_frag_segment_data(coal_desc, port,
  1084. list, total_pkt,
  1085. !csum_err);
  1086. continue;
  1087. }
  1088. if (csum_err) {
  1089. priv->stats.coal.coal_csum_err++;
  1090. /* Segment out the good data */
  1091. if (coal_desc->gso_segs)
  1092. __rmnet_frag_segment_data(coal_desc,
  1093. port,
  1094. list,
  1095. total_pkt,
  1096. true);
  1097. /* Segment out the bad checksum */
  1098. coal_desc->gso_segs = 1;
  1099. __rmnet_frag_segment_data(coal_desc, port,
  1100. list, total_pkt,
  1101. false);
  1102. } else {
  1103. coal_desc->gso_segs++;
  1104. }
  1105. }
  1106. /* If we're switching NLOs, we need to send out everything from
  1107. * the previous one, if we haven't done so. NLOs only switch
  1108. * when the packet length changes.
  1109. */
  1110. if (coal_desc->gso_segs)
  1111. __rmnet_frag_segment_data(coal_desc, port, list,
  1112. total_pkt, true);
  1113. }
  1114. }
  1115. /* Record reason for coalescing pipe closure */
  1116. static void rmnet_frag_data_log_close_stats(struct rmnet_priv *priv, u8 type,
  1117. u8 code)
  1118. {
  1119. struct rmnet_coal_close_stats *stats = &priv->stats.coal.close;
  1120. switch (type) {
  1121. case RMNET_MAP_COAL_CLOSE_NON_COAL:
  1122. stats->non_coal++;
  1123. break;
  1124. case RMNET_MAP_COAL_CLOSE_IP_MISS:
  1125. stats->ip_miss++;
  1126. break;
  1127. case RMNET_MAP_COAL_CLOSE_TRANS_MISS:
  1128. stats->trans_miss++;
  1129. break;
  1130. case RMNET_MAP_COAL_CLOSE_HW:
  1131. switch (code) {
  1132. case RMNET_MAP_COAL_CLOSE_HW_NL:
  1133. stats->hw_nl++;
  1134. break;
  1135. case RMNET_MAP_COAL_CLOSE_HW_PKT:
  1136. stats->hw_pkt++;
  1137. break;
  1138. case RMNET_MAP_COAL_CLOSE_HW_BYTE:
  1139. stats->hw_byte++;
  1140. break;
  1141. case RMNET_MAP_COAL_CLOSE_HW_TIME:
  1142. stats->hw_time++;
  1143. break;
  1144. case RMNET_MAP_COAL_CLOSE_HW_EVICT:
  1145. stats->hw_evict++;
  1146. break;
  1147. default:
  1148. break;
  1149. }
  1150. break;
  1151. case RMNET_MAP_COAL_CLOSE_COAL:
  1152. stats->coal++;
  1153. break;
  1154. default:
  1155. break;
  1156. }
  1157. }
  1158. /* Check if the coalesced header has any incorrect values, in which case, the
  1159. * entire coalesced frame must be dropped. Then check if there are any
  1160. * checksum issues
  1161. */
  1162. static int
  1163. rmnet_frag_data_check_coal_header(struct rmnet_frag_descriptor *frag_desc,
  1164. u64 *nlo_err_mask)
  1165. {
  1166. struct rmnet_map_v5_coal_header *coal_hdr, __coal_hdr;
  1167. struct rmnet_priv *priv = netdev_priv(frag_desc->dev);
  1168. u64 mask = 0;
  1169. int i;
  1170. u8 veid, pkts = 0;
  1171. coal_hdr = rmnet_frag_header_ptr(frag_desc,
  1172. sizeof(struct rmnet_map_header),
  1173. sizeof(*coal_hdr), &__coal_hdr);
  1174. if (!coal_hdr)
  1175. return -EINVAL;
  1176. veid = coal_hdr->virtual_channel_id;
  1177. if (coal_hdr->num_nlos == 0 ||
  1178. coal_hdr->num_nlos > RMNET_MAP_V5_MAX_NLOS) {
  1179. priv->stats.coal.coal_hdr_nlo_err++;
  1180. return -EINVAL;
  1181. }
  1182. for (i = 0; i < RMNET_MAP_V5_MAX_NLOS; i++) {
  1183. /* If there is a checksum issue, we need to split
  1184. * up the skb. Rebuild the full csum error field
  1185. */
  1186. u8 err = coal_hdr->nl_pairs[i].csum_error_bitmap;
  1187. u8 pkt = coal_hdr->nl_pairs[i].num_packets;
  1188. mask |= ((u64)err) << (8 * i);
  1189. /* Track total packets in frame */
  1190. pkts += pkt;
  1191. if (pkts > RMNET_MAP_V5_MAX_PACKETS) {
  1192. priv->stats.coal.coal_hdr_pkt_err++;
  1193. return -EINVAL;
  1194. }
  1195. }
  1196. /* Track number of packets we get inside of coalesced frames */
  1197. priv->stats.coal.coal_pkts += pkts;
  1198. /* Update ethtool stats */
  1199. rmnet_frag_data_log_close_stats(priv,
  1200. coal_hdr->close_type,
  1201. coal_hdr->close_value);
  1202. if (veid < RMNET_MAX_VEID)
  1203. priv->stats.coal.coal_veid[veid]++;
  1204. *nlo_err_mask = mask;
  1205. return 0;
  1206. }
  1207. /* Process a QMAPv5 packet header */
  1208. int rmnet_frag_process_next_hdr_packet(struct rmnet_frag_descriptor *frag_desc,
  1209. struct rmnet_port *port,
  1210. struct list_head *list,
  1211. u16 len)
  1212. {
  1213. struct rmnet_map_v5_csum_header *csum_hdr, __csum_hdr;
  1214. struct rmnet_priv *priv = netdev_priv(frag_desc->dev);
  1215. u64 nlo_err_mask;
  1216. u32 offset = sizeof(struct rmnet_map_header);
  1217. int rc = 0;
  1218. /* Grab the header type. It's easier to grab enough for a full csum
  1219. * offload header here since it's only 8 bytes and then check the
  1220. * header type using that. This also doubles as a check to make sure
  1221. * there's enough data after the QMAP header to ensure that another
  1222. * header is present.
  1223. */
  1224. csum_hdr = rmnet_frag_header_ptr(frag_desc, offset, sizeof(*csum_hdr),
  1225. &__csum_hdr);
  1226. if (!csum_hdr)
  1227. return -EINVAL;
  1228. switch (csum_hdr->header_type) {
  1229. case RMNET_MAP_HEADER_TYPE_COALESCING:
  1230. priv->stats.coal.coal_rx++;
  1231. rc = rmnet_frag_data_check_coal_header(frag_desc,
  1232. &nlo_err_mask);
  1233. if (rc)
  1234. return rc;
  1235. rmnet_frag_segment_coal_data(frag_desc, nlo_err_mask, port,
  1236. list);
  1237. if (list_first_entry(list, struct rmnet_frag_descriptor,
  1238. list) != frag_desc)
  1239. rmnet_recycle_frag_descriptor(frag_desc, port);
  1240. break;
  1241. case RMNET_MAP_HEADER_TYPE_CSUM_OFFLOAD:
  1242. if (unlikely(!(frag_desc->dev->features & NETIF_F_RXCSUM))) {
  1243. priv->stats.csum_sw++;
  1244. } else if (csum_hdr->csum_valid_required) {
  1245. priv->stats.csum_ok++;
  1246. frag_desc->csum_valid = true;
  1247. } else {
  1248. priv->stats.csum_valid_unset++;
  1249. }
  1250. if (!rmnet_frag_pull(frag_desc, port,
  1251. offset + sizeof(*csum_hdr))) {
  1252. rc = -EINVAL;
  1253. break;
  1254. }
  1255. /* Remove padding only for csum offload packets.
  1256. * Coalesced packets should never have padding.
  1257. */
  1258. if (!rmnet_frag_trim(frag_desc, port, len)) {
  1259. rc = -EINVAL;
  1260. break;
  1261. }
  1262. list_del_init(&frag_desc->list);
  1263. list_add_tail(&frag_desc->list, list);
  1264. break;
  1265. default:
  1266. rc = -EINVAL;
  1267. break;
  1268. }
  1269. return rc;
  1270. }
  1271. /* Perf hook handler */
  1272. rmnet_perf_desc_hook_t rmnet_perf_desc_entry __rcu __read_mostly;
  1273. EXPORT_SYMBOL(rmnet_perf_desc_entry);
  1274. static void
  1275. __rmnet_frag_ingress_handler(struct rmnet_frag_descriptor *frag_desc,
  1276. struct rmnet_port *port)
  1277. {
  1278. rmnet_perf_desc_hook_t rmnet_perf_ingress;
  1279. struct rmnet_map_header *qmap, __qmap;
  1280. struct rmnet_endpoint *ep;
  1281. struct rmnet_frag_descriptor *frag, *tmp;
  1282. LIST_HEAD(segs);
  1283. u16 len, pad;
  1284. u8 mux_id;
  1285. qmap = rmnet_frag_header_ptr(frag_desc, 0, sizeof(*qmap), &__qmap);
  1286. if (!qmap)
  1287. goto recycle;
  1288. mux_id = qmap->mux_id;
  1289. pad = qmap->pad_len;
  1290. len = ntohs(qmap->pkt_len) - pad;
  1291. if (qmap->cd_bit) {
  1292. qmi_rmnet_set_dl_msg_active(port);
  1293. if (port->data_format & RMNET_INGRESS_FORMAT_DL_MARKER) {
  1294. rmnet_frag_flow_command(frag_desc, port, len);
  1295. goto recycle;
  1296. }
  1297. if (port->data_format & RMNET_FLAGS_INGRESS_MAP_COMMANDS)
  1298. rmnet_frag_command(frag_desc, qmap, port);
  1299. goto recycle;
  1300. }
  1301. if (mux_id >= RMNET_MAX_LOGICAL_EP)
  1302. goto recycle;
  1303. ep = rmnet_get_endpoint(port, mux_id);
  1304. if (!ep)
  1305. goto recycle;
  1306. frag_desc->dev = ep->egress_dev;
  1307. /* Handle QMAPv5 packet */
  1308. if (qmap->next_hdr &&
  1309. (port->data_format & (RMNET_FLAGS_INGRESS_COALESCE |
  1310. RMNET_FLAGS_INGRESS_MAP_CKSUMV5))) {
  1311. if (rmnet_frag_process_next_hdr_packet(frag_desc, port, &segs,
  1312. len))
  1313. goto recycle;
  1314. } else {
  1315. /* We only have the main QMAP header to worry about */
  1316. if (!rmnet_frag_pull(frag_desc, port, sizeof(*qmap)))
  1317. return;
  1318. if (!rmnet_frag_trim(frag_desc, port, len))
  1319. return;
  1320. list_add_tail(&frag_desc->list, &segs);
  1321. }
  1322. if (port->data_format & RMNET_INGRESS_FORMAT_PS)
  1323. qmi_rmnet_work_maybe_restart(port);
  1324. rcu_read_lock();
  1325. rmnet_perf_ingress = rcu_dereference(rmnet_perf_desc_entry);
  1326. if (rmnet_perf_ingress) {
  1327. list_for_each_entry_safe(frag, tmp, &segs, list) {
  1328. list_del_init(&frag->list);
  1329. rmnet_perf_ingress(frag, port);
  1330. }
  1331. rcu_read_unlock();
  1332. return;
  1333. }
  1334. rcu_read_unlock();
  1335. list_for_each_entry_safe(frag, tmp, &segs, list) {
  1336. list_del_init(&frag->list);
  1337. rmnet_frag_deliver(frag, port);
  1338. }
  1339. return;
  1340. recycle:
  1341. rmnet_recycle_frag_descriptor(frag_desc, port);
  1342. }
  1343. /* Notify perf at the end of SKB chain */
  1344. rmnet_perf_chain_hook_t rmnet_perf_chain_end __rcu __read_mostly;
  1345. EXPORT_SYMBOL(rmnet_perf_chain_end);
  1346. void rmnet_frag_ingress_handler(struct sk_buff *skb,
  1347. struct rmnet_port *port)
  1348. {
  1349. rmnet_perf_chain_hook_t rmnet_perf_opt_chain_end;
  1350. LIST_HEAD(desc_list);
  1351. /* Deaggregation and freeing of HW originating
  1352. * buffers is done within here
  1353. */
  1354. while (skb) {
  1355. struct sk_buff *skb_frag;
  1356. rmnet_frag_deaggregate(skb, port, &desc_list, skb->priority);
  1357. if (!list_empty(&desc_list)) {
  1358. struct rmnet_frag_descriptor *frag_desc, *tmp;
  1359. list_for_each_entry_safe(frag_desc, tmp, &desc_list,
  1360. list) {
  1361. list_del_init(&frag_desc->list);
  1362. __rmnet_frag_ingress_handler(frag_desc, port);
  1363. }
  1364. }
  1365. skb_frag = skb_shinfo(skb)->frag_list;
  1366. skb_shinfo(skb)->frag_list = NULL;
  1367. consume_skb(skb);
  1368. skb = skb_frag;
  1369. }
  1370. rcu_read_lock();
  1371. rmnet_perf_opt_chain_end = rcu_dereference(rmnet_perf_chain_end);
  1372. if (rmnet_perf_opt_chain_end)
  1373. rmnet_perf_opt_chain_end();
  1374. rcu_read_unlock();
  1375. }
  1376. void rmnet_descriptor_deinit(struct rmnet_port *port)
  1377. {
  1378. struct rmnet_frag_descriptor_pool *pool;
  1379. struct rmnet_frag_descriptor *frag_desc, *tmp;
  1380. pool = port->frag_desc_pool;
  1381. list_for_each_entry_safe(frag_desc, tmp, &pool->free_list, list) {
  1382. kfree(frag_desc);
  1383. pool->pool_size--;
  1384. }
  1385. kfree(pool);
  1386. }
  1387. int rmnet_descriptor_init(struct rmnet_port *port)
  1388. {
  1389. struct rmnet_frag_descriptor_pool *pool;
  1390. int i;
  1391. spin_lock_init(&port->desc_pool_lock);
  1392. pool = kzalloc(sizeof(*pool), GFP_ATOMIC);
  1393. if (!pool)
  1394. return -ENOMEM;
  1395. INIT_LIST_HEAD(&pool->free_list);
  1396. port->frag_desc_pool = pool;
  1397. for (i = 0; i < RMNET_FRAG_DESCRIPTOR_POOL_SIZE; i++) {
  1398. struct rmnet_frag_descriptor *frag_desc;
  1399. frag_desc = kzalloc(sizeof(*frag_desc), GFP_ATOMIC);
  1400. if (!frag_desc)
  1401. return -ENOMEM;
  1402. INIT_LIST_HEAD(&frag_desc->list);
  1403. INIT_LIST_HEAD(&frag_desc->frags);
  1404. list_add_tail(&frag_desc->list, &pool->free_list);
  1405. pool->pool_size++;
  1406. }
  1407. return 0;
  1408. }