rmnet_descriptor.c 52 KB

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465666768697071727374757677787980818283848586878889909192939495969798991001011021031041051061071081091101111121131141151161171181191201211221231241251261271281291301311321331341351361371381391401411421431441451461471481491501511521531541551561571581591601611621631641651661671681691701711721731741751761771781791801811821831841851861871881891901911921931941951961971981992002012022032042052062072082092102112122132142152162172182192202212222232242252262272282292302312322332342352362372382392402412422432442452462472482492502512522532542552562572582592602612622632642652662672682692702712722732742752762772782792802812822832842852862872882892902912922932942952962972982993003013023033043053063073083093103113123133143153163173183193203213223233243253263273283293303313323333343353363373383393403413423433443453463473483493503513523533543553563573583593603613623633643653663673683693703713723733743753763773783793803813823833843853863873883893903913923933943953963973983994004014024034044054064074084094104114124134144154164174184194204214224234244254264274284294304314324334344354364374384394404414424434444454464474484494504514524534544554564574584594604614624634644654664674684694704714724734744754764774784794804814824834844854864874884894904914924934944954964974984995005015025035045055065075085095105115125135145155165175185195205215225235245255265275285295305315325335345355365375385395405415425435445455465475485495505515525535545555565575585595605615625635645655665675685695705715725735745755765775785795805815825835845855865875885895905915925935945955965975985996006016026036046056066076086096106116126136146156166176186196206216226236246256266276286296306316326336346356366376386396406416426436446456466476486496506516526536546556566576586596606616626636646656666676686696706716726736746756766776786796806816826836846856866876886896906916926936946956966976986997007017027037047057067077087097107117127137147157167177187197207217227237247257267277287297307317327337347357367377387397407417427437447457467477487497507517527537547557567577587597607617627637647657667677687697707717727737747757767777787797807817827837847857867877887897907917927937947957967977987998008018028038048058068078088098108118128138148158168178188198208218228238248258268278288298308318328338348358368378388398408418428438448458468478488498508518528538548558568578588598608618628638648658668678688698708718728738748758768778788798808818828838848858868878888898908918928938948958968978988999009019029039049059069079089099109119129139149159169179189199209219229239249259269279289299309319329339349359369379389399409419429439449459469479489499509519529539549559569579589599609619629639649659669679689699709719729739749759769779789799809819829839849859869879889899909919929939949959969979989991000100110021003100410051006100710081009101010111012101310141015101610171018101910201021102210231024102510261027102810291030103110321033103410351036103710381039104010411042104310441045104610471048104910501051105210531054105510561057105810591060106110621063106410651066106710681069107010711072107310741075107610771078107910801081108210831084108510861087108810891090109110921093109410951096109710981099110011011102110311041105110611071108110911101111111211131114111511161117111811191120112111221123112411251126112711281129113011311132113311341135113611371138113911401141114211431144114511461147114811491150115111521153115411551156115711581159116011611162116311641165116611671168116911701171117211731174117511761177117811791180118111821183118411851186118711881189119011911192119311941195119611971198119912001201120212031204120512061207120812091210121112121213121412151216121712181219122012211222122312241225122612271228122912301231123212331234123512361237123812391240124112421243124412451246124712481249125012511252125312541255125612571258125912601261126212631264126512661267126812691270127112721273127412751276127712781279128012811282128312841285128612871288128912901291129212931294129512961297129812991300130113021303130413051306130713081309131013111312131313141315131613171318131913201321132213231324132513261327132813291330133113321333133413351336133713381339134013411342134313441345134613471348134913501351135213531354135513561357135813591360136113621363136413651366136713681369137013711372137313741375137613771378137913801381138213831384138513861387138813891390139113921393139413951396139713981399140014011402140314041405140614071408140914101411141214131414141514161417141814191420142114221423142414251426142714281429143014311432143314341435143614371438143914401441144214431444144514461447144814491450145114521453145414551456145714581459146014611462146314641465146614671468146914701471147214731474147514761477147814791480148114821483148414851486148714881489149014911492149314941495149614971498149915001501150215031504150515061507150815091510151115121513151415151516151715181519152015211522152315241525152615271528152915301531153215331534153515361537153815391540154115421543154415451546154715481549155015511552155315541555155615571558155915601561156215631564156515661567156815691570157115721573157415751576157715781579158015811582158315841585158615871588158915901591159215931594159515961597159815991600160116021603160416051606160716081609161016111612161316141615161616171618161916201621162216231624162516261627162816291630163116321633163416351636163716381639164016411642164316441645164616471648164916501651165216531654165516561657165816591660166116621663166416651666166716681669167016711672167316741675167616771678167916801681168216831684168516861687168816891690169116921693169416951696169716981699170017011702170317041705170617071708170917101711171217131714171517161717171817191720172117221723172417251726172717281729173017311732173317341735173617371738173917401741174217431744174517461747174817491750175117521753175417551756175717581759176017611762176317641765176617671768176917701771177217731774177517761777177817791780178117821783178417851786178717881789179017911792179317941795179617971798179918001801180218031804180518061807180818091810181118121813181418151816181718181819182018211822182318241825182618271828182918301831183218331834183518361837183818391840184118421843184418451846184718481849185018511852185318541855185618571858185918601861186218631864186518661867186818691870187118721873187418751876187718781879188018811882188318841885188618871888188918901891189218931894189518961897189818991900190119021903190419051906190719081909191019111912191319141915191619171918191919201921192219231924192519261927192819291930193119321933193419351936193719381939194019411942194319441945194619471948194919501951195219531954195519561957195819591960196119621963196419651966196719681969197019711972197319741975197619771978197919801981198219831984198519861987198819891990199119921993199419951996199719981999200020012002200320042005200620072008200920102011201220132014201520162017201820192020202120222023202420252026202720282029203020312032203320342035203620372038203920402041204220432044204520462047
  1. /* Copyright (c) 2013-2021, The Linux Foundation. All rights reserved.
  2. * Copyright (c) 2022-2023, Qualcomm Innovation Center, Inc. All rights reserved.
  3. *
  4. * This program is free software; you can redistribute it and/or modify
  5. * it under the terms of the GNU General Public License version 2 and
  6. * only version 2 as published by the Free Software Foundation.
  7. *
  8. * This program is distributed in the hope that it will be useful,
  9. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  10. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
  11. * GNU General Public License for more details.
  12. *
  13. * RMNET Packet Descriptor Framework
  14. *
  15. */
  16. #include <linux/ip.h>
  17. #include <linux/ipv6.h>
  18. #include <linux/inet.h>
  19. #include <net/ipv6.h>
  20. #include <net/ip6_checksum.h>
  21. #include "rmnet_config.h"
  22. #include "rmnet_descriptor.h"
  23. #include "rmnet_handlers.h"
  24. #include "rmnet_private.h"
  25. #include "rmnet_vnd.h"
  26. #include "rmnet_qmi.h"
  27. #include "rmnet_trace.h"
  28. #include "qmi_rmnet.h"
  29. #define RMNET_FRAG_DESCRIPTOR_POOL_SIZE 64
  30. #define RMNET_DL_IND_HDR_SIZE (sizeof(struct rmnet_map_dl_ind_hdr) + \
  31. sizeof(struct rmnet_map_header) + \
  32. sizeof(struct rmnet_map_control_command_header))
  33. #define RMNET_DL_IND_TRL_SIZE (sizeof(struct rmnet_map_dl_ind_trl) + \
  34. sizeof(struct rmnet_map_header) + \
  35. sizeof(struct rmnet_map_control_command_header))
  36. #define RMNET_PB_IND_HDR_SIZE (sizeof(struct rmnet_map_pb_ind_hdr) + \
  37. sizeof(struct rmnet_map_header) + \
  38. sizeof(struct rmnet_map_control_command_header))
  39. #define rmnet_descriptor_for_each_frag(p, desc) \
  40. list_for_each_entry(p, &desc->frags, list)
  41. #define rmnet_descriptor_for_each_frag_safe(p, tmp, desc) \
  42. list_for_each_entry_safe(p, tmp, &desc->frags, list)
  43. #define rmnet_descriptor_for_each_frag_safe_reverse(p, tmp, desc) \
  44. list_for_each_entry_safe_reverse(p, tmp, &desc->frags, list)
  45. typedef void (*rmnet_perf_desc_hook_t)(struct rmnet_frag_descriptor *frag_desc,
  46. struct rmnet_port *port);
  47. typedef void (*rmnet_perf_chain_hook_t)(void);
  48. typedef void (*rmnet_perf_tether_ingress_hook_t)(struct tcphdr *tp, struct sk_buff *skb);
  49. rmnet_perf_tether_ingress_hook_t rmnet_perf_tether_ingress_hook __rcu __read_mostly;
  50. EXPORT_SYMBOL(rmnet_perf_tether_ingress_hook);
  51. struct rmnet_frag_descriptor *
  52. rmnet_get_frag_descriptor(struct rmnet_port *port)
  53. {
  54. struct rmnet_frag_descriptor_pool *pool = port->frag_desc_pool;
  55. struct rmnet_frag_descriptor *frag_desc;
  56. unsigned long flags;
  57. spin_lock_irqsave(&port->desc_pool_lock, flags);
  58. if (!list_empty(&pool->free_list)) {
  59. frag_desc = list_first_entry(&pool->free_list,
  60. struct rmnet_frag_descriptor,
  61. list);
  62. list_del_init(&frag_desc->list);
  63. } else {
  64. frag_desc = kzalloc(sizeof(*frag_desc), GFP_ATOMIC);
  65. if (!frag_desc)
  66. goto out;
  67. INIT_LIST_HEAD(&frag_desc->list);
  68. INIT_LIST_HEAD(&frag_desc->frags);
  69. pool->pool_size++;
  70. }
  71. out:
  72. spin_unlock_irqrestore(&port->desc_pool_lock, flags);
  73. return frag_desc;
  74. }
  75. EXPORT_SYMBOL(rmnet_get_frag_descriptor);
  76. void rmnet_recycle_frag_descriptor(struct rmnet_frag_descriptor *frag_desc,
  77. struct rmnet_port *port)
  78. {
  79. struct rmnet_frag_descriptor_pool *pool = port->frag_desc_pool;
  80. struct rmnet_fragment *frag, *tmp;
  81. unsigned long flags;
  82. list_del(&frag_desc->list);
  83. rmnet_descriptor_for_each_frag_safe(frag, tmp, frag_desc) {
  84. struct page *page = skb_frag_page(&frag->frag);
  85. if (page)
  86. put_page(page);
  87. list_del(&frag->list);
  88. kfree(frag);
  89. }
  90. memset(frag_desc, 0, sizeof(*frag_desc));
  91. INIT_LIST_HEAD(&frag_desc->list);
  92. INIT_LIST_HEAD(&frag_desc->frags);
  93. spin_lock_irqsave(&port->desc_pool_lock, flags);
  94. list_add_tail(&frag_desc->list, &pool->free_list);
  95. spin_unlock_irqrestore(&port->desc_pool_lock, flags);
  96. }
  97. EXPORT_SYMBOL(rmnet_recycle_frag_descriptor);
  98. void *rmnet_frag_pull(struct rmnet_frag_descriptor *frag_desc,
  99. struct rmnet_port *port, unsigned int size)
  100. {
  101. struct rmnet_fragment *frag, *tmp;
  102. if (size >= frag_desc->len) {
  103. pr_info("%s(): Pulling %u bytes from %u byte pkt. Dropping\n",
  104. __func__, size, frag_desc->len);
  105. rmnet_recycle_frag_descriptor(frag_desc, port);
  106. return NULL;
  107. }
  108. rmnet_descriptor_for_each_frag_safe(frag, tmp, frag_desc) {
  109. u32 frag_size = skb_frag_size(&frag->frag);
  110. if (!size)
  111. break;
  112. if (size >= frag_size) {
  113. /* Remove the whole frag */
  114. struct page *page = skb_frag_page(&frag->frag);
  115. if (page)
  116. put_page(page);
  117. list_del(&frag->list);
  118. size -= frag_size;
  119. frag_desc->len -= frag_size;
  120. kfree(frag);
  121. continue;
  122. }
  123. /* Pull off 'size' bytes */
  124. skb_frag_off_add(&frag->frag, size);
  125. skb_frag_size_sub(&frag->frag, size);
  126. frag_desc->len -= size;
  127. break;
  128. }
  129. return rmnet_frag_data_ptr(frag_desc);
  130. }
  131. EXPORT_SYMBOL(rmnet_frag_pull);
  132. void *rmnet_frag_trim(struct rmnet_frag_descriptor *frag_desc,
  133. struct rmnet_port *port, unsigned int size)
  134. {
  135. struct rmnet_fragment *frag, *tmp;
  136. unsigned int eat;
  137. if (!size) {
  138. pr_info("%s(): Trimming %u byte pkt to 0. Dropping\n",
  139. __func__, frag_desc->len);
  140. rmnet_recycle_frag_descriptor(frag_desc, port);
  141. return NULL;
  142. }
  143. /* Growing bigger doesn't make sense */
  144. if (size >= frag_desc->len)
  145. goto out;
  146. /* Compute number of bytes to remove from the end */
  147. eat = frag_desc->len - size;
  148. rmnet_descriptor_for_each_frag_safe_reverse(frag, tmp, frag_desc) {
  149. u32 frag_size = skb_frag_size(&frag->frag);
  150. if (!eat)
  151. goto out;
  152. if (eat >= frag_size) {
  153. /* Remove the whole frag */
  154. struct page *page = skb_frag_page(&frag->frag);
  155. if (page)
  156. put_page(page);
  157. list_del(&frag->list);
  158. eat -= frag_size;
  159. frag_desc->len -= frag_size;
  160. kfree(frag);
  161. continue;
  162. }
  163. /* Chop off 'eat' bytes from the end */
  164. skb_frag_size_sub(&frag->frag, eat);
  165. frag_desc->len -= eat;
  166. goto out;
  167. }
  168. out:
  169. return rmnet_frag_data_ptr(frag_desc);
  170. }
  171. EXPORT_SYMBOL(rmnet_frag_trim);
  172. static int rmnet_frag_copy_data(struct rmnet_frag_descriptor *frag_desc,
  173. u32 off, u32 len, void *buf)
  174. {
  175. struct rmnet_fragment *frag;
  176. u32 frag_size, copy_len;
  177. u32 buf_offset = 0;
  178. /* Don't make me do something we'd both regret */
  179. if (off > frag_desc->len || len > frag_desc->len ||
  180. off + len > frag_desc->len)
  181. return -EINVAL;
  182. /* Copy 'len' bytes into the bufer starting from 'off' */
  183. rmnet_descriptor_for_each_frag(frag, frag_desc) {
  184. if (!len)
  185. break;
  186. frag_size = skb_frag_size(&frag->frag);
  187. if (off < frag_size) {
  188. copy_len = min_t(u32, len, frag_size - off);
  189. memcpy(buf + buf_offset,
  190. skb_frag_address(&frag->frag) + off,
  191. copy_len);
  192. buf_offset += copy_len;
  193. len -= copy_len;
  194. off = 0;
  195. } else {
  196. off -= frag_size;
  197. }
  198. }
  199. return 0;
  200. }
  201. void *rmnet_frag_header_ptr(struct rmnet_frag_descriptor *frag_desc, u32 off,
  202. u32 len, void *buf)
  203. {
  204. struct rmnet_fragment *frag;
  205. u8 *start;
  206. u32 frag_size, offset;
  207. /* Don't take a long pointer off a short frag */
  208. if (off > frag_desc->len || len > frag_desc->len ||
  209. off + len > frag_desc->len)
  210. return NULL;
  211. /* Find the starting fragment */
  212. offset = off;
  213. rmnet_descriptor_for_each_frag(frag, frag_desc) {
  214. frag_size = skb_frag_size(&frag->frag);
  215. if (off < frag_size) {
  216. start = skb_frag_address(&frag->frag) + off;
  217. /* If the header is entirely on this frag, just return
  218. * a pointer to it.
  219. */
  220. if (off + len <= frag_size)
  221. return start;
  222. /* Otherwise, we need to copy the data into a linear
  223. * buffer.
  224. */
  225. break;
  226. }
  227. off -= frag_size;
  228. }
  229. if (rmnet_frag_copy_data(frag_desc, offset, len, buf) < 0)
  230. return NULL;
  231. return buf;
  232. }
  233. EXPORT_SYMBOL(rmnet_frag_header_ptr);
  234. int rmnet_frag_descriptor_add_frag(struct rmnet_frag_descriptor *frag_desc,
  235. struct page *p, u32 page_offset, u32 len)
  236. {
  237. struct rmnet_fragment *frag;
  238. frag = kzalloc(sizeof(*frag), GFP_ATOMIC);
  239. if (!frag)
  240. return -ENOMEM;
  241. INIT_LIST_HEAD(&frag->list);
  242. get_page(p);
  243. __skb_frag_set_page(&frag->frag, p);
  244. skb_frag_size_set(&frag->frag, len);
  245. skb_frag_off_set(&frag->frag, page_offset);
  246. list_add_tail(&frag->list, &frag_desc->frags);
  247. frag_desc->len += len;
  248. return 0;
  249. }
  250. EXPORT_SYMBOL(rmnet_frag_descriptor_add_frag);
  251. int rmnet_frag_descriptor_add_frags_from(struct rmnet_frag_descriptor *to,
  252. struct rmnet_frag_descriptor *from,
  253. u32 off, u32 len)
  254. {
  255. struct rmnet_fragment *frag;
  256. int rc;
  257. /* Sanity check the lengths */
  258. if (off > from->len || len > from->len || off + len > from->len)
  259. return -EINVAL;
  260. rmnet_descriptor_for_each_frag(frag, from) {
  261. u32 frag_size;
  262. if (!len)
  263. break;
  264. frag_size = skb_frag_size(&frag->frag);
  265. if (off < frag_size) {
  266. struct page *p = skb_frag_page(&frag->frag);
  267. u32 page_off = skb_frag_off(&frag->frag);
  268. u32 copy_len = min_t(u32, len, frag_size - off);
  269. rc = rmnet_frag_descriptor_add_frag(to, p,
  270. page_off + off,
  271. copy_len);
  272. if (rc < 0)
  273. return rc;
  274. len -= copy_len;
  275. off = 0;
  276. } else {
  277. off -= frag_size;
  278. }
  279. }
  280. return 0;
  281. }
  282. EXPORT_SYMBOL(rmnet_frag_descriptor_add_frags_from);
  283. int rmnet_frag_ipv6_skip_exthdr(struct rmnet_frag_descriptor *frag_desc,
  284. int start, u8 *nexthdrp, __be16 *fragp)
  285. {
  286. u8 nexthdr = *nexthdrp;
  287. *fragp = 0;
  288. while (ipv6_ext_hdr(nexthdr)) {
  289. struct ipv6_opt_hdr *hp, __hp;
  290. int hdrlen;
  291. if (nexthdr == NEXTHDR_NONE)
  292. return -EINVAL;
  293. hp = rmnet_frag_header_ptr(frag_desc, (u32)start, sizeof(*hp),
  294. &__hp);
  295. if (!hp)
  296. return -EINVAL;
  297. if (nexthdr == NEXTHDR_FRAGMENT) {
  298. u32 off = offsetof(struct frag_hdr, frag_off);
  299. __be16 *fp, __fp;
  300. fp = rmnet_frag_header_ptr(frag_desc, (u32)start + off,
  301. sizeof(*fp), &__fp);
  302. if (!fp)
  303. return -EINVAL;
  304. *fragp = *fp;
  305. if (ntohs(*fragp) & ~0x7)
  306. break;
  307. hdrlen = 8;
  308. } else if (nexthdr == NEXTHDR_AUTH) {
  309. hdrlen = (hp->hdrlen + 2) << 2;
  310. } else {
  311. hdrlen = ipv6_optlen(hp);
  312. }
  313. nexthdr = hp->nexthdr;
  314. start += hdrlen;
  315. }
  316. *nexthdrp = nexthdr;
  317. return start;
  318. }
  319. EXPORT_SYMBOL(rmnet_frag_ipv6_skip_exthdr);
  320. static u8 rmnet_frag_do_flow_control(struct rmnet_map_header *qmap,
  321. struct rmnet_map_control_command *cmd,
  322. struct rmnet_port *port,
  323. int enable)
  324. {
  325. struct rmnet_endpoint *ep;
  326. struct net_device *vnd;
  327. u16 ip_family;
  328. u16 fc_seq;
  329. u32 qos_id;
  330. u8 mux_id;
  331. int r;
  332. mux_id = qmap->mux_id;
  333. if (mux_id >= RMNET_MAX_LOGICAL_EP)
  334. return RX_HANDLER_CONSUMED;
  335. ep = rmnet_get_endpoint(port, mux_id);
  336. if (!ep)
  337. return RX_HANDLER_CONSUMED;
  338. vnd = ep->egress_dev;
  339. ip_family = cmd->flow_control.ip_family;
  340. fc_seq = ntohs(cmd->flow_control.flow_control_seq_num);
  341. qos_id = ntohl(cmd->flow_control.qos_id);
  342. /* Ignore the ip family and pass the sequence number for both v4 and v6
  343. * sequence. User space does not support creating dedicated flows for
  344. * the 2 protocols
  345. */
  346. r = rmnet_vnd_do_flow_control(vnd, enable);
  347. if (r)
  348. return RMNET_MAP_COMMAND_UNSUPPORTED;
  349. else
  350. return RMNET_MAP_COMMAND_ACK;
  351. }
  352. static void rmnet_frag_send_ack(struct rmnet_map_header *qmap,
  353. unsigned char type,
  354. struct rmnet_port *port)
  355. {
  356. struct rmnet_map_control_command *cmd;
  357. struct net_device *dev = port->dev;
  358. struct sk_buff *skb;
  359. u16 alloc_len = ntohs(qmap->pkt_len) + sizeof(*qmap);
  360. skb = alloc_skb(alloc_len, GFP_ATOMIC);
  361. if (!skb)
  362. return;
  363. skb->protocol = htons(ETH_P_MAP);
  364. skb->dev = dev;
  365. cmd = rmnet_map_get_cmd_start(skb);
  366. cmd->cmd_type = type & 0x03;
  367. netif_tx_lock(dev);
  368. dev->netdev_ops->ndo_start_xmit(skb, dev);
  369. netif_tx_unlock(dev);
  370. }
  371. static void
  372. rmnet_frag_process_pb_ind(struct rmnet_frag_descriptor *frag_desc,
  373. struct rmnet_map_control_command_header *cmd,
  374. struct rmnet_port *port,
  375. u16 cmd_len)
  376. {
  377. struct rmnet_map_pb_ind_hdr *pbhdr, __pbhdr;
  378. u32 offset = sizeof(struct rmnet_map_header);
  379. u32 data_format;
  380. bool is_dl_mark_v2;
  381. if (cmd_len + offset < RMNET_PB_IND_HDR_SIZE)
  382. return;
  383. data_format = port->data_format;
  384. is_dl_mark_v2 = data_format & RMNET_INGRESS_FORMAT_DL_MARKER_V2;
  385. pbhdr = rmnet_frag_header_ptr(frag_desc, offset + sizeof(*cmd),
  386. sizeof(*pbhdr), &__pbhdr);
  387. if (!pbhdr)
  388. return;
  389. port->stats.pb_marker_count++;
  390. /* If a target is taking frag path, we can assume DL marker v2 is in
  391. * play
  392. */
  393. if (is_dl_mark_v2)
  394. rmnet_map_pb_ind_notify(port, pbhdr);
  395. }
  396. static void
  397. rmnet_frag_process_flow_start(struct rmnet_frag_descriptor *frag_desc,
  398. struct rmnet_map_control_command_header *cmd,
  399. struct rmnet_port *port,
  400. u16 cmd_len)
  401. {
  402. struct rmnet_map_dl_ind_hdr *dlhdr, __dlhdr;
  403. u32 offset = sizeof(struct rmnet_map_header);
  404. u32 data_format;
  405. bool is_dl_mark_v2;
  406. if (cmd_len + offset < RMNET_DL_IND_HDR_SIZE)
  407. return;
  408. data_format = port->data_format;
  409. is_dl_mark_v2 = data_format & RMNET_INGRESS_FORMAT_DL_MARKER_V2;
  410. dlhdr = rmnet_frag_header_ptr(frag_desc, offset + sizeof(*cmd),
  411. sizeof(*dlhdr), &__dlhdr);
  412. if (!dlhdr)
  413. return;
  414. port->stats.dl_hdr_last_ep_id = cmd->source_id;
  415. port->stats.dl_hdr_last_qmap_vers = cmd->reserved;
  416. port->stats.dl_hdr_last_trans_id = cmd->transaction_id;
  417. port->stats.dl_hdr_last_seq = dlhdr->le.seq;
  418. port->stats.dl_hdr_last_bytes = dlhdr->le.bytes;
  419. port->stats.dl_hdr_last_pkts = dlhdr->le.pkts;
  420. port->stats.dl_hdr_last_flows = dlhdr->le.flows;
  421. port->stats.dl_hdr_total_bytes += port->stats.dl_hdr_last_bytes;
  422. port->stats.dl_hdr_total_pkts += port->stats.dl_hdr_last_pkts;
  423. port->stats.dl_hdr_count++;
  424. /* If a target is taking frag path, we can assume DL marker v2 is in
  425. * play
  426. */
  427. if (is_dl_mark_v2)
  428. rmnet_map_dl_hdr_notify_v2(port, dlhdr, cmd);
  429. }
  430. static void
  431. rmnet_frag_process_flow_end(struct rmnet_frag_descriptor *frag_desc,
  432. struct rmnet_map_control_command_header *cmd,
  433. struct rmnet_port *port, u16 cmd_len)
  434. {
  435. struct rmnet_map_dl_ind_trl *dltrl, __dltrl;
  436. u32 offset = sizeof(struct rmnet_map_header);
  437. u32 data_format;
  438. bool is_dl_mark_v2;
  439. if (cmd_len + offset < RMNET_DL_IND_TRL_SIZE)
  440. return;
  441. data_format = port->data_format;
  442. is_dl_mark_v2 = data_format & RMNET_INGRESS_FORMAT_DL_MARKER_V2;
  443. dltrl = rmnet_frag_header_ptr(frag_desc, offset + sizeof(*cmd),
  444. sizeof(*dltrl), &__dltrl);
  445. if (!dltrl)
  446. return;
  447. port->stats.dl_trl_last_seq = dltrl->seq_le;
  448. port->stats.dl_trl_count++;
  449. /* If a target is taking frag path, we can assume DL marker v2 is in
  450. * play
  451. */
  452. if (is_dl_mark_v2)
  453. rmnet_map_dl_trl_notify_v2(port, dltrl, cmd);
  454. }
  455. /* Process MAP command frame and send N/ACK message as appropriate. Message cmd
  456. * name is decoded here and appropriate handler is called.
  457. */
  458. void rmnet_frag_command(struct rmnet_frag_descriptor *frag_desc,
  459. struct rmnet_map_header *qmap, struct rmnet_port *port)
  460. {
  461. struct rmnet_map_control_command *cmd, __cmd;
  462. unsigned char rc = 0;
  463. cmd = rmnet_frag_header_ptr(frag_desc, sizeof(*qmap), sizeof(*cmd),
  464. &__cmd);
  465. if (!cmd)
  466. return;
  467. switch (cmd->command_name) {
  468. case RMNET_MAP_COMMAND_FLOW_ENABLE:
  469. rc = rmnet_frag_do_flow_control(qmap, cmd, port, 1);
  470. break;
  471. case RMNET_MAP_COMMAND_FLOW_DISABLE:
  472. rc = rmnet_frag_do_flow_control(qmap, cmd, port, 0);
  473. break;
  474. default:
  475. rc = RMNET_MAP_COMMAND_UNSUPPORTED;
  476. break;
  477. }
  478. if (rc == RMNET_MAP_COMMAND_ACK)
  479. rmnet_frag_send_ack(qmap, rc, port);
  480. }
  481. int rmnet_frag_flow_command(struct rmnet_frag_descriptor *frag_desc,
  482. struct rmnet_port *port, u16 pkt_len)
  483. {
  484. struct rmnet_map_control_command_header *cmd, __cmd;
  485. cmd = rmnet_frag_header_ptr(frag_desc, sizeof(struct rmnet_map_header),
  486. sizeof(*cmd), &__cmd);
  487. if (!cmd)
  488. return -1;
  489. /* Silently discard any marksers recived over the LL channel */
  490. if (frag_desc->priority == 0xda1a &&
  491. (cmd->command_name == RMNET_MAP_COMMAND_FLOW_START ||
  492. cmd->command_name == RMNET_MAP_COMMAND_FLOW_END))
  493. return 0;
  494. switch (cmd->command_name) {
  495. case RMNET_MAP_COMMAND_FLOW_START:
  496. rmnet_frag_process_flow_start(frag_desc, cmd, port, pkt_len);
  497. break;
  498. case RMNET_MAP_COMMAND_FLOW_END:
  499. rmnet_frag_process_flow_end(frag_desc, cmd, port, pkt_len);
  500. break;
  501. case RMNET_MAP_COMMAND_PB_BYTES:
  502. rmnet_frag_process_pb_ind(frag_desc, cmd, port, pkt_len);
  503. break;
  504. default:
  505. return 1;
  506. }
  507. return 0;
  508. }
  509. EXPORT_SYMBOL(rmnet_frag_flow_command);
  510. static int rmnet_frag_deaggregate_one(struct sk_buff *skb,
  511. struct rmnet_port *port,
  512. struct list_head *list,
  513. u32 start, u32 priority)
  514. {
  515. struct skb_shared_info *shinfo = skb_shinfo(skb);
  516. struct rmnet_frag_descriptor *frag_desc;
  517. struct rmnet_map_header *maph, __maph;
  518. skb_frag_t *frag;
  519. u32 start_frag, offset, i;
  520. u32 start_frag_size, start_frag_off;
  521. u32 pkt_len, copy_len = 0;
  522. int rc;
  523. for (start_frag = 0, offset = 0; start_frag < shinfo->nr_frags;
  524. start_frag++) {
  525. frag = &shinfo->frags[start_frag];
  526. if (start < skb_frag_size(frag) + offset)
  527. break;
  528. offset += skb_frag_size(frag);
  529. }
  530. if (start_frag == shinfo->nr_frags)
  531. return -1;
  532. /* start - offset is the additional offset into the page to account
  533. * for any data on it we've already used.
  534. */
  535. start_frag_size = skb_frag_size(frag) - (start - offset);
  536. start_frag_off = skb_frag_off(frag) + (start - offset);
  537. /* Grab the QMAP header. Careful, as there's no guarantee that it's
  538. * continugous!
  539. */
  540. if (likely(start_frag_size >= sizeof(*maph))) {
  541. maph = skb_frag_address(frag) + (start - offset);
  542. } else {
  543. /* The header's split across pages. We can rebuild it.
  544. * Probably not faster or stronger than before. But certainly
  545. * more linear.
  546. */
  547. if (skb_copy_bits(skb, start, &__maph, sizeof(__maph)) < 0)
  548. return -1;
  549. maph = &__maph;
  550. }
  551. pkt_len = ntohs(maph->pkt_len);
  552. /* Catch empty frames */
  553. if (!pkt_len)
  554. return -1;
  555. frag_desc = rmnet_get_frag_descriptor(port);
  556. if (!frag_desc)
  557. return -1;
  558. frag_desc->priority = priority;
  559. pkt_len += sizeof(*maph);
  560. if (port->data_format & RMNET_FLAGS_INGRESS_MAP_CKSUMV4) {
  561. pkt_len += sizeof(struct rmnet_map_dl_csum_trailer);
  562. } else if ((port->data_format & (RMNET_PRIV_FLAGS_INGRESS_MAP_CKSUMV5 |
  563. RMNET_FLAGS_INGRESS_COALESCE)) &&
  564. !maph->cd_bit) {
  565. u32 hsize = 0;
  566. u8 type;
  567. /* Check the type. This seems like should be overkill for less
  568. * than a single byte, doesn't it?
  569. */
  570. if (likely(start_frag_size >= sizeof(*maph) + 1)) {
  571. type = *((u8 *)maph + sizeof(*maph));
  572. } else {
  573. if (skb_copy_bits(skb, start + sizeof(*maph), &type,
  574. sizeof(type)) < 0)
  575. return -1;
  576. }
  577. /* Type only uses the first 7 bits */
  578. switch ((type & 0xFE) >> 1) {
  579. case RMNET_MAP_HEADER_TYPE_COALESCING:
  580. hsize = sizeof(struct rmnet_map_v5_coal_header);
  581. break;
  582. case RMNET_MAP_HEADER_TYPE_CSUM_OFFLOAD:
  583. hsize = sizeof(struct rmnet_map_v5_csum_header);
  584. break;
  585. }
  586. pkt_len += hsize;
  587. }
  588. /* Add all frags containing the packet data to the descriptor */
  589. for (i = start_frag; pkt_len > 0 && i < shinfo->nr_frags; ) {
  590. u32 size, off;
  591. u32 copy;
  592. frag = &shinfo->frags[i];
  593. size = skb_frag_size(frag);
  594. off = skb_frag_off(frag);
  595. if (i == start_frag) {
  596. /* These are different for the first one to account for
  597. * the starting offset.
  598. */
  599. size = start_frag_size;
  600. off = start_frag_off;
  601. }
  602. copy = min_t(u32, size, pkt_len);
  603. rc = rmnet_frag_descriptor_add_frag(frag_desc,
  604. skb_frag_page(frag), off,
  605. copy);
  606. if (rc < 0) {
  607. rmnet_recycle_frag_descriptor(frag_desc, port);
  608. return -1;
  609. }
  610. pkt_len -= copy;
  611. copy_len += copy;
  612. /* If the fragment is exhausted, we can move to the next one */
  613. if (!(size - copy_len)) {
  614. i++;
  615. copy_len = 0;
  616. }
  617. }
  618. if (pkt_len) {
  619. /* Packet length is larger than the amount of data we have */
  620. rmnet_recycle_frag_descriptor(frag_desc, port);
  621. return -1;
  622. }
  623. list_add_tail(&frag_desc->list, list);
  624. return (int)frag_desc->len;
  625. }
  626. void rmnet_frag_deaggregate(struct sk_buff *skb, struct rmnet_port *port,
  627. struct list_head *list, u32 priority)
  628. {
  629. u32 start = 0;
  630. int rc;
  631. while (start < skb->len) {
  632. rc = rmnet_frag_deaggregate_one(skb, port, list, start,
  633. priority);
  634. if (rc < 0)
  635. return;
  636. start += (u32)rc;
  637. }
  638. }
  639. /* Fill in GSO metadata to allow the SKB to be segmented by the NW stack
  640. * if needed (i.e. forwarding, UDP GRO)
  641. */
  642. static void rmnet_frag_gso_stamp(struct sk_buff *skb,
  643. struct rmnet_frag_descriptor *frag_desc)
  644. {
  645. struct skb_shared_info *shinfo = skb_shinfo(skb);
  646. if (frag_desc->trans_proto == IPPROTO_TCP)
  647. shinfo->gso_type = (frag_desc->ip_proto == 4) ?
  648. SKB_GSO_TCPV4 : SKB_GSO_TCPV6;
  649. else
  650. shinfo->gso_type = SKB_GSO_UDP_L4;
  651. shinfo->gso_size = frag_desc->gso_size;
  652. shinfo->gso_segs = frag_desc->gso_segs;
  653. }
  654. /* Set the partial checksum information. Sets the transport checksum to the
  655. * pseudoheader checksum and sets the offload metadata.
  656. */
  657. static void rmnet_frag_partial_csum(struct sk_buff *skb,
  658. struct rmnet_frag_descriptor *frag_desc)
  659. {
  660. rmnet_perf_tether_ingress_hook_t rmnet_perf_tether_ingress;
  661. struct iphdr *iph = (struct iphdr *)skb->data;
  662. __sum16 pseudo;
  663. u16 pkt_len = skb->len - frag_desc->ip_len;
  664. if (frag_desc->ip_proto == 4) {
  665. iph->tot_len = htons(skb->len);
  666. iph->check = 0;
  667. iph->check = ip_fast_csum(iph, iph->ihl);
  668. pseudo = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
  669. pkt_len, frag_desc->trans_proto,
  670. 0);
  671. } else {
  672. struct ipv6hdr *ip6h = (struct ipv6hdr *)iph;
  673. /* Payload length includes any extension headers */
  674. ip6h->payload_len = htons(skb->len - sizeof(*ip6h));
  675. pseudo = ~csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
  676. pkt_len, frag_desc->trans_proto, 0);
  677. }
  678. if (frag_desc->trans_proto == IPPROTO_TCP) {
  679. struct tcphdr *tp = (struct tcphdr *)
  680. ((u8 *)iph + frag_desc->ip_len);
  681. tp->check = pseudo;
  682. skb->csum_offset = offsetof(struct tcphdr, check);
  683. rmnet_perf_tether_ingress = rcu_dereference(rmnet_perf_tether_ingress_hook);
  684. if (rmnet_perf_tether_ingress)
  685. rmnet_perf_tether_ingress(tp, skb);
  686. } else {
  687. struct udphdr *up = (struct udphdr *)
  688. ((u8 *)iph + frag_desc->ip_len);
  689. up->len = htons(pkt_len);
  690. up->check = pseudo;
  691. skb->csum_offset = offsetof(struct udphdr, check);
  692. }
  693. skb->ip_summed = CHECKSUM_PARTIAL;
  694. skb->csum_start = (u8 *)iph + frag_desc->ip_len - skb->head;
  695. }
  696. #define PFN_ENTRY_MAX (128)
  697. #define PFNI (count++ % PFN_ENTRY_MAX)
  698. static void rmnet_descriptor_trace_pfn(struct sk_buff *skb)
  699. {
  700. struct skb_shared_info *shinfo;
  701. struct sk_buff *frag_iter;
  702. unsigned long rpfn[PFN_ENTRY_MAX];
  703. int i, count;
  704. if (!trace_print_pfn_enabled())
  705. return;
  706. shinfo = skb_shinfo(skb);
  707. memset(rpfn, 0, sizeof(rpfn));
  708. count = 0;
  709. for (i = 0; i < shinfo->nr_frags; i++)
  710. rpfn[PFNI] = page_to_pfn(skb_frag_page(&shinfo->frags[i]));
  711. skb_walk_frags(skb, frag_iter) {
  712. shinfo = skb_shinfo(frag_iter);
  713. for (i = 0; i < shinfo->nr_frags; i++)
  714. rpfn[PFNI] = page_to_pfn(skb_frag_page(&shinfo->frags[i]));
  715. }
  716. trace_print_pfn(skb, rpfn, count);
  717. }
  718. /* Allocate and populate an skb to contain the packet represented by the
  719. * frag descriptor.
  720. */
  721. static struct sk_buff *rmnet_alloc_skb(struct rmnet_frag_descriptor *frag_desc,
  722. struct rmnet_port *port)
  723. {
  724. struct sk_buff *head_skb, *current_skb, *skb;
  725. struct skb_shared_info *shinfo;
  726. struct rmnet_fragment *frag, *tmp;
  727. struct rmnet_skb_cb *cb;
  728. /* Use the exact sizes if we know them (i.e. RSB/RSC, rmnet_perf) */
  729. if (frag_desc->hdrs_valid) {
  730. u16 hdr_len = frag_desc->ip_len + frag_desc->trans_len;
  731. head_skb = alloc_skb(hdr_len + RMNET_MAP_DEAGGR_HEADROOM,
  732. GFP_ATOMIC);
  733. if (!head_skb)
  734. return NULL;
  735. skb_reserve(head_skb, RMNET_MAP_DEAGGR_HEADROOM);
  736. rmnet_frag_copy_data(frag_desc, 0, hdr_len,
  737. skb_put(head_skb, hdr_len));
  738. skb_reset_network_header(head_skb);
  739. if (frag_desc->trans_len)
  740. skb_set_transport_header(head_skb, frag_desc->ip_len);
  741. /* Pull the headers off carefully */
  742. if (hdr_len == frag_desc->len)
  743. /* Fast forward "header only" packets */
  744. goto skip_frags;
  745. if (!rmnet_frag_pull(frag_desc, port, hdr_len)) {
  746. kfree(head_skb);
  747. return NULL;
  748. }
  749. } else {
  750. /* Allocate enough space to avoid penalties in the stack
  751. * from __pskb_pull_tail()
  752. */
  753. head_skb = alloc_skb(256 + RMNET_MAP_DEAGGR_HEADROOM,
  754. GFP_ATOMIC);
  755. if (!head_skb)
  756. return NULL;
  757. skb_reserve(head_skb, RMNET_MAP_DEAGGR_HEADROOM);
  758. }
  759. shinfo = skb_shinfo(head_skb);
  760. current_skb = head_skb;
  761. /* Add in the page fragments */
  762. rmnet_descriptor_for_each_frag_safe(frag, tmp, frag_desc) {
  763. struct page *p = skb_frag_page(&frag->frag);
  764. u32 frag_size = skb_frag_size(&frag->frag);
  765. add_frag:
  766. if (shinfo->nr_frags < MAX_SKB_FRAGS) {
  767. get_page(p);
  768. skb_add_rx_frag(current_skb, shinfo->nr_frags, p,
  769. skb_frag_off(&frag->frag), frag_size,
  770. frag_size);
  771. if (current_skb != head_skb) {
  772. head_skb->len += frag_size;
  773. head_skb->data_len += frag_size;
  774. }
  775. } else {
  776. /* Alloc a new skb and try again */
  777. skb = alloc_skb(0, GFP_ATOMIC);
  778. if (!skb)
  779. break;
  780. if (current_skb == head_skb)
  781. shinfo->frag_list = skb;
  782. else
  783. current_skb->next = skb;
  784. current_skb = skb;
  785. shinfo = skb_shinfo(current_skb);
  786. goto add_frag;
  787. }
  788. }
  789. skip_frags:
  790. head_skb->dev = frag_desc->dev;
  791. rmnet_set_skb_proto(head_skb);
  792. cb = RMNET_SKB_CB(head_skb);
  793. cb->coal_bytes = frag_desc->coal_bytes;
  794. cb->coal_bufsize = frag_desc->coal_bufsize;
  795. /* Handle any header metadata that needs to be updated after RSB/RSC
  796. * segmentation
  797. */
  798. if (frag_desc->ip_id_set) {
  799. struct iphdr *iph;
  800. iph = (struct iphdr *)rmnet_map_data_ptr(head_skb);
  801. csum_replace2(&iph->check, iph->id, frag_desc->ip_id);
  802. iph->id = frag_desc->ip_id;
  803. }
  804. if (frag_desc->tcp_seq_set) {
  805. struct tcphdr *th;
  806. th = (struct tcphdr *)
  807. (rmnet_map_data_ptr(head_skb) + frag_desc->ip_len);
  808. th->seq = frag_desc->tcp_seq;
  809. }
  810. if (frag_desc->tcp_flags_set) {
  811. struct tcphdr *th;
  812. __be16 *flags;
  813. th = (struct tcphdr *)
  814. (rmnet_map_data_ptr(head_skb) + frag_desc->ip_len);
  815. flags = (__be16 *)&tcp_flag_word(th);
  816. *flags = frag_desc->tcp_flags;
  817. }
  818. /* Handle csum offloading */
  819. if (frag_desc->csum_valid && frag_desc->hdrs_valid) {
  820. /* Set the partial checksum information */
  821. rmnet_frag_partial_csum(head_skb, frag_desc);
  822. } else if (frag_desc->csum_valid) {
  823. /* Non-RSB/RSC/perf packet. The current checksum is fine */
  824. head_skb->ip_summed = CHECKSUM_UNNECESSARY;
  825. } else if (frag_desc->hdrs_valid &&
  826. (frag_desc->trans_proto == IPPROTO_TCP ||
  827. frag_desc->trans_proto == IPPROTO_UDP)) {
  828. /* Unfortunately, we have to fake a bad checksum here, since
  829. * the original bad value is lost by the hardware. The only
  830. * reliable way to do it is to calculate the actual checksum
  831. * and corrupt it.
  832. */
  833. __sum16 *check;
  834. __wsum csum;
  835. unsigned int offset = skb_transport_offset(head_skb);
  836. __sum16 pseudo;
  837. /* Calculate pseudo header and update header fields */
  838. if (frag_desc->ip_proto == 4) {
  839. struct iphdr *iph = ip_hdr(head_skb);
  840. __be16 tot_len = htons(head_skb->len);
  841. csum_replace2(&iph->check, iph->tot_len, tot_len);
  842. iph->tot_len = tot_len;
  843. pseudo = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
  844. head_skb->len -
  845. frag_desc->ip_len,
  846. frag_desc->trans_proto, 0);
  847. } else {
  848. struct ipv6hdr *ip6h = ipv6_hdr(head_skb);
  849. ip6h->payload_len = htons(head_skb->len -
  850. sizeof(*ip6h));
  851. pseudo = ~csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
  852. head_skb->len -
  853. frag_desc->ip_len,
  854. frag_desc->trans_proto, 0);
  855. }
  856. if (frag_desc->trans_proto == IPPROTO_TCP) {
  857. check = &tcp_hdr(head_skb)->check;
  858. } else {
  859. udp_hdr(head_skb)->len = htons(head_skb->len -
  860. frag_desc->ip_len);
  861. check = &udp_hdr(head_skb)->check;
  862. }
  863. *check = pseudo;
  864. csum = skb_checksum(head_skb, offset, head_skb->len - offset,
  865. 0);
  866. /* Add 1 to corrupt. This cannot produce a final value of 0
  867. * since csum_fold() can't return a value of 0xFFFF
  868. */
  869. *check = csum16_add(csum_fold(csum), htons(1));
  870. head_skb->ip_summed = CHECKSUM_NONE;
  871. }
  872. /* Handle any rmnet_perf metadata */
  873. if (frag_desc->hash) {
  874. head_skb->hash = frag_desc->hash;
  875. head_skb->sw_hash = 1;
  876. }
  877. if (frag_desc->flush_shs)
  878. cb->flush_shs = 1;
  879. /* Handle coalesced packets */
  880. if (frag_desc->gso_segs > 1)
  881. rmnet_frag_gso_stamp(head_skb, frag_desc);
  882. /* Propagate original priority value */
  883. head_skb->priority = frag_desc->priority;
  884. if (trace_print_tcp_rx_enabled()) {
  885. char saddr[INET6_ADDRSTRLEN], daddr[INET6_ADDRSTRLEN];
  886. if (!frag_desc->hdrs_valid && !frag_desc->trans_len)
  887. goto skip_trace_print_tcp_rx;
  888. memset(saddr, 0, INET6_ADDRSTRLEN);
  889. memset(daddr, 0, INET6_ADDRSTRLEN);
  890. if (head_skb->protocol == htons(ETH_P_IP)) {
  891. if (ip_hdr(head_skb)->protocol != IPPROTO_TCP)
  892. goto skip_trace_print_tcp_rx;
  893. snprintf(saddr, INET6_ADDRSTRLEN, "%pI4", &ip_hdr(head_skb)->saddr);
  894. snprintf(daddr, INET6_ADDRSTRLEN, "%pI4", &ip_hdr(head_skb)->daddr);
  895. }
  896. if (head_skb->protocol == htons(ETH_P_IPV6)) {
  897. if (ipv6_hdr(head_skb)->nexthdr != IPPROTO_TCP)
  898. goto skip_trace_print_tcp_rx;
  899. snprintf(saddr, INET6_ADDRSTRLEN, "%pI6", &ipv6_hdr(head_skb)->saddr);
  900. snprintf(daddr, INET6_ADDRSTRLEN, "%pI6", &ipv6_hdr(head_skb)->daddr);
  901. }
  902. trace_print_tcp_rx(head_skb, saddr, daddr, tcp_hdr(head_skb));
  903. rmnet_descriptor_trace_pfn(head_skb);
  904. }
  905. skip_trace_print_tcp_rx:
  906. if (trace_print_udp_rx_enabled()) {
  907. char saddr[INET6_ADDRSTRLEN], daddr[INET6_ADDRSTRLEN];
  908. u16 ip_id = 0;
  909. if (!frag_desc->hdrs_valid && !frag_desc->trans_len)
  910. goto skip_trace_print_udp_rx;
  911. memset(saddr, 0, INET6_ADDRSTRLEN);
  912. memset(daddr, 0, INET6_ADDRSTRLEN);
  913. if (head_skb->protocol == htons(ETH_P_IP)) {
  914. if (ip_hdr(head_skb)->protocol != IPPROTO_UDP)
  915. goto skip_trace_print_udp_rx;
  916. snprintf(saddr, INET6_ADDRSTRLEN, "%pI4", &ip_hdr(head_skb)->saddr);
  917. snprintf(daddr, INET6_ADDRSTRLEN, "%pI4", &ip_hdr(head_skb)->daddr);
  918. ip_id = ntohs(ip_hdr(head_skb)->id);
  919. }
  920. if (head_skb->protocol == htons(ETH_P_IPV6)) {
  921. if (ipv6_hdr(head_skb)->nexthdr != IPPROTO_UDP)
  922. goto skip_trace_print_udp_rx;
  923. snprintf(saddr, INET6_ADDRSTRLEN, "%pI6", &ipv6_hdr(head_skb)->saddr);
  924. snprintf(daddr, INET6_ADDRSTRLEN, "%pI6", &ipv6_hdr(head_skb)->daddr);
  925. }
  926. trace_print_udp_rx(head_skb, saddr, daddr, udp_hdr(head_skb), ip_id);
  927. rmnet_descriptor_trace_pfn(head_skb);
  928. }
  929. skip_trace_print_udp_rx:
  930. return head_skb;
  931. }
  932. /* Deliver the packets contained within a frag descriptor */
  933. void rmnet_frag_deliver(struct rmnet_frag_descriptor *frag_desc,
  934. struct rmnet_port *port)
  935. {
  936. struct sk_buff *skb;
  937. skb = rmnet_alloc_skb(frag_desc, port);
  938. if (skb)
  939. rmnet_deliver_skb(skb, port);
  940. rmnet_recycle_frag_descriptor(frag_desc, port);
  941. }
  942. EXPORT_SYMBOL(rmnet_frag_deliver);
  943. static void __rmnet_frag_segment_data(struct rmnet_frag_descriptor *coal_desc,
  944. struct rmnet_port *port,
  945. struct list_head *list, u8 pkt_id,
  946. bool csum_valid)
  947. {
  948. struct rmnet_priv *priv = netdev_priv(coal_desc->dev);
  949. struct rmnet_frag_descriptor *new_desc;
  950. u32 dlen = coal_desc->gso_size * coal_desc->gso_segs;
  951. u32 hlen = coal_desc->ip_len + coal_desc->trans_len;
  952. u32 offset = hlen + coal_desc->data_offset;
  953. int rc;
  954. new_desc = rmnet_get_frag_descriptor(port);
  955. if (!new_desc)
  956. return;
  957. /* Header information and most metadata is the same as the original */
  958. memcpy(new_desc, coal_desc, sizeof(*coal_desc));
  959. INIT_LIST_HEAD(&new_desc->list);
  960. INIT_LIST_HEAD(&new_desc->frags);
  961. new_desc->len = 0;
  962. /* Add the header fragments */
  963. rc = rmnet_frag_descriptor_add_frags_from(new_desc, coal_desc, 0,
  964. hlen);
  965. if (rc < 0)
  966. goto recycle;
  967. /* Add in the data fragments */
  968. rc = rmnet_frag_descriptor_add_frags_from(new_desc, coal_desc, offset,
  969. dlen);
  970. if (rc < 0)
  971. goto recycle;
  972. /* Update protocol-specific metadata */
  973. if (coal_desc->trans_proto == IPPROTO_TCP) {
  974. struct tcphdr *th, __th;
  975. th = rmnet_frag_header_ptr(coal_desc, coal_desc->ip_len,
  976. sizeof(*th), &__th);
  977. if (!th)
  978. goto recycle;
  979. new_desc->tcp_seq_set = 1;
  980. new_desc->tcp_seq = htonl(ntohl(th->seq) +
  981. coal_desc->data_offset);
  982. /* Don't allow any dangerous flags to appear in any segments
  983. * other than the last.
  984. */
  985. if (th->fin || th->psh) {
  986. if (offset + dlen < coal_desc->len) {
  987. __be32 flag_word = tcp_flag_word(th);
  988. /* Clear the FIN and PSH flags from this
  989. * segment.
  990. */
  991. flag_word &= ~TCP_FLAG_FIN;
  992. flag_word &= ~TCP_FLAG_PSH;
  993. new_desc->tcp_flags_set = 1;
  994. new_desc->tcp_flags = *((__be16 *)&flag_word);
  995. }
  996. }
  997. } else if (coal_desc->trans_proto == IPPROTO_UDP) {
  998. struct udphdr *uh, __uh;
  999. uh = rmnet_frag_header_ptr(coal_desc, coal_desc->ip_len,
  1000. sizeof(*uh), &__uh);
  1001. if (!uh)
  1002. goto recycle;
  1003. if (coal_desc->ip_proto == 4 && !uh->check)
  1004. csum_valid = true;
  1005. }
  1006. if (coal_desc->ip_proto == 4) {
  1007. struct iphdr *iph, __iph;
  1008. iph = rmnet_frag_header_ptr(coal_desc, 0, sizeof(*iph),
  1009. &__iph);
  1010. if (!iph)
  1011. goto recycle;
  1012. new_desc->ip_id_set = 1;
  1013. new_desc->ip_id = htons(ntohs(iph->id) + coal_desc->pkt_id);
  1014. }
  1015. new_desc->csum_valid = csum_valid;
  1016. priv->stats.coal.coal_reconstruct++;
  1017. /* Update meta information to move past the data we just segmented */
  1018. coal_desc->data_offset += dlen;
  1019. coal_desc->pkt_id = pkt_id + 1;
  1020. coal_desc->gso_segs = 0;
  1021. /* Only relevant for the first segment to avoid overcoutning */
  1022. coal_desc->coal_bytes = 0;
  1023. coal_desc->coal_bufsize = 0;
  1024. list_add_tail(&new_desc->list, list);
  1025. return;
  1026. recycle:
  1027. rmnet_recycle_frag_descriptor(new_desc, port);
  1028. }
  1029. static bool rmnet_frag_validate_csum(struct rmnet_frag_descriptor *frag_desc)
  1030. {
  1031. u8 *data = rmnet_frag_data_ptr(frag_desc);
  1032. unsigned int datagram_len;
  1033. __wsum csum;
  1034. __sum16 pseudo;
  1035. /* Keep analysis tools happy, since they will see that
  1036. * rmnet_frag_data_ptr() could return NULL. It can't in this case,
  1037. * since we can't get this far otherwise...
  1038. */
  1039. if (unlikely(!data))
  1040. return false;
  1041. datagram_len = frag_desc->len - frag_desc->ip_len;
  1042. if (frag_desc->ip_proto == 4) {
  1043. struct iphdr *iph = (struct iphdr *)data;
  1044. pseudo = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
  1045. datagram_len,
  1046. frag_desc->trans_proto, 0);
  1047. } else {
  1048. struct ipv6hdr *ip6h = (struct ipv6hdr *)data;
  1049. pseudo = ~csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
  1050. datagram_len, frag_desc->trans_proto,
  1051. 0);
  1052. }
  1053. csum = csum_partial(data + frag_desc->ip_len, datagram_len,
  1054. csum_unfold(pseudo));
  1055. return !csum_fold(csum);
  1056. }
  1057. /* Converts the coalesced frame into a list of descriptors */
  1058. static void
  1059. rmnet_frag_segment_coal_data(struct rmnet_frag_descriptor *coal_desc,
  1060. u64 nlo_err_mask, struct rmnet_port *port,
  1061. struct list_head *list)
  1062. {
  1063. struct rmnet_priv *priv = netdev_priv(coal_desc->dev);
  1064. struct rmnet_map_v5_coal_header coal_hdr;
  1065. struct rmnet_fragment *frag;
  1066. u8 *version;
  1067. u16 pkt_len;
  1068. u8 pkt, total_pkt = 0;
  1069. u8 nlo;
  1070. bool gro = coal_desc->dev->features & NETIF_F_GRO_HW;
  1071. bool zero_csum = false;
  1072. /* Copy the coal header into our local storage before pulling it. It's
  1073. * possible that this header (or part of it) is the last port of a page
  1074. * a pulling it off would cause it to be freed. Referring back to the
  1075. * header would be invalid in that case.
  1076. */
  1077. if (rmnet_frag_copy_data(coal_desc, sizeof(struct rmnet_map_header),
  1078. sizeof(coal_hdr), &coal_hdr) < 0)
  1079. return;
  1080. /* Pull off the headers we no longer need */
  1081. if (!rmnet_frag_pull(coal_desc, port, sizeof(struct rmnet_map_header) +
  1082. sizeof(coal_hdr)))
  1083. return;
  1084. /* By definition, this byte is linear, and the first byte on the
  1085. * first fragment. ;) Hence why no header_ptr() call is needed
  1086. * for it.
  1087. */
  1088. version = rmnet_frag_data_ptr(coal_desc);
  1089. if (unlikely(!version))
  1090. return;
  1091. if ((*version & 0xF0) == 0x40) {
  1092. struct iphdr *iph, __iph;
  1093. iph = rmnet_frag_header_ptr(coal_desc, 0, sizeof(*iph),
  1094. &__iph);
  1095. if (!iph)
  1096. return;
  1097. coal_desc->ip_proto = 4;
  1098. coal_desc->ip_len = iph->ihl * 4;
  1099. coal_desc->trans_proto = iph->protocol;
  1100. /* Don't allow coalescing of any packets with IP options */
  1101. if (iph->ihl != 5)
  1102. gro = false;
  1103. } else if ((*version & 0xF0) == 0x60) {
  1104. struct ipv6hdr *ip6h, __ip6h;
  1105. int ip_len;
  1106. __be16 frag_off;
  1107. u8 protocol;
  1108. ip6h = rmnet_frag_header_ptr(coal_desc, 0, sizeof(*ip6h),
  1109. &__ip6h);
  1110. if (!ip6h)
  1111. return;
  1112. coal_desc->ip_proto = 6;
  1113. protocol = ip6h->nexthdr;
  1114. ip_len = rmnet_frag_ipv6_skip_exthdr(coal_desc,
  1115. sizeof(*ip6h),
  1116. &protocol,
  1117. &frag_off);
  1118. coal_desc->trans_proto = protocol;
  1119. /* If we run into a problem, or this has a fragment header
  1120. * (which should technically not be possible, if the HW
  1121. * works as intended...), bail.
  1122. */
  1123. if (ip_len < 0 || frag_off) {
  1124. priv->stats.coal.coal_ip_invalid++;
  1125. return;
  1126. }
  1127. coal_desc->ip_len = (u16)ip_len;
  1128. if (coal_desc->ip_len > sizeof(*ip6h)) {
  1129. /* Don't allow coalescing of any packets with IPv6
  1130. * extension headers.
  1131. */
  1132. gro = false;
  1133. }
  1134. } else {
  1135. priv->stats.coal.coal_ip_invalid++;
  1136. return;
  1137. }
  1138. if (coal_desc->trans_proto == IPPROTO_TCP) {
  1139. struct tcphdr *th, __th;
  1140. th = rmnet_frag_header_ptr(coal_desc,
  1141. coal_desc->ip_len, sizeof(*th),
  1142. &__th);
  1143. if (!th)
  1144. return;
  1145. coal_desc->trans_len = th->doff * 4;
  1146. priv->stats.coal.coal_tcp++;
  1147. priv->stats.coal.coal_tcp_bytes += coal_desc->len;
  1148. } else if (coal_desc->trans_proto == IPPROTO_UDP) {
  1149. struct udphdr *uh, __uh;
  1150. uh = rmnet_frag_header_ptr(coal_desc,
  1151. coal_desc->ip_len, sizeof(*uh),
  1152. &__uh);
  1153. if (!uh)
  1154. return;
  1155. coal_desc->trans_len = sizeof(*uh);
  1156. priv->stats.coal.coal_udp++;
  1157. priv->stats.coal.coal_udp_bytes += coal_desc->len;
  1158. if (coal_desc->ip_proto == 4 && !uh->check)
  1159. zero_csum = true;
  1160. } else {
  1161. priv->stats.coal.coal_trans_invalid++;
  1162. return;
  1163. }
  1164. coal_desc->hdrs_valid = 1;
  1165. coal_desc->coal_bytes = coal_desc->len;
  1166. rmnet_descriptor_for_each_frag(frag, coal_desc)
  1167. coal_desc->coal_bufsize +=
  1168. page_size(skb_frag_page(&frag->frag));
  1169. if (rmnet_map_v5_csum_buggy(&coal_hdr) && !zero_csum) {
  1170. /* Mark the checksum as valid if it checks out */
  1171. if (rmnet_frag_validate_csum(coal_desc))
  1172. coal_desc->csum_valid = true;
  1173. coal_desc->gso_size = ntohs(coal_hdr.nl_pairs[0].pkt_len);
  1174. coal_desc->gso_size -= coal_desc->ip_len + coal_desc->trans_len;
  1175. coal_desc->gso_segs = coal_hdr.nl_pairs[0].num_packets;
  1176. list_add_tail(&coal_desc->list, list);
  1177. return;
  1178. }
  1179. /* Fast-forward the case where we have 1 NLO (i.e. 1 packet length),
  1180. * no checksum errors, and are allowing GRO. We can just reuse this
  1181. * descriptor unchanged.
  1182. */
  1183. if (gro && coal_hdr.num_nlos == 1 && coal_hdr.csum_valid) {
  1184. coal_desc->csum_valid = true;
  1185. coal_desc->gso_size = ntohs(coal_hdr.nl_pairs[0].pkt_len);
  1186. coal_desc->gso_size -= coal_desc->ip_len + coal_desc->trans_len;
  1187. coal_desc->gso_segs = coal_hdr.nl_pairs[0].num_packets;
  1188. list_add_tail(&coal_desc->list, list);
  1189. return;
  1190. }
  1191. /* Segment the coalesced descriptor into new packets */
  1192. for (nlo = 0; nlo < coal_hdr.num_nlos; nlo++) {
  1193. pkt_len = ntohs(coal_hdr.nl_pairs[nlo].pkt_len);
  1194. pkt_len -= coal_desc->ip_len + coal_desc->trans_len;
  1195. coal_desc->gso_size = pkt_len;
  1196. for (pkt = 0; pkt < coal_hdr.nl_pairs[nlo].num_packets;
  1197. pkt++, total_pkt++, nlo_err_mask >>= 1) {
  1198. bool csum_err = nlo_err_mask & 1;
  1199. /* Segment the packet if we're not sending the larger
  1200. * packet up the stack.
  1201. */
  1202. if (!gro) {
  1203. coal_desc->gso_segs = 1;
  1204. if (csum_err)
  1205. priv->stats.coal.coal_csum_err++;
  1206. __rmnet_frag_segment_data(coal_desc, port,
  1207. list, total_pkt,
  1208. !csum_err);
  1209. continue;
  1210. }
  1211. if (csum_err) {
  1212. priv->stats.coal.coal_csum_err++;
  1213. /* Segment out the good data */
  1214. if (coal_desc->gso_segs)
  1215. __rmnet_frag_segment_data(coal_desc,
  1216. port,
  1217. list,
  1218. total_pkt,
  1219. true);
  1220. /* Segment out the bad checksum */
  1221. coal_desc->gso_segs = 1;
  1222. __rmnet_frag_segment_data(coal_desc, port,
  1223. list, total_pkt,
  1224. false);
  1225. } else {
  1226. coal_desc->gso_segs++;
  1227. }
  1228. }
  1229. /* If we're switching NLOs, we need to send out everything from
  1230. * the previous one, if we haven't done so. NLOs only switch
  1231. * when the packet length changes.
  1232. */
  1233. if (coal_desc->gso_segs)
  1234. __rmnet_frag_segment_data(coal_desc, port, list,
  1235. total_pkt, true);
  1236. }
  1237. }
  1238. /* Record reason for coalescing pipe closure */
  1239. static void rmnet_frag_data_log_close_stats(struct rmnet_priv *priv, u8 type,
  1240. u8 code)
  1241. {
  1242. struct rmnet_coal_close_stats *stats = &priv->stats.coal.close;
  1243. switch (type) {
  1244. case RMNET_MAP_COAL_CLOSE_NON_COAL:
  1245. stats->non_coal++;
  1246. break;
  1247. case RMNET_MAP_COAL_CLOSE_IP_MISS:
  1248. stats->ip_miss++;
  1249. break;
  1250. case RMNET_MAP_COAL_CLOSE_TRANS_MISS:
  1251. stats->trans_miss++;
  1252. break;
  1253. case RMNET_MAP_COAL_CLOSE_HW:
  1254. switch (code) {
  1255. case RMNET_MAP_COAL_CLOSE_HW_NL:
  1256. stats->hw_nl++;
  1257. break;
  1258. case RMNET_MAP_COAL_CLOSE_HW_PKT:
  1259. stats->hw_pkt++;
  1260. break;
  1261. case RMNET_MAP_COAL_CLOSE_HW_BYTE:
  1262. stats->hw_byte++;
  1263. break;
  1264. case RMNET_MAP_COAL_CLOSE_HW_TIME:
  1265. stats->hw_time++;
  1266. break;
  1267. case RMNET_MAP_COAL_CLOSE_HW_EVICT:
  1268. stats->hw_evict++;
  1269. break;
  1270. default:
  1271. break;
  1272. }
  1273. break;
  1274. case RMNET_MAP_COAL_CLOSE_COAL:
  1275. stats->coal++;
  1276. break;
  1277. default:
  1278. break;
  1279. }
  1280. }
  1281. /* Check if the coalesced header has any incorrect values, in which case, the
  1282. * entire coalesced frame must be dropped. Then check if there are any
  1283. * checksum issues
  1284. */
  1285. static int
  1286. rmnet_frag_data_check_coal_header(struct rmnet_frag_descriptor *frag_desc,
  1287. u64 *nlo_err_mask)
  1288. {
  1289. struct rmnet_map_v5_coal_header *coal_hdr, __coal_hdr;
  1290. struct rmnet_priv *priv = netdev_priv(frag_desc->dev);
  1291. u64 mask = 0;
  1292. int i;
  1293. u8 veid, pkts = 0;
  1294. coal_hdr = rmnet_frag_header_ptr(frag_desc,
  1295. sizeof(struct rmnet_map_header),
  1296. sizeof(*coal_hdr), &__coal_hdr);
  1297. if (!coal_hdr)
  1298. return -EINVAL;
  1299. veid = coal_hdr->virtual_channel_id;
  1300. if (coal_hdr->num_nlos == 0 ||
  1301. coal_hdr->num_nlos > RMNET_MAP_V5_MAX_NLOS) {
  1302. priv->stats.coal.coal_hdr_nlo_err++;
  1303. return -EINVAL;
  1304. }
  1305. for (i = 0; i < RMNET_MAP_V5_MAX_NLOS; i++) {
  1306. /* If there is a checksum issue, we need to split
  1307. * up the skb. Rebuild the full csum error field
  1308. */
  1309. u8 err = coal_hdr->nl_pairs[i].csum_error_bitmap;
  1310. u8 pkt = coal_hdr->nl_pairs[i].num_packets;
  1311. mask |= ((u64)err) << (8 * i);
  1312. /* Track total packets in frame */
  1313. pkts += pkt;
  1314. if (pkts > RMNET_MAP_V5_MAX_PACKETS) {
  1315. priv->stats.coal.coal_hdr_pkt_err++;
  1316. return -EINVAL;
  1317. }
  1318. }
  1319. /* Track number of packets we get inside of coalesced frames */
  1320. priv->stats.coal.coal_pkts += pkts;
  1321. /* Update ethtool stats */
  1322. rmnet_frag_data_log_close_stats(priv,
  1323. coal_hdr->close_type,
  1324. coal_hdr->close_value);
  1325. if (veid < RMNET_MAX_VEID)
  1326. priv->stats.coal.coal_veid[veid]++;
  1327. *nlo_err_mask = mask;
  1328. return 0;
  1329. }
  1330. static int rmnet_frag_checksum_pkt(struct rmnet_frag_descriptor *frag_desc)
  1331. {
  1332. struct rmnet_priv *priv = netdev_priv(frag_desc->dev);
  1333. struct rmnet_fragment *frag;
  1334. int offset = sizeof(struct rmnet_map_header) +
  1335. sizeof(struct rmnet_map_v5_csum_header);
  1336. u8 *version, __version;
  1337. __wsum csum;
  1338. u16 csum_len;
  1339. version = rmnet_frag_header_ptr(frag_desc, offset, sizeof(*version),
  1340. &__version);
  1341. if (!version)
  1342. return -EINVAL;
  1343. if ((*version & 0xF0) == 0x40) {
  1344. struct iphdr *iph;
  1345. u8 __iph[60]; /* Max IP header size (0xF * 4) */
  1346. /* We need to access the entire IP header including options
  1347. * to validate its checksum. Fortunately, the version byte
  1348. * also will tell us the length, so we only need to pull
  1349. * once ;)
  1350. */
  1351. frag_desc->ip_len = (*version & 0xF) * 4;
  1352. iph = rmnet_frag_header_ptr(frag_desc, offset,
  1353. frag_desc->ip_len,
  1354. __iph);
  1355. if (!iph || ip_is_fragment(iph))
  1356. return -EINVAL;
  1357. /* Length needs to be sensible */
  1358. csum_len = ntohs(iph->tot_len);
  1359. if (csum_len > frag_desc->len - offset)
  1360. return -EINVAL;
  1361. csum_len -= frag_desc->ip_len;
  1362. /* IPv4 checksum must be valid */
  1363. if (ip_fast_csum((u8 *)iph, iph->ihl)) {
  1364. priv->stats.csum_sw++;
  1365. return 0;
  1366. }
  1367. frag_desc->ip_proto = 4;
  1368. frag_desc->trans_proto = iph->protocol;
  1369. csum = ~csum_tcpudp_magic(iph->saddr, iph->daddr,
  1370. csum_len,
  1371. frag_desc->trans_proto, 0);
  1372. } else if ((*version & 0xF0) == 0x60) {
  1373. struct ipv6hdr *ip6h, __ip6h;
  1374. int ip_len;
  1375. __be16 frag_off;
  1376. u8 protocol;
  1377. ip6h = rmnet_frag_header_ptr(frag_desc, offset, sizeof(*ip6h),
  1378. &__ip6h);
  1379. if (!ip6h)
  1380. return -EINVAL;
  1381. frag_desc->ip_proto = 6;
  1382. protocol = ip6h->nexthdr;
  1383. ip_len = rmnet_frag_ipv6_skip_exthdr(frag_desc,
  1384. offset + sizeof(*ip6h),
  1385. &protocol, &frag_off);
  1386. if (ip_len < 0 || frag_off)
  1387. return -EINVAL;
  1388. /* Length needs to be sensible */
  1389. frag_desc->ip_len = (u16)ip_len;
  1390. csum_len = ntohs(ip6h->payload_len);
  1391. if (csum_len + frag_desc->ip_len > frag_desc->len - offset)
  1392. return -EINVAL;
  1393. frag_desc->trans_proto = protocol;
  1394. csum = ~csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
  1395. csum_len,
  1396. frag_desc->trans_proto, 0);
  1397. } else {
  1398. /* Not checksumable */
  1399. return -EINVAL;
  1400. }
  1401. /* Protocol check */
  1402. if (frag_desc->trans_proto != IPPROTO_TCP &&
  1403. frag_desc->trans_proto != IPPROTO_UDP)
  1404. return -EINVAL;
  1405. offset += frag_desc->ip_len;
  1406. /* Check for UDP zero csum packets */
  1407. if (frag_desc->trans_proto == IPPROTO_UDP) {
  1408. struct udphdr *uh, __uh;
  1409. uh = rmnet_frag_header_ptr(frag_desc, offset, sizeof(*uh),
  1410. &__uh);
  1411. if (!uh)
  1412. return -EINVAL;
  1413. if (!uh->check) {
  1414. if (frag_desc->ip_proto == 4) {
  1415. /* Zero checksum is valid */
  1416. priv->stats.csum_sw++;
  1417. return 1;
  1418. }
  1419. /* Not valid in IPv6 */
  1420. priv->stats.csum_sw++;
  1421. return 0;
  1422. }
  1423. }
  1424. /* Walk the frags and checksum each chunk */
  1425. list_for_each_entry(frag, &frag_desc->frags, list) {
  1426. u32 frag_size = skb_frag_size(&frag->frag);
  1427. if (!csum_len)
  1428. break;
  1429. if (offset < frag_size) {
  1430. void *addr = skb_frag_address(&frag->frag) + offset;
  1431. u32 len = min_t(u32, csum_len, frag_size - offset);
  1432. /* Checksum 'len' bytes and add them in */
  1433. csum = csum_partial(addr, len, csum);
  1434. csum_len -= len;
  1435. offset = 0;
  1436. } else {
  1437. offset -= frag_size;
  1438. }
  1439. }
  1440. priv->stats.csum_sw++;
  1441. return !csum_fold(csum);
  1442. }
  1443. /* Process a QMAPv5 packet header */
  1444. int rmnet_frag_process_next_hdr_packet(struct rmnet_frag_descriptor *frag_desc,
  1445. struct rmnet_port *port,
  1446. struct list_head *list,
  1447. u16 len)
  1448. {
  1449. struct rmnet_map_v5_csum_header *csum_hdr, __csum_hdr;
  1450. struct rmnet_priv *priv = netdev_priv(frag_desc->dev);
  1451. u64 nlo_err_mask;
  1452. u32 offset = sizeof(struct rmnet_map_header);
  1453. int rc = 0;
  1454. /* Grab the header type. It's easier to grab enough for a full csum
  1455. * offload header here since it's only 8 bytes and then check the
  1456. * header type using that. This also doubles as a check to make sure
  1457. * there's enough data after the QMAP header to ensure that another
  1458. * header is present.
  1459. */
  1460. csum_hdr = rmnet_frag_header_ptr(frag_desc, offset, sizeof(*csum_hdr),
  1461. &__csum_hdr);
  1462. if (!csum_hdr)
  1463. return -EINVAL;
  1464. switch (csum_hdr->header_type) {
  1465. case RMNET_MAP_HEADER_TYPE_COALESCING:
  1466. priv->stats.coal.coal_rx++;
  1467. rc = rmnet_frag_data_check_coal_header(frag_desc,
  1468. &nlo_err_mask);
  1469. if (rc)
  1470. return rc;
  1471. rmnet_frag_segment_coal_data(frag_desc, nlo_err_mask, port,
  1472. list);
  1473. if (list_first_entry(list, struct rmnet_frag_descriptor,
  1474. list) != frag_desc)
  1475. rmnet_recycle_frag_descriptor(frag_desc, port);
  1476. break;
  1477. case RMNET_MAP_HEADER_TYPE_CSUM_OFFLOAD:
  1478. if (unlikely(!(frag_desc->dev->features & NETIF_F_RXCSUM))) {
  1479. priv->stats.csum_sw++;
  1480. } else if (csum_hdr->csum_valid_required) {
  1481. priv->stats.csum_ok++;
  1482. frag_desc->csum_valid = true;
  1483. } else {
  1484. int valid = rmnet_frag_checksum_pkt(frag_desc);
  1485. if (valid < 0) {
  1486. priv->stats.csum_validation_failed++;
  1487. } else if (valid) {
  1488. /* All's good */
  1489. priv->stats.csum_ok++;
  1490. frag_desc->csum_valid = true;
  1491. } else {
  1492. /* Checksum is actually bad */
  1493. priv->stats.csum_valid_unset++;
  1494. }
  1495. }
  1496. if (!rmnet_frag_pull(frag_desc, port,
  1497. offset + sizeof(*csum_hdr))) {
  1498. rc = -EINVAL;
  1499. break;
  1500. }
  1501. /* Remove padding only for csum offload packets.
  1502. * Coalesced packets should never have padding.
  1503. */
  1504. if (!rmnet_frag_trim(frag_desc, port, len)) {
  1505. rc = -EINVAL;
  1506. break;
  1507. }
  1508. list_del_init(&frag_desc->list);
  1509. list_add_tail(&frag_desc->list, list);
  1510. break;
  1511. default:
  1512. rc = -EINVAL;
  1513. break;
  1514. }
  1515. return rc;
  1516. }
  1517. /* Perf hook handler */
  1518. rmnet_perf_desc_hook_t rmnet_perf_desc_entry __rcu __read_mostly;
  1519. EXPORT_SYMBOL(rmnet_perf_desc_entry);
  1520. static void
  1521. __rmnet_frag_ingress_handler(struct rmnet_frag_descriptor *frag_desc,
  1522. struct rmnet_port *port)
  1523. {
  1524. rmnet_perf_desc_hook_t rmnet_perf_ingress;
  1525. struct rmnet_map_header *qmap, __qmap;
  1526. struct rmnet_endpoint *ep;
  1527. struct rmnet_frag_descriptor *frag, *tmp;
  1528. LIST_HEAD(segs);
  1529. u16 len, pad;
  1530. u8 mux_id;
  1531. bool skip_perf = (frag_desc->priority == 0xda1a);
  1532. qmap = rmnet_frag_header_ptr(frag_desc, 0, sizeof(*qmap), &__qmap);
  1533. if (!qmap)
  1534. goto recycle;
  1535. mux_id = qmap->mux_id;
  1536. pad = qmap->pad_len;
  1537. len = ntohs(qmap->pkt_len) - pad;
  1538. if (qmap->cd_bit) {
  1539. qmi_rmnet_set_dl_msg_active(port);
  1540. if (port->data_format & RMNET_INGRESS_FORMAT_DL_MARKER) {
  1541. rmnet_frag_flow_command(frag_desc, port, len);
  1542. goto recycle;
  1543. }
  1544. if (port->data_format & RMNET_FLAGS_INGRESS_MAP_COMMANDS)
  1545. rmnet_frag_command(frag_desc, qmap, port);
  1546. goto recycle;
  1547. }
  1548. if (mux_id >= RMNET_MAX_LOGICAL_EP)
  1549. goto recycle;
  1550. ep = rmnet_get_endpoint(port, mux_id);
  1551. if (!ep)
  1552. goto recycle;
  1553. frag_desc->dev = ep->egress_dev;
  1554. /* Handle QMAPv5 packet */
  1555. if (qmap->next_hdr &&
  1556. (port->data_format & (RMNET_FLAGS_INGRESS_COALESCE |
  1557. RMNET_PRIV_FLAGS_INGRESS_MAP_CKSUMV5))) {
  1558. if (rmnet_frag_process_next_hdr_packet(frag_desc, port, &segs,
  1559. len))
  1560. goto recycle;
  1561. } else {
  1562. /* We only have the main QMAP header to worry about */
  1563. if (!rmnet_frag_pull(frag_desc, port, sizeof(*qmap)))
  1564. return;
  1565. if (!rmnet_frag_trim(frag_desc, port, len))
  1566. return;
  1567. list_add_tail(&frag_desc->list, &segs);
  1568. }
  1569. if (port->data_format & RMNET_INGRESS_FORMAT_PS)
  1570. qmi_rmnet_work_maybe_restart(port,
  1571. list_first_entry_or_null(&segs,
  1572. struct rmnet_frag_descriptor,
  1573. list),
  1574. NULL);
  1575. if (skip_perf)
  1576. goto no_perf;
  1577. rcu_read_lock();
  1578. rmnet_perf_ingress = rcu_dereference(rmnet_perf_desc_entry);
  1579. if (rmnet_perf_ingress) {
  1580. list_for_each_entry_safe(frag, tmp, &segs, list) {
  1581. list_del_init(&frag->list);
  1582. rmnet_perf_ingress(frag, port);
  1583. }
  1584. rcu_read_unlock();
  1585. return;
  1586. }
  1587. rcu_read_unlock();
  1588. no_perf:
  1589. list_for_each_entry_safe(frag, tmp, &segs, list) {
  1590. list_del_init(&frag->list);
  1591. rmnet_frag_deliver(frag, port);
  1592. }
  1593. return;
  1594. recycle:
  1595. rmnet_recycle_frag_descriptor(frag_desc, port);
  1596. }
  1597. /* Notify perf at the end of SKB chain */
  1598. rmnet_perf_chain_hook_t rmnet_perf_chain_end __rcu __read_mostly;
  1599. EXPORT_SYMBOL(rmnet_perf_chain_end);
  1600. void rmnet_descriptor_classify_chain_count(u64 chain_count,
  1601. struct rmnet_port *port)
  1602. {
  1603. u64 index;
  1604. if (chain_count >= 60) {
  1605. port->stats.dl_chain_stat[6] += chain_count;
  1606. return;
  1607. }
  1608. index = chain_count;
  1609. do_div(index, 10);
  1610. port->stats.dl_chain_stat[index] += chain_count;
  1611. }
  1612. void rmnet_descriptor_classify_frag_count(u64 frag_count,
  1613. struct rmnet_port *port)
  1614. {
  1615. u64 index;
  1616. if (frag_count <= 1) {
  1617. port->stats.dl_frag_stat_1 += frag_count;
  1618. return;
  1619. }
  1620. if (frag_count >= 16) {
  1621. port->stats.dl_frag_stat[4] += frag_count;
  1622. return;
  1623. }
  1624. index = frag_count;
  1625. do_div(index, 4);
  1626. port->stats.dl_frag_stat[index] += frag_count;
  1627. }
  1628. void rmnet_frag_ingress_handler(struct sk_buff *skb,
  1629. struct rmnet_port *port)
  1630. {
  1631. rmnet_perf_chain_hook_t rmnet_perf_opt_chain_end;
  1632. LIST_HEAD(desc_list);
  1633. bool skip_perf = (skb->priority == 0xda1a);
  1634. u64 chain_count = 0;
  1635. struct sk_buff *head = skb;
  1636. /* Deaggregation and freeing of HW originating
  1637. * buffers is done within here
  1638. */
  1639. while (skb) {
  1640. struct sk_buff *skb_frag;
  1641. chain_count++;
  1642. rmnet_descriptor_classify_frag_count(skb_shinfo(skb)->nr_frags,
  1643. port);
  1644. rmnet_frag_deaggregate(skb, port, &desc_list, skb->priority);
  1645. if (!list_empty(&desc_list)) {
  1646. struct rmnet_frag_descriptor *frag_desc, *tmp;
  1647. list_for_each_entry_safe(frag_desc, tmp, &desc_list,
  1648. list) {
  1649. list_del_init(&frag_desc->list);
  1650. __rmnet_frag_ingress_handler(frag_desc, port);
  1651. }
  1652. }
  1653. if (skb == head) {
  1654. skb_frag = skb_shinfo(skb)->frag_list;
  1655. skb_shinfo(skb)->frag_list = NULL;
  1656. } else {
  1657. skb_frag = skb->next;
  1658. skb->next = NULL;
  1659. }
  1660. consume_skb(skb);
  1661. skb = skb_frag;
  1662. }
  1663. rmnet_descriptor_classify_chain_count(chain_count, port);
  1664. if (skip_perf)
  1665. return;
  1666. rcu_read_lock();
  1667. rmnet_perf_opt_chain_end = rcu_dereference(rmnet_perf_chain_end);
  1668. if (rmnet_perf_opt_chain_end)
  1669. rmnet_perf_opt_chain_end();
  1670. rcu_read_unlock();
  1671. }
  1672. void rmnet_descriptor_deinit(struct rmnet_port *port)
  1673. {
  1674. struct rmnet_frag_descriptor_pool *pool;
  1675. struct rmnet_frag_descriptor *frag_desc, *tmp;
  1676. pool = port->frag_desc_pool;
  1677. if (pool) {
  1678. list_for_each_entry_safe(frag_desc, tmp, &pool->free_list, list) {
  1679. kfree(frag_desc);
  1680. pool->pool_size--;
  1681. }
  1682. kfree(pool);
  1683. port->frag_desc_pool = NULL;
  1684. }
  1685. }
  1686. int rmnet_descriptor_init(struct rmnet_port *port)
  1687. {
  1688. struct rmnet_frag_descriptor_pool *pool;
  1689. int i;
  1690. spin_lock_init(&port->desc_pool_lock);
  1691. pool = kzalloc(sizeof(*pool), GFP_ATOMIC);
  1692. if (!pool)
  1693. return -ENOMEM;
  1694. INIT_LIST_HEAD(&pool->free_list);
  1695. port->frag_desc_pool = pool;
  1696. for (i = 0; i < RMNET_FRAG_DESCRIPTOR_POOL_SIZE; i++) {
  1697. struct rmnet_frag_descriptor *frag_desc;
  1698. frag_desc = kzalloc(sizeof(*frag_desc), GFP_ATOMIC);
  1699. if (!frag_desc)
  1700. return -ENOMEM;
  1701. INIT_LIST_HEAD(&frag_desc->list);
  1702. INIT_LIST_HEAD(&frag_desc->frags);
  1703. list_add_tail(&frag_desc->list, &pool->free_list);
  1704. pool->pool_size++;
  1705. }
  1706. return 0;
  1707. }