Loading...
1// SPDX-License-Identifier: GPL-2.0-only
2/* Copyright (c) 2013-2018, 2021, The Linux Foundation. All rights reserved.
3 *
4 * RMNET Data MAP protocol
5 */
6
7#include <linux/netdevice.h>
8#include <linux/ip.h>
9#include <linux/ipv6.h>
10#include <net/ip6_checksum.h>
11#include <linux/bitfield.h>
12#include "rmnet_config.h"
13#include "rmnet_map.h"
14#include "rmnet_private.h"
15#include "rmnet_vnd.h"
16
17#define RMNET_MAP_DEAGGR_SPACING 64
18#define RMNET_MAP_DEAGGR_HEADROOM (RMNET_MAP_DEAGGR_SPACING / 2)
19
20static __sum16 *rmnet_map_get_csum_field(unsigned char protocol,
21 const void *txporthdr)
22{
23 if (protocol == IPPROTO_TCP)
24 return &((struct tcphdr *)txporthdr)->check;
25
26 if (protocol == IPPROTO_UDP)
27 return &((struct udphdr *)txporthdr)->check;
28
29 return NULL;
30}
31
32static int
33rmnet_map_ipv4_dl_csum_trailer(struct sk_buff *skb,
34 struct rmnet_map_dl_csum_trailer *csum_trailer,
35 struct rmnet_priv *priv)
36{
37 struct iphdr *ip4h = (struct iphdr *)skb->data;
38 void *txporthdr = skb->data + ip4h->ihl * 4;
39 __sum16 *csum_field, pseudo_csum;
40 __sum16 ip_payload_csum;
41
42 /* Computing the checksum over just the IPv4 header--including its
43 * checksum field--should yield 0. If it doesn't, the IP header
44 * is bad, so return an error and let the IP layer drop it.
45 */
46 if (ip_fast_csum(ip4h, ip4h->ihl)) {
47 priv->stats.csum_ip4_header_bad++;
48 return -EINVAL;
49 }
50
51 /* We don't support checksum offload on IPv4 fragments */
52 if (ip_is_fragment(ip4h)) {
53 priv->stats.csum_fragmented_pkt++;
54 return -EOPNOTSUPP;
55 }
56
57 /* Checksum offload is only supported for UDP and TCP protocols */
58 csum_field = rmnet_map_get_csum_field(ip4h->protocol, txporthdr);
59 if (!csum_field) {
60 priv->stats.csum_err_invalid_transport++;
61 return -EPROTONOSUPPORT;
62 }
63
64 /* RFC 768: UDP checksum is optional for IPv4, and is 0 if unused */
65 if (!*csum_field && ip4h->protocol == IPPROTO_UDP) {
66 priv->stats.csum_skipped++;
67 return 0;
68 }
69
70 /* The checksum value in the trailer is computed over the entire
71 * IP packet, including the IP header and payload. To derive the
72 * transport checksum from this, we first subract the contribution
73 * of the IP header from the trailer checksum. We then add the
74 * checksum computed over the pseudo header.
75 *
76 * We verified above that the IP header contributes zero to the
77 * trailer checksum. Therefore the checksum in the trailer is
78 * just the checksum computed over the IP payload.
79
80 * If the IP payload arrives intact, adding the pseudo header
81 * checksum to the IP payload checksum will yield 0xffff (negative
82 * zero). This means the trailer checksum and the pseudo checksum
83 * are additive inverses of each other. Put another way, the
84 * message passes the checksum test if the trailer checksum value
85 * is the negated pseudo header checksum.
86 *
87 * Knowing this, we don't even need to examine the transport
88 * header checksum value; it is already accounted for in the
89 * checksum value found in the trailer.
90 */
91 ip_payload_csum = csum_trailer->csum_value;
92
93 pseudo_csum = csum_tcpudp_magic(ip4h->saddr, ip4h->daddr,
94 ntohs(ip4h->tot_len) - ip4h->ihl * 4,
95 ip4h->protocol, 0);
96
97 /* The cast is required to ensure only the low 16 bits are examined */
98 if (ip_payload_csum != (__sum16)~pseudo_csum) {
99 priv->stats.csum_validation_failed++;
100 return -EINVAL;
101 }
102
103 priv->stats.csum_ok++;
104 return 0;
105}
106
107#if IS_ENABLED(CONFIG_IPV6)
108static int
109rmnet_map_ipv6_dl_csum_trailer(struct sk_buff *skb,
110 struct rmnet_map_dl_csum_trailer *csum_trailer,
111 struct rmnet_priv *priv)
112{
113 struct ipv6hdr *ip6h = (struct ipv6hdr *)skb->data;
114 void *txporthdr = skb->data + sizeof(*ip6h);
115 __sum16 *csum_field, pseudo_csum;
116 __sum16 ip6_payload_csum;
117 __be16 ip_header_csum;
118
119 /* Checksum offload is only supported for UDP and TCP protocols;
120 * the packet cannot include any IPv6 extension headers
121 */
122 csum_field = rmnet_map_get_csum_field(ip6h->nexthdr, txporthdr);
123 if (!csum_field) {
124 priv->stats.csum_err_invalid_transport++;
125 return -EPROTONOSUPPORT;
126 }
127
128 /* The checksum value in the trailer is computed over the entire
129 * IP packet, including the IP header and payload. To derive the
130 * transport checksum from this, we first subract the contribution
131 * of the IP header from the trailer checksum. We then add the
132 * checksum computed over the pseudo header.
133 */
134 ip_header_csum = (__force __be16)ip_fast_csum(ip6h, sizeof(*ip6h) / 4);
135 ip6_payload_csum = csum16_sub(csum_trailer->csum_value, ip_header_csum);
136
137 pseudo_csum = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
138 ntohs(ip6h->payload_len),
139 ip6h->nexthdr, 0);
140
141 /* It's sufficient to compare the IP payload checksum with the
142 * negated pseudo checksum to determine whether the packet
143 * checksum was good. (See further explanation in comments
144 * in rmnet_map_ipv4_dl_csum_trailer()).
145 *
146 * The cast is required to ensure only the low 16 bits are
147 * examined.
148 */
149 if (ip6_payload_csum != (__sum16)~pseudo_csum) {
150 priv->stats.csum_validation_failed++;
151 return -EINVAL;
152 }
153
154 priv->stats.csum_ok++;
155 return 0;
156}
157#else
158static int
159rmnet_map_ipv6_dl_csum_trailer(struct sk_buff *skb,
160 struct rmnet_map_dl_csum_trailer *csum_trailer,
161 struct rmnet_priv *priv)
162{
163 return 0;
164}
165#endif
166
167static void rmnet_map_complement_ipv4_txporthdr_csum_field(struct iphdr *ip4h)
168{
169 void *txphdr;
170 u16 *csum;
171
172 txphdr = (void *)ip4h + ip4h->ihl * 4;
173
174 if (ip4h->protocol == IPPROTO_TCP || ip4h->protocol == IPPROTO_UDP) {
175 csum = (u16 *)rmnet_map_get_csum_field(ip4h->protocol, txphdr);
176 *csum = ~(*csum);
177 }
178}
179
180static void
181rmnet_map_ipv4_ul_csum_header(struct iphdr *iphdr,
182 struct rmnet_map_ul_csum_header *ul_header,
183 struct sk_buff *skb)
184{
185 u16 val;
186
187 val = MAP_CSUM_UL_ENABLED_FLAG;
188 if (iphdr->protocol == IPPROTO_UDP)
189 val |= MAP_CSUM_UL_UDP_FLAG;
190 val |= skb->csum_offset & MAP_CSUM_UL_OFFSET_MASK;
191
192 ul_header->csum_start_offset = htons(skb_network_header_len(skb));
193 ul_header->csum_info = htons(val);
194
195 skb->ip_summed = CHECKSUM_NONE;
196
197 rmnet_map_complement_ipv4_txporthdr_csum_field(iphdr);
198}
199
200#if IS_ENABLED(CONFIG_IPV6)
201static void
202rmnet_map_complement_ipv6_txporthdr_csum_field(struct ipv6hdr *ip6h)
203{
204 void *txphdr;
205 u16 *csum;
206
207 txphdr = ip6h + 1;
208
209 if (ip6h->nexthdr == IPPROTO_TCP || ip6h->nexthdr == IPPROTO_UDP) {
210 csum = (u16 *)rmnet_map_get_csum_field(ip6h->nexthdr, txphdr);
211 *csum = ~(*csum);
212 }
213}
214
215static void
216rmnet_map_ipv6_ul_csum_header(struct ipv6hdr *ipv6hdr,
217 struct rmnet_map_ul_csum_header *ul_header,
218 struct sk_buff *skb)
219{
220 u16 val;
221
222 val = MAP_CSUM_UL_ENABLED_FLAG;
223 if (ipv6hdr->nexthdr == IPPROTO_UDP)
224 val |= MAP_CSUM_UL_UDP_FLAG;
225 val |= skb->csum_offset & MAP_CSUM_UL_OFFSET_MASK;
226
227 ul_header->csum_start_offset = htons(skb_network_header_len(skb));
228 ul_header->csum_info = htons(val);
229
230 skb->ip_summed = CHECKSUM_NONE;
231
232 rmnet_map_complement_ipv6_txporthdr_csum_field(ipv6hdr);
233}
234#else
235static void
236rmnet_map_ipv6_ul_csum_header(void *ip6hdr,
237 struct rmnet_map_ul_csum_header *ul_header,
238 struct sk_buff *skb)
239{
240}
241#endif
242
243static void rmnet_map_v5_checksum_uplink_packet(struct sk_buff *skb,
244 struct rmnet_port *port,
245 struct net_device *orig_dev)
246{
247 struct rmnet_priv *priv = netdev_priv(orig_dev);
248 struct rmnet_map_v5_csum_header *ul_header;
249
250 ul_header = skb_push(skb, sizeof(*ul_header));
251 memset(ul_header, 0, sizeof(*ul_header));
252 ul_header->header_info = u8_encode_bits(RMNET_MAP_HEADER_TYPE_CSUM_OFFLOAD,
253 MAPV5_HDRINFO_HDR_TYPE_FMASK);
254
255 if (skb->ip_summed == CHECKSUM_PARTIAL) {
256 void *iph = ip_hdr(skb);
257 __sum16 *check;
258 void *trans;
259 u8 proto;
260
261 if (skb->protocol == htons(ETH_P_IP)) {
262 u16 ip_len = ((struct iphdr *)iph)->ihl * 4;
263
264 proto = ((struct iphdr *)iph)->protocol;
265 trans = iph + ip_len;
266 } else if (IS_ENABLED(CONFIG_IPV6) &&
267 skb->protocol == htons(ETH_P_IPV6)) {
268 u16 ip_len = sizeof(struct ipv6hdr);
269
270 proto = ((struct ipv6hdr *)iph)->nexthdr;
271 trans = iph + ip_len;
272 } else {
273 priv->stats.csum_err_invalid_ip_version++;
274 goto sw_csum;
275 }
276
277 check = rmnet_map_get_csum_field(proto, trans);
278 if (check) {
279 skb->ip_summed = CHECKSUM_NONE;
280 /* Ask for checksum offloading */
281 ul_header->csum_info |= MAPV5_CSUMINFO_VALID_FLAG;
282 priv->stats.csum_hw++;
283 return;
284 }
285 }
286
287sw_csum:
288 priv->stats.csum_sw++;
289}
290
291/* Adds MAP header to front of skb->data
292 * Padding is calculated and set appropriately in MAP header. Mux ID is
293 * initialized to 0.
294 */
295struct rmnet_map_header *rmnet_map_add_map_header(struct sk_buff *skb,
296 int hdrlen,
297 struct rmnet_port *port,
298 int pad)
299{
300 struct rmnet_map_header *map_header;
301 u32 padding, map_datalen;
302
303 map_datalen = skb->len - hdrlen;
304 map_header = (struct rmnet_map_header *)
305 skb_push(skb, sizeof(struct rmnet_map_header));
306 memset(map_header, 0, sizeof(struct rmnet_map_header));
307
308 /* Set next_hdr bit for csum offload packets */
309 if (port->data_format & RMNET_FLAGS_EGRESS_MAP_CKSUMV5)
310 map_header->flags |= MAP_NEXT_HEADER_FLAG;
311
312 if (pad == RMNET_MAP_NO_PAD_BYTES) {
313 map_header->pkt_len = htons(map_datalen);
314 return map_header;
315 }
316
317 BUILD_BUG_ON(MAP_PAD_LEN_MASK < 3);
318 padding = ALIGN(map_datalen, 4) - map_datalen;
319
320 if (padding == 0)
321 goto done;
322
323 if (skb_tailroom(skb) < padding)
324 return NULL;
325
326 skb_put_zero(skb, padding);
327
328done:
329 map_header->pkt_len = htons(map_datalen + padding);
330 /* This is a data packet, so the CMD bit is 0 */
331 map_header->flags = padding & MAP_PAD_LEN_MASK;
332
333 return map_header;
334}
335
336/* Deaggregates a single packet
337 * A whole new buffer is allocated for each portion of an aggregated frame.
338 * Caller should keep calling deaggregate() on the source skb until 0 is
339 * returned, indicating that there are no more packets to deaggregate. Caller
340 * is responsible for freeing the original skb.
341 */
342struct sk_buff *rmnet_map_deaggregate(struct sk_buff *skb,
343 struct rmnet_port *port)
344{
345 struct rmnet_map_v5_csum_header *next_hdr = NULL;
346 struct rmnet_map_header *maph;
347 void *data = skb->data;
348 struct sk_buff *skbn;
349 u8 nexthdr_type;
350 u32 packet_len;
351
352 if (skb->len == 0)
353 return NULL;
354
355 maph = (struct rmnet_map_header *)skb->data;
356 packet_len = ntohs(maph->pkt_len) + sizeof(*maph);
357
358 if (port->data_format & RMNET_FLAGS_INGRESS_MAP_CKSUMV4) {
359 packet_len += sizeof(struct rmnet_map_dl_csum_trailer);
360 } else if (port->data_format & RMNET_FLAGS_INGRESS_MAP_CKSUMV5) {
361 if (!(maph->flags & MAP_CMD_FLAG)) {
362 packet_len += sizeof(*next_hdr);
363 if (maph->flags & MAP_NEXT_HEADER_FLAG)
364 next_hdr = data + sizeof(*maph);
365 else
366 /* Mapv5 data pkt without csum hdr is invalid */
367 return NULL;
368 }
369 }
370
371 if (((int)skb->len - (int)packet_len) < 0)
372 return NULL;
373
374 /* Some hardware can send us empty frames. Catch them */
375 if (!maph->pkt_len)
376 return NULL;
377
378 if (next_hdr) {
379 nexthdr_type = u8_get_bits(next_hdr->header_info,
380 MAPV5_HDRINFO_HDR_TYPE_FMASK);
381 if (nexthdr_type != RMNET_MAP_HEADER_TYPE_CSUM_OFFLOAD)
382 return NULL;
383 }
384
385 skbn = alloc_skb(packet_len + RMNET_MAP_DEAGGR_SPACING, GFP_ATOMIC);
386 if (!skbn)
387 return NULL;
388
389 skb_reserve(skbn, RMNET_MAP_DEAGGR_HEADROOM);
390 skb_put(skbn, packet_len);
391 memcpy(skbn->data, skb->data, packet_len);
392 skb_pull(skb, packet_len);
393
394 return skbn;
395}
396
397/* Validates packet checksums. Function takes a pointer to
398 * the beginning of a buffer which contains the IP payload +
399 * padding + checksum trailer.
400 * Only IPv4 and IPv6 are supported along with TCP & UDP.
401 * Fragmented or tunneled packets are not supported.
402 */
403int rmnet_map_checksum_downlink_packet(struct sk_buff *skb, u16 len)
404{
405 struct rmnet_priv *priv = netdev_priv(skb->dev);
406 struct rmnet_map_dl_csum_trailer *csum_trailer;
407
408 if (unlikely(!(skb->dev->features & NETIF_F_RXCSUM))) {
409 priv->stats.csum_sw++;
410 return -EOPNOTSUPP;
411 }
412
413 csum_trailer = (struct rmnet_map_dl_csum_trailer *)(skb->data + len);
414
415 if (!(csum_trailer->flags & MAP_CSUM_DL_VALID_FLAG)) {
416 priv->stats.csum_valid_unset++;
417 return -EINVAL;
418 }
419
420 if (skb->protocol == htons(ETH_P_IP))
421 return rmnet_map_ipv4_dl_csum_trailer(skb, csum_trailer, priv);
422
423 if (IS_ENABLED(CONFIG_IPV6) && skb->protocol == htons(ETH_P_IPV6))
424 return rmnet_map_ipv6_dl_csum_trailer(skb, csum_trailer, priv);
425
426 priv->stats.csum_err_invalid_ip_version++;
427
428 return -EPROTONOSUPPORT;
429}
430
431static void rmnet_map_v4_checksum_uplink_packet(struct sk_buff *skb,
432 struct net_device *orig_dev)
433{
434 struct rmnet_priv *priv = netdev_priv(orig_dev);
435 struct rmnet_map_ul_csum_header *ul_header;
436 void *iphdr;
437
438 ul_header = (struct rmnet_map_ul_csum_header *)
439 skb_push(skb, sizeof(struct rmnet_map_ul_csum_header));
440
441 if (unlikely(!(orig_dev->features &
442 (NETIF_F_IP_CSUM | NETIF_F_IPV6_CSUM))))
443 goto sw_csum;
444
445 if (skb->ip_summed != CHECKSUM_PARTIAL)
446 goto sw_csum;
447
448 iphdr = (char *)ul_header +
449 sizeof(struct rmnet_map_ul_csum_header);
450
451 if (skb->protocol == htons(ETH_P_IP)) {
452 rmnet_map_ipv4_ul_csum_header(iphdr, ul_header, skb);
453 priv->stats.csum_hw++;
454 return;
455 }
456
457 if (IS_ENABLED(CONFIG_IPV6) && skb->protocol == htons(ETH_P_IPV6)) {
458 rmnet_map_ipv6_ul_csum_header(iphdr, ul_header, skb);
459 priv->stats.csum_hw++;
460 return;
461 }
462
463 priv->stats.csum_err_invalid_ip_version++;
464
465sw_csum:
466 memset(ul_header, 0, sizeof(*ul_header));
467
468 priv->stats.csum_sw++;
469}
470
471/* Generates UL checksum meta info header for IPv4 and IPv6 over TCP and UDP
472 * packets that are supported for UL checksum offload.
473 */
474void rmnet_map_checksum_uplink_packet(struct sk_buff *skb,
475 struct rmnet_port *port,
476 struct net_device *orig_dev,
477 int csum_type)
478{
479 switch (csum_type) {
480 case RMNET_FLAGS_EGRESS_MAP_CKSUMV4:
481 rmnet_map_v4_checksum_uplink_packet(skb, orig_dev);
482 break;
483 case RMNET_FLAGS_EGRESS_MAP_CKSUMV5:
484 rmnet_map_v5_checksum_uplink_packet(skb, port, orig_dev);
485 break;
486 default:
487 break;
488 }
489}
490
491/* Process a MAPv5 packet header */
492int rmnet_map_process_next_hdr_packet(struct sk_buff *skb,
493 u16 len)
494{
495 struct rmnet_priv *priv = netdev_priv(skb->dev);
496 struct rmnet_map_v5_csum_header *next_hdr;
497 u8 nexthdr_type;
498
499 next_hdr = (struct rmnet_map_v5_csum_header *)(skb->data +
500 sizeof(struct rmnet_map_header));
501
502 nexthdr_type = u8_get_bits(next_hdr->header_info,
503 MAPV5_HDRINFO_HDR_TYPE_FMASK);
504
505 if (nexthdr_type != RMNET_MAP_HEADER_TYPE_CSUM_OFFLOAD)
506 return -EINVAL;
507
508 if (unlikely(!(skb->dev->features & NETIF_F_RXCSUM))) {
509 priv->stats.csum_sw++;
510 } else if (next_hdr->csum_info & MAPV5_CSUMINFO_VALID_FLAG) {
511 priv->stats.csum_ok++;
512 skb->ip_summed = CHECKSUM_UNNECESSARY;
513 } else {
514 priv->stats.csum_valid_unset++;
515 }
516
517 /* Pull csum v5 header */
518 skb_pull(skb, sizeof(*next_hdr));
519
520 return 0;
521}
522
523#define RMNET_AGG_BYPASS_TIME_NSEC 10000000L
524
525static void reset_aggr_params(struct rmnet_port *port)
526{
527 port->skbagg_head = NULL;
528 port->agg_count = 0;
529 port->agg_state = 0;
530 memset(&port->agg_time, 0, sizeof(struct timespec64));
531}
532
533static void rmnet_send_skb(struct rmnet_port *port, struct sk_buff *skb)
534{
535 if (skb_needs_linearize(skb, port->dev->features)) {
536 if (unlikely(__skb_linearize(skb))) {
537 struct rmnet_priv *priv;
538
539 priv = netdev_priv(port->rmnet_dev);
540 this_cpu_inc(priv->pcpu_stats->stats.tx_drops);
541 dev_kfree_skb_any(skb);
542 return;
543 }
544 }
545
546 dev_queue_xmit(skb);
547}
548
549static void rmnet_map_flush_tx_packet_work(struct work_struct *work)
550{
551 struct sk_buff *skb = NULL;
552 struct rmnet_port *port;
553
554 port = container_of(work, struct rmnet_port, agg_wq);
555
556 spin_lock_bh(&port->agg_lock);
557 if (likely(port->agg_state == -EINPROGRESS)) {
558 /* Buffer may have already been shipped out */
559 if (likely(port->skbagg_head)) {
560 skb = port->skbagg_head;
561 reset_aggr_params(port);
562 }
563 port->agg_state = 0;
564 }
565
566 spin_unlock_bh(&port->agg_lock);
567 if (skb)
568 rmnet_send_skb(port, skb);
569}
570
571static enum hrtimer_restart rmnet_map_flush_tx_packet_queue(struct hrtimer *t)
572{
573 struct rmnet_port *port;
574
575 port = container_of(t, struct rmnet_port, hrtimer);
576
577 schedule_work(&port->agg_wq);
578
579 return HRTIMER_NORESTART;
580}
581
582unsigned int rmnet_map_tx_aggregate(struct sk_buff *skb, struct rmnet_port *port,
583 struct net_device *orig_dev)
584{
585 struct timespec64 diff, last;
586 unsigned int len = skb->len;
587 struct sk_buff *agg_skb;
588 int size;
589
590 spin_lock_bh(&port->agg_lock);
591 memcpy(&last, &port->agg_last, sizeof(struct timespec64));
592 ktime_get_real_ts64(&port->agg_last);
593
594 if (!port->skbagg_head) {
595 /* Check to see if we should agg first. If the traffic is very
596 * sparse, don't aggregate.
597 */
598new_packet:
599 diff = timespec64_sub(port->agg_last, last);
600 size = port->egress_agg_params.bytes - skb->len;
601
602 if (size < 0) {
603 /* dropped */
604 spin_unlock_bh(&port->agg_lock);
605 return 0;
606 }
607
608 if (diff.tv_sec > 0 || diff.tv_nsec > RMNET_AGG_BYPASS_TIME_NSEC ||
609 size == 0)
610 goto no_aggr;
611
612 port->skbagg_head = skb_copy_expand(skb, 0, size, GFP_ATOMIC);
613 if (!port->skbagg_head)
614 goto no_aggr;
615
616 dev_kfree_skb_any(skb);
617 port->skbagg_head->protocol = htons(ETH_P_MAP);
618 port->agg_count = 1;
619 ktime_get_real_ts64(&port->agg_time);
620 skb_frag_list_init(port->skbagg_head);
621 goto schedule;
622 }
623 diff = timespec64_sub(port->agg_last, port->agg_time);
624 size = port->egress_agg_params.bytes - port->skbagg_head->len;
625
626 if (skb->len > size) {
627 agg_skb = port->skbagg_head;
628 reset_aggr_params(port);
629 spin_unlock_bh(&port->agg_lock);
630 hrtimer_cancel(&port->hrtimer);
631 rmnet_send_skb(port, agg_skb);
632 spin_lock_bh(&port->agg_lock);
633 goto new_packet;
634 }
635
636 if (skb_has_frag_list(port->skbagg_head))
637 port->skbagg_tail->next = skb;
638 else
639 skb_shinfo(port->skbagg_head)->frag_list = skb;
640
641 port->skbagg_head->len += skb->len;
642 port->skbagg_head->data_len += skb->len;
643 port->skbagg_head->truesize += skb->truesize;
644 port->skbagg_tail = skb;
645 port->agg_count++;
646
647 if (diff.tv_sec > 0 || diff.tv_nsec > port->egress_agg_params.time_nsec ||
648 port->agg_count >= port->egress_agg_params.count ||
649 port->skbagg_head->len == port->egress_agg_params.bytes) {
650 agg_skb = port->skbagg_head;
651 reset_aggr_params(port);
652 spin_unlock_bh(&port->agg_lock);
653 hrtimer_cancel(&port->hrtimer);
654 rmnet_send_skb(port, agg_skb);
655 return len;
656 }
657
658schedule:
659 if (!hrtimer_active(&port->hrtimer) && port->agg_state != -EINPROGRESS) {
660 port->agg_state = -EINPROGRESS;
661 hrtimer_start(&port->hrtimer,
662 ns_to_ktime(port->egress_agg_params.time_nsec),
663 HRTIMER_MODE_REL);
664 }
665 spin_unlock_bh(&port->agg_lock);
666
667 return len;
668
669no_aggr:
670 spin_unlock_bh(&port->agg_lock);
671 skb->protocol = htons(ETH_P_MAP);
672 dev_queue_xmit(skb);
673
674 return len;
675}
676
677void rmnet_map_update_ul_agg_config(struct rmnet_port *port, u32 size,
678 u32 count, u32 time)
679{
680 spin_lock_bh(&port->agg_lock);
681 port->egress_agg_params.bytes = size;
682 WRITE_ONCE(port->egress_agg_params.count, count);
683 port->egress_agg_params.time_nsec = time * NSEC_PER_USEC;
684 spin_unlock_bh(&port->agg_lock);
685}
686
687void rmnet_map_tx_aggregate_init(struct rmnet_port *port)
688{
689 hrtimer_init(&port->hrtimer, CLOCK_MONOTONIC, HRTIMER_MODE_REL);
690 port->hrtimer.function = rmnet_map_flush_tx_packet_queue;
691 spin_lock_init(&port->agg_lock);
692 rmnet_map_update_ul_agg_config(port, 4096, 1, 800);
693 INIT_WORK(&port->agg_wq, rmnet_map_flush_tx_packet_work);
694}
695
696void rmnet_map_tx_aggregate_exit(struct rmnet_port *port)
697{
698 hrtimer_cancel(&port->hrtimer);
699 cancel_work_sync(&port->agg_wq);
700
701 spin_lock_bh(&port->agg_lock);
702 if (port->agg_state == -EINPROGRESS) {
703 if (port->skbagg_head) {
704 dev_kfree_skb_any(port->skbagg_head);
705 reset_aggr_params(port);
706 }
707
708 port->agg_state = 0;
709 }
710 spin_unlock_bh(&port->agg_lock);
711}
1// SPDX-License-Identifier: GPL-2.0-only
2/* Copyright (c) 2013-2018, The Linux Foundation. All rights reserved.
3 *
4 * RMNET Data MAP protocol
5 */
6
7#include <linux/netdevice.h>
8#include <linux/ip.h>
9#include <linux/ipv6.h>
10#include <net/ip6_checksum.h>
11#include "rmnet_config.h"
12#include "rmnet_map.h"
13#include "rmnet_private.h"
14
15#define RMNET_MAP_DEAGGR_SPACING 64
16#define RMNET_MAP_DEAGGR_HEADROOM (RMNET_MAP_DEAGGR_SPACING / 2)
17
18static __sum16 *rmnet_map_get_csum_field(unsigned char protocol,
19 const void *txporthdr)
20{
21 __sum16 *check = NULL;
22
23 switch (protocol) {
24 case IPPROTO_TCP:
25 check = &(((struct tcphdr *)txporthdr)->check);
26 break;
27
28 case IPPROTO_UDP:
29 check = &(((struct udphdr *)txporthdr)->check);
30 break;
31
32 default:
33 check = NULL;
34 break;
35 }
36
37 return check;
38}
39
40static int
41rmnet_map_ipv4_dl_csum_trailer(struct sk_buff *skb,
42 struct rmnet_map_dl_csum_trailer *csum_trailer,
43 struct rmnet_priv *priv)
44{
45 __sum16 *csum_field, csum_temp, pseudo_csum, hdr_csum, ip_payload_csum;
46 u16 csum_value, csum_value_final;
47 struct iphdr *ip4h;
48 void *txporthdr;
49 __be16 addend;
50
51 ip4h = (struct iphdr *)(skb->data);
52 if ((ntohs(ip4h->frag_off) & IP_MF) ||
53 ((ntohs(ip4h->frag_off) & IP_OFFSET) > 0)) {
54 priv->stats.csum_fragmented_pkt++;
55 return -EOPNOTSUPP;
56 }
57
58 txporthdr = skb->data + ip4h->ihl * 4;
59
60 csum_field = rmnet_map_get_csum_field(ip4h->protocol, txporthdr);
61
62 if (!csum_field) {
63 priv->stats.csum_err_invalid_transport++;
64 return -EPROTONOSUPPORT;
65 }
66
67 /* RFC 768 - Skip IPv4 UDP packets where sender checksum field is 0 */
68 if (*csum_field == 0 && ip4h->protocol == IPPROTO_UDP) {
69 priv->stats.csum_skipped++;
70 return 0;
71 }
72
73 csum_value = ~ntohs(csum_trailer->csum_value);
74 hdr_csum = ~ip_fast_csum(ip4h, (int)ip4h->ihl);
75 ip_payload_csum = csum16_sub((__force __sum16)csum_value,
76 (__force __be16)hdr_csum);
77
78 pseudo_csum = ~csum_tcpudp_magic(ip4h->saddr, ip4h->daddr,
79 ntohs(ip4h->tot_len) - ip4h->ihl * 4,
80 ip4h->protocol, 0);
81 addend = (__force __be16)ntohs((__force __be16)pseudo_csum);
82 pseudo_csum = csum16_add(ip_payload_csum, addend);
83
84 addend = (__force __be16)ntohs((__force __be16)*csum_field);
85 csum_temp = ~csum16_sub(pseudo_csum, addend);
86 csum_value_final = (__force u16)csum_temp;
87
88 if (unlikely(csum_value_final == 0)) {
89 switch (ip4h->protocol) {
90 case IPPROTO_UDP:
91 /* RFC 768 - DL4 1's complement rule for UDP csum 0 */
92 csum_value_final = ~csum_value_final;
93 break;
94
95 case IPPROTO_TCP:
96 /* DL4 Non-RFC compliant TCP checksum found */
97 if (*csum_field == (__force __sum16)0xFFFF)
98 csum_value_final = ~csum_value_final;
99 break;
100 }
101 }
102
103 if (csum_value_final == ntohs((__force __be16)*csum_field)) {
104 priv->stats.csum_ok++;
105 return 0;
106 } else {
107 priv->stats.csum_validation_failed++;
108 return -EINVAL;
109 }
110}
111
112#if IS_ENABLED(CONFIG_IPV6)
113static int
114rmnet_map_ipv6_dl_csum_trailer(struct sk_buff *skb,
115 struct rmnet_map_dl_csum_trailer *csum_trailer,
116 struct rmnet_priv *priv)
117{
118 __sum16 *csum_field, ip6_payload_csum, pseudo_csum, csum_temp;
119 u16 csum_value, csum_value_final;
120 __be16 ip6_hdr_csum, addend;
121 struct ipv6hdr *ip6h;
122 void *txporthdr;
123 u32 length;
124
125 ip6h = (struct ipv6hdr *)(skb->data);
126
127 txporthdr = skb->data + sizeof(struct ipv6hdr);
128 csum_field = rmnet_map_get_csum_field(ip6h->nexthdr, txporthdr);
129
130 if (!csum_field) {
131 priv->stats.csum_err_invalid_transport++;
132 return -EPROTONOSUPPORT;
133 }
134
135 csum_value = ~ntohs(csum_trailer->csum_value);
136 ip6_hdr_csum = (__force __be16)
137 ~ntohs((__force __be16)ip_compute_csum(ip6h,
138 (int)(txporthdr - (void *)(skb->data))));
139 ip6_payload_csum = csum16_sub((__force __sum16)csum_value,
140 ip6_hdr_csum);
141
142 length = (ip6h->nexthdr == IPPROTO_UDP) ?
143 ntohs(((struct udphdr *)txporthdr)->len) :
144 ntohs(ip6h->payload_len);
145 pseudo_csum = ~(csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr,
146 length, ip6h->nexthdr, 0));
147 addend = (__force __be16)ntohs((__force __be16)pseudo_csum);
148 pseudo_csum = csum16_add(ip6_payload_csum, addend);
149
150 addend = (__force __be16)ntohs((__force __be16)*csum_field);
151 csum_temp = ~csum16_sub(pseudo_csum, addend);
152 csum_value_final = (__force u16)csum_temp;
153
154 if (unlikely(csum_value_final == 0)) {
155 switch (ip6h->nexthdr) {
156 case IPPROTO_UDP:
157 /* RFC 2460 section 8.1
158 * DL6 One's complement rule for UDP checksum 0
159 */
160 csum_value_final = ~csum_value_final;
161 break;
162
163 case IPPROTO_TCP:
164 /* DL6 Non-RFC compliant TCP checksum found */
165 if (*csum_field == (__force __sum16)0xFFFF)
166 csum_value_final = ~csum_value_final;
167 break;
168 }
169 }
170
171 if (csum_value_final == ntohs((__force __be16)*csum_field)) {
172 priv->stats.csum_ok++;
173 return 0;
174 } else {
175 priv->stats.csum_validation_failed++;
176 return -EINVAL;
177 }
178}
179#endif
180
181static void rmnet_map_complement_ipv4_txporthdr_csum_field(void *iphdr)
182{
183 struct iphdr *ip4h = (struct iphdr *)iphdr;
184 void *txphdr;
185 u16 *csum;
186
187 txphdr = iphdr + ip4h->ihl * 4;
188
189 if (ip4h->protocol == IPPROTO_TCP || ip4h->protocol == IPPROTO_UDP) {
190 csum = (u16 *)rmnet_map_get_csum_field(ip4h->protocol, txphdr);
191 *csum = ~(*csum);
192 }
193}
194
195static void
196rmnet_map_ipv4_ul_csum_header(void *iphdr,
197 struct rmnet_map_ul_csum_header *ul_header,
198 struct sk_buff *skb)
199{
200 struct iphdr *ip4h = (struct iphdr *)iphdr;
201 __be16 *hdr = (__be16 *)ul_header, offset;
202
203 offset = htons((__force u16)(skb_transport_header(skb) -
204 (unsigned char *)iphdr));
205 ul_header->csum_start_offset = offset;
206 ul_header->csum_insert_offset = skb->csum_offset;
207 ul_header->csum_enabled = 1;
208 if (ip4h->protocol == IPPROTO_UDP)
209 ul_header->udp_ind = 1;
210 else
211 ul_header->udp_ind = 0;
212
213 /* Changing remaining fields to network order */
214 hdr++;
215 *hdr = htons((__force u16)*hdr);
216
217 skb->ip_summed = CHECKSUM_NONE;
218
219 rmnet_map_complement_ipv4_txporthdr_csum_field(iphdr);
220}
221
222#if IS_ENABLED(CONFIG_IPV6)
223static void rmnet_map_complement_ipv6_txporthdr_csum_field(void *ip6hdr)
224{
225 struct ipv6hdr *ip6h = (struct ipv6hdr *)ip6hdr;
226 void *txphdr;
227 u16 *csum;
228
229 txphdr = ip6hdr + sizeof(struct ipv6hdr);
230
231 if (ip6h->nexthdr == IPPROTO_TCP || ip6h->nexthdr == IPPROTO_UDP) {
232 csum = (u16 *)rmnet_map_get_csum_field(ip6h->nexthdr, txphdr);
233 *csum = ~(*csum);
234 }
235}
236
237static void
238rmnet_map_ipv6_ul_csum_header(void *ip6hdr,
239 struct rmnet_map_ul_csum_header *ul_header,
240 struct sk_buff *skb)
241{
242 struct ipv6hdr *ip6h = (struct ipv6hdr *)ip6hdr;
243 __be16 *hdr = (__be16 *)ul_header, offset;
244
245 offset = htons((__force u16)(skb_transport_header(skb) -
246 (unsigned char *)ip6hdr));
247 ul_header->csum_start_offset = offset;
248 ul_header->csum_insert_offset = skb->csum_offset;
249 ul_header->csum_enabled = 1;
250
251 if (ip6h->nexthdr == IPPROTO_UDP)
252 ul_header->udp_ind = 1;
253 else
254 ul_header->udp_ind = 0;
255
256 /* Changing remaining fields to network order */
257 hdr++;
258 *hdr = htons((__force u16)*hdr);
259
260 skb->ip_summed = CHECKSUM_NONE;
261
262 rmnet_map_complement_ipv6_txporthdr_csum_field(ip6hdr);
263}
264#endif
265
266/* Adds MAP header to front of skb->data
267 * Padding is calculated and set appropriately in MAP header. Mux ID is
268 * initialized to 0.
269 */
270struct rmnet_map_header *rmnet_map_add_map_header(struct sk_buff *skb,
271 int hdrlen, int pad)
272{
273 struct rmnet_map_header *map_header;
274 u32 padding, map_datalen;
275 u8 *padbytes;
276
277 map_datalen = skb->len - hdrlen;
278 map_header = (struct rmnet_map_header *)
279 skb_push(skb, sizeof(struct rmnet_map_header));
280 memset(map_header, 0, sizeof(struct rmnet_map_header));
281
282 if (pad == RMNET_MAP_NO_PAD_BYTES) {
283 map_header->pkt_len = htons(map_datalen);
284 return map_header;
285 }
286
287 padding = ALIGN(map_datalen, 4) - map_datalen;
288
289 if (padding == 0)
290 goto done;
291
292 if (skb_tailroom(skb) < padding)
293 return NULL;
294
295 padbytes = (u8 *)skb_put(skb, padding);
296 memset(padbytes, 0, padding);
297
298done:
299 map_header->pkt_len = htons(map_datalen + padding);
300 map_header->pad_len = padding & 0x3F;
301
302 return map_header;
303}
304
305/* Deaggregates a single packet
306 * A whole new buffer is allocated for each portion of an aggregated frame.
307 * Caller should keep calling deaggregate() on the source skb until 0 is
308 * returned, indicating that there are no more packets to deaggregate. Caller
309 * is responsible for freeing the original skb.
310 */
311struct sk_buff *rmnet_map_deaggregate(struct sk_buff *skb,
312 struct rmnet_port *port)
313{
314 struct rmnet_map_header *maph;
315 struct sk_buff *skbn;
316 u32 packet_len;
317
318 if (skb->len == 0)
319 return NULL;
320
321 maph = (struct rmnet_map_header *)skb->data;
322 packet_len = ntohs(maph->pkt_len) + sizeof(struct rmnet_map_header);
323
324 if (port->data_format & RMNET_FLAGS_INGRESS_MAP_CKSUMV4)
325 packet_len += sizeof(struct rmnet_map_dl_csum_trailer);
326
327 if (((int)skb->len - (int)packet_len) < 0)
328 return NULL;
329
330 /* Some hardware can send us empty frames. Catch them */
331 if (ntohs(maph->pkt_len) == 0)
332 return NULL;
333
334 skbn = alloc_skb(packet_len + RMNET_MAP_DEAGGR_SPACING, GFP_ATOMIC);
335 if (!skbn)
336 return NULL;
337
338 skb_reserve(skbn, RMNET_MAP_DEAGGR_HEADROOM);
339 skb_put(skbn, packet_len);
340 memcpy(skbn->data, skb->data, packet_len);
341 skb_pull(skb, packet_len);
342
343 return skbn;
344}
345
346/* Validates packet checksums. Function takes a pointer to
347 * the beginning of a buffer which contains the IP payload +
348 * padding + checksum trailer.
349 * Only IPv4 and IPv6 are supported along with TCP & UDP.
350 * Fragmented or tunneled packets are not supported.
351 */
352int rmnet_map_checksum_downlink_packet(struct sk_buff *skb, u16 len)
353{
354 struct rmnet_priv *priv = netdev_priv(skb->dev);
355 struct rmnet_map_dl_csum_trailer *csum_trailer;
356
357 if (unlikely(!(skb->dev->features & NETIF_F_RXCSUM))) {
358 priv->stats.csum_sw++;
359 return -EOPNOTSUPP;
360 }
361
362 csum_trailer = (struct rmnet_map_dl_csum_trailer *)(skb->data + len);
363
364 if (!csum_trailer->valid) {
365 priv->stats.csum_valid_unset++;
366 return -EINVAL;
367 }
368
369 if (skb->protocol == htons(ETH_P_IP)) {
370 return rmnet_map_ipv4_dl_csum_trailer(skb, csum_trailer, priv);
371 } else if (skb->protocol == htons(ETH_P_IPV6)) {
372#if IS_ENABLED(CONFIG_IPV6)
373 return rmnet_map_ipv6_dl_csum_trailer(skb, csum_trailer, priv);
374#else
375 priv->stats.csum_err_invalid_ip_version++;
376 return -EPROTONOSUPPORT;
377#endif
378 } else {
379 priv->stats.csum_err_invalid_ip_version++;
380 return -EPROTONOSUPPORT;
381 }
382
383 return 0;
384}
385
386/* Generates UL checksum meta info header for IPv4 and IPv6 over TCP and UDP
387 * packets that are supported for UL checksum offload.
388 */
389void rmnet_map_checksum_uplink_packet(struct sk_buff *skb,
390 struct net_device *orig_dev)
391{
392 struct rmnet_priv *priv = netdev_priv(orig_dev);
393 struct rmnet_map_ul_csum_header *ul_header;
394 void *iphdr;
395
396 ul_header = (struct rmnet_map_ul_csum_header *)
397 skb_push(skb, sizeof(struct rmnet_map_ul_csum_header));
398
399 if (unlikely(!(orig_dev->features &
400 (NETIF_F_IP_CSUM | NETIF_F_IPV6_CSUM))))
401 goto sw_csum;
402
403 if (skb->ip_summed == CHECKSUM_PARTIAL) {
404 iphdr = (char *)ul_header +
405 sizeof(struct rmnet_map_ul_csum_header);
406
407 if (skb->protocol == htons(ETH_P_IP)) {
408 rmnet_map_ipv4_ul_csum_header(iphdr, ul_header, skb);
409 return;
410 } else if (skb->protocol == htons(ETH_P_IPV6)) {
411#if IS_ENABLED(CONFIG_IPV6)
412 rmnet_map_ipv6_ul_csum_header(iphdr, ul_header, skb);
413 return;
414#else
415 priv->stats.csum_err_invalid_ip_version++;
416 goto sw_csum;
417#endif
418 } else {
419 priv->stats.csum_err_invalid_ip_version++;
420 }
421 }
422
423sw_csum:
424 ul_header->csum_start_offset = 0;
425 ul_header->csum_insert_offset = 0;
426 ul_header->csum_enabled = 0;
427 ul_header->udp_ind = 0;
428
429 priv->stats.csum_sw++;
430}