|
Added
Link Here
|
| 1 |
/*- |
| 2 |
* Copyright (c) 2015 Dmitry Vagin <daemon.hammer@ya.ru> |
| 3 |
* All rights reserved. |
| 4 |
* |
| 5 |
* Redistribution and use in source and binary forms, with or without |
| 6 |
* modification, are permitted provided that the following conditions |
| 7 |
* are met: |
| 8 |
* 1. Redistributions of source code must retain the above copyright |
| 9 |
* notice, this list of conditions and the following disclaimer. |
| 10 |
* 2. Redistributions in binary form must reproduce the above copyright |
| 11 |
* notice, this list of conditions and the following disclaimer in the |
| 12 |
* documentation and/or other materials provided with the distribution. |
| 13 |
* |
| 14 |
* THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND |
| 15 |
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
| 16 |
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
| 17 |
* ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE |
| 18 |
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
| 19 |
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
| 20 |
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
| 21 |
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
| 22 |
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
| 23 |
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| 24 |
* SUCH DAMAGE. |
| 25 |
* |
| 26 |
*/ |
| 27 |
|
| 28 |
#include <sys/cdefs.h> |
| 29 |
__FBSDID("$FreeBSD$"); |
| 30 |
|
| 31 |
#include "opt_inet.h" |
| 32 |
#include "opt_inet6.h" |
| 33 |
|
| 34 |
#include <sys/param.h> |
| 35 |
#include <sys/systm.h> |
| 36 |
#include <sys/kernel.h> |
| 37 |
#include <sys/endian.h> |
| 38 |
#include <sys/malloc.h> |
| 39 |
#include <sys/mbuf.h> |
| 40 |
#include <sys/socket.h> |
| 41 |
|
| 42 |
#include <net/bpf.h> |
| 43 |
#include <net/ethernet.h> |
| 44 |
#include <net/if.h> |
| 45 |
#include <net/if_vlan_var.h> |
| 46 |
|
| 47 |
#include <netinet/in.h> |
| 48 |
#include <netinet/ip.h> |
| 49 |
#include <netinet/ip6.h> |
| 50 |
#include <netinet/tcp.h> |
| 51 |
#include <netinet/udp.h> |
| 52 |
#include <machine/in_cksum.h> |
| 53 |
|
| 54 |
#include <netgraph/ng_message.h> |
| 55 |
#include <netgraph/ng_parse.h> |
| 56 |
#include <netgraph/netgraph.h> |
| 57 |
|
| 58 |
#include <netgraph/ng_checksum.h> |
| 59 |
|
| 60 |
/* private data */ |
| 61 |
struct ng_checksum_priv { |
| 62 |
hook_p in; |
| 63 |
hook_p out; |
| 64 |
uint8_t dlt; /* DLT_XXX from bpf.h */ |
| 65 |
struct ng_checksum_config *conf; |
| 66 |
struct ng_checksum_stats stats; |
| 67 |
}; |
| 68 |
|
| 69 |
typedef struct ng_checksum_priv *priv_p; |
| 70 |
|
| 71 |
/* Netgraph methods */ |
| 72 |
static ng_constructor_t ng_checksum_constructor; |
| 73 |
static ng_rcvmsg_t ng_checksum_rcvmsg; |
| 74 |
static ng_shutdown_t ng_checksum_shutdown; |
| 75 |
static ng_newhook_t ng_checksum_newhook; |
| 76 |
static ng_rcvdata_t ng_checksum_rcvdata; |
| 77 |
static ng_disconnect_t ng_checksum_disconnect; |
| 78 |
|
| 79 |
#define ERROUT(x) { error = (x); goto done; } |
| 80 |
|
| 81 |
static const struct ng_parse_struct_field ng_checksum_config_type_fields[] |
| 82 |
= NG_CHECKSUM_CONFIG_TYPE; |
| 83 |
static const struct ng_parse_type ng_checksum_config_type = { |
| 84 |
&ng_parse_struct_type, |
| 85 |
&ng_checksum_config_type_fields |
| 86 |
}; |
| 87 |
|
| 88 |
static const struct ng_parse_struct_field ng_checksum_stats_fields[] |
| 89 |
= NG_CHECKSUM_STATS_TYPE; |
| 90 |
static const struct ng_parse_type ng_checksum_stats_type = { |
| 91 |
&ng_parse_struct_type, |
| 92 |
&ng_checksum_stats_fields |
| 93 |
}; |
| 94 |
|
| 95 |
static const struct ng_cmdlist ng_checksum_cmdlist[] = { |
| 96 |
{ |
| 97 |
NGM_CHECKSUM_COOKIE, |
| 98 |
NGM_CHECKSUM_GETDLT, |
| 99 |
"getdlt", |
| 100 |
NULL, |
| 101 |
&ng_parse_uint8_type |
| 102 |
}, |
| 103 |
{ |
| 104 |
NGM_CHECKSUM_COOKIE, |
| 105 |
NGM_CHECKSUM_SETDLT, |
| 106 |
"setdlt", |
| 107 |
&ng_parse_uint8_type, |
| 108 |
NULL |
| 109 |
}, |
| 110 |
{ |
| 111 |
NGM_CHECKSUM_COOKIE, |
| 112 |
NGM_CHECKSUM_GETCONFIG, |
| 113 |
"getconfig", |
| 114 |
NULL, |
| 115 |
&ng_checksum_config_type |
| 116 |
}, |
| 117 |
{ |
| 118 |
NGM_CHECKSUM_COOKIE, |
| 119 |
NGM_CHECKSUM_SETCONFIG, |
| 120 |
"setconfig", |
| 121 |
&ng_checksum_config_type, |
| 122 |
NULL |
| 123 |
}, |
| 124 |
{ |
| 125 |
NGM_CHECKSUM_COOKIE, |
| 126 |
NGM_CHECKSUM_GET_STATS, |
| 127 |
"getstats", |
| 128 |
NULL, |
| 129 |
&ng_checksum_stats_type |
| 130 |
}, |
| 131 |
{ |
| 132 |
NGM_CHECKSUM_COOKIE, |
| 133 |
NGM_CHECKSUM_CLR_STATS, |
| 134 |
"clrstats", |
| 135 |
NULL, |
| 136 |
NULL |
| 137 |
}, |
| 138 |
{ |
| 139 |
NGM_CHECKSUM_COOKIE, |
| 140 |
NGM_CHECKSUM_GETCLR_STATS, |
| 141 |
"getclrstats", |
| 142 |
NULL, |
| 143 |
&ng_checksum_stats_type |
| 144 |
}, |
| 145 |
{ 0 } |
| 146 |
}; |
| 147 |
|
| 148 |
static struct ng_type typestruct = { |
| 149 |
.version = NG_ABI_VERSION, |
| 150 |
.name = NG_CHECKSUM_NODE_TYPE, |
| 151 |
.constructor = ng_checksum_constructor, |
| 152 |
.rcvmsg = ng_checksum_rcvmsg, |
| 153 |
.shutdown = ng_checksum_shutdown, |
| 154 |
.newhook = ng_checksum_newhook, |
| 155 |
.rcvdata = ng_checksum_rcvdata, |
| 156 |
.disconnect = ng_checksum_disconnect, |
| 157 |
.cmdlist = ng_checksum_cmdlist, |
| 158 |
}; |
| 159 |
|
| 160 |
NETGRAPH_INIT(checksum, &typestruct); |
| 161 |
|
| 162 |
static int |
| 163 |
ng_checksum_constructor(node_p node) |
| 164 |
{ |
| 165 |
priv_p priv; |
| 166 |
|
| 167 |
priv = malloc(sizeof(*priv), M_NETGRAPH, M_WAITOK|M_ZERO); |
| 168 |
priv->dlt = DLT_RAW; |
| 169 |
|
| 170 |
NG_NODE_SET_PRIVATE(node, priv); |
| 171 |
|
| 172 |
return (0); |
| 173 |
} |
| 174 |
|
| 175 |
static int |
| 176 |
ng_checksum_newhook(node_p node, hook_p hook, const char *name) |
| 177 |
{ |
| 178 |
const priv_p priv = NG_NODE_PRIVATE(node); |
| 179 |
|
| 180 |
if (strncmp(name, NG_CHECKSUM_HOOK_IN, strlen(NG_CHECKSUM_HOOK_IN)) == 0) { |
| 181 |
priv->in = hook; |
| 182 |
} else if (strncmp(name, NG_CHECKSUM_HOOK_OUT, strlen(NG_CHECKSUM_HOOK_OUT)) == 0) { |
| 183 |
priv->out = hook; |
| 184 |
} else |
| 185 |
return (EINVAL); |
| 186 |
|
| 187 |
return (0); |
| 188 |
} |
| 189 |
|
| 190 |
static int |
| 191 |
ng_checksum_rcvmsg(node_p node, item_p item, hook_p lasthook) |
| 192 |
{ |
| 193 |
const priv_p priv = NG_NODE_PRIVATE(node); |
| 194 |
struct ng_checksum_config *conf, *newconf; |
| 195 |
struct ng_mesg *msg; |
| 196 |
struct ng_mesg *resp = NULL; |
| 197 |
int error = 0; |
| 198 |
|
| 199 |
NGI_GET_MSG(item, msg); |
| 200 |
|
| 201 |
if (msg->header.typecookie != NGM_CHECKSUM_COOKIE) |
| 202 |
ERROUT(EINVAL); |
| 203 |
|
| 204 |
switch (msg->header.cmd) |
| 205 |
{ |
| 206 |
case NGM_CHECKSUM_GETDLT: |
| 207 |
NG_MKRESPONSE(resp, msg, sizeof(uint8_t), M_WAITOK); |
| 208 |
|
| 209 |
if (resp == NULL) |
| 210 |
ERROUT(ENOMEM); |
| 211 |
|
| 212 |
*((uint8_t *) resp->data) = priv->dlt; |
| 213 |
|
| 214 |
break; |
| 215 |
|
| 216 |
case NGM_CHECKSUM_SETDLT: |
| 217 |
if (msg->header.arglen != sizeof(uint8_t)) |
| 218 |
ERROUT(EINVAL); |
| 219 |
|
| 220 |
switch (*(uint8_t *) msg->data) |
| 221 |
{ |
| 222 |
case DLT_EN10MB: |
| 223 |
case DLT_RAW: |
| 224 |
priv->dlt = *(uint8_t *) msg->data; |
| 225 |
break; |
| 226 |
|
| 227 |
default: |
| 228 |
ERROUT(EINVAL); |
| 229 |
} |
| 230 |
|
| 231 |
break; |
| 232 |
|
| 233 |
case NGM_CHECKSUM_GETCONFIG: |
| 234 |
if (priv->conf == NULL) |
| 235 |
ERROUT(0); |
| 236 |
|
| 237 |
NG_MKRESPONSE(resp, msg, sizeof(struct ng_checksum_config), M_WAITOK); |
| 238 |
|
| 239 |
if (resp == NULL) |
| 240 |
ERROUT(ENOMEM); |
| 241 |
|
| 242 |
bcopy(priv->conf, resp->data, sizeof(struct ng_checksum_config)); |
| 243 |
|
| 244 |
break; |
| 245 |
|
| 246 |
case NGM_CHECKSUM_SETCONFIG: |
| 247 |
conf = (struct ng_checksum_config *) msg->data; |
| 248 |
|
| 249 |
if (msg->header.arglen != sizeof(struct ng_checksum_config)) |
| 250 |
ERROUT(EINVAL); |
| 251 |
|
| 252 |
conf->csum_flags &= NG_CHECKSUM_CSUM_IPV4|NG_CHECKSUM_CSUM_IPV6; |
| 253 |
conf->csum_offload &= NG_CHECKSUM_CSUM_IPV4|NG_CHECKSUM_CSUM_IPV6; |
| 254 |
|
| 255 |
newconf = malloc(sizeof(struct ng_checksum_config), M_NETGRAPH, M_WAITOK|M_ZERO); |
| 256 |
|
| 257 |
bcopy(conf, newconf, sizeof(struct ng_checksum_config)); |
| 258 |
|
| 259 |
if (priv->conf) |
| 260 |
free(priv->conf, M_NETGRAPH); |
| 261 |
|
| 262 |
priv->conf = newconf; |
| 263 |
|
| 264 |
break; |
| 265 |
|
| 266 |
case NGM_CHECKSUM_GET_STATS: |
| 267 |
case NGM_CHECKSUM_CLR_STATS: |
| 268 |
case NGM_CHECKSUM_GETCLR_STATS: |
| 269 |
if (msg->header.cmd != NGM_CHECKSUM_CLR_STATS) { |
| 270 |
NG_MKRESPONSE(resp, msg, sizeof(struct ng_checksum_stats), M_WAITOK); |
| 271 |
|
| 272 |
if (resp == NULL) |
| 273 |
ERROUT(ENOMEM); |
| 274 |
|
| 275 |
bcopy(&(priv->stats), resp->data, sizeof(struct ng_checksum_stats)); |
| 276 |
} |
| 277 |
|
| 278 |
if (msg->header.cmd != NGM_CHECKSUM_GET_STATS) |
| 279 |
bzero(&(priv->stats), sizeof(struct ng_checksum_stats)); |
| 280 |
|
| 281 |
break; |
| 282 |
|
| 283 |
default: |
| 284 |
ERROUT(EINVAL); |
| 285 |
} |
| 286 |
|
| 287 |
done: |
| 288 |
NG_RESPOND_MSG(error, node, item, resp); |
| 289 |
NG_FREE_MSG(msg); |
| 290 |
|
| 291 |
return (error); |
| 292 |
} |
| 293 |
|
| 294 |
#define PULLUP_CHECK(mbuf, length) do { \ |
| 295 |
pullup_len += length; \ |
| 296 |
if (((mbuf)->m_pkthdr.len < pullup_len) || \ |
| 297 |
(pullup_len > MHLEN)) { \ |
| 298 |
return (EINVAL); \ |
| 299 |
} \ |
| 300 |
if ((mbuf)->m_len < pullup_len && \ |
| 301 |
(((mbuf) = m_pullup((mbuf), pullup_len)) == NULL)) { \ |
| 302 |
return (ENOBUFS); \ |
| 303 |
} \ |
| 304 |
} while (0) |
| 305 |
|
| 306 |
#ifdef INET |
| 307 |
static int |
| 308 |
checksum_ipv4(priv_p priv, struct mbuf *m, int l3_offset) |
| 309 |
{ |
| 310 |
struct ip *ip4; |
| 311 |
int pullup_len; |
| 312 |
int hlen, plen; |
| 313 |
int processed = 0; |
| 314 |
|
| 315 |
pullup_len = l3_offset; |
| 316 |
|
| 317 |
PULLUP_CHECK(m, sizeof(struct ip)); |
| 318 |
ip4 = (struct ip *) mtodo(m, l3_offset); |
| 319 |
|
| 320 |
if (ip4->ip_v != IPVERSION) |
| 321 |
return (EOPNOTSUPP); |
| 322 |
|
| 323 |
hlen = ip4->ip_hl << 2; |
| 324 |
plen = ntohs(ip4->ip_len); |
| 325 |
|
| 326 |
if (hlen < sizeof(struct ip) || m->m_pkthdr.len < l3_offset + plen) |
| 327 |
return (EINVAL); |
| 328 |
|
| 329 |
if (m->m_pkthdr.csum_flags & CSUM_IP) { |
| 330 |
ip4->ip_sum = 0; |
| 331 |
|
| 332 |
if ((priv->conf->csum_offload & CSUM_IP) == 0) { |
| 333 |
if (hlen == sizeof(struct ip)) |
| 334 |
ip4->ip_sum = in_cksum_hdr(ip4); |
| 335 |
else |
| 336 |
ip4->ip_sum = in_cksum_skip(m, l3_offset + hlen, l3_offset); |
| 337 |
|
| 338 |
m->m_pkthdr.csum_flags &= ~CSUM_IP; |
| 339 |
} |
| 340 |
|
| 341 |
processed = 1; |
| 342 |
} |
| 343 |
|
| 344 |
pullup_len = l3_offset + hlen; |
| 345 |
|
| 346 |
/* We can not calculate a checksum fragmented packets */ |
| 347 |
if (ip4->ip_off & htons(IP_MF|IP_OFFMASK)) { |
| 348 |
m->m_pkthdr.csum_flags &= ~(CSUM_TCP|CSUM_UDP); |
| 349 |
return (0); |
| 350 |
} |
| 351 |
|
| 352 |
switch (ip4->ip_p) |
| 353 |
{ |
| 354 |
case IPPROTO_TCP: |
| 355 |
if (m->m_pkthdr.csum_flags & CSUM_TCP) { |
| 356 |
struct tcphdr *th; |
| 357 |
|
| 358 |
PULLUP_CHECK(m, sizeof(struct tcphdr)); |
| 359 |
th = (struct tcphdr *) mtodo(m, l3_offset + hlen); |
| 360 |
|
| 361 |
th->th_sum = in_pseudo(ip4->ip_src.s_addr, |
| 362 |
ip4->ip_dst.s_addr, htons(ip4->ip_p + plen - hlen)); |
| 363 |
|
| 364 |
if ((priv->conf->csum_offload & CSUM_TCP) == 0) { |
| 365 |
th->th_sum = in_cksum_skip(m, l3_offset + plen, l3_offset + hlen); |
| 366 |
m->m_pkthdr.csum_flags &= ~CSUM_TCP; |
| 367 |
} |
| 368 |
|
| 369 |
processed = 1; |
| 370 |
} |
| 371 |
|
| 372 |
m->m_pkthdr.csum_flags &= ~CSUM_UDP; |
| 373 |
break; |
| 374 |
|
| 375 |
case IPPROTO_UDP: |
| 376 |
if (m->m_pkthdr.csum_flags & CSUM_UDP) { |
| 377 |
struct udphdr *uh; |
| 378 |
|
| 379 |
PULLUP_CHECK(m, sizeof(struct udphdr)); |
| 380 |
uh = (struct udphdr *) mtodo(m, l3_offset + hlen); |
| 381 |
|
| 382 |
uh->uh_sum = in_pseudo(ip4->ip_src.s_addr, |
| 383 |
ip4->ip_dst.s_addr, htons(ip4->ip_p + plen - hlen)); |
| 384 |
|
| 385 |
if ((priv->conf->csum_offload & CSUM_UDP) == 0) { |
| 386 |
uh->uh_sum = in_cksum_skip(m, |
| 387 |
l3_offset + plen, l3_offset + hlen); |
| 388 |
|
| 389 |
if (uh->uh_sum == 0) |
| 390 |
uh->uh_sum = 0xffff; |
| 391 |
|
| 392 |
m->m_pkthdr.csum_flags &= ~CSUM_UDP; |
| 393 |
} |
| 394 |
|
| 395 |
processed = 1; |
| 396 |
} |
| 397 |
|
| 398 |
m->m_pkthdr.csum_flags &= ~CSUM_TCP; |
| 399 |
break; |
| 400 |
|
| 401 |
default: |
| 402 |
m->m_pkthdr.csum_flags &= ~(CSUM_TCP|CSUM_UDP); |
| 403 |
break; |
| 404 |
} |
| 405 |
|
| 406 |
m->m_pkthdr.csum_flags &= ~NG_CHECKSUM_CSUM_IPV6; |
| 407 |
|
| 408 |
if (processed) |
| 409 |
priv->stats.processed++; |
| 410 |
|
| 411 |
return (0); |
| 412 |
} |
| 413 |
#endif /* INET */ |
| 414 |
|
| 415 |
#ifdef INET6 |
| 416 |
static int |
| 417 |
checksum_ipv6(priv_p priv, struct mbuf *m, int l3_offset) |
| 418 |
{ |
| 419 |
struct ip6_hdr *ip6; |
| 420 |
struct ip6_ext *ip6e = NULL; |
| 421 |
int pullup_len; |
| 422 |
int hlen, plen; |
| 423 |
int nxt; |
| 424 |
int processed = 0; |
| 425 |
|
| 426 |
pullup_len = l3_offset; |
| 427 |
|
| 428 |
PULLUP_CHECK(m, sizeof(struct ip6_hdr)); |
| 429 |
ip6 = (struct ip6_hdr *) mtodo(m, l3_offset); |
| 430 |
|
| 431 |
if ((ip6->ip6_vfc & IPV6_VERSION_MASK) != IPV6_VERSION) |
| 432 |
return (EOPNOTSUPP); |
| 433 |
|
| 434 |
hlen = sizeof(struct ip6_hdr); |
| 435 |
plen = ntohs(ip6->ip6_plen) + hlen; |
| 436 |
|
| 437 |
if (m->m_pkthdr.len < l3_offset + plen) |
| 438 |
return (EINVAL); |
| 439 |
|
| 440 |
nxt = ip6->ip6_nxt; |
| 441 |
|
| 442 |
for (;;) { |
| 443 |
switch (nxt) |
| 444 |
{ |
| 445 |
case IPPROTO_DSTOPTS: |
| 446 |
case IPPROTO_HOPOPTS: |
| 447 |
case IPPROTO_ROUTING: |
| 448 |
PULLUP_CHECK(m, sizeof(struct ip6_ext)); |
| 449 |
ip6e = (struct ip6_ext *) mtodo(m, l3_offset + hlen); |
| 450 |
nxt = ip6e->ip6e_nxt; |
| 451 |
hlen += (ip6e->ip6e_len + 1) << 3; |
| 452 |
pullup_len = l3_offset + hlen; |
| 453 |
break; |
| 454 |
|
| 455 |
case IPPROTO_AH: |
| 456 |
PULLUP_CHECK(m, sizeof(struct ip6_ext)); |
| 457 |
ip6e = (struct ip6_ext *) mtodo(m, l3_offset + hlen); |
| 458 |
nxt = ip6e->ip6e_nxt; |
| 459 |
hlen += (ip6e->ip6e_len + 2) << 2; |
| 460 |
pullup_len = l3_offset + hlen; |
| 461 |
break; |
| 462 |
|
| 463 |
case IPPROTO_FRAGMENT: |
| 464 |
/* We can not calculate a checksum fragmented packets */ |
| 465 |
m->m_pkthdr.csum_flags &= ~(CSUM_TCP_IPV6|CSUM_UDP_IPV6); |
| 466 |
return (0); |
| 467 |
|
| 468 |
default: |
| 469 |
goto loopend; |
| 470 |
} |
| 471 |
|
| 472 |
if (nxt == 0) |
| 473 |
return (EINVAL); |
| 474 |
} |
| 475 |
|
| 476 |
loopend: |
| 477 |
|
| 478 |
switch (nxt) |
| 479 |
{ |
| 480 |
case IPPROTO_TCP: |
| 481 |
if (m->m_pkthdr.csum_flags & CSUM_TCP_IPV6) { |
| 482 |
struct tcphdr *th; |
| 483 |
|
| 484 |
PULLUP_CHECK(m, sizeof(struct tcphdr)); |
| 485 |
th = (struct tcphdr *) mtodo(m, l3_offset + hlen); |
| 486 |
|
| 487 |
th->th_sum = in6_cksum_pseudo(ip6, plen - hlen, nxt, 0); |
| 488 |
|
| 489 |
if ((priv->conf->csum_offload & CSUM_TCP_IPV6) == 0) { |
| 490 |
th->th_sum = in_cksum_skip(m, l3_offset + plen, l3_offset + hlen); |
| 491 |
m->m_pkthdr.csum_flags &= ~CSUM_TCP_IPV6; |
| 492 |
} |
| 493 |
|
| 494 |
processed = 1; |
| 495 |
} |
| 496 |
|
| 497 |
m->m_pkthdr.csum_flags &= ~CSUM_UDP_IPV6; |
| 498 |
break; |
| 499 |
|
| 500 |
case IPPROTO_UDP: |
| 501 |
if (m->m_pkthdr.csum_flags & CSUM_UDP_IPV6) { |
| 502 |
struct udphdr *uh; |
| 503 |
|
| 504 |
PULLUP_CHECK(m, sizeof(struct udphdr)); |
| 505 |
uh = (struct udphdr *) mtodo(m, l3_offset + hlen); |
| 506 |
|
| 507 |
uh->uh_sum = in6_cksum_pseudo(ip6, plen - hlen, nxt, 0); |
| 508 |
|
| 509 |
if ((priv->conf->csum_offload & CSUM_UDP_IPV6) == 0) { |
| 510 |
uh->uh_sum = in_cksum_skip(m, |
| 511 |
l3_offset + plen, l3_offset + hlen); |
| 512 |
|
| 513 |
if (uh->uh_sum == 0) |
| 514 |
uh->uh_sum = 0xffff; |
| 515 |
|
| 516 |
m->m_pkthdr.csum_flags &= ~CSUM_UDP_IPV6; |
| 517 |
} |
| 518 |
|
| 519 |
processed = 1; |
| 520 |
} |
| 521 |
|
| 522 |
m->m_pkthdr.csum_flags &= ~CSUM_TCP_IPV6; |
| 523 |
break; |
| 524 |
|
| 525 |
default: |
| 526 |
m->m_pkthdr.csum_flags &= ~(CSUM_TCP_IPV6|CSUM_UDP_IPV6); |
| 527 |
break; |
| 528 |
} |
| 529 |
|
| 530 |
m->m_pkthdr.csum_flags &= ~NG_CHECKSUM_CSUM_IPV4; |
| 531 |
|
| 532 |
if (processed) |
| 533 |
priv->stats.processed++; |
| 534 |
|
| 535 |
return (0); |
| 536 |
} |
| 537 |
#endif /* INET6 */ |
| 538 |
|
| 539 |
#undef PULLUP_CHECK |
| 540 |
|
| 541 |
static int |
| 542 |
ng_checksum_rcvdata(hook_p hook, item_p item) |
| 543 |
{ |
| 544 |
const priv_p priv = NG_NODE_PRIVATE(NG_HOOK_NODE(hook)); |
| 545 |
struct mbuf *m; |
| 546 |
hook_p out; |
| 547 |
int error = 0; |
| 548 |
|
| 549 |
priv->stats.received++; |
| 550 |
|
| 551 |
NGI_GET_M(item, m); |
| 552 |
|
| 553 |
#define PULLUP_CHECK(mbuf, length) do { \ |
| 554 |
pullup_len += length; \ |
| 555 |
if (((mbuf)->m_pkthdr.len < pullup_len) || \ |
| 556 |
(pullup_len > MHLEN)) { \ |
| 557 |
error = EINVAL; \ |
| 558 |
goto bypass; \ |
| 559 |
} \ |
| 560 |
if ((mbuf)->m_len < pullup_len && \ |
| 561 |
(((mbuf) = m_pullup((mbuf), pullup_len)) == NULL)) { \ |
| 562 |
error = ENOBUFS; \ |
| 563 |
goto drop; \ |
| 564 |
} \ |
| 565 |
} while (0) |
| 566 |
|
| 567 |
if (!(priv->conf && hook == priv->in && m && (m->m_flags & M_PKTHDR))) |
| 568 |
goto bypass; |
| 569 |
|
| 570 |
m->m_pkthdr.csum_flags |= priv->conf->csum_flags; |
| 571 |
|
| 572 |
if (m->m_pkthdr.csum_flags & (NG_CHECKSUM_CSUM_IPV4|NG_CHECKSUM_CSUM_IPV6)) |
| 573 |
{ |
| 574 |
struct ether_header *eh; |
| 575 |
struct ng_checksum_vlan_header *vh; |
| 576 |
int pullup_len = 0; |
| 577 |
uint16_t etype; |
| 578 |
|
| 579 |
m = m_unshare(m, M_NOWAIT); |
| 580 |
|
| 581 |
if (m == NULL) |
| 582 |
ERROUT(ENOMEM); |
| 583 |
|
| 584 |
switch (priv->dlt) |
| 585 |
{ |
| 586 |
case DLT_EN10MB: |
| 587 |
PULLUP_CHECK(m, sizeof(struct ether_header)); |
| 588 |
eh = mtod(m, struct ether_header *); |
| 589 |
etype = ntohs(eh->ether_type); |
| 590 |
|
| 591 |
for (;;) { /* QinQ support */ |
| 592 |
switch (etype) |
| 593 |
{ |
| 594 |
case 0x8100: |
| 595 |
case 0x88A8: |
| 596 |
case 0x9100: |
| 597 |
PULLUP_CHECK(m, sizeof(struct ng_checksum_vlan_header)); |
| 598 |
vh = (struct ng_checksum_vlan_header *) mtodo(m, |
| 599 |
pullup_len - sizeof(struct ng_checksum_vlan_header)); |
| 600 |
etype = ntohs(vh->etype); |
| 601 |
break; |
| 602 |
|
| 603 |
default: |
| 604 |
goto loopend; |
| 605 |
} |
| 606 |
} |
| 607 |
loopend: |
| 608 |
#ifdef INET |
| 609 |
if (etype == ETHERTYPE_IP && |
| 610 |
(m->m_pkthdr.csum_flags & NG_CHECKSUM_CSUM_IPV4)) { |
| 611 |
error = checksum_ipv4(priv, m, pullup_len); |
| 612 |
if (error == ENOBUFS) |
| 613 |
goto drop; |
| 614 |
} else |
| 615 |
#endif |
| 616 |
#ifdef INET6 |
| 617 |
if (etype == ETHERTYPE_IPV6 && |
| 618 |
(m->m_pkthdr.csum_flags & NG_CHECKSUM_CSUM_IPV6)) { |
| 619 |
error = checksum_ipv6(priv, m, pullup_len); |
| 620 |
if (error == ENOBUFS) |
| 621 |
goto drop; |
| 622 |
} else |
| 623 |
#endif |
| 624 |
{ |
| 625 |
m->m_pkthdr.csum_flags &= |
| 626 |
~(NG_CHECKSUM_CSUM_IPV4|NG_CHECKSUM_CSUM_IPV6); |
| 627 |
} |
| 628 |
|
| 629 |
break; |
| 630 |
|
| 631 |
case DLT_RAW: |
| 632 |
#ifdef INET |
| 633 |
if (m->m_pkthdr.csum_flags & NG_CHECKSUM_CSUM_IPV4) |
| 634 |
{ |
| 635 |
error = checksum_ipv4(priv, m, pullup_len); |
| 636 |
|
| 637 |
if (error == 0) |
| 638 |
goto bypass; |
| 639 |
else if (error == ENOBUFS) |
| 640 |
goto drop; |
| 641 |
} |
| 642 |
#endif |
| 643 |
#ifdef INET6 |
| 644 |
if (m->m_pkthdr.csum_flags & NG_CHECKSUM_CSUM_IPV6) |
| 645 |
{ |
| 646 |
error = checksum_ipv6(priv, m, pullup_len); |
| 647 |
|
| 648 |
if (error == 0) |
| 649 |
goto bypass; |
| 650 |
else if (error == ENOBUFS) |
| 651 |
goto drop; |
| 652 |
} |
| 653 |
#endif |
| 654 |
if (error) |
| 655 |
m->m_pkthdr.csum_flags &= |
| 656 |
~(NG_CHECKSUM_CSUM_IPV4|NG_CHECKSUM_CSUM_IPV6); |
| 657 |
|
| 658 |
break; |
| 659 |
|
| 660 |
default: |
| 661 |
ERROUT(EINVAL); |
| 662 |
} |
| 663 |
} |
| 664 |
|
| 665 |
#undef PULLUP_CHECK |
| 666 |
|
| 667 |
bypass: |
| 668 |
out = NULL; |
| 669 |
|
| 670 |
if (hook == priv->in) { |
| 671 |
/* return frames on 'in' hook if 'out' not connected */ |
| 672 |
out = priv->out ? priv->out : priv->in; |
| 673 |
} else if (hook == priv->out && priv->in) { |
| 674 |
/* pass frames on 'out' hook if 'in' connected */ |
| 675 |
out = priv->in; |
| 676 |
} |
| 677 |
|
| 678 |
if (out == NULL) |
| 679 |
ERROUT(0); |
| 680 |
|
| 681 |
NG_FWD_NEW_DATA(error, item, out, m); |
| 682 |
|
| 683 |
return (error); |
| 684 |
|
| 685 |
done: |
| 686 |
drop: |
| 687 |
NG_FREE_ITEM(item); |
| 688 |
NG_FREE_M(m); |
| 689 |
|
| 690 |
priv->stats.dropped++; |
| 691 |
|
| 692 |
return (error); |
| 693 |
} |
| 694 |
|
| 695 |
static int |
| 696 |
ng_checksum_shutdown(node_p node) |
| 697 |
{ |
| 698 |
const priv_p priv = NG_NODE_PRIVATE(node); |
| 699 |
|
| 700 |
NG_NODE_SET_PRIVATE(node, NULL); |
| 701 |
NG_NODE_UNREF(node); |
| 702 |
|
| 703 |
if (priv->conf) |
| 704 |
free(priv->conf, M_NETGRAPH); |
| 705 |
|
| 706 |
free(priv, M_NETGRAPH); |
| 707 |
|
| 708 |
return (0); |
| 709 |
} |
| 710 |
|
| 711 |
static int |
| 712 |
ng_checksum_disconnect(hook_p hook) |
| 713 |
{ |
| 714 |
priv_p priv; |
| 715 |
|
| 716 |
priv = NG_NODE_PRIVATE(NG_HOOK_NODE(hook)); |
| 717 |
|
| 718 |
if (hook == priv->in) |
| 719 |
priv->in = NULL; |
| 720 |
|
| 721 |
if (hook == priv->out) |
| 722 |
priv->out = NULL; |
| 723 |
|
| 724 |
if (NG_NODE_NUMHOOKS(NG_HOOK_NODE(hook)) == 0 && |
| 725 |
NG_NODE_IS_VALID(NG_HOOK_NODE(hook))) /* already shutting down? */ |
| 726 |
ng_rmnode_self(NG_HOOK_NODE(hook)); |
| 727 |
|
| 728 |
return (0); |
| 729 |
} |