]> git.saurik.com Git - apple/xnu.git/blame - bsd/kern/uipc_mbuf2.c
xnu-2782.40.9.tar.gz
[apple/xnu.git] / bsd / kern / uipc_mbuf2.c
CommitLineData
1c79356b 1/*
39236c6e 2 * Copyright (c) 2000-2013 Apple Inc. All rights reserved.
5d5c5d0d 3 *
2d21ac55 4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
1c79356b 5 *
2d21ac55
A
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
8f6c56a5 14 *
2d21ac55
A
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
8f6c56a5
A
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
2d21ac55
A
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
8f6c56a5 25 *
2d21ac55 26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
1c79356b
A
27 */
28/* $NetBSD: uipc_mbuf.c,v 1.40 1999/04/01 00:23:25 thorpej Exp $ */
29
30/*
31 * Copyright (C) 1999 WIDE Project.
32 * All rights reserved.
33 *
34 * Redistribution and use in source and binary forms, with or without
35 * modification, are permitted provided that the following conditions
36 * are met:
37 * 1. Redistributions of source code must retain the above copyright
38 * notice, this list of conditions and the following disclaimer.
39 * 2. Redistributions in binary form must reproduce the above copyright
40 * notice, this list of conditions and the following disclaimer in the
41 * documentation and/or other materials provided with the distribution.
42 * 3. Neither the name of the project nor the names of its contributors
43 * may be used to endorse or promote products derived from this software
44 * without specific prior written permission.
45 *
46 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
47 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
48 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
49 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
50 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
51 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
52 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
53 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
54 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
55 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
56 * SUCH DAMAGE.
57 */
58
59/*
60 * Copyright (c) 1982, 1986, 1988, 1991, 1993
61 * The Regents of the University of California. All rights reserved.
62 *
63 * Redistribution and use in source and binary forms, with or without
64 * modification, are permitted provided that the following conditions
65 * are met:
66 * 1. Redistributions of source code must retain the above copyright
67 * notice, this list of conditions and the following disclaimer.
68 * 2. Redistributions in binary form must reproduce the above copyright
69 * notice, this list of conditions and the following disclaimer in the
70 * documentation and/or other materials provided with the distribution.
71 * 3. All advertising materials mentioning features or use of this software
72 * must display the following acknowledgement:
73 * This product includes software developed by the University of
74 * California, Berkeley and its contributors.
75 * 4. Neither the name of the University nor the names of its contributors
76 * may be used to endorse or promote products derived from this software
77 * without specific prior written permission.
78 *
79 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
80 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
81 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
82 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
83 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
84 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
85 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
86 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
87 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
88 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
89 * SUCH DAMAGE.
90 *
91 * @(#)uipc_mbuf.c 8.4 (Berkeley) 2/14/95
92 */
2d21ac55
A
93/*
94 * NOTICE: This file was modified by SPARTA, Inc. in 2005 to introduce
95 * support for mandatory and extensible security protections. This notice
96 * is included in support of clause 2.2 (b) of the Apple Public License,
97 * Version 2.0.
98 */
1c79356b 99
1c79356b 100
9bccf70c 101/*#define PULLDOWN_DEBUG*/
1c79356b
A
102
103#include <sys/param.h>
104#include <sys/systm.h>
91447636 105#include <sys/proc_internal.h>
1c79356b
A
106#include <sys/malloc.h>
107#include <sys/mbuf.h>
6d2010ae 108#include <sys/mcache.h>
1c79356b 109#include <netinet/in.h>
39236c6e
A
110#include <netinet/ip_var.h>
111#if INET6
1c79356b
A
112#include <netinet/ip6.h>
113#include <netinet6/ip6_var.h>
6d2010ae 114#endif /* INET6 */
1c79356b 115
2d21ac55
A
116#if CONFIG_MACF_NET
117#include <security/mac_framework.h>
118#endif
119
1c79356b
A
120/*
121 * ensure that [off, off + len) is contiguous on the mbuf chain "m".
122 * packet chain before "off" is kept untouched.
123 * if offp == NULL, the target will start at <retval, 0> on resulting chain.
124 * if offp != NULL, the target will start at <retval, *offp> on resulting chain.
125 *
126 * on error return (NULL return value), original "m" will be freed.
127 *
128 * XXX M_TRAILINGSPACE/M_LEADINGSPACE on shared cluster (sharedcluster)
129 */
130struct mbuf *
2d21ac55 131m_pulldown(struct mbuf *m, int off, int len, int *offp)
1c79356b
A
132{
133 struct mbuf *n, *o;
134 int hlen, tlen, olen;
135 int sharedcluster;
6d2010ae 136#if defined(PULLDOWN_STAT) && INET6
1c79356b
A
137 static struct mbuf *prev = NULL;
138 int prevlen = 0, prevmlen = 0;
139#endif
140
141 /* check invalid arguments. */
142 if (m == NULL)
143 panic("m == NULL in m_pulldown()");
144 if (len > MCLBYTES) {
145 m_freem(m);
146 return NULL; /* impossible */
147 }
148
6d2010ae 149#if defined(PULLDOWN_STAT) && INET6
1c79356b
A
150 ip6stat.ip6s_pulldown++;
151#endif
152
6d2010ae 153#if defined(PULLDOWN_STAT) && INET6
1c79356b
A
154 /* statistics for m_pullup */
155 ip6stat.ip6s_pullup++;
156 if (off + len > MHLEN)
157 ip6stat.ip6s_pullup_fail++;
158 else {
159 int dlen, mlen;
160
161 dlen = (prev == m) ? prevlen : m->m_len;
162 mlen = (prev == m) ? prevmlen : m->m_len + M_TRAILINGSPACE(m);
163
164 if (dlen >= off + len)
165 ip6stat.ip6s_pullup--; /* call will not be made! */
166 else if ((m->m_flags & M_EXT) != 0) {
167 ip6stat.ip6s_pullup_alloc++;
168 ip6stat.ip6s_pullup_copy++;
169 } else {
170 if (mlen >= off + len)
171 ip6stat.ip6s_pullup_copy++;
172 else {
173 ip6stat.ip6s_pullup_alloc++;
174 ip6stat.ip6s_pullup_copy++;
175 }
176 }
177
178 prevlen = off + len;
179 prevmlen = MHLEN;
180 }
181
182 /* statistics for m_pullup2 */
183 ip6stat.ip6s_pullup2++;
184 if (off + len > MCLBYTES)
185 ip6stat.ip6s_pullup2_fail++;
186 else {
187 int dlen, mlen;
188
189 dlen = (prev == m) ? prevlen : m->m_len;
190 mlen = (prev == m) ? prevmlen : m->m_len + M_TRAILINGSPACE(m);
191 prevlen = off + len;
192 prevmlen = mlen;
193
194 if (dlen >= off + len)
195 ip6stat.ip6s_pullup2--; /* call will not be made! */
196 else if ((m->m_flags & M_EXT) != 0) {
197 ip6stat.ip6s_pullup2_alloc++;
198 ip6stat.ip6s_pullup2_copy++;
199 prevmlen = (off + len > MHLEN) ? MCLBYTES : MHLEN;
200 } else {
201 if (mlen >= off + len)
202 ip6stat.ip6s_pullup2_copy++;
203 else {
204 ip6stat.ip6s_pullup2_alloc++;
205 ip6stat.ip6s_pullup2_copy++;
206 prevmlen = (off + len > MHLEN) ? MCLBYTES
207 : MHLEN;
208 }
209 }
210 }
211
212 prev = m;
213#endif
214
215#ifdef PULLDOWN_DEBUG
216 {
217 struct mbuf *t;
218 printf("before:");
219 for (t = m; t; t = t->m_next)
220 printf(" %d", t->m_len);
221 printf("\n");
222 }
223#endif
224 n = m;
225 while (n != NULL && off > 0) {
226 if (n->m_len > off)
227 break;
228 off -= n->m_len;
229 n = n->m_next;
230 }
231 /* be sure to point non-empty mbuf */
232 while (n != NULL && n->m_len == 0)
233 n = n->m_next;
234 if (!n) {
235 m_freem(m);
236 return NULL; /* mbuf chain too short */
237 }
238
239 /*
240 * the target data is on <n, off>.
241 * if we got enough data on the mbuf "n", we're done.
242 */
243 if ((off == 0 || offp) && len <= n->m_len - off)
244 goto ok;
245
6d2010ae 246#if defined(PULLDOWN_STAT) && INET6
1c79356b
A
247 ip6stat.ip6s_pulldown_copy++;
248#endif
249
250 /*
251 * when len < n->m_len - off and off != 0, it is a special case.
252 * len bytes from <n, off> sits in single mbuf, but the caller does
253 * not like the starting position (off).
254 * chop the current mbuf into two pieces, set off to 0.
255 */
256 if (len < n->m_len - off) {
257 o = m_copym(n, off, n->m_len - off, M_DONTWAIT);
258 if (o == NULL) {
259 m_freem(m);
260 return NULL; /* ENOBUFS */
261 }
262 n->m_len = off;
263 o->m_next = n->m_next;
264 n->m_next = o;
265 n = n->m_next;
266 off = 0;
267 goto ok;
268 }
269
270 /*
271 * we need to take hlen from <n, off> and tlen from <n->m_next, 0>,
272 * and construct contiguous mbuf with m_len == len.
273 * note that hlen + tlen == len, and tlen > 0.
274 */
275 hlen = n->m_len - off;
276 tlen = len - hlen;
277
278 /*
279 * ensure that we have enough trailing data on mbuf chain.
280 * if not, we can do nothing about the chain.
281 */
282 olen = 0;
283 for (o = n->m_next; o != NULL; o = o->m_next)
284 olen += o->m_len;
285 if (hlen + olen < len) {
286 m_freem(m);
287 return NULL; /* mbuf chain too short */
288 }
289
290 /*
291 * easy cases first.
292 * we need to use m_copydata() to get data from <n->m_next, 0>.
293 */
294 if ((n->m_flags & M_EXT) == 0)
295 sharedcluster = 0;
296 else {
1c79356b 297 if (n->m_ext.ext_free)
1c79356b 298 sharedcluster = 1;
91447636 299 else if (m_mclhasreference(n))
1c79356b
A
300 sharedcluster = 1;
301 else
302 sharedcluster = 0;
303 }
304 if ((off == 0 || offp) && M_TRAILINGSPACE(n) >= tlen
305 && !sharedcluster) {
306 m_copydata(n->m_next, 0, tlen, mtod(n, caddr_t) + n->m_len);
307 n->m_len += tlen;
308 m_adj(n->m_next, tlen);
309 goto ok;
310 }
311 if ((off == 0 || offp) && M_LEADINGSPACE(n->m_next) >= hlen
312 && !sharedcluster) {
313 n->m_next->m_data -= hlen;
314 n->m_next->m_len += hlen;
315 bcopy(mtod(n, caddr_t) + off, mtod(n->m_next, caddr_t), hlen);
316 n->m_len -= hlen;
317 n = n->m_next;
318 off = 0;
319 goto ok;
320 }
321
322 /*
323 * now, we need to do the hard way. don't m_copy as there's no room
324 * on both end.
325 */
6d2010ae 326#if defined(PULLDOWN_STAT) && INET6
1c79356b
A
327 ip6stat.ip6s_pulldown_alloc++;
328#endif
329 MGET(o, M_DONTWAIT, m->m_type);
330 if (o == NULL) {
331 m_freem(m);
332 return NULL; /* ENOBUFS */
333 }
334 if (len > MHLEN) { /* use MHLEN just for safety */
335 MCLGET(o, M_DONTWAIT);
336 if ((o->m_flags & M_EXT) == 0) {
337 m_freem(m);
338 m_free(o);
339 return NULL; /* ENOBUFS */
340 }
341 }
342 /* get hlen from <n, off> into <o, 0> */
343 o->m_len = hlen;
344 bcopy(mtod(n, caddr_t) + off, mtod(o, caddr_t), hlen);
345 n->m_len -= hlen;
346 /* get tlen from <n->m_next, 0> into <o, hlen> */
347 m_copydata(n->m_next, 0, tlen, mtod(o, caddr_t) + o->m_len);
348 o->m_len += tlen;
349 m_adj(n->m_next, tlen);
350 o->m_next = n->m_next;
351 n->m_next = o;
352 n = o;
353 off = 0;
354
355ok:
356#ifdef PULLDOWN_DEBUG
357 {
358 struct mbuf *t;
359 printf("after:");
360 for (t = m; t; t = t->m_next)
361 printf("%c%d", t == n ? '*' : ' ', t->m_len);
362 printf(" (off=%d)\n", off);
363 }
364#endif
365 if (offp)
366 *offp = off;
367 return n;
368}
369
6d2010ae
A
370/*
371 * Create and return an m_tag, either by re-using space in a previous tag
372 * or by allocating a new mbuf/cluster
373 */
374struct m_tag *
375m_tag_create(u_int32_t id, u_int16_t type, int len, int wait, struct mbuf *buf)
376{
377 struct m_tag *t = NULL;
378 struct m_tag *p;
379
380 if (len < 0)
381 return (NULL);
382
383 if (len + sizeof (struct m_tag) + sizeof (struct m_taghdr) > MLEN)
384 return (m_tag_alloc(id, type, len, wait));
385
386 /*
387 * We've exhausted all external cases. Now, go through the m_tag
388 * chain and see if we can fit it in any of them.
389 * If not (t == NULL), call m_tag_alloc to store it in a new mbuf.
390 */
391 p = SLIST_FIRST(&buf->m_pkthdr.tags);
392 while(p != NULL) {
393 /* 2KCL m_tag */
394 if (M_TAG_ALIGN(p->m_tag_len) +
395 sizeof (struct m_taghdr) > MLEN) {
396 p = SLIST_NEXT(p, m_tag_link);
397 continue;
398 }
399
400 VERIFY(p->m_tag_cookie == M_TAG_VALID_PATTERN);
401
402 struct mbuf *m = m_dtom(p);
316670eb 403 struct m_taghdr *hdr = (struct m_taghdr *)(void *)m->m_data;
6d2010ae 404
316670eb 405 VERIFY(IS_P2ALIGNED(hdr + 1, sizeof (u_int64_t)));
6d2010ae
A
406 VERIFY(m->m_flags & M_TAGHDR && !(m->m_flags & M_EXT));
407
408 /* The mbuf can store this m_tag */
409 if (M_TAG_ALIGN(len) <= MLEN - m->m_len) {
316670eb
A
410 t = (struct m_tag *)(void *)(m->m_data + m->m_len);
411 VERIFY(IS_P2ALIGNED(t, sizeof (u_int64_t)));
6d2010ae
A
412 hdr->refcnt++;
413 m->m_len += M_TAG_ALIGN(len);
414 VERIFY(m->m_len <= MLEN);
415 break;
416 }
417
418 p = SLIST_NEXT(p, m_tag_link);
419 }
420
421 if (t == NULL)
422 return (m_tag_alloc(id, type, len, wait));
423
424 t->m_tag_cookie = M_TAG_VALID_PATTERN;
425 t->m_tag_type = type;
426 t->m_tag_len = len;
427 t->m_tag_id = id;
428 if (len > 0)
429 bzero(t + 1, len);
430 return (t);
431}
432
91447636
A
433/* Get a packet tag structure along with specified data following. */
434struct m_tag *
435m_tag_alloc(u_int32_t id, u_int16_t type, int len, int wait)
436{
437 struct m_tag *t;
438
439 if (len < 0)
6d2010ae
A
440 return (NULL);
441
442 if (M_TAG_ALIGN(len) + sizeof (struct m_taghdr) <= MLEN) {
91447636 443 struct mbuf *m = m_get(wait, MT_TAG);
6d2010ae
A
444 struct m_taghdr *hdr;
445
91447636 446 if (m == NULL)
6d2010ae
A
447 return (NULL);
448
449 m->m_flags |= M_TAGHDR;
450
316670eb
A
451 hdr = (struct m_taghdr *)(void *)m->m_data;
452 VERIFY(IS_P2ALIGNED(hdr + 1, sizeof (u_int64_t)));
6d2010ae
A
453 hdr->refcnt = 1;
454 m->m_len += sizeof (struct m_taghdr);
316670eb
A
455 t = (struct m_tag *)(void *)(m->m_data + m->m_len);
456 VERIFY(IS_P2ALIGNED(t, sizeof (u_int64_t)));
6d2010ae
A
457 m->m_len += M_TAG_ALIGN(len);
458 VERIFY(m->m_len <= MLEN);
459 } else if (len + sizeof (struct m_tag) <= MCLBYTES) {
316670eb 460 t = (struct m_tag *)(void *)m_mclalloc(wait);
6d2010ae 461 } else {
91447636 462 t = NULL;
6d2010ae
A
463 }
464
91447636 465 if (t == NULL)
6d2010ae
A
466 return (NULL);
467
316670eb 468 VERIFY(IS_P2ALIGNED(t, sizeof (u_int64_t)));
6d2010ae 469 t->m_tag_cookie = M_TAG_VALID_PATTERN;
91447636
A
470 t->m_tag_type = type;
471 t->m_tag_len = len;
472 t->m_tag_id = id;
6d2010ae
A
473 if (len > 0)
474 bzero(t + 1, len);
475 return (t);
91447636
A
476}
477
478
479/* Free a packet tag. */
480void
481m_tag_free(struct m_tag *t)
482{
2d21ac55
A
483#if CONFIG_MACF_NET
484 if (t != NULL &&
485 t->m_tag_id == KERNEL_MODULE_TAG_ID &&
486 t->m_tag_type == KERNEL_TAG_TYPE_MACLABEL)
487 mac_mbuf_tag_destroy(t);
488#endif
91447636
A
489 if (t == NULL)
490 return;
316670eb
A
491
492 VERIFY(t->m_tag_cookie == M_TAG_VALID_PATTERN);
493
6d2010ae 494 if (M_TAG_ALIGN(t->m_tag_len) + sizeof (struct m_taghdr) <= MLEN) {
91447636 495 struct mbuf * m = m_dtom(t);
6d2010ae 496 VERIFY(m->m_flags & M_TAGHDR);
316670eb
A
497 struct m_taghdr *hdr = (struct m_taghdr *)(void *)m->m_data;
498
499 VERIFY(IS_P2ALIGNED(hdr + 1, sizeof (u_int64_t)));
6d2010ae
A
500
501 /* No other tags in this mbuf */
502 if(--hdr->refcnt == 0) {
503 m_free(m);
504 return;
505 }
506
507 /* Pattern-fill the header */
508 u_int64_t *fill_ptr = (u_int64_t *)t;
509 u_int64_t *end_ptr = (u_int64_t *)(t + 1);
510 while (fill_ptr < end_ptr) {
511 *fill_ptr = M_TAG_FREE_PATTERN;
512 fill_ptr++;
513 }
91447636 514 } else {
6d2010ae 515 m_mclfree((caddr_t)t);
91447636 516 }
91447636
A
517}
518
519/* Prepend a packet tag. */
520void
521m_tag_prepend(struct mbuf *m, struct m_tag *t)
522{
6d2010ae
A
523 VERIFY(m != NULL && t != NULL);
524
91447636
A
525 SLIST_INSERT_HEAD(&m->m_pkthdr.tags, t, m_tag_link);
526}
527
528/* Unlink a packet tag. */
529void
530m_tag_unlink(struct mbuf *m, struct m_tag *t)
531{
39236c6e
A
532 VERIFY(m->m_flags & M_PKTHDR);
533 VERIFY(t != NULL && t->m_tag_cookie == M_TAG_VALID_PATTERN);
6d2010ae 534
91447636
A
535 SLIST_REMOVE(&m->m_pkthdr.tags, t, m_tag, m_tag_link);
536}
537
538/* Unlink and free a packet tag. */
539void
540m_tag_delete(struct mbuf *m, struct m_tag *t)
541{
91447636
A
542 m_tag_unlink(m, t);
543 m_tag_free(t);
544}
545
546/* Unlink and free a packet tag chain, starting from given tag. */
547void
548m_tag_delete_chain(struct mbuf *m, struct m_tag *t)
549{
550 struct m_tag *p, *q;
551
39236c6e 552 VERIFY(m->m_flags & M_PKTHDR);
6d2010ae
A
553
554 if (t != NULL) {
91447636 555 p = t;
6d2010ae 556 } else {
91447636 557 p = SLIST_FIRST(&m->m_pkthdr.tags);
6d2010ae 558 }
91447636
A
559 if (p == NULL)
560 return;
6d2010ae
A
561
562 VERIFY(p->m_tag_cookie == M_TAG_VALID_PATTERN);
563 while ((q = SLIST_NEXT(p, m_tag_link)) != NULL) {
564 VERIFY(q->m_tag_cookie == M_TAG_VALID_PATTERN);
91447636 565 m_tag_delete(m, q);
6d2010ae 566 }
91447636
A
567 m_tag_delete(m, p);
568}
569
570/* Find a tag, starting from a given position. */
571struct m_tag *
572m_tag_locate(struct mbuf *m, u_int32_t id, u_int16_t type, struct m_tag *t)
573{
574 struct m_tag *p;
575
39236c6e 576 VERIFY(m->m_flags & M_PKTHDR);
6d2010ae
A
577
578 if (t == NULL) {
91447636 579 p = SLIST_FIRST(&m->m_pkthdr.tags);
6d2010ae
A
580 } else {
581 VERIFY(t->m_tag_cookie == M_TAG_VALID_PATTERN);
91447636 582 p = SLIST_NEXT(t, m_tag_link);
6d2010ae 583 }
91447636 584 while (p != NULL) {
6d2010ae 585 VERIFY(p->m_tag_cookie == M_TAG_VALID_PATTERN);
91447636 586 if (p->m_tag_id == id && p->m_tag_type == type)
6d2010ae 587 return (p);
91447636
A
588 p = SLIST_NEXT(p, m_tag_link);
589 }
6d2010ae 590 return (NULL);
91447636
A
591}
592
593/* Copy a single tag. */
594struct m_tag *
595m_tag_copy(struct m_tag *t, int how)
596{
597 struct m_tag *p;
598
6d2010ae
A
599 VERIFY(t != NULL);
600
3a60a9f5 601 p = m_tag_alloc(t->m_tag_id, t->m_tag_type, t->m_tag_len, how);
91447636
A
602 if (p == NULL)
603 return (NULL);
2d21ac55
A
604#if CONFIG_MACF_NET
605 /*
606 * XXXMAC: we should probably pass off the initialization, and
607 * copying here? can we hid that KERNEL_TAG_TYPE_MACLABEL is
608 * special from the mbuf code?
609 */
610 if (t != NULL &&
611 t->m_tag_id == KERNEL_MODULE_TAG_ID &&
612 t->m_tag_type == KERNEL_TAG_TYPE_MACLABEL) {
613 if (mac_mbuf_tag_init(p, how) != 0) {
614 m_tag_free(p);
615 return (NULL);
616 }
617 mac_mbuf_tag_copy(t, p);
618 } else
619#endif
91447636 620 bcopy(t + 1, p + 1, t->m_tag_len); /* Copy the data */
6d2010ae 621 return (p);
91447636
A
622}
623
624/*
625 * Copy two tag chains. The destination mbuf (to) loses any attached
626 * tags even if the operation fails. This should not be a problem, as
627 * m_tag_copy_chain() is typically called with a newly-allocated
628 * destination mbuf.
629 */
630int
631m_tag_copy_chain(struct mbuf *to, struct mbuf *from, int how)
632{
633 struct m_tag *p, *t, *tprev = NULL;
634
39236c6e 635 VERIFY((to->m_flags & M_PKTHDR) && (from->m_flags & M_PKTHDR));
6d2010ae 636
91447636
A
637 m_tag_delete_chain(to, NULL);
638 SLIST_FOREACH(p, &from->m_pkthdr.tags, m_tag_link) {
6d2010ae 639 VERIFY(p->m_tag_cookie == M_TAG_VALID_PATTERN);
91447636
A
640 t = m_tag_copy(p, how);
641 if (t == NULL) {
642 m_tag_delete_chain(to, NULL);
6d2010ae 643 return (0);
91447636 644 }
6d2010ae 645 if (tprev == NULL) {
91447636 646 SLIST_INSERT_HEAD(&to->m_pkthdr.tags, t, m_tag_link);
6d2010ae 647 } else {
91447636
A
648 SLIST_INSERT_AFTER(tprev, t, m_tag_link);
649 tprev = t;
650 }
651 }
6d2010ae 652 return (1);
91447636
A
653}
654
39236c6e 655/* Initialize dynamic and static tags on an mbuf. */
91447636 656void
39236c6e 657m_tag_init(struct mbuf *m, int all)
91447636 658{
39236c6e 659 VERIFY(m->m_flags & M_PKTHDR);
6d2010ae 660
91447636 661 SLIST_INIT(&m->m_pkthdr.tags);
39236c6e
A
662 /*
663 * If the caller wants to preserve static mbuf tags
664 * (e.g. m_dup_pkthdr), don't zero them out.
665 */
666 if (all) {
667 bzero(&m->m_pkthdr.pf_mtag, sizeof (m->m_pkthdr.pf_mtag));
668 bzero(&m->m_pkthdr.proto_mtag, sizeof (m->m_pkthdr.proto_mtag));
fe8ab488 669 bzero(&m->m_pkthdr.necp_mtag, sizeof (m->m_pkthdr.necp_mtag));
39236c6e 670 }
91447636
A
671}
672
673/* Get first tag in chain. */
674struct m_tag *
675m_tag_first(struct mbuf *m)
676{
39236c6e 677 VERIFY(m->m_flags & M_PKTHDR);
6d2010ae
A
678
679 return (SLIST_FIRST(&m->m_pkthdr.tags));
91447636
A
680}
681
682/* Get next tag in chain. */
683struct m_tag *
6d2010ae 684m_tag_next(struct mbuf *m, struct m_tag *t)
91447636 685{
d1ecb069 686#pragma unused(m)
6d2010ae
A
687 VERIFY(t != NULL);
688 VERIFY(t->m_tag_cookie == M_TAG_VALID_PATTERN);
689
690 return (SLIST_NEXT(t, m_tag_link));
d1ecb069
A
691}
692
316670eb
A
693int
694m_set_traffic_class(struct mbuf *m, mbuf_traffic_class_t tc)
695{
696 u_int32_t val = MBUF_TC2SCVAL(tc); /* just the val portion */
697
698 return (m_set_service_class(m, m_service_class_from_val(val)));
699}
700
701mbuf_traffic_class_t
702m_get_traffic_class(struct mbuf *m)
703{
704 return (MBUF_SC2TC(m_get_service_class(m)));
705}
706
316670eb
A
707int
708m_set_service_class(struct mbuf *m, mbuf_svc_class_t sc)
709{
710 int error = 0;
711
712 VERIFY(m->m_flags & M_PKTHDR);
713
714 if (MBUF_VALID_SC(sc))
39236c6e 715 m->m_pkthdr.pkt_svc = sc;
316670eb
A
716 else
717 error = EINVAL;
718
719 return (error);
720}
721
722mbuf_svc_class_t
723m_get_service_class(struct mbuf *m)
724{
725 mbuf_svc_class_t sc;
726
727 VERIFY(m->m_flags & M_PKTHDR);
728
39236c6e
A
729 if (MBUF_VALID_SC(m->m_pkthdr.pkt_svc))
730 sc = m->m_pkthdr.pkt_svc;
316670eb
A
731 else
732 sc = MBUF_SC_BE;
733
734 return (sc);
735}
736
737mbuf_svc_class_t
738m_service_class_from_idx(u_int32_t i)
739{
740 mbuf_svc_class_t sc = MBUF_SC_BE;
741
742 switch (i) {
743 case SCIDX_BK_SYS:
744 return (MBUF_SC_BK_SYS);
745
746 case SCIDX_BK:
747 return (MBUF_SC_BK);
748
749 case SCIDX_BE:
750 return (MBUF_SC_BE);
751
752 case SCIDX_RD:
753 return (MBUF_SC_RD);
754
755 case SCIDX_OAM:
756 return (MBUF_SC_OAM);
757
758 case SCIDX_AV:
759 return (MBUF_SC_AV);
760
761 case SCIDX_RV:
762 return (MBUF_SC_RV);
763
764 case SCIDX_VI:
765 return (MBUF_SC_VI);
766
767 case SCIDX_VO:
768 return (MBUF_SC_VO);
769
770 case SCIDX_CTL:
771 return (MBUF_SC_CTL);
772
773 default:
774 break;
775 }
776
777 VERIFY(0);
778 /* NOTREACHED */
779 return (sc);
780}
781
782mbuf_svc_class_t
783m_service_class_from_val(u_int32_t v)
784{
785 mbuf_svc_class_t sc = MBUF_SC_BE;
786
787 switch (v) {
788 case SCVAL_BK_SYS:
789 return (MBUF_SC_BK_SYS);
790
791 case SCVAL_BK:
792 return (MBUF_SC_BK);
793
794 case SCVAL_BE:
795 return (MBUF_SC_BE);
796
797 case SCVAL_RD:
798 return (MBUF_SC_RD);
799
800 case SCVAL_OAM:
801 return (MBUF_SC_OAM);
802
803 case SCVAL_AV:
804 return (MBUF_SC_AV);
805
806 case SCVAL_RV:
807 return (MBUF_SC_RV);
808
809 case SCVAL_VI:
810 return (MBUF_SC_VI);
811
812 case SCVAL_VO:
813 return (MBUF_SC_VO);
814
815 case SCVAL_CTL:
816 return (MBUF_SC_CTL);
817
818 default:
819 break;
820 }
821
822 VERIFY(0);
823 /* NOTREACHED */
824 return (sc);
d1ecb069 825}
39236c6e
A
826
827uint16_t
828m_adj_sum16(struct mbuf *m, uint32_t start, uint32_t ulpoff, uint32_t sum)
829{
830 int len = (ulpoff - start);
831
832 if (len > 0) {
833 uint32_t adj = m_sum16(m, start, len);
834 if (adj >= sum)
835 sum = ~(adj - sum) & 0xffff;
836 else
837 sum -= adj;
838 } else if (len < 0) {
839 sum += m_sum16(m, ulpoff, -len);
840 }
841
842 ADDCARRY(sum);
843
844 return (sum);
845}
846
847extern int cpu_in_cksum(struct mbuf *m, int len, int off, uint32_t initial_sum);
848
849uint16_t
850m_sum16(struct mbuf *m, uint32_t off, uint32_t len)
851{
852 int mlen;
853
854 /*
855 * Sanity check
856 *
857 * Use m_length2() instead of m_length(), as we cannot rely on
858 * the caller setting m_pkthdr.len correctly, if the mbuf is
859 * a M_PKTHDR one.
860 */
861 if ((mlen = m_length2(m, NULL)) < (off + len)) {
862 panic("%s: mbuf len (%d) < off+len (%d+%d)\n", __func__,
863 mlen, off, len);
864 }
865
866 return (~cpu_in_cksum(m, len, off, 0) & 0xffff);
867}