2015-05-12 15:56:15 +03:00
# include <linux/kernel.h>
2011-11-28 09:22:18 +04:00
# include <linux/skbuff.h>
2012-01-25 01:03:33 +04:00
# include <linux/export.h>
2011-11-28 09:22:18 +04:00
# include <linux/ip.h>
# include <linux/ipv6.h>
# include <linux/if_vlan.h>
# include <net/ip.h>
2012-07-18 12:11:12 +04:00
# include <net/ipv6.h>
2013-03-19 10:39:30 +04:00
# include <linux/igmp.h>
# include <linux/icmp.h>
# include <linux/sctp.h>
# include <linux/dccp.h>
2011-11-28 09:22:18 +04:00
# include <linux/if_tunnel.h>
# include <linux/if_pppox.h>
# include <linux/ppp_defs.h>
2015-05-12 15:56:16 +03:00
# include <linux/stddef.h>
2015-05-12 15:56:19 +03:00
# include <linux/if_ether.h>
2015-05-12 15:56:07 +03:00
# include <net/flow_dissector.h>
2014-09-06 03:20:26 +04:00
# include <scsi/fc/fc_fcoe.h>
2011-11-28 09:22:18 +04:00
2015-05-12 15:56:15 +03:00
static bool skb_flow_dissector_uses_key ( struct flow_dissector * flow_dissector ,
enum flow_dissector_key_id key_id )
{
return flow_dissector - > used_keys & ( 1 < < key_id ) ;
}
static void skb_flow_dissector_set_key ( struct flow_dissector * flow_dissector ,
enum flow_dissector_key_id key_id )
{
flow_dissector - > used_keys | = ( 1 < < key_id ) ;
}
static void * skb_flow_dissector_target ( struct flow_dissector * flow_dissector ,
enum flow_dissector_key_id key_id ,
void * target_container )
{
return ( ( char * ) target_container ) + flow_dissector - > offset [ key_id ] ;
}
void skb_flow_dissector_init ( struct flow_dissector * flow_dissector ,
const struct flow_dissector_key * key ,
unsigned int key_count )
{
unsigned int i ;
memset ( flow_dissector , 0 , sizeof ( * flow_dissector ) ) ;
for ( i = 0 ; i < key_count ; i + + , key + + ) {
/* User should make sure that every key target offset is withing
* boundaries of unsigned short .
*/
BUG_ON ( key - > offset > USHRT_MAX ) ;
BUG_ON ( skb_flow_dissector_uses_key ( flow_dissector ,
key - > key_id ) ) ;
skb_flow_dissector_set_key ( flow_dissector , key - > key_id ) ;
flow_dissector - > offset [ key - > key_id ] = key - > offset ;
}
2015-06-04 19:16:39 +03:00
/* Ensure that the dissector always includes control and basic key.
* That way we are able to avoid handling lack of these in fast path .
2015-05-12 15:56:15 +03:00
*/
2015-06-04 19:16:39 +03:00
BUG_ON ( ! skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_CONTROL ) ) ;
2015-05-12 15:56:15 +03:00
BUG_ON ( ! skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_BASIC ) ) ;
}
EXPORT_SYMBOL ( skb_flow_dissector_init ) ;
2013-10-02 15:39:24 +04:00
/**
2014-08-26 04:03:46 +04:00
* __skb_flow_get_ports - extract the upper layer ports and return them
* @ skb : sk_buff to extract the ports from
2013-10-02 15:39:24 +04:00
* @ thoff : transport header offset
* @ ip_proto : protocol for which to get port offset
2014-08-26 04:03:46 +04:00
* @ data : raw buffer pointer to the packet , if NULL use skb - > data
* @ hlen : packet header length , if @ data is NULL use skb_headlen ( skb )
2013-10-02 15:39:24 +04:00
*
* The function will try to retrieve the ports at offset thoff + poff where poff
* is the protocol port offset returned from proto_ports_offset
*/
2014-08-23 23:13:41 +04:00
__be32 __skb_flow_get_ports ( const struct sk_buff * skb , int thoff , u8 ip_proto ,
void * data , int hlen )
2013-10-02 15:39:24 +04:00
{
int poff = proto_ports_offset ( ip_proto ) ;
2014-08-23 23:13:41 +04:00
if ( ! data ) {
data = skb - > data ;
hlen = skb_headlen ( skb ) ;
}
2013-10-02 15:39:24 +04:00
if ( poff > = 0 ) {
__be32 * ports , _ports ;
2014-08-23 23:13:41 +04:00
ports = __skb_header_pointer ( skb , thoff + poff ,
sizeof ( _ports ) , data , hlen , & _ports ) ;
2013-10-02 15:39:24 +04:00
if ( ports )
return * ports ;
}
return 0 ;
}
2014-08-23 23:13:41 +04:00
EXPORT_SYMBOL ( __skb_flow_get_ports ) ;
2013-10-02 15:39:24 +04:00
2014-08-26 04:03:47 +04:00
/**
* __skb_flow_dissect - extract the flow_keys struct and return it
* @ skb : sk_buff to extract the flow from , can be NULL if the rest are specified
2015-05-12 15:56:16 +03:00
* @ flow_dissector : list of keys to dissect
* @ target_container : target structure to put dissected values into
2014-08-26 04:03:47 +04:00
* @ data : raw buffer pointer to the packet , if NULL use skb - > data
* @ proto : protocol for which to get the flow , if @ data is NULL use skb - > protocol
* @ nhoff : network header offset , if @ data is NULL use skb_network_offset ( skb )
* @ hlen : packet header length , if @ data is NULL use skb_headlen ( skb )
*
2015-05-12 15:56:16 +03:00
* The function will try to retrieve individual keys into target specified
* by flow_dissector from either the skbuff or a raw buffer specified by the
* rest parameters .
*
* Caller must take care of zeroing target container memory .
2014-08-26 04:03:47 +04:00
*/
2015-05-12 15:56:16 +03:00
bool __skb_flow_dissect ( const struct sk_buff * skb ,
struct flow_dissector * flow_dissector ,
void * target_container ,
2014-08-26 04:03:47 +04:00
void * data , __be16 proto , int nhoff , int hlen )
2011-11-28 09:22:18 +04:00
{
2015-06-04 19:16:39 +03:00
struct flow_dissector_key_control * key_control ;
2015-05-12 15:56:16 +03:00
struct flow_dissector_key_basic * key_basic ;
struct flow_dissector_key_addrs * key_addrs ;
struct flow_dissector_key_ports * key_ports ;
2011-11-28 09:22:18 +04:00
u8 ip_proto ;
2014-08-23 23:13:41 +04:00
if ( ! data ) {
data = skb - > data ;
2014-08-26 04:03:47 +04:00
proto = skb - > protocol ;
nhoff = skb_network_offset ( skb ) ;
2014-08-23 23:13:41 +04:00
hlen = skb_headlen ( skb ) ;
}
2015-06-04 19:16:39 +03:00
/* It is ensured by skb_flow_dissector_init() that control key will
* be always present .
*/
key_control = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_CONTROL ,
target_container ) ;
2015-05-12 15:56:16 +03:00
/* It is ensured by skb_flow_dissector_init() that basic key will
* be always present .
*/
key_basic = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_BASIC ,
target_container ) ;
2011-11-28 09:22:18 +04:00
2015-05-12 15:56:19 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_ETH_ADDRS ) ) {
struct ethhdr * eth = eth_hdr ( skb ) ;
struct flow_dissector_key_eth_addrs * key_eth_addrs ;
key_eth_addrs = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_ETH_ADDRS ,
target_container ) ;
memcpy ( key_eth_addrs , & eth - > h_dest , sizeof ( * key_eth_addrs ) ) ;
}
2011-11-28 09:22:18 +04:00
again :
switch ( proto ) {
2014-03-12 21:04:17 +04:00
case htons ( ETH_P_IP ) : {
2011-11-28 09:22:18 +04:00
const struct iphdr * iph ;
struct iphdr _iph ;
ip :
2014-08-23 23:13:41 +04:00
iph = __skb_header_pointer ( skb , nhoff , sizeof ( _iph ) , data , hlen , & _iph ) ;
2013-11-01 11:01:10 +04:00
if ( ! iph | | iph - > ihl < 5 )
2011-11-28 09:22:18 +04:00
return false ;
2013-11-07 20:37:28 +04:00
nhoff + = iph - > ihl * 4 ;
2011-11-28 09:22:18 +04:00
2013-11-07 20:37:28 +04:00
ip_proto = iph - > protocol ;
2011-11-28 09:22:18 +04:00
if ( ip_is_fragment ( iph ) )
ip_proto = 0 ;
2013-11-07 20:37:28 +04:00
2015-05-12 15:56:16 +03:00
if ( ! skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_IPV4_ADDRS ) )
2014-10-10 23:09:12 +04:00
break ;
2015-06-04 19:16:40 +03:00
2015-05-12 15:56:16 +03:00
key_addrs = skb_flow_dissector_target ( flow_dissector ,
2015-06-04 19:16:40 +03:00
FLOW_DISSECTOR_KEY_IPV4_ADDRS , target_container ) ;
memcpy ( & key_addrs - > v4addrs , & iph - > saddr ,
sizeof ( key_addrs - > v4addrs ) ) ;
key_control - > addr_type = FLOW_DISSECTOR_KEY_IPV4_ADDRS ;
2011-11-28 09:22:18 +04:00
break ;
}
2014-03-12 21:04:17 +04:00
case htons ( ETH_P_IPV6 ) : {
2011-11-28 09:22:18 +04:00
const struct ipv6hdr * iph ;
struct ipv6hdr _iph ;
2014-07-02 08:33:01 +04:00
__be32 flow_label ;
2011-11-28 09:22:18 +04:00
ipv6 :
2014-08-23 23:13:41 +04:00
iph = __skb_header_pointer ( skb , nhoff , sizeof ( _iph ) , data , hlen , & _iph ) ;
2011-11-28 09:22:18 +04:00
if ( ! iph )
return false ;
ip_proto = iph - > nexthdr ;
nhoff + = sizeof ( struct ipv6hdr ) ;
2014-07-02 08:33:01 +04:00
2015-05-12 15:56:18 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_IPV6_HASH_ADDRS ) ) {
key_addrs = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_IPV6_HASH_ADDRS ,
target_container ) ;
2014-09-06 03:20:26 +04:00
2015-06-04 19:16:40 +03:00
key_addrs - > v4addrs . src =
( __force __be32 ) ipv6_addr_hash ( & iph - > saddr ) ;
key_addrs - > v4addrs . dst =
( __force __be32 ) ipv6_addr_hash ( & iph - > daddr ) ;
key_control - > addr_type = FLOW_DISSECTOR_KEY_IPV4_ADDRS ;
2015-05-12 15:56:18 +03:00
goto flow_label ;
}
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_IPV6_ADDRS ) ) {
struct flow_dissector_key_ipv6_addrs * key_ipv6_addrs ;
key_ipv6_addrs = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_IPV6_ADDRS ,
target_container ) ;
2014-10-10 23:09:12 +04:00
2015-05-12 15:56:18 +03:00
memcpy ( key_ipv6_addrs , & iph - > saddr , sizeof ( * key_ipv6_addrs ) ) ;
2015-06-04 19:16:40 +03:00
key_control - > addr_type = FLOW_DISSECTOR_KEY_IPV6_ADDRS ;
2015-05-12 15:56:18 +03:00
goto flow_label ;
}
break ;
flow_label :
2014-07-02 08:33:01 +04:00
flow_label = ip6_flowlabel ( iph ) ;
if ( flow_label ) {
/* Awesome, IPv6 packet has a flow label so we can
* use that to represent the ports without any
* further dissection .
*/
2015-05-12 15:56:16 +03:00
key_basic - > n_proto = proto ;
key_basic - > ip_proto = ip_proto ;
2015-06-04 19:16:39 +03:00
key_control - > thoff = ( u16 ) nhoff ;
2015-05-12 15:56:16 +03:00
2015-05-22 12:05:58 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_PORTS ) ) {
key_ports = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_PORTS ,
target_container ) ;
key_ports - > ports = flow_label ;
}
2014-07-02 08:33:01 +04:00
return true ;
}
2011-11-28 09:22:18 +04:00
break ;
}
2014-03-12 21:04:17 +04:00
case htons ( ETH_P_8021AD ) :
case htons ( ETH_P_8021Q ) : {
2011-11-28 09:22:18 +04:00
const struct vlan_hdr * vlan ;
struct vlan_hdr _vlan ;
2014-08-23 23:13:41 +04:00
vlan = __skb_header_pointer ( skb , nhoff , sizeof ( _vlan ) , data , hlen , & _vlan ) ;
2011-11-28 09:22:18 +04:00
if ( ! vlan )
return false ;
proto = vlan - > h_vlan_encapsulated_proto ;
nhoff + = sizeof ( * vlan ) ;
goto again ;
}
2014-03-12 21:04:17 +04:00
case htons ( ETH_P_PPP_SES ) : {
2011-11-28 09:22:18 +04:00
struct {
struct pppoe_hdr hdr ;
__be16 proto ;
} * hdr , _hdr ;
2014-08-23 23:13:41 +04:00
hdr = __skb_header_pointer ( skb , nhoff , sizeof ( _hdr ) , data , hlen , & _hdr ) ;
2011-11-28 09:22:18 +04:00
if ( ! hdr )
return false ;
proto = hdr - > proto ;
nhoff + = PPPOE_SES_HLEN ;
switch ( proto ) {
2014-03-12 21:04:17 +04:00
case htons ( PPP_IP ) :
2011-11-28 09:22:18 +04:00
goto ip ;
2014-03-12 21:04:17 +04:00
case htons ( PPP_IPV6 ) :
2011-11-28 09:22:18 +04:00
goto ipv6 ;
default :
return false ;
}
}
2015-01-22 19:10:32 +03:00
case htons ( ETH_P_TIPC ) : {
struct {
__be32 pre [ 3 ] ;
__be32 srcnode ;
} * hdr , _hdr ;
hdr = __skb_header_pointer ( skb , nhoff , sizeof ( _hdr ) , data , hlen , & _hdr ) ;
if ( ! hdr )
return false ;
2015-05-12 15:56:16 +03:00
key_basic - > n_proto = proto ;
2015-06-04 19:16:39 +03:00
key_control - > thoff = ( u16 ) nhoff ;
2015-05-12 15:56:16 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_IPV6_HASH_ADDRS ) ) {
key_addrs = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_IPV6_HASH_ADDRS ,
target_container ) ;
2015-06-04 19:16:40 +03:00
key_addrs - > v4addrs . src = hdr - > srcnode ;
key_addrs - > v4addrs . dst = 0 ;
key_control - > addr_type = FLOW_DISSECTOR_KEY_IPV4_ADDRS ;
2015-05-12 15:56:16 +03:00
}
2015-01-22 19:10:32 +03:00
return true ;
}
2014-09-06 03:20:26 +04:00
case htons ( ETH_P_FCOE ) :
2015-06-04 19:16:39 +03:00
key_control - > thoff = ( u16 ) ( nhoff + FCOE_HEADER_LEN ) ;
2014-09-06 03:20:26 +04:00
/* fall through */
2011-11-28 09:22:18 +04:00
default :
return false ;
}
switch ( ip_proto ) {
case IPPROTO_GRE : {
struct gre_hdr {
__be16 flags ;
__be16 proto ;
} * hdr , _hdr ;
2014-08-23 23:13:41 +04:00
hdr = __skb_header_pointer ( skb , nhoff , sizeof ( _hdr ) , data , hlen , & _hdr ) ;
2011-11-28 09:22:18 +04:00
if ( ! hdr )
return false ;
/*
* Only look inside GRE if version zero and no
* routing
*/
2015-06-04 19:16:36 +03:00
if ( hdr - > flags & ( GRE_VERSION | GRE_ROUTING ) )
break ;
proto = hdr - > proto ;
nhoff + = 4 ;
if ( hdr - > flags & GRE_CSUM )
2011-11-28 09:22:18 +04:00
nhoff + = 4 ;
2015-06-04 19:16:36 +03:00
if ( hdr - > flags & GRE_KEY )
nhoff + = 4 ;
if ( hdr - > flags & GRE_SEQ )
nhoff + = 4 ;
if ( proto = = htons ( ETH_P_TEB ) ) {
const struct ethhdr * eth ;
struct ethhdr _eth ;
eth = __skb_header_pointer ( skb , nhoff ,
sizeof ( _eth ) ,
data , hlen , & _eth ) ;
if ( ! eth )
return false ;
proto = eth - > h_proto ;
nhoff + = sizeof ( * eth ) ;
2011-11-28 09:22:18 +04:00
}
2015-06-04 19:16:36 +03:00
goto again ;
2011-11-28 09:22:18 +04:00
}
case IPPROTO_IPIP :
2013-07-29 22:07:36 +04:00
proto = htons ( ETH_P_IP ) ;
goto ip ;
2013-07-29 22:07:42 +04:00
case IPPROTO_IPV6 :
proto = htons ( ETH_P_IPV6 ) ;
goto ipv6 ;
2011-11-28 09:22:18 +04:00
default :
break ;
}
2015-05-12 15:56:16 +03:00
key_basic - > n_proto = proto ;
key_basic - > ip_proto = ip_proto ;
2015-06-04 19:16:39 +03:00
key_control - > thoff = ( u16 ) nhoff ;
2015-05-12 15:56:16 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_PORTS ) ) {
key_ports = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_PORTS ,
target_container ) ;
key_ports - > ports = __skb_flow_get_ports ( skb , nhoff , ip_proto ,
data , hlen ) ;
}
2014-10-10 23:09:12 +04:00
2011-11-28 09:22:18 +04:00
return true ;
}
2014-08-23 23:13:41 +04:00
EXPORT_SYMBOL ( __skb_flow_dissect ) ;
2013-01-21 04:39:24 +04:00
static u32 hashrnd __read_mostly ;
2013-10-23 22:06:00 +04:00
static __always_inline void __flow_hash_secret_init ( void )
{
net_get_random_once ( & hashrnd , sizeof ( hashrnd ) ) ;
}
2015-06-04 19:16:39 +03:00
static __always_inline u32 __flow_hash_words ( u32 * words , u32 length , u32 keyval )
{
return jhash2 ( words , length , keyval ) ;
}
static inline void * flow_keys_hash_start ( struct flow_keys * flow )
2013-10-23 22:06:00 +04:00
{
2015-06-04 19:16:39 +03:00
BUILD_BUG_ON ( FLOW_KEYS_HASH_OFFSET % sizeof ( u32 ) ) ;
return ( void * ) flow + FLOW_KEYS_HASH_OFFSET ;
}
static inline size_t flow_keys_hash_length ( struct flow_keys * flow )
{
2015-06-04 19:16:40 +03:00
size_t diff = FLOW_KEYS_HASH_OFFSET + sizeof ( flow - > addrs ) ;
2015-06-04 19:16:39 +03:00
BUILD_BUG_ON ( ( sizeof ( * flow ) - FLOW_KEYS_HASH_OFFSET ) % sizeof ( u32 ) ) ;
2015-06-04 19:16:40 +03:00
BUILD_BUG_ON ( offsetof ( typeof ( * flow ) , addrs ) ! =
sizeof ( * flow ) - sizeof ( flow - > addrs ) ) ;
switch ( flow - > control . addr_type ) {
case FLOW_DISSECTOR_KEY_IPV4_ADDRS :
diff - = sizeof ( flow - > addrs . v4addrs ) ;
break ;
case FLOW_DISSECTOR_KEY_IPV6_ADDRS :
diff - = sizeof ( flow - > addrs . v6addrs ) ;
break ;
}
return ( sizeof ( * flow ) - diff ) / sizeof ( u32 ) ;
}
__be32 flow_get_u32_src ( const struct flow_keys * flow )
{
switch ( flow - > control . addr_type ) {
case FLOW_DISSECTOR_KEY_IPV4_ADDRS :
return flow - > addrs . v4addrs . src ;
case FLOW_DISSECTOR_KEY_IPV6_ADDRS :
return ( __force __be32 ) ipv6_addr_hash (
& flow - > addrs . v6addrs . src ) ;
default :
return 0 ;
}
}
EXPORT_SYMBOL ( flow_get_u32_src ) ;
__be32 flow_get_u32_dst ( const struct flow_keys * flow )
{
switch ( flow - > control . addr_type ) {
case FLOW_DISSECTOR_KEY_IPV4_ADDRS :
return flow - > addrs . v4addrs . dst ;
case FLOW_DISSECTOR_KEY_IPV6_ADDRS :
return ( __force __be32 ) ipv6_addr_hash (
& flow - > addrs . v6addrs . dst ) ;
default :
return 0 ;
}
}
EXPORT_SYMBOL ( flow_get_u32_dst ) ;
static inline void __flow_hash_consistentify ( struct flow_keys * keys )
{
int addr_diff , i ;
switch ( keys - > control . addr_type ) {
case FLOW_DISSECTOR_KEY_IPV4_ADDRS :
addr_diff = ( __force u32 ) keys - > addrs . v4addrs . dst -
( __force u32 ) keys - > addrs . v4addrs . src ;
if ( ( addr_diff < 0 ) | |
( addr_diff = = 0 & &
( ( __force u16 ) keys - > ports . dst <
( __force u16 ) keys - > ports . src ) ) ) {
swap ( keys - > addrs . v4addrs . src , keys - > addrs . v4addrs . dst ) ;
swap ( keys - > ports . src , keys - > ports . dst ) ;
}
break ;
case FLOW_DISSECTOR_KEY_IPV6_ADDRS :
addr_diff = memcmp ( & keys - > addrs . v6addrs . dst ,
& keys - > addrs . v6addrs . src ,
sizeof ( keys - > addrs . v6addrs . dst ) ) ;
if ( ( addr_diff < 0 ) | |
( addr_diff = = 0 & &
( ( __force u16 ) keys - > ports . dst <
( __force u16 ) keys - > ports . src ) ) ) {
for ( i = 0 ; i < 4 ; i + + )
swap ( keys - > addrs . v6addrs . src . s6_addr32 [ i ] ,
keys - > addrs . v6addrs . dst . s6_addr32 [ i ] ) ;
swap ( keys - > ports . src , keys - > ports . dst ) ;
}
break ;
}
2013-10-23 22:06:00 +04:00
}
2015-05-01 21:30:12 +03:00
static inline u32 __flow_hash_from_keys ( struct flow_keys * keys , u32 keyval )
2014-07-02 08:32:05 +04:00
{
u32 hash ;
2015-06-04 19:16:40 +03:00
__flow_hash_consistentify ( keys ) ;
2014-07-02 08:32:05 +04:00
2015-06-04 19:16:39 +03:00
hash = __flow_hash_words ( ( u32 * ) flow_keys_hash_start ( keys ) ,
flow_keys_hash_length ( keys ) , keyval ) ;
2014-07-02 08:32:05 +04:00
if ( ! hash )
hash = 1 ;
return hash ;
}
u32 flow_hash_from_keys ( struct flow_keys * keys )
{
2015-05-01 21:30:12 +03:00
__flow_hash_secret_init ( ) ;
return __flow_hash_from_keys ( keys , hashrnd ) ;
2014-07-02 08:32:05 +04:00
}
EXPORT_SYMBOL ( flow_hash_from_keys ) ;
2015-05-01 21:30:12 +03:00
static inline u32 ___skb_get_hash ( const struct sk_buff * skb ,
struct flow_keys * keys , u32 keyval )
{
2015-05-12 15:56:16 +03:00
if ( ! skb_flow_dissect_flow_keys ( skb , keys ) )
2015-05-01 21:30:12 +03:00
return 0 ;
return __flow_hash_from_keys ( keys , keyval ) ;
}
2015-05-01 21:30:17 +03:00
struct _flow_keys_digest_data {
__be16 n_proto ;
u8 ip_proto ;
u8 padding ;
__be32 ports ;
__be32 src ;
__be32 dst ;
} ;
void make_flow_keys_digest ( struct flow_keys_digest * digest ,
const struct flow_keys * flow )
{
struct _flow_keys_digest_data * data =
( struct _flow_keys_digest_data * ) digest ;
BUILD_BUG_ON ( sizeof ( * data ) > sizeof ( * digest ) ) ;
memset ( digest , 0 , sizeof ( * digest ) ) ;
2015-05-12 15:56:16 +03:00
data - > n_proto = flow - > basic . n_proto ;
data - > ip_proto = flow - > basic . ip_proto ;
data - > ports = flow - > ports . ports ;
2015-06-04 19:16:40 +03:00
data - > src = flow - > addrs . v4addrs . src ;
data - > dst = flow - > addrs . v4addrs . dst ;
2015-05-01 21:30:17 +03:00
}
EXPORT_SYMBOL ( make_flow_keys_digest ) ;
2015-05-12 15:56:10 +03:00
/**
* __skb_get_hash : calculate a flow hash
* @ skb : sk_buff to calculate flow hash from
*
* This function calculates a flow hash based on src / dst addresses
2014-03-25 02:34:47 +04:00
* and src / dst port numbers . Sets hash in skb to non - zero hash value
* on success , zero indicates no valid hash . Also , sets l4_hash in skb
2013-01-21 04:39:24 +04:00
* if hash is a canonical 4 - tuple hash over transport ports .
*/
2013-12-16 10:12:06 +04:00
void __skb_get_hash ( struct sk_buff * skb )
2013-01-21 04:39:24 +04:00
{
struct flow_keys keys ;
2015-05-01 21:30:12 +03:00
u32 hash ;
2013-01-21 04:39:24 +04:00
2015-05-01 21:30:12 +03:00
__flow_hash_secret_init ( ) ;
hash = ___skb_get_hash ( skb , & keys , hashrnd ) ;
if ( ! hash )
2013-01-21 04:39:24 +04:00
return ;
2015-05-12 15:56:16 +03:00
if ( keys . ports . ports )
2014-03-25 02:34:47 +04:00
skb - > l4_hash = 1 ;
2014-07-02 08:33:17 +04:00
skb - > sw_hash = 1 ;
2015-05-01 21:30:12 +03:00
skb - > hash = hash ;
2013-01-21 04:39:24 +04:00
}
2013-12-16 10:12:06 +04:00
EXPORT_SYMBOL ( __skb_get_hash ) ;
2013-01-21 04:39:24 +04:00
2015-05-01 21:30:12 +03:00
__u32 skb_get_hash_perturb ( const struct sk_buff * skb , u32 perturb )
{
struct flow_keys keys ;
return ___skb_get_hash ( skb , & keys , perturb ) ;
}
EXPORT_SYMBOL ( skb_get_hash_perturb ) ;
2014-09-06 03:20:26 +04:00
u32 __skb_get_poff ( const struct sk_buff * skb , void * data ,
const struct flow_keys * keys , int hlen )
2013-03-19 10:39:30 +04:00
{
2015-06-04 19:16:39 +03:00
u32 poff = keys - > control . thoff ;
2013-03-19 10:39:30 +04:00
2015-05-12 15:56:16 +03:00
switch ( keys - > basic . ip_proto ) {
2013-03-19 10:39:30 +04:00
case IPPROTO_TCP : {
2014-10-10 23:09:12 +04:00
/* access doff as u8 to avoid unaligned access */
const u8 * doff ;
u8 _doff ;
2013-03-19 10:39:30 +04:00
2014-10-10 23:09:12 +04:00
doff = __skb_header_pointer ( skb , poff + 12 , sizeof ( _doff ) ,
data , hlen , & _doff ) ;
if ( ! doff )
2013-03-19 10:39:30 +04:00
return poff ;
2014-10-10 23:09:12 +04:00
poff + = max_t ( u32 , sizeof ( struct tcphdr ) , ( * doff & 0xF0 ) > > 2 ) ;
2013-03-19 10:39:30 +04:00
break ;
}
case IPPROTO_UDP :
case IPPROTO_UDPLITE :
poff + = sizeof ( struct udphdr ) ;
break ;
/* For the rest, we do not really care about header
* extensions at this point for now .
*/
case IPPROTO_ICMP :
poff + = sizeof ( struct icmphdr ) ;
break ;
case IPPROTO_ICMPV6 :
poff + = sizeof ( struct icmp6hdr ) ;
break ;
case IPPROTO_IGMP :
poff + = sizeof ( struct igmphdr ) ;
break ;
case IPPROTO_DCCP :
poff + = sizeof ( struct dccp_hdr ) ;
break ;
case IPPROTO_SCTP :
poff + = sizeof ( struct sctphdr ) ;
break ;
}
return poff ;
}
2015-05-12 15:56:14 +03:00
/**
* skb_get_poff - get the offset to the payload
* @ skb : sk_buff to get the payload offset from
*
* The function will get the offset to the payload as far as it could
* be dissected . The main user is currently BPF , so that we can dynamically
2014-09-06 03:20:26 +04:00
* truncate packets without needing to push actual payload to the user
* space and can analyze headers only , instead .
*/
u32 skb_get_poff ( const struct sk_buff * skb )
{
struct flow_keys keys ;
2015-05-12 15:56:16 +03:00
if ( ! skb_flow_dissect_flow_keys ( skb , & keys ) )
2014-09-06 03:20:26 +04:00
return 0 ;
return __skb_get_poff ( skb , skb - > data , & keys , skb_headlen ( skb ) ) ;
}
2015-05-12 15:56:16 +03:00
static const struct flow_dissector_key flow_keys_dissector_keys [ ] = {
2015-06-04 19:16:39 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_CONTROL ,
. offset = offsetof ( struct flow_keys , control ) ,
} ,
2015-05-12 15:56:16 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_BASIC ,
. offset = offsetof ( struct flow_keys , basic ) ,
} ,
{
. key_id = FLOW_DISSECTOR_KEY_IPV4_ADDRS ,
2015-06-04 19:16:40 +03:00
. offset = offsetof ( struct flow_keys , addrs . v4addrs ) ,
} ,
{
. key_id = FLOW_DISSECTOR_KEY_IPV6_ADDRS ,
. offset = offsetof ( struct flow_keys , addrs . v6addrs ) ,
2015-05-12 15:56:16 +03:00
} ,
{
. key_id = FLOW_DISSECTOR_KEY_IPV6_HASH_ADDRS ,
2015-06-04 19:16:40 +03:00
. offset = offsetof ( struct flow_keys , addrs . v4addrs ) ,
2015-05-12 15:56:16 +03:00
} ,
{
. key_id = FLOW_DISSECTOR_KEY_PORTS ,
. offset = offsetof ( struct flow_keys , ports ) ,
} ,
} ;
static const struct flow_dissector_key flow_keys_buf_dissector_keys [ ] = {
2015-06-04 19:16:39 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_CONTROL ,
. offset = offsetof ( struct flow_keys , control ) ,
} ,
2015-05-12 15:56:16 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_BASIC ,
. offset = offsetof ( struct flow_keys , basic ) ,
} ,
} ;
struct flow_dissector flow_keys_dissector __read_mostly ;
EXPORT_SYMBOL ( flow_keys_dissector ) ;
struct flow_dissector flow_keys_buf_dissector __read_mostly ;
static int __init init_default_flow_dissectors ( void )
{
skb_flow_dissector_init ( & flow_keys_dissector ,
flow_keys_dissector_keys ,
ARRAY_SIZE ( flow_keys_dissector_keys ) ) ;
skb_flow_dissector_init ( & flow_keys_buf_dissector ,
flow_keys_buf_dissector_keys ,
ARRAY_SIZE ( flow_keys_buf_dissector_keys ) ) ;
return 0 ;
}
late_initcall_sync ( init_default_flow_dissectors ) ;