2015-05-12 15:56:15 +03:00
# include <linux/kernel.h>
2011-11-28 09:22:18 +04:00
# include <linux/skbuff.h>
2012-01-25 01:03:33 +04:00
# include <linux/export.h>
2011-11-28 09:22:18 +04:00
# include <linux/ip.h>
# include <linux/ipv6.h>
# include <linux/if_vlan.h>
# include <net/ip.h>
2012-07-18 12:11:12 +04:00
# include <net/ipv6.h>
2013-03-19 10:39:30 +04:00
# include <linux/igmp.h>
# include <linux/icmp.h>
# include <linux/sctp.h>
# include <linux/dccp.h>
2011-11-28 09:22:18 +04:00
# include <linux/if_tunnel.h>
# include <linux/if_pppox.h>
# include <linux/ppp_defs.h>
2015-05-12 15:56:16 +03:00
# include <linux/stddef.h>
2015-05-12 15:56:19 +03:00
# include <linux/if_ether.h>
2015-06-04 19:16:46 +03:00
# include <linux/mpls.h>
2015-05-12 15:56:07 +03:00
# include <net/flow_dissector.h>
2014-09-06 03:20:26 +04:00
# include <scsi/fc/fc_fcoe.h>
2011-11-28 09:22:18 +04:00
2015-05-12 15:56:15 +03:00
static bool skb_flow_dissector_uses_key ( struct flow_dissector * flow_dissector ,
enum flow_dissector_key_id key_id )
{
return flow_dissector - > used_keys & ( 1 < < key_id ) ;
}
static void skb_flow_dissector_set_key ( struct flow_dissector * flow_dissector ,
enum flow_dissector_key_id key_id )
{
flow_dissector - > used_keys | = ( 1 < < key_id ) ;
}
static void * skb_flow_dissector_target ( struct flow_dissector * flow_dissector ,
enum flow_dissector_key_id key_id ,
void * target_container )
{
return ( ( char * ) target_container ) + flow_dissector - > offset [ key_id ] ;
}
void skb_flow_dissector_init ( struct flow_dissector * flow_dissector ,
const struct flow_dissector_key * key ,
unsigned int key_count )
{
unsigned int i ;
memset ( flow_dissector , 0 , sizeof ( * flow_dissector ) ) ;
for ( i = 0 ; i < key_count ; i + + , key + + ) {
/* User should make sure that every key target offset is withing
* boundaries of unsigned short .
*/
BUG_ON ( key - > offset > USHRT_MAX ) ;
BUG_ON ( skb_flow_dissector_uses_key ( flow_dissector ,
key - > key_id ) ) ;
skb_flow_dissector_set_key ( flow_dissector , key - > key_id ) ;
flow_dissector - > offset [ key - > key_id ] = key - > offset ;
}
2015-06-04 19:16:39 +03:00
/* Ensure that the dissector always includes control and basic key.
* That way we are able to avoid handling lack of these in fast path .
2015-05-12 15:56:15 +03:00
*/
2015-06-04 19:16:39 +03:00
BUG_ON ( ! skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_CONTROL ) ) ;
2015-05-12 15:56:15 +03:00
BUG_ON ( ! skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_BASIC ) ) ;
}
EXPORT_SYMBOL ( skb_flow_dissector_init ) ;
2013-10-02 15:39:24 +04:00
/**
2014-08-26 04:03:46 +04:00
* __skb_flow_get_ports - extract the upper layer ports and return them
* @ skb : sk_buff to extract the ports from
2013-10-02 15:39:24 +04:00
* @ thoff : transport header offset
* @ ip_proto : protocol for which to get port offset
2014-08-26 04:03:46 +04:00
* @ data : raw buffer pointer to the packet , if NULL use skb - > data
* @ hlen : packet header length , if @ data is NULL use skb_headlen ( skb )
2013-10-02 15:39:24 +04:00
*
* The function will try to retrieve the ports at offset thoff + poff where poff
* is the protocol port offset returned from proto_ports_offset
*/
2014-08-23 23:13:41 +04:00
__be32 __skb_flow_get_ports ( const struct sk_buff * skb , int thoff , u8 ip_proto ,
void * data , int hlen )
2013-10-02 15:39:24 +04:00
{
int poff = proto_ports_offset ( ip_proto ) ;
2014-08-23 23:13:41 +04:00
if ( ! data ) {
data = skb - > data ;
hlen = skb_headlen ( skb ) ;
}
2013-10-02 15:39:24 +04:00
if ( poff > = 0 ) {
__be32 * ports , _ports ;
2014-08-23 23:13:41 +04:00
ports = __skb_header_pointer ( skb , thoff + poff ,
sizeof ( _ports ) , data , hlen , & _ports ) ;
2013-10-02 15:39:24 +04:00
if ( ports )
return * ports ;
}
return 0 ;
}
2014-08-23 23:13:41 +04:00
EXPORT_SYMBOL ( __skb_flow_get_ports ) ;
2013-10-02 15:39:24 +04:00
2014-08-26 04:03:47 +04:00
/**
* __skb_flow_dissect - extract the flow_keys struct and return it
* @ skb : sk_buff to extract the flow from , can be NULL if the rest are specified
2015-05-12 15:56:16 +03:00
* @ flow_dissector : list of keys to dissect
* @ target_container : target structure to put dissected values into
2014-08-26 04:03:47 +04:00
* @ data : raw buffer pointer to the packet , if NULL use skb - > data
* @ proto : protocol for which to get the flow , if @ data is NULL use skb - > protocol
* @ nhoff : network header offset , if @ data is NULL use skb_network_offset ( skb )
* @ hlen : packet header length , if @ data is NULL use skb_headlen ( skb )
*
2015-05-12 15:56:16 +03:00
* The function will try to retrieve individual keys into target specified
* by flow_dissector from either the skbuff or a raw buffer specified by the
* rest parameters .
*
* Caller must take care of zeroing target container memory .
2014-08-26 04:03:47 +04:00
*/
2015-05-12 15:56:16 +03:00
bool __skb_flow_dissect ( const struct sk_buff * skb ,
struct flow_dissector * flow_dissector ,
void * target_container ,
2015-09-01 19:24:27 +03:00
void * data , __be16 proto , int nhoff , int hlen ,
unsigned int flags )
2011-11-28 09:22:18 +04:00
{
2015-06-04 19:16:39 +03:00
struct flow_dissector_key_control * key_control ;
2015-05-12 15:56:16 +03:00
struct flow_dissector_key_basic * key_basic ;
struct flow_dissector_key_addrs * key_addrs ;
struct flow_dissector_key_ports * key_ports ;
2015-06-04 19:16:43 +03:00
struct flow_dissector_key_tags * key_tags ;
2015-06-04 19:16:45 +03:00
struct flow_dissector_key_keyid * key_keyid ;
2015-06-25 16:10:32 +03:00
u8 ip_proto = 0 ;
2015-09-01 19:24:26 +03:00
bool ret = false ;
2011-11-28 09:22:18 +04:00
2014-08-23 23:13:41 +04:00
if ( ! data ) {
data = skb - > data ;
2014-08-26 04:03:47 +04:00
proto = skb - > protocol ;
nhoff = skb_network_offset ( skb ) ;
2014-08-23 23:13:41 +04:00
hlen = skb_headlen ( skb ) ;
}
2015-06-04 19:16:39 +03:00
/* It is ensured by skb_flow_dissector_init() that control key will
* be always present .
*/
key_control = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_CONTROL ,
target_container ) ;
2015-05-12 15:56:16 +03:00
/* It is ensured by skb_flow_dissector_init() that basic key will
* be always present .
*/
key_basic = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_BASIC ,
target_container ) ;
2011-11-28 09:22:18 +04:00
2015-05-12 15:56:19 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_ETH_ADDRS ) ) {
struct ethhdr * eth = eth_hdr ( skb ) ;
struct flow_dissector_key_eth_addrs * key_eth_addrs ;
key_eth_addrs = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_ETH_ADDRS ,
target_container ) ;
memcpy ( key_eth_addrs , & eth - > h_dest , sizeof ( * key_eth_addrs ) ) ;
}
2011-11-28 09:22:18 +04:00
again :
switch ( proto ) {
2014-03-12 21:04:17 +04:00
case htons ( ETH_P_IP ) : {
2011-11-28 09:22:18 +04:00
const struct iphdr * iph ;
struct iphdr _iph ;
ip :
2014-08-23 23:13:41 +04:00
iph = __skb_header_pointer ( skb , nhoff , sizeof ( _iph ) , data , hlen , & _iph ) ;
2013-11-01 11:01:10 +04:00
if ( ! iph | | iph - > ihl < 5 )
2015-09-01 19:24:26 +03:00
goto out_bad ;
2013-11-07 20:37:28 +04:00
nhoff + = iph - > ihl * 4 ;
2011-11-28 09:22:18 +04:00
2013-11-07 20:37:28 +04:00
ip_proto = iph - > protocol ;
2011-11-28 09:22:18 +04:00
if ( ip_is_fragment ( iph ) )
ip_proto = 0 ;
2013-11-07 20:37:28 +04:00
2015-05-12 15:56:16 +03:00
if ( ! skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_IPV4_ADDRS ) )
2014-10-10 23:09:12 +04:00
break ;
2015-06-04 19:16:40 +03:00
2015-05-12 15:56:16 +03:00
key_addrs = skb_flow_dissector_target ( flow_dissector ,
2015-06-04 19:16:40 +03:00
FLOW_DISSECTOR_KEY_IPV4_ADDRS , target_container ) ;
memcpy ( & key_addrs - > v4addrs , & iph - > saddr ,
sizeof ( key_addrs - > v4addrs ) ) ;
key_control - > addr_type = FLOW_DISSECTOR_KEY_IPV4_ADDRS ;
2011-11-28 09:22:18 +04:00
break ;
}
2014-03-12 21:04:17 +04:00
case htons ( ETH_P_IPV6 ) : {
2011-11-28 09:22:18 +04:00
const struct ipv6hdr * iph ;
struct ipv6hdr _iph ;
2014-07-02 08:33:01 +04:00
__be32 flow_label ;
2011-11-28 09:22:18 +04:00
ipv6 :
2014-08-23 23:13:41 +04:00
iph = __skb_header_pointer ( skb , nhoff , sizeof ( _iph ) , data , hlen , & _iph ) ;
2011-11-28 09:22:18 +04:00
if ( ! iph )
2015-09-01 19:24:26 +03:00
goto out_bad ;
2011-11-28 09:22:18 +04:00
ip_proto = iph - > nexthdr ;
nhoff + = sizeof ( struct ipv6hdr ) ;
2014-07-02 08:33:01 +04:00
2015-05-12 15:56:18 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_IPV6_ADDRS ) ) {
struct flow_dissector_key_ipv6_addrs * key_ipv6_addrs ;
key_ipv6_addrs = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_IPV6_ADDRS ,
target_container ) ;
2014-10-10 23:09:12 +04:00
2015-05-12 15:56:18 +03:00
memcpy ( key_ipv6_addrs , & iph - > saddr , sizeof ( * key_ipv6_addrs ) ) ;
2015-06-04 19:16:40 +03:00
key_control - > addr_type = FLOW_DISSECTOR_KEY_IPV6_ADDRS ;
2015-05-12 15:56:18 +03:00
}
2015-06-04 19:16:44 +03:00
2014-07-02 08:33:01 +04:00
flow_label = ip6_flowlabel ( iph ) ;
if ( flow_label ) {
2015-05-22 12:05:58 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
2015-06-04 19:16:44 +03:00
FLOW_DISSECTOR_KEY_FLOW_LABEL ) ) {
key_tags = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_FLOW_LABEL ,
target_container ) ;
key_tags - > flow_label = ntohl ( flow_label ) ;
2015-05-22 12:05:58 +03:00
}
2014-07-02 08:33:01 +04:00
}
2011-11-28 09:22:18 +04:00
break ;
}
2014-03-12 21:04:17 +04:00
case htons ( ETH_P_8021AD ) :
case htons ( ETH_P_8021Q ) : {
2011-11-28 09:22:18 +04:00
const struct vlan_hdr * vlan ;
struct vlan_hdr _vlan ;
2014-08-23 23:13:41 +04:00
vlan = __skb_header_pointer ( skb , nhoff , sizeof ( _vlan ) , data , hlen , & _vlan ) ;
2011-11-28 09:22:18 +04:00
if ( ! vlan )
2015-09-01 19:24:26 +03:00
goto out_bad ;
2011-11-28 09:22:18 +04:00
2015-06-04 19:16:43 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_VLANID ) ) {
key_tags = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_VLANID ,
target_container ) ;
key_tags - > vlan_id = skb_vlan_tag_get_id ( skb ) ;
}
2011-11-28 09:22:18 +04:00
proto = vlan - > h_vlan_encapsulated_proto ;
nhoff + = sizeof ( * vlan ) ;
goto again ;
}
2014-03-12 21:04:17 +04:00
case htons ( ETH_P_PPP_SES ) : {
2011-11-28 09:22:18 +04:00
struct {
struct pppoe_hdr hdr ;
__be16 proto ;
} * hdr , _hdr ;
2014-08-23 23:13:41 +04:00
hdr = __skb_header_pointer ( skb , nhoff , sizeof ( _hdr ) , data , hlen , & _hdr ) ;
2011-11-28 09:22:18 +04:00
if ( ! hdr )
2015-09-01 19:24:26 +03:00
goto out_bad ;
2011-11-28 09:22:18 +04:00
proto = hdr - > proto ;
nhoff + = PPPOE_SES_HLEN ;
switch ( proto ) {
2014-03-12 21:04:17 +04:00
case htons ( PPP_IP ) :
2011-11-28 09:22:18 +04:00
goto ip ;
2014-03-12 21:04:17 +04:00
case htons ( PPP_IPV6 ) :
2011-11-28 09:22:18 +04:00
goto ipv6 ;
default :
2015-09-01 19:24:26 +03:00
goto out_bad ;
2011-11-28 09:22:18 +04:00
}
}
2015-01-22 19:10:32 +03:00
case htons ( ETH_P_TIPC ) : {
struct {
__be32 pre [ 3 ] ;
__be32 srcnode ;
} * hdr , _hdr ;
hdr = __skb_header_pointer ( skb , nhoff , sizeof ( _hdr ) , data , hlen , & _hdr ) ;
if ( ! hdr )
2015-09-01 19:24:26 +03:00
goto out_bad ;
2015-05-12 15:56:16 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
2015-06-04 19:16:41 +03:00
FLOW_DISSECTOR_KEY_TIPC_ADDRS ) ) {
2015-05-12 15:56:16 +03:00
key_addrs = skb_flow_dissector_target ( flow_dissector ,
2015-06-04 19:16:41 +03:00
FLOW_DISSECTOR_KEY_TIPC_ADDRS ,
2015-05-12 15:56:16 +03:00
target_container ) ;
2015-06-04 19:16:41 +03:00
key_addrs - > tipcaddrs . srcnode = hdr - > srcnode ;
key_control - > addr_type = FLOW_DISSECTOR_KEY_TIPC_ADDRS ;
2015-05-12 15:56:16 +03:00
}
2015-09-01 19:24:26 +03:00
goto out_good ;
2015-01-22 19:10:32 +03:00
}
2015-06-04 19:16:46 +03:00
case htons ( ETH_P_MPLS_UC ) :
case htons ( ETH_P_MPLS_MC ) : {
struct mpls_label * hdr , _hdr [ 2 ] ;
mpls :
hdr = __skb_header_pointer ( skb , nhoff , sizeof ( _hdr ) , data ,
hlen , & _hdr ) ;
if ( ! hdr )
2015-09-01 19:24:26 +03:00
goto out_bad ;
2015-06-04 19:16:46 +03:00
2015-06-12 19:01:05 +03:00
if ( ( ntohl ( hdr [ 0 ] . entry ) & MPLS_LS_LABEL_MASK ) > >
MPLS_LS_LABEL_SHIFT = = MPLS_LABEL_ENTROPY ) {
2015-06-04 19:16:46 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_MPLS_ENTROPY ) ) {
key_keyid = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_MPLS_ENTROPY ,
target_container ) ;
key_keyid - > keyid = hdr [ 1 ] . entry &
htonl ( MPLS_LS_LABEL_MASK ) ;
}
2015-09-01 19:24:26 +03:00
goto out_good ;
2015-06-04 19:16:46 +03:00
}
2015-09-01 19:24:26 +03:00
goto out_good ;
2015-06-04 19:16:46 +03:00
}
2014-09-06 03:20:26 +04:00
case htons ( ETH_P_FCOE ) :
2015-06-04 19:16:39 +03:00
key_control - > thoff = ( u16 ) ( nhoff + FCOE_HEADER_LEN ) ;
2014-09-06 03:20:26 +04:00
/* fall through */
2011-11-28 09:22:18 +04:00
default :
2015-09-01 19:24:26 +03:00
goto out_bad ;
2011-11-28 09:22:18 +04:00
}
2015-06-12 19:01:06 +03:00
ip_proto_again :
2011-11-28 09:22:18 +04:00
switch ( ip_proto ) {
case IPPROTO_GRE : {
struct gre_hdr {
__be16 flags ;
__be16 proto ;
} * hdr , _hdr ;
2014-08-23 23:13:41 +04:00
hdr = __skb_header_pointer ( skb , nhoff , sizeof ( _hdr ) , data , hlen , & _hdr ) ;
2011-11-28 09:22:18 +04:00
if ( ! hdr )
2015-09-01 19:24:26 +03:00
goto out_bad ;
2011-11-28 09:22:18 +04:00
/*
* Only look inside GRE if version zero and no
* routing
*/
2015-06-04 19:16:36 +03:00
if ( hdr - > flags & ( GRE_VERSION | GRE_ROUTING ) )
break ;
proto = hdr - > proto ;
nhoff + = 4 ;
if ( hdr - > flags & GRE_CSUM )
2011-11-28 09:22:18 +04:00
nhoff + = 4 ;
2015-06-04 19:16:45 +03:00
if ( hdr - > flags & GRE_KEY ) {
const __be32 * keyid ;
__be32 _keyid ;
keyid = __skb_header_pointer ( skb , nhoff , sizeof ( _keyid ) ,
data , hlen , & _keyid ) ;
if ( ! keyid )
2015-09-01 19:24:26 +03:00
goto out_bad ;
2015-06-04 19:16:45 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_GRE_KEYID ) ) {
key_keyid = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_GRE_KEYID ,
target_container ) ;
key_keyid - > keyid = * keyid ;
}
2015-06-04 19:16:36 +03:00
nhoff + = 4 ;
2015-06-04 19:16:45 +03:00
}
2015-06-04 19:16:36 +03:00
if ( hdr - > flags & GRE_SEQ )
nhoff + = 4 ;
if ( proto = = htons ( ETH_P_TEB ) ) {
const struct ethhdr * eth ;
struct ethhdr _eth ;
eth = __skb_header_pointer ( skb , nhoff ,
sizeof ( _eth ) ,
data , hlen , & _eth ) ;
if ( ! eth )
2015-09-01 19:24:26 +03:00
goto out_bad ;
2015-06-04 19:16:36 +03:00
proto = eth - > h_proto ;
nhoff + = sizeof ( * eth ) ;
2011-11-28 09:22:18 +04:00
}
2015-06-04 19:16:36 +03:00
goto again ;
2011-11-28 09:22:18 +04:00
}
2015-06-12 19:01:06 +03:00
case NEXTHDR_HOP :
case NEXTHDR_ROUTING :
case NEXTHDR_DEST : {
u8 _opthdr [ 2 ] , * opthdr ;
if ( proto ! = htons ( ETH_P_IPV6 ) )
break ;
opthdr = __skb_header_pointer ( skb , nhoff , sizeof ( _opthdr ) ,
data , hlen , & _opthdr ) ;
2015-06-13 05:31:32 +03:00
if ( ! opthdr )
2015-09-01 19:24:26 +03:00
goto out_bad ;
2015-06-12 19:01:06 +03:00
2015-06-13 05:31:32 +03:00
ip_proto = opthdr [ 0 ] ;
nhoff + = ( opthdr [ 1 ] + 1 ) < < 3 ;
2015-06-12 19:01:06 +03:00
goto ip_proto_again ;
}
2011-11-28 09:22:18 +04:00
case IPPROTO_IPIP :
2013-07-29 22:07:36 +04:00
proto = htons ( ETH_P_IP ) ;
goto ip ;
2013-07-29 22:07:42 +04:00
case IPPROTO_IPV6 :
proto = htons ( ETH_P_IPV6 ) ;
goto ipv6 ;
2015-06-04 19:16:46 +03:00
case IPPROTO_MPLS :
proto = htons ( ETH_P_MPLS_UC ) ;
goto mpls ;
2011-11-28 09:22:18 +04:00
default :
break ;
}
2015-05-12 15:56:16 +03:00
if ( skb_flow_dissector_uses_key ( flow_dissector ,
FLOW_DISSECTOR_KEY_PORTS ) ) {
key_ports = skb_flow_dissector_target ( flow_dissector ,
FLOW_DISSECTOR_KEY_PORTS ,
target_container ) ;
key_ports - > ports = __skb_flow_get_ports ( skb , nhoff , ip_proto ,
data , hlen ) ;
}
2014-10-10 23:09:12 +04:00
2015-09-01 19:24:26 +03:00
out_good :
ret = true ;
out_bad :
key_basic - > n_proto = proto ;
key_basic - > ip_proto = ip_proto ;
key_control - > thoff = ( u16 ) nhoff ;
return ret ;
2011-11-28 09:22:18 +04:00
}
2014-08-23 23:13:41 +04:00
EXPORT_SYMBOL ( __skb_flow_dissect ) ;
2013-01-21 04:39:24 +04:00
static u32 hashrnd __read_mostly ;
2013-10-23 22:06:00 +04:00
static __always_inline void __flow_hash_secret_init ( void )
{
net_get_random_once ( & hashrnd , sizeof ( hashrnd ) ) ;
}
2015-06-04 19:16:39 +03:00
static __always_inline u32 __flow_hash_words ( u32 * words , u32 length , u32 keyval )
{
return jhash2 ( words , length , keyval ) ;
}
static inline void * flow_keys_hash_start ( struct flow_keys * flow )
2013-10-23 22:06:00 +04:00
{
2015-06-04 19:16:39 +03:00
BUILD_BUG_ON ( FLOW_KEYS_HASH_OFFSET % sizeof ( u32 ) ) ;
return ( void * ) flow + FLOW_KEYS_HASH_OFFSET ;
}
static inline size_t flow_keys_hash_length ( struct flow_keys * flow )
{
2015-06-04 19:16:40 +03:00
size_t diff = FLOW_KEYS_HASH_OFFSET + sizeof ( flow - > addrs ) ;
2015-06-04 19:16:39 +03:00
BUILD_BUG_ON ( ( sizeof ( * flow ) - FLOW_KEYS_HASH_OFFSET ) % sizeof ( u32 ) ) ;
2015-06-04 19:16:40 +03:00
BUILD_BUG_ON ( offsetof ( typeof ( * flow ) , addrs ) ! =
sizeof ( * flow ) - sizeof ( flow - > addrs ) ) ;
switch ( flow - > control . addr_type ) {
case FLOW_DISSECTOR_KEY_IPV4_ADDRS :
diff - = sizeof ( flow - > addrs . v4addrs ) ;
break ;
case FLOW_DISSECTOR_KEY_IPV6_ADDRS :
diff - = sizeof ( flow - > addrs . v6addrs ) ;
break ;
2015-06-04 19:16:41 +03:00
case FLOW_DISSECTOR_KEY_TIPC_ADDRS :
diff - = sizeof ( flow - > addrs . tipcaddrs ) ;
break ;
2015-06-04 19:16:40 +03:00
}
return ( sizeof ( * flow ) - diff ) / sizeof ( u32 ) ;
}
__be32 flow_get_u32_src ( const struct flow_keys * flow )
{
switch ( flow - > control . addr_type ) {
case FLOW_DISSECTOR_KEY_IPV4_ADDRS :
return flow - > addrs . v4addrs . src ;
case FLOW_DISSECTOR_KEY_IPV6_ADDRS :
return ( __force __be32 ) ipv6_addr_hash (
& flow - > addrs . v6addrs . src ) ;
2015-06-04 19:16:41 +03:00
case FLOW_DISSECTOR_KEY_TIPC_ADDRS :
return flow - > addrs . tipcaddrs . srcnode ;
2015-06-04 19:16:40 +03:00
default :
return 0 ;
}
}
EXPORT_SYMBOL ( flow_get_u32_src ) ;
__be32 flow_get_u32_dst ( const struct flow_keys * flow )
{
switch ( flow - > control . addr_type ) {
case FLOW_DISSECTOR_KEY_IPV4_ADDRS :
return flow - > addrs . v4addrs . dst ;
case FLOW_DISSECTOR_KEY_IPV6_ADDRS :
return ( __force __be32 ) ipv6_addr_hash (
& flow - > addrs . v6addrs . dst ) ;
default :
return 0 ;
}
}
EXPORT_SYMBOL ( flow_get_u32_dst ) ;
static inline void __flow_hash_consistentify ( struct flow_keys * keys )
{
int addr_diff , i ;
switch ( keys - > control . addr_type ) {
case FLOW_DISSECTOR_KEY_IPV4_ADDRS :
addr_diff = ( __force u32 ) keys - > addrs . v4addrs . dst -
( __force u32 ) keys - > addrs . v4addrs . src ;
if ( ( addr_diff < 0 ) | |
( addr_diff = = 0 & &
( ( __force u16 ) keys - > ports . dst <
( __force u16 ) keys - > ports . src ) ) ) {
swap ( keys - > addrs . v4addrs . src , keys - > addrs . v4addrs . dst ) ;
swap ( keys - > ports . src , keys - > ports . dst ) ;
}
break ;
case FLOW_DISSECTOR_KEY_IPV6_ADDRS :
addr_diff = memcmp ( & keys - > addrs . v6addrs . dst ,
& keys - > addrs . v6addrs . src ,
sizeof ( keys - > addrs . v6addrs . dst ) ) ;
if ( ( addr_diff < 0 ) | |
( addr_diff = = 0 & &
( ( __force u16 ) keys - > ports . dst <
( __force u16 ) keys - > ports . src ) ) ) {
for ( i = 0 ; i < 4 ; i + + )
swap ( keys - > addrs . v6addrs . src . s6_addr32 [ i ] ,
keys - > addrs . v6addrs . dst . s6_addr32 [ i ] ) ;
swap ( keys - > ports . src , keys - > ports . dst ) ;
}
break ;
}
2013-10-23 22:06:00 +04:00
}
2015-05-01 21:30:12 +03:00
static inline u32 __flow_hash_from_keys ( struct flow_keys * keys , u32 keyval )
2014-07-02 08:32:05 +04:00
{
u32 hash ;
2015-06-04 19:16:40 +03:00
__flow_hash_consistentify ( keys ) ;
2014-07-02 08:32:05 +04:00
2015-06-04 19:16:39 +03:00
hash = __flow_hash_words ( ( u32 * ) flow_keys_hash_start ( keys ) ,
flow_keys_hash_length ( keys ) , keyval ) ;
2014-07-02 08:32:05 +04:00
if ( ! hash )
hash = 1 ;
return hash ;
}
u32 flow_hash_from_keys ( struct flow_keys * keys )
{
2015-05-01 21:30:12 +03:00
__flow_hash_secret_init ( ) ;
return __flow_hash_from_keys ( keys , hashrnd ) ;
2014-07-02 08:32:05 +04:00
}
EXPORT_SYMBOL ( flow_hash_from_keys ) ;
2015-05-01 21:30:12 +03:00
static inline u32 ___skb_get_hash ( const struct sk_buff * skb ,
struct flow_keys * keys , u32 keyval )
{
2015-09-01 19:24:27 +03:00
if ( ! skb_flow_dissect_flow_keys ( skb , keys , 0 ) )
2015-05-01 21:30:12 +03:00
return 0 ;
return __flow_hash_from_keys ( keys , keyval ) ;
}
2015-05-01 21:30:17 +03:00
struct _flow_keys_digest_data {
__be16 n_proto ;
u8 ip_proto ;
u8 padding ;
__be32 ports ;
__be32 src ;
__be32 dst ;
} ;
void make_flow_keys_digest ( struct flow_keys_digest * digest ,
const struct flow_keys * flow )
{
struct _flow_keys_digest_data * data =
( struct _flow_keys_digest_data * ) digest ;
BUILD_BUG_ON ( sizeof ( * data ) > sizeof ( * digest ) ) ;
memset ( digest , 0 , sizeof ( * digest ) ) ;
2015-05-12 15:56:16 +03:00
data - > n_proto = flow - > basic . n_proto ;
data - > ip_proto = flow - > basic . ip_proto ;
data - > ports = flow - > ports . ports ;
2015-06-04 19:16:40 +03:00
data - > src = flow - > addrs . v4addrs . src ;
data - > dst = flow - > addrs . v4addrs . dst ;
2015-05-01 21:30:17 +03:00
}
EXPORT_SYMBOL ( make_flow_keys_digest ) ;
2015-05-12 15:56:10 +03:00
/**
* __skb_get_hash : calculate a flow hash
* @ skb : sk_buff to calculate flow hash from
*
* This function calculates a flow hash based on src / dst addresses
2014-03-25 02:34:47 +04:00
* and src / dst port numbers . Sets hash in skb to non - zero hash value
* on success , zero indicates no valid hash . Also , sets l4_hash in skb
2013-01-21 04:39:24 +04:00
* if hash is a canonical 4 - tuple hash over transport ports .
*/
2013-12-16 10:12:06 +04:00
void __skb_get_hash ( struct sk_buff * skb )
2013-01-21 04:39:24 +04:00
{
struct flow_keys keys ;
2015-05-01 21:30:12 +03:00
u32 hash ;
2013-01-21 04:39:24 +04:00
2015-05-01 21:30:12 +03:00
__flow_hash_secret_init ( ) ;
hash = ___skb_get_hash ( skb , & keys , hashrnd ) ;
if ( ! hash )
2013-01-21 04:39:24 +04:00
return ;
2015-08-01 02:52:10 +03:00
2015-09-01 19:24:24 +03:00
__skb_set_sw_hash ( skb , hash ,
flow_keys_have_l4 ( & keys ) ) ;
2013-01-21 04:39:24 +04:00
}
2013-12-16 10:12:06 +04:00
EXPORT_SYMBOL ( __skb_get_hash ) ;
2013-01-21 04:39:24 +04:00
2015-05-01 21:30:12 +03:00
__u32 skb_get_hash_perturb ( const struct sk_buff * skb , u32 perturb )
{
struct flow_keys keys ;
return ___skb_get_hash ( skb , & keys , perturb ) ;
}
EXPORT_SYMBOL ( skb_get_hash_perturb ) ;
2015-08-01 02:52:10 +03:00
__u32 __skb_get_hash_flowi6 ( struct sk_buff * skb , struct flowi6 * fl6 )
{
struct flow_keys keys ;
memset ( & keys , 0 , sizeof ( keys ) ) ;
memcpy ( & keys . addrs . v6addrs . src , & fl6 - > saddr ,
sizeof ( keys . addrs . v6addrs . src ) ) ;
memcpy ( & keys . addrs . v6addrs . dst , & fl6 - > daddr ,
sizeof ( keys . addrs . v6addrs . dst ) ) ;
keys . control . addr_type = FLOW_DISSECTOR_KEY_IPV6_ADDRS ;
keys . ports . src = fl6 - > fl6_sport ;
keys . ports . dst = fl6 - > fl6_dport ;
keys . keyid . keyid = fl6 - > fl6_gre_key ;
keys . tags . flow_label = ( __force u32 ) fl6 - > flowlabel ;
keys . basic . ip_proto = fl6 - > flowi6_proto ;
2015-09-01 19:24:24 +03:00
__skb_set_sw_hash ( skb , flow_hash_from_keys ( & keys ) ,
flow_keys_have_l4 ( & keys ) ) ;
2015-08-01 02:52:10 +03:00
return skb - > hash ;
}
EXPORT_SYMBOL ( __skb_get_hash_flowi6 ) ;
__u32 __skb_get_hash_flowi4 ( struct sk_buff * skb , struct flowi4 * fl4 )
{
struct flow_keys keys ;
memset ( & keys , 0 , sizeof ( keys ) ) ;
keys . addrs . v4addrs . src = fl4 - > saddr ;
keys . addrs . v4addrs . dst = fl4 - > daddr ;
keys . control . addr_type = FLOW_DISSECTOR_KEY_IPV4_ADDRS ;
keys . ports . src = fl4 - > fl4_sport ;
keys . ports . dst = fl4 - > fl4_dport ;
keys . keyid . keyid = fl4 - > fl4_gre_key ;
keys . basic . ip_proto = fl4 - > flowi4_proto ;
2015-09-01 19:24:24 +03:00
__skb_set_sw_hash ( skb , flow_hash_from_keys ( & keys ) ,
flow_keys_have_l4 ( & keys ) ) ;
2015-08-01 02:52:10 +03:00
return skb - > hash ;
}
EXPORT_SYMBOL ( __skb_get_hash_flowi4 ) ;
2014-09-06 03:20:26 +04:00
u32 __skb_get_poff ( const struct sk_buff * skb , void * data ,
const struct flow_keys * keys , int hlen )
2013-03-19 10:39:30 +04:00
{
2015-06-04 19:16:39 +03:00
u32 poff = keys - > control . thoff ;
2013-03-19 10:39:30 +04:00
2015-05-12 15:56:16 +03:00
switch ( keys - > basic . ip_proto ) {
2013-03-19 10:39:30 +04:00
case IPPROTO_TCP : {
2014-10-10 23:09:12 +04:00
/* access doff as u8 to avoid unaligned access */
const u8 * doff ;
u8 _doff ;
2013-03-19 10:39:30 +04:00
2014-10-10 23:09:12 +04:00
doff = __skb_header_pointer ( skb , poff + 12 , sizeof ( _doff ) ,
data , hlen , & _doff ) ;
if ( ! doff )
2013-03-19 10:39:30 +04:00
return poff ;
2014-10-10 23:09:12 +04:00
poff + = max_t ( u32 , sizeof ( struct tcphdr ) , ( * doff & 0xF0 ) > > 2 ) ;
2013-03-19 10:39:30 +04:00
break ;
}
case IPPROTO_UDP :
case IPPROTO_UDPLITE :
poff + = sizeof ( struct udphdr ) ;
break ;
/* For the rest, we do not really care about header
* extensions at this point for now .
*/
case IPPROTO_ICMP :
poff + = sizeof ( struct icmphdr ) ;
break ;
case IPPROTO_ICMPV6 :
poff + = sizeof ( struct icmp6hdr ) ;
break ;
case IPPROTO_IGMP :
poff + = sizeof ( struct igmphdr ) ;
break ;
case IPPROTO_DCCP :
poff + = sizeof ( struct dccp_hdr ) ;
break ;
case IPPROTO_SCTP :
poff + = sizeof ( struct sctphdr ) ;
break ;
}
return poff ;
}
2015-05-12 15:56:14 +03:00
/**
* skb_get_poff - get the offset to the payload
* @ skb : sk_buff to get the payload offset from
*
* The function will get the offset to the payload as far as it could
* be dissected . The main user is currently BPF , so that we can dynamically
2014-09-06 03:20:26 +04:00
* truncate packets without needing to push actual payload to the user
* space and can analyze headers only , instead .
*/
u32 skb_get_poff ( const struct sk_buff * skb )
{
struct flow_keys keys ;
2015-09-01 19:24:27 +03:00
if ( ! skb_flow_dissect_flow_keys ( skb , & keys , 0 ) )
2014-09-06 03:20:26 +04:00
return 0 ;
return __skb_get_poff ( skb , skb - > data , & keys , skb_headlen ( skb ) ) ;
}
2015-05-12 15:56:16 +03:00
static const struct flow_dissector_key flow_keys_dissector_keys [ ] = {
2015-06-04 19:16:39 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_CONTROL ,
. offset = offsetof ( struct flow_keys , control ) ,
} ,
2015-05-12 15:56:16 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_BASIC ,
. offset = offsetof ( struct flow_keys , basic ) ,
} ,
{
. key_id = FLOW_DISSECTOR_KEY_IPV4_ADDRS ,
2015-06-04 19:16:40 +03:00
. offset = offsetof ( struct flow_keys , addrs . v4addrs ) ,
} ,
{
. key_id = FLOW_DISSECTOR_KEY_IPV6_ADDRS ,
. offset = offsetof ( struct flow_keys , addrs . v6addrs ) ,
2015-05-12 15:56:16 +03:00
} ,
2015-06-04 19:16:41 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_TIPC_ADDRS ,
. offset = offsetof ( struct flow_keys , addrs . tipcaddrs ) ,
} ,
2015-05-12 15:56:16 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_PORTS ,
. offset = offsetof ( struct flow_keys , ports ) ,
} ,
2015-06-04 19:16:43 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_VLANID ,
. offset = offsetof ( struct flow_keys , tags ) ,
} ,
2015-06-04 19:16:44 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_FLOW_LABEL ,
. offset = offsetof ( struct flow_keys , tags ) ,
} ,
2015-06-04 19:16:45 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_GRE_KEYID ,
. offset = offsetof ( struct flow_keys , keyid ) ,
} ,
2015-05-12 15:56:16 +03:00
} ;
static const struct flow_dissector_key flow_keys_buf_dissector_keys [ ] = {
2015-06-04 19:16:39 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_CONTROL ,
. offset = offsetof ( struct flow_keys , control ) ,
} ,
2015-05-12 15:56:16 +03:00
{
. key_id = FLOW_DISSECTOR_KEY_BASIC ,
. offset = offsetof ( struct flow_keys , basic ) ,
} ,
} ;
struct flow_dissector flow_keys_dissector __read_mostly ;
EXPORT_SYMBOL ( flow_keys_dissector ) ;
struct flow_dissector flow_keys_buf_dissector __read_mostly ;
static int __init init_default_flow_dissectors ( void )
{
skb_flow_dissector_init ( & flow_keys_dissector ,
flow_keys_dissector_keys ,
ARRAY_SIZE ( flow_keys_dissector_keys ) ) ;
skb_flow_dissector_init ( & flow_keys_buf_dissector ,
flow_keys_buf_dissector_keys ,
ARRAY_SIZE ( flow_keys_buf_dissector_keys ) ) ;
return 0 ;
}
late_initcall_sync ( init_default_flow_dissectors ) ;