mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 10:40:15 +02:00 
			
		
		
		
	flow_dissect: use programable dissector in skb_flow_dissect and friends
Signed-off-by: Jiri Pirko <jiri@resnulli.us> Signed-off-by: David S. Miller <davem@davemloft.net>
This commit is contained in:
		
							parent
							
								
									fbff949e3b
								
							
						
					
					
						commit
						06635a35d1
					
				
					 12 changed files with 228 additions and 145 deletions
				
			
		| 
						 | 
					@ -3051,16 +3051,16 @@ static bool bond_flow_dissect(struct bonding *bond, struct sk_buff *skb,
 | 
				
			||||||
	int noff, proto = -1;
 | 
						int noff, proto = -1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (bond->params.xmit_policy > BOND_XMIT_POLICY_LAYER23)
 | 
						if (bond->params.xmit_policy > BOND_XMIT_POLICY_LAYER23)
 | 
				
			||||||
		return skb_flow_dissect(skb, fk);
 | 
							return skb_flow_dissect_flow_keys(skb, fk);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	fk->ports = 0;
 | 
						fk->ports.ports = 0;
 | 
				
			||||||
	noff = skb_network_offset(skb);
 | 
						noff = skb_network_offset(skb);
 | 
				
			||||||
	if (skb->protocol == htons(ETH_P_IP)) {
 | 
						if (skb->protocol == htons(ETH_P_IP)) {
 | 
				
			||||||
		if (unlikely(!pskb_may_pull(skb, noff + sizeof(*iph))))
 | 
							if (unlikely(!pskb_may_pull(skb, noff + sizeof(*iph))))
 | 
				
			||||||
			return false;
 | 
								return false;
 | 
				
			||||||
		iph = ip_hdr(skb);
 | 
							iph = ip_hdr(skb);
 | 
				
			||||||
		fk->src = iph->saddr;
 | 
							fk->addrs.src = iph->saddr;
 | 
				
			||||||
		fk->dst = iph->daddr;
 | 
							fk->addrs.dst = iph->daddr;
 | 
				
			||||||
		noff += iph->ihl << 2;
 | 
							noff += iph->ihl << 2;
 | 
				
			||||||
		if (!ip_is_fragment(iph))
 | 
							if (!ip_is_fragment(iph))
 | 
				
			||||||
			proto = iph->protocol;
 | 
								proto = iph->protocol;
 | 
				
			||||||
| 
						 | 
					@ -3068,15 +3068,15 @@ static bool bond_flow_dissect(struct bonding *bond, struct sk_buff *skb,
 | 
				
			||||||
		if (unlikely(!pskb_may_pull(skb, noff + sizeof(*iph6))))
 | 
							if (unlikely(!pskb_may_pull(skb, noff + sizeof(*iph6))))
 | 
				
			||||||
			return false;
 | 
								return false;
 | 
				
			||||||
		iph6 = ipv6_hdr(skb);
 | 
							iph6 = ipv6_hdr(skb);
 | 
				
			||||||
		fk->src = (__force __be32)ipv6_addr_hash(&iph6->saddr);
 | 
							fk->addrs.src = (__force __be32)ipv6_addr_hash(&iph6->saddr);
 | 
				
			||||||
		fk->dst = (__force __be32)ipv6_addr_hash(&iph6->daddr);
 | 
							fk->addrs.dst = (__force __be32)ipv6_addr_hash(&iph6->daddr);
 | 
				
			||||||
		noff += sizeof(*iph6);
 | 
							noff += sizeof(*iph6);
 | 
				
			||||||
		proto = iph6->nexthdr;
 | 
							proto = iph6->nexthdr;
 | 
				
			||||||
	} else {
 | 
						} else {
 | 
				
			||||||
		return false;
 | 
							return false;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	if (bond->params.xmit_policy == BOND_XMIT_POLICY_LAYER34 && proto >= 0)
 | 
						if (bond->params.xmit_policy == BOND_XMIT_POLICY_LAYER34 && proto >= 0)
 | 
				
			||||||
		fk->ports = skb_flow_get_ports(skb, noff, proto);
 | 
							fk->ports.ports = skb_flow_get_ports(skb, noff, proto);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return true;
 | 
						return true;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					@ -3102,8 +3102,8 @@ u32 bond_xmit_hash(struct bonding *bond, struct sk_buff *skb)
 | 
				
			||||||
	    bond->params.xmit_policy == BOND_XMIT_POLICY_ENCAP23)
 | 
						    bond->params.xmit_policy == BOND_XMIT_POLICY_ENCAP23)
 | 
				
			||||||
		hash = bond_eth_hash(skb);
 | 
							hash = bond_eth_hash(skb);
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		hash = (__force u32)flow.ports;
 | 
							hash = (__force u32)flow.ports.ports;
 | 
				
			||||||
	hash ^= (__force u32)flow.dst ^ (__force u32)flow.src;
 | 
						hash ^= (__force u32)flow.addrs.dst ^ (__force u32)flow.addrs.src;
 | 
				
			||||||
	hash ^= (hash >> 16);
 | 
						hash ^= (hash >> 16);
 | 
				
			||||||
	hash ^= (hash >> 8);
 | 
						hash ^= (hash >> 8);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -22,7 +22,7 @@ int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq)
 | 
				
			||||||
	int res;
 | 
						int res;
 | 
				
			||||||
	struct filter data;
 | 
						struct filter data;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	switch (keys->ip_proto) {
 | 
						switch (keys->basic.ip_proto) {
 | 
				
			||||||
	case IPPROTO_TCP:
 | 
						case IPPROTO_TCP:
 | 
				
			||||||
		data.u.ipv4.protocol = PROTO_TCP;
 | 
							data.u.ipv4.protocol = PROTO_TCP;
 | 
				
			||||||
		break;
 | 
							break;
 | 
				
			||||||
| 
						 | 
					@ -33,10 +33,10 @@ int enic_addfltr_5t(struct enic *enic, struct flow_keys *keys, u16 rq)
 | 
				
			||||||
		return -EPROTONOSUPPORT;
 | 
							return -EPROTONOSUPPORT;
 | 
				
			||||||
	};
 | 
						};
 | 
				
			||||||
	data.type = FILTER_IPV4_5TUPLE;
 | 
						data.type = FILTER_IPV4_5TUPLE;
 | 
				
			||||||
	data.u.ipv4.src_addr = ntohl(keys->src);
 | 
						data.u.ipv4.src_addr = ntohl(keys->addrs.src);
 | 
				
			||||||
	data.u.ipv4.dst_addr = ntohl(keys->dst);
 | 
						data.u.ipv4.dst_addr = ntohl(keys->addrs.dst);
 | 
				
			||||||
	data.u.ipv4.src_port = ntohs(keys->port16[0]);
 | 
						data.u.ipv4.src_port = ntohs(keys->ports.port16[0]);
 | 
				
			||||||
	data.u.ipv4.dst_port = ntohs(keys->port16[1]);
 | 
						data.u.ipv4.dst_port = ntohs(keys->ports.port16[1]);
 | 
				
			||||||
	data.u.ipv4.flags = FILTER_FIELDS_IPV4_5TUPLE;
 | 
						data.u.ipv4.flags = FILTER_FIELDS_IPV4_5TUPLE;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	spin_lock_bh(&enic->devcmd_lock);
 | 
						spin_lock_bh(&enic->devcmd_lock);
 | 
				
			||||||
| 
						 | 
					@ -158,11 +158,11 @@ static struct enic_rfs_fltr_node *htbl_key_search(struct hlist_head *h,
 | 
				
			||||||
	struct enic_rfs_fltr_node *tpos;
 | 
						struct enic_rfs_fltr_node *tpos;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	hlist_for_each_entry(tpos, h, node)
 | 
						hlist_for_each_entry(tpos, h, node)
 | 
				
			||||||
		if (tpos->keys.src == k->src &&
 | 
							if (tpos->keys.addrs.src == k->addrs.src &&
 | 
				
			||||||
		    tpos->keys.dst == k->dst &&
 | 
							    tpos->keys.addrs.dst == k->addrs.dst &&
 | 
				
			||||||
		    tpos->keys.ports == k->ports &&
 | 
							    tpos->keys.ports.ports == k->ports.ports &&
 | 
				
			||||||
		    tpos->keys.ip_proto == k->ip_proto &&
 | 
							    tpos->keys.basic.ip_proto == k->basic.ip_proto &&
 | 
				
			||||||
		    tpos->keys.n_proto == k->n_proto)
 | 
							    tpos->keys.basic.n_proto == k->basic.n_proto)
 | 
				
			||||||
			return tpos;
 | 
								return tpos;
 | 
				
			||||||
	return NULL;
 | 
						return NULL;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					@ -177,9 +177,10 @@ int enic_rx_flow_steer(struct net_device *dev, const struct sk_buff *skb,
 | 
				
			||||||
	int res, i;
 | 
						int res, i;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	enic = netdev_priv(dev);
 | 
						enic = netdev_priv(dev);
 | 
				
			||||||
	res = skb_flow_dissect(skb, &keys);
 | 
						res = skb_flow_dissect_flow_keys(skb, &keys);
 | 
				
			||||||
	if (!res || keys.n_proto != htons(ETH_P_IP) ||
 | 
						if (!res || keys.basic.n_proto != htons(ETH_P_IP) ||
 | 
				
			||||||
	    (keys.ip_proto != IPPROTO_TCP && keys.ip_proto != IPPROTO_UDP))
 | 
						    (keys.basic.ip_proto != IPPROTO_TCP &&
 | 
				
			||||||
 | 
						     keys.basic.ip_proto != IPPROTO_UDP))
 | 
				
			||||||
		return -EPROTONOSUPPORT;
 | 
							return -EPROTONOSUPPORT;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	tbl_idx = skb_get_hash_raw(skb) & ENIC_RFS_FLW_MASK;
 | 
						tbl_idx = skb_get_hash_raw(skb) & ENIC_RFS_FLW_MASK;
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -334,7 +334,7 @@ static int enic_grxclsrule(struct enic *enic, struct ethtool_rxnfc *cmd)
 | 
				
			||||||
	n = htbl_fltr_search(enic, (u16)fsp->location);
 | 
						n = htbl_fltr_search(enic, (u16)fsp->location);
 | 
				
			||||||
	if (!n)
 | 
						if (!n)
 | 
				
			||||||
		return -EINVAL;
 | 
							return -EINVAL;
 | 
				
			||||||
	switch (n->keys.ip_proto) {
 | 
						switch (n->keys.basic.ip_proto) {
 | 
				
			||||||
	case IPPROTO_TCP:
 | 
						case IPPROTO_TCP:
 | 
				
			||||||
		fsp->flow_type = TCP_V4_FLOW;
 | 
							fsp->flow_type = TCP_V4_FLOW;
 | 
				
			||||||
		break;
 | 
							break;
 | 
				
			||||||
| 
						 | 
					@ -346,16 +346,16 @@ static int enic_grxclsrule(struct enic *enic, struct ethtool_rxnfc *cmd)
 | 
				
			||||||
		break;
 | 
							break;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	fsp->h_u.tcp_ip4_spec.ip4src = n->keys.src;
 | 
						fsp->h_u.tcp_ip4_spec.ip4src = n->keys.addrs.src;
 | 
				
			||||||
	fsp->m_u.tcp_ip4_spec.ip4src = (__u32)~0;
 | 
						fsp->m_u.tcp_ip4_spec.ip4src = (__u32)~0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	fsp->h_u.tcp_ip4_spec.ip4dst = n->keys.dst;
 | 
						fsp->h_u.tcp_ip4_spec.ip4dst = n->keys.addrs.dst;
 | 
				
			||||||
	fsp->m_u.tcp_ip4_spec.ip4dst = (__u32)~0;
 | 
						fsp->m_u.tcp_ip4_spec.ip4dst = (__u32)~0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	fsp->h_u.tcp_ip4_spec.psrc = n->keys.port16[0];
 | 
						fsp->h_u.tcp_ip4_spec.psrc = n->keys.ports.port16[0];
 | 
				
			||||||
	fsp->m_u.tcp_ip4_spec.psrc = (__u16)~0;
 | 
						fsp->m_u.tcp_ip4_spec.psrc = (__u16)~0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	fsp->h_u.tcp_ip4_spec.pdst = n->keys.port16[1];
 | 
						fsp->h_u.tcp_ip4_spec.pdst = n->keys.ports.port16[1];
 | 
				
			||||||
	fsp->m_u.tcp_ip4_spec.pdst = (__u16)~0;
 | 
						fsp->m_u.tcp_ip4_spec.pdst = (__u16)~0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	fsp->ring_cookie = n->rq_id;
 | 
						fsp->ring_cookie = n->rq_id;
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -196,12 +196,12 @@ static bool netvsc_set_hash(u32 *hash, struct sk_buff *skb)
 | 
				
			||||||
	struct flow_keys flow;
 | 
						struct flow_keys flow;
 | 
				
			||||||
	int data_len;
 | 
						int data_len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!skb_flow_dissect(skb, &flow) ||
 | 
						if (!skb_flow_dissect_flow_keys(skb, &flow) ||
 | 
				
			||||||
	    !(flow.n_proto == htons(ETH_P_IP) ||
 | 
						    !(flow.basic.n_proto == htons(ETH_P_IP) ||
 | 
				
			||||||
	      flow.n_proto == htons(ETH_P_IPV6)))
 | 
						      flow.basic.n_proto == htons(ETH_P_IPV6)))
 | 
				
			||||||
		return false;
 | 
							return false;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (flow.ip_proto == IPPROTO_TCP)
 | 
						if (flow.basic.ip_proto == IPPROTO_TCP)
 | 
				
			||||||
		data_len = 12;
 | 
							data_len = 12;
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		data_len = 8;
 | 
							data_len = 8;
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -1935,8 +1935,8 @@ static inline void skb_probe_transport_header(struct sk_buff *skb,
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (skb_transport_header_was_set(skb))
 | 
						if (skb_transport_header_was_set(skb))
 | 
				
			||||||
		return;
 | 
							return;
 | 
				
			||||||
	else if (skb_flow_dissect(skb, &keys))
 | 
						else if (skb_flow_dissect_flow_keys(skb, &keys))
 | 
				
			||||||
		skb_set_transport_header(skb, keys.thoff);
 | 
							skb_set_transport_header(skb, keys.basic.thoff);
 | 
				
			||||||
	else
 | 
						else
 | 
				
			||||||
		skb_set_transport_header(skb, offset_hint);
 | 
							skb_set_transport_header(skb, offset_hint);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -59,42 +59,47 @@ struct flow_dissector {
 | 
				
			||||||
	unsigned short int offset[FLOW_DISSECTOR_KEY_MAX];
 | 
						unsigned short int offset[FLOW_DISSECTOR_KEY_MAX];
 | 
				
			||||||
};
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* struct flow_keys:
 | 
					 | 
				
			||||||
 *	@src: source ip address in case of IPv4
 | 
					 | 
				
			||||||
 *	      For IPv6 it contains 32bit hash of src address
 | 
					 | 
				
			||||||
 *	@dst: destination ip address in case of IPv4
 | 
					 | 
				
			||||||
 *	      For IPv6 it contains 32bit hash of dst address
 | 
					 | 
				
			||||||
 *	@ports: port numbers of Transport header
 | 
					 | 
				
			||||||
 *		port16[0]: src port number
 | 
					 | 
				
			||||||
 *		port16[1]: dst port number
 | 
					 | 
				
			||||||
 *	@thoff: Transport header offset
 | 
					 | 
				
			||||||
 *	@n_proto: Network header protocol (eg. IPv4/IPv6)
 | 
					 | 
				
			||||||
 *	@ip_proto: Transport header protocol (eg. TCP/UDP)
 | 
					 | 
				
			||||||
 * All the members, except thoff, are in network byte order.
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
struct flow_keys {
 | 
					 | 
				
			||||||
	/* (src,dst) must be grouped, in the same way than in IP header */
 | 
					 | 
				
			||||||
	__be32 src;
 | 
					 | 
				
			||||||
	__be32 dst;
 | 
					 | 
				
			||||||
	union {
 | 
					 | 
				
			||||||
		__be32 ports;
 | 
					 | 
				
			||||||
		__be16 port16[2];
 | 
					 | 
				
			||||||
	};
 | 
					 | 
				
			||||||
	u16	thoff;
 | 
					 | 
				
			||||||
	__be16	n_proto;
 | 
					 | 
				
			||||||
	u8	ip_proto;
 | 
					 | 
				
			||||||
};
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
void skb_flow_dissector_init(struct flow_dissector *flow_dissector,
 | 
					void skb_flow_dissector_init(struct flow_dissector *flow_dissector,
 | 
				
			||||||
			     const struct flow_dissector_key *key,
 | 
								     const struct flow_dissector_key *key,
 | 
				
			||||||
			     unsigned int key_count);
 | 
								     unsigned int key_count);
 | 
				
			||||||
bool __skb_flow_dissect(const struct sk_buff *skb, struct flow_keys *flow,
 | 
					
 | 
				
			||||||
 | 
					bool __skb_flow_dissect(const struct sk_buff *skb,
 | 
				
			||||||
 | 
								struct flow_dissector *flow_dissector,
 | 
				
			||||||
 | 
								void *target_container,
 | 
				
			||||||
			void *data, __be16 proto, int nhoff, int hlen);
 | 
								void *data, __be16 proto, int nhoff, int hlen);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static inline bool skb_flow_dissect(const struct sk_buff *skb,
 | 
					static inline bool skb_flow_dissect(const struct sk_buff *skb,
 | 
				
			||||||
				    struct flow_keys *flow)
 | 
									    struct flow_dissector *flow_dissector,
 | 
				
			||||||
 | 
									    void *target_container)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	return __skb_flow_dissect(skb, flow, NULL, 0, 0, 0);
 | 
						return __skb_flow_dissect(skb, flow_dissector, target_container,
 | 
				
			||||||
 | 
									  NULL, 0, 0, 0);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					struct flow_keys {
 | 
				
			||||||
 | 
						struct flow_dissector_key_addrs addrs;
 | 
				
			||||||
 | 
						struct flow_dissector_key_ports ports;
 | 
				
			||||||
 | 
						struct flow_dissector_key_basic basic;
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					extern struct flow_dissector flow_keys_dissector;
 | 
				
			||||||
 | 
					extern struct flow_dissector flow_keys_buf_dissector;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static inline bool skb_flow_dissect_flow_keys(const struct sk_buff *skb,
 | 
				
			||||||
 | 
										      struct flow_keys *flow)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						memset(flow, 0, sizeof(*flow));
 | 
				
			||||||
 | 
						return __skb_flow_dissect(skb, &flow_keys_dissector, flow,
 | 
				
			||||||
 | 
									  NULL, 0, 0, 0);
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static inline bool skb_flow_dissect_flow_keys_buf(struct flow_keys *flow,
 | 
				
			||||||
 | 
											  void *data, __be16 proto,
 | 
				
			||||||
 | 
											  int nhoff, int hlen)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						memset(flow, 0, sizeof(*flow));
 | 
				
			||||||
 | 
						return __skb_flow_dissect(NULL, &flow_keys_buf_dissector, flow,
 | 
				
			||||||
 | 
									  data, proto, nhoff, hlen);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
__be32 __skb_flow_get_ports(const struct sk_buff *skb, int thoff, u8 ip_proto,
 | 
					__be32 __skb_flow_get_ports(const struct sk_buff *skb, int thoff, u8 ip_proto,
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -360,10 +360,10 @@ static inline void inet_set_txhash(struct sock *sk)
 | 
				
			||||||
	struct inet_sock *inet = inet_sk(sk);
 | 
						struct inet_sock *inet = inet_sk(sk);
 | 
				
			||||||
	struct flow_keys keys;
 | 
						struct flow_keys keys;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	keys.src = inet->inet_saddr;
 | 
						keys.addrs.src = inet->inet_saddr;
 | 
				
			||||||
	keys.dst = inet->inet_daddr;
 | 
						keys.addrs.dst = inet->inet_daddr;
 | 
				
			||||||
	keys.port16[0] = inet->inet_sport;
 | 
						keys.ports.port16[0] = inet->inet_sport;
 | 
				
			||||||
	keys.port16[1] = inet->inet_dport;
 | 
						keys.ports.port16[1] = inet->inet_dport;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	sk->sk_txhash = flow_hash_from_keys(&keys);
 | 
						sk->sk_txhash = flow_hash_from_keys(&keys);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -698,10 +698,10 @@ static inline void ip6_set_txhash(struct sock *sk)
 | 
				
			||||||
	struct ipv6_pinfo *np = inet6_sk(sk);
 | 
						struct ipv6_pinfo *np = inet6_sk(sk);
 | 
				
			||||||
	struct flow_keys keys;
 | 
						struct flow_keys keys;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	keys.src = (__force __be32)ipv6_addr_hash(&np->saddr);
 | 
						keys.addrs.src = (__force __be32)ipv6_addr_hash(&np->saddr);
 | 
				
			||||||
	keys.dst = (__force __be32)ipv6_addr_hash(&sk->sk_v6_daddr);
 | 
						keys.addrs.dst = (__force __be32)ipv6_addr_hash(&sk->sk_v6_daddr);
 | 
				
			||||||
	keys.port16[0] = inet->inet_sport;
 | 
						keys.ports.port16[0] = inet->inet_sport;
 | 
				
			||||||
	keys.port16[1] = inet->inet_dport;
 | 
						keys.ports.port16[1] = inet->inet_dport;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	sk->sk_txhash = flow_hash_from_keys(&keys);
 | 
						sk->sk_txhash = flow_hash_from_keys(&keys);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -13,6 +13,7 @@
 | 
				
			||||||
#include <linux/if_tunnel.h>
 | 
					#include <linux/if_tunnel.h>
 | 
				
			||||||
#include <linux/if_pppox.h>
 | 
					#include <linux/if_pppox.h>
 | 
				
			||||||
#include <linux/ppp_defs.h>
 | 
					#include <linux/ppp_defs.h>
 | 
				
			||||||
 | 
					#include <linux/stddef.h>
 | 
				
			||||||
#include <net/flow_dissector.h>
 | 
					#include <net/flow_dissector.h>
 | 
				
			||||||
#include <scsi/fc/fc_fcoe.h>
 | 
					#include <scsi/fc/fc_fcoe.h>
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -63,17 +64,6 @@ void skb_flow_dissector_init(struct flow_dissector *flow_dissector,
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
EXPORT_SYMBOL(skb_flow_dissector_init);
 | 
					EXPORT_SYMBOL(skb_flow_dissector_init);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
/* copy saddr & daddr, possibly using 64bit load/store
 | 
					 | 
				
			||||||
 * Equivalent to :	flow->src = iph->saddr;
 | 
					 | 
				
			||||||
 *			flow->dst = iph->daddr;
 | 
					 | 
				
			||||||
 */
 | 
					 | 
				
			||||||
static void iph_to_flow_copy_addrs(struct flow_keys *flow, const struct iphdr *iph)
 | 
					 | 
				
			||||||
{
 | 
					 | 
				
			||||||
	BUILD_BUG_ON(offsetof(typeof(*flow), dst) !=
 | 
					 | 
				
			||||||
		     offsetof(typeof(*flow), src) + sizeof(flow->src));
 | 
					 | 
				
			||||||
	memcpy(&flow->src, &iph->saddr, sizeof(flow->src) + sizeof(flow->dst));
 | 
					 | 
				
			||||||
}
 | 
					 | 
				
			||||||
 | 
					 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * __skb_flow_get_ports - extract the upper layer ports and return them
 | 
					 * __skb_flow_get_ports - extract the upper layer ports and return them
 | 
				
			||||||
 * @skb: sk_buff to extract the ports from
 | 
					 * @skb: sk_buff to extract the ports from
 | 
				
			||||||
| 
						 | 
					@ -111,17 +101,27 @@ EXPORT_SYMBOL(__skb_flow_get_ports);
 | 
				
			||||||
/**
 | 
					/**
 | 
				
			||||||
 * __skb_flow_dissect - extract the flow_keys struct and return it
 | 
					 * __skb_flow_dissect - extract the flow_keys struct and return it
 | 
				
			||||||
 * @skb: sk_buff to extract the flow from, can be NULL if the rest are specified
 | 
					 * @skb: sk_buff to extract the flow from, can be NULL if the rest are specified
 | 
				
			||||||
 | 
					 * @flow_dissector: list of keys to dissect
 | 
				
			||||||
 | 
					 * @target_container: target structure to put dissected values into
 | 
				
			||||||
 * @data: raw buffer pointer to the packet, if NULL use skb->data
 | 
					 * @data: raw buffer pointer to the packet, if NULL use skb->data
 | 
				
			||||||
 * @proto: protocol for which to get the flow, if @data is NULL use skb->protocol
 | 
					 * @proto: protocol for which to get the flow, if @data is NULL use skb->protocol
 | 
				
			||||||
 * @nhoff: network header offset, if @data is NULL use skb_network_offset(skb)
 | 
					 * @nhoff: network header offset, if @data is NULL use skb_network_offset(skb)
 | 
				
			||||||
 * @hlen: packet header length, if @data is NULL use skb_headlen(skb)
 | 
					 * @hlen: packet header length, if @data is NULL use skb_headlen(skb)
 | 
				
			||||||
 *
 | 
					 *
 | 
				
			||||||
 * The function will try to retrieve the struct flow_keys from either the skbuff
 | 
					 * The function will try to retrieve individual keys into target specified
 | 
				
			||||||
 * or a raw buffer specified by the rest parameters
 | 
					 * by flow_dissector from either the skbuff or a raw buffer specified by the
 | 
				
			||||||
 | 
					 * rest parameters.
 | 
				
			||||||
 | 
					 *
 | 
				
			||||||
 | 
					 * Caller must take care of zeroing target container memory.
 | 
				
			||||||
 */
 | 
					 */
 | 
				
			||||||
bool __skb_flow_dissect(const struct sk_buff *skb, struct flow_keys *flow,
 | 
					bool __skb_flow_dissect(const struct sk_buff *skb,
 | 
				
			||||||
 | 
								struct flow_dissector *flow_dissector,
 | 
				
			||||||
 | 
								void *target_container,
 | 
				
			||||||
			void *data, __be16 proto, int nhoff, int hlen)
 | 
								void *data, __be16 proto, int nhoff, int hlen)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
 | 
						struct flow_dissector_key_basic *key_basic;
 | 
				
			||||||
 | 
						struct flow_dissector_key_addrs *key_addrs;
 | 
				
			||||||
 | 
						struct flow_dissector_key_ports *key_ports;
 | 
				
			||||||
	u8 ip_proto;
 | 
						u8 ip_proto;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!data) {
 | 
						if (!data) {
 | 
				
			||||||
| 
						 | 
					@ -131,7 +131,12 @@ bool __skb_flow_dissect(const struct sk_buff *skb, struct flow_keys *flow,
 | 
				
			||||||
		hlen = skb_headlen(skb);
 | 
							hlen = skb_headlen(skb);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	memset(flow, 0, sizeof(*flow));
 | 
						/* It is ensured by skb_flow_dissector_init() that basic key will
 | 
				
			||||||
 | 
						 * be always present.
 | 
				
			||||||
 | 
						 */
 | 
				
			||||||
 | 
						key_basic = skb_flow_dissector_target(flow_dissector,
 | 
				
			||||||
 | 
										      FLOW_DISSECTOR_KEY_BASIC,
 | 
				
			||||||
 | 
										      target_container);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
again:
 | 
					again:
 | 
				
			||||||
	switch (proto) {
 | 
						switch (proto) {
 | 
				
			||||||
| 
						 | 
					@ -148,14 +153,13 @@ bool __skb_flow_dissect(const struct sk_buff *skb, struct flow_keys *flow,
 | 
				
			||||||
		if (ip_is_fragment(iph))
 | 
							if (ip_is_fragment(iph))
 | 
				
			||||||
			ip_proto = 0;
 | 
								ip_proto = 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/* skip the address processing if skb is NULL.  The assumption
 | 
							if (!skb_flow_dissector_uses_key(flow_dissector,
 | 
				
			||||||
		 * here is that if there is no skb we are not looking for flow
 | 
											 FLOW_DISSECTOR_KEY_IPV4_ADDRS))
 | 
				
			||||||
		 * info but lengths and protocols.
 | 
					 | 
				
			||||||
		 */
 | 
					 | 
				
			||||||
		if (!skb)
 | 
					 | 
				
			||||||
			break;
 | 
								break;
 | 
				
			||||||
 | 
							key_addrs = skb_flow_dissector_target(flow_dissector,
 | 
				
			||||||
		iph_to_flow_copy_addrs(flow, iph);
 | 
											      FLOW_DISSECTOR_KEY_IPV4_ADDRS,
 | 
				
			||||||
 | 
											      target_container);
 | 
				
			||||||
 | 
							memcpy(key_addrs, &iph->saddr, sizeof(*key_addrs));
 | 
				
			||||||
		break;
 | 
							break;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	case htons(ETH_P_IPV6): {
 | 
						case htons(ETH_P_IPV6): {
 | 
				
			||||||
| 
						 | 
					@ -171,12 +175,15 @@ bool __skb_flow_dissect(const struct sk_buff *skb, struct flow_keys *flow,
 | 
				
			||||||
		ip_proto = iph->nexthdr;
 | 
							ip_proto = iph->nexthdr;
 | 
				
			||||||
		nhoff += sizeof(struct ipv6hdr);
 | 
							nhoff += sizeof(struct ipv6hdr);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		/* see comment above in IPv4 section */
 | 
							if (!skb_flow_dissector_uses_key(flow_dissector,
 | 
				
			||||||
		if (!skb)
 | 
											 FLOW_DISSECTOR_KEY_IPV6_HASH_ADDRS))
 | 
				
			||||||
			break;
 | 
								break;
 | 
				
			||||||
 | 
							key_addrs = skb_flow_dissector_target(flow_dissector,
 | 
				
			||||||
 | 
											      FLOW_DISSECTOR_KEY_IPV6_HASH_ADDRS,
 | 
				
			||||||
 | 
											      target_container);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		flow->src = (__force __be32)ipv6_addr_hash(&iph->saddr);
 | 
							key_addrs->src = (__force __be32)ipv6_addr_hash(&iph->saddr);
 | 
				
			||||||
		flow->dst = (__force __be32)ipv6_addr_hash(&iph->daddr);
 | 
							key_addrs->dst = (__force __be32)ipv6_addr_hash(&iph->daddr);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		flow_label = ip6_flowlabel(iph);
 | 
							flow_label = ip6_flowlabel(iph);
 | 
				
			||||||
		if (flow_label) {
 | 
							if (flow_label) {
 | 
				
			||||||
| 
						 | 
					@ -184,10 +191,18 @@ bool __skb_flow_dissect(const struct sk_buff *skb, struct flow_keys *flow,
 | 
				
			||||||
			 * use that to represent the ports without any
 | 
								 * use that to represent the ports without any
 | 
				
			||||||
			 * further dissection.
 | 
								 * further dissection.
 | 
				
			||||||
			 */
 | 
								 */
 | 
				
			||||||
			flow->n_proto = proto;
 | 
					
 | 
				
			||||||
			flow->ip_proto = ip_proto;
 | 
								key_basic->n_proto = proto;
 | 
				
			||||||
			flow->ports = flow_label;
 | 
								key_basic->ip_proto = ip_proto;
 | 
				
			||||||
			flow->thoff = (u16)nhoff;
 | 
								key_basic->thoff = (u16)nhoff;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
								if (!skb_flow_dissector_uses_key(flow_dissector,
 | 
				
			||||||
 | 
												 FLOW_DISSECTOR_KEY_PORTS))
 | 
				
			||||||
 | 
									break;
 | 
				
			||||||
 | 
								key_ports = skb_flow_dissector_target(flow_dissector,
 | 
				
			||||||
 | 
												      FLOW_DISSECTOR_KEY_PORTS,
 | 
				
			||||||
 | 
												      target_container);
 | 
				
			||||||
 | 
								key_ports->ports = flow_label;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
			return true;
 | 
								return true;
 | 
				
			||||||
		}
 | 
							}
 | 
				
			||||||
| 
						 | 
					@ -234,14 +249,22 @@ bool __skb_flow_dissect(const struct sk_buff *skb, struct flow_keys *flow,
 | 
				
			||||||
		hdr = __skb_header_pointer(skb, nhoff, sizeof(_hdr), data, hlen, &_hdr);
 | 
							hdr = __skb_header_pointer(skb, nhoff, sizeof(_hdr), data, hlen, &_hdr);
 | 
				
			||||||
		if (!hdr)
 | 
							if (!hdr)
 | 
				
			||||||
			return false;
 | 
								return false;
 | 
				
			||||||
		flow->src = hdr->srcnode;
 | 
							key_basic->n_proto = proto;
 | 
				
			||||||
		flow->dst = 0;
 | 
							key_basic->thoff = (u16)nhoff;
 | 
				
			||||||
		flow->n_proto = proto;
 | 
					
 | 
				
			||||||
		flow->thoff = (u16)nhoff;
 | 
							if (skb_flow_dissector_uses_key(flow_dissector,
 | 
				
			||||||
 | 
											FLOW_DISSECTOR_KEY_IPV6_HASH_ADDRS)) {
 | 
				
			||||||
 | 
								return true;
 | 
				
			||||||
 | 
								key_addrs = skb_flow_dissector_target(flow_dissector,
 | 
				
			||||||
 | 
												      FLOW_DISSECTOR_KEY_IPV6_HASH_ADDRS,
 | 
				
			||||||
 | 
												      target_container);
 | 
				
			||||||
 | 
								key_addrs->src = hdr->srcnode;
 | 
				
			||||||
 | 
								key_addrs->dst = 0;
 | 
				
			||||||
 | 
							}
 | 
				
			||||||
		return true;
 | 
							return true;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
	case htons(ETH_P_FCOE):
 | 
						case htons(ETH_P_FCOE):
 | 
				
			||||||
		flow->thoff = (u16)(nhoff + FCOE_HEADER_LEN);
 | 
							key_basic->thoff = (u16)(nhoff + FCOE_HEADER_LEN);
 | 
				
			||||||
		/* fall through */
 | 
							/* fall through */
 | 
				
			||||||
	default:
 | 
						default:
 | 
				
			||||||
		return false;
 | 
							return false;
 | 
				
			||||||
| 
						 | 
					@ -296,14 +319,24 @@ bool __skb_flow_dissect(const struct sk_buff *skb, struct flow_keys *flow,
 | 
				
			||||||
		break;
 | 
							break;
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	flow->n_proto = proto;
 | 
						/* It is ensured by skb_flow_dissector_init() that basic key will
 | 
				
			||||||
	flow->ip_proto = ip_proto;
 | 
						 * be always present.
 | 
				
			||||||
	flow->thoff = (u16) nhoff;
 | 
						 */
 | 
				
			||||||
 | 
						key_basic = skb_flow_dissector_target(flow_dissector,
 | 
				
			||||||
 | 
										      FLOW_DISSECTOR_KEY_BASIC,
 | 
				
			||||||
 | 
										      target_container);
 | 
				
			||||||
 | 
						key_basic->n_proto = proto;
 | 
				
			||||||
 | 
						key_basic->ip_proto = ip_proto;
 | 
				
			||||||
 | 
						key_basic->thoff = (u16) nhoff;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* unless skb is set we don't need to record port info */
 | 
						if (skb_flow_dissector_uses_key(flow_dissector,
 | 
				
			||||||
	if (skb)
 | 
										FLOW_DISSECTOR_KEY_PORTS)) {
 | 
				
			||||||
		flow->ports = __skb_flow_get_ports(skb, nhoff, ip_proto,
 | 
							key_ports = skb_flow_dissector_target(flow_dissector,
 | 
				
			||||||
						   data, hlen);
 | 
											      FLOW_DISSECTOR_KEY_PORTS,
 | 
				
			||||||
 | 
											      target_container);
 | 
				
			||||||
 | 
							key_ports->ports = __skb_flow_get_ports(skb, nhoff, ip_proto,
 | 
				
			||||||
 | 
												data, hlen);
 | 
				
			||||||
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return true;
 | 
						return true;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					@ -325,16 +358,16 @@ static inline u32 __flow_hash_from_keys(struct flow_keys *keys, u32 keyval)
 | 
				
			||||||
	u32 hash;
 | 
						u32 hash;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* get a consistent hash (same value on both flow directions) */
 | 
						/* get a consistent hash (same value on both flow directions) */
 | 
				
			||||||
	if (((__force u32)keys->dst < (__force u32)keys->src) ||
 | 
						if (((__force u32)keys->addrs.dst < (__force u32)keys->addrs.src) ||
 | 
				
			||||||
	    (((__force u32)keys->dst == (__force u32)keys->src) &&
 | 
						    (((__force u32)keys->addrs.dst == (__force u32)keys->addrs.src) &&
 | 
				
			||||||
	     ((__force u16)keys->port16[1] < (__force u16)keys->port16[0]))) {
 | 
						     ((__force u16)keys->ports.port16[1] < (__force u16)keys->ports.port16[0]))) {
 | 
				
			||||||
		swap(keys->dst, keys->src);
 | 
							swap(keys->addrs.dst, keys->addrs.src);
 | 
				
			||||||
		swap(keys->port16[0], keys->port16[1]);
 | 
							swap(keys->ports.port16[0], keys->ports.port16[1]);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	hash = __flow_hash_3words((__force u32)keys->dst,
 | 
						hash = __flow_hash_3words((__force u32)keys->addrs.dst,
 | 
				
			||||||
				  (__force u32)keys->src,
 | 
									  (__force u32)keys->addrs.src,
 | 
				
			||||||
				  (__force u32)keys->ports,
 | 
									  (__force u32)keys->ports.ports,
 | 
				
			||||||
				  keyval);
 | 
									  keyval);
 | 
				
			||||||
	if (!hash)
 | 
						if (!hash)
 | 
				
			||||||
		hash = 1;
 | 
							hash = 1;
 | 
				
			||||||
| 
						 | 
					@ -352,7 +385,7 @@ EXPORT_SYMBOL(flow_hash_from_keys);
 | 
				
			||||||
static inline u32 ___skb_get_hash(const struct sk_buff *skb,
 | 
					static inline u32 ___skb_get_hash(const struct sk_buff *skb,
 | 
				
			||||||
				  struct flow_keys *keys, u32 keyval)
 | 
									  struct flow_keys *keys, u32 keyval)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	if (!skb_flow_dissect(skb, keys))
 | 
						if (!skb_flow_dissect_flow_keys(skb, keys))
 | 
				
			||||||
		return 0;
 | 
							return 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return __flow_hash_from_keys(keys, keyval);
 | 
						return __flow_hash_from_keys(keys, keyval);
 | 
				
			||||||
| 
						 | 
					@ -377,11 +410,11 @@ void make_flow_keys_digest(struct flow_keys_digest *digest,
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	memset(digest, 0, sizeof(*digest));
 | 
						memset(digest, 0, sizeof(*digest));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	data->n_proto = flow->n_proto;
 | 
						data->n_proto = flow->basic.n_proto;
 | 
				
			||||||
	data->ip_proto = flow->ip_proto;
 | 
						data->ip_proto = flow->basic.ip_proto;
 | 
				
			||||||
	data->ports = flow->ports;
 | 
						data->ports = flow->ports.ports;
 | 
				
			||||||
	data->src = flow->src;
 | 
						data->src = flow->addrs.src;
 | 
				
			||||||
	data->dst = flow->dst;
 | 
						data->dst = flow->addrs.dst;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
EXPORT_SYMBOL(make_flow_keys_digest);
 | 
					EXPORT_SYMBOL(make_flow_keys_digest);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -404,7 +437,7 @@ void __skb_get_hash(struct sk_buff *skb)
 | 
				
			||||||
	hash = ___skb_get_hash(skb, &keys, hashrnd);
 | 
						hash = ___skb_get_hash(skb, &keys, hashrnd);
 | 
				
			||||||
	if (!hash)
 | 
						if (!hash)
 | 
				
			||||||
		return;
 | 
							return;
 | 
				
			||||||
	if (keys.ports)
 | 
						if (keys.ports.ports)
 | 
				
			||||||
		skb->l4_hash = 1;
 | 
							skb->l4_hash = 1;
 | 
				
			||||||
	skb->sw_hash = 1;
 | 
						skb->sw_hash = 1;
 | 
				
			||||||
	skb->hash = hash;
 | 
						skb->hash = hash;
 | 
				
			||||||
| 
						 | 
					@ -422,9 +455,9 @@ EXPORT_SYMBOL(skb_get_hash_perturb);
 | 
				
			||||||
u32 __skb_get_poff(const struct sk_buff *skb, void *data,
 | 
					u32 __skb_get_poff(const struct sk_buff *skb, void *data,
 | 
				
			||||||
		   const struct flow_keys *keys, int hlen)
 | 
							   const struct flow_keys *keys, int hlen)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	u32 poff = keys->thoff;
 | 
						u32 poff = keys->basic.thoff;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	switch (keys->ip_proto) {
 | 
						switch (keys->basic.ip_proto) {
 | 
				
			||||||
	case IPPROTO_TCP: {
 | 
						case IPPROTO_TCP: {
 | 
				
			||||||
		/* access doff as u8 to avoid unaligned access */
 | 
							/* access doff as u8 to avoid unaligned access */
 | 
				
			||||||
		const u8 *doff;
 | 
							const u8 *doff;
 | 
				
			||||||
| 
						 | 
					@ -478,8 +511,52 @@ u32 skb_get_poff(const struct sk_buff *skb)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	struct flow_keys keys;
 | 
						struct flow_keys keys;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!skb_flow_dissect(skb, &keys))
 | 
						if (!skb_flow_dissect_flow_keys(skb, &keys))
 | 
				
			||||||
		return 0;
 | 
							return 0;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return __skb_get_poff(skb, skb->data, &keys, skb_headlen(skb));
 | 
						return __skb_get_poff(skb, skb->data, &keys, skb_headlen(skb));
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const struct flow_dissector_key flow_keys_dissector_keys[] = {
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							.key_id = FLOW_DISSECTOR_KEY_BASIC,
 | 
				
			||||||
 | 
							.offset = offsetof(struct flow_keys, basic),
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							.key_id = FLOW_DISSECTOR_KEY_IPV4_ADDRS,
 | 
				
			||||||
 | 
							.offset = offsetof(struct flow_keys, addrs),
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							.key_id = FLOW_DISSECTOR_KEY_IPV6_HASH_ADDRS,
 | 
				
			||||||
 | 
							.offset = offsetof(struct flow_keys, addrs),
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							.key_id = FLOW_DISSECTOR_KEY_PORTS,
 | 
				
			||||||
 | 
							.offset = offsetof(struct flow_keys, ports),
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const struct flow_dissector_key flow_keys_buf_dissector_keys[] = {
 | 
				
			||||||
 | 
						{
 | 
				
			||||||
 | 
							.key_id = FLOW_DISSECTOR_KEY_BASIC,
 | 
				
			||||||
 | 
							.offset = offsetof(struct flow_keys, basic),
 | 
				
			||||||
 | 
						},
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					struct flow_dissector flow_keys_dissector __read_mostly;
 | 
				
			||||||
 | 
					EXPORT_SYMBOL(flow_keys_dissector);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					struct flow_dissector flow_keys_buf_dissector __read_mostly;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static int __init init_default_flow_dissectors(void)
 | 
				
			||||||
 | 
					{
 | 
				
			||||||
 | 
						skb_flow_dissector_init(&flow_keys_dissector,
 | 
				
			||||||
 | 
									flow_keys_dissector_keys,
 | 
				
			||||||
 | 
									ARRAY_SIZE(flow_keys_dissector_keys));
 | 
				
			||||||
 | 
						skb_flow_dissector_init(&flow_keys_buf_dissector,
 | 
				
			||||||
 | 
									flow_keys_buf_dissector_keys,
 | 
				
			||||||
 | 
									ARRAY_SIZE(flow_keys_buf_dissector_keys));
 | 
				
			||||||
 | 
						return 0;
 | 
				
			||||||
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					late_initcall_sync(init_default_flow_dissectors);
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -131,9 +131,9 @@ u32 eth_get_headlen(void *data, unsigned int len)
 | 
				
			||||||
		return len;
 | 
							return len;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* parse any remaining L2/L3 headers, check for L4 */
 | 
						/* parse any remaining L2/L3 headers, check for L4 */
 | 
				
			||||||
	if (!__skb_flow_dissect(NULL, &keys, data,
 | 
						if (!skb_flow_dissect_flow_keys_buf(&keys, data, eth->h_proto,
 | 
				
			||||||
				eth->h_proto, sizeof(*eth), len))
 | 
										    sizeof(*eth), len))
 | 
				
			||||||
		return max_t(u32, keys.thoff, sizeof(*eth));
 | 
							return max_t(u32, keys.basic.thoff, sizeof(*eth));
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	/* parse for any L4 headers */
 | 
						/* parse for any L4 headers */
 | 
				
			||||||
	return min_t(u32, __skb_get_poff(NULL, data, &keys, len), len);
 | 
						return min_t(u32, __skb_get_poff(NULL, data, &keys, len), len);
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -68,35 +68,35 @@ static inline u32 addr_fold(void *addr)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static u32 flow_get_src(const struct sk_buff *skb, const struct flow_keys *flow)
 | 
					static u32 flow_get_src(const struct sk_buff *skb, const struct flow_keys *flow)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	if (flow->src)
 | 
						if (flow->addrs.src)
 | 
				
			||||||
		return ntohl(flow->src);
 | 
							return ntohl(flow->addrs.src);
 | 
				
			||||||
	return addr_fold(skb->sk);
 | 
						return addr_fold(skb->sk);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static u32 flow_get_dst(const struct sk_buff *skb, const struct flow_keys *flow)
 | 
					static u32 flow_get_dst(const struct sk_buff *skb, const struct flow_keys *flow)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	if (flow->dst)
 | 
						if (flow->addrs.dst)
 | 
				
			||||||
		return ntohl(flow->dst);
 | 
							return ntohl(flow->addrs.dst);
 | 
				
			||||||
	return addr_fold(skb_dst(skb)) ^ (__force u16) tc_skb_protocol(skb);
 | 
						return addr_fold(skb_dst(skb)) ^ (__force u16) tc_skb_protocol(skb);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static u32 flow_get_proto(const struct sk_buff *skb, const struct flow_keys *flow)
 | 
					static u32 flow_get_proto(const struct sk_buff *skb, const struct flow_keys *flow)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	return flow->ip_proto;
 | 
						return flow->basic.ip_proto;
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static u32 flow_get_proto_src(const struct sk_buff *skb, const struct flow_keys *flow)
 | 
					static u32 flow_get_proto_src(const struct sk_buff *skb, const struct flow_keys *flow)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	if (flow->ports)
 | 
						if (flow->ports.ports)
 | 
				
			||||||
		return ntohs(flow->port16[0]);
 | 
							return ntohs(flow->ports.port16[0]);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return addr_fold(skb->sk);
 | 
						return addr_fold(skb->sk);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static u32 flow_get_proto_dst(const struct sk_buff *skb, const struct flow_keys *flow)
 | 
					static u32 flow_get_proto_dst(const struct sk_buff *skb, const struct flow_keys *flow)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	if (flow->ports)
 | 
						if (flow->ports.ports)
 | 
				
			||||||
		return ntohs(flow->port16[1]);
 | 
							return ntohs(flow->ports.port16[1]);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	return addr_fold(skb_dst(skb)) ^ (__force u16) tc_skb_protocol(skb);
 | 
						return addr_fold(skb_dst(skb)) ^ (__force u16) tc_skb_protocol(skb);
 | 
				
			||||||
}
 | 
					}
 | 
				
			||||||
| 
						 | 
					@ -295,7 +295,7 @@ static int flow_classify(struct sk_buff *skb, const struct tcf_proto *tp,
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		keymask = f->keymask;
 | 
							keymask = f->keymask;
 | 
				
			||||||
		if (keymask & FLOW_KEYS_NEEDED)
 | 
							if (keymask & FLOW_KEYS_NEEDED)
 | 
				
			||||||
			skb_flow_dissect(skb, &flow_keys);
 | 
								skb_flow_dissect_flow_keys(skb, &flow_keys);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		for (n = 0; n < f->nkeys; n++) {
 | 
							for (n = 0; n < f->nkeys; n++) {
 | 
				
			||||||
			key = ffs(keymask) - 1;
 | 
								key = ffs(keymask) - 1;
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
| 
						 | 
					@ -170,13 +170,13 @@ static bool choke_match_flow(struct sk_buff *skb1,
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!choke_skb_cb(skb1)->keys_valid) {
 | 
						if (!choke_skb_cb(skb1)->keys_valid) {
 | 
				
			||||||
		choke_skb_cb(skb1)->keys_valid = 1;
 | 
							choke_skb_cb(skb1)->keys_valid = 1;
 | 
				
			||||||
		skb_flow_dissect(skb1, &temp);
 | 
							skb_flow_dissect_flow_keys(skb1, &temp);
 | 
				
			||||||
		make_flow_keys_digest(&choke_skb_cb(skb1)->keys, &temp);
 | 
							make_flow_keys_digest(&choke_skb_cb(skb1)->keys, &temp);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	if (!choke_skb_cb(skb2)->keys_valid) {
 | 
						if (!choke_skb_cb(skb2)->keys_valid) {
 | 
				
			||||||
		choke_skb_cb(skb2)->keys_valid = 1;
 | 
							choke_skb_cb(skb2)->keys_valid = 1;
 | 
				
			||||||
		skb_flow_dissect(skb2, &temp);
 | 
							skb_flow_dissect_flow_keys(skb2, &temp);
 | 
				
			||||||
		make_flow_keys_digest(&choke_skb_cb(skb2)->keys, &temp);
 | 
							make_flow_keys_digest(&choke_skb_cb(skb2)->keys, &temp);
 | 
				
			||||||
	}
 | 
						}
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in a new issue