Greg Kroah-Hartman | b244131 | 2017-11-01 15:07:57 +0100 | [diff] [blame] | 1 | /* SPDX-License-Identifier: GPL-2.0 */ |
Jiri Pirko | 1bd758e | 2015-05-12 14:56:07 +0200 | [diff] [blame] | 2 | #ifndef _NET_FLOW_DISSECTOR_H |
| 3 | #define _NET_FLOW_DISSECTOR_H |
Eric Dumazet | 0744dd0 | 2011-11-28 05:22:18 +0000 | [diff] [blame] | 4 | |
Jiri Pirko | c3f8eae | 2015-05-12 14:56:17 +0200 | [diff] [blame] | 5 | #include <linux/types.h> |
Jiri Pirko | b924933 | 2015-05-12 14:56:18 +0200 | [diff] [blame] | 6 | #include <linux/in6.h> |
Eric Dumazet | 5566744 | 2019-10-22 07:57:46 -0700 | [diff] [blame] | 7 | #include <linux/siphash.h> |
Jason Baron | 8a9093c | 2020-02-17 15:38:09 -0500 | [diff] [blame] | 8 | #include <linux/string.h> |
Jiri Pirko | 67a900c | 2015-05-12 14:56:19 +0200 | [diff] [blame] | 9 | #include <uapi/linux/if_ether.h> |
Jiri Pirko | c3f8eae | 2015-05-12 14:56:17 +0200 | [diff] [blame] | 10 | |
Jakub Sitnicki | b27f7bb | 2020-05-31 10:28:37 +0200 | [diff] [blame] | 11 | struct bpf_prog; |
| 12 | struct net; |
Matteo Croce | 5dec597 | 2019-10-29 14:50:52 +0100 | [diff] [blame] | 13 | struct sk_buff; |
| 14 | |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 15 | /** |
Tom Herbert | 42aecaa | 2015-06-04 09:16:39 -0700 | [diff] [blame] | 16 | * struct flow_dissector_key_control: |
| 17 | * @thoff: Transport header offset |
| 18 | */ |
| 19 | struct flow_dissector_key_control { |
| 20 | u16 thoff; |
Tom Herbert | c3f8324 | 2015-06-04 09:16:40 -0700 | [diff] [blame] | 21 | u16 addr_type; |
David S. Miller | 4b36993 | 2015-09-01 16:46:08 -0700 | [diff] [blame] | 22 | u32 flags; |
Tom Herbert | 42aecaa | 2015-06-04 09:16:39 -0700 | [diff] [blame] | 23 | }; |
| 24 | |
David S. Miller | 4b36993 | 2015-09-01 16:46:08 -0700 | [diff] [blame] | 25 | #define FLOW_DIS_IS_FRAGMENT BIT(0) |
| 26 | #define FLOW_DIS_FIRST_FRAG BIT(1) |
| 27 | #define FLOW_DIS_ENCAPSULATION BIT(2) |
| 28 | |
Tom Herbert | 3a1214e | 2017-09-01 14:04:11 -0700 | [diff] [blame] | 29 | enum flow_dissect_ret { |
| 30 | FLOW_DISSECT_RET_OUT_GOOD, |
| 31 | FLOW_DISSECT_RET_OUT_BAD, |
| 32 | FLOW_DISSECT_RET_PROTO_AGAIN, |
| 33 | FLOW_DISSECT_RET_IPPROTO_AGAIN, |
| 34 | FLOW_DISSECT_RET_CONTINUE, |
| 35 | }; |
| 36 | |
Tom Herbert | 42aecaa | 2015-06-04 09:16:39 -0700 | [diff] [blame] | 37 | /** |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 38 | * struct flow_dissector_key_basic: |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 39 | * @n_proto: Network header protocol (eg. IPv4/IPv6) |
| 40 | * @ip_proto: Transport header protocol (eg. TCP/UDP) |
| 41 | */ |
| 42 | struct flow_dissector_key_basic { |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 43 | __be16 n_proto; |
| 44 | u8 ip_proto; |
Tom Herbert | 42aecaa | 2015-06-04 09:16:39 -0700 | [diff] [blame] | 45 | u8 padding; |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 46 | }; |
| 47 | |
Tom Herbert | d34af82 | 2015-06-04 09:16:43 -0700 | [diff] [blame] | 48 | struct flow_dissector_key_tags { |
Hadar Hen Zion | f6a6692 | 2016-08-17 13:36:11 +0300 | [diff] [blame] | 49 | u32 flow_label; |
| 50 | }; |
| 51 | |
| 52 | struct flow_dissector_key_vlan { |
Pablo Neira Ayuso | a82055a | 2019-11-19 23:05:54 +0100 | [diff] [blame] | 53 | union { |
Petr Machata | d1746d1 | 2019-11-22 15:47:21 +0000 | [diff] [blame] | 54 | struct { |
| 55 | u16 vlan_id:12, |
| 56 | vlan_dei:1, |
| 57 | vlan_priority:3; |
| 58 | }; |
Pablo Neira Ayuso | a82055a | 2019-11-19 23:05:54 +0100 | [diff] [blame] | 59 | __be16 vlan_tci; |
| 60 | }; |
Jianbo Liu | 2064c3d | 2018-07-06 05:38:12 +0000 | [diff] [blame] | 61 | __be16 vlan_tpid; |
Tom Herbert | d34af82 | 2015-06-04 09:16:43 -0700 | [diff] [blame] | 62 | }; |
| 63 | |
Guillaume Nault | 58cff78 | 2020-05-26 14:29:00 +0200 | [diff] [blame] | 64 | struct flow_dissector_mpls_lse { |
Benjamin LaHaise | 029c1ec | 2017-04-22 16:52:46 -0400 | [diff] [blame] | 65 | u32 mpls_ttl:8, |
| 66 | mpls_bos:1, |
| 67 | mpls_tc:3, |
| 68 | mpls_label:20; |
| 69 | }; |
| 70 | |
Guillaume Nault | 58cff78 | 2020-05-26 14:29:00 +0200 | [diff] [blame] | 71 | #define FLOW_DIS_MPLS_MAX 7 |
| 72 | struct flow_dissector_key_mpls { |
| 73 | struct flow_dissector_mpls_lse ls[FLOW_DIS_MPLS_MAX]; /* Label Stack */ |
| 74 | u8 used_lses; /* One bit set for each Label Stack Entry in use */ |
| 75 | }; |
| 76 | |
| 77 | static inline void dissector_set_mpls_lse(struct flow_dissector_key_mpls *mpls, |
| 78 | int lse_index) |
| 79 | { |
| 80 | mpls->used_lses |= 1 << lse_index; |
| 81 | } |
| 82 | |
Simon Horman | 92e2c40 | 2018-08-07 17:36:00 +0200 | [diff] [blame] | 83 | #define FLOW_DIS_TUN_OPTS_MAX 255 |
| 84 | /** |
| 85 | * struct flow_dissector_key_enc_opts: |
| 86 | * @data: tunnel option data |
| 87 | * @len: length of tunnel option data |
| 88 | * @dst_opt_type: tunnel option type |
| 89 | */ |
| 90 | struct flow_dissector_key_enc_opts { |
| 91 | u8 data[FLOW_DIS_TUN_OPTS_MAX]; /* Using IP_TUNNEL_OPTS_MAX is desired |
| 92 | * here but seems difficult to #include |
| 93 | */ |
| 94 | u8 len; |
| 95 | __be16 dst_opt_type; |
| 96 | }; |
| 97 | |
Tom Herbert | 1fdd512 | 2015-06-04 09:16:45 -0700 | [diff] [blame] | 98 | struct flow_dissector_key_keyid { |
| 99 | __be32 keyid; |
| 100 | }; |
| 101 | |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 102 | /** |
Tom Herbert | c3f8324 | 2015-06-04 09:16:40 -0700 | [diff] [blame] | 103 | * struct flow_dissector_key_ipv4_addrs: |
| 104 | * @src: source ip address |
| 105 | * @dst: destination ip address |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 106 | */ |
Tom Herbert | c3f8324 | 2015-06-04 09:16:40 -0700 | [diff] [blame] | 107 | struct flow_dissector_key_ipv4_addrs { |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 108 | /* (src,dst) must be grouped, in the same way than in IP header */ |
| 109 | __be32 src; |
| 110 | __be32 dst; |
| 111 | }; |
| 112 | |
| 113 | /** |
Tom Herbert | c3f8324 | 2015-06-04 09:16:40 -0700 | [diff] [blame] | 114 | * struct flow_dissector_key_ipv6_addrs: |
| 115 | * @src: source ip address |
| 116 | * @dst: destination ip address |
| 117 | */ |
| 118 | struct flow_dissector_key_ipv6_addrs { |
| 119 | /* (src,dst) must be grouped, in the same way than in IP header */ |
| 120 | struct in6_addr src; |
| 121 | struct in6_addr dst; |
| 122 | }; |
| 123 | |
| 124 | /** |
Jon Maloy | 8d6e79d | 2017-11-08 09:59:26 +0100 | [diff] [blame] | 125 | * struct flow_dissector_key_tipc: |
| 126 | * @key: source node address combined with selector |
Tom Herbert | 9f24908 | 2015-06-04 09:16:41 -0700 | [diff] [blame] | 127 | */ |
Jon Maloy | 8d6e79d | 2017-11-08 09:59:26 +0100 | [diff] [blame] | 128 | struct flow_dissector_key_tipc { |
| 129 | __be32 key; |
Tom Herbert | 9f24908 | 2015-06-04 09:16:41 -0700 | [diff] [blame] | 130 | }; |
| 131 | |
| 132 | /** |
Tom Herbert | c3f8324 | 2015-06-04 09:16:40 -0700 | [diff] [blame] | 133 | * struct flow_dissector_key_addrs: |
| 134 | * @v4addrs: IPv4 addresses |
| 135 | * @v6addrs: IPv6 addresses |
| 136 | */ |
| 137 | struct flow_dissector_key_addrs { |
| 138 | union { |
| 139 | struct flow_dissector_key_ipv4_addrs v4addrs; |
| 140 | struct flow_dissector_key_ipv6_addrs v6addrs; |
Jon Maloy | 8d6e79d | 2017-11-08 09:59:26 +0100 | [diff] [blame] | 141 | struct flow_dissector_key_tipc tipckey; |
Tom Herbert | c3f8324 | 2015-06-04 09:16:40 -0700 | [diff] [blame] | 142 | }; |
| 143 | }; |
| 144 | |
| 145 | /** |
Simon Horman | 5573335 | 2017-01-11 14:05:42 +0100 | [diff] [blame] | 146 | * flow_dissector_key_arp: |
| 147 | * @ports: Operation, source and target addresses for an ARP header |
| 148 | * for Ethernet hardware addresses and IPv4 protocol addresses |
| 149 | * sip: Sender IP address |
| 150 | * tip: Target IP address |
| 151 | * op: Operation |
| 152 | * sha: Sender hardware address |
| 153 | * tpa: Target hardware address |
| 154 | */ |
| 155 | struct flow_dissector_key_arp { |
| 156 | __u32 sip; |
| 157 | __u32 tip; |
| 158 | __u8 op; |
| 159 | unsigned char sha[ETH_ALEN]; |
| 160 | unsigned char tha[ETH_ALEN]; |
| 161 | }; |
| 162 | |
| 163 | /** |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 164 | * flow_dissector_key_tp_ports: |
| 165 | * @ports: port numbers of Transport header |
Jiri Pirko | 59346af | 2015-05-12 14:56:20 +0200 | [diff] [blame] | 166 | * src: source port number |
| 167 | * dst: destination port number |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 168 | */ |
| 169 | struct flow_dissector_key_ports { |
| 170 | union { |
| 171 | __be32 ports; |
Jiri Pirko | 59346af | 2015-05-12 14:56:20 +0200 | [diff] [blame] | 172 | struct { |
| 173 | __be16 src; |
| 174 | __be16 dst; |
| 175 | }; |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 176 | }; |
| 177 | }; |
| 178 | |
Simon Horman | 972d387 | 2016-12-07 13:48:27 +0100 | [diff] [blame] | 179 | /** |
| 180 | * flow_dissector_key_icmp: |
Simon Horman | 972d387 | 2016-12-07 13:48:27 +0100 | [diff] [blame] | 181 | * type: ICMP type |
| 182 | * code: ICMP code |
Matteo Croce | 5dec597 | 2019-10-29 14:50:52 +0100 | [diff] [blame] | 183 | * id: session identifier |
Simon Horman | 972d387 | 2016-12-07 13:48:27 +0100 | [diff] [blame] | 184 | */ |
| 185 | struct flow_dissector_key_icmp { |
Matteo Croce | 5dec597 | 2019-10-29 14:50:52 +0100 | [diff] [blame] | 186 | struct { |
| 187 | u8 type; |
| 188 | u8 code; |
Simon Horman | 972d387 | 2016-12-07 13:48:27 +0100 | [diff] [blame] | 189 | }; |
Matteo Croce | 5dec597 | 2019-10-29 14:50:52 +0100 | [diff] [blame] | 190 | u16 id; |
Simon Horman | 972d387 | 2016-12-07 13:48:27 +0100 | [diff] [blame] | 191 | }; |
Jiri Pirko | b924933 | 2015-05-12 14:56:18 +0200 | [diff] [blame] | 192 | |
Jiri Pirko | 67a900c | 2015-05-12 14:56:19 +0200 | [diff] [blame] | 193 | /** |
| 194 | * struct flow_dissector_key_eth_addrs: |
| 195 | * @src: source Ethernet address |
| 196 | * @dst: destination Ethernet address |
| 197 | */ |
| 198 | struct flow_dissector_key_eth_addrs { |
| 199 | /* (dst,src) must be grouped, in the same way than in ETH header */ |
| 200 | unsigned char dst[ETH_ALEN]; |
| 201 | unsigned char src[ETH_ALEN]; |
| 202 | }; |
| 203 | |
Jiri Pirko | ac4bb5d | 2017-05-23 18:40:44 +0200 | [diff] [blame] | 204 | /** |
| 205 | * struct flow_dissector_key_tcp: |
| 206 | * @flags: flags |
| 207 | */ |
| 208 | struct flow_dissector_key_tcp { |
| 209 | __be16 flags; |
| 210 | }; |
| 211 | |
Or Gerlitz | 518d8a2 | 2017-06-01 21:37:37 +0300 | [diff] [blame] | 212 | /** |
| 213 | * struct flow_dissector_key_ip: |
| 214 | * @tos: tos |
| 215 | * @ttl: ttl |
| 216 | */ |
| 217 | struct flow_dissector_key_ip { |
| 218 | __u8 tos; |
| 219 | __u8 ttl; |
| 220 | }; |
| 221 | |
Jiri Pirko | 82828b8 | 2019-06-19 09:41:02 +0300 | [diff] [blame] | 222 | /** |
| 223 | * struct flow_dissector_key_meta: |
| 224 | * @ingress_ifindex: ingress ifindex |
Pablo Neira Ayuso | 8819efc | 2019-11-19 23:05:53 +0100 | [diff] [blame] | 225 | * @ingress_iftype: ingress interface type |
Jiri Pirko | 82828b8 | 2019-06-19 09:41:02 +0300 | [diff] [blame] | 226 | */ |
| 227 | struct flow_dissector_key_meta { |
| 228 | int ingress_ifindex; |
Pablo Neira Ayuso | 8819efc | 2019-11-19 23:05:53 +0100 | [diff] [blame] | 229 | u16 ingress_iftype; |
Jiri Pirko | 82828b8 | 2019-06-19 09:41:02 +0300 | [diff] [blame] | 230 | }; |
| 231 | |
Paul Blakey | 75a5675 | 2019-07-09 10:30:49 +0300 | [diff] [blame] | 232 | /** |
| 233 | * struct flow_dissector_key_ct: |
| 234 | * @ct_state: conntrack state after converting with map |
| 235 | * @ct_mark: conttrack mark |
| 236 | * @ct_zone: conntrack zone |
| 237 | * @ct_labels: conntrack labels |
| 238 | */ |
| 239 | struct flow_dissector_key_ct { |
| 240 | u16 ct_state; |
| 241 | u16 ct_zone; |
| 242 | u32 ct_mark; |
| 243 | u32 ct_labels[4]; |
| 244 | }; |
| 245 | |
Ariel Levkovich | 0cb09af | 2020-07-23 01:03:00 +0300 | [diff] [blame] | 246 | /** |
| 247 | * struct flow_dissector_key_hash: |
| 248 | * @hash: hash value |
| 249 | */ |
| 250 | struct flow_dissector_key_hash { |
| 251 | u32 hash; |
| 252 | }; |
| 253 | |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 254 | enum flow_dissector_key_id { |
Tom Herbert | 42aecaa | 2015-06-04 09:16:39 -0700 | [diff] [blame] | 255 | FLOW_DISSECTOR_KEY_CONTROL, /* struct flow_dissector_key_control */ |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 256 | FLOW_DISSECTOR_KEY_BASIC, /* struct flow_dissector_key_basic */ |
Tom Herbert | c3f8324 | 2015-06-04 09:16:40 -0700 | [diff] [blame] | 257 | FLOW_DISSECTOR_KEY_IPV4_ADDRS, /* struct flow_dissector_key_ipv4_addrs */ |
| 258 | FLOW_DISSECTOR_KEY_IPV6_ADDRS, /* struct flow_dissector_key_ipv6_addrs */ |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 259 | FLOW_DISSECTOR_KEY_PORTS, /* struct flow_dissector_key_ports */ |
Yoshiki Komachi | 8ffb055 | 2019-12-03 19:40:12 +0900 | [diff] [blame] | 260 | FLOW_DISSECTOR_KEY_PORTS_RANGE, /* struct flow_dissector_key_ports */ |
Simon Horman | 972d387 | 2016-12-07 13:48:27 +0100 | [diff] [blame] | 261 | FLOW_DISSECTOR_KEY_ICMP, /* struct flow_dissector_key_icmp */ |
Jiri Pirko | 67a900c | 2015-05-12 14:56:19 +0200 | [diff] [blame] | 262 | FLOW_DISSECTOR_KEY_ETH_ADDRS, /* struct flow_dissector_key_eth_addrs */ |
Jon Maloy | 8d6e79d | 2017-11-08 09:59:26 +0100 | [diff] [blame] | 263 | FLOW_DISSECTOR_KEY_TIPC, /* struct flow_dissector_key_tipc */ |
Simon Horman | 5573335 | 2017-01-11 14:05:42 +0100 | [diff] [blame] | 264 | FLOW_DISSECTOR_KEY_ARP, /* struct flow_dissector_key_arp */ |
Edward Cree | 91c4595 | 2018-11-27 15:40:59 +0000 | [diff] [blame] | 265 | FLOW_DISSECTOR_KEY_VLAN, /* struct flow_dissector_key_vlan */ |
| 266 | FLOW_DISSECTOR_KEY_FLOW_LABEL, /* struct flow_dissector_key_tags */ |
Tom Herbert | 1fdd512 | 2015-06-04 09:16:45 -0700 | [diff] [blame] | 267 | FLOW_DISSECTOR_KEY_GRE_KEYID, /* struct flow_dissector_key_keyid */ |
Tom Herbert | b3baa0f | 2015-06-04 09:16:46 -0700 | [diff] [blame] | 268 | FLOW_DISSECTOR_KEY_MPLS_ENTROPY, /* struct flow_dissector_key_keyid */ |
Hadar Hen Zion | 9ba6a9a | 2016-11-07 15:14:37 +0200 | [diff] [blame] | 269 | FLOW_DISSECTOR_KEY_ENC_KEYID, /* struct flow_dissector_key_keyid */ |
| 270 | FLOW_DISSECTOR_KEY_ENC_IPV4_ADDRS, /* struct flow_dissector_key_ipv4_addrs */ |
| 271 | FLOW_DISSECTOR_KEY_ENC_IPV6_ADDRS, /* struct flow_dissector_key_ipv6_addrs */ |
| 272 | FLOW_DISSECTOR_KEY_ENC_CONTROL, /* struct flow_dissector_key_control */ |
Hadar Hen Zion | f4d997f | 2016-11-07 15:14:39 +0200 | [diff] [blame] | 273 | FLOW_DISSECTOR_KEY_ENC_PORTS, /* struct flow_dissector_key_ports */ |
Benjamin LaHaise | 029c1ec | 2017-04-22 16:52:46 -0400 | [diff] [blame] | 274 | FLOW_DISSECTOR_KEY_MPLS, /* struct flow_dissector_key_mpls */ |
Jiri Pirko | ac4bb5d | 2017-05-23 18:40:44 +0200 | [diff] [blame] | 275 | FLOW_DISSECTOR_KEY_TCP, /* struct flow_dissector_key_tcp */ |
Or Gerlitz | 518d8a2 | 2017-06-01 21:37:37 +0300 | [diff] [blame] | 276 | FLOW_DISSECTOR_KEY_IP, /* struct flow_dissector_key_ip */ |
Edward Cree | 91c4595 | 2018-11-27 15:40:59 +0000 | [diff] [blame] | 277 | FLOW_DISSECTOR_KEY_CVLAN, /* struct flow_dissector_key_vlan */ |
Or Gerlitz | 5544adb | 2018-07-17 19:27:17 +0300 | [diff] [blame] | 278 | FLOW_DISSECTOR_KEY_ENC_IP, /* struct flow_dissector_key_ip */ |
Simon Horman | 92e2c40 | 2018-08-07 17:36:00 +0200 | [diff] [blame] | 279 | FLOW_DISSECTOR_KEY_ENC_OPTS, /* struct flow_dissector_key_enc_opts */ |
Jiri Pirko | 82828b8 | 2019-06-19 09:41:02 +0300 | [diff] [blame] | 280 | FLOW_DISSECTOR_KEY_META, /* struct flow_dissector_key_meta */ |
Paul Blakey | 75a5675 | 2019-07-09 10:30:49 +0300 | [diff] [blame] | 281 | FLOW_DISSECTOR_KEY_CT, /* struct flow_dissector_key_ct */ |
Ariel Levkovich | 0cb09af | 2020-07-23 01:03:00 +0300 | [diff] [blame] | 282 | FLOW_DISSECTOR_KEY_HASH, /* struct flow_dissector_key_hash */ |
Simon Horman | 92e2c40 | 2018-08-07 17:36:00 +0200 | [diff] [blame] | 283 | |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 284 | FLOW_DISSECTOR_KEY_MAX, |
| 285 | }; |
| 286 | |
Tom Herbert | 807e165 | 2015-09-01 09:24:28 -0700 | [diff] [blame] | 287 | #define FLOW_DISSECTOR_F_PARSE_1ST_FRAG BIT(0) |
Stanislav Fomichev | 1cc2645 | 2019-05-31 14:05:06 -0700 | [diff] [blame] | 288 | #define FLOW_DISSECTOR_F_STOP_AT_FLOW_LABEL BIT(1) |
| 289 | #define FLOW_DISSECTOR_F_STOP_AT_ENCAP BIT(2) |
Tom Herbert | 807e165 | 2015-09-01 09:24:28 -0700 | [diff] [blame] | 290 | |
Jiri Pirko | fbff949 | 2015-05-12 14:56:15 +0200 | [diff] [blame] | 291 | struct flow_dissector_key { |
| 292 | enum flow_dissector_key_id key_id; |
| 293 | size_t offset; /* offset of struct flow_dissector_key_* |
| 294 | in target the struct */ |
| 295 | }; |
| 296 | |
| 297 | struct flow_dissector { |
| 298 | unsigned int used_keys; /* each bit repesents presence of one key id */ |
| 299 | unsigned short int offset[FLOW_DISSECTOR_KEY_MAX]; |
| 300 | }; |
| 301 | |
Paolo Abeni | 72a338b | 2018-05-04 11:32:59 +0200 | [diff] [blame] | 302 | struct flow_keys_basic { |
| 303 | struct flow_dissector_key_control control; |
| 304 | struct flow_dissector_key_basic basic; |
| 305 | }; |
| 306 | |
Jiri Pirko | 06635a3 | 2015-05-12 14:56:16 +0200 | [diff] [blame] | 307 | struct flow_keys { |
Tom Herbert | 42aecaa | 2015-06-04 09:16:39 -0700 | [diff] [blame] | 308 | struct flow_dissector_key_control control; |
| 309 | #define FLOW_KEYS_HASH_START_FIELD basic |
Eric Dumazet | 5566744 | 2019-10-22 07:57:46 -0700 | [diff] [blame] | 310 | struct flow_dissector_key_basic basic __aligned(SIPHASH_ALIGNMENT); |
Tom Herbert | d34af82 | 2015-06-04 09:16:43 -0700 | [diff] [blame] | 311 | struct flow_dissector_key_tags tags; |
Hadar Hen Zion | f6a6692 | 2016-08-17 13:36:11 +0300 | [diff] [blame] | 312 | struct flow_dissector_key_vlan vlan; |
Jianbo Liu | 24c590e | 2018-07-06 05:38:14 +0000 | [diff] [blame] | 313 | struct flow_dissector_key_vlan cvlan; |
Tom Herbert | 1fdd512 | 2015-06-04 09:16:45 -0700 | [diff] [blame] | 314 | struct flow_dissector_key_keyid keyid; |
Tom Herbert | 42aecaa | 2015-06-04 09:16:39 -0700 | [diff] [blame] | 315 | struct flow_dissector_key_ports ports; |
Matteo Croce | 5dec597 | 2019-10-29 14:50:52 +0100 | [diff] [blame] | 316 | struct flow_dissector_key_icmp icmp; |
Matteo Croce | 98298e6 | 2019-10-29 14:50:50 +0100 | [diff] [blame] | 317 | /* 'addrs' must be the last member */ |
Tom Herbert | 42aecaa | 2015-06-04 09:16:39 -0700 | [diff] [blame] | 318 | struct flow_dissector_key_addrs addrs; |
Jiri Pirko | 06635a3 | 2015-05-12 14:56:16 +0200 | [diff] [blame] | 319 | }; |
| 320 | |
Tom Herbert | 42aecaa | 2015-06-04 09:16:39 -0700 | [diff] [blame] | 321 | #define FLOW_KEYS_HASH_OFFSET \ |
| 322 | offsetof(struct flow_keys, FLOW_KEYS_HASH_START_FIELD) |
| 323 | |
Tom Herbert | c3f8324 | 2015-06-04 09:16:40 -0700 | [diff] [blame] | 324 | __be32 flow_get_u32_src(const struct flow_keys *flow); |
| 325 | __be32 flow_get_u32_dst(const struct flow_keys *flow); |
| 326 | |
Jiri Pirko | 06635a3 | 2015-05-12 14:56:16 +0200 | [diff] [blame] | 327 | extern struct flow_dissector flow_keys_dissector; |
Paolo Abeni | 72a338b | 2018-05-04 11:32:59 +0200 | [diff] [blame] | 328 | extern struct flow_dissector flow_keys_basic_dissector; |
Jiri Pirko | 06635a3 | 2015-05-12 14:56:16 +0200 | [diff] [blame] | 329 | |
Tom Herbert | 2f59e1e | 2015-05-01 11:30:17 -0700 | [diff] [blame] | 330 | /* struct flow_keys_digest: |
| 331 | * |
| 332 | * This structure is used to hold a digest of the full flow keys. This is a |
| 333 | * larger "hash" of a flow to allow definitively matching specific flows where |
| 334 | * the 32 bit skb->hash is not large enough. The size is limited to 16 bytes so |
Wolfram Sang | 53bc017 | 2018-05-06 13:23:52 +0200 | [diff] [blame] | 335 | * that it can be used in CB of skb (see sch_choke for an example). |
Tom Herbert | 2f59e1e | 2015-05-01 11:30:17 -0700 | [diff] [blame] | 336 | */ |
| 337 | #define FLOW_KEYS_DIGEST_LEN 16 |
| 338 | struct flow_keys_digest { |
| 339 | u8 data[FLOW_KEYS_DIGEST_LEN]; |
| 340 | }; |
| 341 | |
| 342 | void make_flow_keys_digest(struct flow_keys_digest *digest, |
| 343 | const struct flow_keys *flow); |
| 344 | |
Gao Feng | 66fdd05 | 2016-08-31 11:16:22 +0800 | [diff] [blame] | 345 | static inline bool flow_keys_have_l4(const struct flow_keys *keys) |
Tom Herbert | bcc8383 | 2015-09-01 09:24:24 -0700 | [diff] [blame] | 346 | { |
| 347 | return (keys->ports.ports || keys->tags.flow_label); |
| 348 | } |
| 349 | |
Tom Herbert | c6cc1ca | 2015-09-01 09:24:25 -0700 | [diff] [blame] | 350 | u32 flow_hash_from_keys(struct flow_keys *keys); |
Matteo Croce | 5dec597 | 2019-10-29 14:50:52 +0100 | [diff] [blame] | 351 | void skb_flow_get_icmp_tci(const struct sk_buff *skb, |
| 352 | struct flow_dissector_key_icmp *key_icmp, |
Alexander Lobakin | f96533c | 2021-03-14 11:11:23 +0000 | [diff] [blame] | 353 | const void *data, int thoff, int hlen); |
Tom Herbert | c6cc1ca | 2015-09-01 09:24:25 -0700 | [diff] [blame] | 354 | |
Amir Vadai | 8de2d79 | 2016-03-08 12:42:30 +0200 | [diff] [blame] | 355 | static inline bool dissector_uses_key(const struct flow_dissector *flow_dissector, |
| 356 | enum flow_dissector_key_id key_id) |
| 357 | { |
| 358 | return flow_dissector->used_keys & (1 << key_id); |
| 359 | } |
| 360 | |
| 361 | static inline void *skb_flow_dissector_target(struct flow_dissector *flow_dissector, |
| 362 | enum flow_dissector_key_id key_id, |
| 363 | void *target_container) |
| 364 | { |
| 365 | return ((char *)target_container) + flow_dissector->offset[key_id]; |
| 366 | } |
| 367 | |
Stanislav Fomichev | 089b19a | 2019-04-22 08:55:44 -0700 | [diff] [blame] | 368 | struct bpf_flow_dissector { |
| 369 | struct bpf_flow_keys *flow_keys; |
| 370 | const struct sk_buff *skb; |
Alexander Lobakin | dac06b3 | 2021-03-14 11:11:00 +0000 | [diff] [blame] | 371 | const void *data; |
| 372 | const void *data_end; |
Stanislav Fomichev | 089b19a | 2019-04-22 08:55:44 -0700 | [diff] [blame] | 373 | }; |
| 374 | |
Jason Baron | 8a9093c | 2020-02-17 15:38:09 -0500 | [diff] [blame] | 375 | static inline void |
| 376 | flow_dissector_init_keys(struct flow_dissector_key_control *key_control, |
| 377 | struct flow_dissector_key_basic *key_basic) |
| 378 | { |
| 379 | memset(key_control, 0, sizeof(*key_control)); |
| 380 | memset(key_basic, 0, sizeof(*key_basic)); |
| 381 | } |
| 382 | |
Jakub Sitnicki | b27f7bb | 2020-05-31 10:28:37 +0200 | [diff] [blame] | 383 | #ifdef CONFIG_BPF_SYSCALL |
Jakub Sitnicki | 3b70169 | 2020-06-25 16:13:54 +0200 | [diff] [blame] | 384 | int flow_dissector_bpf_prog_attach_check(struct net *net, |
| 385 | struct bpf_prog *prog); |
Jakub Sitnicki | b27f7bb | 2020-05-31 10:28:37 +0200 | [diff] [blame] | 386 | #endif /* CONFIG_BPF_SYSCALL */ |
| 387 | |
Eric Dumazet | 0744dd0 | 2011-11-28 05:22:18 +0000 | [diff] [blame] | 388 | #endif |