Message ID | 20181119001519.12124-10-pablo@netfilter.org |
---|---|
State | Changes Requested, archived |
Delegated to: | David Miller |
Headers | show |
Series | add flow_rule infrastructure | expand |
Mon, Nov 19, 2018 at 01:15:16AM CET, pablo@netfilter.org wrote: >This patch adds a function to translate the ethtool_rx_flow_spec >structure to the flow_rule representation. > >This allows us to reuse code from the driver side given that both flower >and ethtool_rx_flow interfaces use the same representation. > >Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> >--- >v2: no changes. > > include/net/flow_dissector.h | 5 ++ > net/core/flow_dissector.c | 190 +++++++++++++++++++++++++++++++++++++++++++ > 2 files changed, 195 insertions(+) > >diff --git a/include/net/flow_dissector.h b/include/net/flow_dissector.h >index 7a4683646d5a..ec9036232538 100644 >--- a/include/net/flow_dissector.h >+++ b/include/net/flow_dissector.h >@@ -485,4 +485,9 @@ static inline bool flow_rule_match_key(const struct flow_rule *rule, > return dissector_uses_key(rule->match.dissector, key); > } > >+struct ethtool_rx_flow_spec; >+ >+struct flow_rule *ethtool_rx_flow_rule(const struct ethtool_rx_flow_spec *fs); >+void ethtool_rx_flow_rule_free(struct flow_rule *rule); >+ > #endif >diff --git a/net/core/flow_dissector.c b/net/core/flow_dissector.c >index b9368349f0f7..ef5bdb62620c 100644 >--- a/net/core/flow_dissector.c >+++ b/net/core/flow_dissector.c >@@ -17,6 +17,7 @@ > #include <linux/dccp.h> > #include <linux/if_tunnel.h> > #include <linux/if_pppox.h> >+#include <uapi/linux/ethtool.h> > #include <linux/ppp_defs.h> > #include <linux/stddef.h> > #include <linux/if_ether.h> >@@ -276,6 +277,195 @@ void flow_action_free(struct flow_action *flow_action) > } > EXPORT_SYMBOL(flow_action_free); > >+struct ethtool_rx_flow_key { >+ struct flow_dissector_key_basic basic; >+ union { >+ struct flow_dissector_key_ipv4_addrs ipv4; >+ struct flow_dissector_key_ipv6_addrs ipv6; >+ }; >+ struct flow_dissector_key_ports tp; >+ struct flow_dissector_key_ip ip; >+} __aligned(BITS_PER_LONG / 8); /* Ensure that we can do comparisons as longs. */ >+ >+struct ethtool_rx_flow_match { >+ struct flow_dissector dissector; >+ struct ethtool_rx_flow_key key; >+ struct ethtool_rx_flow_key mask; >+}; >+ >+struct flow_rule *ethtool_rx_flow_rule(const struct ethtool_rx_flow_spec *fs) >+{ >+ static struct in6_addr zero_addr = {}; >+ struct ethtool_rx_flow_match *match; >+ struct flow_action_key *act; >+ struct flow_rule *rule; >+ >+ rule = kmalloc(sizeof(struct flow_rule), GFP_KERNEL); >+ if (!rule) >+ return NULL; >+ >+ match = kzalloc(sizeof(struct ethtool_rx_flow_match), GFP_KERNEL); >+ if (!match) >+ goto err_match; >+ >+ rule->match.dissector = &match->dissector; >+ rule->match.mask = &match->mask; >+ rule->match.key = &match->key; >+ >+ match->mask.basic.n_proto = 0xffff; >+ >+ switch (fs->flow_type & ~FLOW_EXT) { >+ case TCP_V4_FLOW: >+ case UDP_V4_FLOW: { >+ const struct ethtool_tcpip4_spec *v4_spec, *v4_m_spec; >+ >+ match->key.basic.n_proto = htons(ETH_P_IP); >+ >+ v4_spec = &fs->h_u.tcp_ip4_spec; >+ v4_m_spec = &fs->m_u.tcp_ip4_spec; >+ >+ if (v4_m_spec->ip4src) { >+ match->key.ipv4.src = v4_spec->ip4src; >+ match->mask.ipv4.src = v4_m_spec->ip4src; >+ } >+ if (v4_m_spec->ip4dst) { >+ match->key.ipv4.dst = v4_spec->ip4dst; >+ match->mask.ipv4.dst = v4_m_spec->ip4dst; >+ } >+ if (v4_m_spec->ip4src || >+ v4_m_spec->ip4dst) { >+ match->dissector.used_keys |= >+ FLOW_DISSECTOR_KEY_IPV4_ADDRS; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IPV4_ADDRS] = >+ offsetof(struct ethtool_rx_flow_key, ipv4); >+ } >+ if (v4_m_spec->psrc) { >+ match->key.tp.src = v4_spec->psrc; >+ match->mask.tp.src = v4_m_spec->psrc; >+ } >+ if (v4_m_spec->pdst) { >+ match->key.tp.dst = v4_spec->pdst; >+ match->mask.tp.dst = v4_m_spec->pdst; >+ } >+ if (v4_m_spec->psrc || >+ v4_m_spec->pdst) { >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_PORTS; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_PORTS] = >+ offsetof(struct ethtool_rx_flow_key, tp); >+ } >+ if (v4_m_spec->tos) { >+ match->key.ip.tos = v4_spec->pdst; >+ match->mask.ip.tos = v4_m_spec->pdst; >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_IP; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IP] = >+ offsetof(struct ethtool_rx_flow_key, ip); >+ } >+ } >+ break; >+ case TCP_V6_FLOW: >+ case UDP_V6_FLOW: { >+ const struct ethtool_tcpip6_spec *v6_spec, *v6_m_spec; >+ >+ match->key.basic.n_proto = htons(ETH_P_IPV6); >+ >+ v6_spec = &fs->h_u.tcp_ip6_spec; >+ v6_m_spec = &fs->m_u.tcp_ip6_spec; >+ if (memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr))) { >+ memcpy(&match->key.ipv6.src, v6_spec->ip6src, >+ sizeof(match->key.ipv6.src)); >+ memcpy(&match->mask.ipv6.src, v6_m_spec->ip6src, >+ sizeof(match->mask.ipv6.src)); >+ } >+ if (memcmp(v6_m_spec->ip6dst, &zero_addr, sizeof(zero_addr))) { >+ memcpy(&match->key.ipv6.dst, v6_spec->ip6dst, >+ sizeof(match->key.ipv6.dst)); >+ memcpy(&match->mask.ipv6.dst, v6_m_spec->ip6dst, >+ sizeof(match->mask.ipv6.dst)); >+ } >+ if (memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr)) || >+ memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr))) { >+ match->dissector.used_keys |= >+ FLOW_DISSECTOR_KEY_IPV6_ADDRS; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IPV6_ADDRS] = >+ offsetof(struct ethtool_rx_flow_key, ipv6); >+ } >+ if (v6_m_spec->psrc) { >+ match->key.tp.src = v6_spec->psrc; >+ match->mask.tp.src = v6_m_spec->psrc; >+ } >+ if (v6_m_spec->pdst) { >+ match->key.tp.dst = v6_spec->pdst; >+ match->mask.tp.dst = v6_m_spec->pdst; >+ } >+ if (v6_m_spec->psrc || >+ v6_m_spec->pdst) { >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_PORTS; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_PORTS] = >+ offsetof(struct ethtool_rx_flow_key, tp); >+ } >+ if (v6_m_spec->tclass) { >+ match->key.ip.tos = v6_spec->tclass; >+ match->mask.ip.tos = v6_m_spec->tclass; >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_IP; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IP] = >+ offsetof(struct ethtool_rx_flow_key, ip); >+ } >+ } >+ break; >+ } >+ >+ switch (fs->flow_type & ~FLOW_EXT) { >+ case TCP_V4_FLOW: >+ case TCP_V6_FLOW: >+ match->key.basic.ip_proto = IPPROTO_TCP; >+ break; >+ case UDP_V4_FLOW: >+ case UDP_V6_FLOW: >+ match->key.basic.ip_proto = IPPROTO_UDP; >+ break; >+ } >+ match->mask.basic.ip_proto = 0xff; >+ >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_BASIC; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_BASIC] = >+ offsetof(struct ethtool_rx_flow_key, basic); >+ >+ /* ethtool_rx supports only one single action per rule. */ >+ if (flow_action_init(&rule->action, 1) < 0) >+ goto err_action; >+ >+ act = &rule->action.keys[0]; >+ switch (fs->ring_cookie) { >+ case RX_CLS_FLOW_DISC: >+ act->id = FLOW_ACTION_KEY_DROP; >+ break; >+ case RX_CLS_FLOW_WAKE: >+ act->id = FLOW_ACTION_KEY_WAKE; >+ break; >+ default: >+ act->id = FLOW_ACTION_KEY_QUEUE; >+ act->queue_index = fs->ring_cookie; >+ break; >+ } >+ >+ return rule; >+ >+err_action: >+ kfree(match); >+err_match: >+ kfree(rule); >+ return NULL; >+} >+EXPORT_SYMBOL(ethtool_rx_flow_rule); >+ >+void ethtool_rx_flow_rule_free(struct flow_rule *rule) >+{ >+ kfree((struct flow_match *)rule->match.dissector); >+ flow_action_free(&rule->action); >+ kfree(rule); >+} >+EXPORT_SYMBOL(ethtool_rx_flow_rule_free); Code that is doing ethtool->flow_rule conversion should be in ethtool code. You should just provide helpers here (in flow.c) that could be used to assemble the flow_rule structure. Same applies to TC. >+ > /** > * __skb_flow_get_ports - extract the upper layer ports and return them > * @skb: sk_buff to extract the ports from >-- >2.11.0 >
On Mon, Nov 19, 2018 at 03:17:43PM +0100, Jiri Pirko wrote: > Mon, Nov 19, 2018 at 01:15:16AM CET, pablo@netfilter.org wrote: [...] > >diff --git a/include/net/flow_dissector.h b/include/net/flow_dissector.h > >index 7a4683646d5a..ec9036232538 100644 > >--- a/include/net/flow_dissector.h > >+++ b/include/net/flow_dissector.h [...] > >+struct flow_rule *ethtool_rx_flow_rule(const struct ethtool_rx_flow_spec *fs) [...] > Code that is doing ethtool->flow_rule conversion should be in ethtool > code. You should just provide helpers here (in flow.c) that could be > used to assemble the flow_rule structure. OK, will place this in ethtool file.
Mon, Nov 19, 2018 at 01:15:16AM CET, pablo@netfilter.org wrote: >This patch adds a function to translate the ethtool_rx_flow_spec >structure to the flow_rule representation. > >This allows us to reuse code from the driver side given that both flower >and ethtool_rx_flow interfaces use the same representation. > >Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> >--- >v2: no changes. > > include/net/flow_dissector.h | 5 ++ > net/core/flow_dissector.c | 190 +++++++++++++++++++++++++++++++++++++++++++ > 2 files changed, 195 insertions(+) > >diff --git a/include/net/flow_dissector.h b/include/net/flow_dissector.h >index 7a4683646d5a..ec9036232538 100644 >--- a/include/net/flow_dissector.h >+++ b/include/net/flow_dissector.h >@@ -485,4 +485,9 @@ static inline bool flow_rule_match_key(const struct flow_rule *rule, > return dissector_uses_key(rule->match.dissector, key); > } > >+struct ethtool_rx_flow_spec; >+ >+struct flow_rule *ethtool_rx_flow_rule(const struct ethtool_rx_flow_spec *fs); >+void ethtool_rx_flow_rule_free(struct flow_rule *rule); >+ > #endif >diff --git a/net/core/flow_dissector.c b/net/core/flow_dissector.c >index b9368349f0f7..ef5bdb62620c 100644 >--- a/net/core/flow_dissector.c >+++ b/net/core/flow_dissector.c >@@ -17,6 +17,7 @@ > #include <linux/dccp.h> > #include <linux/if_tunnel.h> > #include <linux/if_pppox.h> >+#include <uapi/linux/ethtool.h> > #include <linux/ppp_defs.h> > #include <linux/stddef.h> > #include <linux/if_ether.h> >@@ -276,6 +277,195 @@ void flow_action_free(struct flow_action *flow_action) > } > EXPORT_SYMBOL(flow_action_free); > >+struct ethtool_rx_flow_key { >+ struct flow_dissector_key_basic basic; >+ union { >+ struct flow_dissector_key_ipv4_addrs ipv4; >+ struct flow_dissector_key_ipv6_addrs ipv6; >+ }; >+ struct flow_dissector_key_ports tp; >+ struct flow_dissector_key_ip ip; >+} __aligned(BITS_PER_LONG / 8); /* Ensure that we can do comparisons as longs. */ >+ >+struct ethtool_rx_flow_match { >+ struct flow_dissector dissector; >+ struct ethtool_rx_flow_key key; >+ struct ethtool_rx_flow_key mask; >+}; >+ >+struct flow_rule *ethtool_rx_flow_rule(const struct ethtool_rx_flow_spec *fs) >+{ >+ static struct in6_addr zero_addr = {}; >+ struct ethtool_rx_flow_match *match; >+ struct flow_action_key *act; >+ struct flow_rule *rule; >+ >+ rule = kmalloc(sizeof(struct flow_rule), GFP_KERNEL); Allocating struct flow_rule manually here seems wrong. There should be some helpers. Please see below.*** >+ if (!rule) >+ return NULL; >+ >+ match = kzalloc(sizeof(struct ethtool_rx_flow_match), GFP_KERNEL); >+ if (!match) >+ goto err_match; >+ >+ rule->match.dissector = &match->dissector; >+ rule->match.mask = &match->mask; >+ rule->match.key = &match->key; >+ >+ match->mask.basic.n_proto = 0xffff; >+ >+ switch (fs->flow_type & ~FLOW_EXT) { >+ case TCP_V4_FLOW: >+ case UDP_V4_FLOW: { >+ const struct ethtool_tcpip4_spec *v4_spec, *v4_m_spec; >+ >+ match->key.basic.n_proto = htons(ETH_P_IP); >+ >+ v4_spec = &fs->h_u.tcp_ip4_spec; >+ v4_m_spec = &fs->m_u.tcp_ip4_spec; >+ >+ if (v4_m_spec->ip4src) { >+ match->key.ipv4.src = v4_spec->ip4src; >+ match->mask.ipv4.src = v4_m_spec->ip4src; >+ } >+ if (v4_m_spec->ip4dst) { >+ match->key.ipv4.dst = v4_spec->ip4dst; >+ match->mask.ipv4.dst = v4_m_spec->ip4dst; >+ } >+ if (v4_m_spec->ip4src || >+ v4_m_spec->ip4dst) { >+ match->dissector.used_keys |= >+ FLOW_DISSECTOR_KEY_IPV4_ADDRS; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IPV4_ADDRS] = >+ offsetof(struct ethtool_rx_flow_key, ipv4); >+ } >+ if (v4_m_spec->psrc) { >+ match->key.tp.src = v4_spec->psrc; >+ match->mask.tp.src = v4_m_spec->psrc; >+ } >+ if (v4_m_spec->pdst) { >+ match->key.tp.dst = v4_spec->pdst; >+ match->mask.tp.dst = v4_m_spec->pdst; >+ } >+ if (v4_m_spec->psrc || >+ v4_m_spec->pdst) { >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_PORTS; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_PORTS] = >+ offsetof(struct ethtool_rx_flow_key, tp); >+ } >+ if (v4_m_spec->tos) { >+ match->key.ip.tos = v4_spec->pdst; >+ match->mask.ip.tos = v4_m_spec->pdst; >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_IP; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IP] = >+ offsetof(struct ethtool_rx_flow_key, ip); >+ } >+ } >+ break; >+ case TCP_V6_FLOW: >+ case UDP_V6_FLOW: { >+ const struct ethtool_tcpip6_spec *v6_spec, *v6_m_spec; >+ >+ match->key.basic.n_proto = htons(ETH_P_IPV6); >+ >+ v6_spec = &fs->h_u.tcp_ip6_spec; >+ v6_m_spec = &fs->m_u.tcp_ip6_spec; >+ if (memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr))) { >+ memcpy(&match->key.ipv6.src, v6_spec->ip6src, >+ sizeof(match->key.ipv6.src)); >+ memcpy(&match->mask.ipv6.src, v6_m_spec->ip6src, >+ sizeof(match->mask.ipv6.src)); >+ } >+ if (memcmp(v6_m_spec->ip6dst, &zero_addr, sizeof(zero_addr))) { >+ memcpy(&match->key.ipv6.dst, v6_spec->ip6dst, >+ sizeof(match->key.ipv6.dst)); >+ memcpy(&match->mask.ipv6.dst, v6_m_spec->ip6dst, >+ sizeof(match->mask.ipv6.dst)); >+ } >+ if (memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr)) || >+ memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr))) { >+ match->dissector.used_keys |= >+ FLOW_DISSECTOR_KEY_IPV6_ADDRS; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IPV6_ADDRS] = >+ offsetof(struct ethtool_rx_flow_key, ipv6); >+ } >+ if (v6_m_spec->psrc) { >+ match->key.tp.src = v6_spec->psrc; >+ match->mask.tp.src = v6_m_spec->psrc; >+ } >+ if (v6_m_spec->pdst) { >+ match->key.tp.dst = v6_spec->pdst; >+ match->mask.tp.dst = v6_m_spec->pdst; >+ } >+ if (v6_m_spec->psrc || >+ v6_m_spec->pdst) { >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_PORTS; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_PORTS] = >+ offsetof(struct ethtool_rx_flow_key, tp); >+ } >+ if (v6_m_spec->tclass) { >+ match->key.ip.tos = v6_spec->tclass; >+ match->mask.ip.tos = v6_m_spec->tclass; >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_IP; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IP] = >+ offsetof(struct ethtool_rx_flow_key, ip); >+ } >+ } >+ break; >+ } >+ >+ switch (fs->flow_type & ~FLOW_EXT) { >+ case TCP_V4_FLOW: >+ case TCP_V6_FLOW: >+ match->key.basic.ip_proto = IPPROTO_TCP; >+ break; >+ case UDP_V4_FLOW: >+ case UDP_V6_FLOW: >+ match->key.basic.ip_proto = IPPROTO_UDP; >+ break; >+ } >+ match->mask.basic.ip_proto = 0xff; >+ >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_BASIC; >+ match->dissector.offset[FLOW_DISSECTOR_KEY_BASIC] = >+ offsetof(struct ethtool_rx_flow_key, basic); >+ >+ /* ethtool_rx supports only one single action per rule. */ >+ if (flow_action_init(&rule->action, 1) < 0) >+ goto err_action; >+ >+ act = &rule->action.keys[0]; >+ switch (fs->ring_cookie) { >+ case RX_CLS_FLOW_DISC: >+ act->id = FLOW_ACTION_KEY_DROP; >+ break; >+ case RX_CLS_FLOW_WAKE: >+ act->id = FLOW_ACTION_KEY_WAKE; >+ break; >+ default: >+ act->id = FLOW_ACTION_KEY_QUEUE; >+ act->queue_index = fs->ring_cookie; >+ break; >+ } >+ >+ return rule; >+ >+err_action: >+ kfree(match); >+err_match: >+ kfree(rule); >+ return NULL; >+} >+EXPORT_SYMBOL(ethtool_rx_flow_rule); >+ >+void ethtool_rx_flow_rule_free(struct flow_rule *rule) >+{ >+ kfree((struct flow_match *)rule->match.dissector); Ouch. I wonder if it cannot be stored rather in some rule->priv or something. On alloc, you can have a helper to allocate both: *** struct flow_rule { ... unsigned long priv[0]; }; struct flow_rule *flow_rule_alloc(size_t priv_size) { return kzalloc(sizeof(struct flow_rule) + priv_size, ...); } >+ flow_action_free(&rule->action); >+ kfree(rule); >+} >+EXPORT_SYMBOL(ethtool_rx_flow_rule_free); >+ > /** > * __skb_flow_get_ports - extract the upper layer ports and return them > * @skb: sk_buff to extract the ports from >-- >2.11.0 >
On Mon, Nov 19, 2018 at 03:49:01PM +0100, Jiri Pirko wrote: > Mon, Nov 19, 2018 at 01:15:16AM CET, pablo@netfilter.org wrote: > >This patch adds a function to translate the ethtool_rx_flow_spec > >structure to the flow_rule representation. > > > >This allows us to reuse code from the driver side given that both flower > >and ethtool_rx_flow interfaces use the same representation. > > > >Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> > >--- > >v2: no changes. > > > > include/net/flow_dissector.h | 5 ++ > > net/core/flow_dissector.c | 190 +++++++++++++++++++++++++++++++++++++++++++ > > 2 files changed, 195 insertions(+) > > > >diff --git a/include/net/flow_dissector.h b/include/net/flow_dissector.h > >index 7a4683646d5a..ec9036232538 100644 > >--- a/include/net/flow_dissector.h > >+++ b/include/net/flow_dissector.h > >@@ -485,4 +485,9 @@ static inline bool flow_rule_match_key(const struct flow_rule *rule, > > return dissector_uses_key(rule->match.dissector, key); > > } > > > >+struct ethtool_rx_flow_spec; > >+ > >+struct flow_rule *ethtool_rx_flow_rule(const struct ethtool_rx_flow_spec *fs); > >+void ethtool_rx_flow_rule_free(struct flow_rule *rule); > >+ > > #endif > >diff --git a/net/core/flow_dissector.c b/net/core/flow_dissector.c > >index b9368349f0f7..ef5bdb62620c 100644 > >--- a/net/core/flow_dissector.c > >+++ b/net/core/flow_dissector.c > >@@ -17,6 +17,7 @@ > > #include <linux/dccp.h> > > #include <linux/if_tunnel.h> > > #include <linux/if_pppox.h> > >+#include <uapi/linux/ethtool.h> > > #include <linux/ppp_defs.h> > > #include <linux/stddef.h> > > #include <linux/if_ether.h> > >@@ -276,6 +277,195 @@ void flow_action_free(struct flow_action *flow_action) > > } > > EXPORT_SYMBOL(flow_action_free); > > > >+struct ethtool_rx_flow_key { > >+ struct flow_dissector_key_basic basic; > >+ union { > >+ struct flow_dissector_key_ipv4_addrs ipv4; > >+ struct flow_dissector_key_ipv6_addrs ipv6; > >+ }; > >+ struct flow_dissector_key_ports tp; > >+ struct flow_dissector_key_ip ip; > >+} __aligned(BITS_PER_LONG / 8); /* Ensure that we can do comparisons as longs. */ > >+ > >+struct ethtool_rx_flow_match { > >+ struct flow_dissector dissector; > >+ struct ethtool_rx_flow_key key; > >+ struct ethtool_rx_flow_key mask; > >+}; > >+ > >+struct flow_rule *ethtool_rx_flow_rule(const struct ethtool_rx_flow_spec *fs) > >+{ > >+ static struct in6_addr zero_addr = {}; > >+ struct ethtool_rx_flow_match *match; > >+ struct flow_action_key *act; > >+ struct flow_rule *rule; > >+ > >+ rule = kmalloc(sizeof(struct flow_rule), GFP_KERNEL); > > Allocating struct flow_rule manually here seems wrong. There should > be some helpers. Please see below.*** Will add them. > >+ if (!rule) > >+ return NULL; > >+ > >+ match = kzalloc(sizeof(struct ethtool_rx_flow_match), GFP_KERNEL); > >+ if (!match) > >+ goto err_match; > >+ > >+ rule->match.dissector = &match->dissector; > >+ rule->match.mask = &match->mask; > >+ rule->match.key = &match->key; > >+ > >+ match->mask.basic.n_proto = 0xffff; > >+ > >+ switch (fs->flow_type & ~FLOW_EXT) { > >+ case TCP_V4_FLOW: > >+ case UDP_V4_FLOW: { > >+ const struct ethtool_tcpip4_spec *v4_spec, *v4_m_spec; > >+ > >+ match->key.basic.n_proto = htons(ETH_P_IP); > >+ > >+ v4_spec = &fs->h_u.tcp_ip4_spec; > >+ v4_m_spec = &fs->m_u.tcp_ip4_spec; > >+ > >+ if (v4_m_spec->ip4src) { > >+ match->key.ipv4.src = v4_spec->ip4src; > >+ match->mask.ipv4.src = v4_m_spec->ip4src; > >+ } > >+ if (v4_m_spec->ip4dst) { > >+ match->key.ipv4.dst = v4_spec->ip4dst; > >+ match->mask.ipv4.dst = v4_m_spec->ip4dst; > >+ } > >+ if (v4_m_spec->ip4src || > >+ v4_m_spec->ip4dst) { > >+ match->dissector.used_keys |= > >+ FLOW_DISSECTOR_KEY_IPV4_ADDRS; > >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IPV4_ADDRS] = > >+ offsetof(struct ethtool_rx_flow_key, ipv4); > >+ } > >+ if (v4_m_spec->psrc) { > >+ match->key.tp.src = v4_spec->psrc; > >+ match->mask.tp.src = v4_m_spec->psrc; > >+ } > >+ if (v4_m_spec->pdst) { > >+ match->key.tp.dst = v4_spec->pdst; > >+ match->mask.tp.dst = v4_m_spec->pdst; > >+ } > >+ if (v4_m_spec->psrc || > >+ v4_m_spec->pdst) { > >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_PORTS; > >+ match->dissector.offset[FLOW_DISSECTOR_KEY_PORTS] = > >+ offsetof(struct ethtool_rx_flow_key, tp); > >+ } > >+ if (v4_m_spec->tos) { > >+ match->key.ip.tos = v4_spec->pdst; > >+ match->mask.ip.tos = v4_m_spec->pdst; > >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_IP; > >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IP] = > >+ offsetof(struct ethtool_rx_flow_key, ip); > >+ } > >+ } > >+ break; > >+ case TCP_V6_FLOW: > >+ case UDP_V6_FLOW: { > >+ const struct ethtool_tcpip6_spec *v6_spec, *v6_m_spec; > >+ > >+ match->key.basic.n_proto = htons(ETH_P_IPV6); > >+ > >+ v6_spec = &fs->h_u.tcp_ip6_spec; > >+ v6_m_spec = &fs->m_u.tcp_ip6_spec; > >+ if (memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr))) { > >+ memcpy(&match->key.ipv6.src, v6_spec->ip6src, > >+ sizeof(match->key.ipv6.src)); > >+ memcpy(&match->mask.ipv6.src, v6_m_spec->ip6src, > >+ sizeof(match->mask.ipv6.src)); > >+ } > >+ if (memcmp(v6_m_spec->ip6dst, &zero_addr, sizeof(zero_addr))) { > >+ memcpy(&match->key.ipv6.dst, v6_spec->ip6dst, > >+ sizeof(match->key.ipv6.dst)); > >+ memcpy(&match->mask.ipv6.dst, v6_m_spec->ip6dst, > >+ sizeof(match->mask.ipv6.dst)); > >+ } > >+ if (memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr)) || > >+ memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr))) { > >+ match->dissector.used_keys |= > >+ FLOW_DISSECTOR_KEY_IPV6_ADDRS; > >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IPV6_ADDRS] = > >+ offsetof(struct ethtool_rx_flow_key, ipv6); > >+ } > >+ if (v6_m_spec->psrc) { > >+ match->key.tp.src = v6_spec->psrc; > >+ match->mask.tp.src = v6_m_spec->psrc; > >+ } > >+ if (v6_m_spec->pdst) { > >+ match->key.tp.dst = v6_spec->pdst; > >+ match->mask.tp.dst = v6_m_spec->pdst; > >+ } > >+ if (v6_m_spec->psrc || > >+ v6_m_spec->pdst) { > >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_PORTS; > >+ match->dissector.offset[FLOW_DISSECTOR_KEY_PORTS] = > >+ offsetof(struct ethtool_rx_flow_key, tp); > >+ } > >+ if (v6_m_spec->tclass) { > >+ match->key.ip.tos = v6_spec->tclass; > >+ match->mask.ip.tos = v6_m_spec->tclass; > >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_IP; > >+ match->dissector.offset[FLOW_DISSECTOR_KEY_IP] = > >+ offsetof(struct ethtool_rx_flow_key, ip); > >+ } > >+ } > >+ break; > >+ } > >+ > >+ switch (fs->flow_type & ~FLOW_EXT) { > >+ case TCP_V4_FLOW: > >+ case TCP_V6_FLOW: > >+ match->key.basic.ip_proto = IPPROTO_TCP; > >+ break; > >+ case UDP_V4_FLOW: > >+ case UDP_V6_FLOW: > >+ match->key.basic.ip_proto = IPPROTO_UDP; > >+ break; > >+ } > >+ match->mask.basic.ip_proto = 0xff; > >+ > >+ match->dissector.used_keys |= FLOW_DISSECTOR_KEY_BASIC; > >+ match->dissector.offset[FLOW_DISSECTOR_KEY_BASIC] = > >+ offsetof(struct ethtool_rx_flow_key, basic); > >+ > >+ /* ethtool_rx supports only one single action per rule. */ > >+ if (flow_action_init(&rule->action, 1) < 0) > >+ goto err_action; > >+ > >+ act = &rule->action.keys[0]; > >+ switch (fs->ring_cookie) { > >+ case RX_CLS_FLOW_DISC: > >+ act->id = FLOW_ACTION_KEY_DROP; > >+ break; > >+ case RX_CLS_FLOW_WAKE: > >+ act->id = FLOW_ACTION_KEY_WAKE; > >+ break; > >+ default: > >+ act->id = FLOW_ACTION_KEY_QUEUE; > >+ act->queue_index = fs->ring_cookie; > >+ break; > >+ } > >+ > >+ return rule; > >+ > >+err_action: > >+ kfree(match); > >+err_match: > >+ kfree(rule); > >+ return NULL; > >+} > >+EXPORT_SYMBOL(ethtool_rx_flow_rule); > >+ > >+void ethtool_rx_flow_rule_free(struct flow_rule *rule) > >+{ > >+ kfree((struct flow_match *)rule->match.dissector); > > Ouch. I wonder if it cannot be stored rather in some rule->priv or > something. I can use container_of instead, which is what I should be using here. This works because rule->match.dissector is at the top of struct flow_match at this moment. > On alloc, you can have a helper to allocate both: > > *** > struct flow_rule { > ... > unsigned long priv[0]; > }; > > struct flow_rule *flow_rule_alloc(size_t priv_size) > { > return kzalloc(sizeof(struct flow_rule) + priv_size, ...); > } Yes, will do that. Thanks.
diff --git a/include/net/flow_dissector.h b/include/net/flow_dissector.h index 7a4683646d5a..ec9036232538 100644 --- a/include/net/flow_dissector.h +++ b/include/net/flow_dissector.h @@ -485,4 +485,9 @@ static inline bool flow_rule_match_key(const struct flow_rule *rule, return dissector_uses_key(rule->match.dissector, key); } +struct ethtool_rx_flow_spec; + +struct flow_rule *ethtool_rx_flow_rule(const struct ethtool_rx_flow_spec *fs); +void ethtool_rx_flow_rule_free(struct flow_rule *rule); + #endif diff --git a/net/core/flow_dissector.c b/net/core/flow_dissector.c index b9368349f0f7..ef5bdb62620c 100644 --- a/net/core/flow_dissector.c +++ b/net/core/flow_dissector.c @@ -17,6 +17,7 @@ #include <linux/dccp.h> #include <linux/if_tunnel.h> #include <linux/if_pppox.h> +#include <uapi/linux/ethtool.h> #include <linux/ppp_defs.h> #include <linux/stddef.h> #include <linux/if_ether.h> @@ -276,6 +277,195 @@ void flow_action_free(struct flow_action *flow_action) } EXPORT_SYMBOL(flow_action_free); +struct ethtool_rx_flow_key { + struct flow_dissector_key_basic basic; + union { + struct flow_dissector_key_ipv4_addrs ipv4; + struct flow_dissector_key_ipv6_addrs ipv6; + }; + struct flow_dissector_key_ports tp; + struct flow_dissector_key_ip ip; +} __aligned(BITS_PER_LONG / 8); /* Ensure that we can do comparisons as longs. */ + +struct ethtool_rx_flow_match { + struct flow_dissector dissector; + struct ethtool_rx_flow_key key; + struct ethtool_rx_flow_key mask; +}; + +struct flow_rule *ethtool_rx_flow_rule(const struct ethtool_rx_flow_spec *fs) +{ + static struct in6_addr zero_addr = {}; + struct ethtool_rx_flow_match *match; + struct flow_action_key *act; + struct flow_rule *rule; + + rule = kmalloc(sizeof(struct flow_rule), GFP_KERNEL); + if (!rule) + return NULL; + + match = kzalloc(sizeof(struct ethtool_rx_flow_match), GFP_KERNEL); + if (!match) + goto err_match; + + rule->match.dissector = &match->dissector; + rule->match.mask = &match->mask; + rule->match.key = &match->key; + + match->mask.basic.n_proto = 0xffff; + + switch (fs->flow_type & ~FLOW_EXT) { + case TCP_V4_FLOW: + case UDP_V4_FLOW: { + const struct ethtool_tcpip4_spec *v4_spec, *v4_m_spec; + + match->key.basic.n_proto = htons(ETH_P_IP); + + v4_spec = &fs->h_u.tcp_ip4_spec; + v4_m_spec = &fs->m_u.tcp_ip4_spec; + + if (v4_m_spec->ip4src) { + match->key.ipv4.src = v4_spec->ip4src; + match->mask.ipv4.src = v4_m_spec->ip4src; + } + if (v4_m_spec->ip4dst) { + match->key.ipv4.dst = v4_spec->ip4dst; + match->mask.ipv4.dst = v4_m_spec->ip4dst; + } + if (v4_m_spec->ip4src || + v4_m_spec->ip4dst) { + match->dissector.used_keys |= + FLOW_DISSECTOR_KEY_IPV4_ADDRS; + match->dissector.offset[FLOW_DISSECTOR_KEY_IPV4_ADDRS] = + offsetof(struct ethtool_rx_flow_key, ipv4); + } + if (v4_m_spec->psrc) { + match->key.tp.src = v4_spec->psrc; + match->mask.tp.src = v4_m_spec->psrc; + } + if (v4_m_spec->pdst) { + match->key.tp.dst = v4_spec->pdst; + match->mask.tp.dst = v4_m_spec->pdst; + } + if (v4_m_spec->psrc || + v4_m_spec->pdst) { + match->dissector.used_keys |= FLOW_DISSECTOR_KEY_PORTS; + match->dissector.offset[FLOW_DISSECTOR_KEY_PORTS] = + offsetof(struct ethtool_rx_flow_key, tp); + } + if (v4_m_spec->tos) { + match->key.ip.tos = v4_spec->pdst; + match->mask.ip.tos = v4_m_spec->pdst; + match->dissector.used_keys |= FLOW_DISSECTOR_KEY_IP; + match->dissector.offset[FLOW_DISSECTOR_KEY_IP] = + offsetof(struct ethtool_rx_flow_key, ip); + } + } + break; + case TCP_V6_FLOW: + case UDP_V6_FLOW: { + const struct ethtool_tcpip6_spec *v6_spec, *v6_m_spec; + + match->key.basic.n_proto = htons(ETH_P_IPV6); + + v6_spec = &fs->h_u.tcp_ip6_spec; + v6_m_spec = &fs->m_u.tcp_ip6_spec; + if (memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr))) { + memcpy(&match->key.ipv6.src, v6_spec->ip6src, + sizeof(match->key.ipv6.src)); + memcpy(&match->mask.ipv6.src, v6_m_spec->ip6src, + sizeof(match->mask.ipv6.src)); + } + if (memcmp(v6_m_spec->ip6dst, &zero_addr, sizeof(zero_addr))) { + memcpy(&match->key.ipv6.dst, v6_spec->ip6dst, + sizeof(match->key.ipv6.dst)); + memcpy(&match->mask.ipv6.dst, v6_m_spec->ip6dst, + sizeof(match->mask.ipv6.dst)); + } + if (memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr)) || + memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr))) { + match->dissector.used_keys |= + FLOW_DISSECTOR_KEY_IPV6_ADDRS; + match->dissector.offset[FLOW_DISSECTOR_KEY_IPV6_ADDRS] = + offsetof(struct ethtool_rx_flow_key, ipv6); + } + if (v6_m_spec->psrc) { + match->key.tp.src = v6_spec->psrc; + match->mask.tp.src = v6_m_spec->psrc; + } + if (v6_m_spec->pdst) { + match->key.tp.dst = v6_spec->pdst; + match->mask.tp.dst = v6_m_spec->pdst; + } + if (v6_m_spec->psrc || + v6_m_spec->pdst) { + match->dissector.used_keys |= FLOW_DISSECTOR_KEY_PORTS; + match->dissector.offset[FLOW_DISSECTOR_KEY_PORTS] = + offsetof(struct ethtool_rx_flow_key, tp); + } + if (v6_m_spec->tclass) { + match->key.ip.tos = v6_spec->tclass; + match->mask.ip.tos = v6_m_spec->tclass; + match->dissector.used_keys |= FLOW_DISSECTOR_KEY_IP; + match->dissector.offset[FLOW_DISSECTOR_KEY_IP] = + offsetof(struct ethtool_rx_flow_key, ip); + } + } + break; + } + + switch (fs->flow_type & ~FLOW_EXT) { + case TCP_V4_FLOW: + case TCP_V6_FLOW: + match->key.basic.ip_proto = IPPROTO_TCP; + break; + case UDP_V4_FLOW: + case UDP_V6_FLOW: + match->key.basic.ip_proto = IPPROTO_UDP; + break; + } + match->mask.basic.ip_proto = 0xff; + + match->dissector.used_keys |= FLOW_DISSECTOR_KEY_BASIC; + match->dissector.offset[FLOW_DISSECTOR_KEY_BASIC] = + offsetof(struct ethtool_rx_flow_key, basic); + + /* ethtool_rx supports only one single action per rule. */ + if (flow_action_init(&rule->action, 1) < 0) + goto err_action; + + act = &rule->action.keys[0]; + switch (fs->ring_cookie) { + case RX_CLS_FLOW_DISC: + act->id = FLOW_ACTION_KEY_DROP; + break; + case RX_CLS_FLOW_WAKE: + act->id = FLOW_ACTION_KEY_WAKE; + break; + default: + act->id = FLOW_ACTION_KEY_QUEUE; + act->queue_index = fs->ring_cookie; + break; + } + + return rule; + +err_action: + kfree(match); +err_match: + kfree(rule); + return NULL; +} +EXPORT_SYMBOL(ethtool_rx_flow_rule); + +void ethtool_rx_flow_rule_free(struct flow_rule *rule) +{ + kfree((struct flow_match *)rule->match.dissector); + flow_action_free(&rule->action); + kfree(rule); +} +EXPORT_SYMBOL(ethtool_rx_flow_rule_free); + /** * __skb_flow_get_ports - extract the upper layer ports and return them * @skb: sk_buff to extract the ports from
This patch adds a function to translate the ethtool_rx_flow_spec structure to the flow_rule representation. This allows us to reuse code from the driver side given that both flower and ethtool_rx_flow interfaces use the same representation. Signed-off-by: Pablo Neira Ayuso <pablo@netfilter.org> --- v2: no changes. include/net/flow_dissector.h | 5 ++ net/core/flow_dissector.c | 190 +++++++++++++++++++++++++++++++++++++++++++ 2 files changed, 195 insertions(+)