| /* |
| * sfe_ipv6.c |
| * Shortcut forwarding engine - IPv6 support. |
| * |
| * Copyright (c) 2015-2016, 2019-2020, The Linux Foundation. All rights reserved. |
| * Copyright (c) 2021 Qualcomm Innovation Center, Inc. All rights reserved. |
| * |
| * Permission to use, copy, modify, and/or distribute this software for any |
| * purpose with or without fee is hereby granted, provided that the above |
| * copyright notice and this permission notice appear in all copies. |
| * |
| * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES |
| * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF |
| * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR |
| * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES |
| * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN |
| * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF |
| * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE. |
| */ |
| |
| #include <linux/module.h> |
| #include <linux/sysfs.h> |
| #include <linux/skbuff.h> |
| #include <linux/icmp.h> |
| #include <net/tcp.h> |
| #include <linux/etherdevice.h> |
| #include <linux/version.h> |
| |
| #include "sfe_debug.h" |
| #include "sfe_api.h" |
| #include "sfe.h" |
| #include "sfe_flow_cookie.h" |
| #include "sfe_ipv6.h" |
| |
| #define sfe_ipv6_addr_copy(src, dest) memcpy((void *)(dest), (void *)(src), 16) |
| |
| static char *sfe_ipv6_exception_events_string[SFE_IPV6_EXCEPTION_EVENT_LAST] = { |
| "UDP_HEADER_INCOMPLETE", |
| "UDP_NO_CONNECTION", |
| "UDP_IP_OPTIONS_OR_INITIAL_FRAGMENT", |
| "UDP_SMALL_TTL", |
| "UDP_NEEDS_FRAGMENTATION", |
| "TCP_HEADER_INCOMPLETE", |
| "TCP_NO_CONNECTION_SLOW_FLAGS", |
| "TCP_NO_CONNECTION_FAST_FLAGS", |
| "TCP_IP_OPTIONS_OR_INITIAL_FRAGMENT", |
| "TCP_SMALL_TTL", |
| "TCP_NEEDS_FRAGMENTATION", |
| "TCP_FLAGS", |
| "TCP_SEQ_EXCEEDS_RIGHT_EDGE", |
| "TCP_SMALL_DATA_OFFS", |
| "TCP_BAD_SACK", |
| "TCP_BIG_DATA_OFFS", |
| "TCP_SEQ_BEFORE_LEFT_EDGE", |
| "TCP_ACK_EXCEEDS_RIGHT_EDGE", |
| "TCP_ACK_BEFORE_LEFT_EDGE", |
| "ICMP_HEADER_INCOMPLETE", |
| "ICMP_UNHANDLED_TYPE", |
| "ICMP_IPV6_HEADER_INCOMPLETE", |
| "ICMP_IPV6_NON_V6", |
| "ICMP_IPV6_IP_OPTIONS_INCOMPLETE", |
| "ICMP_IPV6_UDP_HEADER_INCOMPLETE", |
| "ICMP_IPV6_TCP_HEADER_INCOMPLETE", |
| "ICMP_IPV6_UNHANDLED_PROTOCOL", |
| "ICMP_NO_CONNECTION", |
| "ICMP_FLUSHED_CONNECTION", |
| "HEADER_INCOMPLETE", |
| "BAD_TOTAL_LENGTH", |
| "NON_V6", |
| "NON_INITIAL_FRAGMENT", |
| "DATAGRAM_INCOMPLETE", |
| "IP_OPTIONS_INCOMPLETE", |
| "UNHANDLED_PROTOCOL", |
| "FLOW_COOKIE_ADD_FAIL" |
| }; |
| |
| static struct sfe_ipv6 __si6; |
| |
| /* |
| * sfe_ipv6_get_debug_dev() |
| */ |
| static ssize_t sfe_ipv6_get_debug_dev(struct device *dev, struct device_attribute *attr, char *buf); |
| |
| /* |
| * sysfs attributes. |
| */ |
| static const struct device_attribute sfe_ipv6_debug_dev_attr = |
| __ATTR(debug_dev, S_IWUSR | S_IRUGO, sfe_ipv6_get_debug_dev, NULL); |
| |
| /* |
| * sfe_ipv6_is_ext_hdr() |
| * check if we recognize ipv6 extension header |
| */ |
| static inline bool sfe_ipv6_is_ext_hdr(u8 hdr) |
| { |
| return (hdr == NEXTHDR_HOP) || |
| (hdr == NEXTHDR_ROUTING) || |
| (hdr == NEXTHDR_FRAGMENT) || |
| (hdr == NEXTHDR_AUTH) || |
| (hdr == NEXTHDR_DEST) || |
| (hdr == NEXTHDR_MOBILITY); |
| } |
| |
| /* |
| * sfe_ipv6_change_dsfield() |
| * change dscp field in IPv6 packet |
| */ |
| static inline void sfe_ipv6_change_dsfield(struct ipv6hdr *iph, u8 dscp) |
| { |
| __be16 *p = (__be16 *)iph; |
| |
| *p = ((*p & htons(SFE_IPV6_DSCP_MASK)) | htons((u16)dscp << 4)); |
| } |
| |
| /* |
| * sfe_ipv6_get_connection_match_hash() |
| * Generate the hash used in connection match lookups. |
| */ |
| static inline unsigned int sfe_ipv6_get_connection_match_hash(struct net_device *dev, u8 protocol, |
| struct sfe_ipv6_addr *src_ip, __be16 src_port, |
| struct sfe_ipv6_addr *dest_ip, __be16 dest_port) |
| { |
| u32 idx, hash = 0; |
| size_t dev_addr = (size_t)dev; |
| |
| for (idx = 0; idx < 4; idx++) { |
| hash ^= src_ip->addr[idx] ^ dest_ip->addr[idx]; |
| } |
| hash = ((u32)dev_addr) ^ hash ^ protocol ^ ntohs(src_port ^ dest_port); |
| return ((hash >> SFE_IPV6_CONNECTION_HASH_SHIFT) ^ hash) & SFE_IPV6_CONNECTION_HASH_MASK; |
| } |
| |
| /* |
| * sfe_ipv6_find_connection_match_rcu() |
| * Get the IPv6 flow match info that corresponds to a particular 5-tuple. |
| */ |
| static struct sfe_ipv6_connection_match * |
| sfe_ipv6_find_connection_match_rcu(struct sfe_ipv6 *si, struct net_device *dev, u8 protocol, |
| struct sfe_ipv6_addr *src_ip, __be16 src_port, |
| struct sfe_ipv6_addr *dest_ip, __be16 dest_port) |
| { |
| struct sfe_ipv6_connection_match *cm = NULL; |
| unsigned int conn_match_idx; |
| struct hlist_head *lhead; |
| WARN_ON_ONCE(!rcu_read_lock_held()); |
| |
| conn_match_idx = sfe_ipv6_get_connection_match_hash(dev, protocol, src_ip, src_port, dest_ip, dest_port); |
| |
| lhead = &si->hlist_conn_match_hash_head[conn_match_idx]; |
| |
| /* |
| * Hopefully the first entry is the one we want. |
| */ |
| hlist_for_each_entry_rcu(cm, lhead, hnode) { |
| if ((cm->match_dest_port != dest_port) || |
| (!sfe_ipv6_addr_equal(cm->match_src_ip, src_ip)) || |
| (!sfe_ipv6_addr_equal(cm->match_dest_ip, dest_ip)) || |
| (cm->match_protocol != protocol) || |
| (cm->match_dev != dev)) { |
| continue; |
| } |
| |
| this_cpu_inc(si->stats_pcpu->connection_match_hash_hits64); |
| |
| break; |
| |
| } |
| |
| return cm; |
| } |
| |
| /* |
| * sfe_ipv6_connection_match_update_summary_stats() |
| * Update the summary stats for a connection match entry. |
| */ |
| static inline void sfe_ipv6_connection_match_update_summary_stats(struct sfe_ipv6_connection_match *cm, |
| u32 *packets, u32 *bytes) |
| |
| { |
| u32 packet_count, byte_count; |
| |
| packet_count = atomic_read(&cm->rx_packet_count); |
| cm->rx_packet_count64 += packet_count; |
| atomic_sub(packet_count, &cm->rx_packet_count); |
| |
| byte_count = atomic_read(&cm->rx_byte_count); |
| cm->rx_byte_count64 += byte_count; |
| atomic_sub(byte_count, &cm->rx_byte_count); |
| |
| *packets = packet_count; |
| *bytes = byte_count; |
| } |
| |
| /* |
| * sfe_ipv6_connection_match_compute_translations() |
| * Compute port and address translations for a connection match entry. |
| */ |
| static void sfe_ipv6_connection_match_compute_translations(struct sfe_ipv6_connection_match *cm) |
| { |
| u32 diff[9]; |
| u32 *idx_32; |
| u16 *idx_16; |
| |
| /* |
| * Before we insert the entry look to see if this is tagged as doing address |
| * translations. If it is then work out the adjustment that we need to apply |
| * to the transport checksum. |
| */ |
| if (cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_XLATE_SRC) { |
| u32 adj = 0; |
| u32 carry = 0; |
| |
| /* |
| * Precompute an incremental checksum adjustment so we can |
| * edit packets in this stream very quickly. The algorithm is from RFC1624. |
| */ |
| idx_32 = diff; |
| *(idx_32++) = cm->match_src_ip[0].addr[0]; |
| *(idx_32++) = cm->match_src_ip[0].addr[1]; |
| *(idx_32++) = cm->match_src_ip[0].addr[2]; |
| *(idx_32++) = cm->match_src_ip[0].addr[3]; |
| |
| idx_16 = (u16 *)idx_32; |
| *(idx_16++) = cm->match_src_port; |
| *(idx_16++) = ~cm->xlate_src_port; |
| idx_32 = (u32 *)idx_16; |
| |
| *(idx_32++) = ~cm->xlate_src_ip[0].addr[0]; |
| *(idx_32++) = ~cm->xlate_src_ip[0].addr[1]; |
| *(idx_32++) = ~cm->xlate_src_ip[0].addr[2]; |
| *(idx_32++) = ~cm->xlate_src_ip[0].addr[3]; |
| |
| /* |
| * When we compute this fold it down to a 16-bit offset |
| * as that way we can avoid having to do a double |
| * folding of the twos-complement result because the |
| * addition of 2 16-bit values cannot cause a double |
| * wrap-around! |
| */ |
| for (idx_32 = diff; idx_32 < diff + 9; idx_32++) { |
| u32 w = *idx_32; |
| adj += carry; |
| adj += w; |
| carry = (w > adj); |
| } |
| adj += carry; |
| adj = (adj & 0xffff) + (adj >> 16); |
| adj = (adj & 0xffff) + (adj >> 16); |
| cm->xlate_src_csum_adjustment = (u16)adj; |
| } |
| |
| if (cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_XLATE_DEST) { |
| u32 adj = 0; |
| u32 carry = 0; |
| |
| /* |
| * Precompute an incremental checksum adjustment so we can |
| * edit packets in this stream very quickly. The algorithm is from RFC1624. |
| */ |
| idx_32 = diff; |
| *(idx_32++) = cm->match_dest_ip[0].addr[0]; |
| *(idx_32++) = cm->match_dest_ip[0].addr[1]; |
| *(idx_32++) = cm->match_dest_ip[0].addr[2]; |
| *(idx_32++) = cm->match_dest_ip[0].addr[3]; |
| |
| idx_16 = (u16 *)idx_32; |
| *(idx_16++) = cm->match_dest_port; |
| *(idx_16++) = ~cm->xlate_dest_port; |
| idx_32 = (u32 *)idx_16; |
| |
| *(idx_32++) = ~cm->xlate_dest_ip[0].addr[0]; |
| *(idx_32++) = ~cm->xlate_dest_ip[0].addr[1]; |
| *(idx_32++) = ~cm->xlate_dest_ip[0].addr[2]; |
| *(idx_32++) = ~cm->xlate_dest_ip[0].addr[3]; |
| |
| /* |
| * When we compute this fold it down to a 16-bit offset |
| * as that way we can avoid having to do a double |
| * folding of the twos-complement result because the |
| * addition of 2 16-bit values cannot cause a double |
| * wrap-around! |
| */ |
| for (idx_32 = diff; idx_32 < diff + 9; idx_32++) { |
| u32 w = *idx_32; |
| adj += carry; |
| adj += w; |
| carry = (w > adj); |
| } |
| adj += carry; |
| adj = (adj & 0xffff) + (adj >> 16); |
| adj = (adj & 0xffff) + (adj >> 16); |
| cm->xlate_dest_csum_adjustment = (u16)adj; |
| } |
| } |
| |
| /* |
| * sfe_ipv6_update_summary_stats() |
| * Update the summary stats. |
| */ |
| static void sfe_ipv6_update_summary_stats(struct sfe_ipv6 *si, struct sfe_ipv6_stats *stats) |
| { |
| int i = 0; |
| |
| memset(stats, 0, sizeof(*stats)); |
| |
| for_each_possible_cpu(i) { |
| const struct sfe_ipv6_stats *s = per_cpu_ptr(si->stats_pcpu, i); |
| |
| stats->connection_create_requests64 += s->connection_create_requests64; |
| stats->connection_create_collisions64 += s->connection_create_collisions64; |
| stats->connection_create_failures64 += s->connection_create_failures64; |
| stats->connection_destroy_requests64 += s->connection_destroy_requests64; |
| stats->connection_destroy_misses64 += s->connection_destroy_misses64; |
| stats->connection_match_hash_hits64 += s->connection_match_hash_hits64; |
| stats->connection_match_hash_reorders64 += s->connection_match_hash_reorders64; |
| stats->connection_flushes64 += s->connection_flushes64; |
| stats->packets_forwarded64 += s->packets_forwarded64; |
| stats->packets_not_forwarded64 += s->packets_not_forwarded64; |
| } |
| } |
| |
| /* |
| * sfe_ipv6_insert_connection_match() |
| * Insert a connection match into the hash. |
| * |
| * On entry we must be holding the lock that protects the hash table. |
| */ |
| static inline void sfe_ipv6_insert_connection_match(struct sfe_ipv6 *si, |
| struct sfe_ipv6_connection_match *cm) |
| { |
| unsigned int conn_match_idx |
| = sfe_ipv6_get_connection_match_hash(cm->match_dev, cm->match_protocol, |
| cm->match_src_ip, cm->match_src_port, |
| cm->match_dest_ip, cm->match_dest_port); |
| |
| lockdep_assert_held(&si->lock); |
| |
| hlist_add_head_rcu(&cm->hnode, &si->hlist_conn_match_hash_head[conn_match_idx]); |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| if (!si->flow_cookie_enable || !(cm->flags & (SFE_IPV6_CONNECTION_MATCH_FLAG_XLATE_SRC | SFE_IPV6_CONNECTION_MATCH_FLAG_XLATE_DEST))) |
| return; |
| |
| /* |
| * Configure hardware to put a flow cookie in packet of this flow, |
| * then we can accelerate the lookup process when we received this packet. |
| */ |
| for (conn_match_idx = 1; conn_match_idx < SFE_FLOW_COOKIE_SIZE; conn_match_idx++) { |
| struct sfe_ipv6_flow_cookie_entry *entry = &si->sfe_flow_cookie_table[conn_match_idx]; |
| |
| if ((NULL == entry->match) && time_is_before_jiffies(entry->last_clean_time + HZ)) { |
| sfe_ipv6_flow_cookie_set_func_t func; |
| |
| rcu_read_lock(); |
| func = rcu_dereference(si->flow_cookie_set_func); |
| if (func) { |
| if (!func(cm->match_protocol, cm->match_src_ip->addr, cm->match_src_port, |
| cm->match_dest_ip->addr, cm->match_dest_port, conn_match_idx)) { |
| entry->match = cm; |
| cm->flow_cookie = conn_match_idx; |
| } else { |
| si->exception_events[SFE_IPV6_EXCEPTION_EVENT_FLOW_COOKIE_ADD_FAIL]++; |
| } |
| } |
| rcu_read_unlock(); |
| |
| break; |
| } |
| } |
| #endif |
| } |
| |
| /* |
| * sfe_ipv6_remove_connection_match() |
| * Remove a connection match object from the hash. |
| */ |
| static inline void sfe_ipv6_remove_connection_match(struct sfe_ipv6 *si, struct sfe_ipv6_connection_match *cm) |
| { |
| |
| lockdep_assert_held(&si->lock); |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| if (si->flow_cookie_enable) { |
| /* |
| * Tell hardware that we no longer need a flow cookie in packet of this flow |
| */ |
| unsigned int conn_match_idx; |
| |
| for (conn_match_idx = 1; conn_match_idx < SFE_FLOW_COOKIE_SIZE; conn_match_idx++) { |
| struct sfe_ipv6_flow_cookie_entry *entry = &si->sfe_flow_cookie_table[conn_match_idx]; |
| |
| if (cm == entry->match) { |
| sfe_ipv6_flow_cookie_set_func_t func; |
| |
| rcu_read_lock(); |
| func = rcu_dereference(si->flow_cookie_set_func); |
| if (func) { |
| func(cm->match_protocol, cm->match_src_ip->addr, cm->match_src_port, |
| cm->match_dest_ip->addr, cm->match_dest_port, 0); |
| } |
| rcu_read_unlock(); |
| |
| cm->flow_cookie = 0; |
| entry->match = NULL; |
| entry->last_clean_time = jiffies; |
| break; |
| } |
| } |
| } |
| #endif |
| hlist_del_init_rcu(&cm->hnode); |
| |
| /* |
| * If the connection match entry is in the active list remove it. |
| */ |
| if (cm->active) { |
| if (likely(cm->active_prev)) { |
| cm->active_prev->active_next = cm->active_next; |
| } else { |
| si->active_head = cm->active_next; |
| } |
| |
| if (likely(cm->active_next)) { |
| cm->active_next->active_prev = cm->active_prev; |
| } else { |
| si->active_tail = cm->active_prev; |
| } |
| } |
| } |
| |
| /* |
| * sfe_ipv6_get_connection_hash() |
| * Generate the hash used in connection lookups. |
| */ |
| static inline unsigned int sfe_ipv6_get_connection_hash(u8 protocol, struct sfe_ipv6_addr *src_ip, __be16 src_port, |
| struct sfe_ipv6_addr *dest_ip, __be16 dest_port) |
| { |
| u32 idx, hash = 0; |
| |
| for (idx = 0; idx < 4; idx++) { |
| hash ^= src_ip->addr[idx] ^ dest_ip->addr[idx]; |
| } |
| hash = hash ^ protocol ^ ntohs(src_port ^ dest_port); |
| return ((hash >> SFE_IPV6_CONNECTION_HASH_SHIFT) ^ hash) & SFE_IPV6_CONNECTION_HASH_MASK; |
| } |
| |
| /* |
| * sfe_ipv6_find_connection() |
| * Get the IPv6 connection info that corresponds to a particular 5-tuple. |
| * |
| * On entry we must be holding the lock that protects the hash table. |
| */ |
| static inline struct sfe_ipv6_connection *sfe_ipv6_find_connection(struct sfe_ipv6 *si, u32 protocol, |
| struct sfe_ipv6_addr *src_ip, __be16 src_port, |
| struct sfe_ipv6_addr *dest_ip, __be16 dest_port) |
| { |
| struct sfe_ipv6_connection *c; |
| |
| unsigned int conn_idx = sfe_ipv6_get_connection_hash(protocol, src_ip, src_port, dest_ip, dest_port); |
| |
| lockdep_assert_held(&si->lock); |
| c = si->conn_hash[conn_idx]; |
| |
| while (c) { |
| if ((c->src_port == src_port) |
| && (c->dest_port == dest_port) |
| && (sfe_ipv6_addr_equal(c->src_ip, src_ip)) |
| && (sfe_ipv6_addr_equal(c->dest_ip, dest_ip)) |
| && (c->protocol == protocol)) { |
| return c; |
| } |
| c = c->next; |
| } |
| |
| return NULL; |
| } |
| |
| /* |
| * sfe_ipv6_mark_rule() |
| * Updates the mark for a current offloaded connection |
| * |
| * Will take hash lock upon entry |
| */ |
| void sfe_ipv6_mark_rule(struct sfe_connection_mark *mark) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| struct sfe_ipv6_connection *c; |
| |
| spin_lock_bh(&si->lock); |
| c = sfe_ipv6_find_connection(si, mark->protocol, |
| mark->src_ip.ip6, mark->src_port, |
| mark->dest_ip.ip6, mark->dest_port); |
| if (c) { |
| WARN_ON((0 != c->mark) && (0 == mark->mark)); |
| c->mark = mark->mark; |
| } |
| spin_unlock_bh(&si->lock); |
| |
| if (c) { |
| DEBUG_TRACE("Matching connection found for mark, " |
| "setting from %08x to %08x\n", |
| c->mark, mark->mark); |
| } |
| } |
| |
| /* |
| * sfe_ipv6_insert_connection() |
| * Insert a connection into the hash. |
| * |
| * On entry we must be holding the lock that protects the hash table. |
| */ |
| static void sfe_ipv6_insert_connection(struct sfe_ipv6 *si, struct sfe_ipv6_connection *c) |
| { |
| struct sfe_ipv6_connection **hash_head; |
| struct sfe_ipv6_connection *prev_head; |
| unsigned int conn_idx; |
| |
| lockdep_assert_held(&si->lock); |
| |
| /* |
| * Insert entry into the connection hash. |
| */ |
| conn_idx = sfe_ipv6_get_connection_hash(c->protocol, c->src_ip, c->src_port, |
| c->dest_ip, c->dest_port); |
| hash_head = &si->conn_hash[conn_idx]; |
| prev_head = *hash_head; |
| c->prev = NULL; |
| if (prev_head) { |
| prev_head->prev = c; |
| } |
| |
| c->next = prev_head; |
| *hash_head = c; |
| |
| /* |
| * Insert entry into the "all connections" list. |
| */ |
| if (si->all_connections_tail) { |
| c->all_connections_prev = si->all_connections_tail; |
| si->all_connections_tail->all_connections_next = c; |
| } else { |
| c->all_connections_prev = NULL; |
| si->all_connections_head = c; |
| } |
| |
| si->all_connections_tail = c; |
| c->all_connections_next = NULL; |
| si->num_connections++; |
| |
| /* |
| * Insert the connection match objects too. |
| */ |
| sfe_ipv6_insert_connection_match(si, c->original_match); |
| sfe_ipv6_insert_connection_match(si, c->reply_match); |
| } |
| |
| /* |
| * sfe_ipv6_remove_connection() |
| * Remove a sfe_ipv6_connection object from the hash. |
| * |
| * On entry we must be holding the lock that protects the hash table. |
| */ |
| static bool sfe_ipv6_remove_connection(struct sfe_ipv6 *si, struct sfe_ipv6_connection *c) |
| { |
| |
| lockdep_assert_held(&si->lock); |
| if (c->removed) { |
| DEBUG_ERROR("%px: Connection has been removed already\n", c); |
| return false; |
| } |
| |
| /* |
| * Remove the connection match objects. |
| */ |
| sfe_ipv6_remove_connection_match(si, c->reply_match); |
| sfe_ipv6_remove_connection_match(si, c->original_match); |
| |
| /* |
| * Unlink the connection. |
| */ |
| if (c->prev) { |
| c->prev->next = c->next; |
| } else { |
| unsigned int conn_idx = sfe_ipv6_get_connection_hash(c->protocol, c->src_ip, c->src_port, |
| c->dest_ip, c->dest_port); |
| si->conn_hash[conn_idx] = c->next; |
| } |
| |
| if (c->next) { |
| c->next->prev = c->prev; |
| } |
| |
| /* |
| * Unlink connection from all_connections list |
| */ |
| if (c->all_connections_prev) { |
| c->all_connections_prev->all_connections_next = c->all_connections_next; |
| } else { |
| si->all_connections_head = c->all_connections_next; |
| } |
| |
| if (c->all_connections_next) { |
| c->all_connections_next->all_connections_prev = c->all_connections_prev; |
| } else { |
| si->all_connections_tail = c->all_connections_prev; |
| } |
| |
| c->removed = true; |
| si->num_connections--; |
| return true; |
| } |
| |
| /* |
| * sfe_ipv6_gen_sync_connection() |
| * Sync a connection. |
| * |
| * On entry to this function we expect that the lock for the connection is either |
| * already held (while called from sfe_ipv6_periodic_sync() or isn't required |
| * (while called from sfe_ipv6_flush_sfe_ipv6_connection()) |
| */ |
| static void sfe_ipv6_gen_sync_connection(struct sfe_ipv6 *si, struct sfe_ipv6_connection *c, |
| struct sfe_connection_sync *sis, sfe_sync_reason_t reason, |
| u64 now_jiffies) |
| { |
| struct sfe_ipv6_connection_match *original_cm; |
| struct sfe_ipv6_connection_match *reply_cm; |
| u32 packet_count, byte_count; |
| |
| /* |
| * Fill in the update message. |
| */ |
| sis->is_v6 = 1; |
| sis->protocol = c->protocol; |
| sis->src_ip.ip6[0] = c->src_ip[0]; |
| sis->src_ip_xlate.ip6[0] = c->src_ip_xlate[0]; |
| sis->dest_ip.ip6[0] = c->dest_ip[0]; |
| sis->dest_ip_xlate.ip6[0] = c->dest_ip_xlate[0]; |
| sis->src_port = c->src_port; |
| sis->src_port_xlate = c->src_port_xlate; |
| sis->dest_port = c->dest_port; |
| sis->dest_port_xlate = c->dest_port_xlate; |
| |
| original_cm = c->original_match; |
| reply_cm = c->reply_match; |
| sis->src_td_max_window = original_cm->protocol_state.tcp.max_win; |
| sis->src_td_end = original_cm->protocol_state.tcp.end; |
| sis->src_td_max_end = original_cm->protocol_state.tcp.max_end; |
| sis->dest_td_max_window = reply_cm->protocol_state.tcp.max_win; |
| sis->dest_td_end = reply_cm->protocol_state.tcp.end; |
| sis->dest_td_max_end = reply_cm->protocol_state.tcp.max_end; |
| |
| sfe_ipv6_connection_match_update_summary_stats(original_cm, &packet_count, &byte_count); |
| sis->src_new_packet_count = packet_count; |
| sis->src_new_byte_count = byte_count; |
| |
| sfe_ipv6_connection_match_update_summary_stats(reply_cm, &packet_count, &byte_count); |
| sis->dest_new_packet_count = packet_count; |
| sis->dest_new_byte_count = byte_count; |
| |
| sis->src_dev = original_cm->match_dev; |
| sis->src_packet_count = original_cm->rx_packet_count64; |
| sis->src_byte_count = original_cm->rx_byte_count64; |
| |
| sis->dest_dev = reply_cm->match_dev; |
| sis->dest_packet_count = reply_cm->rx_packet_count64; |
| sis->dest_byte_count = reply_cm->rx_byte_count64; |
| |
| sis->reason = reason; |
| |
| /* |
| * Get the time increment since our last sync. |
| */ |
| sis->delta_jiffies = now_jiffies - c->last_sync_jiffies; |
| c->last_sync_jiffies = now_jiffies; |
| } |
| |
| /* |
| * sfe_ipv6_free_sfe_ipv6_connection_rcu() |
| * Called at RCU qs state to free the connection object. |
| */ |
| static void sfe_ipv6_free_sfe_ipv6_connection_rcu(struct rcu_head *head) |
| { |
| struct sfe_ipv6_connection *c; |
| |
| /* |
| * We dont need spin lock as the connection is already removed from link list |
| */ |
| c = container_of(head, struct sfe_ipv6_connection, rcu); |
| BUG_ON(!c->removed); |
| |
| DEBUG_TRACE("%px: connecton has been deleted\n", c); |
| |
| /* |
| * Release our hold of the source and dest devices and free the memory |
| * for our connection objects. |
| */ |
| dev_put(c->original_dev); |
| dev_put(c->reply_dev); |
| kfree(c->original_match); |
| kfree(c->reply_match); |
| kfree(c); |
| } |
| |
| /* |
| * sfe_ipv6_flush_connection() |
| * Flush a connection and free all associated resources. |
| * |
| * We need to be called with bottom halves disabled locally as we need to acquire |
| * the connection hash lock and release it again. In general we're actually called |
| * from within a BH and so we're fine, but we're also called when connections are |
| * torn down. |
| */ |
| static void sfe_ipv6_flush_connection(struct sfe_ipv6 *si, |
| struct sfe_ipv6_connection *c, |
| sfe_sync_reason_t reason) |
| { |
| u64 now_jiffies; |
| sfe_sync_rule_callback_t sync_rule_callback; |
| |
| BUG_ON(!c->removed); |
| |
| this_cpu_inc(si->stats_pcpu->connection_flushes64); |
| |
| rcu_read_lock(); |
| |
| sync_rule_callback = rcu_dereference(si->sync_rule_callback); |
| |
| /* |
| * Generate a sync message and then sync. |
| */ |
| |
| if (sync_rule_callback) { |
| struct sfe_connection_sync sis; |
| now_jiffies = get_jiffies_64(); |
| sfe_ipv6_gen_sync_connection(si, c, &sis, reason, now_jiffies); |
| sync_rule_callback(&sis); |
| } |
| |
| rcu_read_unlock(); |
| |
| call_rcu(&c->rcu, sfe_ipv6_free_sfe_ipv6_connection_rcu); |
| } |
| |
| /* |
| * sfe_ipv6_exception_stats_inc() |
| * Increment exception stats. |
| */ |
| static inline void sfe_ipv6_exception_stats_inc(struct sfe_ipv6 *si, enum sfe_ipv6_exception_events reason) |
| { |
| struct sfe_ipv6_stats *stats = this_cpu_ptr(si->stats_pcpu); |
| |
| stats->exception_events64[reason]++; |
| stats->packets_not_forwarded64++; |
| } |
| |
| /* |
| * sfe_ipv6_recv_udp() |
| * Handle UDP packet receives and forwarding. |
| */ |
| static int sfe_ipv6_recv_udp(struct sfe_ipv6 *si, struct sk_buff *skb, struct net_device *dev, |
| unsigned int len, struct ipv6hdr *iph, unsigned int ihl, bool flush_on_find) |
| { |
| struct udphdr *udph; |
| struct sfe_ipv6_addr *src_ip; |
| struct sfe_ipv6_addr *dest_ip; |
| __be16 src_port; |
| __be16 dest_port; |
| struct sfe_ipv6_connection_match *cm; |
| struct net_device *xmit_dev; |
| bool ret; |
| |
| /* |
| * Is our packet too short to contain a valid UDP header? |
| */ |
| if (!pskb_may_pull(skb, (sizeof(struct udphdr) + ihl))) { |
| |
| sfe_ipv6_exception_stats_inc(si,SFE_IPV6_EXCEPTION_EVENT_UDP_HEADER_INCOMPLETE); |
| DEBUG_TRACE("packet too short for UDP header\n"); |
| return 0; |
| } |
| |
| /* |
| * Read the IP address and port information. Read the IP header data first |
| * because we've almost certainly got that in the cache. We may not yet have |
| * the UDP header cached though so allow more time for any prefetching. |
| */ |
| src_ip = (struct sfe_ipv6_addr *)iph->saddr.s6_addr32; |
| dest_ip = (struct sfe_ipv6_addr *)iph->daddr.s6_addr32; |
| |
| udph = (struct udphdr *)(skb->data + ihl); |
| src_port = udph->source; |
| dest_port = udph->dest; |
| |
| rcu_read_lock(); |
| |
| /* |
| * Look for a connection match. |
| */ |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| cm = si->sfe_flow_cookie_table[skb->flow_cookie & SFE_FLOW_COOKIE_MASK].match; |
| if (unlikely(!cm)) { |
| cm = sfe_ipv6_find_connection_match_rcu(si, dev, IPPROTO_UDP, src_ip, src_port, dest_ip, dest_port); |
| } |
| #else |
| cm = sfe_ipv6_find_connection_match_rcu(si, dev, IPPROTO_UDP, src_ip, src_port, dest_ip, dest_port); |
| #endif |
| if (unlikely(!cm)) { |
| rcu_read_unlock(); |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_UDP_NO_CONNECTION); |
| |
| DEBUG_TRACE("no connection found\n"); |
| return 0; |
| } |
| |
| /* |
| * If our packet has beern marked as "flush on find" we can't actually |
| * forward it in the fast path, but now that we've found an associated |
| * connection we can flush that out before we process the packet. |
| */ |
| if (unlikely(flush_on_find)) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("flush on find\n"); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_UDP_IP_OPTIONS_OR_INITIAL_FRAGMENT); |
| return 0; |
| } |
| |
| #ifdef CONFIG_XFRM |
| /* |
| * We can't accelerate the flow on this direction, just let it go |
| * through the slow path. |
| */ |
| if (unlikely(!cm->flow_accel)) { |
| rcu_read_unlock(); |
| this_cpu_inc(si->stats_pcpu->packets_not_forwarded64); |
| return 0; |
| } |
| #endif |
| |
| /* |
| * Does our hop_limit allow forwarding? |
| */ |
| if (unlikely(iph->hop_limit < 2)) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("hop_limit too low\n"); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_UDP_SMALL_TTL); |
| return 0; |
| } |
| |
| /* |
| * If our packet is larger than the MTU of the transmit interface then |
| * we can't forward it easily. |
| */ |
| if (unlikely(len > cm->xmit_dev_mtu)) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("larger than mtu\n"); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_UDP_NEEDS_FRAGMENTATION); |
| return 0; |
| } |
| |
| /* |
| * From this point on we're good to modify the packet. |
| */ |
| |
| /* |
| * Check if skb was cloned. If it was, unshare it. Because |
| * the data area is going to be written in this path and we don't want to |
| * change the cloned skb's data section. |
| */ |
| if (unlikely(skb_cloned(skb))) { |
| DEBUG_TRACE("%px: skb is a cloned skb\n", skb); |
| skb = skb_unshare(skb, GFP_ATOMIC); |
| if (!skb) { |
| DEBUG_WARN("Failed to unshare the cloned skb\n"); |
| rcu_read_unlock(); |
| return 0; |
| } |
| |
| /* |
| * Update the iph and udph pointers with the unshared skb's data area. |
| */ |
| iph = (struct ipv6hdr *)skb->data; |
| udph = (struct udphdr *)(skb->data + ihl); |
| } |
| |
| /* |
| * Update DSCP |
| */ |
| if (unlikely(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_DSCP_REMARK)) { |
| sfe_ipv6_change_dsfield(iph, cm->dscp); |
| } |
| |
| /* |
| * Decrement our hop_limit. |
| */ |
| iph->hop_limit -= 1; |
| |
| /* |
| * Do we have to perform translations of the source address/port? |
| */ |
| if (unlikely(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_XLATE_SRC)) { |
| u16 udp_csum; |
| |
| iph->saddr.s6_addr32[0] = cm->xlate_src_ip[0].addr[0]; |
| iph->saddr.s6_addr32[1] = cm->xlate_src_ip[0].addr[1]; |
| iph->saddr.s6_addr32[2] = cm->xlate_src_ip[0].addr[2]; |
| iph->saddr.s6_addr32[3] = cm->xlate_src_ip[0].addr[3]; |
| udph->source = cm->xlate_src_port; |
| |
| /* |
| * Do we have a non-zero UDP checksum? If we do then we need |
| * to update it. |
| */ |
| udp_csum = udph->check; |
| if (likely(udp_csum)) { |
| u32 sum = udp_csum + cm->xlate_src_csum_adjustment; |
| sum = (sum & 0xffff) + (sum >> 16); |
| udph->check = (u16)sum; |
| } |
| } |
| |
| /* |
| * Do we have to perform translations of the destination address/port? |
| */ |
| if (unlikely(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_XLATE_DEST)) { |
| u16 udp_csum; |
| |
| iph->daddr.s6_addr32[0] = cm->xlate_dest_ip[0].addr[0]; |
| iph->daddr.s6_addr32[1] = cm->xlate_dest_ip[0].addr[1]; |
| iph->daddr.s6_addr32[2] = cm->xlate_dest_ip[0].addr[2]; |
| iph->daddr.s6_addr32[3] = cm->xlate_dest_ip[0].addr[3]; |
| udph->dest = cm->xlate_dest_port; |
| |
| /* |
| * Do we have a non-zero UDP checksum? If we do then we need |
| * to update it. |
| */ |
| udp_csum = udph->check; |
| if (likely(udp_csum)) { |
| u32 sum = udp_csum + cm->xlate_dest_csum_adjustment; |
| sum = (sum & 0xffff) + (sum >> 16); |
| udph->check = (u16)sum; |
| } |
| } |
| |
| /* |
| * Update traffic stats. |
| */ |
| atomic_inc(&cm->rx_packet_count); |
| atomic_add(len, &cm->rx_byte_count); |
| |
| /* |
| * If we're not already on the active list then insert ourselves at the tail |
| * of the current list. |
| */ |
| if (unlikely(!cm->active)) { |
| spin_lock_bh(&si->lock); |
| if (unlikely(!cm->active)) { |
| cm->active = true; |
| cm->active_prev = si->active_tail; |
| if (likely(si->active_tail)) { |
| si->active_tail->active_next = cm; |
| } else { |
| si->active_head = cm; |
| } |
| si->active_tail = cm; |
| } |
| spin_unlock_bh(&si->lock); |
| } |
| |
| xmit_dev = cm->xmit_dev; |
| skb->dev = xmit_dev; |
| |
| /* |
| * Check to see if we need to write a header. |
| */ |
| if (likely(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_WRITE_L2_HDR)) { |
| if (unlikely(!(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_WRITE_FAST_ETH_HDR))) { |
| dev_hard_header(skb, xmit_dev, ETH_P_IPV6, |
| cm->xmit_dest_mac, cm->xmit_src_mac, len); |
| } else { |
| /* |
| * For the simple case we write this really fast. |
| */ |
| struct ethhdr *eth = (struct ethhdr *)__skb_push(skb, ETH_HLEN); |
| eth->h_proto = htons(ETH_P_IPV6); |
| ether_addr_copy((u8 *)eth->h_dest, (u8 *)cm->xmit_dest_mac); |
| ether_addr_copy((u8 *)eth->h_source, (u8 *)cm->xmit_src_mac); |
| |
| } |
| } |
| |
| /* |
| * Update priority of skb. |
| */ |
| if (unlikely(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_PRIORITY_REMARK)) { |
| skb->priority = cm->priority; |
| } |
| |
| /* |
| * Mark outgoing packet. |
| */ |
| skb->mark = cm->connection->mark; |
| if (skb->mark) { |
| DEBUG_TRACE("SKB MARK is NON ZERO %x\n", skb->mark); |
| } |
| |
| rcu_read_unlock(); |
| |
| this_cpu_inc(si->stats_pcpu->packets_forwarded64); |
| |
| /* |
| * We're going to check for GSO flags when we transmit the packet so |
| * start fetching the necessary cache line now. |
| */ |
| prefetch(skb_shinfo(skb)); |
| |
| /* |
| * Mark that this packet has been fast forwarded. |
| */ |
| skb->fast_forwarded = 1; |
| |
| /* |
| * Send the packet on its way. |
| */ |
| dev_queue_xmit(skb); |
| |
| return 1; |
| } |
| |
| /* |
| * sfe_ipv6_process_tcp_option_sack() |
| * Parse TCP SACK option and update ack according |
| */ |
| static bool sfe_ipv6_process_tcp_option_sack(const struct tcphdr *th, const u32 data_offs, |
| u32 *ack) |
| { |
| u32 length = sizeof(struct tcphdr); |
| u8 *ptr = (u8 *)th + length; |
| |
| /* |
| * Ignore processing if TCP packet has only TIMESTAMP option. |
| */ |
| if (likely(data_offs == length + TCPOLEN_TIMESTAMP + 1 + 1) |
| && likely(ptr[0] == TCPOPT_NOP) |
| && likely(ptr[1] == TCPOPT_NOP) |
| && likely(ptr[2] == TCPOPT_TIMESTAMP) |
| && likely(ptr[3] == TCPOLEN_TIMESTAMP)) { |
| return true; |
| } |
| |
| /* |
| * TCP options. Parse SACK option. |
| */ |
| while (length < data_offs) { |
| u8 size; |
| u8 kind; |
| |
| ptr = (u8 *)th + length; |
| kind = *ptr; |
| |
| /* |
| * NOP, for padding |
| * Not in the switch because to fast escape and to not calculate size |
| */ |
| if (kind == TCPOPT_NOP) { |
| length++; |
| continue; |
| } |
| |
| if (kind == TCPOPT_SACK) { |
| u32 sack = 0; |
| u8 re = 1 + 1; |
| |
| size = *(ptr + 1); |
| if ((size < (1 + 1 + TCPOLEN_SACK_PERBLOCK)) |
| || ((size - (1 + 1)) % (TCPOLEN_SACK_PERBLOCK)) |
| || (size > (data_offs - length))) { |
| return false; |
| } |
| |
| re += 4; |
| while (re < size) { |
| u32 sack_re; |
| u8 *sptr = ptr + re; |
| sack_re = (sptr[0] << 24) | (sptr[1] << 16) | (sptr[2] << 8) | sptr[3]; |
| if (sack_re > sack) { |
| sack = sack_re; |
| } |
| re += TCPOLEN_SACK_PERBLOCK; |
| } |
| if (sack > *ack) { |
| *ack = sack; |
| } |
| length += size; |
| continue; |
| } |
| if (kind == TCPOPT_EOL) { |
| return true; |
| } |
| size = *(ptr + 1); |
| if (size < 2) { |
| return false; |
| } |
| length += size; |
| } |
| |
| return true; |
| } |
| |
| /* |
| * sfe_ipv6_recv_tcp() |
| * Handle TCP packet receives and forwarding. |
| */ |
| static int sfe_ipv6_recv_tcp(struct sfe_ipv6 *si, struct sk_buff *skb, struct net_device *dev, |
| unsigned int len, struct ipv6hdr *iph, unsigned int ihl, bool flush_on_find) |
| { |
| struct tcphdr *tcph; |
| struct sfe_ipv6_addr *src_ip; |
| struct sfe_ipv6_addr *dest_ip; |
| __be16 src_port; |
| __be16 dest_port; |
| struct sfe_ipv6_connection_match *cm; |
| struct sfe_ipv6_connection_match *counter_cm; |
| u32 flags; |
| struct net_device *xmit_dev; |
| bool ret; |
| |
| /* |
| * Is our packet too short to contain a valid UDP header? |
| */ |
| if (!pskb_may_pull(skb, (sizeof(struct tcphdr) + ihl))) { |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_HEADER_INCOMPLETE); |
| DEBUG_TRACE("packet too short for TCP header\n"); |
| return 0; |
| } |
| |
| /* |
| * Read the IP address and port information. Read the IP header data first |
| * because we've almost certainly got that in the cache. We may not yet have |
| * the TCP header cached though so allow more time for any prefetching. |
| */ |
| src_ip = (struct sfe_ipv6_addr *)iph->saddr.s6_addr32; |
| dest_ip = (struct sfe_ipv6_addr *)iph->daddr.s6_addr32; |
| |
| tcph = (struct tcphdr *)(skb->data + ihl); |
| src_port = tcph->source; |
| dest_port = tcph->dest; |
| flags = tcp_flag_word(tcph); |
| |
| rcu_read_lock(); |
| |
| /* |
| * Look for a connection match. |
| */ |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| cm = si->sfe_flow_cookie_table[skb->flow_cookie & SFE_FLOW_COOKIE_MASK].match; |
| if (unlikely(!cm)) { |
| cm = sfe_ipv6_find_connection_match_rcu(si, dev, IPPROTO_TCP, src_ip, src_port, dest_ip, dest_port); |
| } |
| #else |
| cm = sfe_ipv6_find_connection_match_rcu(si, dev, IPPROTO_TCP, src_ip, src_port, dest_ip, dest_port); |
| #endif |
| if (unlikely(!cm)) { |
| /* |
| * We didn't get a connection but as TCP is connection-oriented that |
| * may be because this is a non-fast connection (not running established). |
| * For diagnostic purposes we differentiate this here. |
| */ |
| if (likely((flags & (TCP_FLAG_SYN | TCP_FLAG_RST | TCP_FLAG_FIN | TCP_FLAG_ACK)) == TCP_FLAG_ACK)) { |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_NO_CONNECTION_FAST_FLAGS); |
| |
| DEBUG_TRACE("no connection found - fast flags\n"); |
| return 0; |
| } |
| |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_NO_CONNECTION_SLOW_FLAGS); |
| DEBUG_TRACE("no connection found - slow flags: 0x%x\n", |
| flags & (TCP_FLAG_SYN | TCP_FLAG_RST | TCP_FLAG_FIN | TCP_FLAG_ACK)); |
| return 0; |
| } |
| |
| /* |
| * If our packet has beern marked as "flush on find" we can't actually |
| * forward it in the fast path, but now that we've found an associated |
| * connection we can flush that out before we process the packet. |
| */ |
| if (unlikely(flush_on_find)) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("flush on find\n"); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_IP_OPTIONS_OR_INITIAL_FRAGMENT); |
| return 0; |
| } |
| |
| #ifdef CONFIG_XFRM |
| /* |
| * We can't accelerate the flow on this direction, just let it go |
| * through the slow path. |
| */ |
| if (unlikely(!cm->flow_accel)) { |
| rcu_read_unlock(); |
| this_cpu_inc(si->stats_pcpu->packets_not_forwarded64); |
| return 0; |
| } |
| #endif |
| |
| /* |
| * Does our hop_limit allow forwarding? |
| */ |
| if (unlikely(iph->hop_limit < 2)) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("hop_limit too low\n"); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_SMALL_TTL); |
| return 0; |
| } |
| |
| /* |
| * If our packet is larger than the MTU of the transmit interface then |
| * we can't forward it easily. |
| */ |
| if (unlikely((len > cm->xmit_dev_mtu) && !skb_is_gso(skb))) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("larger than mtu\n"); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_NEEDS_FRAGMENTATION); |
| return 0; |
| } |
| |
| /* |
| * Look at our TCP flags. Anything missing an ACK or that has RST, SYN or FIN |
| * set is not a fast path packet. |
| */ |
| if (unlikely((flags & (TCP_FLAG_SYN | TCP_FLAG_RST | TCP_FLAG_FIN | TCP_FLAG_ACK)) != TCP_FLAG_ACK)) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("TCP flags: 0x%x are not fast\n", |
| flags & (TCP_FLAG_SYN | TCP_FLAG_RST | TCP_FLAG_FIN | TCP_FLAG_ACK)); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_FLAGS); |
| return 0; |
| } |
| |
| counter_cm = cm->counter_match; |
| |
| /* |
| * Are we doing sequence number checking? |
| */ |
| if (likely(!(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_NO_SEQ_CHECK))) { |
| u32 seq; |
| u32 ack; |
| u32 sack; |
| u32 data_offs; |
| u32 end; |
| u32 left_edge; |
| u32 scaled_win; |
| u32 max_end; |
| |
| /* |
| * Is our sequence fully past the right hand edge of the window? |
| */ |
| seq = ntohl(tcph->seq); |
| if (unlikely((s32)(seq - (cm->protocol_state.tcp.max_end + 1)) > 0)) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("seq: %u exceeds right edge: %u\n", |
| seq, cm->protocol_state.tcp.max_end + 1); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_SEQ_EXCEEDS_RIGHT_EDGE); |
| return 0; |
| } |
| |
| /* |
| * Check that our TCP data offset isn't too short. |
| */ |
| data_offs = tcph->doff << 2; |
| if (unlikely(data_offs < sizeof(struct tcphdr))) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("TCP data offset: %u, too small\n", data_offs); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_SMALL_DATA_OFFS); |
| return 0; |
| } |
| |
| /* |
| * Update ACK according to any SACK option. |
| */ |
| ack = ntohl(tcph->ack_seq); |
| sack = ack; |
| if (unlikely(!sfe_ipv6_process_tcp_option_sack(tcph, data_offs, &sack))) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("TCP option SACK size is wrong\n"); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_BAD_SACK); |
| return 0; |
| } |
| |
| /* |
| * Check that our TCP data offset isn't past the end of the packet. |
| */ |
| data_offs += sizeof(struct ipv6hdr); |
| if (unlikely(len < data_offs)) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("TCP data offset: %u, past end of packet: %u\n", |
| data_offs, len); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_BIG_DATA_OFFS); |
| return 0; |
| } |
| |
| end = seq + len - data_offs; |
| |
| /* |
| * Is our sequence fully before the left hand edge of the window? |
| */ |
| if (unlikely((s32)(end - (cm->protocol_state.tcp.end |
| - counter_cm->protocol_state.tcp.max_win - 1)) < 0)) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("seq: %u before left edge: %u\n", |
| end, cm->protocol_state.tcp.end - counter_cm->protocol_state.tcp.max_win - 1); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_SEQ_BEFORE_LEFT_EDGE); |
| return 0; |
| } |
| |
| /* |
| * Are we acking data that is to the right of what has been sent? |
| */ |
| if (unlikely((s32)(sack - (counter_cm->protocol_state.tcp.end + 1)) > 0)) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("ack: %u exceeds right edge: %u\n", |
| sack, counter_cm->protocol_state.tcp.end + 1); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_ACK_EXCEEDS_RIGHT_EDGE); |
| return 0; |
| } |
| |
| /* |
| * Is our ack too far before the left hand edge of the window? |
| */ |
| left_edge = counter_cm->protocol_state.tcp.end |
| - cm->protocol_state.tcp.max_win |
| - SFE_IPV6_TCP_MAX_ACK_WINDOW |
| - 1; |
| if (unlikely((s32)(sack - left_edge) < 0)) { |
| struct sfe_ipv6_connection *c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| DEBUG_TRACE("ack: %u before left edge: %u\n", sack, left_edge); |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_TCP_ACK_BEFORE_LEFT_EDGE); |
| return 0; |
| } |
| |
| /* |
| * Have we just seen the largest window size yet for this connection? If yes |
| * then we need to record the new value. |
| */ |
| scaled_win = ntohs(tcph->window) << cm->protocol_state.tcp.win_scale; |
| scaled_win += (sack - ack); |
| if (unlikely(cm->protocol_state.tcp.max_win < scaled_win)) { |
| cm->protocol_state.tcp.max_win = scaled_win; |
| } |
| |
| /* |
| * If our sequence and/or ack numbers have advanced then record the new state. |
| */ |
| if (likely((s32)(end - cm->protocol_state.tcp.end) >= 0)) { |
| cm->protocol_state.tcp.end = end; |
| } |
| |
| max_end = sack + scaled_win; |
| if (likely((s32)(max_end - counter_cm->protocol_state.tcp.max_end) >= 0)) { |
| counter_cm->protocol_state.tcp.max_end = max_end; |
| } |
| } |
| |
| /* |
| * From this point on we're good to modify the packet. |
| */ |
| |
| /* |
| * Check if skb was cloned. If it was, unshare it. Because |
| * the data area is going to be written in this path and we don't want to |
| * change the cloned skb's data section. |
| */ |
| if (unlikely(skb_cloned(skb))) { |
| DEBUG_TRACE("%px: skb is a cloned skb\n", skb); |
| skb = skb_unshare(skb, GFP_ATOMIC); |
| if (!skb) { |
| DEBUG_WARN("Failed to unshare the cloned skb\n"); |
| rcu_read_unlock(); |
| return 0; |
| } |
| |
| /* |
| * Update the iph and tcph pointers with the unshared skb's data area. |
| */ |
| iph = (struct ipv6hdr *)skb->data; |
| tcph = (struct tcphdr *)(skb->data + ihl); |
| } |
| |
| /* |
| * Update DSCP |
| */ |
| if (unlikely(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_DSCP_REMARK)) { |
| sfe_ipv6_change_dsfield(iph, cm->dscp); |
| } |
| |
| /* |
| * Decrement our hop_limit. |
| */ |
| iph->hop_limit -= 1; |
| |
| /* |
| * Do we have to perform translations of the source address/port? |
| */ |
| if (unlikely(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_XLATE_SRC)) { |
| u16 tcp_csum; |
| u32 sum; |
| |
| iph->saddr.s6_addr32[0] = cm->xlate_src_ip[0].addr[0]; |
| iph->saddr.s6_addr32[1] = cm->xlate_src_ip[0].addr[1]; |
| iph->saddr.s6_addr32[2] = cm->xlate_src_ip[0].addr[2]; |
| iph->saddr.s6_addr32[3] = cm->xlate_src_ip[0].addr[3]; |
| tcph->source = cm->xlate_src_port; |
| |
| /* |
| * Do we have a non-zero UDP checksum? If we do then we need |
| * to update it. |
| */ |
| tcp_csum = tcph->check; |
| sum = tcp_csum + cm->xlate_src_csum_adjustment; |
| sum = (sum & 0xffff) + (sum >> 16); |
| tcph->check = (u16)sum; |
| } |
| |
| /* |
| * Do we have to perform translations of the destination address/port? |
| */ |
| if (unlikely(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_XLATE_DEST)) { |
| u16 tcp_csum; |
| u32 sum; |
| |
| iph->daddr.s6_addr32[0] = cm->xlate_dest_ip[0].addr[0]; |
| iph->daddr.s6_addr32[1] = cm->xlate_dest_ip[0].addr[1]; |
| iph->daddr.s6_addr32[2] = cm->xlate_dest_ip[0].addr[2]; |
| iph->daddr.s6_addr32[3] = cm->xlate_dest_ip[0].addr[3]; |
| tcph->dest = cm->xlate_dest_port; |
| |
| /* |
| * Do we have a non-zero UDP checksum? If we do then we need |
| * to update it. |
| */ |
| tcp_csum = tcph->check; |
| sum = tcp_csum + cm->xlate_dest_csum_adjustment; |
| sum = (sum & 0xffff) + (sum >> 16); |
| tcph->check = (u16)sum; |
| } |
| |
| /* |
| * Update traffic stats. |
| */ |
| atomic_inc(&cm->rx_packet_count); |
| atomic_add(len, &cm->rx_byte_count); |
| |
| /* |
| * If we're not already on the active list then insert ourselves at the tail |
| * of the current list. |
| */ |
| if (unlikely(!cm->active)) { |
| spin_lock_bh(&si->lock); |
| if (unlikely(!cm->active)) { |
| cm->active = true; |
| cm->active_prev = si->active_tail; |
| if (likely(si->active_tail)) { |
| si->active_tail->active_next = cm; |
| } else { |
| si->active_head = cm; |
| } |
| si->active_tail = cm; |
| } |
| spin_unlock_bh(&si->lock); |
| } |
| |
| xmit_dev = cm->xmit_dev; |
| skb->dev = xmit_dev; |
| |
| /* |
| * Check to see if we need to write a header. |
| */ |
| if (likely(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_WRITE_L2_HDR)) { |
| if (unlikely(!(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_WRITE_FAST_ETH_HDR))) { |
| dev_hard_header(skb, xmit_dev, ETH_P_IPV6, |
| cm->xmit_dest_mac, cm->xmit_src_mac, len); |
| } else { |
| /* |
| * For the simple case we write this really fast. |
| */ |
| struct ethhdr *eth = (struct ethhdr *)__skb_push(skb, ETH_HLEN); |
| eth->h_proto = htons(ETH_P_IPV6); |
| ether_addr_copy((u8 *)eth->h_dest, (u8 *)cm->xmit_dest_mac); |
| ether_addr_copy((u8 *)eth->h_source, (u8 *)cm->xmit_src_mac); |
| } |
| } |
| |
| /* |
| * Update priority of skb. |
| */ |
| if (unlikely(cm->flags & SFE_IPV6_CONNECTION_MATCH_FLAG_PRIORITY_REMARK)) { |
| skb->priority = cm->priority; |
| } |
| |
| /* |
| * Mark outgoing packet |
| */ |
| skb->mark = cm->connection->mark; |
| if (skb->mark) { |
| DEBUG_TRACE("SKB MARK is NON ZERO %x\n", skb->mark); |
| } |
| |
| rcu_read_unlock(); |
| |
| this_cpu_inc(si->stats_pcpu->packets_forwarded64); |
| |
| /* |
| * We're going to check for GSO flags when we transmit the packet so |
| * start fetching the necessary cache line now. |
| */ |
| prefetch(skb_shinfo(skb)); |
| |
| /* |
| * Mark that this packet has been fast forwarded. |
| */ |
| skb->fast_forwarded = 1; |
| |
| /* |
| * Send the packet on its way. |
| */ |
| dev_queue_xmit(skb); |
| |
| return 1; |
| } |
| |
| /* |
| * sfe_ipv6_recv_icmp() |
| * Handle ICMP packet receives. |
| * |
| * ICMP packets aren't handled as a "fast path" and always have us process them |
| * through the default Linux stack. What we do need to do is look for any errors |
| * about connections we are handling in the fast path. If we find any such |
| * connections then we want to flush their state so that the ICMP error path |
| * within Linux has all of the correct state should it need it. |
| */ |
| static int sfe_ipv6_recv_icmp(struct sfe_ipv6 *si, struct sk_buff *skb, struct net_device *dev, |
| unsigned int len, struct ipv6hdr *iph, unsigned int ihl) |
| { |
| struct icmp6hdr *icmph; |
| struct ipv6hdr *icmp_iph; |
| struct udphdr *icmp_udph; |
| struct tcphdr *icmp_tcph; |
| struct sfe_ipv6_addr *src_ip; |
| struct sfe_ipv6_addr *dest_ip; |
| __be16 src_port; |
| __be16 dest_port; |
| struct sfe_ipv6_connection_match *cm; |
| struct sfe_ipv6_connection *c; |
| u8 next_hdr; |
| bool ret; |
| |
| /* |
| * Is our packet too short to contain a valid ICMP header? |
| */ |
| len -= ihl; |
| if (!pskb_may_pull(skb, ihl + sizeof(struct icmp6hdr))) { |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_ICMP_HEADER_INCOMPLETE); |
| |
| DEBUG_TRACE("packet too short for ICMP header\n"); |
| return 0; |
| } |
| |
| /* |
| * We only handle "destination unreachable" and "time exceeded" messages. |
| */ |
| icmph = (struct icmp6hdr *)(skb->data + ihl); |
| if ((icmph->icmp6_type != ICMPV6_DEST_UNREACH) |
| && (icmph->icmp6_type != ICMPV6_TIME_EXCEED)) { |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_ICMP_UNHANDLED_TYPE); |
| DEBUG_TRACE("unhandled ICMP type: 0x%x\n", icmph->icmp6_type); |
| return 0; |
| } |
| |
| /* |
| * Do we have the full embedded IP header? |
| * We should have 8 bytes of next L4 header - that's enough to identify |
| * the connection. |
| */ |
| len -= sizeof(struct icmp6hdr); |
| ihl += sizeof(struct icmp6hdr); |
| if (!pskb_may_pull(skb, ihl + sizeof(struct ipv6hdr) + sizeof(struct sfe_ipv6_ext_hdr))) { |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_ICMP_IPV6_HEADER_INCOMPLETE); |
| DEBUG_TRACE("Embedded IP header not complete\n"); |
| return 0; |
| } |
| |
| /* |
| * Is our embedded IP version wrong? |
| */ |
| icmp_iph = (struct ipv6hdr *)(icmph + 1); |
| if (unlikely(icmp_iph->version != 6)) { |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_ICMP_IPV6_NON_V6); |
| DEBUG_TRACE("IP version: %u\n", icmp_iph->version); |
| return 0; |
| } |
| |
| len -= sizeof(struct ipv6hdr); |
| ihl += sizeof(struct ipv6hdr); |
| next_hdr = icmp_iph->nexthdr; |
| while (unlikely(sfe_ipv6_is_ext_hdr(next_hdr))) { |
| struct sfe_ipv6_ext_hdr *ext_hdr; |
| unsigned int ext_hdr_len; |
| |
| ext_hdr = (struct sfe_ipv6_ext_hdr *)(skb->data + ihl); |
| if (next_hdr == NEXTHDR_FRAGMENT) { |
| struct frag_hdr *frag_hdr = (struct frag_hdr *)ext_hdr; |
| unsigned int frag_off = ntohs(frag_hdr->frag_off); |
| |
| if (frag_off & SFE_IPV6_FRAG_OFFSET) { |
| |
| DEBUG_TRACE("non-initial fragment\n"); |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_NON_INITIAL_FRAGMENT); |
| return 0; |
| } |
| } |
| |
| ext_hdr_len = ext_hdr->hdr_len; |
| ext_hdr_len <<= 3; |
| ext_hdr_len += sizeof(struct sfe_ipv6_ext_hdr); |
| len -= ext_hdr_len; |
| ihl += ext_hdr_len; |
| /* |
| * We should have 8 bytes of next header - that's enough to identify |
| * the connection. |
| */ |
| if (!pskb_may_pull(skb, ihl + sizeof(struct sfe_ipv6_ext_hdr))) { |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_HEADER_INCOMPLETE); |
| DEBUG_TRACE("extension header %d not completed\n", next_hdr); |
| return 0; |
| } |
| |
| next_hdr = ext_hdr->next_hdr; |
| } |
| |
| /* |
| * Handle the embedded transport layer header. |
| */ |
| switch (next_hdr) { |
| case IPPROTO_UDP: |
| icmp_udph = (struct udphdr *)(skb->data + ihl); |
| src_port = icmp_udph->source; |
| dest_port = icmp_udph->dest; |
| break; |
| |
| case IPPROTO_TCP: |
| icmp_tcph = (struct tcphdr *)(skb->data + ihl); |
| src_port = icmp_tcph->source; |
| dest_port = icmp_tcph->dest; |
| break; |
| |
| default: |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_ICMP_IPV6_UNHANDLED_PROTOCOL); |
| DEBUG_TRACE("Unhandled embedded IP protocol: %u\n", next_hdr); |
| return 0; |
| } |
| |
| src_ip = (struct sfe_ipv6_addr *)icmp_iph->saddr.s6_addr32; |
| dest_ip = (struct sfe_ipv6_addr *)icmp_iph->daddr.s6_addr32; |
| |
| rcu_read_lock(); |
| /* |
| * Look for a connection match. Note that we reverse the source and destination |
| * here because our embedded message contains a packet that was sent in the |
| * opposite direction to the one in which we just received it. It will have |
| * been sent on the interface from which we received it though so that's still |
| * ok to use. |
| */ |
| cm = sfe_ipv6_find_connection_match_rcu(si, dev, icmp_iph->nexthdr, dest_ip, dest_port, src_ip, src_port); |
| if (unlikely(!cm)) { |
| rcu_read_unlock(); |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_ICMP_NO_CONNECTION); |
| DEBUG_TRACE("no connection found\n"); |
| return 0; |
| } |
| |
| /* |
| * We found a connection so now remove it from the connection list and flush |
| * its state. |
| */ |
| c = cm->connection; |
| spin_lock_bh(&si->lock); |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_FLUSH); |
| } |
| |
| rcu_read_unlock(); |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_ICMP_FLUSHED_CONNECTION); |
| return 0; |
| } |
| |
| /* |
| * sfe_ipv6_recv() |
| * Handle packet receives and forwaring. |
| * |
| * Returns 1 if the packet is forwarded or 0 if it isn't. |
| */ |
| int sfe_ipv6_recv(struct net_device *dev, struct sk_buff *skb) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| unsigned int len; |
| unsigned int payload_len; |
| unsigned int ihl = sizeof(struct ipv6hdr); |
| bool flush_on_find = false; |
| struct ipv6hdr *iph; |
| u8 next_hdr; |
| |
| /* |
| * Check that we have space for an IP header and an uplayer header here. |
| */ |
| len = skb->len; |
| if (!pskb_may_pull(skb, ihl + sizeof(struct sfe_ipv6_ext_hdr))) { |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_HEADER_INCOMPLETE); |
| DEBUG_TRACE("len: %u is too short\n", len); |
| return 0; |
| } |
| |
| /* |
| * Is our IP version wrong? |
| */ |
| iph = (struct ipv6hdr *)skb->data; |
| if (unlikely(iph->version != 6)) { |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_NON_V6); |
| DEBUG_TRACE("IP version: %u\n", iph->version); |
| return 0; |
| } |
| |
| /* |
| * Does our datagram fit inside the skb? |
| */ |
| payload_len = ntohs(iph->payload_len); |
| if (unlikely(payload_len > (len - ihl))) { |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_DATAGRAM_INCOMPLETE); |
| DEBUG_TRACE("payload_len: %u, exceeds len: %u\n", payload_len, (len - (unsigned int)sizeof(struct ipv6hdr))); |
| return 0; |
| } |
| |
| next_hdr = iph->nexthdr; |
| while (unlikely(sfe_ipv6_is_ext_hdr(next_hdr))) { |
| struct sfe_ipv6_ext_hdr *ext_hdr; |
| unsigned int ext_hdr_len; |
| |
| ext_hdr = (struct sfe_ipv6_ext_hdr *)(skb->data + ihl); |
| if (next_hdr == NEXTHDR_FRAGMENT) { |
| struct frag_hdr *frag_hdr = (struct frag_hdr *)ext_hdr; |
| unsigned int frag_off = ntohs(frag_hdr->frag_off); |
| |
| if (frag_off & SFE_IPV6_FRAG_OFFSET) { |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_NON_INITIAL_FRAGMENT); |
| DEBUG_TRACE("non-initial fragment\n"); |
| return 0; |
| } |
| } |
| |
| ext_hdr_len = ext_hdr->hdr_len; |
| ext_hdr_len <<= 3; |
| ext_hdr_len += sizeof(struct sfe_ipv6_ext_hdr); |
| ihl += ext_hdr_len; |
| if (!pskb_may_pull(skb, ihl + sizeof(struct sfe_ipv6_ext_hdr))) { |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_HEADER_INCOMPLETE); |
| |
| DEBUG_TRACE("extension header %d not completed\n", next_hdr); |
| return 0; |
| } |
| |
| flush_on_find = true; |
| next_hdr = ext_hdr->next_hdr; |
| } |
| |
| if (IPPROTO_UDP == next_hdr) { |
| return sfe_ipv6_recv_udp(si, skb, dev, len, iph, ihl, flush_on_find); |
| } |
| |
| if (IPPROTO_TCP == next_hdr) { |
| return sfe_ipv6_recv_tcp(si, skb, dev, len, iph, ihl, flush_on_find); |
| } |
| |
| if (IPPROTO_ICMPV6 == next_hdr) { |
| return sfe_ipv6_recv_icmp(si, skb, dev, len, iph, ihl); |
| } |
| |
| sfe_ipv6_exception_stats_inc(si, SFE_IPV6_EXCEPTION_EVENT_UNHANDLED_PROTOCOL); |
| DEBUG_TRACE("not UDP, TCP or ICMP: %u\n", next_hdr); |
| return 0; |
| } |
| |
| /* |
| * sfe_ipv6_update_tcp_state() |
| * update TCP window variables. |
| */ |
| static void |
| sfe_ipv6_update_tcp_state(struct sfe_ipv6_connection *c, |
| struct sfe_ipv6_rule_create_msg *msg) |
| { |
| struct sfe_ipv6_connection_match *orig_cm; |
| struct sfe_ipv6_connection_match *repl_cm; |
| struct sfe_ipv6_tcp_connection_match *orig_tcp; |
| struct sfe_ipv6_tcp_connection_match *repl_tcp; |
| |
| orig_cm = c->original_match; |
| repl_cm = c->reply_match; |
| orig_tcp = &orig_cm->protocol_state.tcp; |
| repl_tcp = &repl_cm->protocol_state.tcp; |
| |
| /* update orig */ |
| if (orig_tcp->max_win < msg->tcp_rule.flow_max_window) { |
| orig_tcp->max_win = msg->tcp_rule.flow_max_window; |
| } |
| if ((s32)(orig_tcp->end - msg->tcp_rule.flow_end) < 0) { |
| orig_tcp->end = msg->tcp_rule.flow_end; |
| } |
| if ((s32)(orig_tcp->max_end - msg->tcp_rule.flow_max_end) < 0) { |
| orig_tcp->max_end = msg->tcp_rule.flow_max_end; |
| } |
| |
| /* update reply */ |
| if (repl_tcp->max_win < msg->tcp_rule.return_max_window) { |
| repl_tcp->max_win = msg->tcp_rule.return_max_window; |
| } |
| if ((s32)(repl_tcp->end - msg->tcp_rule.return_end) < 0) { |
| repl_tcp->end = msg->tcp_rule.return_end; |
| } |
| if ((s32)(repl_tcp->max_end - msg->tcp_rule.return_max_end) < 0) { |
| repl_tcp->max_end = msg->tcp_rule.return_max_end; |
| } |
| |
| /* update match flags */ |
| orig_cm->flags &= ~SFE_IPV6_CONNECTION_MATCH_FLAG_NO_SEQ_CHECK; |
| repl_cm->flags &= ~SFE_IPV6_CONNECTION_MATCH_FLAG_NO_SEQ_CHECK; |
| if (msg->rule_flags & SFE_RULE_CREATE_FLAG_NO_SEQ_CHECK) { |
| orig_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_NO_SEQ_CHECK; |
| repl_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_NO_SEQ_CHECK; |
| } |
| } |
| |
| /* |
| * sfe_ipv6_update_protocol_state() |
| * update protocol specified state machine. |
| */ |
| static void |
| sfe_ipv6_update_protocol_state(struct sfe_ipv6_connection *c, |
| struct sfe_ipv6_rule_create_msg *msg) |
| { |
| switch (msg->tuple.protocol) { |
| case IPPROTO_TCP: |
| sfe_ipv6_update_tcp_state(c, msg); |
| break; |
| } |
| } |
| |
| /* |
| * sfe_ipv6_update_rule() |
| * update forwarding rule after rule is created. |
| */ |
| void sfe_ipv6_update_rule(struct sfe_ipv6_rule_create_msg *msg) |
| |
| { |
| struct sfe_ipv6_connection *c; |
| struct sfe_ipv6 *si = &__si6; |
| |
| spin_lock_bh(&si->lock); |
| |
| c = sfe_ipv6_find_connection(si, |
| msg->tuple.protocol, |
| (struct sfe_ipv6_addr *)msg->tuple.flow_ip, |
| msg->tuple.flow_ident, |
| (struct sfe_ipv6_addr *)msg->tuple.return_ip, |
| msg->tuple.return_ident); |
| if (c != NULL) { |
| sfe_ipv6_update_protocol_state(c, msg); |
| } |
| |
| spin_unlock_bh(&si->lock); |
| } |
| |
| /* |
| * sfe_ipv6_create_rule() |
| * Create a forwarding rule. |
| */ |
| int sfe_ipv6_create_rule(struct sfe_ipv6_rule_create_msg *msg) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| struct sfe_ipv6_connection *c, *old_c; |
| struct sfe_ipv6_connection_match *original_cm; |
| struct sfe_ipv6_connection_match *reply_cm; |
| struct net_device *dest_dev; |
| struct net_device *src_dev; |
| struct sfe_ipv6_5tuple *tuple = &msg->tuple; |
| |
| src_dev = dev_get_by_index(&init_net, msg->conn_rule.flow_top_interface_num); |
| if (!src_dev) { |
| DEBUG_WARN("%px: Unable to find src_dev corresponding to %d\n", msg, |
| msg->conn_rule.flow_top_interface_num); |
| this_cpu_inc(si->stats_pcpu->connection_create_failures64); |
| return -EINVAL; |
| } |
| |
| dest_dev = dev_get_by_index(&init_net, msg->conn_rule.return_top_interface_num); |
| if (!dest_dev) { |
| DEBUG_WARN("%px: Unable to find dest_dev corresponding to %d\n", msg, |
| msg->conn_rule.return_top_interface_num); |
| this_cpu_inc(si->stats_pcpu->connection_create_failures64); |
| dev_put(src_dev); |
| return -EINVAL; |
| } |
| |
| if (unlikely((dest_dev->reg_state != NETREG_REGISTERED) || |
| (src_dev->reg_state != NETREG_REGISTERED))) { |
| DEBUG_WARN("%px: src_dev=%s and dest_dev=%s are unregistered\n", msg, |
| src_dev->name, dest_dev->name); |
| this_cpu_inc(si->stats_pcpu->connection_create_failures64); |
| dev_put(src_dev); |
| dev_put(dest_dev); |
| return -EINVAL; |
| } |
| |
| /* |
| * Allocate the various connection tracking objects. |
| */ |
| c = (struct sfe_ipv6_connection *)kmalloc(sizeof(struct sfe_ipv6_connection), GFP_ATOMIC); |
| if (unlikely(!c)) { |
| DEBUG_WARN("%px: memory allocation of connection entry failed\n", msg); |
| this_cpu_inc(si->stats_pcpu->connection_create_failures64); |
| dev_put(src_dev); |
| dev_put(dest_dev); |
| return -ENOMEM; |
| } |
| |
| original_cm = (struct sfe_ipv6_connection_match *)kmalloc(sizeof(struct sfe_ipv6_connection_match), GFP_ATOMIC); |
| if (unlikely(!original_cm)) { |
| this_cpu_inc(si->stats_pcpu->connection_create_failures64); |
| DEBUG_WARN("%px: memory allocation of connection match entry failed\n", msg); |
| kfree(c); |
| dev_put(src_dev); |
| dev_put(dest_dev); |
| return -ENOMEM; |
| } |
| |
| reply_cm = (struct sfe_ipv6_connection_match *)kmalloc(sizeof(struct sfe_ipv6_connection_match), GFP_ATOMIC); |
| if (unlikely(!reply_cm)) { |
| this_cpu_inc(si->stats_pcpu->connection_create_failures64); |
| DEBUG_WARN("%px: memory allocation of connection match entry failed\n", msg); |
| kfree(original_cm); |
| kfree(c); |
| dev_put(src_dev); |
| dev_put(dest_dev); |
| return -ENOMEM; |
| } |
| |
| this_cpu_inc(si->stats_pcpu->connection_create_requests64); |
| |
| spin_lock_bh(&si->lock); |
| |
| /* |
| * Check to see if there is already a flow that matches the rule we're |
| * trying to create. If there is then we can't create a new one. |
| */ |
| old_c = sfe_ipv6_find_connection(si, tuple->protocol, (struct sfe_ipv6_addr *)tuple->flow_ip, tuple->flow_ident, |
| (struct sfe_ipv6_addr *)tuple->return_ip, tuple->return_ident); |
| |
| if (old_c != NULL) { |
| this_cpu_inc(si->stats_pcpu->connection_create_collisions64); |
| |
| /* |
| * If we already have the flow then it's likely that this |
| * request to create the connection rule contains more |
| * up-to-date information. Check and update accordingly. |
| */ |
| sfe_ipv6_update_protocol_state(old_c, msg); |
| spin_unlock_bh(&si->lock); |
| |
| kfree(reply_cm); |
| kfree(original_cm); |
| kfree(c); |
| dev_put(src_dev); |
| dev_put(dest_dev); |
| |
| DEBUG_TRACE("connection already exists - p: %d\n" |
| " s: %s:%pxM:%pI6:%u, d: %s:%pxM:%pI6:%u\n", |
| tuple->protocol, |
| src_dev->name, msg->conn_rule.flow_mac, tuple->flow_ip, ntohs(tuple->flow_ident), |
| dest_dev->name, msg->conn_rule.return_mac, tuple->return_ip, ntohs(tuple->return_ident)); |
| return -EADDRINUSE; |
| } |
| |
| /* |
| * Fill in the "original" direction connection matching object. |
| * Note that the transmit MAC address is "dest_mac_xlate" because |
| * we always know both ends of a connection by their translated |
| * addresses and not their public addresses. |
| */ |
| original_cm->match_dev = src_dev; |
| original_cm->match_protocol = tuple->protocol; |
| original_cm->match_src_ip[0] = *(struct sfe_ipv6_addr *)tuple->flow_ip; |
| original_cm->match_src_port = tuple->flow_ident; |
| original_cm->match_dest_ip[0] = *(struct sfe_ipv6_addr *)tuple->return_ip; |
| original_cm->match_dest_port = tuple->return_ident; |
| |
| original_cm->xlate_src_ip[0] = *(struct sfe_ipv6_addr *)tuple->flow_ip; |
| original_cm->xlate_src_port = tuple->flow_ident; |
| original_cm->xlate_dest_ip[0] = *(struct sfe_ipv6_addr *)tuple->return_ip; |
| original_cm->xlate_dest_port = tuple->return_ident; |
| |
| atomic_set(&original_cm->rx_packet_count, 0); |
| original_cm->rx_packet_count64 = 0; |
| atomic_set(&original_cm->rx_byte_count, 0); |
| original_cm->rx_byte_count64 = 0; |
| original_cm->xmit_dev = dest_dev; |
| |
| original_cm->xmit_dev_mtu = msg->conn_rule.return_mtu; |
| memcpy(original_cm->xmit_src_mac, dest_dev->dev_addr, ETH_ALEN); |
| memcpy(original_cm->xmit_dest_mac, msg->conn_rule.return_mac, ETH_ALEN); |
| original_cm->connection = c; |
| original_cm->counter_match = reply_cm; |
| original_cm->flags = 0; |
| if (msg->valid_flags & SFE_RULE_CREATE_QOS_VALID) { |
| original_cm->priority = msg->qos_rule.flow_qos_tag; |
| original_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_PRIORITY_REMARK; |
| } |
| if (msg->valid_flags & SFE_RULE_CREATE_DSCP_MARKING_VALID) { |
| original_cm->dscp = msg->dscp_rule.flow_dscp << SFE_IPV6_DSCP_SHIFT; |
| original_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_DSCP_REMARK; |
| } |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| original_cm->flow_cookie = 0; |
| #endif |
| #ifdef CONFIG_XFRM |
| if (msg->valid_flags & SFE_RULE_CREATE_DIRECTION_VALID) { |
| original_cm->flow_accel = msg->direction_rule.flow_accel; |
| } else { |
| original_cm->flow_accel = 1; |
| } |
| #endif |
| original_cm->active_next = NULL; |
| original_cm->active_prev = NULL; |
| original_cm->active = false; |
| |
| /* |
| * For PPP links we don't write an L2 header. For everything else we do. |
| */ |
| if (!(dest_dev->flags & IFF_POINTOPOINT)) { |
| original_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_WRITE_L2_HDR; |
| |
| /* |
| * If our dev writes Ethernet headers then we can write a really fast |
| * version |
| */ |
| if (dest_dev->header_ops) { |
| if (dest_dev->header_ops->create == eth_header) { |
| original_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_WRITE_FAST_ETH_HDR; |
| } |
| } |
| } |
| |
| /* |
| * Fill in the "reply" direction connection matching object. |
| */ |
| reply_cm->match_dev = dest_dev; |
| reply_cm->match_protocol = tuple->protocol; |
| reply_cm->match_src_ip[0] = *(struct sfe_ipv6_addr *)tuple->return_ip; |
| reply_cm->match_src_port = tuple->return_ident; |
| reply_cm->match_dest_ip[0] = *(struct sfe_ipv6_addr *)tuple->flow_ip; |
| reply_cm->match_dest_port = tuple->flow_ident; |
| reply_cm->xlate_src_ip[0] = *(struct sfe_ipv6_addr *)tuple->return_ip; |
| reply_cm->xlate_src_port = tuple->return_ident; |
| reply_cm->xlate_dest_ip[0] = *(struct sfe_ipv6_addr *)tuple->flow_ip; |
| reply_cm->xlate_dest_port = tuple->flow_ident; |
| |
| atomic_set(&original_cm->rx_byte_count, 0); |
| reply_cm->rx_packet_count64 = 0; |
| atomic_set(&reply_cm->rx_byte_count, 0); |
| reply_cm->rx_byte_count64 = 0; |
| reply_cm->xmit_dev = src_dev; |
| reply_cm->xmit_dev_mtu = msg->conn_rule.flow_mtu; |
| memcpy(reply_cm->xmit_src_mac, src_dev->dev_addr, ETH_ALEN); |
| memcpy(reply_cm->xmit_dest_mac, msg->conn_rule.flow_mac, ETH_ALEN); |
| reply_cm->connection = c; |
| reply_cm->counter_match = original_cm; |
| reply_cm->flags = 0; |
| if (msg->valid_flags & SFE_RULE_CREATE_QOS_VALID) { |
| reply_cm->priority = msg->qos_rule.return_qos_tag; |
| reply_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_PRIORITY_REMARK; |
| } |
| if (msg->valid_flags & SFE_RULE_CREATE_DSCP_MARKING_VALID) { |
| reply_cm->dscp = msg->dscp_rule.return_dscp << SFE_IPV6_DSCP_SHIFT; |
| reply_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_DSCP_REMARK; |
| } |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| reply_cm->flow_cookie = 0; |
| #endif |
| #ifdef CONFIG_XFRM |
| if (msg->valid_flags & SFE_RULE_CREATE_DIRECTION_VALID) { |
| reply_cm->flow_accel = msg->direction_rule.return_accel; |
| } else { |
| reply_cm->flow_accel = 1; |
| } |
| #endif |
| reply_cm->active_next = NULL; |
| reply_cm->active_prev = NULL; |
| reply_cm->active = false; |
| |
| /* |
| * For PPP links we don't write an L2 header. For everything else we do. |
| */ |
| if (!(src_dev->flags & IFF_POINTOPOINT)) { |
| reply_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_WRITE_L2_HDR; |
| |
| /* |
| * If our dev writes Ethernet headers then we can write a really fast |
| * version. |
| */ |
| if (src_dev->header_ops) { |
| if (src_dev->header_ops->create == eth_header) { |
| reply_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_WRITE_FAST_ETH_HDR; |
| } |
| } |
| } |
| |
| /* |
| * No support for NAT in ipv6 |
| */ |
| |
| c->protocol = tuple->protocol; |
| c->src_ip[0] = *(struct sfe_ipv6_addr *)tuple->flow_ip; |
| c->src_ip_xlate[0] = *(struct sfe_ipv6_addr *)tuple->flow_ip; |
| c->src_port = tuple->flow_ident; |
| c->src_port_xlate = tuple->flow_ident; |
| c->original_dev = src_dev; |
| c->original_match = original_cm; |
| |
| c->dest_ip[0] = *(struct sfe_ipv6_addr *)tuple->return_ip; |
| c->dest_ip_xlate[0] = *(struct sfe_ipv6_addr *)tuple->return_ip; |
| c->dest_port = tuple->return_ident; |
| c->dest_port_xlate = tuple->return_ident; |
| |
| c->reply_dev = dest_dev; |
| c->reply_match = reply_cm; |
| c->mark = 0; /* No mark support */ |
| c->debug_read_seq = 0; |
| c->last_sync_jiffies = get_jiffies_64(); |
| c->removed = false; |
| |
| /* |
| * Initialize the protocol-specific information that we track. |
| */ |
| switch (tuple->protocol) { |
| case IPPROTO_TCP: |
| original_cm->protocol_state.tcp.win_scale = msg->tcp_rule.flow_window_scale; |
| original_cm->protocol_state.tcp.max_win = msg->tcp_rule.flow_max_window ? msg->tcp_rule.flow_max_window : 1; |
| original_cm->protocol_state.tcp.end = msg->tcp_rule.flow_end; |
| original_cm->protocol_state.tcp.max_end = msg->tcp_rule.flow_max_end; |
| reply_cm->protocol_state.tcp.win_scale = msg->tcp_rule.return_window_scale; |
| reply_cm->protocol_state.tcp.max_win = msg->tcp_rule.return_max_window ? msg->tcp_rule.return_max_window : 1; |
| reply_cm->protocol_state.tcp.end = msg->tcp_rule.return_end; |
| reply_cm->protocol_state.tcp.max_end = msg->tcp_rule.return_max_end; |
| if (msg->rule_flags & SFE_RULE_CREATE_FLAG_NO_SEQ_CHECK) { |
| original_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_NO_SEQ_CHECK; |
| reply_cm->flags |= SFE_IPV6_CONNECTION_MATCH_FLAG_NO_SEQ_CHECK; |
| } |
| break; |
| } |
| |
| sfe_ipv6_connection_match_compute_translations(original_cm); |
| sfe_ipv6_connection_match_compute_translations(reply_cm); |
| sfe_ipv6_insert_connection(si, c); |
| |
| spin_unlock_bh(&si->lock); |
| |
| /* |
| * We have everything we need! |
| */ |
| DEBUG_INFO("new connection - p: %d\n" |
| " s: %s:%pxM(%pxM):%pI6(%pI6):%u(%u)\n" |
| " d: %s:%pxM(%pxM):%pI6(%pI6):%u(%u)\n", |
| tuple->protocol, |
| src_dev->name, msg->conn_rule.flow_mac, NULL, |
| (void *)tuple->flow_ip, (void *)tuple->flow_ip, ntohs(tuple->flow_ident), ntohs(tuple->flow_ident), |
| dest_dev->name, NULL, msg->conn_rule.return_mac, |
| (void *)tuple->return_ip, (void *)tuple->return_ip, ntohs(tuple->return_ident), ntohs(tuple->return_ident)); |
| |
| return 0; |
| } |
| |
| /* |
| * sfe_ipv6_destroy_rule() |
| * Destroy a forwarding rule. |
| */ |
| void sfe_ipv6_destroy_rule(struct sfe_ipv6_rule_destroy_msg *msg) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| struct sfe_ipv6_connection *c; |
| bool ret; |
| struct sfe_ipv6_5tuple *tuple = &msg->tuple; |
| |
| this_cpu_inc(si->stats_pcpu->connection_destroy_requests64); |
| |
| spin_lock_bh(&si->lock); |
| |
| /* |
| * Check to see if we have a flow that matches the rule we're trying |
| * to destroy. If there isn't then we can't destroy it. |
| */ |
| c = sfe_ipv6_find_connection(si, tuple->protocol, (struct sfe_ipv6_addr *)tuple->flow_ip, tuple->flow_ident, |
| (struct sfe_ipv6_addr *)tuple->return_ip, tuple->return_ident); |
| if (!c) { |
| spin_unlock_bh(&si->lock); |
| |
| this_cpu_inc(si->stats_pcpu->connection_destroy_misses64); |
| |
| DEBUG_TRACE("connection does not exist - p: %d, s: %pI6:%u, d: %pI6:%u\n", |
| tuple->protocol, tuple->flow_ip, ntohs(tuple->flow_ident), |
| tuple->return_ip, ntohs(tuple->return_ident)); |
| return; |
| } |
| |
| /* |
| * Remove our connection details from the hash tables. |
| */ |
| ret = sfe_ipv6_remove_connection(si, c); |
| spin_unlock_bh(&si->lock); |
| |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_DESTROY); |
| } |
| |
| DEBUG_INFO("connection destroyed - p: %d, s: %pI6:%u, d: %pI6:%u\n", |
| tuple->protocol, tuple->flow_ip, ntohs(tuple->flow_ident), |
| tuple->return_ip, ntohs(tuple->return_ident)); |
| } |
| |
| /* |
| * sfe_ipv6_register_sync_rule_callback() |
| * Register a callback for rule synchronization. |
| */ |
| void sfe_ipv6_register_sync_rule_callback(sfe_sync_rule_callback_t sync_rule_callback) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| |
| spin_lock_bh(&si->lock); |
| rcu_assign_pointer(si->sync_rule_callback, sync_rule_callback); |
| spin_unlock_bh(&si->lock); |
| } |
| |
| /* |
| * sfe_ipv6_get_debug_dev() |
| */ |
| static ssize_t sfe_ipv6_get_debug_dev(struct device *dev, |
| struct device_attribute *attr, |
| char *buf) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| ssize_t count; |
| int num; |
| |
| spin_lock_bh(&si->lock); |
| num = si->debug_dev; |
| spin_unlock_bh(&si->lock); |
| |
| count = snprintf(buf, (ssize_t)PAGE_SIZE, "%d\n", num); |
| return count; |
| } |
| |
| /* |
| * sfe_ipv6_destroy_all_rules_for_dev() |
| * Destroy all connections that match a particular device. |
| * |
| * If we pass dev as NULL then this destroys all connections. |
| */ |
| void sfe_ipv6_destroy_all_rules_for_dev(struct net_device *dev) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| struct sfe_ipv6_connection *c; |
| bool ret; |
| |
| another_round: |
| spin_lock_bh(&si->lock); |
| |
| for (c = si->all_connections_head; c; c = c->all_connections_next) { |
| /* |
| * Does this connection relate to the device we are destroying? |
| */ |
| if (!dev |
| || (dev == c->original_dev) |
| || (dev == c->reply_dev)) { |
| break; |
| } |
| } |
| |
| if (c) { |
| ret = sfe_ipv6_remove_connection(si, c); |
| } |
| |
| spin_unlock_bh(&si->lock); |
| |
| if (c) { |
| if (ret) { |
| sfe_ipv6_flush_connection(si, c, SFE_SYNC_REASON_DESTROY); |
| } |
| goto another_round; |
| } |
| } |
| |
| /* |
| * sfe_ipv6_periodic_sync() |
| */ |
| #if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 15, 0)) |
| static void sfe_ipv6_periodic_sync(unsigned long arg) |
| #else |
| static void sfe_ipv6_periodic_sync(struct timer_list *tl) |
| #endif |
| { |
| #if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 15, 0)) |
| struct sfe_ipv6 *si = (struct sfe_ipv6 *)arg; |
| #else |
| struct sfe_ipv6 *si = from_timer(si, tl, timer); |
| #endif |
| u64 now_jiffies; |
| int quota; |
| sfe_sync_rule_callback_t sync_rule_callback; |
| |
| now_jiffies = get_jiffies_64(); |
| |
| rcu_read_lock(); |
| sync_rule_callback = rcu_dereference(si->sync_rule_callback); |
| if (!sync_rule_callback) { |
| rcu_read_unlock(); |
| goto done; |
| } |
| |
| spin_lock_bh(&si->lock); |
| |
| /* |
| * Get an estimate of the number of connections to parse in this sync. |
| */ |
| quota = (si->num_connections + 63) / 64; |
| |
| /* |
| * Walk the "active" list and sync the connection state. |
| */ |
| while (quota--) { |
| struct sfe_ipv6_connection_match *cm; |
| struct sfe_ipv6_connection_match *counter_cm; |
| struct sfe_ipv6_connection *c; |
| struct sfe_connection_sync sis; |
| |
| cm = si->active_head; |
| if (!cm) { |
| break; |
| } |
| |
| /* |
| * There's a possibility that our counter match is in the active list too. |
| * If it is then remove it. |
| */ |
| counter_cm = cm->counter_match; |
| if (counter_cm->active) { |
| counter_cm->active = false; |
| |
| /* |
| * We must have a connection preceding this counter match |
| * because that's the one that got us to this point, so we don't have |
| * to worry about removing the head of the list. |
| */ |
| counter_cm->active_prev->active_next = counter_cm->active_next; |
| |
| if (likely(counter_cm->active_next)) { |
| counter_cm->active_next->active_prev = counter_cm->active_prev; |
| } else { |
| si->active_tail = counter_cm->active_prev; |
| } |
| |
| counter_cm->active_next = NULL; |
| counter_cm->active_prev = NULL; |
| } |
| |
| /* |
| * Now remove the head of the active scan list. |
| */ |
| cm->active = false; |
| si->active_head = cm->active_next; |
| if (likely(cm->active_next)) { |
| cm->active_next->active_prev = NULL; |
| } else { |
| si->active_tail = NULL; |
| } |
| cm->active_next = NULL; |
| |
| /* |
| * Sync the connection state. |
| */ |
| c = cm->connection; |
| sfe_ipv6_gen_sync_connection(si, c, &sis, SFE_SYNC_REASON_STATS, now_jiffies); |
| |
| /* |
| * We don't want to be holding the lock when we sync! |
| */ |
| spin_unlock_bh(&si->lock); |
| sync_rule_callback(&sis); |
| spin_lock_bh(&si->lock); |
| } |
| |
| spin_unlock_bh(&si->lock); |
| rcu_read_unlock(); |
| |
| done: |
| mod_timer(&si->timer, jiffies + ((HZ + 99) / 100)); |
| } |
| |
| /* |
| * sfe_ipv6_debug_dev_read_start() |
| * Generate part of the XML output. |
| */ |
| static bool sfe_ipv6_debug_dev_read_start(struct sfe_ipv6 *si, char *buffer, char *msg, size_t *length, |
| int *total_read, struct sfe_ipv6_debug_xml_write_state *ws) |
| { |
| int bytes_read; |
| |
| si->debug_read_seq++; |
| |
| bytes_read = snprintf(msg, CHAR_DEV_MSG_SIZE, "<sfe_ipv6>\n"); |
| if (copy_to_user(buffer + *total_read, msg, CHAR_DEV_MSG_SIZE)) { |
| return false; |
| } |
| |
| *length -= bytes_read; |
| *total_read += bytes_read; |
| |
| ws->state++; |
| return true; |
| } |
| |
| /* |
| * sfe_ipv6_debug_dev_read_connections_start() |
| * Generate part of the XML output. |
| */ |
| static bool sfe_ipv6_debug_dev_read_connections_start(struct sfe_ipv6 *si, char *buffer, char *msg, size_t *length, |
| int *total_read, struct sfe_ipv6_debug_xml_write_state *ws) |
| { |
| int bytes_read; |
| |
| bytes_read = snprintf(msg, CHAR_DEV_MSG_SIZE, "\t<connections>\n"); |
| if (copy_to_user(buffer + *total_read, msg, CHAR_DEV_MSG_SIZE)) { |
| return false; |
| } |
| |
| *length -= bytes_read; |
| *total_read += bytes_read; |
| |
| ws->state++; |
| return true; |
| } |
| |
| /* |
| * sfe_ipv6_debug_dev_read_connections_connection() |
| * Generate part of the XML output. |
| */ |
| static bool sfe_ipv6_debug_dev_read_connections_connection(struct sfe_ipv6 *si, char *buffer, char *msg, size_t *length, |
| int *total_read, struct sfe_ipv6_debug_xml_write_state *ws) |
| { |
| struct sfe_ipv6_connection *c; |
| struct sfe_ipv6_connection_match *original_cm; |
| struct sfe_ipv6_connection_match *reply_cm; |
| int bytes_read; |
| int protocol; |
| struct net_device *src_dev; |
| struct sfe_ipv6_addr src_ip; |
| struct sfe_ipv6_addr src_ip_xlate; |
| __be16 src_port; |
| __be16 src_port_xlate; |
| u64 src_rx_packets; |
| u64 src_rx_bytes; |
| struct net_device *dest_dev; |
| struct sfe_ipv6_addr dest_ip; |
| struct sfe_ipv6_addr dest_ip_xlate; |
| __be16 dest_port; |
| __be16 dest_port_xlate; |
| u64 dest_rx_packets; |
| u64 dest_rx_bytes; |
| u64 last_sync_jiffies; |
| u32 mark, src_priority, dest_priority, src_dscp, dest_dscp; |
| u32 packet, byte; |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| int src_flow_cookie, dst_flow_cookie; |
| #endif |
| |
| spin_lock_bh(&si->lock); |
| |
| for (c = si->all_connections_head; c; c = c->all_connections_next) { |
| if (c->debug_read_seq < si->debug_read_seq) { |
| c->debug_read_seq = si->debug_read_seq; |
| break; |
| } |
| } |
| |
| /* |
| * If there were no connections then move to the next state. |
| */ |
| if (!c) { |
| spin_unlock_bh(&si->lock); |
| ws->state++; |
| return true; |
| } |
| |
| original_cm = c->original_match; |
| reply_cm = c->reply_match; |
| |
| protocol = c->protocol; |
| src_dev = c->original_dev; |
| src_ip = c->src_ip[0]; |
| src_ip_xlate = c->src_ip_xlate[0]; |
| src_port = c->src_port; |
| src_port_xlate = c->src_port_xlate; |
| src_priority = original_cm->priority; |
| src_dscp = original_cm->dscp >> SFE_IPV6_DSCP_SHIFT; |
| |
| sfe_ipv6_connection_match_update_summary_stats(original_cm, &packet, &byte); |
| sfe_ipv6_connection_match_update_summary_stats(reply_cm, &packet, &byte); |
| |
| src_rx_packets = original_cm->rx_packet_count64; |
| src_rx_bytes = original_cm->rx_byte_count64; |
| dest_dev = c->reply_dev; |
| dest_ip = c->dest_ip[0]; |
| dest_ip_xlate = c->dest_ip_xlate[0]; |
| dest_port = c->dest_port; |
| dest_port_xlate = c->dest_port_xlate; |
| dest_priority = reply_cm->priority; |
| dest_dscp = reply_cm->dscp >> SFE_IPV6_DSCP_SHIFT; |
| dest_rx_packets = reply_cm->rx_packet_count64; |
| dest_rx_bytes = reply_cm->rx_byte_count64; |
| last_sync_jiffies = get_jiffies_64() - c->last_sync_jiffies; |
| mark = c->mark; |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| src_flow_cookie = original_cm->flow_cookie; |
| dst_flow_cookie = reply_cm->flow_cookie; |
| #endif |
| spin_unlock_bh(&si->lock); |
| |
| bytes_read = snprintf(msg, CHAR_DEV_MSG_SIZE, "\t\t<connection " |
| "protocol=\"%u\" " |
| "src_dev=\"%s\" " |
| "src_ip=\"%pI6\" src_ip_xlate=\"%pI6\" " |
| "src_port=\"%u\" src_port_xlate=\"%u\" " |
| "src_priority=\"%u\" src_dscp=\"%u\" " |
| "src_rx_pkts=\"%llu\" src_rx_bytes=\"%llu\" " |
| "dest_dev=\"%s\" " |
| "dest_ip=\"%pI6\" dest_ip_xlate=\"%pI6\" " |
| "dest_port=\"%u\" dest_port_xlate=\"%u\" " |
| "dest_priority=\"%u\" dest_dscp=\"%u\" " |
| "dest_rx_pkts=\"%llu\" dest_rx_bytes=\"%llu\" " |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| "src_flow_cookie=\"%d\" dst_flow_cookie=\"%d\" " |
| #endif |
| "last_sync=\"%llu\" " |
| "mark=\"%08x\" />\n", |
| protocol, |
| src_dev->name, |
| &src_ip, &src_ip_xlate, |
| ntohs(src_port), ntohs(src_port_xlate), |
| src_priority, src_dscp, |
| src_rx_packets, src_rx_bytes, |
| dest_dev->name, |
| &dest_ip, &dest_ip_xlate, |
| ntohs(dest_port), ntohs(dest_port_xlate), |
| dest_priority, dest_dscp, |
| dest_rx_packets, dest_rx_bytes, |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| src_flow_cookie, dst_flow_cookie, |
| #endif |
| last_sync_jiffies, mark); |
| |
| if (copy_to_user(buffer + *total_read, msg, CHAR_DEV_MSG_SIZE)) { |
| return false; |
| } |
| |
| *length -= bytes_read; |
| *total_read += bytes_read; |
| |
| return true; |
| } |
| |
| /* |
| * sfe_ipv6_debug_dev_read_connections_end() |
| * Generate part of the XML output. |
| */ |
| static bool sfe_ipv6_debug_dev_read_connections_end(struct sfe_ipv6 *si, char *buffer, char *msg, size_t *length, |
| int *total_read, struct sfe_ipv6_debug_xml_write_state *ws) |
| { |
| int bytes_read; |
| |
| bytes_read = snprintf(msg, CHAR_DEV_MSG_SIZE, "\t</connections>\n"); |
| if (copy_to_user(buffer + *total_read, msg, CHAR_DEV_MSG_SIZE)) { |
| return false; |
| } |
| |
| *length -= bytes_read; |
| *total_read += bytes_read; |
| |
| ws->state++; |
| return true; |
| } |
| |
| /* |
| * sfe_ipv6_debug_dev_read_exceptions_start() |
| * Generate part of the XML output. |
| */ |
| static bool sfe_ipv6_debug_dev_read_exceptions_start(struct sfe_ipv6 *si, char *buffer, char *msg, size_t *length, |
| int *total_read, struct sfe_ipv6_debug_xml_write_state *ws) |
| { |
| int bytes_read; |
| |
| bytes_read = snprintf(msg, CHAR_DEV_MSG_SIZE, "\t<exceptions>\n"); |
| if (copy_to_user(buffer + *total_read, msg, CHAR_DEV_MSG_SIZE)) { |
| return false; |
| } |
| |
| *length -= bytes_read; |
| *total_read += bytes_read; |
| |
| ws->state++; |
| return true; |
| } |
| |
| /* |
| * sfe_ipv6_debug_dev_read_exceptions_exception() |
| * Generate part of the XML output. |
| */ |
| static bool sfe_ipv6_debug_dev_read_exceptions_exception(struct sfe_ipv6 *si, char *buffer, char *msg, size_t *length, |
| int *total_read, struct sfe_ipv6_debug_xml_write_state *ws) |
| { |
| int i; |
| u64 val = 0; |
| |
| for_each_possible_cpu(i) { |
| const struct sfe_ipv6_stats *s = per_cpu_ptr(si->stats_pcpu, i); |
| val += s->exception_events64[ws->iter_exception]; |
| } |
| |
| if (val) { |
| int bytes_read; |
| |
| bytes_read = snprintf(msg, CHAR_DEV_MSG_SIZE, |
| "\t\t<exception name=\"%s\" count=\"%llu\" />\n", |
| sfe_ipv6_exception_events_string[ws->iter_exception], |
| val); |
| |
| if (copy_to_user(buffer + *total_read, msg, CHAR_DEV_MSG_SIZE)) { |
| return false; |
| } |
| |
| *length -= bytes_read; |
| *total_read += bytes_read; |
| } |
| |
| ws->iter_exception++; |
| if (ws->iter_exception >= SFE_IPV6_EXCEPTION_EVENT_LAST) { |
| ws->iter_exception = 0; |
| ws->state++; |
| } |
| |
| return true; |
| } |
| |
| /* |
| * sfe_ipv6_debug_dev_read_exceptions_end() |
| * Generate part of the XML output. |
| */ |
| static bool sfe_ipv6_debug_dev_read_exceptions_end(struct sfe_ipv6 *si, char *buffer, char *msg, size_t *length, |
| int *total_read, struct sfe_ipv6_debug_xml_write_state *ws) |
| { |
| int bytes_read; |
| |
| bytes_read = snprintf(msg, CHAR_DEV_MSG_SIZE, "\t</exceptions>\n"); |
| if (copy_to_user(buffer + *total_read, msg, CHAR_DEV_MSG_SIZE)) { |
| return false; |
| } |
| |
| *length -= bytes_read; |
| *total_read += bytes_read; |
| |
| ws->state++; |
| return true; |
| } |
| |
| /* |
| * sfe_ipv6_debug_dev_read_stats() |
| * Generate part of the XML output. |
| */ |
| static bool sfe_ipv6_debug_dev_read_stats(struct sfe_ipv6 *si, char *buffer, char *msg, size_t *length, |
| int *total_read, struct sfe_ipv6_debug_xml_write_state *ws) |
| { |
| int bytes_read; |
| struct sfe_ipv6_stats stats; |
| unsigned int num_conn; |
| |
| sfe_ipv6_update_summary_stats(si, &stats); |
| |
| spin_lock_bh(&si->lock); |
| num_conn = si->num_connections; |
| spin_unlock_bh(&si->lock); |
| |
| bytes_read = snprintf(msg, CHAR_DEV_MSG_SIZE, "\t<stats " |
| "num_connections=\"%u\" " |
| "pkts_forwarded=\"%llu\" pkts_not_forwarded=\"%llu\" " |
| "create_requests=\"%llu\" create_collisions=\"%llu\" " |
| "create_failures=\"%llu\" " |
| "destroy_requests=\"%llu\" destroy_misses=\"%llu\" " |
| "flushes=\"%llu\" " |
| "hash_hits=\"%llu\" hash_reorders=\"%llu\" />\n", |
| |
| num_conn, |
| stats.packets_forwarded64, |
| stats.packets_not_forwarded64, |
| stats.connection_create_requests64, |
| stats.connection_create_collisions64, |
| stats.connection_create_failures64, |
| stats.connection_destroy_requests64, |
| stats.connection_destroy_misses64, |
| stats.connection_flushes64, |
| stats.connection_match_hash_hits64, |
| stats.connection_match_hash_reorders64); |
| if (copy_to_user(buffer + *total_read, msg, CHAR_DEV_MSG_SIZE)) { |
| return false; |
| } |
| |
| *length -= bytes_read; |
| *total_read += bytes_read; |
| |
| ws->state++; |
| return true; |
| } |
| |
| /* |
| * sfe_ipv6_debug_dev_read_end() |
| * Generate part of the XML output. |
| */ |
| static bool sfe_ipv6_debug_dev_read_end(struct sfe_ipv6 *si, char *buffer, char *msg, size_t *length, |
| int *total_read, struct sfe_ipv6_debug_xml_write_state *ws) |
| { |
| int bytes_read; |
| |
| bytes_read = snprintf(msg, CHAR_DEV_MSG_SIZE, "</sfe_ipv6>\n"); |
| if (copy_to_user(buffer + *total_read, msg, CHAR_DEV_MSG_SIZE)) { |
| return false; |
| } |
| |
| *length -= bytes_read; |
| *total_read += bytes_read; |
| |
| ws->state++; |
| return true; |
| } |
| |
| /* |
| * Array of write functions that write various XML elements that correspond to |
| * our XML output state machine. |
| */ |
| static sfe_ipv6_debug_xml_write_method_t sfe_ipv6_debug_xml_write_methods[SFE_IPV6_DEBUG_XML_STATE_DONE] = { |
| sfe_ipv6_debug_dev_read_start, |
| sfe_ipv6_debug_dev_read_connections_start, |
| sfe_ipv6_debug_dev_read_connections_connection, |
| sfe_ipv6_debug_dev_read_connections_end, |
| sfe_ipv6_debug_dev_read_exceptions_start, |
| sfe_ipv6_debug_dev_read_exceptions_exception, |
| sfe_ipv6_debug_dev_read_exceptions_end, |
| sfe_ipv6_debug_dev_read_stats, |
| sfe_ipv6_debug_dev_read_end, |
| }; |
| |
| /* |
| * sfe_ipv6_debug_dev_read() |
| * Send info to userspace upon read request from user |
| */ |
| static ssize_t sfe_ipv6_debug_dev_read(struct file *filp, char *buffer, size_t length, loff_t *offset) |
| { |
| char msg[CHAR_DEV_MSG_SIZE]; |
| int total_read = 0; |
| struct sfe_ipv6_debug_xml_write_state *ws; |
| struct sfe_ipv6 *si = &__si6; |
| |
| ws = (struct sfe_ipv6_debug_xml_write_state *)filp->private_data; |
| while ((ws->state != SFE_IPV6_DEBUG_XML_STATE_DONE) && (length > CHAR_DEV_MSG_SIZE)) { |
| if ((sfe_ipv6_debug_xml_write_methods[ws->state])(si, buffer, msg, &length, &total_read, ws)) { |
| continue; |
| } |
| } |
| return total_read; |
| } |
| |
| /* |
| * sfe_ipv6_debug_dev_open() |
| */ |
| static int sfe_ipv6_debug_dev_open(struct inode *inode, struct file *file) |
| { |
| struct sfe_ipv6_debug_xml_write_state *ws; |
| |
| ws = (struct sfe_ipv6_debug_xml_write_state *)file->private_data; |
| if (ws) { |
| return 0; |
| } |
| |
| ws = kzalloc(sizeof(struct sfe_ipv6_debug_xml_write_state), GFP_KERNEL); |
| if (!ws) { |
| return -ENOMEM; |
| } |
| |
| ws->state = SFE_IPV6_DEBUG_XML_STATE_START; |
| file->private_data = ws; |
| |
| return 0; |
| } |
| |
| /* |
| * sfe_ipv6_debug_dev_release() |
| */ |
| static int sfe_ipv6_debug_dev_release(struct inode *inode, struct file *file) |
| { |
| struct sfe_ipv6_debug_xml_write_state *ws; |
| |
| ws = (struct sfe_ipv6_debug_xml_write_state *)file->private_data; |
| if (ws) { |
| /* |
| * We've finished with our output so free the write state. |
| */ |
| kfree(ws); |
| file->private_data = NULL; |
| } |
| |
| return 0; |
| } |
| |
| /* |
| * File operations used in the debug char device |
| */ |
| static struct file_operations sfe_ipv6_debug_dev_fops = { |
| .read = sfe_ipv6_debug_dev_read, |
| .open = sfe_ipv6_debug_dev_open, |
| .release = sfe_ipv6_debug_dev_release |
| }; |
| |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| /* |
| * sfe_ipv6_register_flow_cookie_cb |
| * register a function in SFE to let SFE use this function to configure flow cookie for a flow |
| * |
| * Hardware driver which support flow cookie should register a callback function in SFE. Then SFE |
| * can use this function to configure flow cookie for a flow. |
| * return: 0, success; !=0, fail |
| */ |
| int sfe_ipv6_register_flow_cookie_cb(sfe_ipv6_flow_cookie_set_func_t cb) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| |
| BUG_ON(!cb); |
| |
| if (si->flow_cookie_set_func) { |
| return -1; |
| } |
| |
| rcu_assign_pointer(si->flow_cookie_set_func, cb); |
| return 0; |
| } |
| |
| /* |
| * sfe_ipv6_unregister_flow_cookie_cb |
| * unregister function which is used to configure flow cookie for a flow |
| * |
| * return: 0, success; !=0, fail |
| */ |
| int sfe_ipv6_unregister_flow_cookie_cb(sfe_ipv6_flow_cookie_set_func_t cb) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| |
| RCU_INIT_POINTER(si->flow_cookie_set_func, NULL); |
| return 0; |
| } |
| |
| /* |
| * sfe_ipv6_get_flow_cookie() |
| */ |
| static ssize_t sfe_ipv6_get_flow_cookie(struct device *dev, |
| struct device_attribute *attr, |
| char *buf) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| return snprintf(buf, (ssize_t)PAGE_SIZE, "%d\n", si->flow_cookie_enable); |
| } |
| |
| /* |
| * sfe_ipv6_set_flow_cookie() |
| */ |
| static ssize_t sfe_ipv6_set_flow_cookie(struct device *dev, |
| struct device_attribute *attr, |
| const char *buf, size_t size) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| strict_strtol(buf, 0, (long int *)&si->flow_cookie_enable); |
| |
| return size; |
| } |
| |
| /* |
| * sysfs attributes. |
| */ |
| static const struct device_attribute sfe_ipv6_flow_cookie_attr = |
| __ATTR(flow_cookie_enable, S_IWUSR | S_IRUGO, sfe_ipv6_get_flow_cookie, sfe_ipv6_set_flow_cookie); |
| #endif /*CONFIG_NF_FLOW_COOKIE*/ |
| |
| /* |
| * sfe_ipv6_hash_init() |
| * Initialize conn match hash lists |
| */ |
| static void sfe_ipv6_conn_match_hash_init(struct sfe_ipv6 *si, int len) |
| { |
| struct hlist_head *hash_list = si->hlist_conn_match_hash_head; |
| int i; |
| |
| for (i = 0; i < len; i++) { |
| INIT_HLIST_HEAD(&hash_list[i]); |
| } |
| } |
| |
| /* |
| * sfe_ipv6_init() |
| */ |
| int sfe_ipv6_init(void) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| int result = -1; |
| |
| DEBUG_INFO("SFE IPv6 init\n"); |
| |
| sfe_ipv6_conn_match_hash_init(si, ARRAY_SIZE(si->hlist_conn_match_hash_head)); |
| |
| si->stats_pcpu = alloc_percpu_gfp(struct sfe_ipv6_stats, GFP_KERNEL | __GFP_ZERO); |
| if (!si->stats_pcpu) { |
| DEBUG_ERROR("failed to allocate stats memory for sfe_ipv6\n"); |
| goto exit0; |
| } |
| |
| /* |
| * Create sys/sfe_ipv6 |
| */ |
| si->sys_sfe_ipv6 = kobject_create_and_add("sfe_ipv6", NULL); |
| if (!si->sys_sfe_ipv6) { |
| DEBUG_ERROR("failed to register sfe_ipv6\n"); |
| goto exit1; |
| } |
| |
| /* |
| * Create files, one for each parameter supported by this module. |
| */ |
| result = sysfs_create_file(si->sys_sfe_ipv6, &sfe_ipv6_debug_dev_attr.attr); |
| if (result) { |
| DEBUG_ERROR("failed to register debug dev file: %d\n", result); |
| goto exit2; |
| } |
| |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| result = sysfs_create_file(si->sys_sfe_ipv6, &sfe_ipv6_flow_cookie_attr.attr); |
| if (result) { |
| DEBUG_ERROR("failed to register flow cookie enable file: %d\n", result); |
| goto exit3; |
| } |
| #endif /* CONFIG_NF_FLOW_COOKIE */ |
| |
| /* |
| * Register our debug char device. |
| */ |
| result = register_chrdev(0, "sfe_ipv6", &sfe_ipv6_debug_dev_fops); |
| if (result < 0) { |
| DEBUG_ERROR("Failed to register chrdev: %d\n", result); |
| goto exit4; |
| } |
| |
| si->debug_dev = result; |
| |
| /* |
| * Create a timer to handle periodic statistics. |
| */ |
| #if (LINUX_VERSION_CODE < KERNEL_VERSION(4, 15, 0)) |
| setup_timer(&si->timer, sfe_ipv6_periodic_sync, (unsigned long)si); |
| #else |
| timer_setup(&si->timer, sfe_ipv6_periodic_sync, 0); |
| #endif |
| mod_timer(&si->timer, jiffies + ((HZ + 99) / 100)); |
| |
| spin_lock_init(&si->lock); |
| |
| return 0; |
| |
| exit4: |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| sysfs_remove_file(si->sys_sfe_ipv6, &sfe_ipv6_flow_cookie_attr.attr); |
| |
| exit3: |
| #endif /* CONFIG_NF_FLOW_COOKIE */ |
| sysfs_remove_file(si->sys_sfe_ipv6, &sfe_ipv6_debug_dev_attr.attr); |
| |
| exit2: |
| kobject_put(si->sys_sfe_ipv6); |
| |
| exit1: |
| free_percpu(si->stats_pcpu); |
| |
| exit0: |
| return result; |
| } |
| |
| /* |
| * sfe_ipv6_exit() |
| */ |
| void sfe_ipv6_exit(void) |
| { |
| struct sfe_ipv6 *si = &__si6; |
| |
| DEBUG_INFO("SFE IPv6 exit\n"); |
| |
| /* |
| * Destroy all connections. |
| */ |
| sfe_ipv6_destroy_all_rules_for_dev(NULL); |
| |
| del_timer_sync(&si->timer); |
| |
| unregister_chrdev(si->debug_dev, "sfe_ipv6"); |
| |
| free_percpu(si->stats_pcpu); |
| |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| sysfs_remove_file(si->sys_sfe_ipv6, &sfe_ipv6_flow_cookie_attr.attr); |
| #endif /* CONFIG_NF_FLOW_COOKIE */ |
| sysfs_remove_file(si->sys_sfe_ipv6, &sfe_ipv6_debug_dev_attr.attr); |
| |
| kobject_put(si->sys_sfe_ipv6); |
| } |
| |
| #ifdef CONFIG_NF_FLOW_COOKIE |
| EXPORT_SYMBOL(sfe_ipv6_register_flow_cookie_cb); |
| EXPORT_SYMBOL(sfe_ipv6_unregister_flow_cookie_cb); |
| #endif |