This patch adds a function to translate the ethtool_rx_flow_spec
structure to the flow_rule representation.

This allows us to reuse code from the driver side given that both flower
and ethtool_rx_flow interfaces use the same representation.

Signed-off-by: Pablo Neira Ayuso <pa...@netfilter.org>
---
v3: Suggested by Jiri Pirko:
        - Add struct ethtool_rx_flow_rule, keep placeholder to private
          dissector information.
    Reported by Manish Chopra:
        - Fix incorrect dissector user_keys flags.

 include/linux/ethtool.h |  10 +++
 net/core/ethtool.c      | 189 ++++++++++++++++++++++++++++++++++++++++++++++++
 2 files changed, 199 insertions(+)

diff --git a/include/linux/ethtool.h b/include/linux/ethtool.h
index afd9596ce636..99849e0858b2 100644
--- a/include/linux/ethtool.h
+++ b/include/linux/ethtool.h
@@ -400,4 +400,14 @@ struct ethtool_ops {
        void    (*get_ethtool_phy_stats)(struct net_device *,
                                         struct ethtool_stats *, u64 *);
 };
+
+struct ethtool_rx_flow_rule {
+       struct flow_rule        *rule;
+       unsigned long           priv[0];
+};
+
+struct ethtool_rx_flow_rule *
+ethtool_rx_flow_rule_alloc(const struct ethtool_rx_flow_spec *fs);
+void ethtool_rx_flow_rule_free(struct ethtool_rx_flow_rule *rule);
+
 #endif /* _LINUX_ETHTOOL_H */
diff --git a/net/core/ethtool.c b/net/core/ethtool.c
index d05402868575..e679d6478371 100644
--- a/net/core/ethtool.c
+++ b/net/core/ethtool.c
@@ -28,6 +28,7 @@
 #include <linux/sched/signal.h>
 #include <linux/net.h>
 #include <net/xdp_sock.h>
+#include <net/flow_offload.h>
 
 /*
  * Some useful ethtool_ops methods that're device independent.
@@ -2808,3 +2809,191 @@ int dev_ethtool(struct net *net, struct ifreq *ifr)
 
        return rc;
 }
+
+struct ethtool_rx_flow_key {
+       struct flow_dissector_key_basic                 basic;
+       union {
+               struct flow_dissector_key_ipv4_addrs    ipv4;
+               struct flow_dissector_key_ipv6_addrs    ipv6;
+       };
+       struct flow_dissector_key_ports                 tp;
+       struct flow_dissector_key_ip                    ip;
+} __aligned(BITS_PER_LONG / 8); /* Ensure that we can do comparisons as longs. 
*/
+
+struct ethtool_rx_flow_match {
+       struct flow_dissector           dissector;
+       struct ethtool_rx_flow_key      key;
+       struct ethtool_rx_flow_key      mask;
+};
+
+struct ethtool_rx_flow_rule *
+ethtool_rx_flow_rule_alloc(const struct ethtool_rx_flow_spec *fs)
+{
+       static struct in6_addr zero_addr = {};
+       struct ethtool_rx_flow_match *match;
+       struct ethtool_rx_flow_rule *flow;
+       struct flow_action_entry *act;
+
+       flow = kzalloc(sizeof(struct ethtool_rx_flow_rule) +
+                      sizeof(struct ethtool_rx_flow_match), GFP_KERNEL);
+       if (!flow)
+               return NULL;
+
+       /* ethtool_rx supports only one single action per rule. */
+       flow->rule = flow_rule_alloc(1);
+       if (!flow->rule) {
+               kfree(flow);
+               return NULL;
+       }
+
+       match = (struct ethtool_rx_flow_match *)flow->priv;
+       flow->rule->match.dissector     = &match->dissector;
+       flow->rule->match.mask          = &match->mask;
+       flow->rule->match.key           = &match->key;
+
+       match->mask.basic.n_proto = 0xffff;
+
+       switch (fs->flow_type & ~FLOW_EXT) {
+       case TCP_V4_FLOW:
+       case UDP_V4_FLOW: {
+               const struct ethtool_tcpip4_spec *v4_spec, *v4_m_spec;
+
+               match->key.basic.n_proto = htons(ETH_P_IP);
+
+               v4_spec = &fs->h_u.tcp_ip4_spec;
+               v4_m_spec = &fs->m_u.tcp_ip4_spec;
+
+               if (v4_m_spec->ip4src) {
+                       match->key.ipv4.src = v4_spec->ip4src;
+                       match->mask.ipv4.src = v4_m_spec->ip4src;
+               }
+               if (v4_m_spec->ip4dst) {
+                       match->key.ipv4.dst = v4_spec->ip4dst;
+                       match->mask.ipv4.dst = v4_m_spec->ip4dst;
+               }
+               if (v4_m_spec->ip4src ||
+                   v4_m_spec->ip4dst) {
+                       match->dissector.used_keys |=
+                               (1 << FLOW_DISSECTOR_KEY_IPV4_ADDRS);
+                       match->dissector.offset[FLOW_DISSECTOR_KEY_IPV4_ADDRS] =
+                               offsetof(struct ethtool_rx_flow_key, ipv4);
+               }
+               if (v4_m_spec->psrc) {
+                       match->key.tp.src = v4_spec->psrc;
+                       match->mask.tp.src = v4_m_spec->psrc;
+               }
+               if (v4_m_spec->pdst) {
+                       match->key.tp.dst = v4_spec->pdst;
+                       match->mask.tp.dst = v4_m_spec->pdst;
+               }
+               if (v4_m_spec->psrc ||
+                   v4_m_spec->pdst) {
+                       match->dissector.used_keys |=
+                               (1 << FLOW_DISSECTOR_KEY_PORTS);
+                       match->dissector.offset[FLOW_DISSECTOR_KEY_PORTS] =
+                               offsetof(struct ethtool_rx_flow_key, tp);
+               }
+               if (v4_m_spec->tos) {
+                       match->key.ip.tos = v4_spec->pdst;
+                       match->mask.ip.tos = v4_m_spec->pdst;
+                       match->dissector.used_keys |=
+                               (1 << FLOW_DISSECTOR_KEY_IP);
+                       match->dissector.offset[FLOW_DISSECTOR_KEY_IP] =
+                               offsetof(struct ethtool_rx_flow_key, ip);
+               }
+               }
+               break;
+       case TCP_V6_FLOW:
+       case UDP_V6_FLOW: {
+               const struct ethtool_tcpip6_spec *v6_spec, *v6_m_spec;
+
+               match->key.basic.n_proto = htons(ETH_P_IPV6);
+
+               v6_spec = &fs->h_u.tcp_ip6_spec;
+               v6_m_spec = &fs->m_u.tcp_ip6_spec;
+               if (memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr))) {
+                       memcpy(&match->key.ipv6.src, v6_spec->ip6src,
+                              sizeof(match->key.ipv6.src));
+                       memcpy(&match->mask.ipv6.src, v6_m_spec->ip6src,
+                              sizeof(match->mask.ipv6.src));
+               }
+               if (memcmp(v6_m_spec->ip6dst, &zero_addr, sizeof(zero_addr))) {
+                       memcpy(&match->key.ipv6.dst, v6_spec->ip6dst,
+                              sizeof(match->key.ipv6.dst));
+                       memcpy(&match->mask.ipv6.dst, v6_m_spec->ip6dst,
+                              sizeof(match->mask.ipv6.dst));
+               }
+               if (memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr)) ||
+                   memcmp(v6_m_spec->ip6src, &zero_addr, sizeof(zero_addr))) {
+                       match->dissector.used_keys |=
+                               (1 << FLOW_DISSECTOR_KEY_IPV6_ADDRS);
+                       match->dissector.offset[FLOW_DISSECTOR_KEY_IPV6_ADDRS] =
+                               offsetof(struct ethtool_rx_flow_key, ipv6);
+               }
+               if (v6_m_spec->psrc) {
+                       match->key.tp.src = v6_spec->psrc;
+                       match->mask.tp.src = v6_m_spec->psrc;
+               }
+               if (v6_m_spec->pdst) {
+                       match->key.tp.dst = v6_spec->pdst;
+                       match->mask.tp.dst = v6_m_spec->pdst;
+               }
+               if (v6_m_spec->psrc ||
+                   v6_m_spec->pdst) {
+                       match->dissector.used_keys |=
+                               (1 << FLOW_DISSECTOR_KEY_PORTS);
+                       match->dissector.offset[FLOW_DISSECTOR_KEY_PORTS] =
+                               offsetof(struct ethtool_rx_flow_key, tp);
+               }
+               if (v6_m_spec->tclass) {
+                       match->key.ip.tos = v6_spec->tclass;
+                       match->mask.ip.tos = v6_m_spec->tclass;
+                       match->dissector.used_keys |=
+                               (1 << FLOW_DISSECTOR_KEY_IP);
+                       match->dissector.offset[FLOW_DISSECTOR_KEY_IP] =
+                               offsetof(struct ethtool_rx_flow_key, ip);
+               }
+               }
+               break;
+       }
+
+       switch (fs->flow_type & ~FLOW_EXT) {
+       case TCP_V4_FLOW:
+       case TCP_V6_FLOW:
+               match->key.basic.ip_proto = IPPROTO_TCP;
+               break;
+       case UDP_V4_FLOW:
+       case UDP_V6_FLOW:
+               match->key.basic.ip_proto = IPPROTO_UDP;
+               break;
+       }
+       match->mask.basic.ip_proto = 0xff;
+
+       match->dissector.used_keys |= (1 << FLOW_DISSECTOR_KEY_BASIC);
+       match->dissector.offset[FLOW_DISSECTOR_KEY_BASIC] =
+               offsetof(struct ethtool_rx_flow_key, basic);
+
+       act = &flow->rule->action.entries[0];
+       switch (fs->ring_cookie) {
+       case RX_CLS_FLOW_DISC:
+               act->id = FLOW_ACTION_DROP;
+               break;
+       case RX_CLS_FLOW_WAKE:
+               act->id = FLOW_ACTION_WAKE;
+               break;
+       default:
+               act->id = FLOW_ACTION_QUEUE;
+               act->queue_index = fs->ring_cookie;
+               break;
+       }
+
+       return flow;
+}
+EXPORT_SYMBOL(ethtool_rx_flow_rule_alloc);
+
+void ethtool_rx_flow_rule_free(struct ethtool_rx_flow_rule *flow)
+{
+       kfree(flow->rule);
+       kfree(flow);
+}
+EXPORT_SYMBOL(ethtool_rx_flow_rule_free);
-- 
2.11.0

Reply via email to