cachepc-linux

Fork of AMDESE/linux with modifications for CachePC side-channel attack
git clone https://git.sinitax.com/sinitax/cachepc-linux
Log | Files | Refs | README | LICENSE | sfeed.txt

flow.h (8860B)


      1/* SPDX-License-Identifier: GPL-2.0-only */
      2/*
      3 * Copyright (c) 2007-2017 Nicira, Inc.
      4 */
      5
      6#ifndef FLOW_H
      7#define FLOW_H 1
      8
      9#include <linux/cache.h>
     10#include <linux/kernel.h>
     11#include <linux/netlink.h>
     12#include <linux/openvswitch.h>
     13#include <linux/spinlock.h>
     14#include <linux/types.h>
     15#include <linux/rcupdate.h>
     16#include <linux/if_ether.h>
     17#include <linux/in6.h>
     18#include <linux/jiffies.h>
     19#include <linux/time.h>
     20#include <linux/cpumask.h>
     21#include <net/inet_ecn.h>
     22#include <net/ip_tunnels.h>
     23#include <net/dst_metadata.h>
     24#include <net/nsh.h>
     25
     26struct sk_buff;
     27
     28enum sw_flow_mac_proto {
     29	MAC_PROTO_NONE = 0,
     30	MAC_PROTO_ETHERNET,
     31};
     32#define SW_FLOW_KEY_INVALID	0x80
     33#define MPLS_LABEL_DEPTH       3
     34
     35/* Bit definitions for IPv6 Extension Header pseudo-field. */
     36enum ofp12_ipv6exthdr_flags {
     37	OFPIEH12_NONEXT = 1 << 0,   /* "No next header" encountered. */
     38	OFPIEH12_ESP    = 1 << 1,   /* Encrypted Sec Payload header present. */
     39	OFPIEH12_AUTH   = 1 << 2,   /* Authentication header present. */
     40	OFPIEH12_DEST   = 1 << 3,   /* 1 or 2 dest headers present. */
     41	OFPIEH12_FRAG   = 1 << 4,   /* Fragment header present. */
     42	OFPIEH12_ROUTER = 1 << 5,   /* Router header present. */
     43	OFPIEH12_HOP    = 1 << 6,   /* Hop-by-hop header present. */
     44	OFPIEH12_UNREP  = 1 << 7,   /* Unexpected repeats encountered. */
     45	OFPIEH12_UNSEQ  = 1 << 8    /* Unexpected sequencing encountered. */
     46};
     47
     48/* Store options at the end of the array if they are less than the
     49 * maximum size. This allows us to get the benefits of variable length
     50 * matching for small options.
     51 */
     52#define TUN_METADATA_OFFSET(opt_len) \
     53	(sizeof_field(struct sw_flow_key, tun_opts) - opt_len)
     54#define TUN_METADATA_OPTS(flow_key, opt_len) \
     55	((void *)((flow_key)->tun_opts + TUN_METADATA_OFFSET(opt_len)))
     56
     57struct ovs_tunnel_info {
     58	struct metadata_dst	*tun_dst;
     59};
     60
     61struct vlan_head {
     62	__be16 tpid; /* Vlan type. Generally 802.1q or 802.1ad.*/
     63	__be16 tci;  /* 0 if no VLAN, VLAN_CFI_MASK set otherwise. */
     64};
     65
     66#define OVS_SW_FLOW_KEY_METADATA_SIZE			\
     67	(offsetof(struct sw_flow_key, recirc_id) +	\
     68	sizeof_field(struct sw_flow_key, recirc_id))
     69
     70struct ovs_key_nsh {
     71	struct ovs_nsh_key_base base;
     72	__be32 context[NSH_MD1_CONTEXT_SIZE];
     73};
     74
     75struct sw_flow_key {
     76	u8 tun_opts[IP_TUNNEL_OPTS_MAX];
     77	u8 tun_opts_len;
     78	struct ip_tunnel_key tun_key;	/* Encapsulating tunnel key. */
     79	struct {
     80		u32	priority;	/* Packet QoS priority. */
     81		u32	skb_mark;	/* SKB mark. */
     82		u16	in_port;	/* Input switch port (or DP_MAX_PORTS). */
     83	} __packed phy; /* Safe when right after 'tun_key'. */
     84	u8 mac_proto;			/* MAC layer protocol (e.g. Ethernet). */
     85	u8 tun_proto;			/* Protocol of encapsulating tunnel. */
     86	u32 ovs_flow_hash;		/* Datapath computed hash value.  */
     87	u32 recirc_id;			/* Recirculation ID.  */
     88	struct {
     89		u8     src[ETH_ALEN];	/* Ethernet source address. */
     90		u8     dst[ETH_ALEN];	/* Ethernet destination address. */
     91		struct vlan_head vlan;
     92		struct vlan_head cvlan;
     93		__be16 type;		/* Ethernet frame type. */
     94	} eth;
     95	/* Filling a hole of two bytes. */
     96	u8 ct_state;
     97	u8 ct_orig_proto;		/* CT original direction tuple IP
     98					 * protocol.
     99					 */
    100	union {
    101		struct {
    102			u8     proto;	/* IP protocol or lower 8 bits of ARP opcode. */
    103			u8     tos;	    /* IP ToS. */
    104			u8     ttl;	    /* IP TTL/hop limit. */
    105			u8     frag;	/* One of OVS_FRAG_TYPE_*. */
    106		} ip;
    107	};
    108	u16 ct_zone;			/* Conntrack zone. */
    109	struct {
    110		__be16 src;		/* TCP/UDP/SCTP source port. */
    111		__be16 dst;		/* TCP/UDP/SCTP destination port. */
    112		__be16 flags;		/* TCP flags. */
    113	} tp;
    114	union {
    115		struct {
    116			struct {
    117				__be32 src;	/* IP source address. */
    118				__be32 dst;	/* IP destination address. */
    119			} addr;
    120			union {
    121				struct {
    122					__be32 src;
    123					__be32 dst;
    124				} ct_orig;	/* Conntrack original direction fields. */
    125				struct {
    126					u8 sha[ETH_ALEN];	/* ARP source hardware address. */
    127					u8 tha[ETH_ALEN];	/* ARP target hardware address. */
    128				} arp;
    129			};
    130		} ipv4;
    131		struct {
    132			struct {
    133				struct in6_addr src;	/* IPv6 source address. */
    134				struct in6_addr dst;	/* IPv6 destination address. */
    135			} addr;
    136			__be32 label;			/* IPv6 flow label. */
    137			u16 exthdrs;	/* IPv6 extension header flags */
    138			union {
    139				struct {
    140					struct in6_addr src;
    141					struct in6_addr dst;
    142				} ct_orig;	/* Conntrack original direction fields. */
    143				struct {
    144					struct in6_addr target;	/* ND target address. */
    145					u8 sll[ETH_ALEN];	/* ND source link layer address. */
    146					u8 tll[ETH_ALEN];	/* ND target link layer address. */
    147				} nd;
    148			};
    149		} ipv6;
    150		struct {
    151			u32 num_labels_mask;    /* labels present bitmap of effective length MPLS_LABEL_DEPTH */
    152			__be32 lse[MPLS_LABEL_DEPTH];     /* label stack entry  */
    153		} mpls;
    154
    155		struct ovs_key_nsh nsh;         /* network service header */
    156	};
    157	struct {
    158		/* Connection tracking fields not packed above. */
    159		struct {
    160			__be16 src;	/* CT orig tuple tp src port. */
    161			__be16 dst;	/* CT orig tuple tp dst port. */
    162		} orig_tp;
    163		u32 mark;
    164		struct ovs_key_ct_labels labels;
    165	} ct;
    166
    167} __aligned(BITS_PER_LONG/8); /* Ensure that we can do comparisons as longs. */
    168
    169static inline bool sw_flow_key_is_nd(const struct sw_flow_key *key)
    170{
    171	return key->eth.type == htons(ETH_P_IPV6) &&
    172		key->ip.proto == NEXTHDR_ICMP &&
    173		key->tp.dst == 0 &&
    174		(key->tp.src == htons(NDISC_NEIGHBOUR_SOLICITATION) ||
    175		 key->tp.src == htons(NDISC_NEIGHBOUR_ADVERTISEMENT));
    176}
    177
    178struct sw_flow_key_range {
    179	unsigned short int start;
    180	unsigned short int end;
    181};
    182
    183struct sw_flow_mask {
    184	int ref_count;
    185	struct rcu_head rcu;
    186	struct sw_flow_key_range range;
    187	struct sw_flow_key key;
    188};
    189
    190struct sw_flow_match {
    191	struct sw_flow_key *key;
    192	struct sw_flow_key_range range;
    193	struct sw_flow_mask *mask;
    194};
    195
    196#define MAX_UFID_LENGTH 16 /* 128 bits */
    197
    198struct sw_flow_id {
    199	u32 ufid_len;
    200	union {
    201		u32 ufid[MAX_UFID_LENGTH / 4];
    202		struct sw_flow_key *unmasked_key;
    203	};
    204};
    205
    206struct sw_flow_actions {
    207	struct rcu_head rcu;
    208	size_t orig_len;	/* From flow_cmd_new netlink actions size */
    209	u32 actions_len;
    210	struct nlattr actions[];
    211};
    212
    213struct sw_flow_stats {
    214	u64 packet_count;		/* Number of packets matched. */
    215	u64 byte_count;			/* Number of bytes matched. */
    216	unsigned long used;		/* Last used time (in jiffies). */
    217	spinlock_t lock;		/* Lock for atomic stats update. */
    218	__be16 tcp_flags;		/* Union of seen TCP flags. */
    219};
    220
    221struct sw_flow {
    222	struct rcu_head rcu;
    223	struct {
    224		struct hlist_node node[2];
    225		u32 hash;
    226	} flow_table, ufid_table;
    227	int stats_last_writer;		/* CPU id of the last writer on
    228					 * 'stats[0]'.
    229					 */
    230	struct sw_flow_key key;
    231	struct sw_flow_id id;
    232	struct cpumask cpu_used_mask;
    233	struct sw_flow_mask *mask;
    234	struct sw_flow_actions __rcu *sf_acts;
    235	struct sw_flow_stats __rcu *stats[]; /* One for each CPU.  First one
    236					   * is allocated at flow creation time,
    237					   * the rest are allocated on demand
    238					   * while holding the 'stats[0].lock'.
    239					   */
    240};
    241
    242struct arp_eth_header {
    243	__be16      ar_hrd;	/* format of hardware address   */
    244	__be16      ar_pro;	/* format of protocol address   */
    245	unsigned char   ar_hln;	/* length of hardware address   */
    246	unsigned char   ar_pln;	/* length of protocol address   */
    247	__be16      ar_op;	/* ARP opcode (command)     */
    248
    249	/* Ethernet+IPv4 specific members. */
    250	unsigned char       ar_sha[ETH_ALEN];	/* sender hardware address  */
    251	unsigned char       ar_sip[4];		/* sender IP address        */
    252	unsigned char       ar_tha[ETH_ALEN];	/* target hardware address  */
    253	unsigned char       ar_tip[4];		/* target IP address        */
    254} __packed;
    255
    256static inline u8 ovs_key_mac_proto(const struct sw_flow_key *key)
    257{
    258	return key->mac_proto & ~SW_FLOW_KEY_INVALID;
    259}
    260
    261static inline u16 __ovs_mac_header_len(u8 mac_proto)
    262{
    263	return mac_proto == MAC_PROTO_ETHERNET ? ETH_HLEN : 0;
    264}
    265
    266static inline u16 ovs_mac_header_len(const struct sw_flow_key *key)
    267{
    268	return __ovs_mac_header_len(ovs_key_mac_proto(key));
    269}
    270
    271static inline bool ovs_identifier_is_ufid(const struct sw_flow_id *sfid)
    272{
    273	return sfid->ufid_len;
    274}
    275
    276static inline bool ovs_identifier_is_key(const struct sw_flow_id *sfid)
    277{
    278	return !ovs_identifier_is_ufid(sfid);
    279}
    280
    281void ovs_flow_stats_update(struct sw_flow *, __be16 tcp_flags,
    282			   const struct sk_buff *);
    283void ovs_flow_stats_get(const struct sw_flow *, struct ovs_flow_stats *,
    284			unsigned long *used, __be16 *tcp_flags);
    285void ovs_flow_stats_clear(struct sw_flow *);
    286u64 ovs_flow_used_time(unsigned long flow_jiffies);
    287
    288int ovs_flow_key_update(struct sk_buff *skb, struct sw_flow_key *key);
    289int ovs_flow_key_update_l3l4(struct sk_buff *skb, struct sw_flow_key *key);
    290int ovs_flow_key_extract(const struct ip_tunnel_info *tun_info,
    291			 struct sk_buff *skb,
    292			 struct sw_flow_key *key);
    293/* Extract key from packet coming from userspace. */
    294int ovs_flow_key_extract_userspace(struct net *net, const struct nlattr *attr,
    295				   struct sk_buff *skb,
    296				   struct sw_flow_key *key, bool log);
    297
    298#endif /* flow.h */