diff options
Diffstat (limited to 'src/flow_stat_parser.cpp')
-rw-r--r-- | src/flow_stat_parser.cpp | 426 |
1 files changed, 325 insertions, 101 deletions
diff --git a/src/flow_stat_parser.cpp b/src/flow_stat_parser.cpp index 59de7481..2ab273a6 100644 --- a/src/flow_stat_parser.cpp +++ b/src/flow_stat_parser.cpp @@ -20,39 +20,72 @@ */ #include <netinet/in.h> -#include <common/basic_utils.h> -#include <common/Network/Packet/IPHeader.h> -#include <common/Network/Packet/TcpHeader.h> -#include <common/Network/Packet/IPv6Header.h> -#include <common/Network/Packet/EthernetHeader.h> -#include <flow_stat_parser.h> +#include "common/basic_utils.h" +#include "common/Network/Packet/EthernetHeader.h" +#include "common/Network/Packet/IPHeader.h" +#include "common/Network/Packet/IPv6Header.h" +#include "common/Network/Packet/TcpHeader.h" +#include "test_pkt_gen.h" +#include "flow_stat_parser.h" void CFlowStatParser::reset() { + m_start = 0; + m_len = 0; m_ipv4 = 0; + m_ipv6 = 0; m_l4_proto = 0; + m_l4 = 0; + m_vlan_offset = 0; m_stat_supported = false; } int CFlowStatParser::parse(uint8_t *p, uint16_t len) { EthernetHeader *ether = (EthernetHeader *)p; - int min_len = ETH_HDR_LEN + IPV4_HDR_LEN; + int min_len = ETH_HDR_LEN; reset(); if (len < min_len) return -1; + m_start = p; + m_len = len; switch( ether->getNextProtocol() ) { case EthernetHeader::Protocol::IP : + min_len += IPV4_HDR_LEN; + if (len < min_len) + return -1; m_ipv4 = (IPHeader *)(p + ETH_HDR_LEN); + m_l4 = ((uint8_t *)m_ipv4) + m_ipv4->getHeaderLength(); + m_l4_proto = m_ipv4->getProtocol(); + m_stat_supported = true; + break; + case EthernetHeader::Protocol::IPv6 : + min_len += IPV6_HDR_LEN; + if (len < min_len) + return -1; + m_ipv6 = (IPv6Header *)(p + ETH_HDR_LEN); m_stat_supported = true; break; case EthernetHeader::Protocol::VLAN : + m_vlan_offset = 4; min_len += 4; if (len < min_len) return -1; switch ( ether->getVlanProtocol() ){ case EthernetHeader::Protocol::IP: - m_ipv4 = (IPHeader *)(p + 18); + min_len += IPV4_HDR_LEN; + if (len < min_len) + return -1; + m_ipv4 = (IPHeader *)(p + ETH_HDR_LEN + 4); + m_l4 = ((uint8_t *)m_ipv4) + m_ipv4->getHeaderLength(); + m_l4_proto = m_ipv4->getProtocol(); + m_stat_supported = true; + break; + case EthernetHeader::Protocol::IPv6 : + min_len += IPV6_HDR_LEN; + if (len < min_len) + return -1; + m_ipv6 = (IPv6Header *)(p + ETH_HDR_LEN + 4); m_stat_supported = true; break; default: @@ -70,74 +103,160 @@ int CFlowStatParser::parse(uint8_t *p, uint16_t len) { return 0; } -int CFlowStatParser::get_ip_id(uint16_t &ip_id) { - if (! m_ipv4) - return -1; +int CFlowStatParser::get_ip_id(uint32_t &ip_id) { + if (m_ipv4) { + ip_id = m_ipv4->getId(); + return 0; + } - ip_id = m_ipv4->getId(); + if (m_ipv6) { + ip_id = m_ipv6->getFlowLabel(); + return 0; + } - return 0; + return -1; } -int CFlowStatParser::set_ip_id(uint16_t new_id) { - if (! m_ipv4) - return -1; +int CFlowStatParser::set_ip_id(uint32_t new_id) { + if (m_ipv4) { + // Updating checksum, not recalculating, so if someone put bad checksum on purpose, it will stay bad + m_ipv4->updateCheckSum(PKT_NTOHS(m_ipv4->getId()), PKT_NTOHS(new_id)); + m_ipv4->setId(new_id); + return 0; + } - // Updating checksum, not recalculating, so if someone put bad checksum on purpose, it will stay bad - m_ipv4->updateCheckSum(PKT_NTOHS(m_ipv4->getId()), PKT_NTOHS(new_id)); - m_ipv4->setId(new_id); + if (m_ipv6) { + m_ipv6->setFlowLabel(new_id); + return 0; + } + return -1; +} - return 0; +int CFlowStatParser::get_l3_proto(uint16_t &proto) { + if (m_ipv4) { + proto = EthernetHeader::Protocol::IP; + return 0; + } + + if (m_ipv6) { + proto = EthernetHeader::Protocol::IPv6; + return 0; + } + + return -1; } int CFlowStatParser::get_l4_proto(uint8_t &proto) { - if (! m_ipv4) - return -1; + if (m_ipv4) { + proto = m_ipv4->getProtocol(); + return 0; + } - proto = m_ipv4->getProtocol(); + if (m_ipv6) { + if (!m_l4) { + uint16_t payload_len; + // in IPv6 we calculate l4 proto only when running get_payload_len + get_payload_len(m_start, m_len, payload_len); + } + proto = m_l4_proto; + return 0; + } - return 0; + return -1; +} + +uint16_t CFlowStatParser::get_pkt_size() { + uint16_t ip_len=0; + + if (m_ipv4) { + ip_len = m_ipv4->getTotalLength(); + } else if (m_ipv6) { + ip_len = m_ipv6->getHeaderLength() + m_ipv6->getPayloadLen(); + } + return ( ip_len + m_vlan_offset + ETH_HDR_LEN); +} + +uint8_t CFlowStatParser::get_ttl(){ + if (m_ipv4) { + return ( m_ipv4->getTimeToLive() ); + } + if (m_ipv6) { + return ( m_ipv6->getHopLimit() ); + } + return (0); } // calculate the payload len. Do not want to do this in parse(), since this is required only in -// specific cases, while parse is used in many places (including on packet RX path, where we want to bo as fast as possible) +// specific cases, while parse is used in many places (including on packet RX path, where we want to be as fast as possible) int CFlowStatParser::get_payload_len(uint8_t *p, uint16_t len, uint16_t &payload_len) { uint16_t l2_header_len; uint16_t l3_header_len; uint16_t l4_header_len; + uint8_t *p_l3 = NULL; uint8_t *p_l4 = NULL; TCPHeader *p_tcp = NULL; - if (!m_ipv4) { + if (!m_ipv4 && !m_ipv6) { payload_len = 0; return -1; } - l2_header_len = ((uint8_t *)m_ipv4) - p; - l3_header_len = m_ipv4->getHeaderLength(); - switch (m_ipv4->getProtocol()) { + if (m_ipv4) { + l2_header_len = ((uint8_t *)m_ipv4) - p; + l3_header_len = m_ipv4->getHeaderLength(); + m_l4_proto = m_ipv4->getProtocol(); + p_l3 = (uint8_t *)m_ipv4; + } else if (m_ipv6) { + uint8_t *next_header; + uint8_t next_header_type; + uint16_t len_left; + + p_l3 = (uint8_t *)m_ipv6; + l2_header_len = ((uint8_t *)m_ipv6) - p; + next_header_type = m_ipv6->getNextHdr(); + next_header = p_l3 + IPV6_HDR_LEN; + l3_header_len = IPV6_HDR_LEN; + len_left = len - IPV6_HDR_LEN; + while ((next_header_type != IPPROTO_UDP) && (next_header_type != IPPROTO_TCP) && + (next_header_type != IPPROTO_NONE) && (len_left >= 2)) { + next_header_type = next_header[0]; + uint16_t curr_header_len = (next_header[1] + 1) * 8; + next_header += curr_header_len; + l3_header_len += curr_header_len; + len_left -= curr_header_len; + } + if ((next_header_type != IPPROTO_UDP) && (next_header_type != IPPROTO_TCP)) { + // L4 type we don't know. Assume everyting after IPv6 header is L4 + l3_header_len = IPV6_HDR_LEN; + m_l4_proto = m_ipv6->getNextHdr(); + } else { + m_l4_proto = next_header_type; + } + } + + switch (m_l4_proto) { case IPPROTO_UDP: l4_header_len = 8; break; case IPPROTO_TCP: - p_l4 = ((uint8_t *)m_ipv4) + l3_header_len; + p_l4 = p_l3 + l3_header_len; if ((p_l4 + TCP_HEADER_LEN) > (p + len)) { //Not enough space for TCP header payload_len = 0; - return -1; + return -2; } p_tcp = (TCPHeader *)p_l4; l4_header_len = p_tcp->getHeaderLength(); break; case IPPROTO_ICMP: - l4_header_len = 8; - break; + l4_header_len = 8; + break; default: l4_header_len = 0; } if (len < l2_header_len + l3_header_len + l4_header_len) { payload_len = 0; - return -1; + return -3; } payload_len = len - l2_header_len - l3_header_len - l4_header_len; @@ -146,78 +265,128 @@ int CFlowStatParser::get_payload_len(uint8_t *p, uint16_t len, uint16_t &payload } static const uint16_t TEST_IP_ID = 0xabcd; +static const uint16_t TEST_IP_ID2 = 0xabcd; static const uint8_t TEST_L4_PROTO = IPPROTO_UDP; -int CFlowStatParser::test() { - uint16_t ip_id = 0; - uint8_t l4_proto; - uint8_t test_pkt[] = { - // ether header - 0x74, 0xa2, 0xe6, 0xd5, 0x39, 0x25, - 0xa0, 0x36, 0x9f, 0x38, 0xa4, 0x02, - 0x81, 0x00, - 0x0a, 0xbc, 0x08, 0x00, // vlan - // IP header - 0x45,0x02,0x00,0x30, - 0x01,0x02,0x40,0x00, - 0xff, TEST_L4_PROTO, 0xbd,0x04, - 0x10,0x0,0x0,0x1, - 0x30,0x0,0x0,0x1, - // TCP heaader - 0xab, 0xcd, 0x00, 0x80, // src, dst ports - 0x01, 0x02, 0x03, 0x04, 0x05, 0x06, 0x07, 0x08, // seq num, ack num - 0x50, 0x00, 0xff, 0xff, // Header size, flags, window size - 0x00, 0x00, 0x00, 0x00, // checksum ,urgent pointer - // some extra bytes - 0x1, 0x2, 0x3, 0x4 - }; - - // good packet - assert (parse(test_pkt, sizeof(test_pkt)) == 0); - m_ipv4->updateCheckSum(); - assert(m_ipv4->isChecksumOK() == true); - set_ip_id(TEST_IP_ID); - // utl_DumpBuffer(stdout, test_pkt, sizeof(test_pkt), 0); - get_ip_id(ip_id); - assert(ip_id == TEST_IP_ID); - assert(m_ipv4->isChecksumOK() == true); - assert(get_l4_proto(l4_proto) == 0); - assert(l4_proto == TEST_L4_PROTO); - assert(m_stat_supported == true); - - // payload len test - uint16_t payload_len; + +int CFlowStatParserTest::verify_pkt_one_parser(uint8_t * p, uint16_t pkt_size, uint16_t payload_len, uint32_t ip_id + , uint8_t l4_proto, CFlowStatParser &parser, bool sup_pkt) { int ret; - ret = get_payload_len(test_pkt, sizeof(test_pkt), payload_len); - // UDP packet. - assert(ret == 0); - assert(payload_len == 16); - reset(); - // ICMP packet - test_pkt[27] = IPPROTO_ICMP; - assert (parse(test_pkt, sizeof(test_pkt)) == 0); - ret = get_payload_len(test_pkt, sizeof(test_pkt), payload_len); - assert(ret == 0); - assert(payload_len == 16); - // TCP packet - test_pkt[27] = IPPROTO_TCP; - assert (parse(test_pkt, sizeof(test_pkt)) == 0); - ret = get_payload_len(test_pkt, sizeof(test_pkt), payload_len); - assert(ret == 0); - assert(payload_len == 4); - // Other protocol - test_pkt[27] = 0xaa; - assert (parse(test_pkt, sizeof(test_pkt)) == 0); - ret = get_payload_len(test_pkt, sizeof(test_pkt), payload_len); - assert(ret == 0); - assert(payload_len == 24); + uint32_t pkt_ip_id = 0; + uint8_t pkt_l4_proto; + uint16_t pkt_payload_len; + + ret = parser.parse(p, pkt_size); + if (sup_pkt) { + assert (ret == 0); + parser.get_ip_id(pkt_ip_id); + assert(pkt_ip_id == ip_id); + parser.set_ip_id(TEST_IP_ID2); + // utl_DumpBuffer(stdout, test_pkt, sizeof(test_pkt), 0); + parser.get_ip_id(ip_id); + assert(ip_id == TEST_IP_ID2); + if (parser.m_ipv4) + assert(parser.m_ipv4->isChecksumOK() == true); + assert(parser.get_l4_proto(pkt_l4_proto) == 0); + assert(pkt_l4_proto == l4_proto); + assert(parser.m_stat_supported == true); + ret = parser.get_payload_len(p, pkt_size, pkt_payload_len); + assert(ret == 0); + assert(pkt_payload_len == payload_len); + } else { + assert(ret != 0); + assert(parser.m_stat_supported == false); + } - reset(); + return 0; +} + +int CFlowStatParserTest::verify_pkt(uint8_t *p, uint16_t pkt_size, uint16_t payload_len, uint32_t ip_id, uint8_t l4_proto + , uint16_t flags) { + int ret, ret_val; + CFlowStatParser parser; + C82599Parser parser82599(false); + C82599Parser parser82599_vlan(true); + + printf (" "); + if ((flags & P_OK) || (flags & P_BAD)) { + printf("general parser"); + ret = verify_pkt_one_parser(p, pkt_size, payload_len, ip_id, l4_proto, parser, flags & P_OK); + ret_val = ret; + if (ret == 0) + printf("-OK"); + else { + printf("-BAD"); + } + } + if ((flags & P82599_OK) || (flags & P82599_BAD)) { + printf(", 82599 parser"); + ret = verify_pkt_one_parser(p, pkt_size, payload_len, ip_id, l4_proto, parser82599, flags & P82599_OK); + ret_val |= ret; + if (ret == 0) + printf("-OK"); + else { + printf("-BAD"); + } + } + if ((flags & P82599_VLAN_OK) || (flags & P82599_VLAN_BAD)) { + printf(", 82599 vlan parser"); + ret = verify_pkt_one_parser(p, pkt_size, payload_len, ip_id, l4_proto, parser82599_vlan, flags & P82599_VLAN_OK); + ret_val |= ret; + if (ret == 0) + printf("-OK"); + else { + printf("-BAD"); + } + } + printf("\n"); + + return 0; +} + +int CFlowStatParserTest::test_one_pkt(const char *name, uint16_t ether_type, uint8_t l4_proto, bool is_vlan + , uint16_t verify_flags) { + CTestPktGen gen; + uint8_t *p; + int pkt_size; + uint16_t payload_len = 16; + uint16_t pkt_flags; + int ret = 0; + + printf("%s - ", name); + + // in case of IPv6, we add rx_check header, just to make sure we now how to parse with multiple headers + if (is_vlan) { + pkt_flags = DPF_VLAN | DPF_RXCHECK; + } else { + pkt_flags = DPF_RXCHECK; + } + + p = (uint8_t *)gen.create_test_pkt(ether_type, l4_proto, 255, TEST_IP_ID, pkt_flags, payload_len, pkt_size); + ret = verify_pkt(p, pkt_size, payload_len, TEST_IP_ID, l4_proto, verify_flags); + free(p); - // bad packet. change eth protocol - test_pkt[16] = 0xaa; - assert (parse(test_pkt, sizeof(test_pkt)) == -1); - assert(m_stat_supported == false); + return ret; +} + +int CFlowStatParserTest::test() { + bool vlan = true; + uint8_t tcp = IPPROTO_TCP, udp = IPPROTO_UDP, icmp = IPPROTO_ICMP; + uint16_t ipv4 = EthernetHeader::Protocol::IP, ipv6 = EthernetHeader::Protocol::IPv6; + + test_one_pkt("IPv4 TCP", ipv4, tcp, !vlan, P_OK | P82599_OK | P82599_VLAN_BAD); + test_one_pkt("IPv4 TCP VLAN", ipv4, tcp, vlan, P_OK | P82599_BAD | P82599_VLAN_OK); + test_one_pkt("IPv4 UDP", ipv4, udp, !vlan, P_OK | P82599_OK | P82599_VLAN_BAD); + test_one_pkt("IPv4 UDP VLAN", ipv4, udp, vlan, P_OK | P82599_BAD | P82599_VLAN_OK); + test_one_pkt("IPv4 ICMP", ipv4, icmp, !vlan, P_OK | P82599_OK | P82599_VLAN_BAD); + test_one_pkt("IPv4 ICMP VLAN", ipv4, icmp, vlan, P_OK | P82599_BAD | P82599_VLAN_OK); + test_one_pkt("IPv6 TCP", ipv6, tcp, !vlan, P_OK | P82599_BAD | P82599_VLAN_BAD); + test_one_pkt("IPv6 TCP VLAN", ipv6, tcp, vlan, P_OK | P82599_BAD | P82599_VLAN_BAD); + test_one_pkt("IPv6 UDP", ipv6, udp, !vlan, P_OK | P82599_BAD | P82599_VLAN_BAD); + test_one_pkt("IPv6 UDP VLAN", ipv6, udp, vlan, P_OK | P82599_BAD | P82599_VLAN_BAD); + test_one_pkt("IPv4 IGMP", ipv4, IPPROTO_IGMP, !vlan, P_OK | P82599_OK | P82599_VLAN_BAD); + test_one_pkt("BAD l3 type", 0xaa, icmp, !vlan, P_BAD | P82599_BAD | P82599_VLAN_BAD); + test_one_pkt("VLAN + BAD l3 type", 0xaa, icmp, vlan, P_BAD | P82599_BAD | P82599_VLAN_BAD); return 0; } @@ -263,3 +432,58 @@ int C82599Parser::parse(uint8_t *p, uint16_t len) { return 0; } + +bool CSimplePacketParser::Parse(){ + + rte_mbuf_t * m=m_m; + uint8_t *p=rte_pktmbuf_mtod(m, uint8_t*); + EthernetHeader *m_ether = (EthernetHeader *)p; + IPHeader * ipv4=0; + IPv6Header * ipv6=0; + m_vlan_offset=0; + uint8_t protocol = 0; + + // Retrieve the protocol type from the packet + switch( m_ether->getNextProtocol() ) { + case EthernetHeader::Protocol::IP : + // IPv4 packet + ipv4=(IPHeader *)(p+14); + m_l4 = (uint8_t *)ipv4 + ipv4->getHeaderLength(); + protocol = ipv4->getProtocol(); + break; + case EthernetHeader::Protocol::IPv6 : + // IPv6 packet + ipv6=(IPv6Header *)(p+14); + m_l4 = (uint8_t *)ipv6 + ipv6->getHeaderLength(); + protocol = ipv6->getNextHdr(); + break; + case EthernetHeader::Protocol::VLAN : + m_vlan_offset = 4; + switch ( m_ether->getVlanProtocol() ){ + case EthernetHeader::Protocol::IP: + // IPv4 packet + ipv4=(IPHeader *)(p+18); + m_l4 = (uint8_t *)ipv4 + ipv4->getHeaderLength(); + protocol = ipv4->getProtocol(); + break; + case EthernetHeader::Protocol::IPv6 : + // IPv6 packet + ipv6=(IPv6Header *)(p+18); + m_l4 = (uint8_t *)ipv6 + ipv6->getHeaderLength(); + protocol = ipv6->getNextHdr(); + break; + default: + break; + } + default: + break; + } + m_protocol =protocol; + m_ipv4=ipv4; + m_ipv6=ipv6; + + if ( protocol == 0 ){ + return (false); + } + return (true); +} |